Guest Editors
Dr. Abdelli Mohammed El Amine, University of Salamanca, Spain.
Prof. Anjali Awasthi, Concordia University, Canada.
Prof. Enric Serradell-Lopez, Open University of Catalonia, Spain.
Prof. Maite Cancelo, University of Santiago de Compostela, Spain.
Summary
Big Data plays an essential factor in the wheel of management of organizations in the world’s business so that Big Data has been receiving significant attention in a variety of research and application fields as business and management over recent years. The volume of data generated by computers, people, software, and networks along with the related difficulty of the scientific community involves creativity in organizational management. In business, the ability to work with various types of data - management techniques will provide highly technical expertise to the organizations and governments that they need to operate effectively. In addition, the increasing interest in big data analysis and applications in the management activities indicates that the digital domain field is likely to soon become a data-intensive one.
This Special Issue will present selected samples of the recent research on the use of advanced methods in management science in the wide field of Big Data Analytics, technologies, models, strategies, and methodologies. It will address common principles and technical approaches to data analysis and computational methodology used in the business field, and potentially create doors for further study and advancement of innovative analytical tools and techniques in Big Data applications.
This special issue aims to motivate researchers in the field of managing data to publish their latest research, up-to-date challenges, and opportunities. Proposed submissions should be original and unpublished.
Keywords
Big Data; Decision making; Theoretical and computational models for data Analytics; Challenges in Business Intelligence; Big data and enterprise risk management; Big Data and Sustainability; E-entrepreneurship; Entrepreneurship and Digitalization; Data business; Data management and analytics in IoT; Data in the Management; Data analytics in CSR & Accounting; Fintech (Financial technology); Digital transformation.
Published Papers
-
Open Access
ARTICLE
Regulation Relatedness Map Creation Method with Latent Semantic Analysis
Mehmet Murat Huyut, Batuhan Kocaoğlu, Ünzile Meram
CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 2093-2107, 2022, DOI:10.32604/cmc.2022.024190
(This article belongs to this Special Issue:
Application of Big Data Analytics in the Management of Business)
Abstract Regulatory authorities create a lot of legislation that must be followed. These create complex compliance requirements and time-consuming processes to find regulatory non-compliance. While the regulations establish rules in the relevant areas, recommendations and best practices for compliance are not generally mentioned. Best practices are often used to find a solution to this problem. There are numerous governance, management, and security frameworks in Information Technology (IT) area to guide businesses to run their processes at a much more mature level. Best practice maps can used to map another best practice, and users can adapt themselves by the help of this…
More >
-
Open Access
ARTICLE
QoS in FANET Business and Swarm Data
Jesús Hamilton Ortiz, Carlos Andrés Tavera Romero, Bazil Taha Ahmed, Osamah Ibrahim Khalaf
CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1877-1899, 2022, DOI:10.32604/cmc.2022.023796
(This article belongs to this Special Issue:
Application of Big Data Analytics in the Management of Business)
Abstract This article shows the quality of services in a wireless swarm of drones that form an ad hoc network between them Fly Ad Hoc Networks (FANET). Each drone has the ability to send and receive information (like a router); and can behave as a hierarchical node whit the intregration of three protocols: Multiprotocol Label Switch (MPLS), Fast Hierarchical AD Hoc Mobile (FHAM) and Internet Protocol version 6 (IPv6), in conclusion MPLS + FHAM + IPv6. The metrics analyzed in the FANET are: delay, jitter, throughput, lost and sent packets/received. Testing process was carried out with swarms composed of 10, 20,…
More >
-
Open Access
ARTICLE
Feature Model Configuration Reuse Scheme for Self-Adaptive Systems
Sumaya Alkubaisi, Said Ghoul, Oguz Ata
CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 1249-1262, 2022, DOI:10.32604/cmc.2022.019434
(This article belongs to this Special Issue:
Application of Big Data Analytics in the Management of Business)
