Classification of Histopathology Images of Breast into Benign and Malignant using a Single-layer Convolutional Neural Network EM Nejad, LS Affendey, R Latip, I Ishak International Conference on Imaging, Signal Processing and Communication …, 2017 | 56 | 2017 |
A Review Of Data Quality Research In Achieving High Data Quality Within Organization MI Jaya, F Sidi, I Ishak, LS Affendey, M A. Jabar Journal of Theoretical and Applied Information Technology 95 (12), 2647-2657, 2017 | 42 | 2017 |
A systematic review on the profiling of digital news portal for big data veracity NBC Eembi, IB Ishak, F Sidi, LS Affendey, A Mamat Procedia Computer Science 72, 390-397, 2015 | 29 | 2015 |
Systematic review of using machine learning in imputing missing values M Alabadla, F Sidi, I Ishak, H Ibrahim, LS Affendey, ZC Ani, MA Jabar, ... IEEE Access 10, 44483-44502, 2022 | 27 | 2022 |
Big data analytics implementation for value discovery: A systematic literature review C Adrian, F Sidi, R Abdullah, I Ishak, LS Affendey, M A Jabar Journal of Theoretical and Applied Information Technology 93 (2), 2016 | 20 | 2016 |
A survey on security awareness among social networking users in Malaysia I Ishak, F Sidi, MA Jabar, NFM Sani, A Mustapha, SR Supian, M Apau Australian Journal of Basic and Applied Sciences 6 (12), 23-29, 2012 | 20 | 2012 |
Transferred semantic scores for scalable retrieval of histopathological breast cancer images E Mahraban Nejad, LS Affendey, RB Latip, IB Ishak, R Banaeeyan International Journal of Multimedia Information Retrieval 7, 241-249, 2018 | 18 | 2018 |
How social media crisis response and social interaction is helping people recover from COVID-19: An empirical investigation UA Bukar, MA Jabar, F Sidi, RNHB Nor, S Abdullah, I Ishak Journal of computational social science, 1-29, 2022 | 17 | 2022 |
Semantic Schema Matching Approaches: A Review J Hossain, NFM Sani, LS Affendey, I Ishak, KA Kasmiran Journal of Theoretical and Applied Information Technology 62 (1), 139-147, 2014 | 15 | 2014 |
Mobile plant tagging system for urban forest eco-tourism using QR code I Ishak, F Sidi, LS Affendey, NFM Sani, AS Hamzah, P Bawon 2013 International Conference on Advanced Computer Science Applications and …, 2013 | 14 | 2013 |
The moderating role of personal innovativeness in tourists’ intention to use web 3.0 based on updated information systems success model MA Albaom, F Sidi, MA Jabar, R Abdullah, I Ishak, NA Yunikawati, ... Sustainability 14 (21), 13935, 2022 | 13 | 2022 |
Systematic review of data quality research I Jaya, F Sidi, L Affendey, M Jabar, I Ishak Journal of Theoretical and Applied Information Technology 97 (21), 3043-3068, 2019 | 9 | 2019 |
Quality Model for Massive Open Online Course (MOOC) Web Content WN Wan Ab Rahman, H Zulzalil, I Ishak, AW Selamat International Journal on Advanced Science, Engineering and Information …, 2020 | 8 | 2020 |
A Novel Watermarking Technique in Data Transmission between QR codes and Database K Mohamed, F Sidi, MA Jabar, I Ishak 2013 IEEE Conference on Open Systems, 95-99, 2013 | 8 | 2013 |
MEASURING COMPUTER SECURITY AWARENESS ON INTERNET BANKING AND SHOPPING FOR INTERNET USERS. F SIDI, MA JABAR, A MUSTAPHA, NORF SANI, I ISHAK, SR SUPIAN Journal of Theoretical & Applied Information Technology 53 (2), 2013 | 7 | 2013 |
Database integration approaches for heterogeneous biological data sources: An overview I Ishak, N Salim Proceedings of the Postgraduate Annual Research Seminar 202, 2006 | 7 | 2006 |
The impact of tourist’s intention to use web 3.0: A conceptual integrated model based on TAM & DMISM MA Albaom, F Sidi, MA Jabar, R Abdullah, I Ishak, N Yunikawati, ... J. Theor. Appl. Inf. Technol 99, 6222-6238, 2021 | 6 | 2021 |
Malayik: An ontological approach to knowledge transformation in malay unstructured documents F Sidi, I Ishak, MA Jabar International Journal of Electrical and Computer Engineering 8 (1), 1-10, 2018 | 6 | 2018 |
A Comparative Analysis Study on Information Security Threat Models: A Propose for Threat Factor Profiling F Sidi, M A. Jabar, LS Affendey, I Ishak, NM Sharef, M Zolkepli, TM Ming, ... Journal of Engineering and Applied Sciences 12 (3), 548-554, 2017 | 6 | 2017 |
Protecting wireless data transmission in mobile application systems using digital watermarking technique K Mohamed, F Sidi, MA Jabar, I Ishak Journal of Theoretical and Applied Information Technology 83 (1), 52, 2016 | 6 | 2016 |