| Issue | Title | |
| Vol 2 (2002): June [JATM] | Digital Signature for the Security of Electronic Mail Message | Abstract PDF |
| Noor Hayati Hashim, Khairuddin Omar, Md Jan Nordin, Zulkarnain Md Ali | ||
| Vol 11 (2011): December [JITM] | DNA Sequence Design on Single Objective Artificial Immune System | Abstract PDF |
| M. Daman Huri, Mohd Zakree Ahmad Nazri, Azuraliza Abu Bakar, Tribasuki Kurniawan | ||
| Vol 5 (2008): [JITM] | EAP Authentication Mechanism for Ad Hoc Wireless LAN | Abstract PDF |
| M. Agni Catur Bhakti, Azween Abdullah | ||
| Vol 7 (2009): December [JITM] | Electronic Records Management Policy in Public Sector in Malaysia | Abstract PDF |
| Umi Asma’ Mokhtar, Zawiyah Mohammad Yusof | ||
| Vol 6 (2009): June [JITM] | Embedding the PBL Approach in the C2HADAM Multimedia Package: Effectiveness Constructs | Abstract PDF |
| Faaizah Shahbodin, Halimah Badioze Zaman | ||
| Vol 7 (2009): December [JITM] | Endpoint Detection Enhancement for Speaker Dependent Recognition | Abstract PDF |
| Ummu Salmah Mohamad, Siti Mariyam Shamsuddin, Ramlan Mahmud | ||
| Vol 6 (2009): June [JITM] | Evaluating Multimedia Adaptive Courseware Based on Learning Style | Abstract PDF |
| Nor Azan Mat Zin, Halimah Badioze Zaman, Shahrul Azman Mohd Noah | ||
| Vol 1 (2004): [JITM] | Evaluating Users’ Satisfaction for Towards Cluster-based Technology-based Network | Abstract PDF |
| Suhaila Zainudin, Khairuddin Omar, Johari Salim, Aziz Deraman, Hazilah Mohd. Amin | ||
| Vol 2 (2005): [JITM] | Evaluation of Gauss Rules with a Centralised Dynamic Load Balancing Technique in Parallel Computing Systems | Abstract PDF |
| Festus Omonigho Iyuke, Bahari Idrus | ||
| Vol 8 (2010): June [JITM] | Experimenting with Pair Programming in an Introductory Programming Course | Abstract PDF |
| Dalialah Abd. Ghani, Norasiah Mohammad, Zainura Idrus | ||
| Vol 9 (2010): December [JITM] | Factors for Retaining Workers in IT Firms in Malaysia | Abstract PDF |
| Nur Atiqah Abdullah, Norsiah Aminudin, Ahmad Khairy Ahmad Domil, Khairul Akmaliah Adham | ||
| Vol 2 (2005): [JITM] | Faraid Knowledge Representation: An Expansion Survey | Abstract PDF |
| Khairuddin Omar, Siti Norul Huda Sheikh Abdullah, Abdul Razak Hamdan | ||
| Vol 3 (2006): [JITM] | Firm’s Demand on the Information and Communication Technology Industry Workforce in Malaysia | Abstract PDF |
| Nur Atiqah Abdullah, Ahmad Khairy Ahmad Domil, Nik Mutasim Nik Ab Rahman | ||
| Vol 5 (2008): [JITM] | Framework for ICT Strategic Plan Content Determination Methodology for Public Institution of Higher Learning | Abstract PDF |
| Bakhtiar Md Shaari, Abdul Razak Hamdan, Aziz Deraman | ||
| Vol 8 (2010): June [JITM] | From Palace to Cyber Space: The Development of Ghazal Music Digital Library | Abstract PDF |
| Zuraidah Abdullah, Qurratu 'Aini Adibah Ahmad Fazil | ||
| Vol 2 (2002): June [JATM] | FTSM WATCH: A Rule-based Approach for Detecting IP/ETHERNET Address Conflicts and Intrusions | Abstract PDF |
| Azizi Abdullah, Khairuddin Omar | ||
| Vol 11 (2011): December [JITM] | Generating Idea for Product Design Using TRIZ | Abstract PDF |
| Mei Choo Ang, Kok Weng Ng, Farah Hanani Megat Ghazali | ||
| Vol 4 (2007): [JITM] | Generation of Formative Questions in Drill-and-Practice Learning System in Web Environment | Abstract PDF |
| Norazah Yusof, Abdul Razak Hamdan, Abdul Hamid Nasir | ||
| Vol 2 (2005): [JITM] | Gradient Orientation Histogram Reengineering for Detecting the Skewness and Slantiness of Merong Mahawangsa Manuscript | Abstract PDF |
| Mohd Sanusi Azmi, Khairuddin Omar, Azizi Abdullah | ||
| Vol 4 (2007): [JITM] | High Performance Simulation for Brain Tumours Growth Using Parabolic Equation on Heterogeneous Parallel Computer System | Abstract PDF |
| H. S. Pheng, Norma Alias, Norfarizan Mohd Said | ||
| Vol 10 (2011): June [JITM] | ICT Application in Records Management in Malaysia Public Works Department | Abstract PDF |
| Nurul Ulfa Abd Aziz, Zawiyah Mohammad Yusof, Umi Asma’ Mokhtar | ||
| Vol 1 (2004): [JITM] | Implementation of an Electronic Document Management | Abstract PDF |
| Mohd Juzaiddin Ab Aziz | ||
| Vol 10 (2011): June [JITM] | Improvement Anomaly Intrusion Detection using Fuzzy-ART Based on K-means based on SNC Labeling | Abstract PDF |
| Zulaiha Ali Othman, Afaf Muftah Adabashi, Suhaila Zainudin, Saadat M.Alhashmi | ||
| Vol 11 (2011): December [JITM] | Information and Communication Technology Adoption by the Aboriginal Youths in Selangor | Abstract PDF |
| W. A. Amir Zal | ||
| Vol 9 (2010): December [JITM] | Information Policy: Models, Issues and Classifications | Abstract PDF |
| Zawiyah M. Yusof, Mokmin Basri, Nor Azan Mat Zin | ||
| 26 - 50 of 97 Items | << < 1 2 3 4 > >> | |