ISSN ( ONLINE ) : 2278 - 3091
6 issues per year (February , April, June , August, October, December)
Indian Authors : Rs.1500
Foreign Authors : USD 50
The World Academy of Research in Science and Engineering
Article - 1 | Title | HE_OWW Filter for Enhancement of Wildlife Observation Digital Images in Limited Light Condition | 1 - 8 |
Authors | S. Suhaila, S. Lee, R. Hazli, N.S.A.M. Taujuddin& N.S. Suriani |
Article - 2 | Title | Front-End Development of Nutrient Film Technique for Hydroponic Plant with IoT Monitoring System | 9 - 14 |
Authors | Raja Siti Nur Adiimahbinti Raja Aris, Khairul IrwanFikri bin Mohammad, Lia SafiyahbintiSyafie, Farah Hanan bintiAzimi, Suzanna bintiRidzuan Aw |
Article - 3 | Title | Ontology Model for C-Overflow Vulnerabilities Attack | 15- 20 |
Authors | Nurul Haszeli Ahmad, Syed Ahmad Aljunid, Normaly Kamal Ismail, Muthukkaruppan Annamalai, Shaiful Bakhtiar bin Rodzman |
Article - 4 | Title | JAKIM Halal Logo Verification using Image Processing | 21- 26 |
Authors | KhairilAmirin Kassim, Nor Ashikin Mohamad Kamal, Norizan Mat Diah |
Article - 5 | Title | Voice Integration on Smart Indoor Garden (VoISIG) Using Amazon Alexa | 27- 33 |
Authors | Abidah Mat Taib, Umiera Zulaika Mohd Razlin, Rafiza Ruslan , Nur Fatihah Fauzi |
Article - 6 | Title | Human Competency Considerations in an Integrated Software Configuration Management Framework | 34 - 42 |
Authors | Syahrul Fahmy, Amir Ngah, Ahmad Faiz, Nurul Haslinda1, Wan Roslina |
Article - 7 | Title | An Analysis of Standardized Data for Fog Computing Storage Capacity using Non-Relational Database | 43 - 49 |
Authors | Mohd Hariz Naim @ Mohayat, Jasni Mohamad Zain, Kamarularifin Abd Jalil, Lee Mei Ph’ng, Lizawati Salahuddin, Mohd Hakim Abdul Hamid, Halizah Basiron |
Article - 8 | Title | The Evolution of Software Configuration Management | 50 - 63 |
Authors | Syahrul Fahmy, Aziz Deraman, Jamaiah Yahaya, Akhyari Nasir, Nooraida Shamsudin |
Article - 9 | Title | Design to Encourage Reframing and Transformations through Digital Story telling and Analogical Thinking | 64 - 70 |
Authors | Chien-Sing Lee, Ean-Huat Ooi |
Article - 10 | Title | Developing a Community Event Sharing/ Hosting Website to Improve Quality of Life among Malaysia’s Senior Citizens | 71 - 77 |
Authors | Eugene Jenn-Ning Bong, Chien-Sing Lee |
Article - 11 | Title | Leap Motion-Enhanced Augmented Reality Video Games to Encourage Intergenerational Engagement and Wrist Exercise | 78 - 82 |
Authors | Hong-Wei Wong, Chien-Sing Lee |
Article - 12 | Title | Latency Issues in Internet of Things: A Review of Literature and Solution | 83 - 91 |
Authors | Mohd Tamizan Abu Bakar, Azrul Amri Jamal |
Article - 13 | Title | DARMA: Defeating and Reconnaissance Manna-karma Attacks in 802.11 with Multiple Detections and Prevention | 92 - 100 |
Authors | Norzaidi Baharudin, Fakariah HaniMohd Ali, Mohd HarizBin Naim@Mohayat |
Article - 14 | Title | A Refuse Management System and Blockchain: A Practical View | 101 - 109 |
Authors | Rohana Sham, Amir A’Atieff Hussin, Noranita Abdamia, Suhana Mohamed, Won Jet Rou |
