Results 11 to 20 of about 8,977 (50)

Online Education as a New Normal: Are We Ready for this New Teaching and Learning Mode? [PDF]

open access: yesJournal of Information Technology Management, 2023
The spread of COVID-19 pandemic starting in late 2019 has changed the way we conduct our teaching and learning activities especially in Higher Education Institutions (HEIs). Since March 2020, classes have been conducted via online platforms.
Abdul Kadir Othman   +1 more
doaj   +1 more source

Mobile Host Intrusion Detection in Surveillance Wireless Sensor Networks with Fusion of Sensor Data [PDF]

open access: yesJournal of Information Technology Management, 2023
In intrusion detection applications, wireless sensor networks are commonly used. Many research literature papers are aimed at generating and evaluating the information on intruder detection in terms of probability of detection and false alarm rates.
J. Josephin Jinisha, S. Jerine
doaj   +1 more source

Flash Attack Prognosis by Ensemble Supervised Learning for IoT Networks [PDF]

open access: yesJournal of Information Technology Management, 2023
The scope of the Internet of Things (IoT) becomes inevitable in the communication and information-sharing routines of human life, similar to any technological architecture.
M. Jagadeesh Babu, A.R Reddy
doaj   +1 more source

Investigating the Barriers of Using Blockchain Technology in Iran's Automobile Industry [PDF]

open access: yesInternational Journal of Web Research, 2022
This study evaluated the obstacles and challenges of using blockchain technology in Iran's automotive industry. The statistical population of the present study is all specialists and experts who were familiar with blockchain technology.
Mohsen Zabihi Jamkhaneh   +3 more
doaj   +1 more source

A Dynamic Load Balancing Architecture for Fog Computing using Tree Base Resource Arrangement and Flexible Task Prioritization [PDF]

open access: yesJournal of Information Technology Management, 2023
A greater community of researchers widely studies fog computing as it reduces the massive data flow to the existing cloud-connected network and performs better for real-time systems that expect a quick response.
Bikash Sarma   +2 more
doaj   +1 more source

Improved Particle Swarm Optimization Based Distributed Energy-Efficient Opportunistic Algorithm for Clustering and Routing in WSNs [PDF]

open access: yesJournal of Information Technology Management, 2023
Wireless Sensor Networks (WSNs) have been employed in various real-time applications and addressed fundamental issues, such as limited power resources and network life.
M. S. Sivagamasundari   +3 more
doaj   +1 more source

The role of internet of things (IOT) in knowledge management systems (Case study: Performance management of Yazd municipality staff) [PDF]

open access: yesJournal of Information Technology Management, 2015
With the development of Internet of things (IOT) technologies in recent years, the development of knowledge management systems based on them, as well as the role of these systems in different organizational areas such as staff performance management ...
Hamid Reza Khedmatgozar
doaj   +1 more source

Economic and mathematical modeling of innovative development of the agglomeration on the basis of information technologies [PDF]

open access: yesJournal of Information Technology Management, 2023
Management of innovation processes is one of the functions of local governments and, therefore, they should be the initiators and moderators of communication between research organizations and enterprises.
Mykhailo Oklander   +6 more
doaj   +1 more source

Critical Success Factors for Business Intelligence Implementation in an Enterprise Resource Planning System Environment Using DEMATEL: A Case Study at a Cement Manufacture Company in Indonesia [PDF]

open access: yesJournal of Information Technology Management, 2020
This paper is aimed at evaluating critical success factors in Business Intelligence (BI) implementation in an Enterprise Resource Planning (ERP) environment.
Ridha Adjie Eryadi   +1 more
doaj   +1 more source

Presenting a Framework for Evaluating and Prioritizing Risk of Information Technology Outsourcing: Perspective of Experts in Information Systems Design [PDF]

open access: yesJournal of Information Technology Management, 2012
Information technology outsourcing projects have advantages including: reduced costs, improved service quality, creation of competitive advantage, etc.
abbas Keramati   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy