The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a proposal for a suitable and viable combination of a face recognition system and a watermarking system, with a watermarking technique that will ensure the authenticity of the data being transmitted in the face recognition system, which will then enhance its level of security. The proposed combination is a PCA—DCT system.
P.Ramlee films in Malaysia can be described as unique form of film expression. Unfortunately this artistic value of appreciation among the young generation is slowly being decline. Furthermore, some still argue that the quality of Malaysian mainstream films are still not within the standard of the P.Ramlee's era. With the current updated technologies, globalisation and digital natives era, efforts...
This paper proposes a combination of network frequencies as the supporting medium for communication within a small Search and Rescue (SAR) team to ensure stable communication, and thus command and control, in particular in a forest environment. The proposal is to implement a combination of 869 MHz and 2.4 GHz, which will support the use of smart phones for the SAR team members for audio/oral, visual...
Search and Rescue (SAR) is an operation conducted to find and return to safety the survivors of an emergency incident, where the search may have to be conducted in difficult areas such as in mountains, deserts, forests or at sea. A SAR operation typically requires a search grid for the identified search area, and a search pattern to conduct a search that covers the grid, together forming a search...
Lecturer Promotion Assessment System for Department of Computer Science, Faculty of Science and Technology Defence was built to help the promotion of lecturers featured appraiser to conduct an initial assessment of the eligibility status of lecturers. The lecturer will be treated as eligible, in observation or tidal worth in value that has been set to proceed with the application promotion. It is...
Holograms Technology gives tremendous interactive surface in collaborations' atmosphere. This technology is becoming increasingly affordable medium as it inherited characteristics of a conventional workspace, a projected personal computer and touching capabilities. Holograms Technology offers a world of possibilities task engagement neither face-to-face collaboration nor remote collaboration in 3...
Customer trends is important to assist organization to recognize opportunities, improve sales and provide valuable information on market conditions hence help marketing of the business. This study conducted in local co-operative society, an organization that carries out credit activities and provides financial services such as loans and insurances to the customers. The problem faced by this organization...
Under the 10th Malaysia Plan, National Defense University of Malaysia (NDUM) has developed a new naval architecture laboratory to suit the requirement as a niche and boutique university for new knowledge and competencies in defense related disciplines. This paper describes the optimal specification and design of a wave test flume in a confined space. The wave maker was specified with the constraints...
The Motion Detection From The Thermal Video Using Optical Flow Technique was created to study motion detection techniques from thermal video using optical flow. The purpose of this application is to identify which techniques is more effective in detecting motion in thermal videos and to some extent it can drive technological development in the context of image processing. This application is developed...
Numerous applications are running in a distributed environment in today's large networked world. Corporations really need a mechanism to monitor their own application(s) running on remote devices. One such mechanism by Trusted Computing Group (TCG) called remote attestation that can monitor and verify trustworthiness of remote applications. In this regard, many solutions have been provided on how...
This research contends that the use of Interactive Media Apps with Talk; i.e. chat, whatsapp, comments, FB, Tweet etc. approach in or out of the classroom is developing learners' psychological and cognitive advancement. The Talk means the social undertaking learning style - a socio-cultural environment of Talk and learning that can be developed into activity learning. The activities in learning are...
Extracting unknown and possibly useful information from a set of examples that has desired features is crucial and important for data analysis and interpretation. Normally, a public repository has become the most used method in attempting to find a suitable domain. However, relying on the available data in the public repository has several disadvantages. In this case, an automatic problem generation...
Up to this moment, there is no knowledge based framework with situational awareness using the combination of two models: Nonaka and Endsley. These models can assist our research in terms of collecting and transforming appropriate tacit knowledge into enhancing the existing explicit knowledge. The existing explicit knowledge can be found from training module (doctrines) or any relevant documents. However,...
Cloud computing based services represents a major development in the way of providing IT services. However, the security challenges remains serious threat for such services. Therefore, intrusion detection systems (IDSs) are receiving more attention; this includes IDS methods and applications. This review paper intensively explain characteristics and limitation of the most IDS techniques used in cloud...
Wireless access points are everywhere, at home, offices and public places like shopping malls, on the road and open spaces. Network engineer would require a specific tool to do wardriving, that is to search for Wi-Fi wireless networks by a person in a moving vehicle. The tool could be installed inside a portable computer, smartphone or personal digital assistant. Some hobbyist does wardriving to exploit...
This paper is a review on cyberbullying generally on the issues around it and specifically in Malaysia. The topic that will be covered in this review begins with the definition of cyberbullying, what types of cyberbullying that occur nowadays, the roles of person involve and statistic of who being targeted, and what type of common data that being used in cyberbullying. This paper will give perspective...
License plate recognition(LPR)system contributed to facilitate the human work and make it easier. It is an image processing technology, which uses number plate to identify the vehicles. This paper aims to investigate in the existing LPR research by categorizing existing methods by analyzing the pros/cons of these features, and comparing them in terms of the algorithms that involve and recognition...
This paper introduces Dengue Active Surveillance System (DASS) framework for an early warning system of the outbreak. Dengue and dengue hemorrhagic fever are emerging as major public health problems in most Asian countries such as Malaysia. Effective prevention and control programs will depend on improved surveillance. A new approach to active surveillance outlined with emphasis on the inter-epidemic...
The design of wave energy converter (WEC) is crucial in order to generate the optimum power required to safely and reliably benefit from the available wave energy resource to produce electricity. The effects of the added mass on the idealized power take-off wave energy absorber in irregular waves are examined using a linear frequency domain method. Two strategies in this study are to maximize the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.