Results for 'Learning organizations'

982 found
Order:
  1. Learning Organizations and Their Role in Achieving Organizational Excellence in the Palestinian Universities.Mazen J. Al Shobaki, Samy S. Abu Naser, Youssef M. Abu Amuna & Amal A. Al Hila - 2017 - International Journal of Digital Publication Technology 1 (2):40-85.
    The research aims to identify the learning organizations and their role in achieving organizational excellence in the Palestinian universities in Gaza Strip. The researchers used descriptive analytical approach and used the questionnaire as a tool for information gathering. The questionnaires were distributed to senior management in the Palestinian universities. The study population reached (344) employees in senior management is dispersed over (3) Palestinian universities. A stratified random sample of (182) workers from the Palestinian universities was selected and the (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  2. Trends of Palestinian Higher Educational Institutions in Gaza Strip as Learning Organizations.Samy S. Abu Naser, Mazen J. Al Shobaki, Youssef M. Abu Amuna & Amal A. Al Hila - 2017 - International Journal of Digital Publication Technology 1 (1):1-42.
    The research aims to identify the trends of Palestinian higher educational institutions in Gaza Strip as learning organizations from the perspective of senior management in the Palestinian universities in Gaza Strip. The researchers used descriptive analytical approach and used the questionnaire as a tool for information gathering. The questionnaires were distributed to senior management in the Palestinian universities. The study population reached (344) employees in senior management is dispersed over (3) Palestinian universities. A stratified random sample of (182) (...)
    Download  
     
    Export citation  
     
    Bookmark   23 citations  
  3. Memory and Learning as Key Competences of Living Organisms.G. Witzany - 2018 - In Baluska Frantisek, Gagliano Monica & Guenther Witzany, Memory and Learning in Plants. Cham: Springer. pp. 1-16.
    Organisms that share the capability of storing information about experiences in the past have an actively generated background resource on which they can compare and evaluate more recent experiences in order to quickly or even better react than in previous situations. This is an essential competence for all reaction and adaptation purposes of living organisms. Such memory/learning skills can be found from akaryotes up to unicellular eukaryotes, fungi, animals and plants, although until recently, it had been mentioned only as (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Proposed Model for Learning Organization as an Entry to Organizational Excellence from the Standpoint of Teaching Staff in Palestinian Higher Educational Institutions in Gaza Strip.Amal A. Al Hila, Mazen J. Al Shobaki, Samy S. Abu-Naser & Youssef M. Abu Amuna - 2017 - International Journal of Education and Learning 6 (1):1-26.
    The research aims to design a proposed model of learning organizations as an entry point to achieve organizational excellence in the Palestinian universities of Gaza Strip. A random sample of workers were selected from the Palestinian universities consist of (286) employees at recovery rate of (70.3%). The study concluded with a set of results the most important of which: there is a statistically significant relationship between the components of learning organizations and achieving organizational excellence in the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Constraints in Organizational Learning, Cognitive Load and Its Effect on Employee Behavior.Sidharta Chatterjee - 2013 - IUP Journal of Knowledge Management 11 (4):7-19.
    Traditionally, learning organizations face certain constraints related to both exogenous and endogenous factors. This paper models three well-established constraints that employees face while being part of their organizations. One is an explicit constraint on their natural behavior, and two implicit constraints on their endeavor to acquire new knowledge and perform new actions. The implicit constraints, which are elaborated, are related to their relative performance in acquiring new knowledge and by their consecutive actions based on the new knowledge (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Natural morphological computation as foundation of learning to learn in humans, other living organisms, and intelligent machines.Gordana Dodig-Crnkovic - 2020 - Philosophies 5 (3):17-32.
    The emerging contemporary natural philosophy provides a common ground for the integrative view of the natural, the artificial, and the human-social knowledge and practices. Learning process is central for acquiring, maintaining, and managing knowledge, both theoretical and practical. This paper explores the relationships between the present advances in understanding of learning in the sciences of the artificial, natural sciences, and philosophy. The question is, what at this stage of the development the inspiration from nature, specifically its computational models (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  7.  33
    Non-Organic Matter, Organic Matter, Consciousness, Free Will, Intelligence, and Creativity in Relation to the Universal Formula.Angelito Malicse - manuscript
    Non-Organic Matter, Organic Matter, Consciousness, Free Will, Intelligence, and Creativity in Relation to the Universal Formula -/- By Angelito Enriquez Malicse -/- Introduction -/- The relationship between non-organic matter, organic matter, consciousness, free will, intelligence, and creativity has long been studied separately in science, philosophy, and psychology. However, when examined through the universal law of balance in nature, as defined in my universal formula, these elements are seen as interconnected manifestations of a single natural order. This perspective offers a complete (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. Social learning through process improvements in Russia.Tatiana Medvedeva & Stuart Umpleby - 2002 - In Robert Trappl, Cybernetics and Systems. Austrian Society for Cybernetics Studies. pp. 2.
    The Russian people are struggling to learn how to create a democracy and a market economy. This paper reviews the results of reform efforts to date and what the Russian people are learning as indicated by changes in answers to public opinion surveys. As a way to continue the social learning process in Russia we suggest the widespread use of process improvement methods in organizations. This paper describes some Russian experiences in using process improvement methods and proposes (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Epistemic Vices in Organizations: Knowledge, Truth, and Unethical Conduct.Christopher Baird & Thomas S. Calvard - 2019 - Journal of Business Ethics 160 (1):263-276.
    Recognizing that truth is socially constructed or that knowledge and power are related is hardly a novelty in the social sciences. In the twenty-first century, however, there appears to be a renewed concern regarding people’s relationship with the truth and the propensity for certain actors to undermine it. Organizations are highly implicated in this, given their central roles in knowledge management and production and their attempts to learn, although the entanglement of these epistemological issues with business ethics has not (...)
    Download  
     
    Export citation  
     
    Bookmark   21 citations  
  10. The Impact of Learning and Development Programs on the Core Competencies of Pasay City Government.Rosanie Estuche, Maria Krisna Zen Nirvana Magdasoc Valencia & Cynic Tenedero - 2024 - International Journal of Multidisciplinary Educational Research and Innovation 2 (1):108- 116.
    Learning and Development (L&D) is an organizational process which helps in the development of knowledge and achievement of individual and organizational goals. This is quantitative research employed a descriptive method to determine the impact of Learning and Development Programs on the Core Competencies of Level II employees of the Pasay City Government. The respondents of this study were the two hundred forty-two (242) randomly selected PCG Level II employees of the City Government of Pasay. This research used a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11.  64
    Integrating Ensemble _Deep Learning Models for Cybersecurity in Cloud Network Forensics (12th edition).B. Menaka Dr S. Arulselvarani, - 2024 - International Journal of Multidisciplinary and Scientific Emerging Research 12 (4):2653-2606. Translated by Dr. S. Arulselvarani.
    To evaluate the effectiveness of our approach to enhancing cloud computing network forensics by integrating deep learning techniques with cybersecurity policies. With the increasing complexity and volume of cyber threats targeting cloud environments, traditional forensic methods are becoming inadequate. Deep learning techniques offer promising solutions for analyzing vast amounts of network data and detecting anomalies indicative of security breaches. By integrating deep learning models with cybersecurity policies, organizations can achieve enhanced threat detection, rapid response times, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Transparent Vessels?: What Organ Donors Should Be Allowed to Know about Their Recipients.Richard H. Dees - 2013 - Journal of Law, Medicine and Ethics 41 (1):323-332.
    After a long search, Jonathan has finally found someone willing to donate a kidney to him and thereby free him from dialysis. Meredith is Jonathan's second cousin, and she considers herself a generous person, so although she barely knows Jonathan, she is willing to help. However, as Meredith learns more about the donation process, she begins to ask questions about Jonathan: “Is he HIV positive? I heard he got it using drugs. Has he been in jail? He's already had one (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. Leveraging Machine Learning Algorithms for Medical Image Classification Introduction.Ugochukwu Llodinso - manuscript
    The use of machine learning to medical image classification has seen significant development and implementation in the last several years. Computers can learn to identify patterns, make predictions, and use data to inform their judgements; this capability is known as machine learning, a branch of Artificial intelligence (AI). Classifying images according to their contents allows us to do things like identify the type of sickness, organ, or tissue depicted. Medical picture classification and interpretation using machine learning algorithms (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14.  60
    Building Scalable MLOps: Optimizing Machine Learning Deployment and Operations.Vijayan Naveen Edapurath - 2024 - International Journal of Scientific Research in Engineering and Management 8 (10):1-5.
