首页 > 最新文献

2019 5th International Conference on Information Management (ICIM)最新文献

英文 中文
Digital Commpetence Curriculum for Schools' Employees: Croatian e-Schools Project Example 学校员工数字能力课程:克罗地亚电子学校项目实例
Pub Date : 2019-10-07 DOI: 10.1109/INFOMAN.2019.8714705
Nikolina Žajdela Hrustek, R. Mekovec, Valentina Kirinić
The Curriculum for the Enhancement of Digital Competences of School Employees: Teachers and Associates, Principals and Administrative Staff developed as the result of Croatian e-Schools project is presented. An open curriculum approach has been chosen that characterizes the flexibility of design and is based on recommendations that allow creativity and the introduction of change in the course of implementation. The digital competence curriculum is intended for the training of beneficiaries who are considered adults, therefore specifics related to adult education are implemented. As the digitalization of society, work and education is moving fast, there is a need to set a guidance to improve digital competence. Schools should be leaders on the use of digital technologies for learning, acquiring skills and competences and to emphasize the importance of digital technologies for future education and employment. We believe that this Curriculum can help address some of the key challenges that schools are currently facing.
介绍了克罗地亚电子学校项目开发的提高学校员工数字能力的课程:教师和助理、校长和行政人员。选择了一种开放的课程方法,其特点是设计的灵活性,并以允许创造性和在实施过程中引入变化的建议为基础。数字能力课程旨在培训被认为是成年人的受益者,因此实施了与成人教育有关的具体内容。随着社会、工作和教育的数字化快速发展,有必要制定一项指导方针来提高数字能力。学校应在使用数字技术进行学习、获取技能和能力方面发挥领导作用,并强调数字技术对未来教育和就业的重要性。我们相信这个课程可以帮助解决学校目前面临的一些关键挑战。
{"title":"Digital Commpetence Curriculum for Schools' Employees: Croatian e-Schools Project Example","authors":"Nikolina Žajdela Hrustek, R. Mekovec, Valentina Kirinić","doi":"10.1109/INFOMAN.2019.8714705","DOIUrl":"https://doi.org/10.1109/INFOMAN.2019.8714705","url":null,"abstract":"The Curriculum for the Enhancement of Digital Competences of School Employees: Teachers and Associates, Principals and Administrative Staff developed as the result of Croatian e-Schools project is presented. An open curriculum approach has been chosen that characterizes the flexibility of design and is based on recommendations that allow creativity and the introduction of change in the course of implementation. The digital competence curriculum is intended for the training of beneficiaries who are considered adults, therefore specifics related to adult education are implemented. As the digitalization of society, work and education is moving fast, there is a need to set a guidance to improve digital competence. Schools should be leaders on the use of digital technologies for learning, acquiring skills and competences and to emphasize the importance of digital technologies for future education and employment. We believe that this Curriculum can help address some of the key challenges that schools are currently facing.","PeriodicalId":186072,"journal":{"name":"2019 5th International Conference on Information Management (ICIM)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132623220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Designing of the Entrepreneurial Phase Cycle Simulation Model: Justification and Prospects 创业阶段周期模拟模型的设计:论证与展望
Pub Date : 2019-05-14 DOI: 10.1109/INFOMAN.2019.8714695
S. Smirnov, Tamara Iakovleva, Julia Krylova, A. Kolyshkin, V. Zyabrikov, A. Lupu
Despite the active expansion of simulation modeling as an approach to research in social science, the practical application of this approach in entrepreneurship is still not widespread. Meanwhile, the system dynamics approach fits some areas of entrepreneurship development research. In the paper, we examine the possibilities and provide justification for designing a simulation model which is based on the systemic dynamics approach. The basis of the model's logic is entrepreneur's phase cycle, admitted at the GEM survey and supplemented with data of statistical agencies. In particular, the paper discusses the prospects of entrepreneurial statistics further development with the aim to enhance and expand the understanding of the whole entrepreneurial process. The conceptual model proposed by the authors can be used in quantitative studies of the entrepreneurs' life cycle, in dynamic displaying of entrepreneur's data at phases of their life cycle, and also for the government agencies policy improvement in the field of entrepreneurship.
尽管仿真建模作为一种研究方法在社会科学领域得到了积极的扩展,但这种方法在创业中的实际应用仍然不广泛。同时,系统动力学方法也适用于创业发展研究的某些领域。在本文中,我们考察了基于系统动力学方法的仿真模型设计的可能性并提供了理由。该模型的逻辑基础是创业板调查中承认的企业家阶段周期,并辅以统计机构的数据。本文特别讨论了创业统计进一步发展的前景,旨在增强和扩大对整个创业过程的理解。本文提出的概念模型可用于企业家生命周期的定量研究,可用于企业家生命周期各阶段数据的动态展示,也可用于政府机构在创业领域的政策改进。
{"title":"Designing of the Entrepreneurial Phase Cycle Simulation Model: Justification and Prospects","authors":"S. Smirnov, Tamara Iakovleva, Julia Krylova, A. Kolyshkin, V. Zyabrikov, A. Lupu","doi":"10.1109/INFOMAN.2019.8714695","DOIUrl":"https://doi.org/10.1109/INFOMAN.2019.8714695","url":null,"abstract":"Despite the active expansion of simulation modeling as an approach to research in social science, the practical application of this approach in entrepreneurship is still not widespread. Meanwhile, the system dynamics approach fits some areas of entrepreneurship development research. In the paper, we examine the possibilities and provide justification for designing a simulation model which is based on the systemic dynamics approach. The basis of the model's logic is entrepreneur's phase cycle, admitted at the GEM survey and supplemented with data of statistical agencies. In particular, the paper discusses the prospects of entrepreneurial statistics further development with the aim to enhance and expand the understanding of the whole entrepreneurial process. The conceptual model proposed by the authors can be used in quantitative studies of the entrepreneurs' life cycle, in dynamic displaying of entrepreneur's data at phases of their life cycle, and also for the government agencies policy improvement in the field of entrepreneurship.","PeriodicalId":186072,"journal":{"name":"2019 5th International Conference on Information Management (ICIM)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121443557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Hybrid Density-Based Outlier Detection Model for Privacy in Electronic Patient Record system 基于混合密度的电子病历系统隐私异常点检测模型
Pub Date : 2019-03-24 DOI: 10.1109/INFOMAN.2019.8714701
A. Boddy, William Hurst, M. Mackay, A. El Rhalibi
This research concerns the detection of unauthorised access within hospital networks through the real-time analysis of audit logs. Privacy is a primary concern amongst patients due to the rising adoption of Electronic Patient Record (EPR) systems. There is growing evidence to suggest that patients may withhold information from healthcare providers due to lack of Trust in the security of EPRs. Yet, patient record data must be available to healthcare providers at the point of care. Ensuring privacy and confidentiality of that data is challenging. Roles within healthcare organisations are dynamic and relying on access control is not sufficient. Through proactive monitoring of audit logs, unauthorised accesses can be detected and presented to an analyst for review. Advanced data analytics and visualisation techniques can be used to aid the analysis of big data within EPR audit logs to identify and highlight pertinent data points. Employing a human-in-the-loop model ensures that suspicious activity is appropriately investigated and the data analytics is continuously improving. This paper presents a system that employs a Human-in-the-Loop Machine Learning (HILML) algorithm, in addition to a density-based local outlier detection model. The system is able to detect 145 anomalous behaviours in an unlabelled dataset of 1,007,727 audit logs. This equates to 0.014% of the EPR accesses being labelled as anomalous in a specialist Liverpool (UK) hospital.
