Scheduled System Maintenance:
On Monday, April 27th, IEEE Xplore will undergo scheduled maintenance from 1:00 PM - 3:00 PM ET (17:00 - 19:00 UTC). No interruption in service is anticipated.
By Topic

Service Operations and Logistics, and Informatics (SOLI), 2013 IEEE International Conference on

Date 28-30 July 2013

Filter Results

Displaying Results 1 - 25 of 118
  • A system for green personal integrated mobility: A research in progress

    Publication Year: 2013 , Page(s): 1 - 6
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1231 KB) |  | HTML iconHTML  

    We present an ongoing research on an Integrated Real-time Mobility Assistant (IRMA). IRMA is a software system that targets the personal mobility in a near future scenario, based on green, shared and public transports. IRMA handles end-to-end itineraries that may involve multiple transport systems, and encompasses both commuter mobility and visitor mobility. The objective of IRMA is to make practically feasible a mobility that balances efficiency of time, energy/pollution and cost. Therefore, IRMA supports users in plotting the itinerary and also when en-route. IRMA architecture includes a smartphone application and a set of web services to gather and interpret any relevant source of information, that includes open data, crowd data and big data. The technology is SOA/EDA (Service Oriented Architecture / Event Driven Architecture) and uses GTFS format to access open data. IRMA, after being proved on test cases, shall be tested by the students of University of Pavia. IRMA concept is a step ahead current personal mobility systems that simply suggest and track itineraries. View full abstract»

    Freely Available from IEEE
  • Budget utilization for improved business contingency planning in service delivery

    Publication Year: 2013 , Page(s): 7 - 12
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (87 KB) |  | HTML iconHTML  

    Service delivery using geographically distributed delivery locations has emerged as a mature methodology of service delivery. The fragile nature of business environments at the delivery locations has resulted Business Continuity Planning methodology in becoming a key differentiator between service delivery organizations. Increasingly, these organizations are actively seeking to allocate funds for improving their BCP posture by procuring resources. However, the conventional techniques of cost benefit analysis while allocating budget for the procurement of resources do not take into account the special need of factoring for resumption plans while procurement of resources for BCP. In this paper we explore the issues faced in utilizing budgets for BCP, and suggest a broad methodology that may be used for optimal budget utilization. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reducing defects in IT service delivery

    Publication Year: 2013 , Page(s): 13 - 18
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (258 KB) |  | HTML iconHTML  

    In IT Service Delivery organizations, Quality Analysts (QAs) are responsible for analyzing sets of service tickets to detect exceptional trends, launch investigations and identify and remove defects in the IT environment, thereby bringing down the volume of incidents over time. The large scale of operation (thousands of tickets), hard to detect temporal variations, mix of structured and unstructured data and lack of suitable tool support make the QA's job very time-consuming and challenging. Based on extensive interactions with QAs and field study, we have developed a tool named Drishti that combines a novel and highly interactive user interface, with advanced text processing and statistical analysis support to drastically reduce the time needed to carry out quality analysis, and improve the outcome. The tool has been deployed widely in IBM's global delivery centers and significant benefits have been realized in terms of productivity improvement of QAs as well as the number of investigations that could be triggered to reduce defects. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An adaptive control strategy based on usage analysis for office power management

    Publication Year: 2013 , Page(s): 19 - 23
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (420 KB) |  | HTML iconHTML  

    In this paper, a control strategy is presented to coordinately control the switches of lamps and projectors in offices, especially for those offices with multiple meeting rooms. Firstly, it detects and collects the lamps and projects usage status through some devices, such as embedded sensors. Secondly, it analyzes the historical usage records of projectors and lamps and identifies several patterns for lamps and projector usage. Then, it clusters the control strategies for each pattern and determines the most popular used control strategy for each pattern. Finally, it updates and stores the most popular used strategy as optimal control strategy for execution. In order to verify its feasibility, efficiency and value, a prototype system and apparatus is proposed. And the experimental results prove it can help user to save power consumption and improve operation efficiency while using projectors. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic road detection for highway surveillance using frequency-domain information

