4 research outputs found

    Malaysia indigenous herbs knowledge representation

    Get PDF
    The values of Malaysia indigenous herbs are not limited to its medicinal benefits but also in local and traditional knowledge of each herb.However, this knowledge is scattered and unorganized in internet and merely own by local people that led to difficulty in designing knowledge based system.This paper proposed a Malaysia indigenous herbs knowledge representation and its implementation in Web Ontology Language (OWL) using Protégé 4.2. The herbs knowledge mainly in preparation methods and plants part uses is collected from literatures and experts in herbal field.Additional interview session is conducted with expert to validate the information gathered.In order to ensure the knowledge model and ontology view is well defined, a prototype of knowledge based system is developed based on the ontology classes or concepts and relationships defined which requires conversion the OWL ontology into the relational database system at first hand

    The design and implementation of Malaysian indigenous herbs knowledge management system based on ontology model

    Get PDF
    This paper introduces the design and implementation of an Ontology-Based Malaysian Herbal Knowledge Based System (MiHerbs).The ontology model used in this research is based on a previous research with title, ’Malaysia Indigenous Herbs Knowledge Representation’.The research proposed an Ontology based knowledge representation model of Malaysian indigenous herbs using Web Ontology Language (OWL).The model can be used to encode and store knowledge in a “Knowledge Base” such as database, repository or library. The model also can enhance search formulation in information retrieval of herbal knowledge with ease, fast and accurate.However, the back end databases which is based on the OWL language needs to be transformed to relational database format. The transformation from OWL to Relational database is based on the OWL2DB algorithm guideline will be further discussed in this research.Assisted by the System Development Life Cycle (SDLC) methodology, MiHerbs is expected to help herbal research agencies, private sector and government to store and share their herbal related information via the system to provide an ease information access to public or even people around the world

    Website Traffics Acquisition Model for E-Business using Search Engine Optimization and Sitemap Submission (SEOSS)

    No full text
    Abstract—It is inevitable to accept that today’s business trends focus on selling products online using the latest web application system and website marketing tools. This phenomenon creates a high competition on search engine ranking among website owners in gaining business leads, visitor traffics and acquisitions. This paper proposed a model on improving e-business traffics acquisitions in terms of the number of new visitors (traffics) and returning visitors using Search Engine Optimization (SEO) and Sitemap Submission. This method has been tested on two different online business websites. The detailed results are discussed in the results and discussion section. It is recommended that the SEO strategy implementation is needed for e-business website

    Implementing IT Security Penetration Testing in Higher Education Institute

    No full text
    Keywords: The higher educational industry has unique information security requirements as the organization holds critical data and information of students, employees, research findings as well as other university's main agenda information. This paper proposed an enhanced process flow for web deployment process by implementing IT security penetration testing practices in University Teknologi MARA (UiTM) Pahang, Jengka Campus, as a way to early detection, reduce and prevent the institution's information security and services. This empirical research is based on qualitative data analysis which applied action research and interviews that requires researcher to study the existing university's IT security policy, infrastructure and available services. The development of the penetration testing process flow is guided by various industry standard penetration testing frameworks and literature review
    corecore