首页 > 最新文献

Journal of Digital Information Management最新文献

英文 中文
Model Integration Approach from SysML to MATLAB/Simulink 从SysML到MATLAB/Simulink的模型集成方法
Pub Date : 2018-12-01 DOI: 10.6025/jdim/2018/16/6/289-307
Bassim Chabibi, A. Anwar, M. Nassar
In system engineering process, descriptive system models seem to be insufficient in order to perform a system verification which fulfils various stakeholders’ requirements. This aspect is well handled by simulation process through the use of several simulation techniques or algorithms. As a consequence, design process efficiency is considerably reduced by the fact that both system modeling and simulation tools are often used separately. This study introduces an integration process to unify the potential provided by systems modeling languages and simulation environments, through the definition of a Domain Specific Language, namely Simulation Modeling Language, that is built on the basis ofa deep study of common constructs, semantics and modeling methodologies of several simulation environments, in addition to the specification of a model transformation between this language and a simulation environment (MATLAB/SImulink) in order to illustrate both its importance et its efficiency in our integration approach. Through the specification of its syntaxes and semantics, the defined intermediate modeling language allows modeling systems by using common constructs and modeling methodologies of simulation process in order to ensure their modeling with simulation environments and, thus, con duct experiences and system verifications. The definition of this language constitutes the basis of our integration approach aiming to bridge the gap between system modeling and simulation aspects in order to benefit from the strengths and potentials of both approaches. The integration approach consists on the specification of a bidirectional transformation, based on the concepts of ModelDriven Engineering, to perform in future works. Subject Categories and Descriptors I.6 [Simulation and Modeling] I.6.5 [Model Development]; Modeling methodologies ; F.3.2 [Semantics of Programming Languages] General Terms: Modeling language, Simulation, System Engineering, Model Driven Engineering
在系统工程过程中,描述性的系统模型似乎不足以进行满足各种涉众需求的系统验证。通过使用多种仿真技术或算法,仿真过程很好地处理了这方面的问题。因此,由于系统建模和仿真工具经常分开使用,设计过程的效率大大降低。本研究在深入研究几种仿真环境的通用结构、语义和建模方法的基础上,通过定义一种领域特定语言,即仿真建模语言,引入了一个集成过程,以统一系统建模语言和仿真环境所提供的潜力。此外,为了说明该语言与仿真环境(MATLAB/SImulink)之间的模型转换在我们的集成方法中的重要性和效率,还详细说明了该语言与仿真环境(MATLAB/SImulink)之间的模型转换。通过规范其语法和语义,所定义的中间建模语言允许使用仿真过程的通用构造和建模方法对系统进行建模,以确保其与仿真环境进行建模,从而进行经验和系统验证。该语言的定义构成了我们的集成方法的基础,旨在弥合系统建模和仿真方面之间的差距,以便从这两种方法的优势和潜力中受益。集成方法包括双向转换的规范,基于模型驱动工程的概念,在未来的工作中执行。I.6[仿真与建模]I.6.5[模型开发];建模方法;F.3.2[程序设计语言的语义]一般术语:建模语言、仿真、系统工程、模型驱动工程
{"title":"Model Integration Approach from SysML to MATLAB/Simulink","authors":"Bassim Chabibi, A. Anwar, M. Nassar","doi":"10.6025/jdim/2018/16/6/289-307","DOIUrl":"https://doi.org/10.6025/jdim/2018/16/6/289-307","url":null,"abstract":"In system engineering process, descriptive system models seem to be insufficient in order to perform a system verification which fulfils various stakeholders’ requirements. This aspect is well handled by simulation process through the use of several simulation techniques or algorithms. As a consequence, design process efficiency is considerably reduced by the fact that both system modeling and simulation tools are often used separately. This study introduces an integration process to unify the potential provided by systems modeling languages and simulation environments, through the definition of a Domain Specific Language, namely Simulation Modeling Language, that is built on the basis ofa deep study of common constructs, semantics and modeling methodologies of several simulation environments, in addition to the specification of a model transformation between this language and a simulation environment (MATLAB/SImulink) in order to illustrate both its importance et its efficiency in