Universiti Teknologi Malaysia

Displaying 1-40 of 61 results

  • White Papers // Dec 2013

    Manual Malware Analysis Using Static Method

    Today malware threats represent the greatest challenge to information security. Combat between malware writer and malware researcher never end. Malware writers use a variety of avoidance techniques such as code obfuscation, packing, anti-debugging and anti-virtualization technologies to foil researcher's analysis. On behalf of researchers they try to find out many...

    Provided By Universiti Teknologi Malaysia

  • White Papers // Jan 2013

    Mitigating Man-in-the-Browser Attacks with Hardware-Based Authentication Scheme

    Lack of security awareness amongst end users when dealing with online banking and electronic commerce leave many client side application vulnerabilities open. Thus, this is enables attackers to exploit the vulnerabilities and launch client-side attacks such as man-in-the-browser attack. The attack is designed to manipulate sensitive information via client's application...

    Provided By Universiti Teknologi Malaysia

  • White Papers // Jan 2013

    Strategic Competencies of Bumiputra Small and Medium Enterprise (SME) Owners in Central Malacca District

    This paper focuses on the strategic competencies of Bumiputra Small and Medium Enterprise (SME) owners. The aim is to identify the competencies' level among the Bumiputra SME owners and to investigate the extent of strategic management applications in the Bumiputra SME owners in Central Malacca District in achieving their business...

    Provided By Universiti Teknologi Malaysia

  • White Papers // Jun 2012

    Mobile Learning Environments for Diverse Learners in Higher Education

    ML (Mobile Learning) has extended e-learning to a new paradigm of "Anywhere, anytime learning". The potential of ML in individualization of learning process for the diverse learners should be optimized as learners learn in different ways and usually have their own styles and preferences for learning environment. Research in ML...

    Provided By Universiti Teknologi Malaysia

  • White Papers // Mar 2012

    Digital Intellectual Property Resources as a Service (DIPaaS) to Cloud Users by Using Service-Oriented Architecture (SOA)

    Cloud Computing System called Cloud Computing or simply as Cloud, is a unique style of computing, attracting academia, industry, and especially E-Commerce organizations, and is an emerging computing model. Cloud-based infrastructure is highly reliable, provides a vast variety of cloud storage, maintain higher level consistency, the strength of scalable access,...

    Provided By Universiti Teknologi Malaysia

  • White Papers // Mar 2012

    High Performance Technical Computing Through Cloud Infrastructure Services

    Cloud computing has become a popular means for providing individual and business computing services, and proved to be an affordable technology for getting IT-Enabled services from the cloud service provider or the third party. Hi-Performance Technical Computing (HPTC) need advanced memory-intensive computing load and require multi-node clustered environment which is...

    Provided By Universiti Teknologi Malaysia

  • White Papers // Mar 2012

    Biologically-Inspired Optimal Video Streaming Over Unpredictable Wireless Channel

    Recently there has been an alarming increase in demand for wireless video streaming and the need to provide the required Quality of Service (QoS) to support video applications is very crucial. It is obvious that supporting multimedia applications and services over wireless is very challenging task due to network heterogeneity...

    Provided By Universiti Teknologi Malaysia

  • White Papers // Sep 2011

    A Review of Congestion Control Algorithm for Event-Driven Safety Messages in Vehicular Networks

    Congestion control algorithm in Vehicular Ad-hoc NETworks (VANETs) has been extensively studied. However, most of congestion control algorithms are not directly applicable to uni-priority of event-driven safety messages. The event-driven safety messages have stringent requirement on delay and reliability. The uni-priority of event-driven safety messages are caused by the traffic...

    Provided By Universiti Teknologi Malaysia

  • White Papers // Sep 2011

    Enhancing Congestion Control to Address Link Failure Loss Over Mobile Ad-Hoc Network

    Standard congestion control cannot detect link failure losses which occur due to mobility and power scarcity in Multi-hop Ad-Hoc NETwork (MANET). Moreover, successive executions of Back-off algorithm deficiently grow Retransmission TimeOut (RTO) exponentially for new route. The importance of detecting and responding link failure losses is to prevent sender from...

    Provided By Universiti Teknologi Malaysia

  • White Papers // Aug 2011

    Evaluating Software Maintenance Testing Approaches to Support Test Case Evolution

    Software Maintenance Testing is essential during software testing phase. All defects found during testing must undergo a re-test process in order to eliminate the flaws. By doing so, test cases are absolutely needed to evolve and change accordingly. In this paper, several maintenance testing approaches namely regression test suite approach,...

