174 research outputs found

    UPC barcode apps for drug registered verification

    Get PDF
    In pharmacology, drug is used to prevent and cure diseases and to improve the physical or mental well-being. All medicinal products must be registered with Drug Control Authority (DCA) of Malaysia before being marketed. However, there are still numerous unregistered products being sold in night markets and grocery stalls that contained unknown materials that could harm our bodies. As nowadays most people own smartphones, thus it will be great if the smartphone is being utilized to become a mobile apps that can prevent consumers from buying unregistered products. This study described the process of creating a barcode reader application for drug registered verification. The application is created using Android Studio software, Java programming language and source code from GitHub, which is then synchronized with the database of some medicinal products. The barcode scanner is then tested to read the UPC barcode on the products and the result of registration confirmation will be shown on the screen of the smartphone. Thus, it will aware the user from buying the unregistered products

    Current implementation of advance encryption standard (AES) S-Box

    Get PDF
    Although the attack on cryptosystem is still not severe, the development of the scheme is stillongoing especially for the design of S-Box. Two main approach has beenused, which areheuristic method and algebraic method. Algebraic method as in current AES implementationhas been proven to be the most secure S-Box design to date. This review paper willconcentrate on two kinds of method of constructing AES S-Box, which are algebraic approachand heuristic approach. The objective is to review a method of constructing S-Box, which arecomparable or close to the original construction of AES S-Box especially for the heuristicapproach. Finally, all the listed S-Boxes from these two methods will be compared in terms oftheir security performance which is nonlinearity and differential uniformity of the S-Box. Thefinding may offer the potential approach to develop a new S-Box that is better than theoriginal one.Keywords: block cipher; AES; S-Bo

    Geometric and process design of ultra-thin junctionless double gate vertical MOSFETs

    Get PDF
    The junctionless MOSFET architectures appear to be attractive in realizing the Moore’s law prediction. In this paper, a comprehensive 2-D simulation on junctionless vertical double-gate MOSFET (JLDGVM) under geometric and process consideration was introduced in order to obtain excellent electrical characteristics. Geometrical designs such as channel length (Lch) and pillar thickness (Tp) were considered and the impact on the electrical performance was analyzed. The influence of doping concentration and metal gate work function (WF) were further investigated for achieving better performance. The results show that the shorter Lch can boost the drain current (ID) of n-JLDGVM and p-JLDGVM by approximately 68% and 70% respectively. The ID of the n-JLVDGM and p-JLVDGM could possibly boost up to 42% and 78% respectively as the Tp is scaled down from 11nm to 8nm. The channel doping (Nch) is also a critical parameter, affecting the electrical performance of both n-JLDGVM and p-JLDGVM in which 15% and 39% improvements are observed in their respective ID as the concentration level is increased from 1E18 to 9E18 atom/cm3. In addition, the adjustment of threshold voltage can be realized by varying the metal WF

    A panel data approach towards the effectiveness of energy policies in fostering the implementation of solar photovoltaic technology: Empirical evidence for Asia-Pacific

    Get PDF
    Today, the growing Asia-Pacific population causes a dramatic growth in energy supply to meet energy demand. The rapid rise in energy demand is causing concern in the region. Thus, the present study scrutinizes the effect of energy policy involvement in steering-up renewable energy development by empirically assessing the role of policy instruments in encouraging residen-tial-scale and commercial-scale photovoltaic (PV) systems. The analysis is performed using a fixed effects estimator on a selected range of policy approaches (market-pull policies and tax incentives) and a technology-push policy (capital grants) in selected Asia-Pacific countries between 1998 and 2015. The return on investment is estimated to measure the incentives of feed-in tariff (FIT) tariff policies for both residential-scale and commercial-scale PV systems. This study has shown the im-portance of a strategic combination between technology-push and market-pull policies as comple-mentary to adopting technology and increasing renewable energy utilization for solar PV systems on a residential scale. Investigations into the effectiveness of regulatory support policies for solar PV systems indicate that energy policies are necessary to facilitate solar PV growth on a residential scale in the Asia-Pacific.info:eu-repo/semantics/publishedVersio

