Monday, 22 April 2013

Ant Metaphor on Routing in Packet Access and Unstructured P2P Network

http://comp.utm.my/publications/files/2013/04/Ant-Metaphor-on-Routing-in-Packet-Access-and-Unstructured-P2P-Network.pdf

An Overview Of Curriculum Sequencing Approaches for Personalization of Learning Path

http://comp.utm.my/publications/files/2013/04/An-Overview-Of-Curriculum-Sequencing-Approaches-for-Personalization-of-Learning-Path.pdf

An Improved Decision Making Grid Model for Food Processing Small and Medium Industries

http://comp.utm.my/publications/files/2013/04/An-Improved-Decision-Making-Grid-Model-for-Food-Processing-Small-and-Medium-Industries.pdf

An Embedded Fuzzy Type-2 Controller Base Sensor Behavior for Mobile Roboti

http://comp.utm.my/publications/files/2013/04/An-Embedded-Fuzzy-Type-2-Controller-Base-Sensor-Behavior-for-Mobile-Roboti.pdf

An efficient Automatic Face segmentation Algorithm using Maximum Entropy-Based Thresholding

http://comp.utm.my/publications/files/2013/04/An-efficient-Automatic-Face-segmentation-Algorithm-using-Maximum-Entropy-Based-Thresholding.pdf

An Alternative Model For ERP Maintenance Strategy

http://comp.utm.my/publications/files/2013/04/An-Alternative-Model-For-ERP-Maintenance-Strategy.pdf

AI Application in MCDM- A Review

http://comp.utm.my/publications/files/2013/04/AI-Application-in-MCDM-A-Review.pdf

A Visualization Method to Support Impacts Analysis in Program Understanding

http://comp.utm.my/publications/files/2013/04/A-Visualization-Method-to-Support-Impacts-Analysis-in-Program-Understanding.pdf

A Survey of Client Side Transmission Technique for Improve Quality of Service in Multimedia Over IP

http://comp.utm.my/publications/files/2013/04/A-Survey-of-Client-Side-Transmission-Technique-for-Improve-Quality-of-Service-in-Multimedia-Over-IP.pdf

A Study on R-tree Spatial Indexing for Mobile Georaphical Information System

http://comp.utm.my/publications/files/2013/04/A-Study-on-R-tree-Spatial-Indexing-for-Mobile-Georaphical-Information-System.pdf

A Study of Water Reflection Element in Content Based Image Retrieval using Phase Congruency Edge Detection

http://comp.utm.my/publications/files/2013/04/A-Study-of-Water-Reflection-Element-in-Content-Based-Image-Retrieval-using-Phase-Congruency-Edge-Detection.pdf

A Review on Quality of Service Architectures for Internet Network Service Provider (INSP)

http://comp.utm.my/publications/files/2013/04/A-Review-on-Quality-of-Service-Architectures-for-Internet-Network-Service-Provider-INSP.pdf

A Review on Detecting Stepping Stone Intrusion

http://comp.utm.my/publications/files/2013/04/A-Review-on-Detecting-Stepping-Stone-Intrusion.pdf

A Review of Web Service Composition Approaches

http://comp.utm.my/publications/files/2013/04/A-Review-of-Web-Service-Composition-Approaches.pdf

A Review of Redocumentation Approaches in Software Maintenance

http://comp.utm.my/publications/files/2013/04/A-Review-of-Redocumentation-Approaches-in-Software-Maintenance.pdf

A Review of Machining Parameter based on Features Extraction from DXF File

http://comp.utm.my/publications/files/2013/04/A-Review-of-Machining-Parameter-based-on-Features-Extraction-from-DXF-File.pdf

A Model for Automate Job Assigning and Optimize Number of Processor to Achieve Maximum Performance in Distributed Systemsl

http://comp.utm.my/publications/files/2013/04/A-Model-for-Automate-Job-Assigning-and-Optimize-Number-of-Processor-to-Achieve-Maximum-Performance-in-Distributed-Systemsl.pdf

A Mathematical Walkthrough of Weighted Central Moments and Its Relation to Geometric Moment

http://comp.utm.my/publications/files/2013/04/A-Mathematical-Walkthrough-of-Weighted-Central-Moments-and-Its-Relation-to-Geometric-Moment.pdf

A Design of Knowledge Management System for Knowledge Management Strategy Measurement

http://comp.utm.my/publications/files/2013/04/A-Design-of-Knowledge-Management-System-for-Knowledge-Management-Strategy-Measurement.pdf

