15 research outputs found

    Security-Based BYOD Risk Assessment Metamodelling Approach

    Get PDF
    Rapid changes in mobile computing and modern devices, for example, smartphones, tablets and iPads encouraged the employees to use their personal devices at the workplace. Bring Your Own Devices (BYOD) phenomenon has become pervasive and on-demand for business purposes. Nowadays, employees are allowed to bring personal devices to their workplace. Nevertheless, organizations are practicing BYOD to increase efficiency, work productivity, and cost-saving which lead to employee’s satisfaction. However, BYOD may cause harm in an organization if there are no security policies, regulations and management of the employee’s devices. The common security threats engaged to BYOD implementation are data leakage, exposed to malicious malware and sensitive corporates information. Hence, this study proposed a strategic solution, which is Security-Based BYOD Risk Assessment Metamodel (Security-Based BYODRAM) in reducing BYOD-related issues. The existing BYOD models were reviewed to identify the important concepts in the metamodel development. The Meta Object Facility (MOF) language was used to develop the proposed metamodel

    Quality management of the bamboo resource and its contribution to environmental conservation in Malaysia

    Get PDF
    Purpose – The aim of this study was to contribute towards the systematic management of the natural stand bamboo resource at Nami, Kedah, Malaysia and to improve the forest environment rather than leaving it neglected and unmanaged. In addition, the study examines the commercial value of the abundant bamboo culms for a sustained industry in Malaysia. Design/methodology/approach – A one-hectare experimental plot of Gigantochloa scortechinii (buluh semantan) was established with a split plot design of fertilizer treatments 0, 2 and 5?kg of NPK 15:15:15 and felling intensities of 0, 40, 60 and 80 percent. The experiment was conducted for four years. Parameters such as the number of shoots, culms and basal area were observed throughout the study. Findings – From this study significant results were obtained and management principles were formulated. Due to the effect of fertilizer application, there was an increment of 30 percent of shoots sprouted per clump per application. Thinning should be done selectively and mature culms aged more than three years old well spaced within the clump need to be felled first. Originality/value – This new knowledge would be of value to managers and policy makers in formulating the proper management plan for the exploitation of future resources in the country

    Early performance trial of four Malaysian commercial bamboos in Shouthern Peninsular Malaysia

    Get PDF
    Bamboo has been recognized as the second importance non-timber forest produced by Malaysian Government. It can be a good substitute for timber in producing high value added products. In realizing the importance of this plant, the raw materials need to be exploited and tried on the suitability of planting bamboo as a plantation basis. Even though some planting trials have been done in the country, there is no study done on the growth performance of commercial Malaysian bamboos in Johore. In 1992, four Malaysian commercial bamboos were planted at East Johore Development Authority (Lembaga Kemajuan Johor Tenggara – KEJORA). The species were Bambusa vulgaris, Dendrocalamus asper, Gigantochloa 'Brang' and Gigantochloa levis. Six months year old planting materials from branch cuttings were planted at Forest Research Institute Malaysia's (FRIM) nursery and later transferred to Johore with a distance of 6 x 6 m. A simple randomized complete block designed was used with four replicates where each replicate consisted of alternate single line of each four commercial species mentioned earlier with 16 holes per line. Parameters such as the number of shoots sprouted, diameter at breast height (dbh) and plant's height were monitored. The data were observed for 17 months. Dendrocalamus asper and Gigantochloa levis, both showed high survival rates. In addition, their basal area showed more coverage area than the other two species

    The student's perceptions on the usability of industrial training system and its implication

    Get PDF
    Industrial training refers to placement of students in the industry or organization for a certain period of time in order for them to apply their theoretical knowledge in the actual career world. Industrial training is one of the main components in the Computer Science curriculum in Universiti Teknologi Malaysia (DIM). Meanwhile, Industrial Training Systems (ITS) is a web based system which is developed to manage the industrial training process in DIM. ITS consist of four major modules for students which are student registration, student placement, student online log book and student assessment. Beside the four modules, ITS also facilitated with communication features like email notification and announcements. Hence, ITS become a solution to improve the current process of managing and monitoring the industrial training which were previously being done manually. Indirectly, ITS gives an opportunity for students to utilize internet technology as part of their effective learning tool during industrial training. The aim of this paper is to analyze the satisfaction rate of students towards ITS from the aspect of usability. Usability is used to measures the usable and functional of IT'ss functions from the aspect of learn ability, efficiency, memorability, errors and satisfaction. A survey has been distributed online to undergraduate students who have used ITS during their industrial training period from year 2012 until 2015. The results are derived from satisfactory Likert scales which indicate that students were satisfied with the functionalities provided by ITS

