Pub Date : 2010-07-23DOI: 10.1109/IEEC.2010.5533202
Ya-Yueh Shih
Due to highly complexity of ERP systems, human resources, materials, and times are necessary investments in earlier stage, small enterprises are usually hard to implement the ERP system. Moreover, there are many factors related about how to select a useful ERP system and subjective judgment of decision makers result in promoting the difficulty of ERP system implementation. Accordingly, six factors are constructed to evaluate a useful ERP system from different perspectives, those are conditions of enterprises, supplier of software, consultants of ERP software, function of ERP system, characteristics of ERP system and cost of ERP system. Then Fuzzy AHP method is used to measure the related weights between different factors based on pair-wise comparisons. Accordingly, the condition of enterprise, function of ERP system and cost of ERP system are most important factors for ERP system selection. Top management support and financial condition of enterprise are the most important to all criteria. The implications and suggestions will be discussed later.
{"title":"A Study of ERP Systems Selection via Fuzzy AHP Method","authors":"Ya-Yueh Shih","doi":"10.1109/IEEC.2010.5533202","DOIUrl":"https://doi.org/10.1109/IEEC.2010.5533202","url":null,"abstract":"Due to highly complexity of ERP systems, human resources, materials, and times are necessary investments in earlier stage, small enterprises are usually hard to implement the ERP system. Moreover, there are many factors related about how to select a useful ERP system and subjective judgment of decision makers result in promoting the difficulty of ERP system implementation. Accordingly, six factors are constructed to evaluate a useful ERP system from different perspectives, those are conditions of enterprises, supplier of software, consultants of ERP software, function of ERP system, characteristics of ERP system and cost of ERP system. Then Fuzzy AHP method is used to measure the related weights between different factors based on pair-wise comparisons. Accordingly, the condition of enterprise, function of ERP system and cost of ERP system are most important factors for ERP system selection. Top management support and financial condition of enterprise are the most important to all criteria. The implications and suggestions will be discussed later.","PeriodicalId":307678,"journal":{"name":"2010 2nd International Symposium on Information Engineering and Electronic Commerce","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132497619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1109/IEEC.2010.5533294
Ya-ling Zhang, Jian Bai
Aiming at the problem on lack of independence and interoperability between Virtual Enterprise members in the process of interactive authentication, a virtual certificate authority model is constructed based on the (t ,n) threshold theory and mobile agent technology. Using of the autonomy, heterogeneity, dynamic, mobility and interoperability of the agent technology, several protocols of VCA are designed, such as creation protocol of the VCA, issuance protocol of member certificates and authentication protocol of members, etc. By testing, the system can meet the needs of threshold interactive authentication. The interactive authentication between member enterprises can be implemented.
{"title":"The Design of Interactive Authentication for Virtual Enterprise Based on Mobile Agent","authors":"Ya-ling Zhang, Jian Bai","doi":"10.1109/IEEC.2010.5533294","DOIUrl":"https://doi.org/10.1109/IEEC.2010.5533294","url":null,"abstract":"Aiming at the problem on lack of independence and interoperability between Virtual Enterprise members in the process of interactive authentication, a virtual certificate authority model is constructed based on the (t ,n) threshold theory and mobile agent technology. Using of the autonomy, heterogeneity, dynamic, mobility and interoperability of the agent technology, several protocols of VCA are designed, such as creation protocol of the VCA, issuance protocol of member certificates and authentication protocol of members, etc. By testing, the system can meet the needs of threshold interactive authentication. The interactive authentication between member enterprises can be implemented.","PeriodicalId":307678,"journal":{"name":"2010 2nd International Symposium on Information Engineering and Electronic Commerce","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133015659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
During the operation process of heated oil transportation pipelines, shutdown accidents may be caused by some faults. In view of hydraulic and thermodynamic characteristics, the transient simulation model of heated oil pipelines is established based on hydrodynamic theories. The model is composed of quasilinear hyperbolic partial differential equations. Integration with the boundary conditions that are pressures, temperatures, flow rates and other factors which are obtained while shutdown and restart process, method of characteristic and finite difference method are applied to solve this model. The VB and Matlab hybrid programming technology which is based on COM technical is utilized to develop simulation software which is used to simulate the restarting process after shutdown. Then the safety time of shutdown and maximum transient pressure are determined. The results show the integration of mathematic model and computer simulation can simulate the restarting process successfully.
