首页 > 最新文献

2019 5th International Conference on Information Management (ICIM)最新文献

英文 中文
Hardware Implementation of Compact Genetic Algorithm for Robot Path Planning in Globally Static Environment in 8-bit Microcontroller 全局静态环境下机器人路径规划的紧凑遗传算法在8位微控制器上的硬件实现
Pub Date : 2019-03-24 DOI: 10.1109/INFOMAN.2019.8714672
Mian Ali, Omer Farooq, M. D. Khan, S. Haxha
In this paper, hardware implementation of genetic algorithm for Robot path planning in Globally static Environment is presented. Genetic algorithm is modified and implemented in 8-bit Microtontroller (MCU) PIC18F452. The genetic algorithm is designed to decrease number of iteration and processing power by using predefined priorities for parenti initial path generation rather than creating parent paths randomly. The unmanned ground vehicle (UGV) is designed which receives starting node, final destination and obstacles wirelessly, it then create multiple parent paths by using different priorities, cross over to create new child paths, uses distance as fitness function for determining Optimal or shortest path while avoiding the obstacles and uses stepper motors with three- dimensional movements to reach its destination. The environment is 5×5 static Grid Map in which obstacles are known before path planning. The MCU determines optimal path with no obstacles and require minimum distance to reach its destination.
本文给出了全局静态环境下机器人路径规划的遗传算法的硬件实现。对遗传算法进行了改进,并在8位微控制器PIC18F452上实现。遗传算法采用预定义的优先级来生成父路径,而不是随机生成父路径,从而减少迭代次数和处理能力。设计了一种无人地面车辆(UGV),它无线接收起始节点、最终目的地和障碍物,然后使用不同的优先级创建多个父路径,交叉创建新的子路径,以距离作为适应度函数确定最优路径或最短路径,同时避开障碍物,并使用具有三维运动的步进电机到达目的地。环境是5×5静态网格图,在路径规划之前已知障碍物。MCU确定无障碍物的最优路径,并以最小的距离到达目的地。
{"title":"Hardware Implementation of Compact Genetic Algorithm for Robot Path Planning in Globally Static Environment in 8-bit Microcontroller","authors":"Mian Ali, Omer Farooq, M. D. Khan, S. Haxha","doi":"10.1109/INFOMAN.2019.8714672","DOIUrl":"https://doi.org/10.1109/INFOMAN.2019.8714672","url":null,"abstract":"In this paper, hardware implementation of genetic algorithm for Robot path planning in Globally static Environment is presented. Genetic algorithm is modified and implemented in 8-bit Microtontroller (MCU) PIC18F452. The genetic algorithm is designed to decrease number of iteration and processing power by using predefined priorities for parenti initial path generation rather than creating parent paths randomly. The unmanned ground vehicle (UGV) is designed which receives starting node, final destination and obstacles wirelessly, it then create multiple parent paths by using different priorities, cross over to create new child paths, uses distance as fitness function for determining Optimal or shortest path while avoiding the obstacles and uses stepper motors with three- dimensional movements to reach its destination. The environment is 5×5 static Grid Map in which obstacles are known before path planning. The MCU determines optimal path with no obstacles and require minimum distance to reach its destination.","PeriodicalId":186072,"journal":{"name":"2019 5th International Conference on Information Management (ICIM)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126580978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Early Study of IT Outsourcing in Public Organizations in the Province of Manabi - Ecuador 厄瓜多尔马纳比省公共机构IT外包的早期研究
Pub Date : 2019-03-24 DOI: 10.1109/INFOMAN.2019.8714688
Igor Aguilar Alonso, Miguel Fabián Delgado Cedeño
The Outsourcing of information technology (IT) is the contracting of technological services between a public or private organization and another that are dedicated to the provision of one or several specific services to meet their requirements. In the outsourcing of IT services, there are several difficulties such as limited knowledge of IT personnel about the risks of Outsourcing, poor understanding of vulnerabilities, threats, and the growth of complexity to manage Outsourcing as it expands in the organizations, among others. Due to the problems, we posed the following question: What is the actual situation of the IT outsourcing in public organizations in the province of Manabi - Ecuador? The objective of this research is to measure the results through the field study about the knowledge, problems, the impact of the risks of IT Outsourcing from the perspective of IT managers and IT Professionals of the public organizations in the province of Manabi, Ecuador. The methodology used is a survey aimed at 113 people working in 40 public organizations. The conclusions more important are that more of half of respondents do not know about of IT outsourcing processes in public organizations. However, the have knowledge, indicated that the frequency that occur the IT outsourcing risks is very high, being the technical areas the most affected.
