Skip to main content
Log in

An Intelligent Knowledge Management Model for Construction and Reuse of Automobile Manufacturing Intellectual Properties

  • Original Article
  • Published:
The International Journal of Advanced Manufacturing Technology Aims and scope Submit manuscript

Abstract

More and more organizations have recognized the importance of efficient enterprise knowledge construction, extraction and management. To effectively acquire domain knowledge from experts, a knowledge centre that can automatically manage the huge amounts of documents and knowledge is required. In this paper, a knowledge management (KM) model as well as a platform consisting of document keyword extraction (DKE) module, document classification (DC) module, authority reasoning (AR) module and validation process decision (VPD) module are developed for intelligent and automatic management over the manufacturing intellectual properties (IPs) of the automobile industry. In this industry, sophisticated entities are involved in knowledge construction and reuse under the collaborative design environment. A case study is provided to evaluate feasibility and performance of the intelligent knowledge management model. With the training and learning stages, the accuracy and precision of the KM decision modules can be significantly improved. Therefore, in addition to the automobile IP management, it is proven that with the learning mechanism, the proposed intelligent KM approach can be applied to different applications for organizations to efficiently construct and manage domain knowledge .

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Ando K, Yamasaki T, Shishibori M, Aoe J (2001) Automatic text summarization based on keyword derivation, 2001 IEEE International Conference on Systems, Man, and Cybernetics, Vol. 1, pp. 464–469

  2. Benchiao J (1998) RADIUS: rapid application delivery, installation and upgrade system, Proceedings, Technology of Object-Oriented Languages, pp. 180–186

  3. Dasigi V (1998) Information fusion experiments for text classification, IEEE Information Technology Conference, pp. 23–26

  4. Dengel A (1997) Bridging the media gap from the Guthenberg’s world to electronic document management systems, IEEE International Conference on Systems, Man, and Cybernetics, Computational Cybernetics and Simulation, Vol. 4, pp. 3540–3545

  5. Farkas J (1995) Towards classifying full-text using recurrent neural networks, Canadian Conference on Electrical and Computer Engineering, Vol. 1, pp. 511–514

  6. Fernandez IB, Subbarao WV (1994) Encryption based security for ISDN communication: technique and application, Proceedings of the 1994 IEEE Creative Technology Transfer - A Global Affair, pp. 70–72

    Google Scholar 

  7. Fitzpatrick P (1996) Performance analysis of a layered wireless network serving different user classes, IEEE 46th Vehicular Technology Conference on Mobile Technology for the Human Race, Vol. 1, pp. 431–435

  8. Hahn J (1999) The committee support system, Comput Standards Interfaces 20(4):231–241

    Google Scholar 

  9. Hou J-L, Chan C-A (2003) On the establishment of keyword correlation thesaurus, Proceedings of The 2003 Conference on Electronic Commerce and Digital Life, pp. 38–47

  10. Hou J-L, Chuo H-C (2002) A model for electronic document authentication and management, The 30th International Conference on Computers & Industrial Engineering, pp. 317–322

  11. Israel JE, Linden TA (1983) Authentication in office system Internetworks, ACM Trans Inf Sys 1(3):193–210

    Google Scholar 

  12. Jukes E (1995) Case based reasoning in legal case-retrieval, IEE Colloquium on Case Based Reasoning: Prospects for Applications, Vol. 10, pp. 1–4

  13. Karunadsa PS, Annakkage UD, MacDonald BA (2000) Dynamic security control using secure regions derived from a decision tree technique, IEEE Power Engineering Society Summer Meeting, Vol. 3, pp. 1861–1865

  14. Lam W, Chao Y-H (1999) Modeling textual document classification, IEEE SMC Conference Proceedings: IEEE International Conference on Systems, Man, and Cybernetics, Vol. 3, pp. 946–949

  15. Langer K, Bodendorf F (1994) A system architecture for flexible, knowledge-based, multimedia CBT-application, Proceedings: IEEE First International Conference on Multi-Media Engineering Education, pp. 20–29

  16. Lee C-T, Harris JW (1996) Designing a virtual access control configuration protocol for implementation over ISDN and shared-media networks, Proceedings of the 21st IEEE Conference on Local Computer Networks, pp. 116–125

  17. Lee H-M, Chen C-M, Tan C-C (2001) An intelligent web-page classifier with fair feature-subset selection, IFSA World Congress and 20th NAFIPS International Conference, Vol. 1, pp. 395–400

  18. Leiming Q, Jones DL (2001) Minimax disappointment criterion for video broadcasting, Proceedings of the 2001 International Conference on Image Processing, Vol. 1, pp. 449–452

  19. Mazumdar R, Maso LG, Douligieris C (1990) Fairness in network optimal flow control, IEEE International Telecommunications Symposium, pp. 590–596

  20. Moldovan DI, Mihalcea R (2000) Using WordNet and lexical operators to improve Internet searches, IEEE Internet Comput 4(1):34–43

    Google Scholar 

  21. Ott M, Huth C, Nastansky L (1999) Reengineering organizational structures from within, Proceedings of the 32nd Annual Hawaii International Conference on System Sciences, Vol. 5, p. 10

  22. Peat HJ, Willett P (1991) The limitations of term co-occurrence data for query expansion in document retrieval systems, J Am Soc Inf Sci 42(5):379–380

    Google Scholar 

  23. Petridis V, Kaburlasos VG (2001) Clustering and classification in structured data domains using Fuzzy Lattice Neurocomputing (FLN), IEEE Trans Knowl Data Eng 13(2):245–260

    Google Scholar 

  24. Piattini M, Rodero JA (1999) Auditing data warehouse security, Proceedings of the IEEE 33rd Annual International Carnahan Conference on Security Technology, pp. 255–261

  25. Russell S (1993) Transparent cosignatures for electronic documents, Proceedings of the Ninth Annual Conference on Computer Security Applications, pp. 82–91

  26. Sailer R (1998) Security services in an open service environment, Proceedings of the 14th Annual Computer Security Applications Conference, pp. 223–234

  27. Sakakibara Y, Misue K, Koshiba T (1993) Text classification and keyword extraction by learning decision trees, Proceedings of the Ninth Conference on Artificial Intelligence for Applications, p. 466

  28. Salvador NS, Evangelos T, Donald K (2002) A feature mining based approach for the classification of text documents into disjoint classes, Inf Process Manage 38(4):583–604

    Google Scholar 

  29. Sproat R, Shih C, Gale W, Chang N (1996) A stochastic finite-state word-segmentation algorithm for Chinese, Comput Linguist 22(3):376–404

    Google Scholar 

  30. Sun M-T, Hou J-L (2002) A heuristic model for document authority reasoning, 2003 Conference on Electronic Business Management, Paper ID: 39

  31. Tseng YH (1997) An automatic keyword extraction technique and correlation feedback, J Chin Libr 59:59–64

    Google Scholar 

  32. Tsuda K, Nakamura M (1999) The extraction method of the word meaning class, Third International Conference on Knowledge-Based Intelligent Information Engineering Systems, pp. 534–537

  33. Yip K-W, Ng T-S (2000) Partial-encryption technique for intellectual property protection of FPGA-based products, IEEE Trans Consum Electron 46(1):183–190

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to J.-L. Hou.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Hou, JL., Sun, MT. & Chuo, HC. An Intelligent Knowledge Management Model for Construction and Reuse of Automobile Manufacturing Intellectual Properties. Int J Adv Manuf Technol 26, 169–182 (2005). https://doi.org/10.1007/s00170-003-1971-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00170-003-1971-9

Keywords

Navigation