Universiti Sains Malaysia

Displaying 1-29 of 29 results

  • White Papers // Mar 2013

    Cryptography: A New Approach of Classical Hill Cipher

    The Hill cipher is the first polygraph cipher which has some advantages in symmetric data encryption. However, it is vulnerable to known plaintext attack. Another setback is that an invertible key matrix is needed for decryption and it is not suitable for encrypting a plaintext consisting of zeroes. The objective...

    Provided By Universiti Sains Malaysia

  • White Papers // Mar 2013

    Impact of Route Selection Metrics on the Performance of DSR Protocol for MANETs

    Mobile Ad-hoc NETworks (MANETs) are characterized by connectivity through a group of wireless nodes. MANETs are deployed in circumstances where no base station is available. Accordingly, MANETs need routing protocols which can adopt with dynamic topologies. To achieve this, several routing protocols are proposed and deployed. The route selection is...

    Provided By Universiti Sains Malaysia

  • White Papers // Feb 2013

    Reducing of Inconsistent Data Using Fuzzy Multi Attribute Decision Making for Accessing Data from Database

    Inconsistent data in database occurs due to increasing number of data. A suitable technique is needed to reduce inconsistent data from database. In this paper, fuzzy multi attribute decision making was chosen to reduce inconsistent data from database. This technique contains 5 steps which are deriving quality vector, scale the...

    Provided By Universiti Sains Malaysia

  • White Papers // Aug 2012

    Perceptions of IT Knowledge Among SMEs Operators in Malaysia

    The perception of the importance of IT entrepreneurs plays a vital role in influencing the business performance. Positive perception of the importance of IT knowledge is a necessary approach in achieving and determining the adoption of the business marketing goals. This study was carried out to find out the IT...

    Provided By Universiti Sains Malaysia

  • White Papers // Jun 2012

    Exploring Persuasive Multimedia as an Attitude Formation Strategy for Abusers of Disabled Parking

    Attitude is one of the factors that contribute to the abuse of disabled parking. The attitude's components consist of affective, cognitive and behavioral may be formed in various ways including learning and persuasion. Using learning and persuasion approach, this study has produced a persuasive multimedia aiming to form a positive...

    Provided By Universiti Sains Malaysia

  • White Papers // Jun 2012

    The Design and Development of Multimedia Presentation Modes in Reducing Cognitive Load for Students Different in Cognitive Style

    Researchers have reported mixed results with deploying linear mode and segmented mode. The study demonstrated that simply incorporating two types of multimedia presentation mode into learning environments may not always be sufficient to improve learning. Segmented mode that provides individual control over random access to content may lead to better...

    Provided By Universiti Sains Malaysia

  • White Papers // Jun 2012

    Efficient Certificate Management in VANET

    VANET security has gained the most research efforts in the past years; Certificate plays an important role in network communication, any node in the network can't participate in the network without appropriate certificate. Dealing with certificate management raises many other issues like Certificate Revocation List (CRL) that causes network overhead,...

    Provided By Universiti Sains Malaysia

  • White Papers // Sep 2011

    AIA: Attack Intention Analysis Algorithm Based on D-S Theory with Causal Technique for Network Forensics - A Case Study

    In network forensics, attack intention analyzes play a major role in accelerating the decision-making process for apprehending the real perpetrator. In fact, attack intention analysis is a prediction factor to help investigators conclude a case with high accuracy. However, current techniques in attack intention analysis only focus on recognizing alert...

    Provided By Universiti Sains Malaysia

  • White Papers // Sep 2011

    Header Compression Scheme in Point-To-Point Link Model Over Hybrid Satellite Wimax Network

    The demand for anytime-anywhere connectivity has accelerated the emergence of new technologies and integrated networks for better Quality of Service (QoS). With the introduction of IEEE802.16, mobility in broadband services has become reality. Whilst broadband services in urban area are common, it is deemed luxury service in rural and remote...

