Search results for: network knowledge graph
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 11781

Search results for: network knowledge graph

11301 Estimating Knowledge Flow Patterns of Business Method Patents with a Hidden Markov Model

Authors: Yoonjung An, Yongtae Park

Abstract:

Knowledge flows are a critical source of faster technological progress and stouter economic growth. Knowledge flows have been accelerated dramatically with the establishment of a patent system in which each patent is required by law to disclose sufficient technical information for the invention to be recreated. Patent analysis, thus, has been widely used to help investigate technological knowledge flows. However, the existing research is limited in terms of both subject and approach. Particularly, in most of the previous studies, business method (BM) patents were not covered although they are important drivers of knowledge flows as other patents. In addition, these studies usually focus on the static analysis of knowledge flows. Some use approaches that incorporate the time dimension, yet they still fail to trace a true dynamic process of knowledge flows. Therefore, we investigate dynamic patterns of knowledge flows driven by BM patents using a Hidden Markov Model (HMM). An HMM is a popular statistical tool for modeling a wide range of time series data, with no general theoretical limit in regard to statistical pattern classification. Accordingly, it enables characterizing knowledge patterns that may differ by patent, sector, country and so on. We run the model in sets of backward citations and forward citations to compare the patterns of knowledge utilization and knowledge dissemination.

Keywords: business method patents, dynamic pattern, Hidden-Markov Model, knowledge flow

Procedia PDF Downloads 313
11300 A Two-Step Framework for Unsupervised Speaker Segmentation Using BIC and Artificial Neural Network

Authors: Ahmad Alwosheel, Ahmed Alqaraawi

Abstract:

This work proposes a new speaker segmentation approach for two speakers. It is an online approach that does not require a prior information about speaker models. It has two phases, a conventional approach such as unsupervised BIC-based is utilized in the first phase to detect speaker changes and train a Neural Network, while in the second phase, the output trained parameters from the Neural Network are used to predict next incoming audio stream. Using this approach, a comparable accuracy to similar BIC-based approaches is achieved with a significant improvement in terms of computation time.

Keywords: artificial neural network, diarization, speaker indexing, speaker segmentation

Procedia PDF Downloads 481
11299 Analyzing the Critical Factors Influencing Employees' Tacit and Explicit Knowledge Sharing Intentions for Sustainable Competitive Advantage: A Systematic Review and a Conceptual Framework

Authors: Made Ayu Aristyana Dewi

Abstract:

Due to the importance of knowledge in today’s competitive world, an understanding of how to enhance employee knowledge sharing has become critical. This study discerning employees’ knowledge sharing intentions according to the type of knowledge to be shared, whether tacit or explicit. This study provides a critical and systematic review of the current literature on knowledge sharing, with a particular focus on the most critical factors influencing employees’ tacit and explicit knowledge sharing intentions. The extant literature was identified through four electronic databases, from 2006 to 2016. The findings of this review reveal that most of the previous studies only focus on individual and social factors as the antecedents of knowledge sharing intention. Therefore, those previous studies did not consider some other potential factors, like organizational and technological factors that may hinder the progress of knowledge sharing processes. Based on the findings of the critical review, a conceptual framework is proposed, which presents the antecedents of employees’ tacit and explicit knowledge sharing intentions and its impact on innovation and sustainable competitive advantage.

Keywords: antecedents, explicit knowledge, individual factors, innovation, intentions, knowledge sharing, organizational factors, social factors, sustainable competitive advantage, tacit knowledge, technological factors

Procedia PDF Downloads 299
11298 Revolutionizing Financial Forecasts: Enhancing Predictions with Graph Convolutional Networks (GCN) - Long Short-Term Memory (LSTM) Fusion

Authors: Ali Kazemi

Abstract:

Those within the volatile and interconnected international economic markets, appropriately predicting market trends, hold substantial fees for traders and financial establishments. Traditional device mastering strategies have made full-size strides in forecasting marketplace movements; however, monetary data's complicated and networked nature calls for extra sophisticated processes. This observation offers a groundbreaking method for monetary marketplace prediction that leverages the synergistic capability of Graph Convolutional Networks (GCNs) and Long Short-Term Memory (LSTM) networks. Our suggested algorithm is meticulously designed to forecast the traits of inventory market indices and cryptocurrency costs, utilizing a comprehensive dataset spanning from January 1, 2015, to December 31, 2023. This era, marked by sizable volatility and transformation in financial markets, affords a solid basis for schooling and checking out our predictive version. Our algorithm integrates diverse facts to construct a dynamic economic graph that correctly reflects market intricacies. We meticulously collect opening, closing, and high and low costs daily for key inventory marketplace indices (e.g., S&P 500, NASDAQ) and widespread cryptocurrencies (e.g., Bitcoin, Ethereum), ensuring a holistic view of marketplace traits. Daily trading volumes are also incorporated to seize marketplace pastime and liquidity, providing critical insights into the market's shopping for and selling dynamics. Furthermore, recognizing the profound influence of the monetary surroundings on financial markets, we integrate critical macroeconomic signs with hobby fees, inflation rates, GDP increase, and unemployment costs into our model. Our GCN algorithm is adept at learning the relational patterns amongst specific financial devices represented as nodes in a comprehensive market graph. Edges in this graph encapsulate the relationships based totally on co-movement styles and sentiment correlations, enabling our version to grasp the complicated community of influences governing marketplace moves. Complementing this, our LSTM algorithm is trained on sequences of the spatial-temporal illustration discovered through the GCN, enriched with historic fee and extent records. This lets the LSTM seize and expect temporal marketplace developments accurately. Inside the complete assessment of our GCN-LSTM algorithm across the inventory marketplace and cryptocurrency datasets, the version confirmed advanced predictive accuracy and profitability compared to conventional and opportunity machine learning to know benchmarks. Specifically, the model performed a Mean Absolute Error (MAE) of 0.85%, indicating high precision in predicting day-by-day charge movements. The RMSE was recorded at 1.2%, underscoring the model's effectiveness in minimizing tremendous prediction mistakes, which is vital in volatile markets. Furthermore, when assessing the model's predictive performance on directional market movements, it achieved an accuracy rate of 78%, significantly outperforming the benchmark models, averaging an accuracy of 65%. This high degree of accuracy is instrumental for techniques that predict the course of price moves. This study showcases the efficacy of mixing graph-based totally and sequential deep learning knowledge in economic marketplace prediction and highlights the fee of a comprehensive, records-pushed evaluation framework. Our findings promise to revolutionize investment techniques and hazard management practices, offering investors and economic analysts a powerful device to navigate the complexities of cutting-edge economic markets.

Keywords: financial market prediction, graph convolutional networks (GCNs), long short-term memory (LSTM), cryptocurrency forecasting

Procedia PDF Downloads 33
11297 Surveying the Effect of Cybernetics on Knowledge Management from Users' Viewpoint Who Are Members of Electronic Discussion Groups (ALA, ALIA)

Authors: Mitra Ghiasi, Roghayeh Ghorbani Bousari

Abstract:

Nowadays, the aim of the organizations is to gain sustainable competitive. So, developing their intellectual capital, encouraging innovation, increasing suitable performance can be done by knowledge management. Knowledge turns into science if knowledge is used to improve decision making, decision quality and make effective decisions. The current research intends to investigate the relationship between cybernetics and knowledge management from the perspective of users who are members of electronic discussion groups (ALA, ALIA). The research methodology is survey method, and it is a type of correlation research. Cybernetics and knowledge management questionnaires used for collecting data. The questionnaire that was designed in electronic format, distributed among two electronic discussion groups during 30 days and completed by 100 members of each electronic discussion groups. The finding of this research showed that although cybernetics has an impact on knowledge management, there is no significant difference between the ALA and ALIA user's view regard to effect of cybernetics on knowledge management. The results also indicated that this conceptual model is consistent with the data collected from the sample.

Keywords: ALA discussion group, ALIA discussion group, cybernetics, knowledge management

Procedia PDF Downloads 220
11296 The Conceptual and Procedural Knowledge of Rational Numbers in Primary School Teachers

Authors: R. M. Kashim

Abstract:

The study investigates the conceptual and procedural knowledge of rational number in primary school teachers, specifically, the primary school teachers level of conceptual knowledge about rational number and the primary school teachers level of procedural knowledge about rational numbers. The study was carried out in Bauchi metropolis in Bauchi state of Nigeria. A Conceptual and Procedural Knowledge Test was used as the instrument for data collection, 54 mathematics teachers in Bauchi primary schools were involved in the study. The collections were analyzed using mean and standard deviation. The findings revealed that the primary school mathematics teachers in Bauchi metropolis posses a low level of conceptual knowledge of rational number and also possess a high level of Procedural knowledge of rational number. It is therefore recommended that to be effective, teachers teaching mathematics most posses a deep understanding of both conceptual and procedural knowledge. That way the most knowledgeable teachers in mathematics deliver highly effective rational number instructions. Teachers should not ignore the mathematical concept aspect of rational number teaching. This is because only the procedural aspect of Rational number is highlighted during instructions; this often leads to rote - learning of procedures without understanding the meanings. It is necessary for teachers to learn rational numbers teaching method that focus on both conceptual knowledge and procedural knowledge teaching.

Keywords: conceptual knowledge, primary school teachers, procedural knowledge, rational numbers

Procedia PDF Downloads 308
11295 On the Basis Number and the Minimum Cycle Bases of the Wreath Product of Paths with Wheels

Authors: M. M. M. Jaradat

Abstract:

For a given graph G, the set Ԑ of all subsets of E(G) forms an |E(G)| dimensional vector space over Z2 with vector addition X⊕Y = (X\Y ) [ (Y \X) and scalar multiplication 1.X = X and 0.X = Ø for all X, Yϵ Ԑ. The cycle space, C(G), of a graph G is the vector subspace of (E; ⊕; .) spanned by the cycles of G. Traditionally there have been two notions of minimality among bases of C(G). First, a basis B of G is called a d-fold if each edge of G occurs in at most d cycles of the basis B. The basis number, b(G), of G is the least non-negative integer d such that C(G) has a d-fold basis; a required basis of C(G) is a basis for which each edge of G belongs to at most b(G) elements of B. Second, a basis B is called a minimum cycle basis (MCB) if its total length Σ BϵB |B| is minimum among all bases of C(G). The lexicographic product GρH has the vertex set V (GρH) = V (G) x V (H) and the edge set E(GρH) = {(u1, v1)(u2, v2)|u1 = u2 and v1 v2 ϵ E(H); or u1u2 ϵ E(G) and there is α ϵ Aut(H) such that α (v1) = v2}. In this work, a construction of a minimum cycle basis for the wreath product of wheels with paths is presented. Also, the length of the longest cycle of a minimum cycle basis is determined. Moreover, the basis number for the wreath product of the same is investigated.

Keywords: cycle space, minimum cycle basis, basis number, wreath product

Procedia PDF Downloads 262
11294 Identification of Soft Faults in Branched Wire Networks by Distributed Reflectometry and Multi-Objective Genetic Algorithm

Authors: Soumaya Sallem, Marc Olivas

Abstract:

This contribution presents a method for detecting, locating, and characterizing soft faults in a complex wired network. The proposed method is based on multi-carrier reflectometry MCTDR (Multi-Carrier Time Domain Reflectometry) combined with a multi-objective genetic algorithm. In order to ensure complete network coverage and eliminate diagnosis ambiguities, the MCTDR test signal is injected at several points on the network, and the data is merged between different reflectometers (sensors) distributed on the network. An adapted multi-objective genetic algorithm is used to merge data in order to obtain more accurate faults location and characterization. The proposed method performances are evaluated from numerical and experimental results.

Keywords: wired network, reflectometry, network distributed diagnosis, multi-objective genetic algorithm

Procedia PDF Downloads 176
11293 An Owen Value for Cooperative Games with Pairwise a Priori Incompatibilities

Authors: Jose M. Gallardo, Nieves Jimenez, Andres Jimenez-Losada, Esperanza Lebron

Abstract:

A game with a priori incompatibilities is a triple (N,v,g) where (N,v) is a cooperative game, and (N,g) is a graph which establishes initial incompatibilities between some players. In these games, the negotiation has two stages. In the first stage, players can only negotiate with others with whom they are compatible. In the second stage, the grand coalition will be formed. We introduce a value for these games. Given a game with a priori incompatibility (N,v,g), we consider the family of coalitions without incompatibility relations among their players. This family is a normal set system or coalition configuration Ig. Therefore, we can assign to each game with a priori incompatibilities (N,v,g) a game with coalition configuration (N,v, Ig). Now, in order to obtain a payoff vector for (N,v,g), it suffices to calculate a payoff vector for (N,v, Ig). To this end, we apply a value for games with coalition configuration. In our case, we will use the dual configuration value, which has been studied in the literature. With this method, we obtain a value for games with a priori incompatibilities, which is called the Owen value for a priori incompatibilities. We provide a characterization of this value.

