Scheduled System Maintenance on May 29th, 2015:
IEEE Xplore will be upgraded between 11:00 AM and 10:00 PM EDT. During this time there may be intermittent impact on performance. We apologize for any inconvenience.
By Topic

Future Information Technology and Management Engineering, 2009. FITME '09. Second International Conference on

Date 13-14 Dec. 2009

Filter Results

Displaying Results 1 - 25 of 162
  • [Front cover]

    Publication Year: 2009 , Page(s): C1
    Save to Project icon | Request Permissions | PDF file iconPDF (7581 KB)  
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2009 , Page(s): i
    Save to Project icon | Request Permissions | PDF file iconPDF (29 KB)  
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2009 , Page(s): iii
    Save to Project icon | Request Permissions | PDF file iconPDF (90 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009 , Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (121 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009 , Page(s): v - xiv
    Save to Project icon | Request Permissions | PDF file iconPDF (264 KB)  
    Freely Available from IEEE
  • Message from the FITME 2009 Chairs

    Publication Year: 2009 , Page(s): xv
    Save to Project icon | Request Permissions | PDF file iconPDF (76 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2009 , Page(s): xvi
    Save to Project icon | Request Permissions | PDF file iconPDF (89 KB)  
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2009 , Page(s): xvii
    Save to Project icon | Request Permissions | PDF file iconPDF (84 KB)  
    Freely Available from IEEE
  • Combination of PANA and Diameter in Trusted Vehicle Network

    Publication Year: 2009 , Page(s): 3 - 7
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (301 KB) |  | HTML iconHTML  

    Vehicle network is popular gradually. For more security in vehicle network, a trusted AAA (Authentication, Authorization and Accounting) environment for vehicle network must be established. The paper proposes an approach to establish such an environment using combination of two next generation AAA protocols, PANA (Protocol for carrying Authentication for Network Access) and Diameter. The ability of their combination both in work patterns and in the protocol structure is analyzed, and an AAA network entity communication structure and the architecture of the key device to combine the protocols are put forward. Moreover, the implement method of the software base on Open Diameter on the key device is given in detail. This scheme is proved to be effective through experiment. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Notice of Retraction
    Output Prediction Based on Index Smoothing Procedures and Sustainable Development Research of Hebei Iron and Steel Industry

    Publication Year: 2009 , Page(s): 8 - 13
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (462 KB) |  | HTML iconHTML  

    Notice of Retraction

    After careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.

    We hereby retract the content of this paper. Reasonable effort should be made to remove all past references to this paper.

    The presenting author of this paper has the option to appeal this decision by contacting TPII@ieee.org.

    In this article it describes the development situation of Hebei iron and steel industry; predicts and analyzes the scale output and growth rate from 2008 to 2013 with Index smoothing procedures, points out that it should appropriately control the scale and growth rate; based on this, provides some sustainable development countermeasures. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Notice of Retraction
    The Construction, Mechanism and Application Analysis of Trust Model of Industrial Clusters

    Publication Year: 2009 , Page(s): 14 - 17
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (420 KB) |  | HTML iconHTML  

    Notice of Retraction

    After careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.

    We hereby retract the content of this paper. Reasonable effort should be made to remove all past references to this paper.

    The presenting author of this paper has the option to appeal this decision by contacting TPII@ieee.org.

    Based on the systematic analysis to relative study of trust, this paper analyzes the formation mechanism and effect factor of trust model of industrial clusters from socio-cultural and game analysis two dimensions, and construct the trust model of industrial clusters. This paper also analyzes the mechanism of endogenous variables which effect on the trust model of industrial clusters, and carries out compared application analysis between the cases of auto parts cluster in two regions through the study results. Obtains the following conclusions: the culture background of region decide the logic starting point of trust level of industrial clusters, trust level of industrial clusters is constrained by culture background of the region, the action and policies of government, the strategy choice of participants, geographic area, the number of participants, relationships and time dimension. The trust level of industrial clusters in favor of regional economic development and upgrading the competitive advantage of industrial clusters, trust enhance regional loyalty of industrial clusters. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Notice of Retraction
    The Construction and Analysis of Diffusion Mechanism Models of Industrial Clusters Culture

    Publication Year: 2009 , Page(s): 18 - 21
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (433 KB) |  | HTML iconHTML  

    Notice of Retraction

    After careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.

    We hereby retract the content of this paper. Reasonable effort should be made to remove all past references to this paper.

    The presenting author of this paper has the option to appeal this decision by contacting TPII@ieee.org.

