Universiti Sains Islam Malaysia

Displaying 1-16 of 16 results

  • White Papers // Nov 2013

    An Improved Version of the Visual Digital Signature Scheme

    The issue of authenticity in data transfer is very important in many communications. In this paper, the authors propose an improved version of the visual digital signature scheme with enhanced security. The improvement was made based on Yang's non-expansion visual cryptography technique and Boolean operations. The security of the improved...

    Provided By Universiti Sains Islam Malaysia

  • White Papers // Aug 2013

    Provably Lightweight RFID Mutual Authentication Protocol

    Simplest-Lightweight Authentication Protocol (SLAP) is one of the recent mutual authentication protocols for lightweight RFID environment. However, server impersonation attack can be launched on the aforementioned protocol. The main goal of this paper is to comprehensively verify the security weakness of SLAP. This paper also propose an alternative mutual authentication...

    Provided By Universiti Sains Islam Malaysia

  • White Papers // Apr 2013

    Optimized Quality of Service for Real-Time Wireless Sensor Networks Using a Partitioning Multipath Routing Approach

    Multimedia sensor networks for real-time applications have strict constraints on delay, packet loss, and energy consumption requirements. For example, video streaming in a disaster-management scenario requires careful handling to ensure that the end-to-end delay is within the acceptable range and the video is received properly without any distortion. The failure...

    Provided By Universiti Sains Islam Malaysia

  • White Papers // Jun 2012

    A New Security Mechanism for Vehicular Communication Networks

    Vehicular communication networks are a promising and emerging technology to facilitate road safety, Safety of life, traffic management, and infotainment dissemination for drivers and passengers. One of the ultimate goals in the design of such networking is to resist various malicious abuses and security attacks. In this paper, new security...

    Provided By Universiti Sains Islam Malaysia

  • White Papers // Feb 2012

    A Study on Implication of Adopting E-Business Technology by SMEs

    Electronic business (E-business) is an important strategic tool that attracts many companies in turning their traditional business strategy to e-business. Now-a-days, adoption of e-business is rapidly growing among business organization throughout the world. Organizations involved in e-business not only limited to large companies but also includes Small and Medium Enterprises...

    Provided By Universiti Sains Islam Malaysia

  • White Papers // Dec 2011

    Local Convexity Shape-Preserving Data Visualization by Spline Function

    In this paper, the authors explain about the visualization of convex data that results in a smooth, pleasant, and interactive convexity-preserving curve. The rational cubic function with three free parameters is constructed to preserve the shape of convex data. The free parameters are arranged in a way that two of...

    Provided By Universiti Sains Islam Malaysia

  • White Papers // Jul 2011

    A Novel Header Matching Algorithm for Intrusion Detection Systems

    In this paper, the authors proposed a novel algorithm to detect the intruders, who's trying to gain access to the network using the packets header parameters such as; source/destination address, source/destination port, and protocol without the need to inspect each packet content looking for signatures/patterns. However, the \"Packet Header Matching\"...

    Provided By Universiti Sains Islam Malaysia

  • White Papers // Mar 2011

    A Review of Customer Relationship Management System Benefits and Implementation in Small and Medium Enterprises

    Customer Relationship Management (CRM) systems are very common in large companies. However, CRM systems are not very common in Small and Medium sized Enterprises (SMEs). Most SMEs do not implement CRM systems due to several reasons, such as lack of knowledge about CRM or lack of resources or expertise to...

    Provided By Universiti Sains Islam Malaysia

  • White Papers // Mar 2011

    Effect of Entrepreneur and Firm Characteristics on the Business Success of Small and Medium Enterprises (SMEs) in Bangladesh

    This paper examines the effect of characteristics of entrepreneur and characteristics of the firm on the business success of Small and Medium Enterprises in Bangladesh. The study is based on survey methodology through a questionnaire administered on the owners and employees of small firms. Data are analyzed using Statistical Package...

    Provided By Universiti Sains Islam Malaysia

  • White Papers // Aug 2010

    Putting Sustainability at the Core of Knowledge Management Performance Evaluation System

    With the transformation of managerial views and the increasing focus on knowledge and intellectual capitals as the most important resources to the organizations, the necessity for retaining these resources and monitoring their effectiveness in order to know how they are utilized becomes significant. As for the universities, this requirement is...

    Provided By Universiti Sains Islam Malaysia

  • White Papers // Aug 2010

    Performance Comparison of Wavelet Packet Transform (WPT) and FFTOFDM System Based on QAM Modulation Parameters in Fading Channels

    Orthogonal Frequency Division Multiplexing (OFDM) has been widely adopted in many applications due to its good spectral performance and low sensitivity to impulse noise and multipath channels. It has been widely adopted and standardized in many applications today. It is well known in OFDM that a Cyclic Prefix (CP) is...

