531 research outputs found

    A study of printed La₂O₃ on carbon-glass substrate for micro-flexographic printing process using angle resolve x-ray photoelectron spectroscopy (AEXPS) analysis

    Get PDF
    Micro-flexographic printing process involved in patterning technique from micron to nano scale range to be used for graphic, electronic and bio-medical device on variable substrates. Adhesive property of printing process could be described as an interchangeably with some ink or medium and substrate which was applied to one surface of two separate items that bonded together. Lanthanum oxide (La2O3) had been used as a rare earth metal candidate as printing ink medium. This metal deposit was printed on carbon-glass substrate. The choose of Lanthanum Oxide as a target is due to its wide application in producing electronic devices such as thin film battery and printed circuit board. The La2O3 deposited on the surface of carbon-glass substrate was then analyzed using Angle Resolve X-Ray Photoelectron Spectroscopy (ARXPS). The position for each synthetic component in the narrow scan of Lanthanum (La) 3d and O 1s are referred to the electron binding energy (eV). This research was focused on 3 narrow scan regions which are C 1s, O 1s and La 3d. Further discussion of the spectrum evaluation was discussed in detail. Here, it was proposed that from the adhesive properties of La was suitable as an alternative medium for micro-flexographic printing technique in printing multiple fine solid lines image at micro to nano scale feature. Hence, this paper will describe the capability of this particular metal as rare earth metal in a practice of micro-flexographic printing process

    A study of printing plate mould development by using 3d printers for micro-flexographic printing process

    Get PDF
    Micro-flexographic is a new printing technique that has been implemented by combining flexographic printing and micro-contact printing technique. Flexographic printing is generally a high-speed production in roll to roll printing technique widely used in the graphic printing industry. Micro-contact printing technique is usually employed to produce fine solid line structures in micro to nano scale. Mould preparation for printing plate is also one of the vital parameters in micro to nano scale image printing. A precise mould could be used to produce the most accurate printing plate for micro-flexographic printing. The three dimension (3D) printer has the capability of producing fine solid lines below 100 μm in width and gap on master mould for the printing industry. This research elaborated the use of various 3D printers to produce a master mould for micro-flexographic printing. This paper investigated the capability of multiple 3D printers in creating micro to nano fine solid lines in the master mould for future development and application of printing in the electronic, graphic and bio-medical field

    Improvising Intrusion Detection for Malware Activities on Dual-Stack Network Environment

    Get PDF
    Malware is software which was invented and meant for doing harms on computers. Malware is becoming a significant threat in computer network nowadays. Malware attack is not just only involving financial lost but it can also cause fatal errors which may cost lives in some cases. As new Internet Protocol version 6 (IPv6)emerged, many people believe this protocol could solve most malware propagation issues due to its broader addressing scheme. As IPv6 is still new compares to native IPv4, some transition mechanisms have been introduced to promote smoother migration. Unfortunately, these transition mechanisms allow some malwares to propagate its attack from IPv4 to IPv6 network environment. In this paper, a proof of concept shall be presented in order to show that some existing IPv4 malware detection technique need to be improvised in order to detect malware attack in dual-stack network more efficiently. A testbed of dual-stack network environment has been deployed and some genuine malware have been released to observe their behaviors. The results between these different scenarios will be analyzed and discussed further in term of their behaviors and propagation methods. The results show that malware behave differently on IPv6 from the IPv4 network protocol on the dual-stack network environment. A new detection technique is called for in order to cater this problem in the near future

    Hubungan Amalan Pergudangan Dengan Prestasi Organisasi Pergudangan : Pengenalan Kepada Kerangka Konsep

    Full text link
    Pengurus pergudangan meletakkan harapan besar ke atas amalan-amalan yang diamalkan supaya ia dapat menghasilkan prestasi organisasi yang membanggakan. Kajian mengenai amalan pergudangan dan hubungannya dengan prestasi organisasi kurang diberikan tumpuan padahal permintaan ke atas sektor pergudangan adalah kedua tertinggi selepas pengangkutan dalam industri 3PLs. Oleh itu, kerangka konsep yang diperkenalkan ini sedikit sebanyak dapat membantu memperbanyakkan kajian dalam sektor pergudangan.Dengan menjadikan teori RBV sebagai asas untuk kepada pembangunan kerangka konsep mengenai hubungan amalan pergudangan dengan prestasi organisasi pergudangan amat bertepatan sekali kerana teori tersebut menyokong konsep hubungan sumber-sumber organisasi dengan prestasi. Sumber-sumber organisasi seperti sumber manusia, teknologi maklumat, material pengendalian dan jaringan telah dicadangkan dalam kerangka konsep untuk diuji bagi melihat hubungannya dengan prestasi organisasi. Kerangka konsep ini amat sesuai untuk diuji ke atas syarikat yang menjadikan perkhidmatan pergudangan sebagai teras perniagaan mereka.disebabkan survival perniagaan syarikat ini amat bergantung kepada amalan dan prestasi

    Advanced Trace Pattern For Computer Intrusion Discovery

    Get PDF
    The number of crime committed based on the malware intrusion is never ending as the number of malware variants is growing tremendously and the usage of internet is expanding globally. Malicious codes easily obtained and use as one of weapon to gain their objective illegally. Hence, in this research, diverse logs from different OSI layer are explored to identify the traces left on the attacker and victim logs in order to establish worm trace pattern to defending against the attack and help revealing true attacker or victim. For the purpose of this paper, it focused on malware intrusion and traditional worm namely sasser worm variants. The concept of trace pattern is created by fusing the attacker’s and victim’s perspective. Therefore, the objective of this paper is to propose a general worm trace pattern for attacker’s, victim’s and multi-step (attacker/victim)’s by combining both perspectives. These three proposed worm trace patterns can be extended into research areas in alert correlation and computer forensic investigation