A Critical Review of Question Formulation in Polygraph Literature of Polygraphic Method for Counterproductive Behaviour

http://comp.utm.my/publications/files/2013/04/A-Critical-Review-of-Question-Formulation-in-Polygraph-Literature-of-Polygraphic-Method-for-Counterproductive-Behaviour.pdf

A Case Study on Multifaceted Requirement Traceability

http://comp.utm.my/publications/files/2013/04/A-Case-Study-on-Multifaceted-Requirement-Traceability.pdf

3D Reconstruction of Trabecular Bone Using Visualization and Modeling Techniques- A Review

http://comp.utm.my/publications/files/2013/04/3D-Reconstruction-of-Trabecular-Bone-Using-Visualization-and-Modeling-Techniques-A-Review.pdf

Sunday, 21 April 2013

Web Caching and Prefetching- Techniques and Analysis in World Wide Web

http://comp.utm.my/publications/files/2013/04/Web-Caching-and-Prefetching-Techniques-and-Analysis-in-World-Wide-Web.pdf

Visualization of Impact Analysis Software as a Tool of Reverse Engineering Technique

http://comp.utm.my/publications/files/2013/04/Visualization-of-Impact-Analysis-Software-as-a-Tool-of-Reverse-Engineering-Technique.pdf

Unsupervised Anomaly Detection with Unlabeled Data using Clustering

http://comp.utm.my/publications/files/2013/04/Unsupervised-Anomaly-Detection-with-Unlabeled-Data-using-Clustering.pdf

The Development of Ontology for Metabolic Pathways Using METHONTOLOGY

http://comp.utm.my/publications/files/2013/04/The-Development-of-Ontology-for-Metabolic-Pathways-Using-METHONTOLOGY.pdf

Techniques to Infer Gene Networks from Gene Expression Data

http://comp.utm.my/publications/files/2013/04/Techniques-to-Infer-Gene-Networks-from-Gene-Expression-Data.pdf

Surface Deformation Technique for Game Engine Development

http://comp.utm.my/publications/files/2013/04/Surface-Deformation-Technique-for-Game-Engine-Development.pdf

Static Analyzer in Java Code as a Prototype for Reverse Engineering Technique

http://comp.utm.my/publications/files/2013/04/Static-Analyzer-in-Java-Code-as-a-Prototype-for-Reverse-Engineering-Technique.pdf

Ship Hull Fairing Using Nurbs

http://comp.utm.my/publications/files/2013/04/Ship-Hull-Fairing-Using-Nurbs.pdf

Semi-parametric Reliability Analysis of Repair Time Data

http://comp.utm.my/publications/files/2013/04/Semi-parametric-Reliability-Analysis-of-Repair-Time-Data.pdf

Self-Similarity Measurement Methods for Network Traffic Anomaly Detection

http://comp.utm.my/publications/files/2013/04/Self-Similarity-Measurement-Methods-for-Network-Traffic-Anomaly-Detection.pdf

Security Awareness- A Lesson from Tcpdump and Ethereal

http://comp.utm.my/publications/files/2013/04/Security-Awareness-A-Lesson-from-Tcpdump-and-Ethereal.pdf

Preliminary Model and Simulation Towards Crowd Dynamics in Virtual Environments

http://comp.utm.my/publications/files/2013/04/Preliminary-Model-and-Simulation-Towards-Crowd-Dynamics-in-Virtual-Environments.pdf

Prediction Mining Generalization-Based clustering method

Prediction Mining Generalization-Based clustering method

Predicting Protein-Protein Interactions from Proteins Domain Structure Data using Support Vector Machines

http://comp.utm.my/publications/files/2013/04/Predicting-Protein-Protein-Interactions-from-Proteins-Domain-Structure-Data-using-Support-Vector-Machines.pdf

Pengelompokan Selari untuk Data Skala Besar dan Dimensional Tinggi pada Aplikasi Perlombongan Data

http://comp.utm.my/publications/files/2013/04/Pengelompokan-Selari-untuk-Data-Skala-Besar-dan-Dimensional-Tinggi-pada-Aplikasi-Perlombongan-Data.pdf

Pemodelan Indeks Komposit Kuala Lumpur Menggunakan Adaptive Neuro Fuzzy Inference System

http://comp.utm.my/publications/files/2013/04/Pemodelan-Indeks-Komposit-Kuala-Lumpur-Menggunakan-Adaptive-Neuro-Fuzzy-Inference-System.pdf

