Pub Date : 2019-09-17DOI: 10.5220/0008383604050411
I. Kurnosova, Dmitrii Timofeev, A. Samochadin
The paper studies the roles users play when contributing to open-source projects using modern code hosting and issue tracking platforms like GITHUB. Role identification has been performed using cluster analysis of the feature vectors generated from the events corresponding to user activity. The method was applied to three open-source projects of different sizes. The roles of maintainers and developers (core team), casual contributors, and watchers were identified, as well as the differences in work organization in these projects.
{"title":"Identification of User Activity Types using Issue Tracker Events","authors":"I. Kurnosova, Dmitrii Timofeev, A. Samochadin","doi":"10.5220/0008383604050411","DOIUrl":"https://doi.org/10.5220/0008383604050411","url":null,"abstract":"The paper studies the roles users play when contributing to open-source projects using modern code hosting and issue tracking platforms like GITHUB. Role identification has been performed using cluster analysis of the feature vectors generated from the events corresponding to user activity. The method was applied to three open-source projects of different sizes. The roles of maintainers and developers (core team), casual contributors, and watchers were identified, as well as the differences in work organization in these projects.","PeriodicalId":133533,"journal":{"name":"International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117153493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-17DOI: 10.5220/0008350803070316
Thorsten Haendler, G. Neumann
Long-living software systems are becoming increasingly complex and difficult to maintain. Software refactoring is considered important to achieve maintainability and extensibility of a software system over time. In practice, it is still often neglected, partly because of costs, the perceived risks of collateral damage and difficulties of individuals working on certain components of complex software. It is therefore important for software projects that software developers have the appropriate skills and competences to efficiently perform software refactoring. However, so far there is no systematization of competences in software refactoring to guide in the assessment or training of competences, e.g., for planning or evaluating training activities and paths. In this paper, we address this need by presenting a competence framework for software refactoring by applying Bloom’s revised taxonomy for educational objectives. In particular, we specify competence levels by combining knowledge and cognitive-process dimensions. Via a case study with two existing training environments (i.e. a tutoring system and a serious game), we demonstrate by example that the framework can support (1) in analyzing the competence levels addressed by the training environments and (2) in reflecting training paths for software refactoring. Finally, we discuss the limitations and the further potential of the framework.
{"title":"A Framework for the Assessment and Training of Software Refactoring Competences","authors":"Thorsten Haendler, G. Neumann","doi":"10.5220/0008350803070316","DOIUrl":"https://doi.org/10.5220/0008350803070316","url":null,"abstract":"Long-living software systems are becoming increasingly complex and difficult to maintain. Software refactoring is considered important to achieve maintainability and extensibility of a software system over time. In practice, it is still often neglected, partly because of costs, the perceived risks of collateral damage and difficulties of individuals working on certain components of complex software. It is therefore important for software projects that software developers have the appropriate skills and competences to efficiently perform software refactoring. However, so far there is no systematization of competences in software refactoring to guide in the assessment or training of competences, e.g., for planning or evaluating training activities and paths. In this paper, we address this need by presenting a competence framework for software refactoring by applying Bloom’s revised taxonomy for educational objectives. In particular, we specify competence levels by combining knowledge and cognitive-process dimensions. Via a case study with two existing training environments (i.e. a tutoring system and a serious game), we demonstrate by example that the framework can support (1) in analyzing the competence levels addressed by the training environments and (2) in reflecting training paths for software refactoring. Finally, we discuss the limitations and the further potential of the framework.","PeriodicalId":133533,"journal":{"name":"International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117269366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-17DOI: 10.5220/0008494604350441
Mahmoud Elbattah, C. Ryan
The current trend towards the Semantic Web and Linked Data has resulted in an unprecedented volume of data being continuously published on the Linked Open Data (LOD) cloud. Massive Knowledge Graphs (KGs) are increasingly constructed and enriched based on large amounts of unstructured data. However, the data quality of KGs can still suffer from a variety of inconsistencies, misinterpretations or incomplete information as well. This study investigates the feasibility of utilising the subject-predicate-object (SPO) structure of KG triples to detect possible inconsistencies. The key idea is hinged on using the Freebase-defined entity types for extracting the unique SPO patterns in the KG. Using Machine learning, the problem of predicting inconsistencies could be approached as a sequence classification task. The approach applicability was experimented using a subset of the Freebase KG, which included about 6M triples. The experiments proved promising results using Convnet and LSTM models for detecting inconsistent sequences.
