Pub Date : 2019-10-07DOI: 10.1109/INFOMAN.2019.8714705
Nikolina Žajdela Hrustek, R. Mekovec, Valentina Kirinić
The Curriculum for the Enhancement of Digital Competences of School Employees: Teachers and Associates, Principals and Administrative Staff developed as the result of Croatian e-Schools project is presented. An open curriculum approach has been chosen that characterizes the flexibility of design and is based on recommendations that allow creativity and the introduction of change in the course of implementation. The digital competence curriculum is intended for the training of beneficiaries who are considered adults, therefore specifics related to adult education are implemented. As the digitalization of society, work and education is moving fast, there is a need to set a guidance to improve digital competence. Schools should be leaders on the use of digital technologies for learning, acquiring skills and competences and to emphasize the importance of digital technologies for future education and employment. We believe that this Curriculum can help address some of the key challenges that schools are currently facing.
{"title":"Digital Commpetence Curriculum for Schools' Employees: Croatian e-Schools Project Example","authors":"Nikolina Žajdela Hrustek, R. Mekovec, Valentina Kirinić","doi":"10.1109/INFOMAN.2019.8714705","DOIUrl":"https://doi.org/10.1109/INFOMAN.2019.8714705","url":null,"abstract":"The Curriculum for the Enhancement of Digital Competences of School Employees: Teachers and Associates, Principals and Administrative Staff developed as the result of Croatian e-Schools project is presented. An open curriculum approach has been chosen that characterizes the flexibility of design and is based on recommendations that allow creativity and the introduction of change in the course of implementation. The digital competence curriculum is intended for the training of beneficiaries who are considered adults, therefore specifics related to adult education are implemented. As the digitalization of society, work and education is moving fast, there is a need to set a guidance to improve digital competence. Schools should be leaders on the use of digital technologies for learning, acquiring skills and competences and to emphasize the importance of digital technologies for future education and employment. We believe that this Curriculum can help address some of the key challenges that schools are currently facing.","PeriodicalId":186072,"journal":{"name":"2019 5th International Conference on Information Management (ICIM)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132623220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-05-14DOI: 10.1109/INFOMAN.2019.8714695
S. Smirnov, Tamara Iakovleva, Julia Krylova, A. Kolyshkin, V. Zyabrikov, A. Lupu
Despite the active expansion of simulation modeling as an approach to research in social science, the practical application of this approach in entrepreneurship is still not widespread. Meanwhile, the system dynamics approach fits some areas of entrepreneurship development research. In the paper, we examine the possibilities and provide justification for designing a simulation model which is based on the systemic dynamics approach. The basis of the model's logic is entrepreneur's phase cycle, admitted at the GEM survey and supplemented with data of statistical agencies. In particular, the paper discusses the prospects of entrepreneurial statistics further development with the aim to enhance and expand the understanding of the whole entrepreneurial process. The conceptual model proposed by the authors can be used in quantitative studies of the entrepreneurs' life cycle, in dynamic displaying of entrepreneur's data at phases of their life cycle, and also for the government agencies policy improvement in the field of entrepreneurship.
