322 research outputs found

    Enterprise Architecture Practice and Challenges in Achieving Sustainable Digital Transformation in Developing Countries

    Get PDF
    Information and communication technology (ICT) is crucial for enhancing organisations\u27 economic, environmental, and social sustainability, while Enterprise Architecture (EA) supports developing and managing organisational ICT resources. However, since established EA standards and frameworks are primarily deployed in the context of developed countries, there is a need to understand the unique cultural, institutional, and resource constraints developing countries face in implementing EA. This empirical study investigates EA\u27s current practices and challenges in developing countries, specifically Bangladesh, to support sustainable digital transformation. The research contributes to the EA understanding and sustainable digital transformation through literature analysis and interviews with professionals from diverse industries. The findings highlight a lack of understanding of EA among organisations striving to integrate environment, social and governance (ESG) factors into sustainability and ICT deployments. This study offers implications to research and practice related to challenges in practising EA in developing countries to support digital transformation and sustainability

    The Role of Enterprise Architecture in Ensuring ESG Factors for Sustainability

    Get PDF
    Organisations increasingly recognise the importance of environmental, social, and governance (ESG) aspects for ensuring organisational and global sustainability. Digital transformation is helping organisations to integrate ESG factors into their operations and leverage information technology for economic, social, and environmental benefits. Enterprise architecture (EA) is a strategic approach that integrates business objectives with information technology systems and infrastructure to align with organisational goals and enable effective management, governance, and decision-making. Despite the growing recognition of the significance of ESG factors in promoting sustainable business practices, there are still obstacles to assuring ESG for organisational sustainability. The article explores the key issues in incorporating ESG factors for organisational sustainability and suggests ways EA can help address these challenges. The paper also proposes a conceptual design for the role of EA in ensuring ESG factors for organisational sustainability

    Comparative Study and Analysis on Integrity of Data Files Using Different Tools and Techniques

    Get PDF
    Digital forensic investigation is the scientific process of collection, preservation, examination, analysis, documentation and presentation of digital evidence from digital devices, so that the evidence is in compliance with legal terms and acceptable in a court of law. Integrity of the digital evidence is an indispensable part of the investigation process and should be preserved to maintain the chain of custody. This is done through hashing technique using standardized forensic tools. However, while handling the evidences , lack of knowledge might lead to unintentional alteration of computed hash. This violates the chain of custody and makes the evidence inadmissible in a court of law. In this paper, our objective is to determine the different conditions under which the original hash value of a digital evidence changes. For this, we create different scenarios using sample data files and compute their hash values. A comparative study and analysis are done to determine in which scenario the original hash value of the data file changes. The results of the research will prove useful and essential for Criminal Justice Functionaries in gaining knowledge about various conditions leading to the change in hash value of digital evidence and therefore, avoid its accidental alteration during forensic investigation/examination

    Extending the Real-Time Maude Semantics of Ptolemy to Hierarchical DE Models

    Full text link
    This paper extends our Real-Time Maude formalization of the semantics of flat Ptolemy II discrete-event (DE) models to hierarchical models, including modal models. This is a challenging task that requires combining synchronous fixed-point computations with hierarchical structure. The synthesis of a Real-Time Maude verification model from a Ptolemy II DE model, and the formal verification of the synthesized model in Real-Time Maude, have been integrated into Ptolemy II, enabling a model-engineering process that combines the convenience of Ptolemy II DE modeling and simulation with formal verification in Real-Time Maude.Comment: In Proceedings RTRTS 2010, arXiv:1009.398

    Redefining Islamic garden: comparative analysis of approaches, ideas and design framework

    Get PDF
    The term Islamic garden has been defined in various ways considering different aspects and values. These definitions draw a broader perspective to Islamic garden, a key feature of Islamic civilization throughout the history. This paper aims to analyze these views and compare them in order to reach toward a holistic definition for Islamic garden- its origin, evolution, principles and essence. Also searching for a way to revitalize the original essence and application of Islamic gardens in the contemporary societies are discussed in a brief way

    Multiple Migration and Use of Ties: Bangladeshis in Italy and Beyond

    Get PDF
    This article analyses previous multiple migratory trajectories of Bangladeshifirst generationmigrants before their arrival in Italy and within Italy. It also uncovers the role of social net-works and transnational ties in their multiple migrations. Thefindings show that theirfirstinternational migration was mainly shaped by their family\u2019s socio-economic condition andtransnational kinship networks. They already had someone from their family or close relativesin the preferred country with whom they were connected. Their onward relocations until arriv-ing in Italy, in most cases, was to achieve the socio-economic success and legal status thatthey had failed to attain in theirfirst and subsequent destinations, but the transnational connec-tions with friends or acquaintances are a key resource facilitating these remigrations. Banglade-shis who arrived in Italy from various countries mostly had networks, either with someonefrom their local district in Bangladesh or with their earlier fellow migrants who moved to Italybefore the

    Smart detection and prevention procedure for DoS attack in MANET

    Get PDF
    A self-organized wireless communication short-lived network containing collection of mobile nodes is mobile ad hoc network (MANET). The mobile nodes communicate with each other by wireless radio links without the use of any pre-established fixed communication network infrastructure or centralized administration, such as base stations or access points, and with no human intervention. In addition, this network has potential applications in conference, disaster relief, and battlefield scenario, and have received important attention in current years. There is some security concern that increases fear of attacks on the mobile ad-hoc network. The mobility of the NODE in a MANET poses many security problems and vulnerable to different types of security attacks than conventional wired and wireless networks. The causes of these issues are due to their open medium, dynamic network topology, absence of central administration, distributed cooperation, constrained capability, and lack of clear line of defense. Without proper security, mobile hosts are easily captured, compromised, and attacked by malicious nodes. Malicious nodes behavior may deliberately disrupt the network so that the whole network will be suffering from packet losses. One of the major concerns in mobile ad-hoc networks is a traffic DoS attack in which the traffic is choked by the malicious node which denied network services for the user. Mobile ad-hoc networks must have a safe path for transmission and correspondence which is a serious testing and indispensable issue. So as to provide secure communication and transmission, the scientist worked explicitly on the security issues in versatile impromptu organizations and many secure directing conventions and security measures within the networks were proposed. The goal of the work is to study DoS attacks and how it can be detected in the network. Existing methodologies for finding a malicious node that causes traffic jamming is based on node’s retains value. The proposed approach finds a malicious node using reliability value determined by the broadcast reliability packet (RL Packet). In this approach at the initial level, every node has zero reliability value, specific time slice, and transmission starts with a packet termed as reliability packet, node who responded properly in specific time, increases its reliability value and those nodes who do not respond in a specific time decreases their reliability value and if it goes to less than zero then announced that it’s a malicious node. Reliability approach makes service availability and retransmission time

    PROTEUS2: a web server for comprehensive protein structure prediction and structure-based annotation

    Get PDF
    PROTEUS2 is a web server designed to support comprehensive protein structure prediction and structure-based annotation. PROTEUS2 accepts either single sequences (for directed studies) or multiple sequences (for whole proteome annotation) and predicts the secondary and, if possible, tertiary structure of the query protein(s). Unlike most other tools or servers, PROTEUS2 bundles signal peptide identification, transmembrane helix prediction, transmembrane β-strand prediction, secondary structure prediction (for soluble proteins) and homology modeling (i.e. 3D structure generation) into a single prediction pipeline. Using a combination of progressive multi-sequence alignment, structure-based mapping, hidden Markov models, multi-component neural nets and up-to-date databases of known secondary structure assignments, PROTEUS is able to achieve among the highest reported levels of predictive accuracy for signal peptides (Q2 = 94%), membrane spanning helices (Q2 = 87%) and secondary structure (Q3 score of 81.3%). PROTEUS2's homology modeling services also provide high quality 3D models that compare favorably with those generated by SWISS-MODEL and 3D JigSaw (within 0.2 Å RMSD). The average PROTEUS2 prediction takes ∼3 min per query sequence. The PROTEUS2 server along with source code for many of its modules is accessible a http://wishart.biology.ualberta.ca/proteus2

    Modification of the L1-CAM carboxy-terminus in pancreatic adenocarcinoma cells

    Get PDF
    The neural cell adhesion molecule L1 has recently been shown to be expressed in pancreatic adenocarcinoma (PDAC) cells. In this report, we demonstrate that L1 is expressed by moderately- to poorly-differentiated PDAC cells in situ, and that L1 expression is a predictor of poor patient survival. In vitro, reduced reactivity of an anti-L1 carboxy-terminus-specific antibody was observed in the more poorly differentiated fast-growing (FG) variant of the COLO357 population, versus its well-differentiated slow-growing (SG) counterpart, even though they express equivalent total L1. The carboxy-terminus of L1 mediates binding to the MAP kinase-regulating protein RanBPM and mutation of T1247/S1248 within this region attenuates the expression of malignancy associated proteins and L1-induced tumorigenicity in mice. Therefore, we reasoned that the differential epitope exposure observed might be indicative of modifications responsible for regulating these events. However, epitope mapping demonstrated that the major determinant of binding was actually N1251; mutation of T1247 and S1248, alone or together, had little effect on C20 binding. Moreover, cluster assays using CD25 ectodomain/L1 cytoplasmic domain chimeras demonstrated the N1251-dependent, RanBPM-independent stimulation of erk phosphorylation in these cells. Reactivity of this antibody also reflects the differential exposure of extracellular epitopes in these COLO357 sublines, consistent with the previous demonstration of L1 ectodomain conformation modulation by intracellular modifications. These data further support a central role for L1 in PDAC, and define a specific role for carboxy-terminal residues including N1251 in the regulation of L1 activity in PDAC cells

    Early versus late rehabilitation for stroke survivors: A prospective study

    Get PDF
    The aim of this study was to examine the optimum time of rehabilitation initiation after stroke in terms of disabilities, mobility and fall risk assessment. Data were collected prospectively at seven tertiary level health care centers in Bangladesh during the 36 months period from 2013 to 2016. All respondents were divided into four groups based on the initiation of rehabilitation as: a) 0-24 hours, b) 25-72 hours, c) 4-7 days and d) 8-60 days. Results show that significant improvement on stroke recovery, disabilities reduction, improvement in mobility restriction and reduction of fall risks in all the four groups but more improvement was observed in 0-24 hour’s group during follow-up after 3 and 12 weeks. On multinomial logistic regression analysis, the independent factors shows the mobility restriction and fall risk were more in the younger patients, male gender, married, hemorrhagic lesion and bilateral stroke
    corecore