Outlier Detection Technique in Data Mining- A Research Perspective

http://comp.utm.my/publications/files/2013/04/Outlier-Detection-Technique-in-Data-Mining-A-Research-Perspective.pdf

Optimization of Transportation Problem with Computer Aided Linear Programming

http://comp.utm.my/publications/files/2013/04/Optimization-of-Transportation-Problem-with-Computer-Aided-Linear-Programming.pdf

On The Use of Patterns in Multiagent System Engineering (MaSE) Methodology

http://comp.utm.my/publications/files/2013/04/On-The-Use-of-Patterns-in-Multiagent-System-Engineering-MaSE-Methodology.pdf

Neural Network In Corner Detection Of Chain Code Series

http://comp.utm.my/publications/files/2013/04/Neural-Network-In-Corner-Detection-Of-Chain-Code-Series.pdf

Modular Kohonen-Swarm Clustering for Navigation Pattern in Web- Based Learning System

http://comp.utm.my/publications/files/2013/04/Modular-Kohonen-Swarm-Clustering-for-Navigation-Pattern-in-Web-Based-Learning-System.pdf

Mixing Qualitative and Quantitative Methods in Formulating KMSS within the Context of Malaysian PIHE

http://comp.utm.my/publications/files/2013/04/Mixing-Qualitative-and-Quantitative-Methods-in-Formulating-KMSS-within-the-Context-of-Malaysian-PIHE.pdf

Malay Speech Recognition using Self-Organizing Map and Multilayer Perceptron

http://comp.utm.my/publications/files/2013/04/Malay-Speech-Recognition-using-Self-Organizing-Map-and-Multilayer-Perceptron.pdf

Learning Object Content Models- A Comparative Analysis

http://comp.utm.my/publications/files/2013/04/Learning-Object-Content-Models-A-Comparative-Analysis.pdf

Lattice-Based Firewall for Safety Internet Access

http://comp.utm.my/publications/files/2013/04/Lattice-Based-Firewall-for-Safety-Internet-Access.pdf

Knowledge Management System Architecture for Organizational Learning with Collaborative Environment

http://comp.utm.my/publications/files/2013/04/Knowledge-Management-System-Architecture-for-Organizational-Learning-with-Collaborative-Environment.pdf

Knowledge Management Implementation In Malaysian Public Institution of Higher Education

http://comp.utm.my/publications/files/2013/04/Knowledge-Management-Implementation-In-Malaysian-Public-Institution-of-Higher-Education.pdf

Hard Computing in Intrusion Detection System – A Revisionl

http://comp.utm.my/publications/files/2013/04/Hard-Computing-in-Intrusion-Detection-System-A-Revisionl.pdf

Fuzzy Clustering Algorithms and Their Applications to Chemical Datasets

http://comp.utm.my/publications/files/2013/04/Fuzzy-Clustering-Algorithms-and-Their-Applications-to-Chemical-Datasets.pdf

Experience in Adopting An Embedded Real-Time Component Model in Autonomous Mobile Robot Software Designi

http://comp.utm.my/publications/files/2013/04/Experience-in-Adopting-An-Embedded-Real-Time-Component-Model-in-Autonomous-Mobile-Robot-Software-Designi.pdf

Digital Watermarking Implementation

http://comp.utm.my/publications/files/2013/04/Digital-Watermarking-Implementation.pdf

Development of Hybrid NURBS Skinning Surface Method for Surface Reconstruction

http://comp.utm.my/publications/files/2013/04/Development-of-Hybrid-NURBS-Skinning-Surface-Method-for-Surface-Reconstruction.pdf

Daylight Local Sky Rendering for Real-time Application

http://comp.utm.my/publications/files/2013/04/Daylight-Local-Sky-Rendering-for-Real-time-Application.pdf

Contour Lines Recognition from Raster Topographic Maps

http://comp.utm.my/publications/files/2013/04/Contour-Lines-Recognition-from-Raster-Topographic-Maps.pdf

Conceptualization of Tacit Knowledge Dimension

http://comp.utm.my/publications/files/2013/04/Conceptualization-of-Tacit-Knowledge-Dimension.pdf

