default search action
Ahmad Noraziah
Person information
- affiliation: University Malaysia Pahang
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j17]M. Nazir, Ahmad Noraziah, M. Rahmah:
Students' Performance Prediction in Higher Education Using Multi-Agent Framework-Based Distributed Data Mining Approach: A Review. Int. J. Virtual Pers. Learn. Environ. 13(1): 1-19 (2023) - 2022
- [j16]Julius Beneoluchi Odili, Ahmad Noraziah, Asegunloluwa Eunice Babalola:
A new fitness function for tuning parameters of Peripheral Integral Derivative Controllers. ICT Express 8(3): 463-467 (2022) - 2021
- [j15]Ahmad Noraziah, Ainul Azila Che Fauzi, Sharifah Hafizah Sy Ahmad Ubaidillah, Basem Y. Alkazemi, Julius Beneoluchi Odili:
BVAGQ-AR for Fragmented Database Replication Management. IEEE Access 9: 56168-56177 (2021) - [j14]Julius Beneoluchi Odili, Ahmad Noraziah, M. Zarina:
A Comparative Performance Analysis of Computational Intelligence Techniques to Solve the Asymmetric Travelling Salesman Problem. Comput. Intell. Neurosci. 2021: 6625438:1-6625438:13 (2021)
2010 – 2019
- 2019
- [j13]Muhammad Ahsan Raza, Rahmah Mokhtar, Noraziah Ahmad, Maruf Pasha, Urooj Pasha:
A Taxonomy and Survey of Semantic Approaches for Query Expansion. IEEE Access 7: 17823-17833 (2019) - [j12]Haneen A. Abdulwahab, Ahmad Noraziah, AbdulRahman A. Al-Sewari, Sinan Q. Salih:
An Enhanced Version of Black Hole Algorithm via Levy Flight for Optimization and Data Clustering Problems. IEEE Access 7: 142085-142096 (2019) - [j11]Muhammad Ahsan Raza, Rahmah Mokhtar, Noraziah Ahmad:
A survey of statistical approaches for query expansion. Knowl. Inf. Syst. 61(1): 1-25 (2019) - 2018
- [j10]Ali Safa Sadiq, Basem Y. Alkazemi, Seyedali Mirjalili, Ahmad Noraziah, Suleman Khan, Ihsan Ali, Al-Sakib Khan Pathan, Kayhan Zrar Ghafoor:
An Efficient IDS Using Hybrid Magnetic Swarm Optimization in WANETs. IEEE Access 6: 29041-29053 (2018) - 2016
- [c37]Zailani Abdullah, Amir Ngah, Tutut Herawan, Noraziah Ahmad, Siti Zaharah Mohamad, Abdul Razak Hamdan:
ELP-M2: An Efficient Model for Mining Least Patterns from Data Repository. SCDM 2016: 224-232 - 2015
- [c36]A. Fairuzullah, Ahmad Noraziah, Wan Maseri Binti Wan Mohd, Tutut Herawan:
A New Approach to Secure and Manage Load Balancing of the Distributed Database Using SQL Firewall. DaEng 2015: 3-10 - [c35]A. Fairuzullah, Ahmad Noraziah, Ruzaini Abdullah Arshah, Tutut Herawan:
Optimize Performance Load Balancing Techniques Using Binary Vote Assignment Grid Quorum (BVAGQ): A Systematic Review. DaEng 2015: 31-39 - [c34]Ahmad Noraziah, Ainul Azila Che Fauzi, Wan Maseri Binti Wan Mohd, Tutut Herawan, Zailani Abdullah:
Managing MyGRANTS Fragmented Database Using Binary Vote Assignment Grid Quorum with Association Rule (BVAGQ-AR) Replication Model. DaEng 2015: 41-50 - [c33]Zailani Abdullah, Omer Adam, Tutut Herawan, Ahmad Noraziah, Md. Yazid Mohd. Saman, Abdul Razak Hamdan:
