scispace - formally typeset
Search or ask a question

Showing papers in "Enterprise Information Systems in 2018"


Journal ArticleDOI
TL;DR: A new bio-inspired optimization approach called Bees Life Algorithm (BLA) is proposed aimed at addressing the job scheduling problem in the fog computing environment and outperforms the traditional particle swarm optimization and genetic algorithm in terms of CPU execution time and allocated memory.
Abstract: Fog computing is a new computing architecture, composed of a set of near-user edge devices called fog nodes, which collaborate together in order to perform computational services such as running ap...

202 citations


Journal ArticleDOI
TL;DR: A scheduling method aiming for diverse tasks, which enables each service demander to obtain desired manufacturing services is proposed, which is able to achieve better performance than some usual algorithms such as simulated annealing and pattern search.
Abstract: Cloud manufacturing (CMfg) has emerged as a new manufacturing paradigm that provides ubiquitous, on-demand manufacturing services to customers through network and CMfg platforms. In CMfg system, ta...

84 citations


Journal ArticleDOI
TL;DR: A new method for manufacturing resource supply–demand matching based on complex networks and Internet of Things (IoT) is proposed, and a four-layered architecture for implementing this method is designed.
Abstract: After investigation on the existing advanced manufacturing systems (AMSs), it is found that supply–demand matching of manufacturing resource is one of the common issues to be addressed in all AMSs, and methods for addressing this issue have evolved from P2P (peer-to-peer)-based, to information centre-based, and to platform (or system)-based matching, and are moving towards socialisation and service-based solutions. In order to adapt to this trend, a new method for manufacturing resource supply–demand matching based on complex networks and Internet of Things (IoT) is proposed, and a four-layered architecture for implementing this method is designed. In this method, IoT technology is employed to realise the intelligent perception and accessing of various manufacturing resources and capabilities (MR&C), which enables logical aggregation of various distributed MR&C in the form of services. Then complex networks model and theory are used to realise the efficient manufacturing service management, optima...

82 citations


Journal ArticleDOI
TL;DR: A reference architecture for IoT-based logistic information systems in agri-food supply chains is developed and a hybrid solution that combines the IoT and cloud computing is proposed.
Abstract: Logistics in the food and agribusiness industry must address perishable products, unpredictable supply variations and stringent food safety and sustainability requirements. The Internet of Things (IoT) could contribute significantly to solve these challenges because it allows for remotely controlling the location and conditions of shipments and products. This paper develops a reference architecture for IoT-based logistic information systems in agri-food supply chains. It proposes a hybrid solution that combines the IoT and cloud computing. The architecture supports the provision of affordable tailor-made solutions by utilising technology enablers of the European Future Internet programme and by facilitating the reuse of domain-specific functionalities.

80 citations


Journal ArticleDOI
TL;DR: Fundamental elements of IoT including architectural framework, enabling technologies, network communication, data management, and IoT interactions were discussed with a series of challenges for wider and deeper IoT applications.
Abstract: Internet of Things (IoT) has gradually become one of the most popular topics among both academia and industry, and it is considered as a crucial part of future Internet. However, very few o...

68 citations


Journal ArticleDOI
TL;DR: The introduction of pervasive and ubiquitous instrumentation within Internet of Things (IoT) leads to unprecedented real-time visibility (instrumentation), optimization and fault-tolerance of the p... as discussed by the authors.
Abstract: The introduction of pervasive and ubiquitous instrumentation within Internet of Things (IoT) leads to unprecedented real-time visibility (instrumentation), optimization and fault-tolerance of the p...

53 citations


Journal ArticleDOI
TL;DR: It is concluded that little relevance has been given to computational intelligence and machine learning techniques and process mining challenges, such as balancing among robustness, simplicity, accuracy and generalization, could benefit from a larger use of such techniques.
Abstract: This study systematically assesses the process mining scenario from 2005 to 2014. The analysis of 705 papers evidenced ‘discovery’ (71%) as the main type of process mining addressed and ‘categorical prediction’ (25%) as the main mining task solved. The most applied traditional technique is the ‘graph structure-based’ ones (38%). Specifically concerning computational intelligence and machine learning techniques, we concluded that little relevance has been given to them. The most applied are ‘evolutionary computation’ (9%) and ‘decision tree’ (6%), respectively. Process mining challenges, such as balancing among robustness, simplicity, accuracy and generalization, could benefit from a larger use of such techniques.

