70 research outputs found

    Board of Directors and Risk-taking Behavior of Islamic Banks in South East Asia

    Full text link
    Board of Directors (BODs) and Shariah Supervisory Board (SSB) have a pivotal role to manage Islamic banks in Southeast Asia. The decision made by the BODs and SSB will directly affect to the risk-taking behavior performed by Islamic bank. This study aims to investigate the relationship among BODs, SSB and risk-taking behavior of Islamic banks in Southeast Asia. Adopting random effect model, this research utilizes 24 Islamic banks in Southeast Asia which observe over six periods from 2009 to 2014. By using unbalanced panel data, the result of the study reveals that independent director influences the risk-taking behavior positively while Shariah Supervisory Board (SSB) affects it negatively. In addition, Board size has positive effect to the credit risk but negative to z-score

    Analisis Penentuan Daerah Pusat Pertumbuhan/Pelayanan di Wilayah Kepulauan Maluku

    Get PDF
    Determining an area to be a center of growth or service is very important and is influenced by its hinterland area. The development of an area as a growth/service center is determined by its readiness to become a growth center area. This study aims to determine the regencies/cities that can be considered feasible as growth centers or services in Maluku Province, especially in Ambon, Seram, and Buru islands. The analytical method used is the Scalogram and the Marshal Centrality Index. The results of the study showed that of the six research areas, Ambon City is still the center of growth or service in this area, while Central Maluku Regency can be an alternative area in the development of the Maluku region in the future

    New Multi-step Worm Attack Model

    Get PDF
    The traditional worms such as Blaster, Code Red, Slammer and Sasser, are still infecting vulnerable machines on the internet. They will remain as significant threats due to their fast spreading nature on the internet. Various traditional worms attack pattern has been analyzed from various logs at different OSI layers such as victim logs, attacker logs and IDS alert log. These worms attack pattern can be abstracted to form worms’ attack model which describes the process of worms’ infection. For the purpose of this paper, only Blaster variants were used during the experiment. This paper proposes a multi-step worm attack model which can be extended into research areas in alert correlation and computer forensic investigation

    Analysis of Transmission Lightning Arrester Locations Using Tflash

    Get PDF
    Tropical countries with extensive lightning activity, such as Malaysia, encounter numerous problems on their electrical transmission and distribution systems. Many overhead lines trip because of back flashover of lightning and shielding failures of the grounding system. To overcome the problem and improve transmission line performance, a detailed lightning study is required to analyse the corresponding lines and determine the best location for transmission line arrester (TLA) installation. We used TFlash to analyse a TLA installation on a 132-kV SSWW-BBST overhead transmission line system located in Selangor, Malaysia. Based on the results, the installation of the TLA at the optimum quantity and at appropriate towers have reduced the number of lines that trip

    Utilizing open source software running in inexpensive high performance computing system for cfd applications

    Get PDF
    The high cost of conducting research is a significant issue for the successfulness of any research project. For research activities involving flow simulation, the licensing fee for the numerical software and the cost to acquire powerful machine are the main factors contributing to the high cost. This paper reports our experiences in setting up a cost effective way of doing computational fluid dynamics (CFD). The actions involve two areas, i.e., software and hardware. For the software, open source softwares are utilized, particularly the OpenFOAM(r) as the CFD package. For the hardware, a parallel computer made from a cluster of inexpensive desktop computer is constructed. This architecture is found able to meet our requirement in investigating various flow problems that include aeroacoustics, vibration and wind engineering for ventilation

    A New Generic Taxonomy on Hybrid Malware Detection Technique

    Get PDF
    Malware is a type of malicious program that replicate from host machine and propagate through network. It has been considered as one type of computer attack and intrusion that can do a variety of malicious activity on a computer. This paper addresses the current trend of malware detection techniques and identifies the significant criteria in each technique to improve malware detection in Intrusion Detection System (IDS). Several existing techniques are analyzing from 48 various researches and the capability criteria of malware detection technique have been reviewed. From the analysis, a new generic taxonomy of malware detection technique have been proposed named Hybrid-Malware Detection Technique (Hybrid-MDT) which consists of Hybrid- Signature and Anomaly detection technique and Hybrid-Specification based and Anomaly detection technique to complement the weaknesses of the existing malware detection technique in detecting known and unknown attack as well as reducing false alert before and during the intrusion occur

    Learning by doing : a hands-on value management workshop for postgraduate students

    Get PDF
    Author name used in this publication: Geoffrey Qiping ShenAuthor name used in this publication: Zhao Yuan2012-2013 > Academic research: refereed > Publication in refereed journalVersion of RecordPublishe

    Analysis of transmission lightning arrester locations using Tflash

    Get PDF
    Tropical countries with extensive lightning activity, such as Malaysia, encounter numerous problems on their electrical transmission and distribution systems. Many overhead lines trip because of back flashover of lightning and shielding failures of the grounding system. To overcome the problem and improve transmission line performance, a detailed lightning study is required to analyse the corresponding lines and determine the best location for transmission line arrester (TLA) installation. We used TFlash to analyse a TLA installation on a 132-kV SSWW-BBST overhead transmission line system located in Selangor, Malaysia. Based on the results, the installation of the TLA at the optimum quantity and at appropriate towers have reduced the number of lines that trip

    Transmission-Lightning-Arrester : A Location Determination Using Tflash

    Get PDF
    The high density of lightning occurrence in Malaysiahas caused problems to transmission and distribution electricalenergy. Normally, transmission overhead lines trip due to BackFlashover (BF) of lightning and shielding failures of earth wire.Therefore, a detailed lightning study is required to analyse thecorresponding lines and to determine the exact location ofTransmission Lightning Arrester (TLA). In this paper, a simulationof lightning study using TFlash software associated with theinstallation of (TLA) at 132 kV SSWW-BBST overhead linessystem located in Selangor, Malaysia is presented. By using theTFlash software the location of TLA has been determine

    Enhancing value in public construction projects : the Malaysian journey

    Get PDF
    Author name used in this manuscript: Geoffrey Qiping SHENAuthor name used in this manuscript: Ann Tit Wan YURefereed conference paper2014-2015 > Academic research: refereed > Refereed conference paperVersion of RecordPublishe
    corecore