    This paper first progressively analyzes the connotation of industrial clusters culture, and then described the diffusion mechanism of industrial clusters culture. On this basis, construct basic diffusion model of industrial clusters culture and deeply analyze the effect mechanism of model variables. In order to further analyze the diffusion process of industrial clusters culture, this paper introduce life-cycle theory to analyze diffusion of industrial clusters culture by period, construct the internal decision-making model of enterprises (Ej) based on analysis of cost-benefit and the diffusion speed model of industrial clusters culture, and analyzes variables features and effect change rules of diffusion of industrial clusters culture in the four period : incubation, growth, mature and decline. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Employing MDA in PRINCE2 Framework

    Publication Year: 2009 , Page(s): 22 - 25
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (254 KB) |  | HTML iconHTML  

    In these times, an increasing number of costly IT projects face challenges and fail to meet the primary needs and purposes of their customers and developing teams. Many projects are not durable due to the lack of well-informed management. The need for proper management is quite obvious. Nowadays, correct definition and successful management of IT projects is a major factor of success and improvement of software systems development. Moreover, the software industry has always been seeking new methods to improve the procedure of software development and increasing their quality and durability. Object orientation, CBD and distributed computing patterns and infrastructures, are some instants to achieve such objectives. Simultaneous concern for the two subjects of software project management and the art of software architecture can be quite helpful. In this paper, we intend to use MDA to manage the projects in PRINCE2. The suggested method was evaluated in order to specify its advantages and disadvantages in comparison to other methods. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Notice of Retraction
    The Influence of Public R & D Investment on Technological Innovation in Zhejiang Province

    Publication Year: 2009 , Page(s): 26 - 30
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (481 KB) |  | HTML iconHTML  

    Notice of Retraction

    After careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.

    We hereby retract the content of this paper. Reasonable effort should be made to remove all past references to this paper.

    The presenting author of this paper has the option to appeal this decision by contacting TPII@ieee.org.

    R&D is an important factor in promoting the progress of technology, pushing forward the promotion of industry and keeping the regional economic development. Because of the market failure resulted by the R&D activities, promoting the technological innovation needs public R&D by the government. This essay analyzed the relationship among the invested public R&D, the invested enterprise R&D, the increasing of GDP and the results of technological innovation, according to which to get the effect of the technological innovation of enterprise brought by the invested public R&D in Zhejiang province. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Countermeasures Study about the Protection of the Quality of Agriculture under Decentralization Mode

    Publication Year: 2009 , Page(s): 31 - 34
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (281 KB) |  | HTML iconHTML  

    The quality of agricultural products is a major issue which is related to the consumption safety, agriculture development and social stability. Combining with the analysis of the production process of milk, this text leverages the model of The market for ¿lemons¿ and give us a detail study on the impact of the quality of agricultural products made by the decentralized characteristics of Chinese agricultural production. What's more, this paper also brings out new thoughts to resolve the issue of agricultural quality and safety. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Formation Mechanism and Countermeasures of Food Safety Incident

    Publication Year: 2009 , Page(s): 35 - 38
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (264 KB) |  | HTML iconHTML  

    This paper first analyzes the present situation of Chinese food safety, outlines the changes of its nature and trends. Then, it establishes formation mechanism model of food safety incident, points out that adverse selection and the changes of topological structure of information dissemination system are the two important stages in the formation process of food safety incident. Finally, puts forward the control countermeasures of food safety incidents, emphasize on strengthening supervision, strengthening legislation, strengthening the independence of the judiciary, reforming the government's work performance appraisal system and information disclosure to deal with food safety incidents as important measures. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study on Venture Capital Fund of Central China Rising in Wuhan

    Publication Year: 2009 , Page(s): 39 - 42
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (226 KB) |  | HTML iconHTML  

    In order to realize central China rising, it is an inevitable choice to make significant efforts to develop high-tech. In recent years, Wuhan is increasingly becoming the important pivot of central China rising strategies because of the rapid development of high-tech industries in Wuhan and the construction of "two-oriented society" reform pilot area in Wuhan metropolis circle. This paper researches the successful experiences on how venture capital promotes region development, analyzes the factors which favor the development of venture capital fund in Wuhan and proposes some plans on how to construct the venture capital fund of central China rising in Wuhan and its countermeasures and suggestions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fuzzy Comprehensive Evaluation on China's Modern Rural Logistics Construction Based on Improved Algorithm

    Publication Year: 2009 , Page(s): 43 - 47
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (300 KB) |  | HTML iconHTML  

    Agriculture is the basic industry of the national economy, and agriculture is a so important industry especially for China. Therefore, the healthy development of agriculture and rural economy affects the overall situation of our national economy. It has important practical significance to study modern logistics system in rural areas. The core of fuzzy comprehensive evaluation on modern rural logistics construction is membership degree transformation. But the existing transformation methods should be questioned, because redundant data in index membership degree is also used to compute object membership degree, which is not useful for object classification. The paper applied a new algorithm in fuzzy comprehensive evaluation on modern rural logistics construction. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fuzzy Comprehensive Evaluation on Community Service Based on Improved Algorithm

    Publication Year: 2009 , Page(s): 48 - 52
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (299 KB) |  | HTML iconHTML  