49 citations


Journal ArticleDOI
TL;DR: A novel data-intensive cycle time (CT) prediction system with parallel computing to rapidly forecast the CT of wafer lots with large datasets and can not only speed up the training process of the model but also outperform the radial basis function network, the back-propagation-network and multivariate regression methodology based CTF methods.
Abstract: Cycle time forecasting (CTF) is one of the most crucial issues for production planning to keep high delivery reliability in semiconductor wafer fabrication systems (SWFS). This paper proposes a nov...

46 citations


Journal ArticleDOI
TL;DR: Results of the MicroBuilder tool evaluation are presented alongside the case study which illustrates a usage of MicroBuilder, the tool used for the specification of a software architecture that follows REST microservice design principles.
Abstract: In this paper we present MicroBuilder, the tool used for the specification of a software architecture that follows REST microservice design principles. MicroBuilder comprises MicroDSL and MicroGenerator modules. The MicroDSL module provides the MicroDSL domain-specific language used for the specification of REST microservice software architecture. In this paper we present MicroDSL meta-model, specified in Ecore, together with textual and graphical concrete syntaxes, specified using Xtext and Sirius frameworks respectively. The MicroGenerator module is used to generate executable program code based on MicroDSL specification. In this paper we also present results of the MicroBuilder tool evaluation, alongside the case study which illustrates a usage of MicroBuilder.

35 citations


Journal ArticleDOI
TL;DR: This paper proposes a hybrid emergency message transmission (HEMT), which introduces the SDN technology into the vehicular network environment and utilizes the flexibility of inter-vehicle communication by deploying SDN-enabled central controller and RSU switches to obtain reliable and fast emergency message dissemination.
Abstract: With the increasing number of vehicles connected to the Internet-of-Things (IoT), Internet-of-Vehicles (IoV) is becoming a hot research topic. It can improve traffic safety and efficiency and promote the development of the intelligent transportation that is a very important element in Smart Cities. As an important part of the safety application in IoV, the emergency message transmission is designed to inform all the vehicles in the relevant area timely of the accident information through the multi-hop broadcast communication. In this paper, we propose a hybrid emergency message transmission (HEMT), which introduces the SDN technology into the vehicular network environment and utilizes the flexibility of inter-vehicle communication. By deploying SDN-enabled central controller and RSU switches, we can obtain reliable and fast emergency message dissemination. Moreover, considering the space between the coverages of RSUs caused by the sparse deployment, we also use inter-vehicle multi-hop broadcast co...

30 citations


Journal ArticleDOI
TL;DR: An extensive literature analysis of past 22 years of CSFs of enterprise systems through their life cycle in pursuit of resilient smart factory for emerging aircraft industry can help the practitioners and researchers to make rational decisions throughout the ES life cycle.
Abstract: The research aims to investigate business value critical success factors (CSFs) of enterprise systems (ES) through their life cycle in pursuit of resilient smart factory for emerging aircraft industry. This article provides an extensive literature analysis of past 22 years based on conscientious criteria of authors: (i) who have published strategic content relevant to CSFs, (ii) received more than 300 citations and (iii) concurrently published two or more papers relevant to ES CSFs. The most cited strategic CSFs were termed as classical CSFs. The 22 CSFs were identified, validated and synthesised for better understanding of success across life cycle by aircraft industry experts. The top 10 empirically verified CSFs have numerous differences with past generic classical CSFs. This article canvases real insights of two distinct views: process and variance approaches of the ES CSFs. The process approach, which is a neglected research area, facilitates the researchers for identification of ES life cycle process coupled with a view of resource deployment when it is needed the most. While the variance approach facilitates practitioners and researchers in finding out which resource (CSF) is relatively more important. The significant findings for ES life cycle can help the practitioners and researchers to make rational decisions throughout the ES life cycle.

