46 research outputs found

    Propagation measurement, drain, radio wave, electromagnetic, wireless communications.

    Get PDF
    Propagation measurement results were reported in a style of open-trench drain that is common in several Asian countries in [1]. In particular, measurement results at three frequencies, namely 900 MHz, 2.4 GHz, and 5.8 GHz were reported in three scenarios, whose findings are beneficial in designing wireless communication systems in environments where such drains are present. In this work, further investigation has been made on the contents inside an open-trench drain. This investigation is expected to contribute to a practically important propagation problem because in reality, the open-trench drains environments are not always dry and empty. On the contrary, they are sometimes filled with different contents, the most common one being water, as one of the primary objectives of a drain is to collect water runoff from the surrounding buildings and houses and convey it to an outfall. In other scenarios, the open-trench drainā€™s floor might be filled with liquids, soil, foliage from the surrounding trees, and even, trash

    The approaches to quantify web application security scanners quality: A review

    Get PDF
    The web application security scanner is a computer program that assessed web application security with penetration testing technique. The benefit of automated web application penetration testing is huge, which web application security scanner not only reduced the time, cost, and resource required for web application penetration testing but also eliminate test engineer reliance on human knowledge. Nevertheless, web application security scanners are possessing weaknesses of low test coverage, and the scanners are generating inaccurate test results. Consequently, experimentations are frequently held to quantitatively quantify web application security scanner's quality to investigate the web application security scanner's strengths and limitations. However, there is a discovery that neither a standard methodology nor criterion is available for quantifying the web application security scanner's quality. Hence, in this paper systematic review is conducted and analysed the methodology and criterion used for quantifying web application security scanners' quality. In this survey, the experiment methodologies and criterions that had been used to quantify web application security scanner's quality is classified and review using the preferred reporting items for systematic reviews and meta-analyses (PRISMA) protocol. The objectives are to provide practitioners with the understanding of methodologies and criterions that available for measuring web application security scanners' test coverage, attack coverage, and vulnerability detection rate, while provides the critical hint for development of the next testing framework, model, methodology, or criterions, to measure web application security scanner quality

    Vision-based frontal vehicle detection and tracking

    Get PDF
    This paper presents a vision-based driver assistance system composing of vehicle detection using knowledge-based method and vehicle tracking using Kalman filtering.First, a preceding vehicle is localized by a proposed detection scheme, consisting of shadow detection and brake lights detection.Second, the possible vehicle region is extracted for verification. Symmetry analysis includes contour and brake lights symmetries are performed and followed by an asymmetry contour analysis in order to obtain vehicleā€™s center.The center of vehicle is tracked continuously using Kalman filtering within a predicted subwindow in consecutive frames.It reduces the scanning process and maximizes the computational speed of vehicle detection. Simulation results demonstrate good performance of the proposed system

    Understanding Customer Satisfaction of Internet Banking: A Case Study In Malacca

    Get PDF
    AbstractThe banking industry has been rapidly developing the use of Internet banking as an efficient and viable tool to create customer value. It is one of the popular services offered by the traditional banks to provide speedier and reliable services to online users. With the rapid development of computer technology as a commercial too Internet banking can be used to attract more customers to perform banking transactions in related banks. However, the main problem of Internet banking faced by the providers is that a large number of the banksā€™ customers are not willing to use the Internet banking services offered. This happened due to the services offered through Internet banking have yet to satisfy their customers. Customer satisfaction is an important factor to help banks to sustain competitive advantages. Therefore, the purpose of this research is to search and examine the factors which influence customer satisfaction towards Internet banking. The five factors which can influence customer satisfaction toward Internet banking include service quality, web design and content, security and privacy, convenience and speed. With the use of a questionnaire survey, 200 working adults participated in this study have provided valuable feedback and responses pertaining to the above factors that influence customersā€™ decision to do Internet Banking. The results of this research showed that web design and content, convenience and speed are closely linked to customer satisfaction toward Internet banking. Or ā€¦ The results of this research showed that web design and content, convenience and speed are the top three factors that influence customer satisfaction toward Internet Banking

