Pub Date : 2010-06-03DOI: 10.1109/ICIME.2010.5477676
Liming Xia, J. Pan, Shuping Chen, Yufei Zhao
Based on the systematical analysis of factors influencing government knowledge management and researching the process of knowledge management, this paper establishes a comprehensive index system to evaluate the level of government knowledge management quantitatively, which complements to the existing evaluating methods. A case study was included to demonstrate how the established index system can be used practically to evaluate the level of government knowledge management objectively and concluded factors that can be influential in the further improvement of government knowledge management.
{"title":"Research on government knowledge management capability based on fuzzy comprehensive evaluation","authors":"Liming Xia, J. Pan, Shuping Chen, Yufei Zhao","doi":"10.1109/ICIME.2010.5477676","DOIUrl":"https://doi.org/10.1109/ICIME.2010.5477676","url":null,"abstract":"Based on the systematical analysis of factors influencing government knowledge management and researching the process of knowledge management, this paper establishes a comprehensive index system to evaluate the level of government knowledge management quantitatively, which complements to the existing evaluating methods. A case study was included to demonstrate how the established index system can be used practically to evaluate the level of government knowledge management objectively and concluded factors that can be influential in the further improvement of government knowledge management.","PeriodicalId":382705,"journal":{"name":"2010 2nd IEEE International Conference on Information Management and Engineering","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116994945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-06-03DOI: 10.1109/ICIME.2010.5477788
Peng Xinguang, Chen Lei, He Renzhong
Prediction model of region competitiveness gives an objective understanding of the developments and advantages of the regions. It helps to make the strategies of competition of the regions and to accelerate the development of the regions. In the paper, we construct the evaluation index system for the region competitiveness of Shanxi province in China with local actual conditions on the basis of diamond theory. Then the classifications of individual region are determined by clustering algorithm. Finally, an alternative prediction and evaluation model for the region competitiveness of Shanxi province is created by using entropy computing and classification decision tree algorithm. Furthermore, we use the results to make further countermeasures to enhance the competitiveness of regions for Shanxi province.
{"title":"Prediction model for region competitiveness based on entropy computing","authors":"Peng Xinguang, Chen Lei, He Renzhong","doi":"10.1109/ICIME.2010.5477788","DOIUrl":"https://doi.org/10.1109/ICIME.2010.5477788","url":null,"abstract":"Prediction model of region competitiveness gives an objective understanding of the developments and advantages of the regions. It helps to make the strategies of competition of the regions and to accelerate the development of the regions. In the paper, we construct the evaluation index system for the region competitiveness of Shanxi province in China with local actual conditions on the basis of diamond theory. Then the classifications of individual region are determined by clustering algorithm. Finally, an alternative prediction and evaluation model for the region competitiveness of Shanxi province is created by using entropy computing and classification decision tree algorithm. Furthermore, we use the results to make further countermeasures to enhance the competitiveness of regions for Shanxi province.","PeriodicalId":382705,"journal":{"name":"2010 2nd IEEE International Conference on Information Management and Engineering","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127404549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-04-16DOI: 10.1109/ICIME.2010.5477842
Feng Xiuzhen, Chen Ni
This paper presents an approach for automated mapping metadata according to the characteristics of metadata. A metadata tree matching model is constructed with tree matching theory. First, the metadata should be transformed as a rooted unordered tree. Then, node and structural matching could be conducted. Finally, we get metadata node pairs matched successfully. Accordingly a metadata tree matching algorithm is proposed based on tree path matching. The matching model and algorithm can be applied in automated mapping of heterogeneous metadata, which could construct the foundation of information resource integration, management and interaction.
{"title":"A study on tree matching model and algorithm towards metadata","authors":"Feng Xiuzhen, Chen Ni","doi":"10.1109/ICIME.2010.5477842","DOIUrl":"https://doi.org/10.1109/ICIME.2010.5477842","url":null,"abstract":"This paper presents an approach for automated mapping metadata according to the characteristics of metadata. A metadata tree matching model is constructed with tree matching theory. First, the metadata should be transformed as a rooted unordered tree. Then, node and structural matching could be conducted. Finally, we get metadata node pairs matched successfully. Accordingly a metadata tree matching algorithm is proposed based on tree path matching. The matching model and algorithm can be applied in automated mapping of heterogeneous metadata, which could construct the foundation of information resource integration, management and interaction.","PeriodicalId":382705,"journal":{"name":"2010 2nd IEEE International Conference on Information Management and Engineering","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114999181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-04-16DOI: 10.1109/ICIME.2010.5477478
Dai Hong, Ma Chi, S. Xu
The web application of HTTP service holds the majority share of the traffic transported through web. A big flaw of online filtering affects data transfer throughput. The filter suffers from being poor to analyze HTTP traffic like html reconstruction, HTML encoding, analyzing HTTP, and so on. This paper presents a remedy to this issue by putting the filter engine in sniffer mode. By this way filtering process and data transfer acts independently. At the same time, the filter engine combines a novel high speed patterns matching algorithm with protocol analysis. It can get the special interesting network packets which can get more high efficiency.
{"title":"Filter a matched web request based on protocol analysis","authors":"Dai Hong, Ma Chi, S. Xu","doi":"10.1109/ICIME.2010.5477478","DOIUrl":"https://doi.org/10.1109/ICIME.2010.5477478","url":null,"abstract":"The web application of HTTP service holds the majority share of the traffic transported through web. A big flaw of online filtering affects data transfer throughput. The filter suffers from being poor to analyze HTTP traffic like html reconstruction, HTML encoding, analyzing HTTP, and so on. This paper presents a remedy to this issue by putting the filter engine in sniffer mode. By this way filtering process and data transfer acts independently. At the same time, the filter engine combines a novel high speed patterns matching algorithm with protocol analysis. It can get the special interesting network packets which can get more high efficiency.","PeriodicalId":382705,"journal":{"name":"2010 2nd IEEE International Conference on Information Management and Engineering","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115167051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-04-16DOI: 10.1109/ICIME.2010.5477625
Minghui Wu, Canghong Jin, Jing Ying
In order to solve the problem that business user do not master the techniques to describe their purposes by IT language while IT developers can not understand the real meaning of their customers', MDA approach provides a standard mechanism that can compensate this gap between different stockholders. MDA approach may use complicate models and contain many tools and rules which is difficult for user to implement. In this article, we propose a platform SMICE based on MDA architecture and automated process. We define the Software development life cycle by using SMICE. And mapping rules and tools are introduced in each MDA level. With SMICE's help, both users and developers can cooperate and communicate better in CIM, PIM, and PSM level. At the end of this paper, we use GEF and XML to setup a SMICE prototype to implement the basic functions about defining the process logic and transferring this logic to some acceptable languages for mature process execute engines.
{"title":"SMICE: A platform supports business process modeling and integration","authors":"Minghui Wu, Canghong Jin, Jing Ying","doi":"10.1109/ICIME.2010.5477625","DOIUrl":"https://doi.org/10.1109/ICIME.2010.5477625","url":null,"abstract":"In order to solve the problem that business user do not master the techniques to describe their purposes by IT language while IT developers can not understand the real meaning of their customers', MDA approach provides a standard mechanism that can compensate this gap between different stockholders. MDA approach may use complicate models and contain many tools and rules which is difficult for user to implement. In this article, we propose a platform SMICE based on MDA architecture and automated process. We define the Software development life cycle by using SMICE. And mapping rules and tools are introduced in each MDA level. With SMICE's help, both users and developers can cooperate and communicate better in CIM, PIM, and PSM level. At the end of this paper, we use GEF and XML to setup a SMICE prototype to implement the basic functions about defining the process logic and transferring this logic to some acceptable languages for mature process execute engines.","PeriodicalId":382705,"journal":{"name":"2010 2nd IEEE International Conference on Information Management and Engineering","volume":"166 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115170101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-04-16DOI: 10.1109/ICIME.2010.5478175
Dong Shicheng, Ma Lixin, Gong Yun-qi
Making the best use of resources in existence of power enterprise, the process of human resources training was analyzed, and the training process in power enterprise was adjusted by using the related theory of workflow analysis and information means. The training mode of enterprise human resources was improved, and the new way for management informationization of human resources training was explored. The flow mode of innovative training process was constructed to reduce the cost of human resources in power enterprises, and the reference mode of human resources training management was provided.
{"title":"Study on information technology used in power enterprises' innovation training","authors":"Dong Shicheng, Ma Lixin, Gong Yun-qi","doi":"10.1109/ICIME.2010.5478175","DOIUrl":"https://doi.org/10.1109/ICIME.2010.5478175","url":null,"abstract":"Making the best use of resources in existence of power enterprise, the process of human resources training was analyzed, and the training process in power enterprise was adjusted by using the related theory of workflow analysis and information means. The training mode of enterprise human resources was improved, and the new way for management informationization of human resources training was explored. The flow mode of innovative training process was constructed to reduce the cost of human resources in power enterprises, and the reference mode of human resources training management was provided.","PeriodicalId":382705,"journal":{"name":"2010 2nd IEEE International Conference on Information Management and Engineering","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115227496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-04-16DOI: 10.1109/ICIME.2010.5478021
Hui Wang, Zongpu Jia, B. Lu, Zihao Shen
Documents are often considered as the most important information assets so that they will be the chief target of insider misuse. How to protect confidential documents from being stolen or abused is a vital problem that is concerned with the survival and honor of an organization. However, existing tools or technologies are basically invalid to completely resolve it. In this paper, the security architecture for document is presented, and specific workflow of multi-agents and related implementation algorithms are given.
