Pub Date : 2010-07-23DOI: 10.1109/IEEC.2010.5533211
Na Wei, Bo Zhang
The emergence and development of the Internet provides a new means of securities trading and stock subscription channels for investors, at the same time, it provides better facility for investors. Brokers can make use of Internet to analyze the customer's investment preferences and trading habits, they could provide personalized service according to the customer's situation. What's more, they can also carry out marketing activities on the Internet and develop more customers. In the long run, the keys of securities companies develop an online securities business is to build Internet trading platform, do human resource training and development, establish online stock broker online trading system, all these aspects could build innovation system.
{"title":"Construction of China's Securities Brokerage Business Online Transactions Innovation System","authors":"Na Wei, Bo Zhang","doi":"10.1109/IEEC.2010.5533211","DOIUrl":"https://doi.org/10.1109/IEEC.2010.5533211","url":null,"abstract":"The emergence and development of the Internet provides a new means of securities trading and stock subscription channels for investors, at the same time, it provides better facility for investors. Brokers can make use of Internet to analyze the customer's investment preferences and trading habits, they could provide personalized service according to the customer's situation. What's more, they can also carry out marketing activities on the Internet and develop more customers. In the long run, the keys of securities companies develop an online securities business is to build Internet trading platform, do human resource training and development, establish online stock broker online trading system, all these aspects could build innovation system.","PeriodicalId":307678,"journal":{"name":"2010 2nd International Symposium on Information Engineering and Electronic Commerce","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115305341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1109/IEEC.2010.5533299
Wangfei Zhang, JianGuo Gao
HTTP agreement is stateless and we often agree that Web Services are stateless entities, but the state is very important for us, the problem how to realize the orderly Web Services need to be solved in time. WFRS (Web Services Resource Framework) give us a way to solve this problem. WSRF (Web Services Resource Framework) is the specification which is describes the relationship between the "state" resource and the Web Services. It is the integration of grid technology with Web Services. In this paper, with the study of the implemented principle we introduced the way of modeling using Web Services Resource. As an example, we explored WSRF.net as the basic platform of the Web Services and realized the process of WSRF implementation. The Web Service registering, publishing, inquiring and using were implemented on this platform. A new method of implement of Web Services was provided by our WSRF-based and Grid-supported platform in this paper.
{"title":"Research and Implementation of WSRF Based on Web Services","authors":"Wangfei Zhang, JianGuo Gao","doi":"10.1109/IEEC.2010.5533299","DOIUrl":"https://doi.org/10.1109/IEEC.2010.5533299","url":null,"abstract":"HTTP agreement is stateless and we often agree that Web Services are stateless entities, but the state is very important for us, the problem how to realize the orderly Web Services need to be solved in time. WFRS (Web Services Resource Framework) give us a way to solve this problem. WSRF (Web Services Resource Framework) is the specification which is describes the relationship between the \"state\" resource and the Web Services. It is the integration of grid technology with Web Services. In this paper, with the study of the implemented principle we introduced the way of modeling using Web Services Resource. As an example, we explored WSRF.net as the basic platform of the Web Services and realized the process of WSRF implementation. The Web Service registering, publishing, inquiring and using were implemented on this platform. A new method of implement of Web Services was provided by our WSRF-based and Grid-supported platform in this paper.","PeriodicalId":307678,"journal":{"name":"2010 2nd International Symposium on Information Engineering and Electronic Commerce","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123431237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1109/IEEC.2010.5533188
Hong Li, Zhang He
ZigBee is a low-rate control network communication protocols which designed for the wireless sensor networks with low power consumption, low cost, low complexity, safety and reliability characteristics, and thus have a broad market prospect. ZigBee PHY layer and MAC layer protocol used IEEE802.15.4. This paper analyses the function of MAC layer in IEEE 802.15.4, introduces the process of design and realize of hardware and software co-design of MAC controller in Zigbee chip, put emphasis on consideration of low cost and low consumption.
{"title":"The Realization of MAC Controller in Zigbee Chip","authors":"Hong Li, Zhang He","doi":"10.1109/IEEC.2010.5533188","DOIUrl":"https://doi.org/10.1109/IEEC.2010.5533188","url":null,"abstract":"ZigBee is a low-rate control network communication protocols which designed for the wireless sensor networks with low power consumption, low cost, low complexity, safety and reliability characteristics, and thus have a broad market prospect. ZigBee PHY layer and MAC layer protocol used IEEE802.15.4. This paper analyses the function of MAC layer in IEEE 802.15.4, introduces the process of design and realize of hardware and software co-design of MAC controller in Zigbee chip, put emphasis on consideration of low cost and low consumption.","PeriodicalId":307678,"journal":{"name":"2010 2nd International Symposium on Information Engineering and Electronic Commerce","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125542999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1109/IEEC.2010.5533227
Xin Ma
The downstream nodes only compare the cost of inventory with the cost of stock to determine the optimal volume without considering the quality risk in the traditional supply chain. In fact in the whole supply chain, some intermediate products with quality defects will have a significant impact on each supply chain node and the entire supply chain operations and gains. Both cases of cooperation and non-cooperation between upstream and downstream nodes in food supply chain considering qualitative factors are discussed in this paper, and The both sides will select a conservative approach to reduce the order quantity in order to reduce the loss, and at the same time they will need to bear the risk of quality loss together. The overall benefit of the supply chain under the cooperation is the largest, but this time the effectiveness of each individual company may not be optimal.
