In this paper, the statistic resource contains 49 organizations of e-government operation services and 52 cases offered. This paper applies ITIL framework to set down the analysis indices framework of three grades which adapts to the present situation of e-government operation services of China. Then evaluate the general situation of the present e-government operation services of China from the four aspects of organizations, services, mechanism and tendency. Finally analyze and summarize the success experiences and shortages of the e-government operation services of China, aiming to improve the success rate and satisfaction degree of the e-government projects of China, and to optimize the management system and the investment benefit of the state-owned informationized assets of China.
{"title":"Analysis of the E-Government Operation Services of China in the Present Situation","authors":"Xueqin Zhao, Jing Ye","doi":"10.1109/CCCM.2008.68","DOIUrl":"https://doi.org/10.1109/CCCM.2008.68","url":null,"abstract":"In this paper, the statistic resource contains 49 organizations of e-government operation services and 52 cases offered. This paper applies ITIL framework to set down the analysis indices framework of three grades which adapts to the present situation of e-government operation services of China. Then evaluate the general situation of the present e-government operation services of China from the four aspects of organizations, services, mechanism and tendency. Finally analyze and summarize the success experiences and shortages of the e-government operation services of China, aiming to improve the success rate and satisfaction degree of the e-government projects of China, and to optimize the management system and the investment benefit of the state-owned informationized assets of China.","PeriodicalId":326534,"journal":{"name":"2008 ISECS International Colloquium on Computing, Communication, Control, and Management","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114731074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Disruption risk has received increasing attention in the last few years, when it comes to global supply chains, the potential for disruption comes in many packages, from large-scale natural disasters and terrorist attacks to plant manufacturing fires, widespread electrical blackouts, and operational contingencies such as shipping ports too small to handle the flow of goods coming into a country. The reason is undoubtedly that, supply chain innovation over the past decade has focused on flexibility and responsiveness, with longer paths and shorter clock speeds, todaypsilas leaner, just-in-time globalized supply chains are more vulnerable than ever before to natural and man-made disasters, and there are more opportunities for disruption and a smaller margin for error if a disruption takes place. So, managing supply chain disruptions revolves around two goals: first, to thoroughly understand the potential of identified risks; and second, to increase the capacity of the supply chain - within reasonable limits - to sustain and absorb disruption without serious impact, a reality that creates greater demands on companies to keep supply chains flexible and integrate disruption risk management into every facet of supply chain operations.In this paper, we expressed out views in three steps, the first part, we delivered a framework for risks analyzing in supply chains, and second, we developed approaches on building resilient supply chains, and also gave some advices on how to build up resilient supply chains. In the third part, we provided Ericsson as a case to support our views.
{"title":"Managing the Risk of Supply Chain Disruption: Towards a Resilient Approach of Supply Chain Management","authors":"Jianxin Xu","doi":"10.1109/CCCM.2008.9","DOIUrl":"https://doi.org/10.1109/CCCM.2008.9","url":null,"abstract":"Disruption risk has received increasing attention in the last few years, when it comes to global supply chains, the potential for disruption comes in many packages, from large-scale natural disasters and terrorist attacks to plant manufacturing fires, widespread electrical blackouts, and operational contingencies such as shipping ports too small to handle the flow of goods coming into a country. The reason is undoubtedly that, supply chain innovation over the past decade has focused on flexibility and responsiveness, with longer paths and shorter clock speeds, todaypsilas leaner, just-in-time globalized supply chains are more vulnerable than ever before to natural and man-made disasters, and there are more opportunities for disruption and a smaller margin for error if a disruption takes place. So, managing supply chain disruptions revolves around two goals: first, to thoroughly understand the potential of identified risks; and second, to increase the capacity of the supply chain - within reasonable limits - to sustain and absorb disruption without serious impact, a reality that creates greater demands on companies to keep supply chains flexible and integrate disruption risk management into every facet of supply chain operations.In this paper, we expressed out views in three steps, the first part, we delivered a framework for risks analyzing in supply chains, and second, we developed approaches on building resilient supply chains, and also gave some advices on how to build up resilient supply chains. In the third part, we provided Ericsson as a case to support our views.","PeriodicalId":326534,"journal":{"name":"2008 ISECS International Colloquium on Computing, Communication, Control, and Management","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114877550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents a general design method on serial interface device driver, which is based on the analysis of Modbus protocol and QNX operation system (QNX OS) device driver architecture. Further, the paper specifies serial port communication in C program under QNX OS, and tests its communication with SIEMENS S7-200 PLC. The test result has proved that the method is real-time, stable, and reliable.
