Int. J. Strateg. Inf. Technol. Appl.最新文献

筛选
英文 中文
A Comprehensive Analysis of Congestion Control Models in Wireless Sensor Networks 无线传感器网络拥塞控制模型的综合分析
Int. J. Strateg. Inf. Technol. Appl. Pub Date : 2018-10-01 DOI: 10.4018/ijsita.2018100102
S. Ganesan, V. Muthuswamy, Ganapathy Sannasi, Kannan Arputharaj
{"title":"A Comprehensive Analysis of Congestion Control Models in Wireless Sensor Networks","authors":"S. Ganesan, V. Muthuswamy, Ganapathy Sannasi, Kannan Arputharaj","doi":"10.4018/ijsita.2018100102","DOIUrl":"https://doi.org/10.4018/ijsita.2018100102","url":null,"abstract":"Congestion control is an important factor for performance improvement in wireless sensor networks (WSNs). Congestion occurs due to various reasons including a variation in the data rate between incoming and outgoing links, buffer size, flooding attacks and multiple inputs and minimum output capability. Various outcomes of congestion in sensor networks include immense packet loss or packet drop, fast energy depletion, unfairness across the network, reduced node performance and increased delay in packet delivery. Hence, there is an extreme need to check channel congestion in order to enhance the performance with better congestion management. The job of choosing a suitable congestion control technique is a challenging task for the network designer. In this article, the authors traverse through the underlying conceptual ideas on congestion control schemes which come under six unique models. This article highlights a survey on the existing works done so far on congestion control domains in sensor networks. A comparative analysis based on Quality of Service parameters has been discussed.","PeriodicalId":201145,"journal":{"name":"Int. J. Strateg. Inf. Technol. Appl.","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131240905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A New Contextual Influencer User Measure to Improve the Accuracy of Recommender System 一种新的上下文影响者用户度量以提高推荐系统的准确性
Int. J. Strateg. Inf. Technol. Appl. Pub Date : 2018-10-01 DOI: 10.4018/ijsita.2018100103
Maryam Jallouli, Sonia Lajmi, Ikram Amous
{"title":"A New Contextual Influencer User Measure to Improve the Accuracy of Recommender System","authors":"Maryam Jallouli, Sonia Lajmi, Ikram Amous","doi":"10.4018/ijsita.2018100103","DOIUrl":"https://doi.org/10.4018/ijsita.2018100103","url":null,"abstract":"In the last decade, social-based recommender systems have become the best way to resolve a user's cold start problem. In fact, it enriches the user's model by adding additional information provided from his social network. Most of those approaches are based on a collaborative filtering and compute similarities between the users. The authors' preliminary objective in this work is to propose an innovative context aware metric between users (called contextual influencer user). These new similarities are called C-COS, C-PCC and C-MSD, where C refers to the category. The contextual influencer user model is integrated into a social based recommendation system. The category of the items is considered as the most pertinent context element. The authors' proposal is implemented and tested within the food dataset. The experimentation proved that the contextual influencer user measure achieves 0.873, 0.874, and 0.882 in terms of Mean Absolute Error (MAE) corresponding to C-cos, C-pcc and C-msd, respectively. The experimental results showed that their model outperforms several existing methods.","PeriodicalId":201145,"journal":{"name":"Int. J. Strateg. Inf. Technol. Appl.","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115780444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Co-Creation Among Small Scale Tourism Firm: Role of Information Communication and Technology in Productivity and Sustainability 小规模旅游企业的共同创造:信息通信和技术在生产力和可持续性中的作用
Int. J. Strateg. Inf. Technol. Appl. Pub Date : 2018-10-01 DOI: 10.4018/ijsita.2018100101
Sudhanshu Joshi, Manu Sharma, Satinder Kumar, M. Pant
{"title":"Co-Creation Among Small Scale Tourism Firm: Role of Information Communication and Technology in Productivity and Sustainability","authors":"Sudhanshu Joshi, Manu Sharma, Satinder Kumar, M. Pant","doi":"10.4018/ijsita.2018100101","DOIUrl":"https://doi.org/10.4018/ijsita.2018100101","url":null,"abstract":"ICT enabled tourism brings planners and actors into a common platform. Uttarakhand falls under the L4 (above average) category as per an e-readiness report and subsequently within the span of 5 years, it has climbed to level L3 after the infusion of web-based technologies. Tourism Firm's innovation is primarily based on following criteria: coexistence with existing competitors, cross-value chain income generating activities (IGA) along tourism, new products/processes developed in the past 2 years. An intensive literature review has been done, out of which three critical success factors were identified: (a) Internet usage; (b) firm's