{"title":"Development and Application of a Systematic Knowledge Management Process Model for the Tooling Industry","authors":"G. Schuh, C. Kelzenberg, J. Lange, J. Boshof","doi":"10.1145/3325917.3325953","DOIUrl":"https://doi.org/10.1145/3325917.3325953","url":null,"abstract":"In this paper, an approach to develop a systematic knowledge management process model for tooling industry is presented. Current models are reviewed and requirements regarding knowledge transfer are identified. In order to derive the process model, three steps are necessary: definition of essential elements, conduction of detailed knowledge analysis and composition of the process model. Within this paper, all three steps are described in detail. Moreover, a systematic knowledge management process model for spatial knowledge and information about mistakes in the tool assembly process is presented exemplarily. The objective of the case study based research is a development of a system for an efficient knowledge transfer within tooling industry. The developed model is business process orientated and meets the specific requirements of applicability within the tooling industry.","PeriodicalId":249061,"journal":{"name":"Proceedings of the 2019 3rd International Conference on Information System and Data Mining","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128632034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Muhammad Abu ul Fazal, Sam Ferguson, Shuaib Karim, Andrew Johnston
{"title":"Vinfomize: A Framework for Multiple Voice-based Information Communication","authors":"Muhammad Abu ul Fazal, Sam Ferguson, Shuaib Karim, Andrew Johnston","doi":"10.1145/3325917.3325922","DOIUrl":"https://doi.org/10.1145/3325917.3325922","url":null,"abstract":"In this paper, we discuss investigations conducted with 10 visually challenged users (VCUs) and 8 sighted users (SUs) that aimed to determine user's experience, interest and expectations from concurrent information communication systems. In the first study, we concurrently played two voice-based streams in continuous form in both the ears, and in the second study, we concurrently communicated one stream continuously in one ear and three news headlines as interval-based short interruptions in another ear. We first reported the participants' experience qualitatively and then based on the feedback received from the users, we proposed a framework that may help in developing systems to communicate multiple voice-based information to the users. It is expected that the application of this new framework to information systems that provide multiple concurrent communication will provide a better user experience for users subject to their contextual and perceptual needs and limitations.","PeriodicalId":249061,"journal":{"name":"Proceedings of the 2019 3rd International Conference on Information System and Data Mining","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116343652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Authorship Identification using Recurrent Neural Networks","authors":"Shriya T. P. Gupta, J. Sahoo, R. Roul","doi":"10.1145/3325917.3325935","DOIUrl":"https://doi.org/10.1145/3325917.3325935","url":null,"abstract":"Authorship identification is the process of revealing the hidden identity of authors from a corpus of literary data based on a stylometric analysis of the text. It has essential applications in various fields, such as cyber-forensics, plagiarism detection, and political socialization. This paper aims to use a deep learning approach for the task of authorship identification by defining a suitable characterization of texts to capture the distinctive style of an author. The proposed model uses an index based word embedding for the C50 and the BBC datasets, applied to the input data of article level Long Short Term Memory (LSTM) network and Gated Recurrent Unit (GRU) network models. A comparative study of this new variant of embeddings is done with the standard approach of pre-trained word embeddings.","PeriodicalId":249061,"journal":{"name":"Proceedings of the 2019 3rd International Conference on Information System and Data Mining","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122763275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Building Information Modelling in the Framework of Knowledge Management: A Water Industry Case Study","authors":"S. Suresh, S. Renukappa, Andrew Kamunda","doi":"10.1145/3325917.3325958","DOIUrl":"https://doi.org/10.1145/3325917.3325958","url":null,"abstract":"The UK private water industry has seen a lot of growth in expenditure since privatisation. Ofwat, Defra and DWI have set targets for the water companies to be customer focused, reducing bills, be innovative as well as encourage competition. The emergence of Building Information Modelling (BIM) has offered opportunities to the water industry to achieve cost and programme efficiencies as the rest of the construction industry. This, together with emerging information technology has allowed organisations to take steps in collaborative working, making information available at the right time to the right people, which is fundamental to Knowledge Management (KM). There is limited research in the subject of BIM being used in the context of and tool for KM within the UK water industry. Hence the aim of the study is to explore and understand how the UK water industry is using BIM for KM. A qualitative case study was used for the collection and analysis of data with the results obtained through review of water company supply chain processes, documents, observations and semi structured interviews. The key finding from the study is the significant impact of organisational culture influence on the implementation of BIM & KM in which the water industry supply chain has been aligning its business goals, identifying needed knowledge, creating KM resources and sharing knowledge through BIM as one of KM resources or tools. In conclusion, research identifies that the water industry is heading in the right direction, with leadership and management at the forefront of instilling a positive KM culture, though it is still developing. Ongoing training and provision of resources for KM should continue to be invested in to yield cost, programme, quality and knowledge capture benefits. The close definitions for Information and Knowledge should be taken advantage of for development and implementing of KM strategies using BIM as one of its key tool or resource.","PeriodicalId":249061,"journal":{"name":"Proceedings of the 2019 3rd International Conference on Information System and Data Mining","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126103942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Algorithm of Testing ADC Effective, Number of Bits Based on Hilbert and Wavelet Transform","authors":"E. Awada","doi":"10.1145/3325917.3325921","DOIUrl":"https://doi.org/10.1145/3325917.3325921","url":null,"abstract":"In today advanced digital signal processing, many parameters must be tested to evaluate the accuracy performance of system output. Therefore, focusing down into an essential part of signal converts (Analog to Digital Converts) is a must prior to any system evaluations. As a result, this work will emphasize on the testing enhancement of Analog to Digital Converts parameters, such as Effected Number of Bits, to determine the accuracy of waveform regeneration and device performance with a newly implemented algorithm. That is, a new algorithm based on structuring Discrete Wavelet transform decomposition on prior interleave Hilbert transform, of Analog to Digital Converts output waveform, to measure Converts ability to reproduce a waveform in their full capacity. With such arrangement, the new algorithm intends to improve previous work for the testing process, higher testing accuracy, fewer computation data samples, and provide a platform of modulation process for other parameters measurement at the same time.","PeriodicalId":249061,"journal":{"name":"Proceedings of the 2019 3rd International Conference on Information System and Data Mining","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123238969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparative Analysis of Unstructured P2P File Sharing Networks","authors":"Mehr-un-Nisa, Fasiha Ashraf, Ateeqa Naseer, Shaukat Iqbal","doi":"10.1145/3325917.3325952","DOIUrl":"https://doi.org/10.1145/3325917.3325952","url":null,"abstract":"Numerous P2P networks are available covering different areas of P2P technologies. Since P2P network overlays are good for creating large scale content distribution and data sharing applications, an ample amount of effort has been made to improve the performance of these networks. Moreover, rapid development of P2P technologies has left older technologies far behind. The goal of this paper is to study and present a comprehensive overview of some of these networks. Furthermore, a comparison of Unstructured P2P file sharing wired networks with their distinct characteristics has been presented. In this paper, various features of P2P networks have been studied that results in understanding the behavior of these protocols under different circumstances. A critical analysis of the state of art P2P networks has been made taking care of various significant features for both wired. The analysis presents the effectiveness of different systems in different circumstances. This research aims to provide a comprehensive comparative analysis of P2P file sharing protocols of wired networks.","PeriodicalId":249061,"journal":{"name":"Proceedings of the 2019 3rd International Conference on Information System and Data Mining","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124953136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sulaiman Alhaidari, Ali I. Alharbi, Mansour Alshaikhsaleh, M. Zohdy, D. Debnath
{"title":"Network Traffic Anomaly Detection based on Viterbi Algorithm Using SNMP MIB Data","authors":"Sulaiman Alhaidari, Ali I. Alharbi, Mansour Alshaikhsaleh, M. Zohdy, D. Debnath","doi":"10.1145/3325917.3325928","DOIUrl":"https://doi.org/10.1145/3325917.3325928","url":null,"abstract":"With the growing number of attacks and malicious threats on the Internet services and network infrastructures, the need for techniques to identify and detect attacks is increasing. One of the most critical attack for cyber security and serious security threat to Internet services in recent years is Denial of Service (DoS). Therefore, using machine learning techniques along traditional security mechanisms such as firewall and cryptography, can improve the performance of intrusion detection systems (IDSs). This research paper introduces an approach using Hidden Markov Model (HMM) based on Viterbi algorithm for detecting anomalies on SNMP MIB dataset, and compares it to two classification algorithms: Adaboost M1 and Naive Bayes algorithm. The obtained results show HMM based on Viterbi algorithm found effective and achieved great results in detecting the attacks with a high detection rate.","PeriodicalId":249061,"journal":{"name":"Proceedings of the 2019 3rd International Conference on Information System and Data Mining","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121333373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vita Mayastinasari, Benyamin Lufpi, Novi Indah Earlyanti
{"title":"Knowledge Management System Approach of Police Performance Management in Regional Police of Yogyakarta Special Region, Indonesia","authors":"Vita Mayastinasari, Benyamin Lufpi, Novi Indah Earlyanti","doi":"10.1145/3325917.3325954","DOIUrl":"https://doi.org/10.1145/3325917.3325954","url":null,"abstract":"The purpose of this study was to identify the need of knowledge management and the method of implementing knowledge management in police performance. This research was conducted in the regional police of Yogyakarta Special Region. The approach of research used mixed method research. The method used a survey and description of the analysis. The result of this study showed that the perspective of Yogyakarta Special Region community on police performance had a positive trend, as indicated by level of public confidence in the performance of members of the Yogyakarta special region police at 93.19%, this could be indicated as a positive impact of the knowledge management system approach. The knowledge management system approach will transform secret knowledge into explicit knowledge and will also drive innovation. The implications in this study identified that police performance could be influenced by the knowledge management system approach.","PeriodicalId":249061,"journal":{"name":"Proceedings of the 2019 3rd International Conference on Information System and Data Mining","volume":"30 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117049459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Knowledge Transfer, Sharing, and Management System Based on Causality for Requirements Change Management","authors":"Yuqing Yan, Zhen-hua Zhang","doi":"10.1145/3325917.3325947","DOIUrl":"https://doi.org/10.1145/3325917.3325947","url":null,"abstract":"In software development, requirements changes cannot be avoided. Despite the importance of requirements change management, few studies in the literature concern requirements change knowledge management(RCKM). This study explored knowledge transfer and sharing of RCKM based on change cause analysis and the design of a knowledge management system(KMS) for change management. In this paper, previous research is discussed in three aspects: factors affecting knowledge transfer and sharing, methods to implement knowledge transfer and sharing, and the design of a KMS. After that, the results of a recent questionnaire are analyzed. Finally, this paper discusses the sources of tacit knowledge in the personnel management aspects of software development; the knowledge and the methods of knowledge transfer and sharing in the requirements change management process based on change cause analysis; the design of a data flowchart of repositories, and a prototype structure, logical model, and functional modules of RCKM systems. In conclusion, further study is suggested.","PeriodicalId":249061,"journal":{"name":"Proceedings of the 2019 3rd International Conference on Information System and Data Mining","volume":"300 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116113940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of competitive Power of Chinese Sports Apparel Brand based on Porter's five Force Model","authors":"Lu Ge, Chenggang Li","doi":"10.1145/3325917.3325951","DOIUrl":"https://doi.org/10.1145/3325917.3325951","url":null,"abstract":"Chinese sportswear industry is in the stage of brand establishment, and also faces the double competition of domestic and foreign sportswear brands. If local brands want to create popularity, they must form their own unique competitiveness. The article defines the Chinese sportswear brand, based on Porter's five-force model, from the ability of competitors in the industry, the threat of substitute products or services, the threat of potential competitors, Analysis on the bargaining ability of buyers and suppliers; the industry environment of domestic sportswear industry; and put forward that the development of local sportswear brands in China should implement the cost leading strategy in the basic strategy. In the growth strategy, the strengthening strategy includes three aspects: market penetration, market development and product development.","PeriodicalId":249061,"journal":{"name":"Proceedings of the 2019 3rd International Conference on Information System and Data Mining","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114594895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}