Vol 9, No 2-10

Technology Transforming Lives II

Chief Editor: Dayang NurFatimah Awang Iskandar
Editors: Jane Labadin, Johari Abdullah, Kartinah Zen,  Stephanie Chua Hui Li, Nuha Loling Othman, Chai Soo See, Cheah Wai Shiang, Inson Din

Table of Contents

Articles

CMOS Power Amplifier Design Techniques for UWB Communication: A Review PDF
R. Sapawi, D.H.A. Mohamad, D.S.A.A. Yusuf, S.K. Sahari, D.N.S.D.A. Salleh, N.A.H.A. Hazis, S.A.Z. Murad 1-8
The Analysis of Low Phase Nonlinearity 3.1-6 GHz CMOS Power Amplifier for UWB System PDF
R. Sapawi, D.N.S.D.A. Salleh, S.K. Sahari, S.M.W. Masra, D.A.A. Mat, K. Kipli, S.A.Z. Murad 9-14
A Comparative Study of the Classification of Skin Burn Depth in Human PDF
P.N. Kuan, S. Chua, E.B. Safawi, H.H. Wang, W. Tiong 15-23
Internal Control and Standard Operating Procedures in Malaysian Corporations PDF
Nadianatra Musa, Bob Clift 25-31
An Online Numeral Recognition System Using Improved Structural Features – A Unified Method for Handwritten Arabic and Persian Numerals PDF
Jaafar M. Alghazo, Ghazanfar Latif, Ammar Elhassan, Loay Alzubaidi, Ahmad Al-Hmouz, Rami Al-Hmouz 33-40
Minimizing Human Labelling Effort for Annotating Named Entities in Historical Newspaper PDF
W. M. F. Wan Tamlikha, B. Ranaivo-Malançon, S. Chua 41-46
Evaluating Layout and Clustering Algorithms for Visualizing Named Entity Graph PDF
K. Ibrahim, B. Ranaivo-Malançon, T. Lim, Y.-N. Cheah 47-55
Performance of Opinion Summarization towards Extractive Summarization PDF
H. Iboi, S. Chua, B. Ranaivo-Malançon, N. Kulathuramaiyer 57-64
Cost Efficient Scheduling Through Auction Mechanism in Cloud Computing PDF
Huda Althumali, Masnida Hussin, Zurina Mohd. Hanapi 65-69
A Survey of Cluster Based Routing Protocols for Mobile Ad-Hoc Sensor Network PDF
M. N. Jambli, K. S. Pillay, A. A. Julaihi, A. S. Khan, S. M. Suhaili 71-78
Framework for Measuring the Quality of Software Specification PDF
E. Stephen, E. Mit 79-84
A Comparative Analysis of Feature Detection and Matching Algorithms for Aerial Image Stitching PDF
Mohd Ismail Jolhip, Jacey-Lynn Minoi, Terrin Lim 85-90
Evaluation of Different User Input Types in Interactive Segmentation PDF
Soo See Chai, Kok Luong Goh 91-99
A Methodology for Implementation of Service Learning in Higher Education Institution: A case study from Faculty of Computer Science and Information Technology, UNIMAS PDF
Nadianatra Musa, Dayang Hanani Abang Ibrahim, Johari Abdullah, Suhaila Saee, Fatihah Ramli, Abdul Rahman Mat, Mohd Johan Ahmad Khiri 101-109
Service Learning Support for Academic Learning and Skills Development PDF
M. Salam, D.N.F. Awang Iskandar, D.H. Abang Ibrahim 111-117
Preliminary Experiment Results of Left Ventricular Remodelling Prediction Using Machine Learning Algorithms PDF
D.N.F. Awang Iskandar, P.C. Lim, A. Said, N.H. Mohd Amin, A. Khan, H. Ujir 119-124
Optimal Number of Nodes Deployment Method in Corona-Based WSN PDF
Niayesh Gharaei, Kamalrulnizam Abu Bakar, Siti Zaiton Mohd Hashim, Mohammad Hafiz Mohamed, Syed Othmawi Abd Rahman, Ali Hosseingholi Pourasl 125-129
Achieving Reproducibility Incorporating Service Versioning into Provenance Model PDF
Dayang Hanani Abang Ibrahim, Nadianatra Musa, Chiew Kang Leng, Jane Labadin, Johari Abdullah, Sarina Sulaiman 131-138
A Discrete Event Simulation of Fair Bandwidth Share Mechanism CHOKe-FS PDF
Gamil Gardan, Rohaya Latip 139-144
Chemistry Modelling and Simulation through Agent Oriented Modelling and Netlogo PDF
Cheah WaiShiang, Shane Nissom, Sim Siong Fong, Muhammad Asyraf Khairuddin 145-149
A Hybrid Question Answering System based on Ontology and Topic Modeling PDF
Kwong Seng Fong, Chih How Bong 151-158
Hierarchical Density-based Clustering of Malware Behaviour PDF
Johari Abdullah, Navein Chanderan 159-164
Automatic Segmentation Measuring Function for Cardiac MR-Left Ventricle (LV) Images PDF
D.N.F. Awang Iskandar, A. Khan, P.C. Lim, Y.C. Wang 165-171
A New Zigbee Backoff Approach for Home Healthcare Devices PDF
Halikul Lenando, Azizul Lau 173-177
Threats Advancement in Primary User Emulation Attack and Spectrum Sensing Data Falsification (SSDF) Attack in Cognitive Radio Network (CRN) for 5G Wireless Network Environment PDF
A.H. Fauzi, A.S. Khan 179-183
Relationship Analysis of Keyword and Chapter in Malay-Translated Tafseer of Al-Quran PDF
S. Chua, P.N.E. Nohuddin 185-189
Block Based Image Steganography in Spatial and Frequency Domain PDF
D.N.F Awang Iskandar, Abdulmalik Bacheer Rahhal, Wadood Abdul 191-198


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.

ISSN: 2180-1843

eISSN: 2289-8131