Journal ArticleDOI
TL;DR: The justification of introducing a hybrid database, depending on the criteria of data structuredness in use, was analysed and a new approach for design hybrid SQL/NoSQL database was presented, with its necessary activities.
Abstract: Nowadays the dominant databases for work with structured data are based on a relational model (also called SQL databases), while NoSQL databases have been the increasingly popular solution for unstructured data. An important requirement which contemporary enterprise information systems should address is the use of data, regardless of the level of their structuredness. That has led to the need for design a unique logical database, which includes SQL and NoSQL components, and takes advantage of both technologies, so-called a hybrid SQL/NoSQL database. In this paper, the justification of introducing a hybrid database, depending on the criteria of data structuredness in use, was analysed and a new approach for design hybrid SQL/NoSQL database was presented, with its necessary activities. Experimental results confirmed, in certain conditions, the better performances of the hybrid database compared to SQL database and opened the space for further research.

Journal ArticleDOI
TL;DR: A novel comprehensive data analysis framework alongside a text-mining framework is used to objectively classify and understand customer perceptions during this horsemeat scandal and shows that social media can provide important insights into customer behaviour during crisis communications.
Abstract: As social media has become an important part of modern daily life, users often share product opinions online and these tend to spike when large companies undergo crises. This paper investigates cus...

Journal ArticleDOI
TL;DR: The results show that the IT productivity paradox is aggravated in service SMEs and calls for further research on this issue, suggesting notable differences between the two sectors regarding their respective IT and non-IT capability-building.
Abstract: Building on the resource-based view (RBV) perspective, we analyse the combined effects of two highly-valued organizational resources, namely information technology (IT) capabilities and human resou...

Journal ArticleDOI
TL;DR: In order to minimize the cache miss cost in the hybrid main memory, a cost aware cache replacement policy (CACRP) is proposed that reduces the number of cache misses from NVM and improves the cache performance for a hybrid memory system.
Abstract: Fog computing requires a large main memory capacity to decrease latency and increase the Quality of Service (QoS). However, dynamic random access memory (DRAM), the commonly used random access memory, cannot be included into a fog computing system due to its high consumption of power. In recent years, non-volatile memories (NVM) such as Phase-Change Memory (PCM) and Spin-transfer torque RAM (STT-RAM) with their low power consumption have emerged to replace DRAM. Moreover, the currently proposed hybrid main memory, consisting of both DRAM and NVM, have shown promising advantages in terms of scalability and power consumption. However, the drawbacks of NVM, such as long read/write latency give rise to potential problems leading to asymmetric cache misses in the hybrid main memory. Current last level cache (LLC) policies are based on the unified miss cost, and result in poor performance in LLC and add to the cost of using NVM. In order to minimize the cache miss cost in the hybrid main memory, we prop...

Journal ArticleDOI
TL;DR: A three-parties evolutionary game model is established to study each player’s game strategy based on bounded rationality and demonstrates that a suitable bonus-penalty measure can promote the healthy development of online group-buying market.
Abstract: The emergence of online group-buying provides a new consumption pattern for consumers in e-commerce era. However, many consumers realize that their own interests sometimes can’t be guaranteed in th...

Journal ArticleDOI
TL;DR: This special issue on new technologies and research trends for intelligent collaborative system and service in value network for enterprise computing provides high-quality contributions addressing the fields such as electronic collaboration, collaboration platform/service and collaborative innovation support.
Abstract: Recently, competitive environment for enterprise computing is being mixed with increased uncertainty of supply and demand, globalised markets, shortening of product’s life cycle, rapid change of pr...

