Multimedia University

Displaying 1-32 of 32 results

  • White Papers // Sep 2013

    Multi-View Gait Based Human Identification System with Covariate Analysis

    This paper presents a multi-view gait based human identification system. The system is able to perform well under different walking trajectories and various covariate factors such as apparel, loan carrying and speed of walking. The authors' approach first applies perspective correction to adjust silhouettes from an oblique view to side-view...

    Provided By Multimedia University

  • White Papers // Sep 2013

    Efficient High Dimension Data Clustering using Constraint-Partitioning K-Means Algorithm

    With the ever-increasing size of data, clustering of large dimensional databases poses a demanding task that should satisfy both the requirements of the computation efficiency and result quality. In order to achieve both tasks, clustering of feature space rather than the original data space has received importance among the data...

    Provided By Multimedia University

  • White Papers // May 2013

    Biometric Template Protection Using Watermarking with Hidden Password Encryption

    For quite a few years the biometric recognition techniques have been developed. Here, the authors briefly review some of the known attacks that can be encountered by a biometric system and some corresponding protection techniques. They explicitly focus on threats designed to extract information about the original biometric data of...

    Provided By Multimedia University

  • White Papers // May 2013

    A Dynamic Linkage Clustering using KD-Tree

    Some clustering algorithms calculate connectivity of each data point to its cluster by depending on density reachability. These algorithms can find arbitrarily shaped clusters, but they require parameters that are mostly sensitive to clustering performance. The authors develop a new dynamic linkage clustering algorithm using kd-tree. The proposed algorithm does...

    Provided By Multimedia University

  • White Papers // May 2013

    Enhancements of a Three-Party Password-Based Authenticated Key Exchange Protocol

    To communicate securely over an insecure public network, it is essential that secret keys are exchanged securely. Password-Authenticated Key Exchange (PAKE) protocol allows two parties holding a same memorable password to agree on a common secret value (a session key) over an insecure open network. It also seems more convenient...

    Provided By Multimedia University

  • White Papers // Apr 2013

    The Role of the Cloud Provider to Providing Security in Cloud Computing

    Cloud Computing is a service that delivers different application via the internet to the different users and also reachable from everywhere. Cloud computing same as others technology has challenges, security is main and important challenge for cloud computing. For providing the security in cloud computing can use many mechanisms but...

    Provided By Multimedia University

  • White Papers // Apr 2013

    Factors Influencing Organization Adoption Decision on Cloud Computing

    Cloud computing is a developing field, using by organization that require to computing resource to provide the organizational computing needs. The goal of this research is evaluate the factors that influence on organization decision to adopt the cloud computing in Malaysia. Factors that relate to cloud computing adoption that include:...

    Provided By Multimedia University

  • White Papers // Jan 2013

    Problems of Inheritance at Java Inner Class

    Single inheritance has been widely accepted in the current programming practice to avoid the complication that incurred by multiple inheritance. Single inheritance enhances the reusability of codes and eliminates the confusion of identical methods that possibly defined in two super classes. However, the mechanism of inner class in Java potentially...

    Provided By Multimedia University

  • White Papers // Jan 2013

    Organizational Culture and Its Impact on Creativity in Malaysian SMEs

    Organizations can benefit from establishing and sustaining a culture which supports creativity and human resource practices. Finding the gap between creativity and organizational culture is inevitable for organizations to establish strategies to be a creative organization. Fulfilling this gap needs to identify cultural factors as well as creativity aspects in...

    Provided By Multimedia University

  • White Papers // Jan 2013

    Financial Constraints and Opportunities of Micro Entreprise Entreprenuers: A Theoretical Framework

    This paper is to analyze and present the financial opportunities and constraints faced by the micro enterprise entrepreneurs. In general micro enterprise entrepreneurs face financial difficulties particularly during the start up. A large number of micro enterprises have yet to tap into the funds provided by the banks. Only 13%...

    Provided By Multimedia University

  • White Papers // Jul 2012

    Temporal Data Mining Approaches and Green Design Implementation for Data Center Chillers Management System

    Temporal data mining refers time series data points recorded along with the time which they were observed. Time series is a sequence of data points collected at equal time interval for each point. The authors apply temporal data mining approaches to data center. A data center chillers management system is...