    Secret sharing scheme for collaborative access system

    Get PDF
    This research investigate the concept of secret sharing scheme based on Shamir's secret sharing. The goal of this research is to implement secret sharing scheme for collaborative access system which are ideally suited to application in which a group of mutually suspicious individuals with conflicting interest must cooperate. In (q,n) secret sharing, a quorum, q of a group of n users are allowed to access the system by having the quorum reconstruct a secret(key), less than quorum can gain no information. Lost or stolen share still ensure the security of resources

    Emergency handling system

    Get PDF
    The current emergency handling services are cumbersome; a caller needs to dial 999 in order to report an emergency. In most occasions civilians are urged to call an emergency centers, which normally not remembered by many. The distance between the occurrence of the incident and the center remains as the major aspect for instant assistance. An assistance may not able to reach at soonest time if caller fail to describe his/her exact location. Worst of all the current system hinders handicapped from reporting an emergency. The advancement in wireless technology and infrastructure has amplified the usage of cell phone in our lives, therefore a location-based ah hoc emergency handling system is a value-add to the 999 service. This research studies the issues in providing an emergency handling system (EHS), which deploys location based technology that will detect the location of a caller and connect to database server that store required data. The system enable user to forward distress message either to police station, rescue team, hospital and etc. The professional application checks an emergency message, view location of an incident and respond to an emergency request. The system employs CGI+TA technique in determining the locations of caller and the nearest professional within the incident vicinity. In addition, every message that is transmitted through the network in encrypted and authenticated to ensure integrity and authenticity of an emergency call. This research shows that EHS has several advantages over current emergency services, and beneficial to handicapped

    Ubiquitous database in mobile healthcare

    Get PDF
    Ubiquitous Database in Mobile Healthcare (UDMHC) in Emergency Handling System is utilizing the combined benefit of smart card to support mobility coupled with the ubiquitous access of distributed database via web technology, in order to promote a truly mobile and interactive medical information technology. UDMHC provides benefits of storing comprehensive, accurate and up to date medical information while offering the ease of mobility in pocket. In the time of accident or emergency, UDMHC provides medical-related professional the best solution in immediately retrieving accurate, concise and vital victims medical record, allergies, and other information necessary for medical treatment decisions. Applet provides flexibility in retrieving the users information, users medical information and emergency contact list from ubiquitous database in the smart card. It also provides interaction with other distributed hospital database via HTTP protocol in order to retrieve the victims detail information. This provides a convenient way to gather, adapt, and share data from different hospital. Result indicated that network environment is able to be spanned across hospital, clinic and country boundaries, hence provides better ubiquitous medical record management. The Internet technology offers the opportunity for distributed health services to exchange medical knowledge and allow dynamic monitoring of patients health. With the deployment of Java and open card technology, UDMHC can be seamlessly and ubiquitously applied in any platform

    A Comparative statistical analysis of pseudorandom bit sequences

    No full text
    Many users applied built-in random generator for their cryptography applications which is simple and fast. However, the randomness of generated pseudorandom numbers (PRNs) is under questioned whether it can support the reliable security in secure communication. In this paper, we examined two kinds of pseudorandom bit sequence (PRBS); conventional PRBS and chaos-based PRBS. Linear Congruential method, Marsaglia’s Ziggurat algorithm and Mersenne Twister method are used to generate the former, and the latter is produced using chebychev map, logistic map and sawtooth-like map. To verify the randomness of the PRBS, two standard statistical tests FIPS140-2 and SP800-22 are performed. The results have been compared and analysed between conventional PRBS and chaos-based PRBS on their reliability as encryption key

    Optimization of computer labs usage in schools: a case study of smart-school

    Get PDF
    The explosion of computer-based multimedia instructional has led to the adoption of general applications, such as word-processors and spreadsheets as an efficient way of learning. Furthermore, with the explosion of Internet Communication Technology (ICT) and a catalyst program like Multimedia Super Corridor (MSC), where smart school is one of the agenda, conventional classrooms nationwide are being transformed to a PC-based laboratory. With the future stakes of children nationwide, the matter of controlling and providing the best environment for study cannot be taken lightly. This project developed a Smart Laboratory Real-Time Management System (SLRTMS), to further increase the efficiency of learning, management and student monitoring by using client-server approach. This system will benefit both the instructor and the student, as it simplifies common tasks in a normal PC-based classroom. The server, which is used by the instructor as a control device for teaching and communicating, provides several functions: automating class attendance; broadcasting laboratory work and announcement; providing discussion channel between instructor and students; viewing and locking computer screens; and generating database reports. SLRTMS is a LAN-based system using Windows 98 as the platform and it’s development exploited the functionality of COM and DCOM while using Microsoft Access as its database
    corecore