信息技术外包(IT)是公共或私人组织与另一个组织之间的技术服务合同,该组织致力于提供一种或几种特定服务以满足其需求。在IT服务的外包中,存在一些困难,例如IT人员对外包风险的知识有限,对漏洞、威胁的理解不足,以及随着外包在组织中扩展而管理外包的复杂性的增长等。针对这些问题,我们提出了以下问题:厄瓜多尔马纳比省公共机构IT外包的实际情况如何?本研究的目的是从厄瓜多尔马纳比省公共组织的IT管理人员和IT专业人员的角度,对IT外包的知识、问题、风险影响进行实地研究,以衡量结果。采用的方法是以40个公共机关的113名职员为对象进行的问卷调查。更重要的结论是,超过一半的受访者不了解公共组织的IT外包流程。然而,有知识表明,IT外包风险发生的频率非常高,是受影响最大的技术领域。
{"title":"Early Study of IT Outsourcing in Public Organizations in the Province of Manabi - Ecuador","authors":"Igor Aguilar Alonso, Miguel Fabián Delgado Cedeño","doi":"10.1109/INFOMAN.2019.8714688","DOIUrl":"https://doi.org/10.1109/INFOMAN.2019.8714688","url":null,"abstract":"The Outsourcing of information technology (IT) is the contracting of technological services between a public or private organization and another that are dedicated to the provision of one or several specific services to meet their requirements. In the outsourcing of IT services, there are several difficulties such as limited knowledge of IT personnel about the risks of Outsourcing, poor understanding of vulnerabilities, threats, and the growth of complexity to manage Outsourcing as it expands in the organizations, among others. Due to the problems, we posed the following question: What is the actual situation of the IT outsourcing in public organizations in the province of Manabi - Ecuador? The objective of this research is to measure the results through the field study about the knowledge, problems, the impact of the risks of IT Outsourcing from the perspective of IT managers and IT Professionals of the public organizations in the province of Manabi, Ecuador. The methodology used is a survey aimed at 113 people working in 40 public organizations. The conclusions more important are that more of half of respondents do not know about of IT outsourcing processes in public organizations. However, the have knowledge, indicated that the frequency that occur the IT outsourcing risks is very high, being the technical areas the most affected.","PeriodicalId":186072,"journal":{"name":"2019 5th International Conference on Information Management (ICIM)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124657725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Anti-phishing Training System for Security Awareness and Education Considering Prevention of Information Leakage 考虑防止信息泄露的反网络钓鱼安全意识教育培训体系
Pub Date : 2019-03-24 DOI: 10.1109/INFOMAN.2019.8714691
Masayuki Higashino, Toshiya Kawato, Motoyuki Ohmori, T. Kawamura
Phishing is one of the dangerous threats to organisations. A sender of a phishing e-mail pretends to be a trusted person or a system in order to steal valuable information including personal identity data and credentials. In order to deal with this problem, many organisations have implemented an anti-phishing training. However, the outsourcing of an anti-phishing training requires a high cost. Additionally, many anti-phishing training systems provided by vendors save sensitive data such as e-mail addresses and names of trainees to public servers for an anti-phishing training. This architecture has a problem that attacking these public servers increases for the risk of information leakage about trainees. Therefore, this paper proposes an anti-phishing training system which does not save sensitive data such as an e-mail address and a name of trainees to public servers, and it is implementable at a low cost. This proposed system saves sensitive data to a trainer's local computer instead of public servers. A sensitive data saved on a trainer's local computer and trainees' access log data on public servers are associated with a pseudonym generated via pseudonymisation technique. Thus, if attackers try to steal trainees' sensitive data via the Internet, it becomes difficult for attackers by deleting sensitive data on a trainer's local computer.
网络钓鱼是组织面临的危险威胁之一。网络钓鱼电子邮件的发送者假装成受信任的人或系统,以窃取包括个人身份数据和凭据在内的有价值的信息。为了解决这个问题,许多组织已经实施了反网络钓鱼培训。然而,外包反网络钓鱼培训需要很高的成本。此外,供应商提供的许多反网络钓鱼培训系统将敏感数据(如电子邮件地址和学员姓名)保存到公共服务器上以进行反网络钓鱼培训。这种架构存在一个问题,即攻击这些公共服务器会增加学员信息泄露的风险。因此,本文提出了一种不将学员的电子邮件地址、姓名等敏感数据保存到公共服务器上的反钓鱼培训系统,该系统具有低成本的可实现性。该系统将敏感数据保存到培训师的本地计算机,而不是公共服务器。保存在培训师本地计算机上的敏感数据和公共服务器上的学员访问日志数据与通过假名化技术生成的假名相关联。因此,如果攻击者试图通过互联网窃取学员的敏感数据,攻击者很难删除培训师本地计算机上的敏感数据。
{"title":"An Anti-phishing Training System for Security Awareness and Education Considering Prevention of Information Leakage","authors":"Masayuki Higashino, Toshiya Kawato, Motoyuki Ohmori, T. Kawamura","doi":"10.1109/INFOMAN.2019.8714691","DOIUrl":"https://doi.org/10.1109/INFOMAN.2019.8714691","url":null,"abstract":"Phishing is one of the dangerous threats to organisations. A sender of a phishing e-mail pretends to be a trusted person or a system in order to steal valuable information including personal identity data and credentials. In order to deal with this problem, many organisations have implemented an anti-phishing training. However, the outsourcing of an anti-phishing training requires a high cost. Additionally, many anti-phishing training systems provided by vendors save sensitive data such as e-mail addresses and names of trainees to public servers for an anti-phishing training. This architecture has a problem that attacking these public servers increases for the risk of information leakage about trainees. Therefore, this paper proposes an anti-phishing training system which does not save sensitive data such as an e-mail address and a name of trainees to public servers, and it is implementable at a low cost. This proposed system saves sensitive data to a trainer's local computer instead of public servers. A sensitive data saved on a trainer's local computer and trainees' access log data on public servers are associated with a pseudonym generated via pseudonymisation technique. Thus, if attackers try to steal trainees' sensitive data via the Internet, it becomes difficult for attackers by deleting sensitive data on a trainer's local computer.","PeriodicalId":186072,"journal":{"name":"2019 5th International Conference on Information Management (ICIM)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134311771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Cryptocurrency Price Analysis with Artificial Intelligence 用人工智能分析加密货币价格
Pub Date : 2019-03-24 DOI: 10.1109/INFOMAN.2019.8714700
Yiying Wang, Zang Yeze
Cryptocurrency is playing an increasingly important role in reshaping the financial system due to its growing popular appeal and mechant acceptance. While many people are making investments in Cryptocurrency, the dynamical features, uncertainty, the predictability of Cryptocurrency are still mostly unknown, which dramatically risk the investments. It is a matter to try to understand the factors that infiuence the value formation. In this study, we use advanced artificial intelligence frameworks of fully connected Artificial Neural Network (ANN) and Long Short-Term Memory (LSTM) Recurrent Neural Network to analyse the price dynamics of Bitcoin, Etherum, and Ripple. We find that ANN tends to rely more on long-term history while LSTM tends to rely more on short-term dynamics, which indicate the efficiency of LSTM to utilise useful information hidden in historical memory is stronger than ANN. However, given enough historical information ANN can achieve a similar accuracy, compared with LSTM. This study provides a unique demonstration that Cryptocurrency market price is predictable. However, the explanation of the predictability could vary depending on the nature of the involved machine-learning model.