    Provided By Multimedia University

  • White Papers // Jun 2012

    Adoption of Mobile Technology in a Learning Environment

    Current 3G and 4G mobile technologies are beginning to offer ubiquitous access to the internet, thereby changing the people lifestyles. They have become popular among digital natives and penetrated every aspect of their daily lives. 3G mobile technologies have functions equivalent to a computer system and can be extended to...

    Provided By Multimedia University

  • White Papers // Feb 2012

    Weak Keys of the Full MISTY1 Block Cipher for Related-Key Cryptanalysis

    The MISTY1 block cipher has received considerable attention and its security has been thoroughly analyzed since its publication, particularly the European NESSIE project announced that "No weaknesses were found in the selected designs" when making the portfolio of selected cryptographic algorithms including MISTY1. For the very first time, the authors'...

    Provided By Multimedia University

  • White Papers // Dec 2011

    Examining the Relevance of Emotional Intelligence and Organizational Commitment among Employees of Small and Medium Enterprise in Private Sector

    The relevance of emotional intelligence and organizational commitment is tested among 142 employees of Small and Medium Enterprise (SME) in private sector in Iran. The results indicate that there is a significant relationship between emotional intelligence as an overall construct and organizational commitment. Strong and positive influence of self management...

    Provided By Multimedia University

  • White Papers // Oct 2011

    An Adaptive Task-Core Ratio Load Balancing Strategy for Multi-core Processors

    With the proliferation of multi-core processors in servers, desktops, game consoles, mobile phones and a magnitude of other embedded devices; the need to ensure effective utilization of the processing cores becomes essential. This calls for research and development emphasis for a well engineered operating systems load balancer for these multi-core...

    Provided By Multimedia University

  • White Papers // Aug 2011

    Defining Knowledge Management (KM) Activities From Information Communication Technologies (ICTs) Perspective

    Knowledge Management (KM) activities are one of the basic requirements to know for any individual who wishes to implement KM in his/her organizations. The activities are enabled better by Information Communication Technologies (ICTs). However, since the inception of KM, there are a myriad of definitions given for KM activities by...

    Provided By Multimedia University

  • White Papers // Jul 2011

    Integrated Solution Scheme for Handover Latency Diminution in Proxy Mobile IPV6

    Recent trends show that there are swift developments and fast convergence of wireless and mobile communication networks with internet services to provide the quality of ubiquitous access to network users. Most of the wireless networks and mobile cellular networks are moving to be all IP based. These networks are connected...

    Provided By Multimedia University

  • White Papers // Jan 2011

    Similarity Detection in Collaborative Development of Object-Oriented Formal Specifications

    The complexity of today's software systems makes collaborative development necessary to accomplish tasks. Frameworks are necessary to allow developers perform their tasks independently yet collaboratively. Similarity detection is one of the major issues to consider when developing such frameworks. It allows developers to mine existing repositories when developing their own...

    Provided By Multimedia University

  • White Papers // Dec 2010

    Query Optimization Techniques for XML Databases

    Over the past few years, XML (eXtensible Mark-up Language) has emerged as the standard for information representation and data exchange over the Internet. This paper provides a kick-start for new researches venturing in XML databases field. The authors survey the storage representation for XML document, review the XML query processing...

    Provided By Multimedia University

  • White Papers // Dec 2010

    Effective Implementation of Burst Segmentation Techniques in OBS Networks

    Optical Bursts Switching (OBS) is a relatively new optical switching paradigm. Contention and burst loss in OBS networks are major concerns. To resolve contentions, an interesting alternative to discarding the entire data burst is to partially drop the burst. Partial burst dropping is based on burst segmentation concept that its...

    Provided By Multimedia University

  • White Papers // Sep 2010

    Aspect Based Reusable Synchronization Schemes

    Concurrency and synchronization are becoming big issues as every new PC comes with multi-core processors. A major reason for object-oriented programming originally was to enable easier reuse: encode the algorithm into a class and thoroughly debug it, then one can reuse the class again and again. However, when the authors...

