{"id":1010,"date":"2017-04-05T11:03:06","date_gmt":"2017-04-05T11:03:06","guid":{"rendered":"http:\/\/www.ysrgst.org\/irict2\/?page_id=1010"},"modified":"2018-07-07T03:38:59","modified_gmt":"2018-07-07T03:38:59","slug":"session-schedule","status":"publish","type":"page","link":"https:\/\/irict.co\/?page_id=1010","title":{"rendered":"Session Schedule"},"content":{"rendered":"<h3 style=\"text-align: center;\"><span style=\"color: #000000;\"><strong><span style=\"color: #333399;\">IRICT<\/span> <span style=\"color: #ff9900;\">2018<\/span> Session Schedule<\/strong><\/span><\/h3>\n<table width=\"100%\">\n<tbody>\n<tr>\n<td colspan=\"2\" bgcolor=\" #3973ac\" width=\"100%\">\n<h3><strong><span style=\"color: white;\">Day 1:\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0Monday, 23<sup>rd<\/sup>\u00a0July, 2018<\/span><\/strong><\/h3>\n<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\" bgcolor=\"#ffc266\" width=\"100%\">\n<h5><strong>Parallel Session I<\/strong><\/h5>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" colspan=\"2\" bgcolor=\"#e6e6e6\" width=\"100%\"><strong>Melur Room (Main Hall): 12:00 pm \u2013 1:00 pm <\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>12:00 pm \u2013 12:20 pm<\/strong><\/td>\n<td style=\"text-align: left;\" width=\"81%\"><strong>Deep Belief Network for Molecular Feature Selection in Ligand-Based Virtual Screening<\/strong><\/p>\n<p>Maged Nasser, Naomie Salim, Hentabli Hamza and Faisal Saeed<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>12:20 pm &#8211; 12:40 pm<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>Energy-Efficient Resource Allocation Technique Using Flower Pollination Algorithm for Cloud Datacenters<\/strong><\/p>\n<p style=\"text-align: left;\">Mohammed Joda Usman, Abdul Samad Ismail Abdulsalam Yau Gital Ahmed Aliyu and Tahir Abubakar<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>12:40 pm &#8211; 1:00 pm<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>Schema Proposition Model for NoSQL Applications<\/strong><\/p>\n<p style=\"text-align: left;\">Abdullahi Abubakar Imam, Shuib Basri, Rohiza Ahmad and Mar\u00eda T. Gonz\u00e1lez-Aparicio<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" colspan=\"2\" bgcolor=\"#e6e6e6\" width=\"100%\"><strong>Melati Room 1: 12:00 pm \u2013 1:00 pm <\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>12:00 pm \u2013 12:20 pm<\/strong><\/td>\n<td style=\"text-align: left;\" width=\"81%\"><strong>Computational Analysis of Dynamics in an Agent-based Model of Cognitive Load and Reading Performance<\/strong><\/p>\n<p style=\"text-align: left;\">Hayder M. A. Ghanimi, Azizi Ab Aziz<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>12:20 pm &#8211; 12:40 pm<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>Phishing Hybrid Feature-Based Classifier by Using Recursive Features Subset Selection and Machine Learning Algorithms<\/strong><\/p>\n<p style=\"text-align: left;\">Hiba Zuhair and Ali Selamat<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>12:40 pm &#8211; 1:00 pm<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>A Survey and Future Vision of Double Auctions-based Autonomous Cloud Service Negotiations<\/strong><\/p>\n<p style=\"text-align: left;\">Muhamad Hariz Adnan, Mohd Fadzil Hassan, Izzatdin Abdul Aziz, Nuraini Abdul Rashid<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" colspan=\"2\" bgcolor=\"#e6e6e6\" width=\"100%\"><strong>Melati Room 2: 12:00 pm \u2013 1:00 pm <\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>12:00 pm \u2013 12:20 pm<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>Towards Semantic Interoperability for IoT: Combining Social Tagging Data and Wikipedia to Generate a Domain-Specific Ontology<\/strong><\/p>\n<p style=\"text-align: left;\">Mohammed Alruqimi, Noura Aknin, Tawfik Al-Hadhrami and Anne James-Taylor<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>12:20 pm &#8211; 12:40 pm<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>IoT-Based Smart Waste Management System In A Smart City<\/strong><\/p>\n<p style=\"text-align: left;\">Nibras Abdullah, Ola A. Alwesabi, and Rosni Abdullah<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>12:40 pm &#8211; 1:00 pm<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>Architecture for Latency Reduction in Healthcare Internet-of-Things using Reinforcement Learning and Fuzzy Based Fog Computing<\/strong><\/p>\n<p style=\"text-align: left;\">Saurabh Shukla, Mohd Fadzil Hassan, Low Tan Jung and Azlan Awang<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\" bgcolor=\"#ffc266\" width=\"100%\">\n<h5><strong>Parallel Session II<\/strong><\/h5>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" colspan=\"2\" bgcolor=\"#e6e6e6\" width=\"100%\"><strong>Melur Room (Main Hall): 2:00 pm \u2013 4:20 pm <\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>2:00 pm \u2013 2:200 pm<\/strong><\/td>\n<td style=\"text-align: left;\" width=\"81%\"><strong>Data Mining Techniques for Disease Risk Prediction Model: A Systematic Literature Review<\/strong><\/p>\n<p>Wan Muhamad Taufik Wan Ahmad, Nur Laila Ab Ghani and Sulfeeza Mohd Drus<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>2:200 pm \u2013 2:40 pm<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>Quality Features for Summarizing Text Forum Threads by Selecting Quality Replies<\/strong><\/p>\n<p style=\"text-align: left;\">Akram Osman, Naomie Salim, Faisal Saeed and Ibrahim Abdelhamid<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>2:40 pm \u2013 3:00 pm<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>Modelling and Forecasting Indoor Illumination Time Series Data from Light Pipe System<\/strong><\/p>\n<p style=\"text-align: left;\">Waddah Waheeb, Rozaida Ghazali, Lokman Hakim Ismail and Aslila Abd Kadir<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>3:00 pm &#8211; 3:20 pm<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>A Model for Addressing Quality Issues in Big Data<\/strong><\/p>\n<p style=\"text-align: left;\">Onyeabor Grace Amina and Azman Ta\u2019a<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>3:20 pm &#8211; 3:40 pm<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>Climbing Harmony Search Algorithm For Nurse Rostering Problems<\/strong><\/p>\n<p style=\"text-align: left;\">Mohammed\u00a0Hadwan,\u00a0Masri\u00a0Ayob,\u00a0Mohammed\u00a0Al-Hagery\u00a0and Bassam Naji Al-Tamimi<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>3:40 pm &#8211; 4:00 pm<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>Analyzing Traffic Accident and Casualty Trend Using Data Visualization<\/strong><\/p>\n<p style=\"text-align: left;\">Abdullah Sakib, Saiful Adli Ismail, Haslina Sarkan, Azri Azmi, Othman Mohd Yusop<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>4:00 pm &#8211; 4:20 pm<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>Towards Real-time Customer Satisfaction Prediction Model for Mobile Internet Networks<\/strong><\/p>\n<p style=\"text-align: left;\">Ayisat W. Yusuf-Asaju, Zulkhairi B. Dahalin and Azman Ta\u2019a<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" colspan=\"2\" bgcolor=\"#e6e6e6\" width=\"100%\"><strong>Melati Room 1: 2:00 pm \u2013 4:20 pm <\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>2:00 pm \u2013 2:200 pm<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>Proposing a Comprehensive IS Continuance Model and its Factors<\/strong><\/p>\n<p style=\"text-align: left;\">Mohd Zuhan Mohd Zain, Ab Razak Che Hussin and Nittee Wanichavorapong<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>2:200 pm \u2013 2:40 pm<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>The Interaction of Trust and Social Influence Factors in the Social Commerce Environment<\/strong><\/p>\n<p style=\"text-align: left;\">Hasan Beyari and Ahmad Abareshi<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>2:40 pm \u2013 3:00 pm<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>Social Network Sites (SNS) Utilization in Learning Landscape\u2013 Systematic Literature Review<\/strong><\/p>\n<p style=\"text-align: left;\">Nani Amalina Zulkanain, Suraya Miskon, Norris Syed Abdullah, Nazmona Mat Ali and Mahadi Bahari<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>3:00 pm &#8211; 3:20 pm<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>An Empirical Study of How Social Influence Impact Customer Satisfaction in Social Commerce Sites<\/strong><\/p>\n<p style=\"text-align: left;\">Hasan Beyari and Ahmad Abareshi<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>3:20 pm &#8211; 3:40 pm<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>Searching for Suitable Face of Quality in Crowdsourcing &#8211; A Personality Perspective<\/strong><\/p>\n<p style=\"text-align: left;\">Shakir Karim, Umair Uddin Shaikh and Zaheeruddin Asif<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>3:40 pm &#8211; 4:00 pm<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>The Application of Computational Thinking and TRIZ Methodology in Patent Innovation Analytics<\/strong><\/p>\n<p style=\"text-align: left;\">Zulhasni Abdul Rahim, Shazlinda Md Yusof, Nooh Abu Bakar and Wan Md Syukri Wan Mohamad<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>4:00 pm &#8211; 4:20 pm<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>Determinant Factors of Customer Satisfaction for E-hailing Service: A Preliminary Study<\/strong><\/p>\n<p style=\"text-align: left;\">Nur Athirah Nabila Mohd Idros, Hazura Mohamed and Ruzzakiah Jenal<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" colspan=\"2\" bgcolor=\"#e6e6e6\" width=\"100%\"><strong>Melati Room 2: 2:00 pm \u2013 4:20 pm <\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>2:00 pm \u2013 2:200 pm<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>Enhancement of Text Steganography Technique using LZW Code and Two-letter Word Technique<\/strong><\/p>\n<p style=\"text-align: left;\">Salwa Shakir Baawi, Mohd Rosmadi Mokhtar, and Rossilawati