87 research outputs found

    Sustainable human development: bi’ah salihah index in Al-Amin education system

    Get PDF
    This paper presents spriritual component of the sustainable human development and a study had been made in Al-Amin education system. The salihah environment or bi’ah salihah index is proposed to measure the level of spiritualilty attained by the main stakeholders in Al-Amin schools. This paper takes the inspiration from few verses in the Holy Quran to develop items that can be used to measure the spiritual component of human development sustainability. The spirituality constitute of the faith (belief) and practice (actions) components. The bi’ah salihah index is then computed by taking the average of the mean from faith and practice of the students, teachers and parents (mean of the practice only)

    Novel binary search algorithm for fast tag detection in robust and secure RFID systems

    Get PDF
    Novel binary search algorithm for fast tag detection (BSF1) and (BSF2) in robust and secure RFID systems is presented in this paper. These algorithms introduce fast tag detection with the new method of inquiry. Tags were grouped in two groups and tag collisions of each group were solved by implementing dynamic searching and backtracking procedure. By grouping the tags, time for solving collision was reduced. It performed fast detection in a robust situation, a group of tags with all possibilities of ID arrangements. Tags attached to the products of different manufacturers may considerably have robust ID. For the security of RFID system, the number of bit (n) will be increased to provide allocation of 2n unique ID. The increasing number of bit and the uniqueness of ID will increase the security of the system from counterfeiting. However it will also increase time identification, but our algorithms will provide fast detection in the situation of high security

    Elemen pelaksanaan pendidikan keusahawanan dalam program latihan kemahiran TVET: suatu penelitian terhadap masalah dan cabaran

    Get PDF
    Keusahawanan adalah merupakan satu inisiatif penting negara bagi mengatasi masalah pengangguran di samping meningkatkan ekonomi negara. Salah satu usaha kerajaan dalam menerapkan keusahawanan di kalangan golongan belia adalah melalui penerapan pendidikan keusahawanan dalam Pendidikan Latihan Teknik dan Vokasional (TVET). Namun, isu yang seringkali menjadi pedebatan adalah apakah elemen dan bagaimanakah penerapan pendidikan keusahawanan ini dapat dilaksanakan dengan berkesan. Sehubungan itu, artikel ini akan membincangkan pengenalpastian elemen pendidikan keusahawanan dalam pelaksanaan pendidikan keusahawanan Program Latihan Kemahiran TVET melalui analisis terhadap cabaran dan permasalahan pelaksanaan pendidikan keusahawanan berdasarkan kajian-kajian terdahulu. Kajian literatur penerokaan dengan melibatkan sebanyak 780 artikel yang diperolehi daripada enjin carian Scopus dan Google Scholar pada 9 September 2022 yang lalu. Berdasarkan analisa meta, terdapat 4 elemen utama telah dikenalpasti iaitu kurikulum, kompetensi, proses pengajaran dan pembelajaran serta sokongan kerjaya keusahawanan. Setiap elemen utama tersebut mempunyai sub elemen masing-masing dan semua elemen tersebut saling berhubungan di antara satu sama lain. Semua elemen yang terhasil ini adalah merupakan keperluan asas yang penting dalam pelaksanaan pendidikan keusahawanan yang berkesan di kalangan Program Latihan Kemahiran TVET

    A new dynamic hash algorithm in digital signature

    Get PDF
    This paper presents adoption of a new hash algorithm in digital signature. Digital signature presents a technique to endorse the content of the message. This message has not been altered throughout the communication process. Due to this, it increased the receiver confidence that the message was unchanged. If the message is digitally signed, any changes in the message will invalidate the signature. The comparison of digital signature between Rivest, Shamir and Adleman (RSA) algorithms are summarized. The finding reveals that previous algorithms used large file sizes. Finally the new encoding and decoding dynamic hash algorithm is proposed in a digital signature. The proposed algorithm had reduced significantly the file sizes (8 bytes) during the transferring message

    OPC Protocol Application for Real-Time Carbon Monitoring System for Industrial Environment

    Get PDF
    Global warming is referred to the rise in average surface temperatures on earth primarily due to the Greenhouse Gases (GHG) emissions such as Carbon Dioxide (CO2). Monitoring the emissions, either direct or indirect from the industrial processes, is important to control or to minimize their impact on the environment. Most of the existing environmental monitoring system is being designed and developed for normal environment monitoring. Hence, the aim of this project is to develop industrial CO2 emission monitoring system which implements industrial Open Platform Communications (OPC) protocol in an embedded microcontroller. The software algorithm based on OPC data format has been designed and programmed into the Arduino microcontroller to interface the sensor data to any existing industrial OPC compliant Supervisory Control and Data Acquisition (SCADA) system. The system has been successfully tested in a lab with the suitable environment for real-time CO2 emissions measurement. The real-time measurement data has been shown in an industrial SCADA application which indicates successful implementation of the OPC communications protocol

    Blockchain-based framework for secure and reliable land registry system

    Get PDF
    The land registry system is one of the very important department in any governance system that stores the records of land ownership. There are various issues and loopholes in the existing system that give rise to corruption and disputes. This requires a significant chunk of valuable government resources from judiciary and law enforcement agencies in settling these issues. Blockchain technology has the potential to counter these loopholes and sort out the issues related with land registry system like tempering of records, trading of the same piece of land to more than one buyer. In this paper, a secure and reliable framework for land registry system using Blockchain has been proposed. The proposed framework uses the concept of smart contract at various stages of the land registry and gives an algorithm for pre-agreement. First, we describe the conventional land registry system and reviews the issues in it. Then, we outline the potential benefits of employing Blockchain technology in the land registry system and presented a framework. Finally, a number of case studies are presented

    Adaptive interference mitigation with user grouping for fast transmission in cellular networks

    Get PDF
    Designing uplink systems which group users with adaptive interference mitigation techniques is the objective of this research. Reduction in error rates and improvement in the energy efficiency is expected with this approach in addition to spectral efficiency. This paper reports a study on interference mitigation and transmission designs for groups of users in the uplinks. New formulations for the interference mitigation are produced based on the minimum mean square error and successive interference cancellation approach. By reducing the interference, the energy efficiency can be maintained and improved although the number of users per group increases. The measured error rates of this approach with user grouping achieve gains between 1 to 3 dB against that of the existing approach. With reduced complexity, the proposed scheme should be viable for practical deployment

    Control access security: wireless LAN auditing framework

    Get PDF
    Malaysian Government agencies are gradually enhancing their ICT infrastructure. The wireless network is one of the important elements in ICT infrastructure since it is famously known for the most vulnerable area of cyber-attacks. Planning a perfect access control and security protection for wireless network is one of the crucial task of network administrator and information security officer. Generally, data transfer in government agencies is highly classified and if it falls into wrong parties it could lead to a major disaster. This identified wireless network risk has to be mitigated with highly durable security and network protection. It is important to develop a highly secure network for government agencies and this could assist by a standard network security auditing framework as a guideline. This guideline can be applied by all the government agencies during their network development project and secure their network is fully protected. Therefore, an operating government agency is selected for this research for further study and development of this framework. A survey and observation activities have been conducted to collect sufficient information needed and a standard auditing framework is developed

    Implementation of IoT and blockchain for temperature monitoring in COVID19 vaccine cold chain logistics

    Get PDF
    The current COVID-19 pandemic impacted globally and resulted one hundred million cases with almost two and half million death to-date. The concerns of further spread of the virus has caused the global economy to a halt when most countries globally implementing movement control. Recent approved vaccines developed by multiple fronts has shed some hoped for the recovery of the human activities back to pre-pandemic state. For Malaysia, the government has procured the vaccine from six suppliers and each vaccine require proper temperature monitoring to ensure the safety and the efficacy of the vaccines during transportation and distribution process. Effective vaccine Cold Chain Logistics (CCL) management will be required precise coordination and cooperation across multiple parties to ensure the quality of the vaccines which require temperature monitoring, distribution of records for traceability. Furthermore, the CCL process continuity is becoming critical from the handover point at Malaysia point of receipt from the manufacturer and further distribution from central storage to the two hundred vaccination center across the country. Key concerns will be the vaccines’ CCL process for remote areas in Malaysia. This paper will describe the architecture required to integrate IoT and Blockchain into the CCL management system to monitor the temperature of insulated container or cooler box. While this project may not be able to cover all the parameters it will serve an indication of the required system engineering consideration for the IoT and Blockchain application for the vaccine CCL management

    Comparison of hash function algorithms against attacks: a review

    Get PDF
    Hash functions are considered key components of nearly all cryptographic protocols, as well as of many security applications such as message authentication codes, data integrity, password storage, and random number generation. Many hash function algorithms have been proposed in order to ensure authentication and integrity of the data, including MD5, SHA-1, SHA-2, SHA-3 and RIPEMD. This paper involves an overview of these standard algorithms, and also provides a focus on their limitations against common attacks. These study shows that these standard hash function algorithms suffer collision attacks and time inefficiency. Other types of hash functions are also highlighted in comparison with the standard hash function algorithm in performing the resistance against common attacks. It shows that these algorithms are still weak to resist against collision attacks
    corecore