本研究通过对审计日志的实时分析来检测医院网络中未经授权的访问。由于越来越多的患者采用电子病历(EPR)系统,隐私是患者关注的主要问题。越来越多的证据表明,由于对epr的安全性缺乏信任,患者可能会向医疗保健提供者隐瞒信息。然而,患者记录数据必须在护理点提供给医疗保健提供者。确保这些数据的隐私和机密性是一项挑战。医疗保健组织中的角色是动态的,依赖访问控制是不够的。通过主动监视审计日志,可以检测到未经授权的访问,并将其呈现给分析人员进行审查。先进的数据分析和可视化技术可用于帮助分析EPR审计日志中的大数据,以识别和突出相关数据点。采用人在循环模型可确保对可疑活动进行适当调查,并不断改进数据分析。本文提出了一个采用人在环机器学习(HILML)算法的系统,以及基于密度的局部离群点检测模型。该系统能够在1,007,727个审计日志的未标记数据集中检测到145个异常行为。这相当于0.014%的EPR访问在一家专业的利物浦(英国)医院被标记为异常。
{"title":"A Hybrid Density-Based Outlier Detection Model for Privacy in Electronic Patient Record system","authors":"A. Boddy, William Hurst, M. Mackay, A. El Rhalibi","doi":"10.1109/INFOMAN.2019.8714701","DOIUrl":"https://doi.org/10.1109/INFOMAN.2019.8714701","url":null,"abstract":"This research concerns the detection of unauthorised access within hospital networks through the real-time analysis of audit logs. Privacy is a primary concern amongst patients due to the rising adoption of Electronic Patient Record (EPR) systems. There is growing evidence to suggest that patients may withhold information from healthcare providers due to lack of Trust in the security of EPRs. Yet, patient record data must be available to healthcare providers at the point of care. Ensuring privacy and confidentiality of that data is challenging. Roles within healthcare organisations are dynamic and relying on access control is not sufficient. Through proactive monitoring of audit logs, unauthorised accesses can be detected and presented to an analyst for review. Advanced data analytics and visualisation techniques can be used to aid the analysis of big data within EPR audit logs to identify and highlight pertinent data points. Employing a human-in-the-loop model ensures that suspicious activity is appropriately investigated and the data analytics is continuously improving. This paper presents a system that employs a Human-in-the-Loop Machine Learning (HILML) algorithm, in addition to a density-based local outlier detection model. The system is able to detect 145 anomalous behaviours in an unlabelled dataset of 1,007,727 audit logs. This equates to 0.014% of the EPR accesses being labelled as anomalous in a specialist Liverpool (UK) hospital.","PeriodicalId":186072,"journal":{"name":"2019 5th International Conference on Information Management (ICIM)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126164765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Literature Review of WeChat Friends Circle Advertisement 微信朋友圈广告的文献综述
Pub Date : 2019-03-24 DOI: 10.1109/INFOMAN.2019.8714671
G. Gao, Jia-Heng Zhang, Weidong Zuo, Leida Li, Jianliang Yu
In recent years, instant messaging tools have become one of the main channels for people to communicate, and WeChat is one of the most important members. Since WeChat was launched, monthly active users have exceeded 1 billion. In January 2015, WeChat friends circle advertisement was officially launched and used in the form of information flow advertisement, which users praised or criticized differently. Therefore, it is a problem that WeChat research and development team and advertisers must face to improve users' willingness to accept advertisements in the circle of friends. We used “WeChat” and “circle of friends” as key words to search in CNKI, and the number of articles retrieved was 205. After carrying out quantitative analysis and content analysis of relevant documents (2013 – 2018), it is found that most of the studies were carried out from the perspective of the communication mechanism, marketing strategy and comparative analysis of advantages and disadvantages of WeChat circle of friends. In addition, some studies are based on advertisement avoidance, user participation and willingness to accept. At the same time, we also take WeChat as the research background, integrate the development and changes of TAM (technology acceptance model), and summarize the basic situation of users' willingness to accept WeChat friends' circle advertisement in our country so as to provide more direction and space for the optimization research of WeChat friends' circle advertisement.
近年来,即时通讯工具已经成为人们交流的主要渠道之一,微信是其中最重要的成员之一。b微信上线以来,月活跃用户已突破10亿。2015年1月,微信朋友圈广告正式上线,并以信息流广告的形式使用,用户褒贬不一。因此,如何提高用户对朋友圈广告的接受度,是微信研发团队和广告主必须面对的问题。我们以“微信”和“朋友圈”为关键词在CNKI中进行搜索,检索到的文章数为205篇。在对相关文献(2013 - 2018)进行定量分析和内容分析后发现,大部分研究都是从微信朋友圈的传播机制、营销策略和优劣势对比分析的角度进行的。此外,一些研究基于广告回避、用户参与和接受意愿。同时,我们也以微信为研究背景,整合TAM(技术接受模型)的发展变化,总结出我国用户接受微信朋友圈广告意愿的基本情况,为微信朋友圈广告的优化研究提供更多的方向和空间。
{"title":"Literature Review of WeChat Friends Circle Advertisement","authors":"G. Gao, Jia-Heng Zhang, Weidong Zuo, Leida Li, Jianliang Yu","doi":"10.1109/INFOMAN.2019.8714671","DOIUrl":"https://doi.org/10.1109/INFOMAN.2019.8714671","url":null,"abstract":"In recent years, instant messaging tools have become one of the main channels for people to communicate, and WeChat is one of the most important members. Since WeChat was launched, monthly active users have exceeded 1 billion. In January 2015, WeChat friends circle advertisement was officially launched and used in the form of information flow advertisement, which users praised or criticized differently. Therefore, it is a problem that WeChat research and development team and advertisers must face to improve users' willingness to accept advertisements in the circle of friends. We used “WeChat” and “circle of friends” as key words to search in CNKI, and the number of articles retrieved was 205. After carrying out quantitative analysis and content analysis of relevant documents (2013 – 2018), it is found that most of the studies were carried out from the perspective of the communication mechanism, marketing strategy and comparative analysis of advantages and disadvantages of WeChat circle of friends. In addition, some studies are based on advertisement avoidance, user participation and willingness to accept. At the same time, we also take WeChat as the research background, integrate the development and changes of TAM (technology acceptance model), and summarize the basic situation of users' willingness to accept WeChat friends' circle advertisement in our country so as to provide more direction and space for the optimization research of WeChat friends' circle advertisement.","PeriodicalId":186072,"journal":{"name":"2019 5th International Conference on Information Management (ICIM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114304349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Investigations into the Development of a Knowledge Transfer Platform for Business Productivity 企业生产力知识转移平台开发研究
Pub Date : 2019-03-24 DOI: 10.1109/INFOMAN.2019.8714702
W. Hurst, Nathan Shone, David Tully
There is a lack of access to training tools., best practice guides and knowledge repositories to help with the digital switch to Industry 4.0. Consequently., in this paper., the ProAccel (Productivity Accelerator) platform design is outlined. The system is a modular cloud-based multimedia platform that employs advanced data analytics and gamification techniques., such as Virtual Reality (VR)., to revolutionise the way productivity information is shared to support businesses in their uptake of digital technologies in the Industry 4.0 environment. We present our findings from a 4 month case study., involving over 100 UK-based companies. The resulting research was used to construct a prototype of the ProAccel platform. As an evaluation., a simulated user evaluation of the platform using a guestimate model derived from a KLM analysis is conducted as an analysis of the platform”s functionality.
