By Topic

2009 International Conference on Information Management, Innovation Management and Industrial Engineering

Date 26-27 Dec. 2009

Go

Filter Results

Displaying Results 1 - 25 of 163
  • [Front cover - Vol 4]

    Publication Year: 2009, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (1685 KB)
    Freely Available from IEEE
  • [Title Page i - Volume 4]

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (62 KB)
    Freely Available from IEEE
  • [Title page iii - Volume 4]

    Publication Year: 2009, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (110 KB)
    Freely Available from IEEE
  • [Copyright notice - Volume 4]

    Publication Year: 2009, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (118 KB)
    Freely Available from IEEE
  • Table of contents - Volume 4

    Publication Year: 2009, Page(s):v - xv
    Request permission for commercial reuse | PDF file iconPDF (192 KB)
    Freely Available from IEEE
  • Preface - Volume 4

    Publication Year: 2009, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (99 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee - Volume 4

    Publication Year: 2009, Page(s): xvii
    Request permission for commercial reuse | PDF file iconPDF (114 KB)
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2009, Page(s): xviii
    Request permission for commercial reuse | PDF file iconPDF (97 KB)
    Freely Available from IEEE
  • Study of Environment Risk of Mining Area Based on Triangular Fuzzy Number

    Publication Year: 2009, Page(s):3 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (264 KB) | HTML iconHTML

    Nowadays, the environment risk of mining area is a very serious problem. And mining area environmental impact of a variety of uncertainties, from the engineering point of view can be divided into land pollution, water pollution, air pollution, noise pollution and solid waste pollution. In the paper, an evaluation index system of mining area risk is established by using the triangular fuzzy number ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Risk Degree of Project Duration in U-PERT Network

    Publication Year: 2009, Page(s):6 - 9
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (281 KB) | HTML iconHTML

    When the computation of project duration, the unascertained factor of project duration is leave out in traditional PERT network. And the computing result is a determine value. In this paper, the unascertained number algorithm is introduced in order to discuss the uncertainty in project network. And the project duration is contract with the credence. Firstly, the uncertainty of project duration is ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Governance Mechanism of Regional Brand: A Perspective of Industrial Cluster

    Publication Year: 2009, Page(s):10 - 13
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (351 KB) | HTML iconHTML

    From the perspective of industrial cluster, regional brand is regarded as a combination of regional economy, industrial cluster, as well as brand marketing activities, which can be further characterized as an important symbol of advanced stage in industrial development. Meanwhile, given that the regional brand has embodied certain significant attributes of quasi-public goods, there is a need for g... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Management to Social Enterprise - From a Perspective of Social Innovation

    Publication Year: 2009, Page(s):14 - 17
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (324 KB) | HTML iconHTML

    Social innovation has gradually become a more and more popular topic in recent years as the public focus on social problems continually coming. In this context, social enterprise, comes into being and have responded to crises of ¿government failure¿, market failure¿ and ¿voluntary failure¿ effectively. Simply speaking, SE that is different from corporations, nonprofit organizations (NPO) and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Route Optimization for Bus Dispatching Based on Genetic Algorithm-Ant Colony Algorithm

    Publication Year: 2009, Page(s):18 - 21
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (377 KB) | HTML iconHTML

    On account of route optimization of bus dispatching, it is proposed to use genetic ant algorithm (GAA) for solution. A mathematic model for multi-objective bus route optimization and selection under limited conditions is developed, introducing the evolutionary process of genetic variation to improve the optimization of ant colony algorithm and also the optimal decision updating and identification ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Network for Emergency Logistics Management Inspired by Immune Multi-Affinity Model

    Publication Year: 2009, Page(s):22 - 25
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (303 KB) | HTML iconHTML

    Various disasters with serious results are reported and happen around our lives. Emergency logistics is an important activity dealing with the disasters to transfer a large number of materials to the destroyed places for casualties and reconstruction for the country, even the world. However, the emergency logistics network itself is liable to be damaged by the disaster. Inspired by immune system, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Enterprise High-Performance Work System and Its Enlightenment to Enterprises of Our Country

    Publication Year: 2009, Page(s):26 - 29
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (322 KB) | HTML iconHTML

    The notion of a high-performance work system (HPWS) became a popular topic in American business management in recent years. This paper briefly illuminates the meaning of HPWS and reviews the correlation theories of HPWS. Specifically, it dissects three key concepts: performance, work practice and systemic effects, it analyzes the AOM model and its impact on human resource, (AOM the employee abilit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Improved Genetic Algorithm Based on Van Der Laan-Talman Algorithm

