Forthcoming articles


International Journal of Digital Enterprise Technology


These articles have been peer-reviewed and accepted for publication in IJDET, but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.


Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.


Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.


Articles marked with this Open Access icon are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.


Register for our alerting service, which notifies you by email when new issues of IJDET are published online.


We also offer RSS feeds which provide timely updates of tables of contents, newly published articles and calls for papers.


International Journal of Digital Enterprise Technology (12 papers in press)


Regular Issues


  • Solving Problems on a Knowledge model of Operators and Application   Order a copy of this article
    by Hien Nguyen, Nhon Do, Vuong Pham, Katsumi Inoue 
    Abstract: Knowledge of operators is a popular form of knowledge domains, especially computational knowledge domains. This knowledge domain is useful to build the intelligent problem solver for knowledge domains about mathematics and physics. There are many methods for representing this knowledge domain, such as: rule-based systems, computational networks, ontology. However, these current methods are not effective for representation practical applications. In this paper, we present a mathematical approach for building a knowledge model of operators, called Ops-model. The foundation of this model includes: concepts, operators, and inference rules. Each concepts of this model is a class of objects with the behaviours for solving problems on themselves. This model refers to both unary and binary operators and their properties: commutation, association, identity. Based on the structure of Ops-model, general problems on this model are studied, such as: Reducing an expression, Prove an equality of expressions. The algorithms for solving these problems are designed. They are also proved their effectiveness. Moreover, Ops-model has been applied to specify a part of knowledge domain about Vector Algebra in high school. It is used for constructing a program for solving some problems on this knowledge domain. The solutions of this program are step-by-step, readable and suitable with the learners level. This program is also tested and evaluated by the high-school students. It is useful for supporting students to learn this subject.
    Keywords: knowledge representation; intelligent problem solver; automated reasoning; knowledge engineering.

  • A Forensic Evidence Recovery from Mobile Device Applications   Order a copy of this article
    by John K. Alhassan, Agbejule Gbolahan, Ismaila Idris, Shafi’i Muhammad Abdulhamid, Victor O. Waziri 
    Abstract: In recent past, there is a lot of research advancements in mobile forensics tools. This is so due to increase usage of mobile phones in storage of companys information, law enforcement, mobile online transactions, and also negatively by criminals due to increased computational capabilities. Mobile forensics device continues to remain a difficult task due to poor user data retrieval techniques for evidence and procedural resolutions. Recently, third party applications assume a veritable feet because its supported by majority of mobile devices platforms; thereby making it easy to extract information of its users for future criminal audit. This paper proposes an evidence data retrieval method from InstagramApp using two networks based platforms (that is, pure peer-to-peer (PPP) and special cluster peer (SCP) based),whose concept is to manage mobile device communication and generate multiple copies of users data/information to be dumped across three servers.The forensic test results evaluation was carried out for these forensic models; PPP and SCP developed to securely extract data from mobile devices revealed in either cases considered that, SCP outperformed PPP in terms of the time taken to fulfill forensic auditors requests, throughput and broadband utilization were 42.82% to 57.18%, 56.81% to 43.19% and 35.41% to 64.53% respectively.
    Keywords: Mobile Forensic; Evidence Recovery; Pure Peer-to-Peer; Special Cluster Peer; Mobile Device.

  • Modeling and Time Evaluation of Optical Disc and Retinal Lesions   Order a copy of this article
    by Jan Kubicek, Juraj Timkovic, Marek Penhaker, Martin Augustynek, Jakub Slonka, Veronika Kovarova, Radovan Hudak, Martin Cerny 
    Abstract: In the clinical ophthalmology, the retinal image analysis is a routine procedure with a target of the time considering the retinal lesions over the time. Unfortunately, there is an absence of the clinical software instruments providing a precise tracking the retinal lesions from the image records. Thus, the retinal image analysis is carried out by skilled physicians, but without any objective software feedback. We aim to propose a procedure having ambitions to an automatic and autonomous extraction of the retinal lesion from the retinal images, and its time evaluation. The retinal lesions are considered on a base of the optical disc which is simultaneously segmented from the retinal images. It is clinically supposed that the optical disc has stable geometrical features over the time contrarily geometrical features of the retinal lesions are time-developed. The proposed methodology for a time modeling of the retinal lesions comprises three essential procedures. The optical disc and the retinal lesions segmentation on a base of the time evolving curves ensure indication areas of these retinal objects. Consequently, the binary classification is used with a target of an extraction of a respective model of the optical disc and the retinal lesions.
    Keywords: Retinal lesions; optical disc; modeling; active snake model; binarization; retinal image; RetCam 3; Fundus camera; image processing; image segmentation; geometrical features; initial contour.

  • Adaptive Modulation and Coding Selection Mechanisms for Single-Cell LTE Broadcasting in Enterprise Network   Order a copy of this article
    by Mohammed Algharem, Mohd. Hasbullah Omar, Deris Stiawan, Ismat Aldmour, Rahmat Budiarto 
    Abstract: LTE Broadcast or Evolved Multimedia Broadcast Multicast Service (E-MBMS) enables operators to efficiently launch media services over LTE to meet mobile users demand on multimedia services. This paper introduces two mechanisms that use the Standard Deviation (StD) of E-MBMS users Modulation and Coding Scheme (MCS) level group operated on single cell mode to efficiently select its optimal MCS level. Typically, MCS level is selected on the basis of users' worst channel condition which results in wasting network resources. Since the E-MBMS performance directly depends on the selected MCS level, an efficient Adaptive Modulation and Coding (AMC) scheme is essentially needed. The proposed mechanisms are simulated using LTE simulator and the results show that the proposed mechanisms increase the E-MBMS performance in terms of goodput, delay and Packet Loss Ratio, in compared to the Worst Channel Gain and average mechanisms.
    Keywords: Enterprise Networks; LTE; E-MBMS; Modulation & Coding Scheme; Spectrum Efficiency; Adaptive Modulation & Coding;.

  • Reliable wireless MAC layer for Industrial Internet of Things using polarization diversity   Order a copy of this article
    Abstract: Industrial Internet of Things (IIoT) requires superior reliability from underlying communication technology that consumer wireless technologies often fail to meet. Utilizing polarization diversity techniques through Rotating Polarization Waves (RPW) have been recently proposed to improve the coverage and reliability of IIoT network. However, the design of medium access (MAC) layer that optimally utilizes the key features of the underlying physical layer is a key challenge especially when considering multihop networks. Adopting conventional MAC protocols based on carrier sensing or time division alone would not utilize the physical layer in its optimal manner leading to lower throughput and higher end-to-end latency. In this paper, novel medium access techniques to improve the reliability in the RPW wireless communication have been described. We also consider extensions to the MAC layer to support multihop network using the tree topology. An overview of MAC layer methods and comparative mathematical analysis is provided that clearly show the benefits of multi-hop RPW over conventional networks. In particular, analysis results indicate that for median frame transmission probability of 0.5, we observe a reduction of end-to-end latency by 75% and improvement of 95% in throughput for a tandem network configuration.
    Keywords: M2M; wireless network; rotating polarization; orthogonal code; packet combination; priority; multihop; tree topology.

  • Analysis of operative factors and practices in Social CRM   Order a copy of this article
    by Ayush Tiwari, Madhvendra Misra 
    Abstract: In todays world, the culmination of CRM and social media provides a huge platform for handling and networking with the customers. Organizations nowadays are training their workforce in social CRM technologies. There are immense opportunities and huge scope for marketers in the field of social CRM. Social media extends its powerful impact on the core areas of CRM and hence can be used as a very powerful weapon for the organizations. The purpose of this research paper is to study the impact of operative factors in social CRM domain on the performance measures of the organization. The study aims to discover and assess the implications of Social CRM on the organizations performance behavior. The performance measures are identified in the light of Social CRM domain. The identified operative factors such as customer focus, competitor focus, marketing intelligence and cross-functional collaboration are the factors that play a pivotal role in determining the performance of the organization.
    Keywords: Customer Relationship Management; social CRM; social media; marketing intelligence; performance measures.

    by Fatai Sadique, Ali Selamat 
    Abstract: This paper presents a systematic literature review on context awareness with activities recognition for mitigation of disasters. Disaster preparedness and the method of mitigating it or reduction of causalities is very important in order to safe human lives. The review process went through four faces which are: planning, collation, filtration of dataset to get the most relevant materials, exploration and the description based on findings. The problem with the existing studies are: Technology used lack the capacity to give feedback to potential victims, inability to move the technology around, high false negative alarm, low sensor quality for crowd behavior. This present study used smartphones which is handy and has potential of being carried about. The analysis of the result were presented under three major headings which are Publication by year, Techniques, result and findings. The result shows gap in the area of disaster mitigation and the future study suggests the need to extend context-aware framework for stampede prediction based on activity recognition accuracy.rn
    Keywords: Systematic literature review; Context-awareness; Activity recognition accuracy; Smartphone sensor and Mitigation of crowd disasters.

  • Phishing Classification Models: Issues and Perspectives   Order a copy of this article
    by Hiba Zuhair, Ali Selamat 
    Abstract: The never-ending threats of phishing to the cyberspace motivate researchers to develop more proficient phishing classification models for the survival of cyber-security with safe web services. However, these models remain variable in their reaction and incompetent in their performance against novel phishes at the real-time of application. This is attributed to their partial or full deficiency of inductive factors including a rich set of decisive features, actively learned and adaptive machine learning based classification model. Upon this issue, our paper revisits the current machine learning-based phishing classification models and analyzes their performance qualitatively and quantitatively across three benchmarking data sets. Empirical results and observations emphasized the causality between the models limitations and their lack of inductive factors. Accordingly, future outlooks are recommended as a navigating taxonomy to serve the researchers at developing their upcoming achievements in both academia and industry.
    Keywords: novel phish; feature-based classification; active learning; adaptive classification model.

  • An experiment in blended learning: higher education without lectures?   Order a copy of this article
    by Kevin Jones, Ravi Sharma 
    Abstract: This paper chronicles a 10-year effort to introduce blended learning into a course on software engineering in a computer engineering programme at a leading technological university. In this environment, there was a longstanding tradition of technology-enabled teaching and learning. The infrastructure was state-of-the-art and stable. Hence both teachers and students were familiar with the idea of online (or computer mediated) courses. Despite this the longitudinal experiment did not proceed as could be expected. Technically, there were few problems; but the socio-technical context required the buy-in of administrators as well as behavioural changes from teachers and learners. The research conducted unearthed a host of such issues, challenges, and conundrums. Indeed, universities need to keep in mind that education is a changing journey, not a prescribed destination. A paradigm shift in instructional design is underway. Learners, teachers and administrators must reinvent themselves to harness the positive in this disruptive innovation that is labelled blended learning. Arguably an instance of the so-called flipped classroom, blended learning combines technology-mediated dissemination of content with face-to-face, and often peer, interactions in problem-based learning. The bad news is that blended learning does not lead to cheaper and better delivery outcomes. But the good news is that it make higher education more accessible and hence equitable.
    Keywords: educational technology; online learning; instructional design.

  • Application of Universal Remote Control of Non Smart Home Appliances for Smart Home Concepts   Order a copy of this article
    by Ondrej Krejcar, Jan Dvorak 
    Abstract: Smart Homes concept are widely used nowadays as well as many different standards and technologies exist which enable to remote control of almost every home appliances. In this paper we would like to address universal solution of remote control based on available widely used hardware solution which allow to connect not only current appliances from different producers, but also older appliances which support only the handling via a controller on the basis of infrared transfer. Finally these Non Smart Home Appliances are going to be integrated in whole Smart Environment and also be as smart as other new appliances. The part of the solution is the interface for the connection of the application to current Smart Home systems and an intelligent recognition and an automatization of users actions with controllers. The result of the implementation is a functional prototype with all required design (PCB) and implementation. User testing also confirm the amount of time saved by using such device instead of original Non Smart or not connected Smart ones.
    Keywords: Smart Home; Infrared; Remote Control; Automation; Mobile; Multimedia.

  • Systematic Literature Review and Taxonomy for DDoS Attack Detection and Prediction   Order a copy of this article
    by Ahmad Riza Ain Yusof, Nur Izura Udzir, Ali Selamat 
    Abstract: Distributed Denial of Service (DDoS) attack has been significantly discussed in the computer security domain, particularly due to the damaging effects it causes to organizations assets. However,it confront the challenge under massive growth of Internet user traffic and lightning speed of computer access.In this paper, we present a comprehensive systematic review and measurement analysis of the DDoS impact, including (a) DDoS definition, (b) types of DDoS attack, (c) various types of existing DDoS detecting techniques and (d) different kinds of DDoS attack prediction techniques. Furthermore, drawing upon this analysis, we discuss the advantages and the drawbacks of DDoS detection technique, to understand how technical community can response more effectively to such attacks in the future.
    Keywords: Distributed Denial of Services Attack (DDoS); intrusion detection system; DDoS attack prediction.

Special Issue on: ICOS 2016 Open Systems and Applications

    by Muhammad Dhiauddin Mohamed Suffian, Fairul Rizal Fahrurazi, Loo Fook Ann, Nur Farahin Aman, Norzamzarini Mohd Bajuri 
    Abstract: It is important to have a form of software trustworthiness rating serving as early health indicator on the capability of the software before it is released to end-users and customers. Although various software certification schemes are available in the market, there is limited information on how far results from system testing are exploited and used to rate the trustworthiness of the software under test. Thus, the proposed software trustworthiness rating strategy uses the scoring upon the completion of system testing execution. The strategy covers rating of software that has undergone system testing completely or partially. It is based on multiple levels calculation toward coming out with final rating: test strategies imposed, completeness of system test execution, test iterations, test case priority and test case result for each iteration. As a result, the multilevel scores calculation successfully derives meaningful trustworthiness rating for the software under test, whether it is a complete rating or partial rating.
    Keywords: software trustworthiness; rating; system test; software health indicator; software testing.