ISSN (Online) : 2462-1927
Frequency : Quarterly
Editor-in-Chief : Dr. Shamsul Jamel Elias (E-mail)
View full editorial board
Aims and Scope : Advanced Research in Computing and Applications provides an academic platform for professionals and researchers to contribute innovative work in the area of emerging computer and information technologies including, but not limited to, embedded computing, green computing, smart and intelligent computing, ubiquitous computing, convergence computing, and human computing, etc.
Recent Articles
Volume 13, No. 1 (December, 2018)
An Observation on Social Acceptance of Location-Based Augmented Reality Games in Open Space
Mohammad Ghifari Haekal
Page 27 – 38
PUBLISHED ARTICLES
Hypervisor Security Issues in Cloud Computing: The Need to Mitigate the Risks
A. S. Thiab, and A. S. Shibghatullah
Page 1 – 5
Mobile Application on ABACUS
W. F. Wan Ahmad, J. S. Lee and H. Idrus
Page 6 – 15
Analyze the VANET Performance in Presence of Timing Attack and Sinkhole Attack using OMNeT++
F. N. Bhatti, R. B. Ahmad, M. A. Shahbani Bakar, S. Daud, S. J. Elias and M. N. M. Warip
Page 16 – 32
Service Discovery Mechanism for Service Continuity in Heterogeneous Network
S. Mansor, N. S. Kamal Basha, S. R. Muhamat Dawam, N. R. Ali, and S. J. Elias
Page 33 – 42
Graphical User Interface (GUI) Controlled Mobile Robot
M. H. Zulkefli, K. A. Mohd Annuar, S. H. Johari, M. R. Mohamad Sapiee and S. Ahmad
Page 43 – 50
The Mitigation of Threats and Risks in the Process of Virtualization by Securing the Hypervisor Control Factor
A. S. Thiab, and A. S. Shibghatullah
Page 51 – 56
Advanced Persistent Threat Detection Based On Network Traffic Noise Pattern and Analysis
S. C. Y. Ng and M. Bakhtiari
Page 1 – 18
Throughput Fairness Using Packet Aggregation on 802.11g Networks
R. F. Aji, S. Yazid, H. Suhartanto and I. Budi
Page 19 – 24
A Review and Survey of Vehicular Network’s Cybercrime and Security Approaches
F. N. Bhatti, R. B. Ahmad, H. M. Bhatti, M. N. M. Warip and S. J. Elias
Page 25 – 38
Enhanced Security Audio Steganography by Using Higher Least Significant Bit
S. Krishnan, M. S. Abdullah
Page 39 – 54
Comparative Analysis of Different Switching Techniques for Cascaded H-Bridge Multilevel Inverter
U. B. Tayab, M. A. Roslan and F. N. Bhatti
Page 1 – 6
A Review and Survey of Artificial Neural Network in Medical Science
R. Parveen, M. Nabi, F. A. Memon, S. Zaman and M. Ali
Page 7 – 16
Design of Optimized Pipelined RIPEMD-160 with High Frequency and Throughput
S. Suhaili and T. Watanabe
Page 17 – 27
A Scheme Associated with Newton-Cotes of Order One for Solving the Linear Goursat Problem Involving Derivative Term
N. S. Saharizan and M. A. Salim Nasir
Page 28 – 36
Cubic Bezier Homotopy Function for Solving Exponential Equations
S. S. Ramli, H. Mohamad Nor, N. S. Saharizan and M. A. Salim Nasir
Page 1 – 8
Enhancement Quality of Service at ADTECBP LAN Using Traffic Policing
W. M. H. Ahmad Azamuddin, Z. A. M. Noh, A. S. H. Basari and A. S. H. Shibghatullah
Page 9 – 19
Intan Safina Othman, Abdul Samad Shibgatullah, Abd. Samad Hassan Basari, Zul Azri Muhammad Noh
Page 1 – 10
Review of Augmented Reality Applications in Manufacturing Engineering
Hesham Ahmed Abdul Mutaleb Abas, Faieza Binti Abdul Aziz, Rosaliza Hasan
Page 11 – 16
Criteria and Approach Implications for Requirements and Design Crosscutting Concerns to Support Software Evolution