    Characteristics Of Cu-Doped ZnO Films Prepared Using Magnetron Co-Sputtering

    Get PDF
    In this study, the fabrication of un-doped and cu-doped zinc oxide (ZnO) films by magnetron co-sputtering technique were reported. The films were deposited on glass substrates followed by thermal annealing treatment at 400°C in air environment for 60 minutes. The crystal structure, surface morphology, optical transmittance and resistivity were studied by using X-ray diffraction (XRD), ultraviolet-visible (UV-Vis) spectrophotometry, atomic force microscopy (AFM) and Hall effect measurement with four-point Van der Pauw configuration respectively. Polycrystalline films with hexagonal wurtzite structure has been observed when Cu was introduced into ZnO structure. The redshift and bandgap narrowing were discussed in optical analysis. The trend in bandgap narrowing was contributed by hybridization of Cu 3d band and O 2p band. Hall measurement revealed that the resistance of deposited Cu-doped ZnO (CZO) films will increase at excessive high Cu doping level

    Fabrication and Characterization of Cu-doped ZnO Films Using RF Reactive Magnetron Sputtering

    Get PDF
    ZnO thin films have emerged as an interesting research area owing to its useful properties. Recently, lots of attention have been given to doped ZnO with Cu atom due to its favourable potential in semiconductor devices. Pure and Cu-doped ZnO (CZO) thin films were deposited on the glass, p-GaN/Al2O3 and n-GaN/Al2O3 substrates using radio frequency magnetron sputtering of Cu/ZnO alloy target with a ratio of 10/90 at 200 °C. The crystal structure, optical properties, surface morphology and electrical properties were investigated by using X-ray diffraction (XRD), ultraviolet-visible (UVVIS) spectrophotometer, atomic force microscopy (AFM) and Hall measurement with four-point Van der Pauw configuration respectively. XRD analysis showed that single phase ZnO with hexagonal wurtzite structure and c-axis orientation was fabricated. The transmittance of all films deposited on glass in the visible region were more than 85%. The optical band gap of the films were calculated by using transmittance data obtained from UV-VIS spectrophotometer. Optical band gap reduction occurred when Cu is introduced into ZnO. Deposited CZO films showed smoother surface compare with ZnO films. Hall measurement results revealed that CZO film deposited on n-GaN/Al2O3 had higher mobility and conductivity than pure ZnO films

    Threshold Verification Technique for Network Intrusion Detection System

    Get PDF
    Internet has played a vital role in this modern world, the possibilities and opportunities offered are limitless. Despite all the hype, Internet services are liable to intrusion attack that could tamper the confidentiality and integrity of important information. An attack started with gathering the information of the attack target, this gathering of information activity can be done as either fast or slow attack. The defensive measure network administrator can take to overcome this liability is by introducing Intrusion Detection Systems (IDSs) in their network. IDS have the capabilities to analyze the network traffic and recognize incoming and on-going intrusion. Unfortunately the combination of both modules in real time network traffic slowed down the detection process. In real time network, early detection of fast attack can prevent any further attack and reduce the unauthorized access on the targeted machine. The suitable set of feature selection and the correct threshold value, add an extra advantage for IDS to detect anomalies in the network. Therefore this paper discusses a new technique for selecting static threshold value from a minimum standard features in detecting fast attack from the victim perspective. In order to increase the confidence of the threshold value the result is verified using Statistical Process Control (SPC). The implementation of this approach shows that the threshold selected is suitable for identifying the fast attack in real tim

    Landslides and lineament mapping along the Simpang Pulai to Kg Raja highway, Malaysia

    Get PDF
    Geological structural features, such as the discontinuities that may be detected on satellite imagery as lineaments, in many cases control landslide occurrences. Lineament may represent the plane of weakness where the strength of the slope material has been reduced, eventually resulting in slope failure. The main objective of this study is to assess the relationship between lineament and landslide occurrences along the Simpang Pulai to Kg Raja highway, Malaysia. Lineament mapping was undertaken utilizing Landsat imagery and landslide distributions were identified based on field mapping and historical records. Lineament density maps of length, number and intersections were generated and compared with landslide distributions. The lineaments were also visually compared with the landslide occurrences. The results showed that there is an association between the lineaments and landslide distribution. Thus, lineament mapping is essential for the early stages of planning to prevent hazard potential from landslides

    Enhanced Alert Correlation Framework for Heterogeneous Log

    Get PDF
    Management of intrusion alarms particularly in identifying malware attack is becoming more demanding due to large amount of alert produced by low-level detectors. Alert correlation can provide high-level view of intrusion alerts but incapable of handling large amount of alarm. This paper proposes an enhanced Alert Correlation Framework for sensors and heterogeneous log. It can reduce the large amount of false alarm and identify the perspective of the attack. This framework is mainly focusing on the alert correlation module which consists of Alarm Thread Reconstruction, Log Thread Reconstruction, Attack Session Reconstruction, Alarm Merging and Attack Pattern Identification module. It is evaluated using metric for effectiveness that shows high correlation rate, reduction rate, identification rate and low misclassification rate. Meanwhile in statistical validation it has highly significance result with p < 0.05. This enhanced Alert Correlation Framework can be extended into research areas in alert correlation and computer forensic investigation
    corecore