innovation and competitiveness; (c) income generating activities (IGA) by the firm. Together, these critical success factors (CSFs) express high cumulative variance. The study identifies co-innovation strategies among supply chain actors at the micro and small levels, which is based on cross-functional linkage between allied industries, and on internet use and IGAs. Validation has been done using an explorative study.","PeriodicalId":201145,"journal":{"name":"Int. J. Strateg. Inf. Technol. Appl.","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116412908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Impact of Excessive Access Permissions and Insider Threat Opportunity in the Financial Industry: A Qualitative Study 金融行业过度访问权限与内部威胁机会的影响:一项定性研究
Int. J. Strateg. Inf. Technol. Appl. Pub Date : 2018-07-01 DOI: 10.4018/IJSITA.2018070103
Azucena Quispe
{"title":"Impact of Excessive Access Permissions and Insider Threat Opportunity in the Financial Industry: A Qualitative Study","authors":"Azucena Quispe","doi":"10.4018/IJSITA.2018070103","DOIUrl":"https://doi.org/10.4018/IJSITA.2018070103","url":null,"abstract":"The purpose of this qualitative, exploratory research study was to gain insights into the correlations between: (a) security threats related to the dangers of excessive access permissions in information systems (IS); and (b) the potential risk exposure to insider threat in the financial sector. The study examined the vulnerability risk to insider threats from the view of the possible connection to excessive access permissions which represent a gap in the literature. The central research question of the study was: What are the determinants that influence the applicability of internal security controls such as segregation of duties (SoD), the least privilege principle, the need-to-know concept and the relationship between access permissions and insider threat in IS? A sample of 15 financial sector professionals that included business users, IT personnel, and certified fraud examiners were interviewed to answer the central research question.","PeriodicalId":201145,"journal":{"name":"Int. J. Strateg. Inf. Technol. Appl.","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127105384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cell Phone Security: User Awareness of Security Issues and Mobile Device Management 手机安全:用户对安全问题和移动设备管理的认识
Int. J. Strateg. Inf. Technol. Appl. Pub Date : 2018-07-01 DOI: 10.4018/IJSITA.2018070102
Scott E. Mensch, LeAnn Wilkie
{"title":"Cell Phone Security: User Awareness of Security Issues and Mobile Device Management","authors":"Scott E. Mensch, LeAnn Wilkie","doi":"10.4018/IJSITA.2018070102","DOIUrl":"https://doi.org/10.4018/IJSITA.2018070102","url":null,"abstract":"People use smartphones for a variety of purposes. However, little is known about users' mobile security awareness. This study examines mobile security behaviors of college students. The study's findings conclude that college students, while technologically savvy, may not take appropriate measures to protect their personal data from hackers and thieves.","PeriodicalId":201145,"journal":{"name":"Int. J. Strateg. Inf. Technol. Appl.","volume":"60 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127582540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Corporate Social Responsibility for Sustainable Strategy 企业社会责任可持续发展战略
Int. J. Strateg. Inf. Technol. Appl. Pub Date : 2018-07-01 DOI: 10.4018/IJSITA.2018070101
N. Baporikar
{"title":"Corporate Social Responsibility for Sustainable Strategy","authors":"N. Baporikar","doi":"10.4018/IJSITA.2018070101","DOIUrl":"https://doi.org/10.4018/IJSITA.2018070101","url":null,"abstract":"Growing importance of CSR is making the industry, governments, policy makers and international associations seriously view the issue of corporate social responsibility (CSR) with an aim to link sustainability for the organizations, sector and economy. Hence, more and more of them are entering the arena of setting guidelines on reporting CSR initiatives. Banking is no exception. Through in-depth literature review and grounded theory approach, this article delves into the CSR initiatives by Bank Windhoek, and the multi-pronged approach adopted in developing sustainable strategy in its pursuit and endurance to be a frontrunner in the Namibian banking sector.","PeriodicalId":201145,"journal":{"name":"Int. J. Strateg. Inf. Technol. Appl.","volume":"1998 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123896715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Contribution of ICTs to Sustainable Urbanization and Health in Urban Areas in Cameroon 信息通信技术对喀麦隆城市地区可持续城市化和健康的贡献
Int. J. Strateg. Inf. Technol. Appl. Pub Date : 2018-07-01 DOI: 10.4018/IJSITA.2018070104
Adolphe Ayissi Etémé, J. M. Ngossaha
