List of Parallel Sessions :
pdf List of Presentation Schedule - PDF File (83 KB)
PRESENTATION SLOT 1: 9:00AM - 10:45AM
ROOM NAME | SLOT / ROOM | TIME | TRACK | PAPER ID | PAPER TITLE | AUTHOR(S) |
---|---|---|---|---|---|---|
1 Ruby | S1R2 | 9:00 AM - 9:15 AM | 1 | 8 | Smart Environment Monitoring System for Air Pollution Using Internet of Things (IoTs) | Nor Saradatul Akmar Zulkifli, Mohammad Ridwan Satrial, Mohd Zamri Osman, Nor Syahidatul Nadiah Ismail and Muhammad Rusydi Muhammad Razif |
S2R2 | 9:15 AM - 9:30 AM | 1 | 72 | Industry 4.0: Eyeing The Future via Simulation | Aisyah Ibrahim, Tuty Asmawaty Abdul Kadir and Adzhar Kamaludin | |
S3R2 | 9:30AM - 9:45 AM | 1 | 61 | A Survey on Crowdsourcing Awareness In Indonesian Micro Small Medium Enterprises | Sri Hariani Eko Wulandari and Rahmah Binti Mohtar | |
S4R2 | 9:45 AM - 10:00 AM | 1 | 11 | Indoor occupancy estimation using carbon dioxide concentration and neural network with random weights | Faris Ramli, Kishendran Muniandy, Asrul Adam and Ahmad Fakhri Ab. Nasir | |
S5R2 | 10:00 AM - 10:15 AM | 1 | 48 | Implementation of The Greedy Algorithm To Determine The Nearest Route Search In Distributing Food Production | Hasanul Fahmi, Muhammad Zarlis, Erna B Nababan and Poltak Sihombing | |
S6R2 | 10:15 AM - 10:30 AM | 1 | 60 | A Preliminary Component Model for IoT | Arbaayah Kamarudin, Ng Keng Yap, Mohamed Abdullahi Ali and Lim Swee Phang | |
S7R2 | 10:30 AM - 10:45 AM | 1 | 5 | A MODEL OF FACTORS INFLUENCING USERS’ACCEPTANCE OF INTERNET OF THINGS SERVICES: AN EMPIRICAL STUDY OF AN IRAQI EDUCATIONAL INSTITUTION | Zainab Amin and Hayder Salah | |
2 Crystal | S1R3 | 9:00 AM - 9:15 AM | 2 | 89 | A survey on technique for solving web page classification problem | Siti Hawa Apandi, Jamaludin Sallim and Rozlina Mohamed |
S2R3 | 9:15 AM - 9:30 AM | 2 | 4 | GbLN-PSO Algorithm for indoor localization in Wireless Sensor Network | Muhammad Shahkhir Mozamir, Rohani Abu Bakar, Wan Isni Sofiah Wan Din and Zalili Musa | |
S3R3 | 9:30AM - 9:45 AM | 2 | 9 | Dengue Outbreak Prediction Using an Improved Salp Swarm Algorithm | Khairunnisa Amalina Mohd Rosli and Zuriani Mustaffa | |
S4R3 | 9:45 AM - 10:00 AM | 2 | 49 | Particle Swarm optimization and Global African Buffalo Optimization comparison | Mohammed Adam Kunna Azrag, Tuty Asmawaty Abdul Kadir and Noorlin Binti Mohd Ali | |
S5R3 | 10:00 AM - 10:15 AM | 2 | 59 | The advantages and challenges of augmented reality in educational settings: A systematic literature review | Shahla Asadi and Rusli Abdullah | |
S6R3 | 10:15 AM - 10:30 AM | 2 | 46 | Implementation of Data Mining in Predicting the Study Period of Students using the Naïve Bayes Algorithm | Sri Wahyuni and Murni Marbun | |
S7R3 | 10:30 AM - 10:45 AM | 2 | 47 | Optimizing Production Planning for Tempe Babe Within Goal Programming Method | Sulindawaty, Syahril Efendi, Muhammad Zarlis and Herman Mawengkang | |
3 Amethyst | S1R4 | 9:00 AM - 9:15 AM | 3 | 13 | Approaches in Creating Meta-requirement: A Systematic Literature Review | Muhamad Idaham Umar Ong, Mohamed Ariff Ameedeen and Imran Edzereiq Kamarudin |
