988
Views
43
CrossRef citations to date
0
Altmetric
Original Articles

CKshare: secured cloud-based knowledge-sharing blockchain for injection mold redesign

, , ORCID Icon, & ORCID Icon
Pages 1-33 | Received 01 Feb 2018, Accepted 19 Oct 2018, Published online: 02 Nov 2018

References

  • Aizawa, A. 2003. “An Information-Theoretic Perspective of TF-IDF Measures.” Information Processing & Management 39 (1): 45–65. doi:10.1016/S0306-4573(02)00021-3.
  • Alhammady, H. 2007. “Weighted Naive Bayesian Classifier.” In computer systems and applications, 2007. AICCSA’07. IEEE/ACS international conference on IEEE, 437–441. Amman, Jordan. doi:10.1109/AICCSA.2007.370918.
  • Armbrust, M., A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, … M. Zaharia. 2010. “A View of Cloud Computing.” Communications of the ACM 53 (4): 50–58. doi:10.1145/1721654.1721672.
  • Back, A., M. Corallo, L. Dashjr, M. Friedenbach, G. Maxwell, A. Miller, and P. Wuille. 2014. “Enabling Blockchain Innovations with Pegged Sidechains.” http://www.opensciencereview.com/papers/123/enablingblockchain-innovations-with-pegged-sidechains
  • Badzar, A. 2016. “Blockchain for Securing Sustainable Transport Contracts and Supply Chain Transparency-An Explorative Study of Blockchain Technology in Logistics.” PhD Diss., Lund University.
  • Bijalwan, V., V. Kumar, P. Kumari, and J. Pascual. 2014. “KNN Based Machine Learning Approach for Text and Document Mining.” International Journal of Database Theory and Application 7 (1): 61–70. doi:10.14257/ijdta.2014.7.1.06.
  • Buterin, V. 2014. “A Next-Generation Smart Contract and Decentralized Application Platform.” Ethereum white paper. https://cryptorating.eu/whitepapers/Ethereum/Ethereum_white_paper.pdf
  • Çelik, Ö., A. Teke, and H. B. Yıldırım. 2016. “The Optimized Artificial Neural Network Model with Levenberg–Marquardt Algorithm for Global Solar Radiation Estimation in Eastern Mediterranean Region of Turkey.” Journal of Cleaner Production 116: 1–12. doi:10.1016/j.jclepro.2015.12.082.
  • Chang, V. 2015. “Towards a Big Data System Disaster Recovery in a Private Cloud.” Ad Hoc Networks 35: 65–82. doi:10.1016/j.adhoc.2015.07.012.
  • Chang, V., Y. H. Kuo, and M. Ramachandran. 2016. “Cloud Computing Adoption Framework: A Security Framework for Business Clouds.” Future Generation Computer Systems 57: 24–41. doi:10.1016/j.future.2015.09.031.
  • Chen, H. 1995. “Machine Learning for Information Retrieval: Neural Networks, Symbolic Learning, and Genetic Algorithms.” Journal of the Association for Information Science and Technology 46 (3): 194–216. doi:10.1002/(SICI)1097-4571(199504)46:3<194::AID-ASI4>3.0.CO;2-S.
  • Chen, Y. J. 2010. “Knowledge Integration and Sharing for Collaborative Molding Product Design and Process Development.” Computers in Industry 61 (7): 659–675. doi:10.1016/j.compind.2010.03.013.
  • Chou, H. W., Y. H. Lin, H. S. Lu, H. H. Chang, and S. B. Chou. 2014. “Knowledge Sharing and ERP System Usage in Post-Implementation Stage.” Computers in Human Behavior 33: 16–22. doi:10.1016/j.chb.2013.12.023.
  • Chungoora, N., R. I. Young, G. Gunendran, C. Palmer, Z. Usman, N. A. Anjum, and K. Case. 2013. “A Model-Driven Ontology Approach for Manufacturing System Interoperability and Knowledge Sharing.” Computers in Industry 64 (4): 392–401. doi:10.1016/j.compind.2013.01.003.
  • Crosby, M., P. Pattanayak, S. Verma, and V. Kalyanaraman. 2016. “Blockchain Technology: Beyond Bitcoin.” Applied Innovation 2: 6–10. doi:10.1145/2994581.