Article - 15 | Title | Optimization of Multi-objective ENORA and NSGA-II based on Bio-Inspired Algorithms for Classification Problem | 110 - 116 |
Authors | Mohammad Aizat Basir, Mohamed Saifullah Hussin, Yuhanis Yusof |
Article - 16 | Title | Information Security Culture Model for Malaysian Organizations: A Review | 117 - 121 |
Authors | Akhyari Nasir, Ruzaini Abdullah Arshah, Mohd Rashid Ab Hamid, Syahrul Fahmy, MohdTamizan Abu Bakar |
Article - 17 | Title | J48-Based Algorithm in Predicting the Success Rate in the Board Examination | 122 - 127 |
Authors | Jeffrey A. Clarin |
Article - 18 | Title | Two-Factor Factorial Design to Identify the Best Combination of Factors for PSL Production | 128 - 131 |
Authors | Nurulhaida Bt Zakaria, Sharifah Sakinah Bt Syed Abd Mutalib, Mohamad Asyraf bin Mohd Amin |
Article - 19 | Title | Optimizing the Effectiveness of Intrusion Detection System by using Pearson Correlation and Tune Model Hyper Parameter on Microsoft Azure Platform | 132 - 138 |
Authors | Fuad Mat Isa, Alya Geogiana Buja, Mohammad Yusof Darus, Shahadan Saad |
Article - 20 | Title | Intelligent Investigation on Crime Incident Reports in the Province of Laguna through Predictive Model Development | 139 - 144 |
Authors | Francis F. Balahadia, Jonardo R. Asor, Gene Marck B. Catedrilla, Mia Villarica, Joseph M. Cabiente |
Article - 21 | Title | Fuzzy C Means Imputation of Missing Values with Ant Colony Optimization | 145- 149 |
Authors | Farahida Hanim Mausor, Jafreezal Jaafar, Shakirah MohdTaib |
Article - 22 | Title | Implementation of Predictive Crime Analytics in Municipal Crime Management System in Calauan, Laguna, Philippines | 150- 157 |
Authors | Jonardo R. Asor, Sherwin B. Sapin |
Article - 23 | Title | Java Plum Leaf Classification Using a Mobile Application with Inception Network | 158- 163 |
Authors | James Arnold E. Nogra |
Article - 24 | Title | CHECKDYSC©: Mobile Game for Early Detection of Dyscalculia Signs in Children | 164- 167 |
Authors | Mazeyanti Mohd Ariffin, Nurshazlyn Mohd Aszemi, Nurdiyanah Ismir |
Article - 25 | Title | Application of Technology in Teaching and Facilitating of Islamic Education in 4thIndustrial Revolution: A Review | 168- 174 |
Authors | Muhammad TalhahAjmain @ Jima’ain, Asma Nurul ‘Aqilah Mahpuz, Siti Nur Hadis A Rahman, Mohamad Khairul Latif, Ahmad Marzuki Mohamad, Nur RazanIzzatiMohdRoslan |
Article - 26 | Title | Text Analysis on Instagram Comments to Better Target Users with Product Advertisements | 175- 181 |
Authors | James Arnold E. Nogra |
Article - 27 | Title | Development of E-Health System with Resource Allocation Forecasting for Local Health Communities | 182- 188 |
Authors | John Paul P. Miranda |
Article - 28 | Title | Mobile Bus Ticketing System: Development and Adoption | 189- 196 |
Authors | Ramonsito B. Adducul, Ian Monel C. Adducul |
Article - 29 | Title | MobileNet SSDv2 Inference Approach of Smoke Hazard Detection and Alert System: A Smoke-Induced Simulated Home-Environment | 197- 202 |
Authors | Alvin Sarraga Alon, Jesusimo L. Dioses, Jr, Renante A. Diamante, Rhowel M. Dellosa, Francis Jesmar P. Montalbo |
