By Topic

Information Management, Innovation Management and Industrial Engineering, 2009 International Conference on

Date 26-27 Dec. 2009

Go

Filter Results

Displaying Results 1 - 25 of 163
  • [Front cover - Vol 4]

    Page(s): C1
    Save to Project icon | Request Permissions | PDF file iconPDF (1685 KB)  
    Freely Available from IEEE
  • [Title Page i - Volume 4]

    Page(s): i
    Save to Project icon | Request Permissions | PDF file iconPDF (62 KB)  
    Freely Available from IEEE
  • [Title page iii - Volume 4]

    Page(s): iii
    Save to Project icon | Request Permissions | PDF file iconPDF (110 KB)  
    Freely Available from IEEE
  • [Copyright notice - Volume 4]

    Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (118 KB)  
    Freely Available from IEEE
  • Table of contents - Volume 4

    Page(s): v - xv
    Save to Project icon | Request Permissions | PDF file iconPDF (192 KB)  
    Freely Available from IEEE
  • Preface - Volume 4

    Page(s): xvi
    Save to Project icon | Request Permissions | PDF file iconPDF (99 KB)  
    Freely Available from IEEE
  • Organizing Committee - Volume 4

    Page(s): xvii
    Save to Project icon | Request Permissions | PDF file iconPDF (114 KB)  
    Freely Available from IEEE
  • list-reviewer

    Page(s): xviii
    Save to Project icon | Request Permissions | PDF file iconPDF (97 KB)  
    Freely Available from IEEE
  • Study of Environment Risk of Mining Area Based on Triangular Fuzzy Number

    Page(s): 3 - 5
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (264 KB) |  | HTML iconHTML  

    Nowadays, the environment risk of mining area is a very serious problem. And mining area environmental impact of a variety of uncertainties, from the engineering point of view can be divided into land pollution, water pollution, air pollution, noise pollution and solid waste pollution. In the paper, an evaluation index system of mining area risk is established by using the triangular fuzzy number algorithm. Firstly, the risk factor set is established. Secondly, the value of risk factor set and weight set is scored by using experts. According to the scoring results, the evaluation matrix is got based on the triangular fuzzy number theory. Finally, the result of environment risk of mining area is worked out by using the triangular fuzzy number algorithm. This method can get an objective evidence to evaluate the environment risk on order to provide a basis for decision-making on sustainable development of the mining area. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Risk Degree of Project Duration in U-PERT Network

    Page(s): 6 - 9
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (281 KB) |  | HTML iconHTML  

    When the computation of project duration, the unascertained factor of project duration is leave out in traditional PERT network. And the computing result is a determine value. In this paper, the unascertained number algorithm is introduced in order to discuss the uncertainty in project network. And the project duration is contract with the credence. Firstly, the uncertainty of project duration is studied in the PERT network. Secondly, the unascertained algorithm is introduced, and the unascertained number of the project duration in the network is determined by using this method. Thirdly, both the finish credence and the accumulate credence can be worked out by the unascertained algorithm in the unascertained finish time of the network-planning. Forthly, the risk degree of project duration in U-PERT network is delimited. Finally, the scientific of risk degree of project duration in the U-PERT is proved by a case study. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Governance Mechanism of Regional Brand: A Perspective of Industrial Cluster

    Page(s): 10 - 13
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (351 KB) |  | HTML iconHTML  

    From the perspective of industrial cluster, regional brand is regarded as a combination of regional economy, industrial cluster, as well as brand marketing activities, which can be further characterized as an important symbol of advanced stage in industrial development. Meanwhile, given that the regional brand has embodied certain significant attributes of quasi-public goods, there is a need for governance towards regional brand. This paper first defines the connotation of regional brand, and the interaction mechanism between regional brand and industrial cluster. With respect to the issue of governance, the paper then systematically analyzes regional brand based on industrial cluster, and proposes a set of governance mechanism, with intention to contribute to both research and practice in developing regional brands for industrial cluster. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Management to Social Enterprise - From a Perspective of Social Innovation

    Page(s): 14 - 17
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (324 KB) |  | HTML iconHTML  

    Social innovation has gradually become a more and more popular topic in recent years as the public focus on social problems continually coming. In this context, social enterprise, comes into being and have responded to crises of ¿government failure¿, market failure¿ and ¿voluntary failure¿ effectively. Simply speaking, SE that is different from corporations, nonprofit organizations (NPO) and governments is enterprises and social institutions established mainly to provide public welfare and social services. And it makes innovation of organizations and institutions come true, just being main characters of social innovation. As a result, this paper comes to a conclusion that SE is a kind of social innovation. So, the government, as the supervisor, should take useful new measures in order to cultivate healthy environment for the growth of this new thing. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Route Optimization for Bus Dispatching Based on Genetic Algorithm-Ant Colony Algorithm