    Provided By Universiti Teknologi Malaysia

  • White Papers // Jul 2011

    Enhanced Advancing Front Technique with Extension Cases for Initial Triangular Mesh Generation

    During the element creation procedure of initial mesh generation using the Standard Advancing Front Technique (SAFT), there is a possibility where a conflict of undecided element occurs which do not follow the normal cases. The authors proposed a direct approach to tackle this kind of problem by extending the two...

    Provided By Universiti Teknologi Malaysia

  • White Papers // Jul 2011

    User's Affinity of Choice: Features of Mobile Device Graphical Password Scheme's Anti-Shoulder Surfing Mechanism

    Presently, there are various types of graphical password schemes and anti-shoulder surfing mechanisms are available. Unfortunately, the features best suited for anti-shoulder surfing mechanism on mobile devices are still an uncertainty. Furthermore, it is futile to try embedding every single available feature into a single graphical password anti-shoulder surfing mechanism...

    Provided By Universiti Teknologi Malaysia

  • White Papers // Jul 2011

    The Use Of Disclosure Indices In Internet Financial Reporting Research

    The rapid growth of Internet technology has created the ability for firms to disseminate information to global audience. The revolution in information technology has paved the way to realize new tools, which may aid in different aspect to life. The most essential characteristics of the Internet are that information can...

    Provided By Universiti Teknologi Malaysia

  • White Papers // Jul 2011

    A Review of Cluster-Based Congestion Control Protocols in Wireless Mesh Networks

    Packet loss in Wireless Mesh Networks (WMNs) is due to congestion and probably due to high bit error rate caused by interference, link and node failures. Presently, congestion control and routing protocols in WMNs are not seen to have tamed this recurrent problem of congestion being experience most times in...

    Provided By Universiti Teknologi Malaysia

  • White Papers // May 2011

    Indoor Seamless Roaming for VoIP Using IPv6 Location Assisted Network

    In this paper, the authors present an approach to estimate the location of mobile unit in an indoor WiFi network environment. The estimated location information is then used to perform seamless session mobility across devices (i.e. device switching) in an IPv6 network. Prototype implementation of such location-assisted device switching has...

    Provided By Universiti Teknologi Malaysia

  • White Papers // May 2011

    Seamless Multimedia Communication Applications Using Location Tracking Platform on IPv6 Network

    Due to significant popularity of location-based services and multimedia communication over mobile devices, many researches have been conducted to extend the features of location tracking and make it cost-effective to users. This paper focuses on the performance of an indoor location tracking system on IPv6 Network Island with multiple real...

    Provided By Universiti Teknologi Malaysia

  • White Papers // May 2011

    An Efficient Stream Cipher Algorithm for Data Encryption

    Nowadays the data telecommunication security has been provided by most of well-known stream cipher algorithms which are already implemented in different secure protocols such as GSM, SSL, TLS, WEP, Bluetooth etc. These algorithms are A5/1, A5/2, E0 and RC4. On the other hand, these public algorithms already faced to serious...

    Provided By Universiti Teknologi Malaysia

  • White Papers // May 2011

    Selective Acknowledgement Scheme to Mitigate Routing Misbehavior in Mobile Ad Hoc Network

    Mobile Ad Hoc NETworks (MANETs) rely on the preliminary hypothesis that all co-operating nodes completely cooperate in an infrastructureless wireless network. Each node helps each other to perform network functions in a selforganization way. However, some nodes in a network may oppose to cooperating with others to avoid consuming their...

    Provided By Universiti Teknologi Malaysia

  • White Papers // Apr 2011

    Fuzzy Logic Partition-Based Call Admission Control for Mobile WiMAX

    The unpredictable nature of the wireless network and exponential growth in traffics with different quality of service requirements has led hardware complexity to escalate. In order to effectively control and manage the network traffics, there is a need for intelligent Call Admission Control (CAC) in admitting traffics into the wireless...

    Provided By Universiti Teknologi Malaysia

  • White Papers // Mar 2011

    Fixed Wireless Service Coexistence With IMT-A System Within UHF Band

    Coexistence analysis is exceedingly important in investigating the possibility for spectrum sharing between IMT-A system and existing wireless services. The 470-862 MHz frequency band is currently allocating to several services such Fixed Wireless Access (FWA). International Telecommunication Union-Radio (ITU-R) sector has allocated sub-bands within 470-862 MHz for IMT-A system. This...