    As machine learning (ML) models become increasingly integrated into mission-critical applications and production systems, the need for robust and scalable MLOps (Machine Learning Operations) practices has grown significantly. This paper explores key strategies and best practices for building scalable MLOps pipelines to optimize the deployment and operation of machine learning models at an enterprise scale. It delves into the importance of automating the end-to-end lifecycle of ML models, from data ingestion and model training to testing, deployment, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Memory and Learning in Plants.Baluska Frantisek, Gagliano Monica & Guenther Witzany (eds.) - 2018 - Cham: Springer.
    This book assembles recent research on memory and learning in plants. Organisms that share a capability to store information about experiences in the past have an actively generated background resource on which they can compare and evaluate coming experiences in order to react faster or even better. This is an essential tool for all adaptation purposes. Such memory/learning skills can be found from bacteria up to fungi, animals and plants, although until recently it had been mentioned only as (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Biology and Theology in Malebranche's Theory of Organic Generation.Karen Detlefsen - 2014 - In Ohad Nachtomy & Justin E. H. Smith, The Life Sciences in Early Modern Philosophy. New York, NY: Oup Usa. pp. 137-156.
    This paper has two parts: In the first part, I give a general survey of the various reasons 17th and 18th century life scientists and metaphysicians endorsed the theory of pre-existence according to which God created all living beings at the creation of the universe, and no living beings are ever naturally generated anew. These reasons generally fall into three categories. The first category is theological. For example, many had the desire to account for how all humans are stained by (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  17.  13
    Leveraging Azure AI and Machine Learning For Predictive Analytics and Decision Support Systems IN.Vishnuvardhan S. Venkatapathi S. - 2024 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 7 (6):11631-11636.
    In today's data-driven business environment, organizations increasingly rely on advanced analytics and decision support systems to gain a competitive edge. Azure AI and Machine Learning (ML) provide powerful tools for predictive analytics, enabling businesses to forecast trends, optimize processes, and make more informed decisions. By leveraging the capabilities of Microsoft Azure, businesses can integrate AI and ML into their decision-making processes, enhancing productivity and improving strategic outcomes. This paper explores how Azure's AI and ML tools can be applied (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18.  16
    AI-Driven Cloud Security: Automating Threat Detection and Response with Advanced Machine Learning Algorithms.Prathiksha Subhakar, Unnati K. - 2025 - International Journal of Multidisciplinary and Scientific Emerging Research 13 (1):381-386.
    As the adoption of cloud computing continues to increase, securing cloud environments has become an ever-growing concern. Traditional security models struggle to keep up with the evolving nature of cyber threats, making it essential for organizations to explore innovative approaches. This paper explores how artificial intelligence (AI) and machine learning (ML) can enhance cloud security by automating threat detection, response, and mitigation in real-time. Through the application of advanced ML algorithms, AI-driven security systems can identify and predict security (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Widening Access to Applied Machine Learning With TinyML.Vijay Reddi, Brian Plancher, Susan Kennedy, Laurence Moroney, Pete Warden, Lara Suzuki, Anant Agarwal, Colby Banbury, Massimo Banzi, Matthew Bennett, Benjamin Brown, Sharad Chitlangia, Radhika Ghosal, Sarah Grafman, Rupert Jaeger, Srivatsan Krishnan, Maximilian Lam, Daniel Leiker, Cara Mann, Mark Mazumder, Dominic Pajak, Dhilan Ramaprasad, J. Evan Smith, Matthew Stewart & Dustin Tingley - 2022 - Harvard Data Science Review 4 (1).