由于其越来越受欢迎的吸引力和机制接受度,加密货币在重塑金融体系方面发挥着越来越重要的作用。虽然很多人都在投资加密货币,但加密货币的动态特征、不确定性、可预测性仍然大多是未知的,这给投资带来了极大的风险。试图理解影响价值形成的因素是一个问题。在本研究中,我们使用全连接人工神经网络(ANN)和长短期记忆(LSTM)递归神经网络的先进人工智能框架来分析比特币、以太坊和瑞波币的价格动态。我们发现,人工神经网络更倾向于依赖长期历史,而LSTM更倾向于依赖短期动态,这表明LSTM利用隐藏在历史记忆中的有用信息的效率比人工神经网络强。然而,与LSTM相比,给定足够的历史信息,人工神经网络可以达到相似的精度。这项研究提供了一个独特的证明,即加密货币市场价格是可预测的。然而,对可预测性的解释可能会根据所涉及的机器学习模型的性质而有所不同。
{"title":"Cryptocurrency Price Analysis with Artificial Intelligence","authors":"Yiying Wang, Zang Yeze","doi":"10.1109/INFOMAN.2019.8714700","DOIUrl":"https://doi.org/10.1109/INFOMAN.2019.8714700","url":null,"abstract":"Cryptocurrency is playing an increasingly important role in reshaping the financial system due to its growing popular appeal and mechant acceptance. While many people are making investments in Cryptocurrency, the dynamical features, uncertainty, the predictability of Cryptocurrency are still mostly unknown, which dramatically risk the investments. It is a matter to try to understand the factors that infiuence the value formation. In this study, we use advanced artificial intelligence frameworks of fully connected Artificial Neural Network (ANN) and Long Short-Term Memory (LSTM) Recurrent Neural Network to analyse the price dynamics of Bitcoin, Etherum, and Ripple. We find that ANN tends to rely more on long-term history while LSTM tends to rely more on short-term dynamics, which indicate the efficiency of LSTM to utilise useful information hidden in historical memory is stronger than ANN. However, given enough historical information ANN can achieve a similar accuracy, compared with LSTM. This study provides a unique demonstration that Cryptocurrency market price is predictable. However, the explanation of the predictability could vary depending on the nature of the involved machine-learning model.","PeriodicalId":186072,"journal":{"name":"2019 5th International Conference on Information Management (ICIM)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126431426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Automatic Detection of Ambiguous Software Requirements: An Insight 模糊软件需求的自动检测
Pub Date : 2019-03-24 DOI: 10.1109/INFOMAN.2019.8714682
Muhammad Qasim Riaz, Wasi Haider Butt, S. Rehman
Requirements Engineering is one of the most important phases of the software development lifecycle. The success of the whole software project depends upon the quality of the requirements. But as we know that mostly the software requirements are stated and documented in the natural language. The requirements written in natural language can be ambiguous and inconsistent. These ambiguities and inconsistencies can lead to misinterpretations and wrong implementations in design and development phase. To address these issues a number of approaches, tools and techniques have been proposed for the automatic detection of natural language ambiguities form software requirement documents. However, to the best of our knowledge, there is very little work done to compare and analyze the differences between these tools and techniques. In this paper, we presented a state of art survey of the currently available tools and techniques for the automatic detection of natural language ambiguities from software requirements. We also focused on figuring out the popularity of different tools and techniques on the basis of citations. This research $mathbf{will}$ help the practitioners and researchers to get the latest insights in the above-mentioned context.