    Page(s): 18 - 21
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (377 KB) |  | HTML iconHTML  

    On account of route optimization of bus dispatching, it is proposed to use genetic ant algorithm (GAA) for solution. A mathematic model for multi-objective bus route optimization and selection under limited conditions is developed, introducing the evolutionary process of genetic variation to improve the optimization of ant colony algorithm and also the optimal decision updating and identification in the course of random search of colony to improve the optimization performance and speed up convergence, thus allowing the algorithm with randomicity and determinacy. As a result, the solving steps of the algorithm are given in details. Through comparison of the example results, the algorithm is proved to be feasible and practical for route optimization of bus dispatching. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Network for Emergency Logistics Management Inspired by Immune Multi-Affinity Model

    Page(s): 22 - 25
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (303 KB) |  | HTML iconHTML  

    Various disasters with serious results are reported and happen around our lives. Emergency logistics is an important activity dealing with the disasters to transfer a large number of materials to the destroyed places for casualties and reconstruction for the country, even the world. However, the emergency logistics network itself is liable to be damaged by the disaster. Inspired by immune system, a multi-affinity network model is proposed to build the underlying architecture of emergency logistics network. Various affinity measures are introduced to model the relationship among various entities or sets. By simple simulation study, the emergency logistics and immune-inspired structures are demonstrated. It can be extended to be a basis for emergency logistics study. The analyzing and optimization of emergency logistics can be conducted upon the multi-affinity model. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Enterprise High-Performance Work System and Its Enlightenment to Enterprises of Our Country

    Page(s): 26 - 29
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (322 KB) |  | HTML iconHTML  

    The notion of a high-performance work system (HPWS) became a popular topic in American business management in recent years. This paper briefly illuminates the meaning of HPWS and reviews the correlation theories of HPWS. Specifically, it dissects three key concepts: performance, work practice and systemic effects, it analyzes the AOM model and its impact on human resource, (AOM the employee ability (A), motivations (M) and participates opportunities (O)). It considers Chinese enterprise should build the HWPS suitable for national conditions according to the actual circumstance. Finally, this paper proposes a perfect HPWS model with self-directed work teams (SDWT), Effective incentive mechanism, the enterprise culture with respect and trust and widely training. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Improved Genetic Algorithm Based on Van Der Laan-Talman Algorithm

    Page(s): 30 - 33
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1578 KB) |  | HTML iconHTML  

    Applying triangulation theory of the Van der laan-Talman algorithm, an improved genetic algorithm is proposed to solve optimal problems in this paper. The algorithm operates on a simplicial subdivision of searching space and generates the integer labels at the vertices, and then crossover operators and increasing dimension operators relying on the integer labels are designed. In this case, whether each individual is a completely labeled simplex can be used as an objective convergence criterion and that determined whether the algorithm will be terminated. Several stander test functions are provided to be examined and the experiment results indicate that the proposed algorithm has higher global optimization capability, computing efficiency and stronger stability. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research and Application of the Data Mining Technology on the Modern Enterprise Performance Evaluation System

    Page(s): 34 - 39
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (406 KB) |  | HTML iconHTML  

    In this paper, it starts with Human Resource Management and explains the method of performance evaluation and its importance. Then, this article comes up with the comprehensive evaluation indicators, on the basis of using the cluster theory of the data mining to design and analyze, it gives the rating judgment and sorting of the performance level and evaluates the overall level of each evaluation indicators. At last, through case studies, it proves that the method has a good application value in the human performance appraisal. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study on Coordination Models of Container Logistics System

    Page(s): 40 - 42
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (276 KB) |  | HTML iconHTML  

    Container logistics system is a concrete logistics system with the specialty that containerization simplifies and unifies the circulation process while it enlarges the system scale and makes it more complex. Coordination is becoming an effective mechanism to reduce the cost and improve the profit of container logistics system. From three aspects, the coordinated entities, the interaction models and the coordination content, the coordination model is studied. Then, the designing principles of coordination mechanisms are also studied. The paper studies the related concepts of container logistics system and the coordination mechanisms, which are beneficial to design the higher efficient system of container logistics. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Clustering Analysis of Chinese Water Transport Based on Importance Values

    Page(s): 43 - 46
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (307 KB) |  | HTML iconHTML  

    China has very long coastline and many large navigable rivers, and with the rapid process of Chinese industrialization, Water transport has played more and more important role in transport and logistics system in recent years. One regularity phenomenon appears apparently in China: the more developed one region in economy, the more enough its water transport is utilized. At present, the scalar imbalance development of water transport is very similar to the economic level differences among different regions in China. Based on four importance indices of water transport, the paper analyzes and classifies the water transport of 31 provinces and municipalities except Taiwan, Hongkong and Macao of China through principal component and clustering analysis method, and further explores some bottlenecks that some regions with good conditions of water transport have no gotten enough development. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security Scheme for Sensitive Data in Management-Type SaaS

