600 research outputs found

    Open innovation and social media use towards informatics reporting: a systematic literature review

    Get PDF
    In the realm of technology development, open innovation paradigm and social media have both acquired massive attention in extensive researches since past several years. Social media, as the key medium has abundant to offer to support open innovation, thus successful innovation is the key to business rapid growth. This research provides a systematic literature review to identify, classify and summarize the factors of open innovation and social media use towards informatics reporting. Informatics reporting through this dynamic channel have been realized by many organizations nowadays, nonetheless greater number still confine with the traditional reports and are not ready to have linkage with social media platforms. Social media has been absolutely recognized as a powerful communication resource to engage stakeholders in virtual community. Hence, the result from the review suggests that there were six factors impacted open innovation and social media use towards informatics reporting, with transparency being the dominant factor. Eventually, these findings may ease the process of developing a model for open innovation paradigm implementing online platforms in organizations informatics reporting. All in all, this research shall assist organizations to plan and strategize the implementation of open innovation in social media platform for the advantage of their succeeding triumph

    A study of printed La₂O₃ on carbon-glass substrate for micro-flexographic printing process using angle resolve x-ray photoelectron spectroscopy (AEXPS) analysis

    Get PDF
    Micro-flexographic printing process involved in patterning technique from micron to nano scale range to be used for graphic, electronic and bio-medical device on variable substrates. Adhesive property of printing process could be described as an interchangeably with some ink or medium and substrate which was applied to one surface of two separate items that bonded together. Lanthanum oxide (La2O3) had been used as a rare earth metal candidate as printing ink medium. This metal deposit was printed on carbon-glass substrate. The choose of Lanthanum Oxide as a target is due to its wide application in producing electronic devices such as thin film battery and printed circuit board. The La2O3 deposited on the surface of carbon-glass substrate was then analyzed using Angle Resolve X-Ray Photoelectron Spectroscopy (ARXPS). The position for each synthetic component in the narrow scan of Lanthanum (La) 3d and O 1s are referred to the electron binding energy (eV). This research was focused on 3 narrow scan regions which are C 1s, O 1s and La 3d. Further discussion of the spectrum evaluation was discussed in detail. Here, it was proposed that from the adhesive properties of La was suitable as an alternative medium for micro-flexographic printing technique in printing multiple fine solid lines image at micro to nano scale feature. Hence, this paper will describe the capability of this particular metal as rare earth metal in a practice of micro-flexographic printing process

    Landslides and lineament mapping along the Simpang Pulai to Kg Raja highway, Malaysia

    Get PDF
    Geological structural features, such as the discontinuities that may be detected on satellite imagery as lineaments, in many cases control landslide occurrences. Lineament may represent the plane of weakness where the strength of the slope material has been reduced, eventually resulting in slope failure. The main objective of this study is to assess the relationship between lineament and landslide occurrences along the Simpang Pulai to Kg Raja highway, Malaysia. Lineament mapping was undertaken utilizing Landsat imagery and landslide distributions were identified based on field mapping and historical records. Lineament density maps of length, number and intersections were generated and compared with landslide distributions. The lineaments were also visually compared with the landslide occurrences. The results showed that there is an association between the lineaments and landslide distribution. Thus, lineament mapping is essential for the early stages of planning to prevent hazard potential from landslides

    Factors affecting endoglucanase production by Trichoderma reesei RUT C-30 from solid state fermentation of oil palm empty fruit bunches using Plackett-Burman design

    Get PDF
    A study was conducted to screen parameters affecting the production of endoglucanase by Trichoderma reesei RUT C-30 on solid state fermentation of oil palm empty fruit bunch using the Plackett-Burman design. Factors involved in the screening process were peptone concentration, urea concentration, ammonium sulfate concentration, calcium nitrate concentration, yeast extract concentration, tween 80 concentration, pH, incubation time, initial moisture content, inoculum size and substrate amount. Through analysis of variance (ANOVA), it was found that initial moisture content (p= 0.001), incubation time (p= 0.001), inoculum size (p= 0.032) and ammonium sulfate concentration (p= 0.023) have been recognized as significant factors affecting endoglucanase activity in solid state fermentation (SSF) of oil palm empty fruit bunch (OPEFB) by T. reesei RUT C-30. The model established from the ANOVA analysis have a significant value of Pmodel>F= 0.0008 and R2 of 0.9132. The preoptimized media showed 2.6 fold increased of endoglucanase activity.Key words: Cellulase, oil palm empty fruit bunches, solid state fermentation, Trichoderma reesei RUT C-30, Plackett-Burman design

    The Relationship Between Emotional Intelligence and Mathematical Competency Among Secondary School Students

