| Two-factor Authentication Smart Entryway using Modified LBPH Algorithm |
| Zakiah Ayop 1, Wan Mohamad Hariz Bin Wan Mohamad Rosdi 2, Looi Wei Hua 3, Syarulnaziah Anawar 1 Nur Fadzilah Othman 1, 1 Universiti Teknikal Malaysia Melaka, Malaysia, 2 ASK Pentest Sdn. Bhd., Malaysia, 3 V6 Technology Sdn Bhd, Malaysia |
| Volume : 16 volume number : 6 pdf |
| Clustering based on Hybridization of Genetic Algorithm and Improved K-Means (GA-IKM) in an IoT Network |
| Moez Elarfaoui and Nadia Ben Azzouna, University of Tunis, Tunisia |
| Volume : 16 volume number : 6 pdf |
| The Mediating Effect of Behavioral Intention in the Relationship between Social Influence and Wireless Technology Usage |
| Kyambadde Abdunool, Mwase Ali, Ssebanenya Muhammad and Saunders Warda, Makerere University Business School, Uganda |
| Volume : 16 volume number : 6 pdf |
| A Monte-Carlo Analysis between a Microscopic Model and a Mesoscopic Model for Vehicular Ad-Hoc Networks |
| Aslinda Hassan 1, Wahidah Md. Shah 1 and Mohammed Saad Talib 2, 1 Universiti Teknikal Malaysia Melaka, Malaysia 2 University of Babylon, Iraq |
| Volume : 16 volume number : 6 pdf |
| Network-centric Optimal Hybrid Sensing Hole Recovery and Self- Healing in IPV6 WSNs |
| Kwadwo Asante 1, Yaw Marfo Missah 2, Frimpong Twum 2 and Michael Asante 2, 1 AA-MUSTED, Ghana, 2 KNUST, Ghana |
| Volume : 16 volume number : 6 pdf |