The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud computing is one of the most exciting paradigm shifts in distributed computing. Cloud computing is being widely used due to its readily available services at low cost. When the number of cloud users increase this may subsequently lead to data security and privacy threats. Data confidentiality and efficient data retrieval are major issues which block users to adopt cloud computing. The focus...
This paper presents the design of power amplifier (PA) 0.18 um CMOS technology for ultra wide band (UWB) application at 3.1-10.6 GHz. This PA design is based on two-stage common source topology with resistive shunt feedback technique and output buffer to achieve flat and higher gain, wider bandwidth and better stability. The simulation results show that the average power gain of 12.4 ± 1.1 dB, input...
As mobile cloud computing applications are becoming widely used to mitigate the limitations of mobile devices and exploit cloud services, testing these applications becomes critical. Testing mobile cloud application is complicated further due to dynamic assign of cloud resource to applications that run on mobile devices, due to the increased multiple factors in test case generations and execution...
Since the introduction of social networks over a decade ago, a number of research has focused on understanding the behaviour of social network user in disclosing information over the Social Network Sites (SNS). Although the issue of privacy breach on SNS has been widely reported, very few studies have used the Protection Motivation Theory (PMT) as a framework to understand SNS user's behaviour related...
For any digital watermarking system many requirements should be available. The most important requirements are imperceptibility (quality), and robustness. Many studies have tried to enhance these requirements by using different techniques and methods. In this study, a trade-off between the two requirements to find the optimal value based on the existing Dual Intermediate Significant Bit (DISB) and...
This research paper present some statistical similarities and dissimilarities between the character frequencies of three languages, Malay, Indonesia and English. The reason for their comparison is that they all share a common symbol set (A-Z). It has been found, through investigations that statistically Malay and Indonesian language character frequencies are very close to each other. For example,...
In this paper we discuss a stand-alone system to allow the deaf or hard-of-hearing people and normal people to communicate with each other easily and fluently. We purpose a model for recognizing Malaysian Sign Language through image processing techniques and converting the visual information into textual information at real-time. In order to implement a real time hand gesture recognition system, video...
This paper provides the Framework Methodology of the Autism Children -Vibratory Haptic Interface (AC-VHI) conducted on the mild autism children who have impairment in social interaction. This paper has exclusively explored problems faced by Malaysian autistic children in a National Autism Society at Kuala Lumpur, Malaysia. It also has been conducted at two locations: the classroom and the court of...
As the trend changes, the data can be transit through small hand hold devices, though the small hand hold devices are being used by the users and providing simple portability, but these devices are isolate unless they connected via network. The Clouds provide more services than the hand hold devices. Through this paper, we propose A Modern Cyclic Approach to solve a Classification Problem in Cloud...
The paper is devoted to supervise method approach to identify the vessel anomaly behaviour in waterways using the Automated Identification System (AIS) vessel reporting data. In this work, we describe the use of SVMs to detect the vessel anomaly behaviour. The SVMs is a supervised method that needs some pre knowledge to extract the maritime movement patterns of AIS raw data into information. This...
In the recent years, hundreds to thousands of people have been killed in many disasters across Asian region, such as tsunami, floods, earthquakes and so on. During disaster, most of the electricity supply will be disrupted, then the telecommunication networks will fail. During emergency response, the necessity to have portable charger for mobile phone arises as the victim could communicate with the...
Same as Arabic scripts, Arabic mathematical symbols have some differences with Latin mathematical symbols shape. Although, Arabic Mathematical symbols follow Latin mathematical from the structure of writing the symbols, Arabic symbols have special shape like writing direction, cursive style, and written by Arabic characters. In fact, these symbols are being used in schools and high education level...
Three-dimension (3D) maps visualization concept for mobile devices which can be used for navigation aid comes in to being as a result of the weakness perceived with the two dimension (2D) map. The representation of scene in 2D map is generally limited and lack interaction with the users. The interaction of 2D map is limited to the interpretation of symbols explained in the legend which not every user...
Prior research on real-world way-finding and environmental design principles has shown that effective virtual design supports skilled way-finding behaviour. Darken and Cevik [1] proved that augmentations such as direction indicators, maps and path restriction greatly improve way finding performance and achieve overall user satisfaction when represented in large-scale virtual structures. This study...
Marketing is a managerial function and a set of procedures for generating, cooperating and providing value to clients and improving customer relationships to earn more profit for the organization. Operative marketing is about receiving messages from potential customers in some creative ways to affect their purchase decisions. This paper concentrates on the relationship between information technology...
With the rapid technological advances, possibility of tampering information have been increased. Cryptography is the science of information security that includes symmetric encryption and asymmetric encryption which used to avoid the tampering attempts and guarantee the data integrity. This paper discusses a cryptography algorithm (CARCA), which is combination between two types of cryptography (symmetric...
Digital media manipulation has become easily performed at personal level with the rapidly growth of Technology. Presenting an issue of protecting digital media integrity. Watermarking has become a popular solution for copyright and integrity issues. This paper presents an invisible fragile watermarking technique for protecting the integrity of a PDF Digital Holy Quran. This watermark is generated...
Lightweight block cipher algorithms are vital for constrained environment. Substitution box (S-box) is the essential constituent of many lightweight block cipher algorithms and it is the only nonlinear part. It is proficient to create confusion in the plaintext during the process of encryption. In this research, a new way of key dependent S-box is proposed by choosing one S-box out of 16 good S-boxes...
Character rigging is a process of endowing a character with a set of custom manipulators and controls making it easy to animate by the animators. These controls consist of simple joints, handles, or even separate character selection windows. This research paper present an automated rigging system for quadruped characters with custom controls and manipulators for animation. The full character rigging...
In order to analyze how the correlativity behavioral pattern would change after data embedding, it needs to conduct a statistical analyze on average, maximum, minimum, and standard deviation of each group of photo before embedding. This paper proposes and elaborates the details of a new steganalysis method and then presents the results and characteristics of the four photo themes. The behavioral patterns...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.