180 research outputs found

    Metamodelling Approach To Support Disaster Management Knowledge Sharing

    Get PDF
    Handling uncertain events that could happen anytime and anywhere and dealing with many complex systems interconnected physically and socially makes Disaster Management (DM) a multidisciplinary endeavor and a very difficult domain to model. In this paper we present a development and validation of a Disaster Management Metamodel (DMM), a language that we develop specific for describing DM domain. The metamodel, a precise definition of the constructs and rules needed for creating the semantic models of DM domain consists of four views based on four DM phases including Mitigation, Preparedness, Response and Recovery-phase classes of concept. A Model Importance Factor (MIF) criterion is used to identify 10 existing disaster management models to evaluate the expressiveness and the completeness of DMM. The paper presents the synthesis process and the resulting metamodel, as a foundational component to create a Disaster Management Decision Support System (DMDSS) to unify, facilitate and expedite access to DM expertise

    Effect of concentration of chitosan on the mechanical, morphological and optical properties of tapioca starch film

    Get PDF
    Recently, incorporation of natural filler such as chitosan into edible film to produce food packaging material is of particular interest due to the improvement in the properties of the film such as mechanical, morphological and optical properties of the edible film. In this work, tapioca starch-based edible film was prepared with different concentrations of chitosan; 0, 20, 40, 60, 80% w/w of dry starch solid weight. The effects of varying the chitosan concentration on the mechanical properties (tensile strength (TS), elongation at break (EAB), and Young modulus (YM)), morphological and optical properties (color and transparency) of the edible films were investigated. There was 492% increment in TS value of the edible films when chitosan was added up to 60% w/w (21.23 MPa) compared to neat starch film (3.58 MPa). The 60% w/w chitosan films exhibited smooth and even structure which indicated both chitosan and tapioca starch compounds were blended homogeneously. However, 60% w/w chitosan film exhibited very high YM value (2842.5 MPa) and low EAB value (2.46%) which might limit its application. Effects of chitosan concentration on optical properties could be considered negligible. The improvements in TS and morphological structure of the edible films will be beneficial for the potential application of film as food packaging material in which high TS is important to protect the structure of food and while morphological structure can be related to the aesthetical appearance of the food packaging materials

    Development and validation of a disaster management metamodel (DMM)

    Get PDF
    Disaster Management (DM) is a diffused area of knowledge. It has many complex features interconnecting the physical and the social views of the world. Many international and national bodies create knowledge models to allow knowledge sharing and effective DM activities. But these are often narrow in focus and deal with specified disaster types. We analyze thirty such models to uncover that many DM activities are actually common even when the events vary. We then create a unified view of DM in the form of a metamodel. We apply a metamodelling process to ensure that this metamodel is complete and consistent. We validate it and present a representational layer to unify and share knowledge as well as combine and match different DM activities according to different disaster situations

    Common investigation process model for database forensic investigation discipline

    Get PDF
    Current digital forensic process models are often found to be unsatisfactory due to the fact that they do not provide process model with opportunities to be actively involved database forensic investigation. This study presents common database forensic investigation process, which is proposed by reviewing a few particular digital investigation process models that have created and then identified the frequently common processes phases concentrates. Results of this study showed that with the determining of the frequently shared process, it could be easier for the new users to recognize the processes and also to serve as the basic fundamental concept for the improvement of a new set of processes. Thus, proposing this kind of process model may help to resolve the problems and difficulties associated with database forensic in general

    Security-Based BYOD Risk Assessment Metamodelling Approach

    Get PDF
    Rapid changes in mobile computing and modern devices, for example, smartphones, tablets and iPads encouraged the employees to use their personal devices at the workplace. Bring Your Own Devices (BYOD) phenomenon has become pervasive and on-demand for business purposes. Nowadays, employees are allowed to bring personal devices to their workplace. Nevertheless, organizations are practicing BYOD to increase efficiency, work productivity, and cost-saving which lead to employee’s satisfaction. However, BYOD may cause harm in an organization if there are no security policies, regulations and management of the employee’s devices. The common security threats engaged to BYOD implementation are data leakage, exposed to malicious malware and sensitive corporates information. Hence, this study proposed a strategic solution, which is Security-Based BYOD Risk Assessment Metamodel (Security-Based BYODRAM) in reducing BYOD-related issues. The existing BYOD models were reviewed to identify the important concepts in the metamodel development. The Meta Object Facility (MOF) language was used to develop the proposed metamodel

    The impact of customer relationship management on business performance. Chapter 9

