Skip to main content
Tagging provides support for retrieval and categorization of online content depending on users' tag choice. A number of models of tagging behaviour have been proposed to identify factors that are considered to affect taggers, such as... more
    • by  and +1
    • by 
    •   2  
      Data AnalysisUser interfaces
Tagging provides support for retrieval and categorization of online content depending on users' tag choice. A number of models of tagging behaviour have been proposed to identify factors that are considered to affect taggers, such as... more
    • by 
    • Computer Science
Driverless-car is a technology from the future that seems to be a reality sooner than expected. All countries around the world are assessing their readiness to adopt the change. For many, it is a technology that promises safer roads and... more
    • by 
Purpose This paper aims to propose a novel way of using textual clustering as a feature selection method. It is applied to identify the most important keywords in the profile classification. The method is demonstrated through the problem... more
    • by 
Data preprocessing moves the data from raw to ready for analysis. Data resulting from fraud compromises the quality of the data and the resulting analysis. It can exist in datasets such that it goes undetected since it is included in the... more
    • by 
    • Data
A new methodology was created to measure the energy consumption and related Greenhouse Gas (GHG) emissions of a computer Operating System (OS) across different device platforms. The methodology involved the direct power measurement of... more
    • by 
    •   5  
      Operating SystemsEnergy and EnvironmentEnvironmental SustainabilityGreen IT
In this paper we present a dynamic, country level model and methodology to determine the energy related Green House Gas (GHG) abatement potential of cloud computing. The methodology presented includes variables for market penetration,... more
    • by 
    •   7  
      EngineeringComputer ScienceEnvironmental EconomicsCloud Computing
This paper presents the notion of Context-based Activity Design (CoBAD) that represents context with its dynamic changes and normative activities in an interactive system design. The development of CoBAD requires an appropriate context... more
    • by  and +1
In this paper, we propose a context ontology model that captures context information from multiple domain applications. It consists of three fundamental classes: Extrinsic Context, Interface Context, and Intrinsic Context that corresponds... more
    • by  and +1
Norms are a set of rules that govern the behaviour of human agent, and how human agent behaves in response to the given certain conditions. This paper investigates the overlapping of information fields (set of shared norms) in the Context... more
    • by 
In Malaysia, floods are the natural disasters that happen every year during the monsoon season from November until January. These flood caused serious damage to houses, roads, businesses, public facilities and even killed people. Though... more
    • by  and +1
    •   2  
      Flood Risk ManagementFlood modelling
The proliferation 1 of optical network technology has helped to alleviate the emerging of next generation transport networks; also known as intelligent optical network. Network functions previously processed in the electrical domain have... more
    • by  and +1
    • Next Generation Networks
The growing amount of unstructured text over Internet is tremendous. Text repositories come from Web 2.0, business intelligence and social networking applications. It is also believed that 80-90% of future growth data is available in the... more
    • by 
    •   2  
      Data mining and Text miningTextual Analytics
In Malaysia, floods are the natural disasters that happen every year during the monsoon season from November until January. These flood caused serious damage to houses, roads, businesses, public facilities and even killed people. Though... more
    • by  and +1
    •   2  
      Flood modellingFloods
There are variety of knowledge management system (KMS) have been developed for organizations to provide access to data and knowledge across the enterprise. Nevertheless, very limited KMS focus on military personnel in collecting their... more
    • by 
    •   2  
      Tacit KnowledgeKnowledge Management System
Unfortunately, not many studies have been carried out to explore tacit knowledge in the area of peacekeeping operations. Therefore, this study was conducted among military observers (MILOB) to collect their tacit knowledge which can help... more
    • by  and +1
    •   3  
      Tacit KnowledgeSITUATIONAL AWARENESSSemi-Structured Interviews
Online travel forums have become an extremely popular platform for sharing travel information, with a large number of reviews being posted daily. Travel websites such as TripAdvisor and Booking.com have turned into very important... more
    • by  and +1
    •   4  
      Text MiningCustomer SatisfactionOpinion MiningHotel Reviews
With the phenomenal increase in use of Social Networking Service (SNS) and mobile technology, the consequences of cyberbullying have become an epidemic. More than 80% youth use cell phones making them extremely vulnerable to the abuse and... more
    • by  and +1
    •   5  
      TwitterAssociation Rules MiningCybersafetyAssociation Analysis
Tacit knowledge tends to be an invaluable knowledge repository in lifelong learning. Critical domains such as military learning cannot solely rely on traditional manuals and methods due to the unforeseen and uncertain scenarios brought... more
    • by  and +1