Results (14)
Search Parameters:
Keyword: Best PracticesGenerative Artificial Intelligence and Prompt Engineering: A Comprehensive Guide to Models, Methods, and Best Practices
This article enhances discussions on Generative Artificial Intelligence (GenAI) and prompt engineering by exploring critical pitfalls and industry-specific advantages. It begins with a foundational overview of AI evolution, emphasizing how generative models such as GANs, VAEs, and Transformers have revolutionized language processing, image generation, and drug discovery. Prompt engineering is highlighted as a key methodology…
Read MoreEmerging Trends in Green Best Practices and the Impact on Government Policy
While it is commonly accepted that climate change needs to be addressed to protect both human and environmental health, it is not widely understood what steps need to be taken to accomplish this daunting task. Additionally, there is currently no formal definition of what constitutes a ‘green’ company or ‘green’ best practice, despite the rising…
Read MoreHow a Design-Based Research Approach Supported the Development and Rapid Adaptation Needed to Provide Enriching Rural STEM Camps During COVID and Beyond
Like many STEM research projects, the members of the National Science Foundation-funded STEM SEALS project dramatically shifted from in-person delivery of a summer institute to distance-learning with minimal time for preparation. However, the daunting challenge also offered the unique opportunity to apply Design-based Research within an exploratory study to inform and document the progression and…
Read MorePower Converters and EMS for Fuel Cells CCHP Applications: A Structural and Extended Review
Fuel Cells (FCs) and Combined Cooling, Heating and Power (CCHP) systems are becoming very popular due to their environmental friendliness and immense applications. This extended review paper commenced by introducing the rampant South Africa’s electricity crisis as the basis for the study, followed by some structural analyses of up to forty-four miscellaneous power electronics converters…
Read MoreA Framework to Align Business Processes: Identification of the Main Features
Information and Communications Technologies are developing faster today than ever before, giving an important contribution to the global economy. Organizations in developed and developing economies explore new technologies to gain advantage and add value. That evolution also brings an increasing complexity to the organizations’ management. The alignment of organizational practices with international standards and best…
Read MoreA Framework for the Alignment of ICT with Green IT
The Public Administration is forced to transform itself by taking advantage of the contribution of ICT to in the process of reducing bureaucracy and increase transparency, promoting the dematerialization of processes, increasing the quality of online services, allowing greater ubiquity of access, reducing response times, in the search for improvement of the quality of life…
Read MoreIT GRC Smart Adviser: Process Driven Architecture Applying an Integrated Framework
This article is a continuation of the work presented in the Third World Conference on Smart Trends in Systems Security and Sustainability (WorldS4). In this version we focus on matching IT and business processes from different management levels by using IT-Governance (ITG) Risk and Compliance frameworks in a smart way. In fact, every information system…
Read MoreA Smart Updater IT Governance Platform Based on Artificial Intelligence
This Information technology (IT) has a crucial role to improve business processes in companies. Getting the best technologies rapidly becomes as significant as understanding and developing the business plan of organizations. Thus, different IT best practices and norms are used by companies to help their services and IT business. These standards are set of best…
Read MoreTesting Web Service Compositions: Approaches, Methodology and Automation
Web services give a new view of the web as the biggest, widely accepted and the most straightforward distributed software platform. Their composition into applications and business processes is still a complex, non-trivial task, requiring highly rational efforts not only from the software developers, but from the quality assurance specialists. The provision if web service…
Read MoreITSM Software Ranking for Small Medium Enterprises Based on ITIL V3 Quick Win Criteria using Fuzzy SIR Method
There are various software related to the implementation of IT Service Management (ITSM) for a company, including those that are open source and commercial. An input is needed for companies in determining what software to choose from various software, especially for small and medium enterprises (SMEs) that have limited human and financial resources. In this…
Read MoreTowards Adoption of Authentication and Authorization in Identity Management and Single Sign On
Identity and Access Management (IAM) and Single Sign on (SSO) are two security concepts that are related to each other. IAM governs the user access in an organization whereas SSO facilitates the user by authenticating to one centralized application and not having to re-authenticate when trying to access other applications. This paper addresses the different…
Read MoreA novel beamforming based model of coverage and transmission costing in IEEE 802.11 WLAN networks
IEEE 802.11 WLAN indoor networks face major inherent and environmental issues such as interference, noise, and obstacles. At the same time, they must provide a maximal service performance in highly changing radio environments and conformance to various applications’ requirements. For this purpose, they require a solid design approach that considers both inputs from the radio…
Read MoreA Reliable, Non-Invasive Approach to Data Center Monitoring and Management
Recent standards, legislation, and best practices point to data center infrastructure management systems to control and monitor data center performance. This work presents an innovative approach to address some of the challenges that currently hinder data center management. It explains how monitoring and management systems should be envisioned and implemented. Key parameters associated with data…
Read MoreSemantic-less Breach Detection of Polymorphic Malware in Federated Cloud
Cloud computing is one of the largest emerging utility services that is expected to grow enormously over the next decade. Many organizations are moving into hybrid cloud/hosted computing models. Single cloud service provider introduces cost and environmental challenges. Also, multi-cloud solution implemented by the Cloud tenant is suboptimal as it requires expensive adaptation costs. Cloud…
Read More
