International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management最新文献

筛选
英文 中文
On Present Use of Machine Learning based Automation in Finance 当前基于机器学习的自动化在金融中的应用
V. Tripathi
{"title":"On Present Use of Machine Learning based Automation in Finance","authors":"V. Tripathi","doi":"10.5220/0008480504120418","DOIUrl":"https://doi.org/10.5220/0008480504120418","url":null,"abstract":"In this paper, we survey the current known applications of Machine Learning based Data Analytics and automation in finance industry. We look into the challenges involved in furthering this technology, particularly in employing more Deep Learning approaches proven for successful automation in other domains. We enumerate observations on some of the barriers faced by the industry in effectively adopting and accelerating use of AI techniques, and finally propose more areas that we believe could further benefit from application of Machine Learning.","PeriodicalId":133533,"journal":{"name":"International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128619882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identifying Different Types of Social Ties in Events from Publicly Available Social Media Data 从公开可用的社交媒体数据中识别事件中不同类型的社会关系
J. Gupta, H. Kärkkäinen, Karan Menon, Jukka Huhtamäki, R. Mukkamala, Abid Hussain, Ravikiran Vatrapu, J. Jussila, H. Pirkkalainen, Thomas Olsson
{"title":"Identifying Different Types of Social Ties in Events from Publicly Available Social Media Data","authors":"J. Gupta, H. Kärkkäinen, Karan Menon, Jukka Huhtamäki, R. Mukkamala, Abid Hussain, Ravikiran Vatrapu, J. Jussila, H. Pirkkalainen, Thomas Olsson","doi":"10.5220/0008065501760186","DOIUrl":"https://doi.org/10.5220/0008065501760186","url":null,"abstract":"Tie strength is an essential concept in identifying different kind of social ties - strong ties and weak ties. Most present studies that evaluated tie strength from social media were carried out in a controlled environment and used private/closed social media data. Even though social media has become a very important way of networking in professional events, access to such private social media data in those events is almost impossible. There is very limited research on how to facilitate networking between event participants and especially on how to automate this networking aspect in events using social media. Tie strength evaluated using social media will be key in automating this process of networking. To create such tie strength based event participant recommendation systems and tools in the future, first, we need to understand how to evaluate tie strength using publicly available social media data. The purpose of this study is to evaluate tie strength from publicly available social media data in the context of a professional event. Our case study environment is community managers’ online discussions in social media (Twitter and Facebook) about the CMAD2016 event in Finland. In this work, we analyzed social media data from that event to evaluate tie strength and compared the social media analysis-based findings with the individuals’ perceptions of the actual tie strengths of the event participants using a questionnaire. We present our findings and conclude with directions for future work.","PeriodicalId":133533,"journal":{"name":"International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115211252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Knowledge Management Models for the Smart Factory: A Comparative Analysis of Current Approaches 智能工厂的知识管理模型:当前方法的比较分析
Patrick Tinz, Janik Tinz, Stefan Zander
{"title":"Knowledge Management Models for the Smart Factory: A Comparative Analysis of Current Approaches","authors":"Patrick Tinz, Janik Tinz, Stefan Zander","doi":"10.5220/0008348803980404","DOIUrl":"https://doi.org/10.5220/0008348803980404","url":null,"abstract":"This paper analyses current and well-known knowledge management models regarding their applicability to smart factories and the Industry 4.0. In form of a literature study, we surveyed the specific challenges and requirements that smart factories and the ongoing digital transition in the industrial sector introduce to knowledge management systems and models. In the second part, we then expound the extent to which those requirements are supported by well-established knowledge management models in form of a comparative analysis. A central result of this work is that an Industry 4.0 compliant knowledge management needs to incorporate aspects that emphasize human-machine and machine-machine interaction together with data protection and privacy concerns, besides other well-researched and established aspects.","PeriodicalId":133533,"journal":{"name":"International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121757933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Revisiting Social Media Tie Strength in the Era of Data Access Restrictions 重新审视数据访问限制时代的社交媒体纽带力量
J. Gupta, H. Kärkkäinen, Osku Torro, R. Mukkamala
