Multimedia           University

     (436821-T)

(Cyberjaya – Melaka)

 

 

|   Personal MMU URL   |    Personal URL   |   Publication URL   |    Teaching URL   |    Schedule   |   Survey Study   |

 


Part  A :   Introduction

 

[ Section A.I ]   IPs (Intellectual Properties) :

Copyright (Literary, Musical, Artistic Works, Photograph, Film, Sound Recording, Broadcasting, Architectural Plan, Computer Program), Patent, Utility Innovation (also called Utility Model, Innovation Patent, Petty Patent, Minor Patent, Small Patent in various countries, and Gebrauchsmuster in German and Austria), Industrial Design (also called Design Patent in US), Layout-Design of Integrated Circuits, Geographical Indication, Trade Mark (also called Trademark and Service Mark), Well-Known Mark, Collective Mark, Trade Dress, Confidential Information (also called Trade Secret), Trade Name, Domain Name, etc.

 

 

[ Section A.II ]   Publications (Copyrights of Literary Works) :

Books, Articles, Manuscripts, Correspondence, Surveys, How-To, Proceedings (Conference, Symposium, Workshop), Letters, Journals, Transactions, Theses, Technical Reports, etc.

 


N.B.:   Types of Paper Status

(a) Unpublished

(b) New submission

(c) Resubmission

(d) Revision (1st, 2nd, 3rd, etc.)

(e) Acceptance

(f) Publication

(g) Rejection

(h) Redirection to other editorial office for publication upon improvement, rename, etc.

 

 


Part  B :   IPs (Intellectual Properties)

 

[ Section B.I ]   Copyrights of Computer Programs :

 

N.B.: *1 Author due to idea conception; *2 Author due to analytic evaluation; *3 Author due to reduction to practice;

*4 Author due to novel supervisory advice; *5 Author due to nominal supervision; *6 Author due to fund raising.

 

[1] Kok-Wah Lee*1, *2, *3, *6, “First Key Input Method version 1.1”, Computer Program, Bukit Beruang, Melaka, Malaysia, 05 November 2006.

 

[2] Kok-Wah Lee*1, *2, *3, *6, Alan W.C. Tan*3, “Second Key Input Method version 1.0”, Computer Program, Bukit Beruang, Melaka, Malaysia, 19 November 2006.

 

[3] Kok-Wah Lee*1, *2, *3, *6, Alan W.C. Tan*3, “MobileECC version 1.2”, Computer Program, Bukit Beruang, Melaka, Malaysia, 24 November 2006.

 

[4] Kok-Wah Lee*1, *2, *3, *6, “Account Amount Estimator of Multihash Key Using Key Strengthening Based on Time Response”, Computer Program, Bukit Beruang, Melaka, Malaysia, January 2007.

 

 

[ Section B.II ]   Industrial Designs :

 

[1]

 

 

[ Section B.III ]   Utility Innovations & Patents (Filed Applications, Published Applications, Granted Inventions) :

 

[1] Kok-Wah Lee*1, *2, *3, *6, “An Improved Dual In-Line (DIL) Switch for Securing Data Communication and Storage”, Utility Innovation (UI) Application [No.: UI 20070733], Converted to Patent Application [PI 20070733], Intellectual Property Corporation of Malaysia (MyIPO), Kuala Lumpur, Malaysia, Filing Date: 11 May 2007, Assignee: LEE Kok Wah.

 

[2] Kok-Wah Lee*1, *2, *3, *6, “An Improved Dual In-Line (DIL) Switch for Securing Data Communication and Storage”, PCT Patent Filing [No.: ?], WIPO (World Intellectual Property Organization), Geneva, Switzerland, Filing Date: 08 May 2008, Assignee: LEE Kok Wah.

 

[3] Kok-Wah Lee*1, *2, *3, *6, “An Improved Dual In-Line (DIL) Switch for Securing Data Communication and Storage”, Patent Application [No. ?], TIPO (The Intellectual Property Office of Ministry of Economic Affairs, R.O.C.) (中華民國經濟部智慧財產局), Taipei, Taiwan (ROC), Filing Date: 09 May 2008, Assignee: LEE Kok Wah (李國華).

 

[4]

 

 

[ Section B.IV ]   Trade Marks, Domain Names :

 

[1]

 

 

[ Section B.V ]   Layout-Design of Integrated Circuits :

 

[1] Kok-Wah Lee*1, *2, *3, *6, “An nPST Dual In-Line Package Switch (DIL/DIP Switch) Linking All the Little Actuators into a Single Actuator”, Layout-Design of Integrated Circuit, Malaysia, 19 September 2005.

