Proceedings of the 2019 3rd International Conference on Information System and Data Mining最新文献

筛选
英文 中文
Development and Application of a Systematic Knowledge Management Process Model for the Tooling Industry 工具行业系统化知识管理流程模型的开发与应用
G. Schuh, C. Kelzenberg, J. Lange, J. Boshof
{"title":"Development and Application of a Systematic Knowledge Management Process Model for the Tooling Industry","authors":"G. Schuh, C. Kelzenberg, J. Lange, J. Boshof","doi":"10.1145/3325917.3325953","DOIUrl":"https://doi.org/10.1145/3325917.3325953","url":null,"abstract":"In this paper, an approach to develop a systematic knowledge management process model for tooling industry is presented. Current models are reviewed and requirements regarding knowledge transfer are identified. In order to derive the process model, three steps are necessary: definition of essential elements, conduction of detailed knowledge analysis and composition of the process model. Within this paper, all three steps are described in detail. Moreover, a systematic knowledge management process model for spatial knowledge and information about mistakes in the tool assembly process is presented exemplarily. The objective of the case study based research is a development of a system for an efficient knowledge transfer within tooling industry. The developed model is business process orientated and meets the specific requirements of applicability within the tooling industry.","PeriodicalId":249061,"journal":{"name":"Proceedings of the 2019 3rd International Conference on Information System and Data Mining","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128632034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vinfomize: A Framework for Multiple Voice-based Information Communication Vinfomize:基于语音的多种信息通信框架
Muhammad Abu ul Fazal, Sam Ferguson, Shuaib Karim, Andrew Johnston
{"title":"Vinfomize: A Framework for Multiple Voice-based Information Communication","authors":"Muhammad Abu ul Fazal, Sam Ferguson, Shuaib Karim, Andrew Johnston","doi":"10.1145/3325917.3325922","DOIUrl":"https://doi.org/10.1145/3325917.3325922","url":null,"abstract":"In this paper, we discuss investigations conducted with 10 visually challenged users (VCUs) and 8 sighted users (SUs) that aimed to determine user's experience, interest and expectations from concurrent information communication systems. In the first study, we concurrently played two voice-based streams in continuous form in both the ears, and in the second study, we concurrently communicated one stream continuously in one ear and three news headlines as interval-based short interruptions in another ear. We first reported the participants' experience qualitatively and then based on the feedback received from the users, we proposed a framework that may help in developing systems to communicate multiple voice-based information to the users. It is expected that the application of this new framework to information systems that provide multiple concurrent communication will provide a better user experience for users subject to their contextual and perceptual needs and limitations.","PeriodicalId":249061,"journal":{"name":"Proceedings of the 2019 3rd International Conference on Information System and Data Mining","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116343652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Authorship Identification using Recurrent Neural Networks 使用递归神经网络识别作者
Shriya T. P. Gupta, J. Sahoo, R. Roul
{"title":"Authorship Identification using Recurrent Neural Networks","authors":"Shriya T. P. Gupta, J. Sahoo, R. Roul","doi":"10.1145/3325917.3325935","DOIUrl":"https://doi.org/10.1145/3325917.3325935","url":null,"abstract":"Authorship identification is the process of revealing the hidden identity of authors from a corpus of literary data based on a stylometric analysis of the text. It has essential applications in various fields, such as cyber-forensics, plagiarism detection, and political socialization. This paper aims to use a deep learning approach for the task of authorship identification by defining a suitable characterization of texts to capture the distinctive style of an author. The proposed model uses an index based word embedding for the C50 and the BBC datasets, applied to the input data of article level Long Short Term Memory (LSTM) network and Gated Recurrent Unit (GRU) network models. A comparative study of this new variant of embeddings is done with the standard approach of pre-trained word embeddings.","PeriodicalId":249061,"journal":{"name":"Proceedings of the 2019 3rd International Conference on Information System and Data Mining","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122763275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Building Information Modelling in the Framework of Knowledge Management: A Water Industry Case Study 知识管理框架下的建筑信息模型:一个水务行业的案例研究
S. Suresh, S. Renukappa, Andrew Kamunda
