Elizabeth Chang

Elizabeth Chang
Curtin University · Digital Ecosystems and Business Intelligence Institute (DEBII)

About

416
Publications
93,734
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
7,134
Citations
Citations since 2016
44 Research Items
3255 Citations
20162017201820192020202120220100200300400500
20162017201820192020202120220100200300400500
20162017201820192020202120220100200300400500
20162017201820192020202120220100200300400500

Publications

Publications (416)
Article
Full-text available
Research on academic paper ranking has received great attention in recent years, and many algorithms have been proposed to automatically assess a large number of papers for this purpose. How to evaluate or analyse the performance of these ranking algorithms becomes an open research question. Theoretically, evaluation of an algorithm requires to com...
Article
Risk management is a necessary consideration in any decision-making activity. In global supply chains that are increasingly becoming internetworked and data-centric, risk management assists risk managers in making smart decisions to achieve their desired outcomes. Because of its importance, there are many studies in the literature on supply chain r...
Article
In large-scale projects, the client defines a set of product requirements, which the provider is then expected to deliver within the agreed time, cost and scope. If a client sets ambiguous requirements for the project, this may result in the receipt of an unsatisfactory product. Therefore, reducing ambiguity in product requirements by the client is...
Article
The ever growing volume of academic articles stresses the need for a new generation of knowledge management method to intelligently reuse the academic knowledge and facilitate the development of scientific research. Knowledge fusion (KF) serves a key element of such method addressing those needs, and breakthrough progress has taken place in the fie...
Conference Paper
Full-text available
Expert knowledge can be valuable for academic article recommendation, however, hiring domain experts for this purpose is rather expensive as it is extremely demanding for human to deal with a large volume of academic publications. Therefore, developing an article ranking method which can automatically provide recommendations that are close to exper...
Article
In large-scale projects, it often occurs that the product the purchaser ends up receiving – possibly from projects extending over many years – differs from what they expected. The provider usually defends its delivered product and may blame the imprecision and ambiguity of the requirements, defined by the purchaser, as the primary reason for misint...
Chapter
Customers prefer the availability of a range of products when they shop online. This enables them to identify their needs and select products that best match their desires. This is addressed through assortment planning. Some customers have strong awareness of what they want to purchase and from which provider. When considering customer taste as an...
Article
Full-text available
The volume of scientific articles grow rapidly, producing a scientific basis for understanding and identifying the research problems and the state-of-the-art solutions. Despite the considerable significance of the problem-solving information, existing scholarly recommending systems lack the ability to retrieve this information from the scientific a...
Article
As the volume of scientific papers grows rapidly in size, knowledge management for scientific publications is greatly needed. Information extraction and knowledge fusion techniques have been proposed to obtain information from scholarly publications and build knowledge repositories. However, retrieving the knowledge of problem/solution from academi...
Article
The requirement specification process is an important part of a project and has the potential to prevent problems that may last for years after a project is delivered. Previous studies on the requirement specification process have focused on clarifying stated fuzzy terms in software requirement engineering. However, in many projects there is inform...
Article
Full-text available
While organisations in the current era of big data are generating massive volumes of data, they also need to ensure that its quality is maintained for it to be useful in decision-making purposes. The problem of dirty data plagues every organisation. One aspect of dirty data is the presence of duplicate data records that negatively impact an organis...
Article
Full-text available
Although Multi Criteria Decision Making (MCDM) methods have been applied in numerous case studies, many companies still avoid employing these methods in making their decisions and prefer to decide intuitively. There are studies claiming that MCDM methods provide better rankings for companies than intuitive approaches. This study argues that this cl...
Article
Assortment Planning (AP) is one of the most significant and challenging decision for online retailers (e-tailers) to make. This decision becomes even more complex when a supplier is considered as a distinctive participant in decision making model. In the bricks and mortar mode of retailing, retailers are more powerful than suppliers in getting the...
Article
Operational risk management in supply chain activities is important for the successful achievement of the desired outcomes. Although it is an active area of research with an aim of improving a firm's success in its operations, a drawback of existing approaches is that they analyse it from only the perspective of events local to the supply chain. In...