Keywords: cooperative game, game with coalition configuration, graph, independent set, Owen value, Shapley value

Procedia PDF Downloads 111
11292 Selecting a Foreign Country to Build a Naval Base Using a Fuzzy Hybrid Decision Support System

Authors: Latif Yanar, Muammer Kaçan

Abstract:

Decision support systems are getting more important in many fields of science and technology and used effectively especially when the problems to be solved are complicated with many criteria. In this kind of problems one of the main challenges for the decision makers are that sometimes they cannot produce a countable data for evaluating the criteria but the knowledge and sense of experts. In recent years, fuzzy set theory and fuzzy logic based decision models gaining more place in literature. In this study, a decision support model to determine a country to build naval base is proposed and the application of the model is performed, considering Turkish Navy by the evaluations of Turkish Navy officers and academicians of international relations departments of various Universities located in Istanbul. The results achieved from the evaluations made by the experts in our model are calculated by a decision support tool named DESTEC 1.0, which is developed by the authors using C Sharp programming language. The tool gives advices to the decision maker using Analytic Hierarchy Process, Analytic Network Process, Fuzzy Analytic Hierarchy Process and Fuzzy Analytic Network Process all at once. The calculated results for five foreign countries are shown in the conclusion.

Keywords: decision support system, analytic hierarchy process, fuzzy analytic hierarchy process, analytic network process, fuzzy analytic network process, naval base, country selection, international relations

Procedia PDF Downloads 567
11291 Implementation and Demonstration of Software-Defined Traffic Grooming

Authors: Lei Guo, Xu Zhang, Weigang Hou

Abstract:

Since the traditional network is closed and it has no architecture to create applications, it has been unable to evolve with changing demands under the rapid innovation in services. Additionally, due to the lack of the whole network profile, the quality of service cannot be well guaranteed in the traditional network. The Software Defined Network (SDN) utilizes global resources to support on-demand applications/services via open, standardized and programmable interfaces. In this paper, we implement the traffic grooming application under a real SDN environment, and the corresponding analysis is made. In our SDN: 1) we use OpenFlow protocol to control the entire network by using software applications running on the network operating system; 2) several virtual switches are combined into the data forwarding plane through Open vSwitch; 3) An OpenFlow controller, NOX, is involved as a logically centralized control plane that dynamically configures the data forwarding plane; 4) The traffic grooming based on SDN is demonstrated through dynamically modifying the idle time of flow entries. The experimental results demonstrate that the SDN-based traffic grooming effectively reduces the end-to-end delay, and the improvement ratio arrives to 99%.

Keywords: NOX, OpenFlow, Software Defined Network (SDN), traffic grooming

Procedia PDF Downloads 235
11290 Impact of Network Workload between Virtualization Solutions on a Testbed Environment for Cybersecurity Learning

Authors: Kevin Fernagut, Olivier Flauzac, Erick M. G. Robledo, Florent Nolot

Abstract:

The adoption of modern lightweight virtualization often comes with new threats and network vulnerabilities. This paper seeks to assess this with a different approach studying the behavior of a testbed built with tools such as Kernel-Based Virtual Machine (KVM), Linux Containers (LXC) and Docker, by performing stress tests within a platform where students experiment simultaneously with cyber-attacks, and thus observe the impact on the campus network and also find the best solution for cyber-security learning. Interesting outcomes can be found in the literature comparing these technologies. It is, however, difficult to find results of the effects on the global network where experiments are carried out. Our work shows that other physical hosts and the faculty network were impacted while performing these trials. The problems found are discussed, as well as security solutions and the adoption of new network policies.

Keywords: containerization, containers, cybersecurity, cyberattacks, isolation, performance, virtualization, virtual machines

Procedia PDF Downloads 128
11289 Reliable Multicast Communication in Next Generation Networks

Authors: Muazzam Ali Khan Khattak

Abstract:

Next Generation Network is combination of different networks having different technologies. Due to mobile nature of nodes the movement of nodes occurs from one network to another network. Multicasting in such networks is still a hot issue of research because the user in today's world wants reliable communication wherever it lies. Due to heterogeneity of NGN it is very difficult to handle reliable multicast communication. In this paper we proposed an improved scheme for reliable multicast communication in next generation networks. Because multicast communication is very important to deliver same data packets to multiple receivers and minimize the network traffic. This new scheme will make the multicast communication in NGN more reliable and efficient.

