Multimedia
University
(436821-T)
(Cyberjaya – Melaka)
| Personal MMU URL | Personal URL | Publication URL | Teaching URL | Schedule | Survey Study |
Part A : Introduction
[ Section
A.I ] IPs (Intellectual Properties) :
Copyright (Literary, Musical, Artistic Works, Photograph, Film, Sound Recording, Broadcasting, Architectural Plan, Computer Program), Patent, Utility Innovation (also called Utility Model, Innovation Patent, Petty Patent, Minor Patent, Small Patent in various countries, and Gebrauchsmuster in German and Austria), Industrial Design (also called Design Patent in US), Layout-Design of Integrated Circuits, Geographical Indication, Trade Mark (also called Trademark and Service Mark), Well-Known Mark, Collective Mark, Trade Dress, Confidential Information (also called Trade Secret), Trade Name, Domain Name, etc.
[ Section
A.II ] Publications (Copyrights of
Literary Works) :
Books, Articles, Manuscripts, Correspondence, Surveys, How-To, Proceedings (Conference, Symposium, Workshop), Letters, Journals, Transactions, Theses, Technical Reports, etc.
N.B.: Types of Paper Status
(a)
Unpublished
(b)
New submission
(c)
Resubmission
(d)
Revision (1st, 2nd, 3rd, etc.)
(e)
Acceptance
(f)
Publication
(g)
Rejection
(h)
Redirection to other editorial office for publication upon improvement, rename,
etc.
Part B : IPs (Intellectual Properties)
[ Section
B.I ] Copyrights of Computer Programs :
N.B.:
*1 Author due to idea conception; *2 Author due to
analytic evaluation; *3 Author due to reduction to practice;
*4 Author due to novel supervisory advice; *5
Author due to nominal supervision; *6 Author due to fund raising.
[1]
Kok-Wah Lee*1, *2, *3, *6, “First Key Input Method version
1.1”, Computer Program, Bukit Beruang, Melaka, Malaysia, 05 November
2006.
[2]
Kok-Wah Lee*1, *2, *3, *6, Alan W.C. Tan*3, “Second
Key Input Method version 1.0”, Computer Program, Bukit Beruang, Melaka,
Malaysia, 19 November 2006.
[3]
Kok-Wah Lee*1, *2, *3, *6, Alan W.C. Tan*3,
“MobileECC version 1.2”, Computer Program, Bukit Beruang, Melaka,
Malaysia, 24 November 2006.
[4]
Kok-Wah Lee*1, *2, *3, *6, “Account Amount Estimator of
Multihash Key Using Key Strengthening Based on Time Response”, Computer
Program, Bukit Beruang, Melaka, Malaysia, January 2007.
[ Section
B.II ] Industrial Designs :
[1]
[ Section
B.III ] Utility Innovations &
Patents (Filed Applications, Published Applications, Granted Inventions) :
[1]
Kok-Wah Lee*1, *2, *3, *6, “An Improved Dual In-Line (DIL)
Switch for Securing Data Communication and Storage”, Utility Innovation
(UI) Application [No.: UI 20070733], Converted to Patent Application [PI
20070733], Intellectual Property Corporation of
[2]
Kok-Wah Lee*1, *2, *3, *6, “An Improved Dual In-Line (DIL)
Switch for Securing Data Communication and Storage”, PCT Patent Filing [No.:
?], WIPO (World Intellectual Property
Organization),
[3]
Kok-Wah Lee*1, *2, *3, *6, “An Improved Dual In-Line (DIL)
Switch for Securing Data Communication and Storage”, Patent Application [No.
?], TIPO (The Intellectual Property Office of Ministry of Economic
Affairs, R.O.C.)
(中華民國經濟部智慧財產局),
[4]
[ Section
B.IV ] Trade Marks, Domain Names :
[1]
[ Section
B.V ] Layout-Design of Integrated
Circuits :
[1]
Kok-Wah Lee*1, *2, *3, *6, “An nPST Dual In-Line Package
Switch (DIL/DIP Switch) Linking All the Little Actuators into a Single Actuator”, Layout-Design of
Integrated Circuit, Malaysia, 19 September 2005.
