Universiti Teknikal Malaysia Melaka

Displaying 1-40 of 55 results

  • White Papers // Dec 2013

    Implementing Test Management Traceability Model To Support Test Documents

    Documentation is one of the key quality factors in software development. However, many developers are still putting less effort and less priority on documentation. To them writing documentation during project development is very tedious and time consuming. As a result, the documentation tends to be significantly out-dated, poor quality and...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Oct 2013

    A Review on Green Software Development in a Cloud Environment Regarding Software Development Life Cycle: (SDLC) Perspective

    Cloud Computing (CC) has been recognized and gained significant importance as an approach that can be used to save the energy of resources being used by organizations. CC is crucial in virtualization; that is helpful to reduce the use of the number of power consuming servers. Virtualization itself is being...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Jun 2013

    User Resistance Factors in Post ERP Implementation

    Enterprise Resource Planning (ERP) systems are becoming mature technologies to support inter- and intra-company business processes. However, one of the factors frequently cited as the major reason for the failure of ERP system in post implementation is \"User Resistance\". ERP implementation doesn't finish after Go-Live, instead the real test of...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Jun 2013

    An Integrated Theoretical Framework for Cloud Computing Adoption by Small and Medium-Sized Enterprises

    Due to socio-technical reasons, cloud services are usually deployed in a heterogeneous network where both human and non-human actors are equally important in the process of technology adoption. Close examination of Information Systems adoption and diffusion theories shows that human and non-human actors, as the major elements in every heterogeneous...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Jun 2013

    Implementation of Energy Storage in a Future Smart Grid

    Modernization of power usage and design is demanding for new control and operation strategies of the smart grid. The changes in load control system coupled with the variable and stochastic nature of renewable energy integrated in the smart grid offers a new set of challenges in balancing generation and consumption....

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Jun 2013

    An Effective Model for Evaluating Organizational Risk and Cost in ERP Implementation by SME

    Enterprise Resource Planning (ERP) implementations in the context of small medium size enterprises are discussed in this paper. It is essential for small businesses to success implementation an ERP system to maintain control of their risks. ERP implementation is costly and risky for small and medium enterprises. Paper identified from...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Jun 2013

    Security Model for Microsoft Based Mobile Sales Management Application in Private Cloud Computing

    The Microsoft-based mobile sales management application is a sales force management application that currently running on Windows Mobile 6.5. It handles sales-related activity and cuts down the administrative task of sales representative. Then, Windows launch a new mobile operating system, Windows Phone and stop providing support to Windows Mobile. This...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // May 2013

    An Adaptive Intrusion Detection Model Based on Machine Learning Techniques

    Intrusion detection continues to be an active research field. Even after 20 years of research, the intrusion detection community still faces several difficult problems. Detecting unknown patterns of attack without generating too many false alerts remains an unresolved problem. Although recently, several results have shown that there is a potential...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Apr 2013

    Customer Oriented Business Process Improvement Methodlogy for Public Sector Organizations

    The globalization of businesses and the germination of customer satisfaction importance induced a profound transfer from transitional to relational marketing, together with the introduction of relationship marketing concept. To surmount this transition, business process improvement is acknowledged as one of the prevailing methods to conduct changes in organizations. Concerning the...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Apr 2013

    Performance Analysis of SRTLD and BIOSARP Protocols in Wireless Sensor Networks

    With the growing of wireless network technology researchers find that Wireless Sensor Network (WSN) is one the newest technology to make the life more comfortable and interesting. Security is needed to ensure the communication between the sensor node which is already a part from the same network and not outside...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Apr 2013

    A Brief Review of Mobile Cloud Computing Opportunities

    Cloud Computing (CC) is becoming popular as the latest technology in the infrastructure of the computing world. The CC allows the users to make use of the resources when needed. Mobile Cloud Computing (MCC) combines the cloud computing concept into a mobile setting and manages to deter barriers associated with...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Mar 2013