Article - 30 | Title | Inception Network for Baybáyin Handwriting Recognition | 203- 207 |
Authors | James Arnold E. Nogra |
Article - 31 | Title | Development and Acceptability of Multi-Purpose Electrical Circuit Demonstration Trainer | 208- 214 |
Authors | Warlito D. Antonio |
Article - 32 | Title | Enhanced Decision Support System for Automated Fish Feeder and Water Quality Detection with SMS Notification | 215 - 221 |
Authors | Audelon R. Benito |
Article - 33 | Title | To Trust or Not To Trust? An Investigation into Users’ Action and Perception towards Crowdsourced Information | 222 - 229 |
Authors | Aqilah Azizan, Hazleen Aris |
Article - 34 | Title | Rendering ROV Rolling Motion on a Handheld Haptic Device | 230 - 234 |
Authors | Syed Mohamad Shazali Bin Syed Abdul Hamid, Muhamad Addeen Bin Zailee |
Article - 35 | Title | Fabricating Stationary Solar Power Generator | 235 - 239 |
Authors | Rogelio Rambuyan |
Article - 36 | Title | Automated Sequential Controller for Pre-Seal Bake Process of Microelectronic Packages | 240 - 246 |
Authors | Raymundo P. Gamboa, Glenn N. Ortiz, Mark Joseph B. Enojas |
Article - 37 | Title | An Integrated Model on Airport Terminal Level of Satisfaction for Service Quality Evaluation: A Proposal | 247 - 250 |
Authors | Zirawani Baharum, Azliza Yacob, Siti Fatimah Zahra Abdul Hamid, Fauziah Abdul Rahman |
Article - 38 | Title | A Review on Risk Assessment Using Risk Prediction Technique in Campus Network | 251 - 257 |
Authors | Norkhushaini Awang, Ganthan A/L Narayana Samy, Noor Hafizah Hassan, Pritheega A/P Magalingam , Nurazean Maarop, Sundresan A/L Perumal |
Article - 39 | Title | Modified Round Function of SIMECK 32/64 Block Cipher | 258 - 266 |
Authors | Philipcris C. Encarnacion, Bobby D. Gerardo, Alexander A. Hernandez |
Article - 40 | Title | Cloud based Petrol Pump Blacklisting using IoT | 267 - 273 |
Authors | Rahul Jimmy, Shone Thomas, Suraj P. Nair, Vishnu Baiju, Uday Babu P |
Article - 41 | Title | RFID Controlled “GG” Pieces Ranking Detection with Watch-Dog Enable | 274 - 279 |
Authors | Cherry D. Casuat, Alvin Sarraga Alon,Jesusimo L. Dioses Jr., Rhowel M. Dellosa, Renante A. Diamante |
Article - 42 | Title | Developing an Electrical Outlet using Internet of Things (IoT) | 280 - 286 |
Authors | Maria Charmy A. Arispe, Ryan B. Jaucian, Arnold B. Platon, Floradel S. Relucio, Ben L. Saminiano |
Article - 43 | Title | Overview of Network Dataset and Data Mining Technique | 287 - 290 |
Authors | Noor SuhanaSulaiman, NurSukinah Aziz, NooraidaSamsudin, Wan AinulAlyani, AzlizaYacob, LukmanulhakimNgah |
Article - 44 | Title | Cost Effective IoT based Automated Fish Farming System with Flood Prediction | 291 - 297 |
Authors | Meera Prasad , Selma Majeed, Stephy Romichan, Winnie Mathew , UdayBabu P |
Article - 45 | Title | Sentiment Analysis on Evacuation and Relief Operation in the Philippines | 298 - 302 |
Authors | Maria Charmy A. Arispe, Rosemarie T. Bigueras, Jocelyn O. Torio, Daniel E. Maligat, Jr. |
Article - 46 | Title | A Secure Cloud based Financial Market Research System using Big Data Analytics | 303 - 309 |
