Universiti Teknologi PETRONAS

Displaying 1-28 of 28 results

  • White Papers // Jan 2012

    Personality Wireless Sensor Networks (PWSNs)

    In recent years, WSNs are garnering lot of interest from research community because of their unique characteristics and potential for enormous range of applications. Envision for new class of applications are being emerged such as human augmentation, enhancing social interaction etc. Misunderstanding or misinterpretation of behaviors from individuals leads to...

    Provided By Universiti Teknologi PETRONAS

  • White Papers // Jan 2012

    Conceptual Model for Electronic Clinical Record Information System

    This paper is drawn from an ongoing, large-scale project of implementing Electronic Clinical Record (ECR). The overall aim in this paper is to develop a deeper understanding of the socio-technical aspects of the complexities and challenges emerging from the implementation of the ECR, and in particular to study how to...

    Provided By Universiti Teknologi PETRONAS

  • White Papers // Dec 2011

    An Enhanced Light-Weight Anonymous Authentication and Encryption Protocol in Wireless Sensor Network

    A novel front-end noise power and SNR estimation technique based on one OFDM preamble is proposed and compared with previously published SNR estimators - none of which are front-end estimators. This paper is extended and expanded version of the previous work. It provides complete mathematics and discussion of designed algorithms...

    Provided By Universiti Teknologi PETRONAS

  • White Papers // Aug 2011

    A Study on Risk Assessment for Small and Medium Software Development Projects

    Generally, in software development, there are large, medium, and small software projects that each of them can be affected or influenced by a risk. Therefore, it requires a distinctive assessment process of the potential risks that may cause failure or loss of the project whenever they occur. From this paper,...

    Provided By Universiti Teknologi PETRONAS

  • White Papers // Aug 2011

    Agent-Based MOM Interoperability Framework for Integration and Communication of Different SOA Applications

    A lot of research works in different areas have been done on Interoperability frameworks. Each area of research has its own specification and requirements to manage a complex processing request. Interoperability framework is significantly important for utilizing heterogeneous communications and integrations in SOA systems. Various middleware technologies are often used...

    Provided By Universiti Teknologi PETRONAS

  • White Papers // Jun 2011

    Tight Coupling Internetworking Between UMTS and WLAN: Challenges, Design Architectures and Simulation Analysis

    To provide seamless internet connectivity anywhere at any time to the mobile users, there is a strong demand for the integration of wireless access networks for all-IP based Next Generation Networks (NGN). The Wireless Local Area Network (WLAN) is capable of providing high data rate at low cost. However, its...

    Provided By Universiti Teknologi PETRONAS

  • White Papers // Apr 2011

    Trust and Trusted Computing in VANET

    Last few years, vehicular networks are gaining more and more attraction from the researchers and the automobile industries. The life saving factor is the key issue in this regard. Trust is key part of security and it is undoubtedly a necessity to develop trust in vehicular network. The main aim...

    Provided By Universiti Teknologi PETRONAS

  • White Papers // Feb 2011

    A Voice Priority Queue (VPQ) Fair Scheduler for the VoIP Over WLANs

    Transmission of VoIP over packet switching networks is one of the rapidly emerging real-time Internet Protocol. The real-time application of the Voice over Internet Protocol (VoIP) is growing rapidly for it is more flexible than the traditional Public Switched Telephone Networks systems (PSTN). Meanwhile, the VoIP deployment on Wireless Local...

    Provided By Universiti Teknologi PETRONAS

  • White Papers // Jan 2011

    Denial of Service (DOS) Attack and Its Possible Solutions in VANET

    Vehicular Ad-hoc NETwork (VANET) is taking more attention in automotive industry due to the safety concern of human lives on roads. Security is one of the safety aspects in VANET. To be secure, network availability must be obtained at all times since availability of the network is critically needed when...