Journal ArticleDOI
TL;DR: The study shows that interaction with the B2B-eM-CSFs is an important dimension and has a positive and significant impact on e-business efficiency and marketing improvements for Asian SMEs.
Abstract: Business-to-business (B2B) organisations are increasingly utilising electronic devices in their business operations in order to succeed in increasingly competitive markets. This trend is prevalent in the growing Asian markets, especially in the small and medium-sized enterprises (SMEs) sector. While prior research has focused on this issue in the context of large business-to-customer (B2C) organisations in Asia, there have hardly been any studies that have shed light on the B2B sector in the SME setting. This study aims to critically explore B2B e-marketing critical success factors (B2B-eM-CSFs) for SMEs operating in the Asian B2B marketplace. A key finding is the development of a theoretical framework for SMEs, emerging from the analysis of 406 companies from various industrial sectors. The study shows that interaction with the B2B-eM-CSFs is an important dimension and has a positive and significant impact on e-business efficiency and marketing improvements for Asian SMEs.

Journal ArticleDOI
TL;DR: This paper proposes to formalize the specification language with the consideration of formal logic, so that some effective theorems can be derived for the verification of syntax, semantics, and inference rules in the workflow composition.
Abstract: A Service Workflow is an aggregation of distributed services to fulfill specific functionalities. With ever increasing available services, the methodologies for the selections of the services against the given requirements become main research subjects in multiple disciplines. A few of researchers have contributed to the formal specification languages and the methods for model checking; however, existing methods have the difficulties to tackle with the complexity of workflow compositions. In this paper, we propose to formalize the specification language to reduce the complexity of the workflow composition. To this end, we extend a specification language with the consideration of formal logic, so that some effective theorems can be derived for the verification of syntax, semantics, and inference rules in the workflow composition. The logic-based approach automates compliance checking effectively. The Service Workflow Specification (SWSpec) has been extended and formulated, and the soundness, comple...

Journal ArticleDOI
TL;DR: A configurable approach for recommendations which determines the suitable recommendation method for each field based on the characteristics of its data, the method includes determining the suitable technique for selecting a representative sample of the provided data.
Abstract: This study presents a configurable approach for recommendations which determines the suitable recommendation method for each field based on the characteristics of its data, the method includes determining the suitable technique for selecting a representative sample of the provided data. Then selecting the suitable feature weighting measure to provide a correct weight for each feature based on its effect on the recommendations. Finally, selecting the suitable algorithm to provide the required recommendations. The proposed configurable approach could be applied on different domains. The experiments have revealed that the approach is able to provide recommendations with only 0.89 error rate percentage.

Journal ArticleDOI
TL;DR: Perceived usefulness, perceived ease of use, social influence, organizational commitment and job security are essential for formulating the adoption intention, and adoption intention is also affected by gender, age, and education level.
Abstract: Why would employees adopt bring your own device (BYOD)? Would employees feel risk-taking to perform their work by using their own devices? Would peer pressure and company policy help encourage thei...

Journal ArticleDOI
TL;DR: The requirements and obstacles facing consumers who make purchases through e-Malls in Saudi Arabia are determined, which provide various benefits to consumers and are a suitable environment for SMEs to present and sell their products.
Abstract: A large segment of consumers prefer e-procurement because it provides several advantages such as a variety of options and lower prices. The business-to-consumer approach is spreading on a global scale, but its role is limited in countries such as Saudi Arabia due to the size and strength of the economy. Saudi Arabia has the fourth highest level of economic growth in the Middle East and ranks 38th globally in terms of Internet infrastructure. Its rate of Internet growth is 12% yearly, and 40% of the population has access to the Internet. The volume of online trade in Saudi Arabia was USD 800 million in 2012, and 56% of this amount was for purchases through foreign websites.The end consumers are one of the most important target segments of small- and medium-sized enterprises (SMEs), which constitute 90% of Saudi Arabian companies. These companies face limitations in establishing e-procurement channels because these channels require financial support beyond their funding capabilities. Therefore, one ...