S2R4 | 9:15 AM - 9:30 AM | 3 | 69 | Challenges of Malaysian Healthcare Information System in Public Hospitals: An Early Investigation | Norsyaliza Abd Razak, Norafida Ithnin and Mohd. Zamri Osman | |
S3R4 | 9:30AM - 9:45 AM | 3 | 70 | Students’ Continued Use of E-Learning System: A Review of Conceptual Framework | Anees Nabyla Rosman and Nur Shamsiah Abdul Rahman | |
S4R4 | 9:45 AM - 10:00 AM | 3 | 22 | A Review of User Authentication Model for Online Banking System based on Mobile IMEI Number | Waleed A. Hammood, Ruzaini Abdullah Arshah, Omar A. Hammood and Mohammed A. Al-Sharaf | |
S5R4 | 10:00 AM - 10:15 AM | 3 | 29 | User Requirement Validation: Challenge Exploration in Pre-project Execution | Muhamad Idaham Umar Ong and Mohamed Ariff Ameedeen | |
S6R4 | 10:15 AM - 10:30 AM | 3 | 15 | Mobile Game Effort Estimation: A Literature Review For Functional Requirements | Nur Atiqah Sia Abdullah and Nur Ida Aniza Rusli | |
S7R4 | 10:30 AM - 10:45 AM | 3 | 107 | A StART Model for Code Profiling in Tetris | Roslina Mohd Sidek | |
4 Topaz | S1R5 | 9:00 AM - 9:15 AM | 4 | 40 | An Improved of Integrated Information System for E-Request Transcript Application | Mohd Hariz Ibrahim, Suryanti Awang and Kohbalan Moorthy |
S2R5 | 9:15 AM - 9:30 AM | 4 | 25 | Region of Interest-based Tamper Detection and Lossless Recovery Watermarking Scheme on MRI and X-ray Medical Images | Jessie Ooi, Hui Liang Khor and Siau-Chuin Liew | |
S3R5 | 9:30AM - 9:45 AM | 4 | 26 | Cybersecurity Risk Assessment of the University of Northern Philippines | Bryan Irvin Lamarca | |
S4R5 | 9:45 AM - 10:00 AM | 4 | 90 | Types of anti-phishing solutions for phishing attack | Siti Hawa Apandi, Jamaludin Sallim and Roslina Mohd Sidek | |
S5R5 | 10:00 AM - 10:15 AM | 4 | 88 | A Comparative Analysis on Artificial Intelligence Techniques For Web Phishing Classification | Tengku Balqis Binti Tengku Abd Rashid, Jamaludin Sallim and Yusnita Muhamad Noor | |
S6R5 | 10:15 AM - 10:30 AM | 4 | 65 | Review of Hybrid Analysis Technique for Malware Detection | Yus Kamalrul Mohamed Yunus and Syahrulanuar Ngah | |
S7R5 | 10:30 AM - 10:45 AM | 4 | 75 | Transforming Malware Behavioural Dataset for Deep Denoising Autoencoders | Mohd Razif Bin Shamsuddin, Fakariah Hani Hj Mohd Ali and Mohd Shahril Bin Zainol Abidin |
PRESENTATION SLOT 2: 2:00PM - 3:45PM
Ballroom Emerald | S8R1 | 2:00 PM - 2:15 PM | 3 | 57 | Contextualizing the Framework For Knowledge Management System at the Organizational Level | Mohammad Fakhrulnizam Mohammad, Rusli Abdullah, Marzanah Ab Jabar and Rozi Nor Haizan Nor |
S9R1 | 2:15 PM - 2:30 PM | 3 | 92 | Factors Determination MOOCs Continuance Intention: A Proposed Conceptual Framework | Nurfazrin Syahirah Wan Zainal Adli, Nur Shamsiah Abdul Rahman, Anis Farihan Mat Raffei and Nor Syahidatul Nadiah Ismail | |
S10R1 | 2:30 PM - 2:45 PM | 3 | 14 | Stability Analysis of Relay Access Protocol (RAP) using Fuzzy Logic in Wireless Sensor Networks | Azamuddin Abdul Rahman, Mohd Nizam Mohmad Kahar and Wan Isni Sofiah Wan Din | |
S11R1 | 2:45 PM - 3:00 PM | 3 | 35 | Analysis of energy consumption in a wireless sensor network using different types of fuzzy membership function | Wan Isni Sofiah Wan Din, Mritha Ramalingam and Nuramera Abdullah | |
