Universiti Malaysia Terengganu

Displaying 1-8 of 8 results

  • White Papers // Nov 2012

    Securing Video Streaming Over Internet Protocol Version 6(IPv6)

    The worth of a video can never be ignored in this age of Internet. With streaming, the file can be watching as soon as it begins downloading by end user. However, many raise awareness of security threats and vulnerabilities that exit all around the Internet, thus security becomes a key...

    Provided By Universiti Malaysia Terengganu

  • White Papers // Sep 2012

    Secure Model for Virtualization Layer in Cloud Infrastructure

    Cloud security is one of the buzz words in cloud computing. Since virtualization is the fundamental of the cloud computing, needs to study it more deeply to avoid attacks and system failure. In this research is focused on virtualization vulnerabilities. In addition it is attempted to propose a model to...

    Provided By Universiti Malaysia Terengganu

  • White Papers // Aug 2012

    Performance of Subcarrier- OCDMA System with Complementary Subtraction Detection Technique

    A subcarrier - spectral amplitude coding optical code division multiple access system using the Khazani-Syed code with Complementary subtraction detection technique is proposed. The proposed system has been analyzed by taking into account the effects of phase-induced intensity noise, shot noise, thermal noise and inter-modulation distortion noise. The performance of...

    Provided By Universiti Malaysia Terengganu

  • White Papers // Jul 2012

    A Cloud-Based Intrusion Detection Service Framework

    Intrusion Detection System (IDS) have become increasingly popular over the past years as an important network security technology to detect cyber attacks in a wide variety of network communication. IDS monitors' network or host system activities by collecting network information, and analyze this information for malicious activities. Cloud computing, with...

    Provided By Universiti Malaysia Terengganu

  • White Papers // Feb 2012

    Strategies for Successful Information Technology Adoption in Small and Medium-sized Enterprises

    Information Technology (IT) adoption is an important field of study in a number of areas, which include Small and Medium-sized Enterprises (SMEs). Due to the numerous advantages of IT, SMEs are trying to adopt IT applications to support their businesses. IT adoption by SMEs differs from larger organizations because of...

    Provided By Universiti Malaysia Terengganu

  • White Papers // Dec 2011

    Security Features of an Asymmetric Cryptosystem Based on the Diophantine Equation Hard Problem

    A proper implementation of DEHP would render an attacker to search for private parameters amongst the exponentially many solutions. However, an improper implementation would provide an attacker exponentially many choices to solve the DEHP. The AA -cryptosystem is an asymmetric cryptographic scheme that utilizes this concept together with the factorization...

    Provided By Universiti Malaysia Terengganu

  • White Papers // May 2011

    Developing Dynamic Virtual Environments Using Hierarchical, Tree-Structured Approach

    Virtual Reality (VR) has been utilized in various applications such as in architecture, medicine, advertisement, business, entertainment, and education. In the world of simulation, VR software allows users to visualize, manipulate and interact with the computers and complex data. However, developing VR environments is costly and expensive. Highly-technical persons are...

    Provided By Universiti Malaysia Terengganu

  • White Papers // Oct 2009

    Distributed Object Medical Imaging Model

    Digital medical informatics and images are commonly used in hospitals today. Because of the interrelatedness of the radiology department and other departments, especially the intensive care unit and emergency department, the transmission and sharing of medical images has become a critical issue. The research group has developed a Java-based Distributed...

    Provided By Universiti Malaysia Terengganu

  • White Papers // Aug 2012

    Performance of Subcarrier- OCDMA System with Complementary Subtraction Detection Technique

    A subcarrier - spectral amplitude coding optical code division multiple access system using the Khazani-Syed code with Complementary subtraction detection technique is proposed. The proposed system has been analyzed by taking into account the effects of phase-induced intensity noise, shot noise, thermal noise and inter-modulation distortion noise. The performance of...

    Provided By Universiti Malaysia Terengganu

  • White Papers // Sep 2012

    Secure Model for Virtualization Layer in Cloud Infrastructure

    Cloud security is one of the buzz words in cloud computing. Since virtualization is the fundamental of the cloud computing, needs to study it more deeply to avoid attacks and system failure. In this research is focused on virtualization vulnerabilities. In addition it is attempted to propose a model to...

    Provided By Universiti Malaysia Terengganu

  • White Papers // Feb 2012

    Strategies for Successful Information Technology Adoption in Small and Medium-sized Enterprises

    Information Technology (IT) adoption is an important field of study in a number of areas, which include Small and Medium-sized Enterprises (SMEs). Due to the numerous advantages of IT, SMEs are trying to adopt IT applications to support their businesses. IT adoption by SMEs differs from larger organizations because of...

    Provided By Universiti Malaysia Terengganu

  • White Papers // Jul 2012

    A Cloud-Based Intrusion Detection Service Framework

    Intrusion Detection System (IDS) have become increasingly popular over the past years as an important network security technology to detect cyber attacks in a wide variety of network communication. IDS monitors' network or host system activities by collecting network information, and analyze this information for malicious activities. Cloud computing, with...

    Provided By Universiti Malaysia Terengganu

  • White Papers // Oct 2009

    Distributed Object Medical Imaging Model

    Digital medical informatics and images are commonly used in hospitals today. Because of the interrelatedness of the radiology department and other departments, especially the intensive care unit and emergency department, the transmission and sharing of medical images has become a critical issue. The research group has developed a Java-based Distributed...

    Provided By Universiti Malaysia Terengganu

  • White Papers // May 2011

    Developing Dynamic Virtual Environments Using Hierarchical, Tree-Structured Approach

    Virtual Reality (VR) has been utilized in various applications such as in architecture, medicine, advertisement, business, entertainment, and education. In the world of simulation, VR software allows users to visualize, manipulate and interact with the computers and complex data. However, developing VR environments is costly and expensive. Highly-technical persons are...

    Provided By Universiti Malaysia Terengganu

  • White Papers // Dec 2011

    Security Features of an Asymmetric Cryptosystem Based on the Diophantine Equation Hard Problem

    A proper implementation of DEHP would render an attacker to search for private parameters amongst the exponentially many solutions. However, an improper implementation would provide an attacker exponentially many choices to solve the DEHP. The AA -cryptosystem is an asymmetric cryptographic scheme that utilizes this concept together with the factorization...

    Provided By Universiti Malaysia Terengganu

  • White Papers // Nov 2012

    Securing Video Streaming Over Internet Protocol Version 6(IPv6)

    The worth of a video can never be ignored in this age of Internet. With streaming, the file can be watching as soon as it begins downloading by end user. However, many raise awareness of security threats and vulnerabilities that exit all around the Internet, thus security becomes a key...

    Provided By Universiti Malaysia Terengganu