My Video

This video is shows how UMS guys catwalk.....

My Outstanding Assignment and Project

1. Final Year Project
My final year project title is plagiarism detector system to program’s code using data summarization.

2. ICT Project Management
In this course, we have a project group want to do. We have six people in a group. Our project is to create a management system for a company. We have to create a management system for a gym.

3. Programming Language
In programming language, we have to do the assignment in a group. We need to solve the programming language problem by using C++.

4. Advance Software Engineering
In this course, we also have a group project want to do. We have four people in a group. Our project is to develop a management system for primary system can help principles and teacher easily to view and update their profile and student’s profile.

5. Web Technology
For this course, our assignment is learning how to create a web blog. We have done the assignment individually.

6. Data mining
For this course, we need to solve the program that reads the ARFF formatted file and compute the distance matrix for records stored in the input file by using Java.

7. Computer Security
For this course, we have to do the assignment and project in a group. We have 5 people in a group. Our assignment is doing a study on the network security solutions available in the market. For our project is related the solving of the security system or network.

Relvolving Restaurant & Bar Atmosphere

We all have go to Relvolving Restaurant & Bar Atmosphere enjoy the dinner. Atmosphere Restaurant is situated on the roof of the Kota Kinabalu, Sabah.

We all have enjoy the dinner at relvolving restaurant o....so delicous....
We have take a foto in front of the atmosphere before we go inside....

Borneo Kellybays

Our course has organized 1 trip to the Borneo Kellybay on 20 August for 2 days 1 night. Borneo Kellybays is located at Kampung Laya-Laya Tuaran. At the Borneo Kellybays, visitors can occupy themselves with sport activities like bamboo rafting, water tricycle, surfing, banana boat ride, crab catching, survival games and lots more.our course have organize


Yeah, we want go to Borneo Kellybays for holidays....

This is our first time to play banana boat. So intersting to play water spot game....

we all want go back to UMS lo....after stay at Borneo Kellybays. It's to tired.....


Crocodile Farm

During this semester holiday, i have follow my classmate go to crocodile farm to enjoy....

See, i sit on the crocodile's body....


We all stand by to watch how the crocodiles to grab the food...


Look, all the crocodiles are very hungry already. They all up to grab the food.







Our courses have taken the picture in the Bamboo Hourse at crocodile farm.




Evening @ E 2009

Kolej kediaman E ada menganjurkan Evening @ E 2009 pada 19 Julai 2009 di Anjung Perdana. The tema untuk Evening @ E 2009 adalah “tak kenal maka tak cinta”. Tujuan mengadakan program ini adalah untuk pelajar-pelajar satu dapat mengenali antara satu sama lain dan lebih mengetahui tentang kolej kediaman E. aktiviti ini diwajibkan kepada pelajar tahun 1 hadir.
Activiti ini bermula pada pukul 7 malam. Semua pelajar harus berkumpul di Anjung Perdana. Pada pukul 8.20 pm, ketibaan Jakmas E, Felo-felo, staf HEP dan staf Chase Perdana. Selepas itu, ketibaan pemangku pengetua dan pengurus chase perdana. Aktiviti ini bermula dengan menyanyi lagu ‘NEGARAKU’ dan ‘BERTEKAD CEMERLANG’. Seterusnya, pengarah memberi ucapan pada program ini.
Selepas ucapan, amanat diberi oleh Yang Dipertua Jakmas E dan Pemangku Pengetua kepada pelajar-pelajar terutamanya pelajar tahun 1. Selepas itu, aktiviti ini diteruskan dengan persembahan selingan. Selepas persembahan, sesi soal jawab dibuka kepada semua pelajar. Selepas sesi jawab, bacaan ikrar Aku Janji Pelajar Tahun 1 diadakan kepada pelajar tahun 1. Selepas itu, jamuan ringan diadakan sebelum aktiviti ini tamat.

