Universiti Teknikal Malaysia Melaka

Displaying 1-40 of 62 results

  • White Papers // Nov 2014

    Impacts of Personal, Social and Culture Factors on User Acceptance of ASMD N-Screen Cloud Contents and Services

    The N-screen service has evolved from the OSMU (One Source Multi-Use) method of using a same content on various devices to the ASMD (Adaptive Source Multi-Device) method of different using contents suitable for different devices. Although there is an increase in consumers' need, there is dearth of academic research dealing...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Nov 2014

    Authentication Method Through Keystrokes Measurement of Mobile Users in Cloud Environment

    In order to deal with security of Mobile Cloud Computing (MCC) authentication plays an important role. It is aimed to verify user's identity when they wish to request services via the internet through Cloud Service Provider (CSP). Personal identification number is the most common mechanism for authentication in mobile devices;...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Jul 2014

    An Enhanced Approach for Iris Recognition Using Fusion of FWT with Gabor Wavelet Transform and Daugman Encoding

    In this paper, the authors discuss iris recognition, which is accepted as one of the best biometric methods for identifying an individual. A comparative analysis is done for eight algorithms, namely DCWT, FWT, SWT, CWT, DB, Complex dual tree, Haar wavelet and wavelet packet for extracting the feature from iris...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Mar 2014

    Prevention Schemes Against Phishing Attacks on Internet Banking Systems

    With the rise of Internet banking, phishing has become a major problem in online banking systems. Over time, highly evolved phishing attacks, such as active phishing, have emerged as a serious issue. Thus, the authors suggest two server authentication schemes based on SSL/TLS to protect Internet banking customers from phishing...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Mar 2014

    Big Data Preprocessing Mechanism for Analytics of Mobile Web Log

    The number of mobile web service users has increased steadily as wireless mobile web-based services have diversified, and existing services are also being provided by web-based interfaces on Smartphone's. However, mobile web users' information can be leaked to attackers as mobile web services are interrupted by SQL injection and/or parameter...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Mar 2014

    Study on the Effectiveness of Securing Instant Messaging Using One Time Pad

    Instant Messaging (IM) is one of the popular applications for real-time communication. Along with its popularity the threats that target instant messaging also rising. Some studies have been conducted to improve the message confidentiality of the instant messaging, which do not possess by most existing IM. The purpose of this...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Mar 2014

    Secure Searchable Based Asymmetric Encryption in Cloud Computing

    Cloud computing offers a wide range of services such as user demand network, operating systems, hardware, software and resources. These encouraging facilities and hassle free management of computing resources have attracted many users to outsource their data to untrusted servers. Cloud server may leak documents to unauthorized parties. Therefore, all...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Mar 2014

    An Agile Software Project Management Manifesto - A Reference Disciplines Framework for Agile Development

    The agile development approach to systems development is fundamentally based on the agile manifesto published in 2001 by a group of independent consultants and practitioners. Twelve principles supporting the agile manifesto were elaborated in support. Following the spirit of the agile manifesto, this paper proffers the agile project management manifesto....

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Dec 2013

    Implementing Test Management Traceability Model To Support Test Documents

    Documentation is one of the key quality factors in software development. However, many developers are still putting less effort and less priority on documentation. To them writing documentation during project development is very tedious and time consuming. As a result, the documentation tends to be significantly out-dated, poor quality and...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Oct 2013

    A Review on Green Software Development in a Cloud Environment Regarding Software Development Life Cycle: (SDLC) Perspective

    Cloud Computing (CC) has been recognized and gained significant importance as an approach that can be used to save the energy of resources being used by organizations. CC is crucial in virtualization; that is helpful to reduce the use of the number of power consuming servers. Virtualization itself is being...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Jun 2013

    User Resistance Factors in Post ERP Implementation

    Enterprise Resource Planning (ERP) systems are becoming mature technologies to support inter- and intra-company business processes. However, one of the factors frequently cited as the major reason for the failure of ERP system in post implementation is \"User Resistance\". ERP implementation doesn't finish after Go-Live, instead the real test of...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Jun 2013

