Scheduled System Maintenance:
On Monday, April 27th, IEEE Xplore will undergo scheduled maintenance from 1:00 PM - 3:00 PM ET (17:00 - 19:00 UTC). No interruption in service is anticipated.
By Topic

Management Science and Engineering, 2009. ICMSE 2009. International Conference on

Date 14-16 Sept. 2009

Filter Results

Displaying Results 1 - 25 of 329
  • [Title page]

    Publication Year: 2009 , Page(s): 1 - 8
    Save to Project icon | Request Permissions | PDF file iconPDF (178 KB)  
    Freely Available from IEEE
  • Contents

    Publication Year: 2009 , Page(s): I - XVIII
    Save to Project icon | Request Permissions | PDF file iconPDF (223 KB)  
    Freely Available from IEEE
  • The process of ERP usage in manufacturing firms in China: An empirical investigation

    Publication Year: 2009 , Page(s): 3 - 9
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (157 KB) |  | HTML iconHTML  

    With the fast development of information technologies implementation, Enterprise resource planning (ERP) systems are increasingly adopted by more large and medium-size companies in China. For most Chinese companies, ERP is still in its planning or initializing stages. Managers in those firms are expecting to know more about what will happen and what they need do after the ERP implementation. Even though some researches about ERP usage in other countries can benefit Chinese practitioners, there is little research on the process of post ERP implementation in China itself. Based on interviews in two manufacturing firms in northeast of China, this study aims to explore the general process of the ERP usage after implementation in Chinese companies from the perspective of ERP performance. According to the differences of ERP performance, four stages are identified as ldquoPassion of noveltyrdquo, ldquoShake-downrdquo, ldquoFast improvingrdquo, and ldquoStably and continuously improvingrdquo. Our findings extend prior studies on the stages of ERP performance. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • E-government in the informational economy

    Publication Year: 2009 , Page(s): 10 - 16
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (551 KB) |  | HTML iconHTML  

    In the end of the 20th century the governments of many countries faced the necessity of reforming the classical models of the government which appeared inconsistent with the emerging informatization of the society. Experts of the World Bank recognize the following problems to be common for the majority of the countries: (1) growth of cumulative employment and expenses on wages in public sector; (2) inefficiency of monetary stimulus, weak work motivation of state employees; (3) protectionism, corruption and low level of public trust to officials; (4) Inability of the state machinery to react to changes of public priorities; (5) an operational inefficiency of a state machinery and poor quality of the state services; (6) shortage of qualified personnel in regions with the limited human resources. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Original content extraction oriented to anti-plagiarism

    Publication Year: 2009 , Page(s): 17 - 22
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (257 KB) |  | HTML iconHTML  

    In order to reduce the impact of inclusion of citations and references during the detection of plagiarism in academic theses, and extract the original content, the author created three ways to extract original content and remove the citation: 1) Removal of normative citations by symbol features; 2) removal tacit citations by Bayesian method based on the minimum risk and thesis structure; 3) removal common knowledge base on domain public knowledge base. The research results show that during the extraction of original content, the precision decreases as the risk coefficient increases, while the recall rate increases with the risk coefficient. When the risk coefficient is 60, the whole performance achieves the optimum. Plagiarism detection after extracting the original content presents a fault rate decrease from 9.09% to 4.52%. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Factors influencing enterprise to improve data quality in information systems application —An empirical research on 185 enterprises through field study

    Publication Year: 2009 , Page(s): 23 - 33
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (191 KB) |  | HTML iconHTML  

    Management of data quality has become the bottleneck for enterprises to upgrade their application of information technology (IT). Based on the theory of total quality management, this paper presents five influencing factors of data quality from the perspective of organizational management, namely top management support, capability on regulation and process management, business-IT alignment, staff participation and integration of information systems (IS). At the same time, this paper establishes a process model of influencing factors, and conducts an empirical analysis through a field study of 185 enterprises. The results show that the influence of five factors presents transfer characteristics clearly. Top management support has an effect upon the capability on regulation and process management, and business-IT alignment directly, while indirectly on staff participation and integration of IS. Capability on regulation and process management, and business-IT alignment exert a direct impact on staff participation and integration of IS, while indirectly on data quality. Staff participation and integration of IS shows a direct impact on data quality. Finally, this paper presents some suggestions on improving data quality. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Text representation and classification based on multi-instance learning