    Publication Year: 2013 , Page(s): 24 - 28
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (529 KB) |  | HTML iconHTML  

    Video detection is one of the primary collection means of traffic states in Parallel traffic Management Systems (PtMS). In order to accurately and automatically obtain road areas in highway surveillance videos, this paper presents an automatic detection algorithm based on the frequency-domain information of video images. This algorithm uses the frequency-domain feature that is produced by the vehicles passing through road areas in videos, to realize automatic segmentation and recognition of the road areas. The experiment comparing with the traditional vehicle-tracking-based method, which uses the information in the time-space domain, illustrates the advantages of the proposed algorithm. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improved information feedback in symmetric dualchannel traffic

    Publication Year: 2013 , Page(s): 29 - 34
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (761 KB) |  | HTML iconHTML  

    Information feedback is very important in traffic systems. Real-time information feedback can improve traffic flow with existing facilities. This paper proposes a real-time information feedback strategy named improved mean number feedback strategy. Based on a two-route scenario, simulation results show that the strategy is much more effective in different length of roads or in different percentage of dynamic vehicles than the old strategies, i.e., congestion coefficient feedback strategy and mean velocity feedback strategy. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal implementation of elliptic curve cryptography

    Publication Year: 2013 , Page(s): 35 - 39
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (233 KB) |  | HTML iconHTML  

    The most time-consuming operation in the Elliptic Curve Cryptography (ECC) calculation is scalar multiplication. Scalar multiplication plays a major role in ECC. Currently, there are several optimization algorithms for point scalar multiplication which have either high computational complexity or additional storage requirement. They are all unsuitable for further applying. In this paper, we present a new compatible optimal algorithm which improves the efficiency by generating a special random number k as the scalar. The experimental results show that the processes of encryption and decryption have been speed up significantly in the same condition. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A heuristic implementation of emergency traffic evacuation in urban areas

    Publication Year: 2013 , Page(s): 40 - 44
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (467 KB) |  | HTML iconHTML  

    With the acceleration of China's urbanization, more and more unexpected disasters in big cities make a severe challenge to city emergency traffic management. Under this background, we present a heuristic implementation of urban emergency traffic evacuation in this paper. Firstly, we refer to a popular evacuation demand generation model to generate the evacuation demand. When solving the path selection problem, the heuristic search method is used. We take Dijkstra shortest path and current road condition as two parts of the evaluation function to evaluate different choices and choose the best one. To simulate the dynamic process of evacuation, we developed a position update algorithm to update the positions of traffic participants. The mathematical analysis method and computer simulation are combined to determine the final evacuation route of a traffic participant. This combination is effective since it takes advantages of both methods and avoids the shortcomings at the same time. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Embedded technology and algorithm for video-based vehicle queue length detection

    Publication Year: 2013 , Page(s): 45 - 50
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (678 KB) |  | HTML iconHTML  

    The vehicle queue length detection, specially based on video, is an important and practical research area of Intelligent Transportation Systems (ITS). It has promising application prospect in such areas as urban traffic control, highway toll system etc. In this paper, by analyzing the video sequence obtained from the fixed-camera, the vehicle movements of each road lane, such as left turn, go straight, turn right, are detected by using telescopic virtual coil, and then the vehicle motion detection and vehicle presence detection are used to calculate the vehicle queue length. On this basis, the vehicle queue detection algorithms are improved, and their threshold values are modified in the paper correspondently. And, the DM642 platform is designed to implement the real-time detection of vehicle queue length on the crossroads. Application experiments prove that the solution can detect the vehicle queue length with high precision, and the detection results meet the accuracy and stability requirements of practical application. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on biogenetics-based supply chain knowledge sharing space member preferences and their distribution

    Publication Year: 2013 , Page(s): 51 - 54
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (246 KB) |  | HTML iconHTML  

    The core competence of the supply chain originates in the effective knowledge sharing among the member enterprises, and the knowledge sharing among the member enterprises is influenced by preferences of the member enterprises. The latest economic research result shows that human beings have a variety of preferences like selfishness and altruism. Based on the views of biogenetics, the various kinds of human preferences can be the result of the corresponding preference genes in the living being. The supply chain knowledge sharing preference space model is thus constructed, as well as the zero function of preferences of the member enterprises, and the preference distribution in different dimensionalities is researched to obtain the k value which can depict different preferences, with its meanings in economics and its inspiration to the supply chain knowledge sharing management discussed. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The simulation model of price stability to consumer loyalty degree based on the cognitive behavior

    Publication Year: 2013 , Page(s): 55 - 58
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (331 KB) |  | HTML iconHTML  

    Loyal customers are important for any company, and how to cultivate their loyalty by marketing tactics such as price, relation, promotion and etc. is crucial. We establish a consumer cognitive simulation model based on ACT-R cognitive framework to research the influence of price stability on consumer loyalty in this paper. The model uses three variables price stability, price, and the urgency of the needs, to describe the state of the consumer cognition. Consumers' decision-making mechanism is characterized through the production rules. The behavior for each simulation is evaluated by using the memory cycles and saved in order to assist future cycle decisions. Finally, we make a numeric simulation experiment by using the above model. The result and analysis of the data shows that this model is effective in studying consumer loyalty degree. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Collaborative M-learning based on multi-agent system

    Publication Year: 2013 , Page(s): 59 - 62
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (397 KB) |  | HTML iconHTML  

    Under the situation of m-learning, mobile learners can't be aware of other collaborative learners' information and can't effectively communicate with them due to small screens of mobile devices, small storage and the limitation of data-processing ability. In this paper, the author puts forwards a middleware structure based on multi-agent system in order to allow mobile learners to visit the existing collaborative platform and to make full advantage of multi-agent system's autonomy, coordination and intelligence. The author describes the middleware structure in detail and elaborates on the composition and the functions of the structure. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The effectiveness analysis of time-on-target shooting method under multiple hit system

    Publication Year: 2013 , Page(s): 63 - 67
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (304 KB) |  | HTML iconHTML  

    To check the Time-on-Target shooting method could attack the moving objects effectively, an analysis method that divided the errors into two group was applied. Firstly, give the Fire control model of Time-on-Target Shooting method by discussing the mechanism of multiple hit system. Set the hitting probability as the firing efficiency index. Then build the effectiveness analysis method by dividing all the errors into two groups, and give a simplified aiming point's configuration criterion to calculate the efficiency index. The calculation could be simplified by the numerical integral method. Simulation results show that the Time-on-Target shooting method of multiple hit system is feasible, and may be better than the traditional shooting method under certain conditions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Empirical analysis on operational efficiency and its influential factors of road transportation industry of China

    Publication Year: 2013 , Page(s): 68 - 72
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (499 KB) |  | HTML iconHTML  

    As an important part of general transportation system, road transportation industry plays an important role in Chinese modernization procedure. In the background of changing economy increasing mode, road transportation industry of China should change from pure resource factor input growth pattern to growth pattern emphasizing on quality and efficiency, so the precise mastery of industry operation efficiency seems very important. This paper evaluates operation efficiency and its influential factors of road transportation industry of China, in order to provide references for industry management and policy-making. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Empirical research on IPO financing efficiency of state-owned enterprises based on DEA

    Publication Year: 2013 , Page(s): 73 - 78
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (717 KB) |  | HTML iconHTML  

    The state-owned enterprises play a very important role in China. The financing behavior and efficiency of state-owned enterprises not only have a great influence on its own operation competition, but also relate closely to the development and stability of the whole national economy and social economic efficiency. 51 listed companies which have performed IPO(initial public offering) in 2010 have been chosen under certain principles as samples. Data envelopment analysis (DEA)-Malmquist is used in this paper to evaluate the IPO financing efficiency of state-owned enterprises in China. It is found that the type of ultimate controller of company has played an insignificant way in IPO financing efficiency. IPO financing efficiency did not bring an increase in the efficiency of state-owned enterprises. Finally, the present paper explored the possible reasons for this phenomenon and analyzed two countermeasures to improve the IPO financing efficiency. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A scheme to ensure data security of cloud storage