Jamaluddin Jasmis, Suhaimi Ibrahim, Shamsul Jamel Elias, Rosdiana Abd Razak, Wan Faezah Abbas
Page 1 – 8
A Security Trending Review on Software Define Network (SDN)
Mohd Zafran Abdul Aziz, Koji Okamura
Page 9 – 19
Real-time Monitoring of Waste Management
Hanim Abdul Razak, Rozita Abidin, Hazura Haroon, Anis Suhaila Mohd Zain, Fauziyah Salehuddin, Siti Khadijah Idris, Muhamad Fuad Abdul Karim
Page 1 – 7
Large Scale Image Retrieval for Remote Sensing Images Using Low level Features
Khaled H Mohamed, Safa M Gasser, Mohamed S El-Mahallawy, Mohamed Waleed W Fakhr
Page 8 – 14
Chaos Based Secure Image Hiding in Variable Bit Rate CELP Speech Coding Systems
Said E El-Khamy, Noha O Korany, Marwa H El-Sherif
Page 15 – 21
An Energy-efficient MAC Protocol Based on Node Power for Wireless Sensor Networks
Khalil F Ramadan, M I Dessouky, Mohammed Abd-Elnaby, Fathi E Abd EL-Samie
Page 1 – 13
PoMSA: An Efficient and Precise Position-based Multiple Sequence Alignment Technique
Sara Shehab, Sameh Shohdy, Arabi E Keshk
Page 14 – 20
Anonymizing Published Social Network Data
Emad Elabd, Hatem AbdulKader, Waleed Ead
Page 21 – 28
Business Process Semantic Annotation Suggestions in ERP Systems
Naglaa Badr, Hatem AbdulKader, Emad Elabd
Page 29 – 36
Enhancing Fine Grained Technique for Maintaining Data Privacy
Esraa A. Elwan, Mohamed Elkawkagy, Arabi Keshk
Page 1 – 6
Computer-Aided Model for Abnormality Detection in Biomedical ECG Signals
Nancy S. El-Gamil, Sherin M. Youssef, Marwa ElShenawy
Page 7 – 15
Design and Simulation of New One Time Pad (OTP) Stream Cipher Encryption Algorithm
Mohammed Nabil, Mohamed Helmy Megahed, Mohamed Hassan Abdel Azeem
Page 16 – 23
Investigating English Language Learners’ Experience in Using a Learning Management System in a Blended Learning Setting
Badrul Hisham Ahmad, Aznoora Osman, Nadia Abdul Wahab, Ina Suryani
Page 1 – 8
Bijak Jawi: An Interactive Multimedia Reading Tool Using Phonic ‘Makhraj’ Technique for Preschool Children
Siti Zulaiha Ahmad, Jamalia Aurani, Umi Hanim Mazlan, Mohammad Syazwan Nurhalik
Page 9 – 16
Using the UTAUT Model to Determine the Factors Affecting the Technology Acceptance in Judicial System Environment
Khaled Amrouni, Ruzaini Arshah
Page 17 – 22
Mobile Learning Application for Enhancement of Teaching Tool in Java Programming
Azura Ahmad
Page 23 – 27
Analysis of Information Security Awareness within Users’ Preference, Practice and Knowledge
Ting Tin Tin, Chong Kwok Siang, Eu Zhen Hoong, Lim Siu Boon
Page 1 – 8
Designing Eco-Feedback to Calculate Carbon Footprint of Ecological Waste
Romiza Md Nor, Siti Faqihah Mohd Zulkifli
Page 9 – 14
Scheduling Difficult to Schedule Examination using Memetic Algorithm
Naimah Mohd Hussin
Page 15 – 21
E-Halal Restaurant Recommender System Using Collaborative Filtering Algorithm
M. I. Mahadi, Nurulhuda Zainuddin, Norzatul Bazamah Azman Shah, Nur Asyira Naziron, Siti Fatimah Mohd Rum
Page 22 – 34
Performance Analysis of Three Classical Encryption Algorithms, Simple Substitution, Caeser, and Periodic Permutation (the Three SCP) in Encrypting Database Transactions
Mohammed Suleiman Mohammed Rudwan, Salah Eldin Deng Al-Jack
Page 35 – 45
Experimental Analysis of Trojan Horse and Worm Attacks in Windows Environment
Abidah Mat Taib, Nurul Nabila Khairu Azman Azman
Page 1 – 9