{"title":"Designing of the Entrepreneurial Phase Cycle Simulation Model: Justification and Prospects","authors":"S. Smirnov, Tamara Iakovleva, Julia Krylova, A. Kolyshkin, V. Zyabrikov, A. Lupu","doi":"10.1109/INFOMAN.2019.8714695","DOIUrl":"https://doi.org/10.1109/INFOMAN.2019.8714695","url":null,"abstract":"Despite the active expansion of simulation modeling as an approach to research in social science, the practical application of this approach in entrepreneurship is still not widespread. Meanwhile, the system dynamics approach fits some areas of entrepreneurship development research. In the paper, we examine the possibilities and provide justification for designing a simulation model which is based on the systemic dynamics approach. The basis of the model's logic is entrepreneur's phase cycle, admitted at the GEM survey and supplemented with data of statistical agencies. In particular, the paper discusses the prospects of entrepreneurial statistics further development with the aim to enhance and expand the understanding of the whole entrepreneurial process. The conceptual model proposed by the authors can be used in quantitative studies of the entrepreneurs' life cycle, in dynamic displaying of entrepreneur's data at phases of their life cycle, and also for the government agencies policy improvement in the field of entrepreneurship.","PeriodicalId":186072,"journal":{"name":"2019 5th International Conference on Information Management (ICIM)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121443557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-24DOI: 10.1109/INFOMAN.2019.8714701
A. Boddy, William Hurst, M. Mackay, A. El Rhalibi
This research concerns the detection of unauthorised access within hospital networks through the real-time analysis of audit logs. Privacy is a primary concern amongst patients due to the rising adoption of Electronic Patient Record (EPR) systems. There is growing evidence to suggest that patients may withhold information from healthcare providers due to lack of Trust in the security of EPRs. Yet, patient record data must be available to healthcare providers at the point of care. Ensuring privacy and confidentiality of that data is challenging. Roles within healthcare organisations are dynamic and relying on access control is not sufficient. Through proactive monitoring of audit logs, unauthorised accesses can be detected and presented to an analyst for review. Advanced data analytics and visualisation techniques can be used to aid the analysis of big data within EPR audit logs to identify and highlight pertinent data points. Employing a human-in-the-loop model ensures that suspicious activity is appropriately investigated and the data analytics is continuously improving. This paper presents a system that employs a Human-in-the-Loop Machine Learning (HILML) algorithm, in addition to a density-based local outlier detection model. The system is able to detect 145 anomalous behaviours in an unlabelled dataset of 1,007,727 audit logs. This equates to 0.014% of the EPR accesses being labelled as anomalous in a specialist Liverpool (UK) hospital.
{"title":"A Hybrid Density-Based Outlier Detection Model for Privacy in Electronic Patient Record system","authors":"A. Boddy, William Hurst, M. Mackay, A. El Rhalibi","doi":"10.1109/INFOMAN.2019.8714701","DOIUrl":"https://doi.org/10.1109/INFOMAN.2019.8714701","url":null,"abstract":"This research concerns the detection of unauthorised access within hospital networks through the real-time analysis of audit logs. Privacy is a primary concern amongst patients due to the rising adoption of Electronic Patient Record (EPR) systems. There is growing evidence to suggest that patients may withhold information from healthcare providers due to lack of Trust in the security of EPRs. Yet, patient record data must be available to healthcare providers at the point of care. Ensuring privacy and confidentiality of that data is challenging. Roles within healthcare organisations are dynamic and relying on access control is not sufficient. Through proactive monitoring of audit logs, unauthorised accesses can be detected and presented to an analyst for review. Advanced data analytics and visualisation techniques can be used to aid the analysis of big data within EPR audit logs to identify and highlight pertinent data points. Employing a human-in-the-loop model ensures that suspicious activity is appropriately investigated and the data analytics is continuously improving. This paper presents a system that employs a Human-in-the-Loop Machine Learning (HILML) algorithm, in addition to a density-based local outlier detection model. The system is able to detect 145 anomalous behaviours in an unlabelled dataset of 1,007,727 audit logs. This equates to 0.014% of the EPR accesses being labelled as anomalous in a specialist Liverpool (UK) hospital.","PeriodicalId":186072,"journal":{"name":"2019 5th International Conference on Information Management (ICIM)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126164765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-24DOI: 10.1109/INFOMAN.2019.8714671
G. Gao, Jia-Heng Zhang, Weidong Zuo, Leida Li, Jianliang Yu
In recent years, instant messaging tools have become one of the main channels for people to communicate, and WeChat is one of the most important members. Since WeChat was launched, monthly active users have exceeded 1 billion. In January 2015, WeChat friends circle advertisement was officially launched and used in the form of information flow advertisement, which users praised or criticized differently. Therefore, it is a problem that WeChat research and development team and advertisers must face to improve users' willingness to accept advertisements in the circle of friends. We used “WeChat” and “circle of friends” as key words to search in CNKI, and the number of articles retrieved was 205. After carrying out quantitative analysis and content analysis of relevant documents (2013 – 2018), it is found that most of the studies were carried out from the perspective of the communication mechanism, marketing strategy and comparative analysis of advantages and disadvantages of WeChat circle of friends. In addition, some studies are based on advertisement avoidance, user participation and willingness to accept. At the same time, we also take WeChat as the research background, integrate the development and changes of TAM (technology acceptance model), and summarize the basic situation of users' willingness to accept WeChat friends' circle advertisement in our country so as to provide more direction and space for the optimization research of WeChat friends' circle advertisement.