    Provided By Universiti Teknologi PETRONAS

  • White Papers // Jan 2011

    A New Grid Resource Discovery Framework

    Resource Discovery is an important key issue in grid systems since resource reservation and task scheduling are based on it. This paper proposes a novel semantic-based scalable decentralized grid RD framework. The paper integrates ontology, Peer-to-Peer network and intelligent agents to build the framework. The framework consists of an ontology...

    Provided By Universiti Teknologi PETRONAS

  • White Papers // Nov 2010

    A New Optimistic Replication Strategy for Large-Scale Mobile Distributed Database Systems

    This paper proposes a new optimistic replication strategy for maintaining the eventual consistency in large-scale mobile distributed database systems. The proposed strategy consists of three components in order to support the characteristics of such systems. These components are: replication architecture, updates propagation protocol, and replication method. The purpose of the...

    Provided By Universiti Teknologi PETRONAS

  • White Papers // Oct 2010

    University Students Awareness on M-Learning

    Mobile learning (M-learning) is the current technology that is becoming more popular. It uses the current mobile and wireless computing technology to complement the effectiveness of traditional learning process. This paper presents a survey from 90 undergraduate students of Universiti Teknologi PETRONAS (UTP), to identify the students' perception on M-learning....

    Provided By Universiti Teknologi PETRONAS

  • White Papers // Aug 2010

    Spectral Amplitude Coding Optical CDMA: Performance Analysis of PIIN Reduction Using VC Code Family

    Multi-User interference (MUI) is the main reason of system deterioration in the Spectral Amplitude Coding Optical Code Division Multiple Access (SAC-OCDMA) system. MUI increases with the number of simultaneous users, resulting into higher probability bit rate and limits the maximum number of simultaneous users. On the other hand, Phase Induced...

    Provided By Universiti Teknologi PETRONAS

  • White Papers // Jul 2010

    Knowledge Management and Firm Performance in SMEs: The Role of Social Capital as a Mediating Variable

    Knowledge and intellectual capital are increasingly recognized as the main sources of competitive advantages in the knowledge-based economy. Businesses, particularly those that are small- or medium-sized, find that they need to give increasing attention to knowledge management and social capital - social capital being a mediating variable between knowledge management...

    Provided By Universiti Teknologi PETRONAS

  • White Papers // May 2010

    Maximizing Lifetime of Homogeneous Wireless Sensor Network Through Energy Efficient Clustering Method

    The main purpose of this paper is to develop a mechanism to increase the lifetime of homogeneous sensor nodes by controlling long distance communication, energy balancing and efficient delivery of information. Energy efficiency is a very important issue for sensor nodes which affects the lifetime of sensor networks. To achieve...

    Provided By Universiti Teknologi PETRONAS

  • White Papers // Mar 2010

    Immune Inspired Framework for MANETs' Security

    As a comprehensive security system, researchers recently had turned to the human immune system as a very wealthy inspiration source. DNA computation, evolutionary computation, artificial neural networks, and artificial immune systems are some of the researcher interest which can be pointed out. By means of diverse kind of cells, molecules,...

    Provided By Universiti Teknologi PETRONAS

  • White Papers // Mar 2010

    Development of Multimedia Messaging Service (MMS)-Based Examination Results System

    Mobile devices are becoming more important in daily lives for information gathering, personal management, appointment management and many others. They also have gained increasing relevance in education field, for example Short Messaging Service (SMS)-based examination results system. In this particular system, though authors could gain many benefits out of it,...

    Provided By Universiti Teknologi PETRONAS

  • White Papers // Jan 2010

    Parallelization of Noise Reduction Algorithm for Seismic Data on a Beowulf Cluster

    This paper presents the parallelization of a sequential noise reduction algorithm for seismic data processing into a parallel algorithm. The parallel algorithm was developed using C language with the utilization of the Message Passing Interface (MPI) library. The proposed algorithm has been implemented on an experimental Beowulf cluster which consists...

