The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the last decade, sensor nodes have been widely deployed in many application, owing to the their simple attributes and installation process. However, the sensors nodes are vulnerable to many potential threats such as node cloning and identity attack. The threats become more significant when the nodes are used in applications such as biomedical and e-Health applications where trust, privacy and security...
MyUiTM Engineer is a program especially designed for students in semester 5 with a cumulative grade point average (CGPA) below 3.0 at the Faculty of Electrical, Universiti Teknologi MARA, Shah Alam. The aim of the program is to produce high quality electrical and electronic engineering graduates in Malaysia. This paper discusses the methodology and approach implemented in MyUiTM Engineer program in...
Semiconductor devices is a fundamental course for electronic engineering students at the Faculty of Electrical Engineering, Universiti Teknologi MARA. Strong semiconductor knowledge helps students in understanding other electronic engineering subjects. The paper aims to analyse students' feedback on the implementation of blended learning in semiconductor devices. The objective of blended learning...
Comparator plays an important role in overall performance of analog to digital converters (ADC) in all modern electronic devices used in handheld to industrial applications. High-speed devices with low voltage and low power are considered essential nowadays. This paper presents a CMOS based comparator design using 0.13 μm CMOS process in Mentor Graphics for ADC applications. The primary goal of this...
Nanoparticles ZnO/CuO composite was successfully prepared through a simple sol-gel spin coating technique. The annealing temperature was within the range of 400°C to 600°C to study its effect to the physical, optical and electrical properties to the thin films. Their characteristics were studied by field emission scanning electron microscopy (FESEM), Atomic Force Microscopy (AFM), UV-Vis spectroscopy...
In this work, we have successfully prepared TiO2 thin films doped with various concentration of NbCl5. The doping concentrations were varied from 0.0 mol%, 0.1 mol%, 0.2 mol%, 0.3 mol% and 0.4 mol%. The characterizations were done by means of electrical properties and surface morphology. The results show that as the concentrations of NbCl5 increased, current escalates. For surface morphology, the...
The objective of this research is to evaluate the effect of different molar concentration of the copper oxide (CuO) thin films deposited using spin-coating technique. The CuO thin films were deposited on 500µm quartz substrates. The molar concentration of CuO solutions used were 0.3M, 0.35M, 0.4M, 0.45M and 0.5M were prepared using sol-gel method. These solutions were formed by dissolving copper acetate...
There is high need for data encryption. Accordingly, there are several techniques to encrypt and encode data. Unicode has become a unified global coding system. The special feature of Unicode system is that it can be expanded and it is adopted by many computer fonts' ready-package programs. This research work uses FontCreator program, which adopts unified global coding system, to generate computer...
Recently, the mobile devices are well integrated with Internet and widely used by normal users and organizations which employ Bring Your Own Device technology. On the other hand, the mobile devices are less protected in comparison to computers. Therefore, the mobile devices and networks have now become attractive targets for attackers. Amongst several types of mobile threats, the mobile HTTP Botnets...
Recently, the HTTP based Botnet threat has become a serious challenge for security experts as Bots can be distributed quickly and stealthily. With the HTTP protocol, Bots hide their communication flows within the normal HTTP flows making them more stealthy and difficult to detect. Furthermore, since the HTTP service is being widely used by the Internet applications, it is not easy to block this service...
Histamine has been identified as chemical indicator to estimate the spoilage of food particularly in fish and fish products. Histamine produced in the fish muscle tissue by the action of bacterial decarboxylase enzyme on histidine, can cause poisoning if histamine content in spoilt fish exceeds the FDA safety limit of 100ppm. Ion Selective Field Effect Transistor (ISFET) was introduced by Bergveld...
The integration of solar PVs which is projected to increase over the years creates concerns over stability. Reverse power flow occurs due to high PV penetration into the power system network. PV placement at proper locations in a transmission system is essential to maintain voltage stability. Improper placement will caused voltage stability of the system to be affected. However, if the PVs are connected...
In the polling-based WiMAX network, the number of served mobile station (MSs) and number of polls (NOP) are the parameters that significantly affects the network performance. Both factors had an impact even on basic the service and arrival rate plays a role in the performance. In this paper, we present the performance analysis of throughput based on the Mobile Multi-hop Relay (MMR) WiMAX. We modelled...
Recently, MoBots or Mobile Botnets have become one of the most critical challenges in mobile communication and cyber security. The integration of Mobile devices with the Internet along with enhanced features and capabilities has made them an environment of interest for cyber criminals. Therefore, the spread of sophisticated malware such as Botnets has significantly increased in mobile devices and...
Recently, data that generated from variety of sources with massive volumes, high rates, and different data structure, data with these characteristics is called Big Data. Big Data processing and analyzing is a challenge for the current systems because they were designed without Big Data requirements in mind and most of them were built on centralized architecture, which is not suitable for Big Data...
The effect of Iodine flow rate in nanocomposited MEH-PPV:I-MWCNT was investigated by means of electrical, optical and physical characterization. First, 120 mg of MWCNT was doped with 1g of Iodine using thermal chemical vapour deposition method (TCVD). The doping process was done for 1 hour with Iodine flow rate varied from 0.1, 0.3, 0.5, 0.7 and 0.9 l/min. On the other hand, 40 mg of MEH-PPV was stirred...
Light-emitting diode (LED) applications consist of various materials. One of the materials used is polymer. In this study, MEH-PPV known as poly[2-methoxy-5-(2'-ethyl-hexyloxy)-1, 4-phenylenevinylene] was used. The objective of this paper is to characterize the electrical and optical properties of MEH-PPV thin film by using sol-gel method. The scope is to study only the MEH-PPV thin film without implementation...
Voltage instability is characterized by loss of a stable operating point due to reactive power deficiency, which causes a drop of voltage profile in significant part of the system. The voltage is stable if the system can maintain its voltage within the acceptable limits when there is a change in load admittance. Voltage collapse may occur when the system is subjected to system fault(s); the occurrence...
With the availability and reduced cost of renewable energy sources such as Solar PV, distributed generation (DG) becomes an increasingly common practice in harnessing these energy sources. However, a high level of penetration of the energy sources in the distribution network will cause issues such as reverse power flow and the disruptions to the coordination of existing protection system. This paper...
Recently, BYOD or Bring Your own Device has become one of the most popular models for enterprises to provide mobility and flexibility in workplaces. The emergence of new technologies and features of mobile devices makes them integral parts of every aspect of daily business activities. Also, mobile networks are now well integrated with the Internet (e.g. 3G, 4G and LTE technologies), therefore, in...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.