our integration approach. Through the specification of its syntaxes and semantics, the defined intermediate modeling language allows modeling systems by using common constructs and modeling methodologies of simulation process in order to ensure their modeling with simulation environments and, thus, con duct experiences and system verifications. The definition of this language constitutes the basis of our integration approach aiming to bridge the gap between system modeling and simulation aspects in order to benefit from the strengths and potentials of both approaches. The integration approach consists on the specification of a bidirectional transformation, based on the concepts of ModelDriven Engineering, to perform in future works. Subject Categories and Descriptors I.6 [Simulation and Modeling] I.6.5 [Model Development]; Modeling methodologies ; F.3.2 [Semantics of Programming Languages] General Terms: Modeling language, Simulation, System Engineering, Model Driven Engineering","PeriodicalId":197165,"journal":{"name":"Journal of Digital Information Management","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114313831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Parking System Development Using Extreme Programming Method 用极限编程方法开发停车系统
Pub Date : 2018-12-01 DOI: 10.6025/JDIM/2018/16/6/279-288
Johannes Fernandes Andry, Gary Juliawan, Y. Christian, J. Leonardo, Nicolas
{"title":"Parking System Development Using Extreme Programming Method","authors":"Johannes Fernandes Andry, Gary Juliawan, Y. Christian, J. Leonardo, Nicolas","doi":"10.6025/JDIM/2018/16/6/279-288","DOIUrl":"https://doi.org/10.6025/JDIM/2018/16/6/279-288","url":null,"abstract":"","PeriodicalId":197165,"journal":{"name":"Journal of Digital Information Management","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116314003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Machine Learning in Predicting the Appropriate Model of Software Process-Models Deviation 机器学习在预测软件过程模型偏差中的应用
Pub Date : 2018-12-01 DOI: 10.6025/JDIM/2018/16/6/308-323
Tarik Chaghrouchni, Issam Mohammed Kabbaj, Z. Bakkoury
{"title":"Machine Learning in Predicting the Appropriate Model of Software Process-Models Deviation","authors":"Tarik Chaghrouchni, Issam Mohammed Kabbaj, Z. Bakkoury","doi":"10.6025/JDIM/2018/16/6/308-323","DOIUrl":"https://doi.org/10.6025/JDIM/2018/16/6/308-323","url":null,"abstract":"","PeriodicalId":197165,"journal":{"name":"Journal of Digital Information Management","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123112159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Framework for Context-aware Outlier Detection in Big Data Streams 大数据流中上下文感知异常点检测的新框架
Pub Date : 2018-10-01 DOI: 10.6025/JDIM/2018/16/5/213-222
Hussien Ahmad, S. Dowaji
Outlier and anomaly detection has always been a critical problem in many fields. Although it has been investigated deeply in data mining, the problem has become more difficult and critical in the Big Data era since the volume, velocity and variety of data change drastically with rather complicated types of outliers. In such an environment, where real-time outlier detection and analysis over data streams is a necessity, the existing solutions are no longer effective and sufficient. While many existing algorithms and approaches consider the content of the data stream, there are few approaches which consider the context and conditions in which the content has been produced. In this paper, we propose a novel framework for contextual outlier detection in big data streams which inject the contextual attributes in the stream content as a primary input for outlier detection rather than using the stream content alone or applying the contextual detection on content anomalies only. The detection algorithm incorporates two approaches; the first, a supervised detection method and the other, an unsupervised, which allows the detection process to adapt to the normal change in the stream behavior over time. The