Refine Search

New Search

Results in Journal Communications of the IBIMA: 181

(searched for: journal_id:(360309))
Page of 4
Articles per Page
by
Show export options
  Select all
Alexandru Marius Obretin
Published: 5 March 2021
Communications of the IBIMA pp 1-12; doi:10.5171/2021.524370

Abstract:
The unprecedented development in the realm of Internet of Things in recent times has facilitated the adoption and integration of microcontrollers and sensors into a large variety of contexts and at a significant scale.
Dimitrios Vagianos, Kostas Zafiropoulos
Published: 23 February 2021
Communications of the IBIMA pp 1-18; doi:10.5171/2021.589003

Abstract:
Web 2.0 applications have provided researchers with vast quantities of Big Data, opening up new horizons for developing innovative analysis techniques that are applicable in multiple cognitive fields. Politics is definitely among them and is currently in a dynamically evolving range of these applications.
Sebastian Glorin
Published: 17 February 2021
Communications of the IBIMA pp 1-7; doi:10.5171/2021.589235

Abstract:
Organizations struggle to strike the right balance between flexibility and security for remote work. With the major portion of the workforce in every country working from home during the covid-19 pandemic, employers might not have accounted for this scale of load on their IT infrastructure, not to mention their cybersecurity preparedness.
Sebastian Glorin
Published: 16 February 2021
Communications of the IBIMA pp 1-7; doi:10.5171/2021.168594

Abstract:
Data privacy is becoming one of the major risks faced by organizations. With the emergence of new technologies such as Internet of Things (IoT), Automated vehicles, mobile payments, privacy is no longer a compliance issue, but also a user responsibility to ensure users are aware of the risks of sharing personal data with third parties.
Andreea Mirica, Octavian Ceban, Georgiana Andreea Ferariu, Viorel Cirnu, Bogdan Chiper, Nicoleta Velisca, Marian Necula
Published: 28 September 2020
Communications of the IBIMA pp 1-9; doi:10.5171/2020.537282

Abstract:
The aim of this paper is to illustrate how statistical tools can benefit healthcare policy makers specialised in the rabies management. Understanding the prevalence of such a disease is crucial for management teams. Seasonality may be a salient feature of data series provided by medical units, that is why the use of an innovative tool for seasonal adjustment is needed. For this paper, the data series (number of persons examined for rabies, by age and residency) were provided by one single health care unit – The National Institute of Infectious Diseases “Matei Bals”.
Allal Mokeddem
Published: 4 September 2020
Communications of the IBIMA pp 1-11; doi:10.5171/2020.622155

Abstract:
A company's environment is constantly changing, new competitive models have appeared, new tangible and intangible resources are being built and new competitive regulations form a new competitive framework which opens the field to new opportunities and new threats. With this dynamic, companies are rushing towards the development of their strategic decision system which must be powerful to follow any material (product and service) or immaterial resource (belief, knowledge, know-how) coming from one of the direct competitors. In this context, a conceptual study is carried out with the objective to analyze the evolution of cognition-based competition using artificial intelligence (AI) technology as a support for strategic decision-making; this is in order to transform the competition into an intelligent mode. The finding is presented in an intelligent approach designed to generate automatic competition rules based on deep learning techniques.
Ioana Cristina Florescu, Silvia Elena Cristache, Daniela Șerban, Andrei Bădin
Published: 25 October 2019
Communications of the IBIMA pp 1-12; doi:10.5171/2019.124935

Nadia Ghaibi, Olfa Dâassi, Leila Jemni Ben Ayed
Published: 22 October 2018
Communications of the IBIMA, Volume 2018, pp 1-18; doi:10.5171/2018.281881

Norizan Anwar, Mohamad Noorman Masrek, Mad Khir Johari Abdullah Sani
Published: 14 February 2017
Communications of the IBIMA pp 1-13; doi:10.5171/2017.518818

Eu-Gene Siew, Paul H.P. Yeow, Choon Ling Tan, Nicholas Grigoriou
Published: 20 January 2017
Communications of the IBIMA pp 1-11; doi:10.5171/2017.802423

Rene Leveaux
Published: 2 January 2017
Communications of the IBIMA pp 1-9; doi:10.5171/2016.943964

, Grațiela Boca, Rita Toader, Cezar Toader, Gheorghe M.T. Rădulescu
Communications of the IBIMA pp 1-13; doi:10.5171/2016.769097

Ramzi Belhadj, Amina Omrane, Boutheina Regaieg
Published: 15 April 2016
Communications of the IBIMA pp 1-17; doi:10.5171/2016.187526

Mikko Kontio, Maija Marttila-Kontio, Virpi Hotti
Published: 8 December 2015
Communications of the IBIMA pp 1-13; doi:10.5171/2015.561648

Charles Vyver
Published: 9 September 2015
Communications of the IBIMA pp 1-14; doi:10.5171/2015.574276

Gratiela Boca, , Cezar Toader
Published: 13 April 2015
Communications of the IBIMA pp 1-13; doi:10.5171/2015.100244

, Mohamed Khalifa, Valerie J Lindsay
Published: 5 March 2015
Communications of the IBIMA pp 1-18; doi:10.5171/2015.440860

Sona Mardikyan, Endam Yıldız, Mehmet Ordu, Burcu Simsek
Published: 20 January 2015
Communications of the IBIMA pp 1-10; doi:10.5171/2015.592253

Sonja Bickford, Marina Nenasheva, Paula Kankaanpää, , Angela Hlavnicka
Published: 14 January 2015
Communications of the IBIMA pp 1-12; doi:10.5171/2015.185611

, Hezlin Harris, Salmi Zahid, Nor Ab. Aziz
Published: 18 December 2013
Communications of the IBIMA pp 1-19; doi:10.5171/2013.120942

Nazatul Ramin, Khairul Taib, Dang Hashim, Siti Arpah Noordin,
Published: 10 November 2013
Communications of the IBIMA pp 1-12; doi:10.5171/2013.476066

Lee-Kwun Chan, Hung-Khoon Tan, Phooi-Yee Lau,
Published: 28 September 2013
Communications of the IBIMA pp 1-10; doi:10.5171/2013.246123

Abstract:
Due to ubiquitous information requirements, market interest in mobile business intelligence (BI) has grown markedly. However, mobile BI market is a relatively new area that has been driven primarily by the IT industry. Yet, there is a lack of systematic study on the critical success factors for mobile BI. This research reviews the state-of-the-art of mobile BI, and explores the critical success factors based on a rigorous examination of the academic and practitioner literature. The study reveals that critical success factors of mobile BI generally fall into four key dimensions, namely security, mobile technology, system content and quality, and organisational support perspectives. The various research findings will be useful to organisations which are considering or undertaking mobile business intelligence initiatives
Muhammad Hasan, Abdul Rahman Dahlan
Published: 31 July 2013
Communications of the IBIMA pp 1-12; doi:10.5171/2013.322363

Choo-Kim Tan, Choo-Peng Tan, Siti Fatimah Abdul Razak, Lew Ling
Communications of the IBIMA pp 1-9; doi:10.5171/2013.135959

Abstract:
The aim of this study was to examine undergraduate students’ perceptions toward the adoption of the Graphing Calculator (GC) instructional approach in learning Probability. During the study, a sample of 55 students was provided GCs and self-designed instructional activities modules for their learning. At the end of the study, an adapted questionnaire was distributed to collect students’ views on the adoption of the GC instructional approach in Probability learning. The data collected from the questionnaire were categorized into six aspects: the GC usage, quality of the output from the GC, GC helped students to understand probability, GC helped in increasing students confidence in problem solving, GC helped in students communication, GC helped to foster students attitude towards probability learning, and it was found that students’ perceptions in these six aspects are favourable. ANOVA test also showed that there were no significant differences in the mean scores among students of different levels when the GC instructional approach was adopted. A majority of students found that leaning probability with the GC instructional approach was more funny and interesting. A positive attitude and increased motivation to learn Probability was cultivated as well
Pui Goh, Jer Hong, Ee Tan, Wei Goh
Published: 29 April 2013
Communications of the IBIMA pp 1-9; doi:10.5171/2013.743515

, Ionela-Corina Chersan,
Published: 3 April 2013
Communications of the IBIMA pp 1-16; doi:10.5171/2013.567289

Abstract:
IBIMA Publishing is an open access journals publisher. "i research . i empower the world"
Published: 31 March 2013
Communications of the IBIMA pp 1-15; doi:10.5171/2013.794626

Abstract:
IBIMA Publishing is an open access journals publisher. "i research . i empower the world"
Published: 19 February 2013
Communications of the IBIMA pp 1-12; doi:10.5171/2013.655710

Abstract:
Security and reliability of cloud computing services remain among the dominant concerns inhibiting their pervasive adaptation. The distributed and the multi-tenancy nature of the cloud computing paradigm can be considered as the root causes for their increased risks and vulnerabilities. Resource sharing and virtualization can also be mentioned as additional main factors contributing to or augmenting cross-site scripting and other cloud vulnerabilities. Cloud are also exposed to the risks and liabilities faced by other networked systems. Poorly designed APIs that may cause security problems or distributed denial of services attacks are the examples of this category that are considered in this paper. Public key infrastructure provides the foundations for provision of some essential security services. These include services such as confidentiality, authentication, and privacy that are of vital importance for establishing trust and confidence between the cloud providers and their clients. In this work, we will discuss the potential flaws of this infrastructure and examine how they may deteriorate the security and reliability levels of the cloud environments. To enable a comprehensive study of the challenges in security and reliability of the cloud computing environments, we categorize the risks and vulnerabilities they face. Traditional techniques, based on cryptography, can address some of these challenges to a certain degree. We will argue that they may not be efficient for use in cloud environments. We then focus on data-centric and homomorphic encryption methods that may provide more appropriate solutions in addressing the challenges in cloud computing security and reliability
Nabil Giweli, , Hon Cheung
Published: 19 January 2013
Communications of the IBIMA pp 1-10; doi:10.5171/2013.462966

René Leveaux
Published: 22 November 2012
Communications of the IBIMA pp 1-8; doi:10.5171/2012.834755

Liliana Moga, Khalil Nor, Eugen Mitrică
Published: 27 September 2012
Communications of the IBIMA pp 1-7; doi:10.5171/2012.385699

Page of 4
Articles per Page
by
Show export options
  Select all
Back to Top Top