Content
2024, Volume 23, Issue 3/4
- 175-192 Study on marketing strategy innovation of mobile payment service under internet environment
by Xin Liu - 193-205 An evaluation of customer trust in e-commerce market based on entropy weight analytic hierarchy process
by Yan Liu - 206-218 Research on fast mining of enterprise marketing investment databased on improved association rules
by Yinghui Liu & Xiaosi Xu & Qixing Yin - 219-231 A data mining method based on label mapping for long-term and short-term browsing behaviour of network users
by Xiangyuan Liu - 232-243 Student's classroom behaviour recognition method based on abstract hidden Markov model
by Guojuan Li - 244-260 Risk assessment method of power grid construction project investment based on grey relational analysis
by Fulei Chen & Mingzhu Sun & Lei Shen - 261-277 Evaluation method of cross-border e-commerce supply chain innovation mode based on blockchain technology
by Jinxin Wang & Mingli Sun - 278-290 Online allocation of teaching resources for ideological and political courses in colleges and universities based on differential search algorithm
by Mingli Sun & Jinxin Wang - 291-303 Research on evaluation method of e-commerce platform customer relationship based on decision tree algorithm
by Quan Zhang & Bohan Liu - 304-317 A risk identification method for abnormal accounting data based on weighted random forest
by Yan Shi - 318-329 The performance evaluation of teaching reform based on hierarchical multi-task deep learning
by Jianlei Zhang - 330-344 Quantitative evaluation method of ideological and political teaching achievements based on collaborative filtering algorithm
by Hua Wang - 345-356 Research on construction of police online teaching platform based on blockchain and IPFS technology
by Qilei Wang - 357-371 An evaluation of English distance information teaching quality based on decision tree classification algorithm
by Xueqi Liu
2024, Volume 23, Issue 2
- 89-118 Global information technology outsourcing: issues of attractiveness of some regions in Eastern Europe
by Grigori Feigin & Anna Hayduk - 119-136 A prediction and analysis model of complex system based on extension neural network - taking the prediction and analysis of terrorist events in the big data environment as an example
by Yachun Tang - 137-155 Dynamic options hedging model under mark-to-market risk
by Dongwei Shi & Yanyin Li & Xing Yu - 156-174 Beyond the storm: an exploratory survey on HR managers' representations of epidemic-induced telework
by Grégory Jemine
2024, Volume 23, Issue 1
- 1-12 OpenStack: a virtualisation overview
by Faouzi Mechraoui & Pedro Martins & Filipe Caldeira - 13-32 Consequential effects of leading technology-driven offensive strategy in a universal bank
by Asare Yaw Obeng & Alfred Coleman - 33-47 AQINM: an adaptive QoS management framework based on intelligent negotiation and monitoring in cloud
by Zeng Saifeng - 48-63 Applying machine learning algorithms to determine and predict the reasons and models for employee turnover
by Shardul Shankar & Ranjana Vyas & Vijayshri Tewari - 64-88 If you cannot fly, then run: a model of BIM implementation taxonomies and thresholds
by Oluseye Olugboyega & Godwin Ehis Oseghale & Clinton O. Aigbavboa
2023, Volume 22, Issue 3/4
- 175-189 Optimisation of outlier data mining algorithm for large datasets based on unit
by Yizhi Li & Xiangming Zhou - 190-202 Scheduling and monitoring on engineering vehicles based on IoT
by Li Wan & Xiao Hu - 203-212 Precision advertising and optimisation strategy based on big data algorithms
by Hailan Pan & Shi Yin - 213-225 Parallel machine scheduling optimisation based on an improved multi-objective artificial bee colony algorithm
by Li-Jun Yang - 226-239 Application of a multi-channel attention mechanism in text classification of new media
by Weixian Wang - 240-261 Innovation and entrepreneurship orientation and suggestions for new engineering computer majors under the background of artificial intelligence
by Hongjun Jia - 262-280 Embedded system architecture-computer embedded software defect prediction based on genetic optimisation algorithms
by Aiju Wang - 281-300 O2O customer big data analysis system based on embedded technology
by Fan Zhang & Yu Su - 301-314 Research on application of optimal particle swarm optimisation algorithm in logistics route improvement
by Xianyu Wang - 315-334 Artificial intelligence and big data in the production process to optimise the parameters of the cut tobacco-making process
by Wenlong Jin & Liujing Wang & Chengting Zhang - 335-353 Design and implementation of corporate governance automated decision model based on web data
by Qiang Ma - 354-372 Development of regional agricultural e-commerce in China based on CAS
by Bahao Li - 373-385 Design and implementation of big data analysis and visualisation platform for the smart city
by Kai Sun & Naidi Liu & Xinghua Sun & Yuxin Zhang - 386-406 Real-time prediction algorithm and simulation of sports results based on internet of things and machine learning
by Yibing Ma & Hongyu Guo & Yuqi Sun & Fang Liu
2023, Volume 22, Issue 1/2
- 1-12 The effects of relationship quality and knowledge sharing on service innovation performance: organisational learning as a mediator
by Zhao-quan Jian & Mohamed Ali Osman & Lei Li - 13-31 Impact of e-commerce on supply chain management
by P.G. Saleeshya & R. Rahul - 32-56 Determinants of success and failure of knowledge transfer in information systems offshoring: a ranking-type Delphi study
by Artur Strasser & Susanne Strahringer & Markus Westner - 57-75 How to evaluate brand extension in the mobile internet environment
by Wenlong Zhu & Shiye Wang - 76-109 QoE-based service differentiation: an analysis of the business implications for the mobile services market
by Luis Guillermo Martinez Ballesteros & Per Jonny Nesse & Jan Markendahl - 110-126 Research on evaluation of network payment security
by Xiang Xie & Yingte Wang & Ying Cui - 127-139 Scrutinising medical practitioners' Twitter feeds: an analysis
by Arushi Jain & Vishal Bhatnagar & Nilanjan Dey & Amira S. Ashour & Fuqian Shi - 140-159 Big data block impact within big data environment
by Ron Ziv & Oded Koren & Nir Perel - 160-174 A reliability and security enhanced framework for cloud-based storage systems
by Peng Xiao
2022, Volume 21, Issue 4
- 345-358 Network intrusion detection method based on improved ant colony algorithm combined with cluster analysis in cloud computing environment
by Xifeng Wang & Xiaoluan Zhang - 359-368 An intelligent image denoising method using weighted multi-scale CB morphological filter algorithm
by Yongjie Tan & Jie Qin - 369-381 An intelligent image detection method using improved canny edge detection operator
by Qian Wang & Wenxia Chen & Haiyun Peng - 382-393 Fine-grained sentiment classification based on semantic extension of target word
by Xindong You & Pengfei Guan & Xueqiang Lv & Baoan Li & Xueping Ren - 394-404 Research on evaluation of minimum backbone grid of transmission network based on differentiation planning
by Xinyang Deng & Tao Wang & Yihe Wang & Na Zhang & Kai Liu & Fangyuan Yang - 405-422 Research on control strategy of grid-connected inverter based on three-loop structure
by Yan Geng & Yingjun Ju & Bo Hu & Jianwei Ji
2022, Volume 21, Issue 2/3
- 139-152 Optimisation decision model of enterprise financial risk management combining stochastic demand
by Dandan Zhao & Lin Li - 153-168 Research on integrated management of sales and inventory information in circulation enterprises based on case-based learning
by Ruirong Jing & Huilin Wang & Guohui Gao - 169-184 Research on efficiency evaluation of financial refinement management based on DEA
by Lv Wenwen & Zarina Abdul Salam - 185-199 Mobile payment risk prediction of communication operators under new business model
by Xiao-ying Shi - 200-214 Establishment of business risk information value assessment model based on RAROC
by Nuan Wang - 215-232 Research on real-time acquisition method of logistics location information of electric commerce based on ranking threshold
by Mei Mei - 233-247 Research on visualisation transmission method for business innovation strategy data based on structural characteristics
