8 research outputs found

    Mobile Self-Management System for University Students using Mobile Application Development Lifecycle (MADLC)

    Get PDF
    This study examined the effects of self-management system in the academic enhancement for poor student who got CGPAs below 2.0 in Universiti Teknologi MARA (UiTM), Malaysia. In this research, the qualitative study was conducted to explore, describe, and examine how the self-management system helped UiTM students to develop motivation and concentration in their studies. This project used Mobile Application Development Lifecycle (MADLC) with respect to mobile applications development. The purpose of this project helped students managed themselves using the recent technologies which are mobile application, computer added learning and self-management system compared to traditional method. The proposed system showed that students that used this system improved their study and get better CGPAs

    Performance analysis on secured data method in natural language steganography

    Get PDF
    The rapid amount of exchange information that causes the expansion of the internet during the last decade has motivated that a research in this field.  Recently, steganography approaches have received an unexpected attention. Hence, the aim of this paper is to review different performance metric; covering the decoding, decrypting and extracting performance metric. The process of data decoding interprets the received hidden message into a code word. As such, data encryption is the best way to provide a secure communication. Decrypting take an encrypted text and converting it back into an original text. Data extracting is a process which is the reverse of the data embedding process. The effectiveness evaluation is mainly determined by the performance metric aspect. The intention of researchers is to improve performance metric characteristics. The evaluation success is mainly determined by the performance analysis aspect.  The objective of this paper is to present a review on the study of steganography in natural language based on the criteria of the performance analysis. The findings review will clarify the preferred performance metric aspects used. This review is hoped to help future research in evaluating the performance analysis of natural language in general and the proposed secured data revealed on natural language steganography in specific

    Congestion control in vehicular adhoc network: A survey

    Get PDF
    Vehicular adhoc network (VANET) has a significant potential in reducing traffic congestion to provide a stress-free and safer platform for road drivers to travel on the road. However, the current VANET is vulnerable to several challenges which need to be overcome. Congestion control is considered as one of the main challenges in VANET due to the high dynamic topology characteristic. Reliable congestion control (CC) are necessary to provide effectient dissemination of time-critical safety messages in VANET applications; safety and non-safety applications. In this paper, we present the overview on VANET, its application and challenges. We also discuss on the congestion control and provide a brief survey on the congestion control algorithms such as vehicular cloud computing, multiplicative rate decreasing algorithm, multi-objective Tabu search, D-FPAV algorithm and beaconing strategies which have been proposed in order to provide better solutions towards achieving a successful Smart Tranporation System

    Face recognition attendance system using Local Binary Pattern (LBP)

    Get PDF
    Attendance is important for university students. However, generic way of taking attendance in universities may include various problems. Hence, a face recognition system for attendance taking is one way to combat the problem. This paper will present an automated system that will automatically saves student’s attendance into the database using face recognition method. The paper will elaborate on student attendance system, image processing, face detection and face recognition. The face detection part will be done by using viola-jones algorithm method while the face recognition part will be carried on by using local binary pattern (LBP) method. The system will ensure that the attendance taking process will be faster and more accurate

    Congestion control framework for disseminating safety messages in vehicular Ad-Hoc networks (VANETs)

    Get PDF
    The purpose of this study is to propose a new congestion control framework for uni-priority of event-driven safety messages in VANETs. The uni-priority congestion is caused by the traffic of the same priority. Many of event-driven safety applications developed for VANETs is required real-time communication with high reliability and must be delivered before certain time deadline. In high load traffic, the CCH communication channel easily congested. Many studies [2,10,11,12] recommended congestion control approach to control the load and congestion on the wireless channel in VANETs. Our proposed congestion control will reserve the CCH communication channel for event-driven safety messages if the number of safety messages in the queue exceeds a defined threshold or the congestion control detect event-driven safety message. In normal traffic, the CCH communication channel is not reserve for event-driven safety messages. This research will adapt priority-based Earliest Deadline First (EDF) scheduling algorithms in proposed congestion control to schedule uni-priority of eventdriven safety messages. In addition, to provide reliability performance for event-driven safety messages, we will develop a new rebroadcasting scheme to prevent broadcast storm. In next phase of study, we plan to test and evaluate performance of our congestion control approach using network simulator e.g. NS-3

    Kajian Meningkatkan Keupayaan Rangkaian Komputer di Kampus UiTM Cawangan Kedah

    No full text
    This study aimed at upgrading the UiTM Kedah branch computer networking capabilities with the focus on data transmission. The case study made use of the Netwin methodology. Each activity in this study was based on the phases in this particular methodology. Analyses were done on the information network currently received. This information was obtained from the discussion with the IT personnel and also from the testing done. From the analyses, suggestions were given to upgrade the computer networking performance. These suggestions did not take into consideration the cost that might involve. Apart from that, this study was not meant to reach the implementation stage because it would involve the cost and approval from the UiTM itself The computer networking in UiTM Kedah branch was connected to other UiTM branches computer networking through the use of COINS technology introduced by Syarikat Telekom Malaysia Berhad. It was hope that this study could be beneficial to the UiTM Kedah branch in upgrading the computer networking performance especially in the iaspect of data transmission

    A review of congestion control algorithm for event-driven safety messages in vehicular networks

    Get PDF
    Congestion control algorithm in Vehicular Networks (VANETs) has been extensively studied. However, most of congestion control algorithms are not directly applicable to uni-priority of event-driven safety messages. The event-driven safety messages have stringent requirement on delay and reliability. The uni-priority of event-driven safety messages are caused by the traffic of the same priority, typically the warning messages of safety applications from different transmitters. The uni-priority messages should be schedule before the node starts the transmitting process. In dense network, a large number of vehicles broadcast a beacon messages at a high number of frequency. Then the Control Channel (CCH) easily congested. It’s very important to keep the CCH channel free from congestion to ensure timely and reliable delivery of event-driven safety messages [9, 20]. Hence, this study takes a closer look at existing congestion control algorithms to solve congestion problems because it affects the performance of safety messages. The study further exposes the weaknesses and advantages of some of these congestion control algorithms which can assist researchers to tackle the inherent problems of congestions in VANETs. This paper also concludes with a planned future research for disseminating uni-priority of event-driven safety messages while solving congestion problems
    corecore