    Provided By Universiti Sains Malaysia

  • White Papers // Aug 2011

    An Approach for Identifying Malware Operation and Target Using Run Time Analysis and Resource Monitoring

    In past few years number of malware attacks has increased dramatically. Simultaneously, malware authors also deployed some avoidance technique in order to avoid analysis and detection. Based on that situation, static code analysis is not always a possible solution to investigate and recognize malware characteristics. This paper presents an approach...

    Provided By Universiti Sains Malaysia

  • White Papers // Jul 2011

    Development of Handheld Directory System Built on WiFi-Based Positioning Techniques

    As outdoor positioning systems have relatively well established and matured, indoor positioning and navigation systems still have great potential to grow. The researches on indoor positioning system have gained the ever increasing momentum and importance, as the needs toward indoor positioning and navigation are flourishing. With the prominence of smartphone,...

    Provided By Universiti Sains Malaysia

  • White Papers // Jul 2011

    Transport Layer Protocols Taxonomy From Voice Over IP Perspective

    VoIP technology is becoming increasingly important as they gain market share in PSTN technology. In the short run, it is likely that VoIP technology will dominate the telecommunications market. This evolution towards VoIP technology makes sense for improving the VoIP technology efficiency under the auspices of the internet. However, the...

    Provided By Universiti Sains Malaysia

  • White Papers // Jun 2011

    Video on Demand Caching System Using NIPBCS Over Mobile Ad Hoc Network

    In this paper proposed a caching scheme to reduce the time delay in Video On Demand (VOD) System over MANET. VOD System over MANET is an interactive multimedia system that provides video services to mobile clients. Mobile clients who use the system will encounter high service delay to watch their...

    Provided By Universiti Sains Malaysia

  • White Papers // Dec 2010

    Application of Exact String Matching Algorithms Towards SMILES Representation of Chemical Structure

    Bioinformatics and Cheminformatics use computer as disciplines providing tools for acquisition, storage, processing, analysis, integrate data and for the development of potential applications of biological and chemical data. A chemical database is one of the databases that exclusively designed to store chemical information. NMRShiftDB is one of the main databases...

    Provided By Universiti Sains Malaysia

  • White Papers // Aug 2010

    Spiking Neurons With ASNN Based-Methods for the Neural Block Cipher

    Problem statement: This paper examines Artificial Spiking Neural Network (ASNN) which inter-connects group of artificial neurons that uses a mathematical model with the aid of block cipher. The aim of undertaken this research is to come up with a block cipher where by the keys are randomly generated by ASNN...

    Provided By Universiti Sains Malaysia

  • White Papers // Aug 2010

    Multiple RFID Tag/Reader Co - Existence Proof Based On Rabin Cryptosystem

    There are a lot of multiple RFID tag co - existence proofs have been developed by previous researcher such as Yoking Proof, On Existence Proof for multiple RFID tag and A Proposed Proof by Thiti et al., are applying symmetric secret sharing key method for performing an authentication in between...

    Provided By Universiti Sains Malaysia

  • White Papers // Jul 2010

    A New Public-Key Encryption Scheme Based on Non-Expansion Visual Cryptography and Boolean Operation

    Currently, most of the existing public-key encryption schemes are based on complex algorithms with heavy computations. In 1994, Naor and Shamir proposed a simple cryptography method for digital images called visual cryptography. Existing visual cryptography primitives can be considered as a special kind of secret-key cryptography that does not require...

    Provided By Universiti Sains Malaysia

  • White Papers // Jun 2010

    The Development & Implementation of Reed Solomon Codes for OFDM Using Software-Defined Radio Platform

    In this paper, the performance of Reed Solomon codes (RS code) is presented, so as to make it perform better to choose the effective parameters that can improve Orthogonal Frequency Division Multiplexing (OFDM) system. The results show that code gain with high code rate is better than that of low...

    Provided By Universiti Sains Malaysia

  • White Papers // Apr 2010

    A Broadcast Disk Scheme for Mobile Information System

    The rapidly expanding technology of cellular communications, wireless Local Area Network (LAN), wireless data networks and satellite gives mobile users the ability of accessing information anywhere and anytime. Data broadcasting algorithm plays an important role as it instructs the server to disseminate large amount of data at a fast rate...

    Provided By Universiti Sains Malaysia

  • White Papers // Nov 2009

    The Effect of Using XCAST Based Routing Protocol in Wireless Ad Hoc Networks

    Wireless ad hoc networks provide for the option of being operated in environments where a network infrastructure or a central administration is absent. However, the basic operations of wireless ad-hoc networks have been observed to deliver lower efficiency than is expected due to a loop hole resulting in band width...

    Provided By Universiti Sains Malaysia

  • White Papers // Oct 2009

    Detecting Botnet Activities Based on Abnormal DNS Traffic

    The botnet is considered as a critical issue of the Internet due to its fast growing mechanism and affect. Recently, Botnets have utilized the DNS and query DNS server just like any legitimate hosts. In this case, it is difficult to distinguish between the legitimate DNS traffic and illegitimate DNS...

    Provided By Universiti Sains Malaysia

  • White Papers // Jun 2009

    WPRiMA Tool: Managing Risks in Web Projects

    Risk management is an essential fraction of project management, which plays a significant role in project success. Many failures associated with Web projects are the consequences of poor awareness of the risks involved and lack of process models that can serve as a guideline for the development of Web based...

    Provided By Universiti Sains Malaysia

  • White Papers // Jun 2009

    A Knowledge-Based E-Mail System Using Semantic Categorization and Rating Mechanisms

    Knowledge-based e-mail systems focus on incorporating knowledge management approach in order to enhance the traditional e-mail systems. In this paper, the authors present a knowledge-based e-mail system called KS-Mail where people do not only send and receive e-mail conventionally but are also able to create a sense of knowledge flow....

    Provided By Universiti Sains Malaysia

  • White Papers // Jun 2009

    A System to Integrate and Manipulate Protein Database Using BioPerl and XML

    The size, complexity and number of databases used for protein information have caused bioinformatics to lag behind in adapting to the need to handle this distributed information. Integrating all the information from different databases into one database is a challenging problem. The main research is to develop a tool which...

    Provided By Universiti Sains Malaysia

  • White Papers // May 2009

    Analysis of Natural Language Steganography

    The technology of information hiding through an open network has developed rapidly in recent years. One of the reasons why people need tools to hide message, is to keep secret message concealed from unauthorized party. Steganography is one of the techniques in sending secret message. In this paper, several software...

    Provided By Universiti Sains Malaysia

  • White Papers // Apr 2009

    A Framework for Detecting Bluetooth Mobile Worms

    Bluetooth is an industrial standard for wireless specification for wireless Personal Area Network (PAN). In recent years, Bluetooth technology has become a standard in mobile devices such as cell phone so smart phones and Personal Digital Assistant (PDA) for short range communication. There is a new era of worm attack...

    Provided By Universiti Sains Malaysia

  • White Papers // Jan 2009

    A Framework for RFID Systems' Security for Human Identification Based on Three-Tier Categorization Model

    Off late researches in the Radio Frequency IDentification (RFID) attempt to raise solutions for general applications within the field, these solutions often are hindered by the fact that different RFID deployments do not meet in their specifications and need. In order for these solutions to be valid and more useful;...

    Provided By Universiti Sains Malaysia

  • White Papers // Nov 2008

    A Distributed Resource-Management Approach in MANETs

    Mobile Ad hoc NETwork (MANET) is an infrastructure less network, in where all mobile nodes are free for any movement to any side. Thus the network is going toward zero configurations that would create some problems. Ad hoc network is faced with various limitations that need to be considered among...

    Provided By Universiti Sains Malaysia

  • White Papers // Aug 2008

    The Savings And Investment Nexus: Evidence From Rolling Windows Bounds Test

    The aim of this paper is to empirically re-investigate the savings-investment nexus for Malaysia with a relatively new bounds testing approach to cointegration. This paper covers the annual sample period from 1960 to 2007. The conventional bounds testing approach cannot show evidence of cointegration between the savings and investment. However,...

