Universiti Teknologi MARA

Displaying 1-10 of 10 results

  • White Papers // Apr 2012

    A Survey on Cost Estimation Process in Malaysia Software Industry

    One of the issues that arise within the community of software developers is the process of estimating costs. Questions such as how and what is proper and correct process has always been a matter of much thought among them. Estimation of the exact things related to system development process taken...

    Provided By Universiti Teknologi MARA

  • White Papers // Aug 2011

    Mitigation of Black Hole Attacks for AODV Routing Protocol

    Ad hoc On Demand Vector (AODV) is a reactive routing protocol in Mobile Ad hoc NETwork (MANET). Although the protocol has been around for quite some time, but there is still security issue which made it vulnerable to various attacks such as black hole which tremendously affects the network performance....

    Provided By Universiti Teknologi MARA

  • White Papers // Aug 2011

    An Enhanced Remote Authentication Scheme Using Secure Key Exchange Protocol With Platform Integrity Attestation

    Most remote authentication schemes use key exchange protocol to provide secure communication over an untrusted network. The protocol enables remote client and host to authenticate each other and communicate securely with prearranged shared secret key or server secret key. Many remote services environment such as online banking and electronic commerce...

    Provided By Universiti Teknologi MARA

  • White Papers // May 2011

    Applying Personalization Concept to an Online Newspaper

    With the rapid growth of the size and use of World Wide Web, users are provided with massive amount of information in which only some are of interest to them. Therefore, by applying the personalization concept, the information can be customized to the needs of different users. Personalization offers different...

    Provided By Universiti Teknologi MARA

  • White Papers // Apr 2011

    Towards Rapid Development of User Defined Metaheuristics Hybridization

    It has been revealed by many research studies that metaheuristics methods are useful to solve problems in many different domains. However, the implementation involves some technical hurdles such as the steep learning curve, the abundance and complexity of the algorithms, skill in programming and the lack of user friendly platform...

    Provided By Universiti Teknologi MARA

  • White Papers // Jul 2010

    Trusted Wireless Sensor Node Platform

    Security problems related to Wireless Sensor Networks (WSN) has directly influenced the credibility of WSN applications and its services. With the advancement and demand in the WSN applications such as in military, structural health monitoring, transportation, agriculture, smart home and many more, the system stands to be exposed to too...

    Provided By Universiti Teknologi MARA

  • White Papers // Mar 2010

    Evaluation of Stable Cluster Head Election (SCHE) Routing Protocol for Wireless Sensor Networks

    The nature of wireless sensor networks necessitates specific design requirement, of which energy efficiency is paramount. One of the important parameter in ensuring a good WSN system is the routing protocol. The energy source in WSN is irreplaceable and their lifetime is limited. Thus, an energy efficient routing protocol is...

    Provided By Universiti Teknologi MARA

  • White Papers // Mar 2010

    Voice Recognition Algorithms Using Mel Frequency Cepstral Coefficient (MFCC) and Dynamic Time Warping (DTW) Techniques

    Digital processing of speech signal and voice recognition algorithm is very important for fast and accurate automatic voice recognition technology. The voice is a signal of infinite information. A direct analysis and synthesizing the complex voice signal is due to too much information contained in the signal. Therefore the digital...

    Provided By Universiti Teknologi MARA

  • White Papers // Dec 2009

    ECRM Features in Telecommunication Websites

    Electronic Commerce (ecommerce) is very important nowadays since its introduction during the inception of the Internet. Organizations had realized the advantages of using the Internet for making online transactions especially for cost reduction and also improved customers' satisfaction. The electronic Customer Relationship Management (eCRM) features are the main factors that...

    Provided By Universiti Teknologi MARA

  • White Papers // Jun 2009

    Solving Traveling Salesman Problem on Cluster Compute Nodes

    In this paper, the authors present a parallel implementation of a solution for the Traveling Salesman Problem (TSP). TSP is the problem of finding the shortest path from point A to point B, given a set of points and passing through each point exactly once. Initially a sequential algorithm is...