    Provided By Universiti Teknologi Malaysia

  • White Papers // Mar 2011

    Mobility and Signal Strength-Aware Handover Decision in Mobile IPv6 Based Wireless LAN

    Existing wireless networks aim to provide information communication services between mobile nodes. As a mobile node move between different radio networks, a handover process is needed to change its point of attachment to the predicted radio network. Since traditional (based on one metric Received Signal Strength Indicator) predictions of handover...

    Provided By Universiti Teknologi Malaysia

  • White Papers // Mar 2011

    Message Propagation in Vehicular Ad Hoc Networks Under Free Flow and Congested Flow Scenarios

    Vehicular Ad hoc NETwork (VANET), a subclass of mobile ad hoc networks (MANETs), is a promising approach for the Intelligent Transportation System (ITS). The key difference of VANET and MANET is the special mobility pattern and rapidly changeable topology. Temporary network fragmentation problem and the broadcast storm problem are further...

    Provided By Universiti Teknologi Malaysia

  • White Papers // Mar 2011

    GEVP: Grid Enabled Visualization Pipeline

    The current grid computing practices and techniques built on static resource management technique associate with several drawbacks. These drawbacks forced the current grid systems of taking the direction of remote viewing and zooming techniques of already processed images. There is an urgent need for algorithms and techniques to support automatic...

    Provided By Universiti Teknologi Malaysia

  • White Papers // Mar 2011

    Ubiquitous Positioning: A Taxonomy for Location Determination on Mobile Navigation System

    The location determination in obstructed area can be very challenging especially if Global Positioning System are blocked. Users will find it difficult to navigate directly on-site in such condition, especially indoor car park lot or obstructed environment. Sometimes, it needs to combine with other sensors and positioning methods in order...

    Provided By Universiti Teknologi Malaysia

  • White Papers // Feb 2011

    Cross-Layer Routing Approach in Highly Dynamic Networks

    Vehicular networks are highly mobile wireless networks that can provide wide variety of services and applications such as public safety communications, crash avoidance, multimedia and Internet access in highways. Designing routing algorithm in vehicular network is a challenging task due to rapidly changing topology and high speed mobility of vehicles....

    Provided By Universiti Teknologi Malaysia

  • White Papers // Feb 2011

    MPEG-4 Video Transmission Using Distributed TDMA MAC Protocol Over IEEE 802.15.4 Wireless Technology

    The issues of green technology nowadays give an inspiration to the researcher to make all the future design to be energy efficient. Medium Access Control (MAC) layer is the most effective layer to provide energy efficient due to its ability to control the physical radio directly. One of the important...

    Provided By Universiti Teknologi Malaysia

  • White Papers // Feb 2011

    Proposed Transport Protocol for Reliable Data Transfer in Wireless Sensor Network (WSN)

    Reliable data transport is one of the most important requirements in wireless sensor network where different applications have different reliability requirements. Additionally, the characteristic of wireless sensor network, especially dense deployment, limited processing ability, memory and power supply, provide unique design challenges at transport protocol. Therefore, assuring reliable data delivery...

    Provided By Universiti Teknologi Malaysia

  • White Papers // Feb 2011

    The Relationships Between It Flexibility, It-Business Strategic Alignment, and It Capability

    What seems to still be the main concern for managers in the corporate world across the globe is IT-business strategic alignment. This paper seeks to address the research problem about the lack of alignment between IT and business strategies. Upon reviewing various literature on this subject, it was found that...

    Provided By Universiti Teknologi Malaysia

  • White Papers // Feb 2011

    A Bidding-Based Grid Resource Selection Algorithm Using Single Reservation Mechanism

    The selection of resources that best fitting tasks in grid environments is an essential and critical factor to system performance. Current resource selection methods apply traditional mechanisms for the process of task allocation to resources, which cause performance problems. This paper proposes a resource selection algorithm in bidding based grid...

    Provided By Universiti Teknologi Malaysia

  • White Papers // Feb 2011

    Secure and Efficient Multicast Rekeying Approach for Non-Transparent Relay-Based IEEE 802.16 Networks

    Many emerging applications that depend on secure group communications demand the privacy of participants and access control at the multicast server. The multicast and broadcast services in IEEE 802.16 are efficient and power saving mechanisms, which no doubt also provide subscribers with strong and powerful security protection from the theft...