    Page(s): 47 - 50
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (351 KB) |  | HTML iconHTML  

    In this paper, we proposed the potential security problem of sensitive data in management-type SaaS which have no valid evidence when service provider embezzling or responsibility confirmation in service level agreement dispute, and proposed a scheme to ensure sensitive data safety by taking advantage of encryption and signature technique. Non-credible PKG of identity-based signature mechanism is used as signature mechanism for sensitive data in the scheme. Based on non-credible PKG of identity-based signature, a double-layer PKG framework is built by using the sub-PKG of service provider and tenants according to characteristic of the security responsibility of sensitive data is supervised by both service provider and tenants which have ownership and use right of the software respectively. The symmetric cryptography which ensures confidentiality of sensitive data is employed based on balance efficiency and safety. The related questions are also discussed. Security and the feasibility analysis show that this scheme ensures the confidentiality, integrity and non-repudiation of sensitive data. It can also provide valid evidence for service level agreement dispute and impel the application and the development of management-type SaaS. The proposed scheme can be widely applied to interactive distributed system of sensitive data. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SOA-Based Service Survivability in Financial Information System

    Page(s): 51 - 53
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (295 KB) |  | HTML iconHTML  

    Financial information system requires strong service survivability capability. A framework combining ad hoc network and P2P techniques with service-oriented architecture (SOA) is firstly proposed for this purpose. The non-centre characteristic of ad hoc network is used to remove the relationship of the SOA depending on the universal discovery description and integration(UDDI). The framework inherited the rapid topology reconstruction capability of ad hoc network after disaster. The multi-copy storage ability of P2P system is applied for service documentation and backup. Also, the P2P system' s automatic service identification and discovery features are used when the normal service is not available, which guaranteed the survivability of financial information system. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Two-Factor Evaluating Model of Coal Resources Mining Rights Based on Vasicek Interest Rate

    Page(s): 54 - 57
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (300 KB) |  | HTML iconHTML  

    In China, evaluating coal resources mining right (for short MRCR) scientifically and effectively is a key and precondition of acquiring and transferring it. MRCR has the same option-like characteristics as stock call option, which is a multi-period call option exercised annually, thus evaluation methods of MRCR based on option can reflect the option-like characteristics of MRCR. Previous researches often assume that the risk-free interest rate is constant. In fact, the fluctuation of risk-free interest rates can directly affect the value of MRCR, empirical researches show that Vasicek interest rate can better fit the changing tendency of risk-free interest rate in China. A two-factor model evaluating MRCR based on Vasicek interest rate is set up. Through a practical instance, it' s tested that the two-factor model, compared with DCF, can better reflect government' s income as the owner of the resources. The value of this MRCR declines as the mean-reverting coefficient increases. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Decision Support Framework for Port Efficiency Discovery Based on Intelligent Data Integration

    Page(s): 58 - 61
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (332 KB) |  | HTML iconHTML  

    Trading port efficiency is an important determinant of the competitiveness of the goods and a key factor to improve the investment climate of the countries. Managing the efficiency and coordinating distributed entities in a supply chain is a challenging task. This paper provide proposed s decision support framework for port efficiency discovery based on intelligent data integration, and provided some intelligent approaches to measure and analysis the trading port efficiency from supply chain aspect. The solution can take adequate use of the massive operational data accumulated in the distributed information system scattered in different sectors, and give useful information to support decision-making. A Case study has been developed to give an illustration of employing the proposed decision support framework in one of the trading port in China. The results obtained indicate that the prototype system is capable of get some useful insights into port efficiency. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • High Frequency Financial Time Series Forecasting via Particle Filtering

    Page(s): 62 - 65
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (382 KB) |  | HTML iconHTML  

    Of the strong non-Gauss characteristic, the high frequency financial time series could not be analyzed and forecasted by traditional statistics method any more. For inaccurately estimating the realized volatility using the limited high frequency data created by the market operation, a novel forecasting method is proposed: after modeling the realized volatility, the particle filtering technology for non-Gauss non-liner process is adopted to analyze and predict the volatility, hence the intra-day transaction data could be treated. The method is applied in the MSFT intra-day quote forecasting and a perfect result is obtained. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study of the Case of Learning Bayesian Network from Incomplete Data

    Page(s): 66 - 69
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (301 KB) |  | HTML iconHTML  

    Learning Bayesian networks can be examined as the combination of parameter learning and structure learning. Parameter learning is estimation of the conditional probabilities (dependencies) in the network. Structural learning is the estimation of the topology (links) of the network. The structure of the network can be known or unknown, and the variables can be expressed as complete and incomplete data. In this paper, we introduce two cases of learning Bayesian networks from complete data: known structure and unobservable variables and unknown structure and unobservable variables. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.