 

[2] Kok-Wah Lee*1, *2, *3, *6, “An Ethernet Cable RJ45 Switch for Securing Data Communication and Storage Using Conventional Dual In-Line Package Switch (DIL/DIP switch)”, Layout-Design of Integrated Circuit, Malaysia, 29 November 2006.

 

[3] Kok-Wah Lee*1, *2, *3, *6, “An (nPST + Reverse mPST) Dual In-Line Package Switch (DIL/DIP Switch) with Two Bigger Actuators Linking Two Groups of Switches Activated Oppositely”, Layout-Design of Integrated Circuit, Malaysia, 19 October 2007.

 

[4] Kok-Wah Lee*1, *2, *3, *6, “An Ethernet Cable RJ45 Switch for Securing Data Communication and Storage Using Grayhill 78H02T (Double 4PST DIP Switch)”, Layout-Design of Integrated Circuit, Malaysia, 11 December 2007.

 

[5] Kok-Wah Lee*1, *2, *3, *6, “An Ethernet Cable RJ45 Switch for Securing Data Communication and Storage Using Grayhill 78H01T (Single 4PST DIP Switch)”, Layout-Design of Integrated Circuit, Malaysia, 11 December 2007.

 

[6] Kok-Wah Lee*1, *2, *3, *6, “An Ethernet Cable RJ45 Switch for Securing Data Communication and Storage Using Grayhill 78F01T (Single 2PST DIP Switch)”, Layout-Design of Integrated Circuit, Malaysia, 11 December 2007.

 

[7] Kok-Wah Lee*1, *2, *3, *6, “A Telephone Cable RJ11 Switch for Securing Data Communication and Storage Using Grayhill 78H01T (Single 4PST DIP Switch)”, Layout-Design of Integrated Circuit, Malaysia, 02 June 2008.

 

[8] Kok-Wah Lee*1, *2, *3, *6, “A Telephone Cable RJ11 Switch for Securing Data Communication and Storage Using Grayhill 78F01T (Single 2PST DIP Switch)”, Layout-Design of Integrated Circuit, Malaysia, 02 June 2008.

 

[9] Kok-Wah Lee*1, *2, *3, *6, “A USB Switch for Securing Data Communication and Storage Using Grayhill 78H01T (Single 4PST DIP Switch)”, Layout-Design of Integrated Circuit, Malaysia, 02 June 2008.

 

[10] Kok-Wah Lee*1, *2, *3, *6, “A USB Switch for Securing Data Communication and Storage Using Grayhill 78F01T (Single 2PST DIP Switch)”, Layout-Design of Integrated Circuit, Malaysia, 02 June 2008.

 

[11]

 


Part  C :   Publications (Copyrights of Literary Works)

 

N.B.: *1 Author due to idea conception; *2 Author due to analytic evaluation; *3 Author due to reduction to practice;

*4 Author due to novel supervisory advice; *5 Author due to nominal supervision; *6 Author due to fund raising.

 

[ Section C.I ]   Books, Technical Reports, Theses :

 

[1] Kok-Wah Lee*2, *3, *6, “ECG Signals Classification Using Neural Network”, Bachelor Degree Thesis in Electrical Engineering, B.Eng.(Hons.)(Electrical)(Mal.), (First Draft in Jan. 1999).

 

[2] Kok-Wah Lee*1, *2, *3, *6, “Artificial Neural Network Based Byzantine Agreement Protocol”, Masters Degree Thesis in Computer Communications, M.Eng.Sc.(MMU), (First Draft on 25 Oct. 2002, Revised Draft on 03 Jun. 2003). [Errata Sheet as at 05 Feb. 2007]

 

[3]

 

 

[ Section C.II ]   Proceedings (Conferences, Symposiums, Workshops, etc.) :

 

[1] K.W. Lee*1, *2, *3, *6 and H.T. Ewe*5, “Artificial Neural Networks Based Algorithm for Byzantine Generals Problem”, Proceedings of the MMU International Symposium on Information and Communications Technologies 2001 (MMU-M2USIC 2001), Petaling Jaya, Selangor, Malaysia, pp. TS 1.4(1-4), 16-17 October 2001. Publisher: Multimedia University (MMU), Cyberjaya & Melaka, Malaysia. [Download since 2001]

