{"id":"https://openalex.org/W4293207697","doi":"https://doi.org/10.2478/acss-2022-0005","title":"Proposing a Layer to Integrate the Sub-classification of Monitoring Operations Based on AI and Big Data to Improve Efficiency of Information Technology Supervision","display_name":"Proposing a Layer to Integrate the Sub-classification of Monitoring Operations Based on AI and Big Data to Improve Efficiency of Information Technology Supervision","publication_year":2022,"publication_date":"2022-06-01","ids":{"openalex":"https://openalex.org/W4293207697","doi":"https://doi.org/10.2478/acss-2022-0005"},"language":"en","primary_location":{"id":"doi:10.2478/acss-2022-0005","is_oa":true,"landing_page_url":"https://doi.org/10.2478/acss-2022-0005","pdf_url":"https://www.sciendo.com/pdf/10.2478/acss-2022-0005","source":{"id":"https://openalex.org/S2737199380","display_name":"Applied Computer Systems","issn_l":"2255-8683","issn":["2255-8683","2255-8691"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310317398","host_organization_name":"Polish Association for Knowledge Promotion","host_organization_lineage":["https://openalex.org/P4310317398"],"host_organization_lineage_names":["Polish Association for Knowledge Promotion"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Applied Computer Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://www.sciendo.com/pdf/10.2478/acss-2022-0005","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5075770876","display_name":"Ahmed Yassine Chakor","orcid":"https://orcid.org/0000-0002-4840-7905"},"institutions":[{"id":"https://openalex.org/I240042149","display_name":"Abdelmalek Essa\u00e2di University","ror":"https://ror.org/03c4shz64","country_code":"MA","type":"education","lineage":["https://openalex.org/I240042149"]}],"countries":["MA"],"is_corresponding":true,"raw_author_name":"Ahmed Yassine Chakor","raw_affiliation_strings":["Laboratory of Automation Technology, FST of Tangier , Abdelmalek Essaadi University , Tetouan , Morocco"],"affiliations":[{"raw_affiliation_string":"Laboratory of Automation Technology, FST of Tangier , Abdelmalek Essaadi University , Tetouan , Morocco","institution_ids":["https://openalex.org/I240042149"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049594471","display_name":"Monir Azmani","orcid":"https://orcid.org/0000-0002-7434-3781"},"institutions":[{"id":"https://openalex.org/I240042149","display_name":"Abdelmalek Essa\u00e2di University","ror":"https://ror.org/03c4shz64","country_code":"MA","type":"education","lineage":["https://openalex.org/I240042149"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Azmani Monir","raw_affiliation_strings":["Laboratory of Automation Technology, FST of Tangier , Abdelmalek Essaadi University , Tetouan , Morocco"],"affiliations":[{"raw_affiliation_string":"Laboratory of Automation Technology, FST of Tangier , Abdelmalek Essaadi University , Tetouan , Morocco","institution_ids":["https://openalex.org/I240042149"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5003999513","display_name":"Abdellah Azmani","orcid":"https://orcid.org/0000-0003-4975-3807"},"institutions":[{"id":"https://openalex.org/I240042149","display_name":"Abdelmalek Essa\u00e2di University","ror":"https://ror.org/03c4shz64","country_code":"MA","type":"education","lineage":["https://openalex.org/I240042149"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Azmani Abdellah","raw_affiliation_strings":["Laboratory of Automation Technology, FST of Tangier , Abdelmalek Essaadi University , Tetouan , Morocco"],"affiliations":[{"raw_affiliation_string":"Laboratory of Automation Technology, FST of Tangier , Abdelmalek Essaadi University , Tetouan , Morocco","institution_ids":["https://openalex.org/I240042149"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5075770876"],"corresponding_institution_ids":["https://openalex.org/I240042149"],"apc_list":null,"apc_paid":null,"fwci":0.4281,"has_fulltext":true,"cited_by_count":3,"citation_normalized_percentile":{"value":0.63557193,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"27","issue":"1","first_page":"43","last_page":"54"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9837999939918518,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/troubleshooting","display_name":"Troubleshooting","score":0.9372663497924805},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6908848285675049},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.649288535118103},{"id":"https://openalex.org/keywords/automation","display_name":"Automation","score":0.5535354614257812},{"id":"https://openalex.org/keywords/predictive-maintenance","display_name":"Predictive