Pub Date : 2020-03-01DOI: 10.1109/ICICT50521.2020.00010
A. Rabello, Robison Cris Brito, F. Favarim, A. Weitzenfeld, E. Todt
This paper presents a mobile app developed to optimize the drone flight in a precision agriculture scenario. The Android platform was chosen, once it have free tools for development and there are many different API that could be used to solve this problem. For map presentation, as well as geocoding manipulation, Google tools were used. For the optimization, an algorithm based on recursive auctions was used, which has the characteristic of finding feasible solutions even in complex scenarios. The app has been tested and achieved feasible results for large scenarios with over a thousand waypoints in just few minutes, even running on a mobile device. It highlights the mobile app, and the recursive auction algorithm, it is an important solution for drone flight optimization in rural areas, where there is usually no possibility to run the application on traditional computers, as usually there is no access to the Internet.
{"title":"Mobile System for Optimized Planning to Drone Flight applied to the Precision Agriculture","authors":"A. Rabello, Robison Cris Brito, F. Favarim, A. Weitzenfeld, E. Todt","doi":"10.1109/ICICT50521.2020.00010","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00010","url":null,"abstract":"This paper presents a mobile app developed to optimize the drone flight in a precision agriculture scenario. The Android platform was chosen, once it have free tools for development and there are many different API that could be used to solve this problem. For map presentation, as well as geocoding manipulation, Google tools were used. For the optimization, an algorithm based on recursive auctions was used, which has the characteristic of finding feasible solutions even in complex scenarios. The app has been tested and achieved feasible results for large scenarios with over a thousand waypoints in just few minutes, even running on a mobile device. It highlights the mobile app, and the recursive auction algorithm, it is an important solution for drone flight optimization in rural areas, where there is usually no possibility to run the application on traditional computers, as usually there is no access to the Internet.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"876 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133474044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICICT50521.2020.00097
C. Yoon
In the 4th industrial revolution, enterprise business environment has sharply been altered with advancing diverse smart technologies. The application of smart business for a firm is very crucial for the efficient execution of its management activities and for improving the performance of its business tasks. The analysis and management for firm smart business ability is required to reasonably build and advance the smart business environment appropriate for its management activities and business fields. A rational analysis framework needs to efficiently analyze an enterprise smart business ability to manage and upgrade its smart business ability. This research verified the validity and reliability of the developed 16-item scale based on previous studies. This study presents a structural framework that can properly analyze an enterprise smart business capability in a smart business ability perspective. The developed framework can be utilized for reasonably analyzing an enterprise smart business capability in a smart business environment.
{"title":"Analyzing Enterprise Smart Business Capability in a Smart Technology Environment","authors":"C. Yoon","doi":"10.1109/ICICT50521.2020.00097","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00097","url":null,"abstract":"In the 4th industrial revolution, enterprise business environment has sharply been altered with advancing diverse smart technologies. The application of smart business for a firm is very crucial for the efficient execution of its management activities and for improving the performance of its business tasks. The analysis and management for firm smart business ability is required to reasonably build and advance the smart business environment appropriate for its management activities and business fields. A rational analysis framework needs to efficiently analyze an enterprise smart business ability to manage and upgrade its smart business ability. This research verified the validity and reliability of the developed 16-item scale based on previous studies. This study presents a structural framework that can properly analyze an enterprise smart business capability in a smart business ability perspective. The developed framework can be utilized for reasonably analyzing an enterprise smart business capability in a smart business environment.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131099672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICICT50521.2020.00011
Nabil Almashfi, Lunjin Lu
JavaScript is a scripting language that is used for creating web pages. It is widely used and a top contender in realworld usage. JavaScript has many dynamic features that makes it challenging to static analysis. Arrays and objects are one aspect that needs more attention. Array elements are inherently sparse where elements can be added at noncontiguous locations. Object properties can be dynamically accessed and they can also store values of different types. Existing JavaScript static analyzers use constant propagation domains that lose huge amount of precision when analyzing arrays and objects. In this paper, we propose a string abstract domain that is capable of capturing precise information about arrays and objects. The domain we propose provides useful information for the detection of some errors such as the attempt to access a nonexistent element or property. We also define the abstract semantics of some crucial operations over this domain.
