University of Malaya

Displaying 1-24 of 24 results

  • White Papers // Jun 2012

    A Survey on the Performances of Different Components in Search Engines and Reasons of Search Failure

    Every day, many people use web pages to find answers to their questions, and there they search for their required information. They might not know in which site they can find this information, thus they use search engines. Here, the importance of search engines is typical. Many of them have...

    Provided By University of Malaya

  • White Papers // Jun 2012

    Temperature Sensitive Wideband Spectrum-Sliced ASE

    A wideband spectrum-sliced ASE source is demonstrated using a 1480nm pumped Bismuth-based Erbium-doped fiber and a thermal controlled fiber loop mirror. The spacing of output comb can be tuned by adjusting the birefringence and the effective length of the Polarization Maintaining Fibers (PMFs) in the loop mirror. By changing the...

    Provided By University of Malaya

  • White Papers // Dec 2011

    Representing System Processes Using the Actor Model / Processor Net

    In this paper, the authors describe the issue that modern systems, being composed of multiple components, have certain processing requirements that need to be properly addressed. Unfortunately very few models and notations provide for the idea of process modeling. For this purpose, separate notations have to be used. This paper...

    Provided By University of Malaya

  • White Papers // Apr 2011

    An RFID-Based Validation System for Halal Food

    In recent years, Muslims have depended on the Halal logo, displayed on food packaging, to indicate that the products are prepared according to Halal precepts. As laid out in the Quran, Halal designates that which is lawful and permitted. However, due to the rapid development of advanced technology and the...

    Provided By University of Malaya

  • White Papers // Mar 2011

    Rule Based Bi-Directional Transformation of UML2 Activities Into Petri Nets

    Many modern software models and notations are graph based. UML 2 activities are important notations for modeling different types of behavior and system properties. In the UML 2 specification it is suggested that some forms of activity types are based on Petri net formalisms. Ideally the mapping of UML activities...

    Provided By University of Malaya

  • White Papers // Mar 2011

    Rewriting Petri Nets as Directed Graphs

    In this paper, the authors attempts to understand some of the basic properties of Petri nets and their relationships to directed graphs. Different forms of directed graphs are widely used in computer science. Normally, various names are given to these structures. e.g. Directed Acyclical Graphs (DAGs), Control Flow Graphs (CFGs),...

    Provided By University of Malaya

  • White Papers // Jan 2011

    M-Learning Curriculum Design for Secondary School: A Needs Analysis

    The learning society has currently transformed from 'Wired Society' to become 'Mobile Society' which is facilitated by wireless network. To suit to this new paradigm, m-learning was given birth and rapidly building its prospect to be included in the future curriculum. Research and studies on m-learning spruced up in numerous...

    Provided By University of Malaya

  • White Papers // Jan 2011

    Relationship Between Financing Facilities And Small And Medium Industries: Empirical Evidence From ARDL Bound Testing Approach

    A major challenge to the competitiveness of sustainable economic development is a country's global economic position. Small and medium industries, supposed to be drivers of economic development of a country, receive much of negative impact following the global economic uncertainty environment. This includes facing increasingly critical financial facilities. This paper...

    Provided By University of Malaya

  • White Papers // Dec 2010

    Attributes Of School Principals-Leadership Qualities & Capacities

    Successful leadership is not the result of simply obtaining a position, but rather possessing the knowledge and understanding of successful leadership skills along with the personal ability to effectively implement those skills. Hence, "School leaders need impressive skills to provide effective leadership in the diverse school environments". However Leadership is...

    Provided By University of Malaya

  • White Papers // Oct 2010

    Measurement of V2oIP Over Wide Area Network Between Countries Using Soft Phone and USB Phone

    In this research, the authors propose an architectural solution to integrate the video voice over IP services in campus environment network and tested over LAN and WAN. Voice over IP technology has become a discussion issue for this time being. Today, the deployment of this technology on an organization truly...

    Provided By University of Malaya

  • White Papers // Sep 2010

    Supporting Requirements Engineering with Different Petri Net Classes

    In this paper, the authors consider how Petri net main classes or categories can be used to support systems and software requirements engineering processes. In general Petri nets are classifiable into four main categories which are elementary nets, normal Petri nets, higher order nets and timed Petri nets or Petri...

    Provided By University of Malaya

  • White Papers // Jun 2010

    A Scalable and Secure Position-Based Routing Protocol for Ad-Hoc Networks

    Mobile Ad-Hoc NETworks (MANETs) are becoming increasingly popular as more and more mobile devices find their way to the public. A crucial problem in Ad-Hoc networks is finding an efficient route between a source and a destination. Due to MANET's inherent characteristics, secure routing may be one of the most...

    Provided By University of Malaya

  • White Papers // Apr 2010

    Leader Election Algorithm in 2D Torus Networks With the Presence of One Link Failure

    Leader election algorithms solve the instability problem in the network which is caused by leader failure .In this paper, the authors propose a new leader election algorithm in two dimensional torus networks. The algorithm aims to elect one node to be a new leader. The new leader is identified by...

    Provided By University of Malaya

  • White Papers // Apr 2010

    Impact of CMMI Based Software Process Maturity on COCOMO II's Effort Estimation

    The software capability maturity model has become a popular model for enhancing software development processes with the goal of developing high-quality software within budget and schedule. The software cost estimation model, constructive cost model, in its last update (constructive cost model II) has a set of seventeen cost drivers and...

    Provided By University of Malaya

  • White Papers // Feb 2010

    An Overview of Video Encryption Techniques

    With the rapid development of various multimedia technologies, more and more multimedia data are generated and transmitted in the medical, commercial, and military fields, which may include some sensitive information which should not be accessed by or can only be partially exposed to the general users. Therefore, security and privacy...

    Provided By University of Malaya

  • White Papers // Jan 2010

    A Wide-Range Survey on Recall-Based Graphical User Authentications Algorithms Based on ISO and Attack Patterns

    Nowadays, user authentication is one of the important topics in information security. Text-based strong password schemes could provide with certain degree of security. However, the fact that strong passwords being difficult to memorize often leads their owners to write them down on papers or even save them in a computer...

    Provided By University of Malaya

  • White Papers // Jan 2010

    Performance Study on Audio Codec and Session Transfer of Open Source VoIP Applications

    Voice over Internet Protocol (VoIP) application or commonly known as softphone has been developing an increasingly large market in today's telecommunication world and the trend is expected to continue with the enhancement of additional features. This includes leveraging on the existing presence services, location and contextual information to enable more...

    Provided By University of Malaya

  • White Papers // Jan 2010

    Zest Based Visualization for Requirements Negotiation

    Win-Win is one of the most common models which help systems stakeholders resolve conflicts during system Requirements Negotiation (RN). Solving conflicts, however, is barely dependent on visualizing the negotiation itself. The Zest algorithm was invented to visualize a standard e-mail discussion and demonstrate a concise overview of the discussion to...

    Provided By University of Malaya

  • White Papers // Dec 2009

    Shoulder Surfing Attack in Graphical Password Authentication

    Information and computer security is supported largely by passwords which are the principle part of the authentication process. The most common computer authentication method is to use alphanumerical username and password which has significant drawbacks. To overcome the vulnerabilities of traditional methods, visual or graphical password schemes have been developed...

    Provided By University of Malaya

  • White Papers // Nov 2009

    State of Component Models Usage: Justifying the Need for a Component Model Selection Framework

    The presence of a large number of component models has caused some difficulties in selecting suitable component models to be used, either for research purpose or for software development purpose. Lack of framework or standard that can be used to guide the process of selecting suitable component models is believed...

    Provided By University of Malaya

  • White Papers // Oct 2009

    A Survey on Usability and Security Features in Graphical User Authentication Algorithms

    User authentication is one of the important topics in information security. Text-based strong password scheme can provide security to a certain degree. However, the fact that strong passwords being difficult to memorize often leads their owners to write them down on papers or even save them in a computer file....

    Provided By University of Malaya

  • White Papers // Oct 2009

    Review of Agile Methodologies in Software Development

    During the past forty years, new software development approaches were introduced to fit the new cultures of the software development companies. Most software companies nowadays aim to produce valuable software in short time period with minimal costs, and within unstable, changing environments. Agile Methodologies were thus introduced to meet the...

    Provided By University of Malaya

  • White Papers // Oct 2009

    Software Development Effort Estimation Based on a New Fuzzy Logic Model

    Software developing has always been characterised by some metrics. In this area, one of the greatest challenges for software developers is predicting the development effort for a software system based on developer abilities, size, complexity and other metrics for the last decades. The ability to give a good estimation on...

    Provided By University of Malaya

  • White Papers // Jun 2008

    An Empirical Examination Of The Relationship Between Corporate Social Responsibility Disclosure And Financial Performance In An Emerging Market

    This paper, using longitudinal data analysis, attempts to address the question of whether CSR is linked to financial performance for PLCs in Malaysia. Despite CSR disclosure being at a nascent stage in Malaysia, the findings of this paper solidly support the outcome of the majority of results in developed markets....

