Previous Issue

PDF Icon

RISK MANAGEMENT AND INFORMATION TECHNOLOGY PROJECTS

Author/s:  Amine Nehari Talet, Razali Mat-Zin, Maaradj Houari
Pages:  1-9   /   DOI:  http://dx.doi.org/10.17781/P001078
PDF Icon

STRUCTURING HETEROGENEOUS BIG DATA FOR SCALABILITY AND ACCURACY

Author/s:  Ashraf Gaffar, Eman Monir Darwish, Abdessamad Tridane
Pages:  10-23   /   DOI:  http://dx.doi.org/10.17781/P001079
PDF Icon

A NEW APPROACH TOWARDS INTEGRATED CLOUD COMPUTING ARCHITECTURE

Author/s:  Niloofar Khanghahi, Ramin Nasiri, Mahsa Razavi Davoudi
Pages:  24-34   /   DOI:  http://dx.doi.org/10.17781/P001080
PDF Icon

ENRICHED ETOM FRAMEWORK IN SERVICE DELIVER OPERATION THROUGH ALIGNMENT WITH SOME OF COBIT5 STRATEGIC OBJECTIVES

Author/s:  Faride Latifi, Ramin Nasiri, Mehran Mohsenzadeh
Pages:  35-42   /   DOI:  http://dx.doi.org/10.17781/P001081
PDF Icon

A HIERARCHICAL SELF-HEALING SLA FOR CLOUD COMPUTING

Author/s:  Ahmad Mosallanejad, Rodziah Atan, Masrah Azmi Murad, Rusli Abdullah
Pages:  43-52   /   DOI:  http://dx.doi.org/10.17781/P001082
PDF Icon

A MODEL FOR RECALIBRATING CREDIBILITY IN DIFFERENT CONTEXTS AND LANGUAGES - A TWITTER CASE STUDY

Author/s:  Amal Abdullah AlMansour, Ljiljana Brankovic, Costas S. Iliopoulos
Pages:  53-62   /   DOI:  http://dx.doi.org/10.17781/P001083
PDF Icon

FACTORS GENERATING RISKS DURING REQUIREMENT ENGINEERING PROCESS IN GLOBAL SOFTWARE DEVELOPMENT ENVIRONMENT

Author/s:  Huma Hayat Khan, Mohd. Naz’ri bin Mahrin, Suriayati bt Chuprat
Pages:  63-78   /   DOI:  http://dx.doi.org/10.17781/P001084
PDF Icon

REVIEW OF SUPPORT TO SITUATIONAL REQUIREMENT ENGINEERING FROM STANDARDS AND MODELS

Author/s:  Huma Hayat Khan, Mohd. Naz’ri bin Mahrin, Suriayati bt Chuprat
Pages:  79-94   /   DOI:  http://dx.doi.org/10.17781/P001085
PDF Icon

DEVELOPING USABLE SOFTWARE PRODUCT USING USABILITY RISK ASSESSMENT MODEL

Author/s:  Jayaletchumi Sambantha Moorthy, Suhaimi bin Ibrahim, Mohd Naz’ri Mahrin
Pages:  95-102   /   DOI:  http://dx.doi.org/10.17781/P001088
PDF Icon

CRITICAL FACTORS AND COMPARATIVE ANALYSIS THAT INFLUENCING THE REGISTRATION OF DOMAIN NAME

Author/s:  Norul Bahriyah Shaari, Harihodin Selamat
Pages:  103-113   /   DOI:  http://dx.doi.org/10.17781/P001089
PDF Icon

LIGHTWEIGHT PRIORITY SCHEDULING SCHEME FOR SMART HOME AND AMBIENT ASSISTED LIVING SYSTEM

Author/s:  Hamdan Sayuti, Rozeha A.Rashid, Mu'azzah A. Latiff, A. H. F. A. Hamid, N. Fisal, M. A. Sarijari, Alias Mohd, Kamaludin M. Yusof, Rozaini Abd Rahim
Pages:  114-123   /   DOI:  http://dx.doi.org/10.17781/P001090
PDF Icon

A GENETIC ALGORITHM ANALYSIS TOWARDS OPTIMIZATION SOLUTIONS

Author/s:  Mujahid Tabassum , Kuruvilla Mathew
Pages:  124-142   /   DOI:  http://dx.doi.org/10.17781/P001091
PDF Icon

EXPERIMENTAL COMPARISON OF UNINFORMED AND HEURISTIC AI ALGORITHMS FOR N PUZZLE AND 8 QUEEN PUZZLE SOLUTION

Author/s:  Kuruvilla Mathew , Mujahid Tabassum
Pages:  143-154   /   DOI:  http://dx.doi.org/10.17781/P001092
PDF Icon

PERFORMANCE EVALUATION OF ADAPTIVE LDPC CODED MODULATION COOPERATIVE WIRELESS COMMUNICATION SYSTEM WITH BEST-RELAY SELECTION

Author/s:  Ahmed Mohamed, Mohammed Abd-Elnaby, Sami A. El-dolil
Pages:  155-168   /   DOI:  http://dx.doi.org/10.17781/P001093