{"title":"Simulation of Shutdown and Restarting Process of Heated Oil Pipelines","authors":"Enbin Liu, Changjun Li, Wenlong Jia, Shanbi Peng, Xia Wu, Jingyuan Xu","doi":"10.1109/IEEC.2010.5533271","DOIUrl":"https://doi.org/10.1109/IEEC.2010.5533271","url":null,"abstract":"During the operation process of heated oil transportation pipelines, shutdown accidents may be caused by some faults. In view of hydraulic and thermodynamic characteristics, the transient simulation model of heated oil pipelines is established based on hydrodynamic theories. The model is composed of quasilinear hyperbolic partial differential equations. Integration with the boundary conditions that are pressures, temperatures, flow rates and other factors which are obtained while shutdown and restart process, method of characteristic and finite difference method are applied to solve this model. The VB and Matlab hybrid programming technology which is based on COM technical is utilized to develop simulation software which is used to simulate the restarting process after shutdown. Then the safety time of shutdown and maximum transient pressure are determined. The results show the integration of mathematic model and computer simulation can simulate the restarting process successfully.","PeriodicalId":307678,"journal":{"name":"2010 2nd International Symposium on Information Engineering and Electronic Commerce","volume":"49 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124783642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1109/IEEC.2010.5533214
Mian Zhang, Li Zhang
the collision is an attempt to shut down the port access system in the sequence composition, that is, a specific port connection requests. Port collision technology is a server device to allow the user in accordance with the agreed sequence of collisions, open a server port agreed to provide services technology.
{"title":"Network Security Management Technology Based on Port Collision","authors":"Mian Zhang, Li Zhang","doi":"10.1109/IEEC.2010.5533214","DOIUrl":"https://doi.org/10.1109/IEEC.2010.5533214","url":null,"abstract":"the collision is an attempt to shut down the port access system in the sequence composition, that is, a specific port connection requests. Port collision technology is a server device to allow the user in accordance with the agreed sequence of collisions, open a server port agreed to provide services technology.","PeriodicalId":307678,"journal":{"name":"2010 2nd International Symposium on Information Engineering and Electronic Commerce","volume":"322 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123304298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1109/IEEC.2010.5533239
B. Liu, Hao Tu
Accurate traffic classification is critical in network security monitoring and traffic engineering. To overcome the deficiencies of traditional traffic classification methods with port mapping and signature matching, several machine learning techniques were proposed. However, there are two main challenges for classifying network traffic using machine learning method. Firstly, labeled samples are scarce and difficult to obtain. Secondly, not all types of applications are known a priori, and new ones may appear over time. To address the above-mentioned problems, This paper proposed a semi-supervised classification method that allows classifier to be designed from training dataset consisting of a few labeled and many unlabeled samples. This method consist two steps: Particle Swarm Optimization (PSO) clustering algorithm was employed to partition a training dataset that mixed few labeled samples with abundant unlabeled samples. Then, available labeled samples were used to map the clusters to the application classes. Two host features: IP Address Discreteness and Success Rate of Connections had been proposed and used in this paper. Experimental results using traffic from campus backbone show that high classification accuracy can be achieved with a few labeled samples.
{"title":"An Application Traffic Classification Method Based on Semi-Supervised Clustering","authors":"B. Liu, Hao Tu","doi":"10.1109/IEEC.2010.5533239","DOIUrl":"https://doi.org/10.1109/IEEC.2010.5533239","url":null,"abstract":"Accurate traffic classification is critical in network security monitoring and traffic engineering. To overcome the deficiencies of traditional traffic classification methods with port mapping and signature matching, several machine learning techniques were proposed. However, there are two main challenges for classifying network traffic using machine learning method. Firstly, labeled samples are scarce and difficult to obtain. Secondly, not all types of applications are known a priori, and new ones may appear over time. To address the above-mentioned problems, This paper proposed a semi-supervised classification method that allows classifier to be designed from training dataset consisting of a few labeled and many unlabeled samples. This method consist two steps: Particle Swarm Optimization (PSO) clustering algorithm was employed to partition a training dataset that mixed few labeled samples with abundant unlabeled samples. Then, available labeled samples were used to map the clusters to the application classes. Two host features: IP Address Discreteness and Success Rate of Connections had been proposed and used in this paper. Experimental results using traffic from campus backbone show that high classification accuracy can be achieved with a few labeled samples.","PeriodicalId":307678,"journal":{"name":"2010 2nd International Symposium on Information Engineering and Electronic Commerce","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125276769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1109/IEEC.2010.5533248
Caiyun Gao, Qingjun Li
With the expanding of network teaching, more and more college students begin to addict to the internet, so the design of more scientific network teaching environment is given more attention nowadays. In network teaching, not only the teaching content should be emphasized, but also a safe network teaching environment should be provided. This paper investigates the relationship between the network teaching environment and internet addiction and a model of network teaching environment is designed to enhance the environment and improve the effectiveness of the network teaching.