Authors | Fafeena mole H., Parvathy R., P. Mohammed Shameem |
Article - 47 | Title | Leukocyte Sub Type Identification using Spline Interpolation and Graphical Analysis | 310 - 315 |
Authors | Diana Baby, Sujitha Juliet Devaraj, Anishin Raj M. M. |
Article - 48 | Title | Development and Implementation of a Board Checker for Fast Loop Circuitry in Testing Microelectronic Packages | 316 - 321 |
Authors | Jeffrey P. Abillar, Marilyn A. Aceron, Glenn N. Ortiz, Mark Joseph B. Enojas |
Article - 49 | Title | Design of Mobile Game-Based Learning Application for Children with Dyslexia | 322 - 326 |
Authors | Rosemarie T. Bigueras, Maria Charmy A. Arispe, Jocelyn O. Torio, Daniel E. Maligat, Jr. , Thelma D. Palaoag |
Article- 50 | Title | Safety Road Signage Application for Kids | 327 - 331 |
Authors | IzzahInani Abdul Halim, AiniZuriayati Abdul Kadir, A. Amarah, I. Norhayatie |
Article - 51 | Title | Mobile Game-Based Learning to Enhance the Reading Performance of Dyslexic Children | 332- 337 |
Authors | Rosemarie T. Bigueras, Maria Charmy A. Arispe, Jocelyn O. Torio, Daniel E. Maligat, Jr. |
Article -52 | Title | A Comparative Analysis of Energy Efficient Mobile Offloading Mechanisms | 338- 341 |
Authors | Anoop S, Dr.J Amar Pratap Singh |
Article - 53 | Title | Analyzing and Predicting Career Specialization using Classification Techniques | 342 - 348 |
Authors | Jennifer Anne A. Repaso, Elenita T. Capariño |
Article - 54 | Title | CCTV-Based Surveillance System with Face Recognition Feature | 349 - 355 |
Authors | Michael Bryan P. Lumaban, Giged T. Battung |
Article - 55 | Title | Reducing Intra-class Variations of Deformed Iris Recognition System | 356 - 360 |
Authors | Suzwani Ismail, Fakariah Hani Mohd Ali, Syed Ahmad Aljunid |
Article - 56 | Title | Optimized algorithm for Credit Scoring | 361 - 365 |
Authors | Annie Chacko, Dr.A.Antonidoss,Aleena Sebastain |
Article - 57 | Title | Analyzing the College Freshmen Aptitude Results using K-means Algorithm | 366 - 372 |
Authors | Lourdes M. Padirayon, Manny S. Alipio, Freddie P. Masuli, Grecilia A. Callitong, Daniel T. Ursulum |
Article - 58 | Title | A Review of Internet of Things (IoT): Implementations and Challenges | 373 - 376 |
Authors | Azliza Yacob, Zirawani Baharum, NurSukinah Aziz, Noor Suhana Sulaiman, Wan Mohd Amir Fazamin Wan Hamzah |
Article - 59 | Title | Fuzzy Knowledge to Detect Imprecisions in Strategic Decision Making in a Smart Port | 377 - 380 |
Authors | C. Durán, F. Córdova, F. Yanine, E. Carrillo |
Article - 60 | Title | Exploring Mapping and Avoidance Simulation for Mobile Robot | 381 - 387 |
Authors | Mohammad Ikmal Shamin Abdul Rahman, Sofianita Mutalib, Mohamad Amin Mohamad Zambri, Shuzlina Abdul-Rahman |
Article - 61 | Title | Intelligent Farming Of The Future: An Integrated Farming Assistance And Crop Prediction Technique Using Isolation Forest Anomaly Detection | 388 - 394 |
Authors | Aromal Benny, Aswin A, Athena E, Basil Mathew, Dr. Varghese S Chooralil |
Article - 62 | Title | Cyberbullying Campaign Review for New Implementation and Prevention | 395 - 401 |