{"title":"Game Analysis on Trading Volume between Nodes in Food Supply Chain Considering the Quality Risk","authors":"Xin Ma","doi":"10.1109/IEEC.2010.5533227","DOIUrl":"https://doi.org/10.1109/IEEC.2010.5533227","url":null,"abstract":"The downstream nodes only compare the cost of inventory with the cost of stock to determine the optimal volume without considering the quality risk in the traditional supply chain. In fact in the whole supply chain, some intermediate products with quality defects will have a significant impact on each supply chain node and the entire supply chain operations and gains. Both cases of cooperation and non-cooperation between upstream and downstream nodes in food supply chain considering qualitative factors are discussed in this paper, and The both sides will select a conservative approach to reduce the order quantity in order to reduce the loss, and at the same time they will need to bear the risk of quality loss together. The overall benefit of the supply chain under the cooperation is the largest, but this time the effectiveness of each individual company may not be optimal.","PeriodicalId":307678,"journal":{"name":"2010 2nd International Symposium on Information Engineering and Electronic Commerce","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123010133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1109/IEEC.2010.5533187
Hong Li, Ouyang Yong, Zhangqing He
Wireless sensor network node as the most important member of the whole network, has some specious characteristics such as small size, low-power consumption, limited capacity of storage and communication and so on, the node design is essential. This paper proposes a wireless sensor network nodes design scheme based on 51 core MPU and the CC2420 RF transceiver chip,introduces the design process of the node's hardware and software. Through the expansion and secondary development of applications, Users can easily build the required application system.
{"title":"The Design of Embedded Wireless Sensor Network Node","authors":"Hong Li, Ouyang Yong, Zhangqing He","doi":"10.1109/IEEC.2010.5533187","DOIUrl":"https://doi.org/10.1109/IEEC.2010.5533187","url":null,"abstract":"Wireless sensor network node as the most important member of the whole network, has some specious characteristics such as small size, low-power consumption, limited capacity of storage and communication and so on, the node design is essential. This paper proposes a wireless sensor network nodes design scheme based on 51 core MPU and the CC2420 RF transceiver chip,introduces the design process of the node's hardware and software. Through the expansion and secondary development of applications, Users can easily build the required application system.","PeriodicalId":307678,"journal":{"name":"2010 2nd International Symposium on Information Engineering and Electronic Commerce","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117000295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1109/IEEC.2010.5533219
Siyu Gan, C. Gu, Xueqin Zhang
With the rapid development of E-Business systems, the technology of distributed services and security becomes research focus in the field of Internet based applications. The distributed E-Business application platform has strong security requirements and specific demands on secure user authentication. After analyzing the distributed authentication protocol and public key infrastructure (PKI), a method for distributed E-Business application authentication using public key cryptography is introduced in this paper. By distributing most of the authentication workload away from the trusted intermediary and to the communicating parties, significant enhancements to security and scalability can be achieved.
{"title":"A PKI-Based Authentication Approach for E-Business Systems","authors":"Siyu Gan, C. Gu, Xueqin Zhang","doi":"10.1109/IEEC.2010.5533219","DOIUrl":"https://doi.org/10.1109/IEEC.2010.5533219","url":null,"abstract":"With the rapid development of E-Business systems, the technology of distributed services and security becomes research focus in the field of Internet based applications. The distributed E-Business application platform has strong security requirements and specific demands on secure user authentication. After analyzing the distributed authentication protocol and public key infrastructure (PKI), a method for distributed E-Business application authentication using public key cryptography is introduced in this paper. By distributing most of the authentication workload away from the trusted intermediary and to the communicating parties, significant enhancements to security and scalability can be achieved.","PeriodicalId":307678,"journal":{"name":"2010 2nd International Symposium on Information Engineering and Electronic Commerce","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128497784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1109/IEEC.2010.5533210
Chunmiao Yuan, Qingyong Yang
The paper proposes a peer-to-peer solution for video surveillance system which decreases the transmission pressure of server significantly through one client receives video stream and then forwards them to other clients at the same time. The system model and the establishing algorithm of forwarding tree are described and the analysis of how to improve the performance of the system is also discussed.