    An Integrated Theoretical Framework for Cloud Computing Adoption by Small and Medium-Sized Enterprises

    Due to socio-technical reasons, cloud services are usually deployed in a heterogeneous network where both human and non-human actors are equally important in the process of technology adoption. Close examination of Information Systems adoption and diffusion theories shows that human and non-human actors, as the major elements in every heterogeneous...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Jun 2013

    Implementation of Energy Storage in a Future Smart Grid

    Modernization of power usage and design is demanding for new control and operation strategies of the smart grid. The changes in load control system coupled with the variable and stochastic nature of renewable energy integrated in the smart grid offers a new set of challenges in balancing generation and consumption....

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Jun 2013

    Security Model for Microsoft Based Mobile Sales Management Application in Private Cloud Computing

    The Microsoft-based mobile sales management application is a sales force management application that currently running on Windows Mobile 6.5. It handles sales-related activity and cuts down the administrative task of sales representative. Then, Windows launch a new mobile operating system, Windows Phone and stop providing support to Windows Mobile. This...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Jun 2013

    An Effective Model for Evaluating Organizational Risk and Cost in ERP Implementation by SME

    Enterprise Resource Planning (ERP) implementations in the context of small medium size enterprises are discussed in this paper. It is essential for small businesses to success implementation an ERP system to maintain control of their risks. ERP implementation is costly and risky for small and medium enterprises. Paper identified from...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // May 2013

    An Adaptive Intrusion Detection Model Based on Machine Learning Techniques

    Intrusion detection continues to be an active research field. Even after 20 years of research, the intrusion detection community still faces several difficult problems. Detecting unknown patterns of attack without generating too many false alerts remains an unresolved problem. Although recently, several results have shown that there is a potential...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Apr 2013

    Customer Oriented Business Process Improvement Methodlogy for Public Sector Organizations

    The globalization of businesses and the germination of customer satisfaction importance induced a profound transfer from transitional to relational marketing, together with the introduction of relationship marketing concept. To surmount this transition, business process improvement is acknowledged as one of the prevailing methods to conduct changes in organizations. Concerning the...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Apr 2013

    A Brief Review of Mobile Cloud Computing Opportunities

    Cloud Computing (CC) is becoming popular as the latest technology in the infrastructure of the computing world. The CC allows the users to make use of the resources when needed. Mobile Cloud Computing (MCC) combines the cloud computing concept into a mobile setting and manages to deter barriers associated with...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Apr 2013

    Performance Analysis of SRTLD and BIOSARP Protocols in Wireless Sensor Networks

    With the growing of wireless network technology researchers find that Wireless Sensor Network (WSN) is one the newest technology to make the life more comfortable and interesting. Security is needed to ensure the communication between the sensor node which is already a part from the same network and not outside...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Mar 2013

    Medium Access Control with Token Approach in Wireless Sensor Network

    Hybrid Medium Access Control (MAC) design in Wireless Sensor Network (WSN) brings a new research challenge nowadays. Hybrid MAC gives significant improvement in network performance especially in terms of energy efficiency and reliability of the network. Some of the data are sensitive to loss in the medium such as video...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Feb 2013

    Identifying Benefits and Risks Associated With Utilizing Cloud Computing

    Cloud computing is an emerging computing model where IT and computing operations are delivered as services in highly scalable and cost effective manner. Recently, embarking this new model in business has become popular. Companies in diverse sectors intend to leverage cloud computing architecture, platforms and applications in order to gain...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Feb 2013

    A Survey on Methods to Defend Against DDoS Attack in Cloud Computing

    Cloud computing is a revolution in IT technology by providing a shared pool of virtualizes resources for its users to pay as they use. This technology is based on two crucial concepts as virtualization and abstraction, which increased the ability of on demand access through the available resources in the...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Feb 2013

    An Overview on Methods to Detect Port Scanning Attacks in Cloud Computing

    Cloud computing has become a controversial subject in the future of computer networks. Furthermore, it has emerged as a major information and communications technology leaning. The most important problem in cloud computing environment that enterprises are focused on is security concerns. One of the challenges in cloud environment is to...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Jan 2013

