66 research outputs found

    Removal of Reactive Dyes from Aqueous Solution by Adsorption on Coconut Coir Activated Carbon

    Get PDF
    The removal efficiency of two highly used reactive dyes (C. I. Reactive Red 180 and C. I. Reactive Blue 19) in aqueous solution by activated carbon prepared from coconut coir was investigated. Physicochemical characteristics of the coconut coir activated carbon were measured by ash content and pH

    Removal of Reactive Dyes from Aqueous Solution by Adsorption on Coconut Coir Activated Carbon

    Get PDF
    The removal efficiency of two highly used reactive dyes (C. I. Reactive Red 180 and C. I. Reactive Blue 19) in aqueous solution by activated carbon prepared from coconut coir was investigated. Physicochemical characteristics of the coconut coir activated carbon were measured by ash content and pH

    Security-Based BYOD Risk Assessment Metamodelling Approach

    Get PDF
    Rapid changes in mobile computing and modern devices, for example, smartphones, tablets and iPads encouraged the employees to use their personal devices at the workplace. Bring Your Own Devices (BYOD) phenomenon has become pervasive and on-demand for business purposes. Nowadays, employees are allowed to bring personal devices to their workplace. Nevertheless, organizations are practicing BYOD to increase efficiency, work productivity, and cost-saving which lead to employee’s satisfaction. However, BYOD may cause harm in an organization if there are no security policies, regulations and management of the employee’s devices. The common security threats engaged to BYOD implementation are data leakage, exposed to malicious malware and sensitive corporates information. Hence, this study proposed a strategic solution, which is Security-Based BYOD Risk Assessment Metamodel (Security-Based BYODRAM) in reducing BYOD-related issues. The existing BYOD models were reviewed to identify the important concepts in the metamodel development. The Meta Object Facility (MOF) language was used to develop the proposed metamodel

    Bandwith conservation framework for mobile cloud computing: challenges and solutions

    Get PDF
    Mobile devices are rapidly transforming the computing industry. It is emerging to be the super future computers. Challenges including network bandwidth limitation, availability and storage are among the limitations facing MCC as the number of mobile devices accessing the cloud services are rapidly growing. This paper reviews the state of art of mobile cloud computing as well as it summarizes the latest MCC challenges and solutions. We will also propose a bandwidth conservation framework that will help the bandwidth constrained users to reschedule bandwidth allocatio

    An application of biometric technology : Iris recognition

    Get PDF
    Human identification has always been an imerest continuously explored by human. 1lIe need for identification comes from the need to detect and to recognize people for security. verification, validation and recognition and many other reasons. One method of identification that attracts among the greatest interest is biometric identification. Biometric identification deals with 11M: identification of various Iraits of our body. Biometric identification relies on the unique traits and p;lllem COIISiSI of voice. face. body, bi1'ihmark, iris, palm-print, finger-prim and many Olhers. AmOilg tho5e. iris recognition generates the greatest anemion in the last 20 )"<,ars due to lhe accuracy and the reliability of the recognilion. Iris recognition is arguably lhe most reliable biomelric identificalion currently available. Iris ties in,ide the the sclera, which is Ihe whiTe part of our eye. Inside the iris lies the pupil. The .haracterisTic of iris is unique for every individual. It also differs between idemical Twins. The characTeristic is even differem belween the left and right eyes. The iri, consists of limitless palleros that made itvery reliable in deteetion and recognition when compare to other biometrics such as thumb-print and facial recognitio

    Attributes of ethical leadership in leading good governance

    Get PDF
    The aim of this study is to present a practical and rational perspective of corporate governance. Specifically, this study explores the concept of ethical leadership in relation to corporate governance.It introduces morality as a core element in creating good governance practices, starting from the premise that corporate governance is subjective.We must therefore consider the social reality in which corporate governance is based.As such, inquiry about the social reality is required. Based on that premise, qualitative methodology is employed to gather views about the concept of ethical leadership in the context of corporate governance.The socially constructed reality of this study is represented by individuals who were categorized as experts and corporations known to have a high standard of corporate governance.Views from the subjects about ethics in the perspective of corporate governance were gathered.Content analysis was used to analyse the data.Triangulation techniques of data collection were adopted to provide richness and thickness to the data. Interviews, document analysis and observations were used to understand the reality of the research issue.Triangulation techniques support the validation and reliability of data.The research found several ethical leadership attributes that are essential to guide corporate governance practices.They are fundamental elements that have emerged from the data.This paper develops a framework around the dimensions of ethical leadership relative to the Malaysian business environment. The paper advances an understanding of ethical leadership in the Malaysian business environment and offers an agenda for future research in the corporate governance field

    Increasing the hiding capacity of low-bit encoding audio steganography using a novel embedding technique

    Get PDF
    The rapid growth of multimedia transmission leads to lose the owner identity of their products. Therefore, the demand to secure such input is crucial. In this paper, an overview of steganography and its technique applied is introduced. A data hiding within audio signals is studied. LSB technique is used and simulated result is presented. The result is characterized by robustness and high bit rate. It was shown that length of the embedded message (secret message) does not affect the stego signal audibility as long as it does not exceed the length of the original signal

    State-of-the-art application of artificial neural network in digital watermarking and the way forward

    Get PDF
    Several high-ranking watermarking schemes using neural networks have been proposed in order to make the watermark stronger to resist attacks.The ability of Artificial Neural Network, ANN to learn, do mapping, classify, and adapt has increased the interest of researcher in application of different types ANN in watermarking.In this paper, ANN based approached have been categorized based on their application to different components of watermarking such as; capacity estimate, watermark embedding, recovery of watermark and error rate detection. We propose a new component of water marking, Secure Region, SR in which, ANN can be used to identify such region within the estimated capacity. Hence an attack-proof watermarking system can be achieved

    ICT in telemedicine: conquering privacy and security issues in health care services

    Get PDF
    Advancement in telecommunication combined with improved information technology infrastructures has opened up new dimensions in e-health environment. Such technologies make readily available to access, store, manipulate and replicate medical information and images. These technologies help reduced the time and effort in diagnoses and treatment at lower cost. However, protection and authentication of such medical information and images are now becoming increasingly important in telemedicine environment, where images are readily distributed over electronic networks. Intruders/hackers may gain access to confidential information and possible alter or even delete such vital records. The ultimate success of telemedicine demands an effective technology as well as privacy and security of records should be main concern. This paper explores recent identified privacy and security issues that affect telemedicine. Featuring threats on security and authentication of medical records, and proposing digital watermarking as a technology to curb authentication issues in telemedicine is highlighted

    Image quality assessment of fast fourier transform domain watermarked images

    Get PDF
    Digital watermarking is the processing of embedding digital signature into the host media such as image, video, text, audio etc. During the watermarking process, images are subjected to variety of attacks such as noise in transmission channel, geometric attacks,compression, processing like filtering, etc, all this affect the visual quality of watermarked image. Thus, there is a need for image quality assessment of watermarked images in relation to the original images. Several measures of image metrics are available in the field of image processing however they are application based. This paper discusses watermarking in FFT domain and some of the image quality metric that can be applied. Experiments are conducted using the Full Reference (FR) images. We used Mean Square Error (MSE), Root Mean Square (RMS), Structural Similarity (SSIM), Image Fidelity Measure (IFM), Correlation Coefficient Index (CCI) and Peak Signal to Noise Ratio (PSNR) as our quality assessment. Result shows that CCI, SSIM, and IFM are most appropriate for measuring quality of watermarking system
    corecore