Sulaiman<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>2:200 pm \u2013 2:40 pm<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>Acquiring RFID Tag Asymmetric Key from IOT Cyber Physical Environment<\/strong><\/p>\n<p style=\"text-align: left;\">Muhammad Thariq Abdul Razak, Nurul Azma Abdullah, Nurul Hidayah A. Rahman<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>2:40 pm \u2013 3:00 pm<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>SDN\/NFV Based Moving Target DDoS Defense Mechanism<\/strong><\/p>\n<p style=\"text-align: left;\">Chien-Chang Liu, Bo-Sheng Huang, Chia-Wei Tseng, Yao-Tsung Yang and Li-Der Chou<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>3:00 pm &#8211; 3:20 pm<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>Biometric Based Signature Authentication Scheme for Cloud Healthcare Data Security<\/strong><\/p>\n<p style=\"text-align: left;\">Gunasekar Thangarasu, P.D.D.Dominic, Kayalvizhi Subramanian and Sajitha Smiley<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>3:20 pm &#8211; 3:40 pm<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>Exploiting Dom Mutation for the Detection of Ad Injecting Browser Extension<\/strong><\/p>\n<p style=\"text-align: left;\">Azreen Zaini, Anazida Zainal<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>3:40 pm &#8211; 4:00 pm<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>Security Factors based Evaluation of Verification Algorithm for an IoT Access System<\/strong><\/p>\n<p style=\"text-align: left;\">Abbas M. Al-Ghaili, Hairoladenan Kasim, Marini Othman and Zainuddin Hassan<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>4:00 pm &#8211; 4:20 pm<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>Factors Influencing Information Security Awareness of Phishing Attacks From Bank Customers\u2019 Perspective: A Preliminary Investigation<\/strong><\/p>\n<p style=\"text-align: left;\">Ayman Asfoor, Fiza Abdul Rahim\u00a0 and Salman Yussof<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\" bgcolor=\"#ffc266\" width=\"100%\">\n<h5><strong>Parallel Session III<\/strong><\/h5>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" colspan=\"2\" bgcolor=\"#e6e6e6\" width=\"100%\"><strong>Melur Room (Main Hall): 4:40 pm \u2013 6:00 pm <\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"18%\">\n<p style=\"text-align: left;\"><strong>4:40 pm \u2013 5:00 pm<\/strong><\/p>\n<\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>DWT-CT Image Watermarking Algorithm with Shuffling and Circular Rotation of Bits<\/strong><\/p>\n<p style=\"text-align: left;\">Majdi Al-qdah and Malik Al-qdah<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>5:00 pm &#8211; 5:20 pm<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>Two Stages Haar-Cascad Face Detection with Reduced False Positive<\/strong><\/p>\n<p style=\"text-align: left;\">Abdulaziz Ali Saleh Alashbi<sup>,<\/sup> Mohd Shahrizal Bin Sunar <sup>\u00a0<\/sup>and Qais Ali AL-Nuzaili<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>5:20 pm &#8211; 5:40 pm<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>An Enhanced Context Aware Face Recognition Alert System for People with Hearing Impairment<\/strong><\/p>\n<p style=\"text-align: left;\">Maythem K. Abbas, Bie Tong and Raed Abdulla<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>5:40 pm<\/strong> &#8211; <strong>6:00 pm<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>Spell Checker for Somali Language Using Knuth-Morris-Pratt String Matching Algorithm<\/strong><\/p>\n<p style=\"text-align: left;\">Ali Olow Jimale, Wan Mohd Nazmee Wan Zainon and Lul Farah Abdullahi<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" colspan=\"2\" bgcolor=\"#e6e6e6\" width=\"100%\"><strong>Melati Room 1: 4:40 pm \u2013 6:00 pm <\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"18%\">\n<p style=\"text-align: left;\"><strong>4:40 pm \u2013 5:00 pm<\/strong><\/p>\n<\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>A Systematic Literature Review of Augmented Reality Applications in Libraries<\/strong><\/p>\n<p style=\"text-align: left;\">Rasimah Che Mohd Yusoff, Azhar Osman, \u00a0Sya Azmeela Shariff, Noor Hafizah Hassan, Nilam Nur Amir Sjarif,\u00a0 Roslina Ibrahim, Norziha Megat Zainuddin, Nurazean Maarop<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>5:00 pm &#8211; 5:20 pm<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>The Effect of Demographic Characteristics of Lecturers on Individual and Course Challenges of E-learning Implementation in a Public University in Yemen<\/strong><\/p>\n<p style=\"text-align: left;\">Hanan Aldowah, Irfan Umar and Samar Ghazal<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>5:20 pm &#8211; 5:40 pm<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>Guideline for Organizing Content in Adaptive Learning System<\/strong><\/p>\n<p style=\"text-align: left;\">Halina Dahlan, Ab Razak Che Hussin and Yusuf Sahabi Ali<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>5:40 pm<\/strong> &#8211; <strong>6:00 