{"title":"Precise String Domain for Analyzing JavaScript Arrays and Objects","authors":"Nabil Almashfi, Lunjin Lu","doi":"10.1109/ICICT50521.2020.00011","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00011","url":null,"abstract":"JavaScript is a scripting language that is used for creating web pages. It is widely used and a top contender in realworld usage. JavaScript has many dynamic features that makes it challenging to static analysis. Arrays and objects are one aspect that needs more attention. Array elements are inherently sparse where elements can be added at noncontiguous locations. Object properties can be dynamically accessed and they can also store values of different types. Existing JavaScript static analyzers use constant propagation domains that lose huge amount of precision when analyzing arrays and objects. In this paper, we propose a string abstract domain that is capable of capturing precise information about arrays and objects. The domain we propose provides useful information for the detection of some errors such as the attempt to access a nonexistent element or property. We also define the abstract semantics of some crucial operations over this domain.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"349 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125627816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICICT50521.2020.00040
F. Sanfilippo, C. Pacchierotti
Haptic technology for human augmentation provides gains in ability for different applications, whether the aim is to enhance "disabilities" to "abilities", or "abilities" to "super-abilities". Commercially-available devices are generally expensive and tailored to specific applications and hardware. To give researchers a haptic feedback system that is economical, customisable, and fast to fabricate, our group developed a low-cost immersive haptic, audio, and visual experience built by using off-the-shelf (COTS) components. It is composed of a vibrotactile glove, a Leap Motion sensor, and an head-mounted display, integrated together to provide compelling immersive sensations. This paper proposes a higher technology readiness level (TRL) for the system to make it modular and reliable. To demonstrate its potential, we present two human subject studies in Virtual Reality. They evaluate the capability of the system in providing (i) guidance during simulated drone operations, and (ii) contact haptic feedback during virtual objects interaction. Results prove that the proposed haptic-enabled framework improves the performance and illusion of presence.
{"title":"A Low-Cost Multi-modal Auditory-Visual-Tactile Framework for Remote Touch","authors":"F. Sanfilippo, C. Pacchierotti","doi":"10.1109/ICICT50521.2020.00040","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00040","url":null,"abstract":"Haptic technology for human augmentation provides gains in ability for different applications, whether the aim is to enhance \"disabilities\" to \"abilities\", or \"abilities\" to \"super-abilities\". Commercially-available devices are generally expensive and tailored to specific applications and hardware. To give researchers a haptic feedback system that is economical, customisable, and fast to fabricate, our group developed a low-cost immersive haptic, audio, and visual experience built by using off-the-shelf (COTS) components. It is composed of a vibrotactile glove, a Leap Motion sensor, and an head-mounted display, integrated together to provide compelling immersive sensations. This paper proposes a higher technology readiness level (TRL) for the system to make it modular and reliable. To demonstrate its potential, we present two human subject studies in Virtual Reality. They evaluate the capability of the system in providing (i) guidance during simulated drone operations, and (ii) contact haptic feedback during virtual objects interaction. Results prove that the proposed haptic-enabled framework improves the performance and illusion of presence.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124842095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICICT50521.2020.00092
J. Yeh, Craig W. Bartholio, Elyse Shackleton, Levi Costello, Matthew Perera, Kyle Yeh, Chelsea Yeh
In this paper, we describe the application of the technologies of the Internet of Things (IoT) to secondary and higher education. Specifically, it seeks to monitor the status of the students and estimate student attention and engagement based on data collected by environmentally embedded IoT sensors, and provide real-time feedback to the instructor. The research was divided into three parts. The first part researched the IoT sensors and devices used to capture student physiological data. The second part developed the instructor feedback devices, which included tablet and smartwatch applications. The third part is the creation of the machine learning model that performed the estimation of student attention from the data.
{"title":"Environmentally Embedded Internet-of-Things for Secondary and Higher Education","authors":"J. Yeh, Craig W. Bartholio, Elyse Shackleton, Levi Costello, Matthew Perera, Kyle Yeh, Chelsea Yeh","doi":"10.1109/ICICT50521.2020.00092","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00092","url":null,"abstract":"In this paper, we describe the application of the technologies of the Internet of Things (IoT) to secondary and higher education. Specifically, it seeks to monitor the status of the students and estimate student attention and engagement based on data collected by environmentally embedded IoT sensors, and provide real-time feedback to the instructor. The research was divided into three parts. The first part researched the IoT sensors and devices used to capture student physiological data. The second part developed the instructor feedback devices, which included tablet and smartwatch applications. The third part is the creation of the machine learning model that performed the estimation of student attention from the data.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130975279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICICT50521.2020.00045
Zhang Chunyong, Xiaojing Meng
System logs are often used as the primary resource in data-driven methods to ensure system health and stability. The typical process of system log analysis is to first parse unstructured logs into structured data, and then apply data mining and machine learning techniques to analyze the data and build a workflow model. Existing log parsing methods focus on similar matching of log messages and log templates. We believe that the accuracy of log message parsing is the primary task of log parsing, so we propose One-to-One, a log parser that is marked one-to-one according to the rules duringthe matching process according to the token type and part of speech. Way to parse log messages online. We evaluated Oneto-One on different log sets and compared them with the three most advanced log parsing methods. The results show that our method is similar to the results of the other three methods in parsing simple logs. However, when parsing complex OpenStack logs, the accuracy can reach 98%, which is 20% higher than the best. It can parse tens of thousands of log messages per second. This method shows high efficiency and precision for all three types of test logs, and is applicable to modern system logs.