缺乏获得培训工具的途径。,最佳实践指南和知识库,以帮助数字化转换到工业4.0。因此。,在本文中。,概述了ProAccel(生产力加速器)平台的设计。该系统是一个基于云的模块化多媒体平台,采用先进的数据分析和游戏化技术。例如虚拟现实(VR)。,以彻底改变生产力信息的共享方式,以支持企业在工业4.0环境中采用数字技术。我们介绍了一项为期4个月的案例研究的结果。,涉及100多家英国公司。研究结果被用于构建ProAccel平台的原型。作为评价。,使用从KLM分析中导出的估计模型对平台进行模拟用户评估,作为平台功能的分析。
{"title":"Investigations into the Development of a Knowledge Transfer Platform for Business Productivity","authors":"W. Hurst, Nathan Shone, David Tully","doi":"10.1109/INFOMAN.2019.8714702","DOIUrl":"https://doi.org/10.1109/INFOMAN.2019.8714702","url":null,"abstract":"There is a lack of access to training tools., best practice guides and knowledge repositories to help with the digital switch to Industry 4.0. Consequently., in this paper., the ProAccel (Productivity Accelerator) platform design is outlined. The system is a modular cloud-based multimedia platform that employs advanced data analytics and gamification techniques., such as Virtual Reality (VR)., to revolutionise the way productivity information is shared to support businesses in their uptake of digital technologies in the Industry 4.0 environment. We present our findings from a 4 month case study., involving over 100 UK-based companies. The resulting research was used to construct a prototype of the ProAccel platform. As an evaluation., a simulated user evaluation of the platform using a guestimate model derived from a KLM analysis is conducted as an analysis of the platform”s functionality.","PeriodicalId":186072,"journal":{"name":"2019 5th International Conference on Information Management (ICIM)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134098406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Design Approach for Automated Prevention of Cyberbullying Using Language Features on Social Media 利用社交媒体上的语言特征自动预防网络欺凌的设计方法
Pub Date : 2019-03-24 DOI: 10.1109/INFOMAN.2019.8714683
Wanqi Li
Existing studies point out that the increased use of Information and Communication Technologies (ICT) has introduced new platforms, across which cyberbullying can occur. Most of the studies focus on the causes and consequences of cyberbullying among adolescents, however, few focus on the detection and prevention of cyberbullying, and even fewer focus on detecting cyberbullying in the Chinese language. Against this backdrop, an ethical approach to information filtering and regulation should be implemented and research into language features and language management is required. This research uses Sina Weibo as a case study, focusing on the features of language that occur in cyberbullying and the machine technique system that should be included as principles for managing and regulating cyberbullying contents on social media. Based on the Language Management Theory (LMT), inductive content analysis has been used to analyse offensive language features from the selected samples. The findings of this project will help refine theories, particularly those on offensive information and behaviour, and benefit academic understanding of cyberbullying and media, including the detection, regulation and governance.
现有研究指出,信息和通信技术(ICT)使用的增加引入了新的平台,可以发生网络欺凌。大多数研究关注的是青少年网络欺凌的原因和后果,而很少关注网络欺凌的检测和预防,更少关注中文网络欺凌的检测。在这样的背景下,我们需要对信息过滤和监管采取道德的方法,并对语言特征和语言管理进行研究。本研究以新浪微博为例,重点研究网络欺凌中出现的语言特征,以及社交媒体网络欺凌内容管理和规范应包含的机器技术体系。基于语言管理理论(LMT),运用归纳性内容分析法对所选样本中的攻击性语言特征进行分析。该项目的研究结果将有助于完善理论,特别是关于攻击性信息和行为的理论,并有助于对网络欺凌和媒体的学术理解,包括检测、监管和治理。
{"title":"A Design Approach for Automated Prevention of Cyberbullying Using Language Features on Social Media","authors":"Wanqi Li","doi":"10.1109/INFOMAN.2019.8714683","DOIUrl":"https://doi.org/10.1109/INFOMAN.2019.8714683","url":null,"abstract":"Existing studies point out that the increased use of Information and Communication Technologies (ICT) has introduced new platforms, across which cyberbullying can occur. Most of the studies focus on the causes and consequences of cyberbullying among adolescents, however, few focus on the detection and prevention of cyberbullying, and even fewer focus on detecting cyberbullying in the Chinese language. Against this backdrop, an ethical approach to information filtering and regulation should be implemented and research into language features and language management is required. This research uses Sina Weibo as a case study, focusing on the features of language that occur in cyberbullying and the machine technique system that should be included as principles for managing and regulating cyberbullying contents on social media. Based on the Language Management Theory (LMT), inductive content analysis has been used to analyse offensive language features from the selected samples. The findings of this project will help refine theories, particularly those on offensive information and behaviour, and benefit academic understanding of cyberbullying and media, including the detection, regulation and governance.","PeriodicalId":186072,"journal":{"name":"2019 5th International Conference on Information Management (ICIM)","volume":"73 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126018129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Improved DV-Hop Algorithm Based on Minimum Hops Correction and Reevaluate Hop Distance 基于最小跳数校正和重新评估跳距的改进DV-Hop算法