Keywords: next generation networks, route request, IPT, NACK, ARQ, DTN

Procedia PDF Downloads 481
11288 Understanding Knowledge Sharing and Its Effect on Creative Performance from a Dyadic Relationship Perspective

Authors: Fan Wei, Tang Yipeng

Abstract:

Knowledge sharing is of great value to organizational performance and innovation ability. However, the mainstream research has focused largely on the impact of knowledge sharing at the team level on individuals and teams. There is a lack of empirical studies on how employees interact in the exchange of knowledge and its effect on employees’ own creative performance. Based on communication accommodation theory and social exchange theory, this article explores the construction of an employee knowledge interaction mechanism under the moderating of social status and introduces the leader's creativity expectation as a moderating variable to explore its cross-level moderating effect on employee knowledge sharing and their own creative performance. An empirical test was conducted on 36 teaching and research teams in the two primary schools, and the results showed that: (1) Explicit/tacit knowledge of employees is positively correlated with acquisition of explicit/tacit knowledge; (2) Colleagues’ evaluations of employees’ social status play a moderating role between the employees’ explicit/tacit knowledge and the acquisition of explicit/tacit knowledge. (3) The leadership creativity expectation positively regulates the relationship between the employees' explicit knowledge acquisition and creative performance. This research helps to open the "black box" of the interpersonal interaction mechanism of knowledge sharing and also provides an important theoretical basis and practical guidance for organizational managers to effectively stimulate employee knowledge sharing and creative performance.

Keywords: knowledge sharing, knowledge interaction, social status, leadership creativity expectations, creative performance

Procedia PDF Downloads 106
11287 Towards Security in Virtualization of SDN

Authors: Wanqing You, Kai Qian, Xi He, Ying Qian

Abstract:

In this paper, the potential security issues brought by the virtualization of a Software Defined Networks (SDN) would be analyzed. The virtualization of SDN is achieved by FlowVisor (FV). With FV, a physical network is divided into multiple isolated logical networks while the underlying resources are still shared by different slices (isolated logical networks). However, along with the benefits brought by network virtualization, it also presents some issues regarding security. By examining security issues existing in an OpenFlow network, which uses FlowVisor to slice it into multiple virtual networks, we hope we can get some significant results and also can get further discussions among the security of SDN virtualization.

Keywords: SDN, network, virtualization, security

Procedia PDF Downloads 401
11286 A Review of Literature for Online Social Network Business Continuance Intention and the Hypotheses Thereof

Authors: Akwesi Assensoh-Kodua

Abstract:

Online Social Networks (OSN) has come and gone, yet the explosion of business activities on such platforms continuous to surge high, giving advantage to the bold entrepreneurs. It is therefore a practical requirement that practitioners and researchers understand the key determinants of costumers’ online social network business activities and continuance intention. An exploratory literature research to examine OSN continuous intention of business participants on OSN revealed that the practice of doing business on social network has come to stay and the following factors are the likely drivers for this new business model: perceived trust, perceived ease of use, confirmation, habit, social norm, perceived behavioural control, expected benefit, and satisfaction are the most probable factors that can lead to online social network (OSN) continuance intention.

Keywords: online social network, continuance intention, business continuance

Procedia PDF Downloads 475
11285 Optimizing Network Latency with Fast Path Assignment for Incoming Flows

Authors: Qing Lyu, Hang Zhu

Abstract:

Various flows in the network require to go through different types of middlebox. The improper placement of network middlebox and path assignment for flows could greatly increase the network latency and also decrease the performance of network. Minimizing the total end to end latency of all the ows requires to assign path for the incoming flows. In this paper, the flow path assignment problem in regard to the placement of various kinds of middlebox is studied. The flow path assignment problem is formulated to a linear programming problem, which is very time consuming. On the other hand, a naive greedy algorithm is studied. Which is very fast but causes much more latency than the linear programming algorithm. At last, the paper presents a heuristic algorithm named FPA, which takes bottleneck link information and estimated bandwidth occupancy into consideration, and achieves near optimal latency in much less time. Evaluation results validate the effectiveness of the proposed algorithm.

Keywords: flow path, latency, middlebox, network

Procedia PDF Downloads 190
11284 Design of Local Interconnect Network Controller for Automotive Applications

Authors: Jong-Bae Lee, Seongsoo Lee

Abstract:

Local interconnect network (LIN) is a communication protocol that combines sensors, actuators, and processors to a functional module in automotive applications. In this paper, a LIN ver. 2.2A controller was designed in Verilog hardware description language (Verilog HDL) and implemented in field-programmable gate array (FPGA). Its operation was verified by making full-scale LIN network with the presented FPGA-implemented LIN controller, commercial LIN transceivers, and commercial processors. When described in Verilog HDL and synthesized in 0.18 μm technology, its gate size was about 2,300 gates.