    Publication Year: 2009 , Page(s): 34 - 39
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (170 KB) |  | HTML iconHTML  

    In multi-instance learning, the training set comprises labeled bags which are composed of unlabeled instances, and the task is to predict the labels of unseen bags. In this paper, a text mining problem, i.e. text representation, is investigated from a multi-instance view. In detail, each text is regarded as a bag while each of its sentences is regarded as an instance. Bag can be labeled by its class label and its similarity is defined by sentence similarity. The text classification problem is translated into multi-instance learning problem. In order to solve this problem, a Chinese text classifier focusing on bag has been built by KNN algorithm and good average precision 92.12% and recall 92.01% have been achieved in the experiments. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The collaboration network in China's management science

    Publication Year: 2009 , Page(s): 40 - 44
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (159 KB) |  | HTML iconHTML  

    By using methods of bibliometrics and social network analysis, we find that the scientific collaboration network in China's management science is a scale-free small world network. Based on statistical analysis of the key network properties (L, the average shortest path length; C, the clustering coefficient; the node degree distribution), we explored the relationships between L and the size of China's management science collaboration network, between C and the network density, and between the degree distribution and the strength of node connectivity. The combination of these results shows the current status of China's management science as an academic field. We also divided the period of study into 3 sub-periods and performed analysis on each sub-period. The temporal study shows the trend in China's management science research. By looking into the authors with high node degrees, we also find the hot research area, the most active researchers and organizations. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • QoS ontology based efficient web services selection

    Publication Year: 2009 , Page(s): 45 - 50
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (330 KB) |  | HTML iconHTML  

    The ability to efficiently and effectively select the inter-organizational and heterogeneous services is the important support for the development of the Web service technology. Quality of service (QoS) profiles of Web services are crucial in determining which service best addresses the user desires and objectives. This paper developed a general QoS-based service selection method. By importing the proposed QoS ontology into OWL-S standards, the method can express Web service's nonfunctional attributes in a semantic and extensible way. Web service QoS based selection is formulated as a multi-criteria decision making (MCDM) which can be solved by using different MCDM models to evaluate QoS criteria of the candidate Web services. The values of quality parameters of a Web service are normalized to a non-negative real-valued number where higher normalized values represent higher levels of service performance. The proposed approach can be used as a solution for the complexity and reliability Web service selection problem. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis on the implementation model of intelligent knowledge management based on data mining

    Publication Year: 2009 , Page(s): 51 - 56
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (190 KB) |  | HTML iconHTML  

    The development and application of data mining technology puts forward new requirement to knowledge management in information era. Intelligent knowledge is the valuable knowledge that comes from data mining technology, and has the intelligent features such as memory, recognition, self-updating, disappearance etc after the transaction by man-machine interaction. On the basis of analyzing the goals and layers of intelligent knowledge management, this paper studies the implementation model of intelligent knowledge management from the aspects of its cultivation, expression and storage, audit and logic mechanism etc. It will afford new perspective for research on knowledge management. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Factors that influence a buyer's utility in online auctions: A conceptual model for studying the role of offline experiences

    Publication Year: 2009 , Page(s): 57 - 63
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (396 KB) |  | HTML iconHTML  