Poor English Behind Jobless Graduate

Poor English behind jobless graduates
Nowadays, most of the student can’t find their job after their finish their study. From the research, there are 70% of public universities and institutes of higher learning graduates in the country are unemployed. This is in contrast with 26% for private institutions of higher learning and 34% for foreign graduates. What is the cause of jobless graduates?
Research has shown poor English among the graduates student is one factor for the problem of unemployed graduated. Many of them lack the communication skills, command of the English language and also very poor in grammar languages.
As we know, English is very important nowadays because it is an international language. English languages are use for all people to communicate in this world. Hence, students must ability to articulate and communicate effectively. This is because important skills need to acquire for employment in the first place.
If graduates student lack the ability to communicate effectively, which are important in the work place, then these students were less marketable.
To improve the English languages, students must motivate themselves. They should always use English language to communicate with other. They also should practice every time.
Besides that, for the higher education, participation in extra-curricular activities is very important as coursework. From the extra-curricular activities, they can learn to interact and communicate with other students, so that they can improve their English languages.
Conclusions, easy to get the jobs, firstly should improve our English languages. If we can communicant properly with the English languages, we have one advantage when we want find the jobs.

Hackers

Hacker
1.0 Introduction of hacker
The hacker has acquired many meanings, including a creative programmer, one who illicitly breaks into computers, a novice golfer who digs up the course, a taxicab driver, and ditch-digger. Confusion between the first two interpretations results in the perception that one need be brilliant or creative to break into computers. This may not be true. Indeed, the person we followed was patient and plodding, but hardly showed creative brilliance in discovering new security flaws.
2.0 Background of hacker
The history of hacking is hard to track down. There appears to be as much confusion about the origins of hacking as there is about the term itself. The debate over the history of hacking parallels the debate over the meaning of the term. There are two very distinct arguments on this issue. One side claims that hacking has always referred to those criminals individuals among us who will attempt anything for personal. Hacking has always referred to those who are the pioneers of new fields and constantly explore just for the sake of knowledge claims by the other side. Shapiro (2003) claims that the earliest known use of the word hacker was in a student paper from the Massachusetts Institute of Technology (MIT). He quotes the following from the November 20, 1963 issue and uses this as proof that the word hacker has always referred to someone with malicious intent. The hacking identifies three distinctly different cultures; the first one is hobby. This type of hacking originated in the 20’s. Radio amateurs and electronic enthusiast are the primary members of this group. These hackers began by putting together early computer kits such as the Altair 8800, ABC80 and the ABC800. This began the ideology that hackers possess a through understanding of technology. This type of hacking predates all of the others. The second one is academic. The Model Railroad Club at MIT developed this type of hacking through the sophisticated railroad systems they built in the 50s. The word “hack” first appeared and was used to describe technology based pranks. This group included students from disciplines such as math and eventually, evolved into programming. The third one is network. Today, we would call them phone phreaks because they developed ways to utilize the phone system to make calls. The old phone system used dozen of switches that were controlled by tone commands. Once these switches were discovered they could be used to control the phone system.
3.0 Hacking Today
3.1 Types of Hackers
Hackers can be broken down in several ways. Hackers can be classifying based on their chosen specialty or a combination of both and level of skill. This section has describes the various types of hackers and provides a glimpse of classification by reviewing Guppta, Laliberte & Klevinsky’s (2002) three tiered system. There are some types of hacker: the first one is cracker. This term is used mainly to identify an individual that cracks or breaks into various items and hacker can be cracking security codes, software registrations, or computer systems. The second one is phreaker. Phreaker’s are phone hacker’s and usually concentrate on understanding and manipulating the phone system. There are not always seen that way in the hacking community but it can be malicious. The third one is script Kiddie. These individuals usually comb the Internet looking for pre-written scripts or programs they can use for various purposes. The three tiered system of classification was designed to represent a pyramid. The first-tier contains fairly advanced hackers with the skill level dropping until the last tier is reached. They chose the pyramid to reflect the actual number of hackers that would be in each category. This demonstrates that as skill level drops the number of hackers increase. The first-tier consists of programmers that find vulnerabilities in existing code. These hackers are well educated and possess a deep understanding of computer technology. The second-tier hackers have less skill knowledge in programming than first-tier hackers. They usually have experience with several operating systems, the ability to do general programming, and an in-depth understanding of networking technologies. The third-tier hackers have the lowest skill level and are the most numerous. They are commonly referred to as script kiddies and they download scripts and programs from the Internet to accomplish their hacking. They have potentially to do most harm to a system and do not have an in-depth understanding of the tools they use.
3.2 Malicious of hackers
Through the description and classification of hacker’s one can see that the technical knowledge required to hack can be used to malicious society or to malicious the individual. Malicious hacker’s are sometimes called black-hat hackers by the security profession. Black-hat hackers are those individuals that use their technical skill for personal gain. These include hackers from various disciplines and motivations. These are the malicious hackers who are intent on destruction and profit. They may have personal motivations such as revenge or anger. Sometimes the motivations are simple such as money or notoriety. Media’s misuse of the term and consequences has consistently the term hacker to identify any computer criminal. All too often headlines read that hacker has broken in to a bank or stolen credit card numbers. This misuse of the term has considered consequences for both the industry and the computer professional. The hackers have begun to influence business practices. The industry has been forced to redefine and classify hackers. The security industry is the most heavily influenced by the confusion due to the similarities in hacking and security job functions. Management and administrators of companies are often non-technical. This will influenced by the media criminalizing of hacking, security professionals are now being scrutinized. This excessive scrutiny is slowly eroding the ability of the security professional to perform the necessary tasks to secure the system. The competing company filed charges against the contractor for scanning their network while testing. Hacker commonly do port scans before initiating an attack and security professionals test their systems the same way. The company charged the professional under the anti-hacking laws and attempted to sue for damages. Education of the media and the general public on hacking and security measures could reverse this very dangerous trend.
One type of attack that is of interest to this effort is Denial of services (DOS) attack. Dos attacks can be the result of frustration when efforts to break into a system have failed, for the sense of power it can bring, or ca be used to carry out a grudge against an organization. McClure also feels that DOS attacks will increase due to tools that allow easy launching of DOS attacks, and the opinion that Window NT/95/98 is a favorite, and readily available target. This makes DOS a weapon of choice for terrorists, even if skilled hackers do not care, in general, for this type of attack.
4.0 Conclusion
Through education of the media and public, this misconception can be corrected and further complications avoided. Hacking is the act of exploring technology to expand one’s own knowledge. Hackers retain the responsibility of being or not, just the same as any other professional does.