  • Cummings, J. N. 2004. “Work Groups, Structural Diversity, and Knowledge Sharing in a Global Organization.” Management Science 50 (3): 352–364. doi:10.1287/mnsc.1030.0134.
  • Da Costa, V. F., J. Oliveira, and J. M. de Souza. 2011. “Conceptual Model for Corporate Universities.” Encyclopedia of Knowledge Management Second Edition. Hershey, USA: IGI Global.
  • Dillon, T., C. Wu, and E. Chang. April, 2010. “Cloud Computing: Issues and Challenges.” In advanced information networking and applications (AINA), 2010 24th IEEE international conference on (pp. 27-33), Cape Town, South Africa: IEEE. doi:10.1109/AINA.2010.187.
  • Doelitzscher, F., A. Sulistio, C. Reich, H. Kuijs, and D. Wolf. 2011. “Private Cloud for Collaboration and e-Learning Services: From IaaS to SaaS.” Computing 91 (1): 23–42. doi:10.1007/s00607-010-0106-z.
  • Drescher, D. 2017. Blockchain Basics. Frankfurt am Main, Germany: Apress. doi: 10.1007/978-1-4842-2604-9
  • Feng, N., H. Wu, M. Li, D. Wu, F. Chen, and J. Tian. 2016. “Managing Security Risks for Inter-Organisational Information Systems: A Multiagent Collaborative Model.” Enterprise Information Systems 10 (7): 751–770. doi:10.1080/17517575.2014.986217.
  • Goscinski, A., and M. Brock. 2010. “Toward Dynamic and Attribute Based Publication, Discovery and Selection for Cloud Computing.” Future Generation Computer Systems 26 (7): 947–970. doi:10.1016/j.future.2010.03.009.
  • Goyal, S. 2014. “Public Vs Private Vs Hybrid Vs Community-Cloud Computing: A Critical Review.” International Journal of Computer Network and Information Security 6 (3): 20–29. doi:10.5815/ijcnis.
  • Guo, Y., J. Hu, and Y. Peng. 2012. “A CBR System for Injection Mould Design Based on Ontology: A Case Study.” Computer-Aided Design 44 (6): 496–508. doi:10.1016/j.cad.2011.12.007.
  • Hadzistevic, M., I. Matin, J. Hodolic, D. Vukelic, S. Vukmirovic, D. Godec, and B. Nedic. 2014. “Rule Base Reasoning in the Knowledge-Based Mould Design System.” Technical Gazette 21 (5): 1143–1148.
  • Hertz, J. 2018. Introduction to the Theory of Neural Computation. CRC PressTaylor & Francis Group, Boca Raton
  • Hong, H., Y. Yin, and X. Chen. 2016. “Ontological Modelling of Knowledge Management for Human–Machine Integrated Design of Ultra-Precision Grinding Machine.” Enterprise Information Systems 10 (9): 970–981. doi:10.1080/17517575.2016.1273393.
  • Hu, J., J. Qi, and Y. Peng. 2015. “New CBR Adaptation Method Combining with Problem–Solution Relational Analysis for Mechanical Design.” Computers in Industry 66: 41–51. doi:10.1016/j.compind.2014.08.004.
  • Huang, Y., Z. Jiang, C. He, J. Liu, B. Song, and L. Liu. 2015. “A Semantic-Based Visualised Wiki System (Svwks) for Lesson-Learned Knowledge Reuse Situated in Product Design.” International Journal of Production Research 53 (8): 2524–2541. doi:10.1080/00207543.2014.975861.
  • Hwang, E. H., P. V. Singh, and L. Argote. 2015. “Knowledge Sharing in Online Communities: Learning to Cross Geographic and Hierarchical Boundaries.” Organization Science 26 (6): 1593–1611. doi:10.1287/orsc.2015.1009.
  • Iansiti, M., and K. R. Lakhani. 2017. “The Truth About Blockchain.” Harvard Business Review. https://hbr.org/2017/01/the-truth-about-blockchain
  • Imandoust, S. B., and M. Bolandraftar. 2013. “Application of K-Nearest Neighbor (Knn) Approach for Predicting Economic Events: Theoretical Background.” International Journal of Engineering Research and Applications 3 (5): 605–610.
  • Irani, R. K., B. H. Kim, and J. R. Dixon. 1995. “Towards Automated Design of the Feed System of Injection Molds by Integrating CAE, Iterative Redesign and Features.” Journal of Engineering for Industry 117 (1): 72–77. doi:10.1115/1.2803281.
