Volume 16 Number 4 August 2018


Optimal Web Service Selection Model using Fuzzy Extended AHP and Weighted Sum Method

Rachna Kohar

https://doi.org/10.6025/jdim/2018/4/157-168

Abstract Different services have different values for their different properties (functional and non-functional). Moreover, consumers have different preferences for these properties. Since these preferences may be incomplete/ vague/imprecise, this inevitably can in turn cause selection of a non-optimal service for the consumer which may not have the desired value for these properties for the consumer. Therefore optimal web service selection based... Read More


Exploiting Links to Improve Search in XML Documents

Samia Berchiche-Fellag, Mohamed Mezghiche

https://doi.org/10.6025/jdim/2018/4/169-179

Abstract This paper describes an approach that exploits links in XML retrieval. The proposed approach consists of reranking the set of documents returned for a given query by considering three sources of evidence namely, the relevance scores w.r.t query of a document neighbours, the text of the anchor links, and the document title tag. Our approach is evaluated on INEX 2006 collection. The results showed significant improvements of the... Read More


Major Issues in Adoption of Electronic Health Records

Myongho Yi

https://doi.org/10.6025/jdim/2018/4/180-191

Abstract Backgrounds: The use of Electronic Health Records (EHRs) is not new, but the implementation and provision of their services are. Despite the positive aspects and promising features of EHRs use in medical and healthcare practices, there are many issues that need to be identified and addressed to expedite the adoption rate of EHRs. The objective of the study is to examine major issues which hinder EHR... Read More


Intellectual Capital as a Core Competency for Competitive Advantage: A Case Study

Nazem M.M. Malkawi, Kalid Al Omari, AzmiHalasa

https://doi.org/10.6025/jdim/2018/4/192-202

Abstract This paper aimed to study intellectual capital as a core competency for competitive advantage at pharmaceutical companies in Jordan. To complete the study, a case study was instituted by analyzing the responses of the pharmaceutical companies; the data collected were analyzed with a statistical package. The study concluded some results, the most appearing were; pharmaceutical companies depend on intellectual capital at a high level, competitive... Read More


Cloud Computing Intrusion Detection Using Artificial Bee Colony-BP Network Algorithm

Yang Hui

https://doi.org/10.6025/jdim/2018/4/203-209

Abstract Cloud computing characterizes a methodology for computing communications in a much effective manner, and a business paradigm for trading computing resources and services. Alternatively, these difficult and distributed planning's turn a striking objective for intruders. Cloud computing provides huge latent for enhancing production and decrease expenditures. However it simultaneously acquires several novel security risks. Intrusion Detection Systems (IDS) have been employed broadly for identifying malicious... Read More