Conference Paper
In recent past, there is a growing trend of interest among the downstream stakeholders of a dairy chain to receive milk (and dairy products) of high quality. Moreover, the rejection of milk and other dairy products by customers due to its poor quality has severe negative impacts on the dairy chain's upstream stakeholders. "Smart Farm" is a system f...
Conference Paper
Full-text available
As the volume of scientific papers grows rapidly in size, knowledge management for scientific publications is greatly needed. Information extraction and knowledge fusion techniques have been proposed to obtain information from scholarly publications and build knowledge repositories. However, retrieving the knowledge of problem/solution from academi...
Chapter
Sentiment analysis techniques are widely used to capture the voice of customers about different products/services. Aspect or feature-based sentiment detection tools as one of the sentiment analyses’ types are developed to find the customers’ opinions about various features of a product. However, as a product may contain many features, presenting th...
Preprint
The cloud of things (CoT) is an emerging paradigm that has merged and combined cloud computing and the Internet of Things (IoT). Such a paradigm has enabled service providers to provide on-demand computing resources from devices spread across different locations for service users to be dynamically connected to them. While this benefits the CoT serv...
Article
Milk is a highly perishable product whose quality degrades while moving downstream in an imperfect cold dairy supply chain. Existing literature adopts a reactive approach for evaluating and preventing milk with a high microbial index from moving further downstream in a dairy supply chain. In this paper, we argue that such an approach is not the bes...
Article
Full-text available
Building information networks using semantic based techniques to avoid tedious work and to achieve high efficiency has been a long-term goal in the information management world. A great volume of research has focused on developing large scale information networks for general domains to pursue the comprehensiveness and integrity of the information....
Article
We propose an interactive decision-making framework to assist a Customer Service Representative (CSR) in the efficient and effective recognition of customer records in a database with many ambiguous entries. Our proposed framework consists of three integrated modules. The first module focuses on the detection and resolution of duplicate records to...
Article
Full-text available
In cloud computing, service level agreements (SLAs) are legal agreements between a service provider and consumer that contain a list of obligations and commitments which need to be satisfied by both parties during the transaction. From a service provider's perspective, a violation of such a commitment leads to penalties in terms of money and reputa...
Article
Sentiment knowledge extraction is a growing area of research in the literature. It helps in analyzing users’ opinions about different entities or events, which can then be utilized by analysts for various purposes. Particularly, feature-based sentiment analysis is one of the challenging research areas that analyzes users’ opinions on various featur...
Article
In a dynamic environment such as the cloud-of-things, one of the most critical factors for successful service delivery is the QoS under defined constraints. Even though guarantees in the form of service level agreements (SLAs) are provided to users, many services exhibit dynamic Quality of Service (QoS) variations. This QoS variation as well as cha...
Article
The concept of stratification (CST) has recently been proposed as an innovative approach in problem solving. CST takes a recursive approach to solve problems. It considers a system which has to transition through states until it arrives to a state which belongs to a desired set of states, namely a target set. The states can be stratified by enlargi...
Article
Full-text available
Although we are living in the era of big data, in many real-world applications, being able to access the right set and quantity of data is still a challenging task. One solution to address this drawback is to transform the existing information and knowledge from its tacit form back to data which can be used to simulate and regenerate the required k...
Article
Procurement, the act of buying goods or services from an external supplier, plays an important role in any organisation. To measure how well an organisation undertakes this activity, it needs to measure all associated Key Performance Indicators (KPIs). The current literature's major drawback in performing such a measurement is how to integrate the...
Conference Paper
Full-text available
The big data research topic has grown rapidly for the past decade due to the advent of the "data deluge". Recent advancements in the literature leverage human computing power known as crowdsourcing to manage and harness big data for various applications. However, human involvement in the completion of crowdsourcing tasks is an error-prone process t...
Conference Paper
Full-text available
Avoiding ambiguity and fuzziness in the determination of the requirements is a crucial factor in the success of Performance Based Contracting (PBC). To date, there is a research gap because insufficient studies have been undertaken to address this significant issue in the pro-curement process. Previous studies that have been con-ducted on requireme...
Conference Paper
Full-text available
Cloud-of-things service providers use various descriptions languages to describe Quality of Service (QoS) attributes. However, existing modelling approaches provide support for modelling static QoS attributes only and lack features to model and reason with dynamic QoS attributes such as response time and availability. This paper presents an event-b...