    Medium Access Control with Token Approach in Wireless Sensor Network

    Hybrid Medium Access Control (MAC) design in Wireless Sensor Network (WSN) brings a new research challenge nowadays. Hybrid MAC gives significant improvement in network performance especially in terms of energy efficiency and reliability of the network. Some of the data are sensitive to loss in the medium such as video...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Feb 2013

    Identifying Benefits and Risks Associated With Utilizing Cloud Computing

    Cloud computing is an emerging computing model where IT and computing operations are delivered as services in highly scalable and cost effective manner. Recently, embarking this new model in business has become popular. Companies in diverse sectors intend to leverage cloud computing architecture, platforms and applications in order to gain...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Feb 2013

    A Survey on Methods to Defend Against DDoS Attack in Cloud Computing

    Cloud computing is a revolution in IT technology by providing a shared pool of virtualizes resources for its users to pay as they use. This technology is based on two crucial concepts as virtualization and abstraction, which increased the ability of on demand access through the available resources in the...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Feb 2013

    An Overview on Methods to Detect Port Scanning Attacks in Cloud Computing

    Cloud computing has become a controversial subject in the future of computer networks. Furthermore, it has emerged as a major information and communications technology leaning. The most important problem in cloud computing environment that enterprises are focused on is security concerns. One of the challenges in cloud environment is to...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Jan 2013

    A Formal Semantic for Scenario-Based Model Using Algebraic Semantics Framework for MOF

    Model-driven development uses models to represent system artifacts to improve the visibility of the system towards the real world. The development of models is underlying in the Meta-Object Facility (MOF) standard in order to define the building concepts of metamodel and models. However, these concepts, especially within MOF standard, are...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Dec 2012

    Multi-criteria Receiver Self-Election Scheme for Optimal Packet Forwarding in Vehicular Ad hoc Networks

    In most of the existing geographical forwarding methods of Vehicular Ad hoc NETwork (VANET), a node periodically sends "Hello" messages to determine the positional information of its direct neighbors. Each node stores and maintains more or less accurate information of its direct neighbors in a table. However, due to high...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Oct 2012

    Associated Risks of Cloud Computing for SMEs

    Cloud computing is an emerging computing model, which changed the whole picture that distributed computing used to present. Although, Cloud offers great benefits, it introduces a myriad of threats. These threats must be overcome in order to benefit fully from this new computing exemplar. This paper reveals benefits of exploiting...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Oct 2012

    Users Authentication and Privacy Control of RFID Card

    Security and Privacy concerns in Radio Frequency IDentification (RFID) technology particularly RFID Card, is a wide research area which have attracted researchers for over a decade. Authenticating users at the Card end of the RFID technology constitutes one of the major sources of attacks on the system. In this paper,...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Oct 2012

    Identifying Critical Features for Network Forensics Investigation Perspectives

    Research in the field of network forensics is gradually expanding with the propensity to fully accommodate the tenacity to help in adjudicating, curbing and apprehending the exponential growth of cyber crimes. However, investigating cyber crime differs, depending on the perspective of investigation. There is therefore the need for a comprehensive...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Oct 2012

    Cost Benefits Maximization Using Discount Cost Function for Embedded System Architecture Optimization

    Developing a system architecture that satisfies the functional requirements and keeping the quality attributes high is still an open challenge. The task of selecting the optimal combination and redundancy levels of components (which is known as RAP problem) that meet system-level constraints is hard since each one of these alternatives...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Oct 2012

    Metaheuristic Search Approach Based on In-House/Out-Sourced Strategy to Solve Redundancy Allocation Problem in Component-Based Software Systems

    The redundant components' nodes are widely used as design tactic to improve the reliability of complex embedded systems. The challenge is that; the obtained solution might not be sufficient because it demands high cost, and the system might be failed if the predicted cost does not estimated reasonably. Many publications...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Oct 2012

