Quantcast
Channel: UniKL IR
Viewing all 599 articles
Browse latest View live

MANET – An Alternative Technology for Human Intruder Detection

$
0
0
Title: MANET – An Alternative Technology for Human Intruder Detection Authors: Irma Syarlina Che Ilias; Mohammad Khairy Azmi Abstract: This study focus on MANET as a sensor based system to manage security on the designated area. MANET is a continuously self-configuring, infrastructure-less network of mobile devices connected without wires. MANET is relatively a new technology which people can use it to eradicate missing hardware in computer lab issues. By using MANET it can help us to know the location where there is the activity happen which then we can prevent the activity earlier. In addition, this study using Arduino Uno, a low cost and ARM-based computer on a small circuit board which can detect hardware movement up to 8 meters. Furthermore, o notification on intrusion are through the buzzer. Besides, the technology able to monitor voice, record the footage of intruder, controlling light switch and view room temperature from mobile phone. Therefore, this study can be considering valuable and can be commercialized.

Vertical Handover Evaluation for Heterogeneous Networks

$
0
0
Title: Vertical Handover Evaluation for Heterogeneous Networks Authors: Mohd Taha Ismail; Hassan Dao; Megat F.Zuhairi; Mohammad Azmin Mohamed Ghazali Abstract: This study is to simulate a handover in heterogeneous network using MATLAB. The simulation comprises of three different networks that overlap between each other and a UE will be moving across the networks. In mobile telecommunication, mobility management in heterogeneous networks will require a vertical handover in order to utilise different mobile technologies. To achieve a seamless handover between the systems, IEEE 802.21 is set to support algorithm enabling seamless handover in heterogeneous network. Handover failures and unnecessary handoff may be provoked in many situations which is causing a problem in seamless handoff. Thus, the algorithm is tested to minimize handover failures and unnecessary handoff. The controlled environment and a comprehensive analysis that covers the signal strength are evaluated.

Exploration of Factors that influence information security education

$
0
0
Title: Exploration of Factors that influence information security education Authors: Ahmed Ali Otman Gouni; Dr. Siti Haryani Shaikh Ali; Dr. Amna Saad; (UniKL MIIT) Abstract: The improvement of knowledge is very important in information security domain. due to its positive effect on users’ information security education. It is acknowledged that security education is playing a vital role to mitigate the risk of information security incidents and breaches that faced by users through their ordinary life. Although several approaches have been proposed in information security education, yet these threats continue to increase. To assist the effort of information security education, this research explores the effective factors that have been used in the approaches of information security education, investigates the gaps, and hence, proposes new factors that can help to developing an effective approach to information security education.

MANET – An Alternative Technology for Human Intruder Detection

$
0
0
Title: MANET – An Alternative Technology for Human Intruder Detection Authors: Irma salina Che Alias; Mohammad Khairy Azmi; (UniKL MIIT) Abstract: This study focus on MANET as a sensor based system to manage security on the designated area. MANET is a continuously self-configuring, infrastructure-less network of mobile devices connected without wires. MANET is relatively a new technology which people can use it to eradicate missing hardware in computer lab issues. By using MANET it can help us to know the location where there is the activity happen which then we can prevent the activity earlier. In addition, this study using Arduino Uno, a low cost and ARM-based computer on a small circuit board which can detect hardware movement up to 8 meters. Furthermore, o notification on intrusion are through the buzzer. Besides, the technology able to monitor voice, record the footage of intruder, controlling light switch and view room temperature from mobile phone. Therefore, this study can be considering valuable and can be commercialized.

Vertical Handover Evaluation for Heterogeneous Networks

$
0
0
Title: Vertical Handover Evaluation for Heterogeneous Networks Authors: Mohd Taha Ismail; Hassan Dao; Megat F.Zuhairi; Mohammad Azmin Mohamed Ghazali; (UniKL MIIT) Abstract: This study is to simulate a handover in heterogeneous network using MATLAB. The simulation comprises of three different networks that overlap between each other and a UE will be moving across the networks. In mobile telecommunication, mobility management in heterogeneous networks will require a vertical handover in order to utilise different mobile technologies. To achieve a seamless handover between the systems, IEEE 802.21 is set to support algorithm enabling seamless handover in heterogeneous network. Handover failures and unnecessary handoff may be provoked in many situations which is causing a problem in seamless handoff. Thus, the algorithm is tested to minimize handover failures and unnecessary handoff. The controlled environment and a comprehensive analysis that covers the signal strength are evaluated.