    Provided By Universiti Sains Islam Malaysia

  • White Papers // May 2010

    Implementation of WIMAX IEEE802.16d Baseband Transceiver on Multi-Core Software-Defined Radio Platform

    IEEE 802.16d was developed for WIMAX wireless communication, which is based on Orthogonal Frequency Division Multiplexing (OFDM) technology, to enable advancement towards 4G The last decade have seen growing importance place on research in wireless communication system. A recent surge of research on WIMAX has given them opportunities and challenges....

    Provided By Universiti Sains Islam Malaysia

  • White Papers // Jun 2009

    A Survey of Botnet and Botnet Detection

    Among the various forms of malware, botnets are emerging as the most serious threat against cyber-security as they provide a distributed platform for several illegal activities such as launching distributed denial of service attacks against critical targets, malware dissemination, phishing, and click fraud. The defining characteristic of botnets is the...

    Provided By Universiti Sains Islam Malaysia

  • White Papers // May 2009

    Technology Adoption among Small and Medium Enterprises (SME's): A Research Agenda

    In this paper, the authors present the research agenda that has been proposed to develop an integrated model to explain technology adoption of SMEs in Malaysia. SMEs form over 90% of all business entities in Malaysia and they have been contributing to the development of the nation. Technology adoption has...

    Provided By Universiti Sains Islam Malaysia

  • White Papers // Mar 2009

    Digital Steganalysis: Computational Intelligence Approach

    Over the last decade, one of the most significant current discussions in computer science is the field of information security. In general, information security is the techniques, policies and strategies used to protect and secure computer systems, in maintaining the operations of an organization. In this paper, the authors present...

    Provided By Universiti Sains Islam Malaysia

  • White Papers // Jul 2006

    Resistance to Change and ERP Implementation Success: The Moderating Role of Change Management Initiatives

    Enterprise Resource Planning (ERP) is a useful tool that builds strong capabilities, improves performance, supports better decision making, and provides competitive advantage for businesses. ERP aims to help the management by setting better business practices and equipping them with the right information to take timely decision. In any new technology...

    Provided By Universiti Sains Islam Malaysia

  • White Papers // Jun 2012

    A New Security Mechanism for Vehicular Communication Networks

    Vehicular communication networks are a promising and emerging technology to facilitate road safety, Safety of life, traffic management, and infotainment dissemination for drivers and passengers. One of the ultimate goals in the design of such networking is to resist various malicious abuses and security attacks. In this paper, new security...

    Provided By Universiti Sains Islam Malaysia

  • White Papers // May 2010

    Implementation of WIMAX IEEE802.16d Baseband Transceiver on Multi-Core Software-Defined Radio Platform

    IEEE 802.16d was developed for WIMAX wireless communication, which is based on Orthogonal Frequency Division Multiplexing (OFDM) technology, to enable advancement towards 4G The last decade have seen growing importance place on research in wireless communication system. A recent surge of research on WIMAX has given them opportunities and challenges....

    Provided By Universiti Sains Islam Malaysia

  • White Papers // Aug 2010

    Performance Comparison of Wavelet Packet Transform (WPT) and FFTOFDM System Based on QAM Modulation Parameters in Fading Channels

    Orthogonal Frequency Division Multiplexing (OFDM) has been widely adopted in many applications due to its good spectral performance and low sensitivity to impulse noise and multipath channels. It has been widely adopted and standardized in many applications today. It is well known in OFDM that a Cyclic Prefix (CP) is...

    Provided By Universiti Sains Islam Malaysia

  • White Papers // Mar 2009

    Digital Steganalysis: Computational Intelligence Approach

    Over the last decade, one of the most significant current discussions in computer science is the field of information security. In general, information security is the techniques, policies and strategies used to protect and secure computer systems, in maintaining the operations of an organization. In this paper, the authors present...

    Provided By Universiti Sains Islam Malaysia

  • White Papers // Apr 2013

    Optimized Quality of Service for Real-Time Wireless Sensor Networks Using a Partitioning Multipath Routing Approach

    Multimedia sensor networks for real-time applications have strict constraints on delay, packet loss, and energy consumption requirements. For example, video streaming in a disaster-management scenario requires careful handling to ensure that the end-to-end delay is within the acceptable range and the video is received properly without any distortion. The failure...

