56 research outputs found

    Penghasilan Karbon Teraktif Daripada Kelongsong Biji Getah Sebagai Bahan Penjerap Untuk Penyingkiran Pencelup

    Get PDF
    Kajian ini dilaksanakan bagi memperolehi karbon teraktif (KT) daripada kelongsong biji getah. Kaedah pengaktifan kimiafizikal melalui rawatan natrium hidroksida (NaOH) dan penggasan karbon dioksida (CO2) telah digunakan. Rekabentuk komposit pusat dipilih bagi menentukan keadaan operasi optimum antara suhu, tempoh pengaktifan dan nisbah jerap isi (NJI) NaOH:arang, bagi penghasilan KT sebagai bahan penjerap kepada pencelup-pencelup malacit hijau (MH) dan remazol biru R (RBR). Beberapa siri pencirian digunakan untuk menentukan sifat hasilan KT

    CloudIDS: Cloud Intrusion Detection Model Inspired by Dendritic Cell Mechanism

    Get PDF
    Cloud Computing Security is a new era of computer technology and opens a new research area and creates a lot of opportunity of exploration. One of the new implementation in Cloud is Intrusion Detection System (IDS).There are problems with existing IDS approach in Cloud environment. Implementing traditional IDS need a lot of self-maintenance and did not scale with the customer security requirements. In addition, maintenance of traditional IDS in Cloud Computing system requires expertise and consumes more time where not each Cloud user has. A decentralized traditional IDS approach where being deployed in current Cloud Computing infrastructure will make the IDS management become complicated. Each user's IDS will not be the same in term of type and configurations and each user may have outdated signatures. Inter VM's communication also become a big concern when we implementing Cloud Computing system where communication between Clouds are not monitored and controlled by the traditional IDS. A specific IDS model for Cloud computing is required to solve these problems. In this paper, we develop a prototype of Cloud IDS inspired by Dendritic Cell mechanism. Experiment result proved that Cloud IDS was able to detect any attempt to attack the Cloud environment. The experiments show that the Cloud IDS model based on Dendritic Cell algorithm able to identify and detect novel threat that targeting Cloud environment

    Metodologi Tarjīḥ al-Kāndahlawi dalam Karya al-Abwāb wa al-Tarājim li Ṣaḥīḥ al-Bukhārī [The Methodology of al-Kāndahlawi’s Tarjīḥ In al-Abwāb wa al-Tarājim li Ṣaḥīḥ al-Bukhārī]

    Get PDF
    Perkembangan penulisan ḥadīth telah lama berlaku sejak abad ke-2H/8M. Pelbagai metode telah diperkenalkan oleh para ulama dalam menulis karya ḥadīth. Metode tarjīḥ merupakan salah satu metode yang paling kerap diaplikasikan oleh para ulama ḥadīth ketika menulis karya mereka. Keistimewaan yang terdapat pada metode ini menarik minat sejumlah besar pengkarya untuk mengaplikasikan metode ini dalam karya mereka termasuklah al-Kāndahlawi. Al-Kāndahlawi  telah menjadikan metode ini sebagai salah satu metode yang mendominasi karya al-Abwāb Wa al-Tarājim beliau. Metode tarjīḥ beliau dalam karya al-abwāb dan al-tarājim belum diperbincangkan secara tuntas. Justeru, kajian ini dibuat untuk mengenalpasti metode tarjīḥ yang diguna pakai oleh al-Kāndahlawi dalam menghasilkan karya al-Abwāb wa al-Tarājim li Ṣaḥīḥ al-Bukhārī. Kajian ini merupakan kajian analisis kandungan yang menggunakan pendekatan kaedah analisis dokumen dan analisis sejarah dalam proses pengumpulan data. Data-data yang dikumpulkan dianalisis melalui pendekatan deskriptif. Hasil kajian mendapati bahawa al-Kāndahlawi menggunakan lima metode tarjīḥ. Pertama ialah al-tarjīḥ bi muwāfaqah maᶜānī al-Qurān. Kedua, al-tarjīḥ li muṭābaqah al-ḥadīth bi al-kitāb. Ketiga, al-tarjīḥ aḥad al-khabarain bi muwāfaqah al-aqwāl al-ᶜulama. Keempat, al-tarjīḥ bi iᶜtibār al-isnād . Kelima, tarjīḥ bi muwāfaqah dalil ākhar. Implikasi kajian ini adalah pentingnya menyelami metodologi tarjīḥ yang digunakan oleh ulama dalam menulis ḥadīth Nabi SAW. The burgeoning of Hadith recounting and reporting have long been flourishing since in the second Hijriah (8th Century) with profuse methodology introduced by community of renown Islamic scholars, particularly Tarjih methodology which is known to be the most incessantly solicited. The eccentric or distinctiveness of Tarjih methodology, has drawn the recognition of preponderance among scholars including al-Kandahlawi. Tarjih is evidently the pre-eminence premise on which al-Kandahlawi wrote his al-Abwab Wa al-Tarajim. However, the Tarjih methodology in this particular work of his, has not been examined and explained in detail. Therefore, the impetus of this research paper is purposely carried out to illuminate the applicative of Tarjih methodology in producing his work, al-Abwāb wa al-Tarājim li Ṣaḥīḥ al-Bukhārī. In essence, this research is a study of content analysis that employs document analysis method and historical analysis in data accumulating process. The accreted data then, is analysed by means of descriptive analysis. Ramifications of this research paper recognised that al-Kandahlawi has applied five (5) Tarjih methodology as follows, al-tarjīḥ bi muwāfaqah maᶜānī al-Qurān, al-tarjīḥ li muṭābaqah al-ḥadīth bi al-kitāb, al-tarjīḥ aḥad al-khabarain bi muwāfaqah al-aqwāl al-ᶜulama, al-tarjīḥ bi iᶜtibār al-isnād and tarjīḥ bi muwāfaqah dalil ākhar.  This research paper strives to impart the importance to appreciate the diverse Tarjih methodology utilised by scholars in interpreting hadiths by Prophet Muhammad s.a.w