    Provided By Multimedia University

  • White Papers // Aug 2010

    Hardware Prototyping of an Efficient Encryption Engine

    An approach to develop the FPGA of a flexible key RSA encryption engine that can be used as a standard device in the secured communication system is presented. The VHDL modeling of this RSA encryption engine has the unique characteristics of supporting multiple key sizes, thus can easily be fit...

    Provided By Multimedia University

  • White Papers // Apr 2010

    Testing of Contextual Role-Based Access Control Model (C-RBAC)

    In order to evaluate the feasibility of the proposed C-RBAC model, the work in this paper presents the prototype implementation of C-RBAC model. The authors use eXtensible Access Control Markup Language (XACML) as a data repository and to represent the extended RBAC entities including purpose and spatial model. The OASIS...

    Provided By Multimedia University

  • White Papers // Apr 2010

    PathF3 - Improving Accuracy and Network Load in Available Bandwidth Estimation Based on SLoPS Methodology

    In this paper, the authors presented the results of a series of available bandwidth experiments conducted in a control environment testbed by using WAN Emulator to represent the actual network. The approaches are classified according to the available bandwidth methodology of Self Loading Periodic Streams (SLoPS). The comparative analysis of...

    Provided By Multimedia University

  • White Papers // Mar 2010

    A Conceptual Framework on Mobile Commerce Acceptance and Usage Among Malaysian Consumers

    The aim of this conceptual paper is to investigate the mobile commerce acceptance among Malaysian consumers. With mobile commerce or m-commerce technology, consumers can use mobile phones, Personal Digital Assistant (PDA) and laptop computers to access the internet, send and receive messages and make transactions at any time from any...

    Provided By Multimedia University

  • White Papers // Feb 2010

    Leadership Styles And Management Techniques

    Leaders of organizations need to lead and manage effectively to succeed. Thus, women entrepreneurs who are becoming more prominent in the business arena, have to be good leaders and managers. This study aims to identify the relationship of leadership styles which are charismatic and transformational and management techniques with organizational...

    Provided By Multimedia University

  • White Papers // Jan 2010

    3D Skull Recognition Using 3D Matching Technique

    Biometrics has become a "Hot" area. Governments are funding research programs focused on biometrics. In this paper the problem of person recognition and verification based on a different biometric application has been addressed. The system is based on the 3DSkull recognition using 3D matching technique, in fact this paper presents...

    Provided By Multimedia University

  • White Papers // Aug 2009

    Adaptive Modulation for OFDM Systems

    The goal for the Fourth Generation (4G) of mobile communications system is to seamlessly integrate a wide variety of communication services such as high-speed data, video and multimedia traffic as well as voice signals. One of the promising approaches to 4G is Adaptive OFDM (AOFDM). In AOFDM, adaptive transmission scheme...

    Provided By Multimedia University

  • White Papers // Jun 2009

    Coverage Strategies for Wireless Sensor Networks

    Coverage is one of the main research interests in Wireless Sensor Networks (WSN), it is used to determine the Quality of Service (QoS) of the networks. Therefore this paper aims to review the common strategies use in solving coverage problem in WSN. The strategies studied are used during deployment phase...

    Provided By Multimedia University

  • White Papers // Dec 2008

    Multimodality to Improve Security and Privacy in Fingerprint Authentication System

    With the pace of increasing online transactions and communication, the demand for security and privacy increases. To protect confidential information and to authenticate people electronically, several solutions already introduced. Traditional biometric systems that are based on single biometric usually suffer from problems like impostors' attack or hacking, unacceptable error rates....

    Provided By Multimedia University

  • White Papers // Oct 2008

    Application of Decision Support System in e-Commerce

    Electronic commerce (EC) has the potential to improve efficiency and productivity in business activities. E-commerce today is no longer technological issue, but is also a business issue. A decision support system (DSS) is "an interactive information system that provides information, models and data manipulation tools to help make decisions in...

    Provided By Multimedia University

  • White Papers // Sep 2008

    The Impact of Information Infrastructure Capabilities on Knowledge Manipulation Skills: A Conceptual Framework

    The globalisation of business, the growing use of Information and Communications Technology (ICT) and, the shift from production-based to knowledge-based economy have given Knowledge Management (KM) a critical position across firms. However, there is limited empirical link between KM and Information Infrastructure Capabilities [IICs]. A key objective of this paper,...

