33 research outputs found

    Performance Improvement Studies in Accessing Web Documents

    Get PDF
    As the World Wide Web has now become the standard interface for interactive information services over the Internet, the perceived latency in WWW interaction is becoming an important and crucial issue. Currently, Web users often experience response delay of several seconds or even longer to non-local Web sites especially when the pages they attempt to access are very popular. For WWW to be acceptable for general daily use, the response delay must be reduced. The potential solutions to the problem lie in the extensive use of caching (disk based) and prefetching in WWW. Both caching and prefetching explore the patterns and knowledge in the Web accesses. This thesis describes and tests the efficiency of a batch prefetching update (refreshing) in accessing HTTP and FTP documents on the global Internet. The update is scheduled to run at idle time when the traffic is less congested and the server activity is low. The batch refreshing effort would be fruitful when the refreshed documents are really requested before they tum stale again. The effectiveness of the batch refreshing is verified by running a statistical analysis of the access log files. In the first part of the study, a Proxy Server at the LAN of FTMSK, ITM was set-up, configured and monitored for the use of 400 users. Access log files are collected and analysed for a period of six months. The analysis result would be a benchmark for the caching proxy with batch refreshing in the second part of the work

    Vendor rating for an entrepreneur development programme: a case study using the analytic hierarchy process method

    Get PDF
    With collaborative purchasing programmes where one of the aims is to develop suppliers, vendor rating is important not only in supplier selection and in deciding how to allocate business but also to determine where scarce development effort is best applied. This paper describes a case study into vendor rating for a government sponsored Entrepreneur Development programme in Malaysia. The paper reviews current methods for vendor rating and finds them wanting. It illustrates a new approach based on the use of Saaty's Analytic Hierarchy process method, which was developed to assist in multi-criteria decision problems. The new method overcomes the difficulties associated with the categorical and simple linear weighted average criteria ranking methods. It provides a more systematic way of deriving the weights to be used and for scoring the performance of vendors

    Security validation of smartcard: MCOS

    Get PDF
    The National Fuel subsidy system planning in Malaysia should it persist would have elevated the Multi-purpose of MyKad. Malaysian government is planning for a new MyID system that can retrieve governmental related documents when dealing with 760 governments and agencies nationwide (The Star, 2010). This move will leverage the existing infrastructure of MyKad. The wider usage of MyKad may raise public concern regarding its security. Thus, there is a need for assessing the security of MyKad by an independent third party.This paper will first discuss vulnerability of smartcard by using the attack potential model (CCDB, 2008), and then the appropriateness of the current methods and tools to test the security of smartcard will be investigated.The study concludes that there is no yet a standard of security testing tool imposed on smartcard in Malaysia.The study promotes the developing of security testing tool for MyKad

    A New Approach to Supplier Selection Problem: An Introduction of AHP-SCOR Integrated Model

    Get PDF
    Nowadays manufacturing industry is growing rapidly and large numbers of added value in business activities has been exercised. Supplier selection problem has improved in many areas by evaluation of supplier to increase supply chain performance. Supplier selection is one of the most important aspects in manufacturing industry. This paper suggest a combination techniques of Analytical Hierarchy Process (AHP) together with Supply Chain Operation Reference (SCOR) model to develop new decision support system (DSS) to the industry. There are four stages in supplier selection process which employed the norm stages of supplier selection process: data gathering, AHP calculation, SCOR evaluation, and implementation of decision making. Data analyzed was aligned with evaluation of data to synthesize of priorities and consistencies measurement. Organization’s decision maker would gain benefits and acquire competitive advantage providing DSS practitioners to achieve a success of the holistic approach in future decision support system. DOI: 10.17762/ijritcc2321-8169.15016

    DCT domain stegasvm-shifted LSB model for highly imperceptible and robust cover-image

