Results in Journal Communications of the IBIMA: 181
(searched for: journal_id:(360309))
Communications of the IBIMA pp 1-12; doi:10.5171/2021.524370
The unprecedented development in the realm of Internet of Things in recent times has facilitated the adoption and integration of microcontrollers and sensors into a large variety of contexts and at a significant scale.
Communications of the IBIMA pp 1-18; doi:10.5171/2021.589003
Web 2.0 applications have provided researchers with vast quantities of Big Data, opening up new horizons for developing innovative analysis techniques that are applicable in multiple cognitive fields. Politics is definitely among them and is currently in a dynamically evolving range of these applications.
Communications of the IBIMA pp 1-7; doi:10.5171/2021.589235
Organizations struggle to strike the right balance between flexibility and security for remote work. With the major portion of the workforce in every country working from home during the covid-19 pandemic, employers might not have accounted for this scale of load on their IT infrastructure, not to mention their cybersecurity preparedness.
Communications of the IBIMA pp 1-7; doi:10.5171/2021.168594
Data privacy is becoming one of the major risks faced by organizations. With the emergence of new technologies such as Internet of Things (IoT), Automated vehicles, mobile payments, privacy is no longer a compliance issue, but also a user responsibility to ensure users are aware of the risks of sharing personal data with third parties.
Communications of the IBIMA pp 1-9; doi:10.5171/2020.537282
The aim of this paper is to illustrate how statistical tools can benefit healthcare policy makers specialised in the rabies management. Understanding the prevalence of such a disease is crucial for management teams. Seasonality may be a salient feature of data series provided by medical units, that is why the use of an innovative tool for seasonal adjustment is needed. For this paper, the data series (number of persons examined for rabies, by age and residency) were provided by one single health care unit – The National Institute of Infectious Diseases “Matei Bals”.
Communications of the IBIMA pp 1-11; doi:10.5171/2020.622155
A company's environment is constantly changing, new competitive models have appeared, new tangible and intangible resources are being built and new competitive regulations form a new competitive framework which opens the field to new opportunities and new threats. With this dynamic, companies are rushing towards the development of their strategic decision system which must be powerful to follow any material (product and service) or immaterial resource (belief, knowledge, know-how) coming from one of the direct competitors. In this context, a conceptual study is carried out with the objective to analyze the evolution of cognition-based competition using artificial intelligence (AI) technology as a support for strategic decision-making; this is in order to transform the competition into an intelligent mode. The finding is presented in an intelligent approach designed to generate automatic competition rules based on deep learning techniques.
Communications of the IBIMA pp 1-12; doi:10.5171/2019.124935
Communications of the IBIMA pp 1-7; doi:10.5171/2019.710724
Communications of the IBIMA, Volume 2018, pp 1-18; doi:10.5171/2018.281881
Communications of the IBIMA pp 1-34; doi:10.5171/2017.597300
Communications of the IBIMA pp 1-18; doi:10.5171/2017.369309
Communications of the IBIMA pp 1-14; doi:10.5171/2017.424146
Communications of the IBIMA pp 1-13; doi:10.5171/2017.518818
Communications of the IBIMA pp 1-11; doi:10.5171/2017.802423
Communications of the IBIMA pp 1-9; doi:10.5171/2016.943964
Communications of the IBIMA pp 1-17; doi:10.5171/2016.682007
Communications of the IBIMA pp 1-16; doi:10.5171/2016.979834
Communications of the IBIMA pp 1-13; doi:10.5171/2016.769097
Communications of the IBIMA pp 1-18; doi:10.5171/2016.790219
Communications of the IBIMA pp 1-17; doi:10.5171/2016.187526
Communications of the IBIMA pp 1-13; doi:10.5171/2015.561648
Communications of the IBIMA pp 1-32; doi:10.5171/2015.928262
Communications of the IBIMA pp 1-14; doi:10.5171/2015.574276
Communications of the IBIMA pp 1-13; doi:10.5171/2015.857912
Communications of the IBIMA pp 1-18; doi:10.5171/2015.794545
Communications of the IBIMA pp 1-13; doi:10.5171/2015.100244
Communications of the IBIMA pp 1-18; doi:10.5171/2015.440860
Communications of the IBIMA pp 1-10; doi:10.5171/2015.592253
Communications of the IBIMA pp 1-12; doi:10.5171/2015.185611
Communications of the IBIMA pp 1-12; doi:10.5171/2014.473436
Communications of the IBIMA pp 1-10; doi:10.5171/2012.675652
Communications of the IBIMA pp 1-22; doi:10.5171/2013.291607
Communications of the IBIMA pp 1-19; doi:10.5171/2013.120942
Communications of the IBIMA pp 1-12; doi:10.5171/2013.476066