    Provided By Universiti Teknologi MARA

  • White Papers // Mar 2010

    Voice Recognition Algorithms Using Mel Frequency Cepstral Coefficient (MFCC) and Dynamic Time Warping (DTW) Techniques

    Digital processing of speech signal and voice recognition algorithm is very important for fast and accurate automatic voice recognition technology. The voice is a signal of infinite information. A direct analysis and synthesizing the complex voice signal is due to too much information contained in the signal. Therefore the digital...

    Provided By Universiti Teknologi MARA

  • White Papers // Jun 2009

    Solving Traveling Salesman Problem on Cluster Compute Nodes

    In this paper, the authors present a parallel implementation of a solution for the Traveling Salesman Problem (TSP). TSP is the problem of finding the shortest path from point A to point B, given a set of points and passing through each point exactly once. Initially a sequential algorithm is...

    Provided By Universiti Teknologi MARA

  • White Papers // May 2011

    Applying Personalization Concept to an Online Newspaper

    With the rapid growth of the size and use of World Wide Web, users are provided with massive amount of information in which only some are of interest to them. Therefore, by applying the personalization concept, the information can be customized to the needs of different users. Personalization offers different...

    Provided By Universiti Teknologi MARA

  • White Papers // Jul 2010

    Trusted Wireless Sensor Node Platform

    Security problems related to Wireless Sensor Networks (WSN) has directly influenced the credibility of WSN applications and its services. With the advancement and demand in the WSN applications such as in military, structural health monitoring, transportation, agriculture, smart home and many more, the system stands to be exposed to too...

    Provided By Universiti Teknologi MARA

  • White Papers // Dec 2009

    ECRM Features in Telecommunication Websites

    Electronic Commerce (ecommerce) is very important nowadays since its introduction during the inception of the Internet. Organizations had realized the advantages of using the Internet for making online transactions especially for cost reduction and also improved customers' satisfaction. The electronic Customer Relationship Management (eCRM) features are the main factors that...

    Provided By Universiti Teknologi MARA

  • White Papers // Mar 2010

    Evaluation of Stable Cluster Head Election (SCHE) Routing Protocol for Wireless Sensor Networks

    The nature of wireless sensor networks necessitates specific design requirement, of which energy efficiency is paramount. One of the important parameter in ensuring a good WSN system is the routing protocol. The energy source in WSN is irreplaceable and their lifetime is limited. Thus, an energy efficient routing protocol is...

    Provided By Universiti Teknologi MARA

  • White Papers // Aug 2011

    Mitigation of Black Hole Attacks for AODV Routing Protocol

    Ad hoc On Demand Vector (AODV) is a reactive routing protocol in Mobile Ad hoc NETwork (MANET). Although the protocol has been around for quite some time, but there is still security issue which made it vulnerable to various attacks such as black hole which tremendously affects the network performance....

    Provided By Universiti Teknologi MARA

  • White Papers // Aug 2011

    An Enhanced Remote Authentication Scheme Using Secure Key Exchange Protocol With Platform Integrity Attestation

    Most remote authentication schemes use key exchange protocol to provide secure communication over an untrusted network. The protocol enables remote client and host to authenticate each other and communicate securely with prearranged shared secret key or server secret key. Many remote services environment such as online banking and electronic commerce...

    Provided By Universiti Teknologi MARA

  • White Papers // Apr 2011

    Towards Rapid Development of User Defined Metaheuristics Hybridization

    It has been revealed by many research studies that metaheuristics methods are useful to solve problems in many different domains. However, the implementation involves some technical hurdles such as the steep learning curve, the abundance and complexity of the algorithms, skill in programming and the lack of user friendly platform...

    Provided By Universiti Teknologi MARA

  • White Papers // Apr 2012

    A Survey on Cost Estimation Process in Malaysia Software Industry

    One of the issues that arise within the community of software developers is the process of estimating costs. Questions such as how and what is proper and correct process has always been a matter of much thought among them. Estimation of the exact things related to system development process taken...

    Provided By Universiti Teknologi MARA