    Broadening access to both computational and educational resources is crit- ical to diffusing machine learning (ML) innovation. However, today, most ML resources and experts are siloed in a few countries and organizations. In this article, we describe our pedagogical approach to increasing access to applied ML through a massive open online course (MOOC) on Tiny Machine Learning (TinyML). We suggest that TinyML, applied ML on resource-constrained embedded devices, is an attractive means to widen access because TinyML leverages (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20.  42
    Automating Data Quality Monitoring In Machine Learning Pipelines.Vijayan Naveen Edapurath - 2023 - Esp International Journal of Advancements in Computational Technology 1 (2):104-111.
    This paper addresses the critical role of automated data quality monitoring in Machine Learning Operations (MLOps) pipelines. As organizations increasingly rely on machine learning models for decision-making, ensuring the quality and reliability of input data becomes paramount. The paper explores various types of data quality issues, including missing values, outliers, data drift, and integrity violations, and their potential impact on model performance. It then examines automated detection methods, such as statistical analysis, machine learning-based anomaly detection, rule-based (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Using neurons to maintain autonomy: Learning from C. elegans.William Bechtel & Leonardo Bich - 2023 - Biosystems 232:105017.
    Understanding how biological organisms are autonomous—maintain themselves far from equilibrium through their own activities—requires understanding how they regulate those activities. In multicellular animals, such control can be exercised either via endocrine signaling through the vasculature or via neurons. In C. elegans this control is exercised by a well-delineated relatively small but distributed nervous system that relies on both chemical and electric transmission of signals. This system provides resources to integrate information from multiple sources as needed to maintain the organism. Especially (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  22. Network Intrusion Detection using Machine Learning.B. Ravinder Reddy - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (4):1-15.
    With the growing sophistication and frequency of cyberattacks, there is a critical need for effective systems that can detect and prevent breaches in real time. The AI/ML-based Network Intrusion Detection System (NIDS) addresses this need by analyzing traffic patterns to identify security breaches in firewalls, routers, and network infrastructures. By integrating machine learning algorithms—K-Nearest Neighbors (KNN), Support Vector Machine (SVM), and Random Forest—the system is able to detect both known cyber threats and previously unseen attack vectors. Unlike traditional methods (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Dewey and “the Greeks:” Inquiry and the Organic Spirit of Greek Philosophy.Christopher Kirby - 2014 - In Christopher C. Kirby, Dewey and the Ancients: Essays on Hellenic and Hellenistic Themes in the Philosophy of John Dewey. London: Bloomsbury. pp. 47-76.
    Those who have considered the connection between Dewey’s theory of inquiry and Greek thought have mostly situated their remarks within larger points, regarding either teaching and learning (Garrison, 1997; Johnston, 2006b; Cahn, 2007) or aesthetics and craft (Alexander, 1987; Hickman, 1990). The fact that this area remains somewhat underexplored could be chalked up to several factors: 1) Dewey was often quite critical of the classical tradition, particularly when it came to theories of knowledge, 2) Dewey was not a trained (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  24. Do Students See the “Selection” in Organic Evolution? A Critical Review of the Causal Structure of Student Explanations.Abhijeet Bardapurkar - 2008 - Evolution: Education and Outreach 1 (3):299-305.
    This paper critically reviews and characterizes the student's causal-explanatory understanding; this is done as a step toward explicating the problematic of evolution education as it concerns the cognitive difficulties in understanding Darwin's theory of natural selection. The review concludes that the student's understanding is fundamentally different from Darwin's, for the student understands evolutionary change as necessary individual transformation caused by the transformative action of various physical and behavioral factors. This is in complete contrast to Darwin's (and even the Darwinian's, for (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  25.  32
    Cloudguard: Fortress Security in the Digital World.Matam Avinash Kumar Chengali Ramakrishna Rao, Padidala Pradeep Rao - 2025 - International Journal of Innovative Research in Science Engineering and Technology (Ijirset) 14 (1):753-757.
