Author(s) Zakaria, Nor Azura, W. Z. W. Hasan, I. A. Halin, R. M. Sidek, and Xiaoqing Wen. Summary This paper presents a research work aimed to detect previously-undetected faults, either Write Disturb Faults (WDFs) or Deceptive Read Destructive Faults (DRDFs) or both in March Algorithm such as MATS++(6N), March C-(10N), March SR(14N), and March CL(12N). […]
Author(s) Mohd Farizul Azman, CID, Azmi Yahya, and Hadi Purwanto Summary This type of sensor is planned to be used for the Non-Destructive Test (NDT) measurement of a moisture level in soil for irrigation system in the field and green house. Abstract The Fringing Electric Field (FEF) element design consideration has been discussed in this […]
Author(s) Dr. Abdurashid Mamadolimov Summary Searching is a basic operation for database manipulating problems. We consider the problem of searching for an element in a partially ordered set. Abstract We consider a database composed of a set of conceptual graphs. Using conceptual graphs and graph homomorphism it is possible to build a basic query-answering mechanism […]
This paper reviews the study on a two-way quantum key distribution protocol given imperfect settings through a simple analysis of a toy model and show that it can outperform a BB84 setup.
This paper presents a novel anomaly detection framework to detect anomalous motion trajectory using the fusion of adaptive piecewise analysis and fuzzy rule-based method.
This paper introduces an improved query system using a Visual Query Language. The system allows the users to construct query graphs by interacting with the ontology in a user friendly manner.
A new decoy state method has been presented to tighten the lower bound of the key generation rate for BB84 using one decoy state and one signal state.
This paper discusses the concept of seamless session transfer for real-time application such as VoIP and IPTV, and our prototype implementation of such concept on a selected open source VoIP application.