Search results

11 – 20 of over 16000
Article
Publication date: 7 June 2013

Mu‐Jung Huang, Heien‐Kun Chiang, Pei‐Fen Wu and Yu‐Jung Hsieh

This study aims to propose a blackboard approach using multistrategy machine learning student modeling techniques to learn the properties of students' inconsistent behaviors…

Abstract

Purpose

This study aims to propose a blackboard approach using multistrategy machine learning student modeling techniques to learn the properties of students' inconsistent behaviors during their learning process.

Design/methodology/approach

These multistrategy machine learning student modeling techniques include inductive reasoning (similarity‐based learning), deductive reasoning (explanation‐based learning), and analogical reasoning (case‐based reasoning).

Findings

According to the properties of students' inconsistent behaviors, the ITS (intelligent tutoring system) may then adopt appropriate methods, such as intensifying teaching and practicing, to prevent their inconsistent behaviors from reoccurring.

Originality/value

This research sets the learning object on a single student. After the inferences are accumulated from a group of students, what kinds of students tend to have inconsistent behaviors or under what conditions the behaviors happened for most students can be learned.

Article
Publication date: 12 September 2016

Boris Bosancic

The purpose of this paper is to propose an appropriate symbolic representation, as well as its metaphorical interpretation, to illustrate the special role of information in the…

3021

Abstract

Purpose

The purpose of this paper is to propose an appropriate symbolic representation, as well as its metaphorical interpretation, to illustrate the special role of information in the knowledge acquisition process.

Design/methodology/approach

Besides the literature review, this is a speculative study based on a symbolic and metaphorical point of view.

Findings

The proposed symbolic representation was derived from the conceptual designation of information “as a flow” and, accordingly, by the corresponding redrawing of the data-information-knowledge-wisdom (DIKW) pyramid. The knowledge acquisition process is symbolically represented by the growth of a “tree of knowledge” which is planted on a “data earth,” filled with “information sap” and lit by the rays of the “sun of the mind,” a new symbol of the concept of wisdom in the DIKW model. As indicated, a key concept of this metaphorical interpretation is the role of “information sap” which rises from the roots of the “tree of knowledge” to the top of the tree and it is recognized as an invisible link between “world of data” and “world of knowledge.” This concept is also proposed as a new symbolic representation of the DIKW model.

Originality/value

On the basis of specific symbolic-metaphorical representation, this paper provides a relatively new concept of information which may help bridge observed gaps in the understanding of information in various scientific fields, as well as in its understanding as an objective or subjective phenomenon.

Details

Journal of Documentation, vol. 72 no. 5
Type: Research Article
ISSN: 0022-0418

Keywords

Article
Publication date: 1 June 2018

Chunxiu Qin, Pengwei Zhao, Jian Mou and Jin Zhang

Browsing knowledge documents in a peer-to-peer (P2P) environment is difficult because knowledge documents in such an environment are large in quantity and distributed over…

Abstract

Purpose

Browsing knowledge documents in a peer-to-peer (P2P) environment is difficult because knowledge documents in such an environment are large in quantity and distributed over different peers who organize the documents according to their own views. This paper aims to propose a method for constructing a personal knowledge map for a peer to facilitate knowledge browsing and alleviate information overload in P2P environments.

Design/methodology/approach

The research presents a method for constructing a personal knowledge map. The method adopts an ontology-concept-tree-based classification algorithm to recognize a peer’s personal knowledge structure and construct a personal knowledge map, and uses a self-organizing map algorithm to cluster and visualize the knowledge documents. The correctness of the created knowledge map is evaluated with a collection of abstracts of academic papers.

Findings

The method for constructing a personal knowledge map is the main finding of this research. The evaluation shows that the created knowledge map is good in quality.

Research limitations/implications

The proposed method provides a way for P2P platforms to understand their users’ knowledge background, as well as to improve the P2P platform environment. However, the proposed method will not help a peer when he has nothing in his individual knowledge document repository (i.e. the “cold start” problem). The method also requires a relatively good ontology base for a P2P document sharing system to use the method effectively.

Originality/value

It is novel that the proposed method organizes the knowledge documents related to a peer’s knowledge background into a personal knowledge map. Moreover, the created knowledge map combines the advantages of a hierarchical display and a map display. It has values for a distributed P2P environment to facilitate users’ knowledge browsing and to alleviate information overload.

Details

The Electronic Library, vol. 36 no. 3
Type: Research Article
ISSN: 0264-0473

Keywords

Article
Publication date: 21 December 2023

Majid Rahi, Ali Ebrahimnejad and Homayun Motameni

Taking into consideration the current human need for agricultural produce such as rice that requires water for growth, the optimal consumption of this valuable liquid is…

Abstract

Purpose

Taking into consideration the current human need for agricultural produce such as rice that requires water for growth, the optimal consumption of this valuable liquid is important. Unfortunately, the traditional use of water by humans for agricultural purposes contradicts the concept of optimal consumption. Therefore, designing and implementing a mechanized irrigation system is of the highest importance. This system includes hardware equipment such as liquid altimeter sensors, valves and pumps which have a failure phenomenon as an integral part, causing faults in the system. Naturally, these faults occur at probable time intervals, and the probability function with exponential distribution is used to simulate this interval. Thus, before the implementation of such high-cost systems, its evaluation is essential during the design phase.

Design/methodology/approach

The proposed approach included two main steps: offline and online. The offline phase included the simulation of the studied system (i.e. the irrigation system of paddy fields) and the acquisition of a data set for training machine learning algorithms such as decision trees to detect, locate (classification) and evaluate faults. In the online phase, C5.0 decision trees trained in the offline phase were used on a stream of data generated by the system.

Findings

The proposed approach is a comprehensive online component-oriented method, which is a combination of supervised machine learning methods to investigate system faults. Each of these methods is considered a component determined by the dimensions and complexity of the case study (to discover, classify and evaluate fault tolerance). These components are placed together in the form of a process framework so that the appropriate method for each component is obtained based on comparison with other machine learning methods. As a result, depending on the conditions under study, the most efficient method is selected in the components. Before the system implementation phase, its reliability is checked by evaluating the predicted faults (in the system design phase). Therefore, this approach avoids the construction of a high-risk system. Compared to existing methods, the proposed approach is more comprehensive and has greater flexibility.

Research limitations/implications

By expanding the dimensions of the problem, the model verification space grows exponentially using automata.

Originality/value

Unlike the existing methods that only examine one or two aspects of fault analysis such as fault detection, classification and fault-tolerance evaluation, this paper proposes a comprehensive process-oriented approach that investigates all three aspects of fault analysis concurrently.

Details

International Journal of Intelligent Computing and Cybernetics, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1756-378X

Keywords

Article
Publication date: 11 November 2013

Raja-Jamilah Raja-Yusof, Jananatul Akmal and Nazean Jomhari

The purpose of this paper is to study suitable visualization techniques representing Qur'an history and atlas. It focuses on analyzing the effectiveness of the concept map and the…

Abstract

Purpose

The purpose of this paper is to study suitable visualization techniques representing Qur'an history and atlas. It focuses on analyzing the effectiveness of the concept map and the hyperbolic tree visualization techniques.

Design/methodology/approach

The effectiveness is measured in the aspects of the task time to complete a search based on questions provided. The task time is predicted using a task analysis technique called keystroke level model – goal operator methods and selection rules (KLM-GOMS). It is suitable to produce the hypothesis of which visualization techniques are able to maneuver the users to complete the task goals in the shortest time. The scope presented is the histories and locations related to selected chapters in part 30 of the Qur'an.

Findings

Hyperbolic tree is more time effective compared with concept map visualization technique. Concept map visualization system has been voted as the most satisfying visualization technique even though the difference is only 1.3 seconds. The more important aspect for this analysis is the presentation of the information. Information should be presented clearly rather than hidden although the hidden function should be provided for users to use. However, both techniques are predicted to support conceptual understanding.

Research limitations/implications

The focus of the analysis was data structure and how to get to the right nodes before retrieving the final output.

Social implications

Assisting developers of Qur'anic systems therefore improves the effectiveness of users of Qur'anic system in finding information.

Originality/value

Analysis on visualization techniques in context Qur'an history and atlas using KLM-GOMS study in terms of locations that lead to the birth of various chapters in Qur'an is rarely being discussed. Previous studies focus on development and implementation of textual Qur'an systems while this study focuses on user analysis using techniques mentioned above.

Details

Multicultural Education & Technology Journal, vol. 7 no. 4
Type: Research Article
ISSN: 1750-497X

Keywords

Article
Publication date: 26 October 2018

Chaiwat Riratanaphong and Pongkorn Jermsiriwattana

The environmental performance of buildings can be measured by using an existing green building indicator system. In Thailand, the Thai’s Rating of Energy and Environmental…

Abstract

Purpose

The environmental performance of buildings can be measured by using an existing green building indicator system. In Thailand, the Thai’s Rating of Energy and Environmental Sustainability (TREES) has been applied to 70 buildings including condominiums. It is important to collect feedback from stakeholders to identify the criteria of green features that respond to the expectation of condominium’s potential buyers as well as the satisfaction of current occupants. This paper aims to examine prioritised aspects from potential buyers and occupant satisfaction of the TREES criteria in the case study, a green condominium in Bangkok, Thailand.

Design/methodology/approach

The case study was conducted at IDEO Mobi Sathorn in Bangkok, the only condominium certified with the TREES system so far. Research methods include interviews, observations, document analysis and the surveys from the condominium’s potential buyers and current occupants.

Findings

The findings indicate that the condominium’s potential buyers are more concerned about site and landscape, indoor environmental quality and energy and atmosphere, whereas the current occupants are more satisfied about water conservation, site and landscape and energy and atmosphere in comparison with the other TREES criteria. Despite the provision of green features in the condominium, occupants are less satisfied about green innovation as showed in the least satisfied percentage of TREES criteria. In Facilities Management perspective, the paper shows connections between TREES criteria and FM functions in multi-unit residential project. The findings show that the application of TREES criteria focuses on the provision of value in FM, whereas stakeholder perceptions regarding the TREES criteria contribute to the perception of value in FM.

Practical implications

The findings and reflections upon the finding can help to understand the impact of green building aspects of the TREES system on perceptions of different stakeholders, that is, potential buyers and current occupants of the condominium. Recommendations for real estate developers and facilities managers regarding the development of green building concept on the TREES system are provided.

Originality/value

There has been no prior research in this area. The paper provides better understanding with regard to prioritised aspects from the potential buyers and occupant satisfaction of TREES criteria in Bangkok green condominium. This paper provides empirical data regarding stakeholder perception on TREES criteria that can be used to compare with similar data of the TREES-certified condominiums when they are available in the future.

Details

Facilities , vol. 37 no. 13/14
Type: Research Article
ISSN: 0263-2772

Keywords

Article
Publication date: 7 August 2009

Youngjung Geum, Hyeonju Seol, Sungjoo Lee and Yongtae Park

This study aims to propose a tree‐based analytic tool that may be used in analyzing a large‐scale and complex service process. The tenet of this tool is based on the Boolean logic…

3399

Abstract

Purpose

This study aims to propose a tree‐based analytic tool that may be used in analyzing a large‐scale and complex service process. The tenet of this tool is based on the Boolean logic and named service tree analysis (STA). The proposed STA aims to reflect the customer participation perspective and to propose how to analyze the service process and deduce useful information.

Design/methodology/approach

Fault tree analysis is used as an underlying methodology since it has a Boolean logic to describe the customer's selection of each element and identifies critical events. Taking these advantages of the fault tree, the proposed STA consists of three main parts; service tree construction, qualitative analysis, and quantitative analysis. First, a service tree is constructed depending on how the service elements are selected by the customer; If the subordinate events are always selected by customers, they are linked with an AND gate, otherwise, with an OR gate. Next, in the qualitative analysis, service elements are characterized as core services, supporting services, and optional services by deducing a minimal service cut set. Last, qualitative analysis deals with deriving the impact of each service element based on the Kano model.

Findings

The suggested STA has advantages which help strategic operation and management of the service process.

Originality/value

This study is unique and even exploratory in that it first adopts the notion of tree analysis in structuring a large‐scale, complex service system. Further, the proposed service tree provides a systematic approach from customer participation perspective, which makes the service process to be managed efficiently.

Details

Journal of Service Management, vol. 20 no. 4
Type: Research Article
ISSN: 1757-5818

Keywords

Article
Publication date: 6 July 2010

Donald N. Stengel, Priscilla Chaffe‐Stengel and Kathleen E. Moffitt

This paper seeks to investigate the impact of citrus tristeza virus (CTV) on the commercial value of fruit produced by navel orange trees.

Abstract

Purpose

This paper seeks to investigate the impact of citrus tristeza virus (CTV) on the commercial value of fruit produced by navel orange trees.

Design/methodology/approach

Data are counts of fruit of various sizes and quality harvested from a tree in a year. The counted fruit are converted to a dollar value using a standardized pricing matrix and then normalized as a ratio of the tree value compared to trees in the same orchard and year that were free of virus. Statistical tests determine if trees at various stages of infection have different production values than virus‐free trees.

Findings

On average, trees infected with CTV have higher fruit production values than trees that did not contract the virus, after compensating for climate and location differences, even though the presence or absence of CTV explains only about 1 percent of the variation in production value.

Research limitations/implications

Data are from commercially maintained orchards rather than a carefully controlled experiment in an isolated greenhouse environment.

Practical implications

Orange growers in the region should be reluctant to remove trees that have mild strains of CTV. The effects of a tree virus on production value should be a consideration in how to respond to the virus.

Originality/value

Development of a standardized pricing matrix to control for pricing fluctuations from year to year is a relatively novel concept. The applied concepts of tree status cohorts and relative crop values are original and provide valuable tools for combining data from different orchards and climate conditions.

Details

Journal of Modelling in Management, vol. 5 no. 2
Type: Research Article
ISSN: 1746-5664

Keywords

Article
Publication date: 1 May 2006

Andreas Langegger, Jürgen Palkoska and Roland Wagner

The World Wide Web has undergone a rapid transition from the originally static hypertext to an ubiquitous hypermedia system. Today, the Web is not only used as a basis for…

Abstract

The World Wide Web has undergone a rapid transition from the originally static hypertext to an ubiquitous hypermedia system. Today, the Web is not only used as a basis for distributed applications (Web applications), moreover it serves as a generic architecture for autonomous applications and services. Many research work has been done regarding the modeling and engineering process of Web applications and various platforms, frameworks and development kits exist for the efficient implementation of such systems. Concerning the modeling process, many of the published concepts try to merge traditional hypermedia modeling with techniques from the software engineering domain. Unfortunately, those concepts which capture all facets of the Web’s architecture become rather bulky and are eventually not applicable for a model‐driven Web application development. Moreover, there is a need for frameworks which address both, the modeling process and the implementation task and allow a model driven, semi‐automatic engineering process using CASE tools. This paper outlines the DaVinci Web Engineering Framework which supports the modeling as well as the semi‐automated implementation of Web applications. The DaVinci Architectural Layer specifies a persistent, hierarchical GUI model and a generic interaction scheme. This allows the elimination of the hypermedia paradigm, which turned out to be rather practical when building Web applications.

Details

International Journal of Web Information Systems, vol. 2 no. 2
Type: Research Article
ISSN: 1744-0084

Keywords

Article
Publication date: 29 March 2013

Peter Kieseberg, Sebastian Schrittwieser, Lorcan Morgan, Martin Mulazzani, Markus Huber and Edgar Weippl

Today's database management systems implement sophisticated access control mechanisms to prevent unauthorized access and modifications. For instance, this is an important basic…

Abstract

Purpose

Today's database management systems implement sophisticated access control mechanisms to prevent unauthorized access and modifications. For instance, this is an important basic requirement for SOX (Sarbanes‐Oxley Act) compliance, whereby every past transaction has to be traceable at any time. However, malicious database administrators may still be able to bypass the security mechanisms in order to make hidden modifications to the database. This paper aims to address these issues.

Design/methodology/approach

In this paper the authors define a novel signature of a B+tree, a widely‐used storage structure in database management systems, and propose its utilization for supporting the logging in databases. This additional logging mechanism is especially useful in conjunction with forensic techniques that directly target the underlying tree‐structure of an index. Several techniques for applying this signature in the context of digital forensics on B+trees are proposed in the course of this paper. Furthermore, the authors' signature can be used to generate exact copies of an index for backup purposes, thereby enabling the owner to completely restore data, even on the structural level.

Findings

For database systems in enterprise environments, compliance to regulatory standards such as SOX (Sarbanes‐Oxley Act), whereby every past transaction has to be traceable at any time, is a fundamental requirement. Today's database management systems usually implement sophisticated access control mechanisms to prevent unauthorized access and modifications. Nonetheless malicious database administrators would be able to bypass the security mechanisms in order to make modifications to the database, while covering their tracks.

Originality/value

In this paper, the authors demonstrate how the tree structure of the underlying store engine can be used to enhance forensic logging mechanisms of the database. They define a novel signature for B+trees, which are used by the InnoDB storage engine. This signature stores the structure of database storage files and can help in reconstructing previous versions of the file for forensic purposes. Furthermore, the authors' signature can be used to generate exact copies of an index for backup purposes, thus enabling the owner to completely restore data, even on the structural level. The authors applied their concept to four real‐life scenarios in order to evaluate its effectiveness.

Details

International Journal of Web Information Systems, vol. 9 no. 1
Type: Research Article
ISSN: 1744-0084

Keywords

11 – 20 of over 16000