{"title":"A Conceptual Framework for Smart Workflow Management","authors":"A. Z. Abbasi, Z. Shaikh","doi":"10.1109/ICIME.2009.95","DOIUrl":"https://doi.org/10.1109/ICIME.2009.95","url":null,"abstract":"Workflow technology is an effective means of modeling and management of complex interacting business processes and is now being employed in other diversified domains. Although the workflow technology is already quite mature and commercial workflow management products are readily available, it has been observed that the technology lacks certain context related components and concepts when applied to domains like e-commerce, mobile and pervasive computing. The context-aware or smart workflows are those that operate as per context information gathered from environment or domain knowledge. In order to make workflow management context-aware, extensions and modifications are required in existing architectures and standards of workflow management systems. This paper describes a framework for designing and managing context-aware workflows that encompasses different aspects of context change. It indicates the changes and extensions required in the current technology for smooth integration of context in workflows to enable their smart execution. We present a simplified technique of workflow representation with the introduction of context-activity architecture as the basis of our framework.","PeriodicalId":445284,"journal":{"name":"2009 International Conference on Information Management and Engineering","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133008802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Mixed Method for Training ERP Systems Based on Knowledge Sharing in Malaysian Small and Medium Enterprise (SMEs)","authors":"Ali Noudoostbeni, N. Yasin, H. S. Jenatabadi","doi":"10.1109/ICIME.2009.64","DOIUrl":"https://doi.org/10.1109/ICIME.2009.64","url":null,"abstract":"Training has been identified as one of the most important success factors in the implementation of ERP in Malaysian Small and Medium Enterprises (SMEs). If we do not pay due attention to training as if we fail to implemented training with proper methods, we will end in a failure for ERP application. This article has studied the different training methods of ERP in the Malaysian SMEs, and has identified the most important factors in training which are: the lecturer, on the job training (OJT), and computer –based training. This research, through interviews with the ERP users, has come up with a method which saves the learning time and reduces the training costs; it also increases the users' proficiency on the ERP system.","PeriodicalId":445284,"journal":{"name":"2009 International Conference on Information Management and Engineering","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134494192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distilling the Potential Added-Value of New Information and Communication Technologies: Case of Mobile Technologies for the Sales Force","authors":"Chihab BenMoussa","doi":"10.1109/ICIME.2009.148","DOIUrl":"https://doi.org/10.1109/ICIME.2009.148","url":null,"abstract":"Identifying the potential added value of information and communication technologies before implementation and rollout is important to the new technology acceptance and usage. This becomes even critical when it comes to the sales force. Studies showed than more than 60% of Sales Force Automation (SFA) technologies fail. A common failure factor is the perceived lack of value of SFA by the sales force. Consequently firms face the challenge of identifying prior implementation how the new technology could provide a value-adding support to their sales force; especially when the technology in question is an emerging one such as mobile technology. The aim of this paper is to identify, how mobile information and communication technologies (M-ICT) have the potential to provide a value adding support to the sales force of a pharmaceutical company; before those technologies got actually implemented.","PeriodicalId":445284,"journal":{"name":"2009 International Conference on Information Management and Engineering","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124535464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Principle, Equipment and Experiment of Vector-Matrix Multiplication by Liquid Crystal Array","authors":"Mei Li, Huacan He, Yi Jin","doi":"10.1109/ICIME.2009.34","DOIUrl":"https://doi.org/10.1109/ICIME.2009.34","url":null,"abstract":"As a general purpose system in optical computing,optical vector-matrix multiplier (OVMM) can be applied in a variety of fields. After recalling Goodman’s classic principle of OVMM we proposed a new method taking advantage of liquid crystal array, which can solve the flaws of the former. Here we explain in details the principle of this new method and use our new developed ternary logic optical processor as the equipment to realize it. By experiments the correctness and feasibility of this method are verified. At last the advantages are discussed and the future study work is planned.","PeriodicalId":445284,"journal":{"name":"2009 International Conference on Information Management and Engineering","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117276458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Semantic Audiovisual Features in Video Scene Detection","authors":"L. N. Abdullah, S. Noah, T. Sembok","doi":"10.1109/ICIME.2009.157","DOIUrl":"https://doi.org/10.1109/ICIME.2009.157","url":null,"abstract":"A new semantic based video scene detection technology is proposed to improve the effectiveness of video retrieval. In this study, we proposed a framework for constructing semantic audiovisual features for detecting human action. Two major components, including multimodality features and matching process, are discussed and their corresponding algorithms are presented. A pilot evaluation was conducted to compare the effectiveness of multimodality that supports semantic audiovisualbased detection. Some experimental examples are given to demonstrate the effectiveness and efficiency of proposed algorithms.","PeriodicalId":445284,"journal":{"name":"2009 International Conference on Information Management and Engineering","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123731514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Characteristic of Rectangular Vertex Chain Code for Shapes with Hole","authors":"L. A. Wulandhari, H. Haron","doi":"10.1109/ICIME.2009.32","DOIUrl":"https://doi.org/10.1109/ICIME.2009.32","url":null,"abstract":"Vertex Chain Code is one of image representation that was introduced by Bribiesca in 1999. Each code in this chain code indicates the number of cell vertices, which are in touch with the bounding contour of the shape in that element position. It is possible to represent shape in triangular, rectangular and hexagonal cells in vertex chain code. A shape that is used in vertex chain code that is proposed by Bribiesca is a shape without hole. This paper will explained vertex chain code in rectangular cell for shape with hole. Some characteristic of rectangular vertex chain code for shape with hole is presented by using some example of shapes.","PeriodicalId":445284,"journal":{"name":"2009 International Conference on Information Management and Engineering","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132462129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Evaluation of Users' Anti-Phishing Knowledge Retention","authors":"Abdullah M. Alnajim, M. Munro","doi":"10.1109/ICIME.2009.114","DOIUrl":"https://doi.org/10.1109/ICIME.2009.114","url":null,"abstract":"Phishing scams have become a problem for online banking and e-commerce users. There are different proposed anti-Phishing approaches that make users aware of Phishing emails and websites. This paper evaluates the anti-Phishing knowledge retention for users. It compares the retention of the users' of a novel anti-Phishing approach previously proposed with the retention of the users of the approach of sending anti-Phishing tips by email. Two phases of user experiments were carried out to evaluate the research hypotheses on the retention of the anti-Phishing knowledge.","PeriodicalId":445284,"journal":{"name":"2009 International Conference on Information Management and Engineering","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132951492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Termination of a Class of the Program with Polynomial Guards","authors":"Bin Wu, L. Shen, Zhongqin Bi, Zhenbing Zeng","doi":"10.1109/ICIME.2009.102","DOIUrl":"https://doi.org/10.1109/ICIME.2009.102","url":null,"abstract":"Determining the termination of programs is a basic task in computing science. By analyzing the powers of a matrix symbolically using its eigenvalues, this paper presents a method to prove termination of a class of loop programs with nonlinear guards and linear assignments.The termination of a linear assignment loop is only decided by the eigen values, whose module is greater than one, of the matrix defining the loop assignments.","PeriodicalId":445284,"journal":{"name":"2009 International Conference on Information Management and Engineering","volume":"150 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132091120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nur Syufiza Ahmad Shukor, H. Nawi, S. Basaruddin, Nasrudin Md Rahim
{"title":"Investigation of Knowledge Management Processes Among Academicians at Faculty of Industrial Information Technology, UNISEL: A Case Study","authors":"Nur Syufiza Ahmad Shukor, H. Nawi, S. Basaruddin, Nasrudin Md Rahim","doi":"10.1109/ICIME.2009.149","DOIUrl":"https://doi.org/10.1109/ICIME.2009.149","url":null,"abstract":"This paper focused on the Knowledge Management (KM) processes at the Faculty of Industrial Information Technology (FIIT), Universiti Industri Selangor (UNISEL).The processes of KM studied here are Knowledge Capturing,Organizing, Refining and Transferring. KM has become an important to the organization, as it combines both the tacit and explicit knowledge from the expertise in that particular organization. Among academicians, knowledge sharing is crucial, and the KM processes should be practiced to ensure the knowledge sharing take place. The study was conducted at FIIT and academicians at FIIT are used as population. There are two groups of academicians responded to the questionnaires: academicians who served in the year 2006; and academicians who served in 2008. Statistical analysis was conducted to the data gathered and collected from the questionnaires. Using the t-Test, the study had concluded that the processes of KM do exist at FIIT; and the study can significantly prove that all academicians do practice the processes of KM.","PeriodicalId":445284,"journal":{"name":"2009 International Conference on Information Management and Engineering","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128792370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Abdolshah, R. Yusuff, Md. Yusof B. Ismail, T. S. Hong
{"title":"Overcoming the Challenges of Implementating Six Sigma in Service Industries","authors":"M. Abdolshah, R. Yusuff, Md. Yusof B. Ismail, T. S. Hong","doi":"10.1109/ICIME.2009.120","DOIUrl":"https://doi.org/10.1109/ICIME.2009.120","url":null,"abstract":"Six Sigma has been a powerful and successful tool in manufacturing industries to reduce rate of rejects and to enhance productivity. The service industries are diversified and the features are different from manufacturing industries. Thus, the use of Six Sigma in service industries and its benefits are limited to some specific types of services like health care and banks. This paper focuses on key performance indicators of Six Sigma and elements to cover a wider range of services. From the analysis of the service models, service industries structures and also by comparing between the features of service and manufacturing industries, the main challenges in application of Six Sigma in service industries can be identified. Further analysis of these challenges showed that the proper implementation of Six Sigma in service industries requires not only the effective operational strategies, but also customers’ needs and satisfaction must be considered and designed into the implementation phase. The paper proposed that for the successful implementation of Six Sigma in service industry, instead of just DMAIC, a design phase should be included (DDMAIC). The main meaning of this new phase and its affection will be described.","PeriodicalId":445284,"journal":{"name":"2009 International Conference on Information Management and Engineering","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126643357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}