Volume 1 Number 2 May 2010


A Novel Design of Smart Evaluation on Job Vacancy Application System (SEJVAS) Using UML

Noraziah Binti Ahmad

https://doi.org/

Abstract Nowadays, job application is more preferred online than paper resumes. Smart Evaluation on Job Vacancy Application System (SEJVAS) has been developed by using Rapid Application Development (RAD). In this paper, new designs of the job vacancy application module are presented by using UML diagrams. In addition, this system applies the Rule-based technique in order to generate a shortlist for the... Read More


Knowledge Based Flexible and Integrated PLM System at Ford

M.B. Raza, T. Kirkham, R. Harrison, Q. Reul

https://doi.org/

Abstract This paper reviews the perennial problem of knowledge management / information integration in large scale, complex and knowledge intensive organisations such as automotive industries. Automotive industry is under increased pressure to produce low cost customised products using innovative agile manufacturing techniques. Presently this innovation has focused on the improved process development between different stages of Product Lifecycle Management (PLM). However... Read More


IPOMS: an Internet Public Opinion Monitoring System

Jie Ding, Jungang Xu

https://doi.org/

Abstract In this paper, an IPOMS (Internet Public Opinion Monitoring System) is proposed. This system can collect web pages with some certain key words from Internet news, topics on forum and BBS, and then cluster these web pages according to different ‘event’ groups. Furthermore, this system provides the function of automatically tracking the progress of one event. With this system, supervisors... Read More


Obfuscation Techniques for Mobile Agent Code Confidentiality

Sandhya Armoogum, Asvin Caully

https://doi.org/

Abstract Mobile code, typically mobile agent applications, promises many advantages and is suitable to many different types of applications. However, the main hindrance to the advancement of mobile agent technology is security issues such as mobile agent code confidentiality. Existing security mechanisms for mobile agent technology basically allow for protection against code and data integrity changes by using for instance digitally... Read More


The Architecture of an Integrated Support Tool for Software Product Certification Process

Aziz Deraman, Jamaiah Haji Yahaya

https://doi.org/

Abstract Previous studies in software certification provide a set of axiom and supporting models for software assessment and certification. Two main researches were undertaken to study the issue of certification and developed models of software certification. These models have been developed using requirements-design-implementation strategy to ensure that it meets the needs of a number of different interest groups in the industry.... Read More