Mobile Crowd Sensing Application for Noise Monitoring in Kuala Lumpur

$
0
0
Title: Mobile Crowd Sensing Application for Noise Monitoring in Kuala Lumpur Authors: Rashid Zafar; Megat F. Zuhairi; Eiad Yafi; Hassan Dao; Hilmi Mohd Salleh; (UniKL MIIT) Abstract: Mobile Crowd Sensing (MCS) technology enables mobile devices, such as smart-phones or other android-based de¬vices that are equipped with embedded sensors to gather relevant data for research work. Typically, the MCS appli¬cation field ranges from online social-media monitoring, transportation system monitoring, atmosphere monitoring and etc. The inherent attributes of MCS applications is the ability of the system to monitor and collect data over a huge geographical area. Generally, the planners of MCS select participants based upon the scope of survey or the type of data to be acquired. Consequently, based on user’s movement behavior and location, the MCS application running on the background is able to discreetly collects data from the proximate areas. In principle, this research work high¬lights the development of MCS application, using the noise parameter as input. The research work shows the feasi¬bility of MCS for data gathering. However, it is essential that data obtained from smartphone’s sensor i.e. microphone is properly processed. Basically, the MCS application is designed to be able to interact with the sensor components within the smartphone. Data is collected and has to be periodically uploaded to the server, where analytical operation is undertaken to produce meaningful information. In principle, the MCS application is able to provide viable noise data in many different areas in Kuala Lumpur. The main benefit that the MCS application can offer is the ability to provide continuous data collection with minimal resource needed.

Malware Analysis and Detection Approaches: A Survey that Drives to Deep Learning in Analyzing Program Execution Flow.

$
0
0
Title: Malware Analysis and Detection Approaches: A Survey that Drives to Deep Learning in Analyzing Program Execution Flow. Authors: Salman Jan; Shahrulniza Musa; Toqeer Ali; (UniKL MIIT) Abstract: the increasing growing number of malware attacks poses serious threats to the private data as well as to the expensive computer resources. To detect malware and their associated families, Anti- Virus(AV) companies commonly rely on signatures, such as strings and regular expressions. However, the recent malware attacks in the last few years including the resurgence of ransomware proved that signature-based methods are error-prone and can be easily evaded by intelligent malware programs. This paper presents a survey of traditional and state of-the-art models developed for malware analysis and detection. Further, the presented approaches for efficient classification of malware and their behavior facilitates in provision of basic insights for the researchers working in the domain of malware analysis through deep learning.

The Effect of Internet of Things (IOT) Towards Social Sciences Student’s Performance

$
0
0
Title: The Effect of Internet of Things (IOT) Towards Social Sciences Student’s Performance Authors: Dr Farahwahida Mohd; Norsila Shamsuddin; (UniKL MIIT) Abstract: This study is to evaluate the effect of IoT towards social sciences student’s class performance. This is to measure whether IoT contribute to their performance or not. It is found that e-learning modules are most preferred by the students as compared to blended learning and conventional face-to-face learning environment. E-learning was ranked as number 1 most prefer method followed by blended learning and the least preferred is the conventional method that is face-to-face classroom environment. Furthermore, competency in using IT devices such as smart phones, tablet, wi-fi dongle and etc is an advantage in this new era of technology and very significant towards the students’ performance (p-value = 0.000). Followed by awareness of the usage of IoT (p-value = 0.011), importance of the devices in contributing good performance (p-value = 0.015) and finally yet importantly usefulness of IoT have significant effect towards performance. All variables are significant at 5% level of significant. Therefore, we can conclude that IoT does give significant effect towards these Social Sciences Students’ performance in all of their activities in the university.

