21 research outputs found

    Simulation tool for active learning of introductory computer network subjects

    Get PDF
    Abstract— Simulation software helps a learner of networking subject to have an active learning experience. There are many simulator tools available either freely or off the shelf. Hence, simulation tools need to be carefully chosen to maximize the benefit to the learners. In order to choose simulation tools, comparison is made from a number of simulation tools that are easily available for the public. The comparison made to the tools produce a recommendation of which tool is to be chosen in different study environments. Keywords- computer networks, computer aided instruction, computer science education, electronic learning, network topology, hardware virtualization, next generation networkin

    Simulation tool for active learning of introductory computer network subjects

    Get PDF
    Simulation software helps a learner of networking subject to have an active learning experience. There are many simulator tools available either freely or off the shelf. Hence, simulation tools need to be carefully chosen to maximize the benefit to the learners. In order to choose simulation tools, comparison is made from a number of simulation tools that are easily available for the public. The comparison made to the tools produce a recommendation of which tool is to be chosen in different study environments

    Forecasting financial problems in emerging capital markets

    Get PDF
    The advent of the Asian Financial Crisis (AFC) in the Southeast Asia in 1997 is an appealing case for research work in assessing corporate financial distress. From international perspective, AFC is a product of contagion effect that spread from Thailand and consequently to the other Asian countries. Domestically, the AFC has resulted a sudden economic slump and corporate failures in these economies. This paper examines the corporate failure before the 1997 Asian Financial Crisis in three emerging capital markets namely Malaysia, Singapore and Thailand, and develops, tests, and analyses a model for classifying and predicting financial distress. A failure classification model based on multiple discriminant analysis was utilised to classify listed corporations from these countries for the 1980 to 1996 period. The model is tested on a sample of 33 Malaysian, 17 Singaporean and 52 Thailand failed firms and similar number of non-failed firms in the respective countries as a control sample. The failure prediction model developed successfully discriminates between failed and non-failed listed firms at the rate of 86%, 82% and 71% of Malaysian, Singaporean and Thailand firms respectively. Further validation of findings show that the predictive accuracy was significantly better than chance. © EuroJournals Publishing, Inc. 2006

    Encryption as a Service (EaaS) as a Solution for Cryptography in Cloud

    Get PDF
    AbstractIn recent years, there has been a vast interest in optimal usage of computing resources so that massive data can be processed with minimal cost. The need to use a pool of shared resources in a wide area network that provide elasticity, high capacity of computation and ability to store information on location-independent storages have led to the advent of cloud-computing. However, the global nature of cloud brings about some challenges in security domain when physical control over our information in cloud is impossible. Thus, encrypting critical data becomes essential, and strongly advisable. The server-side encryption in an untrustworthy environment like public cloud is too risky. On the other hand, client-side encryption can undermine the benefits of cloud since it is a time-consuming task for encryption and decryption. To address this issue, we developed a private cloud as an intermediary. In this paper, based on XaaS concept, we design an Encryption as a Service in order to get rid of the security risks of cloud provider's encryption and the inefficiency of client-side encryption

    Radiation measurement from mobile base stations at a university campus in Malaysia

    Get PDF
    The tremendous growth of telecommunication industry results the number of hand phone users increases everyday. In order to support the growing number of users, the mobile base stations can be seen in almost everywhere. This scenario has created uncomfortable feelings to the people that they may be affected by the radiations from antennas. A measurement was done at student hostels and office premises near to base stations in International Islamic University Malaysia, Gombak campus. Measured values are compared with Malaysian Communication and Multimedia Commission (MCMC), IEEE and ANSI recommendations for safety guidelines. The results are presented in this study

    An efficient computation technique for cryptosystems based on Lucas functions

    Get PDF
    Lucas Functions is a special form of second order linear recurrence relation. This function has been used in the LUC Cryptosystems. The encryption process of this system is the computations of V(e), while the decryption process is done by the computations of V(d). The V(e) and V(d) are both Lucas Function. The performances of computations of LUC are influence by the size of e and d. It is also depends on the size of message, M and two primes p and q. In the case of e, d, M, p and q are in a large number, we are sure that the existing algorithm would suffers a huge computations time and spaces. In this paper, we are presenting a new and efficient computations algorithm for LUC Cryptosystems. We have found that the binary sequence used in a new algorithm is shorter than a special sequence used in an existing algorithm. Once we get a generated binary sequence, we shall use this sequence to perform the LUC computations. We are examining the efficiency of this new algorithm by comparing the computation time with an existing algorithm

    Computation of private key for LUC cryptosystem

    Get PDF
    LUC cryptosystem is a public key cryptosystem based on Lucas functions. The encryption of this cryptosystem is relatively easy since we have the knowledge of public key e, two primes p and q and also the message M. Meanwhile, decryption process is difficult without the knowledge of private key d. In this paper, we are presenting a technique that can be used to compute private key for LUC cryptosystem. It is based on the existing number theory techniques. The computation of private key is possible because we know values of two primes p, q and ciphertext C. The size of two primes is important that determined the size of private key

    Computation of cryptosystem based on Lucas functions using addition chain

    Get PDF
    Cryptosystem based on Lucas Functions is known as LUC Cryptosystem. Lucas Functions are the special form of second-order linear recurrence relation using a large public integer as modulus. In this paper, an efficient computation algorithm for LUC Cryptosystem is developed. It is based on Addition Chain. The computation time for existing and new algorithms will be recorded. Smaller computation time means the algorithm is efficient than the other. New technique shows a smaller computation time compared to the existing algorithm. It also increases the efficiency of computation. At the same time, it also reduces some iteration that is involved in LUC Cryptosystem computation

    Enhancing Student Mark Management Through Web Based System

    Get PDF
    In search of technological modernization, the Internet is the main medium of delivery. Education today is seen as leading to the development of the information age. Hence the approach to education is also in line with the latest technology. The use of Information and Communication Technologies (ICT) in teaching and learning has become an important method to increase the efficiency and effectiveness of the education management process. On the other hand, the ICT is also used in education to manage student information. Management of student information especially students’ marks is a burdensome task, requiring lecturers to devote more time to complete the task within the stipulated time. Besides, the lecturers who teach more than one class and have more than one marking category such as quizzes, assignments and lab exercises find this task very complicated. The use of software such as Microsoft Excel can be helpful but cannot solve all mark management requirements due to limitation of its function. Therefore, an online students’ mark management system was developed to facilitate the process of mark calculation for the lecturers in the Faculty of Information Science and Technology. By using this system, lecturers can record each student’s marks and the system will automatically compute and issue the student’s grade. In addition, analysis will be conducted in which the system will generate reports and graphs for each subject. The system was developed using the ASP.NET web application development tool, programming language C# and JavaScript as the language support, whereas the Microsoft SQL Server is used as the database tool and ASP.NET Development Server as the web server
    corecore