by Jing Hu - 248-263 Early warning method for enterprise financial informatisation caused by tax difference
by Guojian Lin & Weichuan Chen - 264-279 Research on digital management method of market information based on fusion information
by Jing Li & Ming Yan - 280-293 Trajectory information acquisition method for library borrowing behaviour based on RFID technology
by Huan Zhou & Enjun Ding - 294-310 Feature extraction modelling of enterprise innovation behaviour data based on morphological gradient
by Shibiao Mu - 311-326 Information supervisory model for financial risk prevention and control based on twin-SVM
by Qiong Kang - 327-341 Integration technology of logistics information resources in electric power enterprises based on web services
by Zijian Zhang & Yu Liang & Yu Cui & Junyu Liu
2022, Volume 21, Issue 1
- 1-12 Construction of an urban multi variable geospatial information integration model based on distributed artificial intelligence
by Lede Niu & Mei Pan & Yan Zhou - 13-29 Optimisation of cost accounting method for resource flow based on blockchain technology
by Sanping Qiu - 30-45 The information association model of college students' archives based on a cloud computing management platform
by Can Yi - 46-62 Design of information push system for global tourist routes in eco-scenic spots based on GIS
by Cuixia Li & Wenqia Shao - 63-79 Dynamic distribution and planning for traffic flow of the urban ecological road network based on blockchain technology
by Xian Luo & Rongtao Liao & Yixi Wang & Wei Zhan - 80-96 A multi-terminal pushing method for emergency information in a smart city based on deep learning
by Zheng Xie & Xin Su - 97-114 Intelligent control method of accounting information based on multi-objective evolution
by Qian Liu & Kim R. Thorup - 115-137 'Are you having a laugh?': detecting humorous expressions on social media: an exploration of theory, current approaches and future work
by Suzanne Elayan & Martin Sykora & Thomas W. Jackson & Ejovwoke Onojeharho
2021, Volume 20, Issue 4
- 335-355 Information systems continuance: the role of incentives and goal harmony
by Tove Bøe & Boge Gulbrandsen & Tom Roar Eikebrokk - 356-376 Enhancing Excel business tools with additional relational and recursive capabilities
by Pedro Ramos & Luís Botelho & António Gonçalves Martins - 377-399 Validation of cognitive inhibitors to technology adoption using content analysis
by Easwar Krishna Iyer & Sreehari Unnikrishnan & Paul Philip & Mallika Sundarrajan & Bharadhwaj Sivakumaran - 400-423 Illusion of SNS influence: are popular SNS influential?
by Dongback Seo & Martin P. Bügel - 424-435 Investigating the role of information technology in developing the learning organisation: empirical evidence from Egypt
by Hadia H. Abdel Aziz & Karim Hodeib
2021, Volume 20, Issue 3
- 221-233 Big data prediction method of traffic logistics demands based on regional differences
by Rongting Sun & Yiqun Guo - 234-249 Research on regional spatial logistics information integration method based on big data
by Xiang-dong Chen & Gregory Kalra - 250-264 Intelligent classification of logistics multi-distribution resources based on information fusion
by Xinxian Qiu - 265-281 Research on routing optimisation of logistics distribution vehicle based on cloud model
by Zhongmin Liu & Jia Lyu - 282-298 Design of logistics transportation monitoring system based on GPS/DR combined positioning technology
by Wenlian Deng & Aida Maki - 299-315 Design of logistics operation management algorithm based on information technology on internet
by Lili Shao & Fuxian Huang & Yuzhen Yang - 316-334 Integrated equilibrium planning for emergency logistics warehouse allocation based on internet plus mode
by Chao-sheng Han & Kim R. Thorup
2021, Volume 20, Issue 1/2
- 5-20 Assessing the impact of information technology on human resource practices: evidence from organisations in Ghana
by Mayqueen Attatsitsey & Noble Osei-Bonsu - 21-48 Investigation and analysis on crowdsourcing for improving enterprise QoS
by S. Remya & R. Sasikala - 49-65 Automatic brain tumour detection using image processing and data mining techniques
