Lim Jiun Yong - Academia.edu (original) (raw)

Papers by Lim Jiun Yong

Research paper thumbnail of Integration of Security Modules in Software Development Lifecycle Phases

ArXiv, 2020

Information protection is becoming a focal point for designing, creating and implementing softwar... more Information protection is becoming a focal point for designing, creating and implementing software applications within highly integrated technology environments. The use of a safe coding technique in the software development process is required by many industrial IT security standards and policies. Despite current cyber protection measures and best practices, vulnerabilities still remain strong and become a huge threat to every developed software. It is crucial to understand the position of secure software development for security management, which is affected by causes such as human security-related factors. Although developers are often held accountable for security vulnerabilities, in reality, many problems often grow from a lack of organizational support during development tasks to handle security. While abstract safe coding guidelines are generally recognized, there are limited low-level secure coding guidelines for various programming languages. A good technique is required to...

Research paper thumbnail of Wireless Networks: Active and Passive Attack Vulnerabilities and Privacy Challenges

In recent years, wireless networks have undoubtedly become a convenient way to connect to the Int... more In recent years, wireless networks have undoubtedly become a convenient way to connect to the Internet and provide connection to everyone in any corner of the world. In fact, in this era, people are connected to the internet almost everyday and wireless networks give us this privilege in a seamless manner. A wireless network normally consists of access points and nodes where the access points are responsible to amplify the wireless signals, while the nodes are the gadgets that are receiving these signals. However, with such great convenience provided, many challenges are also faced by the users and stakeholders. With no physical connection to devices, wireless networks are evidently more vulnerable to invisible cyber attacks. In this research paper, it the security issues that cause issues in the wireless networks are discussed. Furthermore, an analytical review of privacy challenges found in these networks is performed; these challenges are segregated into security issues and priva...

Research paper thumbnail of Cyber Attacks in the Era of COVID-19 and Possible Solution Domains

In this COVID-19 pandemic, the use and dependency on Internet has grown exponentially. The number... more In this COVID-19 pandemic, the use and dependency on Internet has grown exponentially. The number of people doing online activities such as e-learning, remote working, online shopping and others have increased. This has also led to increased vulnerability to cyber crimes. Cyber security attacks have become a serious problem. The common types of cyber security attacks are phishing, malware, ransomware, social engineering, identity theft and denial-of-service. The attackers target the victims in order to get their credential information or financial benefits. Those people who are doing online activities are vulnerable to cyber threats. This is because the network is not safe. The attackers are able to code according to the weaknesses of the Internet. Once the attackers hack into the devices, they have the root access and can do whatever they want to do with the device. In this research paper, the concept of cyber security attack and detailed research about real attacks are discussed. ...

Research paper thumbnail of Taiwan, R.O.C. Robot Task Execution with Telepresence Using Virtual Reality Technology

Robotic manipulators are widely used to replace human operators in tasks that are repetitive in n... more Robotic manipulators are widely used to replace human operators in tasks that are repetitive in nature. However, there are many tasks that are non-repetitive, unpredictable, or hazardous to the human operators. With teleoperation, or remote control, such tasks can still be performed using robotic manipulators. A suitable platform with visual and mechanical feedback is deemed necessary to simplify the operation of such system. This paper describes the design and implementation of a telepresent robot control system using virtual reality (VR) instruments. The system includes a stereo Head-Eye Module (HEM) with 3 degree-of-freedom, a highresolution stereo Head Mounted Display (HMD) for remote supervision, and a 6 degree-of-freedom articulated robotic manipulator. The motion of the operator's head and hand are tracked using 6 degree-of-freedom magnetic trackers. Implementation of the system includes the mechanical design and fabrication of the HEM, and the overall software and hardware integration. The operation of the system was subsequently demonstrated by performing 2 specific tasks

Research paper thumbnail of E cient computation of an isotonic median regression

Applied Mathematics Letters, 1995

Research paper thumbnail of Broadband counter-wound spiral antenna for subsurface radar applications

IEEE Antennas and Propagation Society Symposium, 2004., 2004

Public reporting burden for this collection of information is estimated to average 1 hour per res... more Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington headquarters Services, Directorate for Information Operations and Reports,

