13 research outputs found

    Implementing security framework of electronic business application

    Get PDF
    Security is an essential issue in e-commerce. Lack of security knowledge exposed e�commerc e customer to threat. Security threat such as viruses, Trojan and malicious software could put customer to danger. A study accessing user conceptions of web security has shown web users have mistakenly evaluated whether a connection is secure or not and vice versa even there knowledge of technology is high. Therefore, they need an assistant in determines which website is secure most. This project is about security measurement tool of web based application focused on customer side. The measurement framework is based on Security Quantification of Electronic Business Application. The framework based on four (4) objectivities to be measured, which are Confidentiality, Integrity, Availability and Accountability. Development methodology of this project is Waterfall model. The product is stand-alone application which can be used anywhere at the customer side. The advantage of this tool is covers broad evaluation of files, using both external and internal measurement and P HP source code evaluation automatically

    Consistency check between XML schema and class diagram for document versioning

    Get PDF
    A consistency check between design and implementation is usually done in order to check the correctness of the system’ requirements. However, if the requirements are changed over time, then the document versioning occurred within the requirements. For XML Schema, document versioning exists when there is a change in the XML Schema from its previous Schema. In order to detect the versioning of both XML Schemas, consistency rules check need to be performed to both class diagrams produced by both Schemas. The consistency between two XML Schemas are checked based on transformation rules and versioning rules. Transformation rules are used for translating the XML Schema into class diagram and versioning rules are used for checking the existing of document changes between two XML Schemas. Once two XML Schemas are different the consistency rules will be used for the consistency check. This paper presents an approach based on transformation rules and versioning rules to check consistency between XML Schema and UML class diagram when document versioning exist. The approach is then used for the case study to show how the consistency is checked in order to detect the versioning of two different XML Schemas. Based on the case study, the approach shows that two XML Schemas can be checked for their consistency when document versioning exist

    Consistency Check between XML Schema and Class Diagram for Document Versioning

    Get PDF
    A consistency check between design and implementation is usually done in order to check the correctness of the system’ requirements. However, if the requirements are changed over time, then the document versioning occurred within the requirements. For XML Schema, document versioning exists when there is a change in the XML Schema from its previous Schema. In order to detect the versioning of both XML Schemas, consistency rules check need to be performed to both class diagrams produced by both Schemas. The consistency between two XML Schemas is checked based on transformation rules and versioning rules. Transformation rules are used for translating the XML Schema into the class diagram, and versioning rules are used for checking the existing of document changes between two XML Schemas. Once two XML Schemas are different the consistency rules will be used for the consistency check. This paper presents an approach based on transformation rules and versioning rules to check consistency between XML Schema and UML class diagram when document versioning exist. The approach is then used for the case study to show how the consistency is checked in order to detect the versioning of two different XML Schemas. Based on the case study, the approach shows that two XML Schemas can be checked for their consistency when document versioning exist.

    Multilevel authentication for social network

    Get PDF
    Nowadays, social network plays a vital role in communication. Normally user used social networks in daily activities. However, this left all online users susceptible to misuse and abuse. Recently, there has been a remarkable growth in number of hacking as well. Once the computer is online, anyone can have access to the network. Therefore, we proposed a secure social network site called SocialBook where users can post status, photos and connect with friends. This system is developed using PHP programming language and Iterative and Incremental Development methodology. The purpose of developing this system is to solve unsecured login accounts and lack of user authentication problem. This system applies the secret question procedure when the user wants to change their account password. Moreover, SocialBook use idle session timeout mechanism for additional security. When the user is idle for ten minutes, they will be logged out automatically. So, the user will be less worry about their account from being hacked and the identity impersonation by unauthorized user

    Dream life matchmaker

    Get PDF
    Marriages are arranged by will of the Almighty and by His decisions in the heaven, but the result can only be fruitful if couple were able to meet real- life partner and establish a permanent relationship between them. Matchmaker system is the medium to help join two people through which both people will spend their life till their last breath. Matchmaker system is proposed to help individual search for their life partner by specifying a number of personality question so the system able to make recommendation of potential bride/groom. This project contains the detailed information of the person and his/her family and their expectations. This project can help number of people in finding their partners across the country

