-
Developing Strategies for Improving Government Data Openness in China: A Quantitative Analysis and Assessment
Zhang Xiaojuan,
Sun Cheng,
Xiang Jinpeng
Issue:
Volume 3, Issue 3, September 2018
Pages:
75-87
Received:
19 August 2018
Accepted:
11 September 2018
Published:
19 October 2018
Abstract: This paper aims to develop successful strategies for improving government data openness at state level in China based on its current status of Open Government Data (OGD) against the Open Data Barometer (ODB).For this purpose, firstly, primary and secondary data on the index scores of countries around the world from 2013 to 2016 were collected through the websites of ODB, followed by a statistical analysis of the data which showed the correlation of the indicators of the ODB, emphasized by the co efficiency between the indicators. Secondly, through the quantitative analysis of their survey on individual indicators in China, the authors found that the overall readiness of China’s OGD is acceptable, especially at the local government level, but its implementation and impact is still relatively backward. Further analysis of the assessment results of sub indicators identified the specific problems in China’s OGD. Finally, based on the correlation of indicators and the results of China's assessment, the authors proposed the strategies for the improvement of China’s OGD from the perspectives of readiness and implementation, which will facilitate an overall upgrade of national government data openness in the way of improving the performance on individual backward sub-indicators and addressing the identified problems. The “vertical” improvement of China's readiness is featured with a promotion of the common upgrade of execution and impact while the “horizontal” increase of execution leads to the development of subsequent impact. In addition, a comparative study showed that the former strategy has a slight advantage over the latter in terms of the expected results. This research is of practical significance as it will help to identify, prioritize, and address the most critical issues of government data openness in China.
Abstract: This paper aims to develop successful strategies for improving government data openness at state level in China based on its current status of Open Government Data (OGD) against the Open Data Barometer (ODB).For this purpose, firstly, primary and secondary data on the index scores of countries around the world from 2013 to 2016 were collected throu...
Show More
-
Text Clustering Incremental Algorithm in Sensitive Topic Detection
Yuejin Zhang,
Jiajia Zhang,
Dongmei Zhao
Issue:
Volume 3, Issue 3, September 2018
Pages:
88-95
Received:
28 August 2018
Accepted:
27 September 2018
Published:
30 October 2018
Abstract: With the rapid development of Internet technology, the influence of online consensus continues to expand. How to quickly and effectively discover sensitive topics and keep track of those topics has become an important research recently. Text clustering can aggregate news texts with the same or similar content to achieve the purpose of discovering topics automatically. Make improvement to clustering algorithm according to different media types is the main research direction. Although the existing typical clustering algorithms have certain advantages, they all face constraints on data size and data characteristics in specific applications. There is no existing algorithm can fully adapt to these characteristics. Although the application of more Single-pass algorithms in the (TDT) field can realize the discovery and tracking of topics, there are disadvantages of poor accuracy and slow speed under massive data. According to the dynamic evolution characteristics of online consensus, this paper proposes an incremental text clustering algorithm based on Single-pass, which optimizes the clustering accuracy and efficiency of massive news. Based on the real online news texts from the online consensus analysis system, we conduct an experiment to test and verify the feasibility and effectiveness of the algorithm we proposed. The result shows that the new algorithm is much more efficient compared to the original Single-pass clustering algorithm. In the real application, the new incremental text clustering algorithm basically meets the real-time demand of online topic detection and has a certain practical value.
Abstract: With the rapid development of Internet technology, the influence of online consensus continues to expand. How to quickly and effectively discover sensitive topics and keep track of those topics has become an important research recently. Text clustering can aggregate news texts with the same or similar content to achieve the purpose of discovering t...
Show More
-
Journey Readiness of Industry 4.0 from Revolutionary Idea to Evolutionary Implementation: A Lean Management Perspective
Suresh Sharma,
Pankaj Jayantilal Gandhi
Issue:
Volume 3, Issue 3, September 2018
Pages:
96-103
Received:
5 December 2018
Published:
6 December 2018
Abstract: In the context of manufacturing technology, continual or continuous improvement has been part of the system from the stone-age to this date. Actually, it is in pursuance of a gradual never-ending change to meet the real-time needs. Objective of this study is to review the changing manufacturing technology starting from a stage of ‘one item at a time’ for decorative art piece to mass production to lean-one piece flow and again back to individual single-item production like an exotic sports car as current-day example. Opportunities, challenges, and risks associated with different technologies are included in the scope of study. The intent of this paper is to find relationship between Lean Automation and Industry 4.0. The paper neither defends Lean manufacturing nor promotes the Industry 4.0 initiatives. Upcoming Industry 4.0 technology has been discussed beyond the present automation and past computer integrated manufacturing (CIM) with their relevant characteristics as enablers. The result indicates that Industry 4.0 will not make Lean obsolete. Both manufacturing systems will stay generating mutual dependency. They will have their specific domain of application based on the product variability and values. Secondary research with method for analysis of existing data has been studied and adopted as a recommended methodology for enhancing the overall efficiency of this research.
Abstract: In the context of manufacturing technology, continual or continuous improvement has been part of the system from the stone-age to this date. Actually, it is in pursuance of a gradual never-ending change to meet the real-time needs. Objective of this study is to review the changing manufacturing technology starting from a stage of ‘one item at a tim...
Show More
-
Pixel Value Graphical Password Scheme: Fake Passpix Attempt on Hexadecimal Password Style
Mohd ‘Afizi Bin Mohd Shukran,
Mohd Sidek Fadhil Bin Mohd Yunus
Issue:
Volume 3, Issue 3, September 2018
Pages:
104-109
Received:
5 December 2018
Published:
6 December 2018
Abstract: Early design of graphical password scheme solved the strong alphanumeric password deficiencies in term of hard to memorized, but they was exposed to password shoulder surfing and complicated to produced even by the legitimate users. Motivated to solve the problems, pixel value graphical password scheme was developed in 2012 where it require user to load any their desired digital image as their password. The term Passpix is referring to the pixel value that extracted from the loaded image file derived from the words password pixel. Pixel value in the form of RGB color strength could be representing as 3-octets 8-bits color code (0 to 255) or Hexadecimal code (000000 to FFFFFF) produced 16,777,216 combinations. Pixel value graphical password increases the password strength by implementing two-dimensional 8 by 8 grid extraction that increases the password strength to 1,073,741,824 combinations. It would result the password could be long or super long. Currently, pixel value graphical password scheme using the 8-bits color code as the pixel value and password that stored into database which could produce up to 576 characters. This would be require more storage capacity to store the password that brings into a suggestion to extracting the pixel value using hexadecimal code which produced 384 characters only. Further study on that idea it is found that the number of password characters did not brings a significant impact on-disk data size and it is easy information to construct a fake Passpix which is discussed further in this paper. This paper is organized into 5 sections where the background and concept of pixel value graphical password scheme is introduced in section 1. Section 2 of this paper is describing the password style of pixel value graphical password. The fake Passpix reconstruction is briefly explained in section 3 and section 4 is discussed further about the fake Passpix findings. The conclusion of this study can be found in section 5 and at the end of this paper, there are list of several references used in this study. Hopefully this paper will brings major contribution for safer pixel value graphical password scheme.
Abstract: Early design of graphical password scheme solved the strong alphanumeric password deficiencies in term of hard to memorized, but they was exposed to password shoulder surfing and complicated to produced even by the legitimate users. Motivated to solve the problems, pixel value graphical password scheme was developed in 2012 where it require user to...
Show More