My FYP

Title
Plagiarism detector system to program’s code using data summarization

Introduction
The copying of programming assignment is widespread in academic institution. This is because they can get the words or ideas that they want from the web, friends and so on without acknowledging their source. We called this action as plagiarism.

This action is like stealing from the other. Therefore, we have to stop this action from happening. The lecturer can check the coding line by line if there are just few assignment that need to check but how sure is the lecturer that hundred of the assignment all of it also not the same.

Hence, they need a system that can help them that make sure that plagiarism does not happen among the student. It is because computer would not forget what it store except being delete by the user so a system would be a useful to help the lecturer in detecting the plagiarism.

Problem Background
Nowadays, many students’ likes copy the coding whether from a book, a printed article, or an electronic resource found on the web sites. As we know, plagiarism is the use of someone’s ideas or words as your own without acknowledge their source.

The “cut and paste” online information makes it easier to all person to cyber-plagiarism then even before. However, the same online resources that make it simpler to plagiarism also make it easier for individuals to detect instances of academic dishonestly.

Short Description of the Project
· Programming language used:
Ø Java
Ø Structured Query Language (SQL)
Ø JavaScript
· Software used :
Ø Wamp Server
Ø Macromedia Dreamweaver CS3
Ø Adobe Photoshop CS3

The system should have store the coding into the database and compare all the algorithm of the coding that had being store

Objectives
· Assists lecture in categories assignment related to programming.
· Provide interface for these facilities:
i) Reading files input
ii) Summarize the cluster
· Extracts patterns from each cluster for data analysis.

Scope of objective
· Design the algorithm to help lectures in categories assignment related the coding
The algorithm should check the structure of each coding and detect whethe there are any result of plagiarism

· Develop a user-interface systems interface
An interface should be build so that the user should easily know how the system work Beside that, they can have a better view for the system rather than a black screen with only word

· Use the control structure: the sequence structure, three types of selection structures and three types of repetitions structures
The structure of the coding is store so that it can be compare among each other for plagiarism. If the structure is the same mostly the compared coding is the same else it is not.