    A Formal Semantic for Scenario-Based Model Using Algebraic Semantics Framework for MOF

    Model-driven development uses models to represent system artifacts to improve the visibility of the system towards the real world. The development of models is underlying in the Meta-Object Facility (MOF) standard in order to define the building concepts of metamodel and models. However, these concepts, especially within MOF standard, are...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Dec 2012

    Multi-criteria Receiver Self-Election Scheme for Optimal Packet Forwarding in Vehicular Ad hoc Networks

    In most of the existing geographical forwarding methods of Vehicular Ad hoc NETwork (VANET), a node periodically sends "Hello" messages to determine the positional information of its direct neighbors. Each node stores and maintains more or less accurate information of its direct neighbors in a table. However, due to high...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Oct 2012

    Associated Risks of Cloud Computing for SMEs

    Cloud computing is an emerging computing model, which changed the whole picture that distributed computing used to present. Although, Cloud offers great benefits, it introduces a myriad of threats. These threats must be overcome in order to benefit fully from this new computing exemplar. This paper reveals benefits of exploiting...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Oct 2012

    Users Authentication and Privacy Control of RFID Card

    Security and Privacy concerns in Radio Frequency IDentification (RFID) technology particularly RFID Card, is a wide research area which have attracted researchers for over a decade. Authenticating users at the Card end of the RFID technology constitutes one of the major sources of attacks on the system. In this paper,...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Oct 2012

    Identifying Critical Features for Network Forensics Investigation Perspectives

    Research in the field of network forensics is gradually expanding with the propensity to fully accommodate the tenacity to help in adjudicating, curbing and apprehending the exponential growth of cyber crimes. However, investigating cyber crime differs, depending on the perspective of investigation. There is therefore the need for a comprehensive...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Oct 2012

    Cost Benefits Maximization Using Discount Cost Function for Embedded System Architecture Optimization

    Developing a system architecture that satisfies the functional requirements and keeping the quality attributes high is still an open challenge. The task of selecting the optimal combination and redundancy levels of components (which is known as RAP problem) that meet system-level constraints is hard since each one of these alternatives...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Oct 2012

    Metaheuristic Search Approach Based on In-House/Out-Sourced Strategy to Solve Redundancy Allocation Problem in Component-Based Software Systems

    The redundant components' nodes are widely used as design tactic to improve the reliability of complex embedded systems. The challenge is that; the obtained solution might not be sufficient because it demands high cost, and the system might be failed if the predicted cost does not estimated reasonably. Many publications...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Oct 2012

    Information Systems of Supply Chain Management in SMEs: Sustainable Approach

    Conventional Supply Chain Management (SCM) considered only three stages: pre-manufacture, manufacture and use, while the present enterprises and specially the Small and Medium sized Enterprises (SMEs) need to consider the Sustainable Supply Chain Management (SSCM) for competitive and stability in the market. It means this chain have to consider from...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Aug 2012

    Context-Aware Cloud Computing for Construction Collaboration

    The construction industry has been characterised by fragmentation, lack of integration and complexities in processes and activities. These characteristics could threaten the delivery of project objectives which could ultimately have a negative impact on construction project success. The construction industry is associated with numerous activities, processes, organizations and individuals. Improving...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Aug 2012

    A Survey of Intrusion Detection Schemes in Wireless Sensor Networks

    In this paper, the authors present a survey of intrusion detection schemes in WSNs. First, they present the similar works and show their differences from this work. After that, they outline the fundamentals of intrusion detection in WSNs, describing the types of attacks and state the motivation for intrusion detection...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Aug 2012

    Performance Evaluation of Mobile U-Navigation Based on GPS/WLAN Hybridization

    This paper present the authors' mobile u-navigation system. This approach utilizes hybridization of wireless local area network and Global Positioning System internal sensor which to receive signal strength from access point and the same time retrieve Global Navigation System Satellite signal. This positioning information will be switched based on type...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Aug 2012

    Cloud Computing Technology for Collaborative Information System in Construction Industry

