Sunday, December 17, 2017
   
Text Size
Login

Journal of Information and Communication Technology (JICT) Vol. 1, No. 1 June 2002

TUNING RANDOM EARLY DETECTION ROUTER MECHANISM FOR TCP-FRIENDLINESS
S. Hassan
School of Information Technology, Universiti Utara Malaysia, 06010 UUM Sintok, Kedah Darul Aman, Malaysia
 
ABSTRACT FULL TEXT
The Internet Engineering Task Force (IETF) has strongly recommended the use of the Random Early Detection (RED) active queue management mechanism in network routers (gateways) for controlling Internet congestion. In this article, we describe our experiences with RED parameters from our study on how the TCP-friendliness property of a rate-based congestion control protocol is affected by different parameterizations of RED. We explore a range of optimal RED parameter values for ensuring the TCP-friendliness of competing network connections. Our experimental results show that different RED parameterization does affect the TCP-friendliness of rate-based control protocol. We also argue that an appropriate tuning of RED gateway can significantly improve the TCP-friendliness of rate-based congestion control protocol.
 
Keywords: Congestion control protocols, networks, random early detection, TCP-friendliness.
 
COMPACT STRUCTURE REPRESENTATION IN DISCOVERING FREQUENT PATTERNS FOR ASSOCIATION RULES
N. Mustapha, M. N. Sulaiman, M. Othman and M. H. Selamat
Faculty of Computer Science and Information Technology, Universiti Putra Malaysia, 43400 Serdang, Selangor
 
ABSTRACT FULL TEXT
Frequent pattern mining is a key problem in important data mining applications, such as the discovery of association rules, strong rules and episodes. Structure used in typical algorithms for solving this problem operate in several database scans and a large number of candidate generation. This paper presents a compact structure representation called Flex-tree in discovering frequent patterns for association rules. Flex-tree structure is a lexicographic tree which finds frequent patterns by using depth first search strategy. Efficiency of mining is achieved with one scan of database instead of repeated database passes done in other methods and avoid the costly generation of large numbers of candidate sets, which dramatically reduces the search space.
 
Keywords: Frequent patterns, candidate sets, association rules, lexicographic tree, itemsets.
 

 
BUILDING A TRUSTED ENVIRONMENT FOR E-BUSINESS: A MALAYSIAN PERSPECTIVE
N. M. Din and M. Z. Jamaluddin
Department of Electrical Engineering, College of Engineering, Universiti Tenaga Nasional
 
 
ABSTRACT FULL TEXT
Almost all studies conducted on network economy and the Internet identify ‘security’ as a major concern for businesses. In general, the level of security in any network environment is closely linked to the level of trust assigned to a particular individual or organization within that environment. It is the trust element that is crucial in ensuring a secure environment. Besides physical security, security technology needs to be utilised to provide a trusted environment for e-business. Network security components for perimeter defense, i.e., Virtual Private Networks, firewalls and Intrusion Detection Systems, need to be complemented by security components at the applications and user level, e.g., authentication of user. ID or password security solution may be an option but now with the availability of legally binding digital certificates, security in e-business transactions can be further improved. Time and date stamping of e-business transactions are also of concern to prove at a later date that the transactions took place at the stipulated date and time. Digital certificates are part of Public Key Infrastructure (PKI) scheme, which is an enabling technology for building a trusted environment. PKI comprise policies and procedures for establishing a secure method for exchanging information over a network environment. The Digital Signature Act 1997 (DSA 1997) facilitates the PKI implementation Malaysia. Following the DSA 1997, Certification Authorities (CAs) were set up in Malaysia. This paper describes a trusted platform for spurring e-business and provides a Malaysian perspective of it.
 
Keywords: Public key infrastructure, digital certificates, information security, e-business.
 


ICT UTILIZATION AND THE INFORMATION ECONOMY: THE CASE OF MALAYSIA
School of Economics, Universiti Utara Malaysia, 06010 Sintok, Kedah Darul Aman, Malaysia
 
ABSTRACT FULL TEXT
Malaysia is taking steps to transform the economy from being production-based to being knowledge driven (K-economy). In line with this objective, information and communication technologies (ICT) have been identified as the strategic enabling tools that will support the growth of the Malaysian economy as well as enhance the living standard of the population. Hence, in the past decade various initiatives have been taken by the government to promote the use and development of ICT. However, there are many issues and challenges that need to be addressed by the country before a successful transformation to a K-economy can be made. One of the issues is ICT utilization for the development of an information society and economy in the country. The paper assesses the current state of ICT utilization in Malaysia based on secondary data. The result indicates that the level of ICT utilization in the country is still low compared to selected countries and there exist wide disparities among states in Malaysia in terms of accessibility to ICT.
 
Keywords: ICT utilization, information economy, information society, k-economy.
 

 
PERFORMANCE MODELING OF E-PROCUREMENT WORKFLOW USING GENERALISED STOCHASTIC PETRI NET (GSPN)
1R. Rahim, 2Ku-Mahamud and 3A.T. Othman
1School of Decision Science
2&3School of Information Technology
Universiti Utara Malaysia, 06010 Sintok, Kedah, Malaysia
 
 
ABSTRACT FULL TEXT
This paper proposes a Generalised Stochastic Petri net (GSPN) model representing a generic e-procurement workflow process. The model displays the dynamic behaviour of the system and shows the inter relationship of process activities. An analysis based on matrix equation approach enabled users to analyse the critical system’s states, and thus justify the process performance. The results obtained allow users for better decision making in improving e-procurement workflow performance.
 
Keywords: Performance modeling, generalised stochastic petri nets, e-procurement, workflow.
 

 
VIRTUAL REALITY: A REVIEW OF ITS IMPLEMENTATION IN THE VIRTUAL PHYSICS LAB
N. A. A. A. Bakar, S. Hashim and M. F. Shiratuddin
School of Information Technology, Universiti Utara Malaysia, 06010 Sintok, Kedah, Malaysia
 
ABSTRACT FULL TEXT
Virtual Reality (VR), being the third era in Human-Computer Interaction (HCI), has opened up opportunities in education. At the same time, VR supports the theory of constructivism. The mode of learning geared towards a student-centric or self directed learning model, is embedded in the constructivism learning philosophy. The VR system is able to display a virtual environment that entirely exists in the computer. It can display three-dimensional (3D) elements of sight, hearing and the sense of touch (haptic). This paper reviews the existing implementation of this promising technology in Physics throughout the world and proposes a solution to tackle the challenges faced by secondary school Physics teachers in Malaysia. The ‘Virtual Physics Lab’ is developed and applied to assist current teaching practices. It is foreseen that when VR is introduced into the Malaysian educational system, the results from this research will be one of the valuable resource to assist the growth of the government’s ‘Smart School’ project. Elementary research methodologies, information gathering, prototype design, development and testing, information analysis and documentation are the steps taken to accomplish the research objectives.
 
Keywords: Education, smart school, virtual physics lab, virtual reality.

Universiti Utara Malaysia Press
 Universiti Utara Malaysia, 06010 UUM Sintok
Kedah Darul Aman, MALAYSIA
Phone: +604-928 4816, Fax : +604-928 4792

All Right Reserved. Copyright © 2010, Universiti Utara Malaysia Press