    Publication Year: 2013 , Page(s): 79 - 82
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (195 KB) |  | HTML iconHTML  

    Cloud storage offers great convenience to users. However, the data security concerns may impede cloud storage wide adoption. Although there are many schemes to solve the problem, they mostly focus on an aspect of data security. They have not a detailed discussion about the data security in cloud. In this paper, we proposed approach provides a scheme to allow users to check the integrity of their data in the cloud. We also present the performance criteria about the scheme, which can help the researchers to optimize their mechanism efficiently and effectively. The scheme is lightweight, efficient and robust. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The determinants of the resources reallocation in failure projects based on SEM

    Publication Year: 2013 , Page(s): 83 - 88
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (297 KB) |  | HTML iconHTML  

    This paper uses the questionnaire survey and structural equation model to evaluate the influence of nine indicators from the national macro environment, industry environment and internal environment to the resources reallocation in failure projects through the AMOS statistical analysis method, and analyses the degree of attention to the reallocation of financial resources, human resources and material resources in the process of the resources reallocation in failure projects. Comprehensive conclusions show that improving the resources reallocation consciousness of managers and learning the way and the method of reallocation, enhancing the internal scheduling and allocation of resources, establishing a perfect resources sharing platform and transaction mechanism and so on are helpful to the comprehensive development and reallocation of the resources in failure projects, optimize the resource structure and make better use of available resources. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CO2 emissions and technical efficiency of logistics sector: An empirical research from China

    Publication Year: 2013 , Page(s): 89 - 94
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (405 KB) |  | HTML iconHTML  

    The aim of this paper is to examine the correlation between CO2 emissions and technical efficiency of logistics sector. In doing so, a one-step Stochastic Frontier Analysis (SFA) approach is employed based on panel data from 25 provincial logistics sector in China. Besides CO2 emissions, rail mileage, highway mileage, inland waterway mileage and the progress degree of provincial marketization in China are also assumed as inefficient factors to technical efficiency. The result of empirical research shows that the coefficients of four assumed inefficient factors pass significant test except the inland waterway mileage. The most important insight is that this research measures the coefficient of CO2 emissions to technical efficiency of logistics sector, i.e. reducing 1% CO2 emissions leads to 0.231% enhancement of technical efficiency of logistics sector. Meantime, facilitating the progress of marketization and expanding mileage of rail and highway system can also improve technical efficiency of logistics sector. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on embedded subject service under ubiquitous knowledge environment

    Publication Year: 2013 , Page(s): 95 - 99
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (174 KB) |  | HTML iconHTML  

    Embedded subject service has become a new trend of library subject service under ubiquitous knowledge environment, and it's a personalized service initiative of libraries. This paper summarizes the embedded subject service of libraries in the world, and points out that embedded subject service contains embedded information literacy education and embedded science research, which means librarians embedded into the user's physical space and virtual space to provide personalized subject information service at anytime at anywhere. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance evaluation of green supply chain in manufacturing industry

    Publication Year: 2013 , Page(s): 100 - 103
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (185 KB) |  | HTML iconHTML  

    To promote manufacturers to adopt green supply chain, we propose in this paper a model for evaluating the performance of green supply chain, which covers three important indicators on finance, operation, and environment. We also adopt AHP and Fuzzy comprehensive evaluation approaches to evaluating the model, and apply this model to a practical manufacturer to verify its feasibility and effectiveness. The results show that the model can provide manufacturers with both theoretical and practical guidance about the use of green supply chain. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on horticulture therapy and its promotion in Shenzhen, China

    Publication Year: 2013 , Page(s): 104 - 107
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (842 KB) |  | HTML iconHTML  