    The fragmentation, poor integration and adversarial relationships among players in the construction industry has been one of the main barriers of the successful construction project delivery contributing to negative influence on project objectives. There are many processes, organizations and people involved within the construction industry. Enhanced collaboration with construction parties...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Aug 2012

    GA-Based Parameter Tuning in Finger-Vein Biometric Embedded Systems for Information Security

    As concerns about security in networking and communication systems rise with their rapid technology advancements, the need for more reliable and stronger user authentication techniques has also increased. Traditional security methods such as personal identification number, password, and key smart cards are proving to be more and more inadequate, especially...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Aug 2012

    An Investigation Concerning the Correlation Between User Satisfaction and ICT's Development in Social Networks

    This paper is to determine the correlation of social networks with Information and Communication Technology (ICT) and the rate of user satisfaction and loyalty in social networks, An Investigation concerning the effects of Information Technology (IT) in this field will lead to development in services that all social networks prepare...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Jul 2012

    Signature-Based Multi-Layer Distributed Intrusion Detection System Using Mobile Agents

    The Internet and computer networks are exposed to an increasing number of security threats. With new types of attacks appearing continually, developing flexible and adaptive security oriented approaches is a severe challenge. Intrusions Detection Systems (IDSs) are systems that try to detect attacks as they occur or after the attacks...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Jul 2012

    The Efficiencies of Decoding Methods in Random Network Coding for Video Streaming

    In the recent years, video streaming over wireless networks has become very popular. Users can join the network easily and move from one point to another with no restriction. On the other hand, there are some problems in providing smooth video playback in these nodes due to time-varying channels, obstacles...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Jun 2012

    Sensitive Digital Image Watermarking for Copyright Protection

    In this paper, a watermark hiding scheme for copyright protection of sensitive images is proposed. The concept of Visual Cryptography is used, so that the original host image is not altered. The proposed scheme aims at improving the security of the related schemes. The scheme also reduces the size of...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Jul 2011

    Information Security Solutions Status and the Roadmap for Future Requirements

    Information Security (InfoSec) Surveys conducted worldwide show that the number and type of InfoSec attacks is expanding daily. This is verified and validated through a survey discussed in this paper. The paper asks a number of questions concerning InfoSec issues, outlines a survey designed to answer these questions, and then...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Aug 2012

    A Survey of Intrusion Detection Schemes in Wireless Sensor Networks

    In this paper, the authors present a survey of intrusion detection schemes in WSNs. First, they present the similar works and show their differences from this work. After that, they outline the fundamentals of intrusion detection in WSNs, describing the types of attacks and state the motivation for intrusion detection...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Apr 2012

    A Tree Model for Identification of Threats as the First Stage of Risk Assessment in HIS

    Security remains to be a critical issue in the safe operation of Information Systems (IS). Identifying the threats to IS may lead to an effective method for measuring security as the initial stage for risk management. Despite many attempts to classify threats to IS, new threats to Health Information Systems...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Dec 2013

    Implementing Test Management Traceability Model To Support Test Documents

    Documentation is one of the key quality factors in software development. However, many developers are still putting less effort and less priority on documentation. To them writing documentation during project development is very tedious and time consuming. As a result, the documentation tends to be significantly out-dated, poor quality and...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Mar 2014

    Prevention Schemes Against Phishing Attacks on Internet Banking Systems

    With the rise of Internet banking, phishing has become a major problem in online banking systems. Over time, highly evolved phishing attacks, such as active phishing, have emerged as a serious issue. Thus, the authors suggest two server authentication schemes based on SSL/TLS to protect Internet banking customers from phishing...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Mar 2014

    Big Data Preprocessing Mechanism for Analytics of Mobile Web Log

    The number of mobile web service users has increased steadily as wireless mobile web-based services have diversified, and existing services are also being provided by web-based interfaces on Smartphone's. However, mobile web users' information can be leaked to attackers as mobile web services are interrupted by SQL injection and/or parameter...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Mar 2014

    Study on the Effectiveness of Securing Instant Messaging Using One Time Pad

    Instant Messaging (IM) is one of the popular applications for real-time communication. Along with its popularity the threats that target instant messaging also rising. Some studies have been conducted to improve the message confidentiality of the instant messaging, which do not possess by most existing IM. The purpose of this...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Mar 2014

    Secure Searchable Based Asymmetric Encryption in Cloud Computing

    Cloud computing offers a wide range of services such as user demand network, operating systems, hardware, software and resources. These encouraging facilities and hassle free management of computing resources have attracted many users to outsource their data to untrusted servers. Cloud server may leak documents to unauthorized parties. Therefore, all...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Mar 2014

    An Agile Software Project Management Manifesto - A Reference Disciplines Framework for Agile Development

    The agile development approach to systems development is fundamentally based on the agile manifesto published in 2001 by a group of independent consultants and practitioners. Twelve principles supporting the agile manifesto were elaborated in support. Following the spirit of the agile manifesto, this paper proffers the agile project management manifesto....

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Jul 2014

    An Enhanced Approach for Iris Recognition Using Fusion of FWT with Gabor Wavelet Transform and Daugman Encoding

    In this paper, the authors discuss iris recognition, which is accepted as one of the best biometric methods for identifying an individual. A comparative analysis is done for eight algorithms, namely DCWT, FWT, SWT, CWT, DB, Complex dual tree, Haar wavelet and wavelet packet for extracting the feature from iris...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Nov 2014

    Impacts of Personal, Social and Culture Factors on User Acceptance of ASMD N-Screen Cloud Contents and Services

    The N-screen service has evolved from the OSMU (One Source Multi-Use) method of using a same content on various devices to the ASMD (Adaptive Source Multi-Device) method of different using contents suitable for different devices. Although there is an increase in consumers' need, there is dearth of academic research dealing...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Nov 2014

    Authentication Method Through Keystrokes Measurement of Mobile Users in Cloud Environment

    In order to deal with security of Mobile Cloud Computing (MCC) authentication plays an important role. It is aimed to verify user's identity when they wish to request services via the internet through Cloud Service Provider (CSP). Personal identification number is the most common mechanism for authentication in mobile devices;...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Oct 2012

    Cost Benefits Maximization Using Discount Cost Function for Embedded System Architecture Optimization

    Developing a system architecture that satisfies the functional requirements and keeping the quality attributes high is still an open challenge. The task of selecting the optimal combination and redundancy levels of components (which is known as RAP problem) that meet system-level constraints is hard since each one of these alternatives...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Oct 2012

    Metaheuristic Search Approach Based on In-House/Out-Sourced Strategy to Solve Redundancy Allocation Problem in Component-Based Software Systems

    The redundant components' nodes are widely used as design tactic to improve the reliability of complex embedded systems. The challenge is that; the obtained solution might not be sufficient because it demands high cost, and the system might be failed if the predicted cost does not estimated reasonably. Many publications...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Aug 2012

    An Investigation Concerning the Correlation Between User Satisfaction and ICT's Development in Social Networks

    This paper is to determine the correlation of social networks with Information and Communication Technology (ICT) and the rate of user satisfaction and loyalty in social networks, An Investigation concerning the effects of Information Technology (IT) in this field will lead to development in services that all social networks prepare...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Jul 2012

    Signature-Based Multi-Layer Distributed Intrusion Detection System Using Mobile Agents

    The Internet and computer networks are exposed to an increasing number of security threats. With new types of attacks appearing continually, developing flexible and adaptive security oriented approaches is a severe challenge. Intrusions Detection Systems (IDSs) are systems that try to detect attacks as they occur or after the attacks...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Jun 2012

    Sensitive Digital Image Watermarking for Copyright Protection

    In this paper, a watermark hiding scheme for copyright protection of sensitive images is proposed. The concept of Visual Cryptography is used, so that the original host image is not altered. The proposed scheme aims at improving the security of the related schemes. The scheme also reduces the size of...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Aug 2012

    Performance Evaluation of Mobile U-Navigation Based on GPS/WLAN Hybridization

    This paper present the authors' mobile u-navigation system. This approach utilizes hybridization of wireless local area network and Global Positioning System internal sensor which to receive signal strength from access point and the same time retrieve Global Navigation System Satellite signal. This positioning information will be switched based on type...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Jun 2013

    Implementation of Energy Storage in a Future Smart Grid

    Modernization of power usage and design is demanding for new control and operation strategies of the smart grid. The changes in load control system coupled with the variable and stochastic nature of renewable energy integrated in the smart grid offers a new set of challenges in balancing generation and consumption....