Keywords: local interconnect network, controller, transceiver, processor

Procedia PDF Downloads 268
11283 The Role of the University of Zululand in Documenting and Disseminating Indigenous Knowledge, in KwaZulu-Natal, South Africa

Authors: Smiso Buthelezi, Petros Dlamini, Dennis Ocholla

Abstract:

The study assesses the University of Zululand's practices for documenting, sharing, and accessing indigenous knowledge. Two research objectives guided it: to determine how indigenous knowledge (IK) is developed at the University of Zululand and how indigenous knowledge (IK) is documented at the University of Zululand. The study adopted both interpretive and positivist research paradigms. Ultimately, qualitative and quantitative research methods were used. The qualitative research approach collected data from academic and non-academic staff members. Interviews were conducted with 18 academic staff members and 5 with support staff members. The quantitative research approach was used to collect data from indigenous knowledge (IK) theses and dissertations from the University of Zululand Institutional Repository between 2009-2019. The study results revealed that many departments across the University of Zululand were involved in creating indigenous knowledge (IK)-related content. The department of African Languages was noted to be more involved in creating IK-related content. Moreover, the documentation of the content related to indigenous knowledge (IK) at the University of Zululand is done frequently but is not readily known. It was found that the creation and documentation of indigenous knowledge by different departments faced several challenges. The common challenges are a lack of interest among indigenous knowledge (IK) owners in sharing their knowledge, the local language as a barrier, and a shortage of proper tools for recording and capturing indigenous knowledge (IK). One of the study recommendations is the need for an indigenous knowledge systems (IKS) policy to be in place at the University of Zululand.

Keywords: knowledge creation, SECI model, information and communication technology., indigenous knowledge

Procedia PDF Downloads 88
11282 Students’ Experiential Knowledge Production in the Teaching-Learning Process of Universities

Authors: Didiosky Benítez-Erice, Frederik Questier, Dalgys Pérez-Luján

Abstract:

This paper aims to present two models around the production of students’ experiential knowledge in the teaching-learning process of higher education: the teacher-centered production model and the student-centered production model. From a range of knowledge management and experiential learning theories, the paper elaborates into the nature of students’ experiential knowledge and proposes further adjustments of existing second-generation knowledge management theories taking into account the particularities of higher education. Despite its theoretical nature the paper can be relevant for future studies that stress student-driven improvement and innovation at higher education institutions.

Keywords: experiential knowledge, higher education, knowledge management, teaching-learning process

Procedia PDF Downloads 424
11281 The Role of Piaget's Theory in Conjecture via Analogical Reasoning

Authors: Supratman Ahman Maedi

Abstract:

The construction of knowledge is the goal of learning. The purpose of this research is to know how the role of Piaget theory in allegation via analogy reasoning. This study uses Think out loads when troubleshooting. To explore conjecturing via analogical reasoning is given the question of open analogy. The result: conjecture via analogical reasoning has been done by students in the construction of knowledge, in conjecture there are differences in thinking flow depending on the basic knowledge of the students, in the construction of knowledge occurs assimilation and accommodation problems, strategies and relationships.

Keywords: analogical reasoning, conjecturing, knowledge construction, Piaget's theory

Procedia PDF Downloads 306
11280 Mechanism for Network Security via Routing Protocols Estimated with Network Simulator 2 (NS-2)

Authors: Rashid Mahmood, Muhammad Sufyan, Nasir Ahmed

Abstract:

The MANETs have lessened transportation and decentralized network. There are numerous basis of routing protocols. We derived the MANETs protocol into three major categories like Reactive, Proactive and hybrid. In these protocols, we discussed only some protocols like Distance Sequenced Distance Vector (DSDV), Ad hoc on Demand Distance Vector (AODV) and Dynamic Source Routing (DSR). The AODV and DSR are both reactive type of protocols. On the other hand, DSDV is proactive type protocol here. We compare these routing protocols for network security estimated by network simulator (NS-2). In this dissertation some parameters discussed such as simulation time, packet size, number of node, packet delivery fraction, push time and speed etc. We will construct all these parameters on routing protocols under suitable conditions for network security measures.

Keywords: DSDV, AODV, DSR NS-2, PDF, push time

Procedia PDF Downloads 419
11279 Importance of Knowledge in the Interdisciplinary Production Processes of Innovative Medical Tools

Authors: Katarzyna Mleczko

Abstract:

Processes of production of innovative medical tools have interdisciplinary character. They consist of direct and indirect close cooperation of specialists of different scientific branches. The Knowledge they have seems to be important for undertaken design, construction and manufacturing processes. The Knowledge exchange between participants of these processes is therefore crucial for the final result, which are innovative medical products. The paper draws attention to the necessity of feedback from the end user to the designer / manufacturer of medical tools which will allow for more accurate understanding of user needs. The study describes prerequisites of production processes of innovative medical (surgical) tools including participants and category of knowledge resources occurring in these processes. They are the result of research in selected Polish organizations involved in the production of medical instruments and are the basis for further work on the development of knowledge sharing model in interdisciplinary teams geographically dispersed.

