3 research outputs found

    A Perspective Towards NCIFA and CIFA in Named-Data Networking Architecture

    Get PDF
    Named-Data Networking (NDN) is the most promising architecture in the future Internet. NDN ensure high availability of contents and security of the data packet. However, it may disturb the stability and security in NDN routing such as Interest Flooding Attack (IFA). There are many existing detection and mitigation technique about IFA which labelled a non-collusive type of routing threats where it causes the PIT resources to exhausted and legitimate request could not perform in communication. Unfortunately, all the existing counter-measure mechanism could not defend the Collusive Interest Flooding Attack (CIFA). The attacks initiated with a satisfying interest and malicious data producer will reply to the corresponding request before the expiry of existing PIT entries in NDN router along the path. CIFA is classified as low rate intermittent attack which is very difficult in distinguish with legitimate requests. Thus, CIFA is more vulnerable and threatens than previous NCIFA. Moreover, there is no benchmark datasets or any public datasets to perform further experiments on detecting CIFA. Thus, there is a need to produce reliable datasets for future investigation in detection or mitigation relevant attacks in NDN

    Sequential constructive algorithm incorporate with fuzzy logic for solving real world course timetabling problem

    Get PDF
    Sequential constructive algorithm is one of the popular methods for solving timetabling problems. The concept of the algorithm is to assign event based on their difficulty value by using different sequential heuristic. The most common sequential heuristics are largest enrolment, largest degree and saturation degree. Each sequential heuristic has its own criteria to obtain events’ difficulty value. Instead of single sequential heuristic, this paper presents to use fuzzy logic to consider multiple sequential heuristics in order to obtain the difficulty value of the events. The proposed method will be used to generate feasible solution as well as improve the quality of the solution. Another objective of this paper is to tackle a real world course timetabling problem from Universiti Malaysia Sabah Labuan International Campus (UMSLIC). Currently, UMSLIC generates course timetable manually which is very time consuming and ineffective.The experimental results show that the proposed method is able to produce better quality of solution less than one minute. In terms of quality of timetable and efficiency, the proposed method is outperforming UMSLIC’s manual method

    [Home] [Current Edition] [Compendium] [Forum] [Web Archive] [Email Archive] [Guestbook] [Subscribe] [Advertising Rates] An Exploratory Research of the Usage Level of E-Commerce among SMEs in the West Coast of Sabah, Malaysia

    No full text
    Abstract Previous studies have indicated that e-commerce development offers a promising way for business to meet the challenges of the ever-changing environment. It provides effective and efficient ways, such as buyers can gather information rapidly about the availability of the products or services, evaluate, or negotiate with vendors. However, previous studies on Small and Medium Enterprises (SMEs) in Malaysia have shown that the application of e-commerce is still at its infancy. Thus, this study investigates the usage level of e-commerce application for the SMEs in West Coast of Sabah, Malaysia. This achieved by circulating a set of questionnaire to examine the awareness and adoption of e-commerce application by the SMEs, and recognize the impeding factors to adopt e-commerce and the perception of e-commerce benefits towards incorporating ecommerce in their business. The study found that the awareness and adoption level among the SMEs are still in its infancy, although the potential benefits were perceived to be important
    corecore