{"title":"Log Parser with One-to-One Markup","authors":"Zhang Chunyong, Xiaojing Meng","doi":"10.1109/ICICT50521.2020.00045","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00045","url":null,"abstract":"System logs are often used as the primary resource in data-driven methods to ensure system health and stability. The typical process of system log analysis is to first parse unstructured logs into structured data, and then apply data mining and machine learning techniques to analyze the data and build a workflow model. Existing log parsing methods focus on similar matching of log messages and log templates. We believe that the accuracy of log message parsing is the primary task of log parsing, so we propose One-to-One, a log parser that is marked one-to-one according to the rules duringthe matching process according to the token type and part of speech. Way to parse log messages online. We evaluated Oneto-One on different log sets and compared them with the three most advanced log parsing methods. The results show that our method is similar to the results of the other three methods in parsing simple logs. However, when parsing complex OpenStack logs, the accuracy can reach 98%, which is 20% higher than the best. It can parse tens of thousands of log messages per second. This method shows high efficiency and precision for all three types of test logs, and is applicable to modern system logs.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130723354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICICT50521.2020.00057
Qianhao Zhai, Yang Deng, H. Zhou, Siling Feng, Mengxing Huang
How should taxi drivers make decisions to maximize profits? This is a matter of concern. Profit efficiency of taxi drivers is evaluated based on the method of qualitative analysis in this paper. Taking profit, cost and time as the relevant factors of decision making, the mathematical model of profit efficiency is established, and the profit efficiency is calculated when the taxi driver chooses two different schemes. The preferable scheme is recommended to the driver. The real data were collected and plugged into the model to verify the reasonability of the model. Correlation analysis in SPSS was used to calculate partial correlation coefficient to measure the model's dependency on relevant factors. The results show that the model in the paper is effective and can be used to instruct the taxi driver to make decisions.
{"title":"A Decision Model of Taxi Driver Based on Qualitative Analysis","authors":"Qianhao Zhai, Yang Deng, H. Zhou, Siling Feng, Mengxing Huang","doi":"10.1109/ICICT50521.2020.00057","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00057","url":null,"abstract":"How should taxi drivers make decisions to maximize profits? This is a matter of concern. Profit efficiency of taxi drivers is evaluated based on the method of qualitative analysis in this paper. Taking profit, cost and time as the relevant factors of decision making, the mathematical model of profit efficiency is established, and the profit efficiency is calculated when the taxi driver chooses two different schemes. The preferable scheme is recommended to the driver. The real data were collected and plugged into the model to verify the reasonability of the model. Correlation analysis in SPSS was used to calculate partial correlation coefficient to measure the model's dependency on relevant factors. The results show that the model in the paper is effective and can be used to instruct the taxi driver to make decisions.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116508747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICICT50521.2020.00082
M. M. Tulu, Sultan Feisso, Ronghui Hou, Talha Younas
Mobile Social Network (MSN) is attracting the attention of many researchers so as to leverage cellular links by offloading the mobile traffic load via device-to-device communications. Therefore, applying an effective algorithm to identify influential spreaders in MSN is playing a key role. In this paper, a Content Spreading Efficiency (CSE) algorithm, which considers the degree and the number of contact times of a node with its neighbors and the neighbors' friends, is proposed. Also, it considers the nodes' topological position to determine the efficiency of the node to spread content in the network. The performance of CSE strategy is evaluated by Susceptible Infected-Recovered (SIR) model. The results demonstrate the effectiveness of CSE strategy to select important nodes to spread content in MSNs.
