10 research outputs found

    An Energy Efficient Data Collection Using Multiple UAVs in Wireless Sensor Network: A Survey Study

    Get PDF
       اليوم، مع التقدم العلمي والتكنولوجي في الروبوتات، والذكاء الاصطناعي، والسيطرة والحواسيب، المركبات البرية والجوية والبحرية قد تم الاهتمام بها. كما تم تحسين الطائرات بدون طيار (UAVs) بشكل كبير وهي مفيدة جدا للعديد من التطبيقات الهامة في الأعمال التجارية والبيئة الحضرية والعسكرية. أحد أهم استخدامات الطائرات بدون طيار في شبكات الاستشعار اللاسلكية (WSNs)  التي لديها طاقة منخفضة وقد لا تكون قادرة على الاتصال في مناطق واسعة. في هذه الحالة ، يمكن أن توفر الطائرة بدون طيار وسيلة لجمع بيانات WSN من جهاز واحد ونقلها إلى المستلم المقصود تركز هذه المقالة على مجال البحث في التطبيقات العملية للطائرات بدون طيار كجامع متنقل لشبكات الاستشعار اللاسلكية. أولا التحقيقات حول الطائرات بدون طيار المقترحة تم دراستها ومقارنة نقاط ضعفها مع بعضها البعض. وكذلك التحديات التقنية لتطبيقات الطائرات بدون طيار في شبكة الاستشعار اللاسلكية تم استكشافها.Today, with scientific and technological advances in robotics, artificial intelligence, control and computers, land, air, and sea vehicles, they have been considered. Unmanned aerial vehicles (UAVs) have also significantly improved and are very useful for many important applications in the business, urban and military environment. One of the important uses of UAVs in Wireless Sensor Networks (WSNs) is that devices with low energy and may not be able to communicate in large areas. Nevertheless, a UAV can provide a tool for collecting the data of WSN from one device and transmitting it to another device. This article focuses on the field of research on practical applications of UAVs as mobile collectors for wireless sensor networks. First, the investigations of the proposed UAV were studied and compared their weaknesses with each other. Then, the technical challenges of the applications of UAVs in the wireless sensor network were explored

    Critical success factors for ERP systems’ post-implementations of SMEs in Saudi Arabia: a top management and vendors’ perspective

    Get PDF
    Although numerous case studies have determined the critical success factors (CSFs) for enterprise resource planning (ERP) during the adoption and implementation stages, empirical investigations of CSFs for ERP in post-implementation stages (after going live) are in scarcity. As such, this study examined the influence of top management support and vendor support as CSFs on the post-implementation stage of ERP systems in small and medium enterprises (SMEs) established in the Kingdom of Saudi Arabia (KSA). A total of 177 end-users of ERP systems from two manufacturing organizations in KSA that had implemented on-premises ERP systems were involved in this study. Data gathered from structured questionnaires were analyzed using SmartPLS3 and SPSS software programs. The regression analysis was performed to assess the correlations among the variables. Out of seven CSFs identified from the literature, the impact of top management support was significant on user training, competency of internal Information Technology (IT) department, and effective communication between departments, but insignificant on continuous vendor support. Meanwhile, continuous vendor support had a significant influence on continuous integration of the system, but was insignificant on user interfaces and custom code. The study outcomes may serve as practical guidance for effective post-implementation in ERP systems. Referring to the proposed research model, ERP post-implementation success in KSA was significantly influenced by top management support, whereas continuous vendor support displayed a substantial impact on the continuous integration of ERP systems

    Prioritising Organisational Factors Impacting Cloud ERP Adoption and the Critical Issues Related to Security, Usability, and Vendors: A Systematic Literature Review

    Get PDF
    Abstract: Cloud ERP is a type of enterprise resource planning (ERP) system that runs on the vendor’s cloud platform instead of an on-premises network, enabling companies to connect through the Internet. The goal of this study was to rank and prioritise the factors driving cloud ERP adoption by organisations and to identify the critical issues in terms of security, usability, and vendors that impact adoption of cloud ERP systems. The assessment of critical success factors (CSFs) in on-premises ERP adoption and implementation has been well documented; however, no previous research has been carried out on CSFs in cloud ERP adoption. Therefore, the contribution of this research is to provide research and practice with the identification and analysis of 16 CSFs through a systematic literature review, where 73 publications on cloud ERP adoption were assessed from a range of different conferences and journals, using inclusion and exclusion criteria. Drawing from the literature, we found security, usability, and vendors were the top three most widely cited critical issues for the adoption of cloud-based ERP; hence, the second contribution of this study was an integrative model constructed with 12 drivers based on the security, usability, and vendor characteristics that may have greater influence as the top critical issues in the adoption of cloud ERP systems. We also identified critical gaps in current research, such as the inconclusiveness of findings related to security critical issues, usability critical issues, and vendor critical issues, by highlighting the most important drivers influencing those issues in cloud ERP adoption and the lack of discussion on the nature of the criticality of those CSFs. This research will aid in the development of new strategies or the revision of existing strategies and polices aimed at effectively integrating cloud ERP into cloud computing infrastructure. It will also allow cloud ERP suppliers to determine organisations’ and business owners’ expectations and implement appropriate tactics. A better understanding of the CSFs will narrow the field of failure and assist practitioners and managers in increasing their chances of success

    Cyber-Attack Prediction Based on Network Intrusion Detection Systems for Alert Correlation Techniques: A Survey

    Get PDF
    Network Intrusion Detection Systems (NIDS) are designed to safeguard the security needs of enterprise networks against cyber-attacks. However, NIDS networks suffer from several limitations, such as generating a high volume of low-quality alerts. Moreover, 99% of the alerts produced by NIDSs are false positives. As well, the prediction of future actions of an attacker is one of the most important goals here. The study has reviewed the state-of-the-art cyber-attack prediction based on NIDS Intrusion Alert, its models, and limitations. The taxonomy of intrusion alert correlation (AC) is introduced, which includes similarity-based, statistical-based, knowledge-based, and hybrid-based approaches. Moreover, the classification of alert correlation components was also introduced. Alert Correlation Datasets and future research directions are highlighted. The AC receives raw alerts to identify the association between different alerts, linking each alert to its related contextual information and predicting a forthcoming alert/attack. It provides a timely, concise, and high-level view of the network security situation. This review can serve as a benchmark for researchers and industries for Network Intrusion Detection Systems’ future progress and development

    Resource Exhaustion Attack Detection Scheme for WLAN Using Artificial Neural Network

    Get PDF
    IEEE 802.11 Wi-Fi networks are prone to many denial of service (DoS) attacks due to vulnerabilities at the media access control (MAC) layer of the 802.11 protocol. Due to the data transmission nature of the wireless local area network (WLAN) through radio waves, its communication is exposed to the possibility of being attacked by illegitimate users. Moreover, the security design of the wireless structure is vulnerable to versatile attacks. For example, the attacker can imitate genuine features, rendering classification-based methods inaccurate in differentiating between real and false messages. Although many security standards have been proposed over the last decades to overcome many wireless network attacks, effectively detecting such attacks is crucial in today’s real-world applications. This paper presents a novel resource exhaustion attack detection scheme (READS) to detect resource exhaustion attacks effectively. The proposed scheme can differentiate between the genuine and fake management frames in the early stages of the attack such that access points can effectively mitigate the consequences of the attack. The scheme is built through learning from clustered samples using artificial neural networks to identify the genuine and rogue resource exhaustion management frames effectively and efficiently in the WLAN. The proposed scheme consists of four modules which make it capable to alleviates the attack impact more effectively than the related work. The experimental results show the effectiveness of the proposed technique by gaining an 89.11% improvement compared to the existing works in terms of detection

    User resistance factors in post ERP implementation

    No full text
    Enterprise resource planning (ERP) systems are becoming mature technologies to support inter- and intracompany business processes. However, one of the factors frequently cited as the major reason for the failure of ERP system in post implementation is “User Resistance”. ERP implementation doesn’t finish after Go-Live, instead the real test of system starts when user begins using the system. The main purpose of this study is to investigate user resistance factors in ERP post implementation stage and the influence between the factors associated with the research model. Correlation analysis is used to investigate the influence between user resistances. To achieve this objectives quantitative method were conducted with 95 ERP end users. The result shows Resistance due to change, Change in Job content, User Expectations, Increased efforts, Lack of Education and User training, Usability issues and resistance to technology, Lack of user involvement in the development process, and Lack of communication between top management and end users are the factors behind user resistance. Recommendations and guideline to avoid user resistance in ERP post implementation are also presented. The benefits and outcomes of this study shall aid organizations to overcome user resistance in post ERP implementation