    Provided By University of Malaya

  • White Papers // Jun 2008

    An Empirical Examination Of The Relationship Between Corporate Social Responsibility Disclosure And Financial Performance In An Emerging Market

    This paper, using longitudinal data analysis, attempts to address the question of whether CSR is linked to financial performance for PLCs in Malaysia. Despite CSR disclosure being at a nascent stage in Malaysia, the findings of this paper solidly support the outcome of the majority of results in developed markets....

    Provided By University of Malaya

  • White Papers // Jan 2011

    M-Learning Curriculum Design for Secondary School: A Needs Analysis

    The learning society has currently transformed from 'Wired Society' to become 'Mobile Society' which is facilitated by wireless network. To suit to this new paradigm, m-learning was given birth and rapidly building its prospect to be included in the future curriculum. Research and studies on m-learning spruced up in numerous...

    Provided By University of Malaya

  • White Papers // Jan 2010

    A Wide-Range Survey on Recall-Based Graphical User Authentications Algorithms Based on ISO and Attack Patterns

    Nowadays, user authentication is one of the important topics in information security. Text-based strong password schemes could provide with certain degree of security. However, the fact that strong passwords being difficult to memorize often leads their owners to write them down on papers or even save them in a computer...

    Provided By University of Malaya

  • White Papers // Apr 2010

    Impact of CMMI Based Software Process Maturity on COCOMO II's Effort Estimation

    The software capability maturity model has become a popular model for enhancing software development processes with the goal of developing high-quality software within budget and schedule. The software cost estimation model, constructive cost model, in its last update (constructive cost model II) has a set of seventeen cost drivers and...

    Provided By University of Malaya

  • White Papers // Jan 2010

    Zest Based Visualization for Requirements Negotiation

    Win-Win is one of the most common models which help systems stakeholders resolve conflicts during system Requirements Negotiation (RN). Solving conflicts, however, is barely dependent on visualizing the negotiation itself. The Zest algorithm was invented to visualize a standard e-mail discussion and demonstrate a concise overview of the discussion to...

    Provided By University of Malaya

  • White Papers // Apr 2011

    An RFID-Based Validation System for Halal Food

    In recent years, Muslims have depended on the Halal logo, displayed on food packaging, to indicate that the products are prepared according to Halal precepts. As laid out in the Quran, Halal designates that which is lawful and permitted. However, due to the rapid development of advanced technology and the...

    Provided By University of Malaya

  • White Papers // Nov 2009

    State of Component Models Usage: Justifying the Need for a Component Model Selection Framework

    The presence of a large number of component models has caused some difficulties in selecting suitable component models to be used, either for research purpose or for software development purpose. Lack of framework or standard that can be used to guide the process of selecting suitable component models is believed...

    Provided By University of Malaya

  • White Papers // Apr 2010

    Leader Election Algorithm in 2D Torus Networks With the Presence of One Link Failure

    Leader election algorithms solve the instability problem in the network which is caused by leader failure .In this paper, the authors propose a new leader election algorithm in two dimensional torus networks. The algorithm aims to elect one node to be a new leader. The new leader is identified by...

    Provided By University of Malaya

  • White Papers // Oct 2010

    Measurement of V2oIP Over Wide Area Network Between Countries Using Soft Phone and USB Phone

    In this research, the authors propose an architectural solution to integrate the video voice over IP services in campus environment network and tested over LAN and WAN. Voice over IP technology has become a discussion issue for this time being. Today, the deployment of this technology on an organization truly...

    Provided By University of Malaya

  • White Papers // Dec 2009

    Shoulder Surfing Attack in Graphical Password Authentication

    Information and computer security is supported largely by passwords which are the principle part of the authentication process. The most common computer authentication method is to use alphanumerical username and password which has significant drawbacks. To overcome the vulnerabilities of traditional methods, visual or graphical password schemes have been developed...

    Provided By University of Malaya

  • White Papers // Jan 2010

    Performance Study on Audio Codec and Session Transfer of Open Source VoIP Applications

    Voice over Internet Protocol (VoIP) application or commonly known as softphone has been developing an increasingly large market in today's telecommunication world and the trend is expected to continue with the enhancement of additional features. This includes leveraging on the existing presence services, location and contextual information to enable more...

    Provided By University of Malaya

  • White Papers // Feb 2010

    An Overview of Video Encryption Techniques

    With the rapid development of various multimedia technologies, more and more multimedia data are generated and transmitted in the medical, commercial, and military fields, which may include some sensitive information which should not be accessed by or can only be partially exposed to the general users. Therefore, security and privacy...