maintenance","score":0.5386028289794922},{"id":"https://openalex.org/keywords/preventive-maintenance","display_name":"Preventive maintenance","score":0.5194242000579834},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.5026297569274902},{"id":"https://openalex.org/keywords/process-management","display_name":"Process management","score":0.3936668038368225},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3222314119338989},{"id":"https://openalex.org/keywords/reliability-engineering","display_name":"Reliability engineering","score":0.30033960938453674},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.18672612309455872}],"concepts":[{"id":"https://openalex.org/C147494362","wikidata":"https://www.wikidata.org/wiki/Q2078905","display_name":"Troubleshooting","level":2,"score":0.9372663497924805},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6908848285675049},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.649288535118103},{"id":"https://openalex.org/C115901376","wikidata":"https://www.wikidata.org/wiki/Q184199","display_name":"Automation","level":2,"score":0.5535354614257812},{"id":"https://openalex.org/C70452415","wikidata":"https://www.wikidata.org/wiki/Q3182448","display_name":"Predictive maintenance","level":2,"score":0.5386028289794922},{"id":"https://openalex.org/C24090081","wikidata":"https://www.wikidata.org/wiki/Q1043452","display_name":"Preventive maintenance","level":2,"score":0.5194242000579834},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.5026297569274902},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.3936668038368225},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3222314119338989},{"id":"https://openalex.org/C200601418","wikidata":"https://www.wikidata.org/wiki/Q2193887","display_name":"Reliability engineering","level":1,"score":0.30033960938453674},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.18672612309455872},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.2478/acss-2022-0005","is_oa":true,"landing_page_url":"https://doi.org/10.2478/acss-2022-0005","pdf_url":"https://www.sciendo.com/pdf/10.2478/acss-2022-0005","source":{"id":"https://openalex.org/S2737199380","display_name":"Applied Computer Systems","issn_l":"2255-8683","issn":["2255-8683","2255-8691"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310317398","host_organization_name":"Polish Association for Knowledge Promotion","host_organization_lineage":["https://openalex.org/P4310317398"],"host_organization_lineage_names":["Polish Association for Knowledge Promotion"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Applied Computer Systems","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:a5ee69a92a794259931a8a2de2b12365","is_oa":true,"landing_page_url":"https://doaj.org/article/a5ee69a92a794259931a8a2de2b12365","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Applied Computer Systems, Vol 27, Iss 1, Pp 43-54 (2022)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.2478/acss-2022-0005","is_oa":true,"landing_page_url":"https://doi.org/10.2478/acss-2022-0005","pdf_url":"https://www.sciendo.com/pdf/10.2478/acss-2022-0005","source":{"id":"https://openalex.org/S2737199380","display_name":"Applied Computer Systems","issn_l":"2255-8683","issn":["2255-8683","2255-8691"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310317398","host_organization_name":"Polish Association for Knowledge Promotion","host_organization_lineage":["https://openalex.org/P4310317398"],"host_organization_lineage_names":["Polish Association for Knowledge Promotion"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Applied Computer Systems","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3611121287","display_name":null,"funder_award_id":"Morocco","funder_id":"https://openalex.org/F4320323771","funder_display_name":"Centre National pour la Recherche Scientifique et Technique"}],"funders":[{"id":"https://openalex.org/F4320323771","display_name":"Centre National pour la Recherche Scientifique et