    Information Systems of Supply Chain Management in SMEs: Sustainable Approach

    Conventional Supply Chain Management (SCM) considered only three stages: pre-manufacture, manufacture and use, while the present enterprises and specially the Small and Medium sized Enterprises (SMEs) need to consider the Sustainable Supply Chain Management (SSCM) for competitive and stability in the market. It means this chain have to consider from...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Aug 2012

    Context-Aware Cloud Computing for Construction Collaboration

    The construction industry has been characterised by fragmentation, lack of integration and complexities in processes and activities. These characteristics could threaten the delivery of project objectives which could ultimately have a negative impact on construction project success. The construction industry is associated with numerous activities, processes, organizations and individuals. Improving...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Aug 2012

    A Survey of Intrusion Detection Schemes in Wireless Sensor Networks

    In this paper, the authors present a survey of intrusion detection schemes in WSNs. First, they present the similar works and show their differences from this work. After that, they outline the fundamentals of intrusion detection in WSNs, describing the types of attacks and state the motivation for intrusion detection...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Aug 2012

    Performance Evaluation of Mobile U-Navigation Based on GPS/WLAN Hybridization

    This paper present the authors' mobile u-navigation system. This approach utilizes hybridization of wireless local area network and Global Positioning System internal sensor which to receive signal strength from access point and the same time retrieve Global Navigation System Satellite signal. This positioning information will be switched based on type...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Aug 2012

    Cloud Computing Technology for Collaborative Information System in Construction Industry

    The fragmentation, poor integration and adversarial relationships among players in the construction industry has been one of the main barriers of the successful construction project delivery contributing to negative influence on project objectives. There are many processes, organizations and people involved within the construction industry. Enhanced collaboration with construction parties...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Aug 2012

    GA-Based Parameter Tuning in Finger-Vein Biometric Embedded Systems for Information Security

    As concerns about security in networking and communication systems rise with their rapid technology advancements, the need for more reliable and stronger user authentication techniques has also increased. Traditional security methods such as personal identification number, password, and key smart cards are proving to be more and more inadequate, especially...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Aug 2012

    An Investigation Concerning the Correlation Between User Satisfaction and ICT's Development in Social Networks

    This paper is to determine the correlation of social networks with Information and Communication Technology (ICT) and the rate of user satisfaction and loyalty in social networks, An Investigation concerning the effects of Information Technology (IT) in this field will lead to development in services that all social networks prepare...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Jul 2012

    Signature-Based Multi-Layer Distributed Intrusion Detection System Using Mobile Agents

    The Internet and computer networks are exposed to an increasing number of security threats. With new types of attacks appearing continually, developing flexible and adaptive security oriented approaches is a severe challenge. Intrusions Detection Systems (IDSs) are systems that try to detect attacks as they occur or after the attacks...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Jul 2012

    The Efficiencies of Decoding Methods in Random Network Coding for Video Streaming

    In the recent years, video streaming over wireless networks has become very popular. Users can join the network easily and move from one point to another with no restriction. On the other hand, there are some problems in providing smooth video playback in these nodes due to time-varying channels, obstacles...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Jun 2012

    Sensitive Digital Image Watermarking for Copyright Protection

    In this paper, a watermark hiding scheme for copyright protection of sensitive images is proposed. The concept of Visual Cryptography is used, so that the original host image is not altered. The proposed scheme aims at improving the security of the related schemes. The scheme also reduces the size of...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Apr 2012

    A Tree Model for Identification of Threats as the First Stage of Risk Assessment in HIS

    Security remains to be a critical issue in the safe operation of Information Systems (IS). Identifying the threats to IS may lead to an effective method for measuring security as the initial stage for risk management. Despite many attempts to classify threats to IS, new threats to Health Information Systems...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Apr 2012

    Investment in Technology Based Small and Medium Sized Firms in Malaysia: Roles for Commercial Banks

    Financing is an important input in every business which allows for the smooth running of day-to-day operations, asset acquisitions, expert recruitment, and development of marketing and distribution channels. This is especially the case for high-tech startups that must undergo four development stages to turn ideas into commercial products and become...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Feb 2012

