Forthcoming articles


International Journal of Digital Enterprise Technology


These articles have been peer-reviewed and accepted for publication in IJDET, but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.


Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.


Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.


Articles marked with this Open Access icon are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.


Register for our alerting service, which notifies you by email when new issues of IJDET are published online.


We also offer RSS feeds which provide timely updates of tables of contents, newly published articles and calls for papers.


International Journal of Digital Enterprise Technology (10 papers in press)


Regular Issues


  • Phishing Classification Models: Issues and Perspectives   Order a copy of this article
    by Hiba Zuhair, Ali Selamat 
    Abstract: The never-ending threats of phishing to the cyberspace motivate researchers to develop more proficient phishing classification models for the survival of cyber-security with safe web services. However, these models remain variable in their reaction and incompetent in their performance against novel phishes at the real-time of application. This is attributed to their partial or full deficiency of inductive factors including a rich set of decisive features, actively learned and adaptive machine learning based classification model. Upon this issue, our paper revisits the current machine learning-based phishing classification models and analyzes their performance qualitatively and quantitatively across three benchmarking data sets. Empirical results and observations emphasized the causality between the models limitations and their lack of inductive factors. Accordingly, future outlooks are recommended as a navigating taxonomy to serve the researchers at developing their upcoming achievements in both academia and industry.
    Keywords: novel phish; feature-based classification; active learning; adaptive classification model.

  • An experiment in blended learning: higher education without lectures?   Order a copy of this article
    by Kevin Jones, Ravi Sharma 
    Abstract: This paper chronicles a 10-year effort to introduce blended learning into a course on software engineering in a computer engineering programme at a leading technological university. In this environment, there was a longstanding tradition of technology-enabled teaching and learning. The infrastructure was state-of-the-art and stable. Hence both teachers and students were familiar with the idea of online (or computer mediated) courses. Despite this the longitudinal experiment did not proceed as could be expected. Technically, there were few problems; but the socio-technical context required the buy-in of administrators as well as behavioural changes from teachers and learners. The research conducted unearthed a host of such issues, challenges, and conundrums. Indeed, universities need to keep in mind that education is a changing journey, not a prescribed destination. A paradigm shift in instructional design is underway. Learners, teachers and administrators must reinvent themselves to harness the positive in this disruptive innovation that is labelled blended learning. Arguably an instance of the so-called flipped classroom, blended learning combines technology-mediated dissemination of content with face-to-face, and often peer, interactions in problem-based learning. The bad news is that blended learning does not lead to cheaper and better delivery outcomes. But the good news is that it make higher education more accessible and hence equitable.
    Keywords: educational technology; online learning; instructional design.

  • Application of Universal Remote Control of Non Smart Home Appliances for Smart Home Concepts   Order a copy of this article
    by Ondrej Krejcar, Jan Dvorak 
    Abstract: Smart Homes concept are widely used nowadays as well as many different standards and technologies exist which enable to remote control of almost every home appliances. In this paper we would like to address universal solution of remote control based on available widely used hardware solution which allow to connect not only current appliances from different producers, but also older appliances which support only the handling via a controller on the basis of infrared transfer. Finally these Non Smart Home Appliances are going to be integrated in whole Smart Environment and also be as smart as other new appliances. The part of the solution is the interface for the connection of the application to current Smart Home systems and an intelligent recognition and an automatization of users actions with controllers. The result of the implementation is a functional prototype with all required design (PCB) and implementation. User testing also confirm the amount of time saved by using such device instead of original Non Smart or not connected Smart ones.
    Keywords: Smart Home; Infrared; Remote Control; Automation; Mobile; Multimedia.

  • Systematic Literature Review and Taxonomy for DDoS Attack Detection and Prediction   Order a copy of this article
    by Ahmad Riza Ain Yusof, Nur Izura Udzir, Ali Selamat 
    Abstract: Distributed Denial of Service (DDoS) attack has been significantly discussed in the computer security domain, particularly due to the damaging effects it causes to organizations assets. However,it confront the challenge under massive growth of Internet user traffic and lightning speed of computer access.In this paper, we present a comprehensive systematic review and measurement analysis of the DDoS impact, including (a) DDoS definition, (b) types of DDoS attack, (c) various types of existing DDoS detecting techniques and (d) different kinds of DDoS attack prediction techniques. Furthermore, drawing upon this analysis, we discuss the advantages and the drawbacks of DDoS detection technique, to understand how technical community can response more effectively to such attacks in the future.
    Keywords: Distributed Denial of Services Attack (DDoS); intrusion detection system; DDoS attack prediction.

  • Analyzing Malware Log Files for Internet Investigation Using Hadoop Platform   Order a copy of this article
    by Saiful Adli Ismail 
    Abstract: On the Internet, malicious software (malware) is one of the most serious threats to system security. Major complex issues and problems on any software systems are frequently caused by malware. Malware can infect any computer software that has connection to Internet infrastructure. There are many types of malware and some of the popular malwares are botnet, trojans, viruses, spyware and adware. Internet users with lesser knowledge on the malware threats are susceptible to this issue. To protect and prevent the computer and Internet users from exposing themselves towards malware attacks, identifying the attacks through investigating malware log file is an essential step to curb this threat. The log file exposes crucial information in identifying the malware, such as algorithm and functional characteristic, the network interaction between the source and the destination, and type of malware. By nature, the log file size is humongous and requires the investigation process to be executed on faster and stable platform such as big data environment. In this study, the authors had adopted Hadoop, an open source software framework to process and extract the information from the malware log files that obtains from universitys security equipment. The Python program was used for data transformation then analysed the information in Hadoop simulation environment. The analysis includes assessing reduction of log files size, performance of execution time and data visualisation using Microsoft Power BI (Business Intelligence). As the results of the analysis, 50% and 60% from the two (2) original malware log files size were significantly reduced respectively, while the total execution time would not increase linearly with the size of the data in Hadoop simulation environment. The information will be used for further prevention and protection from malware threats in universitys network.
    Keywords: Internet security; Types of Malware; Malware log files; Big Data environment; Hadoop environment; Log file processing; Log files in Hadoop.

  • An orchestration framework for monitoring and analysis of container based logs and systems   Order a copy of this article
    by Rajendar Kandan, Fairus Khalid Mohammad, Bukhary Ikhwan Ismail, Ehsan Mostajeran Goortani, Hishamadie Ahmad, Mohd Nizam Mohd Mydin, Hong Ong Hoe 
    Abstract: Container technology provides a rapid way of running applications and hence draws it attention to recent times. Container applications are smaller in size and much flexible in management compared to traditional virtual machines. Since containers are non-persistence, the complexity of application logs also increases when more number of container instances deployed across a cluster of hosts. Even with wide range of log management tools available for containers, it requires a combination of few tools for providing a complete logging solution. Thus, it requires a framework which could orchestrate and identify the status of each integrated tools for providing smooth functioning across the entire log system. In this paper, we discussed about the implementation of our orchestration framework, configuration details for communication across log systems and case study.
    Keywords: Log management; container; orchestration.

  • A Comparison of Halal Inspection Process between Federal and State Halal Certification Body in Malaysia   Order a copy of this article
    by Mohd Zabiedy Mohd Sulaiman, Nurulhuda Noordin, Nor Laila Md Noor, Ahmad Iqbal Hakim Suhaimi, Wan Abdul Rahim Wan Mohd Isa 
    Abstract: The rising demand for halal certified products and services is due to the rapid growth of the worlds Muslims population. Halal certification has become an important system for the award of the halal status to product and services. The halal certification systems need to follow the sharia or the Islamic law diligently to ensure that products and services to be certified are in compliance with Islamic law. Halal inspection is the key component that details out the sharia compliance and failure to do so is detrimental to the compliance. As the worldwide demand for halal certified products and services grows, there is a pressing need to have efficient and effective halal certification systems to serve the worldwide Muslim community through several certification bodies. Halal inspection poses a challenge as the different sects of Muslims may have different interpretations of halal inspection and resources needed to perform halal inspection in countries where Muslims are minorities may be limited. To understand the situation further, it is important to identify issues of halal inspection among different Halal Certification Bodies. Malaysia is a leading halal certification provider and exemplifies the situation where halal certification is administered by different organizational bodies as halal certification is awarded by both federal and state level Islamic bodies. A study on the issues and problems of federal and state level halal certification practices can help gain an understanding of the situation. The aim of halal inspection study is to investigate the issues and differences in the practices of halal inspection between the federal and state Halal Certification Body in Malaysia. This study employs a qualitative approach using interviews with halal certification experts. The findings identify several problems in halal inspection between both levels that may influence the halal certification efficiency. The outcome will be helpful in the search for an improved technique to utilize information technology to empower the existing certification systems.
    Keywords: Halal Inspection; Halal Certification; Halal Industry; Halal Certification Body; Halal Authority; Information Technology; Malaysia.

  • Sensor Network Design for Smart Building   Order a copy of this article
    by Abdenour Kifouche, Redha Hamouche, Remy Kocik, Geneviève Baudoin 
    Abstract: This article has two major contributions. The first one deals with energy efficiency and pollution issues in buildings. Our solution is to develop, deploy and operate a sensor network for building monitoring. Regarding existing solutions, our network is based on generic and modular sensors that can collect several data such as temperature, carbon monoxide, etc. Subsequently, these data are forwarded to a base station that stores it in a database. By providing a human machine interface, these data can be visualized and processed in real time. The second contribution is related to a feedback from the development of our sensor network. We identified challenges related to this development including significant development time, energy constraints, large scale network, costs, etc. To overcome these challenges, this article proposes also to explore new development methodology based on a model driven approach that reduces costs and efforts and ensures consistency of the development.
    Keywords: smart building; smart city; wireless sensor network; sensor design; model-driven development; generic modelling environment.

  • Comparative Analysis on Seed Point Placement and Magnitude Based Visual Enhancement for Streamlines Generation   Order a copy of this article
    by Yusman Azimi Yusoff, Farhan Mohamed 
    Abstract: This paper presents an improved seed point placement to locate initial seed points based on magnitude value. The vector field is separated in to grid to ensure the uniformity in generating streamlines and broader streamlines coverage, thus reducing poor visualization information especially near to visualization boundary. An evaluation using Mean Square Error is conducted to evaluate the improvement in term of streamlines placement uniformity. Result shows that proposed method able to come out with lower Mean Square Error value compared to evenly-spaced in across different separation distance, resulting better streamlines control to produce uniform visualization result. Finally, the proposed method can be improved in many aspects to come out with a better visualization result in 2 and possibly 3 dimension flow visualization.
    Keywords: Seed Point Placement; Seed Point Distribution; Streamlines; Flow Visualization.

  • The Implementation of Fuzzy Logic Controller for Defining the Ranking Function on Malay Retrieval System   Order a copy of this article
    by Shaiful Bakhtiar Rodzman, Normaly Kamal Ismail, Nurazzah Abd Rahman, Zulhilmi Mohamed Nor 
    Abstract: Ranking is likely the most important process of an Information Retrieval (IR) system that will be used to evaluate and measure the effectiveness of an IR system. This paper aims to produce the implementation of Fuzzy Logic Controller of Mamdani-type Fuzzy Inference System for defining the ranking function by using the BM25 Model in the Malay IR System that also includes the Malay Stemmer. The result of the ranking function then will be compared to the result of Vector Space Model that is also applied in Malay IR System and be evaluated using relevant document by the Hadith expert. The results showed that FBMIR has slightly outperformed Vector Space Model on 3 Topic Set of query results such as Iman,Ilmu and Wuduk on the Precision at Rank 10 and the percentage of no relevant document in the top ten retrieved measures.
    Keywords: Fuzzy Logic; Malay Text Corpus; fuzzy set; fuzzy rule; Vector Space model; Probabilistic model; BM25 model; ranking function.