Authors: Mensely Cheah Siow Fhang and Rajashekara Swamy Abstract: Today, with the nature of software assembled from legacy, existing independently produced and autonomous tested systems, it imposes great complexity in…
Authors: Chang Pei Shan, Cheong Hoon Sin, Wong Hon Loon, Seyedvahid Dianat and Sea Cheong Seak Abstract: In this paper, we share experience on mobile application development on iOS…
Authors: Thenmalar Ulanganathan, Ali Ebrahimi, Benjamin Chu Min Xian, Khalil Bouzekri, Rohana Mahmud and Ong Hong Hoe Abstract: Named entity recognition (NER) is a process of recognizing, identifying, and…
Authors: Thong Tong Khin, Badrul Affandy Ahmad, Wang Xiaomei and Kandiah Arichandran Abstract: The Soundex method is the preferred method for duplicate detection process on Malaysian Chinese names. The names are written…
Authors: Nor Izyani Daud, Galoh Rashidah Haron and Siti Suriyati Syd Othman Abstract: Previously, canvas fingerprinting can be used as one of the ways to get to know the identity…