    Provided By Universiti Sains Islam Malaysia

  • White Papers // May 2009

    Technology Adoption among Small and Medium Enterprises (SME's): A Research Agenda

    In this paper, the authors present the research agenda that has been proposed to develop an integrated model to explain technology adoption of SMEs in Malaysia. SMEs form over 90% of all business entities in Malaysia and they have been contributing to the development of the nation. Technology adoption has...

    Provided By Universiti Sains Islam Malaysia

  • White Papers // Feb 2012

    A Study on Implication of Adopting E-Business Technology by SMEs

    Electronic business (E-business) is an important strategic tool that attracts many companies in turning their traditional business strategy to e-business. Now-a-days, adoption of e-business is rapidly growing among business organization throughout the world. Organizations involved in e-business not only limited to large companies but also includes Small and Medium Enterprises...

    Provided By Universiti Sains Islam Malaysia

  • White Papers // Mar 2011

    A Review of Customer Relationship Management System Benefits and Implementation in Small and Medium Enterprises

    Customer Relationship Management (CRM) systems are very common in large companies. However, CRM systems are not very common in Small and Medium sized Enterprises (SMEs). Most SMEs do not implement CRM systems due to several reasons, such as lack of knowledge about CRM or lack of resources or expertise to...

    Provided By Universiti Sains Islam Malaysia

  • White Papers // Mar 2011

    Effect of Entrepreneur and Firm Characteristics on the Business Success of Small and Medium Enterprises (SMEs) in Bangladesh

    This paper examines the effect of characteristics of entrepreneur and characteristics of the firm on the business success of Small and Medium Enterprises in Bangladesh. The study is based on survey methodology through a questionnaire administered on the owners and employees of small firms. Data are analyzed using Statistical Package...

    Provided By Universiti Sains Islam Malaysia

  • White Papers // Jul 2006

    Resistance to Change and ERP Implementation Success: The Moderating Role of Change Management Initiatives

    Enterprise Resource Planning (ERP) is a useful tool that builds strong capabilities, improves performance, supports better decision making, and provides competitive advantage for businesses. ERP aims to help the management by setting better business practices and equipping them with the right information to take timely decision. In any new technology...

    Provided By Universiti Sains Islam Malaysia

  • White Papers // Aug 2010

    Putting Sustainability at the Core of Knowledge Management Performance Evaluation System

    With the transformation of managerial views and the increasing focus on knowledge and intellectual capitals as the most important resources to the organizations, the necessity for retaining these resources and monitoring their effectiveness in order to know how they are utilized becomes significant. As for the universities, this requirement is...

    Provided By Universiti Sains Islam Malaysia

  • White Papers // Jun 2009

    A Survey of Botnet and Botnet Detection

    Among the various forms of malware, botnets are emerging as the most serious threat against cyber-security as they provide a distributed platform for several illegal activities such as launching distributed denial of service attacks against critical targets, malware dissemination, phishing, and click fraud. The defining characteristic of botnets is the...

    Provided By Universiti Sains Islam Malaysia

  • White Papers // Jul 2011

    A Novel Header Matching Algorithm for Intrusion Detection Systems

    In this paper, the authors proposed a novel algorithm to detect the intruders, who's trying to gain access to the network using the packets header parameters such as; source/destination address, source/destination port, and protocol without the need to inspect each packet content looking for signatures/patterns. However, the \"Packet Header Matching\"...

    Provided By Universiti Sains Islam Malaysia

  • White Papers // Aug 2013

    Provably Lightweight RFID Mutual Authentication Protocol

    Simplest-Lightweight Authentication Protocol (SLAP) is one of the recent mutual authentication protocols for lightweight RFID environment. However, server impersonation attack can be launched on the aforementioned protocol. The main goal of this paper is to comprehensively verify the security weakness of SLAP. This paper also propose an alternative mutual authentication...

    Provided By Universiti Sains Islam Malaysia

  • White Papers // Nov 2013

    An Improved Version of the Visual Digital Signature Scheme

    The issue of authenticity in data transfer is very important in many communications. In this paper, the authors propose an improved version of the visual digital signature scheme with enhanced security. The improvement was made based on Yang's non-expansion visual cryptography technique and Boolean operations. The security of the improved...

    Provided By Universiti Sains Islam Malaysia

  • White Papers // Dec 2011

    Local Convexity Shape-Preserving Data Visualization by Spline Function

    In this paper, the authors explain about the visualization of convex data that results in a smooth, pleasant, and interactive convexity-preserving curve. The rational cubic function with three free parameters is constructed to preserve the shape of convex data. The free parameters are arranged in a way that two of...

    Provided By Universiti Sains Islam Malaysia