pm<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>Development and Validation of Instruments for Assessing Researcher\u2019s Participation in e-collaboration<\/strong><\/p>\n<p style=\"text-align: left;\">Jamilah Mahmood, Halina Mohamed Dahlan, Ab Razak Che Hussin and Muhammad Aliif Ahmad<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" colspan=\"2\" bgcolor=\"#e6e6e6\" width=\"100%\"><strong>Melati Room 2: 4:40 pm \u2013 6:00 pm <\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"18%\">\n<p style=\"text-align: left;\"><strong>4:40 pm \u2013 5:00 pm<\/strong><\/p>\n<\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>QoS Based Independent Carrier Scheduling Scheme for Heterogeneous Services In 5G LTE-Advanced Networks<\/strong><\/p>\n<p style=\"text-align: left;\">Haitham S Ben Abdelmula, M. N.Mohd Warip, Ong Bi Lynn, Naimah Yaakob<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>5:00 pm &#8211; 5:20 pm<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>Proposed Mechanism based on Genetic Algorithm to Find the Optimal Multi-hop Path in Wireless Sensor Networks<\/strong><\/p>\n<p style=\"text-align: left;\">Mohammed Al-Shalabi, Mohammed Anbar and Tat-Chee Wan<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>5:20 pm &#8211; 5:40 pm<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>A Survey of Millimeter Wave (mm-wave) Communications for 5G: Channel Measurement Below and Above 6 GHz.<\/strong><\/p>\n<p style=\"text-align: left;\">Ahmed M Al-samman, Marwan Hadri Azmi, Tharek Abd Rahman<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>\u00a0<\/strong><\/p>\n<p><strong>5:40 pm<\/strong> &#8211; <strong>6:00 pm<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>Densification of 5G Wireless Access Network for Urban Area at Taiz City, Yemen<\/strong><\/p>\n<p style=\"text-align: left;\">Redhwan Q. Shaddad, Amer A. Al-Mekhlafi, Haithm M. Al-Gunid, Osama M. Al-Kamali, Hussain A. Al-Thawami, Hussum A. Mohammed, Mohammed A. Abduljalil, Nasher M. Sallam, Saber F. Al-Ariqi, Taha M. Assag<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\" bgcolor=\" #3973ac\" width=\"100%\">\n<h3><strong><span style=\"color: white;\">Day 2:\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Tuesday, 24<sup>th<\/sup>\u00a0July, 2018<\/span><\/strong><\/h3>\n<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\" bgcolor=\"#ffc266\" width=\"100%\">\n<h5><strong>Parallel Session I<\/strong><\/h5>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" colspan=\"2\" bgcolor=\"#e6e6e6\" width=\"100%\"><strong>Melur Room (Main Hall): 8:30 am &#8211; 9:50 am <\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>8:30 am \u2013 8:50 am<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>A Fully Adaptive Image Classification Approach for Industrial Revolution 4.0<\/strong><\/p>\n<p style=\"text-align: left;\">Syed Muslim Jameel, Manzoor Ahmed Hashmani, Hitham Alhussain, Arif Budiman<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>8:50 <\/strong><strong>am &#8211; 9:10 am<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>Success Factors for Business Intelligence Systems Implementation in Higher Education Institutions \u2013 A Review<\/strong><\/p>\n<p style=\"text-align: left;\">Salamatu Musa, Nazmona Binti Mat Ali, Suraya Binti Miskon, Mustapha Abubakar Giro<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>9:10 am &#8211; 9:30 am<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>A Review on Exploiting Social Media Analytics for the Growth of Tourism<\/strong><\/p>\n<p style=\"text-align: left;\">Lim Xiao Yan and Preethi Subramanian<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>9:30 am &#8211; 9:50 am<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>Enterprise Resource Planning and Business Intelligence to enhance Organizational Performance in Private Sector of KSA: A Preliminary Review<\/strong><\/p>\n<p style=\"text-align: left;\">Showaimy Aldossari and Umi Asma Mukhtar<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" colspan=\"2\" bgcolor=\"#e6e6e6\" width=\"100%\"><strong>Melati Room 1: 8:30 am &#8211; 9:50 am <\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>8:30 am \u2013 8:50 am<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>A Systematic Mapping Study on Microservices<\/strong><\/p>\n<p style=\"text-align: left;\">Mohammad Sadegh Hamzehloui, Shamsul Sahibuddin<sup>, <\/sup>Khalil Salah<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>8:50 <\/strong><strong>am &#8211; 9:10 am<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>A Theoretical Framework for Improving Software Project Monitoring Task of Agile Kanban Method<\/strong><\/p>\n<p style=\"text-align: left;\">Hamzah Alaidaros, Mazni Omar, and Rohaida Romli<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>9:10 am &#8211; 9:30 am<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>Non-Functional Ontology Requirements Specifications: Islamic Banking Domain<\/strong><\/p>\n<p style=\"text-align: left;\">Ahmad