    Wind-Induced Slow Fading in Foliated Fixed Wireless Links

    This paper investigates the characteristics of wind-induced slow fading in fixed wireless links where the first Fresnel Zone is partially obstructed by trees. Based on results from long term propagation measurements at 5.8GHz, the authors show that, besides seasonal and fast fading, the received signal in foliated fixed wireless links...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Feb 2012

    A Hybrid Approach for Web Service Selection

    Web service selection which is specified to evaluate and select the best candidate from discovered Web services became one of the most significant topics in recent research on Service Oriented Architecture (SOA). In this paper, the authors propose a hybrid approach to solve Web service selection problem. First, they apply...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Jan 2012

    A Robust Diverged Localization and Recognition of License Registration Characters

    Wireless ad hoc nodes are freely and dynamically self-organize in communicating with others. Each node can act as host or router. However, it actually depends on the capability of nodes in terms of its current power level, signal strength, number of hops, routing protocol, interference and others. In this research,...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Nov 2011

    A Requirement Based Test Coverage Analysis Using Software Traceability Approach

    Test coverage is an important deliverable of a software testing process. Many papers have been published detailing on how to get coverage information by either code based testing (white box) or requirement based testing (black box). This paper describes a gray box analyzer prototype, GRAYzer that the authors developed to...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Aug 2011

    Congestive Loss in Wireless Ad Hoc Network

    Communication in wireless network is quite susceptible to mobility, nodes capacity and power consumption level. These might contributes to the major problem of TCP performance degradation where there are highly potential of packet loss and packet reordering. In this paper, the authors manage to observe the impact of packet behavior...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Jul 2011

    Information Security Solutions Status and the Roadmap for Future Requirements

    Information Security (InfoSec) Surveys conducted worldwide show that the number and type of InfoSec attacks is expanding daily. This is verified and validated through a survey discussed in this paper. The paper asks a number of questions concerning InfoSec issues, outlines a survey designed to answer these questions, and then...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Feb 2012

    Wind-Induced Slow Fading in Foliated Fixed Wireless Links

    This paper investigates the characteristics of wind-induced slow fading in fixed wireless links where the first Fresnel Zone is partially obstructed by trees. Based on results from long term propagation measurements at 5.8GHz, the authors show that, besides seasonal and fast fading, the received signal in foliated fixed wireless links...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Aug 2012

    GA-Based Parameter Tuning in Finger-Vein Biometric Embedded Systems for Information Security

    As concerns about security in networking and communication systems rise with their rapid technology advancements, the need for more reliable and stronger user authentication techniques has also increased. Traditional security methods such as personal identification number, password, and key smart cards are proving to be more and more inadequate, especially...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Oct 2012

    Cost Benefits Maximization Using Discount Cost Function for Embedded System Architecture Optimization

    Developing a system architecture that satisfies the functional requirements and keeping the quality attributes high is still an open challenge. The task of selecting the optimal combination and redundancy levels of components (which is known as RAP problem) that meet system-level constraints is hard since each one of these alternatives...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Oct 2012

    Metaheuristic Search Approach Based on In-House/Out-Sourced Strategy to Solve Redundancy Allocation Problem in Component-Based Software Systems

    The redundant components' nodes are widely used as design tactic to improve the reliability of complex embedded systems. The challenge is that; the obtained solution might not be sufficient because it demands high cost, and the system might be failed if the predicted cost does not estimated reasonably. Many publications...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Aug 2012

    An Investigation Concerning the Correlation Between User Satisfaction and ICT's Development in Social Networks

    This paper is to determine the correlation of social networks with Information and Communication Technology (ICT) and the rate of user satisfaction and loyalty in social networks, An Investigation concerning the effects of Information Technology (IT) in this field will lead to development in services that all social networks prepare...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Jul 2012

    Signature-Based Multi-Layer Distributed Intrusion Detection System Using Mobile Agents

