Pub Date : 2019-03-24DOI: 10.1109/INFOMAN.2019.8714672
Mian Ali, Omer Farooq, M. D. Khan, S. Haxha
In this paper, hardware implementation of genetic algorithm for Robot path planning in Globally static Environment is presented. Genetic algorithm is modified and implemented in 8-bit Microtontroller (MCU) PIC18F452. The genetic algorithm is designed to decrease number of iteration and processing power by using predefined priorities for parenti initial path generation rather than creating parent paths randomly. The unmanned ground vehicle (UGV) is designed which receives starting node, final destination and obstacles wirelessly, it then create multiple parent paths by using different priorities, cross over to create new child paths, uses distance as fitness function for determining Optimal or shortest path while avoiding the obstacles and uses stepper motors with three- dimensional movements to reach its destination. The environment is 5×5 static Grid Map in which obstacles are known before path planning. The MCU determines optimal path with no obstacles and require minimum distance to reach its destination.
{"title":"Hardware Implementation of Compact Genetic Algorithm for Robot Path Planning in Globally Static Environment in 8-bit Microcontroller","authors":"Mian Ali, Omer Farooq, M. D. Khan, S. Haxha","doi":"10.1109/INFOMAN.2019.8714672","DOIUrl":"https://doi.org/10.1109/INFOMAN.2019.8714672","url":null,"abstract":"In this paper, hardware implementation of genetic algorithm for Robot path planning in Globally static Environment is presented. Genetic algorithm is modified and implemented in 8-bit Microtontroller (MCU) PIC18F452. The genetic algorithm is designed to decrease number of iteration and processing power by using predefined priorities for parenti initial path generation rather than creating parent paths randomly. The unmanned ground vehicle (UGV) is designed which receives starting node, final destination and obstacles wirelessly, it then create multiple parent paths by using different priorities, cross over to create new child paths, uses distance as fitness function for determining Optimal or shortest path while avoiding the obstacles and uses stepper motors with three- dimensional movements to reach its destination. The environment is 5×5 static Grid Map in which obstacles are known before path planning. The MCU determines optimal path with no obstacles and require minimum distance to reach its destination.","PeriodicalId":186072,"journal":{"name":"2019 5th International Conference on Information Management (ICIM)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126580978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-24DOI: 10.1109/INFOMAN.2019.8714688
Igor Aguilar Alonso, Miguel Fabián Delgado Cedeño
The Outsourcing of information technology (IT) is the contracting of technological services between a public or private organization and another that are dedicated to the provision of one or several specific services to meet their requirements. In the outsourcing of IT services, there are several difficulties such as limited knowledge of IT personnel about the risks of Outsourcing, poor understanding of vulnerabilities, threats, and the growth of complexity to manage Outsourcing as it expands in the organizations, among others. Due to the problems, we posed the following question: What is the actual situation of the IT outsourcing in public organizations in the province of Manabi - Ecuador? The objective of this research is to measure the results through the field study about the knowledge, problems, the impact of the risks of IT Outsourcing from the perspective of IT managers and IT Professionals of the public organizations in the province of Manabi, Ecuador. The methodology used is a survey aimed at 113 people working in 40 public organizations. The conclusions more important are that more of half of respondents do not know about of IT outsourcing processes in public organizations. However, the have knowledge, indicated that the frequency that occur the IT outsourcing risks is very high, being the technical areas the most affected.