    Publication Year: 2009, Page(s):30 - 33
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1578 KB) | HTML iconHTML

    Applying triangulation theory of the Van der laan-Talman algorithm, an improved genetic algorithm is proposed to solve optimal problems in this paper. The algorithm operates on a simplicial subdivision of searching space and generates the integer labels at the vertices, and then crossover operators and increasing dimension operators relying on the integer labels are designed. In this case, whether... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research and Application of the Data Mining Technology on the Modern Enterprise Performance Evaluation System

    Publication Year: 2009, Page(s):34 - 39
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (406 KB) | HTML iconHTML

    In this paper, it starts with Human Resource Management and explains the method of performance evaluation and its importance. Then, this article comes up with the comprehensive evaluation indicators, on the basis of using the cluster theory of the data mining to design and analyze, it gives the rating judgment and sorting of the performance level and evaluates the overall level of each evaluation ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study on Coordination Models of Container Logistics System

    Publication Year: 2009, Page(s):40 - 42
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (276 KB) | HTML iconHTML

    Container logistics system is a concrete logistics system with the specialty that containerization simplifies and unifies the circulation process while it enlarges the system scale and makes it more complex. Coordination is becoming an effective mechanism to reduce the cost and improve the profit of container logistics system. From three aspects, the coordinated entities, the interaction models an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Clustering Analysis of Chinese Water Transport Based on Importance Values

    Publication Year: 2009, Page(s):43 - 46
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (307 KB) | HTML iconHTML

    China has very long coastline and many large navigable rivers, and with the rapid process of Chinese industrialization, Water transport has played more and more important role in transport and logistics system in recent years. One regularity phenomenon appears apparently in China: the more developed one region in economy, the more enough its water transport is utilized. At present, the scalar imba... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security Scheme for Sensitive Data in Management-Type SaaS

    Publication Year: 2009, Page(s):47 - 50
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (351 KB) | HTML iconHTML

    In this paper, we proposed the potential security problem of sensitive data in management-type SaaS which have no valid evidence when service provider embezzling or responsibility confirmation in service level agreement dispute, and proposed a scheme to ensure sensitive data safety by taking advantage of encryption and signature technique. Non-credible PKG of identity-based signature mechanism is ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SOA-Based Service Survivability in Financial Information System

    Publication Year: 2009, Page(s):51 - 53
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (295 KB) | HTML iconHTML

    Financial information system requires strong service survivability capability. A framework combining ad hoc network and P2P techniques with service-oriented architecture (SOA) is firstly proposed for this purpose. The non-centre characteristic of ad hoc network is used to remove the relationship of the SOA depending on the universal discovery description and integration(UDDI). The framework inheri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Two-Factor Evaluating Model of Coal Resources Mining Rights Based on Vasicek Interest Rate

    Publication Year: 2009, Page(s):54 - 57
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (300 KB) | HTML iconHTML

    In China, evaluating coal resources mining right (for short MRCR) scientifically and effectively is a key and precondition of acquiring and transferring it. MRCR has the same option-like characteristics as stock call option, which is a multi-period call option exercised annually, thus evaluation methods of MRCR based on option can reflect the option-like characteristics of MRCR. Previous researche... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Decision Support Framework for Port Efficiency Discovery Based on Intelligent Data Integration

    Publication Year: 2009, Page(s):58 - 61
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (332 KB) | HTML iconHTML

    Trading port efficiency is an important determinant of the competitiveness of the goods and a key factor to improve the investment climate of the countries. Managing the efficiency and coordinating distributed entities in a supply chain is a challenging task. This paper provide proposed s decision support framework for port efficiency discovery based on intelligent data integration, and provided s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • High Frequency Financial Time Series Forecasting via Particle Filtering

    Publication Year: 2009, Page(s):62 - 65
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (382 KB) | HTML iconHTML

    Of the strong non-Gauss characteristic, the high frequency financial time series could not be analyzed and forecasted by traditional statistics method any more. For inaccurately estimating the realized volatility using the limited high frequency data created by the market operation, a novel forecasting method is proposed: after modeling the realized volatility, the particle filtering technology fo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study of the Case of Learning Bayesian Network from Incomplete Data

    Publication Year: 2009, Page(s):66 - 69
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (301 KB) | HTML iconHTML

    Learning Bayesian networks can be examined as the combination of parameter learning and structure learning. Parameter learning is estimation of the conditional probabilities (dependencies) in the network. Structural learning is the estimation of the topology (links) of the network. The structure of the network can be known or unknown, and the variables can be expressed as complete and incomplete d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.