By Topic

Information Science and Management Engineering (ISME), 2010 International Conference of

Date 7-8 Aug. 2010

Go

Filter Results

Displaying Results 1 - 25 of 143
  • [Front cover - Vol 2]

    Publication Year: 2010, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (1250 KB)
    Freely Available from IEEE
  • [Title page i - Volume 2]

    Publication Year: 2010, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (86 KB)
    Freely Available from IEEE
  • [Title page iii - Volume 2]

    Publication Year: 2010, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (153 KB)
    Freely Available from IEEE
  • [Copyright notice - Volume 2]

    Publication Year: 2010, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (114 KB)
    Freely Available from IEEE
  • Table of contents - Volume 2

    Publication Year: 2010, Page(s):v - xiv
    Request permission for commercial reuse | PDF file iconPDF (169 KB)
    Freely Available from IEEE
  • Preface - Volume 2

    Publication Year: 2010, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (63 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee - Volume 2

    Publication Year: 2010, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (157 KB)
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2010, Page(s):xvii - xviii
    Request permission for commercial reuse | PDF file iconPDF (174 KB)
    Freely Available from IEEE
  • Intrusion Alerts Correlation Based Assessment of Network Security

    Publication Year: 2010, Page(s):3 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (292 KB) | HTML iconHTML

    Traditional network security assessment technologies are usually qualitative analyses from large variation of security factors. It is difficult to guide security managers to configure network security mechanisms. A new network security quantitative analysis method called ACRL is presented in this paper. It assesses attack sequences from credibility, risk and the loss of system and provides the ass... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Testing Method and Experimental Studies on Single Laser Pulse Energy

    Publication Year: 2010, Page(s):7 - 10
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (425 KB) | HTML iconHTML

    A new type of testing device is designed for energy of laser pulse in this paper. By using it, pulse energy of KJG-1YAG-400A laser welder can be measured. The calorific models have been established for the device, and the analysis of thermal loss has been finished. Running curves have been obtained between time and resistance after the device absorbing laser energy. After test data is amended, the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Inventory Management Model in Mobile Commerce

    Publication Year: 2010, Page(s):11 - 14
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB) | HTML iconHTML

    In the mobile commerce environment, inventory management evolved into mobile inventory management. The latter is different from the traditional inventory management in many ways. In this paper, an integrated practical model is developed to enhance the inventory management in mobile commerce. The key points to develop this practical inventory management model include determining the order point qua... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bayesian Network Inference on Risks of Construction Schedule-Cost

    Publication Year: 2010, Page(s):15 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (269 KB) | HTML iconHTML

    There is an important relationship between construction costs and schedule, a more appropriate schedule causes less cost risks. In such cases, a more acceptable construction cost-risk analysis model that takes into account of schedule risks should be applied. In this paper, the construction schedule-cost risk is defined and based on Bayesian network a schedule-cost risk analysis model is establish... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New User-Based Collaborative Filtering Algorithm Combining Data-Distribution

    Publication Year: 2010, Page(s):19 - 23
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (282 KB) | HTML iconHTML

    With the development of personalized recommendation systems, the research of collaborative filtering reached a bottleneck. Neither algorithm accuracy nor computational complexity can be improved significantly. In this paper, we present our statistics and analysis on some recognized datasets. The analysis shows that the real rating features of the users cannot follow even distribution while most cu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Intelligent Process Quality Control System under Network Environment

    Publication Year: 2010, Page(s):24 - 27
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (674 KB) | HTML iconHTML

    In the networked manufacturing environment, how to monitor dynamic and variable quality fluctuation, diagnose the abnormal variation in real-time and adjust the process at the right moment, becomes a difficult problem for the modern networked manufacturing enterprise in process quality control. In order to overcome this difficulty, This paper presents an intelligent process quality control mode or... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Numerical Simulation Research on Optimizing Monitoring Well Point of Reservior Pressure

    Publication Year: 2010, Page(s):28 - 31
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (261 KB) | HTML iconHTML

    During the production of oilfield, it is necessary to understand the strata pressure in the recovery process, which is the so-called current formation pressure. However, how to choose the pressure monitoring well point correctly is one of the important tasks in the oilfield development. Usually the simplest method of understanding the strata pressure is actual measurement, but in order to get the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Identification Method of Key Customer Based on CRM

    Publication Year: 2010, Page(s):32 - 34
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (233 KB) | HTML iconHTML

    The thesis first defined the conception of key customer, then set up key customer identification method based on customer value, customer loyalty degree and customer polymerization degree. The method adopted the analytic hierarchy process method to determine the weight of each index. The key customer is classified into three kinds, which include not only single key customers, but also the polymeri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research Transplanting Method of Embedded Linux Kernel Based on ARM Platform

    Publication Year: 2010, Page(s):35 - 38
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (258 KB) | HTML iconHTML

    A novel transplanting method for embedded linux kernel is presented in this work. Linux kernel as well as its cut, compile and porting process under ARM platform are introduced. Transplantation of the operating system can be divided into configuration, cutting the source code, cross compiler and so on. The article gives a more detailed description of the above steps, including the concrete realiza... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study on Recommended Trust Evaluation Model in C2C E-commerce Considering Consumer Purchasing Preference

    Publication Year: 2010, Page(s):39 - 42
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (295 KB) | HTML iconHTML

    This paper develops a recommended trust evaluation model in consideration with consumer purchasing preference in C2C e-commerce. Firstly, we analyze the three main aspects that influence the sellers' trust in C2C e-commerce from product, service and consumer, on the basis of this, a new seller trust evaluation index system is established. Then, the evaluation information given by consumers with th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intuitionistic Fuzzy Group Decision Making for Supply Chain Information Collaboration Partner Selection

    Publication Year: 2010, Page(s):43 - 46
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (282 KB) | HTML iconHTML

    In supply chain management process, information Collaboration is thus recognized as a basic process that holds the value creation opportunity which can drive effective supply chain management Thus, Information collaboration partner selection is an important issue and with the multiple criteria decision making approach. This paper is aimed to present an Intuitionistic Fuzzy set group decision-makin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Numerical Simulation Research on Well Pattern Adaptability of Low Permeability Oilfield

    Publication Year: 2010, Page(s):47 - 50
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (298 KB) | HTML iconHTML

    The geological model is established with Software Petrel. Then by Eclipse, numerical simulation is done. The development index of block well pattern and remaining oil change condition of well pattern are forecasted. At the same time, comparisons are done between theoretical relationship curve and actual data curve of recovery extent and water cut for the whole block and sublayers. Adaptability is ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study of Microwave Dielectric Resonator Oscillator Frequency Degradation Model for Intelligent Maintenance Systems

    Publication Year: 2010, Page(s):51 - 54
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (304 KB) | HTML iconHTML

    This paper presents a modeling method to model and assess the Dielectric Resonator Oscillator (DRO) performance degradation to supply a basis for the fault diagnoses, health state estimates and life prediction of the DRO in the Intelligent Maintenance Systems (IMS). In our research, the model combines internal state transition model with the Brownian motion stochastic process to show the degradati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intelligent Agents for Modeling Warfare Entities Actions Using an Improved Contract Net Protocol

    Publication Year: 2010, Page(s):55 - 58
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1292 KB) | HTML iconHTML

    In order to solve the problems about simulation of intelligent warfare entities actions on dynamic battlefield environment because of the complexity of warfare system, intelligent-agents-based modeling approach is applied in this paper. Based on analysis on caste diagram of warfare entities, the mapping from warfare entities to respective agents is set up, by which the simulation infrastructure is... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Emergency Logistics Risk Assessment Based on AHM

    Publication Year: 2010, Page(s):59 - 61
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (236 KB) | HTML iconHTML

    The research on emergency logistics risk management is an important research study of emergency logistics. In this paper, we analyzed the emergency logistics characteristics and risk characteristics of emergency logistics, and discussed the related content of emergency logistics risk from five aspects of the technology, environment, management, flexibility, operating. Then we use AHM to establish ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on the Knowledge Management System of the Vicarious Management Corporation

    Publication Year: 2010, Page(s):62 - 67
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (265 KB) | HTML iconHTML

    This paper analyzed the importance that the vicarious management corporation (VMC) carried out the knowledge management in its work, discussed the contents of the knowledge management of the VMC, and obtained the knowledge management model. In order to better knowledge management work, the paper put forward a thought establishing the knowledge management system of the VMC which included six parts:... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on the Evaluation of Knowledge Management Performance of Enterprise

    Publication Year: 2010, Page(s):68 - 71
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (290 KB) | HTML iconHTML

    The aim of this study is to develop a model for the measurement of the effectiveness of knowledge management in enterprises. Following a survey of the relevant literature on the subject, the study describes the construction of the model-including the opinions of specialists, scholars, and practitioners of knowledge management practice among China's high-tech firms, the use of focus groups, the app... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.