In Situ Observation and Acceptance Measurement of Collaborative Augmented Reality in Education Field of High School Students
Agung Triwicaksono Pamungkas, Muhammad Farhan Dirhami, Auzi Asfarian
Page 10 – 18
A Survivable Internet of Things Scheme
Omar Alhazmi
Page 19 – 26
An Observation on Social Acceptance of Location-Based Augmented Reality Games in Open Space
Mohammad Ghifari Haekal
Page 27 – 38
Performance Measure of Malaysian Seaports Using Data Envelopment Analysis (DEA)
Zuraida Alwadood, Norlenda Mohd. Noor, Nurul Fadhila Ahmad Salehin, Nur Izzati Mahadhir
Page 1 – 9
Real-Time Water Monitoring System for Fish Farmers Using Arduino
Nor Adora Endut, Mohammad Fahmi Mohd Fo’ad, Nor Azylia Ahmad Azam, Nor Ashitah Abu Othman, Siti Rahayu Abdul Aziz, Anis Shobirin Abdullah Sani
Page 10 – 17
Optimizing Gamification in Learning Solar System for Primary School
Mohd Nabil Zulehmay, Muna Liyana Mohamad Tarmizi, Nurul Najwa Abdul Rahid, Anis Afiqah Sharip, Norfarhana Fadila Mohd Zaki, Nur Farahin Johari
Page 18 – 24
The Development of Proactive Actions Women Safety Application using Direct Combination
Fadzlin Ahmadon, Nor Atikah Raimi
Page 25 – 33
Rasidah Buang, Maznah Banu Mohamed Habiboo Raman, Rahmah Shahril
Page 1 – 8
MotoSOS: Accident Detection for Motorcycle Riders Using Motion Sensors
Hajar Izzati Mohd Ghazalli, Muhammad Izaiddin Hassan, Zuhri Arafah Zulkifli, Siti Nuramalina Johari
Page 9 – 19
Online Zakat Management System for UITM Jasin using Rule Based Technique
Tuan Nur Allia Tuan Mohd Zamli
Page 20 – 25
Optimization of Private Bus Scheduling in UiTM Shah Alam Using Integer Linear Programming
Norlenda Mohd. Noor, Zuraida Alwadood, Nuramelissa Ahmad Murad, Nur Maisarah Mohamad Termizi
Page 26 – 34
Muhamad Zulfikri Md Zin, Raihana Md Saidi, Faridah Sappar, Mohamad Asrol Arshad
Page 1 – 9
Conceptualizing an Attendance Monitoring System for Malaysian Educational Institutions
Mohamad Rahimi Mohamad Rosman, Mohamad Iqmal Ussaiq Ismail, Muhamad Hakim Ahmad Dzarawi, Muhamad Alif Zhafri Md Azman
Page 10 – 23
Exploring Users’ Perspectives on Co-Curricular Registration System using TAM Model
Teh Faradilla Abdul Rahman, Zamri Abu Bakar
Page 24 – 33
The Usability of Mobile Experiment Application in Science Subject for Secondary Student
Anis Amilah
Page 34 – 41
Khairul Nurmazianna Ismail
Page 1 – 5
Development of Quadric Surfaces Learning Tool for Engineering Students using MATLAB GUI
Suhaila Abd Halim, Zuraida Alwadood, Norlenda Mohd Noor, Hanifah Sulaiman
Page 6 – 13
Decision Support System for Diagnosing Mobile Phone Failure using Rule-Based Technique
Siti Aisyah Zainal Abidin, Nur Suhailayani Suhaimi
Page 14 – 19
Learning and Training of Coal-Fired Energy using Augmented Reality (C-FAR)
Norshahidatul Hasana Ishak, Nur Farahin Johari, Siti Nuramalina Johari, Hazrati Zaini, Abdul Hasib Sadiqin Adam Shukri, Aqil Afifi Ahmad Senusi
Page 20 – 24
MOST CITED ARTICLES
A Proposed Optimum Threshold Level for Document Image Binarization
WA Mustafa
A Review of Image Quality Assessment (IQA): SNR, GCF, AD, NAE, PSNR, ME
WA Mustafa, H Yazid, M Jaafar, M Zainal, AS Abdul-Nasir, N Mazlan
A Review and Survey of Artificial Neural Network in Medical Science
R Parveen, M Nabi, FA Memon, MA S Zaman
Submit Your Manuscript
Submit your paper
Guide for Authors
Guide for reviewers
Ethics in Publishing
View More