    The Internet and computer networks are exposed to an increasing number of security threats. With new types of attacks appearing continually, developing flexible and adaptive security oriented approaches is a severe challenge. Intrusions Detection Systems (IDSs) are systems that try to detect attacks as they occur or after the attacks...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Jun 2012

    Sensitive Digital Image Watermarking for Copyright Protection

    In this paper, a watermark hiding scheme for copyright protection of sensitive images is proposed. The concept of Visual Cryptography is used, so that the original host image is not altered. The proposed scheme aims at improving the security of the related schemes. The scheme also reduces the size of...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Aug 2012

    Performance Evaluation of Mobile U-Navigation Based on GPS/WLAN Hybridization

    This paper present the authors' mobile u-navigation system. This approach utilizes hybridization of wireless local area network and Global Positioning System internal sensor which to receive signal strength from access point and the same time retrieve Global Navigation System Satellite signal. This positioning information will be switched based on type...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Dec 2012

    Multi-criteria Receiver Self-Election Scheme for Optimal Packet Forwarding in Vehicular Ad hoc Networks

    In most of the existing geographical forwarding methods of Vehicular Ad hoc NETwork (VANET), a node periodically sends "Hello" messages to determine the positional information of its direct neighbors. Each node stores and maintains more or less accurate information of its direct neighbors in a table. However, due to high...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Feb 2012

    A Hybrid Approach for Web Service Selection

    Web service selection which is specified to evaluate and select the best candidate from discovered Web services became one of the most significant topics in recent research on Service Oriented Architecture (SOA). In this paper, the authors propose a hybrid approach to solve Web service selection problem. First, they apply...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Jul 2011

    Design and Analysis of Ultra Wide Band Planar Monopole Antenna

    A novel two layered UWB antenna is proposed and designed to resonate at the full range of UWB frequencies' spectrums from 3.1 GHz up to 10.6 GHz, well below -14.0dB reference levels of return loss. The size of the UWB antenna is small, with width of 31.0 mm and length...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Apr 2010

    Investigation of Foliage Effects Via Remote Data Logging at 5.8 GHz

    This paper presents an unconventional methodology in examining the extent of vegetation blockage effects imposed on Near Line-Of-Sight (NLOS) fixed wireless links based on Institute of Electrical and Electronics Engineers (IEEE) 802.11a Wireless Local Area Network (WLAN) standard operating at frequency 5.8 GHz of Unlicensed National Information Infrastructure (UNII) band....

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // May 2009

    On Coexistence and Spectrum Sharing Between IMT-Advanced and Existing Fixed Systems

    In this paper, the authors looks into coexistence and sharing between systems as a recently critical issue due to emerging new technologies and spectrum scarcity. At WRC-07, ITU-R allocated 3400-3600 MHz band for the coming Fourth Generation (4G) or IMT-Advanced on a co-primary basis along with existing Fixed Wireless Access...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Jan 2013

    A Formal Semantic for Scenario-Based Model Using Algebraic Semantics Framework for MOF

    Model-driven development uses models to represent system artifacts to improve the visibility of the system towards the real world. The development of models is underlying in the Meta-Object Facility (MOF) standard in order to define the building concepts of metamodel and models. However, these concepts, especially within MOF standard, are...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Mar 2013

    Medium Access Control with Token Approach in Wireless Sensor Network

    Hybrid Medium Access Control (MAC) design in Wireless Sensor Network (WSN) brings a new research challenge nowadays. Hybrid MAC gives significant improvement in network performance especially in terms of energy efficiency and reliability of the network. Some of the data are sensitive to loss in the medium such as video...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Apr 2013

    Performance Analysis of SRTLD and BIOSARP Protocols in Wireless Sensor Networks

    With the growing of wireless network technology researchers find that Wireless Sensor Network (WSN) is one the newest technology to make the life more comfortable and interesting. Security is needed to ensure the communication between the sensor node which is already a part from the same network and not outside...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // May 2013

