Pub Date : 2019-07-01DOI: 10.33965/ijcsis_2019140106
Bernardo Alves Villarinho Lima, L. Almeida
Over the last four decades, Participatory Design (PD) gained traction in Human Computer Interaction (HCI) communities around the world. The approach presents alternatives in attempts to design with persons, and not only for them, in the form of techniques and design practices. Many contemporary PD researchers seek to turn the approach towards designing for democracy and empowerment of partner groups, contrary to PD practices which simply focus on the production of artifacts. Countering technocratic trends, researchers around the world seek to revitalize the discipline by proposing and promoting alternative research agendas, towards a critical and politically engaged discipline. Designers present themselves as actors and actresses in these processes, and understanding how they operate can inform future work on how design practices can promote empowerment despite the power gap between partners and designers. Perspectives from Science, Technology and Society (STS) studies informs critical theories to approach thinking of the designer’s role, agency, and responsibilities that go beyond the production of artifacts, including ethical, political, and technological concerns, the last one being comprehended in a non-deterministic way and encompass activities beyond the design of artifacts. This paper explores works from the 2018 Participatory Design Conference (PDC), seeking state-of-the-art on how researchers perceive themselves in their practices, using STS studies and Cr, and proposes a set of suggestions on how to plan situated participation.
{"title":"DESIGNERS IN CONTEMPORARY PARTICIPATORY DESIGN: PRACTICES AND AGENDAS","authors":"Bernardo Alves Villarinho Lima, L. Almeida","doi":"10.33965/ijcsis_2019140106","DOIUrl":"https://doi.org/10.33965/ijcsis_2019140106","url":null,"abstract":"Over the last four decades, Participatory Design (PD) gained traction in Human Computer Interaction (HCI) communities around the world. The approach presents alternatives in attempts to design with persons, and not only for them, in the form of techniques and design practices. Many contemporary PD researchers seek to turn the approach towards designing for democracy and empowerment of partner groups, contrary to PD practices which simply focus on the production of artifacts. Countering technocratic trends, researchers around the world seek to revitalize the discipline by proposing and promoting alternative research agendas, towards a critical and politically engaged discipline. Designers present themselves as actors and actresses in these processes, and understanding how they operate can inform future work on how design practices can promote empowerment despite the power gap between partners and designers. Perspectives from Science, Technology and Society (STS) studies informs critical theories to approach thinking of the designer’s role, agency, and responsibilities that go beyond the production of artifacts, including ethical, political, and technological concerns, the last one being comprehended in a non-deterministic way and encompass activities beyond the design of artifacts. This paper explores works from the 2018 Participatory Design Conference (PDC), seeking state-of-the-art on how researchers perceive themselves in their practices, using STS studies and Cr, and proposes a set of suggestions on how to plan situated participation.","PeriodicalId":41878,"journal":{"name":"IADIS-International Journal on Computer Science and Information Systems","volume":"66 1","pages":""},"PeriodicalIF":0.2,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89569570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-07-01DOI: 10.33965/ijcsis_2019140103
A. Baratè, G. Haus, L. A. Ludovico, E. Pagani, N. Scarabottolo
The goal of this paper is to analyze and show, also through practical examples, how the emerging 5G technology can improve music education. First, the key characteristics of 5G networks, i.e. improved bandwidth, reliability, and density of devices in an area, will be presented. From such a discussion, it will emerge the possibility to design and implement innovative educational services that are rich in multimedia content, support two-way multimodal interaction, and are highly customizable to respond to users’ requirements and special needs. A number of case studies in the domain of music education will be presented and commented.
{"title":"5G TECHNOLOGY FOR MUSIC EDUCATION: A FEASIBILITY STUDY","authors":"A. Baratè, G. Haus, L. A. Ludovico, E. Pagani, N. Scarabottolo","doi":"10.33965/ijcsis_2019140103","DOIUrl":"https://doi.org/10.33965/ijcsis_2019140103","url":null,"abstract":"The goal of this paper is to analyze and show, also through practical examples, how the emerging 5G technology can improve music education. First, the key characteristics of 5G networks, i.e. improved bandwidth, reliability, and density of devices in an area, will be presented. From such a discussion, it will emerge the possibility to design and implement innovative educational services that are rich in multimedia content, support two-way multimodal interaction, and are highly customizable to respond to users’ requirements and special needs. A number of case studies in the domain of music education will be presented and commented.","PeriodicalId":41878,"journal":{"name":"IADIS-International Journal on Computer Science and Information Systems","volume":"43 1","pages":""},"PeriodicalIF":0.2,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73864559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-07-01DOI: 10.33965/ijcsis_2019140105
Joshua Doe, R. V. D. Wetering, Ben Q. Honyenuga, J. Versendaal
This paper seeks to test the Firm Technology Adoption Model (F-TAM) using data from a developing country context. The data for this current study were purposively collected from four hundred (400) SMEs in the Greater Accra Region of Ghana. We used partial least squares structural equation modeling (PLS-SEM) for our data analysis. Data revealed that, whereas employee factors can lead to firm adoption, firm factors of adoption do not lead to firm adoption if societal factors, characteristics of the innovation, and employee factors do not moderate the relationship between firm factors and firm adoption. Data also reveals that societal factors do not lead to firm adoption if employee factors do not mediate it. The theoretical contribution of this study is that it challenges the dominant idea in most of the earlier models that firm adoption of innovation will be realized, without reference to factors at other levels of adoption. This positioning of the F-TAM model is a significant departure from earlier models. For industry practitioners, these findings illustrate the essence of putting a premium on recruiting technologically savvy employees if the firm intends to adopt digital technologies.
{"title":"FIRM TECHNOLOGY ADOPTION MODEL (F-TAM) AMONG SME'S: AN INTERACTIVE ECO-SYSTEM PERSPECTIVE","authors":"Joshua Doe, R. V. D. Wetering, Ben Q. Honyenuga, J. Versendaal","doi":"10.33965/ijcsis_2019140105","DOIUrl":"https://doi.org/10.33965/ijcsis_2019140105","url":null,"abstract":"This paper seeks to test the Firm Technology Adoption Model (F-TAM) using data from a developing country context. The data for this current study were purposively collected from four hundred (400) SMEs in the Greater Accra Region of Ghana. We used partial least squares structural equation modeling (PLS-SEM) for our data analysis. Data revealed that, whereas employee factors can lead to firm adoption, firm factors of adoption do not lead to firm adoption if societal factors, characteristics of the innovation, and employee factors do not moderate the relationship between firm factors and firm adoption. Data also reveals that societal factors do not lead to firm adoption if employee factors do not mediate it. The theoretical contribution of this study is that it challenges the dominant idea in most of the earlier models that firm adoption of innovation will be realized, without reference to factors at other levels of adoption. This positioning of the F-TAM model is a significant departure from earlier models. For industry practitioners, these findings illustrate the essence of putting a premium on recruiting technologically savvy employees if the firm intends to adopt digital technologies.","PeriodicalId":41878,"journal":{"name":"IADIS-International Journal on Computer Science and Information Systems","volume":"30 1","pages":""},"PeriodicalIF":0.2,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75168765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-07-01DOI: 10.33965/ijcsis_2019140102
Yue Hu, Yu-Hang Li, C. Su
In recent years, game-based programming tools (GBPTs) such as Lightbot, Cargo-Bot, and Run Marco have been developed to help children worldwide better understand programming concepts through an interesting, enjoyable and visualizable programming learning experience. However, in-service teachers’ perceptions regarding the use of these game-based programming tools in K-12 instruction have received little attention. To understand the perceptions of teachers, this study integrated perceived enjoyment into the Technology Acceptance Model (TAM) to explore the factors that influence the intentions of K-12 in-service teachers to use game-based programming tools in their instructional tasks. Thirty Chinese teachers in elementary and secondary schools were invited to finish at least one hour of code tutorial at the code.org site, and then undertake a paper-and-pencil questionnaire. We applied the partial least squares structural equation modeling technique to analyze the extended TAM model. Results demonstrated that teachers’ behavioral intention was determined by their attitudes toward using GBPTs. Perceived usefulness and perceived ease of use had a significant and positive influence on teachers’ attitudes. In addition, the results also indicated that perceived enjoyment has a significant influence on perceived usefulness and perceived ease of use, but no significant effect on the attitude of teachers regarding the use of GBPTs. Based on these findings, enjoyment can be considered as a determinant that influences teachers’ perceptions toward using GBPTs in K-12 programming education. Some pedagogical and research implications are also presented.
