50 research outputs found

    GIS based location information enquiry system (gisbalies)

    Get PDF
    The convergence of the internet and wireless communication has led the popularity of using handheld devices. People have now started demanding services that can be delivered any time anywhere, called Location Based Services (LBS). This paper deal with development of location based services with integrating handheld devices that apply to emergency services. Handheld devices suffer from serious constrains in three areas: memory size, processor speed and screen size. Because of this heavily resource constraint, no application code is installing on handheld devices. This application uses the client server concept within wireless internet environment. The positioning service such as GPS is used to know the position of the user. The objective of this research is to display special query on the required spatial information within handheld devices using different operating systems such as WinCE, Palm OS and Symbian. Hence the system assists people e.g. at the time of emergency to find the shortest path to the hospital. The application will be access through the wireless internet. Only the related location in the entire map will be downloading to the handheld devices, which gives the economical usage of bandwidth and resources for real time response. This technology uses mobile internet as web browser embedded in the handheld devices

    Perception on Cyber Terrorism: A Focus Group Discussion Approach

    Get PDF
    Focus group discussion is an exploratory research technique used to collect data through group interaction. This tech- nique provides the opportunity to observe interaction among participants on a topic under this study. This paper con- tributes to an understanding on the cyber terrorism conceptual framework through the analysis of focus group discus- sion. The proposed cyber terrorism conceptual framework which was obtained during the qualitative study by the au- thors has been used as a basis for discussion in the focus group discussion. Thirty (30) participants took part in the focus group discussion. The overall results suggest that the proposed cyber terrorism framework is acceptable by the partici- pants. The present study supports our initial research that the cyber terrorism conceptual framework constitutes the fol- lowing components: target, motivation, tools of attack, domain, methods of attack and impact

    WiMAX: Network Entry Phase Optimization for Bandwidth Improvement Solution

    Get PDF
    Worldwide Interoperability for Microwave access (WiMAX) service providers is concerned about having enough Internet-backbone to support a potentially large number of users. Network entry process directly influences the initial delay that users are experiencing. Therefore, efficiently combine DCD interval, UCD interval and initial ranging interval in network entry process is predicted to influence the network performance, as presented in this paper

    Image Watermarking Using Psychovisual Threshold Over the Edge

    Get PDF
    Currently the digital multimedia data can easily be copied. Digital image watermarking is an alternative approach to authentication and copyright protection of digital image content. An alternative embedding watermark based on human eye properties can be used to effectively hide the watermark image. This paper introduces the embedding watermark scheme along the edge based on the concept of psychovisual threshold. This paper will investigate the sensi-tivity of minor changes in DCT coefficients against JPEG quantization tables. Based on the concept of psychovisual threshold, there are still deep holes in JPEG quantization values to embed a watermark. This paper locates and utilizes them to embed a watermark. The proposed scheme has been tested against vari-ous non-malicious attacks. The experiment results show the watermark is robust against JPEG image compression, noise attacks and low pass filtering

    Technical Security Metrics Model in Compliance with ISO/IEC 27001 Standard

    Get PDF
    Technical security metrics provide measurements in ensuring the effectiveness of technical security controls or technology devices/objects that are used in protecting the information systems. However, lack of understanding and method to develop the technical security metrics may lead to unachievable security control objectives and inefficient implementation. This paper proposes a model of technical security metrics to measure the effectiveness of network security management. The measurement is based on the security performance for (1) network security controls such as firewall, Intrusion Detection Prevention System (IDPS), switch, wireless access point and network architecture; and (2) network services such as Hypertext Transfer Protocol Secure (HTTPS) and virtual private network (VPN). The methodology used is Plan-Do-Check-Act process model. The proposed technical security metrics provide guidance for organizations in complying with requirements of ISO/IEC 27001 Information Security Management System (ISMS) standard. The proposed model should also be able to provide a comprehensive measurement and guide to use ISO/IEC 27004 ISMS Measurement standard

    DIFS modifications to support QoS in IEEE 802.11g DCF ad-hoc networks

    Get PDF
    This paper describes and investigates the QoS provisioning technique used in IEEE 802.11g ad-hoc structure. This research then propose better scheme to support QoS by modifying the DCF Interframe Space (DIFS) to use new values to bias towards the high priority traffic flow and distinguish it from the low priority traffic.Simulations are done using NS-2 and the findings presented. Results showed that better throughput can be achieved to provide better traffic flows on high priority traffi

    CNC PCB drilling machine using novel natural approach to euclidean TSP

    Get PDF
    Nowadays, many industries use the Computerized Numerical Control (CNC) for Printed Circuit Board (PCB) drilling machines in industrial operations. It takes a long time to find optimal tour for large number of nodes (up to thousands). To achieve more effective results, optimization systems approach is required to be equipped in drilling machine. Euclidean Traveling Salesman Problem (TSP) is one of optimization method that gives fast near optimal solution for the drilling machine movement using novel friendly techniques. This paper describes the development of that CNC PCB drilling machine with novel approach to Euclidean TSP. This design can be widely applied to various CNC PCB drilling machines in small and medium scale manufacturing industries

    Reflection Decomposition In Single Images Using An Optimum Thresholding-based Method

    Get PDF
    Traditional methods of separating reflection components have been developed based on multiple images. There are only few methods which are able to use a single image. However, their applicability is limited due to offline setting of its arbitrary parameter. In this study, we propose an effective method to separate specular components using a single image which based on an optimum thresholding-based technique. This method employs modified specular-free image and selects an optimum value for the offset parameter. In contrast to prior method, the proposed method processes all the steps automatically and produces better performance. Experimental results for inhomogeneous objects demonstrate the promising applicability for real-time implementation. However, this method is unsuitable for objects with strong specular reflection. An extension is suggested to include the specular lobe reflectance into Shafer dichromatic model

    An Enhancement Of The Spectral Statistical Test For Randomness

    Get PDF
    Random Numbers Play Essential Roles In Cryptography, Modeling And Simulation Applications. NIST Statistical Test Suite For Randomness Is The Most Comprehensive Set Of Random Tests. It Has Been Popular And Used As A Benchmark Test For Randomness. One Of The Random Tests Is Spectral Test. There Has Been Serious Problem In Spectral Test As Pointed Out By Few Researchers. In This Paper, Further Theoretical Improvement Shall Be Proposed On The Spectral Test Based On Computational Observation Being Made On Random Noise. A Recommendation On The Spectral Test Setting For Short Cryptographic Keys Shall Also Be Made
    corecore