Pub Date : 2010-07-23DOI: 10.1109/IEEC.2010.5533240
Zheng Liu, Hai Zhao, Qian Zhang
According to the research progress of software networks in these years, the software structural networks show the same characteristics with complex networks and the software topological structure has an effect on the quality characteristics of software systems. The research work begins with the statistics analysis of three characteristic values, which can reflect the efficiency, complexity and orderliness of software systems separately, of 500 open source software systems. Then D(AP), D(AD) and D(E) are presented for measuring the quality characteristics of software systems refer to the definition of deviation of characteristic value and quality characteristics relative to software scale. By testing on seven Linux kernels of different versions, the metrics on software networks based on deviation of characteristic values is validated effective.
{"title":"Metrics on Software Networks Based on Deviation of Characteristic Values","authors":"Zheng Liu, Hai Zhao, Qian Zhang","doi":"10.1109/IEEC.2010.5533240","DOIUrl":"https://doi.org/10.1109/IEEC.2010.5533240","url":null,"abstract":"According to the research progress of software networks in these years, the software structural networks show the same characteristics with complex networks and the software topological structure has an effect on the quality characteristics of software systems. The research work begins with the statistics analysis of three characteristic values, which can reflect the efficiency, complexity and orderliness of software systems separately, of 500 open source software systems. Then D(AP), D(AD) and D(E) are presented for measuring the quality characteristics of software systems refer to the definition of deviation of characteristic value and quality characteristics relative to software scale. By testing on seven Linux kernels of different versions, the metrics on software networks based on deviation of characteristic values is validated effective.","PeriodicalId":307678,"journal":{"name":"2010 2nd International Symposium on Information Engineering and Electronic Commerce","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130564772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1109/IEEC.2010.5533309
Xiaoqin Yuan
The top priority of English teaching reform for newly up-graded universities lies in the cultivation of learner autonomy. Effective teaching model should be based on the guiding principle of teaching students in accordance with their aptitude and the individualization of automatic learning supplemented with guidance from the teacher. Individual students provided with internet-study platform can work out their study plans and goals according to their particularity and needs. The ultimate purpose of this teaching code and model is to achieve learner autonomy in networked teaching, enhance students' English proficiency and develop learner autonomy.
{"title":"An Empirical Study on Students' Individualized Learning Based on Network Teaching in Newly-Upgraded University","authors":"Xiaoqin Yuan","doi":"10.1109/IEEC.2010.5533309","DOIUrl":"https://doi.org/10.1109/IEEC.2010.5533309","url":null,"abstract":"The top priority of English teaching reform for newly up-graded universities lies in the cultivation of learner autonomy. Effective teaching model should be based on the guiding principle of teaching students in accordance with their aptitude and the individualization of automatic learning supplemented with guidance from the teacher. Individual students provided with internet-study platform can work out their study plans and goals according to their particularity and needs. The ultimate purpose of this teaching code and model is to achieve learner autonomy in networked teaching, enhance students' English proficiency and develop learner autonomy.","PeriodicalId":307678,"journal":{"name":"2010 2nd International Symposium on Information Engineering and Electronic Commerce","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129590585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1109/IEEC.2010.5533280
Lili Dong, C. Xue, Guohua Li
In order to overcome traditional genetic algorithm (GA)'s deficiency of slow convergence, and Niche algorithm's too fast convergence, this paper presents a new Improved Immune Genetic Algorithm (IIGA) based on the improved Niche algorithm. Firstly, the improved Niche algorithm, including convergence function, and "noise" chromosome, is given. Then based on the proposed flowchart of IIGA, the steps of the algorithm are introduced in detail. Finally, the IIGA is exemplified, and proved to be feasible and effective by comparing with self-adaptive Genetic Algorithm(SAGA) and traditional GA.