Abstract Most large-scale systems including self-adaptive systems utilize feature models (FMs) to represent their complex architectures and benefit from the reuse of commonalities and variability information. Self-adaptive systems (SASs) are capable of reconfiguring themselves during the run time to satisfy the scenarios of the requisite contexts. However, reconfiguration of SASs corresponding to each adaptation of the system requires significant computational time and resources. The process of configuration reuse can be a better alternative to some contexts to reduce computational time, effort and error-prone. Nevertheless, systems’ complexity can be reduced while the development process of systems by reusing elements or components. FMs…
More >
-
Open Access
ARTICLE
Dual-Port Content Addressable Memory for Cache Memory Applications
Allam Abumwais, Adil Amirjanov, Kaan Uyar, Mujahed Eleyat
CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4583-4597, 2022, DOI:10.32604/cmc.2022.020529
(This article belongs to this Special Issue:
Application of Big Data Analytics in the Management of Business)
Abstract Multicore systems oftentimes use multiple levels of cache to bridge the gap between processor and memory speed. This paper presents a new design of a dedicated pipeline cache memory for multicore processors called dual port content addressable memory (DPCAM). In addition, it proposes a new replacement algorithm based on hardware which is called a near-far access replacement algorithm (NFRA) to reduce the cost overhead of the cache controller and improve the cache access latency. The experimental results indicated that the latency for write and read operations are significantly less in comparison with a set-associative cache memory. Moreover, it was shown…
More >
-
Open Access
ARTICLE
A New Reward System Based on Human Demonstrations for Hard Exploration Games
Wadhah Zeyad Tareq, Mehmet Fatih Amasyali
CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 2401-2414, 2022, DOI:10.32604/cmc.2022.020036
(This article belongs to this Special Issue:
Application of Big Data Analytics in the Management of Business)
Abstract The main idea of reinforcement learning is evaluating the chosen action depending on the current reward. According to this concept, many algorithms achieved proper performance on classic Atari 2600 games. The main challenge is when the reward is sparse or missing. Such environments are complex exploration environments like Montezuma’s Revenge, Pitfall, and Private Eye games. Approaches built to deal with such challenges were very demanding. This work introduced a different reward system that enables the simple classical algorithm to learn fast and achieve high performance in hard exploration environments. Moreover, we added some simple enhancements to several hyperparameters, such as…
More >
-
Open Access
ARTICLE
Data Analytics for the Identification of Fake Reviews Using Supervised Learning
Saleh Nagi Alsubari, Sachin N. Deshmukh, Ahmed Abdullah Alqarni, Nizar Alsharif, Theyazn H. H. Aldhyani, Fawaz Waselallah Alsaade, Osamah I. Khalaf
CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3189-3204, 2022, DOI:10.32604/cmc.2022.019625
(This article belongs to this Special Issue:
Application of Big Data Analytics in the Management of Business)
Abstract Fake reviews, also known as deceptive opinions, are used to mislead people and have gained more importance recently. This is due to the rapid increase in online marketing transactions, such as selling and purchasing. E-commerce provides a facility for customers to post reviews and comment about the product or service when purchased. New customers usually go through the posted reviews or comments on the website before making a purchase decision. However, the current challenge is how new individuals can distinguish truthful reviews from fake ones, which later deceives customers, inflicts losses, and tarnishes the reputation of companies. The present paper…
More >
-
Open Access
ARTICLE
A Fault-Handling Method for the Hamiltonian Cycle in the Hypercube Topology
Adnan A. Hnaif, Abdelfatah A. Tamimi, Ayman M. Abdalla, Iqbal Jebril
CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 505-519, 2021, DOI:10.32604/cmc.2021.016123
(This article belongs to this Special Issue:
Application of Big Data Analytics in the Management of Business)
Abstract Many routing protocols, such as distance vector and link-state protocols are used for finding the best paths in a network. To find the path between the source and destination nodes where every node is visited once with no repeats, Hamiltonian and Hypercube routing protocols are often used. Nonetheless, these algorithms are not designed to solve the problem of a node failure, where one or more nodes become faulty. This paper proposes an efficient modified Fault-free Hamiltonian Cycle based on the Hypercube Topology (FHCHT) to perform a connection between nodes when one or more nodes become faulty. FHCHT can be applied…
