International Journal of Digital Enterprise Technology最新文献

筛选
英文 中文
A comparison of halal inspection process between federal and state halal certification body in Malaysia 马来西亚联邦和州清真认证机构清真检验过程的比较
International Journal of Digital Enterprise Technology Pub Date : 2019-10-28 DOI: 10.1504/ijdet.2019.10025006
Mohd Zabiedy Mohd Sulaiman, Nurulhuda Noordin, N. Noor, A. Suhaimi, W. Isa
{"title":"A comparison of halal inspection process between federal and state halal certification body in Malaysia","authors":"Mohd Zabiedy Mohd Sulaiman, Nurulhuda Noordin, N. Noor, A. Suhaimi, W. Isa","doi":"10.1504/ijdet.2019.10025006","DOIUrl":"https://doi.org/10.1504/ijdet.2019.10025006","url":null,"abstract":"Halal certification is an important system for the award of halal status to product and services to ensure that anything to be certified halal are complying with the Shariah. Halal inspection is the key process that details out the Shariah and failure to do so is detrimental to its compliance. The rising demand of halal products shows a need to have an efficient system for the Muslim community. However, it poses a challenge as the different sects of Muslims may have different halal interpretations and limited resources to perform the inspection. Thus, it is crucial to identify issues among different Halal Certification Bodies. This study aims to investigate the differences in halal inspection practices in Malaysia through interviews with halal certification experts. The findings identify several problems that may influence the halal certification efficiency which will be helpful in the search for a better way to utilise information technology.","PeriodicalId":175346,"journal":{"name":"International Journal of Digital Enterprise Technology","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134265173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Analysing malware log files for internet investigation using Hadoop platform 利用Hadoop平台分析恶意软件日志文件进行网络调查
International Journal of Digital Enterprise Technology Pub Date : 2019-10-28 DOI: 10.1504/ijdet.2019.10025004
Mohd Sharudin Mat Deli, Saiful Adli Ismail, M. Kama, O. Yusop, Azri Azmi
{"title":"Analysing malware log files for internet investigation using Hadoop platform","authors":"Mohd Sharudin Mat Deli, Saiful Adli Ismail, M. Kama, O. Yusop, Azri Azmi","doi":"10.1504/ijdet.2019.10025004","DOIUrl":"https://doi.org/10.1504/ijdet.2019.10025004","url":null,"abstract":"To protect the computer and internet users from exposing themselves towards malware attacks, identifying the attacks through investigating malware log file is an essential step to curb this threat. The log file exposes crucial information in identifying the malware, such as algorithm and functional characteristic, the network interaction between the source and the destination, and type of malware. By nature, the log file size is humongous and requires the investigation process to be executed on faster and stable platform such as big data environment. In this study, Hadoop technology used to process and extract the information from the malware log files that obtains from university's security equipment. The Python program was used for data transformation then analysis it in Hadoop simulation environment. The results of log processing have reduced 50% of the original log file size, while the total execution time would not increase linearly with the size of the data.","PeriodicalId":175346,"journal":{"name":"International Journal of Digital Enterprise Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128837684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative analysis on seed point placement and magnitude-based visual enhancement for streamlines generation 流线生成中种子点放置与基于大小的视觉增强的对比分析
International Journal of Digital Enterprise Technology Pub Date : 2019-10-28 DOI: 10.1504/ijdet.2019.10025008
Yusman Azimi Yusoff, F. Mohamed, M. Sunar, A. Selamat, N. Jaafar
{"title":"Comparative analysis on seed point placement and magnitude-based visual enhancement for streamlines generation","authors":"Yusman Azimi Yusoff, F. Mohamed, M. Sunar, A. Selamat, N. Jaafar","doi":"10.1504/ijdet.2019.10025008","DOIUrl":"https://doi.org/10.1504/ijdet.2019.10025008","url":null,"abstract":"This paper presents an improved seed point placement to locate initial seed points based on magnitude value. The vector field is separated in to grid to ensure the uniformity in generating streamlines and broader streamlines coverage, thus reducing poor visualisation information especially near to visualisation boundary. An evaluation using mean square error is conducted to evaluate the improvement in term of streamlines placement uniformity. Result shows that proposed method able to come out with lower mean square error value compared to evenly-spaced in across different separation distance, resulting better streamlines control to produce uniform visualisation result. Finally, the proposed method can be improved in many aspects to come out with a better visualisation result in two and possibly three dimension flow visualisation.","PeriodicalId":175346,"journal":{"name":"International Journal of Digital Enterprise Technology","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120953351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sensor network design for smart building 智能建筑传感器网络设计
International Journal of Digital Enterprise Technology Pub Date : 2019-10-28 DOI: 10.1504/ijdet.2019.10025007
Abdenour Kifouche, R. Hamouche, R. Kocik, G. Baudoin
{"title":"Sensor network design for smart building","authors":"Abdenour Kifouche, R. Hamouche, R. Kocik, G. Baudoin","doi":"10.1504/ijdet.2019.10025007","DOIUrl":"https://doi.org/10.1504/ijdet.2019.10025007","url":null,"abstract":"This article has two major contributions. The first one deals with energy efficiency and pollution issues in buildings. Our solution is to develop, deploy and operate a sensor network for building monitoring. Regarding existing solutions, our network is based on generic and modular sensors that can collect several data such as temperature, carbon monoxide, etc. Subsequently, these data are forwarded to a base station that stores it in a database. By providing a human machine interface, these data can be visualised and processed in real time. The second contribution is related to a feedback from the development of our sensor network. We identified challenges related to this development including significant development time, energy constraints, large-scale network, costs, etc. To overcome these challenges, this article proposes also to explore new development methodology based on a model driven approach that reduces costs and efforts and ensures consistency of the development.","PeriodicalId":175346,"journal":{"name":"International Journal of Digital Enterprise Technology","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133155522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of universal remote control of non-smart home appliances for smart home concepts 非智能家电的通用遥控应用为智能家居概念
International Journal of Digital Enterprise Technology Pub Date : 2019-02-21 DOI: 10.1504/IJDET.2019.10019067
Jan Dvorak, O. Krejcar, Lim Kok Cheng
{"title":"Application of universal remote control of non-smart home appliances for smart home concepts","authors":"Jan Dvorak, O. Krejcar, Lim Kok Cheng","doi":"10.1504/IJDET.2019.10019067","DOIUrl":"https://doi.org/10.1504/IJDET.2019.10019067","url":null,"abstract":"The smart homes concept is widely used nowadays, as well as many different standards and technologies that exist which enable to remotely control almost every home appliance. In this paper, we would like to address universal solution of remote control based on available widely used hardware solution which allows to connect not only current appliances from different producers, but also older appliances which support only the handling via a controller on the basis of infrared transfer. Finally, these non-smart home appliances are going to be integrated in whole smart environment and also be as smart as other new appliances. The part of the solution is the interface for the connection of the application to current smart home systems and an intelligent recognition and an automatisation of user's actions with controllers. The result of the implementation is a functional prototype with all required design (PCB) and implementation. User testing also confirms the amount of time saved by using such device instead of original non-smart or not connected smart ones.","PeriodicalId":175346,"journal":{"name":"International Journal of Digital Enterprise Technology","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123247458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Systematic literature review and taxonomy for DDoS attack detection and prediction 系统的文献综述和分类DDoS攻击检测和预测
International Journal of Digital Enterprise Technology Pub Date : 2019-02-21 DOI: 10.1504/IJDET.2019.10019068
Ahmad Riza'ain Yusof, N. Udzir, A. Selamat
{"title":"Systematic literature review and taxonomy for DDoS attack detection and prediction","authors":"Ahmad Riza'ain Yusof, N. Udzir, A. Selamat","doi":"10.1504/IJDET.2019.10019068","DOIUrl":"https://doi.org/10.1504/IJDET.2019.10019068","url":null,"abstract":"Distributed denial of service (DDoS) attack has been significantly discussed in the computer security domain, particularly due to the damaging effects it causes to organisations' assets. However, it confronts the challenge under massive growth of internet user traffic and lightning speed of computer access. In this paper, we present a comprehensive systematic literature review and measurement analysis of the DDoS impact, including: a) DDoS definition; b) types of DDoS attack; c) various types of existing DDoS detecting techniques; d) different kinds of DDoS attack prediction techniques. Furthermore, this paper provides an in-depth analysis the advantages and the drawbacks of existing DDoS detection and prediction technique to assist for both academia and industry researchers towards produce better DDoS detection and prediction mechanism.","PeriodicalId":175346,"journal":{"name":"International Journal of Digital Enterprise Technology","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122960916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
An experiment in blended learning: higher education without lectures 混合式学习的实验:没有讲座的高等教育
International Journal of Digital Enterprise Technology Pub Date : 2019-02-21 DOI: 10.1504/IJDET.2019.10019066
K. Jones, Ravi S. Sharma
{"title":"An experiment in blended learning: higher education without lectures","authors":"K. Jones, Ravi S. Sharma","doi":"10.1504/IJDET.2019.10019066","DOIUrl":"https://doi.org/10.1504/IJDET.2019.10019066","url":null,"abstract":"This paper chronicles a 10-year introduction of blended learning in software engineering at a leading technological university, with a longstanding tradition of technology-enabled teaching and learning, and state-of-the-art infrastructure. Hence, both teachers and students were familiar with the idea of online courses. Despite this the longitudinal experiment did not proceed as could be expected. Though few technical problems, it required behavioural changes from teachers and learners, thus unearthing a host of sio-technical issues, challenges, and conundrums. Indeed, education is a changing journey, not a prescribed destination, where learners, teachers, and administrators must reinvent themselves to harness the positive in this disruptive innovation of blended learning - closely related to flipped classroom - which combines eLearning with face-to-face and peer, interactions in problem-based learning. Blended learning does not necessarily lead to cheaper and better delivery outcomes, but it makes higher education more customisable to different learning styles and hence more accessible.","PeriodicalId":175346,"journal":{"name":"International Journal of Digital Enterprise Technology","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116267025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A review on the ways to determine at-risk students in online learning 在线学习中确定高危学生的方法综述
International Journal of Digital Enterprise Technology Pub Date : 1900-01-01 DOI: 10.1504/ijdet.2022.10049633
S. N. Kew, Z. Tasir
{"title":"A review on the ways to determine at-risk students in online learning","authors":"S. N. Kew, Z. Tasir","doi":"10.1504/ijdet.2022.10049633","DOIUrl":"https://doi.org/10.1504/ijdet.2022.10049633","url":null,"abstract":"","PeriodicalId":175346,"journal":{"name":"International Journal of Digital Enterprise Technology","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124022178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An orchestration framework for monitoring and analysis of container-based logs and systems 用于监视和分析基于容器的日志和系统的编排框架
International Journal of Digital Enterprise Technology Pub Date : 1900-01-01 DOI: 10.1504/ijdet.2019.10025005
H. Ong, Mohd Nizam Mohd Mydin, Hishamadie Ahmad, Ehsan Mostajeran Goortani, Mohammad Fairus Khalid, Bukhary Ikhwan Ismail, Rajendar Kandan
{"title":"An orchestration framework for monitoring and analysis of container-based logs and systems","authors":"H. Ong, Mohd Nizam Mohd Mydin, Hishamadie Ahmad, Ehsan Mostajeran Goortani, Mohammad Fairus Khalid, Bukhary Ikhwan Ismail, Rajendar Kandan","doi":"10.1504/ijdet.2019.10025005","DOIUrl":"https://doi.org/10.1504/ijdet.2019.10025005","url":null,"abstract":"","PeriodicalId":175346,"journal":{"name":"International Journal of Digital Enterprise Technology","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126380698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Employee's attrition prediction using survival analysis and Cox proportional hazard model 基于生存分析和Cox比例风险模型的员工流失预测
International Journal of Digital Enterprise Technology Pub Date : 1900-01-01 DOI: 10.1504/ijdet.2022.10049631
K. Mohbey
{"title":"Employee's attrition prediction using survival analysis and Cox proportional hazard model","authors":"K. Mohbey","doi":"10.1504/ijdet.2022.10049631","DOIUrl":"https://doi.org/10.1504/ijdet.2022.10049631","url":null,"abstract":"","PeriodicalId":175346,"journal":{"name":"International Journal of Digital Enterprise Technology","volume":"161 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115996118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信
小红书