{"title":"An Improved Immune Genetic Algorithm Based on Niche Algorithm and Its Application","authors":"Lili Dong, C. Xue, Guohua Li","doi":"10.1109/IEEC.2010.5533280","DOIUrl":"https://doi.org/10.1109/IEEC.2010.5533280","url":null,"abstract":"In order to overcome traditional genetic algorithm (GA)'s deficiency of slow convergence, and Niche algorithm's too fast convergence, this paper presents a new Improved Immune Genetic Algorithm (IIGA) based on the improved Niche algorithm. Firstly, the improved Niche algorithm, including convergence function, and \"noise\" chromosome, is given. Then based on the proposed flowchart of IIGA, the steps of the algorithm are introduced in detail. Finally, the IIGA is exemplified, and proved to be feasible and effective by comparing with self-adaptive Genetic Algorithm(SAGA) and traditional GA.","PeriodicalId":307678,"journal":{"name":"2010 2nd International Symposium on Information Engineering and Electronic Commerce","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125915267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1109/IEEC.2010.5533283
Zhuomin Shi, Ichiro Furukawa, Chunji Jin, Li Zhu
As a complex social and psychological phenomenon, MIANZI, Known as Chinese face, has attracted much attention in the field of sociology and psychology. But in the field of marketing, research on how MIANZI (FACE) affecting consumer behavior is not abundant. Moreover, research on the connotations of sub-dimension of MIANZI (FACE), that is, LIAN and MIAN as well as their influences on consumer behavior is seldom seen. By using open-ended and close-ended questionnaire and focus group interview, this study extracts hundreds of scenario sentences of LIAN and MIAN, initially forming a preliminary scale with 14 positive items and 20 negative items concerning with LIAN and MIAN. Studies validate the discrepancy between "FACE"(MIANZI) and "LIAN". Moreover, the discrepancy between "FACE"(MIANZI) and "LIAN" also appears in consumer perception about product category and Country-of-Origin Image. In respect to product category buying behavior, in which automobile ranks the first place affected by face, followed by cosmetics, milk is the least-affected in this study; In addition, there is significant discrepancy in the cognition of LIAN and MIAN on Country of Origin Image. As for automobile buying behavior, Buying German car is regarded as the most face-earning behavior; Buying Japanese car is regarded as LIAN-losing (shameful) but face-earning (graceful) behavior; Buying Chinese car is somehow considered as purchase of no-face but having- LIAN.
{"title":"Chinese Face: MIANZI and LIAN: And Their Influence on Chinese Consumer Behavior","authors":"Zhuomin Shi, Ichiro Furukawa, Chunji Jin, Li Zhu","doi":"10.1109/IEEC.2010.5533283","DOIUrl":"https://doi.org/10.1109/IEEC.2010.5533283","url":null,"abstract":"As a complex social and psychological phenomenon, MIANZI, Known as Chinese face, has attracted much attention in the field of sociology and psychology. But in the field of marketing, research on how MIANZI (FACE) affecting consumer behavior is not abundant. Moreover, research on the connotations of sub-dimension of MIANZI (FACE), that is, LIAN and MIAN as well as their influences on consumer behavior is seldom seen. By using open-ended and close-ended questionnaire and focus group interview, this study extracts hundreds of scenario sentences of LIAN and MIAN, initially forming a preliminary scale with 14 positive items and 20 negative items concerning with LIAN and MIAN. Studies validate the discrepancy between \"FACE\"(MIANZI) and \"LIAN\". Moreover, the discrepancy between \"FACE\"(MIANZI) and \"LIAN\" also appears in consumer perception about product category and Country-of-Origin Image. In respect to product category buying behavior, in which automobile ranks the first place affected by face, followed by cosmetics, milk is the least-affected in this study; In addition, there is significant discrepancy in the cognition of LIAN and MIAN on Country of Origin Image. As for automobile buying behavior, Buying German car is regarded as the most face-earning behavior; Buying Japanese car is regarded as LIAN-losing (shameful) but face-earning (graceful) behavior; Buying Chinese car is somehow considered as purchase of no-face but having- LIAN.","PeriodicalId":307678,"journal":{"name":"2010 2nd International Symposium on Information Engineering and Electronic Commerce","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130084380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1109/IEEC.2010.5533306
Wei Dong
As a new type of media, with its unique way of carrying and spreading information and knowledge, Internet provides a rich quick and rich interactive platform for interpersonal communication. It has far-reaching impact on University students' thinking style, behavior patterns and value attitude; it also gravely challenges university's moral education work in our country at the same time, especially network honesty education for university students. Under the network circumstances, it is a decision-making process for students to choose to be honesty or not, in which students' protective value attitude will have direct impact on behavior choices. The most important purpose for establishment of honesty evaluation system is to provide an effective carrier for universities to develop network honesty education, so that there will be a better solution for university students' dishonesty problems. Hence, this article tries to establish a network honesty evaluation system bases on Cluster-Discriminate analysis model, to restrain and regulate students' behavior, so that the situation of lacking of honesty can be changed.