    : As organizations continue to adopt cloud computing for its numerous advantages—such as scalability, cost-efficiency, and flexibility—the need to secure digital assets within the cloud has never been more critical. Cloud security faces unique challenges due to the distributed and multi-tenant nature of cloud services. Cyber-attacks, data breaches, and misconfigurations are among the prominent risks that threaten the integrity, confidentiality, and availability of cloud-based data and applications. In this paper, we explore CloudGuard, an advanced security framework designed to protect (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26.  25
    Artificial Intelligence and Automation in Cloud Cost Management: Predicting and Optimizing Cloud Spend.Rewatkar Janhavi - 2025 - International Journal of Multidisciplinary and Scientific Emerging Research (Ijmserh) 13 (1):123-128.
    As organizations increasingly adopt cloud computing services, managing and optimizing cloud costs has become a crucial aspect of IT and financial operations. Cloud cost management is a complex and dynamic challenge, given the pay-as-you-go pricing model, the variety of services offered by cloud providers, and the need for scalability and flexibility in cloud environments. Artificial Intelligence (AI) and automation are emerging as key technologies for addressing these challenges. This paper explores the role of AI and automation in cloud cost (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27.  21
    AI-Powered Cloud Migration: Automating the Transition from On-Premises to Cloud Environments with Zero Downtime.M. Vaidhegi G. Glory - 2025 - International Journal of Innovative Research in Science Engineering and Technology (Ijirset) 14 (1):747-752.
    : As organizations continue to embrace cloud computing, the migration of workloads, applications, and data from on-premises environments to the cloud remains one of the most critical tasks. However, migrating to the cloud is often seen as a daunting task due to the complexity, the risk of downtime, and the potential for service disruptions. Artificial Intelligence (AI) and automation have emerged as transformative technologies for cloud migration, providing solutions that enable a seamless, efficient, and zero-downtime transition. This paper explores (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Artificial Intelligence in HR: Driving Agility and Data-Informed Decision-Making.Madhavan Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):506-515.
    In today’s rapidly evolving business landscape, organizations must continuously adapt to stay competitive. AI-driven human resource (HR) analytics has emerged as a strategic tool to enhance workforce agility and inform decision-making processes. By leveraging advanced algorithms, machine learning models, and predictive analytics, HR departments can transform vast data sets into actionable insights, driving talent management, employee engagement, and overall organizational efficiency. AI’s ability to analyze patterns, forecast trends, and offer data-driven recommendations empowers HR professionals to make proactive decisions (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  29.  67
    Engaging Global Justice Through Internships.Ericka Tucker - 2015 - In Julinna Oxley & Ramona Ilea, Experiential Learning in Philosophy: Philosophy Without Walls. New York: Routledge. pp. 161-168.
    Engaging with Global Justice through InternshipsGlobal justice, on its face, seems like an impossible task. As individuals, even citizens of wealthy and powerful countries, the task of economic, social and political justice seems to outstrip our intellectual, practical and emotional abilities. Considering the scope of 'global' justice, it would appear that a massive coordinated effort would be necessary to overcome the problems of global injustice, yet it would seem such coordination may be impossible. The difficulties of seeking justice between nations (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Evolving to Generalize: Trading Precision for Speed.Cailin O’Connor - 2017 - British Journal for the Philosophy of Science 68 (2).
    Biologists and philosophers of biology have argued that learning rules that do not lead organisms to play evolutionarily stable strategies (ESSes) in games will not be stable and thus not evolutionarily successful. This claim, however, stands at odds with the fact that learning generalization---a behavior that cannot lead to ESSes when modeled in games---is observed throughout the animal kingdom. In this paper, I use learning generalization to illustrate how previous analyses of the evolution of learning have (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  31. Evaluating ICT utilization in education administration and management during the COVID-19 outbreak in Pakistan: An empirical review.Abdul Rahim Chandio - 2021 - Journal of Research in Instructional e-Issn: 2776-222X 1 (1):81 – 94.
    Abstract: This study aims to evaluate the utilization of ICT in education administration and management in a Pakistan context during the pandemic outbreak. Adoption of information and communication technologies (ICTs) has digitalized the learning process where education organizations were administrated by means of wireless-based instructions, electronic pedagogy, and online assessment in order to continue the educational activities while the government halted the physical appearance in education institutions. Data collection has been carried by three public universities in which teachers (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Developing as a leader and decison maker.Marcus Selart - 2010 - In A Leadership Perspective on Decision Making. Cappelen Academic Publishers. pp. 147-176.