    Provided By Multimedia University

  • White Papers // Jan 2013

    Problems of Inheritance at Java Inner Class

    Single inheritance has been widely accepted in the current programming practice to avoid the complication that incurred by multiple inheritance. Single inheritance enhances the reusability of codes and eliminates the confusion of identical methods that possibly defined in two super classes. However, the mechanism of inner class in Java potentially...

    Provided By Multimedia University

  • White Papers // Apr 2010

    PathF3 - Improving Accuracy and Network Load in Available Bandwidth Estimation Based on SLoPS Methodology

    In this paper, the authors presented the results of a series of available bandwidth experiments conducted in a control environment testbed by using WAN Emulator to represent the actual network. The approaches are classified according to the available bandwidth methodology of Self Loading Periodic Streams (SLoPS). The comparative analysis of...

    Provided By Multimedia University

  • White Papers // Apr 2013

    The Role of the Cloud Provider to Providing Security in Cloud Computing

    Cloud Computing is a service that delivers different application via the internet to the different users and also reachable from everywhere. Cloud computing same as others technology has challenges, security is main and important challenge for cloud computing. For providing the security in cloud computing can use many mechanisms but...

    Provided By Multimedia University

  • White Papers // Jul 2012

    Temporal Data Mining Approaches and Green Design Implementation for Data Center Chillers Management System

    Temporal data mining refers time series data points recorded along with the time which they were observed. Time series is a sequence of data points collected at equal time interval for each point. The authors apply temporal data mining approaches to data center. A data center chillers management system is...

    Provided By Multimedia University

  • White Papers // Feb 2010

    Leadership Styles And Management Techniques

    Leaders of organizations need to lead and manage effectively to succeed. Thus, women entrepreneurs who are becoming more prominent in the business arena, have to be good leaders and managers. This study aims to identify the relationship of leadership styles which are charismatic and transformational and management techniques with organizational...

    Provided By Multimedia University

  • White Papers // Oct 2008

    Application of Decision Support System in e-Commerce

    Electronic commerce (EC) has the potential to improve efficiency and productivity in business activities. E-commerce today is no longer technological issue, but is also a business issue. A decision support system (DSS) is "an interactive information system that provides information, models and data manipulation tools to help make decisions in...

    Provided By Multimedia University

  • White Papers // Mar 2010

    A Conceptual Framework on Mobile Commerce Acceptance and Usage Among Malaysian Consumers

    The aim of this conceptual paper is to investigate the mobile commerce acceptance among Malaysian consumers. With mobile commerce or m-commerce technology, consumers can use mobile phones, Personal Digital Assistant (PDA) and laptop computers to access the internet, send and receive messages and make transactions at any time from any...

    Provided By Multimedia University

  • White Papers // Apr 2010

    Testing of Contextual Role-Based Access Control Model (C-RBAC)

    In order to evaluate the feasibility of the proposed C-RBAC model, the work in this paper presents the prototype implementation of C-RBAC model. The authors use eXtensible Access Control Markup Language (XACML) as a data repository and to represent the extended RBAC entities including purpose and spatial model. The OASIS...

    Provided By Multimedia University

  • White Papers // Jan 2010

    3D Skull Recognition Using 3D Matching Technique

    Biometrics has become a "Hot" area. Governments are funding research programs focused on biometrics. In this paper the problem of person recognition and verification based on a different biometric application has been addressed. The system is based on the 3DSkull recognition using 3D matching technique, in fact this paper presents...

    Provided By Multimedia University

  • White Papers // Dec 2010

    Query Optimization Techniques for XML Databases

    Over the past few years, XML (eXtensible Mark-up Language) has emerged as the standard for information representation and data exchange over the Internet. This paper provides a kick-start for new researches venturing in XML databases field. The authors survey the storage representation for XML document, review the XML query processing...

    Provided By Multimedia University

  • White Papers // Dec 2010

    Effective Implementation of Burst Segmentation Techniques in OBS Networks

    Optical Bursts Switching (OBS) is a relatively new optical switching paradigm. Contention and burst loss in OBS networks are major concerns. To resolve contentions, an interesting alternative to discarding the entire data burst is to partially drop the burst. Partial burst dropping is based on burst segmentation concept that its...