    An Adaptive Intrusion Detection Model Based on Machine Learning Techniques

    Intrusion detection continues to be an active research field. Even after 20 years of research, the intrusion detection community still faces several difficult problems. Detecting unknown patterns of attack without generating too many false alerts remains an unresolved problem. Although recently, several results have shown that there is a potential...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // May 2011

    Channel Assignment Model in Wireless Mesh Networks

    A wireless mesh network is a multi-hop network consisting of nodes called mesh routers and mesh clients. The network is self-organized and it is capable of covering a large geographical area for purposes like data gathering, communication and information processing. For communication, the nodes in the network are allocated with...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Jan 2011

    Virtualization Implementation Model for Cost Effective & Efficient Data Centers

    Data centers form a key part of the infrastructure upon which a variety of information technology services are built. They provide the capabilities of centralized repository for storage, management, networking and dissemination of data. With the rapid increase in the capacity and size of data centers, there is a continuous...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Jul 2012

    The Efficiencies of Decoding Methods in Random Network Coding for Video Streaming

    In the recent years, video streaming over wireless networks has become very popular. Users can join the network easily and move from one point to another with no restriction. On the other hand, there are some problems in providing smooth video playback in these nodes due to time-varying channels, obstacles...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Oct 2012

    Associated Risks of Cloud Computing for SMEs

    Cloud computing is an emerging computing model, which changed the whole picture that distributed computing used to present. Although, Cloud offers great benefits, it introduces a myriad of threats. These threats must be overcome in order to benefit fully from this new computing exemplar. This paper reveals benefits of exploiting...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Jun 2013

    An Integrated Theoretical Framework for Cloud Computing Adoption by Small and Medium-Sized Enterprises

    Due to socio-technical reasons, cloud services are usually deployed in a heterogeneous network where both human and non-human actors are equally important in the process of technology adoption. Close examination of Information Systems adoption and diffusion theories shows that human and non-human actors, as the major elements in every heterogeneous...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Dec 2009

    Controller Area Network (CAN) Application in Security System

    The Controller Area Network (CAN) has long been used for automotive applications as a method to enable robust serial communication. The goal was to make the system more reliable, safe and efficient while decreasing wiring harness weight and complexity. Based on these factors, a CAN bus project was carried out...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Jan 2010

    New Multi-Step Worm Attack Model

    The traditional worms such as Blaster, Code Red, Slammer and Sasser, are still infecting vulnerable machines on the internet. They will remain as significant threats due to their fast spreading nature on the internet. Various traditional worms attack pattern has been analyzed from various logs at different OSI layers such...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Aug 2009

    Tracing Technique for Blaster Attack

    Blaster worm of 2003 is still persistent, the infection appears to have successfully transitioned to new hosts as the original systems are cleaned or shut off, suggesting that the Blaster worm, and other similar worms, will remain significant Internet threats for many years after their initial release. This paper is...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Sep 2009

    A New Generic Taxonomy on Hybrid Malware Detection Technique

    Malware is a type of malicious program that replicate from host machine and propagate through network. It has been considered as one type of computer attack and intrusion that can do a variety of malicious activity on a computer. This paper addresses the current trend of malware detection techniques and...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Sep 2008

    Intrusion Alert Correlation Technique Analysis for Heterogeneous Log

    Intrusion alert correlation is multi-step processes that receives alerts from heterogeneous log resources as input and produce a high-level description of the malicious activity on the network. The objective of this study is to analyze the current alert correlation technique and identify the significant criteria in each technique that can...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Jan 2012

    A Robust Diverged Localization and Recognition of License Registration Characters

    Wireless ad hoc nodes are freely and dynamically self-organize in communicating with others. Each node can act as host or router. However, it actually depends on the capability of nodes in terms of its current power level, signal strength, number of hops, routing protocol, interference and others. In this research,...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Aug 2011