{"title":"Learning Triple Sequence Patterns in Knowledge Graphs to Predict Inconsistencies","authors":"Mahmoud Elbattah, C. Ryan","doi":"10.5220/0008494604350441","DOIUrl":"https://doi.org/10.5220/0008494604350441","url":null,"abstract":"The current trend towards the Semantic Web and Linked Data has resulted in an unprecedented volume of data being continuously published on the Linked Open Data (LOD) cloud. Massive Knowledge Graphs (KGs) are increasingly constructed and enriched based on large amounts of unstructured data. However, the data quality of KGs can still suffer from a variety of inconsistencies, misinterpretations or incomplete information as well. This study investigates the feasibility of utilising the subject-predicate-object (SPO) structure of KG triples to detect possible inconsistencies. The key idea is hinged on using the Freebase-defined entity types for extracting the unique SPO patterns in the KG. Using Machine learning, the problem of predicting inconsistencies could be approached as a sequence classification task. The approach applicability was experimented using a subset of the Freebase KG, which included about 6M triples. The experiments proved promising results using Convnet and LSTM models for detecting inconsistent sequences.","PeriodicalId":133533,"journal":{"name":"International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128199081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-17DOI: 10.1007/978-3-030-66196-0_7
S. Carta, G. Fenu, Anselmo Ferreira, D. R. Recupero, Roberto Saia
{"title":"A Two-Step Feature Space Transforming Method to Improve Credit Scoring Performance","authors":"S. Carta, G. Fenu, Anselmo Ferreira, D. R. Recupero, Roberto Saia","doi":"10.1007/978-3-030-66196-0_7","DOIUrl":"https://doi.org/10.1007/978-3-030-66196-0_7","url":null,"abstract":"","PeriodicalId":133533,"journal":{"name":"International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129195348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-17DOI: 10.5220/0008343902310235
T. Arndt
Blockchain technology is one of the most widely acclaimed technologies of recent years. It enables the creation of distributed applications involving multiple actors or organizations in which transactions and data are not under the control of a central authority. Transactions are stored in a distributed public ledger in an immutable format in such a way that they can be verified by participants. This disintermediation promises to remove much of the “friction” (and lower costs) from distributed transactions by cutting out the intermediary party, thus enabling a variety of applications in finance, government, health, etc. This paper provides an overview of recent research in the application of blockchain technology to higher education for those who are interested in working in this area or just understanding how higher education may be positively impacted in the future by blockchain.
{"title":"An Overview of Blockchain for Higher Education","authors":"T. Arndt","doi":"10.5220/0008343902310235","DOIUrl":"https://doi.org/10.5220/0008343902310235","url":null,"abstract":"Blockchain technology is one of the most widely acclaimed technologies of recent years. It enables the creation of distributed applications involving multiple actors or organizations in which transactions and data are not under the control of a central authority. Transactions are stored in a distributed public ledger in an immutable format in such a way that they can be verified by participants. This disintermediation promises to remove much of the “friction” (and lower costs) from distributed transactions by cutting out the intermediary party, thus enabling a variety of applications in finance, government, health, etc. This paper provides an overview of recent research in the application of blockchain technology to higher education for those who are interested in working in this area or just understanding how higher education may be positively impacted in the future by blockchain.","PeriodicalId":133533,"journal":{"name":"International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130376377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-17DOI: 10.5220/0008355603490355
Ritesh Chugh
The importance of transferring tacit knowledge transfer is acknowledged in the literature, but the usage of information technology for tacit knowledge transfer is not well researched. Through a mixed methods approach, employing an online questionnaire and interviews, this study explored the perceptions of university academic staff with regards to information technology usage, specifically relating to the transfer of tacit knowledge. The study found a lack of specific tacit knowledge transfer technologies but relatively high use of communication tools, a need for training on the use of new information technology was identified and academic staff are generally quick to adapt to information technology. However, there appeared to be a lack of confidence in information technology for the transfer of tacit knowledge and staff willingness to use technology for sharing tacit knowledge was not high, exhibiting uncertainty. This study contributes to a better understanding of the usage of information technology for tacit knowledge transfer and its adaptability by university academics. The results of this study may stimulate future research by addressing sample size limitation and replication in a different organisational setting.
{"title":"Tacit Knowledge Transfer: Information Technology Usage in Universities","authors":"Ritesh Chugh","doi":"10.5220/0008355603490355","DOIUrl":"https://doi.org/10.5220/0008355603490355","url":null,"abstract":"The importance of transferring tacit knowledge transfer is acknowledged in the literature, but the usage of information technology for tacit knowledge transfer is not well researched. Through a mixed methods approach, employing an online questionnaire and interviews, this study explored the perceptions of university academic staff with regards to information technology usage, specifically relating to the transfer of tacit knowledge. The study found a lack of specific tacit knowledge transfer technologies but relatively high use of communication tools, a need for training on the use of new information technology was identified and academic staff are generally quick to adapt to information technology. However, there appeared to be a lack of confidence in information technology for the transfer of tacit knowledge and staff willingness to use technology for sharing tacit knowledge was not high, exhibiting uncertainty. This study contributes to a better understanding of the usage of information technology for tacit knowledge transfer and its adaptability by university academics. The results of this study may stimulate future research by addressing sample size limitation and replication in a different organisational setting.","PeriodicalId":133533,"journal":{"name":"International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123722925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-17DOI: 10.5220/0008494104190426
Ilkka Tikanmäki, Harri Ruoslahti
There are several different definitions of situation awareness. However, all of them have in common is knowing and understanding of what is happening, an understanding of future changes or problems, and the prediction of the future situation and the decisions to be made on its basis. Situation picture and Situation Awareness are narrow. Situation understanding of the situation is the understanding of the decision-makers and their assistants about what has happened, the circumstances that have affected them, the goals of the different parties and the possible development options of the events needed to make decisions on a particular issue or subject. The results of this study indicate that the recent discussion in scholarly literature focus on situation awareness. A further result is that the context of the many of the recent literature are focused on issues related to cyber security or on intelligent systems, thus on IT systems, which are very relevant to modern situation awareness and understanding in these modern times where more and more systems become digitalized and interconnected..
{"title":"How Are Situation Picture, Situation Awareness, and Situation Understanding Discussed in Recent Scholarly Literature?","authors":"Ilkka Tikanmäki, Harri Ruoslahti","doi":"10.5220/0008494104190426","DOIUrl":"https://doi.org/10.5220/0008494104190426","url":null,"abstract":"There are several different definitions of situation awareness. However, all of them have in common is knowing and understanding of what is happening, an understanding of future changes or problems, and the prediction of the future situation and the decisions to be made on its basis. Situation picture and Situation Awareness are narrow. Situation understanding of the situation is the understanding of the decision-makers and their assistants about what has happened, the circumstances that have affected them, the goals of the different parties and the possible development options of the events needed to make decisions on a particular issue or subject. The results of this study indicate that the recent discussion in scholarly literature focus on situation awareness. A further result is that the context of the many of the recent literature are focused on issues related to cyber security or on intelligent systems, thus on IT systems, which are very relevant to modern situation awareness and understanding in these modern times where more and more systems become digitalized and interconnected..","PeriodicalId":133533,"journal":{"name":"International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114065323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-17DOI: 10.5220/0008344502360242
Laura Krimberg, A. H. S. Sonego, L. Machado, K. K. A. D. Silva, P. Behar
This article aims to present the profile of M-Learning students, called Mobile Subject. For this, a mapping of their characteristics related to mobile learning was carried out. The study establishes a relationship between students engaged in educational activities through their mobile devices. For this purpose, questionnaires were applied to students from two undergraduate and two extension courses, characterizing research as a case study, with a qualitative-quantitative approach. The analysis consisted in the evaluation of the data, outlining the profile of the Mobile Subject by identifying four main characteristics: Speed, Connectivity, Immersion in Social Media and Multitasking and their respective elements. It is hoped that this research may contribute to new discussions about the profile of the Mobile Subject student, proposing parameters and new strategies focused on mobile learning.