    Provided By Universiti Teknologi Malaysia

  • White Papers // Feb 2011

    Congestion Control Framework for Disseminating Safety Messages in Vehicular Ad-Hoc Networks (VANETs)

    The purpose of this paper is to propose a new congestion control framework for uni-priority of event-driven safety messages in VANETs. The uni-priority congestion is caused by the traffic of the same priority. Many of event-driven safety applications developed for VANETs is required real-time communication with high reliability and must...

    Provided By Universiti Teknologi Malaysia

  • White Papers // Jan 2011

    Comparison Process Long Execution Between PQ Algorthm and New Fuzzy Logic Algorithm for VoIP

    The transmission of voice over IP networks can generate network congestion due to weak supervision of the traffic incoming packet, queuing and scheduling. This congestion negatively affects the Quality of Service (QoS) such as delay, packet drop and packet loss. Packet delay effects will affect the other QoS such as:...

    Provided By Universiti Teknologi Malaysia

  • White Papers // Jan 2011

    Evolution of Computer Virus Concealment and Anti-Virus Techniques: A Short Survey

    This paper presents a general overview on evolution of concealment methods in computer viruses and defensive techniques employed by anti-virus products. In order to stay far from the anti-virus scanners, computer viruses gradually improve their codes to make them invisible. On the other hand, anti-virus technologies continually follow the virus...

    Provided By Universiti Teknologi Malaysia

  • White Papers // Oct 2010

    A Fuzzy Logic Classification of Incoming Packet for VoIP

    The Voice over Internet Protocol (VoIP) technology is cheaper and does not need new infrastructure because it has available in the global computer (IP) network. Unfortunately, transition from PSTN to VoIP networks have emerged new problems in voice quality. Furthermore, the transmission of voice over IP networks can generate network...

    Provided By Universiti Teknologi Malaysia

  • White Papers // Oct 2010

    Hybrid Computing Algorithm in Representing Solid Model

    This paper presents an algorithm, which is a hybrid-computing algorithm in representing solid model. The proposed algorithm contains two steps namely reconstruction and representation. In the reconstruction step, neural network with back propagation has been applied to derive the depth values of solid model that was represented by the given...

    Provided By Universiti Teknologi Malaysia

  • White Papers // Sep 2010

    Modeling An e-Government Portal And Developing A System For Tourism Industry

    Usability of the e-government portal is a crucial factor that should be considered for improving efficiency in services to citizens. In this study a heuristic design model is provided as a guideline in developing e-government portal. The quality of portals' usability lies on identifying user requirements and evaluation techniques. By...

    Provided By Universiti Teknologi Malaysia

  • White Papers // Sep 2010

    Implementation of Terrain Rendering on Mobile Device

    Recently, there are significant improvements in the capabilities of mobile devices; rendering large terrain is tedious because of the constraint in resources of mobile devices. This paper focuses on the implementation of terrain rendering on mobile device to observe some issues and current constraints occurred. Experiments are performed using two...

    Provided By Universiti Teknologi Malaysia

  • White Papers // Sep 2010

    Loop Back Connected Component Labeling Algorithm and Its Implementation in Detecting Face

    In this study, a Loop Back Algorithm for component connected labeling for detecting objects in a digital image is presented. The approach is using loop back connected component labeling algorithm that helps the system to distinguish the object detected according to their label. Deferent than whole window scanning technique, this...

    Provided By Universiti Teknologi Malaysia

  • White Papers // Jul 2010

    A Cross-Layer Approach for Minimizing Interference and Latency of Medium Access in Wireless Sensor Networks

    In low power wireless sensor networks, MAC protocols usually employ periodic sleep/wake schedule to reduce idle listening time. Even though this mechanism is simple and efficient, it results in high end-to-end latency and low throughput. On the other hand, the previously proposed CSMA/CA based MAC protocols have tried to reduce...

    Provided By Universiti Teknologi Malaysia

  • White Papers // May 2010

    The Customer Relationship Management Strategies: Personal Needs Assessment Of Training And Customer Turnover

    Understanding how to effectively manage customer relationships has become a very important topic to both academicians and practitioners in recent years. Since then, customer relationship management has become a requisite fixture at many companies around the world. Also, organizations are realizing that customers have different economic value to the company...

