WICT 2014


Bridging Creativity and Group by Elements of Problem-Based Learning (PBL)
Chunfang Zhou

Password Recovery Using Graphical Method
Wafa' Mohd Kharudin, Nur Fatehah Md Din and Mohd Zalisham Jali

An Classification on Brainwave Patterns for Parkinson Patients Using WEKA
Waidah Ismail, Nurshuhada Mahfuz, Nor Azila Noh, Mohd Zalisham Jali, Dalilah Abdullah and Md Jan Nordin

An ontological approach for knowledge modelling and reasoning over heterogeneous crop data sources
Abdur Rakib, Abba Lawan and Sue Walker

A study on changes of supervision model in universities and fostering creative Ph.D. students in China
Lingling Luo, Chunfang Zhou and Song Zhang

Evaluating Different In-Memory Cached Architectures in regards to Time-Efficiency for Big Data Analysis
Richard Millham

Engagement in Web-based Learning System: An Investigation of Linear and Non-Linear Navigation
Norliza Katuk and Nur Haryani Zakaria

Can Single- Sign-On Improve Password Management? A Focus Group Study
Norliza Katuk, Hatim Mohamad Tahir, Nur Zakaria and Mohamad Subri Halim

The Relevance of Software Requirements Defects Management to Improve Requirements and Product Quality: A Systematic Literature Review
Nurul Atikah Rosmadi, Sabrina Ahmad and Noraswaliza Abdullah

Finding the Effectiveness of Software Team Members Using Decision Tree
Mazni Omar and Sharifah Lailee Syed Abdullah

Data Completeness Measures
Nurul Emran

Cloud Computing Adoption and Security Concern in Malaysian Polytechnic
Siti Salmah Md Kassim, Mazleena Salleh and Anazida Zainal

The Correlations between Big Five Personality Traits and Social Networking Sites Usage of Elementary School Students in Taiwan
Ying-Chun Chou and Chiung-Hui Chiu

A Cryptographic Encryption Technique of MPEG Digital video Images based on RGB Layer Pixel Values
Kester Quist-Aphetsi, Laurent Nana, Anca Christine Pascu, Sophie Gire, Moses Jojo Eghan and Nii Narku Quaynor

The Impact of Knowledge Management in Pair Programming on Program Quality
Mazida Ahmad, Mazni Omar, Azman Yasin, Rohaida Romli, Ariffin Abdul Mutalib, Ainul Husna Abd Razak and Ana Syafiqah Zahari

Social Networks Event Mining: A Systematic Literature Review
Muniba Shaikh, Norsaremah Salleh and Lili Marziana

Personalized Learning Environment (PLE) Experience in the 21st Century: Review of Literature
Che Ku Nuraini Che Ku Mohd, Faaizah Shahbodin and Ahmad Naim Che Pee

Social Networks Content Analysis for Peacebuilding Application
Muniba Shaikh, Norsaremah Salleh and Lili Marziana

Tree-base Structure for Feature Selection in Writer Identification
Noraziera Akmal Sukor, Azah Muda, Noor Azilah Muda, Yun-Huoy Choo and Ong Sing Goh

Factors That Affecting The Effective Online Collaborative Learning Environment
Razali Sharifah Nadiyah, Shahbodin Faaizah, Hussin Hanipah and Bakar Norasiken

Comparing Features Extraction Methods for Person Authentication using EEG Signals
Siaw-Hong Liew, Yun-Huoy Choo, Yin Fen Low, Zeratul Izzah Mohd Yusoh and Azah Muda

A Comparative Study of 2D UMI and 3D Zernike Shape Descriptor for ATS Drugs Identification
Satrya Fajri Pratama, Azah Kamilah Muda, Yun-Huoy Choo and Ajith Abraham

Risk assessment for Grid computing using Meta learning Ensembles
Sara Abdelghani and Ajith Abraham

Modeling Cloud Computing Risk Assessment Using Ensemble Methods
Nada Ahmed and Ajith Abraham

Design Consideration for Improved Term Weighting Scheme for Pornographic Websites
Hafsah Salam, Mohd Aizaini Maarof and Anazida Zainal

A novel secure two-party Identity-Based Authenticated Key Agreement protocol without Bilinear Pairings
Seyed-Mohsen Ghoreishi, Ismail Fauzi Isnin, Shukor Abd Razak and Hassan Chizari

An Efficient Pairing-free Certificateless Authenticated Two-party Key Agreement protocol over Elliptic Curves
Seyed-Mohsen Ghoreishi, Ismail Fauzi Isnin, Shukor Abd Razak and Hassan Chizari

Selection of Soil Features for Detection of Ganoderma Using Rough Set Theory
Nurfazrina Mohd Zamry, Anazida Zainal, Murad A. Rassam, Majid Bakhtiari and Mohd Aizaini Maarof

Category-based Graphical User Authentication (CGUA) Scheme for Web Application
Mohd Zamri Osman and Norafida Ithnin

An Improved Certificateless Public Key Authentication Scheme For Mobile Ad hoc Networks Over Elliptic Curves
Shabnam Kasra Kermanshahi and Mazleena Salleh

A Resource Efficient Integrity Monitoring & Response Approach for Cloud Computing Environment
Sanchika Gupta, Padam Kumar and Ajith Abraham