{"title":"Literature Review of WeChat Friends Circle Advertisement","authors":"G. Gao, Jia-Heng Zhang, Weidong Zuo, Leida Li, Jianliang Yu","doi":"10.1109/INFOMAN.2019.8714671","DOIUrl":"https://doi.org/10.1109/INFOMAN.2019.8714671","url":null,"abstract":"In recent years, instant messaging tools have become one of the main channels for people to communicate, and WeChat is one of the most important members. Since WeChat was launched, monthly active users have exceeded 1 billion. In January 2015, WeChat friends circle advertisement was officially launched and used in the form of information flow advertisement, which users praised or criticized differently. Therefore, it is a problem that WeChat research and development team and advertisers must face to improve users' willingness to accept advertisements in the circle of friends. We used “WeChat” and “circle of friends” as key words to search in CNKI, and the number of articles retrieved was 205. After carrying out quantitative analysis and content analysis of relevant documents (2013 – 2018), it is found that most of the studies were carried out from the perspective of the communication mechanism, marketing strategy and comparative analysis of advantages and disadvantages of WeChat circle of friends. In addition, some studies are based on advertisement avoidance, user participation and willingness to accept. At the same time, we also take WeChat as the research background, integrate the development and changes of TAM (technology acceptance model), and summarize the basic situation of users' willingness to accept WeChat friends' circle advertisement in our country so as to provide more direction and space for the optimization research of WeChat friends' circle advertisement.","PeriodicalId":186072,"journal":{"name":"2019 5th International Conference on Information Management (ICIM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114304349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-24DOI: 10.1109/INFOMAN.2019.8714702
W. Hurst, Nathan Shone, David Tully
There is a lack of access to training tools., best practice guides and knowledge repositories to help with the digital switch to Industry 4.0. Consequently., in this paper., the ProAccel (Productivity Accelerator) platform design is outlined. The system is a modular cloud-based multimedia platform that employs advanced data analytics and gamification techniques., such as Virtual Reality (VR)., to revolutionise the way productivity information is shared to support businesses in their uptake of digital technologies in the Industry 4.0 environment. We present our findings from a 4 month case study., involving over 100 UK-based companies. The resulting research was used to construct a prototype of the ProAccel platform. As an evaluation., a simulated user evaluation of the platform using a guestimate model derived from a KLM analysis is conducted as an analysis of the platform”s functionality.