    Congestive Loss in Wireless Ad Hoc Network

    Communication in wireless network is quite susceptible to mobility, nodes capacity and power consumption level. These might contributes to the major problem of TCP performance degradation where there are highly potential of packet loss and packet reordering. In this paper, the authors manage to observe the impact of packet behavior...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Nov 2011

    A Requirement Based Test Coverage Analysis Using Software Traceability Approach

    Test coverage is an important deliverable of a software testing process. Many papers have been published detailing on how to get coverage information by either code based testing (white box) or requirement based testing (black box). This paper describes a gray box analyzer prototype, GRAYzer that the authors developed to...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Oct 2012

    Users Authentication and Privacy Control of RFID Card

    Security and Privacy concerns in Radio Frequency IDentification (RFID) technology particularly RFID Card, is a wide research area which have attracted researchers for over a decade. Authenticating users at the Card end of the RFID technology constitutes one of the major sources of attacks on the system. In this paper,...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Oct 2012

    Identifying Critical Features for Network Forensics Investigation Perspectives

    Research in the field of network forensics is gradually expanding with the propensity to fully accommodate the tenacity to help in adjudicating, curbing and apprehending the exponential growth of cyber crimes. However, investigating cyber crime differs, depending on the perspective of investigation. There is therefore the need for a comprehensive...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Aug 2009

    New Approach in Teaching Network Security Subjects

    This paper discusses a curriculum approach that will give emphasis on practical sessions of teaching network security subjects in information and communication technology courses. As one is well aware, the need to use a practice and application oriented approach in education is paramount. Research on active learning and cooperative groups...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Mar 2010

    E-Business: Obstacles And Marketing Strategy In Selling Fishing Tools In Akapiman Enterprise

    There is no doubt that in the 21st century Malaysia had entered a new era of globalization. Among others, Malaysia is faced with the new challenge especially in adoption with new business marketing through internet. The terms formerly known as e-commerce, is become a popular platform for the company in...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Aug 2012

    A Survey of Intrusion Detection Schemes in Wireless Sensor Networks

    In this paper, the authors present a survey of intrusion detection schemes in WSNs. First, they present the similar works and show their differences from this work. After that, they outline the fundamentals of intrusion detection in WSNs, describing the types of attacks and state the motivation for intrusion detection...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Apr 2012

    A Tree Model for Identification of Threats as the First Stage of Risk Assessment in HIS

    Security remains to be a critical issue in the safe operation of Information Systems (IS). Identifying the threats to IS may lead to an effective method for measuring security as the initial stage for risk management. Despite many attempts to classify threats to IS, new threats to Health Information Systems...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Aug 2012

    Cloud Computing Technology for Collaborative Information System in Construction Industry

    The fragmentation, poor integration and adversarial relationships among players in the construction industry has been one of the main barriers of the successful construction project delivery contributing to negative influence on project objectives. There are many processes, organizations and people involved within the construction industry. Enhanced collaboration with construction parties...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Jun 2013

    Implementation of Energy Storage in a Future Smart Grid

    Modernization of power usage and design is demanding for new control and operation strategies of the smart grid. The changes in load control system coupled with the variable and stochastic nature of renewable energy integrated in the smart grid offers a new set of challenges in balancing generation and consumption....

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Feb 2013

    Identifying Benefits and Risks Associated With Utilizing Cloud Computing

    Cloud computing is an emerging computing model where IT and computing operations are delivered as services in highly scalable and cost effective manner. Recently, embarking this new model in business has become popular. Companies in diverse sectors intend to leverage cloud computing architecture, platforms and applications in order to gain...

    Provided By Universiti Teknikal Malaysia Melaka

  • White Papers // Jun 2013

    An Effective Model for Evaluating Organizational Risk and Cost in ERP Implementation by SME

    Enterprise Resource Planning (ERP) implementations in the context of small medium size enterprises are discussed in this paper. It is essential for small businesses to success implementation an ERP system to maintain control of their risks. ERP implementation is costly and risky for small and medium enterprises. Paper identified from...

    Provided By Universiti Teknikal Malaysia Melaka