Scheduled System Maintenance
On Tuesday, May 22, IEEE Xplore will undergo scheduled maintenance. Single article sales and account management will be unavailable
from 6:00am–5:00pm ET. There may be intermittent impact on performance from noon–6:00pm ET.
We apologize for the inconvenience.

2010 International Conference on Future Information Technology and Management Engineering

Volume 1 • 9-10 Oct. 2010

Go

Filter Results

Displaying Results 1 - 25 of 154
  • [Front and back cover]

    Publication Year: 2010, Page(s):c1 - c4
    Request permission for commercial reuse | PDF file iconPDF (1291 KB)
    Freely Available from IEEE
  • [Front matter]

    Publication Year: 2010, Page(s):i - v
    Request permission for commercial reuse | PDF file iconPDF (87 KB)
    Freely Available from IEEE
  • FITME 2010 volume 1 contents

    Publication Year: 2010, Page(s):vi - xvi
    Request permission for commercial reuse | PDF file iconPDF (114 KB)
    Freely Available from IEEE
  • The study on relation between knowledge management and organizational innovation

    Publication Year: 2010, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (568 KB) | HTML iconHTML

    This paper studied the relationship between knowledge management and organizational innovation at the knowledge management angle of view. We take high-tech firms as example and find that knowledge creation could significantly improves corporate innovation capability Moreover, innovation capability is much more helpful for organizational performance than process capability and foundation facilities... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security and precaution on computer network

    Publication Year: 2010, Page(s):5 - 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (126 KB) | HTML iconHTML

    The development of computer network has accelerated the social information, meanwhile lots of network security issues appeared. Therefore, it seems that much more effort should be made to enhance security and precaution on computer network when conducting network application. This essay mainly introduces features of computer network security and primary threats faced by computer network. Finally, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A military aircraft safety risk evaluation method based on “human-machine-environment system”

    Publication Year: 2010, Page(s):8 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (764 KB) | HTML iconHTML

    To solve the difficulties in the safety risk decision of the military aircrafts based on full life cycles, a military aircraft safety risk evaluation model was established on the basis of “human-machine” and “environment-machine”. A grey fuzzy analytic network process was also proposed for the insufficiencies of current safety risk decision methods used in the research ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on rough sets theory based tax data mining

    Publication Year: 2010, Page(s):13 - 15
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (179 KB) | HTML iconHTML

    In order to conduct effectively data mining to the abnormal data in the mass tax data to get decision rules of tax information system, a decision rules mining algorithm based on positive approximation is proposed, which is based on the traditional rough set theory and the decision-making table of coordination. A practice applied in tax monitoring table in a tax department is validated, which shows... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The study of E-commerce application in foreign trade enterprise

    Publication Year: 2010, Page(s):16 - 19
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (147 KB) | HTML iconHTML

    With the development of Internet, E-commerce becomes a common practice in foreign trade and penetrates into every aspect of international trade. In this paper, the state of E-commerce application in foreign trade enterprise are analyzed, the potential application that E-commerce is superior to traditional trade is expounded, active reactions are suggested be taken, the promotive function of E-comm... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The application of UML in the development of CRM sale system online

    Publication Year: 2010, Page(s):20 - 23
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (634 KB) | HTML iconHTML

    Information technology and network technology is developing rapidly, the relationship between firms and customers are becoming increasingly important. According to the management characteristics of CRM, the paper applies modeling methods and tools of UML to analyze and design sale management system online. This paper builds system development models, including the use case diagrams, the class diag... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on rural emergency alarm system based on network

    Publication Year: 2010, Page(s):24 - 27
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (304 KB) | HTML iconHTML

    As the huge rural people floating into the cities, for those old men and children who have to live in the village, the safety issues, especially the ones on the alarm and treatment on time during the emergency situation, need to be resolved urgently. The paper demonstrates a system that is composed of software and hardware, constructs its structure model and hardware and software functionality. Th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A study of Green Manufacturing in workshop Production scheduling system

    Publication Year: 2010, Page(s):28 - 30
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (584 KB) | HTML iconHTML

    It plays a very important role for traditional workshop planning and scheduling system to achieve Production goals-time, quality and cost. With the emergence of Green Manufacturing, resource using and environmental impact has become important factors in manufacturing system decisions. Based on the analyzing of environmental impact of equipment, scheduling, raw material consumption and waste resour... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Development of the workshop tool management system with UML

    Publication Year: 2010, Page(s):31 - 34
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1290 KB) | HTML iconHTML

    In manufacturing, a good workshop tool management system (WTMS) plays an important role for enterprise production planning system & the use of equipment capacity. By using Unified Modeling Language (UML), based on Use Case Diagram, Static Structure Diagrams, and Dynamic Behavior Diagram, the functional demands of workshop tool management system are analyzed. Thus the workshop tool management s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The impact of TQM and interactivity on retention process in CRM context

    Publication Year: 2010, Page(s):35 - 38
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (896 KB) | HTML iconHTML