    With a tremendous growth of online auction researches over the last several years, more and more scholars want to know what factors make individual bidders pay more or less for the same item in online auctions. Following the idea of e-commerce which considers traditional market and e-market as two separate markets, most of the researches focus on the factors of e-market. However, a customer exists in both traditional market and e-market, and his offline experience of a product may probably affect his utility to buy a product in e-market, especially for those experience products. So in this paper we theoretically emphasize the role that offline experiences of a product play and divide the offline experiences of an item into four types based on the interview with online bidders through QQ. By adding the offline experience construct to Kauffman's Online Consumer Transaction Valuation Model, we connect e-market and traditional market together and propose a conceptual model to study the factors that affect a buyer's utility in online auctions more comprehensively. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new User Profile Model based on Intuitionistic Fuzzy set for personalized information analysis and sharing

    Publication Year: 2009 , Page(s): 64 - 69
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (215 KB) |  | HTML iconHTML  

    With the fast development of World Wide Wed, Web-based applications and services should allow user to get the right personalized information quickly and effectively. User profile acts a very important role both in Web service personalization and information sharing. In this paper, a new user profile model was proposed to store the characteristics and preferences of person. By using intuitionistic fuzzy set, the intuitionistic fuzzy user profile model (IUM) has ability to handle fuzzy phenomenon and uncertainty information, especially in describing hesitancy degree (HD) of people and comparative analysis. IUM can also be shared on different Web application. The experimental results show that the proposed approach is effectiveness in personalized information analysis, and this research facilitates the personalized information sharing and reuse on the Web application and services. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic remodeling of logistic business process in E-Logistic

    Publication Year: 2009 , Page(s): 70 - 75
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (232 KB) |  | HTML iconHTML  

    Electronic business has made logistics collaboration more and more important. Electronic logistic (e-logistic) as an open electronic platform can realize logistics collaboration. Workflow management system (WFMS) supports the operation of e-logistic. Exact logistic business process can ensure the normal running of WFMS. With the constantly change of logistic environment, logistic business process models don't keep stable. The large mount of process logs are saved in WFMS. These logs involve information of various logistic business processes. This paper researches an automatic remodeling method based on these logs. The core of the method is process remodeling algorithm. In the algorithm a Markov transition matrix is set up based on process logs. And according to the matrix the eight remodeling rules of process logical relations are designed. The remodeling method can not only automatically remodel the various logistic business processes, but also greatly enhance the process modeling efficiency. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Combination forecasting based on Support Vector Machine and its application

    Publication Year: 2009 , Page(s): 76 - 80
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (168 KB) |  | HTML iconHTML  

    In this paper, we first introduce the principles and methods of Support Vector Machine (SVM), then give the methods of determining weights of combination forecasting using Support Vector Machine. This method can overcome the shortcoming of the other combination forecasting, which keeps smaller fitting error and higher forecasting accuracy, therefore the effect of forecasting is greatly promoted. At last, this method is applied to forecast the total number of health personnels of Hebei province. Contrast trial indicates that this method possesses fast operation velocity and good generalization performance. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • What affect the contribution of it to firm performance? an exploratory study in China

    Publication Year: 2009 , Page(s): 81 - 94
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (233 KB) |  | HTML iconHTML  

    This paper integrates the strategic management perspectives of ldquoresource-basedrdquo and ldquopositioningrdquo to simultaneously examine the mediating effect of knowledge management (KM) and the moderating effect of industry setting on the performance impact of information technology (IT). Data collected from 236 firms operating in China replicated and extended research findings of previous studies, based on structural model equations. Consistent with previous studies, KM capability was found to be a partial mediator of the IT-performance relationship. Extending previous studies, industry setting was found to be a moderator of the IT-performance and IT-KM capability relationships. Theoretical contributions and managerial implications are discussed accordingly. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Incremental learning algorithm of least squares support vector machines based on Renyi entropy

    Publication Year: 2009 , Page(s): 95 - 100
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (180 KB) |  | HTML iconHTML  