Pub Date : 2019-03-24 DOI: 10.1109/INFOMAN.2019.8714669
Wangsheng Fang, Haomin Xu, Geng Yang
In the DV -HOP algorithm of the wireless sensor network, an inaccurate estimation of the minimum hop count and the average hop distance produces a positioning error. Therefore, this paper proposes an improved DV-HOP algorithm. The algorithm reevaluates the average hop distance of the anchor node and corrects the minimum hop count of the node to be located and the anchor node, which reduces the above error. First, the average hop distance of the anchor node closest to the positioned node is reassessed according to the error. Then, the minimum hop count is obtained by the average hop distance of the revaluation, and the correction coefficient of the ratio of the minimum hop count to the actual minimum hop count is obtained, and the minimum hop count of the node to be positioned is corrected by the correction coefficient. Finally, the distance between the node to be located and the anchor node is calculated, and the position of the node to be positioned is calculated by the least squares method. Simulation results show that the improved dv-hop algorithm can reduce the node positioning error and improve the positioning accuracy.
在无线传感器网络的DV -HOP算法中,由于对最小跳数和平均跳距的估计不准确,会产生定位误差。因此,本文提出了一种改进的DV-HOP算法。该算法重新计算锚节点的平均跳距离,并对待定位节点和锚节点的最小跳数进行校正,减小了上述误差。首先,根据误差重新评估离定位节点最近的锚节点的平均跳距。然后,通过重估的平均跳距得到最小跳数,并得到最小跳数与实际最小跳数之比的修正系数,通过修正系数对待定位节点的最小跳数进行修正。最后,计算待定位节点与锚节点的距离,并采用最小二乘法计算待定位节点的位置。仿真结果表明,改进的dv-hop算法可以减小节点定位误差,提高定位精度。
{"title":"Improved DV-Hop Algorithm Based on Minimum Hops Correction and Reevaluate Hop Distance","authors":"Wangsheng Fang, Haomin Xu, Geng Yang","doi":"10.1109/INFOMAN.2019.8714669","DOIUrl":"https://doi.org/10.1109/INFOMAN.2019.8714669","url":null,"abstract":"In the DV -HOP algorithm of the wireless sensor network, an inaccurate estimation of the minimum hop count and the average hop distance produces a positioning error. Therefore, this paper proposes an improved DV-HOP algorithm. The algorithm reevaluates the average hop distance of the anchor node and corrects the minimum hop count of the node to be located and the anchor node, which reduces the above error. First, the average hop distance of the anchor node closest to the positioned node is reassessed according to the error. Then, the minimum hop count is obtained by the average hop distance of the revaluation, and the correction coefficient of the ratio of the minimum hop count to the actual minimum hop count is obtained, and the minimum hop count of the node to be positioned is corrected by the correction coefficient. Finally, the distance between the node to be located and the anchor node is calculated, and the position of the node to be positioned is calculated by the least squares method. Simulation results show that the improved dv-hop algorithm can reduce the node positioning error and improve the positioning accuracy.","PeriodicalId":186072,"journal":{"name":"2019 5th International Conference on Information Management (ICIM)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121627751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
XCFG Based Data Flow Analysis of Business Processes 基于XCFG的业务流程数据流分析
Pub Date : 2019-03-24 DOI: 10.1109/INFOMAN.2019.8714686
Shunhui Ji, Bixin Li, Pengcheng Zhang
A lot of service-based business processes have been developed with the rapid growth of cloud computing. Ensuring the data flow correctness of business processes is very important, which needs capturing the data flow firstly. In this article, an XCFG(eXtended Control Flow Graph) based approach is proposed for the data flow analysis of business processes defined in BPEL specification. With XCFG modeling BPEL process, the improved equations for reaching definitions are defined to take the new characters of XCFG into consideration. Then iterative algorithm is adopted to solve the equations so that the definitions that may reach each XCFG node are computed. Case study shows the effectiveness of the proposed approach.