  • Jiang, S., G. Pang, M. Wu, and L. Kuang. 2012. “An Improved K-nearest-neighbor Algorithm for Text Categorization.” Expert Systems with Applications 39 (1): 1503–1509. doi: 10.1016/j.eswa.2011.08.040.
  • Jing, Q., A. V. Vasilakos, J. Wan, J. Lu, and D. Qiu. 2014. “Security of the Internet of Things: Perspectives and Challenges.” Wireless Networks 20 (8): 2481–2501. doi:10.1007/s11276-014-0761-7.
  • Jones, P. 2015. Mould Design Guide. Shawbury: Shrapra.
  • Jong, W. R., Y. H. Ting, T. C. Li, and K. Y. Chen. 2013. “An Integrated Application for Historical Knowledge Management with Mould Design Navigating Process.” International Journal of Production Research 51 (11): 3191–3205. doi:10.1080/00207543.2012.715769.
  • Kaushik, A., and A. Kumar. 2013. “Application of Cloud Computing in Libraries.” International Journal of Information Dissemination and Technology 3 (4): 270.
  • Kazmer, D. O. 2016. Injection Mold Design Engineering. Munich: Carl Hanser Verlag GmbH Co KG.
  • Kim, E. K., J. T. Wu, S. Tamura, Y. Sato, R. Close, H. Taketani, … K. Ono. 1993. “Comparison of Neural Network and k-NN Classification Methods in Vowel and Patellar Subluxation Image Recognitions.” In Advances in Pattern Recognition Systems Using Neural Network Technologies 131–138. doi:10.1142/9789812797926_0008.
  • Kotsiantis, S. B., Zaharakis, I., & Pintelas, P. 2007. “Supervised machine learning: A review of classification techniques.” Emerging artificial intelligence applications in computer engineering, 160, 3–24.
  • Laili, Y., F. Tao, and L. Zhang. 2015. “A Hybrid RCO for Dual Scheduling of Cloud Service and Computing Resource in Private Cloud.” Configurable intelligent optimization algorithm. Springer series in advanced manufacturing. Cham: Springer. doi:10.1007/978-3-319-08840-2_9.
  • Leung, Y. K., K. L. Choy, and C. K. Kwong. 2010. “A Real-Time Hybrid Information-Sharing and Decision Support System for the Mould Industry.” The Journal of High Technology Management Research 21 (1): 64–77. doi:10.1016/j.hitech.2010.02.008.
  • Li, X., W. Li, and D. Shi. 2015. “Enterprise Private Cloud File Encryption System Based on Tripartite Secret Key Protocol.” In International industrial informatics and computer engineering conference, 166–169. Xi'an, Shaanxi, China.
  • Li, Z., A. Vatankhah Barenji, and G. Q. Huang. 2018. “Toward a Blockchain Cloud Manufacturing System as a Peer to Peer Distributed Network Platform.” Robotics and Computer-Integrated Manufacturing 54: 133–144. doi:10.1016/j.rcim.2018.05.011.
  • Li, Z., L. Liu, A. V. Barenji, and W. Wang. 2018a. “Cloud-Based Manufacturing Blockchain: Secure Knowledge Sharing for Injection Mould Redesign.” Procedia CIRP 72: 961–966. doi:10.1016/j.procir.2018.03.004.
  • Li, Z., L. Liu, and W. M. Wang. 2017. “Simulated Annealing Algorithm-Based IMMK System for Mould Redesign.” Transdisciplinary Engineering: A Paradigm Shift 5: 889–897. doi:10.3233/978-1-61499-779-5-889.
  • Li, Z., W. M. Wang, G. Liu, L. Liu, J. He, and G. Q. Huang. 2018b. “Towards Open Manufacturing: A Cross-Enterprises Knowledge and Services Exchange Framework Based on Blockchain and Edge Computing.” Industrial Management & Data Systems 118 (1): 303–320. doi:10.1108/IMDS-04-2017-0142.
  • Lior, R. 2014. Data Mining with Decision Trees: Theory and Applications. Singapore: World scientific.
  • López-Cuadrado, J. L., R. Colomo-Palacios, I. González-Carrasco, Á. García-Crespo, and B. Ruiz-Mezcua. 2012. “SABUMO: Towards a Collaborative and Semantic Framework for Knowledge Sharing.” Expert Systems with Applications 39 (10): 8671–8680. doi:10.1016/j.eswa.2012.01.198.
