Nurturing a Thesis to Extract High Quality Journals
Security Analysis using Process Mining
AUDIT ICT - Kenapa ia amat diperlukan sekarang?
Robotics & Artificial Intelligence
Design Science as a Framework for Research in Computing
Maturity and Readiness for Digital Forensic Investigation in Era of Industrial Revolution 4.0
Work Life Balance as a Postgraduate Student
SA Lab Menjuarai : Perkongsian di sebalik rahsia Podac 2019 & Chipta 2020
Pemodelan Data Bisnes : 5 Aturan Mudah
Identifying & Presenting Research Gaps in Artificial Intelligence Research
Introduction to Security Issues in Deep Learning and Its Application
Industrial Talk on Connected and Autonomous Vehicles. My Journey from Malaysia to Finland
Tips on Viva and GOT
How to Publish in High Impact Journals?
Internet of Things as a Service for the Community
Webinar Projek Tahun Akhir Ke Jurnal dan Tutorial Grammarly
Road Map to Research World (series 3) - How to Write an Impact Research Paper?
Road Map to Research World (series 2) - How to Prepare a Research Proposal?
Applying Sumitomo Foundation Grant : Tips & Trick
To see this video please send your application to firstname.lastname@example.org
Road Map to Research World (series 1) - How to start the Research?
How to Write Systematic Literature Review Journal Paper?
Sharing Session with CAITs Alumni - Challenges in Postgraduate Study : Dos & Don’ts
Fakulti Teknologi dan Sains Maklumat, UKM is not liable for any loss or damage caused by the usage of any information obtained from this web site.
The latest technology includes data encryption to protect data and compliance to strict security standards are maintained to prevent unauthorized access.
All electronic storage and personal data transaction are protected and stored using appropriate security technology.
If you choose to make any transaction or send an e-mail which contains personal information, this information may be shared where necessary with other Government agencies so as to serve you in the most efficient and effective manner. An example might be in terms of resolving or addressing complaints that require escalation to other Government agencies.
No personal information will be gathered while you are using this website except for information given via e-mail.
What Happens When I Link to Another Site?