detected outliers are either both content and contextual outliers or contextual outliers only. The proposed contextual detection approach prunes the false positive outliers and detects the true negative outliers at the same time. Moreover, in this framework, the detection engine preserves both outliers and context values in which those outliers were detected to be used in the engine self-training and in outliers modeling in order to enhance the outlier prediction accuracy. Journal of Digital Information Management Subject Categories and Descriptors H.2 [Database Management] H.2.8 Database Applications];
异常点和异常检测一直是许多领域的关键问题。尽管在数据挖掘中已经进行了深入的研究,但在大数据时代,由于数据的数量、速度和种类发生了巨大变化,异常值类型相当复杂,因此这个问题变得更加困难和关键。在这样的环境中,需要对数据流进行实时异常值检测和分析,现有的解决方案不再有效和充分。虽然许多现有的算法和方法考虑数据流的内容,但很少有方法考虑产生内容的上下文和条件。在本文中,我们提出了一种新的大数据流上下文异常点检测框架,该框架将流内容中的上下文属性作为异常点检测的主要输入,而不是单独使用流内容或仅对内容异常应用上下文检测。该检测算法包含两种方法;第一种是监督检测方法,另一种是无监督检测方法,它允许检测过程适应流行为随时间的正常变化。检测到的离群值要么是内容和上下文离群值,要么只是上下文离群值。本文提出的上下文检测方法在剔除假阳性异常值的同时检测真阴性异常值。此外,在该框架中,检测引擎同时保留了异常值和上下文值,将检测到的异常值用于引擎的自训练和异常值建模,以提高异常值预测的精度。数字信息管理学科分类与描述符H.2[数据库管理]H.2.8数据库应用];
{"title":"A Novel Framework for Context-aware Outlier Detection in Big Data Streams","authors":"Hussien Ahmad, S. Dowaji","doi":"10.6025/JDIM/2018/16/5/213-222","DOIUrl":"https://doi.org/10.6025/JDIM/2018/16/5/213-222","url":null,"abstract":"Outlier and anomaly detection has always been a critical problem in many fields. Although it has been investigated deeply in data mining, the problem has become more difficult and critical in the Big Data era since the volume, velocity and variety of data change drastically with rather complicated types of outliers. In such an environment, where real-time outlier detection and analysis over data streams is a necessity, the existing solutions are no longer effective and sufficient. While many existing algorithms and approaches consider the content of the data stream, there are few approaches which consider the context and conditions in which the content has been produced. In this paper, we propose a novel framework for contextual outlier detection in big data streams which inject the contextual attributes in the stream content as a primary input for outlier detection rather than using the stream content alone or applying the contextual detection on content anomalies only. The detection algorithm incorporates two approaches; the first, a supervised detection method and the other, an unsupervised, which allows the detection process to adapt to the normal change in the stream behavior over time. The detected outliers are either both content and contextual outliers or contextual outliers only. The proposed contextual detection approach prunes the false positive outliers and detects the true negative outliers at the same time. Moreover, in this framework, the detection engine preserves both outliers and context values in which those outliers were detected to be used in the engine self-training and in outliers modeling in order to enhance the outlier prediction accuracy. Journal of Digital Information Management Subject Categories and Descriptors H.2 [Database Management] H.2.8 Database Applications];","PeriodicalId":197165,"journal":{"name":"Journal of Digital Information Management","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114101593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Noise-Robust Image Encryption Algorithm Based on Hyper Chaotic Cellular Neural Network 一种基于超混沌细胞神经网络的抗噪声图像加密算法
Pub Date : 2018-10-01 DOI: 10.6025/JDIM/2018/16/5/230-245
Gangyi Hu, Sumeth Yuenyong, Jian Qu, Jiang Rong, W. Kou
{"title":"A Noise-Robust Image Encryption Algorithm Based on Hyper Chaotic Cellular Neural Network","authors":"Gangyi Hu, Sumeth Yuenyong, Jian Qu, Jiang Rong, W. Kou","doi":"10.6025/JDIM/2018/16/5/230-245","DOIUrl":"https://doi.org/10.6025/JDIM/2018/16/5/230-245","url":null,"abstract":"","PeriodicalId":197165,"journal":{"name":"Journal of Digital Information Management","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123649854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Log Based Update of Replicated Profiles in Decentralized Social Networks 分散式社交网络中基于日志的复制配置文件更新
