Abdullah Mohd Zin

Learn More
43 Abstract—Real-time virtual heritage application is normally executed with a high performance computer system. This is due to the complexity and highly computational cost which makes such system impossible to run in a lower specification computer system. Therefore, many developed virtual heritage application cannot be retrieved by the target users. One of(More)
Wiki is a social networking system that allows users to freely intermingle at different levels of communication such as collaborative learning, chatting and group communications. This is conceived to be the merriest goal. It is particularly vulnerable due to its features of open medium and lack of clear plan of defense. Social networking systems today are(More)
This paper presents a method for fast-approximate collision detection between 3D models <i>S</i> undergoing rigid body motion. To enclose a 3D model in as tight as possible, we propose an approach known as oriented convex polyhedra <i>R</i>(<i>S</i>). By surrounding the 3D models tightly, the veracity of detected collision can be improved. It is known that(More)
Pervasive and sustained cyber attacks against information systems continue to pose a potentially devastating impact. Security of information systems and the networks that connect them is becoming increasingly significant nowadays than before as the number of security incidents steadily climbs. The traditional ways of protection with firewall and encryption(More)
This paper presents a method to convert the deterministic, continuous representation of a biological system by ordinary differential equations into a non-deterministic, discrete membrane computation. The dynamics of the membrane computation is governed by rewrite rules operating at certain rates. That has the advantage of applying accurately to small(More)