{"title":"Aedes Entomological Prediction Analytical Dashboard Application for Dengue Outbreak Surveillance","authors":"Y. Tan, Noraini Ibrahim, S. A. Halim","doi":"10.1007/978-3-030-33582-3_6","DOIUrl":"https://doi.org/10.1007/978-3-030-33582-3_6","url":null,"abstract":"","PeriodicalId":448355,"journal":{"name":"International Conference of Reliable Information and Communication Technology","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124291595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Essam Alhroob, Mohammed Falah Mohammed, Osama Nayel Al Sayaydeh, Fadhl Hujainah, N. A. Ghani
{"title":"Analysis on Misclassification in Existing Contraction of Fuzzy Min-Max Models","authors":"Essam Alhroob, Mohammed Falah Mohammed, Osama Nayel Al Sayaydeh, Fadhl Hujainah, N. A. Ghani","doi":"10.1007/978-3-030-33582-3_26","DOIUrl":"https://doi.org/10.1007/978-3-030-33582-3_26","url":null,"abstract":"","PeriodicalId":448355,"journal":{"name":"International Conference of Reliable Information and Communication Technology","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125113326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Walid Mohamed Alsharafi, M. N. Omar, N. A. Al-Majmar, Yousef Fazea
{"title":"Normal Profile Updating Method for Enhanced Packet Header Anomaly Detection","authors":"Walid Mohamed Alsharafi, M. N. Omar, N. A. Al-Majmar, Yousef Fazea","doi":"10.1007/978-3-030-33582-3_69","DOIUrl":"https://doi.org/10.1007/978-3-030-33582-3_69","url":null,"abstract":"","PeriodicalId":448355,"journal":{"name":"International Conference of Reliable Information and Communication Technology","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125255155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Determinants of Users' Intention to Use IoT: A Conceptual Framework","authors":"Nura Muhammad Baba, A. S. Baharudin","doi":"10.1007/978-3-030-33582-3_92","DOIUrl":"https://doi.org/10.1007/978-3-030-33582-3_92","url":null,"abstract":"","PeriodicalId":448355,"journal":{"name":"International Conference of Reliable Information and Communication Technology","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130318348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Saghir, Bassam Ahmed H. Abu Al Khair, Jameel Hamodi, Nibras Abdullah
{"title":"Traditional Versus Decentralized Access Control for Internet of Things (IoT): Survey","authors":"M. Saghir, Bassam Ahmed H. Abu Al Khair, Jameel Hamodi, Nibras Abdullah","doi":"10.1007/978-3-030-33582-3_46","DOIUrl":"https://doi.org/10.1007/978-3-030-33582-3_46","url":null,"abstract":"","PeriodicalId":448355,"journal":{"name":"International Conference of Reliable Information and Communication Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129958314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. P. Pratama, S. N. Saud, R. Ekawati, M. Manfaluthy
{"title":"Load Balancing Approach of Protection in Datacenters: A Narrative Review","authors":"L. P. Pratama, S. N. Saud, R. Ekawati, M. Manfaluthy","doi":"10.1007/978-3-030-33582-3_109","DOIUrl":"https://doi.org/10.1007/978-3-030-33582-3_109","url":null,"abstract":"","PeriodicalId":448355,"journal":{"name":"International Conference of Reliable Information and Communication Technology","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115220285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Phishing Email: Could We Get Rid of It? A Review on Solutions to Combat Phishing Emails","authors":"G. Ali","doi":"10.1007/978-3-030-33582-3_80","DOIUrl":"https://doi.org/10.1007/978-3-030-33582-3_80","url":null,"abstract":"","PeriodicalId":448355,"journal":{"name":"International Conference of Reliable Information and Communication Technology","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125027668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Imperative Selection Intensity of Parent Selection Operator in Evolutionary Algorithm Hybridization for Nurse Scheduling Problem","authors":"Huai Tein Lim, I. Yong, P. Ng","doi":"10.1007/978-3-030-33582-3_23","DOIUrl":"https://doi.org/10.1007/978-3-030-33582-3_23","url":null,"abstract":"","PeriodicalId":448355,"journal":{"name":"International Conference of Reliable Information and Communication Technology","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124166478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Karkonasasi, Y. Cheah, S. Mousavi, A. S. Baharudin
{"title":"Malaysian Health Centers' Intention to Use an SMS-Based Vaccination Reminder and Management System: A Conceptual Model","authors":"K. Karkonasasi, Y. Cheah, S. Mousavi, A. S. Baharudin","doi":"10.1007/978-3-030-33582-3_90","DOIUrl":"https://doi.org/10.1007/978-3-030-33582-3_90","url":null,"abstract":"","PeriodicalId":448355,"journal":{"name":"International Conference of Reliable Information and Communication Technology","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124143425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abdullah B. Nasser, Fadhl Hujainah, Abdulrahman A. Alsewari, K. Z. Zamli
{"title":"An Improved Jaya Algorithm-Based Strategy for T-Way Test Suite Generation","authors":"Abdullah B. Nasser, Fadhl Hujainah, Abdulrahman A. Alsewari, K. Z. Zamli","doi":"10.1007/978-3-030-33582-3_34","DOIUrl":"https://doi.org/10.1007/978-3-030-33582-3_34","url":null,"abstract":"","PeriodicalId":448355,"journal":{"name":"International Conference of Reliable Information and Communication Technology","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126500842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}