    Provided By Universiti Teknologi PETRONAS

  • White Papers // Oct 2009

    Biologically Inspired Execution Framework for Vulnerable Workflow Systems

    The main objective of the research is to introduce a biologically inspired execution framework for workflow systems under threat due to some intrusion attack. Usually vulnerable systems need to be stop and put into wait state, hence to insure the data security and privacy while being recovered. This research ensures...

    Provided By Universiti Teknologi PETRONAS

  • White Papers // Oct 2009

    Delay and Throughput Performance of Optical WCDMA Network with Code Sharing

    All-optical networking concept promises an information transfer rate of terabits per seconds by requiring that no optoelectronic conversion occurs within the network, but only to its periphery. The most critical issue in the realization of such a network is how the resources will be shared among users, each requiring only...

    Provided By Universiti Teknologi PETRONAS

  • White Papers // Oct 2009

    Survivable System by Critical Service Recovery Model: Single Service Analysis

    This paper reported another recovery model to enhance system survivability. The model focuses on how to preserve the system and resume its critical service while incident occurs by reconfiguring the damaged critical service resources based on available resources without affecting the stability and functioning of the system. There are three...

    Provided By Universiti Teknologi PETRONAS

  • White Papers // Jul 2009

    Immune Inspired Approach for Securing Wireless Ad Hoc Networks

    New computational techniques are being developed based on the immune system concepts, seeking to solve several engineering problems. Moreover, Mobile Ad Hoc Networks (MANETs) have no clear line of defense and no fixed infrastructure; therefore, the known security techniques used for cabled networks might not work perfectly. A security approach...

    Provided By Universiti Teknologi PETRONAS

  • White Papers // Jun 2009

    Wireless Sensor Networks: Delay Guarentee and Energy Efficient MAC Protocols

    Wireless sensor networks is an emerging technology that serves as environment monitors in many applications. Yet these miniatures suffer from constrained resources in terms of computation capabilities and energy resources. Limited energy resource in these nodes demands an efficient consumption of that resource either by developing the modules itself or...

    Provided By Universiti Teknologi PETRONAS

  • White Papers // Jun 2009

    Digital Social Networks: Examining the Knowledge Characteristics

    In today's information age, numbers of organizations are still arguing on capitalizing the values of Information Technology (IT) and Knowledge Management (KM) to which individuals can benefit from and effective communication among the individuals can be established. IT exists in enabling positive improvement for communication among knowledge workers (k-workers) with...

    Provided By Universiti Teknologi PETRONAS

  • White Papers // Jun 2009

    Time Comparative Simulator for Distributed Process Scheduling Algorithms

    In any distributed systems, process scheduling plays a vital role in determining the efficiency of the system. Process scheduling algorithms are used to ensure that the components of the system would be able to maximize its utilization and able to complete all the processes assigned in a specified period of...

    Provided By Universiti Teknologi PETRONAS

  • White Papers // Nov 2008

    Remote Mobile Nodes Service Delivery Via VANET

    Human beings, naturally, love to do super things or to be super heroes at doing some things and show people their abilities, and because some of them are irresponsible people, driving at high speed might be an example of a combination result of acting as super drivers and having fun...

    Provided By Universiti Teknologi PETRONAS

  • White Papers // Nov 2008

    Security Mechanism for MANETs

    Be short of well-defined networks boundaries, shared medium, collaborative services, and dynamic nature, all are representing some of the key characteristics that distinguish mobile ad hoc networks from the conventional ones. Besides, each node is a possible part of the essential support infrastructure, cooperate with each other to make basic...

    Provided By Universiti Teknologi PETRONAS

  • White Papers // Nov 2008

    Silent Alarm: Path Optimization Route Lifetime for VANET Multi-Hop Routing Protocol

    Raising vehicle crime is one of major concerns for public opinion nowadays. One proposed solution to this issue is via development of Vehicular Ad hoc NETworks (VANET) that able vehicles to exchange information within a network without the need of installing any infrastructure along the roadside. The risk of the...

