6 research outputs found

    Significant Feature Identification Mechanism For Ipv6 In Enhancing Intrusion Detection System

    Get PDF
    Manufacturing complexity has become more challenging with increased in demand fluctuation, product customisation and shorter lead time expectation. It is becoming more crucial to measure manufacturing complexity to better recognise and control the various manufacturing components to achieve optimum manufacturing performance. Cellular manufacturing or group technology is a method used to manage manufacturing complexity based on clustering of different types of equipment to process parts. The organizational structure of cellular manufacturing will always need to be flexible for reconfiguration to address rapid changes in customer requirement especially in managing its dual constraints; human and machine. Very often, the human component is overlooked or overestimated due to poor understanding of the effects of human constraints and lack of study is linked to the difficulty to model human’s behaviour. The purpose of this study is to develop a human system model to fill the gap in the study of human constraints on cellular manufacturing’s performance. As such, a new human system framework focusing on the aspects of human dynamics and attributes was designed to be integrated with the predetermined time standards system in an expert system, eMOST. The new human system model was evaluated for applicability at the actual manufacturing environment through five case studies where accurate labour utilisation and man-machine configuration information were conceived. Thus, the newly defined approach was able to efficiently improve data capture, analysis and model human constraints. The human information from the model was integrated with other manufacturing resources using WITNESS simulation modelling tool focusing on the bottleneck area to further evaluate the dynamic impact of these components on the manufacturing performance. Simulation modelling experiments use has also proven advantageous to change manufacturing configurations and run alternative scenarios to improve the efficiency of the system in terms of the throughput, cycle time, operator utilisation and man-machine configuration. The findings of this study enabled the management to make good decisions to efficiently manage the human resource and better predictions to reconfigure and competently manage resources allocation

    Assessing wireless security implementation in government and private sector companies in Malacca-a case study

    Get PDF
    Wireless local area networks (WLAN) have become a common technology in our everyday life. The use of WLAN can be seen among home users who use it to access the Internet and play games to business users who conduct daily business activities over the WLAN. The main objective of this case study was to ascertain the level of security with regards to wireless implementation in government and private sector companies in Malacca. To gauge the level of security being implemented, we conduct war driving sessions where we use certain hardware and software to map these wireless networks and then analyze their level of security in terms of whether they use encryption techniques such as WEP or WPA for data confidentiality.Simulation was done to show that some of these techniques are not secure. Then, comparisons are made between the use of open source software against vendor based software to collect and analyze the wireless networks before making several conclusions. The most alarming conclusion was that the level of awareness of wireless security among users in Malacca was still relatively low, especially in government sectors. Finally, we propose several steps that can be taken to minimize and counter problems faced when using wireless technology

    IoT Technological Development: Prospect And Implication For Cyberstability

    Get PDF
    Failure to address the risk poses by future technological development could cause devastating damage to public trust in the technologies. Therefore, ascendant technologies such as artificial intelligence are the key components to provide solutions for new cybersecurity threats and strengthen the capabilities of the future technological developments. In effect, ability of the technologies to prevent and withstand a cyber-attack could become the new deterrence. This paper will provide gaps to guide the government, industry, and the research community in pursuing Internet of Things (IoT) technological development that may be in need of improvement. The contribution of this paper is as follows: First, a roadmap that outline security requirements and concerns of future technology and the significant of IoT technology in addressing the concerns. Second, an assessment that illustrates the expected and unexpected impact of future technology adoption and its significant geopolitical implication on potential impacted areas such as regulatory, legal, political, military, and intelligence

    Effect Of Video Encoding Scheme Of Battery Consumption Of Mobile Device

    Get PDF
    Battery acts like a soul for mobile phones. It provides energy to the mobile phones. As long as the device is on, it will keep consuming the battery energy. Nevertheless, battery of mobile devices has limited power. In addition, the diversity of applications that are used reduce the battery lifetime. One of the application provided is a video player which mostly use for online streaming. However, the battery usage is difference while streaming a video. The codec used for video streaming affects the battery consumption. Therefore, the objective of this paper is to measure the battery consumption of mobile devices based on the type of video codec used. An empirical study was conducted by using a smartphone that supported by Samsung Galaxy Tab 2. The codec type such as WMV, MP4 and DIVX are among the codec, which be evaluated in this paper. In the end, the impact of several video codecs to the battery consumption are revealed. The outcome of this study assist the user to determine the best video codec for future use
    corecore