
Kean Ho ChewZORALab Enterprise · Software
Kean Ho Chew
Bachelor of Mechatronics Engineering
About
23
Publications
34,650
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
8
Citations
Citations since 2017
Introduction
Hi there! I'm a multi-role technical individual contributor passionate about algorithms and software approach for both personal and commercial interests. I love end-to-end architectures approach and all the down to hardware and all the way up to interfacing with end-user (human and robots). Feel free to contact me for collaborations!
Additional affiliations
October 2012 - January 2015
Position
- Embedded Software Developer
Description
- Responsible for developing C-language I/O drivers on Linux kernel and upstreaming efforts. Dealt with SD+SDIO, HSUART, I2C, I2S, CAN Network, EFI Bootloader, Linux OS from scratch, Grub2, SMBus both hardware and software approaches. >10 peers rewards throughout the tenure.
Education
March 2008 - December 2012
Publications
Publications (23)
Publishing research paper across the Internet is getting easier comparing to 20 years ago. There are many open platform publishers such as ResearchGate, Academia.edu, IEEE Spectrum, etc. to choose from. However, each publishers has its own research paper format. As for open platform publishers, there are none. Hence, there is a problem in choosing...
While IT industry bloomed and evolved from time to time especially in year 2022 where Covid19 pandemic has begun recovering from its severe economic effects, there is a need to revisit all available business and revenue models to cope with such big changes. There were too many massive changes to almost all surviving organizations such as but not li...
Developing software since year 2005 was as easy and seamless as using a free pricing version control service provider such as but not limited to Bitbucket, GitHub, and GitLab. These service providers serve the global market easily by facilitating all-in-one facilities from development to product distribution of both source codes and compiled softwa...
Working on unit testing software product in modern programming languages is getting more cumbersome as the software product is getting incrementally complex in a very rapid and demanding pace. Since year 2019, research efforts had been done to effectively deploy large scale testing specifically for Go Programming Language. While the unit-testing al...
The development of AI has reached a level of sophistication where it can generate new content based on internalized datasets, including both text and images, across different AI products. As of 2023, AI assistant is being used for testing and path-finding purposes and has garnered significant attention from various industries worldwide. At ZORALab,...
Post-Traumatic Stress Disorder, better known as PTSD, is on the rise where every 60% of men or 50% of women surveyed by United States Veterans Affairs experienced at least 1 trauma in their lives where some takes months while some takes years to recover[1][2]. Due to various environmental changes such as economy and social pressure over time, PTSD,...
On April 13, 2022, the High Court of Johor Bahru Malaysia overturned Magistrate Court of Johor Bahru acquittal decision regarding Sam Ke Ting alleged reckless driving and sentenced her to 6 years imprisonment and a MYR6000 fines. For her case, she allegedly killed 8 minors on Jalan Lingkaran Dalam highway in Johor Bahru back 2017. The judgment made...
On April 13, 2022, the High Court of Johor Bahru Malaysia overturned Magistrate Court of Johor Bahru acquittal decision regarding Sam Ke Ting reckless driving and sentenced her to 6 years imprisonment and a MYR6000 fines. For her case, she killed 8 minors on Jalan Lingkaran Dalam highway in Johor Bahru back 2017. The judgment made by Judge Datuk Ab...
Energy demands are increasing in the 21st Century where digital devices like Internet connected devices, servers, and digital services are growing at exponential rate. Given the technological innovation transitioning heavy machinery such as but not limited to gasoline cars into electricity cars, we, as human being, had developed an unprecedented re...
Image user interface is a commonly used component in web development for displaying pictorial and illustrative data. However, due to its simplicity, abstracting the component’s structural design for building a reusable, continuously improved capable user interface module can be carelessly implemented. Hence, there is a need to carefully analyze exi...
Navigation sidebar user interface is a commonly used component in web page development for helping users navigate the complex website. However, abstracting its structural design to build a reusable, continuously improved capable user interface module can be notoriously complex primarily due to its massive design variances. Hence, there is a need to...
Deploying a Debian operating system into the Internet as a service can be daunting at first since it can be compromised into a backdoor access point. Afterall, any server that exposes itself to the Internet is constantly under attack for intrusion and compromisation. Hence, the effort of hardening Debian operating system security is essential befor...
Basic git cheat sheet for newcomers to software programming world. The goal is to help them contribute to an existing Git repository without already knowing repository maintenance.
In mathematics and computer science, for a given real number, there are situations where we need to perform base number conversion. Floating point numbers are known for their very large and very small number representations such as beyond CPU 64-bit integer supporting range at the expense of loosely controlled accuracy. In Go, floating-point number...
Testing in Go is reasonably easy compared to all other programming languages due to its out of the box tools availability and robustness. Moreover, there are many tutorials made available for beginners to learn and practice.
When at scaled, such as growing beyond 1000 test cases, the existing test approaches introduced by the tutorials become too...
Dealing cryptography requires the full scope of software security understanding even though cryptography is only one part of it. Many guides and tutorials on the internet only shows how to programmatically interface with a particular cryptography library but did not discuss the reasoning behind every actions and objectives. Without an in-depth unde...
Software testing tools are available in the market. However, they are very specific to their software domains such as programming languages. That made the tools not portable and very difficult to use across different software domains. Hence, developing software products under those software domains has a risk of missing quality assurance via softwa...
Access management using password is a conventional and traditional method for implementing an identity and access management system. Without detailed research related to its security vulnerabilities, however, a novice system developer can accidentally self-invent a system with common vulnerabilities, such using the wrong hashing algorithm. This pap...
HTTP session has been long being used as a method to store a requester's state in a stateless web application. In recent years, json web token (JWT) emerges with its promising claims to improve the user authentication implementation across the application development despite numerous claims that JWT is not suitable for replacing HTTP session. In th...
Media licenses are the licenses for redistributing media from the owner to any targeted reader or consumer. The media can be images, videos, audio, musics, writing, arts etc. This paper studies a number factors to determine the most suitable licenses before applying the licenses onto the media.
This paper studied a number of licenses, such as Pub...