    Provided By Universiti Sains Malaysia

  • White Papers // Mar 2013

    Cryptography: A New Approach of Classical Hill Cipher

    The Hill cipher is the first polygraph cipher which has some advantages in symmetric data encryption. However, it is vulnerable to known plaintext attack. Another setback is that an invertible key matrix is needed for decryption and it is not suitable for encrypting a plaintext consisting of zeroes. The objective...

    Provided By Universiti Sains Malaysia

  • White Papers // Jan 2009

    A Framework for RFID Systems' Security for Human Identification Based on Three-Tier Categorization Model

    Off late researches in the Radio Frequency IDentification (RFID) attempt to raise solutions for general applications within the field, these solutions often are hindered by the fact that different RFID deployments do not meet in their specifications and need. In order for these solutions to be valid and more useful;...

    Provided By Universiti Sains Malaysia

  • White Papers // Apr 2009

    A Framework for Detecting Bluetooth Mobile Worms

    Bluetooth is an industrial standard for wireless specification for wireless Personal Area Network (PAN). In recent years, Bluetooth technology has become a standard in mobile devices such as cell phone so smart phones and Personal Digital Assistant (PDA) for short range communication. There is a new era of worm attack...

    Provided By Universiti Sains Malaysia

  • White Papers // Nov 2009

    The Effect of Using XCAST Based Routing Protocol in Wireless Ad Hoc Networks

    Wireless ad hoc networks provide for the option of being operated in environments where a network infrastructure or a central administration is absent. However, the basic operations of wireless ad-hoc networks have been observed to deliver lower efficiency than is expected due to a loop hole resulting in band width...

    Provided By Universiti Sains Malaysia

  • White Papers // Jun 2009

    A System to Integrate and Manipulate Protein Database Using BioPerl and XML

    The size, complexity and number of databases used for protein information have caused bioinformatics to lag behind in adapting to the need to handle this distributed information. Integrating all the information from different databases into one database is a challenging problem. The main research is to develop a tool which...

    Provided By Universiti Sains Malaysia

  • White Papers // May 2009

    Analysis of Natural Language Steganography

    The technology of information hiding through an open network has developed rapidly in recent years. One of the reasons why people need tools to hide message, is to keep secret message concealed from unauthorized party. Steganography is one of the techniques in sending secret message. In this paper, several software...

    Provided By Universiti Sains Malaysia

  • White Papers // Aug 2010

    Spiking Neurons With ASNN Based-Methods for the Neural Block Cipher

    Problem statement: This paper examines Artificial Spiking Neural Network (ASNN) which inter-connects group of artificial neurons that uses a mathematical model with the aid of block cipher. The aim of undertaken this research is to come up with a block cipher where by the keys are randomly generated by ASNN...

    Provided By Universiti Sains Malaysia

  • White Papers // Dec 2010

    Application of Exact String Matching Algorithms Towards SMILES Representation of Chemical Structure

    Bioinformatics and Cheminformatics use computer as disciplines providing tools for acquisition, storage, processing, analysis, integrate data and for the development of potential applications of biological and chemical data. A chemical database is one of the databases that exclusively designed to store chemical information. NMRShiftDB is one of the main databases...

    Provided By Universiti Sains Malaysia

  • White Papers // Oct 2009

    Detecting Botnet Activities Based on Abnormal DNS Traffic

    The botnet is considered as a critical issue of the Internet due to its fast growing mechanism and affect. Recently, Botnets have utilized the DNS and query DNS server just like any legitimate hosts. In this case, it is difficult to distinguish between the legitimate DNS traffic and illegitimate DNS...

    Provided By Universiti Sains Malaysia

  • White Papers // Jul 2010

    A New Public-Key Encryption Scheme Based on Non-Expansion Visual Cryptography and Boolean Operation

    Currently, most of the existing public-key encryption schemes are based on complex algorithms with heavy computations. In 1994, Naor and Shamir proposed a simple cryptography method for digital images called visual cryptography. Existing visual cryptography primitives can be considered as a special kind of secret-key cryptography that does not require...