    Provided By Universiti Teknologi PETRONAS

  • White Papers // Jan 2012

    Personality Wireless Sensor Networks (PWSNs)

    In recent years, WSNs are garnering lot of interest from research community because of their unique characteristics and potential for enormous range of applications. Envision for new class of applications are being emerged such as human augmentation, enhancing social interaction etc. Misunderstanding or misinterpretation of behaviors from individuals leads to...

    Provided By Universiti Teknologi PETRONAS

  • White Papers // Jul 2010

    Knowledge Management and Firm Performance in SMEs: The Role of Social Capital as a Mediating Variable

    Knowledge and intellectual capital are increasingly recognized as the main sources of competitive advantages in the knowledge-based economy. Businesses, particularly those that are small- or medium-sized, find that they need to give increasing attention to knowledge management and social capital - social capital being a mediating variable between knowledge management...

    Provided By Universiti Teknologi PETRONAS

  • White Papers // Jul 2009

    Immune Inspired Approach for Securing Wireless Ad Hoc Networks

    New computational techniques are being developed based on the immune system concepts, seeking to solve several engineering problems. Moreover, Mobile Ad Hoc Networks (MANETs) have no clear line of defense and no fixed infrastructure; therefore, the known security techniques used for cabled networks might not work perfectly. A security approach...

    Provided By Universiti Teknologi PETRONAS

  • White Papers // Jan 2010

    Parallelization of Noise Reduction Algorithm for Seismic Data on a Beowulf Cluster

    This paper presents the parallelization of a sequential noise reduction algorithm for seismic data processing into a parallel algorithm. The parallel algorithm was developed using C language with the utilization of the Message Passing Interface (MPI) library. The proposed algorithm has been implemented on an experimental Beowulf cluster which consists...

    Provided By Universiti Teknologi PETRONAS

  • White Papers // Oct 2009

    Delay and Throughput Performance of Optical WCDMA Network with Code Sharing

    All-optical networking concept promises an information transfer rate of terabits per seconds by requiring that no optoelectronic conversion occurs within the network, but only to its periphery. The most critical issue in the realization of such a network is how the resources will be shared among users, each requiring only...

    Provided By Universiti Teknologi PETRONAS

  • White Papers // Mar 2010

    Development of Multimedia Messaging Service (MMS)-Based Examination Results System

    Mobile devices are becoming more important in daily lives for information gathering, personal management, appointment management and many others. They also have gained increasing relevance in education field, for example Short Messaging Service (SMS)-based examination results system. In this particular system, though authors could gain many benefits out of it,...

    Provided By Universiti Teknologi PETRONAS

  • White Papers // Mar 2010

    Immune Inspired Framework for MANETs' Security

    As a comprehensive security system, researchers recently had turned to the human immune system as a very wealthy inspiration source. DNA computation, evolutionary computation, artificial neural networks, and artificial immune systems are some of the researcher interest which can be pointed out. By means of diverse kind of cells, molecules,...

    Provided By Universiti Teknologi PETRONAS

  • White Papers // Jun 2009

    Wireless Sensor Networks: Delay Guarentee and Energy Efficient MAC Protocols

    Wireless sensor networks is an emerging technology that serves as environment monitors in many applications. Yet these miniatures suffer from constrained resources in terms of computation capabilities and energy resources. Limited energy resource in these nodes demands an efficient consumption of that resource either by developing the modules itself or...

    Provided By Universiti Teknologi PETRONAS

  • White Papers // Oct 2010

    University Students Awareness on M-Learning

    Mobile learning (M-learning) is the current technology that is becoming more popular. It uses the current mobile and wireless computing technology to complement the effectiveness of traditional learning process. This paper presents a survey from 90 undergraduate students of Universiti Teknologi PETRONAS (UTP), to identify the students' perception on M-learning....