Authors | A. Amarah, Ghazali Daimin, I. Norhayatie, AiniZuriayati Abdul Kadir, Tmhassan Wnidayu |
Article - 63 | Title | Classifying Violent Elements in Role-Playing Games Based on User Review using Naïve Bayes Technique | 402 - 407 |
Authors | Nursyahirah Tengku Mohamad Hazmiza, Norizan Mat Diah, Nasiroh Omar |
Article - 64 | Title | Philippine Twitter Sentiments during Covid-19 Pandemic using Multinomial Naïve-Bayes | 408 - 412 |
Authors | John Pierre D. Delizo, Mideth B. Abisado, Ma. Ian P. De Los Trinos |
Article - 65 | Title | A Flexible Learning Framework Implementing Asynchronous Course Delivery for Philippine Local Colleges and Universities | 413 - 421 |
Authors | Mideth B. Abisado, Maricris G. Unico, Danny G. Umoso, Filipina E. Manuel, Shalini S. Barroso |
Article - 66 | Title | Network Traffic Profiling Using Data Mining Technique in Campus Environment | 422 - 428 |
Authors | Muhammad Azizi Mohd Ariffin1, Rusmawati Ishak2, Siti Arpah Ahmad3, Zolidah Kasiran4 |
Article - 67 | Title | Human Falling Recognition using Shallow Convolutional Neural Network | 429 - 434 |
Authors | Amirah Syahirah Ali, Zaidah Ibrahim, Zarina Zainol |
Article - 68 | Title | Development and Acceptability of an Industrial Motor Control System Trainer | 435 - 439 |
Authors | Elmer A. Bartolome |
Article - 69 | Title | Web Vulnerability Assessment Tool for Content Management System | 440 - 445 |
Authors | Mohamad Yusof Darus, Mohd Afham Omar, Mohd Farihan Mohamad, Zulhairi Seman, Norkhusahini Awang |
Article - 70 | Title | A New Design of Permutation Function Using Spiral Fibonacci in Block Cipher | 445 - 450 |
Authors | Kamsiah Mohamed, Fakariah Hani Hj. Mohd Ali, Suriyani Ariffin |
Article - 71 | Title | Analysis of Performance of Classification Algorithms in Mushroom Poisonous Detection using Confusion Matrix Analysis | 451- 456 |
Authors | John Heland Jasper C. Ortega, Ace C. Lagman, Lizel Rose Q. Natividad, Emilsa T. Bantug, Michael R. Resureccion, LanzJimuel O. Manalo |
Article - 72 | Title | Securing Network Using Raspberry Pi by Implementing VPN, Pi-Hole, and IPS (VPiSec) | 457- 464 |
Authors | Abidah Mat Taib, Mohammad Fikri Hanif Ishak, Nur Khairani Kamarudin, Mohamad Yusof Darus, Nor Azira Mohd Radzi |
Article - 73 | Title | Blended Agile Approach: A Mobile Application Approach | 465- 469 |
Authors | John Heland Jasper C. Ortega, May Greeze M. de Zosa, Jennifer T. Carpio3,Ace C. Lagman, Emilsa T. Bantug, Michael R. Resureccion |
Article - 74 | Title | SIE-EVD: A Novel Satellite Image Enhancement Technique with Quality Metrices for Effective Visual Display using CBIR | 470- 474 |
Authors | Neetu Manocha, Rajeev Gupta |
Article - 75 | Title | An Analysis of Classification of Breast Cancer Dataset Using J48 Algorithm | 475 - 480 |
Authors | John Heland Jasper C. Ortega, Michael R. Resureccion, Lizel Rose Q. Natividad, Emilsa T. Bantug, Ace C. Lagman, Shinji Robin Lopez |
Article - 76 | Title | Design of E-Data Collecting Tools for Probationers | 481 - 484 |
Authors | Jesusimo L. Dioses Jr , Jose P. Gallena Jr and Jordan L. Mariano |