Pub Date : 2018-10-01 DOI: 10.6025/JDIM/2018/16/5/223-229
Lyes Badis, M. Amad, D. Aïssani
{"title":"A Log Based Update of Replicated Profiles in Decentralized Social Networks","authors":"Lyes Badis, M. Amad, D. Aïssani","doi":"10.6025/JDIM/2018/16/5/223-229","DOIUrl":"https://doi.org/10.6025/JDIM/2018/16/5/223-229","url":null,"abstract":"","PeriodicalId":197165,"journal":{"name":"Journal of Digital Information Management","volume":" 28","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132040339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
New Approach for Intrusion Detection in Big Data as a Service in the Cloud 云中的大数据即服务入侵检测新方法
Pub Date : 2018-10-01 DOI: 10.6025/JDIM/2018/16/5/246-257
Dounya Kassimi, O. Kazar, O. Boussaid, Abdelhak Merizig
The advantages and the solutions proposed with the appearance of the new technologies either Cloud computing or Big Data force the logical and physical structures of mass data storage move towards these technologies. In addition, the solutions offered presented in storage and processing of various operations. However, these solutions do not cover all the previous issues specially the one related to the security problem [1].
云计算或大数据等新技术的出现所带来的优势和解决方案,迫使海量数据存储的逻辑和物理结构向这些技术靠拢。此外,还提出了存储和处理各种操作的解决方案。然而,这些解决方案并没有涵盖前面的所有问题,特别是与安全问题相关的问题[1]。
{"title":"New Approach for Intrusion Detection in Big Data as a Service in the Cloud","authors":"Dounya Kassimi, O. Kazar, O. Boussaid, Abdelhak Merizig","doi":"10.6025/JDIM/2018/16/5/246-257","DOIUrl":"https://doi.org/10.6025/JDIM/2018/16/5/246-257","url":null,"abstract":"The advantages and the solutions proposed with the appearance of the new technologies either Cloud computing or Big Data force the logical and physical structures of mass data storage move towards these technologies. In addition, the solutions offered presented in storage and processing of various operations. However, these solutions do not cover all the previous issues specially the one related to the security problem [1].","PeriodicalId":197165,"journal":{"name":"Journal of Digital Information Management","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123031237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Optimal Web Service Selection Model using Fuzzy Extended AHP and Weighted Sum Method 基于模糊扩展AHP和加权和方法的最优Web服务选择模型
Pub Date : 2018-08-01 DOI: 10.6025/JDIM/2018/16/4/157-168
R. Kohar
Different services have different values for their different properties (functional and non-functional). Moreover, consumers have different preferences for these properties. Since these preferences may be incomplete/ vague/imprecise, this inevitably can in turn cause selection of a non-optimal service for the consumer which may not have the desired value for these properties for the consumer. Therefore optimal web service selection based on the consumer’s preferences is a challenging task. In this paper, a new service selection model is proposed which considers consumer preferences for different service properties as well as the actual values of its properties. Services are evaluated and priority weights are computed separately for functional and non-functional properties using modified Fuzzy Extended Analytic Hierarchy Process (FEAHP) and Weighted Sum Method (WSM) respectively. Real time data is used to conduct experiments. Subject Categories and Descriptors [H.3.5 Online Information Services]; Web-based services: [I.2.3 Deduction and Theorem Proving]; Fuzzy, and probabilistic reasoning General Terms: Fuzzy Process; Web Services
不同的服务对于其不同的属性(功能性和非功能性)具有不同的值。此外,消费者对这些属性有不同的偏好。由于这些偏好可能是不完整的/模糊的/不精确的,这不可避免地会导致为消费者选择非最佳服务,这些服务可能不具有消费者期望的这些属性值。因此,基于消费者偏好的最优web服务选择是一项具有挑战性的任务。本文提出了一种新的服务选择模型,该模型考虑了消费者对不同服务属性的偏好以及服务属性的实际值。采用改进的模糊扩展层次分析法(FEAHP)和加权和法(WSM)分别对服务的功能属性和非功能属性进行评价和优先级权重计算。使用实时数据进行实验。主题类别和描述符[H.3.5在线信息服务];基于web的服务:[I.2.3演绎与定理证明];模糊推理与概率推理通则:模糊过程Web服务