    Provided By Universiti Teknologi Malaysia

  • White Papers // Mar 2010

    The Mediating Effect of Cognitive and Emotional Satisfaction on Customer Loyalty

    Loyal customers are among the greatest revenue producer and are more likely to occur in a form of word-of-mouth. In the compound and vibrant Malaysian home computer retail market today, customer loyalty through word-of-mouth marketing tends to occur very slowly and is limited geographically but is a very potent method...

    Provided By Universiti Teknologi Malaysia

  • White Papers // Jan 2013

    Strategic Competencies of Bumiputra Small and Medium Enterprise (SME) Owners in Central Malacca District

    This paper focuses on the strategic competencies of Bumiputra Small and Medium Enterprise (SME) owners. The aim is to identify the competencies' level among the Bumiputra SME owners and to investigate the extent of strategic management applications in the Bumiputra SME owners in Central Malacca District in achieving their business...

    Provided By Universiti Teknologi Malaysia

  • White Papers // Jan 2013

    Mitigating Man-in-the-Browser Attacks with Hardware-Based Authentication Scheme

    Lack of security awareness amongst end users when dealing with online banking and electronic commerce leave many client side application vulnerabilities open. Thus, this is enables attackers to exploit the vulnerabilities and launch client-side attacks such as man-in-the-browser attack. The attack is designed to manipulate sensitive information via client's application...

    Provided By Universiti Teknologi Malaysia

  • White Papers // May 2009

    Online Slant Signature Algorithm Analysis

    A vector rule-based approach and analysis to on-line slant signature recognition algorithm is presented. Extracting features in signature is an intense area due to complex human behavior, which is developed through repetition. Features such as direction, slant, baseline, pressure, speed and numbers of pen ups and downs are some of...

    Provided By Universiti Teknologi Malaysia

  • White Papers // Apr 2009

    Baseline Extraction Algorithm for Online Signature Recognition

    In this paper, the authors discuss baseline extraction algorithm for online signature recognition based on vector rules. In order to recognize, verify and analyze a signature, one needs to establish the feasible computational signature features which would be required to be extracted. The main features in this case are direction,...

    Provided By Universiti Teknologi Malaysia

  • White Papers // Dec 2013

    Manual Malware Analysis Using Static Method

    Today malware threats represent the greatest challenge to information security. Combat between malware writer and malware researcher never end. Malware writers use a variety of avoidance techniques such as code obfuscation, packing, anti-debugging and anti-virtualization technologies to foil researcher's analysis. On behalf of researchers they try to find out many...

    Provided By Universiti Teknologi Malaysia

  • White Papers // Aug 2008

    Revealing the Influence of Feature Selection for Fast Attack Detection

    The success of an intrusion detection system depends on the selection of the appropriate features in detecting the intrusion activity. Selecting unnecessary features may cause computational issues and decrease the accuracy of detection. Furthermore, current research concentrates more on the technique of detection rather than revealing the reason behind the...

    Provided By Universiti Teknologi Malaysia

  • White Papers // Aug 2009

    Ant Based Self-Organized Routing Protocol for Wireless Sensor Networks

    The field of Wireless Sensor Networks (WSNs) is an important and challenging research area today. Advancements in sensor networks enable a wide range of environmental monitoring and object tracking applications. Moreover, multihop routing in WSN is affected by new nodes constantly entering/leaving the system. Therefore, biologically inspired algorithms are reviewed...

    Provided By Universiti Teknologi Malaysia

  • White Papers // May 2010

    The Customer Relationship Management Strategies: Personal Needs Assessment Of Training And Customer Turnover

    Understanding how to effectively manage customer relationships has become a very important topic to both academicians and practitioners in recent years. Since then, customer relationship management has become a requisite fixture at many companies around the world. Also, organizations are realizing that customers have different economic value to the company...

    Provided By Universiti Teknologi Malaysia

  • White Papers // Jul 2011

    User's Affinity of Choice: Features of Mobile Device Graphical Password Scheme's Anti-Shoulder Surfing Mechanism

    Presently, there are various types of graphical password schemes and anti-shoulder surfing mechanisms are available. Unfortunately, the features best suited for anti-shoulder surfing mechanism on mobile devices are still an uncertainty. Furthermore, it is futile to try embedding every single available feature into a single graphical password anti-shoulder surfing mechanism...