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Feb 2013

    Identifying Benefits and Risks Associated With Utilizing Cloud Computing

    Cloud computing is an emerging computing model where IT and computing operations are delivered as services in highly scalable and cost effective manner. Recently, embarking this new model in business has become popular. Companies in diverse sectors intend to leverage cloud computing architecture, platforms and applications in order to gain...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Jun 2013

    Security Model for Microsoft Based Mobile Sales Management Application in Private Cloud Computing

    The Microsoft-based mobile sales management application is a sales force management application that currently running on Windows Mobile 6.5. It handles sales-related activity and cuts down the administrative task of sales representative. Then, Windows launch a new mobile operating system, Windows Phone and stop providing support to Windows Mobile. This...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Aug 2012

    Context-Aware Cloud Computing for Construction Collaboration

    The construction industry has been characterised by fragmentation, lack of integration and complexities in processes and activities. These characteristics could threaten the delivery of project objectives which could ultimately have a negative impact on construction project success. The construction industry is associated with numerous activities, processes, organizations and individuals. Improving...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // May 2011

    Understanding Strategic Reactiveness Influences on Entrepreneurial Management Tendencies

    This paper explores the relationship between Strategic Reactiveness (SR) and Entrepreneurial Management (EM) tendencies of SMEs sector within the states of Melaka and Johor in Malaysia. This research considers that strategy-related variables are competitively aggressive and adaptive. Strategic planning allows organizations to anticipate changes and create strategic options for those...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Sep 2008

    Open Source Integration Into Business Strategies: A Review

    Open source projects have enabled many business establishments to take advantage of robust software at low cost. This is because open source software is one whose license allows for free modification of source code for ease of reusability. This paper discusses the values of Open Source that can be adopted...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Apr 2013

    A Brief Review of Mobile Cloud Computing Opportunities

    Cloud Computing (CC) is becoming popular as the latest technology in the infrastructure of the computing world. The CC allows the users to make use of the resources when needed. Mobile Cloud Computing (MCC) combines the cloud computing concept into a mobile setting and manages to deter barriers associated with...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Jun 2013

    An Effective Model for Evaluating Organizational Risk and Cost in ERP Implementation by SME

    Enterprise Resource Planning (ERP) implementations in the context of small medium size enterprises are discussed in this paper. It is essential for small businesses to success implementation an ERP system to maintain control of their risks. ERP implementation is costly and risky for small and medium enterprises. Paper identified from...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Apr 2012

    Investment in Technology Based Small and Medium Sized Firms in Malaysia: Roles for Commercial Banks

    Financing is an important input in every business which allows for the smooth running of day-to-day operations, asset acquisitions, expert recruitment, and development of marketing and distribution channels. This is especially the case for high-tech startups that must undergo four development stages to turn ideas into commercial products and become...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Oct 2012

    Information Systems of Supply Chain Management in SMEs: Sustainable Approach

    Conventional Supply Chain Management (SCM) considered only three stages: pre-manufacture, manufacture and use, while the present enterprises and specially the Small and Medium sized Enterprises (SMEs) need to consider the Sustainable Supply Chain Management (SSCM) for competitive and stability in the market. It means this chain have to consider from...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Aug 2012

    Cloud Computing Technology for Collaborative Information System in Construction Industry

    The fragmentation, poor integration and adversarial relationships among players in the construction industry has been one of the main barriers of the successful construction project delivery contributing to negative influence on project objectives. There are many processes, organizations and people involved within the construction industry. Enhanced collaboration with construction parties...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Jun 2013