{"title":"Optimal Web Service Selection Model using Fuzzy Extended AHP and Weighted Sum Method","authors":"R. Kohar","doi":"10.6025/JDIM/2018/16/4/157-168","DOIUrl":"https://doi.org/10.6025/JDIM/2018/16/4/157-168","url":null,"abstract":"Different services have different values for their different properties (functional and non-functional). Moreover, consumers have different preferences for these properties. Since these preferences may be incomplete/ vague/imprecise, this inevitably can in turn cause selection of a non-optimal service for the consumer which may not have the desired value for these properties for the consumer. Therefore optimal web service selection based on the consumer’s preferences is a challenging task. In this paper, a new service selection model is proposed which considers consumer preferences for different service properties as well as the actual values of its properties. Services are evaluated and priority weights are computed separately for functional and non-functional properties using modified Fuzzy Extended Analytic Hierarchy Process (FEAHP) and Weighted Sum Method (WSM) respectively. Real time data is used to conduct experiments. Subject Categories and Descriptors [H.3.5 Online Information Services]; Web-based services: [I.2.3 Deduction and Theorem Proving]; Fuzzy, and probabilistic reasoning General Terms: Fuzzy Process; Web Services","PeriodicalId":197165,"journal":{"name":"Journal of Digital Information Management","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132403643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Cloud Computing Intrusion Detection Using Artificial Bee Colony-BP Network Algorithm 基于人工蜂群bp网络算法的云计算入侵检测
Pub Date : 2018-08-01 DOI: 10.6025/jdim/2018/16/4/203-209
Yang Hui
Cloud computing characterizes a methodology for computing communications in a much effective manner, and a business paradigm for trading computing resources and services. Alternatively, these difficult and distributed planning’s turn a striking objective for intruders. Cloud computing provides huge latent for enhancing production and decrease expenditures. However it simultaneously acquires several novel security risks. Intrusion Detection Systems (IDS) have been employed broadly for identifying malicious actions in network communication and hosts. In this work, an artificial bee colony-BP neural network algorithm is applied to the detection module, in order to detect the complicated aggressive behaviors. Through example verification, the artificial bee colony-BP network algorithm has improved intrusion detection efficiency and classification precision, and can effectively guarantee the safety of the cloud computing environment. Subject Categories and Descriptors [D.4.6 Security and Protection] [C.2 Cmputer Communication Networks] Security and protection [F.1.1 Models of Computation]; Neural networks General Terms: Cloud Computing, Neural Networks, IDS
云计算的特点是一种以非常有效的方式计算通信的方法,以及一种交易计算资源和服务的业务范例。另外,这些困难和分散的计划变成了入侵者的一个引人注目的目标。云计算为提高生产和减少支出提供了巨大的潜力。然而,它同时也带来了一些新的安全风险。入侵检测系统(IDS)被广泛用于识别网络通信和主机中的恶意行为。本文将人工蜂群- bp神经网络算法应用于检测模块,以检测复杂的攻击行为。通过实例验证,人工蜂群- bp网络算法提高了入侵检测效率和分类精度,能够有效保障云计算环境的安全。主题类别和描述词[D.4.6安全与保护][C.2 .6计算机通信网络安全与保护[F.1.1计算模型];通用术语:云计算,神经网络,入侵检测系统
{"title":"Cloud Computing Intrusion Detection Using Artificial Bee Colony-BP Network Algorithm","authors":"Yang Hui","doi":"10.6025/jdim/2018/16/4/203-209","DOIUrl":"https://doi.org/10.6025/jdim/2018/16/4/203-209","url":null,"abstract":"Cloud computing characterizes a methodology for computing communications in a much effective manner, and a business paradigm for trading computing resources and services. Alternatively, these difficult and distributed planning’s turn a striking objective for intruders. Cloud computing provides huge latent for enhancing production and decrease expenditures. However it simultaneously acquires several novel security risks. Intrusion Detection Systems (IDS) have been employed broadly for identifying malicious actions in network communication and hosts. In this work, an artificial bee colony-BP neural network algorithm is applied to the detection module, in order to detect the complicated aggressive behaviors. Through example verification, the artificial bee colony-BP network algorithm has improved intrusion detection efficiency and classification precision, and can effectively guarantee the safety of the cloud computing environment. Subject Categories and Descriptors [D.4.6 Security and Protection] [C.2 Cmputer Communication Networks] Security and protection [F.1.1 Models of Computation]; Neural networks General Terms: Cloud Computing, Neural Networks, IDS","PeriodicalId":197165,"journal":{"name":"Journal of Digital Information Management","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117244698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intellectual Capital as a Core Competency for Competitive Advantage: A Case Study 智力资本作为竞争优势的核心能力:个案研究
Pub Date : 2018-08-01 DOI: 10.6025/JDIM/2018/16/4/192-202
Nazem Malkawi, K. Omari, Azmi Halasa
This paper aimed to study intellectual capital as a core competency for competitive advantage at pharmaceutical companies in Jordan. To complete the study, a case study was instituted by analyzing the responses of the pharmaceutical companies; the data collected were analyzed with a statistical package. The study concluded some results, the most appearing were; pharmaceutical companies depend on intellectual capital at a high level, competitive advantage also high, and there is a significant statistical effect of intellectual capital on competitive advantage as a whole and on all its indicators (leadership, human recourse, innovation, processes, and financial excellence) at (α ≤ 0.00). Researchers recommend pharmaceutical companies management and staff to reinforce using intellectual capital at all levels and functions and use it as a main source for competitive advantage in all its areas. Subject Categories and Descriptors: [G.3 Probability And Statistics]: [J.1 Administrative Data Processing ]; Business
本文旨在研究约旦制药企业的核心竞争力——智力资本。为了完成研究,通过分析制药公司的反应,建立了一个案例研究;收集的数据用统计软件包进行分析。研究总结了一些结果,最引人注目的是;医药企业对智力资本的依赖程度较高,竞争优势也较高,智力资本对整体竞争优势及其所有指标(领导力、人力资源、创新、流程和财务卓越)的统计效应在(α≤0.00)处显著。研究人员建议制药公司的管理层和员工加强在各个层面和职能部门使用智力资本,并将其作为所有领域竞争优势的主要来源。主题类别和描述符:[G.3 .数理统计[j]行政资料处理];业务
{"title":"Intellectual Capital as a Core Competency for Competitive Advantage: A Case Study","authors":"Nazem Malkawi, K. Omari, Azmi Halasa","doi":"10.6025/JDIM/2018/16/4/192-202","DOIUrl":"https://doi.org/10.6025/JDIM/2018/16/4/192-202","url":null,"abstract":"This paper aimed to study intellectual capital as a core competency for competitive advantage at pharmaceutical companies in Jordan. To complete the study, a case study was instituted by analyzing the responses of the pharmaceutical companies; the data collected were analyzed with a statistical package. The study concluded some results, the most appearing were; pharmaceutical companies depend on intellectual capital at a high level, competitive advantage also high, and there is a significant statistical effect of intellectual capital on competitive advantage as a whole and on all its indicators (leadership, human recourse, innovation, processes, and financial excellence) at (α ≤ 0.00). Researchers recommend pharmaceutical companies management and staff to reinforce using intellectual capital at all levels and functions and use it as a main source for competitive advantage in all its areas. Subject Categories and Descriptors: [G.3 Probability And Statistics]: [J.1 Administrative Data Processing ]; Business","PeriodicalId":197165,"journal":{"name":"Journal of Digital Information Management","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124557934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
期刊
Journal of Digital Information Management
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1