S12R1 | 3:00 PM - 3:15 PM | 3 | 38 | A Hybrid Screen Size Independent Authentication Scheme for Smart Devices | Ahmed Faizuwan Bin Welhendri, Saiful Azad and Md Sayfullah Al Noman Ranak | |
S13R1 | 3:15 PM - 3:30 PM | 3 | 53 | Analysis of Mamdani Method To Increase The Level Of The Advantages Of Infrastructure Development For Optimal Network | Niskarto Zendrato and Muhammad Zarlis | |
S14R1 | 3:30 PM - 3:45 PM | 3 | 67 | Performance analysis on round trip available bandwidth estimation tools for wireless mesh network | Imran Edzereiq Kamarudin, Mohamed Ariff Ameedeen, Zafril Rizal M Azmi, Muhamad Idaham Umar Ong and Abbas Saliimi Lokman | |
1 Ruby | S8R2 | 2:00 PM - 2:15 PM | 1 | 7 | Introduction to Big Data | Hiba Alwan and Ku Ruhana Ku-Mahamud |
S9R2 | 2:15 PM - 2:30 PM | 1 | 19 | A Combined Weighting for the Feature-Based Method on Topological Parameters in Semantic Taxonomy Using Social Media | Ali Muttaleb Hasan, Noorhuzaimi Mohd Noor, Taha Hussein Rassem and Ahmed Muttaleb Hasan | |
S10R2 | 2:30 PM - 2:45 PM | 1 | 24 | Predicting Graduate Employability based on Program Learning Outcomes | Wan Nor Afiqah Wan Othman, Aziman Abdullah and Awanis Romli | |
S11R2 | 2:45 PM - 3:00 PM | 1 | 6 | Reversible Watermarking Technique for Fingerprint Authentication Based on DCT | Mohamed Lebcir, Suryanti Awang and Ali Benziane | |
S12R2 | 3:00 PM - 3:15 PM | 1 | 41 | Student Learning Curve as Parameter to Predict Graduate Employability | Wan Nor Afiqah Wan Othman and Aziman Abdullah | |
S13R2 | 3:15 PM - 3:30 PM | 1 | 52 | A Geofencing-based Recent Trends Identification from Twitter Data | Saiful Azad, M. Saef Ullah Miah, Gollam Rabby, M. Sadid Tahsin, M. Sirajul Islam, Shihab Uddin and Md Masuduzzaman | |
S14R2 | 3:30 PM - 3:45 PM | 1 | 58 | A New Data Analytics Model of Unstructured Malay Text | Rosmayati Mohemad and Nazratul Naziah Mohd Muhait | |
2 Crystal | S8R3 | 2:00 PM - 2:15 PM | 2 | 31 | Backpropagation Network Optimization using One Step Secant (OSS) Algorithm | Solikhun, M. Safii, Mochamad Wahyudi and Muhammad Zarlis |
S9R3 | 2:15 PM - 2:30 PM | 2 | 32 | Resilient Algorithm in Predicting Fertilizer Imports by Major Countries | Solikhun, M. Safii, Mochamad Wahyudi and Muhammad Zarlis | |
S10R3 | 2:30 PM - 2:45 PM | 2 | 36 | A Conceptual IR Chatbot Framework with Automated Keywords-based Vector Representation (K-VR) Generation | Abbas Saliimi, Mohamed Ariff Ameedeen and Ngahzaifa Ab Ghani | |
S11R3 | 2:45 PM - 3:00 PM | 2 | 98 | Divorce Information Management System: A Systematic Literature Review | Aziman Abdullah, Asar Abdul Karim and Mohammad Affendy Omardin | |
S12R3 | 3:00 PM - 3:15 PM | 2 | 101 | A Novel Student Engagement Data Model for Blended Learning Attendance System (SEDM-BLAS) | Aziman Abdullah, Nur Alnisa’ Anis Alanna Ruzelan and Asar Abdul Karim. | |
S13R3 | 3:15 PM - 3:30 PM | 2 | 44 | Template Matching Analysis using Neural Network for Mobile Iris Recognition System | Anis Farihan Mat Raffei, Siti Zulaikha Dzulkifli and Nur Shamsiah Abdul Rahman | |