    Get PDF
    Anxiety towards mathematics among secondary school students have been reported. Anxiety creates strong negative emotions and can hinder a person's cognitive, learning and academic performance. Fear of mathematics came early in the educational process and if this is not handled properly, it will negatively affect the students to adulthood. In learning mathematics, emotional intelligence (EI) impacts on how a person deals with emotions, mathematics and the general self-regulations strategies that the person adopts. A study was carried out to access secondary students' EI and their mathematical competency (MC). The EI was tested using an EI questionnaire for adolescents (IKEM-R/MEQI) consisting of 7 domains, while the MC was tested using selected questions from PISA (Programme for International Student Assessment) 2012 released items. Analysis shows that EI predict significantly students MC, but with low correlational value. Most of the respondents have moderate level of EI in all 7 domains whereby self awareness and self-regulation are the two domains with lowest scores. On the other hand, most of the students' MC are poor. This particular research shows that EI is not a good predictor of MC which contradicts other reports. However it is suggested that the data collection can be improved by examining students' EI while they are engaging in activities that call for MCs rather than doing it before or after the tasks

    Threshold Verification Technique for Network Intrusion Detection System

    Get PDF
    Internet has played a vital role in this modern world, the possibilities and opportunities offered are limitless. Despite all the hype, Internet services are liable to intrusion attack that could tamper the confidentiality and integrity of important information. An attack started with gathering the information of the attack target, this gathering of information activity can be done as either fast or slow attack. The defensive measure network administrator can take to overcome this liability is by introducing Intrusion Detection Systems (IDSs) in their network. IDS have the capabilities to analyze the network traffic and recognize incoming and on-going intrusion. Unfortunately the combination of both modules in real time network traffic slowed down the detection process. In real time network, early detection of fast attack can prevent any further attack and reduce the unauthorized access on the targeted machine. The suitable set of feature selection and the correct threshold value, add an extra advantage for IDS to detect anomalies in the network. Therefore this paper discusses a new technique for selecting static threshold value from a minimum standard features in detecting fast attack from the victim perspective. In order to increase the confidence of the threshold value the result is verified using Statistical Process Control (SPC). The implementation of this approach shows that the threshold selected is suitable for identifying the fast attack in real tim

    Recognizing P2P Botnets Characteristic Through TCP Distinctive Behaviour

    Get PDF
    Botnet has been identified as one of the most emerging threats to the Internet users. It has been attracted much attention and gives a big threat in network security. Through the year a number of Botnet variants have been introduced and the most lethal variants are known as peerto- peer (P2P) botnets which able to camouflaging itself as the benign P2P application. This evolution of Botnet variants has made it harder to detect and shut down. Alike any network connection, p2p similarly using TCP to initialize the communication between two parties. Based on this reason, this paper investigates the network traffic characteristics of normal P2P connection and P2P botnets through the TCP connection initialize or received between the bot to the bot master. The proposed mechanism detects and classifies the P2P botnet TCP connection behaviour from the normal P2P network traffic. This can be used for early warning of P2P botnet activities in the network and prevention mechanism

    Enhanced Alert Correlation Framework for Heterogeneous Log

    Get PDF
    Management of intrusion alarms particularly in identifying malware attack is becoming more demanding due to large amount of alert produced by low-level detectors. Alert correlation can provide high-level view of intrusion alerts but incapable of handling large amount of alarm. This paper proposes an enhanced Alert Correlation Framework for sensors and heterogeneous log. It can reduce the large amount of false alarm and identify the perspective of the attack. This framework is mainly focusing on the alert correlation module which consists of Alarm Thread Reconstruction, Log Thread Reconstruction, Attack Session Reconstruction, Alarm Merging and Attack Pattern Identification module. It is evaluated using metric for effectiveness that shows high correlation rate, reduction rate, identification rate and low misclassification rate. Meanwhile in statistical validation it has highly significance result with p < 0.05. This enhanced Alert Correlation Framework can be extended into research areas in alert correlation and computer forensic investigation

    Advanced Trace Pattern For Computer Intrusion Discovery

    Get PDF
    The number of crime committed based on the malware intrusion is never ending as the number of malware variants is growing tremendously and the usage of internet is expanding globally. Malicious codes easily obtained and use as one of weapon to gain their objective illegally. Hence, in this research, diverse logs from different OSI layer are explored to identify the traces left on the attacker and victim logs in order to establish worm trace pattern to defending against the attack and help revealing true attacker or victim. For the purpose of this paper, it focused on malware intrusion and traditional worm namely sasser worm variants. The concept of trace pattern is created by fusing the attacker’s and victim’s perspective. Therefore, the objective of this paper is to propose a general worm trace pattern for attacker’s, victim’s and multi-step (attacker/victim)’s by combining both perspectives. These three proposed worm trace patterns can be extended into research areas in alert correlation and computer forensic investigation
    corecore