5 research outputs found
Server-based open system implementation for ICOSYS (ICOSYS2)
Information and communication services are developed to enhance the utilization of the ICT infrastructure.These services can be implemented either using proprietary
or open source software platforms.This work focuses on the implementation of the open source services at the Faculty of Information Technology (FTM), Universiti Utara Malaysia. The study is part of the ICOSYS research intitiative.The underlying vision of ICOSYS2 is to create a conducive and efficient working environment using open source technologies.ICOSYS2 consists of four basic services that comprises file storage, application, printing and backup services.Firstly, ICOSYS2 files and storage services provide users with the ability of centrally storing and sharing data.Secondly, the ICOSYS2 application services provide access to the world of Linux-based open source
applications.Thirdly, ICOSYS2 printing services allow users to send their print jobs to respective printers across the FTM network and pave the way for centralized printing
administration.Finally, the ICOSYS2 backup services outlines a tertiary mean to backup the users' data.It is hoped the implementation of this ICOSYS2 project can
facilitate academic and administrative tasks at FTM
Effect of demographic factors on knowledge creation processes in learning management system among postgraduate students
Analyzing data from top Japanese industries, Nonaka and Takeuchi concluded that knowledge creation involves the processes of interaction and transaction of tacit and explicit knowledge between experts and novices that employ the processes of Socialization, Externalization, Combination, and Internalization (SECI).The SECI model is appealing but has not been shown to be applicable to the field of education.Thus, this study investigated whether the SECI model could explain the knowledge creation processes in education for demographic factors in online Learning Management System (LMS) supported postgraduate courses.The sample comprised 160 postgraduate students enrolled in LMS-supported courses in higher learning institution.Data was analyzed using statistical analysis such as independence samples t-test and one-way analysis of variance (ANOVA).It was found that the Socialization process has significant difference in the scores for all the demographic factors. These findings suggest that for Socialization process, careful review of LMS-supported teaching method among the postgraduate students should be undertaken to harness the knowledge creation processes from lecturers as experts to students as novices
Hybrid machine learning technique for intrusion detection system
The utilization of the Internet has grown tremendously resulting in more critical data are being transmitted and handled online.Hence, these occurring changes have led to draw the conclusion that thenumber of attacks on the important information over the internet is increasing
yearly.Intrusion is one of the main threat to the internet.Various techniques and approaches have been developed to address the limitations of intrusion detection system such as low accuracy, high false alarm rate, and time consuming. This research proposed a hybrid machine learning technique for network intrusion detection based on combination of K-means clustering and support vector machine classification.The aim of this research is to reduce the rate of false positive alarm, false negative alarm rate and to improve the detection rate.The NSL-KDD dataset has been used in the proposed technique.In order to improve classification performance, some steps have been taken on the dataset.The classification has been performed by using support vector machine. After training and testing the proposed hybrid machine learning technique, the results have shown that the proposed technique has achieved a positive detection rate and reduce the false alarm rate
Together We Are Stronger: Examining Virtual Leadership Behavior Towards Knowledge Sharing in Online Programming Communities
Online communities are rapidly growing as an
outlet for social support and community building.
However, very few succeeded in inspiring members
to share their knowledge. The problem of under
contribution in online settings has triggered
researchers to investigate the role of virtual
leadership in promoting knowledge sharing. Using
path-goal theory, this study examines the role of
supportive, participative, and achievement-oriented leadership towards knowledge sharing in online programming communities. Data were collected from 20 online programming communities and used to empirically test the proposed model. The result from the structural equation modelling suggests that the three leadership behaviors significantly moderate the effect of self-efficacy and outcome expectancy towards members’ knowledge sharing in the online programming community. A suitable level of autonomy and recognition of members contributions can motivate members to
continuously contribute to online programming
communities and help promote sustainability in this platform
Text Steganography Using the Second Quotient Remainder Theorem and Dark Colour Schemes
Data communication over the Internet has increased significantly, resulting in high data traffic and concerns over data security. Information sent over the Internet always gets the attention of intruders, which causes the effort to increase the security of sensitive data and the need to prevent leakage. Steganography is one of the techniques to protect the confidentiality of data that can be accomplished by hiding secret information within the medium of text, images, audio, and video. Hiding a secret message using text steganography can be done on character properties such as size, colour, style, etc. Colour- based steganography has always raised suspicions about the generated stego text, which is a major issue in this study. Therefore, the Red, Green, and Blue (RGB) colour technique and the Second Quotient Remainder Theorem (SQRT) were introduced in this study to perform the hiding process. RGB (0,0,0) to RGB (15,15,15) colours were used for the hiding process to avoid colour suspicion. In addition, the pseudorandom number generator (PRNG) was also used to generate dynamic hidden messages with Homophonic table generation. The results showed that the secret message can be represented dynamically and has increased the hiding capacity to 77.4%. Other than that, the selected colour has successfully avoided the suspicion of the generated stego text. Hence, the results suggested that SQRT could be employed as a method in text steganography for securing information