Research paper thumbnail of A collaborative awareness framework for mobile tourist recommender system

2011 3rd International Conference on Computer Research and Development, 2011

Tourism industry is expected to grow tremendously in Malaysia. Mobile technology such as smart ph... more Tourism industry is expected to grow tremendously in Malaysia. Mobile technology such as smart phones can be use as a tourist recommender system. This paper proposed a collaborative awareness framework in order to design a usable mobile system. The collaborative awareness framework takes into account of tourist types, tourism activities, tourist experiences, visiting phases, mobile technology capabilities and limitations. The proposed mobile tourist recommender system will be able to provide both location-based and person-based awareness.

Research paper thumbnail of Human Age and Vehicle Speeds Affect on Vehicle Ingress Motion Pattern

Lecture Notes in Computer Science

ABSTRACT

Research paper thumbnail of User experience evaluation methods for mobile devices

Third International Conference on Innovative Computing Technology (INTECH 2013), 2013

There are many user experience evaluation methods available in the literature. Four different use... more There are many user experience evaluation methods available in the literature. Four different user experience evaluation methods were reviewed. However, most user experience evaluation methods measured different dimensions of user experience. Therefore, Norman's emotional design is proposed as a common conceptual framework for user experience. User experience evaluation method should measure emotional response related to visceral, behavioural and reflective. Thus, a user experience testing is designed to provide holistic view of a product. Other challenges faced in user experience evaluation methods are also discussed in detail.

Research paper thumbnail of Integrating interpersonal space and shared workspace for translation groupware development

Proceedings of the 11th International Conference on Information Integration and Web-based Applications & Services, 2009

Translation is a process that allows people to learn and comprehend others' ideas or cultures in ... more Translation is a process that allows people to learn and comprehend others' ideas or cultures in their own language. A translation groupware, that allows two or more human translators to edit the output of machine translation at different times and different places, is developed in order to overcome the limitation of human translators and machine translation. However, translation groupware still not widely adopted by current human translators and the effectiveness is not known. An understanding of how multiple translators work and interact within a group is vital to develop a usable groupware. It is hypothesized that collaborative awareness can improve the translation groupware usability. Collaborative awareness components, such as interpersonal space and shared workspace, are identified as important characteristics to enhance the usability of translation groupware.

Research paper thumbnail of Improved electrical property of Sb-doped SnO2 nanonets as measured by contact and non-contact approaches

Rsc Advances, 2012

ABSTRACT This work reports the characterization of antimony doping effects on the electron transp... more ABSTRACT This work reports the characterization of antimony doping effects on the electron transportation in SnO 2 nanonets via a contact (field-effect transistor) and a non-contact (terahertz time-domain spectroscopy) approach. The doping influence is well demonstrated by the contact method through exploring the output characteristics of the devices. In addition, through the analysis of the terahertz time-domain spectra using Drude–Smith model, the non-contact method provides more precise characterization ascribed to the absence of extra effects such as contact resistance and nanowire– nanowire junction barriers.

Research paper thumbnail of Collaborative Awareness for Translation Groupware

2009 International Conference on Information and Multimedia Technology, 2009

Abstract Translation is a process that allows people to learn and comprehend others'... more Abstract Translation is a process that allows people to learn and comprehend others' ideas or cultures in their own language. Such knowledge sharing will bring major advancement on society and the economy. A translation groupware, that allows two or more human ...

Research paper thumbnail of Virtual obstacle concept for local-minimum-recovery in potential-field based navigation

Proceedings 2000 ICRA. Millennium Conference. IEEE International Conference on Robotics and Automation. Symposia Proceedings (Cat. No.00CH37065)

We present a navigation algorithm, which integrates virtual obstacle concept with a potential-fie... more We present a navigation algorithm, which integrates virtual obstacle concept with a potential-field-based method to maneuver cylindrical mobile robots in unknown or unstructured environments. This study focuses on the real-time feature of the navigation algorithm for fast moving mobile robots. We mainly consider the potential-field method in conjunction with virtual obstacle concept as the basis of our navigation algorithm. Simulation and experiments of our algorithm shows good performance and ability to overcome the local minimum problem associated with potential field methods.

