Authors:Abdulsalam K. Alhazmi, Nasr Alsakkaf, Mohammed Motahar, Ghadah Alqubati Pages: 1 - 8 Abstract: Enterprise Resource Planning Systems (ERPs) are of vital importance to all institutions, especially those involved in higher education (HEIs). However, the level of their implementation among these institutions has shown poor results. Currently, higher education institutions in Malaysia have yet to explore factors leading to the successful implementation of ERPs. There is a lack of research on ERP systems implemented in HEIs, especially regarding their success factors. As such, a literature review was conducted on ERPs in higher education institutions, discussing the advantages of different systems; their obstacles to implementation; and their success factors in HEIs. This review concluded with two theories by which to define the most critical and impactful factors to these systems' success. It is hoped that this review will help HEIs to understand the factors that might lead to the successful implementation of ERPs. In addition, implementing ERPs successfully in higher education will help develop a global competitive advantage, as well as affect the satisfaction levels of stakeholders in HEIs. Whilst investments in ERP systems by modern organisations are becoming increasingly common – especially amongst higher education institutions - the lack of previous empirical research in this environment has neglected the potential benefits of these systems. PubDate: 2023-03-01 DOI: 10.20428/jst.v27i2.2051 Issue No:Vol. 27, No. 2 (2023)
Authors:Asma'a Hassan Salem, Ghaleb H. Algaphari Pages: 9 - 31 Abstract: Despite the importance of resource allocation issues, there is no systematic, comprehensive and detailed survey on resource allocation approaches in the fog-computing context. In this article, we provide a Systematic Literature Review (SLR) on the resource allocation approaches in fog environments in the form of a classical taxonomy to recognize the state-of-the-art mechanisms on this important topic and provide open issues. The presented taxonomy is categorized into three main fields: centralized allocation, decentralized allocation, and integrated allocation (published between 2017 and March 2022). According to what is known in fog computing, load balancing and service placement are among the most important basic parameters that ensure service quality. These fields are classified into four methods, approximate, exact, fundamental, and hybrid. In addition, this article investigates resource allocation metrics with all advantages and limitations related to chosen resource allocation mechanisms in networks. PubDate: 2023-03-01 DOI: 10.20428/jst.v27i2.2052 Issue No:Vol. 27, No. 2 (2023)
Authors:Shawqi Alwatiri, Zakarya Omar , Yousif A. Algabri Pages: 32 - 36 Abstract: People who live or work in areas where there have been armed conflicts may face the threat of landmines and explosive hazards, such as unexploded or abandoned ordnance, abandoned military vehicles, and equipment. Therefore, this is a tremendous obstacle to development and construction in such areas, which requires awareness of the threat and appropriate preventive action. This paper aims to facilitate the detection and elimination of planted landmines in Yemen. Two stages are proposed to be implemented in this study for the demining techniques: detection and clearance phases. The first phase uses a Quadcopter with detecting sensors to locate and map the mines' spot, while the second stage uses a Quadcopter to unload a mass on that determined location from a certain height. By employing these two stages, it is expected to quickly and accurately detect the locations of landmines. That will reduce risk, protect human lives, and provide a more efficient and safe way to sweep minefield workers using sample, small, and easy control equipment. PubDate: 2023-03-01 DOI: 10.20428/jst.v27i2.2053 Issue No:Vol. 27, No. 2 (2023)
Authors:Hamood. M. Yousef, Shehab Abdulhabib Alzaeemi Pages: 37 - 42 Abstract: This paper aims to study two approximate analytical methods for solving linear and nonlinear delay differential equations. Approximate approaches are shown in the Variational iteration method and the Adomian decomposition method. Through the conversion of some instances, including linear and nonlinear delay differential equations with initial values, by comparing different approximate methods. The results show that this procedure is accurate and adequate for DDE. Comparisons between the Adomian Decomposition Method and Variational Iteration Method results demonstrate the accuracy of the results obtained from both mentioned methods. The variational iteration method is efficient and convenient based on comparing the results and exact solutions. PubDate: 2023-03-01 DOI: 10.20428/jst.v27i2.2054 Issue No:Vol. 27, No. 2 (2023)
Authors:Meiad Jrad Hamood Aljrad, Kawther Al-Dhlan Pages: 43 - 47 Abstract: Although the Internet of Things (IoT) developers view human users as the weakest cybersecurity link and potentially a deciding factor in IoT security, IoT devices are exposed to a variety of security flaws and vulnerabilities, which most social engineers take advantage of to launch several data-collection attacks. For various purposes, this study looked at improving data security on MySQL databases and web pages by using TSL encryption protocols and the two algorithms (RSA & AES) that correlate with the Internet of Things environment and enable user authentication. The implementation was done on the proposed models and encryption methods used. This study aimed to protect the information that is shared on the Internet and connect IoT devices in a secure environment. The results revealed that the proposed study increased the level of protection with the help of complex conditions specified when registering the user and protecting it against attacks. As a result, one of the most important events that came true is the existence of cybersecurity. It is expected that this research will enhance the understanding of the IoT environment and exploit social engineering attacks to impose security on the IoT environment and preserve the rights of human users. PubDate: 2023-03-01 DOI: 10.20428/jst.v27i2.2055 Issue No:Vol. 27, No. 2 (2023)