Communications of the IBIMA pp 1-15; doi:10.5171/2013.131318
Communications of the IBIMA pp 1-10; doi:10.5171/2013.246123
Due to ubiquitous information requirements, market interest in mobile business intelligence (BI) has grown markedly. However, mobile BI market is a relatively new area that has been driven primarily by the IT industry. Yet, there is a lack of systematic study on the critical success factors for mobile BI. This research reviews the state-of-the-art of mobile BI, and explores the critical success factors based on a rigorous examination of the academic and practitioner literature. The study reveals that critical success factors of mobile BI generally fall into four key dimensions, namely security, mobile technology, system content and quality, and organisational support perspectives. The various research findings will be useful to organisations which are considering or undertaking mobile business intelligence initiatives
Communications of the IBIMA pp 1-12; doi:10.5171/2013.322363
Communications of the IBIMA pp 1-13; doi:10.5171/2013.477923
Communications of the IBIMA pp 1-9; doi:10.5171/2013.135959
The aim of this study was to examine undergraduate students’ perceptions toward the adoption of the Graphing Calculator (GC) instructional approach in learning Probability. During the study, a sample of 55 students was provided GCs and self-designed instructional activities modules for their learning. At the end of the study, an adapted questionnaire was distributed to collect students’ views on the adoption of the GC instructional approach in Probability learning. The data collected from the questionnaire were categorized into six aspects: the GC usage, quality of the output from the GC, GC helped students to understand probability, GC helped in increasing students confidence in problem solving, GC helped in students communication, GC helped to foster students attitude towards probability learning, and it was found that students’ perceptions in these six aspects are favourable. ANOVA test also showed that there were no significant differences in the mean scores among students of different levels when the GC instructional approach was adopted. A majority of students found that leaning probability with the GC instructional approach was more funny and interesting. A positive attitude and increased motivation to learn Probability was cultivated as well
Communications of the IBIMA pp 1-9; doi:10.5171/2013.311167
Communications of the IBIMA pp 1-9; doi:10.5171/2013.743515
Communications of the IBIMA pp 1-16; doi:10.5171/2013.567289
IBIMA Publishing is an open access journals publisher. "i research . i empower the world"
Communications of the IBIMA pp 1-15; doi:10.5171/2013.794626
IBIMA Publishing is an open access journals publisher. "i research . i empower the world"
Communications of the IBIMA pp 1-16; doi:10.5171/2013.480436
Communications of the IBIMA pp 1-12; doi:10.5171/2013.655710
Security and reliability of cloud computing services remain among the dominant concerns inhibiting their pervasive adaptation. The distributed and the multi-tenancy nature of the cloud computing paradigm can be considered as the root causes for their increased risks and vulnerabilities. Resource sharing and virtualization can also be mentioned as additional main factors contributing to or augmenting cross-site scripting and other cloud vulnerabilities. Cloud are also exposed to the risks and liabilities faced by other networked systems. Poorly designed APIs that may cause security problems or distributed denial of services attacks are the examples of this category that are considered in this paper. Public key infrastructure provides the foundations for provision of some essential security services. These include services such as confidentiality, authentication, and privacy that are of vital importance for establishing trust and confidence between the cloud providers and their clients. In this work, we will discuss the potential flaws of this infrastructure and examine how they may deteriorate the security and reliability levels of the cloud environments. To enable a comprehensive study of the challenges in security and reliability of the cloud computing environments, we categorize the risks and vulnerabilities they face. Traditional techniques, based on cryptography, can address some of these challenges to a certain degree. We will argue that they may not be efficient for use in cloud environments. We then focus on data-centric and homomorphic encryption methods that may provide more appropriate solutions in addressing the challenges in cloud computing security and reliability
Communications of the IBIMA pp 1-10; doi:10.5171/2013.462966
Communications of the IBIMA pp 1-17; doi:10.5171/2012.216771
Communications of the IBIMA pp 1-8; doi:10.5171/2012.834755
Communications of the IBIMA pp 1-10; doi:10.5171/2012.768706
Communications of the IBIMA pp 1-7; doi:10.5171/2012.385699