ISSN 2220-9085 (online)
ISSN 2412-3587 (print)

Previous Issue (Vol. 1, No. 3), 2011

PDF Icon

REUSABILITY ASSESSMENT OF OPEN SOURCE COMPONENTS FOR SOFTWARE PRODUCT LINES

Author/s:  Fazal-e- Amin, Ahmad Kamil Mahmood, Alan Oxley
Pages:  519-533
PDF Icon

DETECTING SLEEP DEPRIVATION ATTACK OVER MANET USING A DANGER THEORY-BASED ALGORITHM

Author/s:  Maha Abdelhaq, Rosilah Hassan, Mahamod Ismail, Raed Alsaqour, Daud Israf
Pages:  534-541
PDF Icon

QOS MEASUREMENT OF SINGLE-HOP PERIODIC COMMUNICATION IN VEHICULAR ENVIRONMENT

Author/s:  Bilal Munir Mughal, Asif Ali Wagan, Halabi Hasbullah
Pages:  542-552
PDF Icon

EXPLORATION ON SCALABILITY OF DATABASE BULK INSERTION WITH MULTITHREADING

Author/s:  Boon-Wee Low, Boon-Yaik Ooi, and Chee-Siang Wong
Pages:  553-564
PDF Icon

MODEL-BASED SECURITY ENGINEERING OF SOA SYSTEM USING SECURITY INTENT DSL

Author/s:  Muhammad Qaiser Saleem, Jafreezal Jaafar, Mohd Fadzil Hassan
Pages:  565-580
PDF Icon

COMPUTATIONALLY INEXPENSIVE SEQUENTIAL FORWARD FLOATING SELECTION FOR ACQUIRING SIGNIFICANT FEATURES FOR AUTHORSHIP INVARIANCENESS IN WRITER IDENTIFICATION

Author/s:  Satrya Fajri Pratama, Azah Kamilah Muda, Yun-Huoy Choo, and Noor Azilah Muda
Pages:  581-598
PDF Icon
PDF Icon

FACTORS FOR KMS POST ADOPTION: THE EXPLORATORY STUDY IN OIL AND GAS INDUSTRY IN MALAYSIA

Author/s:  Sureena Matayong, Ahmad Kamil Bin Mahmood
Pages:  615-623
PDF Icon

ONE-TIME KEY AND DIAMETER MESSAGE AUTHENTICATION PROTOCOL FOR PROXY MOBILE IPV6

Author/s:  Md. Mahedi Hassan, Poo Kuan Hoong
Pages:  624-639
PDF Icon

SEMANTIC WEB SERVICE COMPOSITION APPROACHES: OVERVIEW AND LIMITATIONS

Author/s:  Furkh Zeshan, Radziah Mohamad
Pages:  640-651
PDF Icon

CLASSIFICATION AND MEASUREMENT ON C OVERFLOW VULNERABILITIES ATTACK

Author/s:  Nurul Haszeli Ahmad, Syed Ahmad Aljunid, Jamalul-lail Ab Manan
Pages:  652-664
PDF Icon

BLOG QUALITY MEASUREMENT: ANALYSIS OF CRITERIA USING THE RASCH MODEL

Author/s:  Zuhaira Muhammad Zain, Abdul Azim Abd Ghani, Rusli Abdullah, Rodziah Atan, Razali Yaakob
Pages:  665-682
PDF Icon

APPLYING ROUGH SET THEORY IN MULTIMEDIA DATA CLASSIFICATION

Author/s:  M Nordin A Rahman, Yuzarimi M Lazim, Farham Mohamed
Pages:  683-693
PDF Icon

OPTIMIZING DECISION TREE IN MALWARE CLASSIFICATION SYSTEM BY USING GENETIC ALGORITHM

Author/s:  Mohd Najwadi Yusoff, Aman Jantan
Pages:  694-713
PDF Icon

AN EXTENDED SIMULATION OF COMPLEX TASK PARTITIONING METHOD IN ASELF-ORGANIZED ROBOTICS SWARM

Author/s:  Mehrdad Jangjou, Alireza Bagheri, Mohammad Mansour Riahi Kashani, Koosha Sadeghi Oskooyee
Pages:  714-720
PDF Icon
PDF Icon

INTEGRATED KMS@EWS OF CONCEPTUAL IMPLEMENTATION MODEL FOR CLINICAL DENGUE FEVER ENVIRONMENT

Author/s:  Norzaliha Mohamad Noor, Rusli Abdullah, Mohd Hasan Selamat
Pages:  743-756
PDF Icon

DYNAMIC LOAD BALANCING POLICY WITH COMMUNICATION AND COMPUTATION ELEMENTS IN GRID COMPUTING WITH MULTI-AGENT SYSTEM INTEGRATION

Author/s:  Bakri Yahaya, Rohaya Latip, Mohamed Othman, Azizol Abdullah
Pages:  757-765
PDF Icon

TOWARDS A DYNAMIC FILE INTEGRITY MONITOR THROUGH A SECURITY CLASSIFICATION

Author/s:  Zul Hilmi Abdullah, Nur Izura Udzir, Ramlan Mahmod, and Khairulmizam Samsudin
Pages:  766-779
PDF Icon

EVALUATING COMPLEXITY OF TASK KNOWLEDGE PATTERNS THROUGH REUSABILITY ASSESSMENT

Author/s:  Cheah WaiShiang, Cheah WaiShiang, Edwin Mit, Azman Bujang Masli
Pages:  780-796