Universiti Utara Malaysia

Displaying 1-18 of 18 results

  • White Papers // Jul 2012

    Multimedia Traffic Routing in Multilayer WDM Networks

    The advent of real-time multimedia services over the Internet has stimulated new technologies for expanding the information carrying capacity of optical network backbones. Multilayer wavelength Division Multiplexing (WDM) packet switching is an emerging technology for increasing the bandwidth of optical networks. Two algorithms for the routing of the multimedia traffic...

    Provided By Universiti Utara Malaysia

  • White Papers // May 2012

    Current Web Application Development and Measurement Practices for Small Software Firms

    This paper discusses issues on current development and measurement practices that were identified from a pilot study conducted on Jordanian small software firms. The study was to investigate whether developers follow development and measurement best practices in web applications development. The analysis was conducted in two stages: first, grouping the...

    Provided By Universiti Utara Malaysia

  • White Papers // Dec 2011

    The VPQ Scheduler in Access Point for Voip Over WLAN

    The Voice over Internet Protocol (VoIP) application has observed the fastest growth in the world of telecommunication. VoIP is seen as a short-term and long-trem transmission for voice and audio traffic. Meanwhile, VoIP is moving on Wireless Local Area Networks (WLANs) based on IEEE 802.11 standards. Currently, there are many...

    Provided By Universiti Utara Malaysia

  • White Papers // Mar 2011

    The Influence of Perceived Privacy on Customer Loyalty in Mobile Phone Services: An Empirical Research in Jordan

    Concern about the privacy of personal information and communications is the top reason many consumers have stayed out of the online services including mobile phone services. The keen competition in the communication and mobile phone service market place and the increasing numbers of mobile phone users all over the world...

    Provided By Universiti Utara Malaysia

  • White Papers // Dec 2010

    Dynamic Intrusion Detection Method for Mobile Ad Hoc Network Using CPDOD Algorithm

    Mobile Ad hoc NETworks (MANETs) are susceptible to several types of attacks due to their open medium, lack of centralized monitoring and management point, dynamic topology and other features. Many of the intrusion detection techniques developed on wired networks cannot be directly applied to MANET due to special characteristics of...

    Provided By Universiti Utara Malaysia

  • White Papers // May 2010

    Educational Approach of Refactoring in Facilitating Reverse Engineering

    Refactoring improves software codes and design. This activity often neglected by software developers because they need time to decide tactically where and when to refactor codes. Although the concepts theoretically instilled in the developer's mind, this activity is not easy to apply and visualize. This situation became more problematic when...

    Provided By Universiti Utara Malaysia

  • White Papers // Sep 2009

    The Uniformization Process of the Fast Congestion Notification (FN)

    Fast Congestion Notification (FN) is one of the proactive queue management mechanisms that practices congestion avoidance to help avoid the beginning of congestion by marking/dropping packets before the router's queue gets full; and exercises congestion control, when congestion avoidance fails, by increasing the rate of packet marking/dropping. Technically, FN avoids...

    Provided By Universiti Utara Malaysia

  • White Papers // Aug 2009

    Accessing Academic-Related Materials Through WAP Protocols

    Nowadays, wireless technology has been widely used in various applications. Mobile Internet users have been increasing rapidly around the world. Several benefits of using mobile internet includes transmitting data through querying and updating databases, e-commerce transactions and daily business application as well as in education such querying examination results. This...

    Provided By Universiti Utara Malaysia

  • White Papers // Jun 2009

    Data Pre-Processing on Web Server Logs for Generalized Association Rules Mining Algorithm

    Web log file analysis began as a way for IT administrators to ensure adequate bandwidth and server capacity on their organizations website. Log file data can offer valuable insight into web site usage. It reflects actual usage in natural working condition, compared to the artificial setting of a usability lab....

    Provided By Universiti Utara Malaysia

  • White Papers // Jun 2009

    Intelligent Failure Connection Algorithm for Detecting Internet Worms

    Morris worm showed the Internet community for the first time in 1988 that a worm could bring the Internet down in hours. Worm requires host computer with an address on the Internet and any of several vulnerabilities to create a big threat environment. It proposes intelligent early system detection mechanism...

    Provided By Universiti Utara Malaysia

  • White Papers // Apr 2009

    Visualizing the Pattern for Hard Disk Media Yield Prediction

    In a hard disk media manufacturing, engineers rely on inspection machine to generate production yield temporal data that can be used for future analysis. To proactively perform process maintenance on the equipment in order to avoid unnecessary unplanned down time, they have to be able to predict the yield outcome...

    Provided By Universiti Utara Malaysia

  • White Papers // Nov 2008

    Detecting Rogue Access Point (RAP) Using Simple Network Management Protocol (SNMP)

    Rogue Access Points (RAPs) expose the enterprise network to a barrage of security vulnerabilities in that they are typically connected to a network port behind the firewall. It will break any security implementation without a notice. Detecting RAP is vital to clear any threat to network environment. This paper is...