    User Resistance Factors in Post ERP Implementation

    Enterprise Resource Planning (ERP) systems are becoming mature technologies to support inter- and intra-company business processes. However, one of the factors frequently cited as the major reason for the failure of ERP system in post implementation is \"User Resistance\". ERP implementation doesn't finish after Go-Live, instead the real test of...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Apr 2013

    Customer Oriented Business Process Improvement Methodlogy for Public Sector Organizations

    The globalization of businesses and the germination of customer satisfaction importance induced a profound transfer from transitional to relational marketing, together with the introduction of relationship marketing concept. To surmount this transition, business process improvement is acknowledged as one of the prevailing methods to conduct changes in organizations. Concerning the...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Feb 2013

    A Survey on Methods to Defend Against DDoS Attack in Cloud Computing

    Cloud computing is a revolution in IT technology by providing a shared pool of virtualizes resources for its users to pay as they use. This technology is based on two crucial concepts as virtualization and abstraction, which increased the ability of on demand access through the available resources in the...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Feb 2013

    An Overview on Methods to Detect Port Scanning Attacks in Cloud Computing

    Cloud computing has become a controversial subject in the future of computer networks. Furthermore, it has emerged as a major information and communications technology leaning. The most important problem in cloud computing environment that enterprises are focused on is security concerns. One of the challenges in cloud environment is to...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Feb 2007

    An Authentication Method for Secure Internet Transaction Using Smart Card and Secure Coprocessor

    Consumers for years have put their trust in physical means of proving personal identity. However, with the advent of Smart Cards, creating the same sense of trust in the security world is a challenge. Smart Cards, carrying digital signatures, private keys and certificates, offer an approach to trust in the...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Oct 2013

    A Review on Green Software Development in a Cloud Environment Regarding Software Development Life Cycle: (SDLC) Perspective

    Cloud Computing (CC) has been recognized and gained significant importance as an approach that can be used to save the energy of resources being used by organizations. CC is crucial in virtualization; that is helpful to reduce the use of the number of power consuming servers. Virtualization itself is being...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Dec 2012

    Multi-criteria Receiver Self-Election Scheme for Optimal Packet Forwarding in Vehicular Ad hoc Networks

    In most of the existing geographical forwarding methods of Vehicular Ad hoc NETwork (VANET), a node periodically sends "Hello" messages to determine the positional information of its direct neighbors. Each node stores and maintains more or less accurate information of its direct neighbors in a table. However, due to high...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Feb 2012

    A Hybrid Approach for Web Service Selection

    Web service selection which is specified to evaluate and select the best candidate from discovered Web services became one of the most significant topics in recent research on Service Oriented Architecture (SOA). In this paper, the authors propose a hybrid approach to solve Web service selection problem. First, they apply...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Jul 2011

    Design and Analysis of Ultra Wide Band Planar Monopole Antenna

    A novel two layered UWB antenna is proposed and designed to resonate at the full range of UWB frequencies' spectrums from 3.1 GHz up to 10.6 GHz, well below -14.0dB reference levels of return loss. The size of the UWB antenna is small, with width of 31.0 mm and length...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Apr 2010

    Investigation of Foliage Effects Via Remote Data Logging at 5.8 GHz

    This paper presents an unconventional methodology in examining the extent of vegetation blockage effects imposed on Near Line-Of-Sight (NLOS) fixed wireless links based on Institute of Electrical and Electronics Engineers (IEEE) 802.11a Wireless Local Area Network (WLAN) standard operating at frequency 5.8 GHz of Unlicensed National Information Infrastructure (UNII) band....

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // May 2009

    On Coexistence and Spectrum Sharing Between IMT-Advanced and Existing Fixed Systems

    In this paper, the authors looks into coexistence and sharing between systems as a recently critical issue due to emerging new technologies and spectrum scarcity. At WRC-07, ITU-R allocated 3400-3600 MHz band for the coming Fourth Generation (4G) or IMT-Advanced on a co-primary basis along with existing Fixed Wireless Access...

    Provided By Universiti Teknikal Malaysia Melaka