Conference Paper
Full-text available
Effective business planning requires seamless access and intelligent analysis of information in its totality to allow the business planner to gain enhanced critical business insights for decision support. Current business planning tools provide insights from structured business data (i.e. sales forecasts, customers and products data, inventory deta...
Conference Paper
Full-text available
Building ontology for wireless network intrusion detection is an emerging method for the purpose of achieving high accuracy, comprehensive coverage, self-organization and flexibility for network security. In this paper, we leverage the power of Natural Language Processing (NLP) and Crowdsourcing for this purpose by constructing lightweight semi-aut...
Article
Full-text available
In today's competitive world, service providers need to be customer-focused and proactive in their marketing strategies to create consumer awareness of their services. Cloud computing provides an open and ubiquitous computing feature in which a large random number of consumers can interact with providers and request services. In such an environment...
Article
Full-text available
Purpose Contact centers (CCs) are one of the main touch points of customers in an organization. They form one of the inputs to customer relationship management (CRM) to enable an organization to efficiently resolve customer queries. CCs have an important impact on customer satisfaction and are a strategic asset for CRM systems. The purpose of this...
Article
In current competitive times, product manufacturers need not only to retain their existing customer base, but also to increase their market share. One way they can achieve this is by generating new ideas and developing novel products with new features. As highlighted in the literature, in generating new ideas to develop novel and innovative product...
Article
Full-text available
Service level agreement (SLA) is an essential agreement formed between a consumer and a provider in business activities. The SLA defines the business terms, objectives, obligations and commitment of both parties to a business activity, and in cloud computing it also defines a consumer's request for both fixed and variable resources, due to the elas...
Conference Paper
Automated planning is a rich technical filed in Artificial Intelligence (AI) and most of the existing research focused on path finding methods in a compact state-transition system where planning is decoupled from execution. The introduction of the Web has led to increasing emphasis in AI on the development of planning algorithms for real-world appl...
Article
Cloud computing has rapidly become the most effective computing paradigm for today’s increasingly technology-dependent society. The emerging concepts of federated clouds with support for interoperability between different cloud providers and open standards in cloud middleware have opened up new challenges in cloud service management. One of the eme...
Conference Paper
Full-text available
Entity identification and resolution has been a hot topic in computer science from last three decades. The ever increasing amount of data and data quality issues such as duplicate records pose great challenge to organizations to efficiently and effectively perform their business operations such as customer relationship management, marketing, contac...
Article
The Semantic Web envisions a Web where information is accessible and processable by computers as well as humans. Ontologies are the cornerstones for realizing this vision of the Semantic Web by capturing domain knowledge through the defined terms and the relationship between them to provide a formal representation of the domain with machine-underst...
Article
Cloud computing is a new computing paradigm in which virtualized hardware and software resources are provided to the users over the Internet as services with pay-as-you-go like pricing mechanisms. This enables the cloud users to fulfil their IT requirements by using virtualized computing resources, located at a cloud service provider, as cloud serv...
Article
Full-text available
Cloud technology connects a network of virtualized computers that are dynamically provisioned as computing resources, based on negotiated agreements between service providers and users. It delivers information technology resources in diverse forms of service, and the explosion of Cloud services on the Internet brings new challenges in Cloud service...
Article
Cloud computing is a very attractive option for service users and service providers for their businesses because of the benefits it provides. A major concern among service users regarding cloud adoption, however, is the unpredictability of performance in relation to the services provided. Even though guarantees in the form of service-level agreemen...
Article
Full-text available
This paper draws on the existing body of knowledge to develop an ontology for university social responsibility (USR). There are numerous terms and definitions for USR in the existing literature. However, there is no consensus among them. In order to address this issue, we used a semi-automated text mining approach for ontology engineering. The deve...
Conference Paper
Full-text available
The emergence of Internet advertising brings about an economic and efficient marketing means for small and medium enterprises in service industries. Every day, massive service advertising information is published over the Internet. Nevertheless, on the other side, service consumers find it difficult to quickly and precisely retrieve their desired s...