需求工程是软件开发生命周期中最重要的阶段之一。整个软件项目的成功取决于需求的质量。但是正如我们所知道的,大多数软件需求都是用自然语言陈述和记录的。用自然语言编写的需求可能是模糊的和不一致的。在设计和开发阶段,这些歧义和不一致可能导致误解和错误的实现。为了解决这些问题,已经提出了许多方法、工具和技术来自动检测软件需求文档中的自然语言歧义。然而,据我们所知,对这些工具和技术之间的差异进行比较和分析的工作很少。在本文中,我们展示了当前可用的工具和技术的现状,用于从软件需求中自动检测自然语言歧义。我们还专注于在引用的基础上找出不同工具和技术的流行程度。这项研究$mathbf{将}$帮助从业者和研究人员在上述背景下获得最新的见解。
{"title":"Automatic Detection of Ambiguous Software Requirements: An Insight","authors":"Muhammad Qasim Riaz, Wasi Haider Butt, S. Rehman","doi":"10.1109/INFOMAN.2019.8714682","DOIUrl":"https://doi.org/10.1109/INFOMAN.2019.8714682","url":null,"abstract":"Requirements Engineering is one of the most important phases of the software development lifecycle. The success of the whole software project depends upon the quality of the requirements. But as we know that mostly the software requirements are stated and documented in the natural language. The requirements written in natural language can be ambiguous and inconsistent. These ambiguities and inconsistencies can lead to misinterpretations and wrong implementations in design and development phase. To address these issues a number of approaches, tools and techniques have been proposed for the automatic detection of natural language ambiguities form software requirement documents. However, to the best of our knowledge, there is very little work done to compare and analyze the differences between these tools and techniques. In this paper, we presented a state of art survey of the currently available tools and techniques for the automatic detection of natural language ambiguities from software requirements. We also focused on figuring out the popularity of different tools and techniques on the basis of citations. This research $mathbf{will}$ help the practitioners and researchers to get the latest insights in the above-mentioned context.","PeriodicalId":186072,"journal":{"name":"2019 5th International Conference on Information Management (ICIM)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124817398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Research on Dynamic Model of Interorganizational Information System Diffusion Based on System Dynamics 基于系统动力学的组织间信息系统扩散动态模型研究
Pub Date : 2019-03-24 DOI: 10.1109/INFOMAN.2019.8714673
Jiao Wang, Xin Zhang, Chuan-Yun Li
The diffusion of interorganizational information system is a dynamic process. Studying the dynamic changes of IOIS from a macro perspective can not only promote the further spread of IOIS, but also have guiding significance for enterprises to adopt IOIS. We used the system dynamics method to construct the dynamic model of IOIS diffusion, used the sensitivity analysis method to carry out the model test, and selected Vensim to carry out the system simulation for the model. The simulation results shown that government policy support and guidance, bank loan ability, impact of adoption organizations, university(scientific research institution)support and support of software companies have different degrees of influence on IOIS diffusion.
组织间信息系统的扩散是一个动态的过程。从宏观角度研究产业信息系统的动态变化,不仅可以促进产业信息系统的进一步推广,而且对企业采用产业信息系统具有指导意义。采用系统动力学方法构建IOIS扩散动力学模型,采用灵敏度分析法进行模型检验,并选用Vensim软件对模型进行系统仿真。仿真结果表明,政府政策支持和引导、银行贷款能力、收养机构的影响、大学(科研机构)的支持和软件公司的支持对信息系统扩散有不同程度的影响。
{"title":"Research on Dynamic Model of Interorganizational Information System Diffusion Based on System Dynamics","authors":"Jiao Wang, Xin Zhang, Chuan-Yun Li","doi":"10.1109/INFOMAN.2019.8714673","DOIUrl":"https://doi.org/10.1109/INFOMAN.2019.8714673","url":null,"abstract":"The diffusion of interorganizational information system is a dynamic process. Studying the dynamic changes of IOIS from a macro perspective can not only promote the further spread of IOIS, but also have guiding significance for enterprises to adopt IOIS. We used the system dynamics method to construct the dynamic model of IOIS diffusion, used the sensitivity analysis method to carry out the model test, and selected Vensim to carry out the system simulation for the model. The simulation results shown that government policy support and guidance, bank loan ability, impact of adoption organizations, university(scientific research institution)support and support of software companies have different degrees of influence on IOIS diffusion.","PeriodicalId":186072,"journal":{"name":"2019 5th International Conference on Information Management (ICIM)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125880427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Empirical Study on the Performance of Commercial Banks in Guangdong-Hong Kong-Macao Greater Bay Area Based on Relational Network DEA Model 基于关系网络DEA模型的粤港澳大湾区商业银行绩效实证研究
