8 research outputs found

    Salary and Wages in Malaysia

    Get PDF
    This paper discusses the compensation practices in Malaysia against the backdrop of the legal framework for wage and salary deterination. It also examines the Malaysian labour market situation and trends in salary and wage administration together with the role of unions in compensation determination

    The student's perceptions on the usability of industrial training system and its implication

    Get PDF
    Industrial training refers to placement of students in the industry or organization for a certain period of time in order for them to apply their theoretical knowledge in the actual career world. Industrial training is one of the main components in the Computer Science curriculum in Universiti Teknologi Malaysia (DIM). Meanwhile, Industrial Training Systems (ITS) is a web based system which is developed to manage the industrial training process in DIM. ITS consist of four major modules for students which are student registration, student placement, student online log book and student assessment. Beside the four modules, ITS also facilitated with communication features like email notification and announcements. Hence, ITS become a solution to improve the current process of managing and monitoring the industrial training which were previously being done manually. Indirectly, ITS gives an opportunity for students to utilize internet technology as part of their effective learning tool during industrial training. The aim of this paper is to analyze the satisfaction rate of students towards ITS from the aspect of usability. Usability is used to measures the usable and functional of IT'ss functions from the aspect of learn ability, efficiency, memorability, errors and satisfaction. A survey has been distributed online to undergraduate students who have used ITS during their industrial training period from year 2012 until 2015. The results are derived from satisfactory Likert scales which indicate that students were satisfied with the functionalities provided by ITS

    Does parallel projection is suitable in electrical capacitance tomography? -A comparison with common approach

    Get PDF
    Electrical Capacitance Tomography (ECT) is one of the soft field tomography that widely used for the purpose of measurement and monitoring of multiphase flow. Common problem of the soft field tomography is low quality and unstable images in the pipe especially at the center section of the pipe. In this paper, an ECT system with a comparison between common approach and a parallel approach is presented. Simulation in 2 dimensions with 16-electrode is carried out to observe a potential projection. The COMSOL Multiphysics software is used to investigate the state and response of the electric field with this approach by exporting data with 128x128 pixels. Air bubbles as a phantom in the oil medium have been tested and analyzed. Linear Back-Projection Algorithm (LBP) is implemented using MATLAB software to obtain a tomogram. A Multi Scale Structural Similarity, MSSIM was applied to compare both approaches. Consequently, the resolution and quality of the pictures in the pipes can be distinguished. However, a further investigation is needed to improve the parallel approach for ECT system

    Does parallel projection is suitable in electrical capacitance tomography

    Get PDF
    Electrical Capacitance Tomography (ECT) is one of the soft field tomography that widely used for the purpose of measurement and monitoring of multiphase flow. Common problem of the soft field tomography is low quality and unstable images in the pipe especially at the center section of the pipe. In this paper, an ECT system with a comparison between common approach and a parallel approach is presented. Simulation in 2 dimensions with 16-electrode is carried out to observe a potential projection. The COMSOL Multiphysics software is used to investigate the state and response of the electric field with this approach by exporting data with 128x128 pixels. Air bubbles as a phantom in the oil medium have been tested and analyzed. Linear Back-Projection Algorithm (LBP) is implemented using MATLAB software to obtain a tomogram. A Multi Scale Structural Similarity, MSSIM was applied to compare both approaches. Consequently, the resolution and quality of the pictures in the pipes can be distinguished. However, a further investigation is needed to improve the parallel approach for ECT system

    The implementation of competition to promote team working and thinking skills in computer network course

    No full text
    Computer Network course is a continuation from the theoretical Network Communication. This course is a 'lab-heavy' course that requires students to be adept in the different configurations of different networking devices, mainly routers and switches. Future network administrators must also be able to work in a team and think critically to manage and troubleshoot networking problems. Teamwork and thinking skills are two soft skills required and assessed in this course. Previous implementation and assessment of these two soft skills within the course were boring and ineffectual. Competition was introduced into class activities to promote and assess these skills, and it developed into the competition in discussion within this paper. This paper presents a study on the implementation of competition; namely NetXplorace, to promote and assess team working and thinking skills to students of the Computer Network course in School of Computing, Universiti Teknologi Malaysia. It will discuss the purpose and objective behind the program, the planning and implementation of the program, along with the outcome of this endeavor. Through NetXplorace, both soft skills were successfully implemented

    Group-based authentication schemes used for machine type communication devices in WSN: a review

    Get PDF
    M2M communication is the next vital part of IoT infrastructure. It is extremely important for IoT systems to prosper in machine-type communication (MTC) devices that have low computational power, limited energy and small amount of memory capabilities. Thousands of devices transmitting data while working remotely and independent of any external supervision, creates concern for the security of data and devices as the topology is totally different to that of personal computers. In relation to the security of the devices, authentication is the first important part that has to be addressed against all possible security threats in IoT communication. In this regard, we focus on different types of authentication techniques being carried out by the researchers in M2M communicating environment of several remotely operating devices and address their security threats
    corecore