    Predictors of career advancement of female academic staff in Nigerian universities

    Get PDF
    Female participation in the formal sector is gradually growing in hitherto male and female oriented organizations around the globe.However, the rate of female entry into higher positions of management is not encouraging relative to the number of able female labour force in the Nigeria. Using regression analysis on 368 surveys of female academic staff of Nigerian universities via statistical package for social sciences 18, this study examines predictors and found that level of education and organizational support were positively significant to career advancement. However, work experience was negatively related to career advancement. Thus, this is an insight that these positive factors are viable predictors to career advancement of female academic staff. Recommendation for future study was given in the study

    Analisis keberkesanan benziltrietilamonium klorida sebagai perencat kakisan bagi perlindungan keluli karbon

    Get PDF
    Keberkesanan perencatan benziltrietilamonium klorida (BK) terhadap perlindungan kakisan keluli karbon di dalam 1 M asid asetik telah dianalisis dengan menggunakan kaedah ujian kehilangan berat. Matlamat kajian adalah untuk menilai tahap kecekapan perencatan BK berdasarkan perubahan nilai kepekatan perencat berkenaan dan suhu. Analisis kehilangan berat menunjukkan kadar kakisan keluli karbon berjaya dikurangkan dengan penggunaan kepekatan BK yang lebih tinggi dan nilai kecekapan perencatan BK mencapai sehingga 70%. Namun kadar kakisan didapati meningkat selari dengan peningkatan suhu. Analisis termodinamik mendapati perencatan BK berjaya mengurangkan proses pelarutan ion-ion logam melalui pembentukan lapisan filem nipis pada permukaan keluli karbon. Analisis juga menunjukkan sebatian BK berupaya menjerap pada permukaan keluli karbon melalui kedua-dua kaedah penjerapan fizikal dan kimia. Proses penjerapan BK pada permukaan keluli karbon didapati lebih menjurus kepada model isoterma penjerapan Langmuir. Analisis morfologi menggunakan mikroskop imbasan elektron turut mengesahkan berlakunya perencatan BK pada tapak permukaan keluli karbon. Keseluruhan kajian mendapati sebatian BK berupaya melindungi keluli karbon daripada mengalami kakisan di dalam medium asid asetik

    Cloud denial of service detection by dendritic cell mechanism

    Get PDF
    The term cloud computing is not new anymore in computing technology. This form of computing technology previously considered only as marketing term, but today cloud computing not only provides innovative improvements in resource utilization but it also creates a new opportunities in data protection mechanisms where the advancement of intrusion detection technologies are blooming rapidly. From the perspective of security, cloud computing also introduces concerns about data protection and intrusion detection mechanism especially cloud computing are exposed to Denial of Service (DoS) attacks. This paper aims to provide DoS detection mechanism for cloud computing environment. As a result, we provide an experiment to examine the capability of the proposed system. The result shows that the proposed system was able to detect DoS attacks that conducted during the experiment with 94.4% detection rate. We conclude the paper with a discussion on the results, then we include together with a graphical summary of the experiment's result

    Rukhsah Terhadap Golongan Orang Kelainan Upaya (OKU)