{"title":"Investigations into the Development of a Knowledge Transfer Platform for Business Productivity","authors":"W. Hurst, Nathan Shone, David Tully","doi":"10.1109/INFOMAN.2019.8714702","DOIUrl":"https://doi.org/10.1109/INFOMAN.2019.8714702","url":null,"abstract":"There is a lack of access to training tools., best practice guides and knowledge repositories to help with the digital switch to Industry 4.0. Consequently., in this paper., the ProAccel (Productivity Accelerator) platform design is outlined. The system is a modular cloud-based multimedia platform that employs advanced data analytics and gamification techniques., such as Virtual Reality (VR)., to revolutionise the way productivity information is shared to support businesses in their uptake of digital technologies in the Industry 4.0 environment. We present our findings from a 4 month case study., involving over 100 UK-based companies. The resulting research was used to construct a prototype of the ProAccel platform. As an evaluation., a simulated user evaluation of the platform using a guestimate model derived from a KLM analysis is conducted as an analysis of the platform”s functionality.","PeriodicalId":186072,"journal":{"name":"2019 5th International Conference on Information Management (ICIM)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134098406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-24DOI: 10.1109/INFOMAN.2019.8714683
Wanqi Li
Existing studies point out that the increased use of Information and Communication Technologies (ICT) has introduced new platforms, across which cyberbullying can occur. Most of the studies focus on the causes and consequences of cyberbullying among adolescents, however, few focus on the detection and prevention of cyberbullying, and even fewer focus on detecting cyberbullying in the Chinese language. Against this backdrop, an ethical approach to information filtering and regulation should be implemented and research into language features and language management is required. This research uses Sina Weibo as a case study, focusing on the features of language that occur in cyberbullying and the machine technique system that should be included as principles for managing and regulating cyberbullying contents on social media. Based on the Language Management Theory (LMT), inductive content analysis has been used to analyse offensive language features from the selected samples. The findings of this project will help refine theories, particularly those on offensive information and behaviour, and benefit academic understanding of cyberbullying and media, including the detection, regulation and governance.
{"title":"A Design Approach for Automated Prevention of Cyberbullying Using Language Features on Social Media","authors":"Wanqi Li","doi":"10.1109/INFOMAN.2019.8714683","DOIUrl":"https://doi.org/10.1109/INFOMAN.2019.8714683","url":null,"abstract":"Existing studies point out that the increased use of Information and Communication Technologies (ICT) has introduced new platforms, across which cyberbullying can occur. Most of the studies focus on the causes and consequences of cyberbullying among adolescents, however, few focus on the detection and prevention of cyberbullying, and even fewer focus on detecting cyberbullying in the Chinese language. Against this backdrop, an ethical approach to information filtering and regulation should be implemented and research into language features and language management is required. This research uses Sina Weibo as a case study, focusing on the features of language that occur in cyberbullying and the machine technique system that should be included as principles for managing and regulating cyberbullying contents on social media. Based on the Language Management Theory (LMT), inductive content analysis has been used to analyse offensive language features from the selected samples. The findings of this project will help refine theories, particularly those on offensive information and behaviour, and benefit academic understanding of cyberbullying and media, including the detection, regulation and governance.","PeriodicalId":186072,"journal":{"name":"2019 5th International Conference on Information Management (ICIM)","volume":"73 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126018129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-24DOI: 10.1109/INFOMAN.2019.8714669
Wangsheng Fang, Haomin Xu, Geng Yang
In the DV -HOP algorithm of the wireless sensor network, an inaccurate estimation of the minimum hop count and the average hop distance produces a positioning error. Therefore, this paper proposes an improved DV-HOP algorithm. The algorithm reevaluates the average hop distance of the anchor node and corrects the minimum hop count of the node to be located and the anchor node, which reduces the above error. First, the average hop distance of the anchor node closest to the positioned node is reassessed according to the error. Then, the minimum hop count is obtained by the average hop distance of the revaluation, and the correction coefficient of the ratio of the minimum hop count to the actual minimum hop count is obtained, and the minimum hop count of the node to be positioned is corrected by the correction coefficient. Finally, the distance between the node to be located and the anchor node is calculated, and the position of the node to be positioned is calculated by the least squares method. Simulation results show that the improved dv-hop algorithm can reduce the node positioning error and improve the positioning accuracy.
