Steganography is a technique used to transmit hidden information by modifying an audio signal in an imperceptible manner. The transmission must be possible in spite of subsequent imperceptible alterations (attacks) of...
详细信息
Steganography is a technique used to transmit hidden information by modifying an audio signal in an imperceptible manner. The transmission must be possible in spite of subsequent imperceptible alterations (attacks) of the modified signal. We propose a novel approach of substitution technique of audio steganography. Using genetic algorithm, message bits are embedded into multiple, vague and higher LSB layers, resulting in increased robustness. The robustness specially would be increased against those intentional attacks which try to reveal the hidden message and also some unintentional attacks like noise addition as well.
"Malware" is an umbrella term that describes a variety of Internet-borne threats, including viruses, spyware,Trojan horses, spam, bots and more. This sophisticated and evolving security threat puts all busin...
详细信息
"Malware" is an umbrella term that describes a variety of Internet-borne threats, including viruses, spyware,Trojan horses, spam, bots and more. This sophisticated and evolving security threat puts all businesses at risk, no matter how big or small. Malware creates unique challenges to higher learning institutions (HLI) in protecting their information assets. This is largely due to the fact that HLI informationtechnology (IT) departments must balance between enabling a highly collaborative, non-restrictive environment and ensuring the confidentiality, integrity, and availability of data and computing resources. HLIs can proactively defend the network to reduce the risks associated with this threat by assessing the vulnerabilities and threats present in their networks and implementing appropriate multilayer security. A multilayer approach involves applying countermeasures at every layer of the computer network, from the perimeter routers and firewalls to users' personal computers in order to increase network security. The goal of this study is to propose a framework for network security protection against malware to increase the level of protection using non technical countermeasures.
In the business world, financial institutions, like banks and investment firms, heavily rely on technology to manipulate daily operations and support business. Many more business processes have now become automated an...
详细信息
In the business world, financial institutions, like banks and investment firms, heavily rely on technology to manipulate daily operations and support business. Many more business processes have now become automated and require procedures to be approved. For example, when providing business services liked personal / corporate loans, mortgage, or Letter of Credit (LC), a customer is required to submit information within their applications; whereas, the service provider has to perform complicated approval procedures, involving different departments or even external parties. In this paper, we discuss how a credit approval system (CAS) handles the workflow of such business processes. The system is extensible to contemporary technologies including business process execution language (BPEL), asynchronous JavaScript and XML (AJAX), and Java server face (JSF) in order to coordinate related parties through the Internet as well as to facilitate the operations and communications with different levels of staff in the Intranet. Our experiences and design characteristics will be further implemented into a system designed for a global financial firm.
Reviewing on computer-supported collaborative learning (CSCL) tools revealed that CSCL is important to support collaborative learning (CL) strategy in school. Existing CSCL applications are mostly research-based and a...
详细信息
Reviewing on computer-supported collaborative learning (CSCL) tools revealed that CSCL is important to support collaborative learning (CL) strategy in school. Existing CSCL applications are mostly research-based and are not available for use. Through a survey on the needs for CSCL in Malaysia, it is confirmed that CSCL application is needed but the available one could not support CL activities. This paper discusses CSCL study in Malaysia, especially the relationship between user involvement and type of CSCL application needed. In particular, the CSCL application that could associate existing knowledge among students to build new knowledge for their better understanding and problem solving skills. We examine this need and assess its impact by developing Collaborative Environment for Teaching and Learning System (CETLs).
software Process Improvement (SPI) became known in the last twenty years. SPI is crucial to augment software process capabilities in software companies to face present demanding and global market. There were numerous ...
详细信息
software Process Improvement (SPI) became known in the last twenty years. SPI is crucial to augment software process capabilities in software companies to face present demanding and global market. There were numerous published studies in United States, Europe, Australia and North America. Yet, there was still being short of research and published studies on SPI in Malaysia. This research attempts to fill this gap by focusing to analyze the resistance factors that de-motivate the implementation of SPI project specifically software companies operated in Malaysia. This research has been conducted during March 2008 until August 2008 and it used a survey instrument to gather data from 39 companies operated across Malaysia with the total of 251 professionals responded. The findings showed that organizational factors specifically human factors are playing an important role in determining the success of the SPI project. Participation and commitments from all individuals across the organization are also vital and imperative to ensure success for SPI initiative.
In this study, discusses enhancing the e-learning system by employing a distributed database that apply reusable learning object as one of the technologies that is applied to e-learning development. An e-learning syst...
详细信息
This research presents the outcomes of a study performed with the aim of identifying the issues affecting the application of Component-Oriented software Development (COSD) amongst the software developers, which consis...
详细信息
A new approach to web search that is based on a bee hive metaphor is presented. We proposed a modified model of a bee hive. Our model comprises of a dance floor, an auditorium, and a dispatch room. We have shown that ...
详细信息
Due to environmental mismatch, speech recognition systems often exhibit drastic performance degradation in noisy conditions. This paper presents a model-based technique termed Adaptive Parallel Model Combination (APMC...
详细信息
ISBN:
(纸本)9781424423149
Due to environmental mismatch, speech recognition systems often exhibit drastic performance degradation in noisy conditions. This paper presents a model-based technique termed Adaptive Parallel Model Combination (APMC) which compensates the initial acoustic models to reduce the discrepancy. APMC used the well-known PMC technique to composite a set of corrupted speech models, while fine tuning the mean parameter of the models using a transformation-based adaptation technique called Maximum Likelihood Spectral Transformation (MLST). Evaluated on a context-independent phone recognition task, APMC was found to be superior to both PMC and MLST, especially in non-stationary noisy conditions. On average, APMC has achieved 48.81% improvement over the initial models, whereas PMC and MLST have improved the accuracy by 34.12% and 35.23% respectively.
Deciding on how to evaluate each students programming skills is one of the largest challenges facing educators who teach object-oriented courses. Traditional assessment of programming education is with Grade. Quite of...
详细信息
Deciding on how to evaluate each students programming skills is one of the largest challenges facing educators who teach object-oriented courses. Traditional assessment of programming education is with Grade. Quite often students get good grades in programming but still facing great challenges or have difficulties to take on real programming jobs. This research focus on how we addressed this challenge in object oriented programming course by proposing a new assessment method to assess students' object-oriented programming skills. The process begins by identifying generic object-oriented skills that students should acquired. In this paper we discuss the issues on object-oriented programming assessment and our proposed solution for a new assessment model. This followed by an approach taken in the process of identifying the object-oriented skills using Delphi technique. Delphi technique is a structured multi-step process that uses a group of experts to achieve a consensus opinion. We present the methodology of three Delphi processes to identify object-oriented programming skills. The identified skills will be used to guide both the coverage of student learning assessments and can be used by instructors to identify what topics merit emphasis.
暂无评论