default search action
Noraini Ibrahim
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j6]Sarah Abdulkarem Alshalif, Norhalina Senan, Faisal Saeed, Wad Ghaban, Noraini Ibrahim, Muhammad Aamir, Wareesa Sharif:
A systematic literature review on meta-heuristic based feature selection techniques for text classification. PeerJ Comput. Sci. 10: e2084 (2024) - 2023
- [j5]Sarah Abdulkarem Alshalif, Norhalina Senan, Faisal Saeed, Wad Ghaban, Noraini Ibrahim, Muhammad Aamir, Wareesa Sharif:
Alternative Relative Discrimination Criterion Feature Ranking Technique for Text Classification. IEEE Access 11: 71739-71755 (2023) - [j4]Muhammad Yaseen, Aida Mustapha, Muhammad Arif Shah, Noraini Ibrahim:
A hybrid technique using minimal spanning tree and analytic hierarchical process to prioritize functional requirements for parallel software development. Requir. Eng. 28(3): 347-376 (2023) - 2021
- [j3]Yasir Ahmad, Wan Mohd Nasir Wan-Kadir, Sadia Husain, Noraini Ibrahim:
An Intuitionistic Fuzzy Based Approach to Resolve Detected Ambiguities in the User Requirements Document. IEEE Access 9: 114547-114563 (2021) - 2015
- [j2]Muhammad Imran Babar, Masitah Ghazali, Dayang N. A. Jawawi, Siti Mariyam Shamsuddin, Noraini Ibrahim:
PHandler: An expert system for a scalable software requirements prioritization process. Knowl. Based Syst. 84: 179-202 (2015) - 2012
- [j1]Radziah Mohamad, M. W. Aziz, Dayang Norhayati Abang Jawawi, Masitah Ghazali, M. Z. Arbaie, Noraini Ibrahim:
Service identification guideline for developing distributed embedded real-time systems. IET Softw. 6(1): 74-82 (2012)
Conference and Workshop Papers
- 2020
- [c12]Zuriyaninatasa Podari, Adila Firdaus Bt Arbain, Noraini Ibrahim, Endah Sudarmilah:
Risk Mitigation Framework for Agile Global Software Development. IRICT 2020: 1233-1246 - 2019
- [c11]Yong Keong Tan, Noraini Ibrahim, Shahliza Abd Halim:
Aedes Entomological Prediction Analytical Dashboard Application for Dengue Outbreak Surveillance. IRICT 2019: 54-65 - [c10]Han Xin Hui, Noraini Ibrahim, Fatin Aliah Phang:
CarbonFree - A Multi-platform Application for Low Carbon Education. IRICT 2019: 1159-1169 - 2018
- [c9]Asmau Usman, Noraini Ibrahim, Ibrahim Anka Salihu:
Test Case Generation from Android Mobile Applications Focusing on Context Events. ICSCA 2018: 25-30 - 2016
- [c8]Sarah Abdulkarem Alshalif, Noraini Ibrahim, Tutut Herawan:
Artificial Neural Network with Hyperbolic Tangent Activation Function to Improve the Accuracy of COCOMO II Model. SCDM 2016: 81-90 - [c7]Noor Fardzilawati Md Nasir, Noraini Ibrahim, Tutut Herawan:
Detection of Redundancy in CFG-Based Test Cases Using Entropy. SCDM 2016: 244-252 - 2011
- [c6]Noraini Ibrahim, Rosziati Ibrahim, Mohd Zainuri Saringat, Dzahar Mansor, Tutut Herawan:
Definition of Consistency Rules between UML Use Case and Activity Diagram. UCMA (2) 2011: 498-508 - 2010
- [c5]Mohd Zainuri Saringat, Rosziati Ibrahim, Noraini Ibrahim, Tutut Herawan:
On Database Normalization Using User Interface Normal Form. ICIC (1) 2010: 571-578 - [c4]Noraini Ibrahim, Rosziati Ibrahim, Mohd Zainuri Saringat, Dzahar Mansor, Tutut Herawan:
On Well-Formedness Rules for UML Use Case Diagram. WISM 2010: 432-439 - 2009
- [c3]Noraini Ibrahim, Wan M. N. Wan-Kadir, Safaai Deris:
Propagating Requirement Change into Software High Level Designs towards Resilient Software Evolution. APSEC 2009: 347-354 - 2008
- [c2]Noraini Ibrahim, Wan M. N. Wan-Kadir, Safaai Deris:
Comparative Evaluation of Change Propagation Approaches towards Resilient Software Evolution. ICSEA 2008: 198-204 - 2007
- [c1]Rosziati Ibrahim, Mohd Zainuri Saringat, Noraini Ibrahim, Noraida Ismail:
An Automatic Tool for Generating Test Cases from the System's Requirements. CIT 2007: 861-866
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint