Search results

1 – 10 of over 22000
Article
Publication date: 10 May 2018

Chun-Liang Chen, Yao-Chin Lin, Wei-Hung Chen and Xin-Si Heng

The purpose of this paper is to prove the importance of both cluster leadership and identification on cluster innovation.

Abstract

Purpose

The purpose of this paper is to prove the importance of both cluster leadership and identification on cluster innovation.

Design/methodology/approach

The case studies presented in this study involve a cluster by micro-enterprises in Yilan, Taiwan. Data collected during interviews, observations and secondary data provide understanding and practices for the impact of cluster identification on cluster innovation.

Findings

This study proved: first, the importance of cluster identification on innovation by representing the need of consensus and collaboration of the members in conducting innovation actions; and second, the cluster identification is influenced by the cluster leadership by showing high satisfaction of the leader, close interaction between the members and high identification with the cluster.

Research limitations/implications

This study predicts the ongoing cluster innovation activities will be achieved due to the transformational leadership and high cluster identification.

Originality/value

This study enriches the factors of cluster innovation accomplishment and proposes the important of cluster identification, which has not been discussed much in the past.

Details

Leadership & Organization Development Journal, vol. 39 no. 4
Type: Research Article
ISSN: 0143-7739

Keywords

Article
Publication date: 14 November 2016

Bahjat Fatima, Huma Ramzan and Sohail Asghar

The purpose of this paper is to critically analyze the state-of-the-art session identification techniques used in web usage mining (WUM) process in terms of their limitations…

Abstract

Purpose

The purpose of this paper is to critically analyze the state-of-the-art session identification techniques used in web usage mining (WUM) process in terms of their limitations, features, and methodologies.

Design/methodology/approach

In this research, systematic literature review has been conducted using review protocol approach. The methodology consisted of a comprehensive search for relevant literature over the period of 2005-2015, using four online database repositories (i.e. IEEE, Springer, ACM Digital Library, and ScienceDirect).

Findings

The findings revealed that this research area is still immature and existing literature lacks the critical review of recent session identification techniques used in WUM process.

Originality/value

The contribution of this study is to provide a structured overview of the research developments, to critically review the existing session identification techniques, highlight their limitations and associated challenges and identify areas where further improvements are required so as to complement the performance of existing techniques.

Details

Online Information Review, vol. 40 no. 7
Type: Research Article
ISSN: 1468-4527

Keywords

Open Access
Article
Publication date: 13 June 2022

Julie Krogh Agergaard, Kristoffer Vandrup Sigsgaard, Niels Henrik Mortensen, Jingrui Ge and Kasper Barslund Hansen

The purpose of this paper is to investigate the impact of early-stage maintenance clustering. Few researchers have previously studied early-stage maintenance clustering

Abstract

Purpose

The purpose of this paper is to investigate the impact of early-stage maintenance clustering. Few researchers have previously studied early-stage maintenance clustering. Experience from product and service development has shown that early stages are critical to the development process, as most decisions are made during these stages. Similarly, most maintenance decisions are made during the early stages of maintenance development. Developing maintenance for clustering is expected to increase the potential of clustering.

Design/methodology/approach

A literature study and three case studies using the same data set were performed. The case studies simulate three stages of maintenance development by clustering based on the changes available at each given stage.

Findings

The study indicates an increased impact of maintenance clustering when clustering already in the first maintenance development stage. By performing clustering during the identification phase, 4.6% of the planned work hours can be saved. When clustering is done in the planning phase, 2.7% of the planned work hours can be saved. When planning is done in the scheduling phase, 2.4% of the planned work hours can be saved. The major difference in potential from the identification to the scheduling phase came from avoiding duplicate, unnecessary and erroneous work.

Originality/value

The findings from this study indicate a need for more studies on early-stage maintenance clustering, as few others have studied this.

Details

Journal of Quality in Maintenance Engineering, vol. 29 no. 5
Type: Research Article
ISSN: 1355-2511

Keywords

Article
Publication date: 28 April 2020

Siham Eddamiri, Asmaa Benghabrit and Elmoukhtar Zemmouri

The purpose of this paper is to present a generic pipeline for Resource Description Framework (RDF) graph mining to provide a comprehensive review of each step in the knowledge…

Abstract

Purpose

The purpose of this paper is to present a generic pipeline for Resource Description Framework (RDF) graph mining to provide a comprehensive review of each step in the knowledge discovery from data process. The authors also investigate different approaches and combinations to extract feature vectors from RDF graphs to apply the clustering and theme identification tasks.

Design/methodology/approach

The proposed methodology comprises four steps. First, the authors generate several graph substructures (Walks, Set of Walks, Walks with backward and Set of Walks with backward). Second, the authors build neural language models to extract numerical vectors of the generated sequences by using word embedding techniques (Word2Vec and Doc2Vec) combined with term frequency-inverse document frequency (TF-IDF). Third, the authors use the well-known K-means algorithm to cluster the RDF graph. Finally, the authors extract the most relevant rdf:type from the grouped vertices to describe the semantics of each theme by generating the labels.

Findings

The experimental evaluation on the state of the art data sets (AIFB, BGS and Conference) shows that the combination of Set of Walks-with-backward with TF-IDF and Doc2vec techniques give excellent results. In fact, the clustering results reach more than 97% and 90% in terms of purity and F-measure, respectively. Concerning the theme identification, the results show that by using the same combination, the purity and F-measure criteria reach more than 90% for all the considered data sets.

Originality/value

The originality of this paper lies in two aspects: first, a new machine learning pipeline for RDF data is presented; second, an efficient process to identify and extract relevant graph substructures from an RDF graph is proposed. The proposed techniques were combined with different neural language models to improve the accuracy and relevance of the obtained feature vectors that will be fed to the clustering mechanism.

Details

International Journal of Web Information Systems, vol. 16 no. 2
Type: Research Article
ISSN: 1744-0084

Keywords

Article
Publication date: 22 August 2008

Fabrice Coutier and Giovanni Sebastiani

This purpose of this paper is to describe a fast and easy method of both clustering samples and identifying active genes in cDNA microarray data.

Abstract

Purpose

This purpose of this paper is to describe a fast and easy method of both clustering samples and identifying active genes in cDNA microarray data.

Design/methodology/approach

The method relies on alternation of identification of the active genes using a mixture model and clustering of the samples based on Ward hierarchical clustering. The initial‐point of the procedure is obtained by means of a χ2 test. The method attempts to locally minimize the sum of the within cluster sample variances under a suitable Gaussian assumption on the distribution of data.

Findings

This paper illustrates the proposed methodology and its success by means of results from both simulated and real cDNA microarray data. The comparison of the results with those from a related known method demonstrates the superiority of the proposed approach.

Research limitations/implications

Only empirical evidence of algorithm convergence is provided. Theoretical proof of algorithm convergence is an open issue.

Practical implications

The proposed methodology can be applied to perform cDNA microarray data analysis.

Originality/value

This paper provides a contribution to the development of successful statistical methods for cDNA microarray data analysis.

Details

International Journal of Intelligent Computing and Cybernetics, vol. 1 no. 3
Type: Research Article
ISSN: 1756-378X

Keywords

Article
Publication date: 6 September 2018

Michele Gorgoglione and Umberto Panniello

The purpose of this paper is to demonstrate that a deeper analysis of customer experience (CE) can identify idiosyncratic and critical perceptions in the experiences of groups of…

Abstract

Purpose

The purpose of this paper is to demonstrate that a deeper analysis of customer experience (CE) can identify idiosyncratic and critical perceptions in the experiences of groups of customers.

Design/methodology/approach

The methodology that the authors used is made of three main steps: segmentation analysis, profiling and identification of idiosyncratic clusters’ profiles (i.e. those with a CE perception different respect to the whole sample) and among these idiosyncratic clusters, identification of those that may be critical for the business.

Findings

The authors identified clusters of customers showing significant differences in their perceived experience with respect to the holistic CE model. Nevertheless, a sample of bank managers assessed three cluster profiles among them to be critical signals a company. The identification of these idiosyncratic patterns provides managers with interesting additional insights that would be hidden in a holistic CE model.

Practical implications

Managers can gain valuable insights of CE from this analysis that should be added to those coming from an holistic CE model.

Originality/value

This paper contributes to the scientific research in that it extends the knowledge about CE by showing how personal factors can be identified and how drawing additional managerial insights.

Details

International Journal of Bank Marketing, vol. 36 no. 7
Type: Research Article
ISSN: 0265-2323

Keywords

Article
Publication date: 1 July 1991

Patrick Fox

How a manager′s functional area and hierarchicallevel affect the roles required by managers in theirjobs is examined. The 131 managers in the samplecompleted a matrix of 20 tasks…

Abstract

How a manager′s functional area and hierarchical level affect the roles required by managers in their jobs is examined. The 131 managers in the sample completed a matrix of 20 tasks and 28 qualities required in their jobs. A disjoint clustering technique was used to analyse the data – this is a type of oblique component analysis related to group factor analysis. Subgroups of managers were delineated, seven on the basis of their functional areas, and one group of senior managers/executives. The results indicate that the differences between theories of management work can be attributed to methodological artefacts. However, the argument that management is a set of behavioural skills which is transferable from one functional area to another is questioned, as the results of this study indicate that job‐related contingency variables affect strongly the contents of managerial work.

Details

International Journal of Manpower, vol. 12 no. 7
Type: Research Article
ISSN: 0143-7720

Keywords

Article
Publication date: 30 October 2009

Fataneh Taghaboni‐Dutta, Amy J.C. Trappey, Charles V. Trappey and Hsin‐Ying Wu

This paper aims to study the development of radio frequency identification (RFID) technology through an analysis of patents filed with and issued by the US Patent and Trademark…

1313

Abstract

Purpose

This paper aims to study the development of radio frequency identification (RFID) technology through an analysis of patents filed with and issued by the US Patent and Trademark Office. A close analysis of these clusters reveals the patent development strategies of two competing factions of RFID technology developers. This paper provides an analysis of the patents along with insights into the contents of the patents held by these two groups.

Design/methodology/approach

The analysis is based on Intermec Technologies and the RFID Patent Pool, the two major players in this domain. The comparison of Intermec Technologies and RFID Patent Pool is conducted using meta‐data analysis and patent content clustering. The methodology and approach includes data pre‐processing, key phrase extraction using term frequency‐inverse document frequency, ontology construction, key phrase correlation measurement, patent technology clustering and patent document clustering. Clusters are derived using the K‐means approach and a prototype Legal Knowledge Management Platform.

Findings

The findings support a strong link between intellectual property and competitive advantage – specifically Intermec Technologies, which have not joined the RFID Patent Pool. The patent search results show that Intermec Technologies hold basic RFID patents in the early stages of technology development, which has placed the company in a dominant position.

Research limitations/implications

The features of each cluster clearly depict the niches and specialties of companies and provide a historical framework of RFID technology development.

Practical implications

The RFID patent analysis shows that if a company holds crucial patents in the early stages of a developing technology which relate to the fundamental key aspects of the technology, then the company will be more likely to maintain a leading and dominant position in that industry segment (i.e. RFID in this study).

Originality/value

This research uses patent content cluster analysis to explain the rationale behind an alliance strategy decision.

Details

Management Research News, vol. 32 no. 12
Type: Research Article
ISSN: 0140-9174

Keywords

Open Access
Article
Publication date: 28 July 2020

Prabhat Pokharel, Roshan Pokhrel and Basanta Joshi

Analysis of log message is very important for the identification of a suspicious system and network activity. This analysis requires the correct extraction of variable entities…

1075

Abstract

Analysis of log message is very important for the identification of a suspicious system and network activity. This analysis requires the correct extraction of variable entities. The variable entities are extracted by comparing the logs messages against the log patterns. Each of these log patterns can be represented in the form of a log signature. In this paper, we present a hybrid approach for log signature extraction. The approach consists of two modules. The first module identifies log patterns by generating log clusters. The second module uses Named Entity Recognition (NER) to extract signatures by using the extracted log clusters. Experiments were performed on event logs from Windows Operating System, Exchange and Unix and validation of the result was done by comparing the signatures and the variable entities against the standard log documentation. The outcome of the experiments was that extracted signatures were ready to be used with a high degree of accuracy.

Details

Applied Computing and Informatics, vol. 19 no. 1/2
Type: Research Article
ISSN: 2634-1964

Keywords

Article
Publication date: 15 June 2023

Abena Owusu and Aparna Gupta

Although risk culture is a key determinant for an effective risk management, identifying the risk culture of a firm can be challenging due to the abstract concept of culture. This…

Abstract

Purpose

Although risk culture is a key determinant for an effective risk management, identifying the risk culture of a firm can be challenging due to the abstract concept of culture. This paper proposes a novel approach that uses unsupervised machine learning techniques to identify significant features needed to assess and differentiate between different forms of risk culture.

Design/methodology/approach

To convert the unstructured text in our sample of banks' 10K reports into structured data, a two-dimensional dictionary for text mining is built to capture risk culture characteristics and the bank's attitude towards the risk culture characteristics. A principal component analysis (PCA) reduction technique is applied to extract the significant features that define risk culture, before using a K-means unsupervised learning to cluster the reports into distinct risk culture groups.

Findings

The PCA identifies uncertainty, litigious and constraining sentiments among risk culture features to be significant in defining the risk culture of banks. Cluster analysis on the PCA factors proposes three distinct risk culture clusters: good, fair and poor. Consistent with regulatory expectations, a good or fair risk culture in banks is characterized by high profitability ratios, bank stability, lower default risk and good governance.

Originality/value

The relationship between culture and risk management can be difficult to study given that it is hard to measure culture from traditional data sources that are messy and diverse. This study offers a better understanding of risk culture using an unsupervised machine learning approach.

Details

International Journal of Managerial Finance, vol. 20 no. 2
Type: Research Article
ISSN: 1743-9132

Keywords

1 – 10 of over 22000