Technique","ror":"https://ror.org/00675rp98"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4293207697.pdf","grobid_xml":"https://content.openalex.org/works/W4293207697.grobid-xml"},"referenced_works_count":51,"referenced_works":["https://openalex.org/W56869384","https://openalex.org/W61646295","https://openalex.org/W94959834","https://openalex.org/W341531820","https://openalex.org/W1498348584","https://openalex.org/W1500693574","https://openalex.org/W1573753230","https://openalex.org/W1919021221","https://openalex.org/W1972809764","https://openalex.org/W1977928849","https://openalex.org/W1990220114","https://openalex.org/W2002983432","https://openalex.org/W2030441628","https://openalex.org/W2040366163","https://openalex.org/W2047824738","https://openalex.org/W2060280062","https://openalex.org/W2063399198","https://openalex.org/W2096474000","https://openalex.org/W2103129939","https://openalex.org/W2104333234","https://openalex.org/W2109560632","https://openalex.org/W2111038504","https://openalex.org/W2113659417","https://openalex.org/W2114837486","https://openalex.org/W2116752428","https://openalex.org/W2118022153","https://openalex.org/W2124403757","https://openalex.org/W2150788325","https://openalex.org/W2156813924","https://openalex.org/W2158907675","https://openalex.org/W2159587105","https://openalex.org/W2160251991","https://openalex.org/W2161006788","https://openalex.org/W2161591413","https://openalex.org/W2162332844","https://openalex.org/W2162831674","https://openalex.org/W2240435662","https://openalex.org/W2617931713","https://openalex.org/W2737647392","https://openalex.org/W2755897503","https://openalex.org/W2784294263","https://openalex.org/W2911964244","https://openalex.org/W2933589034","https://openalex.org/W2963765036","https://openalex.org/W2997822014","https://openalex.org/W3004795158","https://openalex.org/W3124792046","https://openalex.org/W3162728205","https://openalex.org/W3163791259","https://openalex.org/W4245495698","https://openalex.org/W4300945730"],"related_works":["https://openalex.org/W23403803","https://openalex.org/W4214827973","https://openalex.org/W2063020871","https://openalex.org/W2315243270","https://openalex.org/W4231557335","https://openalex.org/W3006925589","https://openalex.org/W1969617929","https://openalex.org/W2394158014","https://openalex.org/W3159422131","https://openalex.org/W4283512660"],"abstract_inverted_index":{"Abstract":[0],"Intelligent":[1],"monitoring":[2,45,136],"of":[3,11,31,44,51,58,85,91,115,120,134,137],"a":[4,8,95,112,138,152],"computer":[5,139],"network":[6,53,140],"provides":[7,23],"clear":[9],"understanding":[10],"its":[12,59,143],"behaviour":[13],"at":[14],"various":[15,19],"times":[16],"and":[17,49,80,117,141,145,162],"in":[18],"situations.":[20],"It":[21,149],"also":[22,150],"relief":[24],"to":[25,54,62,69,78,158,166],"support":[26,163],"teams":[27],"that":[28],"spend":[29],"most":[30],"their":[32],"time":[33,116],"troubleshooting":[34],"problems":[35,147],"caused":[36],"by":[37,71],"hardware":[38],"or":[39],"software":[40],"failures.":[41],"This":[42,129],"type":[43],"ensures":[46],"the":[47,52,56,89,118,135,146],"accuracy":[48],"efficiency":[50],"meet":[55],"expectations":[57],"users.":[60],"However,":[61,102],"ensure":[63],"intelligent":[64],"monitoring,":[65],"it":[66,105],"is":[67,106],"necessary":[68],"start":[70],"automating":[72],"this":[73],"process,":[74],"which":[75],"often":[76],"leads":[77],"long":[79],"costly":[81],"interventions.":[82,169],"The":[83],"success":[84],"such":[86],"automation":[87],"implies":[88],"establishment":[90],"predictive":[92],"maintenance":[93,100,110],"as":[94],"prerequisite":[96],"for":[97,125,160],"good":[98],"preventive":[99,109],"governance.":[101],"even":[103],"when":[104],"practiced":[107],"effectively,":[108],"requires":[111],"great":[113],"deal":[114],"mobilization":[119],"several":[121],"full-time":[122],"resources,":[123],"especially":[124],"large":[126],"IT":[127],"structures.":[128],"paper":[130],"gives":[131],"an":[132],"overview":[133],"explains":[142],"process":[144],"encountered.":[148],"proposes":[151],"method":[153],"based":[154],"on":[155],"machine":[156],"learning":[157],"allow":[159],"prediction":[161],"decision":[164],"making":[165],"proactively":[167],"anticipate":[168]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
