148 research outputs found

    A Framework for Managing Knowledge and Competencies in a Group Project Implementation

    Get PDF
    Every organisation realizes that its organisational knowledge which resides in individual brain or stored in organisational processes, products, facilities, systems and documentation is quickly becoming a sustainable competitive advantage. This growing attention has lead to the idea that these resources must be protected, cultivated and shared among its members. As organisation's knowledge is built upon these human resources, and effective way of managing these resources is a challenge. The challenges poses problems such as when knowledge can be lost when people leave the organisation, problem in difficulties to manage tacit knowledge and also in managing the competencies, expertise and capabilities of the organisation. The research has explored and proposed a framework to achieve its objectives, in capturing, and structuring knowledge in acquiring competitiveness edge in an organisation. KEPSNet (Knowledge Extract,Profiling, and Sharing Network), has approached the problems in managing knowledge and competencies based on three key elements of peopleprocess- product, conceptual theory and by prescribing a knowledge model of five layers: knowledge object, agents, knowledge functionalities, knowledge services and knowledge application. KEPSNet provided a practical application of knowledge capture and reuses of relevant know-how, experiences, best practices from a group project implementation. KEPSNet implementation as a Portal provided functionalities, for group project to capture and retain their knowledge in group repository with the use of concept maps, thus providing facilities for retrieving and sharing knowledge, structured and retained in the group knowledge repository. Two software agents introduced in KEPSNet implementation: the Profile Agent and Knowledge Agent has shown that it has adopted an autonomous way of managing knowledge, maintaining competency profile to reflect the level of knowledge of the expertise and to support knowledge sharing during group project implementation. KEPSNet Portal and agents were developed on Domino Lotus Notes, while Cmap Tool was used as the knowledge modeling tool for knowledge capture in this researc

    Knowledge management system quality:a survey of knowledge management system quality dimensions

    Get PDF
    The knowledge management systems are becoming more complex and diverse as a result of advances in information technology. Nowadays, users demanding for more accurate and reliable KMS systems increases the awareness and need of KMS quality. To enhance KMS quality the quality dimensions should be identified first. This paper focuses on investigating the quality dimensions of related KMS work namely: software quality dimensions, data quality dimensions, information quality dimensions and knowledge systems quality dimensions. The extracted quality dimensions will be proposed as the basis of KMS quality dimensions that will be mapped with KM processes to produce the KMS quality framework

    MalayIK: An Ontological Approach to Knowledge Transformation in Malay Unstructured Documents

    Get PDF
    The number of unstructured documents written in Malay language is enormously available on the web and intranets. However, unstructured documents cannot be queried in simple ways, hence the knowledge contained in such documents can neither be used by automatic systems nor could be understood easily and clearly by humans. This paper proposes a new approach to transform extracted knowledge in Malay unstructured document using ontology by identifying, organizing, and structuring the documents into an interrogative structured form. A Malay knowledge base, the MalayIK corpus is developed and used to test the MalayIK-Ontology against Ontos, an existing data extraction engine. The experimental results from MalayIK-Ontology have shown a significant improvement of knowledge extraction over Ontos implementation. This shows that clear knowledge organization and structuring concept is able to increase understanding, which leads to potential increase in sharable and reusable of concepts among the community

    Protecting wireless data transmission in mobile application systems using digital watermarking technique

    Get PDF
    There have been many cases of fake documents be used for important legal transactions. This includes the use of fake degrees or certificates during professional job applications either in private sectors or government related firms. Since many people are using smart phones currently, it is possible to have a mobile application system apps that can validate the correctness of legal documents or certificates in real time basis. The apps must be able to validate the certificate by confirming it with the data obtained from a registered database owned by relevant academic institutions. However, since these data require wireless transmissions which are vulnerable to data manipulations by hackers, this paper introduces a protection measure using encrypted elements of user authentication to watermark the transmitting data

    Comparison between ant colony and genetic algorithm using traveling salesman problem

    Get PDF
    The Travelling Salesman Problem (TSP) is a complex problem in combinatorial optimization. The aim of this study is compare the effect of using two distributed algorithm which are ant colony as a Swarm intelligence algorithm and genetic algorithm. In ant colony algorithm each individual ant constructs a part of the solution using an artificial pheromone which reflects its experience accumulated while solving the problem and heuristic information dependent on the problem. The results of comparison show that ant colony is high efficient than genetic algorithm and it requires less computational cost and generally only a few lines of code

