Search

Your search keyword '"Suriayati Chuprat"' showing total 53 results

Search Constraints

Start Over You searched for: Author "Suriayati Chuprat" Remove constraint Author: "Suriayati Chuprat" Topic business.industry Remove constraint Topic: business.industry
53 results on '"Suriayati Chuprat"'

Search Results

1. Tamper Detection and Localization for Quranic Text Watermarking Scheme Based on Hybrid Technique

2. Acute lymphoblastic leukemia segmentation using local pixel information

3. Hybrid Heuristic Load Balancing Algorithm For Resource Allocation In Cloud Computing

4. Risk Management Framework for Distributed Software Team: A Case Study of Telecommunication Company

5. Determining Factors Influencing the Acceptance of Cloud Computing Implementation

6. The Validity and Reliability Evaluation of Instruments for Cloud Computing Acceptance Study

7. A model for technological aspect of e-learning readiness in higher education

8. Data Reconstruction Through Sequence Based Mapping in Secured Data Partitioning

9. Improving the accuracy of collaborative filtering recommendations using clustering and association rules mining on implicit data

10. Software Engineering Wastes - A Perspective of Modern Code Review

11. Knowledge Sharing Factors for Modern Code Review to Minimize Software Engineering Waste

12. Situational Modern Code Review Framework to Support Individual Sustainability of Software Engineers

13. Knowledge Sharing Framework for Modern Code Review to Diminish Software Engineering Waste

14. Situational Factors for Modern Code Review to Support Software Engineers’ Sustainability

15. Knowledge sharing, a key sustainable practice is on risk: An insight from Modern Code Review

16. Situational factors affecting Software Engineers Sustainability: A Vision of Modern Code Review

17. Understanding the Impact of Feedback on Knowledge Sharing in Modern Code Review

18. Individual Sustainability Barriers and Mitigation Strategies: Systematic Literature Review Protocol

19. A Review on Cloud Computing Acceptance Factors

20. Adopting ISO/IEC 27005:2011-based Risk Treatment Plan to Prevent Patients Data Theft

21. Fuzzy Delphi Method for Evaluating HyTEE Model (Hybrid Software Change Management Tool with Test Effort Estimation)

22. Sustainable Software Engineering:A Perspective of Individual Sustainability

23. Support Vector Machine Algorithm for SMS Spam Classification in The Telecommunication Industry

24. Mobile Business Intelligence Acceptance Model for Organisational Decision Making

25. Malware Forensic Analytics Framework Using Big Data Platform

26. Challenges and Benefits of Modern Code Review-Systematic Literature Review Protocol

27. A Review for Improving Software Change using Traceability Model with Test Effort Estimation

28. Social Networking Sites Habits and Addiction Among Adolescents in Klang Valley

29. Improving the accuracy of complex activities recognition using accelerometer-embedded mobile phone classifiers

30. The challenges of Extract, Transform and Loading (ETL) system implementation for near real-time environment

31. Web Crime Mining by Means of Data Mining Techniques

32. DESIGN AND IMPLEMENTATION OF A PRIVACY PRESERVED OFF-PREMISES CLOUD STORAGE

33. Proposing a Framework for Exploration of Crime Data Using Web Structure and Content Mining

34. Parameters Consideration in Designing a Magnetorheological Damper

35. ABCD rules segmentation on malignant tumor and benign skin lesion images

36. Acceptance of cloud computing in the Malaysian public sector: A proposed model

37. Secured data partitioning in multi cloud environment

38. Situational requirement engineering framework for Global Software Development

39. Trusted cloud computing framework for healthcare sector

40. Situational requirement engineering: A systematic literature review protocol

41. Situational factors affecting Requirement Engineering process in Global Software Development

42. Zero-delay FPGA-based odd-even sorting network

43. A study on significance of adopting cloud computing paradigm in healthcare sector

44. Cloud implementation security challenges

45. Towards an Efficient and Secure Educational Platform on cloud infrastructure

46. Field programmable gate array system for real-time IRIS recognition

47. Using virtual machine monitors to overcome the challenges of monitoring and managing virtualized cloud infrastructures

48. Nurse scheduling with fairness criteria for public hospital

49. Mouse movement behavioral biometric systems

Catalog

Books, media, physical & digital resources