Search results

1 – 7 of 7
Article
Publication date: 23 February 2015

Abdelaziz Boutrid, M. Chettibi, S. Yahyaoui and K Talhi

This research aim to assess the effect of absorption on the mechanical properties of sandstone rocks using a servo-controlled testing machine, stress-strain curves were obtained…

Abstract

This research aim to assess the effect of absorption on the mechanical properties of sandstone rocks using a servo-controlled testing machine, stress-strain curves were obtained from which the uni-axial compressive strength, Young’s modulus and the brittleness index were measured for specimens prepared from a single block of Sandstone from the Hassi Messaoud site investigation, Algeria. To see how the strength properties were affected by changes in absorption content such as are likely to occur on site, the specimens were divided into three groups which were prepared for testing under different conditions of absorption equilibrium.

Details

World Journal of Engineering, vol. 12 no. 1
Type: Research Article
ISSN: 1708-5284

Keywords

Article
Publication date: 10 April 2017

Guan Yingbin, Wang Xinghen and Guo Shengwen

The purpose of study is to develop methods for damage prevention and production safety.

Abstract

Purpose

The purpose of study is to develop methods for damage prevention and production safety.

Design/methodology/approach

In this study, water aquifers in various districts of the Merlin Temple coal-mining area number 3-1 were examined using a fuzzy comprehensive evaluation. Using FLAC-3D software, a three-dimensional numerical model based on the geological conditions of the first mining area was built to produce a numerical simulation of the fissure-zone and caving development in the area.

Findings

The simulation results, together with the traditional empirical formula, were used to produce a contour map of the distribution of these characteristics. This enabled areas to be classified according to various safety factors.

Originality/value

On the basis of the water richness in the area, coal-roof aquifers and the safety factors of different districts, as well as comprehensive coal-roof water-flow conditions and their associated dangers could be better understood.

Details

World Journal of Engineering, vol. 14 no. 2
Type: Research Article
ISSN: 1708-5284

Keywords

Book part
Publication date: 29 May 2023

Divya Nair and Neeta Mhavan

A zero-day vulnerability is a complimentary ticket to the attackers for gaining entry into the network. Thus, there is necessity to device appropriate threat detection systems and…

Abstract

A zero-day vulnerability is a complimentary ticket to the attackers for gaining entry into the network. Thus, there is necessity to device appropriate threat detection systems and establish an innovative and safe solution that prevents unauthorised intrusions for defending various components of cybersecurity. We present a survey of recent Intrusion Detection Systems (IDS) in detecting zero-day vulnerabilities based on the following dimensions: types of cyber-attacks, datasets used and kinds of network detection systems.

Purpose: The study focuses on presenting an exhaustive review on the effectiveness of the recent IDS with respect to zero-day vulnerabilities.

Methodology: Systematic exploration was done at the IEEE, Elsevier, Springer, RAID, ESCORICS, Google Scholar, and other relevant platforms of studies published in English between 2015 and 2021 using keywords and combinations of relevant terms.

Findings: It is possible to train IDS for zero-day attacks. The existing IDS have strengths that make them capable of effective detection against zero-day attacks. However, they display certain limitations that reduce their credibility. Novel strategies like deep learning, machine learning, fuzzing technique, runtime verification technique, and Hidden Markov Models can be used to design IDS to detect malicious traffic.

Implication: This paper explored and highlighted the advantages and limitations of existing IDS enabling the selection of best possible IDS to protect the system. Moreover, the comparison between signature-based and anomaly-based IDS exemplifies that one viable approach to accurately detect the zero-day vulnerabilities would be the integration of hybrid mechanism.

Details

Smart Analytics, Artificial Intelligence and Sustainable Performance Management in a Global Digitalised Economy
Type: Book
ISBN: 978-1-80382-555-7

Keywords

Article
Publication date: 14 April 2020

Mona Mohamed, Joyram Chakraborty and Sharma Pillutla

The purpose of this study is to examine the effects of culture on the cross-cultural design of the recognition-based graphical password (RBG-P) interface as inferred from Chinese…

Abstract

Purpose

The purpose of this study is to examine the effects of culture on the cross-cultural design of the recognition-based graphical password (RBG-P) interface as inferred from Chinese and Saudi subjects’ image selections.

Design/methodology/approach

The authors use a between-group design adopted using two groups of participants from China and the Kingdom of Saudi Arabia to measure the differences caused by the effects of cultures on graphical password image selections. Three hypotheses have been tested in a four-week long study carried out using two questionnaires and an RBG-P webtool designed for images selection.

Findings

The results have indicated that participants are equally biased not only toward their own culture but also depending on their opinions about other cultures. In addition, when creating the password, it has been observed that culture not only influenced the image selection to create the password but also have an effect on the sequence of the images forming the password.

Research limitations/implications

Appropriately used image selection differences can be used appropriately in cross-cultural designs that will lead to better development of culturally adaptive interfaces that will boost the security posture of RBG-P authentication.

Practical implications

Some RBG-P interfaces that are produced outside the designer’s culture may suffer the effects of cultural differences. Hence, to incorporate culture in the interface, authentication systems within applications should be flexible by designing images that fit the culture in which the software will be used. To this end, access control interface testing should also be carried out in the environmental and cultural context in which it is will be used.

Originality/value

This paper provides useful information for international developers who develop cross-cultural usable secure designs. In such environments, the cross-culturally designs may have significant effects on the acceptability and adoption adaptation of the interface to multi-cultural settings.

Details

Journal of Systems and Information Technology, vol. 22 no. 1
Type: Research Article
ISSN: 1328-7265

Keywords

Article
Publication date: 28 August 2023

Ganesh Tanpure, Vinod Yadav, Rakesh Jain and Gunjan Soni

Product Lifecycle Management (PLM) systems have gained wide popularity for their role in manufacturing organizations for creating, managing and distributing product data. These…

Abstract

Purpose

Product Lifecycle Management (PLM) systems have gained wide popularity for their role in manufacturing organizations for creating, managing and distributing product data. These systems are one of various enterprise systems which are required for smooth functioning and meeting the scaling up requirements organization. However, with introduction of cloud technology and other industry 4.0 initiatives, there has been focus on moving the on-premises IT application to the cloud. Such a move needs to be carried out by identifying and evaluating various challenges. This paper aims to discuss the aforementioned objective.

Design/methodology/approach

The challenges identified through literature review have also been confirmed to be present via interview, system observation and documentation review through case study-based validation in an automotive component manufacturing industry.

Findings

The article identifies needs and challenges of cloud PLM systems and presents a generic framework for developing an approach for cloud PLM journey for an organization. The article also provides an approach for resolving the different challenges to realizing the designed system.

Originality/value

The simplified generic framework has been presented for use by industry professionals and researchers for designing cloud PLM systems that would fulfill expectations of different levels of stakeholders.

Details

Business Process Management Journal, vol. 29 no. 6
Type: Research Article
ISSN: 1463-7154

Keywords

Article
Publication date: 7 November 2016

Galal H. Elgemeie and Doaa M. Masoud

This paper aims to focus on the most popular technique nowadays, the use of microwave irradiation in organic synthesis; in a few years, most chemists will use microwave energy to…

1277

Abstract

Purpose

This paper aims to focus on the most popular technique nowadays, the use of microwave irradiation in organic synthesis; in a few years, most chemists will use microwave energy to heat chemical reactions on a laboratory scale. Also, many scientists use microwave technology in the industry. They have turned to microwave synthesis as a frontline methodology for their projects. Microwave and microwave-assisted organic synthesis (MAOS) has emerged as a new “lead” in organic synthesis.

Design/methodology/approach

Using microwave radiation for synthesis and design of fluorescent dyes is of great interest, as it decreases the time required for synthesis and the synthesized dyes can be applied to industrial scale.

Findings

The technique offers many advantages, as it is simple, clean, fast, efficient and economical for the synthesis of a large number of organic compounds. These advantages encourage many chemists to switch from the traditional heating method to microwave-assisted chemistry.

Practical implications

This review highlights applications of microwave chemistry in organic synthesis for fluorescent dyes. Fluorescents are a fairly new and very heavily used class of organics. These materials have many applications, as a penetrant liquid for crack detection, synthetic resins, plastics, printing inks, non-destructive testing and sports ball dyeing.

Originality/value

The aim value of this review is to define the scope and limitation of microwave synthesis procedures for the synthesis of novel fluorescent dyes via a simple and economic way.

Details

Pigment & Resin Technology, vol. 45 no. 6
Type: Research Article
ISSN: 0369-9420

Keywords

Article
Publication date: 22 November 2024

Yudi Fernando, Gaik Chin Eing and Ika Sari Wahyuni-TD

This paper aims to review how the metaverse influences and contributes to the halal industry, particularly focusing on halal logistics (HL), halal supply chain management (HSCM…

Abstract

Purpose

This paper aims to review how the metaverse influences and contributes to the halal industry, particularly focusing on halal logistics (HL), halal supply chain management (HSCM) and consumer behavior.

Design/methodology/approach

This paper analyzed scholarly studies to investigate existing literature and current as well as future trends in the adoption of the metaverse in HL, supply chains and consumer behavior. The study explores the thematic structure of the current knowledge landscape, identifies research gaps and highlights potential directions for future research at the intersection of the metaverse, supply chain and halal behavior. The authors identified 286 papers that examined the integration of the metaverse with HL practices, supply chain management strategies and consumer behavior in alignment with Islamic principles and standards.

Findings

The results indicate a limited number of studies on the successful adoption of the metaverse in HL, HSCM and behavioral research. This paper has proposed a framework for the metaverse-supply chain and halal behavior. The framework can serve as a reference for scholars and practitioners on how to incorporate advanced technology to engage with and predict market demand. Additionally, the metaverse-supply chain framework can be used to align with halal supply chain practices based on customer needs and preferences. The metaverse integrates the virtual world, enabling halal supply chain networks to enhance virtual reality, digital experiences and business performance.

Practical implications

The halal industry can showcase products and services through virtual scenarios, avatars and shops. By developing a halal-compliant metaverse, the halal industry can facilitate activities such as online sales, online payments and virtual marketing, thereby enabling a digital business transformation. Embracing the metaverse can improve business efficiency and influence consumer behavior, decisions and compliance with Shariah principles.

Originality/value

The authors argue that this paper is at the forefront and will serve as a reference for future research. This paper is distinct from existing literature, as it focuses on metaverse adoption and its correlation with a Shariah compliance framework in logistics, supply chain and behavioral aspects. Through its findings, this framework aims to inspire further empirical research and provide guidance and solutions to foster sustainable development in the halal industry.

Details

Journal of Islamic Marketing, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1759-0833

Keywords

1 – 7 of 7