More >
-
Open Access
ARTICLE
Developing a Recognition System for Classifying COVID-19 Using a Convolutional Neural Network Algorithm
Fawaz Waselallah Alsaade, Theyazn H. H. Aldhyani, Mosleh Hmoud Al-Adhaileh
CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 805-819, 2021, DOI:10.32604/cmc.2021.016264
(This article belongs to this Special Issue:
Application of Big Data Analytics in the Management of Business)
Abstract The COVID-19 pandemic poses an additional serious public health threat due to little or no pre-existing human immunity, and developing a system to identify COVID-19 in its early stages will save millions of lives. This study applied support vector machine (SVM), k-nearest neighbor (K-NN) and deep learning convolutional neural network (CNN) algorithms to classify and detect COVID-19 using chest X-ray radiographs. To test the proposed system, chest X-ray radiographs and CT images were collected from different standard databases, which contained 95 normal images, 140 COVID-19 images and 10 SARS images. Two scenarios were considered to develop a system for predicting…
More >
-
Open Access
ARTICLE
Thermodynamic Simulation on the Change in Phase for Carburizing Process
Anh Tuan Hoang, Xuan Phuong Nguyen, Osamah Ibrahim Khalaf, Thi Xuan Tran, Minh Quang Chau, Thi Minh Hao Dong, Duong Nam Nguyen
CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 1129-1145, 2021, DOI:10.32604/cmc.2021.015349
(This article belongs to this Special Issue:
Application of Big Data Analytics in the Management of Business)
Abstract The type of technology used to strengthen the surface structure of machine parts, typically by carbon-permeation, has made a great contribution to the mechanical engineering industry because of its outstanding advantages in corrosion resistance and enhanced mechanical and physical properties. Furthermore, carbon permeation is considered as an optimal method of heat treatment through the diffusion of carbon atoms into the surface of alloy steel. This study presented research results on the thermodynamic calculation and simulation of the carbon permeability process. Applying Fick’s law, the paper calculated the distribution of carbon concentration in the alloy steel after it is absorbed from…
More >
-
Open Access
ARTICLE
Payload Capacity Scheme for Quran Text Watermarking Based on Vowels with Kashida
Ali A.R. Alkhafaji, Nilam Nur Amir Sjarif, M.A Shahidan, Nurulhuda Firdaus Mohd Azmi, Haslina Md Sarkan, Suriayati Chuprat, Osamah Ibrahim Khalaf, Ehab Nabiel Al-Khanak
CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3865-3885, 2021, DOI:10.32604/cmc.2021.015803
(This article belongs to this Special Issue:
Application of Big Data Analytics in the Management of Business)
Abstract The most sensitive Arabic text available online is the digital Holy Quran. This sacred Islamic religious book is recited by all Muslims worldwide including non-Arabs as part of their worship needs. Thus, it should be protected from any kind of tampering to keep its invaluable meaning intact. Different characteristics of Arabic letters like the vowels (), Kashida (extended letters), and other symbols in the Holy Quran must be secured from alterations. The cover text of the Quran and its watermarked text are different due to the low values of the Peak Signal to Noise Ratio (PSNR) and Embedding Ratio (ER).…
More >
-
Open Access
ARTICLE
Modelling the Psychological Impact of COVID-19 in Saudi Arabia Using Machine Learning
Mohammed A. Aleid, Khaled A. Z. Alyamani, Mohieddine Rahmouni, Theyazn H. H. Aldhyani, Nizar Alsharif, Mohammed Y. Alzahrani
CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 2029-2047, 2021, DOI:10.32604/cmc.2021.014873
(This article belongs to this Special Issue:
Application of Big Data Analytics in the Management of Business)
Abstract This article aims to assess health habits, safety behaviors, and anxiety factors in the community during the novel coronavirus disease (COVID-19) pandemic in Saudi Arabia based on primary data collected through a questionnaire with 320 respondents. In other words, this paper aims to provide empirical insights into the correlation and the correspondence between socio-demographic factors (gender, nationality, age, citizenship factors, income, and education), and psycho-behavioral effects on individuals in response to the emergence of this new pandemic. To focus on the interaction between these variables and their effects, we suggest different methods of analysis, comprising regression trees and support vector…
More >