{"title":"Mobile Subject: M-Learning Student Profile","authors":"Laura Krimberg, A. H. S. Sonego, L. Machado, K. K. A. D. Silva, P. Behar","doi":"10.5220/0008344502360242","DOIUrl":"https://doi.org/10.5220/0008344502360242","url":null,"abstract":"This article aims to present the profile of M-Learning students, called Mobile Subject. For this, a mapping of their characteristics related to mobile learning was carried out. The study establishes a relationship between students engaged in educational activities through their mobile devices. For this purpose, questionnaires were applied to students from two undergraduate and two extension courses, characterizing research as a case study, with a qualitative-quantitative approach. The analysis consisted in the evaluation of the data, outlining the profile of the Mobile Subject by identifying four main characteristics: Speed, Connectivity, Immersion in Social Media and Multitasking and their respective elements. It is hoped that this research may contribute to new discussions about the profile of the Mobile Subject student, proposing parameters and new strategies focused on mobile learning.","PeriodicalId":133533,"journal":{"name":"International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125772959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-17DOI: 10.5220/0008352703170324
M. Conlon, O. Molloy
Introduction: This empirical work examines the information requirements when undertaking a process modelling project in a Healthcare setting such as a CT (Computed Tomography) department. Using qualitative and quantitative methods we map the process, incorporating patient, staff and process related components so as to quantify resource utilisation and the service experienced by the patient. Method: In this study, semi structured interviews are used to identify patient complexity factors/characteristics. Process mapping and involvement of stakeholders are discussed as is the identification and analysis of data. A discrete event simulation (DES) model of the process is designed and performance metrics identified. Results: Yearly demand for Radiology services are increasing significantly. Factors determining patient complexity and variation include patient type, infectiousness, mobility, exam type and patient care needs. A strong correlation between age and infectiousness was observed. Conclusion: DES modelling, though data intensive, provides decision makers with insights into resource utilisation, process capacity, delays and disruptions and in doing so supports operations, management and the adoption of good practices in Healthcare.
{"title":"Knowledge Management in Healthcare: Information Requirements When Creating a Decision Support Tool in Radiology","authors":"M. Conlon, O. Molloy","doi":"10.5220/0008352703170324","DOIUrl":"https://doi.org/10.5220/0008352703170324","url":null,"abstract":"Introduction: This empirical work examines the information requirements when undertaking a process modelling project in a Healthcare setting such as a CT (Computed Tomography) department. Using qualitative and quantitative methods we map the process, incorporating patient, staff and process related components so as to quantify resource utilisation and the service experienced by the patient. Method: In this study, semi structured interviews are used to identify patient complexity factors/characteristics. Process mapping and involvement of stakeholders are discussed as is the identification and analysis of data. A discrete event simulation (DES) model of the process is designed and performance metrics identified. Results: Yearly demand for Radiology services are increasing significantly. Factors determining patient complexity and variation include patient type, infectiousness, mobility, exam type and patient care needs. A strong correlation between age and infectiousness was observed. Conclusion: DES modelling, though data intensive, provides decision makers with insights into resource utilisation, process capacity, delays and disruptions and in doing so supports operations, management and the adoption of good practices in Healthcare.","PeriodicalId":133533,"journal":{"name":"International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121335173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-17DOI: 10.5220/0008348102640270
Malika Grim-Yefsah, B. Bucher
Knowledge Management is a way to answer the problem of capitalizing on the companies’ knowledge. Knowing that hosting sports events (SE) requires organizers to learn from past events to not repeat mistakes, we examine knowledge management in a sport events legacy (SEL). Thus, in this paper, we propose in first, two conceptual models based on UML; one for the SE, another for SEL. Secondly, we propose a system to manage SEL to assist in the process of data acquisition and capitalization on SE knowledge. This system helps to create an open collaborative platform for consultation, visualization of the spinoffs of sport events. It is intended to be used by public policies, territories, journalists, citizens, historians and all others. We propose also to take into account the spatiotemporal aspects of SE.
{"title":"Towards Improving Knowledge Capitalization System for Sport Events Legacy","authors":"Malika Grim-Yefsah, B. Bucher","doi":"10.5220/0008348102640270","DOIUrl":"https://doi.org/10.5220/0008348102640270","url":null,"abstract":"Knowledge Management is a way to answer the problem of capitalizing on the companies’ knowledge. Knowing that hosting sports events (SE) requires organizers to learn from past events to not repeat mistakes, we examine knowledge management in a sport events legacy (SEL). Thus, in this paper, we propose in first, two conceptual models based on UML; one for the SE, another for SEL. Secondly, we propose a system to manage SEL to assist in the process of data acquisition and capitalization on SE knowledge. This system helps to create an open collaborative platform for consultation, visualization of the spinoffs of sport events. It is intended to be used by public policies, territories, journalists, citizens, historians and all others. We propose also to take into account the spatiotemporal aspects of SE.","PeriodicalId":133533,"journal":{"name":"International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127724911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}