{"title":"PERCEPTIONS OF TEACHERS TOWARD GAME-BASED PROGRAMMING TOOLS IN K-12 CLASSROOMS","authors":"Yue Hu, Yu-Hang Li, C. Su","doi":"10.33965/ijcsis_2019140102","DOIUrl":"https://doi.org/10.33965/ijcsis_2019140102","url":null,"abstract":"In recent years, game-based programming tools (GBPTs) such as Lightbot, Cargo-Bot, and Run Marco have been developed to help children worldwide better understand programming concepts through an interesting, enjoyable and visualizable programming learning experience. However, in-service teachers’ perceptions regarding the use of these game-based programming tools in K-12 instruction have received little attention. To understand the perceptions of teachers, this study integrated perceived enjoyment into the Technology Acceptance Model (TAM) to explore the factors that influence the intentions of K-12 in-service teachers to use game-based programming tools in their instructional tasks. Thirty Chinese teachers in elementary and secondary schools were invited to finish at least one hour of code tutorial at the code.org site, and then undertake a paper-and-pencil questionnaire. We applied the partial least squares structural equation modeling technique to analyze the extended TAM model. Results demonstrated that teachers’ behavioral intention was determined by their attitudes toward using GBPTs. Perceived usefulness and perceived ease of use had a significant and positive influence on teachers’ attitudes. In addition, the results also indicated that perceived enjoyment has a significant influence on perceived usefulness and perceived ease of use, but no significant effect on the attitude of teachers regarding the use of GBPTs. Based on these findings, enjoyment can be considered as a determinant that influences teachers’ perceptions toward using GBPTs in K-12 programming education. Some pedagogical and research implications are also presented.","PeriodicalId":41878,"journal":{"name":"IADIS-International Journal on Computer Science and Information Systems","volume":"105 1","pages":""},"PeriodicalIF":0.2,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80712125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-07-01DOI: 10.33965/ijcsis_2019140104
Joseph Thomas Bills
Video games could have potential therapeutic value for individuals on the autism spectrum, but little research has been done on targeting games to the diverse individual needs of adults with autism, and the problem is complicated by the inaccessibility of patient profiles. It is also important to incorporate fun as well as therapeutic value into recommendations. Fun can be estimated by comparing a user’s profile of preferred games to the proposed therapeutic games using information from online resources like VideoGameGeek and Wikipedia, even though sorting by therapeutic value is still non-trivial. This can be done by labeling therapeutic games with discrete categories according to their therapeutic value, and sorting games primarily by therapeutic category, and secondarily by estimated fun value. In this paper, we present an approach of using the patient’s profile of preferred games as a proxy for their clinical profile, and making game recommendation based on a hypothetical model and updates in response to feedback. This feedback is measured using an ad-hoc questionnaire, which is evaluated on a set of adults with autism spectrum disorder. This model both enables personalized game recommendation from a cold start and allows the learned information to be generalized to other patients.
{"title":"RECOMMENDING THERAPEUTIC GAMES TARGETED TO THE INDIVIDUAL NEEDS OF ADULTS WITH AUTISM SPECTRUM DISORDER","authors":"Joseph Thomas Bills","doi":"10.33965/ijcsis_2019140104","DOIUrl":"https://doi.org/10.33965/ijcsis_2019140104","url":null,"abstract":"Video games could have potential therapeutic value for individuals on the autism spectrum, but little research has been done on targeting games to the diverse individual needs of adults with autism, and the problem is complicated by the inaccessibility of patient profiles. It is also important to incorporate fun as well as therapeutic value into recommendations. Fun can be estimated by comparing a user’s profile of preferred games to the proposed therapeutic games using information from online resources like VideoGameGeek and Wikipedia, even though sorting by therapeutic value is still non-trivial. This can be done by labeling therapeutic games with discrete categories according to their therapeutic value, and sorting games primarily by therapeutic category, and secondarily by estimated fun value. In this paper, we present an approach of using the patient’s profile of preferred games as a proxy for their clinical profile, and making game recommendation based on a hypothetical model and updates in response to feedback. This feedback is measured using an ad-hoc questionnaire, which is evaluated on a set of adults with autism spectrum disorder. This model both enables personalized game recommendation from a cold start and allows the learned information to be generalized to other patients.","PeriodicalId":41878,"journal":{"name":"IADIS-International Journal on Computer Science and Information Systems","volume":"366 1","pages":""},"PeriodicalIF":0.2,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90575651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.33965/ijcsis_2019140204
C. Kontzinos, Vagelis Karakolis, Stavros Skalidakis, Ourania I. Markaki, Maro Androutsopoulou, J. Psarras
The aim of Higher Education is twofold: meet the learning needs of individuals through the development of their intellectual abilities, as well as equip them with the necessary skills that will help them enter the labor market. As such, university processes and curricula should be well structured with courses and activities that help students follow their aptitudes, while also providing them with the required level of expertise that the respective job market requires. This paper presents work from the EU funded research project QualiChain that aims to revolutionize the domains of public and private education as well as their connections with the labor market and society at large through the development of a platform that is based on innovative approaches and technologies, such as blockchain, semantics, data analytics and decision support. To achieve its goals regarding education and the labor market, QualiChain involves a pilot targeting student accreditation, curriculum design and process optimization within the School of Electrical & Computer Engineering (ECE) of the National Technical University of Athens (NTUA), which will be the main focus of the present paper.
{"title":"COMBINING BLOCKCHAIN, SEMANTICS AND DATA ANALYTICS FOR UNIVERSITY PROCESS OPTIMISATION","authors":"C. Kontzinos, Vagelis Karakolis, Stavros Skalidakis, Ourania I. Markaki, Maro Androutsopoulou, J. Psarras","doi":"10.33965/ijcsis_2019140204","DOIUrl":"https://doi.org/10.33965/ijcsis_2019140204","url":null,"abstract":"The aim of Higher Education is twofold: meet the learning needs of individuals through the development of their intellectual abilities, as well as equip them with the necessary skills that will help them enter the labor market. As such, university processes and curricula should be well structured with courses and activities that help students follow their aptitudes, while also providing them with the required level of expertise that the respective job market requires. This paper presents work from the EU funded research project QualiChain that aims to revolutionize the domains of public and private education as well as their connections with the labor market and society at large through the development of a platform that is based on innovative approaches and technologies, such as blockchain, semantics, data analytics and decision support. To achieve its goals regarding education and the labor market, QualiChain involves a pilot targeting student accreditation, curriculum design and process optimization within the School of Electrical & Computer Engineering (ECE) of the National Technical University of Athens (NTUA), which will be the main focus of the present paper.","PeriodicalId":41878,"journal":{"name":"IADIS-International Journal on Computer Science and Information Systems","volume":"192 1","pages":""},"PeriodicalIF":0.2,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75534007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.33965/ijcsis_2019140201
Hui Chen, M. Nunes
The purpose of the study reported in this paper was to identify how experience and tacit knowledge can be externalized and articulated in a way that they can be the object of electronic records management (ERM) as well as establish the areas of convergence between ERM and knowledge management (KM). The study employed an inductive qualitative approach based on a single case study of a successful software (SW) development private company that specializes in SW for archive management. 25 participants from this Chinese software company were selected based on their role in SW design and development and were interviewed using a semi-structured interview script. Gathered data were analysed by using an a priori thematic analysis approach, which was focused on the processes of externalisation for tacit knowledge into explicit knowledge that can be used by using ERM. The findings of this research suggest that evidence of experience is best defined by story-telling and unstructured narratives that capture tacit knowledge and are then easily managed through ERM. Knowledge which is derived from experience often affects and helps to improve the performance of agents in human activity systems of all types, ranging from business organizations to social networks. However, both tacit knowledge and evidence of experience are hard to capture, represent and maintain by organizations since they reside in individual’s minds rather than in information repositories. Therefore, more than theoretical research and propositions there is a need to devise clear processes to translate and externalize tacit knowledge into explicit one that can then be stored, shared and used. This study contributes to this practical and applied KM and ERM research and provides new and practice grounded insights in this area.
{"title":"RETAINING PROFESSIONAL TACIT KNOWLEDGE AND EVIDENCE OF EXPERIENCE THROUGH ELECTRONIC RECORDS MANAGEMENT","authors":"Hui Chen, M. Nunes","doi":"10.33965/ijcsis_2019140201","DOIUrl":"https://doi.org/10.33965/ijcsis_2019140201","url":null,"abstract":"The purpose of the study reported in this paper was to identify how experience and tacit knowledge can be externalized and articulated in a way that they can be the object of electronic records management (ERM) as well as establish the areas of convergence between ERM and knowledge management (KM). The study employed an inductive qualitative approach based on a single case study of a successful software (SW) development private company that specializes in SW for archive management. 25 participants from this Chinese software company were selected based on their role in SW design and development and were interviewed using a semi-structured interview script. Gathered data were analysed by using an a priori thematic analysis approach, which was focused on the processes of externalisation for tacit knowledge into explicit knowledge that can be used by using ERM. The findings of this research suggest that evidence of experience is best defined by story-telling and unstructured narratives that capture tacit knowledge and are then easily managed through ERM. Knowledge which is derived from experience often affects and helps to improve the performance of agents in human activity systems of all types, ranging from business organizations to social networks. However, both tacit knowledge and evidence of experience are hard to capture, represent and maintain by organizations since they reside in individual’s minds rather than in information repositories. Therefore, more than theoretical research and propositions there is a need to devise clear processes to translate and externalize tacit knowledge into explicit one that can then be stored, shared and used. This study contributes to this practical and applied KM and ERM research and provides new and practice grounded insights in this area.","PeriodicalId":41878,"journal":{"name":"IADIS-International Journal on Computer Science and Information Systems","volume":"31 1","pages":""},"PeriodicalIF":0.2,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78114751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.33965/ijcsis_2019140203
J. M. Miguel, M. Pereira, P. Henriques, M. Beron
The technology of nowadays allows to easily extract, store, process and use information about individuals and organizations. The increase of the amount of data collected and its value to our society was, at first, a great advance that could be used to optimize processes, find solutions and support decisions but also brought new problems related with lack of privacy and malicious attacks to confidential information. In this paper, a tool to anonymize databases is presented. It can be used by data publishers to protect information from attacks controlling the desired privacy level and the data usefulness. In order to specify these requirements a DSL (PrivasL) is used and the automatization of repository transformation, that is based on language processing techniques, is the novelty of this work.