S14R3 | 3:30 PM - 3:45 PM | 2 | 45 | IMPROVING GREEN IT ASSESSMENT TOOL USING CASE-BASED REASONING TECHNIQUE | Xiao Ying Chua and Madzlina Abdul Majid | |
3 Amethyst | S8R4 | 2:00 PM - 2:15 PM | 3 | 12 | A Development of Tahfiz Selangor School System | Suziyanti Marjudi, Eda Suhana Sharudin, Md. Sidin A. Ishak, Ab. Razak Aripin, Hafizah Kusnek and Syahirah Ismail |
S9R4 | 2:15 PM - 2:30 PM | 3 | 21 | Requirement Prioritization Based On Non-Functional Requirement Classification Using Hierarchy Analytic Hierarchy Process | Thant Zin Win, Rozlina Mohamed and Jamaludin Sallim | |
S10R4 | 2:30 PM - 2:45 PM | 3 | 43 | Preventive Self-Care Serious Games for Diabetes: A Game Design | Siti Normaziah Ihsan, Tuty Asmawaty Abdul Kadir, Abdul Rafiq Abdullah and Reuben Benedict | |
S11R4 | 2:45 PM - 3:00 PM | 3 | 50 | Rural Integrated Population Decision Support Model In The Best Election Of The University In Aceh | Taufiq, Muhammad Zarlis, Herman Mawengkang and Saib Suwilo | |
S12R4 | 3:00 PM - 3:15 PM | 3 | 63 | Applying Heuristics Evaluation to Improve the Usability of Malaysia Accounting Training Management System | Azma Abdullah, Zuraidah Mat Harun and Kiriyadhatshini Gunaratnam | |
S13R4 | 3:15 PM - 3:30 PM | 3 | 66 | Mobile Learning Application Impact Towards Student Performance in Programming Subject | Nurul Farahah Abdul Halim and Danakorn Nincarean Eh Phon | |
S14R4 | 3:30 PM - 3:45 PM | 3 | 95 | Propose Meta-requirement Mapping Model | Muhamad Idaham Umar Ong and Mohamed Ariff Ameedeen |
PRESENTATION SLOT 3: 4:00PM - 05:30PM
Ballroom Emerald | S15R1 | 4:00 PM - 4:15 PM | 2 | 68 | Texture-based Feature using Multi-blocks Gray Level Co-occurrence Matrix and Machine Learning for Ethnicity Identification | Mohd. Zamri Osman, Mohd Aizaini Maarof and Mohd Foad Rohani |
S16R1 | 4:15 PM - 4:30 PM | 2 | 74 | Applying Graph-based Algorithm in a Simulated Environment | Nazrul Azril Badioze Zaman, Shuzlina Abdul-Rahman and Sofianita Mutalib | |
S17R1 | 4:30 PM - 4:45 PM | 2 | 18 | To Predict the Performance of Undergraduate Student in Chemistry Course using Machine Learning | Che Akmal Che Yahaya, Ahmad Firdaus Zainal Abidin, Nuresa Fatin Hasbullah, Che Yahaya Yaakub, Mohd Faizal Ab Razak and Mohamad Fadli Zolkipli | |
S18R1 | 4:45 PM - 5:00 PM | 2 | 91 | Enhanced Shape Corner Detection by using Global and Local Curvature Properties | Suraya Abu Bakar, Muhammad Suzuri Hitam and Wan Nural Jawahir Hj Wan Yussof | |
S19R1 | 5:00 PM - 5:15 PM | 2 | 96 | Detection of Proliferative Diabetic Retinopathy in Fundus Images Using Convolution Neural Network | Hasliza Abu Hassan, Azlee Zabidi and Marzuqi Yaakob | |
S20R1 | 5:15 PM - 5:30 PM | 2 | 54 | Generic Code Clone Detection Model for Java Applications | Al-Fahim Mubarak-Ali, Shahida Sulaiman | |
1 Ruby | S15R2 | 4:00 PM - 4:15 PM | 1 | 73 | A Model Of Biodiversity Taxonomy Database (iTaxo) For Managing And Analysing Kenyir Landscape Biodiversity Data | Salwana Mohamad Asmara |
S16R2 | 4:15 PM - 4:30 PM | 1 | 42 | Reducing the Throughput Time for Patient Flow in Emergency Department: Simulation and Modelling Overview | Nidal Hamza, Mazlina Abdul Majid and Hael Al-Bashiri | |