  • Lyu, H., and Z. Zhang. 2015. “Job Quitters, Information Security Awareness, and Knowledge Management Strategies.” Journal of Information Privacy and Security 11 (4): 189–210. doi:10.1080/15536548.2015.1105594.
  • Mariani, J., E. Quasney, and M. E. Raynor. 2015. “Forging Links into Loops.” The Internet of Things, 55. https://www2.deloitte.com/content/dam/insights/us/articles/internet-of-things-supply-chain-management/DUP1159_DR17_ForgingLinksIntoLoops.pdf
  • Mariscal, G., O. Marban, and C. Fernandez. 2010. “A Survey of Data Mining and Knowledge Discovery Process Models and Methodologies.” The Knowledge Engineering Review 25 (2): 137–166. doi:10.1017/S0269888910000032.
  • Mok, C. K., M. Hua, and S. Y. Wong. 2008. “A Hybrid Case-Based Reasoning CAD System for Injection Mould Design.” International Journal of Production Research 46 (14): 3783–3800. doi:10.1080/00207540601103100.
  • Mokris, I., and L. Skovajsova. 2008. “Document Space Dimension Reduction by Latent Semantic Analysis and Hebbian Neural Network.” 6th International Symposium on Intelligent Systems and Informatics.  Subotica, Serbia. pp. 1–4. doi:10.1109/SISY.2008.4664910.
  • Mon, E. E., and T. T. Naing. 2011. “The Privacy-Aware Access Control System Using Attribute-And Role-Based Access Control in Private Cloud.” In broadband network and multimedia technology (IC-BNMT), 4th IEEE international conference on IEEE, Beijing, October 28–30.
  • Nakamoto, S. 2008. Bitcoin: A Peer-To-Peer Electronic Cash System. http://bitcoin.org/bitcoin.pdf
  • Narayanan, V., I. Arora, and A. Bhatia. 2013. “Fast and Accurate Sentiment Classification Using an Enhanced Naive Bayes Model.” In international conference on intelligent data engineering and automated learning, Berlin, Heidelberg: Springer, 194–201. doi:10.1177/1753193413475963.
  • Othman, S. H., and G. Beydoun. 2016. “A Metamodel-Based Knowledge Sharing System for Disaster Management.” Expert Systems with Applications 63: 49–65. doi:10.1016/j.eswa.2016.06.018.
  • Palychata, J. 2014. “The Development of an Alternative to the Current Banking System Is under Way.” Analysis: Crypto-currency. https://bitcoin.fr/public/divers/docs/BNP_Paribas_-_Quintessence_-_Automne_2014_-_A_propos_de_Bitcoin.pdf
  • Rittinghouse, J. W., and J. F. Ransome. 2016. Cloud Computing: Implementation, Management, and Security. Boca Raton: CRC press.
  • Roman, R., J. Zhou, and J. Lopez. 2013. “On the Features and Challenges of Security and Privacy in Distributed Internet of Things.” Computer Networks 57 (10): 2266–2279. doi:10.1016/j.comnet.2012.12.018.
  • Safa, N. S., and R. Von Solms. 2016. “An Information Security Knowledge Sharing Model in Organizations.” Computers in Human Behavior 57: 442–451. doi:10.1016/j.chb.2015.12.037.
  • Sedighi, M., S. van Splunter, F. Brazier, C. van Beers, and S. Lukosch. 2016. “Exploration of Multi-Layered Knowledge Sharing Participation: The Roles of Perceived Benefits and Costs.” Journal of Knowledge Management 20 (6): 1247–1267. doi:10.1108/JKM-01-2016-0044.
  • Sniderman, B., M. Mahto, and M. J. Cotteleer. 2016. Industry 4.0 And Manufacturing Ecosystems, Exploring the World of Connected Enterprises. Dallas, Texas: Deloitte University Press.
  • Street, W. N., and Y. Kim. 2001. “A Streaming Ensemble Algorithm (SEA) for Large-Scale Classification.” In proceedings of the seventh ACM SIGKDD international conference on Knowledge discovery and data mining, ACM, 377–382. San Francisco. doi:10.1145/502512.502568.
