Forthcoming articles

International Journal of Digital Enterprise Technology

International Journal of Digital Enterprise Technology (IJDET)

These articles have been peer-reviewed and accepted for publication but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.

Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.

Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.

Register for our alerting service, which notifies you by email when new issues are published online.

Open AccessArticles marked with this Open Access icon are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.
We also offer which provide timely updates of tables of contents, newly published articles and calls for papers.

International Journal of Digital Enterprise Technology (6 papers in press)

Regular Issues

  • Analyzing Malware Log Files for Internet Investigation Using Hadoop Platform   Order a copy of this article
    by Saiful Adli Ismail 
    Abstract: On the Internet, malicious software (malware) is one of the most serious threats to system security. Major complex issues and problems on any software systems are frequently caused by malware. Malware can infect any computer software that has connection to Internet infrastructure. There are many types of malware and some of the popular malwares are botnet, trojans, viruses, spyware and adware. Internet users with lesser knowledge on the malware threats are susceptible to this issue. To protect and prevent the computer and Internet users from exposing themselves towards malware attacks, identifying the attacks through investigating malware log file is an essential step to curb this threat. The log file exposes crucial information in identifying the malware, such as algorithm and functional characteristic, the network interaction between the source and the destination, and type of malware. By nature, the log file size is humongous and requires the investigation process to be executed on faster and stable platform such as big data environment. In this study, the authors had adopted Hadoop, an open source software framework to process and extract the information from the malware log files that obtains from universitys security equipment. The Python program was used for data transformation then analysed the information in Hadoop simulation environment. The analysis includes assessing reduction of log files size, performance of execution time and data visualisation using Microsoft Power BI (Business Intelligence). As the results of the analysis, 50% and 60% from the two (2) original malware log files size were significantly reduced respectively, while the total execution time would not increase linearly with the size of the data in Hadoop simulation environment. The information will be used for further prevention and protection from malware threats in universitys network.
    Keywords: Internet security; Types of Malware; Malware log files; Big Data environment; Hadoop environment; Log file processing; Log files in Hadoop.

  • An orchestration framework for monitoring and analysis of container based logs and systems   Order a copy of this article
    by Rajendar Kandan, Fairus Khalid Mohammad, Bukhary Ikhwan Ismail, Ehsan Mostajeran Goortani, Hishamadie Ahmad, Mohd Nizam Mohd Mydin, Hong Ong Hoe 
    Abstract: Container technology provides a rapid way of running applications and hence draws it attention to recent times. Container applications are smaller in size and much flexible in management compared to traditional virtual machines. Since containers are non-persistence, the complexity of application logs also increases when more number of container instances deployed across a cluster of hosts. Even with wide range of log management tools available for containers, it requires a combination of few tools for providing a complete logging solution. Thus, it requires a framework which could orchestrate and identify the status of each integrated tools for providing smooth functioning across the entire log system. In this paper, we discussed about the implementation of our orchestration framework, configuration details for communication across log systems and case study.
    Keywords: Log management; container; orchestration.

  • A Comparison of Halal Inspection Process between Federal and State Halal Certification Body in Malaysia   Order a copy of this article
    by Mohd Zabiedy Mohd Sulaiman, Nurulhuda Noordin, Nor Laila Md Noor, Ahmad Iqbal Hakim Suhaimi, Wan Abdul Rahim Wan Mohd Isa 
    Abstract: The rising demand for halal certified products and services is due to the rapid growth of the worlds Muslims population. Halal certification has become an important system for the award of the halal status to product and services. The halal certification systems need to follow the sharia or the Islamic law diligently to ensure that products and services to be certified are in compliance with Islamic law. Halal inspection is the key component that details out the sharia compliance and failure to do so is detrimental to the compliance. As the worldwide demand for halal certified products and services grows, there is a pressing need to have efficient and effective halal certification systems to serve the worldwide Muslim community through several certification bodies. Halal inspection poses a challenge as the different sects of Muslims may have different interpretations of halal inspection and resources needed to perform halal inspection in countries where Muslims are minorities may be limited. To understand the situation further, it is important to identify issues of halal inspection among different Halal Certification Bodies. Malaysia is a leading halal certification provider and exemplifies the situation where halal certification is administered by different organizational bodies as halal certification is awarded by both federal and state level Islamic bodies. A study on the issues and problems of federal and state level halal certification practices can help gain an understanding of the situation. The aim of halal inspection study is to investigate the issues and differences in the practices of halal inspection between the federal and state Halal Certification Body in Malaysia. This study employs a qualitative approach using interviews with halal certification experts. The findings identify several problems in halal inspection between both levels that may influence the halal certification efficiency. The outcome will be helpful in the search for an improved technique to utilize information technology to empower the existing certification systems.
    Keywords: Halal Inspection; Halal Certification; Halal Industry; Halal Certification Body; Halal Authority; Information Technology; Malaysia.

  • Sensor Network Design for Smart Building   Order a copy of this article
    by Abdenour Kifouche, Redha Hamouche, Remy Kocik, Geneviève Baudoin 
    Abstract: This article has two major contributions. The first one deals with energy efficiency and pollution issues in buildings. Our solution is to develop, deploy and operate a sensor network for building monitoring. Regarding existing solutions, our network is based on generic and modular sensors that can collect several data such as temperature, carbon monoxide, etc. Subsequently, these data are forwarded to a base station that stores it in a database. By providing a human machine interface, these data can be visualized and processed in real time. The second contribution is related to a feedback from the development of our sensor network. We identified challenges related to this development including significant development time, energy constraints, large scale network, costs, etc. To overcome these challenges, this article proposes also to explore new development methodology based on a model driven approach that reduces costs and efforts and ensures consistency of the development.
    Keywords: smart building; smart city; wireless sensor network; sensor design; model-driven development; generic modelling environment.

  • Comparative Analysis on Seed Point Placement and Magnitude Based Visual Enhancement for Streamlines Generation   Order a copy of this article
    by Yusman Azimi Yusoff, Farhan Mohamed 
    Abstract: This paper presents an improved seed point placement to locate initial seed points based on magnitude value. The vector field is separated in to grid to ensure the uniformity in generating streamlines and broader streamlines coverage, thus reducing poor visualization information especially near to visualization boundary. An evaluation using Mean Square Error is conducted to evaluate the improvement in term of streamlines placement uniformity. Result shows that proposed method able to come out with lower Mean Square Error value compared to evenly-spaced in across different separation distance, resulting better streamlines control to produce uniform visualization result. Finally, the proposed method can be improved in many aspects to come out with a better visualization result in 2 and possibly 3 dimension flow visualization.
    Keywords: Seed Point Placement; Seed Point Distribution; Streamlines; Flow Visualization.

  • The Implementation of Fuzzy Logic Controller for Defining the Ranking Function on Malay Retrieval System   Order a copy of this article
    by Shaiful Bakhtiar Rodzman, Normaly Kamal Ismail, Nurazzah Abd Rahman, Zulhilmi Mohamed Nor 
    Abstract: Ranking is likely the most important process of an Information Retrieval (IR) system that will be used to evaluate and measure the effectiveness of an IR system. This paper aims to produce the implementation of Fuzzy Logic Controller of Mamdani-type Fuzzy Inference System for defining the ranking function by using the BM25 Model in the Malay IR System that also includes the Malay Stemmer. The result of the ranking function then will be compared to the result of Vector Space Model that is also applied in Malay IR System and be evaluated using relevant document by the Hadith expert. The results showed that FBMIR has slightly outperformed Vector Space Model on 3 Topic Set of query results such as Iman,Ilmu and Wuduk on the Precision at Rank 10 and the percentage of no relevant document in the top ten retrieved measures.
    Keywords: Fuzzy Logic; Malay Text Corpus; fuzzy set; fuzzy rule; Vector Space model; Probabilistic model; BM25 model; ranking function.