By Topic

2009 Second International Conference on Future Information Technology and Management Engineering

13-14 Dec. 2009

Filter Results

Displaying Results 1 - 25 of 162
  • [Front cover]

    Publication Year: 2009, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (7581 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (29 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2009, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (90 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (121 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009, Page(s):v - xiv
    Request permission for commercial reuse | PDF file iconPDF (264 KB)
    Freely Available from IEEE
  • Message from the FITME 2009 Chairs

    Publication Year: 2009, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (76 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2009, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (89 KB)
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2009, Page(s): xvii
    Request permission for commercial reuse | PDF file iconPDF (84 KB)
    Freely Available from IEEE
  • Combination of PANA and Diameter in Trusted Vehicle Network

    Publication Year: 2009, Page(s):3 - 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (301 KB) | HTML iconHTML

    Vehicle network is popular gradually. For more security in vehicle network, a trusted AAA (Authentication, Authorization and Accounting) environment for vehicle network must be established. The paper proposes an approach to establish such an environment using combination of two next generation AAA protocols, PANA (Protocol for carrying Authentication for Network Access) and Diameter. The ability o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Notice of Retraction
    Output Prediction Based on Index Smoothing Procedures and Sustainable Development Research of Hebei Iron and Steel Industry

    Publication Year: 2009, Page(s):8 - 13
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (462 KB) | HTML iconHTML

    Notice of Retraction

    After careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.

    We hereby retract the content of this paper. Reasonable effort should be made to remove all past references to this paper.

    The presenting author of this paper has the option ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Notice of Retraction
    The Construction, Mechanism and Application Analysis of Trust Model of Industrial Clusters

    Publication Year: 2009, Page(s):14 - 17
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (420 KB) | HTML iconHTML

    Notice of Retraction

    After careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.

    We hereby retract the content of this paper. Reasonable effort should be made to remove all past references to this paper.

    The presenting author of this paper has the option ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Notice of Retraction
    The Construction and Analysis of Diffusion Mechanism Models of Industrial Clusters Culture

    Publication Year: 2009, Page(s):18 - 21
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (433 KB) | HTML iconHTML

    Notice of Retraction

    After careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.

    We hereby retract the content of this paper. Reasonable effort should be made to remove all past references to this paper.

    The presenting author of this paper has the option ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Employing MDA in PRINCE2 Framework

    Publication Year: 2009, Page(s):22 - 25
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (254 KB) | HTML iconHTML

    In these times, an increasing number of costly IT projects face challenges and fail to meet the primary needs and purposes of their customers and developing teams. Many projects are not durable due to the lack of well-informed management. The need for proper management is quite obvious. Nowadays, correct definition and successful management of IT projects is a major factor of success and improveme... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Notice of Retraction
    The Influence of Public R & D Investment on Technological Innovation in Zhejiang Province

    Publication Year: 2009, Page(s):26 - 30
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (481 KB) | HTML iconHTML

    Notice of Retraction

    After careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.

    We hereby retract the content of this paper. Reasonable effort should be made to remove all past references to this paper.

    The presenting author of this paper has the option ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Countermeasures Study about the Protection of the Quality of Agriculture under Decentralization Mode

    Publication Year: 2009, Page(s):31 - 34
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (281 KB) | HTML iconHTML

    The quality of agricultural products is a major issue which is related to the consumption safety, agriculture development and social stability. Combining with the analysis of the production process of milk, this text leverages the model of The market for ¿lemons¿ and give us a detail study on the impact of the quality of agricultural products made by the decentralized characteristics of Chinese ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Formation Mechanism and Countermeasures of Food Safety Incident

    Publication Year: 2009, Page(s):35 - 38
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (264 KB) | HTML iconHTML

    This paper first analyzes the present situation of Chinese food safety, outlines the changes of its nature and trends. Then, it establishes formation mechanism model of food safety incident, points out that adverse selection and the changes of topological structure of information dissemination system are the two important stages in the formation process of food safety incident. Finally, puts forwa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study on Venture Capital Fund of Central China Rising in Wuhan