    Provided By Universiti Utara Malaysia

  • White Papers // Nov 2008

    A Survey of Cellular IP in the Next Generation of Network Protocol

    The main objective of mobility management in wireless data communication is to allow networks to search and locate (location management) mobile users while maintaining its connections (handoff management) whenever users move into a new network. Management of location and handoff divided into macromobility (for managing inter-domain network) and micromobility (for...

    Provided By Universiti Utara Malaysia

  • White Papers // Nov 2008

    A Cluster-Based Distributed Hierarchical IDS for MANETs

    Many attempts were made to secure wireless ad hoc networks, but due to special ad-hoc nature, which is lack of a fixed infrastructure and central management, finding an optimal and comprehensive security solution is still a research challenge. Intrusion detection system is one of key techniques and best solution instead...

    Provided By Universiti Utara Malaysia

  • White Papers // Nov 2008

    A New Routing Protocol for Wireless Ad-Hoc Networks

    In recent years, a number of routing protocols for Mobile Ad Hoc wireless networks have been developed and have found many applications including multiple routing protocols In Ad-Hoc mobile network, multi-hop wireless links are popular applications as they are less routing overhead in order to reduce the network congestion as...

    Provided By Universiti Utara Malaysia

  • White Papers // Nov 2008

    CogRadNet: Ubiquitous Heterogenous Wireless Networks

    Mobile radio systems have shown rapid growth and hence increase the awareness for more efficient use of spectrum. With the advancements of technology, the development of radio systems that is dynamic and efficient in term of spectrum usage can be realized. Cognitive radio system is one of the advancement that...

    Provided By Universiti Utara Malaysia

  • White Papers // Nov 2008

    Performance Analysis of TCP Using AODV Routing Protocol in Wireless Ad-Hoc Network

    TCP is transmission control protocol based on end-to-end reliable transmission. Particularly, network component become to follow wireless and mobile network from wired network proposed that many TCP algorithm optimized in variety environment. When TCP was created, however as it was design based on wired link, wireless link made more transmission...

    Provided By Universiti Utara Malaysia

  • White Papers // Nov 2008

    Simulation Study Of Blackhole Attack in the Mobile Ad Hoc Networks

    A Wireless ad-hoc network is a temporary network set up by wireless mobile computers (or nodes) moving arbitrary in the places that have no network infrastructure. Due to security vulnerabilities of the routing protocols, wireless ad-hoc networks are unprotected to attacks of the malicious nodes. One of these attacks is...

    Provided By Universiti Utara Malaysia

  • White Papers // Jun 2009

    Intelligent Failure Connection Algorithm for Detecting Internet Worms

    Morris worm showed the Internet community for the first time in 1988 that a worm could bring the Internet down in hours. Worm requires host computer with an address on the Internet and any of several vulnerabilities to create a big threat environment. It proposes intelligent early system detection mechanism...

    Provided By Universiti Utara Malaysia

  • White Papers // Apr 2009

    Visualizing the Pattern for Hard Disk Media Yield Prediction

    In a hard disk media manufacturing, engineers rely on inspection machine to generate production yield temporal data that can be used for future analysis. To proactively perform process maintenance on the equipment in order to avoid unnecessary unplanned down time, they have to be able to predict the yield outcome...

    Provided By Universiti Utara Malaysia

  • White Papers // Nov 2008

    Detecting Rogue Access Point (RAP) Using Simple Network Management Protocol (SNMP)

    Rogue Access Points (RAPs) expose the enterprise network to a barrage of security vulnerabilities in that they are typically connected to a network port behind the firewall. It will break any security implementation without a notice. Detecting RAP is vital to clear any threat to network environment. This paper is...

    Provided By Universiti Utara Malaysia

  • White Papers // May 2010

    Educational Approach of Refactoring in Facilitating Reverse Engineering

    Refactoring improves software codes and design. This activity often neglected by software developers because they need time to decide tactically where and when to refactor codes. Although the concepts theoretically instilled in the developer's mind, this activity is not easy to apply and visualize. This situation became more problematic when...

    Provided By Universiti Utara Malaysia

  • White Papers // Dec 2010

    Dynamic Intrusion Detection Method for Mobile Ad Hoc Network Using CPDOD Algorithm

    Mobile Ad hoc NETworks (MANETs) are susceptible to several types of attacks due to their open medium, lack of centralized monitoring and management point, dynamic topology and other features. Many of the intrusion detection techniques developed on wired networks cannot be directly applied to MANET due to special characteristics of...

    Provided By Universiti Utara Malaysia

  • White Papers // Aug 2009

    Accessing Academic-Related Materials Through WAP Protocols

    Nowadays, wireless technology has been widely used in various applications. Mobile Internet users have been increasing rapidly around the world. Several benefits of using mobile internet includes transmitting data through querying and updating databases, e-commerce transactions and daily business application as well as in education such querying examination results. This...

