Universiti Utara Malaysia

Displaying 1-11 of 11 results

  • White Papers // Jul 2012

    Multimedia Traffic Routing in Multilayer WDM Networks

    The advent of real-time multimedia services over the Internet has stimulated new technologies for expanding the information carrying capacity of optical network backbones. Multilayer wavelength Division Multiplexing (WDM) packet switching is an emerging technology for increasing the bandwidth of optical networks. Two algorithms for the routing of the multimedia traffic...

    Provided By Universiti Utara Malaysia

  • White Papers // May 2012

    Current Web Application Development and Measurement Practices for Small Software Firms

    This paper discusses issues on current development and measurement practices that were identified from a pilot study conducted on Jordanian small software firms. The study was to investigate whether developers follow development and measurement best practices in web applications development. The analysis was conducted in two stages: first, grouping the...

    Provided By Universiti Utara Malaysia

  • White Papers // Dec 2011

    The VPQ Scheduler in Access Point for Voip Over WLAN

    The Voice over Internet Protocol (VoIP) application has observed the fastest growth in the world of telecommunication. VoIP is seen as a short-term and long-trem transmission for voice and audio traffic. Meanwhile, VoIP is moving on Wireless Local Area Networks (WLANs) based on IEEE 802.11 standards. Currently, there are many...

    Provided By Universiti Utara Malaysia

  • White Papers // Mar 2011

    The Influence of Perceived Privacy on Customer Loyalty in Mobile Phone Services: An Empirical Research in Jordan

    Concern about the privacy of personal information and communications is the top reason many consumers have stayed out of the online services including mobile phone services. The keen competition in the communication and mobile phone service market place and the increasing numbers of mobile phone users all over the world...

    Provided By Universiti Utara Malaysia

  • White Papers // Dec 2010

    Dynamic Intrusion Detection Method for Mobile Ad Hoc Network Using CPDOD Algorithm

    Mobile Ad hoc NETworks (MANETs) are susceptible to several types of attacks due to their open medium, lack of centralized monitoring and management point, dynamic topology and other features. Many of the intrusion detection techniques developed on wired networks cannot be directly applied to MANET due to special characteristics of...

    Provided By Universiti Utara Malaysia

  • White Papers // May 2010

    Educational Approach of Refactoring in Facilitating Reverse Engineering

    Refactoring improves software codes and design. This activity often neglected by software developers because they need time to decide tactically where and when to refactor codes. Although the concepts theoretically instilled in the developer's mind, this activity is not easy to apply and visualize. This situation became more problematic when...

    Provided By Universiti Utara Malaysia

  • White Papers // Sep 2009

    The Uniformization Process of the Fast Congestion Notification (FN)

    Fast Congestion Notification (FN) is one of the proactive queue management mechanisms that practices congestion avoidance to help avoid the beginning of congestion by marking/dropping packets before the router's queue gets full; and exercises congestion control, when congestion avoidance fails, by increasing the rate of packet marking/dropping. Technically, FN avoids...

    Provided By Universiti Utara Malaysia

  • White Papers // Aug 2009

    Accessing Academic-Related Materials Through WAP Protocols

    Nowadays, wireless technology has been widely used in various applications. Mobile Internet users have been increasing rapidly around the world. Several benefits of using mobile internet includes transmitting data through querying and updating databases, e-commerce transactions and daily business application as well as in education such querying examination results. This...

    Provided By Universiti Utara Malaysia

  • White Papers // Jun 2009

    Data Pre-Processing on Web Server Logs for Generalized Association Rules Mining Algorithm

    Web log file analysis began as a way for IT administrators to ensure adequate bandwidth and server capacity on their organizations website. Log file data can offer valuable insight into web site usage. It reflects actual usage in natural working condition, compared to the artificial setting of a usability lab....

    Provided By Universiti Utara Malaysia

  • White Papers // Jun 2009

    Intelligent Failure Connection Algorithm for Detecting Internet Worms

    Morris worm showed the Internet community for the first time in 1988 that a worm could bring the Internet down in hours. Worm requires host computer with an address on the Internet and any of several vulnerabilities to create a big threat environment. It proposes intelligent early system detection mechanism...

    Provided By Universiti Utara Malaysia

  • White Papers // Apr 2009

    Visualizing the Pattern for Hard Disk Media Yield Prediction

    In a hard disk media manufacturing, engineers rely on inspection machine to generate production yield temporal data that can be used for future analysis. To proactively perform process maintenance on the equipment in order to avoid unnecessary unplanned down time, they have to be able to predict the yield outcome...