{"title":"An Empirical Research for Strengthening the Protection of University Students' Protective Value Attitude Bases on Clustering-Discriminant Analysis Model of Network Honesty Evaluation System","authors":"Wei Dong","doi":"10.1109/IEEC.2010.5533306","DOIUrl":"https://doi.org/10.1109/IEEC.2010.5533306","url":null,"abstract":"As a new type of media, with its unique way of carrying and spreading information and knowledge, Internet provides a rich quick and rich interactive platform for interpersonal communication. It has far-reaching impact on University students' thinking style, behavior patterns and value attitude; it also gravely challenges university's moral education work in our country at the same time, especially network honesty education for university students. Under the network circumstances, it is a decision-making process for students to choose to be honesty or not, in which students' protective value attitude will have direct impact on behavior choices. The most important purpose for establishment of honesty evaluation system is to provide an effective carrier for universities to develop network honesty education, so that there will be a better solution for university students' dishonesty problems. Hence, this article tries to establish a network honesty evaluation system bases on Cluster-Discriminate analysis model, to restrain and regulate students' behavior, so that the situation of lacking of honesty can be changed.","PeriodicalId":307678,"journal":{"name":"2010 2nd International Symposium on Information Engineering and Electronic Commerce","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131368011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1109/IEEC.2010.5533212
Wenjian Xing, Chang-Jong Wang
In the project of program development, it is a basic function to input data and display data. The development of a specific mode for data entry and display can be seen everywhere in the whole project. The difficulty of its development is also very simple. However, this method has poor adaptability. When a user's needs for the data change, developers need to amend the corresponding form surface, modify the source code to compile and distribute again, which will increase the workload of programs' maintenance. In this paper, through a Dynamic Creation of Controls technology, we achieve the dynamic data entry and display and enhance the adaptability of the program.ven in this document.
{"title":"The Research of Dynamic Creation of Controls Technology in Software Development","authors":"Wenjian Xing, Chang-Jong Wang","doi":"10.1109/IEEC.2010.5533212","DOIUrl":"https://doi.org/10.1109/IEEC.2010.5533212","url":null,"abstract":"In the project of program development, it is a basic function to input data and display data. The development of a specific mode for data entry and display can be seen everywhere in the whole project. The difficulty of its development is also very simple. However, this method has poor adaptability. When a user's needs for the data change, developers need to amend the corresponding form surface, modify the source code to compile and distribute again, which will increase the workload of programs' maintenance. In this paper, through a Dynamic Creation of Controls technology, we achieve the dynamic data entry and display and enhance the adaptability of the program.ven in this document.","PeriodicalId":307678,"journal":{"name":"2010 2nd International Symposium on Information Engineering and Electronic Commerce","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115912097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1109/IEEC.2010.5533295
Rui Gu, Jia Chen
The context of literal communication is important for perception but hard to capture and express. A technique was introduced to log time sequences and receivers of conversations. Logs were processed into XML at the server side and represented via XSLT to suit both rich and lean client. Browser/Server architecture was adopted to build the framework. However the proposed technique is suitable for all Client/Server applications as long as the underlying communication layer supports HTTP. The implementation is a step forward towards a comprehensive online community infrastructure.
