Bridging Creativity and Group by Elements of Problem-Based Learning (PBL)
Chunfang Zhou
Password Recovery Using Graphical Method
Wafa' Mohd Kharudin, Nur Fatehah Md Din and Mohd Zalisham Jali
An Classification on Brainwave Patterns for Parkinson Patients Using WEKA
Waidah Ismail, Nurshuhada Mahfuz, Nor Azila Noh, Mohd Zalisham Jali, Dalilah Abdullah and Md Jan Nordin
An ontological approach for knowledge modelling and reasoning over heterogeneous crop data sources
Abdur Rakib, Abba Lawan and Sue Walker
A study on changes of supervision model in universities and fostering creative Ph.D. students in China
Lingling Luo, Chunfang Zhou and Song Zhang
Evaluating Different In-Memory Cached Architectures in regards to Time-Efficiency for Big Data Analysis
Richard Millham
Engagement in Web-based Learning System: An Investigation of Linear and Non-Linear Navigation
Norliza Katuk and Nur Haryani Zakaria
Can Single- Sign-On Improve Password Management? A Focus Group Study
Norliza Katuk, Hatim Mohamad Tahir, Nur Zakaria and Mohamad Subri Halim
The Relevance of Software Requirements Defects Management to Improve Requirements and Product Quality: A Systematic Literature Review
Nurul Atikah Rosmadi, Sabrina Ahmad and Noraswaliza Abdullah
Finding the Effectiveness of Software Team Members Using Decision Tree
Mazni Omar and Sharifah Lailee Syed Abdullah
Data Completeness Measures
Nurul Emran
Cloud Computing Adoption and Security Concern in Malaysian Polytechnic
Siti Salmah Md Kassim, Mazleena Salleh and Anazida Zainal
The Correlations between Big Five Personality Traits and Social Networking Sites Usage of Elementary School Students in Taiwan
Ying-Chun Chou and Chiung-Hui Chiu
A Cryptographic Encryption Technique of MPEG Digital video Images based on RGB Layer Pixel Values
Kester Quist-Aphetsi, Laurent Nana, Anca Christine Pascu, Sophie Gire, Moses Jojo Eghan and Nii Narku Quaynor
The Impact of Knowledge Management in Pair Programming on Program Quality
Mazida Ahmad, Mazni Omar, Azman Yasin, Rohaida Romli, Ariffin Abdul Mutalib, Ainul Husna Abd Razak and Ana Syafiqah Zahari
Social Networks Event Mining: A Systematic Literature Review
Muniba Shaikh, Norsaremah Salleh and Lili Marziana
Personalized Learning Environment (PLE) Experience in the 21st Century: Review of Literature
Che Ku Nuraini Che Ku Mohd, Faaizah Shahbodin and Ahmad Naim Che Pee
Social Networks Content Analysis for Peacebuilding Application
Muniba Shaikh, Norsaremah Salleh and Lili Marziana
Tree-base Structure for Feature Selection in Writer Identification
Noraziera Akmal Sukor, Azah Muda, Noor Azilah Muda, Yun-Huoy Choo and Ong Sing Goh
Factors That Affecting The Effective Online Collaborative Learning Environment
Razali Sharifah Nadiyah, Shahbodin Faaizah, Hussin Hanipah and Bakar Norasiken
Comparing Features Extraction Methods for Person Authentication using EEG Signals
Siaw-Hong Liew, Yun-Huoy Choo, Yin Fen Low, Zeratul Izzah Mohd Yusoh and Azah Muda
A Comparative Study of 2D UMI and 3D Zernike Shape Descriptor for ATS Drugs Identification
Satrya Fajri Pratama, Azah Kamilah Muda, Yun-Huoy Choo and Ajith Abraham
Risk assessment for Grid computing using Meta learning Ensembles
Sara Abdelghani and Ajith Abraham
Modeling Cloud Computing Risk Assessment Using Ensemble Methods
Nada Ahmed and Ajith Abraham
Design Consideration for Improved Term Weighting Scheme for Pornographic Websites
Hafsah Salam, Mohd Aizaini Maarof and Anazida Zainal
A novel secure two-party Identity-Based Authenticated Key Agreement protocol without Bilinear Pairings
Seyed-Mohsen Ghoreishi, Ismail Fauzi Isnin, Shukor Abd Razak and Hassan Chizari
An Efficient Pairing-free Certificateless Authenticated Two-party Key Agreement protocol over Elliptic Curves
Seyed-Mohsen Ghoreishi, Ismail Fauzi Isnin, Shukor Abd Razak and Hassan Chizari
Selection of Soil Features for Detection of Ganoderma Using Rough Set Theory
Nurfazrina Mohd Zamry, Anazida Zainal, Murad A. Rassam, Majid Bakhtiari and Mohd Aizaini Maarof
Category-based Graphical User Authentication (CGUA) Scheme for Web Application
Mohd Zamri Osman and Norafida Ithnin
An Improved Certificateless Public Key Authentication Scheme For Mobile Ad hoc Networks Over Elliptic Curves
Shabnam Kasra Kermanshahi and Mazleena Salleh
A Resource Efficient Integrity Monitoring & Response Approach for Cloud Computing Environment
Sanchika Gupta, Padam Kumar and Ajith Abraham