    Publication Year: 2009, Page(s):39 - 42
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (226 KB) | HTML iconHTML

    In order to realize central China rising, it is an inevitable choice to make significant efforts to develop high-tech. In recent years, Wuhan is increasingly becoming the important pivot of central China rising strategies because of the rapid development of high-tech industries in Wuhan and the construction of "two-oriented society" reform pilot area in Wuhan metropolis circle. This paper research... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fuzzy Comprehensive Evaluation on China's Modern Rural Logistics Construction Based on Improved Algorithm

    Publication Year: 2009, Page(s):43 - 47
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (300 KB) | HTML iconHTML

    Agriculture is the basic industry of the national economy, and agriculture is a so important industry especially for China. Therefore, the healthy development of agriculture and rural economy affects the overall situation of our national economy. It has important practical significance to study modern logistics system in rural areas. The core of fuzzy comprehensive evaluation on modern rural logis... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fuzzy Comprehensive Evaluation on Community Service Based on Improved Algorithm

    Publication Year: 2009, Page(s):48 - 52
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (299 KB) | HTML iconHTML

    With the development of community service work, community service evaluation becomes more and more important. However, there are not quantitative methods widely accepted for evaluating on community service. Therefore, evaluation on community service is often with a lot of arbitrary and subjective. Using data mining technology based on entropy to mine knowledge information about object classificati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Effect Assessment of Beijing Technology Acquisition

    Publication Year: 2009, Page(s):53 - 56
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (214 KB) | HTML iconHTML

    Given that Beijing is the capital of China, its technology acquisition is of great importance to the technology transfer of the whole nation. This thesis has constructed an index assessment system for technology acquisition effect by the analysis to the features of the acquisition of Beijing. Moreover, it has also made an evaluation to the technology acquisition effect by the method of positive an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Image Retrieval Based on NSCT from the Science and Technology Resource Image Database

    Publication Year: 2009, Page(s):57 - 60
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (304 KB) | HTML iconHTML

    Considering the characteristics of science and technology resources image, the system structure of image retrieval techniques from the science and technology resources image database is designed to rapidly and effectively retrieve the image from the database. Firstly, a novel image retrieval algorithm based on texture is proposed. The algorithm proposed takes fully the advantage of statistical att... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Behavior and Management of Corporate Donations: Data from Enterprises in Yangtze River Delta between 2004 and 2006

    Publication Year: 2009, Page(s):61 - 64
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (287 KB) | HTML iconHTML

    Corporate donation comes forth rapidly and has become an important form of corporate social responsibility. The research used data from 290 enterprises in Yangtze River delta of China involved in philanthropy between 2004 and 2006 so as to study behavior and management of donations. According to descriptive statistics analysis, the results are as follows: (1) the average annual amount of corporate... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Method for Information System Selection

    Publication Year: 2009, Page(s):65 - 68
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (447 KB) | HTML iconHTML

    A good information system (IS) makes it possible to improve organizational efficiency and effectiveness, which can provide competitive advantage. Now the most of company through the purchase of existing information systems to complete the construction of enterprise information, it can save a lot of money. So the information system evaluation is an important task to the company. In this paper, an i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Research of Feasibility Analysis and Risk Prevention Measures of Zero Inventory

    Publication Year: 2009, Page(s):69 - 72
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (411 KB) | HTML iconHTML

    Zero inventory is the special concept of the stock, which is also an important classification concept in industrial enterprises and commercial enterprises. Whether the enterprise is suitable for the implementation of the zero inventory management and how to conduct a feasibility analysis of zero inventory and how to solve the zero inventory risk has always been a troubled business problems. In thi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Business Process Modeling and Verification Architecture

    Publication Year: 2009, Page(s):73 - 76
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (315 KB) | HTML iconHTML

    Business process modeling and verification is one of the main functions for all the workflow products. In order to detect the deadlock, the lack of synchronization and other issues in process modeling, the majority of workflow products needed to provide analysis and modeling functions based on formal methods. As the WS-BPEL (Web services business process execution language) is a kind of non-formal... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.