{"title":"Study on Peer-to-Peer in Video Surveillance System","authors":"Chunmiao Yuan, Qingyong Yang","doi":"10.1109/IEEC.2010.5533210","DOIUrl":"https://doi.org/10.1109/IEEC.2010.5533210","url":null,"abstract":"The paper proposes a peer-to-peer solution for video surveillance system which decreases the transmission pressure of server significantly through one client receives video stream and then forwards them to other clients at the same time. The system model and the establishing algorithm of forwarding tree are described and the analysis of how to improve the performance of the system is also discussed.","PeriodicalId":307678,"journal":{"name":"2010 2nd International Symposium on Information Engineering and Electronic Commerce","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128761779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1109/IEEC.2010.5533288
L. Gao, Lan Wei, Bo Zhang
Based on the time serial method, this paper makes quantitative analysis on foreign direct investment(FDI) and imports and exports of the eastern and western regions. The result shows that the contribution elasticity of accumulated amount of FDI to exports of the eastern region is higher than that of the western region. The western region should pay attention to upgrade the opening level, and increase the attraction of FDI and policy support.
{"title":"Empirical Analysis on Foreign Direct Investment and Imports and Exports in the Eastern and Western Regions","authors":"L. Gao, Lan Wei, Bo Zhang","doi":"10.1109/IEEC.2010.5533288","DOIUrl":"https://doi.org/10.1109/IEEC.2010.5533288","url":null,"abstract":"Based on the time serial method, this paper makes quantitative analysis on foreign direct investment(FDI) and imports and exports of the eastern and western regions. The result shows that the contribution elasticity of accumulated amount of FDI to exports of the eastern region is higher than that of the western region. The western region should pay attention to upgrade the opening level, and increase the attraction of FDI and policy support.","PeriodicalId":307678,"journal":{"name":"2010 2nd International Symposium on Information Engineering and Electronic Commerce","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129049558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1109/IEEC.2010.5533241
Xianglei Zhao, Houkuan Huang, Chong Shao
Supply chain management has become a very important economic topic. In this paper, we use multi-agent system to solve this problem. But how to control the supply chain links in the various details and how to manage the supply chain optimization effectively is a very difficult issue. We use ant colony optimization algorithm and rational multi-agent model of supply chain management to solve the supply chain management problem effectively. The experiment shows this method is better than normal method.
{"title":"Research on Supply Chain Management Using Multi-Agent System Based on Ant Colony Algorithm","authors":"Xianglei Zhao, Houkuan Huang, Chong Shao","doi":"10.1109/IEEC.2010.5533241","DOIUrl":"https://doi.org/10.1109/IEEC.2010.5533241","url":null,"abstract":"Supply chain management has become a very important economic topic. In this paper, we use multi-agent system to solve this problem. But how to control the supply chain links in the various details and how to manage the supply chain optimization effectively is a very difficult issue. We use ant colony optimization algorithm and rational multi-agent model of supply chain management to solve the supply chain management problem effectively. The experiment shows this method is better than normal method.","PeriodicalId":307678,"journal":{"name":"2010 2nd International Symposium on Information Engineering and Electronic Commerce","volume":"80 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116356113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1109/IEEC.2010.5533230
Guoshi Wang, Qiang Li, Lejiang Guo
Aiming at solving the problems of unsatisfactory routes planning that are suboptimal to optimal routes planning and dissatisfactory real time routes planning and routes planning of multiple unmanned aerial vehicles (UAVs) cooperation, a cost function of multiple UAVs routes planning is presented after modeling the primary factors influencing on multiple UAVs route planning. Then, Based on particle swarm optimization (PSO) algorithm, this paper presents the approaches of static three-dimensional routes planning and dynamic three-dimensional routes planning for multiple UAVs cooperation. The approaches can also be used to plan a single UAV route. Using these approaches, an emluator is designed and some experiments are made, and the results demonstrate that the approaches can satisfy the requests of the multiple UAVs routes planning.
{"title":"Multiple UAVs Routes Planning Based on Particle Swarm Optimization Algorithm","authors":"Guoshi Wang, Qiang Li, Lejiang Guo","doi":"10.1109/IEEC.2010.5533230","DOIUrl":"https://doi.org/10.1109/IEEC.2010.5533230","url":null,"abstract":"Aiming at solving the problems of unsatisfactory routes planning that are suboptimal to optimal routes planning and dissatisfactory real time routes planning and routes planning of multiple unmanned aerial vehicles (UAVs) cooperation, a cost function of multiple UAVs routes planning is presented after modeling the primary factors influencing on multiple UAVs route planning. Then, Based on particle swarm optimization (PSO) algorithm, this paper presents the approaches of static three-dimensional routes planning and dynamic three-dimensional routes planning for multiple UAVs cooperation. The approaches can also be used to plan a single UAV route. Using these approaches, an emluator is designed and some experiments are made, and the results demonstrate that the approaches can satisfy the requests of the multiple UAVs routes planning.","PeriodicalId":307678,"journal":{"name":"2010 2nd International Symposium on Information Engineering and Electronic Commerce","volume":"57 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113978601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}