{"title":"ASSURING DATA PRIVACY WITH PRIVAS – A TOOL FOR DATA PUBLISHERS","authors":"J. M. Miguel, M. Pereira, P. Henriques, M. Beron","doi":"10.33965/ijcsis_2019140203","DOIUrl":"https://doi.org/10.33965/ijcsis_2019140203","url":null,"abstract":"The technology of nowadays allows to easily extract, store, process and use information about individuals and organizations. The increase of the amount of data collected and its value to our society was, at first, a great advance that could be used to optimize processes, find solutions and support decisions but also brought new problems related with lack of privacy and malicious attacks to confidential information. In this paper, a tool to anonymize databases is presented. It can be used by data publishers to protect information from attacks controlling the desired privacy level and the data usefulness. In order to specify these requirements a DSL (PrivasL) is used and the automatization of repository transformation, that is based on language processing techniques, is the novelty of this work.","PeriodicalId":41878,"journal":{"name":"IADIS-International Journal on Computer Science and Information Systems","volume":"12 1","pages":""},"PeriodicalIF":0.2,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80923293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.33965/ijcsis_2019140205
Ning Zhang, M. Nunes, G. Peng, Lijun Wang
Despite its tremendous success, the Chinese Economy is still characterized and controlled by a recurring process of 5 year planning. This comprehensive National planning program occurs at all levels of the Chinese government, educational system and state owned companies. This paper reports on a study that was made in preparation for the 13 5 year Plan for the Smart City component of the upcoming city of Tianjin. The objective of this study was to identify problems in informatization, automation and centralization of command and control, so that these could be solved as part of the 5 year plan. The study followed a three-stage mixed-method approach. First, questionnaires were used to assess the sate of development of the smart city features in the different departments of the city government. Second, the study organized thematic joint development groups consisting of expert representatives from different city’s departments and units. Third, results of questionnaires and thematic joint development discussions were analyzed in departmental focus groups to clarify and specify the problems and assess proposed solutions and viability of those solutions. This paper analyses the findings of this three-stage process and offers a classification of the identified problems, an integrative conceptual representation of these and a discussion of the importance of this identification in the overall planning process. The results and discussion are of particular importance in China for the next round of 5 year planning that will take place in 2020. However the meaning of the findings of this applied research process are transferable to any smart city planning process all over the world as the majority of the issues discussed are generic.
{"title":"LESSONS LEARNED FROM THE PREPARATION FOR THE 13TH FIVE YEAR PLAN FOR LARGE AND COMPLEX SMART CITIES IN CHINA","authors":"Ning Zhang, M. Nunes, G. Peng, Lijun Wang","doi":"10.33965/ijcsis_2019140205","DOIUrl":"https://doi.org/10.33965/ijcsis_2019140205","url":null,"abstract":"Despite its tremendous success, the Chinese Economy is still characterized and controlled by a recurring process of 5 year planning. This comprehensive National planning program occurs at all levels of the Chinese government, educational system and state owned companies. This paper reports on a study that was made in preparation for the 13 5 year Plan for the Smart City component of the upcoming city of Tianjin. The objective of this study was to identify problems in informatization, automation and centralization of command and control, so that these could be solved as part of the 5 year plan. The study followed a three-stage mixed-method approach. First, questionnaires were used to assess the sate of development of the smart city features in the different departments of the city government. Second, the study organized thematic joint development groups consisting of expert representatives from different city’s departments and units. Third, results of questionnaires and thematic joint development discussions were analyzed in departmental focus groups to clarify and specify the problems and assess proposed solutions and viability of those solutions. This paper analyses the findings of this three-stage process and offers a classification of the identified problems, an integrative conceptual representation of these and a discussion of the importance of this identification in the overall planning process. The results and discussion are of particular importance in China for the next round of 5 year planning that will take place in 2020. However the meaning of the findings of this applied research process are transferable to any smart city planning process all over the world as the majority of the issues discussed are generic.","PeriodicalId":41878,"journal":{"name":"IADIS-International Journal on Computer Science and Information Systems","volume":"65 1","pages":""},"PeriodicalIF":0.2,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90158297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.33965/ijcsis_2019140206
