46 resultados para MALAYSIA
Resumo:
The Niah Caves in Sarawak, Borneo, have captured evidence for people and economies of 8000 and 4000 years ago. Although not continuous on this site, these open two windows on to life at the cultural turning point, broadly equivalent to the transition from Mesolithic to Neolithic. They have much in common, inferring that the occupants, perhaps belonging to an older maritime dispersal, had a choosy appetite for the Neolithic package.
Resumo:
Identifying responsibility for classes in object oriented software design phase is a crucial task. This paper proposes an approach for producing high quality and robust behavioural diagrams (e.g. Sequence Diagrams) through Class Responsibility Assignment (CRA). GRASP or General Responsibility Assignment Software Pattern (or Principle) was used to direct the CRA process when deriving behavioural diagrams. A set of tools to support CRA was developed to provide designers and developers with a cognitive toolkit that can be used when analysing and designing object-oriented software. The tool developed is called Use Case Specification to Sequence Diagrams (UC2SD). UC2SD uses a new approach for developing Unified Modelling Language (UML) software designs from Natural Language, making use of a meta-domain oriented ontology, well established software design principles and established Natural Language Processing (NLP) tools. UC2SD generates a well-formed UML sequence diagrams as output.
Resumo:
Efficient scrubbing of mercury vapour from natural gas streams has been demonstrated both in the laboratory and on an industrial scale, using chlorocuprate(ii) ionic liquids impregnated on high surface area porous solid supports, resulting in the effective removal of mercury vapour from natural gas streams. This material has been commercialised for use within the petroleum gas production industry, and has currently been running continuously for three years on a natural gas plant in Malaysia. Here we report on the chemistry underlying this process, and demonstrate the transfer of this technology from gram to ton scale.
Resumo:
A new niche of densely populated, unprotected networks is becoming more prevalent in public areas such as Shopping Malls, defined here as independent open-access networks, which have attributes that make attack detection more challenging than in typical enterprise networks. To address these challenges, new detection systems which do not rely on knowledge of internal device state are investigated here. This paper shows that this lack of state information requires an additional metric (The exchange timeout window) for detection of WLAN Denial of Service Probe Flood attacks. Variability in this metric has a significant influence on the ability of a detection system to reliably detect the presence of attacks. A parameter selection method is proposed which is shown to provide reliability and repeatability in attack detection in WLANs. Results obtained from ongoing live trials are presented that demonstrate the importance of accurately estimating probe request and probe response timeouts in future Independent Intrusion Detection Systems.