    Provided By Universiti Teknologi PETRONAS

  • White Papers // Aug 2010

    Spectral Amplitude Coding Optical CDMA: Performance Analysis of PIIN Reduction Using VC Code Family

    Multi-User interference (MUI) is the main reason of system deterioration in the Spectral Amplitude Coding Optical Code Division Multiple Access (SAC-OCDMA) system. MUI increases with the number of simultaneous users, resulting into higher probability bit rate and limits the maximum number of simultaneous users. On the other hand, Phase Induced...

    Provided By Universiti Teknologi PETRONAS

  • White Papers // Jan 2011

    Denial of Service (DOS) Attack and Its Possible Solutions in VANET

    Vehicular Ad-hoc NETwork (VANET) is taking more attention in automotive industry due to the safety concern of human lives on roads. Security is one of the safety aspects in VANET. To be secure, network availability must be obtained at all times since availability of the network is critically needed when...

    Provided By Universiti Teknologi PETRONAS

  • White Papers // May 2010

    Maximizing Lifetime of Homogeneous Wireless Sensor Network Through Energy Efficient Clustering Method

    The main purpose of this paper is to develop a mechanism to increase the lifetime of homogeneous sensor nodes by controlling long distance communication, energy balancing and efficient delivery of information. Energy efficiency is a very important issue for sensor nodes which affects the lifetime of sensor networks. To achieve...

    Provided By Universiti Teknologi PETRONAS

  • White Papers // Jan 2011

    A New Grid Resource Discovery Framework

    Resource Discovery is an important key issue in grid systems since resource reservation and task scheduling are based on it. This paper proposes a novel semantic-based scalable decentralized grid RD framework. The paper integrates ontology, Peer-to-Peer network and intelligent agents to build the framework. The framework consists of an ontology...

    Provided By Universiti Teknologi PETRONAS

  • White Papers // Oct 2009

    Survivable System by Critical Service Recovery Model: Single Service Analysis

    This paper reported another recovery model to enhance system survivability. The model focuses on how to preserve the system and resume its critical service while incident occurs by reconfiguring the damaged critical service resources based on available resources without affecting the stability and functioning of the system. There are three...

    Provided By Universiti Teknologi PETRONAS

  • White Papers // Nov 2010

    A New Optimistic Replication Strategy for Large-Scale Mobile Distributed Database Systems

    This paper proposes a new optimistic replication strategy for maintaining the eventual consistency in large-scale mobile distributed database systems. The proposed strategy consists of three components in order to support the characteristics of such systems. These components are: replication architecture, updates propagation protocol, and replication method. The purpose of the...

    Provided By Universiti Teknologi PETRONAS

  • White Papers // Jun 2009

    Time Comparative Simulator for Distributed Process Scheduling Algorithms

    In any distributed systems, process scheduling plays a vital role in determining the efficiency of the system. Process scheduling algorithms are used to ensure that the components of the system would be able to maximize its utilization and able to complete all the processes assigned in a specified period of...

    Provided By Universiti Teknologi PETRONAS

  • White Papers // Oct 2009

    Biologically Inspired Execution Framework for Vulnerable Workflow Systems

    The main objective of the research is to introduce a biologically inspired execution framework for workflow systems under threat due to some intrusion attack. Usually vulnerable systems need to be stop and put into wait state, hence to insure the data security and privacy while being recovered. This research ensures...

    Provided By Universiti Teknologi PETRONAS

  • White Papers // Jun 2009

    Digital Social Networks: Examining the Knowledge Characteristics

    In today's information age, numbers of organizations are still arguing on capitalizing the values of Information Technology (IT) and Knowledge Management (KM) to which individuals can benefit from and effective communication among the individuals can be established. IT exists in enabling positive improvement for communication among knowledge workers (k-workers) with...

    Provided By Universiti Teknologi PETRONAS

  • White Papers // Feb 2011

    A Voice Priority Queue (VPQ) Fair Scheduler for the VoIP Over WLANs

    Transmission of VoIP over packet switching networks is one of the rapidly emerging real-time Internet Protocol. The real-time application of the Voice over Internet Protocol (VoIP) is growing rapidly for it is more flexible than the traditional Public Switched Telephone Networks systems (PSTN). Meanwhile, the VoIP deployment on Wireless Local...