    With the development of community service work, community service evaluation becomes more and more important. However, there are not quantitative methods widely accepted for evaluating on community service. Therefore, evaluation on community service is often with a lot of arbitrary and subjective. Using data mining technology based on entropy to mine knowledge information about object classification hidden in every index, the paper affirmed the relationship of object classification and index membership and eliminated the redundant data in index membership for object classification by defining distinguishable weight and extract valid values to compute object membership. The new algorithm of membership degree transformation includes three calculation steps which can be summarized as ¿effective, comparison and composition¿, which is denoted as M(1,2,3). The paper applied the new algorithm in fuzzy comprehensive evaluation on community service. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Effect Assessment of Beijing Technology Acquisition

    Publication Year: 2009 , Page(s): 53 - 56
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (214 KB) |  | HTML iconHTML  

    Given that Beijing is the capital of China, its technology acquisition is of great importance to the technology transfer of the whole nation. This thesis has constructed an index assessment system for technology acquisition effect by the analysis to the features of the acquisition of Beijing. Moreover, it has also made an evaluation to the technology acquisition effect by the method of positive analysis. Then it concludes that technology contributes substantially to the growth of the national economy in Beijing. On the contrary, contribution of capital and labor to economy is not obvious. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Image Retrieval Based on NSCT from the Science and Technology Resource Image Database

    Publication Year: 2009 , Page(s): 57 - 60
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (304 KB) |  | HTML iconHTML  

    Considering the characteristics of science and technology resources image, the system structure of image retrieval techniques from the science and technology resources image database is designed to rapidly and effectively retrieve the image from the database. Firstly, a novel image retrieval algorithm based on texture is proposed. The algorithm proposed takes fully the advantage of statistical attribution of image's nonsubsampled contourlet transform (NSCT) coefficients to form the eigenvector for depicting textural feature and shape feature. Finally, the TBIR method is used to retrieve the image from the database. Secondly the CBIR method is used to retrieve the image from the result of the TBIR method. Moreover, the three key technologies, the image segmentation, the feature extraction and the similarity measurement, is researched and comprehensively used to retrieve the image. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Behavior and Management of Corporate Donations: Data from Enterprises in Yangtze River Delta between 2004 and 2006

    Publication Year: 2009 , Page(s): 61 - 64
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (287 KB) |  | HTML iconHTML  

    Corporate donation comes forth rapidly and has become an important form of corporate social responsibility. The research used data from 290 enterprises in Yangtze River delta of China involved in philanthropy between 2004 and 2006 so as to study behavior and management of donations. According to descriptive statistics analysis, the results are as follows: (1) the average annual amount of corporate donations takes on a trend of "the middle is high, while both sides are low"; (2) enterprises have a tendency to donate in various forms; (3) most enterprises do not attach much importance to each aspect of donation management, lack of donation plan, donation object and donation evaluation. There are still differences in management of corporate donation with different ownership and size. In general, foreign enterprises are better than domestic ones, whether in donation characteristics or donation management. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Method for Information System Selection

    Publication Year: 2009 , Page(s): 65 - 68
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (447 KB) |  | HTML iconHTML  

    A good information system (IS) makes it possible to improve organizational efficiency and effectiveness, which can provide competitive advantage. Now the most of company through the purchase of existing information systems to complete the construction of enterprise information, it can save a lot of money. So the information system evaluation is an important task to the company. In this paper, an information system performance evaluation model is constructed with BSC (balance score card) which is applied to define the hierarchy with four major perspectives. In addition, this paper extends information performance evaluation base on TOPSIS and vague, where the characteristics of the alternatives are represented by vague sets. At last we give the example that suggests that the model be a good tool for solving the information system performance evaluation. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Research of Feasibility Analysis and Risk Prevention Measures of Zero Inventory

    Publication Year: 2009 , Page(s): 69 - 72
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (411 KB) |  | HTML iconHTML  

    Zero inventory is the special concept of the stock, which is also an important classification concept in industrial enterprises and commercial enterprises. Whether the enterprise is suitable for the implementation of the zero inventory management and how to conduct a feasibility analysis of zero inventory and how to solve the zero inventory risk has always been a troubled business problems. In this paper, based on the concept of zero inventory as well as the operational mechanism of zero inventory, we raised the question of how to conduct a feasibility analysis of zero inventory and sets out ways how to achieve zero inventory and once enterprise implement zero inventory management the enterprise how to face risks and deal with risks. This paper has certain significance for zero inventory management of enterprises. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Business Process Modeling and Verification Architecture

    Publication Year: 2009 , Page(s): 73 - 76
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (315 KB) |  | HTML iconHTML  

    Business process modeling and verification is one of the main functions for all the workflow products. In order to detect the deadlock, the lack of synchronization and other issues in process modeling, the majority of workflow products needed to provide analysis and modeling functions based on formal methods. As the WS-BPEL (Web services business process execution language) is a kind of non-formal language to describe business processes, testing and verification is not easy. What's more, there is no corresponding formal supporting tool, which makes it difficult to guarantee the correctness of Web services and to track the business processes in more abstract level. For this problem, this paper brought forward the three-tier architecture of business process modeling and verification, and realized the conversion algorithm of business processes to the ¿-calculus description. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.