    Performance analysis of ultrathin junctionless double gate vertical MOSFETs

    Get PDF
    The main challenge in MOSFET minituarization is to form an ultra-shallow source/drain (S/D) junction with high doping concentration gradient, which requires an intricate S/D and channel engineering. Junctionless MOSFET configuration is an alternative solution for this issue as the junction and doping gradients is totally eliminated. A process simulation has been developed to investigate the impact of junctionless configuration on the double-gate vertical MOSFET. The result proves that the performance of junctionless double-gate vertical MOSFETs (JLDGVM) are superior to the conventional junctioned double-gate vertical MOSFETs (JDGVM). The results reveal that the drain current (ID) of the n-JLVDGM and p-JLVDGM could be tremendously enhanced by 57% and 60% respectively as the junctionless configuration was applied to the double-gate vertical MOSFET. In addition, junctionless devices also exhibit larger ION/IOFF ratio and smaller subthreshold slope compared to the junction devices, implying that the junctionless devices have better power consumption and faster switching capability

    2021 stars conference: student plenary

    Full text link
    The Student Panel Session at the 2021 STARS Conference concluded the formal presentations for the event.&nbsp; At this session, students from the tertiary sector shared with delegates their personal experiences in higher education and thoughts concerning the messages and insights gained from the conference experience. The students had responded to an invitation from Student Voice Australia to participate in the conference, be part of the Panel, and were encouraged to attend the keynote presentations across the event.&nbsp; Delegates had the opportunity to present questions to the students.&nbsp; For the purposes of this feature, the editors have summarised and edited the transcript to present the key points of each discussion, including questions and comments from delegates. Panel members have approved the editorial interpretations of their comments.</jats:p

    Data visualization of temporal ozone pollution between urban and sub-urban locations in Selangor Malaysia

    Get PDF
    In Malaysian environment, ground level zone has been reported as one of the most important pollutants that contribute to air quality degradation. The odourless and invisible nature of the pollutant has caused problems for individuals to realize and notice the existence of Ozone pollution in the environment. Thus, this study was conducted with the aim to assess and visualize the occurrence of potential Ozone pollution severity of two chosen locations in Selangor, Malaysia: Shah Alam (urban) and Banting (sub-urban). Data visualization analytics were employed using Ozone exceedances and Principal Component Analysis (PCA). The study results have shown an increasing pattern of Ozone pollution occurrence with several modes of distinct diurnal variations at the locations. The study also provides strong insights that Banting might experience a higher potential for Ozone pollution severity compared to Shah Alam.Keywords: ozone pollution; air quality; data visualization; data analytics; principalcomponent analysis

    Adapting Traceability in Digital Forensic Investigation Process

    Get PDF
    Generally, the goals of digital forensic investigation process in a cyber crime are to identify the origin of the incident reported as well as maintaining the chain of custody so that the legal process can take its option. However, the traceability process has become a key or an important element of the digital investigation process, as it is capable to map the events of an incident from different sources in obtaining evidence of an incident to be used for other auxiliary investigation aspects. Hence, this paper introduces the adaptability of the traceability model to illustrate the relationship in the digital forensic investigation process by integrating the traceability features. The objective of this integration is to provide the capability of trace and map the evidence to the sources and shows the link between the evidence, the entities and the sources involved in the process. Additionally, the proposed model is expected to help the forensic investigator in obtaining accurate and complete evidence that can be further used in a court of law

    Scenario Based Worm Trace Pattern Identification Technique

    Get PDF
    The number of malware variants is growing tremendously and the study of malware attacks on the Internet is still a demanding research domain. In this research, various logs from different OSI layer are explore to identify the traces leave on the attacker and victim logs, and the attack worm trace pattern are establish in order to reveal true attacker or victim.For the purpose of this paper, it will only concentrate on cybercrime that caused by malware network intrusion and used the traditional worm namely blaster worm variants. This research creates the concept of trace pattern by fusing the attacker’s and victim’s perspective. Therefore, the objective of this paper is to propose on attacker’s, victim’s and multi-step(attacker/victim)’s trace patterns by combining both perspectives. These three proposed worm trace patterns can be extended into research areas in alert correlation and computer forensic investigation

    Tracing Technique for Blaster Attack

    Get PDF
    Blaster worm of 2003 is still persistent, the infection appears to have successfully transitioned to new hosts as the original systems are cleaned or shut off, suggesting that the Blaster worm, and other similar worms, will remain significant Internet threats for many years after their initial release. This paper is to propose technique on tracing the Blaster attack from various logs in different OSI layers based on fingerprint of Blaster attack on victim logs, attacker logs and IDS alert log. The researchers intended to do a preliminary investigation upon this particular attack so that it can be used for further research in alert correlation and computer forensic investigation
    • …
    corecore