Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hybrid of rough set theory and Artificial Immune Recognition System as a solution to decrease false alarm rate in intrusion detection system., , and . IAS, page 134-138. IEEE, (2011)Mining the student programming performance using rough set., , , and . ISKE, page 478-483. IEEE, (2010)Classification of students' performance in computer programming course according to learning style., , , and . DMO, page 37-41. IEEE, (2009)Solving University Examination Timetabling Problem Using Intelligent Water Drops Algorithm., , , and . SEMCCO, volume 8947 of Lecture Notes in Computer Science, page 187-200. Springer, (2014)Integrated computer forensic investigation model based on Malaysian standards., and . Int. J. Electron. Secur. Digit. Forensics, 3 (2): 108-119 (2010)A Traffic Signature-based Algorithm for Detecting Scanning Internet Worms., , , and . Int. J. Commun. Networks Inf. Secur., (2009)Intelligent Decision Support Model Based on Neural Network to Support Reservoir Water Release Decision., , and . ICSECS (1), volume 179 of Communications in Computer and Information Science, page 365-379. Springer, (2011)Interacted Multiple Ant Colonies Optimization Framework: an Experimental Study of the Evaluation and the Exploration Techniques to Control the Search Stagnation., , and . Int. J. Adv. Comp. Techn., 2 (1): 78-85 (2010)Lexical Disambiguation in Natural Language Questions (NLQs)., , and . CoRR, (2017)Features Extraction Technique Analysis of EEG Signal for Motor Imagery Classification., , , , and . IICAIET, page 135-140. IEEE, (2023)