Shaharudin Abdul Latiff, Haryani Haron and Muthukkaruppan Annamalai<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>9:30 am &#8211; 9:50 am<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>A Proposed Framework using Exploratory Testing to improve Software Quality in SME\u2019s <\/strong><\/p>\n<p style=\"text-align: left;\">Shuib Basri, Dhanapal Durai Dominic, Thangiah Murugan and Malek Ahmad Almomani<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" colspan=\"2\" bgcolor=\"#e6e6e6\" width=\"100%\"><strong>Melati Room 2: 8:30 am &#8211; 9:50 am <\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>8:30 am \u2013 8:50 am<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>RFID Smart Shelf based on Reference Tag Technique<\/strong><\/p>\n<p style=\"text-align: left;\">Wan Nurfatin Faiqa Binti Wan Abdullah, Muhammad Rafie Bin Hj. Mohd. Arshad, Kamal Karkonasasi and Seyed Aliakbar Mousavi<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>8:50 <\/strong><strong>am &#8211; 9:10 am<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>Literature Survey on Enhancement of MOM for Intelligent Cross-platform Communications in Service Oriented Architecture<\/strong><\/p>\n<p style=\"text-align: left;\">Najhan Muhamad Ibrahim and Mohd Fadzil Hassan<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>9:10 am &#8211; 9:30 am<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>Intelligent Offset Time Algorithm for Optical Burst Switching Networks<\/strong><\/p>\n<p style=\"text-align: left;\">Abdulsalam A. Yayah, Abdul Samad Ismail, Tawfik Al-Hadhrami and Yahaya Coulibaly<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>9:30 am &#8211; 9:50 am<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>Planning and Optimization of LTE Radio Access Network for Suburban and Rural Area at Taiz City, Yemen<\/strong><\/p>\n<p style=\"text-align: left;\">Redhwan Q. Shaddad, Nabil Y. Saleh, Aziz A. Mohammed, Zahi A. Saeed, Afif A.\u00a0 Shaif and Samir A Al-Gaialni<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\" bgcolor=\"#ffc266\" width=\"100%\">\n<h5><strong>Parallel Session II<\/strong><\/h5>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" colspan=\"2\" bgcolor=\"#e6e6e6\" width=\"100%\"><strong>Melur Room (Main Hall): 10:20 am &#8211; 1:00 pm <\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>10:20 am \u2013 10:40 am<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>A Proposed Tourism Information Accuracy Assessment (TIAA) Framework<\/strong><\/p>\n<p style=\"text-align: left;\">Sivakumar Pertheban, Ganthan Narayana Samy,\u00a0\u00a0\u00a0Bharanidharan Shanmugam, Sundresan Perumal<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>10:40 am &#8211; 11:00 am<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>Big Data Analytics in the Malaysian Public Sector: The Determinants of Value Creation<\/strong><\/p>\n<p style=\"text-align: left;\">Esmat A. Wahdain, Ahmad Suhaimi Baharudin and Mohammad Nazir Ahmad<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>11:00 am &#8211; 11:20 am<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>Intention to use a Cloud-Based Point of Sale Software among Retailers in Malaysia: The Mediating Effect of Attitude<\/strong><\/p>\n<p style=\"text-align: left;\">Kamal Karkonasasi, Lingam Arusanthran, G.C. Sodhy, Seyed Aliakbar Mousavi, Putra Sumari<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>11:20 am &#8211; 11:40 am<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>Conceptualizing a Model for the Effect of Information Culture on Electronic Commerce Adoption<\/strong><\/p>\n<p style=\"text-align: left;\">Fadi A.T. Herzallah, Mohammed A. Al-Sharafi, Qasim Alajmi, Muriati Mukhtar, Ruzaini Abdullah Arshah and\u00a0 Dirar Eleyan<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>11:40 am &#8211; 12:00 pm <\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>Information Relevance Factors of Argument Quality for E-Commerce Consumer Review<\/strong><\/p>\n<p style=\"text-align: left;\">Nur Syadhila Bt Che Lah, Ab Razak Bin Che Hussin and Halina Bt Mohamed Dahlan<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>12:00 pm &#8211; 12:20 pm <\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>The Determinants of Customer Knowledge Sharing Behavior: A Review Study<\/strong><\/p>\n<p style=\"text-align: left;\">Hasan Sari, Marini Othman, Abbas M. Al-Ghaili<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>12:20 pm &#8211; 12:40 pm<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>Value Innovation in the Malaysian Telecommunications Service Industry: Case Study<\/strong><\/p>\n<p style=\"text-align: left;\">Mohammed A. Hajar, Daing Nasir Ibrahim and Mohammed A. Al-Sharafi<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>12:40 pm &#8211; 1:00 pm<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>A Framework for Electronic Records Management System Adoption in the Higher Professional Education: Individual, Technological and Environmental