    This chapter makes it clear that a significant element of both leadership and decision making is the development aspect. Leaders develop in their decision making by being confronted with difficult decision situations. However, they also develop through various forms of systemized training and education. Different leaders tend to develop in different directions. For this reason, one can identify a number of key leadership styles based on different ways of leading. These different styles are appropriate for various types of organization. Some (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  33. Psychopower and Ordinary Madness: Reticulated Dividuals in Cognitive Capitalism.Ekin Erkan - 2019 - Cosmos and History 15 (1):214-241.
    Despite the seemingly neutral vantage of using nature for widely-distributed computational purposes, neither post-biological nor post-humanist teleology simply concludes with the real "end of nature" as entailed in the loss of the specific ontological status embedded in the identifier "natural." As evinced by the ecological crises of the Anthropocene—of which the 2019 Brazil Amazon rainforest fires are only the most recent—our epoch has transfixed the “natural order" and imposed entropic artificial integration, producing living species that become “anoetic,” made to serve (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  34. On the Theoretical Foundations of Gen Inertia.Sidharta Chatterjee - 2017 - IUP Journal of Knowledge Management 4 (15):54-68.
    This paper addresses the foundational aspects of the theory of Gen inertia. We attempt to emphasize the cognitive factors that accounts for learning inertia in organizations, and that which prevents employees from generating and absorbing new knowledge. The novel concept of Gen inertia helps us to understand the causes behind inertia in learning among the knowledge workers under organizational settings. This concept of 'Gen inertia' is distinct from the pre-existing concept of organizational knowledge inertia. In this paper, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Teleological Dynamics of Organizational Performance: From Process to Practice and Perfectionism.Sidharta Chatterjee - 2016 - IUP Journal of Knowledge Management 14 (2):7-27.
    Workforce education forms one of the core aspects of organizational learning which aims for performance as well as efficiency. Learning is goal-oriented in business organizations. Organizations' activities are highly-oriented towards customer satisfaction. Organizations learn from practice and delivery of services to meet consumer needs and necessities. Perfection, efficiency and smart practices define today's multinational organizational culture. But how do the multinational organizations achieve such perfections in their business operations? This paper addresses this issue by (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36.  36
    A Comprehensive Framework for Data Dependency Monitoring in Upstream Business Intelligence Systems.Vijayan Naveen Edapurath - 2024 - Esp Journal of Engineering and Technology Advancements 4 (4):68-75.
    As organizations increasingly depend on data-driven decision-making, the complexity of Business Intelligence (BI) systems and their data pipelines has grown exponentially. This complexity introduces significant challenges in maintaining data quality, ensuring traceability, and guaranteeing system reliability. Unmanaged data dependencies in upstream BI components can lead to data inconsistencies, system failures, and compromised analytics. This paper presents a comprehensive framework for monitoring and managing data dependencies in upstream BI systems, with a primary focus on the Dependency Discovery Engine utilizing Static (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. Managing Constraints and Removing Obstacles to Knowledge Management.Sidharta Chatterjee - 2014 - IUP Journal of Knowledge Management 12 (4):24-38.
    Practice of knowledge management is often characterized by obstacles to creation, distribution, and transfer of knowledge from specific groups of settings. Obstacles or constraints to attempts to constitute knowledge as an organizational resource have been previously dealt within the context of organizational learning perspectives; however, there still remain barriers toward making learning available and all-pervasive throughout organizations. This is often as a result of two important factors: (i) bureaucratic and hierarchical forms of organization; and (ii) owing to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38.  17
    The Great Resignation: Managing Cybersecurity Risks during Workforce Transitions.Govindarajan Lakshmikanthan Sreejith Sreekandan Nair - 2022 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 5 (7):1551-1563.