{"title":"Early Study of IT Outsourcing in Public Organizations in the Province of Manabi - Ecuador","authors":"Igor Aguilar Alonso, Miguel Fabián Delgado Cedeño","doi":"10.1109/INFOMAN.2019.8714688","DOIUrl":"https://doi.org/10.1109/INFOMAN.2019.8714688","url":null,"abstract":"The Outsourcing of information technology (IT) is the contracting of technological services between a public or private organization and another that are dedicated to the provision of one or several specific services to meet their requirements. In the outsourcing of IT services, there are several difficulties such as limited knowledge of IT personnel about the risks of Outsourcing, poor understanding of vulnerabilities, threats, and the growth of complexity to manage Outsourcing as it expands in the organizations, among others. Due to the problems, we posed the following question: What is the actual situation of the IT outsourcing in public organizations in the province of Manabi - Ecuador? The objective of this research is to measure the results through the field study about the knowledge, problems, the impact of the risks of IT Outsourcing from the perspective of IT managers and IT Professionals of the public organizations in the province of Manabi, Ecuador. The methodology used is a survey aimed at 113 people working in 40 public organizations. The conclusions more important are that more of half of respondents do not know about of IT outsourcing processes in public organizations. However, the have knowledge, indicated that the frequency that occur the IT outsourcing risks is very high, being the technical areas the most affected.","PeriodicalId":186072,"journal":{"name":"2019 5th International Conference on Information Management (ICIM)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124657725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-24DOI: 10.1109/INFOMAN.2019.8714691
Masayuki Higashino, Toshiya Kawato, Motoyuki Ohmori, T. Kawamura
Phishing is one of the dangerous threats to organisations. A sender of a phishing e-mail pretends to be a trusted person or a system in order to steal valuable information including personal identity data and credentials. In order to deal with this problem, many organisations have implemented an anti-phishing training. However, the outsourcing of an anti-phishing training requires a high cost. Additionally, many anti-phishing training systems provided by vendors save sensitive data such as e-mail addresses and names of trainees to public servers for an anti-phishing training. This architecture has a problem that attacking these public servers increases for the risk of information leakage about trainees. Therefore, this paper proposes an anti-phishing training system which does not save sensitive data such as an e-mail address and a name of trainees to public servers, and it is implementable at a low cost. This proposed system saves sensitive data to a trainer's local computer instead of public servers. A sensitive data saved on a trainer's local computer and trainees' access log data on public servers are associated with a pseudonym generated via pseudonymisation technique. Thus, if attackers try to steal trainees' sensitive data via the Internet, it becomes difficult for attackers by deleting sensitive data on a trainer's local computer.
{"title":"An Anti-phishing Training System for Security Awareness and Education Considering Prevention of Information Leakage","authors":"Masayuki Higashino, Toshiya Kawato, Motoyuki Ohmori, T. Kawamura","doi":"10.1109/INFOMAN.2019.8714691","DOIUrl":"https://doi.org/10.1109/INFOMAN.2019.8714691","url":null,"abstract":"Phishing is one of the dangerous threats to organisations. A sender of a phishing e-mail pretends to be a trusted person or a system in order to steal valuable information including personal identity data and credentials. In order to deal with this problem, many organisations have implemented an anti-phishing training. However, the outsourcing of an anti-phishing training requires a high cost. Additionally, many anti-phishing training systems provided by vendors save sensitive data such as e-mail addresses and names of trainees to public servers for an anti-phishing training. This architecture has a problem that attacking these public servers increases for the risk of information leakage about trainees. Therefore, this paper proposes an anti-phishing training system which does not save sensitive data such as an e-mail address and a name of trainees to public servers, and it is implementable at a low cost. This proposed system saves sensitive data to a trainer's local computer instead of public servers. A sensitive data saved on a trainer's local computer and trainees' access log data on public servers are associated with a pseudonym generated via pseudonymisation technique. Thus, if attackers try to steal trainees' sensitive data via the Internet, it becomes difficult for attackers by deleting sensitive data on a trainer's local computer.","PeriodicalId":186072,"journal":{"name":"2019 5th International Conference on Information Management (ICIM)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134311771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-24DOI: 10.1109/INFOMAN.2019.8714700
Yiying Wang, Zang Yeze
Cryptocurrency is playing an increasingly important role in reshaping the financial system due to its growing popular appeal and mechant acceptance. While many people are making investments in Cryptocurrency, the dynamical features, uncertainty, the predictability of Cryptocurrency are still mostly unknown, which dramatically risk the investments. It is a matter to try to understand the factors that infiuence the value formation. In this study, we use advanced artificial intelligence frameworks of fully connected Artificial Neural Network (ANN) and Long Short-Term Memory (LSTM) Recurrent Neural Network to analyse the price dynamics of Bitcoin, Etherum, and Ripple. We find that ANN tends to rely more on long-term history while LSTM tends to rely more on short-term dynamics, which indicate the efficiency of LSTM to utilise useful information hidden in historical memory is stronger than ANN. However, given enough historical information ANN can achieve a similar accuracy, compared with LSTM. This study provides a unique demonstration that Cryptocurrency market price is predictable. However, the explanation of the predictability could vary depending on the nature of the involved machine-learning model.