[2]
Kok-Wah Lee*1, *2, *3, *6, “An Ethernet Cable RJ45 Switch for
Securing Data Communication and Storage Using Conventional Dual In-Line Package
Switch (DIL/DIP switch)”, Layout-Design of
[3]
Kok-Wah Lee*1, *2, *3, *6, “An (nPST + Reverse mPST) Dual
In-Line Package Switch (DIL/DIP Switch) with Two Bigger Actuators Linking Two
Groups of Switches Activated Oppositely”, Layout-Design of
[4]
Kok-Wah Lee*1, *2, *3, *6, “An Ethernet Cable RJ45 Switch for Securing
Data Communication and Storage Using Grayhill 78H02T (Double 4PST DIP Switch)”, Layout-Design of
[5]
Kok-Wah Lee*1, *2, *3, *6, “An Ethernet Cable RJ45 Switch for
Securing Data Communication and Storage Using Grayhill 78H01T (Single 4PST DIP
Switch)”,
Layout-Design of
[6]
Kok-Wah Lee*1, *2, *3, *6, “An Ethernet Cable RJ45 Switch for
Securing Data Communication and Storage Using Grayhill 78F01T (Single 2PST DIP Switch)”, Layout-Design of
[7]
Kok-Wah Lee*1, *2, *3, *6, “A Telephone Cable RJ11 Switch for
Securing Data Communication and Storage Using Grayhill 78H01T (Single 4PST DIP
Switch)”,
Layout-Design of
[8]
Kok-Wah Lee*1, *2, *3, *6, “A Telephone Cable RJ11 Switch for
Securing Data Communication and Storage Using Grayhill 78F01T (Single 2PST DIP
Switch)”,
Layout-Design of
[9]
Kok-Wah Lee*1, *2, *3, *6, “A USB Switch for Securing Data
Communication and Storage Using Grayhill 78H01T (Single 4PST DIP Switch)”, Layout-Design of
[10]
Kok-Wah Lee*1, *2, *3, *6, “A USB Switch for Securing Data
Communication and Storage Using Grayhill 78F01T (Single 2PST DIP Switch)”, Layout-Design of
[11]
Part C : Publications (Copyrights of Literary Works)
N.B.:
*1 Author due to idea conception; *2 Author due to
analytic evaluation; *3 Author due to reduction to practice;
*4 Author due to novel supervisory advice; *5
Author due to nominal supervision; *6 Author due to fund raising.
[ Section
C.I ] Books, Technical Reports, Theses
:
[1]
Kok-Wah Lee*2, *3, *6, “ECG Signals Classification Using Neural
Network”,
Bachelor Degree Thesis in Electrical Engineering,
B.Eng.(Hons.)(Electrical)(Mal.), (First Draft in Jan. 1999).
[2]
Kok-Wah Lee*1, *2, *3, *6, “Artificial Neural Network Based
Byzantine Agreement Protocol”, Masters Degree Thesis in Computer Communications,
M.Eng.Sc.(MMU), (First Draft on 25 Oct. 2002, Revised Draft on 03 Jun. 2003). [Errata Sheet as at 05 Feb. 2007]
[3]
[ Section
C.II ] Proceedings (Conferences,
Symposiums, Workshops, etc.) :
[1]
K.W. Lee*1, *2, *3, *6 and H.T. Ewe*5, “Artificial Neural
Networks Based Algorithm for Byzantine Generals Problem”, Proceedings of the
MMU International Symposium on Information and Communications Technologies 2001
(MMU-M2USIC 2001), Petaling Jaya,
[2]
K.W. Lee*1, *2, *3, *6 and H.T. Ewe*5, "Artificial Neural
Network Based Byzantine Agreement Protocol", Proceedings of the 6th IASTED International Conference
on Artificial Intelligence and Soft Computing (IASTED-ASC 2002), Banff,
Alberta, Canada, pp. 368-373, 17-19 July 2002. ISBN: 0-88986-346-6, ISSN:
1482-7913, Publisher: ACTA Press,
[3]
K.W. Lee*1, *2, *3, *6 and H.T. Ewe*5, "Faulty Node
Detection in the Tripartite ANN based BAP", Proceedings of the MMU International
Symposium on Information and Communications Technologies 2003 (MMU-M2USIC
2003), Petaling Jaya, Selangor, Malaysia, TS 3A-2, pp. 45-48, 2-3 October 2003.
Publisher:
[4]
K.W. Lee*1, *2, *3, *6, “Semantic Error Occurrences in the
Multimedia Communications”, Proceedings of the IASTED International Conference on Education
and Technology 2005 (IASTED-ICET 2005), Calgary, Alberta, Canada, pp. 227-231,
4-6 July 2005. ISBN: 0-88986-487-X, Publisher: ACTA Press,
[5]
K.W. Lee*1, *2, *4, C.E. Teh*3, *6, Y.L. Tan*3, *6,
“Decrypting English Text Using Enhanced Frequency Analysis”, National Seminar on
Science, Technology and Social Sciences 2006 (UiTM-STSS 2006), Swiss Garden
Resort & Spa, Kuantan, Pahang, Malaysia, pp. 1-7, 30-31 May 2006.
