Mohd Zabiedy Mohd Sulaiman, Nurulhuda Noordin, N. Noor, A. Suhaimi, W. Isa
{"title":"A comparison of halal inspection process between federal and state halal certification body in Malaysia","authors":"Mohd Zabiedy Mohd Sulaiman, Nurulhuda Noordin, N. Noor, A. Suhaimi, W. Isa","doi":"10.1504/ijdet.2019.10025006","DOIUrl":"https://doi.org/10.1504/ijdet.2019.10025006","url":null,"abstract":"Halal certification is an important system for the award of halal status to product and services to ensure that anything to be certified halal are complying with the Shariah. Halal inspection is the key process that details out the Shariah and failure to do so is detrimental to its compliance. The rising demand of halal products shows a need to have an efficient system for the Muslim community. However, it poses a challenge as the different sects of Muslims may have different halal interpretations and limited resources to perform the inspection. Thus, it is crucial to identify issues among different Halal Certification Bodies. This study aims to investigate the differences in halal inspection practices in Malaysia through interviews with halal certification experts. The findings identify several problems that may influence the halal certification efficiency which will be helpful in the search for a better way to utilise information technology.","PeriodicalId":175346,"journal":{"name":"International Journal of Digital Enterprise Technology","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134265173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohd Sharudin Mat Deli, Saiful Adli Ismail, M. Kama, O. Yusop, Azri Azmi
{"title":"Analysing malware log files for internet investigation using Hadoop platform","authors":"Mohd Sharudin Mat Deli, Saiful Adli Ismail, M. Kama, O. Yusop, Azri Azmi","doi":"10.1504/ijdet.2019.10025004","DOIUrl":"https://doi.org/10.1504/ijdet.2019.10025004","url":null,"abstract":"To protect the computer and internet users from exposing themselves towards malware attacks, identifying the attacks through investigating malware log file is an essential step to curb this threat. The log file exposes crucial information in identifying the malware, such as algorithm and functional characteristic, the network interaction between the source and the destination, and type of malware. By nature, the log file size is humongous and requires the investigation process to be executed on faster and stable platform such as big data environment. In this study, Hadoop technology used to process and extract the information from the malware log files that obtains from university's security equipment. The Python program was used for data transformation then analysis it in Hadoop simulation environment. The results of log processing have reduced 50% of the original log file size, while the total execution time would not increase linearly with the size of the data.","PeriodicalId":175346,"journal":{"name":"International Journal of Digital Enterprise Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128837684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yusman Azimi Yusoff, F. Mohamed, M. Sunar, A. Selamat, N. Jaafar
{"title":"Comparative analysis on seed point placement and magnitude-based visual enhancement for streamlines generation","authors":"Yusman Azimi Yusoff, F. Mohamed, M. Sunar, A. Selamat, N. Jaafar","doi":"10.1504/ijdet.2019.10025008","DOIUrl":"https://doi.org/10.1504/ijdet.2019.10025008","url":null,"abstract":"This paper presents an improved seed point placement to locate initial seed points based on magnitude value. The vector field is separated in to grid to ensure the uniformity in generating streamlines and broader streamlines coverage, thus reducing poor visualisation information especially near to visualisation boundary. An evaluation using mean square error is conducted to evaluate the improvement in term of streamlines placement uniformity. Result shows that proposed method able to come out with lower mean square error value compared to evenly-spaced in across different separation distance, resulting better streamlines control to produce uniform visualisation result. Finally, the proposed method can be improved in many aspects to come out with a better visualisation result in two and possibly three dimension flow visualisation.","PeriodicalId":175346,"journal":{"name":"International Journal of Digital Enterprise Technology","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120953351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abdenour Kifouche, R. Hamouche, R. Kocik, G. Baudoin
{"title":"Sensor network design for smart building","authors":"Abdenour Kifouche, R. Hamouche, R. Kocik, G. Baudoin","doi":"10.1504/ijdet.2019.10025007","DOIUrl":"https://doi.org/10.1504/ijdet.2019.10025007","url":null,"abstract":"This article has two major contributions. The first one deals with energy efficiency and pollution issues in buildings. Our solution is to develop, deploy and operate a sensor network for building monitoring. Regarding existing solutions, our network is based on generic and modular sensors that can collect several data such as temperature, carbon monoxide, etc. Subsequently, these data are forwarded to a base station that stores it in a database. By providing a human machine interface, these data can be visualised and processed in real time. The second contribution is related to a feedback from the development of our sensor network. We identified challenges related to this development including significant development time, energy constraints, large-scale network, costs, etc. To overcome these challenges, this article proposes also to explore new development methodology based on a model driven approach that reduces costs and efforts and ensures consistency of the development.","PeriodicalId":175346,"journal":{"name":"International Journal of Digital Enterprise Technology","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133155522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of universal remote control of non-smart home appliances for smart home concepts","authors":"Jan Dvorak, O. Krejcar, Lim Kok Cheng","doi":"10.1504/IJDET.2019.10019067","DOIUrl":"https://doi.org/10.1504/IJDET.2019.10019067","url":null,"abstract":"The smart homes concept is widely used nowadays, as well as many different standards and technologies that exist which enable to remotely control almost every home appliance. In this paper, we would like to address universal solution of remote control based on available widely used hardware solution which allows to connect not only current appliances from different producers, but also older appliances which support only the handling via a controller on the basis of infrared transfer. Finally, these non-smart home appliances are going to be integrated in whole smart environment and also be as smart as other new appliances. The part of the solution is the interface for the connection of the application to current smart home systems and an intelligent recognition and an automatisation of user's actions with controllers. The result of the implementation is a functional prototype with all required design (PCB) and implementation. User testing also confirms the amount of time saved by using such device instead of original non-smart or not connected smart ones.","PeriodicalId":175346,"journal":{"name":"International Journal of Digital Enterprise Technology","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123247458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Systematic literature review and taxonomy for DDoS attack detection and prediction","authors":"Ahmad Riza'ain Yusof, N. Udzir, A. Selamat","doi":"10.1504/IJDET.2019.10019068","DOIUrl":"https://doi.org/10.1504/IJDET.2019.10019068","url":null,"abstract":"Distributed denial of service (DDoS) attack has been significantly discussed in the computer security domain, particularly due to the damaging effects it causes to organisations' assets. However, it confronts the challenge under massive growth of internet user traffic and lightning speed of computer access. In this paper, we present a comprehensive systematic literature review and measurement analysis of the DDoS impact, including: a) DDoS definition; b) types of DDoS attack; c) various types of existing DDoS detecting techniques; d) different kinds of DDoS attack prediction techniques. Furthermore, this paper provides an in-depth analysis the advantages and the drawbacks of existing DDoS detection and prediction technique to assist for both academia and industry researchers towards produce better DDoS detection and prediction mechanism.","PeriodicalId":175346,"journal":{"name":"International Journal of Digital Enterprise Technology","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122960916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An experiment in blended learning: higher education without lectures","authors":"K. Jones, Ravi S. Sharma","doi":"10.1504/IJDET.2019.10019066","DOIUrl":"https://doi.org/10.1504/IJDET.2019.10019066","url":null,"abstract":"This paper chronicles a 10-year introduction of blended learning in software engineering at a leading technological university, with a longstanding tradition of technology-enabled teaching and learning, and state-of-the-art infrastructure. Hence, both teachers and students were familiar with the idea of online courses. Despite this the longitudinal experiment did not proceed as could be expected. Though few technical problems, it required behavioural changes from teachers and learners, thus unearthing a host of sio-technical issues, challenges, and conundrums. Indeed, education is a changing journey, not a prescribed destination, where learners, teachers, and administrators must reinvent themselves to harness the positive in this disruptive innovation of blended learning - closely related to flipped classroom - which combines eLearning with face-to-face and peer, interactions in problem-based learning. Blended learning does not necessarily lead to cheaper and better delivery outcomes, but it makes higher education more customisable to different learning styles and hence more accessible.","PeriodicalId":175346,"journal":{"name":"International Journal of Digital Enterprise Technology","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116267025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A review on the ways to determine at-risk students in online learning","authors":"S. N. Kew, Z. Tasir","doi":"10.1504/ijdet.2022.10049633","DOIUrl":"https://doi.org/10.1504/ijdet.2022.10049633","url":null,"abstract":"","PeriodicalId":175346,"journal":{"name":"International Journal of Digital Enterprise Technology","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124022178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Ong, Mohd Nizam Mohd Mydin, Hishamadie Ahmad, Ehsan Mostajeran Goortani, Mohammad Fairus Khalid, Bukhary Ikhwan Ismail, Rajendar Kandan
{"title":"An orchestration framework for monitoring and analysis of container-based logs and systems","authors":"H. Ong, Mohd Nizam Mohd Mydin, Hishamadie Ahmad, Ehsan Mostajeran Goortani, Mohammad Fairus Khalid, Bukhary Ikhwan Ismail, Rajendar Kandan","doi":"10.1504/ijdet.2019.10025005","DOIUrl":"https://doi.org/10.1504/ijdet.2019.10025005","url":null,"abstract":"","PeriodicalId":175346,"journal":{"name":"International Journal of Digital Enterprise Technology","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126380698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Employee's attrition prediction using survival analysis and Cox proportional hazard model","authors":"K. Mohbey","doi":"10.1504/ijdet.2022.10049631","DOIUrl":"https://doi.org/10.1504/ijdet.2022.10049631","url":null,"abstract":"","PeriodicalId":175346,"journal":{"name":"International Journal of Digital Enterprise Technology","volume":"161 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115996118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}