    Provided By Universiti Utara Malaysia

  • White Papers // Jun 2009

    Data Pre-Processing on Web Server Logs for Generalized Association Rules Mining Algorithm

    Web log file analysis began as a way for IT administrators to ensure adequate bandwidth and server capacity on their organizations website. Log file data can offer valuable insight into web site usage. It reflects actual usage in natural working condition, compared to the artificial setting of a usability lab....

    Provided By Universiti Utara Malaysia

  • White Papers // Sep 2009

    The Uniformization Process of the Fast Congestion Notification (FN)

    Fast Congestion Notification (FN) is one of the proactive queue management mechanisms that practices congestion avoidance to help avoid the beginning of congestion by marking/dropping packets before the router's queue gets full; and exercises congestion control, when congestion avoidance fails, by increasing the rate of packet marking/dropping. Technically, FN avoids...

    Provided By Universiti Utara Malaysia

  • White Papers // Mar 2011

    The Influence of Perceived Privacy on Customer Loyalty in Mobile Phone Services: An Empirical Research in Jordan

    Concern about the privacy of personal information and communications is the top reason many consumers have stayed out of the online services including mobile phone services. The keen competition in the communication and mobile phone service market place and the increasing numbers of mobile phone users all over the world...

    Provided By Universiti Utara Malaysia

  • White Papers // Nov 2008

    A Survey of Cellular IP in the Next Generation of Network Protocol

    The main objective of mobility management in wireless data communication is to allow networks to search and locate (location management) mobile users while maintaining its connections (handoff management) whenever users move into a new network. Management of location and handoff divided into macromobility (for managing inter-domain network) and micromobility (for...

    Provided By Universiti Utara Malaysia

  • White Papers // Nov 2008

    A Cluster-Based Distributed Hierarchical IDS for MANETs

    Many attempts were made to secure wireless ad hoc networks, but due to special ad-hoc nature, which is lack of a fixed infrastructure and central management, finding an optimal and comprehensive security solution is still a research challenge. Intrusion detection system is one of key techniques and best solution instead...

    Provided By Universiti Utara Malaysia

  • White Papers // Nov 2008

    A New Routing Protocol for Wireless Ad-Hoc Networks

    In recent years, a number of routing protocols for Mobile Ad Hoc wireless networks have been developed and have found many applications including multiple routing protocols In Ad-Hoc mobile network, multi-hop wireless links are popular applications as they are less routing overhead in order to reduce the network congestion as...

    Provided By Universiti Utara Malaysia

  • White Papers // Nov 2008

    CogRadNet: Ubiquitous Heterogenous Wireless Networks

    Mobile radio systems have shown rapid growth and hence increase the awareness for more efficient use of spectrum. With the advancements of technology, the development of radio systems that is dynamic and efficient in term of spectrum usage can be realized. Cognitive radio system is one of the advancement that...

    Provided By Universiti Utara Malaysia

  • White Papers // Nov 2008

    Performance Analysis of TCP Using AODV Routing Protocol in Wireless Ad-Hoc Network

    TCP is transmission control protocol based on end-to-end reliable transmission. Particularly, network component become to follow wireless and mobile network from wired network proposed that many TCP algorithm optimized in variety environment. When TCP was created, however as it was design based on wired link, wireless link made more transmission...

    Provided By Universiti Utara Malaysia

  • White Papers // Nov 2008

    Simulation Study Of Blackhole Attack in the Mobile Ad Hoc Networks

    A Wireless ad-hoc network is a temporary network set up by wireless mobile computers (or nodes) moving arbitrary in the places that have no network infrastructure. Due to security vulnerabilities of the routing protocols, wireless ad-hoc networks are unprotected to attacks of the malicious nodes. One of these attacks is...

    Provided By Universiti Utara Malaysia

  • White Papers // Dec 2011

    The VPQ Scheduler in Access Point for Voip Over WLAN

    The Voice over Internet Protocol (VoIP) application has observed the fastest growth in the world of telecommunication. VoIP is seen as a short-term and long-trem transmission for voice and audio traffic. Meanwhile, VoIP is moving on Wireless Local Area Networks (WLANs) based on IEEE 802.11 standards. Currently, there are many...

    Provided By Universiti Utara Malaysia

  • White Papers // Jul 2012

    Multimedia Traffic Routing in Multilayer WDM Networks

    The advent of real-time multimedia services over the Internet has stimulated new technologies for expanding the information carrying capacity of optical network backbones. Multilayer wavelength Division Multiplexing (WDM) packet switching is an emerging technology for increasing the bandwidth of optical networks. Two algorithms for the routing of the multimedia traffic...

    Provided By Universiti Utara Malaysia

  • White Papers // May 2012

    Current Web Application Development and Measurement Practices for Small Software Firms

    This paper discusses issues on current development and measurement practices that were identified from a pilot study conducted on Jordanian small software firms. The study was to investigate whether developers follow development and measurement best practices in web applications development. The analysis was conducted in two stages: first, grouping the...

    Provided By Universiti Utara Malaysia