{"title":"The Design of Network Teaching Environment and the Internet Addiction of College Students","authors":"Caiyun Gao, Qingjun Li","doi":"10.1109/IEEC.2010.5533248","DOIUrl":"https://doi.org/10.1109/IEEC.2010.5533248","url":null,"abstract":"With the expanding of network teaching, more and more college students begin to addict to the internet, so the design of more scientific network teaching environment is given more attention nowadays. In network teaching, not only the teaching content should be emphasized, but also a safe network teaching environment should be provided. This paper investigates the relationship between the network teaching environment and internet addiction and a model of network teaching environment is designed to enhance the environment and improve the effectiveness of the network teaching.","PeriodicalId":307678,"journal":{"name":"2010 2nd International Symposium on Information Engineering and Electronic Commerce","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116823907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1109/IEEC.2010.5533243
Yanghe Feng, Chaofan Dai, Jianmai Shi, Liang Mu
The usability of model-aided decision relies on intellectualized level of model selection. An algorithm of Model selection based sample data is proposed in the paper. The meta-models are classified by characters of the sample data, and the assembled models are built as tree format. The genetic operations are performed under several restrictions to provide the model selection scheme. Its process hardly depends on user's knowledge on domain.
{"title":"An Automatic Model Selection Algorithm Based Genetic Programming","authors":"Yanghe Feng, Chaofan Dai, Jianmai Shi, Liang Mu","doi":"10.1109/IEEC.2010.5533243","DOIUrl":"https://doi.org/10.1109/IEEC.2010.5533243","url":null,"abstract":"The usability of model-aided decision relies on intellectualized level of model selection. An algorithm of Model selection based sample data is proposed in the paper. The meta-models are classified by characters of the sample data, and the assembled models are built as tree format. The genetic operations are performed under several restrictions to provide the model selection scheme. Its process hardly depends on user's knowledge on domain.","PeriodicalId":307678,"journal":{"name":"2010 2nd International Symposium on Information Engineering and Electronic Commerce","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122356278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1109/IEEC.2010.5533246
Jianzhong Li, L. Yan, X. Tang
One-dimensional consolidation tests were performed on the undisturbed and remodeled specimens under different consolidating pressure. By analyzing the laboratory test results, following conclusions were drawn: (1)the creep deformation of undisturbed specimen is much smaller than that of remodeled one; (2)although there is steady creep stage of undisturbed reticulate red clay, creep curves of undisturbed specimen in this stage are rough, while the creep curves of remodeled specimen in the same stage are smooth; (3) the difference between the times to obtain stable displacement of remodeled and undisturbed specimen decreased as the consolidating load increasing, while the difference between the stable displacements increased significantly. It was also found that the one-dimensional consolidating curves of reticulate red clay can be simulated with linear equation very well.