 

[2] K.W. Lee*1, *2, *3, *6 and H.T. Ewe*5, "Artificial Neural Network Based Byzantine Agreement Protocol", Proceedings of the 6th IASTED International Conference on Artificial Intelligence and Soft Computing (IASTED-ASC 2002), Banff, Alberta, Canada, pp. 368-373, 17-19 July 2002. ISBN: 0-88986-346-6, ISSN: 1482-7913, Publisher: ACTA Press, Anaheim (CA, USA), Calgary (Alberta, Canada), & Zurich (Switzerland). [Download since 2002]

 

[3] K.W. Lee*1, *2, *3, *6 and H.T. Ewe*5, "Faulty Node Detection in the Tripartite ANN based BAP", Proceedings of the MMU International Symposium on Information and Communications Technologies 2003 (MMU-M2USIC 2003), Petaling Jaya, Selangor, Malaysia, TS 3A-2, pp. 45-48, 2-3 October 2003. Publisher: Multimedia University (MMU), Cyberjaya & Melaka, Malaysia. [Download since 2003]

 

[4] K.W. Lee*1, *2, *3, *6, “Semantic Error Occurrences in the Multimedia Communications”, Proceedings of the IASTED International Conference on Education and Technology 2005 (IASTED-ICET 2005), Calgary, Alberta, Canada, pp. 227-231, 4-6 July 2005. ISBN: 0-88986-487-X, Publisher: ACTA Press, Anaheim (CA, USA), Calgary (Alberta, Canada), & Zurich (Switzerland). [Download since 17 Mar. 2005]

 

[5] K.W. Lee*1, *2, *4, C.E. Teh*3, *6, Y.L. Tan*3, *6, “Decrypting English Text Using Enhanced Frequency Analysis”, National Seminar on Science, Technology and Social Sciences 2006 (UiTM-STSS 2006), Swiss Garden Resort & Spa, Kuantan, Pahang, Malaysia, pp. 1-7, 30-31 May 2006. Publisher: Universiti Teknologi Mara (UiTM) (Pahang Campus), Jengka, Pahang, Malaysia. [Download since 24 Jan. 2007]

 

[6] Lee Kok Wah*1, *2, *3, *6, “Byzantine Agreement for Electronic Commerce", Proceedings of the Regional Computer Science Postgraduate Conference 2006 (USM-ReCSPC06), Ferringhi Beach Hotel, Penang, Malaysia, pp. 114-119, 27-28 June 2006. ISBN: 983-3391-81-8, Publisher: School of Computer Sciences, Universiti Sains Malaysia (USM), Penang, Malaysia. [Download since 24 Jan. 2007]

 

[7] Kok-Wah Lee*1, *2, *3, *6, Hong-Tat Ewe*5, “Coinware for Multilingual Passphrase Generation and Its Application for Chinese Language Password", Proceedings of the 2006 International Conference on Computational Intelligence and Security (CIS 2006), Guangzhou, Guangdong, China, pp. 1511-1514 (Part 2), 3-6 November 2006. ISBN: 1-4244-0604-8, Publisher: IEEE, Piscataway, NJ, USA. [Download from IEEE Xplore Database]

 

[8] Kok-Wah Lee*1, *2, *3, *6, Hong-Tat Ewe*5, “Speeding up the Byzantine Agreement Protocol with Artificial Neural Network (BAP-ANN) Using Modified Backpropagation Learning Algorithm (BPLA)", Proceedings of the Malaysia-Japan International Symposium on Advanced Technology 2007 (MJISAT 2007), Kuala Lumpur, Malaysia, Technical Session T5-5: AI Applications III, pp. 65 & 169, 12-15 November 2007.

 

[9] Kok-Wah Lee*1, *2, *3, *6, Hong-Tat Ewe*5, “Passphrase with Semantic Noises and a Proof on Its Higher Information Rate”, Proceedings of the International Conference on Computational Intelligence and Security Workshops (CISW 2007), Harbin, Heilongjiang, China, pp. 652-655, 15-19 December, 2007. ISBN: 978-0-7695-3073-4, Publisher: IEEE, Piscataway, NJ, USA. [Download from IEEE Xplore Database]

 

[10] Kok-Wah Lee*1, *2, *3, *6, Gita Radhakrishna*2, *3, Lake-Tee Khaw*1, *2, “The Proof of Copyright Ownership Using Digital Timestamp in Malaysia”, Proceedings of the MMU International Symposium on Information and Communications Technologies 2007 (MMU-M2USIC 2007), Petaling Jaya, Selangor, Malaysia, Technical Session TS3A: Information Security & Cryptography, file (f.) TS3A-1.pdf, pp. 20 & 37, 19-20 November 2007. ISBN: 983-431600-3, Publisher: Multimedia University, Cyberjaya (Selangor) & Bukit Beruang (Melaka), Malaysia.