    Provided By Universiti Teknologi Malaysia

  • White Papers // Sep 2011

    A Review of Congestion Control Algorithm for Event-Driven Safety Messages in Vehicular Networks

    Congestion control algorithm in Vehicular Ad-hoc NETworks (VANETs) has been extensively studied. However, most of congestion control algorithms are not directly applicable to uni-priority of event-driven safety messages. The event-driven safety messages have stringent requirement on delay and reliability. The uni-priority of event-driven safety messages are caused by the traffic...

    Provided By Universiti Teknologi Malaysia

  • White Papers // Mar 2011

    Mobility and Signal Strength-Aware Handover Decision in Mobile IPv6 Based Wireless LAN

    Existing wireless networks aim to provide information communication services between mobile nodes. As a mobile node move between different radio networks, a handover process is needed to change its point of attachment to the predicted radio network. Since traditional (based on one metric Received Signal Strength Indicator) predictions of handover...

    Provided By Universiti Teknologi Malaysia

  • White Papers // Apr 2011

    Fuzzy Logic Partition-Based Call Admission Control for Mobile WiMAX

    The unpredictable nature of the wireless network and exponential growth in traffics with different quality of service requirements has led hardware complexity to escalate. In order to effectively control and manage the network traffics, there is a need for intelligent Call Admission Control (CAC) in admitting traffics into the wireless...

    Provided By Universiti Teknologi Malaysia

  • White Papers // Sep 2011

    Enhancing Congestion Control to Address Link Failure Loss Over Mobile Ad-Hoc Network

    Standard congestion control cannot detect link failure losses which occur due to mobility and power scarcity in Multi-hop Ad-Hoc NETwork (MANET). Moreover, successive executions of Back-off algorithm deficiently grow Retransmission TimeOut (RTO) exponentially for new route. The importance of detecting and responding link failure losses is to prevent sender from...

    Provided By Universiti Teknologi Malaysia

  • White Papers // Feb 2011

    MPEG-4 Video Transmission Using Distributed TDMA MAC Protocol Over IEEE 802.15.4 Wireless Technology

    The issues of green technology nowadays give an inspiration to the researcher to make all the future design to be energy efficient. Medium Access Control (MAC) layer is the most effective layer to provide energy efficient due to its ability to control the physical radio directly. One of the important...

    Provided By Universiti Teknologi Malaysia

  • White Papers // Feb 2011

    Cross-Layer Routing Approach in Highly Dynamic Networks

    Vehicular networks are highly mobile wireless networks that can provide wide variety of services and applications such as public safety communications, crash avoidance, multimedia and Internet access in highways. Designing routing algorithm in vehicular network is a challenging task due to rapidly changing topology and high speed mobility of vehicles....

    Provided By Universiti Teknologi Malaysia

  • White Papers // Apr 2010

    Employing Wavelength Diversity to Improve SOA Gain Uniformity

    In this paper, the authors propose a wavelength diversity technique for the Semiconductor Optical Amplifier (SOA) to improve the gain uniformity for ultra-high speed optical routers. In such routers, fast SOA gain recovery is required to ensure the minimum gain standard deviation and thus leading to reduction in the system...

    Provided By Universiti Teknologi Malaysia

  • White Papers // Apr 2009

    The Effect of the Input Energy on the SOA Gain With Non-Uniform Biasing

    This paper investigates the effect of input optical pulse energy on the total gain of the Semiconductor Optical Amplifier (SOA) injected with a non-uniform bias current. For ultra-high data rate applications it is essential that the SOA has a fast gain recovery response, thus resulting in maximum SOA gain and...

    Provided By Universiti Teknologi Malaysia

  • White Papers // Apr 2010

    Singular Points Detection Using Fingerprint Orientation Field Reliability

    Singular points detection is the most challenging and important process in biometrics fingerprint verification and identification systems. Singular points are used for fingerprint classification, fingerprint matching and fingerprint alignment. This paper overcomes problems of the previous methods of miss deducting or deducting spurious singular points. The authors propose a novel...

    Provided By Universiti Teknologi Malaysia

  • White Papers // Nov 2008

    Understanding The Relationship Of HR Competencies & Roles Of Malaysian Human Resource Professionals

    This paper examines the competencies and roles of Human Resource (HR) professionals in the manufacturing companies in Malaysia. The competencies include business knowledge, strategic contribution, HR delivery, personal credibility and HR technology. All these competencies were tested whether they relate to HR roles such as strategic partner, change agent, administrative...