{"title":"Design of the Modbus Communication through Serial Port in QNX Operation System","authors":"Sen Xu, Haipeng Pan, Jia Ren, Jie Su","doi":"10.1109/CCCM.2008.271","DOIUrl":"https://doi.org/10.1109/CCCM.2008.271","url":null,"abstract":"This paper presents a general design method on serial interface device driver, which is based on the analysis of Modbus protocol and QNX operation system (QNX OS) device driver architecture. Further, the paper specifies serial port communication in C program under QNX OS, and tests its communication with SIEMENS S7-200 PLC. The test result has proved that the method is real-time, stable, and reliable.","PeriodicalId":326534,"journal":{"name":"2008 ISECS International Colloquium on Computing, Communication, Control, and Management","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114877951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Multi-protocol label switching (MPLS) is deployed in the Internet backbone to support service differentiation and traffic engineering. Mobile MPLS is a new scheme that integrates Mobile IP and MPLS protocols to support mobility to MPLS. However, it is not suitable for micro-mobility environments. In this paper we propose a micro-mobility architecture based on the integration of MPLS for wireless networks. In addition to QoS supporting, the proposed scheme has the advantages of traffic aggregation, traffic engineering capabilities offering, low latency and fast handoff.
{"title":"A Micro-Mobility MPLS Scheme for QoS Supporting in Wireless Access Network","authors":"Nie Gang","doi":"10.1109/CCCM.2008.21","DOIUrl":"https://doi.org/10.1109/CCCM.2008.21","url":null,"abstract":"Multi-protocol label switching (MPLS) is deployed in the Internet backbone to support service differentiation and traffic engineering. Mobile MPLS is a new scheme that integrates Mobile IP and MPLS protocols to support mobility to MPLS. However, it is not suitable for micro-mobility environments. In this paper we propose a micro-mobility architecture based on the integration of MPLS for wireless networks. In addition to QoS supporting, the proposed scheme has the advantages of traffic aggregation, traffic engineering capabilities offering, low latency and fast handoff.","PeriodicalId":326534,"journal":{"name":"2008 ISECS International Colloquium on Computing, Communication, Control, and Management","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124321918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ontology is a method of expressing knowledge. It is essential for multiple engineers to develop a collaborative ontology. However, current tools, techniques and methodologies for developing collaborative ontology system are inadequate. Against this background, a collaborative ontology development method based on lock-granularity is proposed in this paper. The method aims to control the lock-granularity flexibly, and improve the locking reliability and integrity in collaborative environment. Correlation among nodes and users' locking authority ensure the collaborative ontology construction in the method. At the same time, the relativity threshold and the semantic radius are also used to control the lock-granularity. Then, two relevant algorithms are given. Finally, the experimental results show that the method is efficient and feasible..
{"title":"Research on Collaborative Ontology Development Method Based on Lock Granularity","authors":"X. Shixiong, Deng Zhiwen, Zhang Lei, Yuan Guan","doi":"10.1109/CCCM.2008.220","DOIUrl":"https://doi.org/10.1109/CCCM.2008.220","url":null,"abstract":"Ontology is a method of expressing knowledge. It is essential for multiple engineers to develop a collaborative ontology. However, current tools, techniques and methodologies for developing collaborative ontology system are inadequate. Against this background, a collaborative ontology development method based on lock-granularity is proposed in this paper. The method aims to control the lock-granularity flexibly, and improve the locking reliability and integrity in collaborative environment. Correlation among nodes and users' locking authority ensure the collaborative ontology construction in the method. At the same time, the relativity threshold and the semantic radius are also used to control the lock-granularity. Then, two relevant algorithms are given. Finally, the experimental results show that the method is efficient and feasible..","PeriodicalId":326534,"journal":{"name":"2008 ISECS International Colloquium on Computing, Communication, Control, and Management","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124105863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Our proposed design, which we refer to as re-traffic pricing (RTP), aims to defense against application-level distributed denial-of-service (App-DDoS) attacks which is a rapidly growing problem. RTP prevents the server form overloading and encourages all the users to spend re-traffic which the legitimate users are assumed to have more of than the attackers to bid for the service resources. We apply the re-traffic which we define as the bandwidth uploaded after encouragement to the server as the constrained resource in this paper. The goal of RTP architecture is to allocate service resources in rough proportion to the users' re-traffic. On account of this mechanism, legitimate clients with greater re-traffic will receive the bulk of the service.