    Get PDF
    The importance of information security in protecting and hiding information has increased due to the increased use of computers and Internet.Information hiding technology such as Digital Image steganography embeds secret messages inside other files.Least Square Bit (LSB) is the most popular technique used in image steganography that hides data behind a cover-image in a spatial and discrete cosine transform (DCT) domain.Support Vector Machine (SVM) is another technique that is used to strengthen the embedding algorithm.The main aim of image steganography is to keep the secret-message remain secret regardless of the techniques used.But many of the previously proposed techniques failed to attain this aim.The main concerns to this problem are the non-random changes of a cover-image that constantly occurred after the embedding process and the non-robustness of the embedding algorithm to image processing operation.This study therefore proposes a new model that utilises Human Visual System (HVS) and embedding technique through shifted LSB called StegaSVM-Shifted LSB in DCT domain to preserve the imperseptibility and increase the robustness of stego-images.The proposed technique shows better performances compared to other existing techniques

    Looking into the definition and characteristics of u-learning

    Get PDF
    This paper describes a new learning paradigm,known as ubiquitous learning or u-learning, which is supported by the ubiquitous computing technologies.In addition, the paper also aims at providing specific information related to u-learning for researchers who are interested in venturing the new area of ubiquitous computing.The u-learning definition and characteristics are also compared and discussed. As a result, a conclusive definition of u-learning together with its characterization is proposed. Finally, some of the u-learning applications are explained to further enhance the understanding of u-learning concept

    Traffic behavior of local area network based on M/M/1 queuing model using Poisson and exponential distribution

    Get PDF
    Nowadays, Local Area Networks (LAN) are one of the most popular networks, and the LAN performance is very important for operators. The LAN method has been applied as an essential infrastructure of numerous companies and organizations for a long time. This study aims to evaluate the M/M/1 queuing model in LAN Based on Poisson and Exponential Distribution and compare the traffic behavior of these Distributions in terms of some essential parameters. Moreover, it also aims to design and implement a model to perform the M/M/1 queuing model with different metrics and finally analyze the results to evaluate traffic behavior of M/M/1 queuing model for Poisson and Exponential Distribution in LAN

    Preminilary study on electronic number mapping in Malaysia

    Get PDF
    ENUM (Electronic Number Mapping) is a scheme for searching an address out of Internet resources by DNS retrieval in a form of URI which corresponds to a telecommunication number based on ITU-T E164 recommendation. ENUM Working Group was formed in 1999 by IETF.ENUM was standardized by introducing the basic protocol (RFC291) in 2000 which has been later improved (RFC3761) in 2004.With this protocol, ENUM will be extended to e- mail, facsimile on telephone line, web browsing etc.Currently, trials are done mainly in Europe, America and Asia, where Europe been the most active.Trials are also going on in main IT countries in Asia-Pasific region like Australia, Japan and South Korea. ENUM Working Group in Malaysia was formed sometime in 2003 but revived on 2007.Among the group duties are to perform various phases of ENUM and conduct future trials. Currently ENUM technology is still at its infant stage and not fully explored. This paper discusses the pos sible Malaysian implementation of ENUM, its challlenges and issues

    Presage criteria for blog credibility assessment using Rasch analysis / Sharifah Aliman, Saadiah Yahya and Syed Ahmad Aljunid

    Get PDF
    Credibility is an entrance path to trust model environment and its impact is so tremendous to the blogosphere and real world. The natural unique of blogs features compared with ordinary websites, the rise of information propagation through blogs and the scarcity of blog credibility research have sparked the impetus to investigate blog credibility assessment. This paper presents an exploratory study to identify credibility factors used by local blog users in assessing blogs. Our survey respondents are from local university that consisting of academic staff and students who are computer and Internet literate. Data was analyzed using person-item distribution map (PIDM) Rasch analysis. The results indicated that 75% credibility criteria, which was validated using misfit item, are preferable for assessing blog credibility. However, only 46% credibility criteria, which was validated using person gap difference, are acceptable. It also shows that update blog content, reputation of blog authors as well as recognition and performance of blog site are inapt criteria to assess blog credibility. Inspite, most of our credibility criteria are fit to formulate our new blog credibility model. Our study also suggests that Rasch analysis is significantly worthy to validate criteria that most of previous researches employed descriptive statistics and factor analytic approach’
    corecore