{"title":"The Contribution of ICTs to Sustainable Urbanization and Health in Urban Areas in Cameroon","authors":"Adolphe Ayissi Etémé, J. M. Ngossaha","doi":"10.4018/IJSITA.2018070104","DOIUrl":"https://doi.org/10.4018/IJSITA.2018070104","url":null,"abstract":"The uncontrolled urbanization in African cities with inadequate access to urban domestic waste, housing and sanitation management services (DWHSMS) generates landscapes that become places of the spread of many pathologies leading to many public health problems. The city of Yaoundé (Cameroon) is not an exception in this situation which exposes an urban population to the most recurrent diseases. The situation become more complex in the fact that, the performance of the policies and the actions undertaken implied in developing countries, is not known in a precisely. The information sources are dispersed, old and not coordinated. ICT can, at the service of the great causes like the sustainable urbanization and/or environmental health, constitute the irreplaceable ones and essential decision-making tools. For this purpose, integrated and interoperable YUSIIP platform has proposed and deployed. The objective of this article is to present this Domestic platform and to show its contribution in (DWHSMS).","PeriodicalId":201145,"journal":{"name":"Int. J. Strateg. Inf. Technol. Appl.","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115072851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Multi-Verse Optimizer Approach for Instance Selection and Optimizing 1-NN Algorithm 实例选择与1-NN算法优化的多域优化方法
Int. J. Strateg. Inf. Technol. Appl. Pub Date : 2018-04-01 DOI: 10.4018/IJSITA.2018040103
Nassima Dif, Z. Elberrichi
{"title":"A Multi-Verse Optimizer Approach for Instance Selection and Optimizing 1-NN Algorithm","authors":"Nassima Dif, Z. Elberrichi","doi":"10.4018/IJSITA.2018040103","DOIUrl":"https://doi.org/10.4018/IJSITA.2018040103","url":null,"abstract":"","PeriodicalId":201145,"journal":{"name":"Int. J. Strateg. Inf. Technol. Appl.","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121824120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Multi-Objective ACO to Solve the Daily Carpool Problem 一种求解日常拼车问题的多目标蚁群算法
Int. J. Strateg. Inf. Technol. Appl. Pub Date : 2018-04-01 DOI: 10.4018/IJSITA.2018040104
Sahraoui Abdelatif, Derdour Makhlouf, Bouchra Marzak
{"title":"A Multi-Objective ACO to Solve the Daily Carpool Problem","authors":"Sahraoui Abdelatif, Derdour Makhlouf, Bouchra Marzak","doi":"10.4018/IJSITA.2018040104","DOIUrl":"https://doi.org/10.4018/IJSITA.2018040104","url":null,"abstract":"Inurbanareas,thecostofroadcongestionhaspaidgreatattentiontothesociological, technological and environmental aspects, such as the optimal route and fuel consumption.Thisstepistowardsasmartervehiclemobilitywherethetraveltime willbeplannedanddynamicallyadaptedtochangeswithactualstatusofthetraffic flow.Inthisarticleamulti-objectiveACOalgorithmisproposedtosolvethedaily carpoolingproblem.Inparticular,asetofdecisionvariablesareproposedinorderto minimizethreeobjectivefunctionssubjecttoasetofconstraintsontheseobjectives. KeywORDS Daily Carpool Problem, Heuristic Function, Multi-Objective ACO, Solution Space","PeriodicalId":201145,"journal":{"name":"Int. J. Strateg. Inf. Technol. Appl.","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121780209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Big Data and IoT-Allied Challenges Associated With Healthcare Applications in Smart and Automated Systems 与智能和自动化系统中的医疗保健应用相关的大数据和物联网相关挑战
Int. J. Strateg. Inf. Technol. Appl. Pub Date : 2018-04-01 DOI: 10.4018/IJSITA.2018040102
Mamata Rath
{"title":"Big Data and IoT-Allied Challenges Associated With Healthcare Applications in Smart and Automated Systems","authors":"Mamata Rath","doi":"10.4018/IJSITA.2018040102","DOIUrl":"https://doi.org/10.4018/IJSITA.2018040102","url":null,"abstract":"Most of the current smart applications are developed with basis on intelligent computing, most of which are implemented using big data analytics and much other advanced technology. With emerging technology, industrial and instructive improvements are causing greater changes in the lifestyle of people in smart cities and there is more chance of various health problems in urban areas. The way of life in metro urban areas with an expansive volume of people is similarly influenced by different applications and administration frameworks. In this way, the majority of the urban communities are transforming into smart urban areas by receiving mechanized frameworks in every conceivable segment. Therefore, there is more health-related issues and health hazard issues can be identified in urban areas. This article carries out a comprehensive survey of health care issues and improved solutions in automated systems using Big Data Analytics in smart cities integrated with IoT.","PeriodicalId":201145,"journal":{"name":"Int. J. Strateg. Inf. Technol. Appl.","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114971866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信