    The CSFs from the Perspective of Users in Achieving ERP System Implementation and Post-Implementation Success: A Case of Saudi Arabian Food Industry

    No full text
    Enterprise resource planning (ERP) systems have a major impact on the functioning of organizations and the development of business strategy. However, one of the main reasons that cause failure in ERP implementations to achieve the expected benefits is that the system is not fully accepted by end users. User rejection of the system is the second reason after time and budget overrun, while the fourth barrier to ERP post-implementation. Most studies have focused on ERP adoption and installation while neglecting post-implementation evaluation, which omits insights into the priority of ERP systems and CSFs from the stance of ERP users. Therefore, this study identified factors that led to user acceptance of the use of ERP systems at both implementation and post-implementation stages (after installation). In addition, this study assessed the interrelationship between the factors and the most influential factors toward user acceptance. A survey was conducted among pioneers of the food industry in Saudi Arabia, which included 144 ERP system users from assembly and manufacturing, accounts, human resources, warehouse, and sales departments. The descriptive-analytical approach was deployed in this study. As a result, project management, top management support, and user training had significant impacts on the efficacy of ERP system implementation. On the contrary, support for technological changes in new software and hardware, managing changes in systems, procedures, and work steps already in place within the organization, as well as user interfaces and custom code, displayed a direct impact on user acceptance of ERP systems post-implementation. This study is the first research that provides a rating of CSFs from the perspective of its users in Saudi Arabia. It also enables decision makers of food industries to better assess the project risks, implement risk-mitigation methods, create appropriate intervention techniques to discover the strengths and limitations of the ERP users, and value the “best of fit” solutions over “best practice” solutions when determining the most appropriate option for food industries

    The CSFs from the Perspective of Users in Achieving ERP System Implementation and Post-Implementation Success: A Case of Saudi Arabian Food Industry

    No full text
    Enterprise resource planning (ERP) systems have a major impact on the functioning of organizations and the development of business strategy. However, one of the main reasons that cause failure in ERP implementations to achieve the expected benefits is that the system is not fully accepted by end users. User rejection of the system is the second reason after time and budget overrun, while the fourth barrier to ERP post-implementation. Most studies have focused on ERP adoption and installation while neglecting post-implementation evaluation, which omits insights into the priority of ERP systems and CSFs from the stance of ERP users. Therefore, this study identified factors that led to user acceptance of the use of ERP systems at both implementation and post-implementation stages (after installation). In addition, this study assessed the interrelationship between the factors and the most influential factors toward user acceptance. A survey was conducted among pioneers of the food industry in Saudi Arabia, which included 144 ERP system users from assembly and manufacturing, accounts, human resources, warehouse, and sales departments. The descriptive-analytical approach was deployed in this study. As a result, project management, top management support, and user training had significant impacts on the efficacy of ERP system implementation. On the contrary, support for technological changes in new software and hardware, managing changes in systems, procedures, and work steps already in place within the organization, as well as user interfaces and custom code, displayed a direct impact on user acceptance of ERP systems post-implementation. This study is the first research that provides a rating of CSFs from the perspective of its users in Saudi Arabia. It also enables decision makers of food industries to better assess the project risks, implement risk-mitigation methods, create appropriate intervention techniques to discover the strengths and limitations of the ERP users, and value the “best of fit” solutions over “best practice” solutions when determining the most appropriate option for food industries

    Using Theory Integration to Explain Online Impulse Buying Behavior in Social Commerce

    No full text
    Online Impulse Buying Behavior (IBB) significantly increases and contributes to the total S-commerce revenue. Hence, understanding such behavior is critical for an online business to strengthen competitiveness, enhance revenue, and ensure business sustainability. The majority of the prior research used urge-to-buy (UBI) to examine online IBB instead of the actual IBB. Hence, the studies that differentiate between UBI and IBB are limited. Moreover, these studies have concentrated on the impact of consumer characteristics, website, and marketing factors, but they neglected the role of social factors. This study integrated Social Influence and Uses and Gratifications Theories to explore the social factors affecting online IBB. The findings indicate that social influences, entertainment, purposive value, and maintaining interpersonal connectivity influence IBB significantly. UBI also mediates the relationships between social influences and IBB. Impulsiveness moderates the indirect relationships between compliance, internalization, and IBB through UBI. This study has practical implications for social commerce designers, marketers, and managers
    corecore