    Provided By University of Malaya

  • White Papers // Oct 2009

    Software Development Effort Estimation Based on a New Fuzzy Logic Model

    Software developing has always been characterised by some metrics. In this area, one of the greatest challenges for software developers is predicting the development effort for a software system based on developer abilities, size, complexity and other metrics for the last decades. The ability to give a good estimation on...

    Provided By University of Malaya

  • White Papers // Dec 2010

    Attributes Of School Principals-Leadership Qualities & Capacities

    Successful leadership is not the result of simply obtaining a position, but rather possessing the knowledge and understanding of successful leadership skills along with the personal ability to effectively implement those skills. Hence, "School leaders need impressive skills to provide effective leadership in the diverse school environments". However Leadership is...

    Provided By University of Malaya

  • White Papers // Jan 2011

    Relationship Between Financing Facilities And Small And Medium Industries: Empirical Evidence From ARDL Bound Testing Approach

    A major challenge to the competitiveness of sustainable economic development is a country's global economic position. Small and medium industries, supposed to be drivers of economic development of a country, receive much of negative impact following the global economic uncertainty environment. This includes facing increasingly critical financial facilities. This paper...

    Provided By University of Malaya

  • White Papers // Oct 2009

    A Survey on Usability and Security Features in Graphical User Authentication Algorithms

    User authentication is one of the important topics in information security. Text-based strong password scheme can provide security to a certain degree. However, the fact that strong passwords being difficult to memorize often leads their owners to write them down on papers or even save them in a computer file....

    Provided By University of Malaya

  • White Papers // Oct 2009

    Review of Agile Methodologies in Software Development

    During the past forty years, new software development approaches were introduced to fit the new cultures of the software development companies. Most software companies nowadays aim to produce valuable software in short time period with minimal costs, and within unstable, changing environments. Agile Methodologies were thus introduced to meet the...

    Provided By University of Malaya

  • White Papers // Jun 2012

    A Survey on the Performances of Different Components in Search Engines and Reasons of Search Failure

    Every day, many people use web pages to find answers to their questions, and there they search for their required information. They might not know in which site they can find this information, thus they use search engines. Here, the importance of search engines is typical. Many of them have...

    Provided By University of Malaya

  • White Papers // Jun 2012

    Temperature Sensitive Wideband Spectrum-Sliced ASE

    A wideband spectrum-sliced ASE source is demonstrated using a 1480nm pumped Bismuth-based Erbium-doped fiber and a thermal controlled fiber loop mirror. The spacing of output comb can be tuned by adjusting the birefringence and the effective length of the Polarization Maintaining Fibers (PMFs) in the loop mirror. By changing the...

    Provided By University of Malaya

  • White Papers // Jun 2010

    A Scalable and Secure Position-Based Routing Protocol for Ad-Hoc Networks

    Mobile Ad-Hoc NETworks (MANETs) are becoming increasingly popular as more and more mobile devices find their way to the public. A crucial problem in Ad-Hoc networks is finding an efficient route between a source and a destination. Due to MANET's inherent characteristics, secure routing may be one of the most...

    Provided By University of Malaya

  • White Papers // Dec 2011

    Representing System Processes Using the Actor Model / Processor Net

    In this paper, the authors describe the issue that modern systems, being composed of multiple components, have certain processing requirements that need to be properly addressed. Unfortunately very few models and notations provide for the idea of process modeling. For this purpose, separate notations have to be used. This paper...

    Provided By University of Malaya

  • White Papers // Sep 2010

    Supporting Requirements Engineering with Different Petri Net Classes

    In this paper, the authors consider how Petri net main classes or categories can be used to support systems and software requirements engineering processes. In general Petri nets are classifiable into four main categories which are elementary nets, normal Petri nets, higher order nets and timed Petri nets or Petri...

    Provided By University of Malaya

  • White Papers // Mar 2011

    Rule Based Bi-Directional Transformation of UML2 Activities Into Petri Nets

    Many modern software models and notations are graph based. UML 2 activities are important notations for modeling different types of behavior and system properties. In the UML 2 specification it is suggested that some forms of activity types are based on Petri net formalisms. Ideally the mapping of UML activities...

    Provided By University of Malaya

  • White Papers // Mar 2011

    Rewriting Petri Nets as Directed Graphs

    In this paper, the authors attempts to understand some of the basic properties of Petri nets and their relationships to directed graphs. Different forms of directed graphs are widely used in computer science. Normally, various names are given to these structures. e.g. Directed Acyclical Graphs (DAGs), Control Flow Graphs (CFGs),...

    Provided By University of Malaya