{"title":"Revisiting Social Media Tie Strength in the Era of Data Access Restrictions","authors":"J. Gupta, H. Kärkkäinen, Osku Torro, R. Mukkamala","doi":"10.5220/0008067501870194","DOIUrl":"https://doi.org/10.5220/0008067501870194","url":null,"abstract":"The strength of social ties has an impact on how information is transferred and processed in a social network. Many studies have used social media data to evaluate tie strength. However, many of these studies were done at a time when social media data could be accessed legally without using the social media platform API. In the past few years, there have been significant changes in the data access policies of these platforms, which has led to a considerable reduction in the possibilities of using social media data for tie strength evaluation. The paper aims to study the impact of the data access policy changes of major social media platforms on the existing social media based tie strength models. The findings of this study show that the existing social media based tie strength models can no longer be utilized in their current form. Our study suggests that there is either a need to modify the existing social media based tie strength models or to develop new social media based tie strength models that reflect the recent changes in the data access policies.","PeriodicalId":133533,"journal":{"name":"International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126480499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Prediction of Public Procurement Corruption Indices using Machine Learning Methods 基于机器学习方法的公共采购腐败指数预测
K. Rabuzin, Nikola Modrusan
{"title":"Prediction of Public Procurement Corruption Indices using Machine Learning Methods","authors":"K. Rabuzin, Nikola Modrusan","doi":"10.5220/0008353603330340","DOIUrl":"https://doi.org/10.5220/0008353603330340","url":null,"abstract":"The protection of citizens’ public financial resources through advanced corruption detection models in public procurement has become an almost inevitable topic and the subject of numerous studies. Since it almost always focuses on the prediction of corrupt competition, the calculation of various indices and indications of corruption to the data itself are very difficult to come by. These data sets usually have very few observations, especially accurately labelled ones. The prevention or detection of compromised public procurement processes is definitely a crucial step, related to the initial phase of public procurement, i.e., the phase of publication of the notice. The aim of this paper is to compare prediction models using text-mining techniques and machine-learning methods to detect suspicious tenders, and to develop a model to detect suspicious one-bid tenders. Consequently, we have analyzed tender documentation for particular tenders, extracted the content of interest about the levels of all bids and grouped it by procurement lots using machine-learning methods. A model that includes the aforementioned components uses the most common text classification algorithms for the purpose of prediction: naive Bayes, logistic regression and support vector machines. The results of the research showed that knowledge in the tender documentation can be used for detection suspicious tenders.","PeriodicalId":133533,"journal":{"name":"International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management","volume":"311 15","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120875640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Material Recognition for Mixed Reality Scene including Objects' Physical Characteristics 基于物体物理特征的混合现实场景材料识别
Kenzaburo Miyawaki, Soichi Okabe
{"title":"Material Recognition for Mixed Reality Scene including Objects' Physical Characteristics","authors":"Kenzaburo Miyawaki, Soichi Okabe","doi":"10.5220/0008332502190224","DOIUrl":"https://doi.org/10.5220/0008332502190224","url":null,"abstract":"Mixed Reality (MR) is a technique to represent scenes which make virtual objects exist in the real world. MR is different from Augmented Reality (AR) and Virtual Reality (VR). For example, in MR scenes, a user can put a virtual Computer Graphics (CG) object on a desk of the real world. The virtual object can interact with the real desk physically, and the user can see the virtual object from every direction. However, MR only uses position and shape information of real world objects. Therefore, we present a new MR scene generator considering real world objects’ physical characteristics such as friction, repulsion and so on, by using material recognition based on a deep neural network.","PeriodicalId":133533,"journal":{"name":"International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121524748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fruitful Synergies between Computer Science, Historical Studies and Archives: The Experience in the PRiSMHA Project 计算机科学、历史研究和档案之间卓有成效的协同作用:PRiSMHA项目的经验
A. Goy, Cristina Accornero, Dunia Astrologo, Davide Colla, M. D'Ambrosio, R. Damiano, Marco Leontino, Antonio Lieto, F. Loreto, Diego Magro, Enrico Mensa, Alice Montanaro, Valeria Mosca, S. Musso, Daniele P. Radicioni, Christopher Ré
{"title":"Fruitful Synergies between Computer Science, Historical Studies and Archives: The Experience in the PRiSMHA Project","authors":"A. Goy, Cristina Accornero, Dunia Astrologo, Davide Colla, M. D'Ambrosio, R. Damiano, Marco Leontino, Antonio Lieto, F. Loreto, Diego Magro, Enrico Mensa, Alice Montanaro, Valeria Mosca, S. Musso, Daniele P. Radicioni, Christopher Ré","doi":"10.5220/0008343802250230","DOIUrl":"https://doi.org/10.5220/0008343802250230","url":null,"abstract":"In this paper we present the mid-term results of the PRiSMHA project, aimed to contribute in building a digital “smart archivist”, i.e., a web-based system providing an innovative access to historical archives. Such a system is endowed with a semantic layer over existing archival metadata, including computational ontologies and a knowledge base, containing a formal description of the content of the documents stored in the archives. The paper focuses on the fruitful synergies employed to reach its goal. In particular, it explains the steps of the “spiral” process implemented for creating a full-fledged formal semantic model, through the interaction between computer scientists, historians, and archivists. The paper also presents some “core side-effects” of this process: an analytical card for each document has been produced, all selected documents have been digitized, OCR-ized (when possible), and linked to a record on the archival platform. This experience enabled us to define a virtuous procedural model, from the paper documents up to the digital “smart archivist”, based on a close collaboration between universities and cultural and historical institutions.","PeriodicalId":133533,"journal":{"name":"International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management","volume":"204 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123372611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Blockchain Certification and Granular Editing Permissions in Document Management System 文档管理系统中的区块链认证和细粒度编辑权限
F. Pani, Giacomo Ibba, M. Marchesi, A. Pinna, S. Porru, R. Tonelli, Bartolomeo Valcalda
{"title":"Blockchain Certification and Granular Editing Permissions in Document Management System","authors":"F. Pani, Giacomo Ibba, M. Marchesi, A. Pinna, S. Porru, R. Tonelli, Bartolomeo Valcalda","doi":"10.5220/0008349902990306","DOIUrl":"https://doi.org/10.5220/0008349902990306","url":null,"abstract":"Ever-growing digitalization and increasingly competitive markets are driving industry and the public sector into fast-paced transformation. Competitive advantage is being acquired through technology investments made possible by previously unavailable resources, freed by process automation, simplification, and rationalization. Under these contingencies, we propose an innovative document management platform, featuring a collaborative document editing technique and a blockchain certification procedure. The two proposing parties - a private company and an academic organization - mutually agreed on employing open-source technologies as a strategic means to promote software reuse and developer communities’ support, and consequently reduce implementation costs and ensure interoperability.","PeriodicalId":133533,"journal":{"name":"International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116844726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Knowledge Requirements for Sustainable Smart Service Design 可持续智能服务设计的知识需求
J. M. V. Cedeño, L. Hannola, V. Ojanen
{"title":"Knowledge Requirements for Sustainable Smart Service Design","authors":"J. M. V. Cedeño, L. Hannola, V. Ojanen","doi":"10.5220/0008069201950202","DOIUrl":"https://doi.org/10.5220/0008069201950202","url":null,"abstract":"Recent research have addressed the topic of smart services from distinct angles, covering both technical and business aspects. However, a holistic approach in development processes of such services have yet to be fully covered. Therefore, this paper proposes an elicitation of requirements process as the initial step of a smart service design approach. The process takes information and knowledge needs as its core element for development, also considering customer centricity, service lifecycle, and sustainability concerns. A text mining tool was used to discover the unknown knowledge requirements from different text-data sources presented in a case ecosystem. After a co-occurrence analysis performed by our text mining software, we extracted the most relevant natural linguistic elements, which are expressed as knowledge requirements. The proposed elicitation process aims to lay the foundations for further propositions with a holistic point of view. Future research could aim the application of other technologies and methods for service design, as well as a broader approach in business processes and interdisciplinary cooperation.","PeriodicalId":133533,"journal":{"name":"International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126227557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Evaluation of the Performance of Information Systems Implemented at the University of Tripoli, Libya 在利比亚的黎波里大学实施的信息系统性能评估
Tareq Salahi Almigheerbi, David Ramsey, Anna Lamek
{"title":"Evaluation of the Performance of Information Systems Implemented at the University of Tripoli, Libya","authors":"Tareq Salahi Almigheerbi, David Ramsey, Anna Lamek","doi":"10.5220/0008119902030211","DOIUrl":"https://doi.org/10.5220/0008119902030211","url":null,"abstract":"Evaluating the performance of information systems (ISs) has emerged from the increasing influence of information technology on the effectiveness and efficiency of work processes in an organization (Bryman and Bell 2007). The aim of the overall study is to overcome a lack in the literature regarding the assessment of information systems (IS) in Libyan Higher Education (LHE), especially universities. The aim of this initial article is to focus on the University of Tripoli (UOT), a study that will be extended to other Libyan public universities. A description of the study, its significance and objectives and the methodology followed are presented, together with an analysis of the findings on the basis of appropriately chosen models. Finally, we assess the current level of ISs implemented in UOT by analyzing the findings based on these models.","PeriodicalId":133533,"journal":{"name":"International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121825480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信