{"title":"Building Information Modelling in the Framework of Knowledge Management: A Water Industry Case Study","authors":"S. Suresh, S. Renukappa, Andrew Kamunda","doi":"10.1145/3325917.3325958","DOIUrl":"https://doi.org/10.1145/3325917.3325958","url":null,"abstract":"The UK private water industry has seen a lot of growth in expenditure since privatisation. Ofwat, Defra and DWI have set targets for the water companies to be customer focused, reducing bills, be innovative as well as encourage competition. The emergence of Building Information Modelling (BIM) has offered opportunities to the water industry to achieve cost and programme efficiencies as the rest of the construction industry. This, together with emerging information technology has allowed organisations to take steps in collaborative working, making information available at the right time to the right people, which is fundamental to Knowledge Management (KM). There is limited research in the subject of BIM being used in the context of and tool for KM within the UK water industry. Hence the aim of the study is to explore and understand how the UK water industry is using BIM for KM. A qualitative case study was used for the collection and analysis of data with the results obtained through review of water company supply chain processes, documents, observations and semi structured interviews. The key finding from the study is the significant impact of organisational culture influence on the implementation of BIM & KM in which the water industry supply chain has been aligning its business goals, identifying needed knowledge, creating KM resources and sharing knowledge through BIM as one of KM resources or tools. In conclusion, research identifies that the water industry is heading in the right direction, with leadership and management at the forefront of instilling a positive KM culture, though it is still developing. Ongoing training and provision of resources for KM should continue to be invested in to yield cost, programme, quality and knowledge capture benefits. The close definitions for Information and Knowledge should be taken advantage of for development and implementing of KM strategies using BIM as one of its key tool or resource.","PeriodicalId":249061,"journal":{"name":"Proceedings of the 2019 3rd International Conference on Information System and Data Mining","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126103942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Algorithm of Testing ADC Effective, Number of Bits Based on Hilbert and Wavelet Transform 基于希尔伯特和小波变换的ADC有效性、位数测试算法
E. Awada
{"title":"The Algorithm of Testing ADC Effective, Number of Bits Based on Hilbert and Wavelet Transform","authors":"E. Awada","doi":"10.1145/3325917.3325921","DOIUrl":"https://doi.org/10.1145/3325917.3325921","url":null,"abstract":"In today advanced digital signal processing, many parameters must be tested to evaluate the accuracy performance of system output. Therefore, focusing down into an essential part of signal converts (Analog to Digital Converts) is a must prior to any system evaluations. As a result, this work will emphasize on the testing enhancement of Analog to Digital Converts parameters, such as Effected Number of Bits, to determine the accuracy of waveform regeneration and device performance with a newly implemented algorithm. That is, a new algorithm based on structuring Discrete Wavelet transform decomposition on prior interleave Hilbert transform, of Analog to Digital Converts output waveform, to measure Converts ability to reproduce a waveform in their full capacity. With such arrangement, the new algorithm intends to improve previous work for the testing process, higher testing accuracy, fewer computation data samples, and provide a platform of modulation process for other parameters measurement at the same time.","PeriodicalId":249061,"journal":{"name":"Proceedings of the 2019 3rd International Conference on Information System and Data Mining","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123238969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Comparative Analysis of Unstructured P2P File Sharing Networks 非结构化P2P文件共享网络的比较分析
Mehr-un-Nisa, Fasiha Ashraf, Ateeqa Naseer, Shaukat Iqbal
{"title":"Comparative Analysis of Unstructured P2P File Sharing Networks","authors":"Mehr-un-Nisa, Fasiha Ashraf, Ateeqa Naseer, Shaukat Iqbal","doi":"10.1145/3325917.3325952","DOIUrl":"https://doi.org/10.1145/3325917.3325952","url":null,"abstract":"Numerous P2P networks are available covering different areas of P2P technologies. Since P2P network overlays are good for creating large scale content distribution and data sharing applications, an ample amount of effort has been made to improve the performance of these networks. Moreover, rapid development of P2P technologies has left older technologies far behind. The goal of this paper is to study and present a comprehensive overview of some of these networks. Furthermore, a comparison of Unstructured P2P file sharing wired networks with their distinct characteristics has been presented. In this paper, various features of P2P networks have been studied that results in understanding the behavior of these protocols under different circumstances. A critical analysis of the state of art P2P networks has been made taking care of various significant features for both wired. The analysis presents the effectiveness of different systems in different circumstances. This research aims to provide a comprehensive comparative analysis of P2P file sharing protocols of wired networks.","PeriodicalId":249061,"journal":{"name":"Proceedings of the 2019 3rd International Conference on Information System and Data Mining","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124953136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Network Traffic Anomaly Detection based on Viterbi Algorithm Using SNMP MIB Data 基于SNMP MIB数据的Viterbi算法网络流量异常检测
Sulaiman Alhaidari, Ali I. Alharbi, Mansour Alshaikhsaleh, M. Zohdy, D. Debnath