{"title":"Information flow security architecture based on multi-agents","authors":"Hui Wang, Zongpu Jia, B. Lu, Zihao Shen","doi":"10.1109/ICIME.2010.5478021","DOIUrl":"https://doi.org/10.1109/ICIME.2010.5478021","url":null,"abstract":"Documents are often considered as the most important information assets so that they will be the chief target of insider misuse. How to protect confidential documents from being stolen or abused is a vital problem that is concerned with the survival and honor of an organization. However, existing tools or technologies are basically invalid to completely resolve it. In this paper, the security architecture for document is presented, and specific workflow of multi-agents and related implementation algorithms are given.","PeriodicalId":382705,"journal":{"name":"2010 2nd IEEE International Conference on Information Management and Engineering","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115333488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-04-16DOI: 10.1109/ICIME.2010.5478243
S. Yongqiang, Li Qiangli
The goal of this paper is to research the evaluation method on the documents' quality of building engineering design, which included four parts mainly: introducing the system engineering of building engineering design, forming the assessment index system on quality of building engineering design and utilizing a fuzzy comprehensive evaluation method to evaluate the quality of constructing documents design. It was shown that the building engineering design quality can be evaluated perfectly and reasonably through the quality multi-layered assessment method with Fuzzy evaluation. Then the building engineering quality will be improved.
{"title":"Evaluation method of building engineering design quality","authors":"S. Yongqiang, Li Qiangli","doi":"10.1109/ICIME.2010.5478243","DOIUrl":"https://doi.org/10.1109/ICIME.2010.5478243","url":null,"abstract":"The goal of this paper is to research the evaluation method on the documents' quality of building engineering design, which included four parts mainly: introducing the system engineering of building engineering design, forming the assessment index system on quality of building engineering design and utilizing a fuzzy comprehensive evaluation method to evaluate the quality of constructing documents design. It was shown that the building engineering design quality can be evaluated perfectly and reasonably through the quality multi-layered assessment method with Fuzzy evaluation. Then the building engineering quality will be improved.","PeriodicalId":382705,"journal":{"name":"2010 2nd IEEE International Conference on Information Management and Engineering","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116706657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-04-16DOI: 10.1109/ICIME.2010.5478345
Letian Sha, Hong-Xia Wang
There is no standardized definition to characterize R/Bootkit that threatens kernel security of boot process in operating system. Most existing detection techniques attempt to detect the performance of it in the running stage of operating system, rather than protect kernel modules in the boot process. This paper proposes a new trust chain, where the trust root is TPM, which checks all kernel modules from CPU to the application environment, then security of kernel modules can be ensured out of R/Bootkit. In addition, a neural network is designed to identify known and unknown R/Bootkit. The test results show that we can correctly detect illegal modifications for kernel modules.
{"title":"R/Bootkit detection based on trusted computing and neural network","authors":"Letian Sha, Hong-Xia Wang","doi":"10.1109/ICIME.2010.5478345","DOIUrl":"https://doi.org/10.1109/ICIME.2010.5478345","url":null,"abstract":"There is no standardized definition to characterize R/Bootkit that threatens kernel security of boot process in operating system. Most existing detection techniques attempt to detect the performance of it in the running stage of operating system, rather than protect kernel modules in the boot process. This paper proposes a new trust chain, where the trust root is TPM, which checks all kernel modules from CPU to the application environment, then security of kernel modules can be ensured out of R/Bootkit. In addition, a neural network is designed to identify known and unknown R/Bootkit. The test results show that we can correctly detect illegal modifications for kernel modules.","PeriodicalId":382705,"journal":{"name":"2010 2nd IEEE International Conference on Information Management and Engineering","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127291427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-04-16DOI: 10.1109/ICIME.2010.5478168
Wenjie Yang, Hao-Xue Liu, Jie Shi
The strong features of printing industry and production mode of order-driven make the complexity of the design of printing ERP system. On the basis of the status and characteristics of printing enterprises, this paper presents the demand analysis and builds a framework for ERP system in modern printing enterprise. The framework is divided into several parts to develop the B/S pattern printing ERP software system using Java series technology, which are database, data access component, business logic component, controller, XML component, view component. The development based on many components is advantageous for building the ERP system according to business needs and makes the maintenance and upgrading become more convenient. The paper also introduces the business management, production management, materials management functional modules and so on achieved by the ERP system.
{"title":"The design of printing enterprise resources planning (ERP) software","authors":"Wenjie Yang, Hao-Xue Liu, Jie Shi","doi":"10.1109/ICIME.2010.5478168","DOIUrl":"https://doi.org/10.1109/ICIME.2010.5478168","url":null,"abstract":"The strong features of printing industry and production mode of order-driven make the complexity of the design of printing ERP system. On the basis of the status and characteristics of printing enterprises, this paper presents the demand analysis and builds a framework for ERP system in modern printing enterprise. The framework is divided into several parts to develop the B/S pattern printing ERP software system using Java series technology, which are database, data access component, business logic component, controller, XML component, view component. The development based on many components is advantageous for building the ERP system according to business needs and makes the maintenance and upgrading become more convenient. The paper also introduces the business management, production management, materials management functional modules and so on achieved by the ERP system.","PeriodicalId":382705,"journal":{"name":"2010 2nd IEEE International Conference on Information Management and Engineering","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127481309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}