2M-SELAR: A Model for Mining Sequential Least Association Rules. DaEng 2015: 91-99 - [c32]Wan Maseri Binti Wan Mohd, Abul Hashem Beg, Tutut Herawan, Ahmad Noraziah, Haruna Chiroma:
Multi-dimensional K-Means Algorithm for Student Clustering. DaEng 2015: 119-128 - [c31]Ahmad Noraziah, Tutut Herawan, Mohd Tarmizi Abd Rahman, Zailani Abdullah, Balsam A. Mustafa, Mohammed Adam Ibrahim Fakharaldien:
Fault Tolerance Impact on Near Field Communication for Data Storage of Mobile Commerce Technology in Cloud Computing. DaEng 2015: 489-497 - [c30]Khalid Adam, Mohammed Adam Ibrahim Fakharaldien, Jasni Mohamad Zain, Mazlina Abdul Majid, Ahmad Noraziah:
BigData: Issues, Challenges, Technologies and Methods. DaEng 2015: 541-550 - 2014
- [j9]Zailani Abdullah, Tutut Herawan, Ahmad Noraziah, Mustafa Mat Deris:
A Scalable Algorithm for Constructing Frequent Pattern Tree. Int. J. Intell. Inf. Technol. 10(1): 42-56 (2014) - [c29]Zailani Abdullah, Tutut Herawan, Noraziah Ahmad, Rozaida Ghazali, Mustafa Mat Deris:
Mining Indirect Least Association Rule from Students' Examination Datasets. ICCSA (6) 2014: 783-797 - 2013
- [p1]Tutut Herawan, Ahmad Noraziah, Zailani Abdullah, Mustafa Mat Deris, Jemal H. Abawajy:
IPMA: Indirect Patterns Mining Algorithm. Advanced Methods for Computational Collective Intelligence 2013: 187-196 - 2012
- [j8]Nawsher Khan, Noraziah Ahmad, Tutut Herawan, Zakira Inayat:
Cloud Computing: Locally Sub-Clouds instead of Globally One Cloud. Int. J. Cloud Appl. Comput. 2(3): 68-85 (2012) - [j7]Nawsher Khan, Ahmad Noraziah, Elrasheed I. Ismail, Mustafa Mat Deris, Tutut Herawan:
Cloud Computing: Analysis of Various Platforms. Int. J. E Entrepreneurship Innov. 3(2): 51-59 (2012) - [j6]Ho Cheong Lee, Tutut Herawan, Ahmad Noraziah:
Product Design Generation and Decision Making Through Strategic Integration of Evolutionary Grammars and Kano Model. Int. J. Intell. Inf. Technol. 8(3): 32-55 (2012) - [c28]Noriyani Mohd Zin, Ahmad Noraziah, Ainul Azila Che Fauzi, Tutut Herawan:
Replication Techniques in Data Grid Environments. ACIIDS (2) 2012: 549-559 - [c27]Ainul Azila Che Fauzi, Ahmad Noraziah, Tutut Herawan, Noriyani Mohd Zin:
On Cloud Computing Security Issues. ACIIDS (2) 2012: 560-569 - [c26]Tutut Herawan, Ahmad Noraziah, Zailani Abdullah, Mustafa Mat Deris, Jemal H. Abawajy:
EFP-M2: Efficient Model for Mining Frequent Patterns in Transactional Database. ICCCI (2) 2012: 29-38 - [c25]Zailani Abdullah, Tutut Herawan, Ahmad Noraziah, Mustafa Mat Deris:
DFP-Growth: An Efficient Algorithm for Mining Frequent Patterns in Dynamic Database. ICICA (LNCS) 2012: 51-58 - [c24]Nawsher Khan, Ahmad Noraziah, Tutut Herawan:
A Cloud Architecture with an Efficient Scheduling Technique. ICICA (LNCS) 2012: 381-388 - [c23]Nawsher Khan, Ahmad Noraziah, Tutut Herawan, Mustafa Mat Deris:
Cloud Computing: Analysis of Various Services. ICICA (LNCS) 2012: 397-404 - [c22]Ahmad Noraziah, Zailani Abdullah, Tutut Herawan, Mustafa Mat Deris:
Scalable Technique to Discover Items Support from Trie Data Structure. ICICA (LNCS) 2012: 500-507 - [c21]Rabiei Mamat, Tutut Herawan, Ahmad Noraziah, Mustafa Mat Deris:
On Soft Partition Attribute Selection. ICICA (LNCS) 2012: 508-515 - [c20]Ahmad Noraziah, Ainul Azila Che Fauzi, Noriyani Mohd Zin, Tutut Herawan:
Binary Vote Assignment Grid Quorum for Managing Fragmented Database. ICICA (LNCS) 2012: 584-591 - [c19]Ahmad Noraziah, Zailani Abdullah, Tutut Herawan, Mustafa Mat Deris:
WLAR-Viz: Weighted Least Association Rules Visualization. ICICA (LNCS) 2012: 592-599 - [c18]Nawsher Khan, Ahmad Noraziah, Tutut Herawan, Elrasheed I. Ismail, Zakira Inayat:
Cloud Computing: Architecture for Efficient Provision of Services. NBiS 2012: 18-23 - 2011
- [j5]Wan Maseri Binti Wan Mohd, Abul Hashem Beg, Tutut Herawan, Ahmad Noraziah, Khandakar Fazley Rabbi:
Improved Parameterless K-Means: Auto-Generation Centroids and Distance Data Point Clusters. Int. J. Inf. Retr. Res. 1(3): 1-14 (2011) - [c17]Ahmad Noraziah, M. Affendy Omardin, Noriyani Mohd Zin, Roslina Mohd Sidek, Mohd Helmy Abd Wahab, Jiwat Ram:
BUSCLIS for Construction Industry. DEIS 2011: 206-217 - [c16]Ahmad Noraziah, A. S. Ahmad Solihin, Tutut Herawan, Roslina Mohd Sidek, Eyas El-Qawasmeh, Ezendu Ariwa:
Development of Online Fuel Consumption Cost Calculator. DEIS 2011: 218-228 - [c15]Nawsher Khan, Ahmad Noraziah, Mustafa Mat Deris, Elrasheed I. Ismail:
Cloud Computing: Comparison of Various Features. DEIS 2011: 243-254 - [c14]Ainul Azila Che Fauzi, Ahmad Noraziah, Noriyani Mohd Zin:
A Novel Binary Vote Assignment Grid Quorum Algorithm for Distributed Database Fragmentation. DEIS 2011: 339-349 - [c13]Noriyani Mohd Zin, Ahmad Noraziah, Ainul Azila Che Fauzi:
Neighbour Replication on Grid Deadlock Detection Framework. DEIS 2011: 350-357 - [c12]Mohammad F. J. Klaib, Sangeetha Muthuraman, Ahmad Noraziah:
A Parallel Tree Based Strategy for T-Way Combinatorial Interaction Testing. ICSECS (3) 2011: 91-98 - [c11]Roslina Mohd Sidek, Ahmad Noraziah, Mohd Helmy Abd Wahab:
The Preferable Test Documentation Using IEEE 829. ICSECS (3) 2011: 109-118 - [c10]Abul Hashem Beg, Noraziah Ahmad, Ahmed N. Abd Alla, E. I. Sultan, Noriyani Mohd Zin:
Synchronous Replication: Novel Strategy of Software Persistence Layer Supporting Heterogeneous System. ICSECS (2) 2011: 232-243 - [c9]Noraziah Ahmad, Roslina Mohd Sidek, Mohammad F. J. Klaib, Ainul Azila Che Fauzi, Mohd Helmy Abd Wahab, Wan Maseri Binti Wan Mohd:
Preserving Data Replication Consistency through ROWA-MSTS. ICSECS (2) 2011: 244-253 - [i1]Mohd Helmy Abd Wahab, Amirul A. Talib, Herdawatie Abdul Kadir, Ayob Johari, Ahmad Noraziah, Roslina Mohd Sidek, Ariffin Abdul Mutalib:
Smart Cane: Assistive Cane for Visually-impaired People. CoRR abs/1110.5156 (2011) - 2010
- [c8]Noraziah Ahmad, Mohammad Fadel Jamil Klaib, Roslina Mohd Sidek:
Failure Semantic of Neighbour Replication Grid Transaction Model. CIT 2010: 668-673 - [c7]Mohammad F. J. Klaib, Sangeetha Muthuraman, Noraziah Ahmad, Roslina Mohd Sidek:
A Tree Based Strategy for Test Data Generation and Cost Calculation for Uniform and Non-Uniform Parametric Values. CIT 2010: 1376-1383 - [c6]Noraziah Ahmad, Ainul Azila Che Fauzi, Roslina Mohd Sidek, Noriyani Mat Zin, Abul Hashem Beg:
Lowest Data Replication Storage of Binary Vote Assignment Data Grid. NDT (2) 2010: 466-473 - [c5]Noraziah Ahmad, Noriyani Mat Zin, Roslina Mohd Sidek, Mohammad Fadel Jamil Klaib, Mohd Helmy Abd Wahab:
Neighbour Replica Transaction Failure Framework in Data Grid. NDT (2) 2010: 488-495 - [c4]Mohammad F. J. Klaib, Sangeetha Muthuraman, Noraziah Ahmad, Roslina Mohd Sidek:
A Parallel Tree Based Strategy for Test Data Generation and Cost Calculation for Pairwise Combinatorial Interaction Testing. NDT (2) 2010: 509-522 - [c3]Roslina Mohd Sidek, Noraziah Ahmad, Mohammad Fadel Jamil Klaib, Mohd Helmy Abd Wahab:
Expediency Heuristic in University Conference Webpage. NDT (1) 2010: 566-576 - [c2]Mohd Helmy Abd Wahab, Ahmad Al' Hafiz Riman, Herdawatie Abdul Kadir, Rahmat Sanudin, Ayob Johari, Roslina Mohd Sidek, Noraziah Ahmad:
GSM-Based Notification System for Electronic Pigeon Hole. NDT (2) 2010: 619-630
2000 – 2009
- 2009
- [j4]Ahmad Noraziah, Mustafa Mat Deris, Mohd Yazid Saman, R. Norhayati, M. Rabiei, W. N. W. Shuhadah:
Managing transactions on grid-neighbour replication in distributed systems. Int. J. Comput. Math. 86(9): 1624-1633 (2009) - [j3]Ahmad Noraziah, M. N. Noorhuzaimi, S. Junaida:
Smart Electronic Visitor Information Management System with Biometric Verification. J. Digit. Inf. Manag. 7(5): 319-323 (2009) - 2004
- [j2]Mustafa Mat Deris, Noraziah Ahmad, Mohd Yazid Saman, Noraida Ali, Youwei Yuan:
High System Availability Using Neighbor Replication on Grid. IEICE Trans. Inf. Syst. 87-D(7): 1813-1819 (2004) - 2003
- [j1]Mustafa Mat Deris, David J. Evans, Mohd Yazid Saman, Ahmad Noraziah:
Binary vote assignment on a grid for efficient access of replicated data. Int. J. Comput. Math. 80(12): 1489-1498 (2003) - [c1]Mustafa Mat Deris, M. Rabiei, Ahmad Noraziah, H. M. Suzuri:
High Service Reliability for Cluster Server Systems. CLUSTER 2003: 281-288
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-10 20:27 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint