Forthcoming articles

 


International Journal of Digital Enterprise Technology

 

These articles have been peer-reviewed and accepted for publication in IJDET, but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.

 

Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.

 

Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.

 

Articles marked with this Open Access icon are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.

 

Register for our alerting service, which notifies you by email when new issues of IJDET are published online.

 

We also offer RSS feeds which provide timely updates of tables of contents, newly published articles and calls for papers.

 

International Journal of Digital Enterprise Technology (8 papers in press)

 

Regular Issues

 

  • Solving Problems on a Knowledge model of Operators and Application   Order a copy of this article
    by Hien Nguyen, Nhon Do, Vuong Pham, Katsumi Inoue 
    Abstract: Knowledge of operators is a popular form of knowledge domains, especially computational knowledge domains. This knowledge domain is useful to build the intelligent problem solver for knowledge domains about mathematics and physics. There are many methods for representing this knowledge domain, such as: rule-based systems, computational networks, ontology. However, these current methods are not effective for representation practical applications. In this paper, we present a mathematical approach for building a knowledge model of operators, called Ops-model. The foundation of this model includes: concepts, operators, and inference rules. Each concepts of this model is a class of objects with the behaviours for solving problems on themselves. This model refers to both unary and binary operators and their properties: commutation, association, identity. Based on the structure of Ops-model, general problems on this model are studied, such as: Reducing an expression, Prove an equality of expressions. The algorithms for solving these problems are designed. They are also proved their effectiveness. Moreover, Ops-model has been applied to specify a part of knowledge domain about Vector Algebra in high school. It is used for constructing a program for solving some problems on this knowledge domain. The solutions of this program are step-by-step, readable and suitable with the learners level. This program is also tested and evaluated by the high-school students. It is useful for supporting students to learn this subject.
    Keywords: knowledge representation; intelligent problem solver; automated reasoning; knowledge engineering.

  • A Forensic Evidence Recovery from Mobile Device Applications   Order a copy of this article
    by John K. Alhassan, Agbejule Gbolahan, Ismaila Idris, Shafi’i Muhammad Abdulhamid, Victor O. Waziri 
    Abstract: In recent past, there is a lot of research advancements in mobile forensics tools. This is so due to increase usage of mobile phones in storage of companys information, law enforcement, mobile online transactions, and also negatively by criminals due to increased computational capabilities. Mobile forensics device continues to remain a difficult task due to poor user data retrieval techniques for evidence and procedural resolutions. Recently, third party applications assume a veritable feet because its supported by majority of mobile devices platforms; thereby making it easy to extract information of its users for future criminal audit. This paper proposes an evidence data retrieval method from InstagramApp using two networks based platforms (that is, pure peer-to-peer (PPP) and special cluster peer (SCP) based),whose concept is to manage mobile device communication and generate multiple copies of users data/information to be dumped across three servers.The forensic test results evaluation was carried out for these forensic models; PPP and SCP developed to securely extract data from mobile devices revealed in either cases considered that, SCP outperformed PPP in terms of the time taken to fulfill forensic auditors requests, throughput and broadband utilization were 42.82% to 57.18%, 56.81% to 43.19% and 35.41% to 64.53% respectively.
    Keywords: Mobile Forensic; Evidence Recovery; Pure Peer-to-Peer; Special Cluster Peer; Mobile Device.

  • Modeling and Time Evaluation of Optical Disc and Retinal Lesions   Order a copy of this article
    by Jan Kubicek, Marek Penhaker, Martin Augustynek, Jakub Slonka, Veronika Kovarova 
    Abstract: In the clinical ophthalmology, the retinal image analysis is a routine procedure with a target of the time considering the retinal lesions over the time. Unfortunately, there is an absence of the clinical software instruments providing a precise tracking the retinal lesions from the image records. Thus, the retinal image analysis is carried out by skilled physicians, but without any objective software feedback. We aim to propose a procedure having ambitions to an automatic and autonomous extraction of the retinal lesion from the retinal images, and its time evaluation. The retinal lesions are considered on a base of the optical disc which is simultaneously segmented from the retinal images. It is clinically supposed that the optical disc has stable geometrical features over the time contrarily geometrical features of the retinal lesions are time-developed. The proposed methodology for a time modeling of the retinal lesions comprises three essential procedures. The optical disc and the retinal lesions segmentation on a base of the time evolving curves ensure indication areas of these retinal objects. Consequently, the binary classification is used with a target of an extraction of a respective model of the optical disc and the retinal lesions.
    Keywords: Retinal lesions; optical disc; modeling; active snake model; binarization; retinal image; RetCam 3; Fundus camera; image processing; image segmentation; geometrical features; initial contour.

  • Adaptive Modulation and Coding Selection Mechanisms for Single-Cell LTE Broadcasting in Enterprise Network   Order a copy of this article
    by Mohammed Algharem, Mohd. Hasbullah Omar, Deris Stiawan, Ismat Aldmour, Rahmat Budiarto 
    Abstract: LTE Broadcast or Evolved Multimedia Broadcast Multicast Service (E-MBMS) enables operators to efficiently launch media services over LTE to meet mobile users demand on multimedia services. This paper introduces two mechanisms that use the Standard Deviation (StD) of E-MBMS users Modulation and Coding Scheme (MCS) level group operated on single cell mode to efficiently select its optimal MCS level. Typically, MCS level is selected on the basis of users' worst channel condition which results in wasting network resources. Since the E-MBMS performance directly depends on the selected MCS level, an efficient Adaptive Modulation and Coding (AMC) scheme is essentially needed. The proposed mechanisms are simulated using LTE simulator and the results show that the proposed mechanisms increase the E-MBMS performance in terms of goodput, delay and Packet Loss Ratio, in compared to the Worst Channel Gain and average mechanisms.
    Keywords: Enterprise Networks; LTE; E-MBMS; Modulation & Coding Scheme; Spectrum Efficiency; Adaptive Modulation & Coding;.

  • Reliable wireless MAC layer for Industrial Internet of Things using polarization diversity   Order a copy of this article
    by RITESH KALLE 
    Abstract: Industrial Internet of Things (IIoT) requires superior reliability from underlying communication technology that consumer wireless technologies often fail to meet. Utilizing polarization diversity techniques through Rotating Polarization Waves (RPW) have been recently proposed to improve the coverage and reliability of IIoT network. However, the design of medium access (MAC) layer that optimally utilizes the key features of the underlying physical layer is a key challenge especially when considering multihop networks. Adopting conventional MAC protocols based on carrier sensing or time division alone would not utilize the physical layer in its optimal manner leading to lower throughput and higher end-to-end latency. In this paper, novel medium access techniques to improve the reliability in the RPW wireless communication have been described. We also consider extensions to the MAC layer to support multihop network using the tree topology. An overview of MAC layer methods and comparative mathematical analysis is provided that clearly show the benefits of multi-hop RPW over conventional networks. In particular, analysis results indicate that for median frame transmission probability of 0.5, we observe a reduction of end-to-end latency by 75% and improvement of 95% in throughput for a tandem network configuration.
    Keywords: M2M; wireless network; rotating polarization; orthogonal code; packet combination; priority; multihop; tree topology.

  • Analysis of operative factors and practices in Social CRM   Order a copy of this article
    by Ayush Tiwari, Madhvendra Misra 
    Abstract: In todays world, the culmination of CRM and social media provides a huge platform for handling and networking with the customers. Organizations nowadays are training their workforce in social CRM technologies. There are immense opportunities and huge scope for marketers in the field of social CRM. Social media extends its powerful impact on the core areas of CRM and hence can be used as a very powerful weapon for the organizations. The purpose of this research paper is to study the impact of operative factors in social CRM domain on the performance measures of the organization. The study aims to discover and assess the implications of Social CRM on the organizations performance behavior. The performance measures are identified in the light of Social CRM domain. The identified operative factors such as customer focus, competitor focus, marketing intelligence and cross-functional collaboration are the factors that play a pivotal role in determining the performance of the organization.
    Keywords: Customer Relationship Management; social CRM; social media; marketing intelligence; performance measures.

  • A SYSTEMATIC LITERATURE REVIEW ON ACTIVITY RECOGNITION WITH CONTEXT-AWARENESS TECHNIQUES FOR MITIGATION OF DISASTERS   Order a copy of this article
    by Fatai Sadique, Ali Selamat 
    Abstract: This paper presents a systematic literature review on context awareness with activities recognition for mitigation of disasters. Disaster preparedness and the method of mitigating it or reduction of causalities is very important in order to safe human lives. The review process went through four faces which are: planning, collation, filtration of dataset to get the most relevant materials, exploration and the description based on findings. The problem with the existing studies are: Technology used lack the capacity to give feedback to potential victims, inability to move the technology around, high false negative alarm, low sensor quality for crowd behavior. This present study used smartphones which is handy and has potential of being carried about. The analysis of the result were presented under three major headings which are Publication by year, Techniques, result and findings. The result shows gap in the area of disaster mitigation and the future study suggests the need to extend context-aware framework for stampede prediction based on activity recognition accuracy.rn
    Keywords: Systematic literature review; Context-awareness; Activity recognition accuracy; Smartphone sensor and Mitigation of crowd disasters.

Special Issue on: ICOS 2016 Open Systems and Applications

  • RATING OF SOFTWARE TRUSTWORTHINESS VIA SCORING OF SYSTEM TESTING RESULTS   Order a copy of this article
    by Muhammad Dhiauddin Mohamed Suffian, Fairul Rizal Fahrurazi, Loo Fook Ann, Nur Farahin Aman, Norzamzarini Mohd Bajuri 
    Abstract: It is important to have a form of software trustworthiness rating serving as early health indicator on the capability of the software before it is released to end-users and customers. Although various software certification schemes are available in the market, there is limited information on how far results from system testing are exploited and used to rate the trustworthiness of the software under test. Thus, the proposed software trustworthiness rating strategy uses the scoring upon the completion of system testing execution. The strategy covers rating of software that has undergone system testing completely or partially. It is based on multiple levels calculation toward coming out with final rating: test strategies imposed, completeness of system test execution, test iterations, test case priority and test case result for each iteration. As a result, the multilevel scores calculation successfully derives meaningful trustworthiness rating for the software under test, whether it is a complete rating or partial rating.
    Keywords: software trustworthiness; rating; system test; software health indicator; software testing.