    This paper introduces Renyi entropy and incremental learning algorithm into the financial distress prediction of enterprises and advances an incremental learning algorithm on least squares support vector machine based on Renyi entropy. By analysis and comparison of LS-SVM incremental learning algorithm based on Renyi entropy,traditional LS-SVM algorithm and standard SVM algorithm,LS-SVM incremental learning algorithm based on the Renyi entropy are evidently superior to the traditional LS-SVM algorithm and the standard SVM in terms of the number of training samples and computing time. This confirms the effectiveness and superiority of the introduction of Renyi entropy into the field of financial distress prediction. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An empirical study on the effect of information system innovation usage on performance: Based on the innovation climate perspective

    Publication Year: 2009 , Page(s): 101 - 105
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (176 KB) |  | HTML iconHTML  

    Enterprises increasingly have to depend on the innovation behaviors to get the best organizational performance from information systems. The objective of this paper is to contribute to a deeper understanding of information system innovation usage in enterprises by examining its effect to enterprise performance and its determinant factors. Based on the organizational innovation climate and exploitation & exploration innovation theories from organizational management literature, the paper develops a research model of information system innovation usage. Then with the questionnaires from approximately two hundreds enterprises in Chinese economy, this proposed model is empirically tested. Research results show that organizational innovational climate is positively associated with two types of information system innovation usage, and exploitation of information system innovation usage influence on short-term performance, and exploration of information system innovation usage influence on long-term performance. Some implications are given in the end of paper. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The study on the influential factors of electronic payment system adoption

    Publication Year: 2009 , Page(s): 106 - 111
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (176 KB) |  | HTML iconHTML  

    Along with popularity of electronic commerce and online purchasing, electronic payment systems have been developed and expected to the main payment means of e-commerce. But many of electronic payment systems have failed with a short-lived time. From the standpoint of buyers, this paper discusses the influential factors of electronic payment system adoption and classifies these influential factors into six dimensions. Moreover, a numerical case is illustrated for presenting rough set approach (RSA) to quantize the influence degree of these factors on electronic payment system adoption. The results derived from the case reveal that only 20 percent of buyers take electronic payment system as their first choice, security and trust have more significant impact on users' attitude than other influential factors. Finally, the paper concludes with the limitations of the study and several suggestion for future research. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Investigation and application of extension data mining based on rough set

    Publication Year: 2009 , Page(s): 112 - 118
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (211 KB) |  | HTML iconHTML  

    In the database of information system, usually there are some attributes which are unimportant to the decision attribute, and some records that disturb the decision making. In this paper, reducing the condition attributes based on the matter-element theory and rough set method, calculating the importance to the decision attribute for each condition attribute after reduction, and data mining the relevant rules based on the reduced attributes, extension relevant function is used to depict quality of data gather in data mining. Finally, how to tap new customers and how to recommend an appropriate brand to new customers, Research result indicates that extension data mining can provide effective decide support for the decision-making of enterprise. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on e-shopper purchase behavior based on linguistic values of attributes of database

    Publication Year: 2009 , Page(s): 119 - 124
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (218 KB) |  | HTML iconHTML  

    It is very necessary for e-marketers to understand e-shoppers' needs for making correct marketing strategies. Knowledge of e-shoppers purchase behaviors can be extracted from transaction databases. In this paper, transaction database is transformed into the database of linguistic values, and research on e-shopper purchase behavior is made based on linguistic values of product attributes. And an algorithm that contains the first support, the second support and rel-confidence is proposed to extract rules from the database of linguistic values. The algorithm is applicable for mining both frequent linguistic items and significant rare items. Consequently, e-shoppers purchase behavior can be revealed based on the rules. The result indicates the proposed method is very efficient in discovering e-shoppers purchase behavior, and is useful for e-marketers to make marketing decisions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The strategies personalization's in E-business on the base of the technologies of the alive decisions

    Publication Year: 2009 , Page(s): 127 - 133
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (404 KB) |  | HTML iconHTML  

