5 research outputs found

    Development of decision support system to enhance the decision of rice pesticide management in paddy cultivation

    No full text
    Decision Support System (DSS) is defined as interactive computer-based systems that help decisions makers utilize data and models to solve problems [1]. The lack of adequate information on pesticides hinders users in making the correct and suitable decision on choosing the pesticides for specific pests. This paper describes the development of a decision support system that helps users to choose the suitable pesticide to eradicate pests in paddy cultivation. This system provides details information about the paddy cultivation in Malaysia such as the type of pests, symptoms, and type of pesticides, weather and the granary area in Malaysia. This DSS is very important to users like farmers because it can provide details of information about the paddy and on how to manage the application of pesticide

    A study on physical access control using QR code as virtual identification system for door access control

    No full text
    The increase in criminal activities in today’s world is the cause of tremendous development in safety measures across the nation. One of the widely used safety measures is physical access control. Authentication methods of physical access control such as keys, biometrics (fingerprint, retinal scan), smart cards and One Time Password (OTP) require additional equipment and a high cost to purchase, install and to maintain it, whereby many organizations depending on their specific industry and its requirement along with budget allocation, may choose to opt for these features or not. Unfortunately, tools like keys and smart cards are not unique to specific users and could be possibly misplaced due to human error. OTPs are normally received as text messages on mobile devices and it could be accessed by other parties than the actual individual under minimal supervision by the owner of the device. In this innovative era, smartphones play a noteworthy part in our daily life. This device is easily detectable when it has been misplaced since it is being habitually utilized everyday. Hence, smartphone is utilized in our research due to its deliberate availability. An element that will be corporated on the device, is the Quick Response (QR) code. A QR code can now, not just solely save massive records, but additionally has the error-correction capacity. The QR code has been provided to each UPM students in the PutraVID (Putra Virtual Identification) application as a physical access control tool. The PutraVID has implemented the usage of QR code in the campus for everyday use. Although the QR code is utilized in a huge scale in the campus, there is no particular system to differentiate UPM students and the public, as they not more wearing their matric card or staff ID card as they used to prior to the introduction and implementation PutraVID. The campus environment became vulnerable to attacks as it became an opportunity for unauthorized people to trespass the facilities and caused damages. In order to cope with this issue, QR code is generated in PutraVID which is unique to individuals, as it contains their information such as matric number and name. This information is encrypted into a two-dimensional matrix code, used to scan and access facilities especially restricted areas. The QR code will not be the same for two people, as each student has their individual information stored in it, in order to avoid outsiders from having access to the campus environment. Hence, the entire ecosystem for this system is researched and developed in this paper inclusive of the hardware and software part which proficiently handles the problem. The system develops a centralized door access control management system which is used to store the time stamp of students and staff, and introduces an IoT-based door access control system using the QR code of PutraVID

    Towards an enhancement of organizational information security through Threat Factor Profiling (TFP) model

    No full text
    Information security has been identified by organizations as part of internal operations that need to be well implemented and protected. This is because each day the organizations face a high probability of increase of threats to their networks and services that will lead to information security issues. Thus, effective information security management is required in order to protect their information assets. Threat profiling is a method that can be used by an organization to address the security challenges. Threat profiling allows analysts to understand and organize intelligent information related to threat groups. This paper presents a comparative analysis that was conducted to study the existing threat profiling models. It was found that existing threat models were constructed based on specific objectives, thus each model is limited to only certain components or factors such as assets, threat sources, countermeasures, threat agents, threat outcomes and threat actors. It is suggested that threat profiling can be improved by the combination of components found in each existing threat profiling model/framework. The proposed model can be used by an organization in executing a proactive approach to incident management

    Scoring matrix framework for threat factor profiling model

    Get PDF
    One of the important requirements in preparing for an information security risk management system is to construct a threat profiling model that can be used to identify and classify threats. The threat profiling model provides an organization with a complete set of information including pattern of threat scenarios and analysis on the threat they encounter. However, an organization must set objectives and results of a threat profiling, as well as metrics in order to measure, appreciate and counter the potential threats. The main contribution of this paper is the framework of the threat scoring which extends our previous findings on combinations of components found in referred threat models. Furthermore, to the best of our knowledge, threat scoring framework has not been investigated by any previous approaches. In fact, the computed threat score enables the quantification of the degree of threat severity which is an important benchmark for an organization to plan their countermeasure actions. Therefore, a scoring matrix framework for Threat Factor Profiling (TFP) model that includes identification and classification of threat is proposed. The purpose of this framework is to identify threats based on activity within an information system of an organization. The Threat Profile Report presents the collected data of threat based on the predetermined matrix
    corecore