by R. Geetha Ramani & Febronica Faustina & Shalika Siddique & K. Sivaselvi - 66-82 Congestion management with improved real power transfer using TCSC in 30 bus system
by P. Kalaimani & K. Mohana Sundaram - 83-94 Classification of cricket videos using finite state machines
by Vijayan Ellappan & R. Rajkumar - 95-109 An improved mean curvature-based bending model for cloth simulation
by Xiaohui Tan & Ruiliang Guo - 110-131 A review on feature selection methods for improving the performance of classification in educational data mining
by Maryam Zaffar & Manzoor Ahmed Hashmani & K.S. Savita & Sameer Ahmad Khan - 132-144 Frequency variations management in deregulated environment using intelligent controller
by C.V. Aravind & Yi Heng Ser & Charles R. Sarimuthu & Ramani Kannan - 145-159 Automation of smart monitoring for person localisation and alerting network
by K. Deepika & J. Usha - 160-177 Mobile application for children to learn hadith: 'Hidup Cara Rasullullah'
by Aliza Sarlan & Rohiza Ahmad & Wan Fatimah Wan Ahmad & Suci Astrini - 178-206 Promoting business-IT alignment through agent metaphor-based software technology
by D. Venkatesan & S. Sridhar - 207-216 Performance analysis of iris biometric system using GKPCA and SVM
by M. Suganthy & S. Manjula
2020, Volume 19, Issue 4
- 261-279 Predicting service collaboration for users based on data variation patterns
by Jiaqiu Wang & Zhongjie Wang - 280-291 Comprehensive evaluation of cloud services based on fuzzy grey method
by Wenjuan Li & Jian Cao & Shiyou Qian - 292-304 Log automaton under conditions of infrequent behaviour mining
by Xian-wen Fang & Juan Li & Li-li Wang & Huan Fang - 305-317 A caching strategy based on dynamic popularity for named data networking
by Meiju Yu & Ru Li - 318-333 A construction and self-learning method for intelligent domain sentiment lexicon
by Shaochun Wu & Qifeng Xiao & Ming Gao & Guobing Zou - 334-346 Learning context-dependent word embeddings based on dependency parsing
by Ke Yan & Jie Chen & Wenhao Zhu & Xin Jin & Guannan Hu - 347-357 A recommendation algorithm for point of interest using time-based collaborative filtering
by Jun Zeng & Xin He & Feng Li & Yingbo Wu - 358-375 A dynamic programming-based approach for cloud instance type selection and optimisation
by Pengwei Wang & Wanjun Zhou & Caihui Zhao & Yinghui Lei & Zhaohui Zhang
2020, Volume 19, Issue 2/3
- 93-117 Automatic recognition and defect compensation for calf leather
by Yu-Tang Lee & Chung Yeh - 118-125 Fitting the power spectrum of stationary random sequence
by Chang-qing Zhang & Zhan-wen Liu & Zhi-gang Xu - 126-150 Factors influencing cloud computing adoption for higher educational institutes in India: a fuzzy AHP approach
by Mahak Sharma & Ruchita Gupta & Padmanav Acharya - 151-161 A blind demodulation algorithm of random codes on carrier under low signal noise ratio by Morlet wavelet
by Wei Huang & Xiangmo Zhao & Chao Wang - 162-180 E-HRM implementation, adoption and its predictors: a case of small and medium enterprises of Pakistan
by Abdul Waheed & Miao Xiaoming & Salma Waheed & Naveed Ahmad & Shang Tian-tian - 181-201 Moderating effect of information technology ambidexterity linking new human resource management practices and innovation performance
by Abdul Waheed & Miao Xiaoming & Naveed Ahmad & Salma Waheed - 202-219 Canonical correlation analysis of the impact of ICT on the diversification performance
by Omar Alexánder León García & Juan Ignacio Igartua Lopez & Jaione Ganzarain Epelde - 220-239 Simulation verification for automobile anti-lock braking system bench test principle
by Ruru Hao & Xiangmo Zhao & Lan Yang - 240-258 OBWD: an ontology and Bayesian network-based workflow design platform
by Chao Dong & Chongchong Zhao
2020, Volume 19, Issue 1
- 1-18 Impact of information and communication technologies on productivity growth
by Alma Maciulyte-Sniukiene & Mindaugas Butkus - 19-32 A Delphi-based study on the innovation practices in the Albanian financial sector
by Amali Çipi & Enida Pulaj - 33-46 Implementing ERP evaluation through a fuzzy analysis: an empirical investigation
by Maria Rosaria Marcone - 47-67 Does social media use at work lower productivity?