随着云计算的快速发展,已经开发了许多基于服务的业务流程。确保业务流程的数据流正确性非常重要,这需要首先捕获数据流。在本文中,提出了一种基于XCFG(扩展控制流图)的方法,用于分析BPEL规范中定义的业务流程的数据流。利用XCFG建模BPEL过程,定义了改进的到达定义的方程,以考虑XCFG的新特性。然后采用迭代算法对方程进行求解,计算出可能到达每个XCFG节点的定义。实例研究表明了该方法的有效性。
{"title":"XCFG Based Data Flow Analysis of Business Processes","authors":"Shunhui Ji, Bixin Li, Pengcheng Zhang","doi":"10.1109/INFOMAN.2019.8714686","DOIUrl":"https://doi.org/10.1109/INFOMAN.2019.8714686","url":null,"abstract":"A lot of service-based business processes have been developed with the rapid growth of cloud computing. Ensuring the data flow correctness of business processes is very important, which needs capturing the data flow firstly. In this article, an XCFG(eXtended Control Flow Graph) based approach is proposed for the data flow analysis of business processes defined in BPEL specification. With XCFG modeling BPEL process, the improved equations for reaching definitions are defined to take the new characters of XCFG into consideration. Then iterative algorithm is adopted to solve the equations so that the definitions that may reach each XCFG node are computed. Case study shows the effectiveness of the proposed approach.","PeriodicalId":186072,"journal":{"name":"2019 5th International Conference on Information Management (ICIM)","volume":"218 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122390978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Analysis of Research on Online Rumors 网络谣言研究分析
Pub Date : 2019-03-24 DOI: 10.1109/INFOMAN.2019.8714707
Anjan Pal, A. Chua
The prevalence of online rumors has now become a serious concern. They have also been attracting much scholarly attention from various academic disciplines. This study seeks to investigate the following research question: How do scholars tackle the phenomenon of online rumors? Specifically, it identifies (a) the research aims that have been explored, and (b) the disciplines as well as authors' collaboration trends in the exploration. For this purpose, the study conducts a content analysis of 202 scholarly articles to review the landscape of research on online rumors. The findings are as follows: There are four groups of research aims: (1) how rumors spread, (2) how rumors can be detected, (3) how rumors are perceived by humans, and (4) how rumors can be mitigated. In terms of the disciplines and authors' collaboration trends, while 128 (63.37%) articles showed intra-disciplinary collaboration, 74 (36.63%) articles involved inter-disciplinary collaboration trends. This study identifies directions for future research.