移动社交网络(Mobile Social Network, MSN)是一种利用蜂窝链路,通过设备对设备的通信来卸载移动流量负荷的网络,正受到众多研究者的关注。因此,应用一种有效的算法来识别MSN中有影响力的传播者是至关重要的。本文提出了一种内容传播效率(CSE)算法,该算法考虑了节点与其邻居和邻居的朋友的接触程度和次数。同时考虑节点的拓扑位置来确定节点在网络中传播内容的效率。利用SIR(易感感染-恢复)模型评价CSE策略的性能。结果证明了CSE策略在微信网络中选择重要节点传播内容的有效性。
{"title":"CSE: A Content Spreading Efficiency Based Influential Nodes Selection Method in 5G Mobile Social Networks","authors":"M. M. Tulu, Sultan Feisso, Ronghui Hou, Talha Younas","doi":"10.1109/ICICT50521.2020.00082","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00082","url":null,"abstract":"Mobile Social Network (MSN) is attracting the attention of many researchers so as to leverage cellular links by offloading the mobile traffic load via device-to-device communications. Therefore, applying an effective algorithm to identify influential spreaders in MSN is playing a key role. In this paper, a Content Spreading Efficiency (CSE) algorithm, which considers the degree and the number of contact times of a node with its neighbors and the neighbors' friends, is proposed. Also, it considers the nodes' topological position to determine the efficiency of the node to spread content in the network. The performance of CSE strategy is evaluated by Susceptible Infected-Recovered (SIR) model. The results demonstrate the effectiveness of CSE strategy to select important nodes to spread content in MSNs.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123601026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICICT50521.2020.00030
T. Mapayi, P. Owolawi
As digital retina imaging and automatic retinal vascular network analysis continue to find increasing usefulness in the field of biomedicine for the diagnosis, monitoring and management of various forms of human illness like hypertension, retinopathies, glaucoma and cardiovascular diseases, the mitigation of different complications such as nonhomogeneous illumination noise, vessel width variation and very low contrast of the small-width vessels in relation to the retinal fundus background, for an efficient segmentation performance remains a subject of on-going research. This paper investigates the use of an adaptive thresholding method based on local spatial relational variance (LSRV) for the segmentation of the retinal vascular networks in fundus images. An experimental study conducted on DRIVE database shows that the vascular network segmentation results obtained from the investigated method detects large vessels and thin vessels in the retinal fundus images. When compared to some previous methods in the literature, the proposed method achieved higher average accuracy value of 95.04% and average sensitivity value of 76.55%. The proposed method is also computationally fast with a processing time of 4.5 seconds for the segmentation of the retinal vascular networks in each fundus image.
{"title":"Retinal Vascular Network Segmentation Using Adaptive Thresholding Method Based on LSRV","authors":"T. Mapayi, P. Owolawi","doi":"10.1109/ICICT50521.2020.00030","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00030","url":null,"abstract":"As digital retina imaging and automatic retinal vascular network analysis continue to find increasing usefulness in the field of biomedicine for the diagnosis, monitoring and management of various forms of human illness like hypertension, retinopathies, glaucoma and cardiovascular diseases, the mitigation of different complications such as nonhomogeneous illumination noise, vessel width variation and very low contrast of the small-width vessels in relation to the retinal fundus background, for an efficient segmentation performance remains a subject of on-going research. This paper investigates the use of an adaptive thresholding method based on local spatial relational variance (LSRV) for the segmentation of the retinal vascular networks in fundus images. An experimental study conducted on DRIVE database shows that the vascular network segmentation results obtained from the investigated method detects large vessels and thin vessels in the retinal fundus images. When compared to some previous methods in the literature, the proposed method achieved higher average accuracy value of 95.04% and average sensitivity value of 76.55%. The proposed method is also computationally fast with a processing time of 4.5 seconds for the segmentation of the retinal vascular networks in each fundus image.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128302444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICICT50521.2020.00016
Amjed Al-Thuhli, Mohammed Al-Badawi
The involvement of human interactions with business processes through Enterprise Social Networks improves organizations performance. However, Enterprise Social Networks consist of massive amount of data in form of structure and unstructured data. Therefore, finding valuable information from these types of data is a challenging issue. Nevertheless, with the annotation that are available in form of social tagging, some challenges have been resolved. In this paper, we investigate the problem of using social tagging in order to socialize organization business processes. Specifically, we present a framework to analyze social tagging and unstructured data that are generated by users to recommend tasks and activities of any type of business processes based on hybrid method of clustering and text classification. The framework uses k-means algorithm to cluster tags datasets and term frequency–inverse document frequency to weight user's documents. The experiment results performed on a real case study shows the efficiency of the framework after validates its accuracy.
{"title":"A Framework to Analyze Social Tagging and Unstructured Data","authors":"Amjed Al-Thuhli, Mohammed Al-Badawi","doi":"10.1109/ICICT50521.2020.00016","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00016","url":null,"abstract":"The involvement of human interactions with business processes through Enterprise Social Networks improves organizations performance. However, Enterprise Social Networks consist of massive amount of data in form of structure and unstructured data. Therefore, finding valuable information from these types of data is a challenging issue. Nevertheless, with the annotation that are available in form of social tagging, some challenges have been resolved. In this paper, we investigate the problem of using social tagging in order to socialize organization business processes. Specifically, we present a framework to analyze social tagging and unstructured data that are generated by users to recommend tasks and activities of any type of business processes based on hybrid method of clustering and text classification. The framework uses k-means algorithm to cluster tags datasets and term frequency–inverse document frequency to weight user's documents. The experiment results performed on a real case study shows the efficiency of the framework after validates its accuracy.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117041420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}