{"title":"Logging and Expressing Literal Communication: A XML Based Implementation","authors":"Rui Gu, Jia Chen","doi":"10.1109/IEEC.2010.5533295","DOIUrl":"https://doi.org/10.1109/IEEC.2010.5533295","url":null,"abstract":"The context of literal communication is important for perception but hard to capture and express. A technique was introduced to log time sequences and receivers of conversations. Logs were processed into XML at the server side and represented via XSLT to suit both rich and lean client. Browser/Server architecture was adopted to build the framework. However the proposed technique is suitable for all Client/Server applications as long as the underlying communication layer supports HTTP. The implementation is a step forward towards a comprehensive online community infrastructure.","PeriodicalId":307678,"journal":{"name":"2010 2nd International Symposium on Information Engineering and Electronic Commerce","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115943141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1109/IEEC.2010.5533216
Bin Zhou, Xing-peng Chen, Shulian Chen
The fuzzy synthetic evaluation method and the example that the fuzzy synthetic evaluation is applied in ecology environment impact assessment along the Xi'ning-Golmud section among the Qinghai-Tibet railway are introduced in detail so as to reveal the important significance and value of the fuzzy synthetic evaluation.
{"title":"Application on Fuzzy Synthetic Evaluation in Ecology Environment Impact Assessment along Xi'Ning-Golmud Section among Qinghai-Tibet Railway","authors":"Bin Zhou, Xing-peng Chen, Shulian Chen","doi":"10.1109/IEEC.2010.5533216","DOIUrl":"https://doi.org/10.1109/IEEC.2010.5533216","url":null,"abstract":"The fuzzy synthetic evaluation method and the example that the fuzzy synthetic evaluation is applied in ecology environment impact assessment along the Xi'ning-Golmud section among the Qinghai-Tibet railway are introduced in detail so as to reveal the important significance and value of the fuzzy synthetic evaluation.","PeriodicalId":307678,"journal":{"name":"2010 2nd International Symposium on Information Engineering and Electronic Commerce","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115626413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1109/IEEC.2010.5533304
Dezhi Tong, Yuping Tong, Shuo Mu
This paper studies the government innovation based on electronic government through the case of government process reengineering. The tendency from business process reengineering to government process reengineering provided a new way to government innovation under the stimulation of electronic government. We can draw the conclusion that the key point of the government innovation is the government reformation itself, however, government innovation needs new governance model to sustain electronic government have it's strongly reason.
{"title":"Government Innovation Based on Electronic Government: Government Process Reengineering as the Case","authors":"Dezhi Tong, Yuping Tong, Shuo Mu","doi":"10.1109/IEEC.2010.5533304","DOIUrl":"https://doi.org/10.1109/IEEC.2010.5533304","url":null,"abstract":"This paper studies the government innovation based on electronic government through the case of government process reengineering. The tendency from business process reengineering to government process reengineering provided a new way to government innovation under the stimulation of electronic government. We can draw the conclusion that the key point of the government innovation is the government reformation itself, however, government innovation needs new governance model to sustain electronic government have it's strongly reason.","PeriodicalId":307678,"journal":{"name":"2010 2nd International Symposium on Information Engineering and Electronic Commerce","volume":"154 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116207745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1109/IEEC.2010.5533298
Jiemin Ding, Weibo Li
In this paper, we studied respectively the relationship among the data and information, information, knowledge and strategy content, combining with the decision-making process of human beings on understanding and optimizing the world. We also discussed variety representations of knowledge, and focused on analysis of object-oriented knowledge representation and put forward the basic description framework, summarizing the process that information, knowledge and intelligence are formed, which provided an important way for exploring the mechanism of intelligence.
{"title":"Evolution and Representation on Data Information Knowledge Strategy","authors":"Jiemin Ding, Weibo Li","doi":"10.1109/IEEC.2010.5533298","DOIUrl":"https://doi.org/10.1109/IEEC.2010.5533298","url":null,"abstract":"In this paper, we studied respectively the relationship among the data and information, information, knowledge and strategy content, combining with the decision-making process of human beings on understanding and optimizing the world. We also discussed variety representations of knowledge, and focused on analysis of object-oriented knowledge representation and put forward the basic description framework, summarizing the process that information, knowledge and intelligence are formed, which provided an important way for exploring the mechanism of intelligence.","PeriodicalId":307678,"journal":{"name":"2010 2nd International Symposium on Information Engineering and Electronic Commerce","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114704676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}