{"title":"Simulation on the Creep Deformation of Reticulate Red Clay","authors":"Jianzhong Li, L. Yan, X. Tang","doi":"10.1109/IEEC.2010.5533246","DOIUrl":"https://doi.org/10.1109/IEEC.2010.5533246","url":null,"abstract":"One-dimensional consolidation tests were performed on the undisturbed and remodeled specimens under different consolidating pressure. By analyzing the laboratory test results, following conclusions were drawn: (1)the creep deformation of undisturbed specimen is much smaller than that of remodeled one; (2)although there is steady creep stage of undisturbed reticulate red clay, creep curves of undisturbed specimen in this stage are rough, while the creep curves of remodeled specimen in the same stage are smooth; (3) the difference between the times to obtain stable displacement of remodeled and undisturbed specimen decreased as the consolidating load increasing, while the difference between the stable displacements increased significantly. It was also found that the one-dimensional consolidating curves of reticulate red clay can be simulated with linear equation very well.","PeriodicalId":307678,"journal":{"name":"2010 2nd International Symposium on Information Engineering and Electronic Commerce","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122368422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1109/IEEC.2010.5533224
Xuexia Xu, Li-chiang Su
Under the knowledge economic environment, the competitiveness of enterprises is mainly an innovative competition, particularly in high-tech enterprise. Company actively engaged in R & D activities, leading to rapid increase in R & D expenditures. In 2007, the new accounting standards stipulated that corporate spending on independent research and development activities can conditionally capitalized, which brought the listed companies space in earnings management. Selected 45 high-tech industries listed companies and through three indexes of discretionary accruals, manage costs and R & D expenditures, the article study whether there are listed companies utilizing R & D expenditures to engage in earnings management. By analyzing the specific way of using R & D expenditures to manipulate profit margin, the article concluded that the listed companies do have a behavior of using R & D expenditure to engage in earnings management.
{"title":"Studies on R & D Expenditure Earnings Management of Chinese High-Tech Listed Companies","authors":"Xuexia Xu, Li-chiang Su","doi":"10.1109/IEEC.2010.5533224","DOIUrl":"https://doi.org/10.1109/IEEC.2010.5533224","url":null,"abstract":"Under the knowledge economic environment, the competitiveness of enterprises is mainly an innovative competition, particularly in high-tech enterprise. Company actively engaged in R & D activities, leading to rapid increase in R & D expenditures. In 2007, the new accounting standards stipulated that corporate spending on independent research and development activities can conditionally capitalized, which brought the listed companies space in earnings management. Selected 45 high-tech industries listed companies and through three indexes of discretionary accruals, manage costs and R & D expenditures, the article study whether there are listed companies utilizing R & D expenditures to engage in earnings management. By analyzing the specific way of using R & D expenditures to manipulate profit margin, the article concluded that the listed companies do have a behavior of using R & D expenditure to engage in earnings management.","PeriodicalId":307678,"journal":{"name":"2010 2nd International Symposium on Information Engineering and Electronic Commerce","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128070307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1109/IEEC.2010.5533256
Xu-dong Lin, Lijun Ma
The adoption of price comparison technology can make electronic markets more competitive, hence affecting the competitive dynamics of online sales. In the case of duopolistic homogenous goods market, multi-period dynamic pricing game models are suggest used to analyze how the prices in electronic markets evolve with the diffusion of price comparison shopping technology and probe into related fundamental theoretical proxies. Our results show: (ⅰ)the average price within the support of equilibrium price decrease with the development of electronic markets, at the rate positively related to the diffusion rate of price comparison technology.(ⅱ)the larger the difference between firms' loyal segments is, the higher average price within the support of equilibrium price would be . And (ⅲ) the higher accepted degree of customer for online goods can bring in the according higher average price.
{"title":"Researches on Duopolistic Price Competition in Homogenous Markets","authors":"Xu-dong Lin, Lijun Ma","doi":"10.1109/IEEC.2010.5533256","DOIUrl":"https://doi.org/10.1109/IEEC.2010.5533256","url":null,"abstract":"The adoption of price comparison technology can make electronic markets more competitive, hence affecting the competitive dynamics of online sales. In the case of duopolistic homogenous goods market, multi-period dynamic pricing game models are suggest used to analyze how the prices in electronic markets evolve with the diffusion of price comparison shopping technology and probe into related fundamental theoretical proxies. Our results show: (ⅰ)the average price within the support of equilibrium price decrease with the development of electronic markets, at the rate positively related to the diffusion rate of price comparison technology.(ⅱ)the larger the difference between firms' loyal segments is, the higher average price within the support of equilibrium price would be . And (ⅲ) the higher accepted degree of customer for online goods can bring in the according higher average price.","PeriodicalId":307678,"journal":{"name":"2010 2nd International Symposium on Information Engineering and Electronic Commerce","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127739061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}