Conceptual Design of Biodiversity Data Model (BiDaM) using Object Relational and Event Based Approach

http://comp.utm.my/publications/files/2013/04/Conceptual-Design-of-Biodiversity-Data-Model-BiDaM-using-Object-Relational-and-Event-Based-Approach.pdf

Comparison of TCP Variants Over Self-Similar Traffic

http://comp.utm.my/publications/files/2013/04/Comparison-of-TCP-Variants-Over-Self-Similar-Traffic.pdf

Collision Response between Deformable Objects In Computer Games Environment

http://comp.utm.my/publications/files/2013/04/Collision-Response-between-Deformable-Objects-In-Computer-Games-Environment.pdf

Clustering Spatial Data Using A Kernel-Based Algorithm

http://comp.utm.my/publications/files/2013/04/Clustering-Spatial-Data-Using-A-Kernel-Based-Algorithm.pdf

Canalization and Personalization in Mobile Wireless Application

http://comp.utm.my/publications/files/2013/04/Canalization-and-Personalization-in-Mobile-Wireless-Application.pdf

Building Medium-Scale Friendly Collaborative Virtual Environments- A Town Planning Perspective

http://comp.utm.my/publications/files/2013/04/Building-Medium-Scale-Friendly-Collaborative-Virtual-Environments-A-Town-Planning-Perspective.pdf

Avalanche Analysis of Extended Feistel Network

http://comp.utm.my/publications/files/2013/04/Avalanche-Analysis-of-Extended-Feistel-Network.pdf

Artificial Intelligence Techniques Applied to Intrusion Detection

http://comp.utm.my/publications/files/2013/04/Artificial-Intelligence-Techniques-Applied-to-Intrusion-Detection.pdf

Archiving System of Biomechanics Data using Motion Capture

http://comp.utm.my/publications/files/2013/04/Archiving-System-of-Biomechanics-Data-using-Motion-Capture.pdf

Applying Mobile Agent Technology in Distributed Speech Recognition

http://comp.utm.my/publications/files/2013/04/Applying-Mobile-Agent-Technology-in-Distributed-Speech-Recognition.pdf

Appearance-Preserving on Out-of-Core Simplification in 3D Real-Time Game Engine Development

http://comp.utm.my/publications/files/2013/04/Appearance-Preserving-on-Out-of-Core-Simplification-in-3D-Real-Time-Game-Engine-Development.pdf

An Overview of Artificial Immune System in Pattern Recognition

http://comp.utm.my/publications/files/2013/04/An-Overview-of-Artificial-Immune-System-in-Pattern-Recognition.pdf

An Optimization to the Integrated of Production and Distribution using Hybrid Genetic Algorithm

http://comp.utm.my/publications/files/2013/04/An-Optimization-to-the-Integrated-of-Production-and-Distribution-using-Hybrid-Genetic-Algorithm.pdf

An Optimal Path Planning Algorithm For Large Virtual Environment

http://comp.utm.my/publications/files/2013/04/An-Optimal-Path-Planning-Algorithm-For-Large-Virtual-Environment.pdf

An Intelligent Prediction of An Employee’s Counterproductive Behaviour

http://comp.utm.my/publications/files/2013/04/An-Intelligent-Prediction-of-An-Employee%E2%80%99s-Counterproductive-Behaviour.pdf

An Equijoin-Optimization Technique for Malaysian Hydrological Information System (MHIS) Data

An Equijoin-Optimization Technique for Malaysian Hydrological Information System (MHIS) Data

An Application of Multiple Linear Regression in Analysis Computer-Based Assessment System’s Data

An Application of Multiple Linear Regression in Analysis Computer-Based Assessment System’s Data

Academic Computing Components in Malaysian Higher Education

Academic Computing Components in Malaysian Higher Education

A Software Traceability Model to Support Change Impact Analysis

A Software Traceability Model to Support Change Impact Analysis

A Multiple Perspective Code of Ethics Framework for Information System Personnel in Malaysian Health Public Sector Organizations

A Multiple Perspective Code of Ethics Framework for Information System Personnel in Malaysian Health Public Sector Organizations

A Model-based Software Architecture for XML Data and Metadata Integration in Data Warehouse Systems

A Model-based Software Architecture for XML Data and Metadata Integration in Data Warehouse Systems

A-Model-for-Integrating-Security-Features-of-Legacy-Databases

http://comp.utm.my/publications/files/2013/04/A-Model-for-Integrating-Security-Features-of-Legacy-Databases.pdf