    Provided By Universiti Teknologi PETRONAS

  • White Papers // Jun 2011

    Tight Coupling Internetworking Between UMTS and WLAN: Challenges, Design Architectures and Simulation Analysis

    To provide seamless internet connectivity anywhere at any time to the mobile users, there is a strong demand for the integration of wireless access networks for all-IP based Next Generation Networks (NGN). The Wireless Local Area Network (WLAN) is capable of providing high data rate at low cost. However, its...

    Provided By Universiti Teknologi PETRONAS

  • White Papers // Nov 2008

    Remote Mobile Nodes Service Delivery Via VANET

    Human beings, naturally, love to do super things or to be super heroes at doing some things and show people their abilities, and because some of them are irresponsible people, driving at high speed might be an example of a combination result of acting as super drivers and having fun...

    Provided By Universiti Teknologi PETRONAS

  • White Papers // Nov 2008

    Security Mechanism for MANETs

    Be short of well-defined networks boundaries, shared medium, collaborative services, and dynamic nature, all are representing some of the key characteristics that distinguish mobile ad hoc networks from the conventional ones. Besides, each node is a possible part of the essential support infrastructure, cooperate with each other to make basic...

    Provided By Universiti Teknologi PETRONAS

  • White Papers // Nov 2008

    Silent Alarm: Path Optimization Route Lifetime for VANET Multi-Hop Routing Protocol

    Raising vehicle crime is one of major concerns for public opinion nowadays. One proposed solution to this issue is via development of Vehicular Ad hoc NETworks (VANET) that able vehicles to exchange information within a network without the need of installing any infrastructure along the roadside. The risk of the...

    Provided By Universiti Teknologi PETRONAS

  • White Papers // Jan 2012

    Conceptual Model for Electronic Clinical Record Information System

    This paper is drawn from an ongoing, large-scale project of implementing Electronic Clinical Record (ECR). The overall aim in this paper is to develop a deeper understanding of the socio-technical aspects of the complexities and challenges emerging from the implementation of the ECR, and in particular to study how to...

    Provided By Universiti Teknologi PETRONAS

  • White Papers // Apr 2011

    Trust and Trusted Computing in VANET

    Last few years, vehicular networks are gaining more and more attraction from the researchers and the automobile industries. The life saving factor is the key issue in this regard. Trust is key part of security and it is undoubtedly a necessity to develop trust in vehicular network. The main aim...

    Provided By Universiti Teknologi PETRONAS

  • White Papers // Aug 2011

    A Study on Risk Assessment for Small and Medium Software Development Projects

    Generally, in software development, there are large, medium, and small software projects that each of them can be affected or influenced by a risk. Therefore, it requires a distinctive assessment process of the potential risks that may cause failure or loss of the project whenever they occur. From this paper,...

    Provided By Universiti Teknologi PETRONAS

  • White Papers // Aug 2011

    Agent-Based MOM Interoperability Framework for Integration and Communication of Different SOA Applications

    A lot of research works in different areas have been done on Interoperability frameworks. Each area of research has its own specification and requirements to manage a complex processing request. Interoperability framework is significantly important for utilizing heterogeneous communications and integrations in SOA systems. Various middleware technologies are often used...

    Provided By Universiti Teknologi PETRONAS

  • White Papers // Dec 2011

    An Enhanced Light-Weight Anonymous Authentication and Encryption Protocol in Wireless Sensor Network

    A novel front-end noise power and SNR estimation technique based on one OFDM preamble is proposed and compared with previously published SNR estimators - none of which are front-end estimators. This paper is extended and expanded version of the previous work. It provides complete mathematics and discussion of designed algorithms...

    Provided By Universiti Teknologi PETRONAS