22 research outputs found

    Using RGB colour combination in coloured quick response (QR) code algorithm to enhance QR code capacity

    Get PDF
    A Quick Response (QR) Code is a two-dimensional barcode that stores characters and can be read by any smartphone camera. The QR code has the capability to encode various data formats and languages; nevertheless, existing black and white QR code offers limited data storage. Even though there exist research on coloured QR Code to increase the storage capacity, requirement for larger data capacity by end user keep increasing. Hence, this thesis proposes a coloured QR Code algorithm which utilizes RGB colour combination to allow a larger data storage. The proposed algorithm integrates the use of compression, multiplexing, and multilayer techniques in encoding and decoding the QR code. Furthermore, it also introduces a partial encoding/decoding algorithm that allows the stored data to be manipulated. The algorithm that includes encoding and decoding processes is based on the red, green, and blue (RGB) colour techniques, which are used to create high capacity coloured QR code. This is realised in the experiments that store American Standard Code for Information Interchange (ASCII) characters. The ASCII text characters are used as an input and performance is measured by the number of characters that can be stored in a single black and white QR code version 40 (i.e. the benchmark) and also the coloured QR code. Other experiment metrics include percentage of missing characters, number of produced QR code, and elapsed time to create the QR code. Simulation results indicate that the proposed algorithm stores 29 times more characters than the black and white QR code and 9 times more than other coloured QR code. Hence, this shows that the coloured QR Code has the potential of becoming a useful mini-data storage as it does not rely on internet connection

    Strategy to block traffic create by anti-cencorship software in LAN for small and medium organisation

    Get PDF
    Anti-censorship software originally develop to fight internet censorship in China.The anti censorship software such as Ultrasurf, Freegate, Gpass, GTunnel and FirePhoenixare become popular for the stubborn user who used the internet for thier own’s purpose and disobey the poilicies . Since it is widely use by users in organisation local area network to bypass firewall policies, it become a threat to LAN organization.Hence, it cause a problem for network administrator who manage the internet utilisation and enforcing internet policies.For an organisation, uncontrolled internet usage lead the opened system vulnerability to viruses, backdoor, non productivity activities and slow internet connection.Thus, this studies proposed strategies to filter and blocking traffic create by anti-censorship software in LAN. Method used in this project is “design computer security experiment”.Therefore, this project will guide the network administrator to control internet utilisation, protect organisation LAN and carried out implementation of the internal organization’s internet policies

    Expanding the data capacity of QR codes using multiple compression algorithms and base64 encode/decode

    Get PDF
    The Quick Response (QR) code is an enhancement from one dimensional barcode which was used to store limited capacity of information. The QR code has the capability to encode various data formats and languages. Several techniques were suggested by researchers to increase the data contents. One of the technique to increase data capacity is by compressing the data and encode it with a suitable data encoder. This study focuses on the selection of compression algorithms and use base64 encoder/decoder to increase the capacity of data which is to be stored in the QR code. The result will be compared with common technique to get the efficiency among the selected compression algorithm after the data was encoded with base64 encoder/decoder

    WEBIC: a web based business insolvency classifier using neural networks

    Get PDF
    Business insolvency is one of the major problems faced by decision makers, especially to detect the early symptom that may contribute to critical business condition.This paper discusses the implementation of neural networks in classifying business insolvency cases in Malaysia. The developed prototype can be accessed remotely via World Wide Web (WWW).For the development purposes, the data was obtained from the Registrar of Business / Companies (ROB/ROC), Kuala Lumpur Stock Exchange and Bank Negara Malaysia (Central Bank of Malaysia).Several experiments were conducted to determine the most suitable parameters for the neural network model.Based on the experimental results, a network with an architecture of 11-6-1 with learning rate 0.1 and momentum term of 0.5. The prototype obtained 90.25% generalization and therefore indicates that the prototype has the potential to be used as a tool for classifying business insolvency.Hence, the prototype provides a basic framework for developing such a classifie

    WEBIC: a web based business insolvency classifier using neural networks

    Get PDF
    Business insolvency is one of the major problems faced by decision makers, especially to detect the early symptom that may contribute to critical business condition.This paper discusses the implementation of neural networks in classifying business insolvency cases in Malaysia. The developed prototype can be accessed remotely via World Wide Web (WWW).For the development purposes, the data was obtained from the Registrar of Business / Companies (ROB/ROC), Kuala Lumpur Stock Exchange and Bank Negara Malaysia (Central Bank of Malaysia).Several experiments were conducted to determine the most suitable parameters for the neural network model.Based on the experimental results, a network with an architecture of 11-6-1 with learning rate 0.1 and momentum term of 0.5. The prototype obtained 90.25% generalization and therefore indicates that the prototype has the potential to be used as a tool for classifying business insolvency.Hence, the prototype provides a basic framework for developing such a classifie