Factors<\/strong><\/p>\n<p style=\"text-align: left;\">Muaadh Mukred, Zawiyah M. Yusof, Umi Asma\u2019 Mokhtar, Fariza Fauzi<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" colspan=\"2\" bgcolor=\"#e6e6e6\" width=\"100%\"><strong>Melati Room 1: 10:20 am &#8211; 1:00 pm <\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>10:20 am \u2013 10:40 am<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>ESCAPE: Interactive Fire Simulation &amp; Training for Children using Virtual Reality<\/strong><\/p>\n<p style=\"text-align: left;\">Wan Fatimah Wan Ahmad, Aliza Sarlan, Nurfadzira Ahmad Rauf<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>10:40 am &#8211; 11:00 am<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>Self-Reflective Visualizations of Patient-Centered Health Information Systems<\/strong><\/p>\n<p style=\"text-align: left;\">Archanaa Visvalingam, Jaspaljeet Singh Dhillon, Saraswathy Shamini Gunasekaran, Alan Cheah Kah Hoe<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>11:00 am &#8211; 11:20 am<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>Potential Measures to Enhance Information Security Compliance in Healthcare Internet of Things<\/strong><\/p>\n<p style=\"text-align: left;\">Premylla Jeremiah, Ganthan Narayana Samy, Bharanidharan Shanmugam, Kannan Ponkoodalingam and Sundresan Perumal<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>11:20 am &#8211; 11:40 am<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>A Proposed Conceptual Framework for Mobile Health Technology Adoption among Employees at Workplaces in Malaysia<\/strong><\/p>\n<p style=\"text-align: left;\">Hasan Sari, Marini Othman, Abbas M. Al-Ghaili<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"18%\"><strong>\u00a0<\/strong><\/p>\n<p style=\"text-align: left;\"><strong>11:40 am &#8211; 12:00 pm <\/strong><\/p>\n<\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>Problematic of Massively Multiplayer Online Game Addiction in Malaysia<\/strong><\/p>\n<p style=\"text-align: left;\">Muhammad Muhaimin, Norshakirah Aziz, Mazeyanti Ariffin<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>12:00 pm &#8211; 12:20 pm <\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>Exploring Barriers that Affect Telerehabilitation (TeleRehab) Readiness: A Case Study of Rehabilitation Centre in Malaysia<\/strong><\/p>\n<p style=\"text-align: left;\">Tiara Izrinda Jafni, Mahadi Bahari, Waidah Ismail and Muhammad Hafiz Hanafi<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>12:20 pm &#8211; 12:40 pm<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>A Study on Mobile Applications Developed for Children with Autism<\/strong><\/p>\n<p style=\"text-align: left;\">Naziatul Shima Abdul Aziz, Wan Fatimah Wan Ahmad and Ahmad Sobri Hashim<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>12:40 pm &#8211; 1:00 pm<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>Heuristic Evaluation of the Smartphone Applications in Supporting Elderly<\/strong><\/p>\n<p style=\"text-align: left;\">Hasanin Mohammed Salman, Wan Fatimah Wan Ahmad and Suziah Sulaiman<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" colspan=\"2\" bgcolor=\"#e6e6e6\" width=\"100%\"><strong>Melati Room 2: 10:20 am &#8211; 1:00 pm <\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>10:20 am \u2013 10:40 am<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>Novel Risk Assessment Method to Identify Information Security Threats in Cloud Computing Environment<\/strong><\/p>\n<p style=\"text-align: left;\">Ganthan Narayana Samy, Sameer Hasan Albakri, Nurazean Maarop, Pritheega Magalingam, Doris Hooi-Ten Wong, Bharanidharan Shanmugam and Sundresan Perumal<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>10:40 am &#8211; 11:00 am<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>Proposing a New Approach for Securing DHCPv6 Server Against Rogue DHCPv6 Attack in IPv6 Network<\/strong><\/p>\n<p style=\"text-align: left;\">Ayman Al-Ani, Mohammed Anbar, Rosni Abdullah, and Ahmed K. Al-Ani<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>11:00 am &#8211; 11:20 am<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>A Review of Ransomware Families and Detection Methods<\/strong><\/p>\n<p style=\"text-align: left;\">Helen Jose Chittooparambil, Bharanidharan Shanmugam, Sami Azam, Krishnan Kannoorpatti, Mirjam Jonkman and Ganthan Narayana Samy<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>11:20 am &#8211; 11:40 am<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>A Survey on SCADA Security and Honeypot in Industrial Control System<\/strong><\/p>\n<p style=\"text-align: left;\">Kuan-Chu Lu \u00a0and I-Hsien Liu <sup>\u00a0<\/sup>and Meng-Wei Sun\u00a0 and Jung-Shian Li<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>11:40 am &#8211; 12:00 pm <\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>Review on Feature Selection Algorithms for Anomaly-Based Intrusion Detection System<\/strong><\/p>\n<p style=\"text-align: left;\">Taief Alaa