Article
Full-text available
Web services provide a standard means for the interoperable operations between electronic devices in a network. The mission of Web service discovery is to seek an appropriate Web service for a service requester on the basis of the service descriptions in Web service advertisements and the service requester's requirements. Nevertheless, the standard...
Article
Recent advancements in wireless communication are creating a spectrum shortage problem on a daily basis. Recently, Cognitive Radio (CR), a novel technology, has attempted to minimize this problem by dynamically using the free spectrum in wireless communications and mobile computing. Cognitive radio networks (CRNs) can be formed using cognitive radi...
Conference Paper
Full-text available
The main purpose of this paper is to propose a content analysis approach in order to develop an ontology of university social responsibility (USR). The proposed approach comprises four main phases in which two content analyses software have been utilized to extract the main USR components and to identify the domain of this concept. To achieve the g...
Article
This paper proposes a novel neural network (NN) training method that employs the hybrid exponential smoothing method and the Levenberg–Marquardt (LM) algorithm, which aims to improve the generalization capabilities of previously used methods for training NNs for short-term traffic flow forecasting. The approach uses exponential smoothing to preproc...
Conference Paper
In the current economic, budget tightening and competitive times, organizations need to be customer focused and provide customized service to customers to ensure their loyalty. To achieve this, Customer Relationship Management (CRM) systems help organizations to deal with and answer various customer queries. However with a change in the type of inf...
Article
Over the past two decades, neural networks have been applied to develop short-term traffic flow predictors. The past traffic flow data, captured by on-road sensors, is used as input patterns of neural networks to forecast future traffic flow conditions. The amount of input patterns captured by the on-road sensors is usually huge, but not all input...
Conference Paper
Full-text available
The main purpose of this study is to investigate, from a theoretical point of view, virtual universities in comparison with Social Networking Services (SNS). The theoretical framework constitutes of the Human Motivation Theory (HMT) and the Human Factors (HF) in which Facebook as the most popular SNS is compared with virtual university in general....
Article
Cyber-Physical Systems (CPS) provides a smart infrastructure connecting abstract computational artifacts with the physical world. This paper presents some challenges for developing distributed real-time Cyber-Physical Systems. The focus is on one particular challenge, namely event modelling in distributed real-time CPS. A Web-of-Things based CPS fr...
Article
A narrative can be described as a series of events connected to one another, which are caused by or experienced by the characters of the story. By this definition, an Event can be interpreted as an important part of the story since it is mostly these kinds of statements that move the plot along. The concept proposed in this paper features an Event...
Conference Paper
Ontology evolution becomes an interesting topic in the semantic web field and increasingly getting research momentum. However, there is still a lack of understanding and support in ontology evolution. In this paper, we focus on an approach for ontology evolution of Software Engineering Ontology (SE Ontology) in multi-site software development setti...
Article
In Demand-driven Production with Just-in-Time inputs, there are several sources of uncertainty which impact on the manufacturer’s ability to meet the required customer’s demand within the given time frame. This can result in a loss of revenue and customers, which will have undesirable impacts on the financial aspects and on the viability of the man...
Article
The modelling and management of trust between interacting parties are crucial parts of the overall business intelligence strategy for any organization. Predicting trust values is a key element of modelling and managing trust. It is of critical importance when the interaction is to be conducted at a future point in time. In the existing body of work...
Article
A digital ecosystem is a widespread type of ubiquitous computing environment comprised of ubiquitous, geographically dispersed, and heterogeneous species, technologies and services. As a subdomain of the digital ecosystems, digital health ecosystems are crucial for the stability and sustainable development of the digital ecosystems. However, since...
Article
Full-text available
Digital ecosystem (DE) is comprised of heterogeneous and distributed species which can play the dual role of service provider and service requester. Nowadays, DE lacks semantic search support, which means it cannot provide a reliable and trustworthy link between service providers and service requesters. To solve this issue, we design a conceptual f...
Article
A quad-band 2.5G receiver is designed to replace the front-end SAW filters with on-chip bandpass filters and to integrate the LNA matching components, as well as the RF baluns. The receiver achieves a typical sensitivity of -110 dBm or better, while saving a considerable amount of BOM. Utilizing an arrangement of four baseband capacitors and MOS sw...