{"title":"Re-traffic Pricing for Fighting against DDoS","authors":"Yue Shen, Fengzhi Fan, Wen-Xiu Xie, Lu-feng Mo","doi":"10.1109/CCCM.2008.298","DOIUrl":"https://doi.org/10.1109/CCCM.2008.298","url":null,"abstract":"Our proposed design, which we refer to as re-traffic pricing (RTP), aims to defense against application-level distributed denial-of-service (App-DDoS) attacks which is a rapidly growing problem. RTP prevents the server form overloading and encourages all the users to spend re-traffic which the legitimate users are assumed to have more of than the attackers to bid for the service resources. We apply the re-traffic which we define as the bandwidth uploaded after encouragement to the server as the constrained resource in this paper. The goal of RTP architecture is to allocate service resources in rough proportion to the users' re-traffic. On account of this mechanism, legitimate clients with greater re-traffic will receive the bulk of the service.","PeriodicalId":326534,"journal":{"name":"2008 ISECS International Colloquium on Computing, Communication, Control, and Management","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127664855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
These days, IDS has been widely deployed and is beginning to gain acceptance as a worthwhile investment. However, at least three disadvantages, which are very high alert rate, fairly high false positives and quite limited ability for detecting distributed and collaborative attacks, hinder its further development. In order to overcome these weaknesses and resolve the conflict with current network security requirements as well, researches on post-IDS alert analysis become a focus, while more and more researchers and engineers advocate two techniques named collaboration and correlation. The aim of this paper is then to propose application of XML-based integrated network management techniques to support collaboration for the purpose of post-IDS alert analysis, and discuss corresponding issues about unified representation of information and knowledge. Validation results show that, proposed approach is quite effective in reducing the rate of false positives.
{"title":"Collaborative Post-IDS Alert Analysis Based on Network Management Techniques","authors":"Hui Xu, Debao Xiao, Xue Xia, Zheng Wu","doi":"10.1109/CCCM.2008.237","DOIUrl":"https://doi.org/10.1109/CCCM.2008.237","url":null,"abstract":"These days, IDS has been widely deployed and is beginning to gain acceptance as a worthwhile investment. However, at least three disadvantages, which are very high alert rate, fairly high false positives and quite limited ability for detecting distributed and collaborative attacks, hinder its further development. In order to overcome these weaknesses and resolve the conflict with current network security requirements as well, researches on post-IDS alert analysis become a focus, while more and more researchers and engineers advocate two techniques named collaboration and correlation. The aim of this paper is then to propose application of XML-based integrated network management techniques to support collaboration for the purpose of post-IDS alert analysis, and discuss corresponding issues about unified representation of information and knowledge. Validation results show that, proposed approach is quite effective in reducing the rate of false positives.","PeriodicalId":326534,"journal":{"name":"2008 ISECS International Colloquium on Computing, Communication, Control, and Management","volume":"262 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121703083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E-service (such as e-learning and e-business) has been growing rapidly, keeping pace with the Web. The management pattern of e-commerce may greatly save the cost in the physical environment and bring conveniences to customers. People pay more and more attention to e-commerce day by day. Therefore, more and more companies have set up their own e-business Web sites to sell commodities or issue information service. But, the quality of the recommendations has an important effect on the customerpsilas future shopping behavior. Unqualified recommendations may cause two types of characteristic errors: false negative and false positive. According to the reasons mentioned above, the technologies of personalized technology, adaptive filtering are applied in the paper, while a new personalized recommendation algorithm is proposed, personalized recommendation algorithm was applied to a real e-bookstore for evaluation. Some experiment results are also provided.