网络谣言的盛行现在已经成为一个严重的问题。它们也一直吸引着各个学科的学术关注。本研究旨在探讨以下研究问题:学者如何处理网络谣言现象?具体来说,它确定了(a)已探索的研究目标,以及(b)学科以及作者在探索中的合作趋势。为此,本研究对202篇学术论文进行了内容分析,以回顾网络谣言研究的现状。研究结果如下:有四组研究目标:(1)谣言如何传播;(2)谣言如何被发现;(3)谣言如何被人类感知;(4)谣言如何被缓解。在学科和作者合作趋势方面,128篇(63.37%)文章表现为学科内合作趋势,74篇(36.63%)文章表现为跨学科合作趋势。这项研究确定了未来研究的方向。
{"title":"Analysis of Research on Online Rumors","authors":"Anjan Pal, A. Chua","doi":"10.1109/INFOMAN.2019.8714707","DOIUrl":"https://doi.org/10.1109/INFOMAN.2019.8714707","url":null,"abstract":"The prevalence of online rumors has now become a serious concern. They have also been attracting much scholarly attention from various academic disciplines. This study seeks to investigate the following research question: How do scholars tackle the phenomenon of online rumors? Specifically, it identifies (a) the research aims that have been explored, and (b) the disciplines as well as authors' collaboration trends in the exploration. For this purpose, the study conducts a content analysis of 202 scholarly articles to review the landscape of research on online rumors. The findings are as follows: There are four groups of research aims: (1) how rumors spread, (2) how rumors can be detected, (3) how rumors are perceived by humans, and (4) how rumors can be mitigated. In terms of the disciplines and authors' collaboration trends, while 128 (63.37%) articles showed intra-disciplinary collaboration, 74 (36.63%) articles involved inter-disciplinary collaboration trends. This study identifies directions for future research.","PeriodicalId":186072,"journal":{"name":"2019 5th International Conference on Information Management (ICIM)","volume":"284 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114391043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research on Integration of Multi-source BIM Models Based on GIS Platform 基于GIS平台的多源BIM模型集成研究
Pub Date : 2019-03-24 DOI: 10.1109/INFOMAN.2019.8714651
Weiguo Xiang, Fuzhang Wang, Xianwu Zhang
Aiming at solving the problems of low success rate and low efficiency in converting BIM models to GIS platform, this paper proposes a multi-source model integration and publishment method based on two main software, i.e., Bentley Microstation and Weijingxing CityMaker. First, this paper analyzes the traditional data exchange methods, and gives a recommended method to convert multi-source models to one format, i.e., DGN. Second, it proposes a data analysis and transformation method. This method converts format DGN to FDB, which is to realize the conversion of BIM models to GIS models efficiently. Third, the integrated model in the Weijingxing CityMaker GIS platform is tiled and published. Finally, the Shenzhen Qianhai Project is used as a case to verify the feasibility of the method. The method can integrate BIM models into the Weijingxing CityMaker 3D GIS platform efficiently and accurately, and has the potential to realize the integrated and centralized display of the massive urban-level model.
针对BIM模型向GIS平台转换成功率低、效率低的问题,本文提出了一种基于Bentley Microstation和Weijingxing CityMaker两大软件的多源模型集成与发布方法。本文首先对传统的数据交换方法进行了分析,提出了一种将多源模型转换为一种格式的推荐方法,即DGN。其次,提出了一种数据分析与转换方法。该方法将格式DGN转换为FDB,实现了BIM模型到GIS模型的高效转换。第三,对Weijingxing CityMaker GIS平台中的集成模型进行了平铺和发布。最后,以深圳前海工程为例,验证了该方法的可行性。该方法可以高效、准确地将BIM模型集成到Weijingxing CityMaker 3D GIS平台中,具有实现大规模城市级模型集成、集中展示的潜力。
{"title":"Research on Integration of Multi-source BIM Models Based on GIS Platform","authors":"Weiguo Xiang, Fuzhang Wang, Xianwu Zhang","doi":"10.1109/INFOMAN.2019.8714651","DOIUrl":"https://doi.org/10.1109/INFOMAN.2019.8714651","url":null,"abstract":"Aiming at solving the problems of low success rate and low efficiency in converting BIM models to GIS platform, this paper proposes a multi-source model integration and publishment method based on two main software, i.e., Bentley Microstation and Weijingxing CityMaker. First, this paper analyzes the traditional data exchange methods, and gives a recommended method to convert multi-source models to one format, i.e., DGN. Second, it proposes a data analysis and transformation method. This method converts format DGN to FDB, which is to realize the conversion of BIM models to GIS models efficiently. Third, the integrated model in the Weijingxing CityMaker GIS platform is tiled and published. Finally, the Shenzhen Qianhai Project is used as a case to verify the feasibility of the method. The method can integrate BIM models into the Weijingxing CityMaker 3D GIS platform efficiently and accurately, and has the potential to realize the integrated and centralized display of the massive urban-level model.","PeriodicalId":186072,"journal":{"name":"2019 5th International Conference on Information Management (ICIM)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122012193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2019 5th International Conference on Information Management (ICIM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1