    Horticultural therapy is the emerging service industries in China. This article summarizes the concept, the applicable objects, the target, the characteristics and the efficacy of the horticultural therapy. And explains the basic composition of horticultural therapy activities as well as the famous Japanese horticultural therapy rehabilitation facility, comfort garden Azomino for example. It also proposes the way of promotion of horticultural therapy of Shenzhen area in China, the effect of proof test multimode promotion cooperate with pension institutions, for the promotion of horticultural therapy of more cities and regions in China to lay the foundation. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mechanism of information dissemination under socialization networking environment

    Publication Year: 2013 , Page(s): 108 - 112
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (225 KB) |  | HTML iconHTML  

    The study of information dissemination based on users' relationship under socialization networking environment is of important significance. This article focuses on the issue of information dissemination mechanism. It started with the analysis of development of information dissemination mode, including non-linear dissemination based on users' relationship, dissemination of low threshold and equalization, and dissemination of cascade and value-added of information. Based on the network information dissemination mode, a socialization information dissemination mode was proposed, and was interpreted from the aspects of users' relationship and social media. Information dissemination in socialization networking environment takes users' relationship chain as communication channel, and takes user node as hub; value-added of information would be achieved because of spread layer by layer and cascade dissemination. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Investment decision-making method of Eucalyptus plantation based on real options theory

    Publication Year: 2013 , Page(s): 113 - 118
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (383 KB) |  | HTML iconHTML  

    Aiming at Eucalyptus plantation project with long-term, uncertainty, stage and other characteristics, this article using option pricing theory, made up the defect that the traditional investment decision-making method with the net cash flow as the core can not evaluate the uncertainty value of the project. The study showed that, relative to traditional cash-flow theory, the uncertainty value of the eucalyptus plantation project was fully reflected by the option pricing theory which can reflect the project's true objective value better. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Advance on control and management of internal transport system for large-scale general hospital buildings

    Publication Year: 2013 , Page(s): 119 - 123
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (200 KB) |  | HTML iconHTML  

    The control of internal transport system of large complex building which focuses on the convenience and comfort for pedestrians, is greatly different from urban traffic. Effective control of the overall internal transport system is essential to enhance the safety and convenience. However, ongoing changes in population coupled with the economic development, mean that most of the control and management methods can quickly become dated or even have been unsuitable, leading to the overcrowding in large buildings, especially large-scale hospitals in China. Considerable research on urban traffic has been carried out, whereas the internal transport system has rarely been investigated. This paper thus seeks to develop a practical and efficient methodology to allow current internal transport system to be updated to alleviate the congestion. For this purpose, we undertake a comparison between internal transport system and urban traffic. Then, large-scale hospital's transport system is considered. Features of patient flow, clinic service process, and interior layout are analyzed in detail. Finally, based on these analyses, improved management and control methods of hospital's transport system are presented. The methodology developed in this paper appears to be useful for many applications such as the internal transport system of the shopping mall due to the development of cities. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on the effect of co-creation customer experience on customer co-created value in non-trading virtual community

    Publication Year: 2013 , Page(s): 124 - 129
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (3916 KB) |  | HTML iconHTML  

    The paper attempts to analyze the relationship between co-creation customer experience, customer co-created value and behavioral intention in non-trading virtual community. Customer co-created value defined by the help of literature research in non-trading virtual community. And Literature research and qualitative research of focus group interview were applied to determine the dimensions of customer co-created value, including pragmatic value and hedonic value. Empirical research of structural equation model was applied to analyze the relationship between co-creation customer experience, customer co-created value and behavioral intention. The results show that the two dimensions of co-creation customer experience, emotional experience and relationship experience all have significantly positive impact on pragmatic value and hedonic value; pragmatic value and hedonic value all have significantly positive impact on word-of-mouth and repeated use intention, and the impact of hedonic value is more significant. The conclusion of the paper can not only help researchers to study intensively about the theory of effect factors of customer co-created value, but also make community enterprises understand customers better and improve their online services. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.