W. Tung, Jing-Sin Liu
Coverage path planning (CPP) is a fundamental task that is conducted in many applications for machining, cleaning, mine sweeping, lawn mowing, and performing missions by using unmanned aerial vehicles such as mapping, surveillance, search and rescue, and air-quality monitoring. An approach for conducting CPP for a known environment with obstacles involves decomposing the environment into cells such that each cell can be covered individually. The visiting order of the cells can then be decided to connect those intracell paths together. Finding the shortest intercell path that visits every cell and returns to the origin cell is similar to the traveling salesman problem (TSP). However, an additional variation from TSP that should be considered is that there are multiple intracell paths for each cell. These paths result from different selections of entry and exit points in each cell and thus affect the intercell path. This integrated TSP and CPP problem is known as TSP-CPP and is similar to the TSP with neighborhoods (TSPN). To solve TSP-CPP, one must simultaneously determine the visiting order of sites with minimal repetition and the transition points of each visiting site. The current approaches for solving TSP-CPP are as follows: (i) adapting dynamic programming (DP) for TSP to TSP-CPP, which is excellent for obtaining the optimal route and (ii) determining the optimal route by conducting a brute force enumerative search on entry and exit point combinations for every cell and then solving each combination of entry and exit points with a TSP solver. For large numbers of cells, approaches (i) and (ii) both suffer from exponential complexity and are impractical for complex environments. In this study, we proposed an appropriate genetic algorithm implementation for TSP-CPP to achieve an optimal balance between time efficiency and path optimality to eliminate the curse of dimensionality in DP. Our approach is demonstrated to find the true optimal solution as DP in all simulation environments that can be solved by both DP and GA, and GA is one hundred times faster than DP approach for maps decomposed with large cell number.
{"title":"SOLUTION OF AN INTEGRATED TRAVELING SALESMAN AND COVERAGE PATH PLANNING PROBLEM BY USING A GENETIC ALGORITHM WITH MODIFIED OPERATORS","authors":"W. Tung, Jing-Sin Liu","doi":"10.33965/ijcsis_2019140206","DOIUrl":"https://doi.org/10.33965/ijcsis_2019140206","url":null,"abstract":"Coverage path planning (CPP) is a fundamental task that is conducted in many applications for machining, cleaning, mine sweeping, lawn mowing, and performing missions by using unmanned aerial vehicles such as mapping, surveillance, search and rescue, and air-quality monitoring. An approach for conducting CPP for a known environment with obstacles involves decomposing the environment into cells such that each cell can be covered individually. The visiting order of the cells can then be decided to connect those intracell paths together. Finding the shortest intercell path that visits every cell and returns to the origin cell is similar to the traveling salesman problem (TSP). However, an additional variation from TSP that should be considered is that there are multiple intracell paths for each cell. These paths result from different selections of entry and exit points in each cell and thus affect the intercell path. This integrated TSP and CPP problem is known as TSP-CPP and is similar to the TSP with neighborhoods (TSPN). To solve TSP-CPP, one must simultaneously determine the visiting order of sites with minimal repetition and the transition points of each visiting site. The current approaches for solving TSP-CPP are as follows: (i) adapting dynamic programming (DP) for TSP to TSP-CPP, which is excellent for obtaining the optimal route and (ii) determining the optimal route by conducting a brute force enumerative search on entry and exit point combinations for every cell and then solving each combination of entry and exit points with a TSP solver. For large numbers of cells, approaches (i) and (ii) both suffer from exponential complexity and are impractical for complex environments. In this study, we proposed an appropriate genetic algorithm implementation for TSP-CPP to achieve an optimal balance between time efficiency and path optimality to eliminate the curse of dimensionality in DP. Our approach is demonstrated to find the true optimal solution as DP in all simulation environments that can be solved by both DP and GA, and GA is one hundred times faster than DP approach for maps decomposed with large cell number.","PeriodicalId":41878,"journal":{"name":"IADIS-International Journal on Computer Science and Information Systems","volume":"17 1","pages":""},"PeriodicalIF":0.2,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84464688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}