Literature review
There are a lot of ways that had being use to stop plagiarism from happening. In University of Akron, there are rule that had being set to stop this act. There are general guidelines for the student and the definition of plagiarism written in it so that the student can understand what is the meaning of plagiarism.

Not only that, the guidelines also written why plagiarism is wrong and also the thing the student can and cannot do. Therefore the student can understand the meaning of plagiarism and also they know what they should do even when they were learn or build upon other people work.

Summary
The copying of programming assignment is a significant and increasing problem in education institutions. The system is designed in order to assist lecturer preventing plagiarism among the students. Besides this, the system can help lecturer to check the coding when the lecturer has hundreds of students. It is also easy for the lecturer to find whether students plagiarize or not.

My CV

CURRICULUM VITAE
Name : CHIN SIEW ENG
Address : 5D, LORONG 16B, JALAN TEKAM,
96000 SIBU SARAWAK.
Telephone : 0165898759
Nationality : Malaysia
Date of Birth : 20 JANUARY 1986
Marital Status : Single
Gender : Female

PROFILE
Enthusiastic and self-motivated. Hardworking, friendly, responsible and flexible. I also enjoy working in teams.



QUALIFICATION:
2005 – 2006 STPM CGPA- 2.75

EDUCATION
2005-2006 SMK ROSLI DHOBY Sijil Tinggi Pelajaran Malaysia (STPM)
1992-2004 SMK DURIN Sijil Pelajaran Malaysia (SPM)


WORKING EXPERIENCE
2005 Asia Tuition School Tuition teacher
2003 Daesim Mart Sdn Bhd Part time cashier



PROFESSONAL SKILLS
COMPUTER SKILL: HTML, JAVA, C, PHP, C++.
COMPUTER: Familiar with Microsoft Office 2003 and 2007, Microsoft Excel,
Microsoft Publisher, Microsoft Power Point.
LANGUAGE: Able to speak good English, Bahasa Malaysia and Mandarin.
WRITING: Able to write in English, Bahasa Malaysia and Mandarin.


CO – CURRICULUM ACHIEVEMENT
Secondary School:
- Class Leader (Form 6)
- Treasure of Leo Club (Form 6)
- Leader for Mathematics Club (Form 4 – 5)


ADDITIONAL INFORMATION:
HOBBIES
- Reading and surfing the net during free hours and meeting new people.

Education Background

I have study at UMS and talking software engineering course. For the first semester, I had learned the programming language in C. C is a structured, general purpose, procedural language developed at Bell Laboratories. For the programming C, I had learn the basic of the programming C and learn how to write the coding for the C. In the semester 2, I had learned the programming language in Java. Java is object-oriented language invented at Sun Microsystems. It may be used to develop stand-alone application that operate on a single computer, application that run over the Internet from a Web server, and applets that run in a Web browser. In this semester, I had known the basic of the Java and know the coding of the Java. In the third semester, I had learned programming C++ in data structure. C++ is based on the C language; it often object-oriented features not found in C. C++ was also invented at Bell Laboratories. Besides this, I had learned Database. In database, I had learned how to develop web-based system using PHP. For the fourth semester, I had talked software engineering subject. This subject had introduced about the stages involved in software development process. This syllabus includes software requirements and specifications, software design techniques, software testing, documentations and maintenance. For the fifth semester, I had take advance software engineering subject. In this subject, I know how conduct a web application development project and plan web application development project. Besides this, I had take web technology course. In this course, I had understood the major protocols for internetworking and perform basic website design, basic client side programming and basic server side programming. I also had take ICT project Management course. In this subject, I had understood the genesis of project management and it’s important to improving the success of information technology project. Besides this, I had learn how to use project management tools to manage ICT project and apply project management concepts by working on a group project.

Mobile Content Challenge




Last monday, our course had join the workshop at Novotel Hotel. The workshop is talk about the Mobile Content Challenge.
hi, this is my first create blog, welcome u all to my blog!!!!