 

[11]

 

 

[ Section C.III ]   Correspondence, Magazines, Letters, Surveys, How-To, Journals, Transactions :

 

[1] Kok-Wah Lee*1, *2, *3, *6, Hong-Tat Ewe*5, “Performance Study of Byzantine Agreement Protocol with Artificial Neural Network", Information Sciences (Elsevier-INS), 177(21), pp. 4785-4798, 01 November 2007. ISSN: 0020-0255, Publisher: Elsevier Science, New York, NY, USA. [Download from ScienceDirect Database of Elsevier Science]

 

[2] Kok-Wah Lee*1, *2, *3, *6, Hong-Tat Ewe*5, “Multiple Hashes of Single Key with Passcode for Multiple Accounts", Journal of Zhejiang University Science A (JZUS-A), 8(8), pp. 1183-1190, 26 July 2007. ISSN: 1673-565X, Publisher: Zhejiang University, Hangzhou, China. [Download from JZUS Database or SpringerLink Database]

 

[3]

 

 


Part  D :   Main References

 

[ Section D.I ]   Types of R&D (Research and Development) :

 

[1] Scientific Research (Fundamental Research)

[2] Technological Development (Applied Research)

[3] Product/Process Development (Design End Engineering)

 

 

[ Section D.II ]   Reference Papers for Scientific and Technological Research, Development, Study, Survey, etc. :


[1] Whitfield Diffie and Martin E. Hellman, "
New Directions in Cryptography", IEEE Transactions on Information Theory, 22(6), pp. 644-654, November 1976. ISSN: 0018-9448, Publisher: IEEE, Piscataway, NJ, USA. [Download]

 

[2] Leslie Lamport, Robert Shostak and Marshall Pease, "The Byzantine Generals Problem", ACM Transactions on Programming Languages and Systems (TOPLAS), 4(3), pp. 382-401, July 1982. ISSN: 0164-0925, Publisher: ACM Press, New York, NY, USA. [Download]

 

[3] Wang S.C. and Kao S.H., “A New Approach for Byzantine Agreement”, Proceedings of the 15th International Conference on Information Networking 2001, pp. 518-524, 31 January - 02 February 2001, Beppu City, Oita, Japan. ISBN: 0-7695-0951-7, Publisher: IEEE, Piscataway, NJ, USA. [Download]

 

[4] Leslie Lamport, "The Temporal Logic of Actions", ACM Transactions on Programming Languages and Systems (TOPLAS), 16(3), pp. 872-923, May 1994. ISSN: 0164-0925, Publisher: ACM Press, New York, NY, USA. [Download]

 

[5] Yoram Moses, Danny Dolev and Joseph Y. Halpern, “Cheating Husbands and Other Stories (Preliminary Version): A Case Study of Knowledge, Action, and Communication”, Proceedings of the 4th Annual ACM Symposium on Principles of Distributed Computing (PODC ’85), Minaki, Ontario, Canada, pp. 215-223, 1985. ISBN: 0-89791-168-7, Publisher: ACM Press, New York, NY, USA. [Download]

 

[6] Leslie Lamport, “The Part-Time Parliament”, ACM Transactions on Computer Systems (TOCS), 16(2), pp. 133-169, May 1998. Publisher: ACM Press, New York, NY, USA. [Download]

 

[7] Ross J. Anderson, “The Eternity Service”, Proceedings of the 1st International Conference on the Theory and Applications of Cryptology (Pragocrypt ’96), Prague, Czech, September 1996. Publisher: Czech Technical University (CTU) Publishing House, Prague, Czech. [Download]

 

[8]

 


|   Personal MMU URL   |    Personal URL   |   Publication URL   |    Teaching URL   |    Schedule   |   Survey Study   |

Veni Vedi Vinci  :  I come I see I conquer.

Email here :   kwlee@mmu.edu.my

Updated on 10 June 2008