by Joseph Vithayathil & Majid Dadgar & J. Kalu Osiri - 68-90 Assessing the business dimensions of green IT transformation: a case of an Indian IT organisation
by Parvathi Jayaprakash & R. Radhakrishna Pillai
2019, Volume 18, Issue 4
- 347-361 Top management support and information systems implementation success: a meta-analytical replication
by Mark I. Hwang - 362-388 User engagement in social media - empirical results from Facebook
by Rupak Rauniar & Greg Rawski & Ronald J. Salazar & Donald Hudson - 389-406 Evaluation of mean and variance approximations in three point estimation of task completion times using the beta and the Kumaraswamy distribution
by Pablo Ortiz Bochard & Thomas Schwarz - 407-418 Impact of communication on the collaboration between 3PL service providers and their clients. Case of Lithuania
by Aidas Vasilis Vasiliauskas & Virgilija Vasilienė-Vasiliauskienė & Ieva Meidutė-Kavaliauskienė - 419-434 CPPM: a lightweight performance prediction middleware for cloud platforms
by Xiao Peng
2019, Volume 18, Issue 2/3
- 129-142 Parallel naïve Bayes regression model-based collaborative filtering recommendation algorithm and its realisation on Hadoop for big data
by Shiqi Wen & Cheng Wang & Haibo Li & Guoqi Zheng - 143-155 A fuzzy inference-based trust model estimation system for service selection in cloud computing
by Roney Thomas & Priya Govindaraj & Jaisankar Natarajan - 156-170 Identifying inter-organisational resource-service sequences based on similarity for collaborative tasks
by Haibo Li & Mengxia Liang - 171-181 An EMD-SVM model with error compensation for short-term wind speed forecasting
by Yuanyuan Xu & Tianhe Yao & Genke Yang - 182-194 Facilitating social recommendation with collaborative topic regression and social trust
by Xiaoyi Deng & Feifei Huangfu - 195-212 A collusion-resistant public auditing scheme for shared cloud data
by Fulin Nan & Hui Tian & Tian Wang & Yiqiao Cai & Yonghong Chen - 213-226 Cost and green aware workload migration on geo-distributed datacentres
by Jiacheng Jiang & Yingbo Wu & De Xiang & Keqin Yu & Tianhui Wang - 227-242 SGP: a social network sampling method based on graph partition
by Xiaolin Du & Dan Wang & Yunming Ye & Yan Li & Yueping Li - 243-255 A semi-supervised approach of graph-based with local and global consistency
by Yihao Zhang & Junhao Wen & Zhi Liu & Changpeng Zhu - 256-267 Diabetes index evaluation framework based on data mining technology: a genetic factor involved solution for predicting diabetes risk
by Yao Wang & Dianhui Chu & Mingqiang Song - 268-283 Voice transmission through WiFi
by Shalini Goel & Vipul Garg & Deepak Garg & Manshiv Kathait - 284-296 Study on image feature recognition algorithm and its application in public security management
by Xiaoyi Yang & Qian Wu & Xinmei Deng - 297-326 Needle in a haystack: an empirical study on mining tags from Flickr user comments
by Haijun Zhang & Jingxuan Li & Bin Luo & Yan Li - 327-345 Threefold similarity analysis: a case study on crowdsourcing feeds
by Kaixu Liu & Gianmario Motta & Tianyi Ma & Ke Fan
2019, Volume 18, Issue 1
- 1-15 Analysis of the multi-agent's relationship in collaborative innovation network for science and technology SEMs based on evolutionary game theory
by Guangyou Nan & Jinyu Wei & Haiju Hu - 16-31 Research on the measuring method and structure mining of organisation conflict
by Lei Liu & Xinan Zhao - 32-46 Electric vehicle range estimation based on the road congestion level classification
by Hong Liang & Wenjiao Wang & Yunlei Sun & Min Zhong & Yuan Gao & Xiao Sun & Jianhang Liu - 47-62 A decision support system for identification of technology innovation risk based on sequential CBR
by Quan Xiao - 63-73 The research on the selection of the rice transfer machine
by Xin Yang & Zhenxiang Zeng & Jinyu Wei & Xinjiang Cai - 74-92 Dataset replica placement strategy under a response time constraint in the cloud