Sistem Analisis Kawalan Injap Pneumatik

$
0
0
Title: Sistem Analisis Kawalan Injap Pneumatik Authors: Kosmo, UniKL BMI

Program Teknologi Telekomunikasi UniKL BMI

$
0
0
Title: Program Teknologi Telekomunikasi UniKL BMI Authors: Utusan Malaysia, UniKL BMI

Syrian Youth in Za’atari Refugee Camp as ICT Wayfarers: An Exploratory Study Using LEGO and Storytelling

$
0
0
Title: Syrian Youth in Za’atari Refugee Camp as ICT Wayfarers: An Exploratory Study Using LEGO and Storytelling Authors: Yafi, Dr Eiad; Fisher, Karen E.; UniKL MIIT Abstract: We share insights from exploratory research with Syrian youth at the Za’atari Refugee Camp in Jordan about the role of information and mobile technology in their daily lives, and how they serve as information, communication and technology (ICT) wayfarers. Survey findings (n=174) show most youth own mobiles and SIM cards, and WhatsApp and Google are the most popular apps/engines. Design Workshop data contradicted youth survey self-reports of being heavy ICT users on behalf of others. Instead, narrative-drawings (n=50) created using LEGO Mini-Figures depicted situations involving primarily instrumental assistance, with fewer representations of informational, technological and emotional assistance, per Dervin’s Sense-Making framework. Depicting mostly events in Syria, with several in Za’atari, the narrative-drawings reflect the youths’ affinity for the forms of assistance outlined in the fourth Geneva Convention. The research informed longer workshops in the camp setting in accordance with the methodology’s original aim to co-design ICT mediary devices that support the youths’ mediary behavior, as represented by their narrative-drawings and survey data, and in support of UN Sustainable Development Goals.

Deep Convolutional Generative Adversarial Networks for Intent-based Dynamic Behavior Capture

$
0
0
Title: Deep Convolutional Generative Adversarial Networks for Intent-based Dynamic Behavior Capture Authors: Salman Jan; Shahrulniza Musa; Toqeer Ali; Ali Alzahrani Abstract: Malware analysis for Android systems has been the focus of considerable research in the past few years due to the large customer base moving towards Android, which has attracted a corresponding number of malware writers. Several techniques have been used to detect the malicious behavior of Android applications as well as that of the complete system. Machine-learning techniques have been used in the past to assess the behavior of an application using either static or dynamic analysis Description: Venue : Malaysian Institute of Information Technology, Universiti Kuala Lumpur, Kuala Lumpur, Malaysia

Linking Halal Requirement and Branding:

$
0
0
Title: Linking Halal Requirement and Branding: Authors: Nor Aida Abdul Rahman; Mohamad Fakhrulnizam Mohamad; Jailani Muda; Md Fauzi Ahmad; Suzari Abdul Rahim; Zawiah Abdul Majid; Hazariah Md Noh Abstract: There is something very appealing about Halal branding and its linked to Halal requirements. The establishment of Halal branding is actually closely related to Syariah compliance requirements. This study aims to explore how Halal branding is created in the context of Halal Flight Kitchen in Malaysia. This study adopted single case study method for deep exploration of the topic. This interpretive study opted for semi-structured interview, observation, and documents review as a main data collection method. Findings suggest proper segregation, sertu and workers hygiene are the three main elements to establish Halal branding in Halal flight kitchen. This study is among the pioneering research on Halal branding establishment from Flight Kitchen perspective. Description: UniKL MIAT Subang

Regulator Perspective on Halal Air Cargo Warehouse Compliance

$
0
0
Title: Regulator Perspective on Halal Air Cargo Warehouse Compliance Authors: Muhamad Munzir Khairuddin; Nor Aida Abdul Rahman; Mohammad Fakhrulnizam Mohammad; Zawiah Abdul Majid; Md Fauzi Ahmad Abstract: In establishing a successful Halal supply chain, Syariah compliancy has emerged as a key issue. Halal transport and Halal warehouse play a significant role in maintaining the integrity of the Halal products from point of origin to end of consumption. The escalating demand for halal food has encouraged warehouse operators to devise a new business plan to cater to the present business trend. Warehousing or storage is a critical factor where cross-contamination may occur. As such, this study explored the Halal warehouse compliance from the perspective of regulators. This study adopted the qualitative approach by carrying out interview sessions, document review, and observation as the primary methods for data collection. The outcomes pointed out eight main factors that ascertain Halal warehouse compliance from the perspective of regulator, which are: management member, comprehensive training, Halal standard adoption, supplier, standard operating procedure (SOP), internal halal committee, documentation, and knowledge. This study appears to be a pioneer that probes into Halal warehouse compliance in Malaysia. Description: UniKL MIAT Subang

A Recommender system for Finding Products from Next Door Virtual manufacturer or Supplier: A conceptual Study