    Provided By Multimedia University

  • White Papers // Jan 2011

    Similarity Detection in Collaborative Development of Object-Oriented Formal Specifications

    The complexity of today's software systems makes collaborative development necessary to accomplish tasks. Frameworks are necessary to allow developers perform their tasks independently yet collaboratively. Similarity detection is one of the major issues to consider when developing such frameworks. It allows developers to mine existing repositories when developing their own...

    Provided By Multimedia University

  • White Papers // Jun 2009

    Coverage Strategies for Wireless Sensor Networks

    Coverage is one of the main research interests in Wireless Sensor Networks (WSN), it is used to determine the Quality of Service (QoS) of the networks. Therefore this paper aims to review the common strategies use in solving coverage problem in WSN. The strategies studied are used during deployment phase...

    Provided By Multimedia University

  • White Papers // Aug 2010

    Hardware Prototyping of an Efficient Encryption Engine

    An approach to develop the FPGA of a flexible key RSA encryption engine that can be used as a standard device in the secured communication system is presented. The VHDL modeling of this RSA encryption engine has the unique characteristics of supporting multiple key sizes, thus can easily be fit...

    Provided By Multimedia University

  • White Papers // Sep 2010

    Aspect Based Reusable Synchronization Schemes

    Concurrency and synchronization are becoming big issues as every new PC comes with multi-core processors. A major reason for object-oriented programming originally was to enable easier reuse: encode the algorithm into a class and thoroughly debug it, then one can reuse the class again and again. However, when the authors...

    Provided By Multimedia University

  • White Papers // Aug 2009

    Adaptive Modulation for OFDM Systems

    The goal for the Fourth Generation (4G) of mobile communications system is to seamlessly integrate a wide variety of communication services such as high-speed data, video and multimedia traffic as well as voice signals. One of the promising approaches to 4G is Adaptive OFDM (AOFDM). In AOFDM, adaptive transmission scheme...

    Provided By Multimedia University

  • White Papers // Jul 2011

    Integrated Solution Scheme for Handover Latency Diminution in Proxy Mobile IPV6

    Recent trends show that there are swift developments and fast convergence of wireless and mobile communication networks with internet services to provide the quality of ubiquitous access to network users. Most of the wireless networks and mobile cellular networks are moving to be all IP based. These networks are connected...

    Provided By Multimedia University

  • White Papers // Feb 2012

    Weak Keys of the Full MISTY1 Block Cipher for Related-Key Cryptanalysis

    The MISTY1 block cipher has received considerable attention and its security has been thoroughly analyzed since its publication, particularly the European NESSIE project announced that "No weaknesses were found in the selected designs" when making the portfolio of selected cryptographic algorithms including MISTY1. For the very first time, the authors'...

    Provided By Multimedia University

  • White Papers // Jun 2012

    Adoption of Mobile Technology in a Learning Environment

    Current 3G and 4G mobile technologies are beginning to offer ubiquitous access to the internet, thereby changing the people lifestyles. They have become popular among digital natives and penetrated every aspect of their daily lives. 3G mobile technologies have functions equivalent to a computer system and can be extended to...

    Provided By Multimedia University

  • White Papers // Jan 2013

    Organizational Culture and Its Impact on Creativity in Malaysian SMEs

    Organizations can benefit from establishing and sustaining a culture which supports creativity and human resource practices. Finding the gap between creativity and organizational culture is inevitable for organizations to establish strategies to be a creative organization. Fulfilling this gap needs to identify cultural factors as well as creativity aspects in...

    Provided By Multimedia University

  • White Papers // Jan 2013

    Financial Constraints and Opportunities of Micro Entreprise Entreprenuers: A Theoretical Framework

    This paper is to analyze and present the financial opportunities and constraints faced by the micro enterprise entrepreneurs. In general micro enterprise entrepreneurs face financial difficulties particularly during the start up. A large number of micro enterprises have yet to tap into the funds provided by the banks. Only 13%...

    Provided By Multimedia University

  • White Papers // Apr 2013

    Factors Influencing Organization Adoption Decision on Cloud Computing

    Cloud computing is a developing field, using by organization that require to computing resource to provide the organizational computing needs. The goal of this research is evaluate the factors that influence on organization decision to adopt the cloud computing in Malaysia. Factors that relate to cloud computing adoption that include:...