    Provided By Universiti Utara Malaysia

  • White Papers // Jun 2009

    Intelligent Failure Connection Algorithm for Detecting Internet Worms

    Morris worm showed the Internet community for the first time in 1988 that a worm could bring the Internet down in hours. Worm requires host computer with an address on the Internet and any of several vulnerabilities to create a big threat environment. It proposes intelligent early system detection mechanism...

    Provided By Universiti Utara Malaysia

  • White Papers // Apr 2009

    Visualizing the Pattern for Hard Disk Media Yield Prediction

    In a hard disk media manufacturing, engineers rely on inspection machine to generate production yield temporal data that can be used for future analysis. To proactively perform process maintenance on the equipment in order to avoid unnecessary unplanned down time, they have to be able to predict the yield outcome...

    Provided By Universiti Utara Malaysia

  • White Papers // May 2010

    Educational Approach of Refactoring in Facilitating Reverse Engineering

    Refactoring improves software codes and design. This activity often neglected by software developers because they need time to decide tactically where and when to refactor codes. Although the concepts theoretically instilled in the developer's mind, this activity is not easy to apply and visualize. This situation became more problematic when...

    Provided By Universiti Utara Malaysia

  • White Papers // Dec 2010

    Dynamic Intrusion Detection Method for Mobile Ad Hoc Network Using CPDOD Algorithm

    Mobile Ad hoc NETworks (MANETs) are susceptible to several types of attacks due to their open medium, lack of centralized monitoring and management point, dynamic topology and other features. Many of the intrusion detection techniques developed on wired networks cannot be directly applied to MANET due to special characteristics of...

    Provided By Universiti Utara Malaysia

  • White Papers // Aug 2009

    Accessing Academic-Related Materials Through WAP Protocols

    Nowadays, wireless technology has been widely used in various applications. Mobile Internet users have been increasing rapidly around the world. Several benefits of using mobile internet includes transmitting data through querying and updating databases, e-commerce transactions and daily business application as well as in education such querying examination results. This...

    Provided By Universiti Utara Malaysia

  • White Papers // Jun 2009

    Data Pre-Processing on Web Server Logs for Generalized Association Rules Mining Algorithm

    Web log file analysis began as a way for IT administrators to ensure adequate bandwidth and server capacity on their organizations website. Log file data can offer valuable insight into web site usage. It reflects actual usage in natural working condition, compared to the artificial setting of a usability lab....

    Provided By Universiti Utara Malaysia

  • White Papers // Sep 2009

    The Uniformization Process of the Fast Congestion Notification (FN)

    Fast Congestion Notification (FN) is one of the proactive queue management mechanisms that practices congestion avoidance to help avoid the beginning of congestion by marking/dropping packets before the router's queue gets full; and exercises congestion control, when congestion avoidance fails, by increasing the rate of packet marking/dropping. Technically, FN avoids...

    Provided By Universiti Utara Malaysia

  • White Papers // Mar 2011

    The Influence of Perceived Privacy on Customer Loyalty in Mobile Phone Services: An Empirical Research in Jordan

    Concern about the privacy of personal information and communications is the top reason many consumers have stayed out of the online services including mobile phone services. The keen competition in the communication and mobile phone service market place and the increasing numbers of mobile phone users all over the world...

    Provided By Universiti Utara Malaysia

  • White Papers // Dec 2011

    The VPQ Scheduler in Access Point for Voip Over WLAN

    The Voice over Internet Protocol (VoIP) application has observed the fastest growth in the world of telecommunication. VoIP is seen as a short-term and long-trem transmission for voice and audio traffic. Meanwhile, VoIP is moving on Wireless Local Area Networks (WLANs) based on IEEE 802.11 standards. Currently, there are many...

    Provided By Universiti Utara Malaysia

  • White Papers // Jul 2012

    Multimedia Traffic Routing in Multilayer WDM Networks

    The advent of real-time multimedia services over the Internet has stimulated new technologies for expanding the information carrying capacity of optical network backbones. Multilayer wavelength Division Multiplexing (WDM) packet switching is an emerging technology for increasing the bandwidth of optical networks. Two algorithms for the routing of the multimedia traffic...

    Provided By Universiti Utara Malaysia

  • White Papers // May 2012

    Current Web Application Development and Measurement Practices for Small Software Firms

    This paper discusses issues on current development and measurement practices that were identified from a pilot study conducted on Jordanian small software firms. The study was to investigate whether developers follow development and measurement best practices in web applications development. The analysis was conducted in two stages: first, grouping the...

    Provided By Universiti Utara Malaysia