Pub Date : 2019-03-24 DOI: 10.1109/INFOMAN.2019.8714658
Hong-xing Fang
In the context of global economic financialization, building Guangdong-Hong Kong-Macao Greater Bay Area into a world economic center with strong guiding and radiation force cannot be separated from the support of financial system. As an important part of the financial market, commercial bank's operating performance reflects the performance of the entire financial market. This paper uses relational network DEA model based on series system to measure the operating efficiencies of 20 major commercial banks in Guangdong-Hong Kong-Macao Greater Bay Area and evaluates the performance of commercial banks in the area to give some useful suggestions. The results show that the overall operating efficiency of the commercial banks in the area is not high. The pure technical efficiency of fund raising is relatively low compared to fund utilization, but the two stages have good correlation validity. The low technical efficiency of the system is mainly caused by the low pure technical efficiency. Within the area, there are significant differences in efficiency among the three regions-Guangdong city cluster, Hong Kong and Macao.
在全球经济金融化的背景下,粤港澳大湾区建设成为具有强大指导性和辐射力的世界经济中心,离不开金融体系的支撑。商业银行作为金融市场的重要组成部分,其经营业绩反映了整个金融市场的经营状况。本文采用基于序列系统的关系网络DEA模型对粤港澳大湾区20家主要商业银行的经营效率进行了测度,并对粤港澳大湾区商业银行的经营绩效进行了评价,提出了一些有益的建议。结果表明,该地区商业银行的整体经营效率不高。筹资的纯技术效率与资金利用相比相对较低,但两者具有较好的相关效度。系统技术效率低主要是由于纯技术效率低造成的。在区域内,广东城市群、香港、澳门三个区域的效率存在显著差异。
{"title":"An Empirical Study on the Performance of Commercial Banks in Guangdong-Hong Kong-Macao Greater Bay Area Based on Relational Network DEA Model","authors":"Hong-xing Fang","doi":"10.1109/INFOMAN.2019.8714658","DOIUrl":"https://doi.org/10.1109/INFOMAN.2019.8714658","url":null,"abstract":"In the context of global economic financialization, building Guangdong-Hong Kong-Macao Greater Bay Area into a world economic center with strong guiding and radiation force cannot be separated from the support of financial system. As an important part of the financial market, commercial bank's operating performance reflects the performance of the entire financial market. This paper uses relational network DEA model based on series system to measure the operating efficiencies of 20 major commercial banks in Guangdong-Hong Kong-Macao Greater Bay Area and evaluates the performance of commercial banks in the area to give some useful suggestions. The results show that the overall operating efficiency of the commercial banks in the area is not high. The pure technical efficiency of fund raising is relatively low compared to fund utilization, but the two stages have good correlation validity. The low technical efficiency of the system is mainly caused by the low pure technical efficiency. Within the area, there are significant differences in efficiency among the three regions-Guangdong city cluster, Hong Kong and Macao.","PeriodicalId":186072,"journal":{"name":"2019 5th International Conference on Information Management (ICIM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132333901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Framework for Improving the Sharing of Teaching Practices Through Web 2.0 Technology for Academic Instructors 基于web2.0技术的学术教师教学实践共享框架研究
Pub Date : 2019-03-24 DOI: 10.1109/INFOMAN.2019.8714720
N. Almujally, M. Joy
Knowledge management (KM) has become significant for gaining a competitive advantage in many organizations, specifically higher education institutions (HEIs) which are knowledge-intensive environments. Instructors generate a considerable amount of valuable teaching-related knowledge that has accumulated through years of teaching, and needs to be gathered and shared among communities of instructors. Identifying and sharing teaching experiences means enhancing successes by helping instructors to learn from each other and deliver better quality teaching. Many universities still struggle in documenting, sharing and reusing the knowledge gained by instructors due to the absence of a collaborative platform where novices and experts can interact and collaborate. In this paper, we propose a knowledge management framework that aims to enhance the process of acquiring, sharing and reusing teaching practices. Meta-requirements are explored by conducting an investigative study with instructors who work in Saudi universities and then translating these requirements into design principles for efficient and effective knowledge management system development in the higher education context.