Research paper thumbnail of The Exploratory of Personal Assistants

Lecture Notes in Computer Science, 2002

This paper presents a perspective of using personal assistants in personalized systems, particula... more This paper presents a perspective of using personal assistants in personalized systems, particularly in both understanding the user model and generating appropriate adaptation and response. The paper discusses the use of a personal assistant as a data input source and the expected stereotypes based on mind-sets. This is the framework of exploring a user-centered design approach to building up the

Research paper thumbnail of Design of Embedded System for Grid Handtop Computing (ESGHC)

2008 International Conference on Electronic Design, 2008

This paper discusses the design of the Embedded System for Grid Handtop Computing (ESGHC), the im... more This paper discusses the design of the Embedded System for Grid Handtop Computing (ESGHC), the implementation and the methods used in ESGHC. ESGHC applies the grid computing technology which is built under a grid environment for handtop devices. By having ESGHC, sharing of handtop devices in terms of computational power and storage are virtually possible. Besides, grid services can be accessed everywhere at any time through handtop devices. This research aims at applying the mobile grid technology to the medical line.

Research paper thumbnail of Designing and Developing a PDA Food Ordering System Using Interaction Design Approach: A Case Study

2009 International Conference on Computer Technology and Development, 2009

Abstract Handheld technology had been used in fast food industry in order to improve their custom... more Abstract Handheld technology had been used in fast food industry in order to improve their customer services. The usability of these handheld systems is important so that waiter can take customer order effectively, efficiently and satisfactorily. This paper describes how a ...

Research paper thumbnail of A filter neural network

Proceedings of 1993 International Conference on Neural Networks (IJCNN-93-Nagoya, Japan)

This paper proposes to add a filter layer to a dot product matching neural network. The purpose o... more This paper proposes to add a filter layer to a dot product matching neural network. The purpose of the filter layer is to discard those unfavourable choices by checking the lower and upper bounds of each exemplar with the test pattern. The product is a supervised, fast learning filter neural network. It has a better generalisation capability than an ordinary

Research paper thumbnail of Individual Differences on Internet Search Tools

This paper presents a user-oriented evaluation method to compare the usability of Internet search... more This paper presents a user-oriented evaluation method to compare the usability of Internet search tools. Subjects will be pre-tested for cognitive and problem solving style. The subjects will be given three search tasks to perform in controlled conditions. Subject will rate the usability of each search tools based on relevance and satisfaction. A framework of user-oriented evaluation on Internet search tools is proposed in this study. The ultimate aim of the research is to contribute to the knowledge concerning individual differences and information retrieval technology. In particular we hope to get a better understanding of which presentation structures and user interface attributes work best and why.

Research paper thumbnail of Design and Development of an Omnidirectional Mobile Robot

Applied Mechanics and Materials, 2013

Most mobile robots use differential-drive concept, where they are equipped with two actuators tha... more Most mobile robots use differential-drive concept, where they are equipped with two actuators that permit only single-direction rotation at a time. This concept limits the robots navigation because its orientation must always change according to the direction of movement. This paper presents the development of an omnidirectional mobile robot that uses three actuators, aligned in 120 degrees separation and each attached to an omniwheel. By manipulating actuator speed, the robot can navigate to any direction without changing its orientation. Using NIsbRIO9632xt as the main controller, navigation algorithm is implemented in LabVIEW, integrated with PID controller to fine-tune robot movements.

Research paper thumbnail of Ladder Logic Diagram Development for Programmable Logic Controllers via S-Method

Applied Mechanics and Materials, 2012

This paper proposes a method of developing ladder logic diagram for PLCs via S-method (a structur... more This paper proposes a method of developing ladder logic diagram for PLCs via S-method (a structured method of programming routines). From flexible manufacturing industry point of view, engineers can easily understand the operation of the complicated system and have better control on industrial automation system by applying S-method. By practicing this, highly dependent on vendor for operating the system also can be eliminated. This paper describes detailed steps of the method that converts from description of the system to a ladder logic diagram involving a series of systematic steps. A case study on pick and place section, the KUKA system which is implementing the S-method is discussed in paper.

