8 research outputs found

    Implementing security framework of electronic business application

    Get PDF
    Security is an essential issue in e-commerce. Lack of security knowledge exposed e�commerc e customer to threat. Security threat such as viruses, Trojan and malicious software could put customer to danger. A study accessing user conceptions of web security has shown web users have mistakenly evaluated whether a connection is secure or not and vice versa even there knowledge of technology is high. Therefore, they need an assistant in determines which website is secure most. This project is about security measurement tool of web based application focused on customer side. The measurement framework is based on Security Quantification of Electronic Business Application. The framework based on four (4) objectivities to be measured, which are Confidentiality, Integrity, Availability and Accountability. Development methodology of this project is Waterfall model. The product is stand-alone application which can be used anywhere at the customer side. The advantage of this tool is covers broad evaluation of files, using both external and internal measurement and P HP source code evaluation automatically

    Consistency check between XML schema and class diagram for document versioning

    Get PDF
    A consistency check between design and implementation is usually done in order to check the correctness of the system’ requirements. However, if the requirements are changed over time, then the document versioning occurred within the requirements. For XML Schema, document versioning exists when there is a change in the XML Schema from its previous Schema. In order to detect the versioning of both XML Schemas, consistency rules check need to be performed to both class diagrams produced by both Schemas. The consistency between two XML Schemas are checked based on transformation rules and versioning rules. Transformation rules are used for translating the XML Schema into class diagram and versioning rules are used for checking the existing of document changes between two XML Schemas. Once two XML Schemas are different the consistency rules will be used for the consistency check. This paper presents an approach based on transformation rules and versioning rules to check consistency between XML Schema and UML class diagram when document versioning exist. The approach is then used for the case study to show how the consistency is checked in order to detect the versioning of two different XML Schemas. Based on the case study, the approach shows that two XML Schemas can be checked for their consistency when document versioning exist

    Comparison Study of Sorting Techniques in Static Data Structure

    Get PDF
    To manage and organize large data is imperative in order to formulate the data analysis and data processing efficiency. Therefore, this paper investigates the set of sorting techniques to observe which technique to provide better efficiency. Five types of sorting techniques of static data structure, Bubble, Insertion, Selection with O(n2) complexity and Merge, Quick with O(n log n) complexity  have been used and tested on four groups between (100–30000) of dataset. To validate the performance of sorting techniques, three performance metrics which are time complexity, execution time and size of dataset were used. All experimental setups were accomplished using simple linear regression. The experimental results illustrate that Quick sort is more efficiency than other sorting and Selection sort is more efficient than Bubble and Insertion in large data size using array. In addition, Bubble, Insertion and Selection have good performance for small data size using array thus, sorting technique with behaviour O(n log n) is more efficient than sorting technique with behaviour  O(n2) using array

    Wedding planner in a box

    Get PDF
    Marriage describes the connection of two souls who promise to become one heart. Everyone dreams their marriage to be nearly perfect and that will happen only if they are able to make their wedding plan with best packages. In this busy world, many couples delay their wedding mainly because of high budget required to meet their dream wedding ceremony. Wedding ceremony requires careful and meticulous planning from many aspects such as choosing the food, make up, decoration, and gifts

    The design of flexible telemedicine framework for healthcare big data

    No full text
    The lifetime health record, which correlates each episode of care of an individual into a continuous health record, is the central key delivery of the Malaysian integrated telehealth application. A lifetime health record for an individual is the integration on his/her life timeline of all his/her electronic health records from healthcare centers he/she has been to since birth. The electronic medical records to be collected that form the lifetime health record, can be gathered from various spectrums of health information systems and healthcare levels, implying the necessity to handle diverse communications and information technology infrastructures. Most important consideration, however, is that the lifetime health record should contain not only longitudinal health summary information, but also the possibility of on-line retrieval of all patient health history whenever required, even during computer system downtime and unavailability of landline telecommunication network. It is only with such comprehensiveness of health records that the risk of inappropriate delivery of care may be reduced, and most of all the true continuum of care may be achieved. This paper develops an interoperable framework for an integrated and distributed telemedicine system in Malaysia, intended to cope with these requirements. The overview on the framework is provided, followed by a concise description of the three major components of the framework
    corecore