    Where organizations used to rely on employees tenured with their company, the Great Resignation has presented new problems to organizational structure and fortification. Such a process usually leads to disrupted employee productivity and most importantly, increased vulnerability to cyber threats. Loyal workers, intentionally or unintentionally disloyal workers, and employees who leave the organization can compromise organizational confidential information, such as innovation, customer data, and other data that the organization considers to be highly valuable. Research has also revealed that workforce (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39.  41
    Next-Generation Cloud Security Frameworks:Balancing Privacy, Compliance, and Data Protection in a Digital-First Era.Varad Upadhye Atharva Hasabnis - 2025 - International Journal of Advanced Research in Education and Technology (Ijarety) 12 (2):453-457.
    As businesses increasingly migrate to cloud environments, the need for robust and adaptive cloud security frameworks becomes paramount. Cloud services provide numerous benefits such as scalability, flexibility, and cost-efficiency, but they also introduce significant risks in terms of privacy, compliance, and data protection. This paper explores the evolving landscape of cloud security, focusing on next-generation frameworks that aim to balance the often-competing demands of privacy, regulatory compliance, and data protection. We analyze emerging security models that incorporate advanced technologies such as (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40.  43
    The Cloud defense: Building Resilient Security Layers.Manoj Jha Pravin Kumar Borkar - 2025 - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 14 (3):706-711.
    Cloud computing has revolutionized how businesses operate by providing scalable infrastructure, cost efficiency, and flexibility. However, as organizations increasingly migrate sensitive data and mission-critical applications to the cloud, securing these resources has become more complex. This paper explores the concept of building resilient security layers in the cloud, an essential approach to mitigate cyber threats and safeguard digital assets. We examine the various security challenges in cloud environments, including data breaches, misconfigurations, and insider threats, and offer solutions to address (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Field Creativity and Post-Anthropocentrism.Stanislav Roudavski - 2016 - Digital Creativity 27 (1):7-23.
    Can matter, things, nonhuman organisms, technologies, tools and machines, biota or institutions be seen as creative? How does such creativity reposition the visionary activities of humans? This article is an elaboration of such questions as well as an attempt at a partial response. It was written as an editorial for the special issue of the Digital Creativity journal that interrogates the conception of Post-Anthropocentric Creativity. However, the text below is a rather unconventional editorial. It does not attempt to provide an (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  42.  39
    Implementing Sales Forecasting with Predictive Analytics.Iyer R. Sneha - 2024 - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 13 (2):224-229.
    Sales forecasting plays a pivotal role in business planning, helping organizations predict future sales trends based on historical data. Traditional forecasting methods, such as moving averages and linear regression, often lack the flexibility and precision required to account for complex patterns in sales data. Predictive analytics, which leverages advanced machine learning techniques, offers a more robust and dynamic approach for forecasting sales. This paper explores the implementation of sales forecasting using predictive analytics, focusing on the application of machine (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Streaching the notion of moral responsibility in nanoelectronics by appying AI.Robert Albin & Amos Bardea - 2021 - In Robert Albin & Amos Bardea, Ethics in Nanotechnology Social Sciences and Philosophical Aspects, Vol. 2. Berlin: De Gruyter. pp. 75-87.
    The development of machine learning and deep learning (DL) in the field of AI (artificial intelligence) is the direct result of the advancement of nano-electronics. Machine learning is a function that provides the system with the capacity to learn from data without being programmed explicitly. It is basically a mathematical and probabilistic model. DL is part of machine learning methods based on artificial neural networks, simply called neural networks (NNs), as they are inspired by the biological (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44.  11
    Cloudsentry: Protecting Your Digital Assets.Shravan Kumar Reuel Reuben, Rishabh Jain - 2025 - International Journal of Multidisciplinary Research in Science, Engineering, Technology and Management 12 (3):789-795.
    With the rise of cloud computing, businesses have rapidly transitioned to cloud-based infrastructures to reap the benefits of scalability, flexibility, and cost-efficiency. However, this shift has introduced a new set of security challenges, particularly in protecting digital assets and sensitive data stored in cloud environments. The importance of securing these digital assets has become more pronounced as cyber threats become increasingly sophisticated. This paper introduces CloudSentry, a comprehensive security framework designed to protect digital assets in cloud environments. The framework focuses (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45.  32
    Resource Allocation Optimizing Resource Allocation in Data Centers and Networks using AI to Efficiently Distribute Bandwidth and Computing Power.Santhosh Katragadda Amarnadh Eedupuganti - 2019 - International Journal of Advanced Research in Education and Technology 6 (5):1609-1620.