    Honey bee based trust management system for cloud computing

    Get PDF
    Cloud computing has been considered as the new computing paradigm that would offer computer resources over the Internet as service.With the widespread use of cloud, computing would become another utility similar to electricity, water, gas and telephony where the customer would be paying only for the services consumed contrary to the current practice of paying a monthly or annual fixed charge irrespective of use.For cloud computing to become accepted by everybody, several issues need to be resolved.One of the most important issues to be addressed is cloud security.Trust management is one of the important components of cloud security that requires special attention. In this paper, the authors propose the concept that honey bee algorithm which has been developed to solve complex optimization problems can be successfully used to address this issue.The authors have taken a closer look at the optimization problems that had been solved using the honey bee algorithm and the similarity between these problems and the cloud computing environment.Thus concluding that the honey bee algorithm could be successfully used to solve the trust management issue in cloud computing

    An interaction between SCTP and on demand MANET routing protocols

    Get PDF
    Mobile Ad hoc Network (MANET) is a wireless network of mobile nodes that has no fixed routers.In MANET, mobile nodes can communicate via the wireless interface while nodes are moving freely without using the network infrastructure.Nowadays the performance of a new existence Internet protocol technology, that is Stream Control Transportation Protocol ( SCTP) in a MANET Routing Protocol still unknown.The general objective of this research is to analyze and make the comparative performance of SCTP with Ad-hoc On-demand Distance Vector (AODV) and Dynamic Source Routing protocol (DSR) using Network Simulator (NS-2).Specifically, this research is to measure the behavior of SCTP in terms of throughput and smoothness and; to determine routing protocol in Mobile Ad-hoc Network (MANET) either it has significant effect in SCTP.This research used Network Simulator 2 (NS-2), type of the traffic is Constant Bit Rate ( CBR) and packet size is 1000.The data sent consists of five speeds at 5 m/s, 10 m/s, 15 m/s, 20 m/s, 25 m/s, and then these speeds are used in AODV and DSR simulation.The result, of our study suggested that the SCTP throughput over AODV is higher than DSR and the smoothness of SCTP over DSR was higher than AODV for the five types of speed.In addition, there was no significant impact on throughput between AODV and DSR as the percentage difference was small (i.e., 0 to 2.4%).Furthermore, the speed of node movement does not significant affect the smoothness

    Network response time : Case study UUM ISLAN

    Get PDF
    This research was done descriptively in order to collect data about bandwidths, errors, traffics and ping latencies inside Integrated Sintok Local Area Network (ISLAN).The samples of study are restricted to the applications in University Information System (SMU).The data obtained through interview sessions with inter-varsity and distributed questionnaires were referred to as guidelines for network monitoring process using Cacti application.The data, which were recorded every five minutes by Cacti application, were analyzed.The data monitored by Cacti were packet inputs, packet outputs, errors in, errors out and total time connected in seconds.At the end of this study, few suggestions were presented in order to improve the SMU usage

    Updating information in colored QR code for knowledge sharing

    Get PDF
    Knowledge sharing is the process through which explicit or tacit knowledge is communicated to other individuals.Recently, the Quick Response (QR) Code which is a small size printed shape of black and white squares has been used in many domain as a storage medium.To date, it is a popular storage medium in the marketing domain. The code can easily be used to disseminate information about a product as it only requires a small printed area.The QR Code may contain various information such as URL, contact information, and application launching. However, the information stored in the QR Codes may require some modification or updating. Hence, this paper demonstrates a technique to update information stored in colored QR Code and regenerate the code using integrated techniques of compression, multiplexing and multilayered techniques (CoMM). The processes to regenerate an updated QR Code includes the decode and re-encode of the QR Code

    A study on ICT related issues for school-based assessment online system in Malaysian secondary education

    Get PDF
    School-based assessment is one of the initiatives under the Multimedia Super Corridor Malaysia that was introduced in the year 2010.The implementation of the SPBBS online system is an introduction of a new method of recording and reporting system for students’ activities and academic achievement. This online system has been reported to trigger issues from the teachers as the major stakeholders in the system development and deployment.The online SPBBS system is claimed to be difficult to access and slow in response.The objective of this study is to identify, whether the claimed made is true or on the contrary.In ICT aspect, what is the element that causes the main problem? The infrastructure such as internet connectivity and hardware and knowledge of the users are studied. Surveys and interviews with the relevant parties were conducted, namely the teachers from Sekolah Menengah Sultanah Asma, Alor Setar, Kedah as well as the officers from Bahagian Teknologi Pendidikan Negeri Kedah. Comparison of data and information gathered are analyzed. Facts and findings should show that the problem would generally circulate around the internet capacity, hardware involved and ICT knowledge of the respondents or parties involved. The tasks and perception of each user involved are also evaluated
    corecore