    Total quality management is one of the outstanding tools emerged to help companies enhance the effectiveness and mostly concentrated in customer gratification. It is absolutely compatible in customer relationship environment. Customer retention has been one of the most significant phenomena in the work setting. Today, companies are challenging with each other, not only to win the customers also to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network user dial-up behavior analysis

    Publication Year: 2010, Page(s):39 - 43
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1032 KB) | HTML iconHTML

    With the development of the Internet and network services, broadband user behavior tends to diversify. It is a rising challenge for the network operators to understand network user behavior. In this paper, we use the Postgres to sort the data records which are caught and extracted from the network monitoring equipment. Then we analyze the characteristics of the data by SPSS, such as login time, lo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of laboratory management information system based on WEB

    Publication Year: 2010, Page(s):44 - 46
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (304 KB) | HTML iconHTML

    Based on the high-vocational colleges laboratory status quo, this paper proposes the corresponding solution to design laboratory information management system by information technology, given the design, and described the design used by some specific techniques and methods. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study of engineering insurance market on hydropower project based on the theory of information asymmetries

    Publication Year: 2010, Page(s):47 - 49
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (448 KB) | HTML iconHTML

    It is the basis that the sound development of hydropower engineering insurance market is for improving hydropower construction. Therefore, it is of great significance to focus on main participants' strategies. In this paper, it is that the information asymmetry of main participants in hydropower engineering insurance market can be described in detail. Furthermore, incomplete information static gam... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Notice of Retraction
    The applicable scope and objects of government accounting in public finance system

    Publication Year: 2010, Page(s):50 - 51
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (266 KB) | HTML iconHTML

    Notice of RetractionAfter careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.We hereby retract the content of this paper. Reasonable effort should be made to remove all past references to this paper.The presenting author of this paper has the option ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Notice of Retraction
    A study on financial-rights allocation under the financial crisis condition: Some new perspectives

    Publication Year: 2010, Page(s):52 - 54
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (278 KB) | HTML iconHTML

    Notice of RetractionAfter careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.We hereby retract the content of this paper. Reasonable effort should be made to remove all past references to this paper.The presenting author of this paper has the option ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A P2P-Botnet detection model and algorithms based on network streams analysis

    Publication Year: 2010, Page(s):55 - 58
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (737 KB) | HTML iconHTML

    Aimed at the situation that it is difficult to detect the peer-to-peer (P2P) botnet, we provide a new method for detection based on the analysis network streams. Firstly, because the P2P streams reveal the characteristics of paroxysm and distribution, we can filtrate them with streams feature for our targets to analyze. Then, according to the cohesion in a P2P network, we can figure out the set of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research and design of a high performance GPS vehicle monitoring system

    Publication Year: 2010, Page(s):59 - 62
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (656 KB) | HTML iconHTML

    According to the defects of the GPS vehicle monitor system in the present market,a high concurrent and real-time GPS vehicle monitoring system is proposed. The entre system is based on a three-layer framework:the terminals,the interim database server,and the monitoring workstation. The monitor workstation is based on the MAPX platform,and the database server communicates with terminals through GPR... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An investigation into berth and quay crane scheduling for container terminals based on knowledge

    Publication Year: 2010, Page(s):63 - 66
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1090 KB) | HTML iconHTML

    Berth and quay crane scheduling is one of the most complex parts in container terminal operations, which significantly affects the operational efficiency, energy consumption and operational cost of the entire container terminal. Therefore, it is necessary to develop an efficient berth and quay crane scheduling strategy from the perspective of knowledge, which aims at saving energy consumption and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bulk terminal stockpile automatic modeling based on 3D scanning technology

    Publication Year: 2010, Page(s):67 - 70
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (890 KB) | HTML iconHTML

    The operation efficiency of bulk terminal yard depends on several factors, among which the geometry parameter of stockpile is the most crucial one. Because of the random change of stockpile shape caused by the mechanical operation, it is difficult to implement the real-time operation scheduling by offline calculating. In this study, the bulk stockpile automatic modeling based on the 3D scanning te... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Notice of Retraction
    Research of personnel executives occupational mobility

    Publication Year: 2010, Page(s):71 - 74
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (793 KB) | HTML iconHTML

    Notice of RetractionAfter careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.We hereby retract the content of this paper. Reasonable effort should be made to remove all past references to this paper.The presenting author of this paper has the option ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • To evaluate E-commercial technological innovation ability based on grey relational analysis model with balance factor

    Publication Year: 2010, Page(s):75 - 78
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (212 KB) | HTML iconHTML

    For the complexity of the process of E-commercial innovation, there is no uniform standard on how to measure E-commercial innovation at home and abroad. Evaluation of E-commercial innovation, however, is an important management tool in the process of E-commercial innovation. Therefore, the author introduces the Balanced Scorecard on the base of summarizing the research on E-commercial innovations ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Knowledge-enabled human resource development research based on case heterogeneity

    Publication Year: 2010, Page(s):79 - 82
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (359 KB) | HTML iconHTML

    The knowledge-enabled human resource development is to excavate human resources potentiality by the method and tool of information management, and create the capital value of intelligence through the optimization of the procedure of human resources development. This text probes into the heterogeneity identity characteristic directed against the staff, and heterogeneity human resources knowledge, t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.