2015 13th International Conference on ICT and Knowledge Engineering (ICT & Knowledge Engineering 2015)最新文献

筛选
英文 中文
Improvement of call center customer service in a thai bank using disco fuzzy mining algorithm 利用迪斯科模糊挖掘算法改进泰国某银行呼叫中心客户服务
Poohridate Arpasat, P. Porouhan, W. Premchaiswadi
{"title":"Improvement of call center customer service in a thai bank using disco fuzzy mining algorithm","authors":"Poohridate Arpasat, P. Porouhan, W. Premchaiswadi","doi":"10.1109/ICTKE.2015.7368477","DOIUrl":"https://doi.org/10.1109/ICTKE.2015.7368477","url":null,"abstract":"The main objective of the study was to benchmark performance, control discrepancies, and investigate variations of a bank customer service call center data dealing with incoming calls of its clients and customers. To do this, initially an event log consisting of a total of 625,767 process instances (i.e., events) was collected from a private bank in Thailand for the month of July 2015. Using Disco fuzzy mining technique as a process mining tool enabled us to simulate and create authentic visual models/maps from the collected event log in form of fuzzy mining graphs. To better investigate the behavior of the bank's clients/customers and administrators/operators dealing with inappropriate (not successful) customer service and calls, only “Failure” or “Not Responded” types of process instances/events were chosen and selected for the study. The findings showed that the number of the incoming calls made into the call center (customer service section) due to the “over card limit” problem was the highest (i.e., with 4,667 process instances in total) compared with the other problems within the call center event log. On the other hand, the results showed that almost 32%of the “Over Card Limit” type of the problems were not solved at the first attempt (i.e., clients/customers have to re-dial and re-contact the operators in charge of the section again for the second, third or sometimes multiple-times). Similarly, our results showed that the problems occurred due to the reason why the “card number is already activated” allocated the second highest number of problems (i.e., with a total of 2,068 process instances in total) within the call center event log. Interestingly, 10% of the incoming calls facing the “card number is already activated” were not solved/fixed at the first attempt and clients/customers need to re-contact the call center operators again afterwards. With the same token “record not found” (with 52% of the calls not solved at the first attempt), “account not found” (with 68% of the calls not solved at the first attempt) and “account does not exist” (with 61% of the calls not solved at the first attempt) types of the problems allocated the third, fourth and fifth most frequent incoming calls made into the call center customer service section. Eventually, the results of the study can be used in order to enhance and improve the performance of the customer service processes in a more efficient, effective and timely manner.","PeriodicalId":128925,"journal":{"name":"2015 13th International Conference on ICT and Knowledge Engineering (ICT & Knowledge Engineering 2015)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122598583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Determining citizen complaints to the appropriate government departments using KNN algorithm 使用KNN算法确定公民向适当政府部门的投诉
Suhatati Tjandra, Amelia Alexandra Putri Warsito, J. Sugiono
{"title":"Determining citizen complaints to the appropriate government departments using KNN algorithm","authors":"Suhatati Tjandra, Amelia Alexandra Putri Warsito, J. Sugiono","doi":"10.1109/ICTKE.2015.7368461","DOIUrl":"https://doi.org/10.1109/ICTKE.2015.7368461","url":null,"abstract":"Participation of citizens in the process of city development is very important. To achieve good governance and democratic, the citizen can participate by providing complaints, information, or advices. In the current system, complaints are handled manually by 1-2 operators, whereas speed and accuracy are needed. The problem is this manual handling causes errors in the determination of appropriate government departments that handle the complaint. This research will propose a system that aims to determine the appropriate government department with complaints given by the citizen with the implementation of K-Nearest Neighbor (KNN) algorithm, to reduce human errors. This algorithm is one of text classification algorithms, which in this research, is used to classify complaints which the texts in Indonesian language. The input of the system is complaint given by the citizen and the output is the name of the appropriate government department, which is in accordance with the contents of the complaint.","PeriodicalId":128925,"journal":{"name":"2015 13th International Conference on ICT and Knowledge Engineering (ICT & Knowledge Engineering 2015)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116528323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Disaster mitigation support system using web services and SNS information 使用web服务和SNS信息的减灾支持系统