    The article is dedicated to an actual e-business problem in accordance with need of the reinforcement during personalization in a virtual system of information relations. At present personalization relations have, in greater measure, a formal nature. This is conditioned by mechanical carrying in a system of the virtual relations of the rules of the usual document processing, applicable in business. As a result of absences personal contacts appear in the elements of the estranging and uncertainties, barriers and restrictions. From decision leaves the soul, emotions, actuating stimuli. This article lists the main problems that happen, disturbing development personalization of relations. Acceptances are considered on part of the problems to account for the use of innovation technologies of the active decisions. This technology is designed in State University of Management and Moscow Humanitarian University to Russia. In this article it is graphically shown that all relations are realized by way of different decisions. These decisions can be of four types: technical, biological, management and political. Each type of decision is defined by object and nature of the influence. Concrete acceptance is brought by shaping the system personalization of relations in e-business on the basis of a humanitarian approach. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Risk identification and measure based on data analysis —take internationalization risk as an example

    Publication Year: 2009 , Page(s): 134 - 140
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (149 KB) |  | HTML iconHTML  

    Risk identification is the chief step of risk management in enterprises' international operation, and also the premise and base of risk avoidance and countermeasure. This research takes Chinese enterprises' international operation as the research background. Based on theoretical deduction of the international risk classification and identification, through empirical research about measure of risk content, this research identifies all kinds of risks that enterprises have to face when they exploit international market. It gets an evaluation index system which contains evaluative targets, first sub-layer, second sub-layer and concrete index for international risk measure. Furthermore, it probes into the construction of international risk identification mechanism which contains risk analysis subsystem and risk assessment subsystem. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Selective regenerated particle swarm optimization for data clustering

    Publication Year: 2009 , Page(s): 141 - 147
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (207 KB) |  | HTML iconHTML  

    This paper proposes an improved particle swarm optimization (PSO) for data clustering. In order to increase the efficiency, suggestions on parameter settings is made and a mechanism is designed to prevent particles fall into the local optimal. To evaluate its effectiveness and efficiency, this approach is applied to data clustering problem. The proposed methods were tested on nine datasets, and their performance is compared with those of PSO, K-means and four other clustering methods. Results show that our schemes are both robust and suitable for solving data clustering problems. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Trust evaluation model of partners in complex products and systems based on Rough Set theory and Support Vector Machine

    Publication Year: 2009 , Page(s): 148 - 154
    Cited by:  Papers (1)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (224 KB) |  | HTML iconHTML  

    Facing the problems of so many decision attributes and few data samples for decision-making analysis when the integrators in complex products and systems evaluate the partners of collaboration and innovation, this paper creates a trust evaluation model of collaborative partners in CoPS based on rough set and (RS) Support Vector Machines (SVM). In this paper, firstly, trust evaluation system about partners of collaboration and innovation will be set up in CoPS. Secondly, followed by the application of RS attribute reduction as a data pre-processing removes the redundancy in the decision-making property, and then combined with support vector machines in dealing with small samples, as well as non-linear question on the basis of trust in the advantages of the classification of the partners, in that it will not reduce the classification performance achieved under the premise of reducing data dimensionality and classification of the complexity of the process of purpose to help decision-makers to achieve the confidence of partners in collaborative innovation evaluation and chosen. Finally, the method has been applied to complex systems integration products supplier to the trust of the assessment process in detail for the actual operation of the method steps and preliminary verification of the validity of the model. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on feedback tracking control for disequilibrium cobweb model based on LMI algorithms

    Publication Year: 2009 , Page(s): 155 - 160
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (203 KB) |  | HTML iconHTML  

    A new design scheme of tracking control for a class of typical disequilibrium cobweb models is proposed in this paper. From the viewpoint of economic control theory , dynamic analysis method is used to study the stability of disequilibrium market containing the expected price, the controllability of the expected price and the tracking performance of the error between demand and supply. The design is based on the principle of dynamic feedback control and the algorithms of linear matrix inequation (LMI). By defining state feedback control input and corresponding Lyapunov function, multiple control objectives including stabilization, tracking performance and robustness can be guaranteed simultaneously. Simulation results show the proposed dynamic approach is effective and adaptable for economic reality. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.