Publisher: Universiti Teknologi Mara (UiTM) (Pahang Campus), Jengka,
[6]
Lee Kok Wah*1, *2, *3, *6, “Byzantine Agreement for Electronic
Commerce",
Proceedings of the Regional Computer Science Postgraduate Conference 2006 (USM-ReCSPC06),
Ferringhi Beach Hotel, Penang, Malaysia, pp. 114-119, 27-28 June 2006. ISBN:
983-3391-81-8, Publisher: School of Computer Sciences, Universiti Sains
[7]
Kok-Wah Lee*1, *2, *3, *6, Hong-Tat Ewe*5, “Coinware for
Multilingual Passphrase Generation and Its Application for Chinese Language
Password",
Proceedings of the 2006 International Conference on Computational Intelligence
and Security (CIS 2006), Guangzhou, Guangdong, China, pp. 1511-1514 (Part 2),
3-6 November 2006. ISBN: 1-4244-0604-8, Publisher: IEEE,
[8]
Kok-Wah Lee*1, *2, *3, *6, Hong-Tat Ewe*5, “Speeding up the
Byzantine Agreement Protocol with Artificial Neural Network (BAP-ANN) Using
Modified Backpropagation Learning Algorithm (BPLA)", Proceedings of the
Malaysia-Japan International Symposium on Advanced Technology 2007 (MJISAT
2007), Kuala Lumpur, Malaysia, Technical Session T5-5: AI Applications III, pp.
65 & 169, 12-15 November 2007.
[9]
Kok-Wah Lee*1, *2, *3, *6, Hong-Tat Ewe*5, “Passphrase with Semantic Noises and a Proof
on Its Higher Information Rate”, Proceedings of the International Conference on Computational
Intelligence and Security Workshops (CISW 2007),
[10]
Kok-Wah Lee*1, *2, *3, *6, Gita Radhakrishna*2, *3, Lake-Tee
Khaw*1, *2, “The Proof of Copyright Ownership Using Digital
Timestamp in
[11]
[ Section
C.III ] Correspondence, Magazines,
Letters, Surveys, How-To, Journals, Transactions :
[1]
Kok-Wah Lee*1, *2, *3, *6, Hong-Tat Ewe*5, “Performance Study
of Byzantine Agreement Protocol with Artificial Neural Network", Information Sciences
(Elsevier-INS), 177(21), pp. 4785-4798, 01 November 2007. ISSN: 0020-0255,
Publisher:
[2]
Kok-Wah Lee*1, *2, *3, *6, Hong-Tat Ewe*5, “Multiple Hashes
of Single Key with Passcode for Multiple Accounts", Journal of
[3]
Part D : Main References
[ Section
D.I ] Types of R&D (Research and
Development) :
[1] Scientific Research (Fundamental Research)
[2] Technological Development (Applied Research)
[3] Product/Process Development (Design End Engineering)
[ Section
D.II ] Reference Papers for Scientific
and Technological Research, Development, Study, Survey, etc. :
[1] Whitfield Diffie and Martin E.
Hellman, "New
Directions in Cryptography", IEEE Transactions on Information Theory, 22(6), pp. 644-654,
November 1976. ISSN: 0018-9448, Publisher: IEEE,
[2]
Leslie Lamport, Robert Shostak and Marshall Pease, "The Byzantine Generals Problem", ACM Transactions on
Programming Languages and Systems (TOPLAS), 4(3), pp. 382-401, July 1982. ISSN:
0164-0925, Publisher: ACM Press,
[3]
Wang S.C. and Kao S.H., “A
New Approach for Byzantine Agreement”, Proceedings of the 15th International
Conference on Information Networking 2001, pp. 518-524, 31 January - 02
February 2001, Beppu City, Oita, Japan. ISBN: 0-7695-0951-7, Publisher: IEEE,
[4]
Leslie Lamport, "The
Temporal Logic of Actions", ACM Transactions on Programming Languages and Systems (TOPLAS),
16(3), pp. 872-923, May 1994. ISSN: 0164-0925, Publisher: ACM Press,
[5]
Yoram Moses, Danny Dolev and Joseph Y. Halpern, “Cheating Husbands and Other Stories
(Preliminary Version): A Case Study of Knowledge, Action, and Communication”, Proceedings of the
4th Annual ACM Symposium on Principles of Distributed Computing (PODC
’85), Minaki, Ontario, Canada, pp. 215-223, 1985. ISBN: 0-89791-168-7,
Publisher: ACM Press,
[6]
Leslie Lamport, “The
Part-Time Parliament”, ACM Transactions on Computer Systems (TOCS), 16(2), pp. 133-169,
May 1998. Publisher: ACM Press,
[7]
Ross J. Anderson, “The
Eternity Service”,
Proceedings of the 1st International Conference on the Theory and Applications
of Cryptology (Pragocrypt ’96),
[8]
| Personal MMU URL | Personal URL | Publication URL | Teaching URL | Schedule | Survey Study |
Veni Vedi Vinci : I come I see I conquer.
Email here : kwlee@mmu.edu.my
Updated on 10 June 2008