    Provided By Universiti Teknologi Malaysia

  • White Papers // Dec 2009

    Development of IEEE802.15.4 Based Wireless Sensor Network Platform for Image Transmission

    Conventional Wireless Sensor Network (WSN) mainly deals with scalar data such as temperature, humidity, pressure and light which are very suitable for low rate and low power IEEE 802.15.4 based networking technology. The commercial off-The-Shelf (COTS) CMOS camera has fostered researchers to push WSN a step further. The unique properties...

    Provided By Universiti Teknologi Malaysia

  • White Papers // Feb 2010

    Readiness Of Malaysian Human Resource Professionals To Be A Strategic Partner

    The Ulrich's HRM Four-Role Model is used in this paper. The various roles that are examined are strategic partner, change agent, administrative expert and employee champion. All these roles will be tested whether or not they are significantly related to a firm's performance. This paper also examines the potential barriers...

    Provided By Universiti Teknologi Malaysia

  • White Papers // Sep 2010

    Modeling An e-Government Portal And Developing A System For Tourism Industry

    Usability of the e-government portal is a crucial factor that should be considered for improving efficiency in services to citizens. In this study a heuristic design model is provided as a guideline in developing e-government portal. The quality of portals' usability lies on identifying user requirements and evaluation techniques. By...

    Provided By Universiti Teknologi Malaysia

  • White Papers // Sep 2010

    Loop Back Connected Component Labeling Algorithm and Its Implementation in Detecting Face

    In this study, a Loop Back Algorithm for component connected labeling for detecting objects in a digital image is presented. The approach is using loop back connected component labeling algorithm that helps the system to distinguish the object detected according to their label. Deferent than whole window scanning technique, this...

    Provided By Universiti Teknologi Malaysia

  • White Papers // Sep 2010

    Implementation of Terrain Rendering on Mobile Device

    Recently, there are significant improvements in the capabilities of mobile devices; rendering large terrain is tedious because of the constraint in resources of mobile devices. This paper focuses on the implementation of terrain rendering on mobile device to observe some issues and current constraints occurred. Experiments are performed using two...

    Provided By Universiti Teknologi Malaysia

  • White Papers // Jun 2009

    Towards a Flow-Based Internet Traffic Classification for Bandwidth Optimization

    The evolution of the Internet into a large complex service-based network has posed tremendous challenges for network monitoring and control in terms of how to collect the large amount of data in addition to the accurate classification of new emerging applications such as peer to peer, video streaming and online...

    Provided By Universiti Teknologi Malaysia

  • White Papers // Oct 2008

    A Review of Current Routing Attacks in Mobile Ad Hoc Networks

    A Mobile Adhoc Network (MANET) is a dynamic wireless network that can be formed without any pre-existing infrastructure in which each node can act as a router. MANET has no clear line of defense, so, it is accessible to both legitimate network users and malicious attackers. In the presence of...

    Provided By Universiti Teknologi Malaysia

  • White Papers // Oct 2010

    Hybrid Computing Algorithm in Representing Solid Model

    This paper presents an algorithm, which is a hybrid-computing algorithm in representing solid model. The proposed algorithm contains two steps namely reconstruction and representation. In the reconstruction step, neural network with back propagation has been applied to derive the depth values of solid model that was represented by the given...

    Provided By Universiti Teknologi Malaysia

  • White Papers // Jan 2011

    Comparison Process Long Execution Between PQ Algorthm and New Fuzzy Logic Algorithm for VoIP

    The transmission of voice over IP networks can generate network congestion due to weak supervision of the traffic incoming packet, queuing and scheduling. This congestion negatively affects the Quality of Service (QoS) such as delay, packet drop and packet loss. Packet delay effects will affect the other QoS such as:...

    Provided By Universiti Teknologi Malaysia

  • White Papers // Jul 2010

    A Cross-Layer Approach for Minimizing Interference and Latency of Medium Access in Wireless Sensor Networks

    In low power wireless sensor networks, MAC protocols usually employ periodic sleep/wake schedule to reduce idle listening time. Even though this mechanism is simple and efficient, it results in high end-to-end latency and low throughput. On the other hand, the previously proposed CSMA/CA based MAC protocols have tried to reduce...