    Comparison Study of Sorting Techniques in Static Data Structure

    Get PDF
    To manage and organize large data is imperative in order to formulate the data analysis and data processing efficiency. Therefore, this paper investigates the set of sorting techniques to observe which technique to provide better efficiency. Five types of sorting techniques of static data structure, Bubble, Insertion, Selection with O(n2) complexity and Merge, Quick with O(n log n) complexity  have been used and tested on four groups between (100–30000) of dataset. To validate the performance of sorting techniques, three performance metrics which are time complexity, execution time and size of dataset were used. All experimental setups were accomplished using simple linear regression. The experimental results illustrate that Quick sort is more efficiency than other sorting and Selection sort is more efficient than Bubble and Insertion in large data size using array. In addition, Bubble, Insertion and Selection have good performance for small data size using array thus, sorting technique with behaviour O(n log n) is more efficient than sorting technique with behaviour  O(n2) using array

    Wedding planner in a box

    Get PDF
    Marriage describes the connection of two souls who promise to become one heart. Everyone dreams their marriage to be nearly perfect and that will happen only if they are able to make their wedding plan with best packages. In this busy world, many couples delay their wedding mainly because of high budget required to meet their dream wedding ceremony. Wedding ceremony requires careful and meticulous planning from many aspects such as choosing the food, make up, decoration, and gifts

    Proper software engineering process in developing an integrated telehealth system

    Get PDF
    Software development project becomes difficult because of the complexity in the business requirements, rigid framework and unpredictable performance. These cause difficulties to deliver the software on time, to maintain it and to adapt to new requirements. These scenarios had been faced in developing the healthcare information system which typically complex and comprehensive. Due to its complexities, the development of healthcare information system and other related healthcare applications typically disparate and less integrated. This led to maintenance and system integration issues that recently struggling by most healthcare providers around the world to resolve it by putting effort to link all existing disparate system into integrated one. This was due to the fact that a proper software engineering process was given less attention at the beginning of the health ICT project. This paper proposed, a systematic software engineering process based on customized Rational Unified Process for managing the development of integrated telehealth system. This paper also proposed literate modeling approach for performing system analysis and design model for users‟ accessibility and comprehensibility

    Comparison study of sorting techniques in static data structure

    Get PDF
    To manage and organize large data is imperative in order to formulate the data analysis and data processing efficiency. Therefore, this paper investigates the set of sorting techniques to observe which technique to provide better efficiency. Five types of sorting techniques of static data structure, Bubble, Insertion, Selection with O(n2 ) complexity and Merge, Quick with O(n log n) complexity have been used and tested on four groups between (100–30000) of dataset. To validate the performance of sorting techniques, three performance metrics which are time complexity, execution time and size of dataset were used. All experimental setups were accomplished using simple linear regression. The experimental results illustrate that Quick sort is more efficiency than other sorting and Selection sort is more efficient than Bubble and Insertion in large data size using array. In addition, Bubble, Insertion and Selection have good performance for small data size using array thus, sorting technique with behaviour O(n log n) is more efficient than sorting technique with behaviour O(n2 ) using array

    Investigating telemedicine approaches: a 10-country comparison

    Get PDF
    This paper investigates and appraises the current state of knowledge and practice and the existing telemedicine approaches in ten countries, namely China, Taiwan, Hong Kong, Singapore, Japan, South Korea, Canada, the U.K, Australia and New Zealand. The literature dealing with telemedicine development approaches was reviewed, compared and contrasted between Malaysia and the 10- country. Based on our analysis results, the suitable approaches and technologies were discussed. If no suitable approach is found, it will be possible to elicit the most relevant approach and best practice and to learn from any possible weaknesses
    corecore