This paper introduces the service-oriented architecture (SOA) and grid technology. SOA has the characteristic of loose coupling, easy to realize cross-application integration and achieve the complete separation of business and technology. Grid technology has the ability of using the geographical distribution resources on the Internet, provides users with information and application integration services and archives the full realization of information sharing.How to integrate SOA with Grid? According to the requirement of Water Resources domain, this paper designs the water resources grid based on SOA (WRGRID). First, we give the framework of WRGRID, and then explain it from three aspects: grid computing, grid storage and grid application. Finally, we describe the implementation of WRGRID at present, and discuss the future work.
{"title":"Research on Water Resources Grid Based on SOA","authors":"L. Tao, L. Meng, Zidan Chen, Deqing Chen","doi":"10.1109/FITME.2008.22","DOIUrl":"https://doi.org/10.1109/FITME.2008.22","url":null,"abstract":"This paper introduces the service-oriented architecture (SOA) and grid technology. SOA has the characteristic of loose coupling, easy to realize cross-application integration and achieve the complete separation of business and technology. Grid technology has the ability of using the geographical distribution resources on the Internet, provides users with information and application integration services and archives the full realization of information sharing.How to integrate SOA with Grid? According to the requirement of Water Resources domain, this paper designs the water resources grid based on SOA (WRGRID). First, we give the framework of WRGRID, and then explain it from three aspects: grid computing, grid storage and grid application. Finally, we describe the implementation of WRGRID at present, and discuss the future work.","PeriodicalId":218182,"journal":{"name":"2008 International Seminar on Future Information Technology and Management Engineering","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121846895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Benefiting from the development of network technology, applications based on distributed system become more and more popular. In these applications, different copies of data are always stored in different databases, so the data synchronization becomes very important. Firstly, this paper analyzes existing data synchronization technology. And then it describes the architecture and the major advantages of the Oracle streams mechanism that is provided in the Oracle9i database in detail. At last, it verifies the advantages of the Oracle steams by analyzing the test results of synchronous replication method, asynchronous replication method and Oracle streams method.
{"title":"Research on Data Synchronization in Oracle Distributed System","authors":"Hao Yan, X. Diao, Guo Jiang","doi":"10.1109/FITME.2008.127","DOIUrl":"https://doi.org/10.1109/FITME.2008.127","url":null,"abstract":"Benefiting from the development of network technology, applications based on distributed system become more and more popular. In these applications, different copies of data are always stored in different databases, so the data synchronization becomes very important. Firstly, this paper analyzes existing data synchronization technology. And then it describes the architecture and the major advantages of the Oracle streams mechanism that is provided in the Oracle9i database in detail. At last, it verifies the advantages of the Oracle steams by analyzing the test results of synchronous replication method, asynchronous replication method and Oracle streams method.","PeriodicalId":218182,"journal":{"name":"2008 International Seminar on Future Information Technology and Management Engineering","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114768988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Performance assessment is an important component of enterprisespsila strategy implementation and control. This paper proposed an E-commerce performance assessment method based on the D-S theory and the Balanced Score Card (BSC) method. With the BSC method, this paper analyzes the primary factors which should be considered to assess an E-commerce companypsilas performance from four aspects: the enterprise operating ability, the exterior customer relations, the Staff's growth degree and the financial aspects. Also, this paper establishes the E-commerce performance assessment indicator system, and then establishes the performance assessment inference model with D-S theory method. Finally, this paper proves this methodpsilas usability through an example analysis.
{"title":"E-commerce Performance Assessment Research Based on the D-S Theory and the Balanced Score Card Method","authors":"Peide Liu, Zhengwei Du","doi":"10.1109/FITME.2008.149","DOIUrl":"https://doi.org/10.1109/FITME.2008.149","url":null,"abstract":"Performance assessment is an important component of enterprisespsila strategy implementation and control. This paper proposed an E-commerce performance assessment method based on the D-S theory and the Balanced Score Card (BSC) method. With the BSC method, this paper analyzes the primary factors which should be considered to assess an E-commerce companypsilas performance from four aspects: the enterprise operating ability, the exterior customer relations, the Staff's growth degree and the financial aspects. Also, this paper establishes the E-commerce performance assessment indicator system, and then establishes the performance assessment inference model with D-S theory method. Finally, this paper proves this methodpsilas usability through an example analysis.","PeriodicalId":218182,"journal":{"name":"2008 International Seminar on Future Information Technology and Management Engineering","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130706708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This article has estimated the stochastic frontier production function of grain farming through building a parallel data model. It has divided the growth source of grain output into factor input, technical progress and technical efficiency. The research indicates that the growth of the grain output in Hubei during the period from 1980-2005 mainly derived from agricultural technical, following was the improvement of technical efficiency, and the 3rd was the input of material expenditure. Another was also found that the lower technical efficiency suffered from the insufficient derived demand of the technology substituting for labor, Hubei grain farmers are not ldquopoor but efficientrdquo.
{"title":"Research on the Source of Grain Output Growth Based on SFA Model","authors":"Yu Zhao, Yu Zhang, Chunjie Qi","doi":"10.1109/FITME.2008.37","DOIUrl":"https://doi.org/10.1109/FITME.2008.37","url":null,"abstract":"This article has estimated the stochastic frontier production function of grain farming through building a parallel data model. It has divided the growth source of grain output into factor input, technical progress and technical efficiency. The research indicates that the growth of the grain output in Hubei during the period from 1980-2005 mainly derived from agricultural technical, following was the improvement of technical efficiency, and the 3rd was the input of material expenditure. Another was also found that the lower technical efficiency suffered from the insufficient derived demand of the technology substituting for labor, Hubei grain farmers are not ldquopoor but efficientrdquo.","PeriodicalId":218182,"journal":{"name":"2008 International Seminar on Future Information Technology and Management Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130827228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Technological innovation diffusion refers to the continuous promotion and application for new technology after the earliest commercialization, that is, new technology is spread and promoted among potential adopters. Technological innovation diffusion is an important part of technological innovation and the critical link of technological improvement as well. General model of technological innovation diffusion explains the development of new technology diffusion by S-type logic curve. It always only studies technological system itself. In this article, the author attempts to use differential equation to describe the characteristic of technological innovation diffusion, viscidity among enterprises from the microcosmic angle, then he sets up the dynamics model of technological innovation diffusion on the basis of complete consideration on the mutual relationship between technology and environment. It is meaningful for the development of technological innovation and enterprises to learn from each other to some extent.
{"title":"A Study on Viscidity and Dynamics Model of Technological Innovation Diffusion","authors":"Huang Wei","doi":"10.1109/FITME.2008.8","DOIUrl":"https://doi.org/10.1109/FITME.2008.8","url":null,"abstract":"Technological innovation diffusion refers to the continuous promotion and application for new technology after the earliest commercialization, that is, new technology is spread and promoted among potential adopters. Technological innovation diffusion is an important part of technological innovation and the critical link of technological improvement as well. General model of technological innovation diffusion explains the development of new technology diffusion by S-type logic curve. It always only studies technological system itself. In this article, the author attempts to use differential equation to describe the characteristic of technological innovation diffusion, viscidity among enterprises from the microcosmic angle, then he sets up the dynamics model of technological innovation diffusion on the basis of complete consideration on the mutual relationship between technology and environment. It is meaningful for the development of technological innovation and enterprises to learn from each other to some extent.","PeriodicalId":218182,"journal":{"name":"2008 International Seminar on Future Information Technology and Management Engineering","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125518478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
For horizontal conflict of marketing channel, this paper has studied the main triggers of channel memberspsila conflict by game theory. The main triggers include the revenue, cost, incentive and punitive mechanisms. The research model is ldquoPrisoner's Dilemmardquo and ldquoNASH Equilibrium Solutionrdquo. Through analyzing the causes of transshipment phenomenon, this paper gave some control measures and solutions.