    Provided By Universiti Teknologi Malaysia

  • White Papers // Dec 2009

    A Survey on Recognition-Based Graphical User Authentication Algorithms

    Nowadays, user authentication is one of the important topics in information security. Strong text-based password schemes could provide with certain degree of security. However, the fact that strong passwords are difficult to memorize often leads their owners to write them down on papers or even save them in a computer...

    Provided By Universiti Teknologi Malaysia

  • White Papers // Mar 2011

    Message Propagation in Vehicular Ad Hoc Networks Under Free Flow and Congested Flow Scenarios

    Vehicular Ad hoc NETwork (VANET), a subclass of mobile ad hoc networks (MANETs), is a promising approach for the Intelligent Transportation System (ITS). The key difference of VANET and MANET is the special mobility pattern and rapidly changeable topology. Temporary network fragmentation problem and the broadcast storm problem are further...

    Provided By Universiti Teknologi Malaysia

  • White Papers // Mar 2011

    GEVP: Grid Enabled Visualization Pipeline

    The current grid computing practices and techniques built on static resource management technique associate with several drawbacks. These drawbacks forced the current grid systems of taking the direction of remote viewing and zooming techniques of already processed images. There is an urgent need for algorithms and techniques to support automatic...

    Provided By Universiti Teknologi Malaysia

  • White Papers // Feb 2011

    The Relationships Between It Flexibility, It-Business Strategic Alignment, and It Capability

    What seems to still be the main concern for managers in the corporate world across the globe is IT-business strategic alignment. This paper seeks to address the research problem about the lack of alignment between IT and business strategies. Upon reviewing various literature on this subject, it was found that...

    Provided By Universiti Teknologi Malaysia

  • White Papers // Mar 2011

    Ubiquitous Positioning: A Taxonomy for Location Determination on Mobile Navigation System

    The location determination in obstructed area can be very challenging especially if Global Positioning System are blocked. Users will find it difficult to navigate directly on-site in such condition, especially indoor car park lot or obstructed environment. Sometimes, it needs to combine with other sensors and positioning methods in order...

    Provided By Universiti Teknologi Malaysia

  • White Papers // Jan 2011

    Evolution of Computer Virus Concealment and Anti-Virus Techniques: A Short Survey

    This paper presents a general overview on evolution of concealment methods in computer viruses and defensive techniques employed by anti-virus products. In order to stay far from the anti-virus scanners, computer viruses gradually improve their codes to make them invisible. On the other hand, anti-virus technologies continually follow the virus...

    Provided By Universiti Teknologi Malaysia

  • White Papers // Sep 2008

    Interference Self-Cancellation Schemes for Space Time Frequency Block Codes MIMO-OFDM System

    This paper highlights the Space Time Frequency Block Codes (STFBC) that exploit both spatial, time and frequency diversity can be designed using Orthogonal Frequency Division Multiplexing (OFDM). Intermarried Interference (ICI) self-cancellation schemes were often employed in many OFDM systems as a simple and effective approach to suppress ICI caused by...

    Provided By Universiti Teknologi Malaysia

  • White Papers // May 2011

    An Efficient Stream Cipher Algorithm for Data Encryption

    Nowadays the data telecommunication security has been provided by most of well-known stream cipher algorithms which are already implemented in different secure protocols such as GSM, SSL, TLS, WEP, Bluetooth etc. These algorithms are A5/1, A5/2, E0 and RC4. On the other hand, these public algorithms already faced to serious...

    Provided By Universiti Teknologi Malaysia

  • White Papers // May 2011

    Selective Acknowledgement Scheme to Mitigate Routing Misbehavior in Mobile Ad Hoc Network

    Mobile Ad Hoc NETworks (MANETs) rely on the preliminary hypothesis that all co-operating nodes completely cooperate in an infrastructureless wireless network. Each node helps each other to perform network functions in a selforganization way. However, some nodes in a network may oppose to cooperating with others to avoid consuming their...

    Provided By Universiti Teknologi Malaysia

  • White Papers // Jun 2009

    A Novel Hybrid Mobile Agent Based Distributed Intrusion Detection System

    The first generation of Mobile Agents based Intrusion Detection System just had two components namely data collection and single centralized analyzer. The disadvantage of this type of intrusion detection is if connection to the analyzer fails, the entire system will become useless. In this paper, the authors propose novel hybrid...

    Provided By Universiti Teknologi Malaysia