Forthcoming articles

 


International Journal of Information Technology and Management

 

These articles have been peer-reviewed and accepted for publication in IJITM, but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.

 

Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.

 

Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.

 

Articles marked with this Open Access icon are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.

 

Register for our alerting service, which notifies you by email when new issues of IJITM are published online.

 

We also offer RSS feeds which provide timely updates of tables of contents, newly published articles and calls for papers.

 

International Journal of Information Technology and Management (50 papers in press)

 

Regular Issues

 

  • Research on book shopping website interface based on the eye tracker   Order a copy of this article
    by Hongxia Li, dandan che, xiaofang yuan, yan li 
    Abstract: This study aims to analyze the behavior of consumers when they buy books online, and analyze the law of their scanning of the products and their focus when they check the information. In the experiment, 20 subjects must follow the instruction to complete two specific tasks, and the eye tracker recorded their eyes movement data automatically. According to the heat map, researchers divided the area of interest (AOI) which got the attention of subjects and analyzed the data in the AOI. Combined with the interview and analysis, they found that: a) The customers tend to view pages following an F pattern: attention is largely focused on the upper and left part; b) The upper part of webpage is more attractive than the lower part; c)In terms of text, Dangdang.com is more attractive than Amazon because Amazon has a cluttered text typography; d)Consumers like to check the goods information and the comments of the goods when they choose them. e) Dangdang.coms operation is simpler than Amazon when they are completing the order.
    Keywords: Book shopping website; Electronic commerce; Eye-tracking; Tobii T60XL; Interface design;

  • Case Study on Estimating the Financial Impact of IT Process Alignment   Order a copy of this article
    by Eunil Park, Jay Ohm, Sang Jib Kwon 
    Abstract: The current study is designed to be used as supplementary material for potential professionals in the area of IT process alignment. This study deals with automation of trouble ticketing system. With this new technology, the company needs to properly align their IT processes with investment model and automation. The proper alignment will bring about dramatic improvements in their business performance. This case study walks through the major components in estimating the financial impact of IT process alignment.
    Keywords: IT Process; trouble ticketing system; IT consulting.

  • Challenges of Software Developers: The Namibian Government Experience   Order a copy of this article
    by Monica Nehemia-Maletzky, Tiko Iyamu 
    Abstract: The Namibian government has recognized the importance of ICT, as one of the critical contributing sector to the development of digital factors, especially with regards to the digital economy. Explicit activities through the National Development Program (NDP) were developed to spearhead the development of the ICT sector. Software development is recognized to be the critical resource behind the development of an ICT sector. Almost 15 years after the NDP was initiated, the government of Namibia is still outsourcing most of its software development to companies from Germany, India, USA and South Africa. This is considered by the general populace of the country to have negative impact on the economy, as well as skill and knowledge transfer. This research, through multiple case studies, examined and discusses the impact of lack of in-house software development experts in the country. The Namibian government institutions which include Serve Agency, Populace Agency, Department of Natural resource and Department of International Affairs were used as cases in the study.
    Keywords: Software; Development; Organisation; Skill.

  • Research on Key Techniques of Cryptographic Access Control and Properties Optimization in Cloud Storage   Order a copy of this article
    by Shidong Zhu, Liu Jiang, Zhenliu Zhou 
    Abstract: With the analysis of data privacy protection requirement from the users, we proposed cryptographic access control scheme and key distribution scheme based on CP-ABE (Ciphertext-Policy Attribute-Based Encryption), and gave a hierarchy based on CP-ABE key generation algorithm. This scheme uses precise identity and hierarchal structure as the user attributes, and supports hierarchal key generation. As the cloud data are encrypted by the users, the data privacy protection can be effectively achieved in cloud storage against network attackers even if CSP (Cloud Service Provider), suitable for the multi-user who have hierarchal structure attributes sharing cloud storage services environment. We also proposed two schemes for improving the usability of cloud storage system. The first one is that the metadata information of unstructured data are stored in cloud using non-relational database MongoDB, which can greatly improve the speed of data access. The second is data migration algorithm based on physical volume, which can migrate data to the matching devices automatically depending on user access frequency value. Experimental results showed that these programs were able to improve the storage efficiency of cloud storage system. The study is of theoretical significance and practical value to the similar systems.
    Keywords: cloud storage; storage virtualization; unstructured data storage; cryptographic access control; Key generation; data privacy protection; Ciphertext-Policy Attribute-Based Encryption; data migration.

  • Informal interactive Bring-Your-Own-Device Strategizing Practices of South African Small and Medium Enterprises   Order a copy of this article
    by Salah Kabanda 
    Abstract: The purpose of this study is twofold: firstly, to identify factors affecting BYOD adoption in South African SMEs and secondly understand strategies SMEs engage in with regards to BYOD. Following an interpretive approach, and interviews as a means of data collection; the findings show that SMEs are consciously aware of BYOD but are not eager to formalise their strategy. Instead, SMEs engage in informal interactive strategizing despite their concerns of cost, security and privacy. SMEs did not view BYOD as a cost saving approach but rather as a double end sword that brought privacy and security concerns; unintended consequence; and no improvement in productivity. Further findings show how SMEs, specifically employees advocated the need for a policy prescribing how mobile devices should be used and in so doing perpetuating the interactive strategizing. External factors such as changing laws and regulation were perceived as barriers towards a formalised BYOD strategy.
    Keywords: BYOD; strategy; SME; developing countries; adoption.

  • Establishment for Service Quality Evaluation Index System of Mobile E-commerce   Order a copy of this article
    by Liping Liu 
    Abstract: With the rapid development of mobile e-commerce, more and more importance has been attached by the users to the level of service quality of mobile e-commerce. Accurate settings of the evaluation indexes of the mobile e-commerce services quality is able to better measure and improve the service quality of mobile e-commerce. Based on PZBs SERVQUAL and in combination with the characteristics of mobile e-commerce, the paper constructs evaluation index system of mobile e-commerce service quality, consisting of such six dimensions as tangible, reliability, responsiveness, mobile situationality, safety and remedy. Through the questionnaire survey, SPSS and AMOS software are used to conduct construction validity analysis, reliability analysis, confirmatory factor analysis and other empirical analysis. Results showed that it was reasonable to change six dimensions in the initial scale to five dimensions: safety, responsiveness, tangible, mobile situationality and reliability. The main characteristics of the paper are as follows: first, a dimension mobile situationality corresponding to mobile business feature is added based on the original SERVQUAL model. The mobile business feature is also heighted in other detailed indicators; second, the questionnaire method is used to conduct empirical analysis on the constructed evaluation index system, so as to ensure its reliability and validity.
    Keywords: mobile e-commerce; service quality; evaluation index; SERVQUAL; tangible; reliability; responsiveness; mobile situationality; safety; remedy Introduction.

  • COLLLABORATION ENVIRONEMNTS FOR SMALL AND MEDIUM-SIZED ARCHITECTURE, ENGINEERING AND CONSTRUCTION ENTERPRISES: SUCCESS FACTORS IN IMPLEMENTATION   Order a copy of this article
    by Aisha Abuelmaatti, Vian Ahmed 
    Abstract: It is widely recognised that collaboration in the Architecture, Engineering and Construction (AEC) sector increases productivity, improves quality, competitiveness and profitability. This poses the problem of what are the most appropriate collaboration methods available to accommodate unique work settings and virtual organisation like modus operandi. With Building Information Modelling (BIM) being imposed by the UK government on AEC projects, the development of new technology for collaboration purposes is one solution to this problem. Unfortunately information technologies have failed in productivity growth despite previous governments attempts, most famously, with the 2004 Latham and 2008 Egan reports. BIM is not about a specific technology, but ensuring the whole-sector adoption is fundamental. In fact, many Small and Medium Enterprises (SMEs) within the sector would like to be implementing BIM not only for the business productivity, but also to not get left behind. It is, however, commonly observed that SMEs have fewer chances to get it right and so they need guidance. Debate over whether or not to use BIM has become almost irrelevant. Instead, the question raised is how collaborative technologies promote collaborative working between large companies and SMEs in the AEC sector to increase productivity and improve quality to meet the high collaboration demands? Against this background,several approaches from the literature were reviewed. This led to identifying the key elements to focus on during the collaborative technologies implementation to enhance successful collaboration. A qualitative study of fourteen cases was developed in order to map the current practice of the collaborative technologies implementations and their success level in the AEC sector. The case studies revealed a number of factors affecting the success of collaborative technologies implementations. These factors were affecting the collaboration at the organisation level. This also led to further investigation of the factors affecting the collaboration at the end-user level. The quantitative study of a survey returned by sixty four respondents was guided by the list of elements proposed by the review developed from the literature. The results suggested that the success of collaborative technologies depends on 23 factors. This research concluded that, collaborative technologies are effective methods to support collaboration within the AEC and meet the demands of the sector, when strategically implemented, underlined by a set of factors. Recommendation emerged from these findings are used to suggest a path for SMEs to implement BIM into AEC, so that they are better prepared for the future ways of working.
    Keywords: SMEs; AEC sector; Information Technology (IT); Organisation Readiness and Maturity; Collaborative Working; Factor Analysis.

  • Hadoop Ecosystem As Enterprise Big Data Platform: Perspectives and Practices   Order a copy of this article
    by Sourav Mazumder, Subhankar Dhar 
    Abstract: Innovation in Hadoop and other related Big Data technologies in last few years brings on to the table a lot of promises around better management of enterprise data at much lesser cost but with high value business benefits. However, managing Big Data environment at enterprise level can be an involved task both from the perspectives of cost and operation complexities. Supporting various types of enterprise data use cases with different workload patterns in the same cluster, minimizing the data movement in and out of cluster, assuring different Service Level Agreements (SLAs) across various use cases and user groups, ensuring data lineage and veracity, security and data privacy are some of the key challenges every enterprise is trying to address in their individual stage of establishing Enterprise Big Data Platform. In this paper, we propose to delve into some of the challenges from practitioners perspective based on lessons learnt from various Big Data implementation scenarios. We also aim to discuss the emerging concept of Hadoop Ecosystem as Big Data platform to address these challenges with a holistic proposition. We also discuss the other technologies outside Hadoop Ecosystem which can be also potentially used to realize the patterns of Big Data platform. Finally, we also provide a prescriptive approachbased on the best practices which can help moving towards the vision of Enterprise Big Data Platform using Hadoop Ecosystem balancing between the short term objectives and the long term goals of managing and maintaining Enterprise Big Data Platform. Hence this work will be beneficial to industry experts and practitioners for managing enterprise Big Data environment.
    Keywords: Business analytics; Big Data; Data Mining; Map Reduce; Hadoop; Spark; Tachyon; NoSQL.

  • Factors Affecting Diffusion and Adoption of Information and Communication Technology Among Rural Users in Khyber Pakhtunkhwa Province, Pakistan   Order a copy of this article
    by Zahid Latif, Wang Lei, Zulfiqar Hussain Pathan, Sikander Hussain, Kaleem Khan 
    Abstract: Information and Communication Technology (ICT) is increasingly recognized as an important driver for economic growth, innovation, employment and productivity, and is widely attributed as the foremost pillar for the development of any country. In the present globalized era, the accessibility of ICT to rural areas is a core challenge that needs to be addressed. Implementation of ICT technology is more likely to improve technical advancements and revenue generation of overall service sector of a country. The purpose of this study is to investigate and categorize the factors influencing diffusion and adoption of ICT in the rural areas of Pakistan. The research deals principally with common people of the rural areas of Khyber Pakhtunkhwa Province for adoption of ICT in their daily life. The sample size encountered was 330 respondents, who were selected through random sampling technique. Primary data was collected from people belonging to different races of life throughout the province. The results of the study were calculated by using Confirmatory Factor Analysis (CFA) and Structural Equation Modeling (SEM) techniques, which show that the overall ICT diffusion and adoption is profoundly influenced by seven factors, including social, political, environmental, regulatory, technological, economic and legal. The study confirms a most significant impact of social and political factors upon ICT diffusion, whereas the remaining factors seem to have a moderate impact.
    Keywords: ICT diffusion; Confirmatory Factor Analysis(CFA); Gross Domestic Product (GDP); Khyber Pakhtunkhwa; Pakistan.
    DOI: 10.1504/IJITM.2016.10003630
     
  • Finding Linkage between Sustainability Science and Complex Networks   Order a copy of this article
    by Katsuhide Fujita 
    Abstract: Sustainability science has been widely accepted worldwide as an important research field worldwide. Since it is widespread in many research fields such as environmental science and engineering, architecture, materials science, and civil engineering, it is important to discover the hidden connections between sustainability science and other academic fields. For this purpose, supporting tools are necessary. This paper investigates the relationship between sustainability science and complex networks on the basis of citation network analysis using large datasets of academic papers. First, citation networks are generated on the basis of academic paper datasets and clustered to understand the research fields of sustainability science and complex networks. Next, we measure the textual similarities among the clusters in these fields and analyze the shared terms to find the overlapping research areas that connect the two fields. These results offer overviews of how complex networks contribute to sustainability science and assist the formation of policies that promote key results in artificial intelligence toward future sustainable societies.
    Keywords: Citation Networks; Sustainability Science; Complex Networks.

  • Top Management Support and Information Systems Implementation Success: A Meta-Analytical Replication   Order a copy of this article
    by Mark Hwang 
    Abstract: Factors that contribute to the success or failure of Information systems implementation have received extensive attention in the literature. Top management support is considered one of the most, if not the most, critical factors for implementation success. However, the positive effect of top management support is not always borne out in empirical data, prompting a quest for moderator variables. A classic meta-analysis shows that the effect of top management support on implementation success is moderated by task interdependence, a claim refuted in several more recent meta-analyses. Drawing from the lessons learned from these meta-analyses, the current research reanalyzed the top management support literature with a larger sample while controlling for the effect of common method variance and systems success measurement issues. The results reaffirm the significant and substantial effect of top management support on systems success. At the same time, evidence also supports the moderating role of task interdependence, common method variance, and how systems success is measured. Implications for systems implementation are discussed.
    Keywords: top management support; task interdependence; IS implementation; IT project; meta-analysis; common method variance.

  • User Engagement in Social Media- Empirical Results from Facebook   Order a copy of this article
    by Rupak Rauniar, Greg , Ronald Salazar, Donald Hudson 
    Abstract: Theory building and better understanding of user engagement behavior is fundamental to developing future approaches and effective organizational deployment of social media technologies. Based on the Theory of Reasoned Action (TRA), predictors of intention to engage on social media sites were empirically examined with 389 users of Facebook - the most popular online social media site. Our results suggest that perceived value, social presence, interactivity, and trustworthiness are positively related to the users attitude towards social media. The research model shows promise for use by managers and organizations to predict and understand the usage of social media in a target population.
    Keywords: Queueing; Reward-cost structure; Extensive form game; Behavioral strategy; Nash equilibrium.

  • Evaluation of mean and variance approximations in three point estimation of task completion times using the Beta and the Kumaraswamy Distribution   Order a copy of this article
    by Thomas Schwarz, Pablo Andrés Ortiz Bochard 
    Abstract: Estimation of task and project completion times within IT projects remains one of the most error-prone, but also most critical duties of an IT project manager. The three-point method introduced by PERT has an expert determine a pessimistic, most likely, and an optimistic value for the duration of a task. It then calculates an estimate for the completion time as a weighted means of these values. In the literature, PERTs and similar three-point approximation are evaluated against a set of beta-distributions. Unfortunately, there is no a-priori reason to assume that the beta- distribution is the correct distribution for task completion times seen in practice. We present an evaluation of three-point approximations for the expected completion time of a task or project and of two-point approximation for the variance of the completion time. The evaluation uses a set of distributions defined by skew and kurtosis instead simply by choosing a range of shape parameters. The distributions chosen are the beta distribution and the Kumaraswamy distribution. Both are candidates for the a-priori completion time distribution. We validate various approximations proposed in the literature and show that it is possible to obtain valid approximations (with low absolute and relative errors) that work for all test sets of distributions.
    Keywords: Project management; expert judgement; PERT; activity duration; betadistribution; Kumawasramy distribution.

  • CPPM: a lightweight performance prediction middleware for cloud platforms   Order a copy of this article
    by Xiao Peng 
    Abstract: As more and more commercial clouds have been applied in various areas, how to evaluate the performance of a cloud platform has become an important issue that needs to be addressed. Furthermore, an effective performance prediction mechanism is of significant value for improving the current cloud services, such as resource allocation and task scheduling. In the paper, we present the design and prototype implementation of performance prediction system, namely Cloud Performance Prediction Middleware (CPPM), which is aiming at providing a set of lightweight and flexible services on existing cloud infrastructure so as to allow cloud providers monitoring, estimating and predicting the runtime performance from various aspects. The CPPM enables cloud providers making more efficient and fine-grained resource management and scheduling policies based on its short-term workload prediction mechanism; also it provides an application-level performance prediction service which uses skeleton approach to capture execution characteristics of the running applications so as to predict their actual runtime performance and efficiency. Extensive experiments are conducted to examine the effectiveness and efficiency of the CPPM.
    Keywords: cloud computing; performance evaluation; workload; quality of service.

  • From social capital to continuous use of social networking sites: a conceptualisation   Order a copy of this article
    by Rui Chen, Sushil K. Sharma, H. Raghav Rao 
    Abstract: Site use is important to the sustainability of social networking sites. In this paper, we explore the drivers of member site use through the theoretical lens of social capital theory. Drawing upon supporting literature, we contend that social capital acts as an important factor in motivating members to continue their site usage. Specifically, we expect cognitive, structural, and relational capital to jointly contribute to one's use activity. In addition, we investigate the intricate relationships among the three capital acts and suggest that cognitive and relational capital will strengthen (i.e., positive moderation) the relationship between structural capital and member site use. This article contributes to the literature on social networking sites by developing a theoretical framework that helps explain user behaviour. The study also sheds light on social capital research by advocating the potential value of social capital theory in social networking research and theorising the mutual relationships among distinct social capitals.
    Keywords: social networking site; SNS; social capital theory; SCT; site use; main effect; interaction effect; conceptual model.
    DOI: 10.1504/IJITM.2017.10005168
     
  • Exploring the benefits of cloud services and accountability tools from a competitiveness and return on investment perspective   Order a copy of this article
    by Sindre Høyland, Janne Merete Hagen, Ruth Østgaard Skotnes 
    Abstract: There are a number of challenges involved in using cloud services, such as privacy, control of data and compromised networks. The EU-project A4Cloud arose from an interest in mitigating these challenges through the development of tools for holding service providers accountable for handling of data. As part of the A4Cloud project, we applied a case study approach to explore cloud services and accountability tools among enterprise users and authorities in Norway. Our findings suggest that potential competitiveness and return on investment lie in an integrated cloud and accountability tools solution that can improve service dependability and alleviate pressing security concerns, improve competitiveness, and achieve cost reductions while representing a flexible, on-demand, and pay-per-use asset for effectively generating revenues. Therefore, return on investment is found in the synergy between the cloud and accountability tools, where the security mitigation potential of the tools plays an integral part.
    Keywords: cloud services; accountability tools; economic theories; case study; content analysis.
    DOI: 10.1504/IJITM.2017.10005170
     
  • References-based search methodology for assuring acceptable quality of a query research article   Order a copy of this article
    by Ranjeet Kumar, Ramesh Chandra Tripathi 
    Abstract: It has been noted many a times that some new author(s) cite irrelevant references in their research article and at the same time skip the most genuine references having a bearing on the subject matter. In the growing academic research publications, assessing therefore the relevancy of references cited in a research document becomes a major concern in the current internet age. At the same time some of the research articles published in the conferences-proceedings are found to have some contents questionable in terms of copyrights. In the present paper, development of a references-based tool for first hand assuring acceptable quality of a query research article simply-based on references is described subject to the reach of the repository used. The tool also reports the relevancy check-up of the references in the query research article so as to make the references compact and also check plagiarism on self created repository of most likely research articles as the resources.
    Keywords: references-based search; citation relevancy; textual plagiarism; content similarity.
    DOI: 10.1504/IJITM.2017.10005171
     
  • Internet thinking of the traditional enterprise - taking Su Ning as an example   Order a copy of this article
    by Dan Chang, Jiawei Song 
    Abstract: In the internet age, people's daily life has been changed with the application of the internet. Internet has penetrated into all aspects of people's lives and it has subverted people's traditional conception of thinking. The internet enterprises gradually invade the core business of the traditional industries with its powerful potentials in resource integration and advanced business model. Many companies begin to make the transition with the help of the internet. Starting from the nature of the internet, this paper summaries seven kinds of internet thinking and put forward the business model under internet thinking. Finally, this paper analyses on the case of Su Ning's transformation to make some reference significance for actual practice.
    Keywords: internet thinking; enterprise model; business model; Su Ning.
    DOI: 10.1504/IJITM.2017.10005173
     
  • Information industry security: an industry convergence point of view   Order a copy of this article
    by Xiaolan Guan, Menggang Li 
    Abstract: There is a close relationship between industry convergence and information industry security, so we can study theoretically by combining the industry convergence and information industry security. In this paper, by using the theory and methods of industry convergence, industry security and ecology, we analysed the mechanism of information industry security from the perspective of industry convergence deeply, and constructed a model to analyse on the basis of logistic model. Then we took the integration of informatisation and industrialisation of China as an example to do the empirical research, and provided a range of effective policy recommendations about how to enhance the information industry security.
    Keywords: information industry security; industry convergence; logistic model; convergence of informatisation and industrialisation.
    DOI: 10.1504/IJITM.2017.10005174
     
  • Network dynamics in friend recommendation: a study of Indian engineering students   Order a copy of this article
    by Pradip Swarnakar, Ajay Kumar, Himanshu Tyagi 
    Abstract: Social networks are the frequently used service which over the past few years, have grown by leaps and bounds. In this study, a survey of engineering students has been conducted to find out the most relevant socio-demographic and webographic factors that are considered by users while sending/accepting friend requests. An extensive survey has been conducted and the responses were used to determine the influence of various factors in friend request attributes. Based on the collected responses, logistic regression and artificial neural network models have been developed for predicting the users' friend request attributes. A comparative performance analysis of these models to predict the friend request attributes has also been done. The results indicate that neural network model outperformed the logistic regression model when data are nonlinear. The study also shows that among all the factors, users' gender, photographs, hometown, age, and shared interests are the most significant factors.
    Keywords: social networks; Facebook; user perception of friendship; logistic regression; artificial neural network; ANN.
    DOI: 10.1504/IJITM.2017.10005176
     
  • Using cognitive radio scheme for big data traffic management in cellular systems   Order a copy of this article
    by Jamal Raiyn 
    Abstract: This paper introduces the use of the cognitive radio in the cellular system. Cognitive radio Approach aims to manage the traffic flow in dynamic systems. The cognitive radio is a self-aware communication system that efficiently uses spectrum in an intelligent way. The cognitive radio scheme offers several features like autonomy, negotiation and sensing. The use of cognitive radio gives greater autonomy to the base stations. This autonomy allows an increase in flexibility to deal with new situations in the traffic load. The negotiation is used to avoid conflict in the resource allocation. The proposed algorithm is very successful for two reasons. The cognitive radio handles the handoff problem that reduces the handoff blocking rate. The reduction of the call blocking rate in cellular networks will increase the accuracy and the reliability of the forecast model. A number of spectrum sensing techniques have been proposed. A spectrum scheme uses received signals to detect channel states. To improve the performance of spectrum sensing scheme new technique will be added to spectrum scheme. The new technique is channel states forecasting based on quality of experience.
    Keywords: cognitive radio; cellular system; forecast scheme.
    DOI: 10.1504/IJITM.2017.10005167
     
  • Study of repeated e-government project audit based on text mining   Order a copy of this article
    by Yan Hong Chen, Hui Hui Li, Zhi Nan Yu 
    Abstract: In recent years, a large amount of unstructured text data is produced in the auditing field. In order to obtain the abundant potential knowledge and auditing trails, researchers pay more attention to the text mining technology. In this paper, we first introduce the basic concepts and application of text mining. Then, we use TF-IDF method to model text documents as term frequency vectors, and compute similarity between text documents by using cosine similarity. The results of experiment in the repeated e-government project audit show the analysis method of text achieved a relatively good accuracy.
    Keywords: texting mining; project audit; TF-IDF; repeated project; e-government.
    DOI: 10.1504/IJITM.2017.10005719
     

Special Issue on: ICSS 2015 Services Computing Technologies and Applications

  • Threefold similarity analysis A case study on crowdsourcing feeds   Order a copy of this article
    by Kaixu Liu, Gianmario Motta 
    Abstract: Crowdsourcing is a valuable social sensing for the smarter city. We present a framework of crowdsourcing feeds similarity analysis from a threefold point of view, namely image, text, and geography, which is based on similarity analysis, founded on a sequence that goes from coarse to thinner similarity filters. The main idea is to extract feeds within a specific geographic range, and then to analyze similarity of image color and text in clustered feed sets. The framework enables to identify feeds that report the same issue, and hence to filter redundant information. Based on proved methods and algorithms, such framework has been implemented in a software application, called CITY FEED, which is used by the Municipality of Pavia.
    Keywords: Crowdsourcing, Smart city, Image similarity analysis, Text similarity analysis.

  • Needle in a Haystack: An Empirical Study on Mining Tags from Flickr User Comments   Order a copy of this article
    by Haijun Zhang, Jingxuan Li, Bin Luo, Yan Li 
    Abstract: In the Web2.0 era, user generated content has become the main source of information of many popular photo-sharing websites such as Flickr. In Flickr, many photos have very few or even no tags, because only the uploader can mark tags for a photo. Meanwhile, the user can deliver his/her comment on the photo, which he/she is browsing. Therefore, it is possible to recommend new tags or enrich the existing tag set based on user comments. The work of this paper contains two phases, i.e. the tag generation, and the ranking algorithm. In the phase of candidate tags generation, two methods are introduced relying on Natural Language Processing (NLP) techniques, namelyword-based and phrase-based. In ranking and recommending tags, we proposed an algorithm by jointly modeling the location information of candidate tags, statistical information of candidate tags and semantic similarity between candidate tags. Extensive experimental results demonstrate the effectiveness of our method.
    Keywords: tag recommendation; user comment; Flickr; image annotation

  • SGP: A Social Network Sampling Method Based on Graph Partition   Order a copy of this article
    by Xiaolin Du, Yunming Ye, Yan Li, Yueping Li 
    Abstract: A representative sample of a social network is essential for many Internet services that rely on accurate analysis. A good sampling method for social network should be able to generate small sample network with similar structures and distributions as its original network. In this paper, a sampling algorithm based on graph partition, SGP (Sampling based on Graph Partition), is proposed to sample social networks. SGP firstly partitions the original network into several subnetworks, and then samples in each subnetwork evenly. This procedure enables SGP to effectively maintain the topological similarity and community structure similarity between the sampled network and its original network. Finally, we evaluate SGP on several well-known data sets. The experimental results show that SGP method outperforms seven state-of-the-art methods.
    Keywords: sampling algorithms; social networks; graph partition; community structure; topology structure.

Special Issue on: Next Generation of Social Computing for Computational Collective Intelligence

  • Immersive element analysis of the multiplayer online battle arena game genre   Order a copy of this article
    by Gilsang Yoo, Jaebum Jung, Jaechun Ryu, Jeahong Kim, Kichun Nam 
    Abstract: The game industry is the total entertainment industry, which includes its entertainingness and popularity and the future planning industry, which allows to create added value with its neighboring industry. The main purpose of these game development is improving its competitiveness by making satisfied product for users. To make competitiveness game product, it is needed to classify the interested elements and analyze flow elements correctly. In this study, we deducted the content elements from the Multiplayer Online Battle Arena (MOBA) game genre and quantified the importance of subdivided elements of focus group interview and semi-Delphi. Play theory based MOBAs flow elements is analyzed by the quantified value of subdivided elements. By this, we propose the developmental direction about interested elements of the MOBA game genre. This study result can be used for contents satisfaction of MOBA game genre and flow evaluation system.
    Keywords: Flow, Game immersive, Game design, Play theory, Multiplayer Online Battle Arena

  • Texture Analysis Based Feature Extraction Using Gabor Filter and SVD for Reliable Fault diagnosis of an Induction Motor   Order a copy of this article
    by Rashedul Islam, Jia Uddin, Jong-Myon Kim 
    Abstract: This paper presents a texture analysis based feature extraction method using a Gabor filter and singular value decomposition (SVD) for reliable fault diagnosis of an induction motor. This method first converts 1D vibration signal to 2D image pixels to create a 2D grey-level texture image for each fault signal. Then, the 2D Gabor filter with optimal frequency and orientation values is used to extract a filtered image with distinctive texture information, and SVD is utilized to decompose the Gabor filtered image and select finer singular values of SVD as discriminative features for multi-fault diagnosis. Finally, one-against-all multiclass support vector machines (OAA-MCSVMs) is used as a classifier. In this study, multiple induction motor faults with different noisy conditions are used to validate this proposed fault diagnosis methodology. Experimental result indicates that the proposed method achieves an average classification accuracy of 99.86% and outperforms conventional fault diagnosis algorithms in the fault classification accuracy.
    Keywords: induction motor; texture analysis; discriminative features; Gabor filter; singular valued decomposition

  • An Introduction to Face-Recognition Methods and its Implementation in Social Software Applications   Order a copy of this article
    by Kang-Hee Lee, Byoung-Moo Kwon 
    Abstract: Face detection and recognition technology has shown a steep development in the field of scientific research and is subsequently harvesting growing interest from the industry, which in fact can be confirmed seeing numerous implementations in forms of socially interactive applications such as autofocus in digital cameras, human computer interfaces in smartphones, or even video surveillance cameras in airports. In response to this growing interest and willingness to implement this technology of face detection and face recognition technology, this paper will provide the readers with fundamental knowledge of how face detection essentially works and ought to help the readers to establish a foothold in developing own ideas using face detection technology. The main purpose of this research paper is to introduce several significant principles of current face-detecting methods such as active shape model(ASM), active appearance model(AAM) and constrained local models(CLM) in a comprehensive manner and to provide some insight on closely related topics such as principal component analysis and eigenfaces. In this paper we will also present selected examples of implementations of above mentioned face-detecting methods via open-source software applications such as ofxFacetracker and FaceSubstitution with openFrameworks.
    Keywords: Face Recognition, Active Shape Model(ASM), Active Appearance Model(AAM), Constrained Local Model(CLM

  • Shadow Detection using Chromaticity and Entropy in colour image   Order a copy of this article
    by Ki-Hong Park, Jae-Ho Kim, Yoon-Ho Kim 
    Abstract: Shadows in image often bring a significant problem which can cause unintended negative outcome, so how to detect shadow is an important issue of computer vision tasks. This paper proposed a method to detect shadows from real images. Due to shadows in image have a dark pixel values, shadow candidates are defined. Shadow candidates have been estimated and detected by chromaticity of colour image and threshold image using entropy. Some experiments are conducted so as to verify the proposed method, and results show that the proposed method can detect shadows in colour image.
    Keywords: shadow detection; shadow candidates; chromaticity; entropy; single image; minimum cross entropy; maximum entropy; colour distribution; colour model; colour histogram.

  • The Investigation of Relationships: Self-esteem, Self-confidence, and Conduct Problems in Counseling   Order a copy of this article
    by Mila Park 
    Abstract: The purpose of this study was to investigate the relationship between self-esteem self-confidence, and conduct problems. It demonstrated that the correlation of self-esteem and self-confidence was not significantly related to the children and adolescents' conduct problems. Also, there is no direct relationship between self-confidence and parents couple intimacy. However, self-esteem and parents' couple intimacy were significantly related, indicating that self-esteem and self-confidence are different. As demonstrated by Hypotheses, the relationship of self-esteem and self-confidence is significant. In particular, self-esteem is more significant than self-confidence in this study. The relationship of self-esteem and parents' couple intimacy, and self-esteem and self-confidence, were accepted. It indicated that self-esteem and self-confidence are very similar but they have different ripple effects. This study aims to examine coping conduct problems, self-confidence, and self-esteem of students in Korea. Results of the study also gave information about the general information relating to the self-esteem of 1st to 12th grade students. The results produced evidence for the obvious correlations between coping behaviors, and self-esteem as well. This data will help counselors and educators recognize their students difficulties when they practice in counseling settings and identify how to help students use their counseling more proficiently.
    Keywords: Self-esteem, Self-confidence, Conduct(behavioral) problems, Parents’ couple intimacy, HTP drawing test, Adolescents, Children, Counseling, Education, Family relationship, parenting.

  • User Interface Using Bounce for Realistic Movement on Smart TV   Order a copy of this article
    by Daehyun Ryu 
    Abstract: In this research, we designed the various movements on the screen based on a touch pad of smart TV. Due to increment of smart TV, diverse interfaces are applied on the screen and movement is the crucial part of the interfaces. However, the screen is comprised of pattern as a button, the availability of new interface is less effected for users. Therefore, it is necessary to research new screen composition to escape the existing one. rnThe plan of this research is to expect the appropriate screen of smart TV, we analyze related research and give a change of movement. This screen layout suggests new directional properties such as moving the position where we want with simple gesture. Moreover, we found the fact in this research that less change from movement of many objects is showed that compared with existing movement. rnThe result of this research, it is possible to show motion of various effects and two-dimensional movement better than existing one-dimensional movement. So, we enhanced motion naturally and degree of freedom. rnThis research suggests matched motion for the applicable interface on the screen composition of smart TV from now on, so that we expect compatible development for the future UI environment of screen.rn
    Keywords: Smart TV; UI; Bounce; touch pad; realistic;

  • Analysis of Serious Games for Preventing Internet Gaming Addiction   Order a copy of this article
    by Ji-Yun Kim, Jae Hwan Bae 
    Abstract: Internet Addiction and Internet Gaming(Game) Addiction are two terms regularly used in our daily lives, however, their distinction is rather vague. Internet Gaming Addition refers to a psychological, emotional, and social state where one, due to increased tolerance and dependence to games and other reasons, loses control over and plays internet games excessively and compulsively, and any efforts to reduce or stop playing will be ensued by withdrawal symptoms. One means to better the problems caused by Gaming Addiction is development of a variety of Serious Games and related services. Whereas Internet games are played for entertainment, Serious Games utilize the entertainment function to further education and addition preventive measures objectives.
    Keywords: Serious Game, Game Addiction Preventionrn

  • A Framework for Context-Aware Application Programming on Smart Phone   Order a copy of this article
    by BaekGyoon Sung 
    Abstract: The internationalization of a small mobile operator into the surrounding emerging markets is an entrepreneurial and risky process due to the target markets nature. This paper deals with market and timing factors potentially influencing the transaction costs of a company in its international ventures, which are used as transaction cost proxies, based on Gerpott and Jakopins paper Determinants of Mobile Network Operators Choice of Cross-Border Entry Modes. In addition, they are assigned as corresponding hypotheses in order to test their effect on Zain Telecoms entry mode choices. This model did not seem to explain all factors influencing the entry mode choices of Zain Telecom, since not only many hypotheses were rejected, but also they did not match with the findings of Gerpott and Jakopin for mobile operators in the Western world. Hence, in order to understand the managerial drivers in Zain Telecoms decision-making, a holistic framework MEMS (Market and Market Entry Mode Selection) model was used. This framework shed the light on many of the managerial facets of Zains strategical decision-making and answered the following question: How did target country, market, and timing factors contribute in shaping Zain Telecoms cross-border entry mode choices? Of course, for optimal and overall decision making, this research should be enriched with engineering analysis and techniques.
    Keywords: Framework for context aware application, Context awareness, personalized service, Context aware system on smart phone, rule based reasoning, case based reasoning, Smartphone sensor.

  • A Tree Cognitive Navigation System Based on Two-dimensional Code and GPS   Order a copy of this article
    by Wenjie Hu, Chunling Wang, Qiaochu Mo, Bo Wang 
    Abstract: The recognition of trees plays an important role in the construction of ecological civilization. In order to strengthen tree information management and help the public to have a better understanding of trees, an Android-based tree cognitive navigation system for smart phones was developed. Using two-dimensional code and GPS technologies, the system can rapidly acquire geographic coordinates and species of trees. In this paper, the theory, system framework and key technologies of the system are presented. Subsequently, a tree cognitive system based on two-dimensional code and GPS was developed for Beijing Forestry University. The system implementation approach hasbroad application prospects. The case study showed that it is portable, practical, user-friendly, and network-independent and has good potential for application and expansion.
    Keywords: tree; two-dimensional code; GPS; Android system; cognitive navigation

  • Estimating the Sentiment Strength of a Word using Word Similarity   Order a copy of this article
    by Kangbok Lee, Jongbum Baik, Soowon Lee 
    Abstract: Identifying the sentiment orientation and strength of a sentence or phrase is one of the crucial issues in opinion mining. A dictionary approach to this problem is to use the sentiment orientations and strengths for the words included in a given document unit. This paper proposes a novel method for estimating the sentiment strength of a word using similarities between a target sentiment word and sentiment words in dictionary. To calculate the word similarity, we introduce the notions of relative similarity and adjusted similarity. The experimental results from the analysis of Facebook text data demonstrate the effectiveness of the proposed method in terms of the root-mean-square-error.
    Keywords: sentiment strength; word similarity; sentiment analysis; relative similarity; adjusted similarity

  • Game Operation Query Language (GOQL) for Facilitating Game Servers FCAPS Operation   Order a copy of this article
    by Hwan-Soo Yoo, Seong-Whan Kim 
    Abstract: Game companies require successful game operation for their revenue maximization. In an operation phase, they need not only operators who are experts in non-functional and operational issues but also developers who are experts in game development. Game server should manage several operational issues such as fault recovery, performance metering, and configuration management during game service period. However, most game server operators do not have programming expertise. To support successful FACPS (fault, accounting, configuration, performance, security) operation without programming expertise or development knowledge, we introduce DSL (domain specific language) operation approach for usual game operators. We design GOQL DSL, focusing on fault, configuration, and performance management issues. We experimented with 15 game server operators who are working in major game publishers. Experimental results show that GOQL was attractive to game operators because it is functional and does not require programming knowledge even in the situation that needs programming source modifications. For the future research, we will extend our textual version of GOQL to visual language version to give more convenience and intuitive advantage to game operators and novice developers. To cover this, we require study on visual notations, UX related elements, and visual transformation of text.
    Keywords: Game; Server; Operation; FCAPS; DSL

  • Gaining compliance in humanrobot interaction: Korean honorific forms and gestures   Order a copy of this article
    by Eunji Kim, Jonathan Sangyeon Lee, Meina Cui, Namyeon Lee, Ohbyung Kwon 
    Abstract: Although research on social robots has increased as robots become more prevalent in everyday life, there is still a controversy as to what makes people agree to or follow instructions coming from robots during humanrobot interaction. In this paper, we propose a research model of compliance with robot guidance, examining the stages through which compliance develops and the associated stimuli, cognition, and attitude toward the consequences of complying with the guidance of a social robot. In an experiment, participants (n=36) interacted with a guidance robot exhibiting different levels of honorifics. The results demonstrate that the perceived level of politeness in robot speech and gestures is a determinant of compliance intention. The findings from this study may contribute to a better understanding of human feelings and perceptions toward social robots and the development of effective and interactive design guidelines.
    Keywords: Human–Robot Interaction; Social Robot; Politeness; Compliance.

Special Issue on: LISS 2014 Data Mining Theories, Methods, and Applications

  • Modeling Technique of the Object-Attribute System Oriented to Data Mining   Order a copy of this article
    by Yaoyu Hu, Ai Wang 
    Abstract: The research of modeling the object-attribute system, essentially a two dimensional problem, belongs to the domain of interpretative structural modeling and it is one of the basic problems in the data mining field. Firstly, this paper proposes and demonstrates the Subsystem Judgment theorem. In order to solve the problem above, this paper puts forward an algorithm which can reduce the scale and the dimension of the original data through modeling the object-attribute system based on the object similar feature matrix (OSFM). In the last part of the paper, a numerical value example is provided to show the whole process of the method.
    Keywords: ISM; Subsystem Judgment theorem; data mining; OSFM

  • Relationships among Customer Loyalty, Customer Satisfaction, Corporate Image and Behavioral Intention on Social Media for A Corporation   Order a copy of this article
    by Lv Haixia, Yu Guang, Wu Gang 
    Abstract: In this paper, how customer loyalty, customer satisfaction, corporate image and behavioral intention affect each other on social media and how to make the benefit maximization for corporation are explored. We leverage Natural Language Processing (NLP) techniques analysis emotion of comment and retweet in the text, and combined with the other attributes and behavior of the Weibo users who interact with the corporate account (we used the accounting data of Shanghai Peace Hotel as the study case) to research the relationships on social media. The results show that customer image has a direct impact on customer satisfaction and has an indirect impact on customer loyalty. Customer loyalty is impacted by customer satisfaction and behavior intention. Th influence of customer image on behavior intention and loyalty and the influence of customer satisfaction on behavior intention are not very significant. As the results suggest, Shanghai Peace Hotel needs to more widely publicize their corporation such as celebrity endorsement and make more interaction with his followers through a variety of marketing activities (Lv et al., 2013). The difference between the traditional media and social media is another marketing problem. Facing such challenges, businesses should reconsider their strategy regarding customer satisfaction. Whether they can keep existing consumer, or make extra efforts to anticipate, appreciate, understand, and satisfy their genuine needs and whether they can build close relationship with existing customers are the three main topics. This study provides empirical evidences to analyze the relationships and provide the reference for the corporation to make the strategic plan.
    Keywords: Behavioral Intention, Corporate Image, Customer Satisfaction, Customer Loyalty, Social Media, Structural Equation

  • A Research on the International Competition Ability Measure of Chinese ICT Industry   Order a copy of this article
    by Li Hai-chao, Fan Shi-jie 
    Abstract: ICT industry is playing a key role nowadays and in future world economic development, and has become the focus of world economic competitions. In the process of making current empirical investigation on the international competition ability of ICT industry, we meet great difficulties. The research on the international competition ability measure of Chinese ICT industry can remedy the shortcomings of the theory research and also benefit for determining Chinese ICT status in the world, in that way we can get the access to make improvement for international competition ability of Chinese ICT industry. To further explore and discover the level of international competition ability of ICT industry in a scientific way, some famous scholars choose the evaluation index on the mixing of the ICT industry's specific characteristics. In this paper, we have selected RCA index, MS index, TC index and CA index as measuring indexes and find out the weight of these index and time sequence through advanced entropy method to measure international competition ability of Chinese ICT industry. The results show that the international competition ability of Chinese ICT industry is in the second place among 15 countries, with a higher level of international competition ability
    Keywords: ICT industry; international competition ability; entropy method; measure.

Special Issue on: Advances in Technology and Management in a Global World

  • Enhancing BRICS integration: a cloud-based green supply chain concept   Order a copy of this article
    by Saroj Koul, Hari Narayan Perikamana, Uma Kumar, Vinod Kumar 
    Abstract: Today, BRICS - a five nation active group - represents an emerging power that aims to increase its economic integration in response to new global challenges. While many companies in the BRICS group are opening up new geographical industry clusters, changing their IT landscape, and contributing to global climate change concerns, others are not fully prepared, or ready, to do so. This study explores the applicability of mutually beneficial cloud-based green supply chain system among BRICS nations to help achieve development targets while mitigating the environmental impacts associated with rapid development and industrialisation. Data on the BRICS countries trade potential and patterns is reviewed to get a sense of the movement of goods and services between the BRICS nations. Although regulatory barriers and inter-country coordination pose significant challenges for meeting the promise of BRICS trade cooperation, the adoption of new cloud-based IT technologies, new innovations and new thinking remains an important enabling driver of green supply chain management and needs to be explored.
    Keywords: BRICS; green supply chain system; cloud-based system; IT technologies.
    DOI: 10.1504/IJITM.2017.10005698
     
  • Evaluating the competitiveness of Indian metro cities: in smart city context   Order a copy of this article
    by Harish Kumar, Manoj Kumar Singh, Manmohan Prasad Gupta 
    Abstract: The eminent outgrowth rate of urban population and varying conditions need to improve public utilities and various services to its citizens in a particular city. There is a need for smarter, effective, efficient and sustainable cities in developing countries like India. Various urban development initiatives have been planned by the Indian Government for the rapid urbanisation. The objective of this study is to analyse the competitiveness of four main metro cities in India. Various indicators essential for city competitiveness were identified from the extensive literature study. Secondary data was collected for four metro cities, i.e., Delhi, Kolkata, Mumbai and Chennai. Based on city competitive analysis, this study explores about the smart city initiatives which could be implemented for these metro cities to make them smart cities.
    Keywords: city competitiveness; smart cities; standardised score; competitive analysis; smart city initiatives.
    DOI: 10.1504/IJITM.2017.10005708
     
  • Big data analytics for exploratory social network analysis   Order a copy of this article
    by Chetna Dabas 
    Abstract: If an organisation desires to retrieve productive insights, big data analytics plays a vital role in analysing the unstructured, semi-structured and structured data. Big data assumes human-sourced information (social network analysis), machine-generated data and process-mediated data. Big data as a product of social networks comes from human experiences in works of art or in books, video, photographs, etc. A small piece of information that might have begun with a suggestion of purchasing a smart phone during group chats amongst a circle of friends might end up on the desk of a smart phone company manager as an aid to decision making. This paper aims to address big data analytics for exploratory social network and proposes an experimental study with results. Experimentation has been carried out on SocNetV Version 1.9 using Pajek and different metrics of SNA are evaluated and analysed to strengthen decision making.
    Keywords: big data analytics; data visualisation; social network analysis; SNA.
    DOI: 10.1504/IJITM.2017.10005706
     
