Skip to main content

previous disabled Page of 2
and
  1. Article

    Open Access

    A new multi-attribute group decision-making method based on Einstein Bonferroni operators under interval-valued Fermatean hesitant fuzzy environment

    Faced with the increasing complexity and uncertainty of decision-making information, interval-valued Fermatean hesitant fuzzy sets (IVFHFSs) were presented as a novel mathematical model that handled uncertain ...

    Siyue Lei, **uqin Ma, Hongwu Qin, Yibo Wang, Jasni Mohamad Zain in Scientific Reports (2024)

  2. No Access

    Article

    A novel global MPPT technique to enhance maximum power from PV systems under variable atmospheric conditions

    The study of renewable energy is expanding quickly, particularly in the areas of modeling and photovoltaic (PV) technology. The utilization of photovoltaic systems is prevalent in diverse renewable energy appl...

    Tao Hai, Jasni Mohamad Zain, Kengo Muranaka in Soft Computing (2023)

  3. No Access

    Article

    Maximum power point tracking technique based on variable step size with sliding mode controller in photovoltaic system

    Due to the economic and technical advantages, the use of solar energy is expanding in developed countries. The extraction of maximum power in solar power plants is an important issue that requires extensive re...

    Tao Hai, Jasni Mohamad Zain, Hiroki Nakamura in Soft Computing (2023)

  4. No Access

    Chapter and Conference Paper

    The Central Bank Digital Currency in Malaysia: A Literature Review

    Central Bank Digital Currency (CBDC) is a digital form of central bank money, and is different from traditional reserves or settlement accounts balances. In line with the digital technology era, CBDC has gaine...

    Normi Sham Awang Abu Bakar, Norzariyah Yahya in Innovation of Businesses, and Digitalizati… (2023)

  5. No Access

    Chapter and Conference Paper

    Relationship Between Consumer's Social Networking Behavior and Cybercrime Victimization Among the University Students

    Social media is broadly used for various reasons and one being for academic purposes in universities. Although it has its own repercussion such as cyber-crime victimization. This study intends to investigate t...

    Yousuf Saif Al-Hasani, Jasni Mohamad Zain in International Conference on Information Sy… (2023)

  6. No Access

    Book and Conference Proceedings

    Soft Computing in Data Science

    6th International Conference, SCDS 2021, Virtual Event, November 2–3, 2021, Proceedings

    Prof. Dr. Azlinah Mohamed in Communications in Computer and Information Science (2021)

  7. No Access

    Chapter and Conference Paper

    On Maximal Degree of Domination for Decision Making

    This paper presents an extended decision making of soft set to multi-valued information systems. By the notion of multi-soft sets, the concept of domination between two soft sets is proposed. Then, the highest...

    Suhirman, Jasni Mohamad Zain in Proceedings of the International Conferenc… (2019)

  8. No Access

    Chapter and Conference Paper

    Digital Image Quality Evaluation for Spatial Domain Text Steganography

    Steganography is one of the techniques that can be used to hide information in any file types such as audio, image, text and video format. The image steganography is about concealing the hidden data into digit...

    Jasni Mohamad Zain, Nur Imana Balqis Ramli in Soft Computing in Data Science (2019)

  9. No Access

    Article

    Bit allocation strategy based on Psychovisual threshold in image compression

    Image compression leads to minimize the storage-requirement of an image by reducing the size of the image. This paper presents a bit allocation strategy based on psychovisual threshold in image compression con...

    Ferda Ernawan, Muhammad Nomani Kabir in Multimedia Tools and Applications (2018)

  10. No Access

    Article

    Numbering with spiral pattern to prove authenticity and integrity in medical images

    With the rapid development of technology in digital multimedia, manipulation and misconduct of digital data are soaring. The watermarking procedure is seen as helpful to protect the security of digital images ...

    Syifak Izhar Hisham, Afifah Nailah Muhammad in Pattern Analysis and Applications (2017)

  11. No Access

    Chapter and Conference Paper

    Enhancement of RSA Key Generation Using Identity

    The purpose of this paper is to enhance previous algorithm called Tripathi algorithm. The Tripathi algorithm proposes an RSA based algorithm to generate cryptographic keys using user identity such as email add...

    Norhidayah Muhammad, Jasni Mohamad Zain in Advanced Computer and Communication Engine… (2015)

  12. No Access

    Chapter and Conference Paper

    An Improved Genetic Clustering Algorithm for Categorical Data

    Deng et al. [Deng, S., He, Z., Xu, X.: G-ANMI: A mutual information based genetic clustering algorithm for categorical data, Knowledge-Based Systems 23, 144–149(2010)] proposed a mutual information based genetic ...

    Hongwu Qin, **uqin Ma, Tutut Herawan in Emerging Trends in Knowledge Discovery and… (2013)

  13. No Access

    Book and Conference Proceedings

    Digital Information and Communication Technology and Its Applications

    International Conference, DICTAP 2011, Dijon, France, June 21-23, 2011, Proceedings, Part II

    Hocine Cherifi, Jasni Mohamad Zain in Communications in Computer and Information Science (2011)

  14. No Access

    Book and Conference Proceedings

    Software Engineering and Computer Systems

    Second International Conference, ICSECS 2011, Kuantan, Pahang, Malaysia, June 27-29, 2011, Proceedings, Part II

    Jasni Mohamad Zain in Communications in Computer and Information Science (2011)

  15. No Access

    Book and Conference Proceedings

    Software Engineering and Computer Systems

    Second International Conference, ICSECS 2011, Kuantan, Pahang, Malaysia, June 27-29, 2011, Proceedings, Part I

    Jasni Mohamad Zain in Communications in Computer and Information Science (2011)

  16. No Access

    Book and Conference Proceedings

    Digital Information and Communication Technology and Its Applications

    International Conference, DICTAP 2011, Dijon, France, June 21-23, 2011. Proceedings, Part I

    Hocine Cherifi, Jasni Mohamad Zain in Communications in Computer and Information Science (2011)

  17. No Access

    Book and Conference Proceedings

    Software Engineering and Computer Systems

    Second International Conference, ICSECS 2011, Kuantan, Pahang, Malaysia, June 27-29, 2011, Proceedings, Part III

    Jasni Mohamad Zain in Communications in Computer and Information Science (2011)

  18. No Access

    Chapter and Conference Paper

    A Soft Set Model on Information System and Its Application in Clustering Attribute Selection

    In this paper, we define a soft set model on the set of equivalence classes in an information system, which can be easily applied to obtaining approximation sets of rough set. Furthermore, we use it to select ...

    Hongwu Qin, **uqin Ma, Jasni Mohamad Zain in Software Engineering and Computer Systems (2011)

  19. No Access

    Chapter and Conference Paper

    Malaysian Car Plates Recognition Using Freeman Chain Codes and Characters’ Features

    Car plate recognition (CPR) system is an important application of image detection and recognition used to overcome the challenges of monitoring modern day traffic. The Freeman chain codes (FCC) is applied in t...

    Nor Amizam Jusoh, Jasni Mohamad Zain in Software Engineering and Computer Systems (2011)

  20. No Access

    Chapter and Conference Paper

    Enhancement Algorithms for SQL-Based Chatbot

    Artificial intelligence chatbot is a technology that makes interaction between men and machines using natural language possible. From literature of chatbot’s keywords/pattern matching techniques, some potentia...

    Abbas Saliimi Lokman, Jasni Mohamad Zain in Software Engineering and Computer Systems (2011)

previous disabled Page of 2