Research paper thumbnail of Integration of Security Modules in Software Development Lifecycle Phases

ArXiv, 2020

Information protection is becoming a focal point for designing, creating and implementing softwar... more Information protection is becoming a focal point for designing, creating and implementing software applications within highly integrated technology environments. The use of a safe coding technique in the software development process is required by many industrial IT security standards and policies. Despite current cyber protection measures and best practices, vulnerabilities still remain strong and become a huge threat to every developed software. It is crucial to understand the position of secure software development for security management, which is affected by causes such as human security-related factors. Although developers are often held accountable for security vulnerabilities, in reality, many problems often grow from a lack of organizational support during development tasks to handle security. While abstract safe coding guidelines are generally recognized, there are limited low-level secure coding guidelines for various programming languages. A good technique is required to...

Research paper thumbnail of Wireless Networks: Active and Passive Attack Vulnerabilities and Privacy Challenges

In recent years, wireless networks have undoubtedly become a convenient way to connect to the Int... more In recent years, wireless networks have undoubtedly become a convenient way to connect to the Internet and provide connection to everyone in any corner of the world. In fact, in this era, people are connected to the internet almost everyday and wireless networks give us this privilege in a seamless manner. A wireless network normally consists of access points and nodes where the access points are responsible to amplify the wireless signals, while the nodes are the gadgets that are receiving these signals. However, with such great convenience provided, many challenges are also faced by the users and stakeholders. With no physical connection to devices, wireless networks are evidently more vulnerable to invisible cyber attacks. In this research paper, it the security issues that cause issues in the wireless networks are discussed. Furthermore, an analytical review of privacy challenges found in these networks is performed; these challenges are segregated into security issues and priva...

Research paper thumbnail of Cyber Attacks in the Era of COVID-19 and Possible Solution Domains

In this COVID-19 pandemic, the use and dependency on Internet has grown exponentially. The number... more In this COVID-19 pandemic, the use and dependency on Internet has grown exponentially. The number of people doing online activities such as e-learning, remote working, online shopping and others have increased. This has also led to increased vulnerability to cyber crimes. Cyber security attacks have become a serious problem. The common types of cyber security attacks are phishing, malware, ransomware, social engineering, identity theft and denial-of-service. The attackers target the victims in order to get their credential information or financial benefits. Those people who are doing online activities are vulnerable to cyber threats. This is because the network is not safe. The attackers are able to code according to the weaknesses of the Internet. Once the attackers hack into the devices, they have the root access and can do whatever they want to do with the device. In this research paper, the concept of cyber security attack and detailed research about real attacks are discussed. ...

Research paper thumbnail of Taiwan, R.O.C. Robot Task Execution with Telepresence Using Virtual Reality Technology

Robotic manipulators are widely used to replace human operators in tasks that are repetitive in n... more Robotic manipulators are widely used to replace human operators in tasks that are repetitive in nature. However, there are many tasks that are non-repetitive, unpredictable, or hazardous to the human operators. With teleoperation, or remote control, such tasks can still be performed using robotic manipulators. A suitable platform with visual and mechanical feedback is deemed necessary to simplify the operation of such system. This paper describes the design and implementation of a telepresent robot control system using virtual reality (VR) instruments. The system includes a stereo Head-Eye Module (HEM) with 3 degree-of-freedom, a highresolution stereo Head Mounted Display (HMD) for remote supervision, and a 6 degree-of-freedom articulated robotic manipulator. The motion of the operator's head and hand are tracked using 6 degree-of-freedom magnetic trackers. Implementation of the system includes the mechanical design and fabrication of the HEM, and the overall software and hardware integration. The operation of the system was subsequently demonstrated by performing 2 specific tasks

Research paper thumbnail of E cient computation of an isotonic median regression

Applied Mathematics Letters, 1995

Research paper thumbnail of Broadband counter-wound spiral antenna for subsurface radar applications

IEEE Antennas and Propagation Society Symposium, 2004., 2004

Public reporting burden for this collection of information is estimated to average 1 hour per res... more Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington headquarters Services, Directorate for Information Operations and Reports,