T. Funayama, Yoshiro Yamamoto, Makoto Tomita, Y. Kajita, S. Tajima, K. Utsu, O. Uchida
{"title":"Disaster mitigation support system using web services and SNS information","authors":"T. Funayama, Yoshiro Yamamoto, Makoto Tomita, Y. Kajita, S. Tajima, K. Utsu, O. Uchida","doi":"10.1109/ICTKE.2015.7368469","DOIUrl":"https://doi.org/10.1109/ICTKE.2015.7368469","url":null,"abstract":"Our research group previously developed a system that checks Twitter tweet contents for current-location address using GPS and for need of assistance, and automatically attaches a hashtag to postings made within the system. In the present study, we proceeded to the construction of a disaster mitigation support system that utilizes tweets posted in the system together with web services in order to transmit information for disaster mitigation. The new system draws concurrently from some of the many web services related to disaster mitigation and is characterized by its transmission of information on specific locations obtained by GPS. Incorporating a web GIS, the system uses a web API to convert location geocoordinates (latitude and longitude) to prefectural names and vice versa, as well as to construct a map showing radar-detected rain cloud information. Furthermore, it uses Python to obtain tweets and weather information, convert location indicators, and create HTML files.","PeriodicalId":128925,"journal":{"name":"2015 13th International Conference on ICT and Knowledge Engineering (ICT & Knowledge Engineering 2015)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117091084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Process simulation and pattern discovery through alpha and heuristic algorithms 通过alpha和启发式算法进行过程模拟和模式发现
W. Premchaiswadi, P. Porouhan
{"title":"Process simulation and pattern discovery through alpha and heuristic algorithms","authors":"W. Premchaiswadi, P. Porouhan","doi":"10.1109/ICTKE.2015.7368472","DOIUrl":"https://doi.org/10.1109/ICTKE.2015.7368472","url":null,"abstract":"The paper is divided into two main parts. In the first part of the study, we applied two process mining discovery techniques (i.e., alpha and heuristic algorithms) on an event log previously collected from an information system during an Academic Writing (English) training course at a private university in Thailand. The event log was initially consisted of 330 process instances (i.e., number of participants) and 3,326 events (i.e., number of actions/tasks) in total. Using alpha algorithm enabled us to reconstruct causality in form of a Petri-net graph/model. By using heuristic algorithm we could derive XOR and AND connectors in form of a C-net. The results showed 86.36% of the applicants/participants managed to achieve the Academic Writing (English) certificate successfully, while 6.36% of them failed to achieve any certificate after a maximum number of 3 attempts to repeat the training course. Surprisingly, 7.28% of the participants neither achieved an accredited certificate nor failed the course by dropping out before ending the course training process. In the second part of the study, we used performance analysis with Petri net technique (as a process mining conformance checking approach) in order to further analyze the points of noncompliant behavior (i.e., so-called bottlenecks or points of noncompliant behavior) for every case in the collected course training log. Based on the results, we could eventually detect the existing discrepancies of the event log leading to +24 missed tokens and -24 remained tokens altogether.","PeriodicalId":128925,"journal":{"name":"2015 13th International Conference on ICT and Knowledge Engineering (ICT & Knowledge Engineering 2015)","volume":"211 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122451460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Applying social network miner on medical event logs using handover of work metric 使用工作移交度量在医疗事件日志中应用社交网络挖掘器
Waraporn Meethaisong, W. Premchaiswadi
{"title":"Applying social network miner on medical event logs using handover of work metric","authors":"Waraporn Meethaisong, W. Premchaiswadi","doi":"10.1109/ICTKE.2015.7368481","DOIUrl":"https://doi.org/10.1109/ICTKE.2015.7368481","url":null,"abstract":"The main objective of the paper is to analyze of the behavior of patients (as well as the doctors and surgeons) referring to a private hospital for treatment in Thailand. The main idea is to investigate and scrutinize the relationships of the patients and the relevant physicians during the treatment process based on an event log previously collected from the information system of the hospital. Accordingly, we applied process mining social network analysis approach (in term of the handover of work metric) to