    Rapidly expanding data centers along with networks create a fundamental problem regarding resource allocation efficiency. Standard resource management systems prove unable to adapt dynamically to varying workloads so bandwidth allocation and computing utilization stays inefficient. Developers use recent advancements in artificial intelligence technology to build automatic optimization algorithms that instantly adjust resource distributions. Through the integration of machine learning with deep reinforcement learning systems organizations obtain predictive power to prepare resource distribution ahead of time without endangering operational (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Insights about Electronic Technology in Digital Transformation Age & Neutrosophic Data Structure.A. A. Salama, A. Abd ELhamid, Shimaa I. Hassan & N. M. A. Ayad - 2021 - Neutrosophic Knowledge 2 (2):11-22.
    In recent decades, Information and Communication Technology (ICT) has been advanced and widely spread around the globe in addition to ICT revolution and technological advances are considered the major role in the evolution of modern age, which is called "Digital Transformation Age". Therefore, Electronic Technology (E-Technology) has become one of the most prominent approaches such as Electronic Learning (E-Learning), Electronic Training (E-Training), Mobile Learning (M-Learning), Virtual Lab (V-Lab), Virtual University, etc. E-Technology includes some features, for instance (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Intergenerational Education for Social Inclusion and Solidarity: The Case Study of the EU Funded Project "Connecting Generations".Giovanna Del Gobbo, Glenda Galeotti & Gilda Esposito - 2017 - In Andrzej Klimczuk & Łukasz Tomczyk, Selected Contemporary Challenges of Ageing Policy. Uniwersytet Pedagogiczny W Krakowie. pp. 149--187.
    This paper reflects on lessons learned from a validated model of international collaboration based on research and practice. During the European Year for Active Ageing, a partnership of seven organizations from the European Union plus Turkey implemented the Lifelong Learning Programme partnership “Connecting Generations‘ which involved universities, non-governmental organizations, third age Universities and municipalities in collaboration with local communities. Reckoning that Europe has dramatically changed in its demographic composition and is facing brand new challenges regarding intergenerational and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48.  8
    Safe in the Cloud: The Evolution of Security.Daspute Krishna Sayyad Jindavali, Dudhe Jitesh, Jadhav Shambhuraj - 2025 - International Journal of Innovative Research in Computer and Communication Engineering 13 (2):1686-1691.
    As cloud computing continues to dominate the digital landscape, it has introduced new avenues for businesses to operate with enhanced flexibility, scalability, and cost-efficiency. However, this rapid adoption of cloud technologies also brings forth critical security challenges. The evolution of security within the cloud ecosystem is essential to safeguard digital assets from emerging threats. This paper traces the evolution of cloud security, from traditional on-premise solutions to advanced cloud-native security frameworks. It discusses the various security paradigms, tools, and technologies that (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49.  28
    AI-Powered Phishing Detection: Protecting Enterprises from Advanced Social Engineering Attacks.Bellamkonda Srikanth - 2022 - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 11 (1):12-20.
    Phishing, a prevalent form of social engineering attack, continues to threaten enterprises by exploiting human vulnerabilities and targeting sensitive information. With the increasing sophistication of phishing schemes, traditional detection methods often fall short in identifying and mitigating these threats. As attackers employ advanced techniques, such as highly personalized spear-phishing emails and malicious links, enterprises require innovative solutions to safeguard their digital ecosystems. This research explores the application of artificial intelligence (AI) in enhancing phishing detection and response, with a specific focus (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. Non-Experiential Evaluation.Jeremy M. Pober - forthcoming - Philosophia:1-10.
    [COMMENTARY on Walter Veit's "A Philosophy for the Science of Animal Consciousness"] The framework Veit introduces for animal consciousness turns on finding and articulating its evolutionary origins. Veit argues that consciousness first evolved as affective experience in the Cambrian period. His argument centers around the plausible need of organisms in the Cambrian for a common currency of subjective valuation. I argue that such an adaptive pressure is unlikely to result in affective experience. I review other processes that instantiate common currencies (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 982