    Provided By Universiti Sains Malaysia

  • White Papers // Jun 2009

    A Knowledge-Based E-Mail System Using Semantic Categorization and Rating Mechanisms

    Knowledge-based e-mail systems focus on incorporating knowledge management approach in order to enhance the traditional e-mail systems. In this paper, the authors present a knowledge-based e-mail system called KS-Mail where people do not only send and receive e-mail conventionally but are also able to create a sense of knowledge flow....

    Provided By Universiti Sains Malaysia

  • White Papers // Jun 2009

    WPRiMA Tool: Managing Risks in Web Projects

    Risk management is an essential fraction of project management, which plays a significant role in project success. Many failures associated with Web projects are the consequences of poor awareness of the risks involved and lack of process models that can serve as a guideline for the development of Web based...

    Provided By Universiti Sains Malaysia

  • White Papers // Aug 2008

    The Savings And Investment Nexus: Evidence From Rolling Windows Bounds Test

    The aim of this paper is to empirically re-investigate the savings-investment nexus for Malaysia with a relatively new bounds testing approach to cointegration. This paper covers the annual sample period from 1960 to 2007. The conventional bounds testing approach cannot show evidence of cointegration between the savings and investment. However,...

    Provided By Universiti Sains Malaysia

  • White Papers // Jun 2010

    The Development & Implementation of Reed Solomon Codes for OFDM Using Software-Defined Radio Platform

    In this paper, the performance of Reed Solomon codes (RS code) is presented, so as to make it perform better to choose the effective parameters that can improve Orthogonal Frequency Division Multiplexing (OFDM) system. The results show that code gain with high code rate is better than that of low...

    Provided By Universiti Sains Malaysia

  • White Papers // Jul 2011

    Development of Handheld Directory System Built on WiFi-Based Positioning Techniques

    As outdoor positioning systems have relatively well established and matured, indoor positioning and navigation systems still have great potential to grow. The researches on indoor positioning system have gained the ever increasing momentum and importance, as the needs toward indoor positioning and navigation are flourishing. With the prominence of smartphone,...

    Provided By Universiti Sains Malaysia

  • White Papers // Nov 2008

    A Distributed Resource-Management Approach in MANETs

    Mobile Ad hoc NETwork (MANET) is an infrastructure less network, in where all mobile nodes are free for any movement to any side. Thus the network is going toward zero configurations that would create some problems. Ad hoc network is faced with various limitations that need to be considered among...

    Provided By Universiti Sains Malaysia

  • White Papers // Apr 2010

    A Broadcast Disk Scheme for Mobile Information System

    The rapidly expanding technology of cellular communications, wireless Local Area Network (LAN), wireless data networks and satellite gives mobile users the ability of accessing information anywhere and anytime. Data broadcasting algorithm plays an important role as it instructs the server to disseminate large amount of data at a fast rate...

    Provided By Universiti Sains Malaysia

  • White Papers // Sep 2011

    Header Compression Scheme in Point-To-Point Link Model Over Hybrid Satellite Wimax Network

    The demand for anytime-anywhere connectivity has accelerated the emergence of new technologies and integrated networks for better Quality of Service (QoS). With the introduction of IEEE802.16, mobility in broadband services has become reality. Whilst broadband services in urban area are common, it is deemed luxury service in rural and remote...

    Provided By Universiti Sains Malaysia

  • White Papers // Jun 2011

    Video on Demand Caching System Using NIPBCS Over Mobile Ad Hoc Network

    In this paper proposed a caching scheme to reduce the time delay in Video On Demand (VOD) System over MANET. VOD System over MANET is an interactive multimedia system that provides video services to mobile clients. Mobile clients who use the system will encounter high service delay to watch their...

    Provided By Universiti Sains Malaysia

  • White Papers // Aug 2011

    An Approach for Identifying Malware Operation and Target Using Run Time Analysis and Resource Monitoring

    In past few years number of malware attacks has increased dramatically. Simultaneously, malware authors also deployed some avoidance technique in order to avoid analysis and detection. Based on that situation, static code analysis is not always a possible solution to investigate and recognize malware characteristics. This paper presents an approach...

    Provided By Universiti Sains Malaysia

  • White Papers // Sep 2011

    AIA: Attack Intention Analysis Algorithm Based on D-S Theory with Causal Technique for Network Forensics - A Case Study

    In network forensics, attack intention analyzes play a major role in accelerating the decision-making process for apprehending the real perpetrator. In fact, attack intention analysis is a prediction factor to help investigators conclude a case with high accuracy. However, current techniques in attack intention analysis only focus on recognizing alert...

    Provided By Universiti Sains Malaysia

  • White Papers // Aug 2010

    Multiple RFID Tag/Reader Co - Existence Proof Based On Rabin Cryptosystem

    There are a lot of multiple RFID tag co - existence proofs have been developed by previous researcher such as Yoking Proof, On Existence Proof for multiple RFID tag and A Proposed Proof by Thiti et al., are applying symmetric secret sharing key method for performing an authentication in between...

    Provided By Universiti Sains Malaysia

  • White Papers // Jul 2011

    Transport Layer Protocols Taxonomy From Voice Over IP Perspective

    VoIP technology is becoming increasingly important as they gain market share in PSTN technology. In the short run, it is likely that VoIP technology will dominate the telecommunications market. This evolution towards VoIP technology makes sense for improving the VoIP technology efficiency under the auspices of the internet. However, the...

    Provided By Universiti Sains Malaysia

  • White Papers // Jun 2012

    Efficient Certificate Management in VANET

    VANET security has gained the most research efforts in the past years; Certificate plays an important role in network communication, any node in the network can't participate in the network without appropriate certificate. Dealing with certificate management raises many other issues like Certificate Revocation List (CRL) that causes network overhead,...

    Provided By Universiti Sains Malaysia

  • White Papers // Jun 2012

    Exploring Persuasive Multimedia as an Attitude Formation Strategy for Abusers of Disabled Parking

    Attitude is one of the factors that contribute to the abuse of disabled parking. The attitude's components consist of affective, cognitive and behavioral may be formed in various ways including learning and persuasion. Using learning and persuasion approach, this study has produced a persuasive multimedia aiming to form a positive...

    Provided By Universiti Sains Malaysia

  • White Papers // Jun 2012

    The Design and Development of Multimedia Presentation Modes in Reducing Cognitive Load for Students Different in Cognitive Style

    Researchers have reported mixed results with deploying linear mode and segmented mode. The study demonstrated that simply incorporating two types of multimedia presentation mode into learning environments may not always be sufficient to improve learning. Segmented mode that provides individual control over random access to content may lead to better...

    Provided By Universiti Sains Malaysia

  • White Papers // Feb 2013

    Reducing of Inconsistent Data Using Fuzzy Multi Attribute Decision Making for Accessing Data from Database

    Inconsistent data in database occurs due to increasing number of data. A suitable technique is needed to reduce inconsistent data from database. In this paper, fuzzy multi attribute decision making was chosen to reduce inconsistent data from database. This technique contains 5 steps which are deriving quality vector, scale the...

    Provided By Universiti Sains Malaysia

  • White Papers // Mar 2013

    Impact of Route Selection Metrics on the Performance of DSR Protocol for MANETs

    Mobile Ad-hoc NETworks (MANETs) are characterized by connectivity through a group of wireless nodes. MANETs are deployed in circumstances where no base station is available. Accordingly, MANETs need routing protocols which can adopt with dynamic topologies. To achieve this, several routing protocols are proposed and deployed. The route selection is...

    Provided By Universiti Sains Malaysia

  • White Papers // Aug 2012

    Perceptions of IT Knowledge Among SMEs Operators in Malaysia

    The perception of the importance of IT entrepreneurs plays a vital role in influencing the business performance. Positive perception of the importance of IT knowledge is a necessary approach in achieving and determining the adoption of the business marketing goals. This study was carried out to find out the IT...

    Provided By Universiti Sains Malaysia