    Purchase intention of Consumers from Melaka towards Mobile Advertising

    Get PDF
    Acceleration growth in the telecommunication technology especially in mobile devices has resulted to greater new opportunities to the marketing strategies. It thus has led to the current study on the purchase intention of consumers from Melaka towards mobile advertising. A survey was conducted with a set of self-administered questionnaire. A total of 250 respondents was recruited using convenience sampling. The results show that three out of five independent variables examined, namely credibility, irritation and incentive are significant. Informativeness and entertainment were found to have no impact on purchase intention. The regression model is able to explain 73.6% of the variation in consumers purchase intention. This study is able to provide information in relation to factors influencing purchase intention of consumer which has laid a basis in helping the mobile advertisers to develop better strategy of their advertisement

    An Adaptive Lossless Data Compression Scheme for Wireless Sensor Networks

    Get PDF
    Energy is an important consideration in the design and deployment of wireless sensor networks (WSNs) since sensor nodes are typically powered by batteries with limited capacity. Since the communication unit on a wireless sensor node is the major power consumer, data compression is one of possible techniques that can help reduce the amount of data exchanged between wireless sensor nodes resulting in power saving. However, wireless sensor networks possess significant limitations in communication, processing, storage, bandwidth, and power. Thus, any data compression scheme proposed for WSNs must be lightweight. In this paper, we present an adaptive lossless data compression (ALDC) algorithm for wireless sensor networks. Our proposed ALDC scheme performs compression losslessly using multiple code options. Adaptive compression schemes allow compression to dynamically adjust to a changing source. The data sequence to be compressed is partitioned into blocks, and the optimal compression scheme is applied for each block. Using various real-world sensor datasets we demonstrate the merits of our proposed compression algorithm in comparison with other recently proposed lossless compression algorithms for WSNs

    Complete genome sequence of Planococcus donghaensis JH1T, a pectin-degrading bacterium

    Get PDF
    The type strain Planococcus donghaensis JH1T is a psychrotolerant and halotolerant bacterium with starch-degrading ability. Here, we determine the carbon utilization profile of P. donghaensis JH1T and report the first complete genome of the strain. This study revealed the strainā€™s ability to utilize pectin and d-galacturonic acid, and identified genes responsible for degradation of the polysaccharides. The genomic information provided may serve as a fundamental resource for full exploration of the biotechnological potential of P. donghaensis JH1T

    COVID-19, Suffering and Palliative Care: A Review

    Get PDF
    According to the WHO guideline, palliative care is an integral component of COVID-19 management. The relief of physical symptoms and the provision of psychosocial support should be practiced by all healthcare workers caring for COVID-19 patients. In this review, we aim to provide a simple outline on COVID-19, suffering in COVID-19, and the role of palliative care in COVID-19. We also introduce 3 principles of palliative care that can serve as a guide for all healthcare workers caring for COVID-19 patients, which are (1) good symptom control, (2) open and sensitive communication, and (3) caring for the whole team. The pandemic has brought immense suffering, fear and death to people everywhere. The knowledge, skills and experiences from palliative care could be used to relieve the suffering of COVID-19 patients

    Design and build a negative regulated DC supply

    No full text
    The negative regulated DC power supply is used in many application. The common use of negative DC voltage is in operational amplifiers which the device require both positive and negative voltage. This project aims to design and build a negative regulated voltage supply with maximum output current limit of -100 milli-ampere, voltage ripple of less than 0.2 volt and the output voltage to regulate at voltage range within -5V. The negative regulated voltage supply circuit consists of a step down transformer connected to a filter capacitor, rectifier and a regulator made up of transistors and other discrete components. The final outcome of the circuit design achieved the objective. This report covers the design process of the negative regulated voltage supply circuit using a software program and the implementation of the design into a hardware circuit. The test results, observations, problems faced and future recommendations of the project are discussed in this report.Bachelor of Engineerin
    corecore