{"title":"Marketing Channel Horizontal Conflicts and Countermeasures Discussion Based on Game Theory","authors":"Longwen Zhao, Y. Long","doi":"10.1109/FITME.2008.41","DOIUrl":"https://doi.org/10.1109/FITME.2008.41","url":null,"abstract":"For horizontal conflict of marketing channel, this paper has studied the main triggers of channel memberspsila conflict by game theory. The main triggers include the revenue, cost, incentive and punitive mechanisms. The research model is ldquoPrisoner's Dilemmardquo and ldquoNASH Equilibrium Solutionrdquo. Through analyzing the causes of transshipment phenomenon, this paper gave some control measures and solutions.","PeriodicalId":218182,"journal":{"name":"2008 International Seminar on Future Information Technology and Management Engineering","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132448079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Evaluation and management of operational risk has received significant attention as the operational risk extends its influence to the bank industry increasingly. In order to overcome the limit that commercial banks of China are lack of internal loss data, a frame, using an uncertain linguistic term set, based on risk event type as well as the business unit is set up to evaluate the operational risk in commercial bank. UEOWA operator is applied to aggregate the linguistic information which uses an interval form to express some fuzzy indices that are difficult to quantify directly. Then a complete process for evaluating operational risk is introduced. Finally, an example shows that the proposed frame and methods are useful and exercisable.
{"title":"Research on Operational Risk Evaluation of Commercial Bank with Incomplete and Linguistic Information","authors":"Qian Chen, Jinlin Li, Lun Ran","doi":"10.1109/FITME.2008.15","DOIUrl":"https://doi.org/10.1109/FITME.2008.15","url":null,"abstract":"Evaluation and management of operational risk has received significant attention as the operational risk extends its influence to the bank industry increasingly. In order to overcome the limit that commercial banks of China are lack of internal loss data, a frame, using an uncertain linguistic term set, based on risk event type as well as the business unit is set up to evaluate the operational risk in commercial bank. UEOWA operator is applied to aggregate the linguistic information which uses an interval form to express some fuzzy indices that are difficult to quantify directly. Then a complete process for evaluating operational risk is introduced. Finally, an example shows that the proposed frame and methods are useful and exercisable.","PeriodicalId":218182,"journal":{"name":"2008 International Seminar on Future Information Technology and Management Engineering","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133980327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mobile ad hoc networks are collection of wireless mobile nodes forming a temporary network without the aid of any established infrastructure. Security issues are more paramount in such networks even more so than in wired networks. Despite the existence of well-known security mechanisms, additional vulnerabilities and features pertinent to this new networking paradigm might render the traditional solutions inapplicable. In particular these networks are extremely under threat to insider attacks especially packet dropping attacks. It is very difficult to detect such attacks because they comes in the category of attacks in mobile ad hoc networks in which the attacker nodes becomes the part of the network. In this paper we have proposed a two folded approach, to detect and then to isolate such nodes which become the part of the network to cause packet dropping attacks. First approach will detect the misbehavior of nodes and will identify the malicious activity in network, and then upon identification of nodes misbehavior in network other approach will isolate the malicious node from network.