在许多组织中,知识管理(KM)已经成为获得竞争优势的重要手段,特别是在知识密集型环境中的高等教育机构(HEIs)。教师通过多年的教学积累了大量有价值的教学相关知识,需要在教师社区中收集和共享。识别和分享教学经验意味着通过帮助教师相互学习和提供更高质量的教学来提高成功。由于缺乏一个协作平台,新手和专家可以进行互动和协作,许多大学仍然在努力记录、共享和重用教师获得的知识。在本文中,我们提出了一个知识管理框架,旨在加强教学实践的获取、共享和重用过程。通过与在沙特大学工作的教师进行调查研究,探索元需求,然后将这些需求转化为高等教育环境中高效和有效的知识管理系统开发的设计原则。
{"title":"A Framework for Improving the Sharing of Teaching Practices Through Web 2.0 Technology for Academic Instructors","authors":"N. Almujally, M. Joy","doi":"10.1109/INFOMAN.2019.8714720","DOIUrl":"https://doi.org/10.1109/INFOMAN.2019.8714720","url":null,"abstract":"Knowledge management (KM) has become significant for gaining a competitive advantage in many organizations, specifically higher education institutions (HEIs) which are knowledge-intensive environments. Instructors generate a considerable amount of valuable teaching-related knowledge that has accumulated through years of teaching, and needs to be gathered and shared among communities of instructors. Identifying and sharing teaching experiences means enhancing successes by helping instructors to learn from each other and deliver better quality teaching. Many universities still struggle in documenting, sharing and reusing the knowledge gained by instructors due to the absence of a collaborative platform where novices and experts can interact and collaborate. In this paper, we propose a knowledge management framework that aims to enhance the process of acquiring, sharing and reusing teaching practices. Meta-requirements are explored by conducting an investigative study with instructors who work in Saudi universities and then translating these requirements into design principles for efficient and effective knowledge management system development in the higher education context.","PeriodicalId":186072,"journal":{"name":"2019 5th International Conference on Information Management (ICIM)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121228130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Study on ‘Tourism Ambassadors’ in Indonesia Content Analysis, Instagram Accounts, and Tourism Promotion Strategy 印尼“旅游大使”的内容分析、Instagram账号与旅游推广策略研究
Pub Date : 2019-03-01 DOI: 10.1109/INFOMAN.2019.8714684
Gilang Maulana Majid
Considering the high competition within the tourism industry, a demand for an effective means of promotion will always be in place. In Indonesia, the program of tourism ambassadors has been widely spread throughout the archipelago, albeit the very little global attention it receives. However, one must admit that despite the problems and stigmata this program embodies, it may offer lots of potentials that might significantly boost the related sector in the future. This study attempts to shed light on the discourse by applying content analysis on five Instagram accounts of tourism ambassadors' associations and the responses of selected informants representing each related organisation. The research findings demonstrate that albeit the great extent of contributions that the tourism ambassadors already gave to the society, the program itself still requires a lot of optimisation efforts before being able to satisfy public expectation and contribute to the increase of the number of tourists
考虑到旅游业内部的激烈竞争,对有效促销手段的需求将始终存在。在印度尼西亚,旅游大使计划已经在整个群岛广泛传播,尽管它得到的全球关注很少。然而,我们必须承认,尽管这个项目存在着问题和耻辱,但它可能提供了许多潜力,可能会在未来显著推动相关行业的发展。本研究试图通过对五个旅游大使协会的Instagram账户和代表每个相关组织的选定线人的回应进行内容分析来阐明话语。研究结果表明,虽然旅游大使已经为社会做出了很大的贡献,但该计划本身仍需要大量的优化工作,才能满足公众的期望,并有助于增加游客数量