  • The internet of things - new value streams for customers   Order a copy of this article
    by Ashok Kumar Wahi, Vandana Ahuja 
    Abstract: This manuscript traces the changes in the organisational ecosystems which will pave the way for the evolution of the business systems for 2020 and studies the diverse applications of the internet of things (IoT). IoT can help companies in creating new value streams for customers, speed time to market, and respond more rapidly to customer needs. The manuscript further proceeds to outline the varied applications which would eventually translate into long term benefits for the corporate sector with respect to creation of new business models, real time mission critical systems, diversification of revenue streams, global visibility through digital marketing and efficient, intelligent operations. While some benefits may have greater value to the corporate sector, the others while having tremendous potential may spell out slightly lesser significance and advantage to the commercial sector. This study develops an internet of things application benefit index (IABI), which reflects the composite potential of a specific internet of things applications, in terms of its long-term benefits to the corporate workspaces.
    Keywords: internet of things; IoT; internet of things application benefit index; IABI; value streams; revenue streams; digital marketing; business models.
    DOI: 10.1504/IJITM.2017.10005701
     
  • Antecedents for success of e-commerce platforms: an investigative approach   Order a copy of this article
    by Asif Ali, Gowhar Rasool, Anjali Pathania 
    Abstract: A plethora of literature is available highlighting the critical success factors (CSFs) of information systems (IS). While most of the studies were elusive in determining CSFs, the research of DeLone and McLean (1992) proposed an IS success model which is most comprehensive and widely applied model in various research studies carried out in this context. The model was later updated to incorporate parsimony by DeLone and McLean (2003). The updated model is based on six success factors, i.e., system quality, information, service quality use, user satisfaction and net benefits. This paper attempts to examine the role of each critical success factors as suggested by DeLone and McLean (2003) towards the success of e-commerce platforms and how it can be leveraged for enhancing customer value by laying strong foundation on most vital factor. DeLone and McLean (2003) model was applied to make a comparison between Flipkart and Snapdeal which are two dominant players of e-commerce in India, so as to investigate the antecedents for the success of e-commerce platforms.
    Keywords: information systems; e-commerce platforms; user experiences; critical success factors.
    DOI: 10.1504/IJITM.2017.10005709
     

Special Issue on: LISS16-ITM Information and Technology Management in Big Data Environment

  • Analysis of the Multi-Agents Relationship in Collaborative Innovation Network for Science and Technology SEMs Based on Evolutionary Game Theory   Order a copy of this article
    by Guangyou Nan, Jinyu Wei, Haiju Hu 
    Abstract: The construction of collaborative innovation network for the science and technology small and middle enterprises (SMEs) is an attempt to effectively combine the advantages of science and technology SMEs. In this paper, the evolutionary game theory is used to establish the three partys game model including the government, science and technology SMEs, the college and research institution. Then, the interaction mechanism among them is analyzed. On the basis of analyzing each partys cost and benefit under different strategic portfolios of three parties, the stable strategy of the evolutionary game is derived. The research results show that the government can effectively mobilize the enthusiasm of enterprises and the college and research institution by setting up reasonable subsidies or fines for them, and could also influence and promote the cooperation relations between enterprises and the college and research institution.
    Keywords: Collaborative Innovation Network; Government; Science and Technology SMEs; College and Research institution; Innovation Management; Evolutionary Game Theory.

  • Research on the Measuring Method and Structure Mining of Organization Conflict   Order a copy of this article
    by Lei Liu, Xinan Zhao 
    Abstract: Jehn divides organization conflict into task conflict and relationship conflict. To grasping the degree and structure of organization conflict, which can provide effective decision-making basis for dealing with conflict. Establishing measurement model of organization conflict , giving the weight with the methods of distinguish individual advantage characteristic and using Intergroup Conflict Scale to measure conflict situation .According to the measurement results, (1) analyzing the intensity of the conflict of the organization, (2) analyzing the types of organization conflict, (3)fingding the common features of high conflict members. Taking a company in Shenyang as an example, selecting market services and property management departments. Applying the research method to analyze the organization conflict, determining the causes for conflict of high conflict group members, and verifing the feasibility of this study.
    Keywords: organization conflict;structure mining;individual advantage characteristic;clustering analysis.

  • Electric vehicle range estimation based on the road congestion level classification   Order a copy of this article
    by Hong Liang, Wenjiao Wang, Yunlei Sun, Min Zhong, Jianhang Liu 
    Abstract: Electric vehicles have been an emerging industry in recent years even though the remaining driving range bothering the drivers. To strengthen the user acceptance and relieve the range anxiety, an efficient and accurate estimation approach of remaining driving range would be a solution. In this paper, a road congestion level classification based on support vector machines is proposed and an electric vehicle power model is implemented based on the real-world dataset collected from LF620 battery vehicles. The experiment includes data pre-processing, best parameters searching, support vector machine model training and remaining driving range calculation. The results show the significant influence of considering the big data analysis results on range estimation.
    Keywords: electric vehicle; driving range estimation; support vector machine; python.

  • A Decision Support System for Identification of Technology Innovation Risk Based on Sequential CBR   Order a copy of this article
    by Quan Xiao 
    Abstract: To identify risks in the increasingly complex market is an important issue for the survival and development of technology innovation enterprises. But it is contended that there still lack effective methods to support the dynamic characteristic and knowledge reuse of the problem. In front of a variety of risk sources, the utilization of IT is necessary, and we introduce Case-based Reasoning (CBR) technique to identify new risks from cases in the past. However, extant CBR method has limitations on problems with dynamic characteristics. In this paper we provide insights into the dynamic nature of technology innovation risk identification, and contribute a novel extension of CBR to sequential CBR and design a decision support system for identification of technology innovation risk. In our framework, cases are represented as sequences of risk events, and similarity between cases is measured based on weighted event sequence pattern mining method. The effectiveness of this work is illustrated with a case of technology innovation risk identification.
    Keywords: risk identification; case-based reasoning; technology innovation; sequential data.

  • The research on the selection of the rice transfer machine   Order a copy of this article
    by Xin Yang, Zhenxiang Zeng, Xinjiang Cai 
    Abstract: This article sets the fuel consumption index and the working efficiency index as the main basis for the rice transfer machine. Through the simulation experiment of different load transfer machine models, it reaches their fuel law in the rice field. Finally it determines the best model by the optimal ratio and the working efficiency, which extremely satisfies the requirement of the short payback period and the long service life. The transfer machine reduces the labor intensity of the future agriculture field, improves the production efficiency, and reduces the labor cost. And it also has an important role on improving business efficiency.
    Keywords: Rice mechanization; Transfer machine; BOM; Fuel consumption efficiency ratio.