Research paper thumbnail of A collaborative awareness framework for mobile tourist recommender system

2011 3rd International Conference on Computer Research and Development, 2011

Tourism industry is expected to grow tremendously in Malaysia. Mobile technology such as smart ph... more Tourism industry is expected to grow tremendously in Malaysia. Mobile technology such as smart phones can be use as a tourist recommender system. This paper proposed a collaborative awareness framework in order to design a usable mobile system. The collaborative awareness framework takes into account of tourist types, tourism activities, tourist experiences, visiting phases, mobile technology capabilities and limitations. The proposed mobile tourist recommender system will be able to provide both location-based and person-based awareness.

Research paper thumbnail of Human Age and Vehicle Speeds Affect on Vehicle Ingress Motion Pattern

Lecture Notes in Computer Science

ABSTRACT

Research paper thumbnail of User experience evaluation methods for mobile devices

Third International Conference on Innovative Computing Technology (INTECH 2013), 2013

There are many user experience evaluation methods available in the literature. Four different use... more There are many user experience evaluation methods available in the literature. Four different user experience evaluation methods were reviewed. However, most user experience evaluation methods measured different dimensions of user experience. Therefore, Norman's emotional design is proposed as a common conceptual framework for user experience. User experience evaluation method should measure emotional response related to visceral, behavioural and reflective. Thus, a user experience testing is designed to provide holistic view of a product. Other challenges faced in user experience evaluation methods are also discussed in detail.

Research paper thumbnail of Integrating interpersonal space and shared workspace for translation groupware development

Proceedings of the 11th International Conference on Information Integration and Web-based Applications & Services, 2009

Translation is a process that allows people to learn and comprehend others' ideas or cultures in ... more Translation is a process that allows people to learn and comprehend others' ideas or cultures in their own language. A translation groupware, that allows two or more human translators to edit the output of machine translation at different times and different places, is developed in order to overcome the limitation of human translators and machine translation. However, translation groupware still not widely adopted by current human translators and the effectiveness is not known. An understanding of how multiple translators work and interact within a group is vital to develop a usable groupware. It is hypothesized that collaborative awareness can improve the translation groupware usability. Collaborative awareness components, such as interpersonal space and shared workspace, are identified as important characteristics to enhance the usability of translation groupware.

Research paper thumbnail of Improved electrical property of Sb-doped SnO2 nanonets as measured by contact and non-contact approaches

Rsc Advances, 2012

ABSTRACT This work reports the characterization of antimony doping effects on the electron transp... more ABSTRACT This work reports the characterization of antimony doping effects on the electron transportation in SnO 2 nanonets via a contact (field-effect transistor) and a non-contact (terahertz time-domain spectroscopy) approach. The doping influence is well demonstrated by the contact method through exploring the output characteristics of the devices. In addition, through the analysis of the terahertz time-domain spectra using Drude–Smith model, the non-contact method provides more precise characterization ascribed to the absence of extra effects such as contact resistance and nanowire– nanowire junction barriers.

Research paper thumbnail of Collaborative Awareness for Translation Groupware

2009 International Conference on Information and Multimedia Technology, 2009

Abstract Translation is a process that allows people to learn and comprehend others'... more Abstract Translation is a process that allows people to learn and comprehend others' ideas or cultures in their own language. Such knowledge sharing will bring major advancement on society and the economy. A translation groupware, that allows two or more human ...

Research paper thumbnail of Virtual obstacle concept for local-minimum-recovery in potential-field based navigation

Proceedings 2000 ICRA. Millennium Conference. IEEE International Conference on Robotics and Automation. Symposia Proceedings (Cat. No.00CH37065)

We present a navigation algorithm, which integrates virtual obstacle concept with a potential-fie... more We present a navigation algorithm, which integrates virtual obstacle concept with a potential-field-based method to maneuver cylindrical mobile robots in unknown or unstructured environments. This study focuses on the real-time feature of the navigation algorithm for fast moving mobile robots. We mainly consider the potential-field method in conjunction with virtual obstacle concept as the basis of our navigation algorithm. Simulation and experiments of our algorithm shows good performance and ability to overcome the local minimum problem associated with potential field methods.

