An Intelligent Knowledge Management Model for Construction and Reuse of Automobile Manufacturing Intellectual Properties

More and more organizations have recognized the importance of efficient enterprise knowledge construction, extraction and management. To effectively acquire domain knowledge from experts, a knowledge centre that can automatically manage the huge amounts of documents and knowledge is required. In this paper, a knowledge management (KM) model as well as a platform consisting of document keyword extraction (DKE) module, document classification (DC) module, authority reasoning (AR) module and validation process decision (VPD) module are developed for intelligent and automatic management over the manufacturing intellectual properties (IPs) of the automobile industry. In this industry, sophisticated entities are involved in knowledge construction and reuse under the collaborative design environment. A case study is provided to evaluate feasibility and performance of the intelligent knowledge management model. With the training and learning stages, the accuracy and precision of the KM decision modules can be significantly improved. Therefore, in addition to the automobile IP management, it is proven that with the learning mechanism, the proposed intelligent KM approach can be applied to different applications for organizations to efficiently construct and manage domain knowledge .

[1]  Vassilios Petridis,et al.  Clustering and Classification in Structured Data Domains Using Fuzzy Lattice Neurocomputing (FLN) , 2001, IEEE Trans. Knowl. Data Eng..

[2]  Peter Willett,et al.  The Limitations of Term Co-Occurrence Data for Query Expansion in Document Retrieval Systems , 1991 .

[3]  F. Bodendorf,et al.  A system architecture for flexible, knowledge-based, multimedia CBT-applications , 1994, Proceedings IEEE 1st International Conference on Multi Media Engineering Education.

[4]  W. V. Subbarao,et al.  Encryption based security for ISDN communication: technique and application , 1994, Proceedings of SOUTHEASTCON '94.

[5]  Mario Piattini,et al.  Auditing data warehouse security , 1999, Proceedings IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology (Cat. No.99CH36303).

[6]  Theodore A. Linden,et al.  Authentication in office system internetworks , 1983, TOIS.

[7]  Jörg Hahn,et al.  The committee support system , 1988 .

[8]  Venu Dasigi Information fusion experiments for text classification , 1998, 1998 IEEE Information Technology Conference, Information Environment for the Future (Cat. No.98EX228).

[9]  Ludwig Nastansky,et al.  Reengineering organizational structures from within , 1999, Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32. Abstracts and CD-ROM of Full Papers.

[10]  Kazuhiko Tsuda,et al.  The extraction method of the word meaning class , 1999, 1999 Third International Conference on Knowledge-Based Intelligent Information Engineering Systems. Proceedings (Cat. No.99TH8410).

[11]  Reiner Sailer Security services in an open service environment , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).

[12]  Douglas L. Jones,et al.  Minimax disappointment criterion for video broadcasting , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[13]  Udaya Annakkage,et al.  Dynamic security control using secure regions derived from a decision tree technique , 2000, 2000 Power Engineering Society Summer Meeting (Cat. No.00CH37134).

[14]  Rada Mihalcea,et al.  Using WordNet and Lexical Operators to Improve Internet Searches , 2000, IEEE Internet Comput..

[15]  Andreas Dengel Bridging the media gap from the Guthenberg's world to electronic document management systems , 1997, 1997 IEEE International Conference on Systems, Man, and Cybernetics. Computational Cybernetics and Simulation.

[16]  Tung-Sang Ng,et al.  Partial-encryption technique for intellectual property protection of FPGA-based products , 2000, IEEE Trans. Consumer Electron..

[17]  Donald H. Kraft,et al.  A feature mining based approach for the classification of text documents into disjoint classes , 2002, Inf. Process. Manag..

[18]  Selwyn Russell Transparent cosignatures for electronic documents , 1993, Proceedings of 9th Annual Computer Security Applications Conference.

[19]  Takeshi Koshiba,et al.  Text classification and keyword extraction by learning decision trees , 1993, Proceedings of 9th IEEE Conference on Artificial Intelligence for Applications.

[20]  Chooi-Tian Lee,et al.  Designing a virtual access control configuration protocol for implementation over ISDN and shared-media networks , 1996, Proceedings of LCN - 21st Annual Conference on Local Computer Networks.

[21]  Wai Lam,et al.  Modeling textual document classification , 1999, IEEE SMC'99 Conference Proceedings. 1999 IEEE International Conference on Systems, Man, and Cybernetics (Cat. No.99CH37028).

[22]  Masami Shishibori,et al.  Automatic text summarization based on keyword derivation , 2001, 2001 IEEE International Conference on Systems, Man and Cybernetics. e-Systems and e-Man for Cybernetics in Cyberspace (Cat.No.01CH37236).

[23]  J. Farkas Towards classifying full-text using recurrent neural networks , 1995, Proceedings 1995 Canadian Conference on Electrical and Computer Engineering.

[24]  Hahn-Ming Lee,et al.  An intelligent web-page classifier with fair feature-subset selection , 2001, Proceedings Joint 9th IFSA World Congress and 20th NAFIPS International Conference (Cat. No. 01TH8569).

[25]  Jörg Hahn,et al.  The Committee Support System 1Originally published in Computer Standards and Interfaces, volume 8 (1988), pages 57–66. Copyright of original article: 0920-5489/88/$3.50 © 1988, Elsevier Science Publishers B.V. (North-Holland). All rights reserved. 1 , 1999 .

[26]  E. Jukes Case based reasoning in legal case-retrieval , 1995 .

[27]  P. Fitzpatrick Performance analysis of a layered wireless network serving different user classes , 1996, Proceedings of Vehicular Technology Conference - VTC.

[28]  Chilin Shih,et al.  A Stochastic Finite-State Word-Segmentation Algorithm for Chinese , 1994, ACL.

[29]  L. G. Mason,et al.  Fairness in network optimal flow control , 1990, SBT/IEEE International Symposium on Telecommunications.

[30]  Benchiao Jai RADIUS: rapid application delivery, installation and upgrade system , 1998, Proceedings Technology of Object-Oriented Languages. TOOLS 28 (Cat. No.98TB100271).