{"title":"Cryptocurrency Price Analysis with Artificial Intelligence","authors":"Yiying Wang, Zang Yeze","doi":"10.1109/INFOMAN.2019.8714700","DOIUrl":"https://doi.org/10.1109/INFOMAN.2019.8714700","url":null,"abstract":"Cryptocurrency is playing an increasingly important role in reshaping the financial system due to its growing popular appeal and mechant acceptance. While many people are making investments in Cryptocurrency, the dynamical features, uncertainty, the predictability of Cryptocurrency are still mostly unknown, which dramatically risk the investments. It is a matter to try to understand the factors that infiuence the value formation. In this study, we use advanced artificial intelligence frameworks of fully connected Artificial Neural Network (ANN) and Long Short-Term Memory (LSTM) Recurrent Neural Network to analyse the price dynamics of Bitcoin, Etherum, and Ripple. We find that ANN tends to rely more on long-term history while LSTM tends to rely more on short-term dynamics, which indicate the efficiency of LSTM to utilise useful information hidden in historical memory is stronger than ANN. However, given enough historical information ANN can achieve a similar accuracy, compared with LSTM. This study provides a unique demonstration that Cryptocurrency market price is predictable. However, the explanation of the predictability could vary depending on the nature of the involved machine-learning model.","PeriodicalId":186072,"journal":{"name":"2019 5th International Conference on Information Management (ICIM)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126431426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-24DOI: 10.1109/INFOMAN.2019.8714682
Muhammad Qasim Riaz, Wasi Haider Butt, S. Rehman
Requirements Engineering is one of the most important phases of the software development lifecycle. The success of the whole software project depends upon the quality of the requirements. But as we know that mostly the software requirements are stated and documented in the natural language. The requirements written in natural language can be ambiguous and inconsistent. These ambiguities and inconsistencies can lead to misinterpretations and wrong implementations in design and development phase. To address these issues a number of approaches, tools and techniques have been proposed for the automatic detection of natural language ambiguities form software requirement documents. However, to the best of our knowledge, there is very little work done to compare and analyze the differences between these tools and techniques. In this paper, we presented a state of art survey of the currently available tools and techniques for the automatic detection of natural language ambiguities from software requirements. We also focused on figuring out the popularity of different tools and techniques on the basis of citations. This research $mathbf{will}$ help the practitioners and researchers to get the latest insights in the above-mentioned context.
{"title":"Automatic Detection of Ambiguous Software Requirements: An Insight","authors":"Muhammad Qasim Riaz, Wasi Haider Butt, S. Rehman","doi":"10.1109/INFOMAN.2019.8714682","DOIUrl":"https://doi.org/10.1109/INFOMAN.2019.8714682","url":null,"abstract":"Requirements Engineering is one of the most important phases of the software development lifecycle. The success of the whole software project depends upon the quality of the requirements. But as we know that mostly the software requirements are stated and documented in the natural language. The requirements written in natural language can be ambiguous and inconsistent. These ambiguities and inconsistencies can lead to misinterpretations and wrong implementations in design and development phase. To address these issues a number of approaches, tools and techniques have been proposed for the automatic detection of natural language ambiguities form software requirement documents. However, to the best of our knowledge, there is very little work done to compare and analyze the differences between these tools and techniques. In this paper, we presented a state of art survey of the currently available tools and techniques for the automatic detection of natural language ambiguities from software requirements. We also focused on figuring out the popularity of different tools and techniques on the basis of citations. This research $mathbf{will}$ help the practitioners and researchers to get the latest insights in the above-mentioned context.","PeriodicalId":186072,"journal":{"name":"2019 5th International Conference on Information Management (ICIM)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124817398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-24DOI: 10.1109/INFOMAN.2019.8714673
Jiao Wang, Xin Zhang, Chuan-Yun Li
The diffusion of interorganizational information system is a dynamic process. Studying the dynamic changes of IOIS from a macro perspective can not only promote the further spread of IOIS, but also have guiding significance for enterprises to adopt IOIS. We used the system dynamics method to construct the dynamic model of IOIS diffusion, used the sensitivity analysis method to carry out the model test, and selected Vensim to carry out the system simulation for the model. The simulation results shown that government policy support and guidance, bank loan ability, impact of adoption organizations, university(scientific research institution)support and support of software companies have different degrees of influence on IOIS diffusion.
