Urmăriți
Iskandar Ishak
Iskandar Ishak
Associate Professor, Department of Computer Science, Faculty of Comp. Sc. and Info. Tech, UPM
Adresă de e-mail confirmată pe upm.edu.my - Pagina de pornire
Titlu
Citat de
Citat de
Anul
Classification of Histopathology Images of Breast into Benign and Malignant using a Single-layer Convolutional Neural Network
EM Nejad, LS Affendey, R Latip, I Ishak
International Conference on Imaging, Signal Processing and Communication …, 2017
552017
A Review Of Data Quality Research In Achieving High Data Quality Within Organization
MI Jaya, F Sidi, I Ishak, LS Affendey, M A. Jabar
Journal of Theoretical and Applied Information Technology 95 (12), 2647-2657, 2017
402017
A systematic review on the profiling of digital news portal for big data veracity
NBC Eembi, IB Ishak, F Sidi, LS Affendey, A Mamat
Procedia Computer Science 72, 390-397, 2015
282015
Systematic review of using machine learning in imputing missing values
M Alabadla, F Sidi, I Ishak, H Ibrahim, LS Affendey, ZC Ani, MA Jabar, ...
IEEE Access 10, 44483-44502, 2022
272022
Big data analytics implementation for value discovery: A systematic literature review
C Adrian, F Sidi, R Abdullah, I Ishak, LS Affendey, M A Jabar
Journal of Theoretical and Applied Information Technology 93 (2), 2016
202016
A survey on security awareness among social networking users in Malaysia
I Ishak, F Sidi, MA Jabar, NFM Sani, A Mustapha, SR Supian, M Apau
Australian Journal of Basic and Applied Sciences 6 (12), 23-29, 2012
192012
Transferred semantic scores for scalable retrieval of histopathological breast cancer images
E Mahraban Nejad, LS Affendey, RB Latip, IB Ishak, R Banaeeyan
International Journal of Multimedia Information Retrieval 7, 241-249, 2018
182018
How social media crisis response and social interaction is helping people recover from COVID-19: An empirical investigation
UA Bukar, MA Jabar, F Sidi, RNHB Nor, S Abdullah, I Ishak
Journal of computational social science, 1-29, 2022
162022
Semantic Schema Matching Approaches: A Review
J Hossain, NFM Sani, LS Affendey, I Ishak, KA Kasmiran
Journal of Theoretical and Applied Information Technology 62 (1), 139-147, 2014
152014
Mobile plant tagging system for urban forest eco-tourism using QR code
I Ishak, F Sidi, LS Affendey, NFM Sani, AS Hamzah, P Bawon
2013 International Conference on Advanced Computer Science Applications and …, 2013
142013
The moderating role of personal innovativeness in tourists’ intention to use web 3.0 based on updated information systems success model
MA Albaom, F Sidi, MA Jabar, R Abdullah, I Ishak, NA Yunikawati, ...
Sustainability 14 (21), 13935, 2022
122022
Quality Model for Massive Open Online Course (MOOC) Web Content
WN Wan Ab Rahman, H Zulzalil, I Ishak, AW Selamat
International Journal on Advanced Science, Engineering and Information …, 2020
82020
Systematic review of data quality research
I Jaya, F Sidi, L Affendey, M Jabar, I Ishak
Journal of Theoretical and Applied Information Technology 97 (21), 3043-3068, 2019
82019
A Novel Watermarking Technique in Data Transmission between QR codes and Database
K Mohamed, F Sidi, MA Jabar, I Ishak
2013 IEEE Conference on Open Systems, 95-99, 2013
82013
MEASURING COMPUTER SECURITY AWARENESS ON INTERNET BANKING AND SHOPPING FOR INTERNET USERS.
F SIDI, MA JABAR, A MUSTAPHA, NORF SANI, I ISHAK, SR SUPIAN
Journal of Theoretical & Applied Information Technology 53 (2), 2013
72013
Database integration approaches for heterogeneous biological data sources: An overview
I Ishak, N Salim
Proceedings of the Postgraduate Annual Research Seminar 202, 2006
72006
The impact of tourist’s intention to use web 3.0: A conceptual integrated model based on TAM & DMISM
MA Albaom, F Sidi, MA Jabar, R Abdullah, I Ishak, N Yunikawati, ...
J. Theor. Appl. Inf. Technol 99, 6222-6238, 2021
62021
Malayik: An ontological approach to knowledge transformation in malay unstructured documents
F Sidi, I Ishak, MA Jabar
International Journal of Electrical and Computer Engineering 8 (1), 1-10, 2018
62018
A Comparative Analysis Study on Information Security Threat Models: A Propose for Threat Factor Profiling
F Sidi, M A. Jabar, LS Affendey, I Ishak, NM Sharef, M Zolkepli, TM Ming, ...
Journal of Engineering and Applied Sciences 12 (3), 548-554, 2017
62017
Protecting wireless data transmission in mobile application systems using digital watermarking technique
K Mohamed, F Sidi, MA Jabar, I Ishak
Journal of Theoretical and Applied Information Technology 83 (1), 52, 2016
62016
Sistemul nu poate realiza operația în acest moment. Încercați din nou mai târziu.
Articole 1–20