    Crosscutting concern domain library listing composition for early aspect discovery

    Get PDF
    Modularization is an essential part of a software program that ensures software maintainability. However, object oriented programs still can’t achieve the higher level modularization since it still contain extensive amount of crosscutting concerns. Crosscutting concerns refer to common functionality that does exist in software programs. Separation of concern (SoC) is essential elements of aspect oriented paradigm whereby it has viewed as a way to modularize the existing object oriented programs. Since there are various crosscutting concerns exist, the SoC from base functionality become tedious process. In fact, the process of identifying crosscutting concern for legacy system notably difficult and time consuming. Moreover, crosscutting concern generalization hard to be achieved due to it contain more domain specific concerns. This triggers a need for a literature survey in which it collect and review articles which indicate the usage of crosscutting concerns that exist in software programs in regards of domains. There are five main domains has been specifically retrieved from previous studies. The outcome of the evidence based survey grouped as a domain library which known as Crosscutting Concern Domain Library Listing (CCDLL). CCDLL emphasize on the usage to software practitioner in order to collectively reuse the crosscutting concernswith regards to the domains

    The factors affecting on managing sensitive data in cloud computing

    Get PDF
    Cloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of proposed framework, a pilot study by using a structured questionnaire was conducted. Framework using multilevel to enhance management information system on sensitive data in cloud environment

    Selection, generation and extraction of MCCTree using XMCCTree

    Get PDF
    Previous research proposed notions of CLCA and MCLCA to answer keyword query in XML document. The notions are implemented in its proposed algorithms and the result, namely MCCTree, is ranked with its proposed ranking method. The algorithms transform the XML tree into a compact global tree called CGTree, and select the MCCTree from the CGTree. The resulted MCCTree is in a compact structure; however the calculation in the ranking method requires the original structure as in the XML tree. Thus, this paper presents a new algorithm that implements the same notions with different approach. The MCCTree is returned in a structure as required by the ranking method. This algorithm, called XMCCTree, improve the efficiency of producing a set of MCCTree in answering keyword query in XML document

    Global virtual teams’ (GVTs) performance: online training and development, organizational commitment, and motivation

    Get PDF
    The global virtual teams (GVTs) comprise of team members who are geographically dispersed, culturally varied, and mainly depends on information and communication technologies (ICT) to communicate with each other's. In spite of technological leverages, the GVTs facing many challenges that affect their performance. Hence, the online training and development is very important for GVTs to perform. The main goal of online training and development is to improve the skills and behaviors of the GVTs, which leads to increase the performance of the team. A systematic literature review was conducted to answer two research questions. The first research question is to investigate the relationship between online training and development and global virtual teams' performance. The second research question is to find out the existing frame works involving online training and development in GVTs. Then, the related frameworks are analyzed to highlight the gaps and limitations for each of them. The findings indicated that there is a positive relationship between online training and development and global virtual teams' performance. The existing frameworks are overlapped in some variables such as online training and global virtual teams' performance. However, the existing frameworks are still not sufficient to measure the performance of GVTs. A Performance Measurement Framework for GVTs was proposed to assist the project manager on measuring the global virtual teams' performance involving the online training and development, organizational commitment, and motivation based on defined key performance indicators (KPIs)

    A performance measurement framework for Global Virtual Teams (GVTs) in global IT projects

    Get PDF
    In spite of the increasing prevalence of global virtual teams (GVTs), It should be noted that in spite of the advantages of technology provides, most of global IT projects tend to face problems and risks, and great deal of such projects fail to reach all their objectives. According to the literature review we found that there is a lack of communication within global virtual teams in global IT projects and this problem affect the global IT project performance and leads to global IT project failure. So there is a need to develop a framework to measure the performance for global virtual teams in global IT projects. Early stage and before developing the instrument and conducting the pilot test, the researchers conducted a structured interview with 6 experts to validate the proposed framework. In conclusion, The validity and reliability of the instrument were tested through experts, typical respondents, and analyzed by SPSS 22. The results confirmed the validity of the proposed framework and the validity and reliability of the instrument
    corecore