    Get PDF
    The Arabic term "Barakah" is used to this day amongst Muslims in their different languages as a very popular supplication for prosperity. The term was mentioned in the Qur’an on numerous occasions in different contexts, some referring to a physical dimension while others refer to a spiritual one. This paper sets out to examine the Qur’anic concept of Barakah by examining the meaning of Barakah within the Qur’anic context. It will explore the different usages of Barakah in the Qur’an and the understandings that could be deduced from them through investigating Quranic verses and their exegesis from both classical and modern works of Tafsir. The paper concludes that Barakah in the Quran comes in numerous context and carries many important meanings turning something that seems ordinary into something extraordinary with incredible characteristics. Although Barakah maybe subtle and invisible only some aspects are understood which have been named and identified in the Quranic and Prophetic texts

    State of the Art Intrusion Detection System for Cloud Computing

    Get PDF
    The term Cloud computing is not new anymore in computing technology. This form of computing technology previously considered only as marketing term, but today Cloud computing not only provides innovative improvements in resource utilisation but it also creates a new opportunities in data protection mechanisms where the advancement of intrusion detection technologies  are blooming rapidly. From the perspective of security, Cloud computing also introduces concerns about data protection and intrusion detection mechanism. This paper surveys, explores and informs researchers about the latest developed Cloud Intrusion Detection Systems by providing a comprehensive taxonomy and investigating possible solutions to detect intrusions in cloud computing systems. As a result, we provide a comprehensive review of Cloud Intrusion Detection System research, while highlighting the specific properties of Cloud Intrusion Detection System. We also present taxonomy on the key issues in Cloud Intrusion Detection System area and discuss the different approaches taken to solve the issues. We conclude the paper with a critical analysis of challenges that have not fully solved

    Perlindungan biokakisan keluli karbon akibat bakteria penurun sulfat yang dipencil daripada minyak mentah tropika

    Get PDF
    Ancaman biokakisan akibat aktiviti bakteria penurun sulfat (SRB) pada saluran paip keluli karbon dalam industri petroleum boleh menjejaskan kelancaran aliran pengangkutan minyak mentah dan meningkatkan kos pengoperasian. Usaha bagi melindungi keluli karbon serta pengawalan SRB masih memerlukan kajian yang berterusan. Dalam kajian ini, keberkesanan tetrametilamonium bromida (TMB), karboksimetil trimetilamonium (BTN) dan benzalkonium klorida (BKC) bagi melindungi keluli karbon di dalam persekitaran yang mengandungi SRB diuji melalui kaedah pengutuban elektrokimia dinamik (PED) dan morfologi keluli karbon dianalisis menggunakan mikroskop elektron imbasan. Analisis PED mendapati penggunaan TMB, BTN dan BKC masing-masing berupaya mengurangkan kadar kakisan sehingga 0.13, 0.56 dan 0.17 mm/thn berbanding 8.91 mm/thn pada larutan kawalan yang mengandungi SRB. Morfologi permukaan biofilem mengesahkan kadar pertumbuhan SRB serta hasilan metabolisme bakteria ini turut mengalami penyusutan. Kajian ini menunjukkan dua mekanisme kawalan kakisan didapati berlaku iaitu mekanisme perencatan kakisan melalui penjerapan sebatian amonium kuaterner pada permukaan keluli karbon serta berlakunya proses tindak balas mitigasi sebatian ini dengan bakteria SRB. Kesimpulannya, TMB, BTN dan BKC didapati berupaya melindungi keluli karbon daripada mengalami kakisan akibat aktiviti SRB

    Keberkesanan teknologi augmentasi realiti dalam topik pembelajaran pola

    Get PDF
    Matematik Awal merupakan salah satu mata pelajaran yang kritikal dimana konsep pembelajaran perlu diperkenalkan kepada murid pada peringkat awal agar tidak wujud persepsi terhadap konsep mata pelajaran ini. Bermula pada tahun 1970-an, kaedah pengajaran secara tradisinya lebih bermakna kepada penghafalan konsep Matematik. Tujuan penyelidikan ini adalah untuk meningkatkan kefahaman murid tentang topik pola dalam Matematik Awal dengan mengintegrasikan aplikasi Augmentasi Realiti. Kajian pembangunan modul ini dijalankan menggunakan model TUP (Technology, Usability, Pedagogy) daripada Model TUP Bednarik telah dilaksanakan untuk menilai teknologi, kebolehgunaan dan pedagogi untuk menilai keberkesanan modul yang dihasilkan. Kajian mendapati pelajar lebih berminat dan menunjukkan minat mereka terhadap kelas, ibu bapa turut terlibat di dalam pembelajaran anak serta guru mampu melaksanakan sesi pengajaran berdasarkan perbincangan dengan lebih baik apabila mereka diberi lebih peluang untuk melibatkan diri secara aktif di dalam kelas. Selain pembelajaran aktif dalam bilik darjah, gabungan teknologi juga memainkan peranan penting dalam aliran kaedah pembelajaran semasa
    corecore