{"title":"Improved DV-Hop Algorithm Based on Minimum Hops Correction and Reevaluate Hop Distance","authors":"Wangsheng Fang, Haomin Xu, Geng Yang","doi":"10.1109/INFOMAN.2019.8714669","DOIUrl":"https://doi.org/10.1109/INFOMAN.2019.8714669","url":null,"abstract":"In the DV -HOP algorithm of the wireless sensor network, an inaccurate estimation of the minimum hop count and the average hop distance produces a positioning error. Therefore, this paper proposes an improved DV-HOP algorithm. The algorithm reevaluates the average hop distance of the anchor node and corrects the minimum hop count of the node to be located and the anchor node, which reduces the above error. First, the average hop distance of the anchor node closest to the positioned node is reassessed according to the error. Then, the minimum hop count is obtained by the average hop distance of the revaluation, and the correction coefficient of the ratio of the minimum hop count to the actual minimum hop count is obtained, and the minimum hop count of the node to be positioned is corrected by the correction coefficient. Finally, the distance between the node to be located and the anchor node is calculated, and the position of the node to be positioned is calculated by the least squares method. Simulation results show that the improved dv-hop algorithm can reduce the node positioning error and improve the positioning accuracy.","PeriodicalId":186072,"journal":{"name":"2019 5th International Conference on Information Management (ICIM)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121627751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-24DOI: 10.1109/INFOMAN.2019.8714686
Shunhui Ji, Bixin Li, Pengcheng Zhang
A lot of service-based business processes have been developed with the rapid growth of cloud computing. Ensuring the data flow correctness of business processes is very important, which needs capturing the data flow firstly. In this article, an XCFG(eXtended Control Flow Graph) based approach is proposed for the data flow analysis of business processes defined in BPEL specification. With XCFG modeling BPEL process, the improved equations for reaching definitions are defined to take the new characters of XCFG into consideration. Then iterative algorithm is adopted to solve the equations so that the definitions that may reach each XCFG node are computed. Case study shows the effectiveness of the proposed approach.
{"title":"XCFG Based Data Flow Analysis of Business Processes","authors":"Shunhui Ji, Bixin Li, Pengcheng Zhang","doi":"10.1109/INFOMAN.2019.8714686","DOIUrl":"https://doi.org/10.1109/INFOMAN.2019.8714686","url":null,"abstract":"A lot of service-based business processes have been developed with the rapid growth of cloud computing. Ensuring the data flow correctness of business processes is very important, which needs capturing the data flow firstly. In this article, an XCFG(eXtended Control Flow Graph) based approach is proposed for the data flow analysis of business processes defined in BPEL specification. With XCFG modeling BPEL process, the improved equations for reaching definitions are defined to take the new characters of XCFG into consideration. Then iterative algorithm is adopted to solve the equations so that the definitions that may reach each XCFG node are computed. Case study shows the effectiveness of the proposed approach.","PeriodicalId":186072,"journal":{"name":"2019 5th International Conference on Information Management (ICIM)","volume":"218 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122390978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-24DOI: 10.1109/INFOMAN.2019.8714707
Anjan Pal, A. Chua
The prevalence of online rumors has now become a serious concern. They have also been attracting much scholarly attention from various academic disciplines. This study seeks to investigate the following research question: How do scholars tackle the phenomenon of online rumors? Specifically, it identifies (a) the research aims that have been explored, and (b) the disciplines as well as authors' collaboration trends in the exploration. For this purpose, the study conducts a content analysis of 202 scholarly articles to review the landscape of research on online rumors. The findings are as follows: There are four groups of research aims: (1) how rumors spread, (2) how rumors can be detected, (3) how rumors are perceived by humans, and (4) how rumors can be mitigated. In terms of the disciplines and authors' collaboration trends, while 128 (63.37%) articles showed intra-disciplinary collaboration, 74 (36.63%) articles involved inter-disciplinary collaboration trends. This study identifies directions for future research.