    Provided By Multimedia University

  • White Papers // Aug 2011

    Defining Knowledge Management (KM) Activities From Information Communication Technologies (ICTs) Perspective

    Knowledge Management (KM) activities are one of the basic requirements to know for any individual who wishes to implement KM in his/her organizations. The activities are enabled better by Information Communication Technologies (ICTs). However, since the inception of KM, there are a myriad of definitions given for KM activities by...

    Provided By Multimedia University

  • White Papers // Sep 2008

    The Impact of Information Infrastructure Capabilities on Knowledge Manipulation Skills: A Conceptual Framework

    The globalisation of business, the growing use of Information and Communications Technology (ICT) and, the shift from production-based to knowledge-based economy have given Knowledge Management (KM) a critical position across firms. However, there is limited empirical link between KM and Information Infrastructure Capabilities [IICs]. A key objective of this paper,...

    Provided By Multimedia University

  • White Papers // Sep 2013

    Multi-View Gait Based Human Identification System with Covariate Analysis

    This paper presents a multi-view gait based human identification system. The system is able to perform well under different walking trajectories and various covariate factors such as apparel, loan carrying and speed of walking. The authors' approach first applies perspective correction to adjust silhouettes from an oblique view to side-view...

    Provided By Multimedia University

  • White Papers // Sep 2013

    Efficient High Dimension Data Clustering using Constraint-Partitioning K-Means Algorithm

    With the ever-increasing size of data, clustering of large dimensional databases poses a demanding task that should satisfy both the requirements of the computation efficiency and result quality. In order to achieve both tasks, clustering of feature space rather than the original data space has received importance among the data...

    Provided By Multimedia University

  • White Papers // May 2013

    A Dynamic Linkage Clustering using KD-Tree

    Some clustering algorithms calculate connectivity of each data point to its cluster by depending on density reachability. These algorithms can find arbitrarily shaped clusters, but they require parameters that are mostly sensitive to clustering performance. The authors develop a new dynamic linkage clustering algorithm using kd-tree. The proposed algorithm does...

    Provided By Multimedia University

  • White Papers // May 2013

    Enhancements of a Three-Party Password-Based Authenticated Key Exchange Protocol

    To communicate securely over an insecure public network, it is essential that secret keys are exchanged securely. Password-Authenticated Key Exchange (PAKE) protocol allows two parties holding a same memorable password to agree on a common secret value (a session key) over an insecure open network. It also seems more convenient...

    Provided By Multimedia University

  • White Papers // Dec 2008

    Multimodality to Improve Security and Privacy in Fingerprint Authentication System

    With the pace of increasing online transactions and communication, the demand for security and privacy increases. To protect confidential information and to authenticate people electronically, several solutions already introduced. Traditional biometric systems that are based on single biometric usually suffer from problems like impostors' attack or hacking, unacceptable error rates....

    Provided By Multimedia University

  • White Papers // May 2013

    Biometric Template Protection Using Watermarking with Hidden Password Encryption

    For quite a few years the biometric recognition techniques have been developed. Here, the authors briefly review some of the known attacks that can be encountered by a biometric system and some corresponding protection techniques. They explicitly focus on threats designed to extract information about the original biometric data of...

    Provided By Multimedia University

  • White Papers // Dec 2011

    Examining the Relevance of Emotional Intelligence and Organizational Commitment among Employees of Small and Medium Enterprise in Private Sector

    The relevance of emotional intelligence and organizational commitment is tested among 142 employees of Small and Medium Enterprise (SME) in private sector in Iran. The results indicate that there is a significant relationship between emotional intelligence as an overall construct and organizational commitment. Strong and positive influence of self management...

    Provided By Multimedia University

  • White Papers // Oct 2011

    An Adaptive Task-Core Ratio Load Balancing Strategy for Multi-core Processors

    With the proliferation of multi-core processors in servers, desktops, game consoles, mobile phones and a magnitude of other embedded devices; the need to ensure effective utilization of the processing cores becomes essential. This calls for research and development emphasis for a well engineered operating systems load balancer for these multi-core...

    Provided By Multimedia University