{"title":"Research on Dynamic Model of Interorganizational Information System Diffusion Based on System Dynamics","authors":"Jiao Wang, Xin Zhang, Chuan-Yun Li","doi":"10.1109/INFOMAN.2019.8714673","DOIUrl":"https://doi.org/10.1109/INFOMAN.2019.8714673","url":null,"abstract":"The diffusion of interorganizational information system is a dynamic process. Studying the dynamic changes of IOIS from a macro perspective can not only promote the further spread of IOIS, but also have guiding significance for enterprises to adopt IOIS. We used the system dynamics method to construct the dynamic model of IOIS diffusion, used the sensitivity analysis method to carry out the model test, and selected Vensim to carry out the system simulation for the model. The simulation results shown that government policy support and guidance, bank loan ability, impact of adoption organizations, university(scientific research institution)support and support of software companies have different degrees of influence on IOIS diffusion.","PeriodicalId":186072,"journal":{"name":"2019 5th International Conference on Information Management (ICIM)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125880427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-24DOI: 10.1109/INFOMAN.2019.8714658
Hong-xing Fang
In the context of global economic financialization, building Guangdong-Hong Kong-Macao Greater Bay Area into a world economic center with strong guiding and radiation force cannot be separated from the support of financial system. As an important part of the financial market, commercial bank's operating performance reflects the performance of the entire financial market. This paper uses relational network DEA model based on series system to measure the operating efficiencies of 20 major commercial banks in Guangdong-Hong Kong-Macao Greater Bay Area and evaluates the performance of commercial banks in the area to give some useful suggestions. The results show that the overall operating efficiency of the commercial banks in the area is not high. The pure technical efficiency of fund raising is relatively low compared to fund utilization, but the two stages have good correlation validity. The low technical efficiency of the system is mainly caused by the low pure technical efficiency. Within the area, there are significant differences in efficiency among the three regions-Guangdong city cluster, Hong Kong and Macao.
{"title":"An Empirical Study on the Performance of Commercial Banks in Guangdong-Hong Kong-Macao Greater Bay Area Based on Relational Network DEA Model","authors":"Hong-xing Fang","doi":"10.1109/INFOMAN.2019.8714658","DOIUrl":"https://doi.org/10.1109/INFOMAN.2019.8714658","url":null,"abstract":"In the context of global economic financialization, building Guangdong-Hong Kong-Macao Greater Bay Area into a world economic center with strong guiding and radiation force cannot be separated from the support of financial system. As an important part of the financial market, commercial bank's operating performance reflects the performance of the entire financial market. This paper uses relational network DEA model based on series system to measure the operating efficiencies of 20 major commercial banks in Guangdong-Hong Kong-Macao Greater Bay Area and evaluates the performance of commercial banks in the area to give some useful suggestions. The results show that the overall operating efficiency of the commercial banks in the area is not high. The pure technical efficiency of fund raising is relatively low compared to fund utilization, but the two stages have good correlation validity. The low technical efficiency of the system is mainly caused by the low pure technical efficiency. Within the area, there are significant differences in efficiency among the three regions-Guangdong city cluster, Hong Kong and Macao.","PeriodicalId":186072,"journal":{"name":"2019 5th International Conference on Information Management (ICIM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132333901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-24DOI: 10.1109/INFOMAN.2019.8714720
N. Almujally, M. Joy
Knowledge management (KM) has become significant for gaining a competitive advantage in many organizations, specifically higher education institutions (HEIs) which are knowledge-intensive environments. Instructors generate a considerable amount of valuable teaching-related knowledge that has accumulated through years of teaching, and needs to be gathered and shared among communities of instructors. Identifying and sharing teaching experiences means enhancing successes by helping instructors to learn from each other and deliver better quality teaching. Many universities still struggle in documenting, sharing and reusing the knowledge gained by instructors due to the absence of a collaborative platform where novices and experts can interact and collaborate. In this paper, we propose a knowledge management framework that aims to enhance the process of acquiring, sharing and reusing teaching practices. Meta-requirements are explored by conducting an investigative study with instructors who work in Saudi universities and then translating these requirements into design principles for efficient and effective knowledge management system development in the higher education context.