Journal ArticleDOI
TL;DR: This study identifies the critical success factors for collaborative strategic partnerships and presents an evaluation framework for assessing and managing suppliers and develops an organisational process model for Supplier relationship management (SRM)-based collaboration.
Abstract: Nowadays, information technology (IT) outsourcing companies face enduring demands to reduce cost while increasing productivity. This pressure leads many IT outsourcing companies to rely on outsourcing arrangements with IT personnel suppliers. In order to maximise efficiency, outsourcing companies have focused on fostering high-performing suppliers through improved collaboration and mutual relations. However, it is very difficult to advance to a long-term partnership using the existing outsourcing process because of insufficient collaboration between IT outsourcing companies and their suppliers. Based on collaboration perspective of supply chain management (SCM), this study identifies the critical success factors for collaborative strategic partnerships and presents an evaluation framework for assessing and managing suppliers. We have developed an organisational process model for Supplier relationship management (SRM)-based collaboration which includes some of the key constructs from the previous s...

Journal ArticleDOI
TL;DR: A framework of cooperation of these systems, based on the schema on read modeling approach and data virtualization, is proposed, which responds flexibly and efficiently to the requirements related to adding new data sources, new data models and new data storage technologies.
Abstract: Big Data analysis is the process that can help organizations to make better business decisions. Organizations use data warehouses and business intelligence systems, i.e. enterprise information systems (EISs), to support and improve their decision-making processes. Since the ultimate goal of using EISs and Big Data analytics is the same, a logical task is to enable these systems to work together. In this paper we propose a framework of cooperation of these systems, based on the schema on read modeling approach and data virtualization. The goal of data virtualization process is to hide technical details related to data storage from applications and to display heterogeneous data sources as one integrated data source. We have tested the proposed model in a case study in the transportation domain. The study has shown that the proposed integration model responds flexibly and efficiently to the requirements related to adding new data sources, new data models and new data storage technologies.

Journal ArticleDOI
TL;DR: RESTsec is presented, a Low-Code platform that supports rapid security requirements modelling for Enterprise Services, abiding by the state of the art ABAC authorisation scheme, and enables the developer to seamlessly embed the desired access control policy and generate the service, the security infrastructure and the code.
Abstract: In the modern business world it is increasingly often that Enterprises opt to bring their business model online, in their effort to reach out to more end users and increase their customer base. Whi...

Journal ArticleDOI
TL;DR: Simulation results show that the proposed mechanism not only minimizes total execution time for mobile devices but also decreases their energy consumption.
Abstract: Nowadays Internet applications have become more complicated that mobile device needs more computing resources for shorter execution time but it is restricted to limited battery capacity. Mobile clo...

Journal ArticleDOI
TL;DR: An integrated research model that combines the process virtualization theory (PVT), the technology-organization-environment (TOE) framework and the institutional theory (INT) is proposed, contributing to the information system (IS) discipline, deepening the applicability and strengths of these theories.
Abstract: Software as a service (SaaS) is a service model in which the applications are accessible from various client devices through internet. Several studies report possible factors driving the adoption o...

Journal ArticleDOI
TL;DR: It is found that the level of information entropy significantly influences emergency information dissemination and can more effectively describe and understand information on the internet concerning emergency responses.
Abstract: The emergency information dissemination model discussed in this paper describes the dissemination and broadcasting characteristics of emergency information on the internet. This model is helpful fo...

Journal ArticleDOI
TL;DR: This work builds process models via Petri nets (PNs) and investigates how to repair a PN-based process model with choice structures and designs a new model repair approach.
Abstract: Model repair is regarded as a new process mining technique. It can repair process models of information systems according to the generated event logs. The existing approaches focus on eliminating d...

Journal ArticleDOI
TL;DR: A gossip based distributed itemset mining (GDIM) algorithm is proposed to extract frequent itemsets, which are special types of frequent patterns, in a wireless sensor network environment and experimental results show that the proposed algorithm outperforms the best existing gossip based algorithm in term of execution time.
Abstract: The computational complexity, huge memory space requirement, and time-consuming nature of frequent pattern mining process are the most important motivations for distribution and parallelization of ...