  • Tan, S., and J. Zhang. 2008. “An Empirical Study of Sentiment Analysis for Chinese Documents.” Expert Systems with Applications 34 (4): 2622–2629. doi:10.1016/j.eswa.2007.05.028.
  • Tang, B., H. He, P. M. Baggenstoss, and S. Kay. 2016. “A Bayesian Classification Approach Using Class-Specific Features for Text Categorization.” IEEE Transactions on Knowledge and Data Engineering 28 (6): 1602–1606. doi:10.1109/TKDE.2016.2522427.
  • Teregowda, P., B. Urgaonkar, and C. L. Giles. 2010. “Cloud Computing: A Digital Libraries Perspective.” 2010 IEEE 3rd international conference on cloud computing, Marriott San Juan, December 13–16.
  • Tian, F. 2016. “An Agri-Food Supply Chain Traceability System for China Based on RFID & Blockchain Technology.” International conference on service systems and service management, 1–6. Kumming, China: IEEE.
  • Vatankhah Barenji, A., and M. Hashemipour. 2017. “Real-Time Building Information Modeling (BIM) Synchronization Using Radio Frequency Identification Technology and Cloud Computing System.” Journal of Industrial and Systems Engineering 10: 61–68.
  • Viriyasitavat, W., and D. Hoonsopon. 2018. “Blockchain Characteristics and Consensus in Modern Business Processes.” Journal of Industrial Information Integration. doi:10.1016/j.jii.2018.07.004.
  • Viryasitavat, W., L. Xu, Z. Bi, and A. Sapsomboon. 2018. “Blockchain-Based Business Process Management (BPM) Framework for Service Composition in Industry 4.0.” Journal of Intelligent Manufacturing 1–12. doi:10.1007/s10845-018-1422-y.
  • Voelpel, S. C., M. Dous, and T. H. Davenport. 2005. “Five Steps to Creating a Global Knowledge-Sharing System: Siemens’ ShareNet.” Academy of Management Perspectives 19 (2): 9–23. doi:10.5465/ame.2005.16962590.
  • Wang, Z., and N. Wang. 2012. “Knowledge Sharing, Innovation and Firm Performance.” Expert Systems with Applications 39 (10): 8899–8908. doi:10.1016/j.eswa.2012.02.017.
  • Weber, I., X. Xu, R. Riveret, G. Governatori, A. Ponomarev, and J. Mendling. 2016. “Untrusted Business Process Monitoring and Execution Using Blockchain.” In international conference on business process management, Cham: Springer, 329–347. doi:10.1039/c5pp00343a.
  • Xia, Q., E. B. Sifah, K. O. Asamoah, J. Gao, X. Du, and M. Guizani. 2017. “MeDShare: Trust-Less Medical Data Sharing among Cloud Service Providers via Blockchain.” IEEE Access 5: 14757–14767. doi:10.1109/ACCESS.2017.2730843.
  • Yan, R., and A. G. Hauptmann. 2007. “A Review of Text and Image Retrieval Approaches for Broadcast News Video.” Information Retrieval 10 (4–5): 445–484. doi:10.1007/s10791-007-9031-y.
  • Yermack, D. 2017. “Corporate Governance and Blockchains.” Review of Finance 21 (1): 7–31. doi:10.1093/rof/rfw074.
  • Yu, X., J. H. Liu, and M. He. 2011. “Design Knowledge Retrieval Technology Based on Domain Ontology for Complex Products.” Computer Integrated Manufacturing Systems 17 (2): 225–231.
  • Zhang, S., Z. Qin, C. X. Ling, and S. Sheng. 2005. “Missing Is Useful: Missing Values in Cost-Sensitive Decision Trees.” IEEE Transactions on Knowledge and Data Engineering 17 (12): 1689–1693. doi:10.1109/TKDE.2005.188.
  • Zhang, Y., X. Luo, Y. Zhao, and H. C. Zhang. 2015. “An Ontology-Based Knowledge Framework for Engineering Material Selection.” Advanced Engineering Informatics 29 (4): 985–1000. doi:10.1016/j.aei.2015.09.002.
  • Zyskind, G., and O. Nathan. 2015. “Decentralizing Privacy: Using Blockchain to Protect Personal Data.” In security and privacy workshops (SPW), 2015 IEEE, 180–184. San Jose, CA, USA: IEEE. doi:10.1109/SPW.2015.27.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.