by Xiuguo Wu & Wei Su - 93-109 Sampling method based on improved C4.5 decision tree and its application in prediction of telecom customer churn
by Weibin Deng & Linsen Deng & Jin Liu & Jie Qi - 110-125 An improved reversible data hiding scheme based on pixel permutation
by Jilin Wang & Xiao Sun & Xiaoqing Feng
2018, Volume 17, Issue 4
- 257-274 Research on key techniques of cryptographic access control and properties optimisation in cloud storage
by Shidong Zhu & Liu Jiang & Zhenliu Zhou - 275-295 Informal interactive bring your own device strategising practices of South African small and medium enterprises
by Salah Kabanda - 296-312 Finding linkage between sustainability science and complex networks
by Katsuhide Fujita - 313-333 Collaboration environments for small and medium-sized architecture, engineering and construction enterprises: success factors in implementation
by Aisha Abuelmaatti & Vian Ahmed - 334-348 Hadoop ecosystem as enterprise big data platform: perspectives and practices
by Sourav Mazumder & Subhankar Dhar - 349-370 Factors affecting diffusion and adoption of information and communication technology among rural users in Khyber Pakhtunkhwa Province, Pakistan
by Zahid Latif & Wang Lei & Zulfiqar Hussain Pathan & Sikander Hussain & Kaleem Khan
2018, Volume 17, Issue 3
- 155-169 Modelling technique of the object-attribute system oriented to data mining
by Yaoyu Hu & Ai Wang - 170-183 Relationships among customer loyalty, customer satisfaction, corporate image and behavioural intention on social media for a corporation
by Haixia Lv & Guang Yu & Gang Wu - 184-196 A research on the international competition ability measure of Chinese ICT industry
by Hai-Chao Li & Shi-Jie Fan - 197-216 Research on book shopping website interface based on the eye tracker
by Hongxia Li & Dandan Che & Xiaofang Yuan & Yan Li - 217-236 Case study on estimating the financial impact of IT process alignment
by Eunil Park & Jay Ohm & Sang Jib Kwon - 237-255 Challenges of software developers: the Namibian Government experience
by Monica Nehemia-Maletzky & Tiko Iyamu
2018, Volume 17, Issue 1/2
- 4-19 Immersive element analysis of the multiplayer online battle arena game genre
by Gilsang Yoo & Jaebum Jung & Jaechun Ryu & Jeahong Kim & Kichun Nam - 20-32 Texture analysis based feature extraction using Gabor filter and SVD for reliable fault diagnosis of an induction motor
by Rashedul Islam & Jia Uddin & Jong-Myon Kim - 33-43 An introduction to face-recognition methods and its implementation in software applications
by Byoung-Moo Kwon & Kang-Hee Lee - 44-50 Shadow detection using chromaticity and entropy in colour image
by Ki-Hong Park & Jae-Ho Kim & Yoon-Ho Kim - 51-61 User interface using bounce for realistic movement on smart TV
by Daehyun Ryu & Kyoungju Park - 62-70 Analysis of serious games for preventing internet gaming addiction
by Ji Yun Kim & Jae Hwan Bae - 71-79 A framework for context-aware application programming on smart phone
by Baek Gyoon Sung - 80-91 A tree cognitive navigation system based on two-dimensional code and GPS
by Wenjie Hu & Chunling Wang & Qiaochu Mo & Bo Wang - 92-112 Estimating the sentiment strength of a word using word similarity
by Kangbok Lee & Jongbum Baik & Soowon Lee - 113-128 Game operation query language for facilitating game server's FCAPS operation
by Hwan-Soo Yoo & Seong-Whan Kim - 129-139 Automatic classification of Lithuanian parliament bills
by Aušra Mackutė-Varoneckienė & Ka Lok Man & Tomas Krilavičius - 140-154 The investigation of relationships: self-esteem, self-confidence, and conduct problems in counselling
by Mila Park
2017, Volume 16, Issue 4
- 317-332 Enhancing BRICS integration: a cloud-based green supply chain concept
by Saroj Koul & Hari Narayan Perikamana & Uma Kumar & Vinod Kumar - 333-347 Evaluating the competitiveness of Indian metro cities: in smart city context
by Harish Kumar & Manoj Kumar Singh & Manmohan Prasad Gupta - 348-359 Big data analytics for exploratory social network analysis
by Chetna Dabas - 360-375 The internet of things - new value streams for customers
by Ashok Kumar Wahi & Vandana Ahuja - 376-390 Antecedents for success of e-commerce platforms: an investigative approach
by Asif Ali & Gowhar Rasool & Anjali Pathania - 391-404 Study of repeated e-government project audit based on text mining
by Yan Hong Chen & Hui Hui Li & Zhi Nan Yu
2017, Volume 16, Issue 3
- 205-214 From social capital to continuous use of social networking sites: a conceptualisation
by Rui Chen & Sushil K. Sharma & H. Raghav Rao - 215-236 Exploring the benefits of cloud services and accountability tools from a competitiveness and return on investment perspective
by Sindre Høyland & Janne Merete Hagen & Ruth Østgaard Skotnes - 237-253 References-based search methodology for assuring acceptable quality of a query research article
by Ranjeet Kumar & Ramesh Chandra Tripathi - 254-268 Internet thinking of the traditional enterprise - taking Su Ning as an example
by Dan Chang & Jiawei Song - 269-286 Information industry security: an industry convergence point of view
by Xiaolan Guan & Menggang Li - 287-300 Network dynamics in friend recommendation: a study of Indian engineering students
by Pradip Swarnakar & Ajay Kumar & Himanshu Tyagi - 301-313 Using cognitive radio scheme for big data traffic management in cellular systems
by Jamal Raiyn
2017, Volume 16, Issue 2
- 117-132 Cultivating the wisdom of personnel through internal crowdsourcing
by Kaisa Henttonen & Tommi Rissanen & Päivi Eriksson & Jukka Hallikas - 133-146 Brick and mortar store vs. online shopping experience: a study
by Pooja Misra & Sushil Baranwal & Manya Jha - 147-161 Providing custom enterprise resource planning solutions: benefits and challenges
by Hanuv Mann & Uma Kumar & Vinod Kumar & Inder Jit Singh Mann - 162-172 Archiving ERP data to enhance operational effectiveness: the case of Dolphin
by Shalini Srivastava & Richa Misra - 173-180 Assessing learning styles to improve skill development: a case study of NASSCOM
by Abhijeet Lele & Parameswar Nayak - 181-204 Critical success factors for e-business in Sri Lankan text books and stationery market
by S.W.S.B. Dasanayaka & M.A. Aboonidhal & G.D. Sardana
2017, Volume 16, Issue 1
- 5-30 PLM as a strategy for the management of heterogeneous information in bio-medical imaging field
by Marianne Allanic & Pierre-Yves Hervé & Alexandre Durupt & Marc Joliot & Philippe Boutinaud & Benoît Eynard - 31-52 Cyber-physical infomobility for tourism application
by Alexander Smirnov & Nikolay Shilov & Alexey Kashevnik & Andrew Ponomarev - 53-72 A situation awareness analysis scheme to identify deficiencies of complex man-machine interactions
by Ellemieke Van Doorn & Zoltán Rusák & Imre Horváth - 73-90 The influence of documenting assumed values of product properties on the number of iterations in the design process - first observations
by Alfred Sadlauer & Peter Hehenberger & Klaus Zeman - 91-112 A feature-based approach to conceptualisation, upfront modelling, and planning for the future of complex systems
by Eliab Z. Opiyo
2016, Volume 15, Issue 4
- 293-312 Thermal infrared geostationary satellite sensor data application for prediction and monitoring earthquake in Algeria
by Abdelatif Hassini & Ahmed Hafid Belbachir - 313-332 Designing security policies for complex SCADA systems management and protection
by Christophe Feltus & Djamel Khadraoui - 333-345 The use of RFID tags to support the post-disaster recovery of utility infrastructure
by Chetan S. Sankar & Bill Rushing & Corley L. Lauderdale & Steve Henderson - 346-363 Adaptive data collection approach based on sets similarity function for saving energy in periodic sensor networks
by Hassan Harb & Abdallah Makhoul & Ali Jaber & Rami Tawil & Oussama Bazzi - 364-386 From spatial data warehouse and decision-making tool to SOLAP generalisation approach for efficient road risk analysis
by Khalissa Amieur Derbal & Zioual Tahar & Kamel Boukhalfa & Ibtissem Frihi & Zaïa Alimazighi