{"title":"Research on Personalized E-Bookstore Service System","authors":"Yanhui Zhang","doi":"10.1109/CCCM.2008.395","DOIUrl":"https://doi.org/10.1109/CCCM.2008.395","url":null,"abstract":"E-service (such as e-learning and e-business) has been growing rapidly, keeping pace with the Web. The management pattern of e-commerce may greatly save the cost in the physical environment and bring conveniences to customers. People pay more and more attention to e-commerce day by day. Therefore, more and more companies have set up their own e-business Web sites to sell commodities or issue information service. But, the quality of the recommendations has an important effect on the customerpsilas future shopping behavior. Unqualified recommendations may cause two types of characteristic errors: false negative and false positive. According to the reasons mentioned above, the technologies of personalized technology, adaptive filtering are applied in the paper, while a new personalized recommendation algorithm is proposed, personalized recommendation algorithm was applied to a real e-bookstore for evaluation. Some experiment results are also provided.","PeriodicalId":326534,"journal":{"name":"2008 ISECS International Colloquium on Computing, Communication, Control, and Management","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131965981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Traditional melt temperature PID controllers have difficulties in PID parameter tuning. So, they suffer from low accuracy in temperature controlling and the dissatisfaction in high exactitude extrusion processing of the present PID controllers. A new kind of PID controller based on radial basis function (RBF) neural network is proposed. By using a sigmoid function to form the step size function, the proposed controller can not only obtain a higher accuracy in temperature controlling, but also infinitely approach the nonlinear system with lower computations, quicker convergence and more system stability. The simulation results show that the proposed PID controller has a better performance in the melt temperature controlling than other traditional PID controllers.
{"title":"A Melt Temperature PID Controller Based on RBF Neural Network","authors":"Jing Jiang, Sheng-ke Wen, Guoping Zhao","doi":"10.1109/CCCM.2008.141","DOIUrl":"https://doi.org/10.1109/CCCM.2008.141","url":null,"abstract":"Traditional melt temperature PID controllers have difficulties in PID parameter tuning. So, they suffer from low accuracy in temperature controlling and the dissatisfaction in high exactitude extrusion processing of the present PID controllers. A new kind of PID controller based on radial basis function (RBF) neural network is proposed. By using a sigmoid function to form the step size function, the proposed controller can not only obtain a higher accuracy in temperature controlling, but also infinitely approach the nonlinear system with lower computations, quicker convergence and more system stability. The simulation results show that the proposed PID controller has a better performance in the melt temperature controlling than other traditional PID controllers.","PeriodicalId":326534,"journal":{"name":"2008 ISECS International Colloquium on Computing, Communication, Control, and Management","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132456243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the middle of online business in China, the third-party payment has its unique characteristics, but it is difficult for the companies to make their advantages in competition with other parts of value chain. This paper suggests that the online payment platforms should improve their construction according to three different value chain layers, such as integrating security protocols with payment gateway in support layer, strengthening payment infrastructure in service layer and expanding value-added services in application layer.
{"title":"The Construction of Online Third-Party Payment Based on Value Chain","authors":"Yiqun Li, Zhaoran Xu","doi":"10.1109/CCCM.2008.42","DOIUrl":"https://doi.org/10.1109/CCCM.2008.42","url":null,"abstract":"In the middle of online business in China, the third-party payment has its unique characteristics, but it is difficult for the companies to make their advantages in competition with other parts of value chain. This paper suggests that the online payment platforms should improve their construction according to three different value chain layers, such as integrating security protocols with payment gateway in support layer, strengthening payment infrastructure in service layer and expanding value-added services in application layer.","PeriodicalId":326534,"journal":{"name":"2008 ISECS International Colloquium on Computing, Communication, Control, and Management","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132983580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}