$
0
0
Title: A Recommender system for Finding Products from Next Door Virtual manufacturer or Supplier: A conceptual Study Authors: Mohammad, Abdul Hadi; M, Fahtullah; S, Ismail; M R, Aliff Radzuan; UniKL MIIT Abstract: Electronic Commerce (EC) platform which is widely known as E-Marketplace handles milion of transaction over internet. While individual user of E-marketplace frequently interact with a shorter supply chain Business-to-Business (B2B) users, on the other hand, manage multiply interaction with multiple layers of partners such as manufacturers or suppliers. This Complexity, However, introduces problem of information overloan where the user only require pertinent of information based on their interest. Although recomender system (RSs) are widely used in resolving such problems, the current RSs in the literature are still suffering several limitations, such as overspecialised recommendation, and scalability issues. Moreover, there is an urgency to introduce manufacturing companies or suppliers to online business buyers within to trade with the shortest path between the users.The papers present a conceptual idea of the B2B recommendation model to present potentially usefull product to virtual manufacturers or suppliers to business users. The concept highlighted the effectiveness of social network information for the recommender to alleviate the current issues of RSs to support the complexity introduced in the B2B enviroment.

Putera Edward Lawat BMI.

$
0
0
Title: Putera Edward Lawat BMI. Authors: Berita Harian, UniKL BMI

Busy Schedule for Queen Elizabeth up to moment of departure

$
0
0
Title: Busy Schedule for Queen Elizabeth up to moment of departure Authors: The Star, UniKL BMI

Graduan UniKL BMI Pilihan Majikan.

$
0
0
Title: Graduan UniKL BMI Pilihan Majikan. Authors: Utusan Malaysia, UniKL BMI

DEVELOPMENT FOR THE STAND OF SOLAR PHOTOVOLTAIC BASED ON THE DIRECTION AND ANGLE ANALYSIS AT NORTH PENINSULAR MALAYSIA

$
0
0
Title: DEVELOPMENT FOR THE STAND OF SOLAR PHOTOVOLTAIC BASED ON THE DIRECTION AND ANGLE ANALYSIS AT NORTH PENINSULAR MALAYSIA Authors: S. M. M. Maharum; M. Z. W. M. Tohid; Z. Muhammad; I. H. Hamzah; Z. A. Halim; M. K. Rahmat; N. F. Haris; Z. I. Rizman; (UniKL MITEC) Abstract: This paper describes the development of the stand solar panel based on angle and direction. A direction here means the solar photovoltaic is facing the sun. 5 different angles had been investigated. The method used in this paper was an output of 50W solar photovoltaic. The output of solar panel is used as a reference to identify the performance of solar PV.3 places had been chosen at north Peninsular Malaysia. The results show the angle approximate to 90° is the best angle to design the stand for the solar photovoltaic. The design need to be inclined by considering other factors. Tilt angle of 87° is used to design the stand and facing to the North Peninsular Malaysia, which is the best position for solar photovoltaic development. The analysis is based on the voltage output from 50Wp of solar photovoltaic at different angle and position. The result was used to design stand for 4000Wp solar photovoltaic.

Energy Harvester from Waste Heat using Thermoelectricity

$
0
0
Title: Energy Harvester from Waste Heat using Thermoelectricity Authors: Mohd Zul Waqar B. Mohd Tohid; Tunku Muhammad Izzat B. Tunku Baharin; Hanim B. Mohd Yatim; Chia C. Kang; Fatin Ayuni B. Mohd Suhaimi; Muhammad B. Azmi; (UniKL MITEC) Abstract: Currently there are many methods available to harvest energy from renewable sources. However, the method to harvest energy from waste heat sources still not fully explored. This paper focused on using thermoelectricity as a main component to utilized waste heat from household appliance especially from air conditioning system. The objective of this paper is to develop a thermoelectric generator system (TEG) based on heat release from compressor of the air conditioner system. Experimental data input was acquired from the compressor of the air conditioner system includes hot and cold side temperature. Then, Matlab SIMULINK has been used as a tool to analyse the acquired input data and output voltage, while current and power was calculated from the model. As result, maximum voltage obtained from the TEG system are 3.44 V with the temperature difference of 77.6 K at 16 °C, 0.73 A current, while power produced at 1.62 W. In conjunction to the power produced, the waste heat from air-conditioning system could light up the bulb in a room with the energy harvested using thermoelectric principle. The TEG system can also be utilize as an alternative energy sources for distributed energy generation (DEG) application.
Viewing all 599 articles
Browse latest View live




Latest Images