{"title":"A Framework for Improving the Sharing of Teaching Practices Through Web 2.0 Technology for Academic Instructors","authors":"N. Almujally, M. Joy","doi":"10.1109/INFOMAN.2019.8714720","DOIUrl":"https://doi.org/10.1109/INFOMAN.2019.8714720","url":null,"abstract":"Knowledge management (KM) has become significant for gaining a competitive advantage in many organizations, specifically higher education institutions (HEIs) which are knowledge-intensive environments. Instructors generate a considerable amount of valuable teaching-related knowledge that has accumulated through years of teaching, and needs to be gathered and shared among communities of instructors. Identifying and sharing teaching experiences means enhancing successes by helping instructors to learn from each other and deliver better quality teaching. Many universities still struggle in documenting, sharing and reusing the knowledge gained by instructors due to the absence of a collaborative platform where novices and experts can interact and collaborate. In this paper, we propose a knowledge management framework that aims to enhance the process of acquiring, sharing and reusing teaching practices. Meta-requirements are explored by conducting an investigative study with instructors who work in Saudi universities and then translating these requirements into design principles for efficient and effective knowledge management system development in the higher education context.","PeriodicalId":186072,"journal":{"name":"2019 5th International Conference on Information Management (ICIM)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121228130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/INFOMAN.2019.8714684
Gilang Maulana Majid
Considering the high competition within the tourism industry, a demand for an effective means of promotion will always be in place. In Indonesia, the program of tourism ambassadors has been widely spread throughout the archipelago, albeit the very little global attention it receives. However, one must admit that despite the problems and stigmata this program embodies, it may offer lots of potentials that might significantly boost the related sector in the future. This study attempts to shed light on the discourse by applying content analysis on five Instagram accounts of tourism ambassadors' associations and the responses of selected informants representing each related organisation. The research findings demonstrate that albeit the great extent of contributions that the tourism ambassadors already gave to the society, the program itself still requires a lot of optimisation efforts before being able to satisfy public expectation and contribute to the increase of the number of tourists
{"title":"A Study on ‘Tourism Ambassadors’ in Indonesia Content Analysis, Instagram Accounts, and Tourism Promotion Strategy","authors":"Gilang Maulana Majid","doi":"10.1109/INFOMAN.2019.8714684","DOIUrl":"https://doi.org/10.1109/INFOMAN.2019.8714684","url":null,"abstract":"Considering the high competition within the tourism industry, a demand for an effective means of promotion will always be in place. In Indonesia, the program of tourism ambassadors has been widely spread throughout the archipelago, albeit the very little global attention it receives. However, one must admit that despite the problems and stigmata this program embodies, it may offer lots of potentials that might significantly boost the related sector in the future. This study attempts to shed light on the discourse by applying content analysis on five Instagram accounts of tourism ambassadors' associations and the responses of selected informants representing each related organisation. The research findings demonstrate that albeit the great extent of contributions that the tourism ambassadors already gave to the society, the program itself still requires a lot of optimisation efforts before being able to satisfy public expectation and contribute to the increase of the number of tourists","PeriodicalId":186072,"journal":{"name":"2019 5th International Conference on Information Management (ICIM)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123860311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/INFOMAN.2019.8714714
Wang Li
This paper takes Wuhan University of Technology 2007–2017 WOS database SCIE/SSCI from the data source, based on the ESI database as the foundation, the potential subject prediction method, ESI exploration of Wuhan University of Technology has not yet entered the world's top 1%, has certain advantages and potential, the future may enter the ESI rankings; take the Potential subject physics subject as the research object to analyzed the index of ESI competitiveness of Wuhan University of Technology. To explore the discipline into the ESI in the top 1% of the world's potential, and proposes the corresponding guide path, to provide data support for the development of disciplines, enhance the international reputation, and complete the path of Wuhan University of Technology to build first-class universities and first-class disciplines.
{"title":"The Prediction and Competitiveness Performance Analysis of the ESI Potential Discipline Research under the Vision of the Construction of “Double First-Class”","authors":"Wang Li","doi":"10.1109/INFOMAN.2019.8714714","DOIUrl":"https://doi.org/10.1109/INFOMAN.2019.8714714","url":null,"abstract":"This paper takes Wuhan University of Technology 2007–2017 WOS database SCIE/SSCI from the data source, based on the ESI database as the foundation, the potential subject prediction method, ESI exploration of Wuhan University of Technology has not yet entered the world's top 1%, has certain advantages and potential, the future may enter the ESI rankings; take the Potential subject physics subject as the research object to analyzed the index of ESI competitiveness of Wuhan University of Technology. To explore the discipline into the ESI in the top 1% of the world's potential, and proposes the corresponding guide path, to provide data support for the development of disciplines, enhance the international reputation, and complete the path of Wuhan University of Technology to build first-class universities and first-class disciplines.","PeriodicalId":186072,"journal":{"name":"2019 5th International Conference on Information Management (ICIM)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128378013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}