discover meaningful relationships and insights between the personnel and patients. One of the major benefits of the applied approach was that we could better track and trace the handover of workload from a doctor/surgeon to another doctor/physician within different medical wards/sections dealing with the patients' disease during the treatment process. Considering the results of the study, can significantly help the hospital's administrators and physicians to monitor and recognize the correct flow of transactions and interactions made between different resources in specify sections/wards. Moreover, the proposed technique enabled us to identify those resources who probably were playing an idle role dealing with patients' needs and medical procedures, while not contributing in the assigned tasks and duties as they should do. Eventually, by contemplating on the findings of the study, the researchers and hospitals' management level can benchmark and improve the handling of the patients' treatment process in a way to lead to increased customer satisfaction toward the quality of the service on work, in a more efficient, effective and timely manner.","PeriodicalId":128925,"journal":{"name":"2015 13th International Conference on ICT and Knowledge Engineering (ICT & Knowledge Engineering 2015)","volume":"06 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134221533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Special consideration for Big Data in IoE or Internet of Everything 特别考虑IoE或万物互联中的大数据
S. Charmonman, Pornpisud Mongkhonvanit
{"title":"Special consideration for Big Data in IoE or Internet of Everything","authors":"S. Charmonman, Pornpisud Mongkhonvanit","doi":"10.1109/ICTKE.2015.7368487","DOIUrl":"https://doi.org/10.1109/ICTKE.2015.7368487","url":null,"abstract":"The Internet of Thing (IoT) is the network of things connected all over the world. The Internet of Everything (IoE) adds People, Process, and Data to IoT and thus creates exabyte (billion of billions) of data every day. The traditional data management can be used only partially for IoE data from sensors and not for all data from other sources and types. This paper will discuss the IoT market statistics, the insights for IoE, the 2014 World Economic Forum Data Policy Recommendations, Big Data and IoE, Management of IoE data, and Sample Best Practices for IoE.","PeriodicalId":128925,"journal":{"name":"2015 13th International Conference on ICT and Knowledge Engineering (ICT & Knowledge Engineering 2015)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122058388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Analysis of customer behavior in a call center using fuzzy miner 基于模糊挖掘的呼叫中心客户行为分析
Kanok Rattanathavorn, W. Premchaiswadi
{"title":"Analysis of customer behavior in a call center using fuzzy miner","authors":"Kanok Rattanathavorn, W. Premchaiswadi","doi":"10.1109/ICTKE.2015.7368485","DOIUrl":"https://doi.org/10.1109/ICTKE.2015.7368485","url":null,"abstract":"The main objective of this research is to investigate and analyze customer behavior in call center of a telecommunication company. In order to find the purpose of their contact, we applied Fuzzy mining algorithm (supported by ProM 5.2 and Disco Fluxicon) on event log of stored and collected from the call center database. Using these techniques enables us to better track and trace the number of times each section/segment has received calls from customers in total (with respect to frequency of the contacts made via the call center). Also, we could better follow up the steps undertaken dealing with the calls made to communicate company with respect to topic and type of the problems, complaints, services and so on. One of the main advantages of Fuzzy mining techniques is the ability to deal with the concurrent activities (i.e., loops) in a more sophisticated approach compared with other knowledge discovery model such as Alpha or Heuristic mining. Considering the results of the study, administrators and operators of the telecommunication companies can better handle the inbound calls leading to better performance, efficiency, and customer satisfaction.","PeriodicalId":128925,"journal":{"name":"2015 13th International Conference on ICT and Knowledge Engineering (ICT & Knowledge Engineering 2015)","volume":"775 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114000241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Analysis of call-center operational data using role hierarchy miner 基于角色层次挖掘的呼叫中心运营数据分析
Sompong Wongvigran, W. Premchaiswadi