Research paper thumbnail of The Exploratory of Personal Assistants

Lecture Notes in Computer Science, 2002

This paper presents a perspective of using personal assistants in personalized systems, particula... more This paper presents a perspective of using personal assistants in personalized systems, particularly in both understanding the user model and generating appropriate adaptation and response. The paper discusses the use of a personal assistant as a data input source and the expected stereotypes based on mind-sets. This is the framework of exploring a user-centered design approach to building up the

Research paper thumbnail of Design of Embedded System for Grid Handtop Computing (ESGHC)

2008 International Conference on Electronic Design, 2008

This paper discusses the design of the Embedded System for Grid Handtop Computing (ESGHC), the im... more This paper discusses the design of the Embedded System for Grid Handtop Computing (ESGHC), the implementation and the methods used in ESGHC. ESGHC applies the grid computing technology which is built under a grid environment for handtop devices. By having ESGHC, sharing of handtop devices in terms of computational power and storage are virtually possible. Besides, grid services can be accessed everywhere at any time through handtop devices. This research aims at applying the mobile grid technology to the medical line.

Research paper thumbnail of Designing and Developing a PDA Food Ordering System Using Interaction Design Approach: A Case Study

2009 International Conference on Computer Technology and Development, 2009

Abstract Handheld technology had been used in fast food industry in order to improve their custom... more Abstract Handheld technology had been used in fast food industry in order to improve their customer services. The usability of these handheld systems is important so that waiter can take customer order effectively, efficiently and satisfactorily. This paper describes how a ...

Research paper thumbnail of A filter neural network

Proceedings of 1993 International Conference on Neural Networks (IJCNN-93-Nagoya, Japan)

This paper proposes to add a filter layer to a dot product matching neural network. The purpose o... more This paper proposes to add a filter layer to a dot product matching neural network. The purpose of the filter layer is to discard those unfavourable choices by checking the lower and upper bounds of each exemplar with the test pattern. The product is a supervised, fast learning filter neural network. It has a better generalisation capability than an ordinary

Research paper thumbnail of Individual Differences on Internet Search Tools

This paper presents a user-oriented evaluation method to compare the usability of Internet search... more This paper presents a user-oriented evaluation method to compare the usability of Internet search tools. Subjects will be pre-tested for cognitive and problem solving style. The subjects will be given three search tasks to perform in controlled conditions. Subject will rate the usability of each search tools based on relevance and satisfaction. A framework of user-oriented evaluation on Internet search tools is proposed in this study. The ultimate aim of the research is to contribute to the knowledge concerning individual differences and information retrieval technology. In particular we hope to get a better understanding of which presentation structures and user interface attributes work best and why.

Research paper thumbnail of Design and Development of an Omnidirectional Mobile Robot

Applied Mechanics and Materials, 2013

Most mobile robots use differential-drive concept, where they are equipped with two actuators tha... more Most mobile robots use differential-drive concept, where they are equipped with two actuators that permit only single-direction rotation at a time. This concept limits the robots navigation because its orientation must always change according to the direction of movement. This paper presents the development of an omnidirectional mobile robot that uses three actuators, aligned in 120 degrees separation and each attached to an omniwheel. By manipulating actuator speed, the robot can navigate to any direction without changing its orientation. Using NIsbRIO9632xt as the main controller, navigation algorithm is implemented in LabVIEW, integrated with PID controller to fine-tune robot movements.

Research paper thumbnail of Ladder Logic Diagram Development for Programmable Logic Controllers via S-Method

Applied Mechanics and Materials, 2012

This paper proposes a method of developing ladder logic diagram for PLCs via S-method (a structur... more This paper proposes a method of developing ladder logic diagram for PLCs via S-method (a structured method of programming routines). From flexible manufacturing industry point of view, engineers can easily understand the operation of the complicated system and have better control on industrial automation system by applying S-method. By practicing this, highly dependent on vendor for operating the system also can be eliminated. This paper describes detailed steps of the method that converts from description of the system to a ladder logic diagram involving a series of systematic steps. A case study on pick and place section, the KUKA system which is implementing the S-method is discussed in paper.