Keywords: interdisciplinary production processes, knowledge exchange, knowledge sharing, medical tools

Procedia PDF Downloads 423
11278 Acquisition and Preservation of Traditional Medicinal Knowledge in Rural Areas of KwaZulu Natal, South Africa

Authors: N. Khanyile, P. Dlamini, M. Masenya

Abstract:

Background: Most of the population in Africa is still dependent on indigenous medicinal knowledge for treating and managing ailments. Indigenous traditional knowledge owners/practitioners who own this knowledge are consulted by communities, but their knowledge is not known how they get it. The question of how knowledge is acquired and preserved remains one of the biggest challenges in traditional healing and treatment with herbal medicines. It is regrettable that despite the importance and recognition of indigenous medicinal knowledge globally, the details of acquirement, storing and transmission, and preservation techniques are not known. Hence this study intends to unveil the process of acquirement and transmission, and preservation techniques of indigenous medical knowledge by its owners. Objectives: This study aims to assess the process of acquiring and preservation of traditional medicinal knowledge by traditional medicinal knowledge owners/practitioners in uMhlathuze Municipality, in the province of KwaZulu-Natal, South Africa. The study was guided by four research objectives which were to: identify the types of traditional medicinal knowledge owners who possess this knowledge, establish the approach used by indigenous medicinal knowledge owners/healers for acquiring medicinal knowledge, identify the process of preservation of medicinal knowledge by indigenous medicinal knowledge owners/healers, and determine the challenges encountered in transferring the knowledge. Method: The study adopted a qualitative research approach, and a snowball sampling technique was used to identify the study population. Data was collected through semi-structured interviews with indigenous medicinal knowledge owners. Results: The findings suggested that uMhlathuze municipality had different types of indigenous medicinal knowledge owners who possess valuable knowledge. These are diviners (Izangoma), faith healers (Abathandazi), and herbalists (Izinyanga). The study demonstrated that indigenous medicinal knowledge is acquired in many different ways, including visions, dreams, and vigorous training. The study also revealed the acquired knowledge is preserved or shared with specially chosen children and trainees. Conclusion: The study concluded that this knowledge is gotten through vigorous training, which requires the learner to be attentive and eager to learn. It was recommended that a study of this nature be conducted but at a broader level to enhance an informed conclusion and recommendations.

Keywords: preserving, indigenous medicinal knowledge, indigenous knowledge, indigenous medicinal knowledge owners/practitioners, acquiring

Procedia PDF Downloads 68
11277 Review of Studies on Agility in Knowledge Management

Authors: Ferdi Sönmez, Başak Buluz

Abstract:

Agility in Knowledge Management (AKM) tries to capture agility requirements and their respective answers within the framework of knowledge and learning for organizations. Since it is rather a new construct, it is difficult to claim that it has been sufficiently discussed and analyzed in practical and theoretical realms. Like the term ‘agile learning’, it is also commonly addressed in the software development and information technology fields and across the related areas where those technologies can be applied. The organizational perspective towards AKM, seems to need some more time to become scholarly mature. Nevertheless, in the literature one can come across some implicit usages of this term occasionally. This research is aimed to explore the conceptual background of agility in KM, re-conceptualize it and extend it to business applications with a special focus on e-business.

Keywords: knowledge management, agility requirements, agility, knowledge

Procedia PDF Downloads 247
11276 Personalize E-Learning System Based on Clustering and Sequence Pattern Mining Approach

Authors: H. S. Saini, K. Vijayalakshmi, Rishi Sayal

Abstract:

Network-based education has been growing rapidly in size and quality. Knowledge clustering becomes more important in personalized information retrieval for web-learning. A personalized-Learning service after the learners’ knowledge has been classified with clustering. Through automatic analysis of learners’ behaviors, their partition with similar data level and interests may be discovered so as to produce learners with contents that best match educational needs for collaborative learning. We present a specific mining tool and a recommender engine that we have integrated in the online learning in order to help the teacher to carry out the whole e-learning process. We propose to use sequential pattern mining algorithms to discover the most used path by the students and from this information can recommend links to the new students automatically meanwhile they browse in the course. We have Developed a specific author tool in order to help the teacher to apply all the data mining process. We tend to report on many experiments with real knowledge so as to indicate the quality of using both clustering and sequential pattern mining algorithms together for discovering personalized e-learning systems.

Keywords: e-learning, cluster, personalization, sequence, pattern

Procedia PDF Downloads 409
11275 Internet-Based Architecture for Machine-to-Machine Communication of a Public Security Network

Authors: Ogwueleka Francisca Nonyelum, Jiya Muhammad

Abstract:

Poor communication between the victims of the burglaries, road and fire accidents and the agencies, and lack of quick emergency response by the agencies is solved through Machine-to-Machine (M2M) communication. A distress caller is expected to make a call through a network to the respective agency for emergency response but due to some challenges, this often becomes arduous and futile. This research puts forth an Internet-based architecture for Machine-to-Machine (M2M) communication to enhance information dissemination in National Public Security Communication System (NPSCS) network. M2M enables the flow of data between machines and machines and ultimately machines and people with information flowing from a machine over a network, and then through a gateway to a system where it is reviewed and acted on. The research findings showed that Internet-based architecture for M2M communication is most suitable for deployment of a public security network which will allow machines to use Internet to talk to each other.

Keywords: machine-to-machine (M2M), internet-based architecture, network, gateway

Procedia PDF Downloads 461
11274 Knowledge Management Strategies as a Tool to Change the Organizational Culture

Authors: Doaa Abbas Zaher

Abstract:

For the past two decades demand for knowledge has been increasing. Management of society’s knowledge has far reaching effects to economic growth through increased capacity to complete viable activities. Organizations use information technology to effect organizational change. This is a challenge for the less developed nations whose capacity to integrate knowledge in core functions is limited. This creates organizational problems as there is global competition amongst organizations. Cross-cultural perceptions influence difference knowledge Management. This study provides a cross-cultural analysis on the influence in knowledge culture in Japan and Saudi Arabia to effect change in organizations. Since different countries adopt different knowledge management strategies, this dictates the state of organizational development through enriched organizational culture. The research uses a mixed approach design to collect data from primary and secondary sources. Primary source will use the questionnaires while secondary sources uses case analysis from books, articles, reports, and journals. The study will take a period of three years to come up with a complete paper.

Keywords: knowledge management, organizational culture, information, society knowledge

Procedia PDF Downloads 337
11273 A Case from China on the Situation of Knowledge Management in Government

Authors: Qiaoyun Yang

Abstract:

Organizational scholars have paid enormous attention on how local governments manage their knowledge during the past two decades. Government knowledge management (KM) research recognizes that the management of knowledge flows and networks is critical to reforms on government service efficiency and the effect of administration. When dealing with complex affairs, all the limitations resulting from a lack of KM concept, processes and technologies among all the involved organizations begin to be exposed and further compound the processing difficulty of the affair. As a result, the challenges for individual or group knowledge sharing, knowledge digging and organizations’ collaboration in government's activities are diverse and immense. This analysis presents recent situation of government KM in China drawing from a total of more than 300 questionnaires and highlights important challenges that remain. The causes of the lapses in KM processes within and across the government agencies are discussed.

Keywords: KM processes, KM technologies, government, KM situation

Procedia PDF Downloads 340
11272 Multi-Dimension Threat Situation Assessment Based on Network Security Attributes

Authors: Yang Yu, Jian Wang, Jiqiang Liu, Lei Han, Xudong He, Shaohua Lv

Abstract:

As the increasing network attacks become more and more complex, network situation assessment based on log analysis cannot meet the requirements to ensure network security because of the low quality of logs and alerts. This paper addresses the lack of consideration of security attributes of hosts and attacks in the network. Identity and effectiveness of Distributed Denial of Service (DDoS) are hard to be proved in risk assessment based on alerts and flow matching. This paper proposes a multi-dimension threat situation assessment method based on network security attributes. First, the paper offers an improved Common Vulnerability Scoring System (CVSS) calculation, which includes confident risk, integrity risk, availability risk and a weighted risk. Second, the paper introduces deterioration rate of properties collected by sensors in hosts and network, which aimed at assessing the time and level of DDoS attacks. Third, the paper introduces distribution of asset value in security attributes considering features of attacks and network, which aimed at assessing and show the whole situation. Experiments demonstrate that the approach reflects effectiveness and level of DDoS attacks, and the result can show the primary threat in network and security requirement of network. Through comparison and analysis, the method reflects more in security requirement and security risk situation than traditional methods based on alert and flow analyzing.

Keywords: DDoS evaluation, improved CVSS, network security attribute, threat situation assessment

Procedia PDF Downloads 195