{"title":"Network Traffic Anomaly Detection based on Viterbi Algorithm Using SNMP MIB Data","authors":"Sulaiman Alhaidari, Ali I. Alharbi, Mansour Alshaikhsaleh, M. Zohdy, D. Debnath","doi":"10.1145/3325917.3325928","DOIUrl":"https://doi.org/10.1145/3325917.3325928","url":null,"abstract":"With the growing number of attacks and malicious threats on the Internet services and network infrastructures, the need for techniques to identify and detect attacks is increasing. One of the most critical attack for cyber security and serious security threat to Internet services in recent years is Denial of Service (DoS). Therefore, using machine learning techniques along traditional security mechanisms such as firewall and cryptography, can improve the performance of intrusion detection systems (IDSs). This research paper introduces an approach using Hidden Markov Model (HMM) based on Viterbi algorithm for detecting anomalies on SNMP MIB dataset, and compares it to two classification algorithms: Adaboost M1 and Naive Bayes algorithm. The obtained results show HMM based on Viterbi algorithm found effective and achieved great results in detecting the attacks with a high detection rate.","PeriodicalId":249061,"journal":{"name":"Proceedings of the 2019 3rd International Conference on Information System and Data Mining","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121333373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Knowledge Management System Approach of Police Performance Management in Regional Police of Yogyakarta Special Region, Indonesia 印尼日惹特别行政区警察绩效管理的知识管理系统方法
Vita Mayastinasari, Benyamin Lufpi, Novi Indah Earlyanti
{"title":"Knowledge Management System Approach of Police Performance Management in Regional Police of Yogyakarta Special Region, Indonesia","authors":"Vita Mayastinasari, Benyamin Lufpi, Novi Indah Earlyanti","doi":"10.1145/3325917.3325954","DOIUrl":"https://doi.org/10.1145/3325917.3325954","url":null,"abstract":"The purpose of this study was to identify the need of knowledge management and the method of implementing knowledge management in police performance. This research was conducted in the regional police of Yogyakarta Special Region. The approach of research used mixed method research. The method used a survey and description of the analysis. The result of this study showed that the perspective of Yogyakarta Special Region community on police performance had a positive trend, as indicated by level of public confidence in the performance of members of the Yogyakarta special region police at 93.19%, this could be indicated as a positive impact of the knowledge management system approach. The knowledge management system approach will transform secret knowledge into explicit knowledge and will also drive innovation. The implications in this study identified that police performance could be influenced by the knowledge management system approach.","PeriodicalId":249061,"journal":{"name":"Proceedings of the 2019 3rd International Conference on Information System and Data Mining","volume":"30 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117049459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Knowledge Transfer, Sharing, and Management System Based on Causality for Requirements Change Management 需求变更管理中基于因果关系的知识转移、共享与管理系统
Yuqing Yan, Zhen-hua Zhang
{"title":"Knowledge Transfer, Sharing, and Management System Based on Causality for Requirements Change Management","authors":"Yuqing Yan, Zhen-hua Zhang","doi":"10.1145/3325917.3325947","DOIUrl":"https://doi.org/10.1145/3325917.3325947","url":null,"abstract":"In software development, requirements changes cannot be avoided. Despite the importance of requirements change management, few studies in the literature concern requirements change knowledge management(RCKM). This study explored knowledge transfer and sharing of RCKM based on change cause analysis and the design of a knowledge management system(KMS) for change management. In this paper, previous research is discussed in three aspects: factors affecting knowledge transfer and sharing, methods to implement knowledge transfer and sharing, and the design of a KMS. After that, the results of a recent questionnaire are analyzed. Finally, this paper discusses the sources of tacit knowledge in the personnel management aspects of software development; the knowledge and the methods of knowledge transfer and sharing in the requirements change management process based on change cause analysis; the design of a data flowchart of repositories, and a prototype structure, logical model, and functional modules of RCKM systems. In conclusion, further study is suggested.","PeriodicalId":249061,"journal":{"name":"Proceedings of the 2019 3rd International Conference on Information System and Data Mining","volume":"300 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116113940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of competitive Power of Chinese Sports Apparel Brand based on Porter's five Force Model 基于波特五力模型的中国运动服装品牌竞争力分析
Lu Ge, Chenggang Li
{"title":"Analysis of competitive Power of Chinese Sports Apparel Brand based on Porter's five Force Model","authors":"Lu Ge, Chenggang Li","doi":"10.1145/3325917.3325951","DOIUrl":"https://doi.org/10.1145/3325917.3325951","url":null,"abstract":"Chinese sportswear industry is in the stage of brand establishment, and also faces the double competition of domestic and foreign sportswear brands. If local brands want to create popularity, they must form their own unique competitiveness. The article defines the Chinese sportswear brand, based on Porter's five-force model, from the ability of competitors in the industry, the threat of substitute products or services, the threat of potential competitors, Analysis on the bargaining ability of buyers and suppliers; the industry environment of domestic sportswear industry; and put forward that the development of local sportswear brands in China should implement the cost leading strategy in the basic strategy. In the growth strategy, the strengthening strategy includes three aspects: market penetration, market development and product development.","PeriodicalId":249061,"journal":{"name":"Proceedings of the 2019 3rd International Conference on Information System and Data Mining","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114594895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信