Alamiedy, Mohammed Anbar, Ahmed K. Al-Ani, Bassam Naji Al-Tamimi, and Nameer Faleh<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>12:00 pm &#8211; 12:20 pm <\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>Forensic Use Case Analysis of User Input in Windows Application<\/strong><\/p>\n<p style=\"text-align: left;\">Funminiyi Olajide, Tawfik Al-hadrami \u00a0and Anne James-Taylor<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>12:20 pm &#8211; 12:40 pm<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>Digital Investigation and Forensic User Analysis<\/strong><\/p>\n<p style=\"text-align: left;\">Funminiyi Olajide, Tawfik Al-Hadrami and Anne James-Taylor<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>12:40 pm &#8211; 1:00 pm<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>Security in Internet of Things: Issues, Challenges and Solutions<\/strong><\/p>\n<p style=\"text-align: left;\">Hanan Aldowah<sub>,<\/sub> Shafiq Ul Rehman<sub>, <\/sub>and Irfan Umar<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\" bgcolor=\"#ffc266\" width=\"100%\">\n<h5><strong>Parallel Session III<\/strong><\/h5>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" colspan=\"2\" bgcolor=\"#e6e6e6\" width=\"100%\"><strong>Melur Room (Main Hall): 2:00 pm &#8211; 4:20 pm <\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>2:00 pm \u2013 2:20 pm<\/strong><\/td>\n<td style=\"text-align: left;\" width=\"81%\"><strong>Electronic Word of Mouth Engagement Model in Social Commerce<\/strong><\/p>\n<p>Yusuf Sahabi Ali and Ab Razak Che Hussin<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>2:20 pm &#8211; 2:40 pm<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>Social Media for Informal learning Usage in Malaysia: Barriers and Benefits<\/strong><\/p>\n<p style=\"text-align: left;\">Mohmed Y. Mohmed Al-Sabaawi and Halina Mohamed Dahlan<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>2:40 pm &#8211; 3:00 pm<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>Towards the Development of a Citizens\u2019 Trust Model in Using Social Media For e-government Services: The Context of Pakistan<\/strong><\/p>\n<p style=\"text-align: left;\">Sohrab Khan, Nor Zairah Ab. Rahim, Nurazean Maarop<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>3:00 pm &#8211; 3:20 pm<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>The Influence of Social Presence and Trust on Customers\u2019 Loyalty to Social Commerce Websites<\/strong><\/p>\n<p style=\"text-align: left;\">Hilal Alhulail, Martin Dick and Ahmad Abareshi<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>3:20 pm &#8211; 3:40 pm<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>The Influence of Word-of-Mouth on Customer Loyalty to Social Commerce Websites: Trust as a Mediator<\/strong><\/p>\n<p style=\"text-align: left;\">Hilal Alhulail, Martin Dick and Ahmad Abareshi<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>3:40 pm- 4:00 pm<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>Determining Underlying Factors that Influence Online Social Network Usage among Public Sector Employees in the UAE<\/strong><\/p>\n<p style=\"text-align: left;\">Ali Ameen, Hamad Almari, Osama Isaac<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>4:00 pm &#8211; 4:20 pm<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>A Theoretical Framework to Build Trust and Prevent Fake News in Social Media using Blockchain<\/strong><\/p>\n<p style=\"text-align: left;\">Tee Wee Jing and Raja Kumar Murugesan<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" colspan=\"2\" bgcolor=\"#e6e6e6\" width=\"100%\"><strong>Melati Room 1: 2:00 pm &#8211; 4:20 pm <\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>2:00 pm \u2013 2:20 pm<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>Pairwise Test Suite Generation using Adaptive Teaching Learning-based Optimization Algorithm with Remedial Operator<\/strong><\/p>\n<p style=\"text-align: left;\">Fakhrud Din and Kamal Z. Zamli<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>2:20 pm &#8211; 2:40 pm<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>Novel Multi-Swarm Approach for Balancing Exploration and Exploitation in Particle Swarm Optimization<\/strong><\/p>\n<p style=\"text-align: left;\">Sinan Q. Salih , AbdulRahman A. Alsewari, Bellal Al-Khateeb and Mohamad Fadli Zolkipli<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>2:40 pm &#8211; 3:00 pm<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>A Fuzzy Logic-based Cloud Computing Provider\u2019s Evaluation and Recommendation Model<\/strong><\/p>\n<p style=\"text-align: left;\">Mohd Hilmi Hasan, Norshakirah A Aziz, Emelia Akashah P Akhir, Nur Zarith Natasya Mohd Burhan and Razulaimi Razali<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>3:00 pm &#8211; 3:20 pm<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>Self-Adaptive Population Size Strategy Based on Flower Pollination Algorithm for T-way Test Suite Generation<\/strong><\/p>\n<p style=\"text-align: left;\">Abdullah B. Nasser and Kamal Z. Zamli<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>3:20 pm &#8211; 3:40 pm<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>Feature Selection Method Based on Grey Wolf Optimization for Coronary Artery Disease Classification<\/strong><\/p>\n<p style=\"text-align: left;\">Qasem Al-Tashi, Helmi Rais and Said Jadid<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>3:40 pm- 4:00 pm<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>Combined Support Vector Machine and Pattern Matching for Hadith Question Classification System<\/strong><\/p>\n<p style=\"text-align: left;\">Ali Muttaleb Hasan, Taha H. Rassem, M.N. Noorhuzaimi@Karimah<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>\u00a04:00 pm &#8211; 4:20 pm<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>Traffic Bottleneck Reconstruction LIDAR Orthoimages: A RANSAC Algorithm Feature Extraction<\/strong><\/p>\n<p style=\"text-align: left;\">Md. Nazmus Sakib , Md. Ashiqur Rahman<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" colspan=\"2\" bgcolor=\"#e6e6e6\" width=\"100%\"><strong>Melati Room 2: 2:00 pm &#8211; 4:00 pm <\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>2:00 pm \u2013 2:20 pm<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>Data Quality Issues in Big Data: A Review<\/strong><\/p>\n<p style=\"text-align: left;\">Fathi Ibrahim Salih, Saiful Adli Ismail, Mosaab M. Hamed, Othman Mohd Yusop, Azri Azmi, Nurulhuda Firdaus Mohd Azmi<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>2:20 pm &#8211; 2:40 pm<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>Comparative Study of Segmentation and Feature Extraction Method on Finger Movement <\/strong><\/p>\n<p style=\"text-align: left;\">Nurazrin Mohd Esa, Azlan Mohd Zain, Mahadi Bahari, Suhaila Mohd Yusuf<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>2:40 pm &#8211; 3:00 pm<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>Realizing the Value of Big Data in Process Monitoring and Control: Current Issues and Opportunities<\/strong><\/p>\n<p style=\"text-align: left;\">Saddaf Rubab, Syed A. Taqvi, Mohd Fadzil Hassan<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>3:00 pm &#8211; 3:20 pm<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>Comparing the Performance of FCBF, Chi-Square and ReliefF Filter Feature Selection Algorithms in Educational Data Mining<\/strong><\/p>\n<p style=\"text-align: left;\">Maryam Zaffar, Manzoor Ahmed Hashmani, K.S. Savita<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>3:20 pm &#8211; 3:40 pm<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>The Study of Co-occurrences Index\u2019s Keywords for Malaysian\u2019s Publication<\/strong><\/p>\n<p style=\"text-align: left;\">Nurul Mardhiah Azura Md Nadzar, Aryati Bakri, Roliana Ibrahim<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"18%\"><strong>3:40 pm- 4:00 pm<\/strong><\/td>\n<td width=\"81%\">\n<p style=\"text-align: left;\"><strong>Cloud Computing and Internet of Things Integration Systems: A Review<\/strong><\/p>\n<p style=\"text-align: left;\">Ayman Amairah, Bassam Naji Al-tamimi, Mohammed Anbar and Khalid Aloufi<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h5><strong><span style=\"color: #000000;\"><br \/>\nClick <a href=\"https:\/\/irict.co\/wp-content\/uploads\/2018\/07\/IRICT-2018-Paper-Presentation-Schedule.pdf\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #3366ff;\"><em>here<\/em><\/span><\/a> to download the <span style=\"color: #333399;\">IRICT<\/span> <span style=\"color: #ff9900;\">2018<\/span> Session Schedule<\/span><\/strong><\/h5>\n","protected":false},"excerpt":{"rendered":"<p>IRICT 2018 Session Schedule Day 1:\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0Monday, 23rd\u00a0July, 2018 Parallel Session I Melur Room (Main Hall): 12:00 pm \u2013 1:00 pm 12:00 pm \u2013 12:20 pm Deep Belief Network for Molecular Feature Selection in Ligand-Based Virtual Screening Maged Nasser, Naomie Salim, <a href=\"https:\/\/irict.co\/?page_id=1010\" class=\"read-more\">Read More &#8230;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":8,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1010","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/irict.co\/index.php?rest_route=\/wp\/v2\/pages\/1010","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/irict.co\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/irict.co\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/irict.co\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/irict.co\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1010"}],"version-history":[{"count":23,"href":"https:\/\/irict.co\/index.php?rest_route=\/wp\/v2\/pages\/1010\/revisions"}],"predecessor-version":[{"id":1467,"href":"https:\/\/irict.co\/index.php?rest_route=\/wp\/v2\/pages\/1010\/revisions\/1467"}],"wp:attachment":[{"href":"https:\/\/irict.co\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1010"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}