    Get PDF
    This study attempts to determine the most significant factors of contributing CRM process to improve a business performance in Small Medium Enterprises (SME’s) firm. The factors utilized based on Customer Relationship Management (CRM) process as sales, marketing and services. The data collections from 114 SME’s firms were gathered in field survey. The findings indicate that firms with improved CRM process enjoy better organizational performance. Moreover, the results revealed that services as a successful key of CRM processes are more affected by combination of managerial commitment, cultural change and a combination of resource to achieve improving business performance. Research on the CRM processes has been fragmented due to various perspectives onbusiness performance

    Disaster Management (DM) Model Transformations Framework

    Get PDF
    Metamodelling produces a ‘metamodel’ capable of generalizing the domain. A metamodel gathers all domain concepts and their relationships. It enables partitioning a domain problem into sub-problems. Decision makers can then develop a variety of domain solutions models based on mixing and matching solutions for sub-problems indentified using the metamodel. A repository of domain knowledge structured using the metamodel would allow the transformation of models generated from a higher level to a lower level according to scope of the problem on hand. In this paper, we reveal how a process of mixing and matching disaster management actions can be accomplished using our Disaster Management Metamodel (DMM). The paper describes DM model transformations underpinned by DMM. They are illustrated benefiting DM users creating appropriate DM solution models from extant partial solutions

    An assessment of cybersecurity awareness level among Northeastern University students in Nigeria

    Get PDF
    The world economy today has adopted the internet as a medium of transactions, this has made many organizations use the internet for their daily activities. With this, there is an urgent need to have knowledge in cybersecurity and also how to defend critical assets. The objective of this paper is to identify the level of cybersecurity awareness of students in Northeastern Nigeria. A quantitative approach was used for data collection and cyberbully, personal information, internet banking, internet addiction, and Self-protection were the items ask for cybersecurity awareness level identification. Descriptive analysis was performed for initial result findings using SPSS and OriginPro for graphical design. the preliminary result shows of the students have some basic knowledge of cybersecurity in an item like internet banking, while other items like cyberbully, self-protection and, internet addiction result show moderate awareness, the students' participation based on gender, males constitute 77.1% i.e. (N=340) and females constitute 22.9% i.e. (N=101). Future research would concentrate on designing awareness programs that would increase the level of their awareness especially the students in the Northeastern part of Nigeria

    Towards adapting metamodeling approach for the mobile forensics investigation domain

    Get PDF
    Mobile phones have become quite important tools in the modern world. The forensics field heavily relies on knowledge as an important resource. Due to the ongoing changes in digital technology, the power of knowledge enables innovation and assists in establishing proper standards and procedures. As such, it is necessary to establish a relationship between the information derived from knowledge to form new concepts and ideas. Knowledge in mobile forensics is scattered and huge. Hence, this leads to lack of knowledge management in mobile forensics. In addition, lead to complexity of investigation for new investigators, ambiguity in concepts and terminologies of mobile forensics domain and waste time to understand mobile forensics domain. Therefore, mobile forensics investigators are quite suffering with forensics investigation processes in their domain. This paper will develop a new approach for mobile forensics domain which is based on metamodeling. This approach contributes to unify common concepts of mobile forensics. It also provides many benefits which include simplifying the investigation process and guide investigations team, capture and reuse specialized forensic knowledge and support training and knowledge management activities. Furthermore, it reduces complexity and ambiguity in mobile forensic domai Towards Adapting Metamodeling approach for the Mobile Forensics Investigation Domain

    A review of support vector machine-based intrusion detection system for wireless sensor network with different kernel functions

    Get PDF
    Wireless sensor network (WSN) is among the popular communication technology which capable of self-configured and infrastructure-less wireless networks to monitor physical or environmental conditions. WSN also is the most standard services employed in commercial and industrial applications, because of its technical development in a processor, communication, and low-power usage of embedded computing devices. However, WSN is vulnerable due to the dynamic nature of wireless network. One of the best solutions to mitigate the risk is implementing Intrusion Detection System (IDS) to the network. Numerous researches were done to improve the efficiency of WSN-IDS because attacks in networks has been evolved due to the rapid growth of technology. Support Vector Machine (SVM) is one of the best algorithms for the enhancement of WSN-IDS. Nevertheless, the efficiency of classification in SVM is based on the kernel function used. Since dynamic environment of WSN consist of nonlinear data, linear classification of SVM has limitations in maximizing its margin during the classification. It is important to have the best kernel in classifying nonlinear data as the main goal of SVM to maximize the margin in the feature space during classification. In this research, kernel function of SVM such as Linear, RBF, Polynomial and Sigmoid were used separately in data classification. In addition, a modified version of KDD’99, NSL-KDD was used for the experiment of this research. Performance evaluation was made based on the experimental result obtained. Finally, this research found out that RBF kernel provides the best classification result with 91% accuracy
    corecore