{"title":"Adding Security against Packet Dropping Attack in Mobile Ad Hoc Networks","authors":"M. Zeshan, S.A. Khan, A. R. Cheema, A. Ahmed","doi":"10.1109/FITME.2008.159","DOIUrl":"https://doi.org/10.1109/FITME.2008.159","url":null,"abstract":"Mobile ad hoc networks are collection of wireless mobile nodes forming a temporary network without the aid of any established infrastructure. Security issues are more paramount in such networks even more so than in wired networks. Despite the existence of well-known security mechanisms, additional vulnerabilities and features pertinent to this new networking paradigm might render the traditional solutions inapplicable. In particular these networks are extremely under threat to insider attacks especially packet dropping attacks. It is very difficult to detect such attacks because they comes in the category of attacks in mobile ad hoc networks in which the attacker nodes becomes the part of the network. In this paper we have proposed a two folded approach, to detect and then to isolate such nodes which become the part of the network to cause packet dropping attacks. First approach will detect the misbehavior of nodes and will identify the malicious activity in network, and then upon identification of nodes misbehavior in network other approach will isolate the malicious node from network.","PeriodicalId":218182,"journal":{"name":"2008 International Seminar on Future Information Technology and Management Engineering","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130941376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Most software development projects confront great risks and risks might occur in the whole development process. Success of the projects demands effective management of the risks. Five main reasons are analyzed for a complete and clear understanding of the risks. The reasons include the use of new and unproven technologies, system requirements, system architecture, system performance, and organizational or non-functional affairs. The risks can be avoided, confined, mitigated and monitored under effective management. software development project risk management should focus on reduction and prevention of risks, continuously assess possible problems, define potential risks, determine what risks are important and deal with them. Four steps and three countermeasures are put forward to cope with various risks in software development projects. The steps are risk identification, assessing the level of exposure for each risk, risk mitigation and risk conclusion. The countermeasures are careful, typical and flexible countermeasures.
{"title":"A Study of Software Development Project Risk Management","authors":"Ye Tao","doi":"10.1109/FITME.2008.125","DOIUrl":"https://doi.org/10.1109/FITME.2008.125","url":null,"abstract":"Most software development projects confront great risks and risks might occur in the whole development process. Success of the projects demands effective management of the risks. Five main reasons are analyzed for a complete and clear understanding of the risks. The reasons include the use of new and unproven technologies, system requirements, system architecture, system performance, and organizational or non-functional affairs. The risks can be avoided, confined, mitigated and monitored under effective management. software development project risk management should focus on reduction and prevention of risks, continuously assess possible problems, define potential risks, determine what risks are important and deal with them. Four steps and three countermeasures are put forward to cope with various risks in software development projects. The steps are risk identification, assessing the level of exposure for each risk, risk mitigation and risk conclusion. The countermeasures are careful, typical and flexible countermeasures.","PeriodicalId":218182,"journal":{"name":"2008 International Seminar on Future Information Technology and Management Engineering","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132395681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Word of Mouth (WOM) has been extensively studied as persuasive communication but it has seldom been studied as diffusive communication. This study focuses on online WOM as diffusive communication and the accompanying associated ripple effect by examining the informationpsilas quality, authenticity, authority, and interestingness. It also investigates how a participantpsilas opinion leadership and seeking propensities influence consumerpsilas online WOM activities. Our results show that all of the four WOM information dimensions have a positive effect on a transmitterpsilas level of acceptance of WOM, which in turn positively affects the transmitterpsilas sharing intention. This study indicates that in computer-mediated environments opinion seekers are more likely to be transmitter.
{"title":"People as Transmitters: What Makes an Online Marketing Message Contagious?","authors":"Xuesong Huang, Maohong Liu, Minxue Huang","doi":"10.1109/FITME.2008.71","DOIUrl":"https://doi.org/10.1109/FITME.2008.71","url":null,"abstract":"Word of Mouth (WOM) has been extensively studied as persuasive communication but it has seldom been studied as diffusive communication. This study focuses on online WOM as diffusive communication and the accompanying associated ripple effect by examining the informationpsilas quality, authenticity, authority, and interestingness. It also investigates how a participantpsilas opinion leadership and seeking propensities influence consumerpsilas online WOM activities. Our results show that all of the four WOM information dimensions have a positive effect on a transmitterpsilas level of acceptance of WOM, which in turn positively affects the transmitterpsilas sharing intention. This study indicates that in computer-mediated environments opinion seekers are more likely to be transmitter.","PeriodicalId":218182,"journal":{"name":"2008 International Seminar on Future Information Technology and Management Engineering","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132554093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}