Follow
Iskandar Ishak
Iskandar Ishak
Associate Professor, Department of Computer Science, Faculty of Comp. Sc. and Info. Tech, UPM
Verified email at upm.edu.my - Homepage
Title
Cited by
Cited by
Year
Classification of Histopathology Images of Breast into Benign and Malignant using a Single-layer Convolutional Neural Network
EM Nejad, LS Affendey, R Latip, I Ishak
International Conference on Imaging, Signal Processing and Communication …, 2017
562017
A Review Of Data Quality Research In Achieving High Data Quality Within Organization
MI Jaya, F Sidi, I Ishak, LS Affendey, M A. Jabar
Journal of Theoretical and Applied Information Technology 95 (12), 2647-2657, 2017
422017
A systematic review on the profiling of digital news portal for big data veracity
NBC Eembi, IB Ishak, F Sidi, LS Affendey, A Mamat
Procedia Computer Science 72, 390-397, 2015
292015
Systematic review of using machine learning in imputing missing values
M Alabadla, F Sidi, I Ishak, H Ibrahim, LS Affendey, ZC Ani, MA Jabar, ...
IEEE Access 10, 44483-44502, 2022
272022
Big data analytics implementation for value discovery: A systematic literature review
C Adrian, F Sidi, R Abdullah, I Ishak, LS Affendey, M A Jabar
Journal of Theoretical and Applied Information Technology 93 (2), 2016
202016
A survey on security awareness among social networking users in Malaysia
I Ishak, F Sidi, MA Jabar, NFM Sani, A Mustapha, SR Supian, M Apau
Australian Journal of Basic and Applied Sciences 6 (12), 23-29, 2012
202012
Transferred semantic scores for scalable retrieval of histopathological breast cancer images
E Mahraban Nejad, LS Affendey, RB Latip, IB Ishak, R Banaeeyan
International Journal of Multimedia Information Retrieval 7, 241-249, 2018
182018
How social media crisis response and social interaction is helping people recover from COVID-19: An empirical investigation
UA Bukar, MA Jabar, F Sidi, RNHB Nor, S Abdullah, I Ishak
Journal of computational social science, 1-29, 2022
172022
Semantic Schema Matching Approaches: A Review
J Hossain, NFM Sani, LS Affendey, I Ishak, KA Kasmiran
Journal of Theoretical and Applied Information Technology 62 (1), 139-147, 2014
152014
The moderating role of personal innovativeness in tourists’ intention to use web 3.0 based on updated information systems success model
MA Albaom, F Sidi, MA Jabar, R Abdullah, I Ishak, NA Yunikawati, ...
Sustainability 14 (21), 13935, 2022
142022
Mobile plant tagging system for urban forest eco-tourism using QR code
I Ishak, F Sidi, LS Affendey, NFM Sani, AS Hamzah, P Bawon
2013 International Conference on Advanced Computer Science Applications and …, 2013
142013
Systematic review of data quality research
I Jaya, F Sidi, L Affendey, M Jabar, I Ishak
Journal of Theoretical and Applied Information Technology 97 (21), 3043-3068, 2019
92019
Quality Model for Massive Open Online Course (MOOC) Web Content
WN Wan Ab Rahman, H Zulzalil, I Ishak, AW Selamat
International Journal on Advanced Science, Engineering and Information …, 2020
82020
A Novel Watermarking Technique in Data Transmission between QR codes and Database
K Mohamed, F Sidi, MA Jabar, I Ishak
2013 IEEE Conference on Open Systems, 95-99, 2013
82013
MEASURING COMPUTER SECURITY AWARENESS ON INTERNET BANKING AND SHOPPING FOR INTERNET USERS.
F SIDI, MA JABAR, A MUSTAPHA, NORF SANI, I ISHAK, SR SUPIAN
Journal of Theoretical & Applied Information Technology 53 (2), 2013
72013
Database integration approaches for heterogeneous biological data sources: An overview
I Ishak, N Salim
Proceedings of the Postgraduate Annual Research Seminar 202, 2006
72006
The impact of tourist’s intention to use web 3.0: A conceptual integrated model based on TAM & DMISM
MA Albaom, F Sidi, MA Jabar, R Abdullah, I Ishak, N Yunikawati, ...
J. Theor. Appl. Inf. Technol 99, 6222-6238, 2021
62021
Malayik: An ontological approach to knowledge transformation in malay unstructured documents
F Sidi, I Ishak, MA Jabar
International Journal of Electrical and Computer Engineering 8 (1), 1-10, 2018
62018
A Comparative Analysis Study on Information Security Threat Models: A Propose for Threat Factor Profiling
F Sidi, M A. Jabar, LS Affendey, I Ishak, NM Sharef, M Zolkepli, TM Ming, ...
Journal of Engineering and Applied Sciences 12 (3), 548-554, 2017
62017
Protecting wireless data transmission in mobile application systems using digital watermarking technique
K Mohamed, F Sidi, MA Jabar, I Ishak
Journal of Theoretical and Applied Information Technology 83 (1), 52, 2016
62016
The system can't perform the operation now. Try again later.
Articles 1–20