{"title":"Analysis of Research on Online Rumors","authors":"Anjan Pal, A. Chua","doi":"10.1109/INFOMAN.2019.8714707","DOIUrl":"https://doi.org/10.1109/INFOMAN.2019.8714707","url":null,"abstract":"The prevalence of online rumors has now become a serious concern. They have also been attracting much scholarly attention from various academic disciplines. This study seeks to investigate the following research question: How do scholars tackle the phenomenon of online rumors? Specifically, it identifies (a) the research aims that have been explored, and (b) the disciplines as well as authors' collaboration trends in the exploration. For this purpose, the study conducts a content analysis of 202 scholarly articles to review the landscape of research on online rumors. The findings are as follows: There are four groups of research aims: (1) how rumors spread, (2) how rumors can be detected, (3) how rumors are perceived by humans, and (4) how rumors can be mitigated. In terms of the disciplines and authors' collaboration trends, while 128 (63.37%) articles showed intra-disciplinary collaboration, 74 (36.63%) articles involved inter-disciplinary collaboration trends. This study identifies directions for future research.","PeriodicalId":186072,"journal":{"name":"2019 5th International Conference on Information Management (ICIM)","volume":"284 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114391043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-24DOI: 10.1109/INFOMAN.2019.8714651
Weiguo Xiang, Fuzhang Wang, Xianwu Zhang
Aiming at solving the problems of low success rate and low efficiency in converting BIM models to GIS platform, this paper proposes a multi-source model integration and publishment method based on two main software, i.e., Bentley Microstation and Weijingxing CityMaker. First, this paper analyzes the traditional data exchange methods, and gives a recommended method to convert multi-source models to one format, i.e., DGN. Second, it proposes a data analysis and transformation method. This method converts format DGN to FDB, which is to realize the conversion of BIM models to GIS models efficiently. Third, the integrated model in the Weijingxing CityMaker GIS platform is tiled and published. Finally, the Shenzhen Qianhai Project is used as a case to verify the feasibility of the method. The method can integrate BIM models into the Weijingxing CityMaker 3D GIS platform efficiently and accurately, and has the potential to realize the integrated and centralized display of the massive urban-level model.
针对BIM模型向GIS平台转换成功率低、效率低的问题,本文提出了一种基于Bentley Microstation和Weijingxing CityMaker两大软件的多源模型集成与发布方法。本文首先对传统的数据交换方法进行了分析,提出了一种将多源模型转换为一种格式的推荐方法,即DGN。其次,提出了一种数据分析与转换方法。该方法将格式DGN转换为FDB,实现了BIM模型到GIS模型的高效转换。第三,对Weijingxing CityMaker GIS平台中的集成模型进行了平铺和发布。最后,以深圳前海工程为例,验证了该方法的可行性。该方法可以高效、准确地将BIM模型集成到Weijingxing CityMaker 3D GIS平台中,具有实现大规模城市级模型集成、集中展示的潜力。
{"title":"Research on Integration of Multi-source BIM Models Based on GIS Platform","authors":"Weiguo Xiang, Fuzhang Wang, Xianwu Zhang","doi":"10.1109/INFOMAN.2019.8714651","DOIUrl":"https://doi.org/10.1109/INFOMAN.2019.8714651","url":null,"abstract":"Aiming at solving the problems of low success rate and low efficiency in converting BIM models to GIS platform, this paper proposes a multi-source model integration and publishment method based on two main software, i.e., Bentley Microstation and Weijingxing CityMaker. First, this paper analyzes the traditional data exchange methods, and gives a recommended method to convert multi-source models to one format, i.e., DGN. Second, it proposes a data analysis and transformation method. This method converts format DGN to FDB, which is to realize the conversion of BIM models to GIS models efficiently. Third, the integrated model in the Weijingxing CityMaker GIS platform is tiled and published. Finally, the Shenzhen Qianhai Project is used as a case to verify the feasibility of the method. The method can integrate BIM models into the Weijingxing CityMaker 3D GIS platform efficiently and accurately, and has the potential to realize the integrated and centralized display of the massive urban-level model.","PeriodicalId":186072,"journal":{"name":"2019 5th International Conference on Information Management (ICIM)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122012193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}