{"title":"A Study on ‘Tourism Ambassadors’ in Indonesia Content Analysis, Instagram Accounts, and Tourism Promotion Strategy","authors":"Gilang Maulana Majid","doi":"10.1109/INFOMAN.2019.8714684","DOIUrl":"https://doi.org/10.1109/INFOMAN.2019.8714684","url":null,"abstract":"Considering the high competition within the tourism industry, a demand for an effective means of promotion will always be in place. In Indonesia, the program of tourism ambassadors has been widely spread throughout the archipelago, albeit the very little global attention it receives. However, one must admit that despite the problems and stigmata this program embodies, it may offer lots of potentials that might significantly boost the related sector in the future. This study attempts to shed light on the discourse by applying content analysis on five Instagram accounts of tourism ambassadors' associations and the responses of selected informants representing each related organisation. The research findings demonstrate that albeit the great extent of contributions that the tourism ambassadors already gave to the society, the program itself still requires a lot of optimisation efforts before being able to satisfy public expectation and contribute to the increase of the number of tourists","PeriodicalId":186072,"journal":{"name":"2019 5th International Conference on Information Management (ICIM)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123860311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Prediction and Competitiveness Performance Analysis of the ESI Potential Discipline Research under the Vision of the Construction of “Double First-Class” “双一流”建设视野下ESI潜力学科研究的预测与竞争力绩效分析
Pub Date : 2019-03-01 DOI: 10.1109/INFOMAN.2019.8714714
Wang Li
This paper takes Wuhan University of Technology 2007–2017 WOS database SCIE/SSCI from the data source, based on the ESI database as the foundation, the potential subject prediction method, ESI exploration of Wuhan University of Technology has not yet entered the world's top 1%, has certain advantages and potential, the future may enter the ESI rankings; take the Potential subject physics subject as the research object to analyzed the index of ESI competitiveness of Wuhan University of Technology. To explore the discipline into the ESI in the top 1% of the world's potential, and proposes the corresponding guide path, to provide data support for the development of disciplines, enhance the international reputation, and complete the path of Wuhan University of Technology to build first-class universities and first-class disciplines.
本文以武汉理工大学2007-2017年WOS数据库SCIE/SSCI为数据源,基于ESI数据库为基础,采用潜力学科预测方法,探索武汉理工大学ESI目前尚未进入全球前1%,具有一定优势和潜力,未来可能进入ESI排名;以潜力学科物理学科为研究对象,对武汉理工大学ESI竞争力指标进行分析。探索学科进入ESI全球前1%的潜力,并提出相应的指导路径,为学科发展提供数据支撑,提升国际知名度,完成武汉理工大学建设一流大学、一流学科的路径。
{"title":"The Prediction and Competitiveness Performance Analysis of the ESI Potential Discipline Research under the Vision of the Construction of “Double First-Class”","authors":"Wang Li","doi":"10.1109/INFOMAN.2019.8714714","DOIUrl":"https://doi.org/10.1109/INFOMAN.2019.8714714","url":null,"abstract":"This paper takes Wuhan University of Technology 2007–2017 WOS database SCIE/SSCI from the data source, based on the ESI database as the foundation, the potential subject prediction method, ESI exploration of Wuhan University of Technology has not yet entered the world's top 1%, has certain advantages and potential, the future may enter the ESI rankings; take the Potential subject physics subject as the research object to analyzed the index of ESI competitiveness of Wuhan University of Technology. To explore the discipline into the ESI in the top 1% of the world's potential, and proposes the corresponding guide path, to provide data support for the development of disciplines, enhance the international reputation, and complete the path of Wuhan University of Technology to build first-class universities and first-class disciplines.","PeriodicalId":186072,"journal":{"name":"2019 5th International Conference on Information Management (ICIM)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128378013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2019 5th International Conference on Information Management (ICIM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1