{"title":"Analysis of call-center operational data using role hierarchy miner","authors":"Sompong Wongvigran, W. Premchaiswadi","doi":"10.1109/ICTKE.2015.7368486","DOIUrl":"https://doi.org/10.1109/ICTKE.2015.7368486","url":null,"abstract":"The main objective of this research is to analyze information of customer contact made to a call center section of a telecommunication company in Thailand. Using role hierarchy mining approach (as process mining technique) enabled us to focus on the hierarchical perspectives of the collected event log with respect to the functional relationships amongst the originators (i.e., the administrators and operators who were in charge of handling incoming calls made from customers/clients). Following a role hierarchy approach, we could better track and trace the interactions made between different personnel/administrators in a functional organizational structure from top to down. One of the main advantages of the proposed approach was the ability to detect and identify potential discrepancies and outbreaks made against the rules and responsibilities previously defined by the top management and human resource staff. Accordingly, the results of the study can help the telecommunication companies to improve their call center (customer service) section in such a way to result in more customer/client satisfaction toward the quality of service on work. Therefore, applying a role hierarchy mining approach will eventually lead to improving the performance of the handling calls made to the callcenter section, in a more efficient, effective and timely manner.","PeriodicalId":128925,"journal":{"name":"2015 13th International Conference on ICT and Knowledge Engineering (ICT & Knowledge Engineering 2015)","volume":"157 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121478546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Crop irrigation schedule expert system 作物灌溉调度专家系统
M. Hazman
{"title":"Crop irrigation schedule expert system","authors":"M. Hazman","doi":"10.1109/ICTKE.2015.7368475","DOIUrl":"https://doi.org/10.1109/ICTKE.2015.7368475","url":null,"abstract":"In this paper, a crop irrigation schedule expert system was presented. The main task for the presented system is to utilize irrigation expertise for a crop and calculates the detailed irrigation operations. The irrigation operation determines the exact water requirements and time for the crop according to different environmental parameters and the cultivated crop parameters. Separating these parameters from the expert system knowledge base is required to generalize the presented irrigation system to be applied for any crop. Therefore, the proposed system takes these parameters as input data. Since these parameters are not usually known by the ordinary user, then the proposed model uses predefined services for collecting the needed parameters based on the plantation date, location, and crop type. A case study is applied to demonstrate how the proposed system can be applied for generating Fababean irrigation schedule. The result shows the applicability of the proposed system to be used in generating the irrigation schedule for any crop.","PeriodicalId":128925,"journal":{"name":"2015 13th International Conference on ICT and Knowledge Engineering (ICT & Knowledge Engineering 2015)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125680686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Social network analysis and role hierarchy mining through MXML-based event logs 通过基于mxml的事件日志进行社会网络分析和角色层次挖掘
P. Porouhan, W. Premchaiswadi
{"title":"Social network analysis and role hierarchy mining through MXML-based event logs","authors":"P. Porouhan, W. Premchaiswadi","doi":"10.1109/ICTKE.2015.7368471","DOIUrl":"https://doi.org/10.1109/ICTKE.2015.7368471","url":null,"abstract":"This paper is divided into three main parts. In the first part of the study, we initially collected a process event log -from an information system -during an Academic Writing (English) training course in Thailand. The original data was consisted of 330 process instances and 3,326 events in total. Being aware of the fact that ProM process mining framework accepts and supports only XES and MXML logs, the data was subsequently configured and converted into the fitting format. In the second part of the study, we applied role hierarchy mining technique in order to evaluate the role of every individual throughout the course/training program. Moreover, the organizational mining technique enabled us to better understand the functional structure of the training organization (based on models) and ultimately improve (or benchmark) the underlying processes. In the thirst part of the study, we used social network mining as a pre-requisite for social network analysis to discover the interaction patterns between the originators during the teaching process. Accordingly, the handover of work metric -of the social network mining technique-made possible to not only investigate direct relationships but also indirect relationships as well.","PeriodicalId":128925,"journal":{"name":"2015 13th International Conference on ICT and Knowledge Engineering (ICT & Knowledge Engineering 2015)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123810356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信