Abstract: This paper presents initiatives of Knowledge
Management (KM) applied to Forensic Sciences field, especially
developed at the Forensic Science Institute of the Brazilian Federal
Police. Successful projects, related to knowledge sharing, drugs
analysis and environmental crimes, are reported in the KM
perspective. The described results are related to: a) the importance of
having an information repository, like a digital library, in such a
multidisciplinary organization; b) the fight against drug dealing and
environmental crimes, enabling the possibility to map the evolution
of crimes, drug trafficking flows, and the advance of deforestation in
Amazon rain forest. Perspectives of new KM projects under
development and studies are also presented, tracing an evolution line
of the KM view at the Forensic Science Institute.
Abstract: Nowadays, HPC, Grid and Cloud systems are evolving
very rapidly. However, the development of infrastructure solutions
related to HPC is lagging behind. While the existing infrastructure is
sufficient for simple cases, many computational problems have more
complex requirements.Such computational experiments use different
resources simultaneously to start a large number of computational
jobs.These resources are heterogeneous. They have different
purposes, architectures, performance and used software.Users need a
convenient tool that allows to describe and to run complex
computational experiments under conditions of HPC environment.
This paper introduces a modularworkflow system called SEGL
which makes it possible to run complex computational experiments
under conditions of a real HPC organization. The system can be used
in a great number of organizations, which provide HPC power.
Significant requirements to this system are high efficiency and
interoperability with the existing HPC infrastructure of the
organization without any changes.
Abstract: Ad hoc networks are characterized by multi-hop
wireless connectivity and frequently changing network topology.
Forming security association among a group of nodes in ad-hoc
networks is more challenging than in conventional networks due to the
lack of central authority, i.e. fixed infrastructure. With that view in
mind, group key management plays an important building block of
any secure group communication. The main contribution of this paper
is a low complexity key management scheme that is suitable for fully
self-organized ad-hoc networks. The protocol is also password
authenticated, making it resilient against active attacks. Unlike other
existing key agreement protocols, ours make no assumption about the
structure of the underlying wireless network, making it suitable for
“truly ad-hoc" networks. Finally, we will analyze our protocol to show
the computation and communication burden on individual nodes for
key establishment.
Abstract: Performance appraisal of employee is important in
managing the human resource of an organization. With the change
towards knowledge-based capitalism, maintaining talented
knowledge workers is critical. However, management classification
of “outstanding", “poor" and “average" performance may not be an
easy decision. Besides that, superior might also tend to judge the
work performance of their subordinates informally and arbitrarily
especially without the existence of a system of appraisal. In this
paper, we propose a performance appraisal system using
multifactorial evaluation model in dealing with appraisal grades
which are often express vaguely in linguistic terms. The proposed
model is for evaluating staff performance based on specific
performance appraisal criteria. The project was collaboration with
one of the Information and Communication Technology company in
Malaysia with reference to its performance appraisal process.
Abstract: The right information at the right time influences the
enterprise and technical success. Sharing knowledge among members
of a big organization may be a complex activity. And as long as the
knowledge is not shared, can not be exploited by the organization.
There are some mechanisms which can originate knowledge sharing.
It is intended, in this paper, to trigger these mechanisms by using
semantic nets. Moreover, the intersection and overlapping of terms
and sub-terms, as well as their relationships will be described through
the mereology science for the whole knowledge sharing system. It is
proposed a knowledge system to supply to operators with the right
information about a specific process and possible risks, e.g. at the
assembly process, at the right time in an automated manufacturing
environment, such as at the automotive industry.
Abstract: The Economic factors are leading to the rise of
infrastructures provides software and computing facilities as a
service, known as cloud services or cloud computing. Cloud services
can provide efficiencies for application providers, both by limiting
up-front capital expenses, and by reducing the cost of ownership over
time. Such services are made available in a data center, using shared
commodity hardware for computation and storage. There is a varied
set of cloud services available today, including application services
(salesforce.com), storage services (Amazon S3), compute services
(Google App Engine, Amazon EC2) and data services (Amazon
SimpleDB, Microsoft SQL Server Data Services, Google-s Data
store). These services represent a variety of reformations of data
management architectures, and more are on the horizon.
Abstract: This paper presents a new approach for intelligent agent communication based on ontology for agent community. DARPA agent markup language (DAML) is used to build the community ontology. This paper extends the agent management specification by the foundation for intelligent physical agents (FIPA) to develop an agent role called community facilitator (CF) that manages community directory and community ontology. CF helps build agent community. Precise description of agent service in this community can thus be achieved. This facilitates agent communication. Furthermore, through ontology update, agents with different ontology are capable of communicating with each other. An example of advanced traveler information system is included to illustrate practicality of this approach.
Abstract: In the era of great competition, understanding and satisfying
customers- requirements are the critical tasks for a company
to make a profits. Customer relationship management (CRM) thus
becomes an important business issue at present. With the help of
the data mining techniques, the manager can explore and analyze
from a large quantity of data to discover meaningful patterns and
rules. Among all methods, well-known association rule is most
commonly seen. This paper is based on Apriori algorithm and uses
genetic algorithms combining a data mining method to discover fuzzy
classification rules. The mined results can be applied in CRM to
help decision marker make correct business decisions for marketing
strategies.
Abstract: Empirical insights into the implementation of logistics competencies at the top management level are scarce. This paper addresses this issue with an explorative approach which is based on a dataset of 872 observations in the years 2000, 2004 and 2008 using quantitative content analysis from annual reports of the 500 publicly listed firms with the highest global research and development expenditures according to the British Department for Business Innovation and Skills. We find that logistics competencies are more pronounced in Asian companies than in their European or American counterparts. On an industrial level the results are quite mixed. Using partial point-biserial correlations we show that logistics competencies are positively related to financial performance.
Abstract: The area of knowledge management has been in the
highlight for enterprises over the past three decades. Many
enterprises would like to have knowledge management and work hard
to achieve it, however they are often confused about which direction
to take to be successful and this point is especially true for Small and
Medium Enterprises (SMEs) in developing countries. Many large
companies have realized that knowledge is one of the richest
resources which an organization possesses and knowledge
management is a part of the foundation for a sustainable competitive
advantage. Much work has been done in the area of knowledge
management, but most of it has served large enterprises. This
research provides a Model of knowledge management strategy for
SMEs. It is based on analysis, insights and recommendations and it is
presented so that SMEs in developing countries can easily understand
and implement this model.
Abstract: The importance of hints in an intelligent tutoring system is well understood. The problems however related to their delivering are quite a few. In this paper we propose delivering of hints to be based on considering their usefulness. By this we mean that a hint is regarded as useful to a student if the student has succeeded to solve a problem after the hint was suggested to her/him. Methods from the theory of partial orderings are further applied facilitating an automated process of offering individualized advises on how to proceed in order to solve a particular problem.
Abstract: Work Breakdown Structure (WBS) is one of the
most vital planning processes of the project management since it
is considered to be the fundamental of other processes like
scheduling, controlling, assigning responsibilities, etc. In fact
WBS or activity list is the heart of a project and omission of a
simple task can lead to an irrecoverable result. There are some
tools in order to generate a project WBS. One of the most
powerful tools is mind mapping which is the basis of this article.
Mind map is a method for thinking together and helps a project
manager to stimulate the mind of project team members to
generate project WBS. Here we try to generate a WBS of a
sample project involving with the building construction using the
aid of mind map and the artificial intelligence (AI) programming
language. Since mind map structure can not represent data in a
computerized way, we convert it to a semantic network which can
be used by the computer and then extract the final WBS from the
semantic network by the prolog programming language. This
method will result a comprehensive WBS and decrease the
probability of omitting project tasks.
Abstract: Hybrid knowledge model is suggested as an underlying
framework for product development management. It can support such
hybrid features as ontologies and rules. Effective collaboration in
product development environment depends on sharing and reasoning
product information as well as engineering knowledge. Many studies
have considered product information and engineering knowledge.
However, most previous research has focused either on building the
ontology of product information or rule-based systems of engineering
knowledge. This paper shows that F-logic based knowledge model can
support such desirable features in a hybrid way.
Abstract: Imperfect knowledge cannot be avoided all the time. Imperfections may have several forms; uncertainties, imprecision and incompleteness. When we look to classification of methods for the management of imperfect knowledge we see fuzzy set-based techniques. The choice of a method to process data is linked to the choice of knowledge representation, which can be numerical, symbolic, logical or semantic and it depends on the nature of the problem to be solved for example decision support, which will be mentioned in our study. Fuzzy Logic is used for its ability to manage imprecise knowledge, but it can take advantage of the ability of neural networks to learn coefficients or functions. Such an association of methods is typical of so-called soft computing. In this study a new method was used for the management of imprecision for collected knowledge which related to economic analysis of construction industry in Turkey. Because of sudden changes occurring in economic factors decrease competition strength of construction companies. The better evaluation of these changes in economical factors in view of construction industry will made positive influence on company-s decisions which are dealing construction.
Abstract: Grid computing is a high performance computing
environment to solve larger scale computational applications. Grid
computing contains resource management, job scheduling, security
problems, information management and so on. Job scheduling is a
fundamental and important issue in achieving high performance in
grid computing systems. However, it is a big challenge to design an
efficient scheduler and its implementation. In Grid Computing, there
is a need of further improvement in Job Scheduling algorithm to
schedule the light-weight or small jobs into a coarse-grained or
group of jobs, which will reduce the communication time,
processing time and enhance resource utilization. This Grouping
strategy considers the processing power, memory-size and
bandwidth requirements of each job to realize the real grid system.
The experimental results demonstrate that the proposed scheduling
algorithm efficiently reduces the processing time of jobs in
comparison to others.
Abstract: Having a very many number of pipelines all over the
country, Iran is one of the countries consists of various ecosystems
with variable degrees of fragility and robusticity as well as
geographical conditions. This study presents a state-of-the-art method
to estimate environmental risks of pipelines by recommending
rational equations including FES, URAS, SRS, RRS, DRS, LURS
and IRS as well as FRS to calculate the risks. This study was carried
out by a relative semi-quantitative approach based on land uses and
HVAs (High-Value Areas). GIS as a tool was used to create proper
maps regarding the environmental risks, land uses and distances. The
main logic for using the formulas was the distance-based approaches
and ESI as well as intersections. Summarizing the results of the
study, a risk geographical map based on the ESIs and final risk score
(FRS) was created. The study results showed that the most sensitive
and so of high risk area would be an area comprising of mangrove
forests located in the pipeline neighborhood. Also, salty lands were
the most robust land use units in the case of pipeline failure
circumstances. Besides, using a state-of-the-art method, it showed
that mapping the risks of pipelines out with the applied method is of
more reliability and convenience as well as relative
comprehensiveness in comparison to present non-holistic methods for
assessing the environmental risks of pipelines. The focus of the
present study is “assessment" than that of “management". It is
suggested that new policies are to be implemented to reduce the
negative effects of the pipeline that has not yet been constructed
completely
Abstract: Accurate assessment of the primary tumor response to
treatment is important in the management of breast cancer. This
paper introduces a new set of treatment evaluation indicators for
breast cancer cases based on the computational process of three
known metrics, the Euclidian, Hamming and Levenshtein distances.
The distance principals are applied to pairs of mammograms and/or
echograms, recorded before and after treatment, determining a
reference point in judging the evolution amount of the studied
carcinoma. The obtained numerical results are indeed very
transparent and indicate not only the evolution or the involution of
the tumor under treatment, but also a quantitative measurement of the
benefit in using the selected method of treatment.
Abstract: This paper contributes to the field of Environmental
Awareness Training (EAT) evaluation in terms of military activities.
Environmental management of military activities is a growing concern
for defence forces worldwide and the importance of EAT is becoming
widely recognized. As one of Australia-s largest landowners, the
Australian Defence Force (ADF) is extremely mindful of its duty as a
joint environmental manager. It has an integrated Environmental
Management System (EMS) to assist environmental management and
EAT is an essential part of the ADF EMS model. This paper examines
how EAT was conducted during the exercise Talisman Saber in 2009
(TS09) and evaluates its effectiveness, using Shoalwater Bay Training
Area (SWBTA), one of the most significant military training areas and
a significant protected area in Australia, as a case study. A
questionnaire survey conducted showed, overall, that EAT was
effective from the perspective of a sample of participants.
Recommendations are made for the ADF to refine EAT for future
exercises.
Abstract: European Rail Traffic Management System (ERTMS) is the European reference for interoperable and safer signaling systems to efficiently manage trains running. If implemented, it allows trains cross seamlessly intra-European national borders. ERTMS has defined a secure communication protocol, EURORADIO, based on open communication networks. Its RadioInfill function can improve the reaction of the signaling system to changes in line conditions, avoiding unnecessary braking: its advantages in terms of power saving and travel time has been analyzed. In this paper a software implementation of the EURORADIO protocol with RadioInfill for ERTMS Level 1 using GSM-R is illustrated as part of the SR-Secure Italian project. In this building-blocks architecture the EURORADIO layers communicates together through modular Application Programm Interfaces. Security coding rules and railway industry requirements specified by EN 50128 standard have been respected. The proposed implementation has successfully passed conformity tests and has been tested on a computer-based simulator.
Abstract: This study is about an application of King Bhumibol
Adulyadej’s “Learn Wisely” (LW) concept in instructional design
and management process at the Faculty of Education, Suan Sunahdha
Rajabhat University. The concept suggests four strategies for true
learning. Related literature and significant LW methods in teaching
and learning are also reviewed and then applied in designing a
pedagogy learning module. The design has been implemented in
three classrooms with a total of 115 sophomore student teachers.
After one consecutive semester of managing and adjusting the
process by instructors and experts using collected data from minutes,
assessment of learning management, satisfaction and learning
achievement of the students, it is found that the effective SSRU
model of LW instructional method comprises of five steps.