13 research outputs found

    Securing library information system: Vulnerabilities and threats

    Get PDF
    Threats and vulnerabilities in computers and networks are common nowadays since computers are widely used by the public. The risks of computer threats and vulnerabilities are high since most computers are connected to the internet. Library Information Systems is also vulnerable to attack since it is a public access institution. Majority of users are naive when it comes to computer and network securities. Some breaches in Library Information System are intentional and some are unintentional. Risks analysis should be done to find the threats and risks in designing the Library Information System. Threats are made possible due to lack of proper procedures, software flaws and policies. The administrators should anticipate all the possible attacks and their mitigation techniques. In this paper, we will try to address various issues arise from this vulnerabilities and threats. We will also describe how we can reduce and overcome this vulnerabilities and threats

    Group formation using genetic algorithm

    Get PDF
    Due to the increasing of complexity in software projects, group work is becoming more important in order to ensure quality software products can be delivered on time.Thus, in universities, group work is seen as a good preparation for students to industry because by working in group, it can reduce the individual workload,improve the ability to manage a project and enhance the problem solving skills. However, due to lack of programming skills especially in Java programming language and the inability to have meetings frequently among the group members,most of the students’ software project cannot be delivered successfully.To solve this problem, systematic group formation is one of the initial factors that should be considered to ensure that every group consists of quality individuals who are good in Java programming and also to ensure that every group member in a group are staying closer to each other.In this research, we propose a method for group formation using Genetic Algorithms, where the members for each group will be generated based on the students’ programming skill and location of residential colleges

    Generic functional requirements for effective school parents interaction system (SPIS)

    Get PDF
    An effective interaction system in school environment is certainly vital in order to improve communication and relationship between school and its community. Apart from that, information can be shared and exchanged easily. Through use of Internet, the drawback in old style of school-parent relationship including problem with parents do not have enough time to get involve in their children life school will be solved without doubt.Although there are some existing Internet-based systems for school-parent interaction that currently available in the market, the specifications and the features of these systems are different. Thus, this paper will propose generic functional requirements of school-parent interaction system. The proposed requirements can be used as a standard requirement which beneficial for developers in constructing an effective school-parent interaction system. Thus, reduce the development time and effort

    RSA algorithm performance in short messaging system exchange environment

    Get PDF
    Short Message Service (SMS) is a widely service for brief communication.With the rise of mobile usage it has become a popular tool for transmitting sensitive information. This sensitive information should be totally secure and reliable to exchange.This urgent need for secure SMS, led to drive for RSA implementation, which is considered one of the strongest algorithms in security since we are going to bring big security into small device.Our main goal in this project is to design an experimental test bed application in order to use this application in evaluating the performance of RSA. This report explains and documents the process of implementing an RSA in Experimental SMS Exchange Environment using J2ME language which is available in several mobile devices on the market today

    Penilaian kemahiran pengaturcaraan: Eksperimen terhadap pelajar menggunakan proses kejuruteraan semula

    Get PDF
    Agak sukar untuk kita menilai tahap kemahiran pengaturcaraan setiap pelajar jika hanya merujuk kepada keputusan peperiksaan semata-mata. Oleh yang demikian, kertas kerja ini akan melaporkan hasil eksperimen yang telah dilakukan terhadap pelajar Program Sarjana Muda Teknologi Maklumat, pengkhususan dalam bidang Kejuruteraan Perisian. Seramai 33 orang pelajar yang mempunyai keputusan yang baik dalam Pengaturcaraan Java telah dipilih dan diuji dalam makmal menggunakan proses kejuruteraan semula. Pelajar diminta untuk membangunkan semula program menggunakan Java berpandukan program Ada yang disediakan. Hanya keputusan pengaturcaraan yang memenuhi spesifikasi ujian sahaja dinilai dan masa setiap pelajar yang berjaya direkodkan

    A method for group formation using genetic algorithm

    Get PDF
    Due to the increasing of complexity in software projects, group work is becoming more important in order to ensure quality software products can be delivered on time.Thus, in universities, group work is seen as a good preparation for students to enter industry because by working in group, it can reduce the individual workload, improve the ability to manage a project and enhance the problem solving skills. However, due to lack of programming skills especially in Java programming language, most of the students’ software project cannot be delivered successfully.To solve this problem, systematic group formation is one of the initial factors that should be considered to ensure that every group consists of quality individuals who are good in programming.This paper presents a method for group formation using genetic algorithm, where the members for each group will be generated based on the students’ programming skill

    A problem based learning model for IT courses

    Get PDF
    A problem that always occurs in the implementation of PBL is inappropriate course assessment, the out-of-context conversation, unbalanced group formation and improper facilitation.In addition, a comprehensive PBL model that considers those factors has not been performed yet.Thus, this paper aims to determine the effective factors that might influence IT students’ perception on the PBL practices.The study involved three (3) main phases: Initial Study, Modeling, and Validation. Four main factors have been identified: PBL Characteristics, Course Assessment, PBL Practices, and PBL Perception. Based on these four factors, a PBL model hasbeen constructed.Four hypotheses were formulated and analyzed.All hypotheses have been proven significantly acceptable.The results show that the PBL Characteristics and Course Assessment factors significantly influence the PBL Practices and indirectly influence the students’ perception on the PBL implementation for IT courses.This model can assist decision makers in enhancing the PBL teaching and learning strategy for IT courses
    corecore