S17R2 | 4:30 PM - 4:45 PM | 1 | 94 | Preserving the Topology of Self-Organizing Maps for Data Analysis: A Review | Bariah Yusob, Zuriani Mustaffa and Siti Mariyam Hj Shamsuddin | |
S18R2 | 4:45 PM - 5:00 PM | 1 | 17 | Inverse Kinematic Motion Control of Robotic Manipulator Arm with Unified Analytical Models of Trigonometric Rule and Linear Systems | Khairul Annuar Abdullah, Zuriati Yusof and Riza Sulaiman | |
S19R2 | 5:00 PM - 5:15 PM | 1 | 99 | Dengue Innovation: A Sustainability Approach for Preventing and Controlling of Dengue Diseases Outbreaks by Using IoT Technology | Mustafa Man, Wan Aezwani Wan Abu Bakar, Lim Chee Hwa, Wan Nural Jawahir Wan Mohd Yusoff, Mustafa Afenddi Mat Nor and Mohd. Irfan Hakim Mohd. Noor | |
S20R2 | 5:15 PM - 5:30 PM | 1 | 77 | An Improved Mapping Pattern for Digital Watermarking using Hilbert-Peano Pattern | Mohamad Nazmi Nasir and Syifak Izhar Hisham | |
2 Crystal | S15R3 | 4:00 PM - 4:15 PM | 2 | 23 | Swarm Intelligence Algorithms’ Solutions to the Travelling Salesman’s Problem | Julius Beneoluchi Odili and A. Noraziah |
S16R3 | 4:15 PM - 4:30 PM | 2 | 28 | Text-based emotion prediction system using machine learning approach | Ahmad Fakhri Ab. Nasir, Eng Seok Nee, Ahmad Shahrizan Abdul Ghani, Anwar P. P. Abdul Majeed, Asrul Adam and Mhd. Furqan | |
S17R3 | 4:30 PM - 4:45 PM | 2 | 10 | Human Faces Identification through Geometric Illumination Invariant Matching Approach | Khamiss Ahmed | |
S18R3 | 4:45 PM - 5:00 PM | 2 | 55 | Coding mechanism and soft systems technique applied to integrate the fuzzy based Decision Support System with HRM components in the SMEs of Bangladesh | Tarnima Warda Andalib and Hasliza Abdul Halim | |
S19R3 | 5:00 PM - 5:15 PM | 2 | 56 | Artificial Intelligence (AI): A Review of its Uses in Language Teaching and Learning | Zuraina Ali | |
S20R3 | 5:15 PM - 5:30 PM | 2 | 64 | Pathfinding Algorithms in Games Development | Abdul Rafiq and Tuty Asmawaty | |
3 Amethyst | S15R4 | 4:00 PM - 4:15 PM | 4 | 102 | A Survey on Current Malicious JavaScript Behavior of infected Web Content in Detection of Malicious Web pages | Wan Nurulsafawati Wan Manan, Mohd Nizam Mohmad Kahar and Noorlin Mohd Ali. |
S16R4 | 4:15 PM - 4:30 PM | 4 | 20 | A Decision-making hybrid offloading algorithm for mobile cloud computing | S.M. Roudro Mehedi, Fatema Tuj Johora and Md. Mahabub Hasan | |
S17R4 | 4:30 PM - 4:45 PM | 4 | 27 | AN IMPROVED IMAGE STEGANOGRAPHY SCHEME BASED ON RDWT AND QR DECOMPOSITION | Ke Huey Ng, Siau Chuin Liew and Ferda Ernawan | |
S18R4 | 4:45 PM - 5:00 PM | 4 | 62 | Coinhive’s Monero Drive-by Crypto-jacking | Azizah Abdul Aziz, Syahrulanuar Ngah, Ti Dun Yau and Fui Bee Tan | |
S19R4 | 5:00 PM - 5:15 PM | 4 | 71 | A Review of Cloud Computing Implementation in ASEAN Countries | Wan Isni Sofiah Wan Din, Asyran Abdullah, Zalili Musa and Razulaimi Razali | |
S20R4 | 5:15 PM - 5:30 PM | 4 | 34 | An open cloud-based platform for the creation and delivery of smart applications and services | Heba M. Fadhil, Mohammed Issam Younis, Abdulrahman A. Alsewari, Mohammed Abd-Alrazzaq, Ameer Toran Mahdi and Alaa A. Alomoush |