Pub Date : 2010-04-16DOI: 10.1109/ICIME.2010.5478004
Linli Hu, Yuhao Wang, Dong Li, Jing Li
With the development of information society and the improvement of people's needs, E-ticket is an inevitable trend, which means a common platform for online ticketing has become a priority. This paper presents an integrated ticketing system based on two-dimensional (2-D) barcode on mobile phone, using coding and decoding technology of 2-D code and MD5 Message Digest Algorithm. There are also presentations of framework structure, module function and class designing in this paper.
{"title":"A hybrid client/server and browser/server mode-based universal mobile ticketing system","authors":"Linli Hu, Yuhao Wang, Dong Li, Jing Li","doi":"10.1109/ICIME.2010.5478004","DOIUrl":"https://doi.org/10.1109/ICIME.2010.5478004","url":null,"abstract":"With the development of information society and the improvement of people's needs, E-ticket is an inevitable trend, which means a common platform for online ticketing has become a priority. This paper presents an integrated ticketing system based on two-dimensional (2-D) barcode on mobile phone, using coding and decoding technology of 2-D code and MD5 Message Digest Algorithm. There are also presentations of framework structure, module function and class designing in this paper.","PeriodicalId":382705,"journal":{"name":"2010 2nd IEEE International Conference on Information Management and Engineering","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123966168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-04-16DOI: 10.1109/ICIME.2010.5477561
Wu Di, Yan-Xiu He, Zhang Yao-dan, Xie Jianfen
E-Press is an important technology of information system which can be applied in almost all the publishing companies and accessed by many types of network clients. This paper introduces an E-Press system which implemented based on Java 2 Enterprise Edition (J2EE) and role-based access control (RBAC) technology. The E-Press system is developed for Huazhong University of Science and Technology Press and can powerfully support the whole resource and business management of the press.
{"title":"An E-Press system based on J2EE and RBAC","authors":"Wu Di, Yan-Xiu He, Zhang Yao-dan, Xie Jianfen","doi":"10.1109/ICIME.2010.5477561","DOIUrl":"https://doi.org/10.1109/ICIME.2010.5477561","url":null,"abstract":"E-Press is an important technology of information system which can be applied in almost all the publishing companies and accessed by many types of network clients. This paper introduces an E-Press system which implemented based on Java 2 Enterprise Edition (J2EE) and role-based access control (RBAC) technology. The E-Press system is developed for Huazhong University of Science and Technology Press and can powerfully support the whole resource and business management of the press.","PeriodicalId":382705,"journal":{"name":"2010 2nd IEEE International Conference on Information Management and Engineering","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124153752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-04-16DOI: 10.1109/ICIME.2010.5477441
Baolin Xu, Yangqing Xiao
This paper analyses knowledge strategy space and decision model of venture capitalists (VCs). Drawing from the knowledge-based view, we examine the space of knowledge strategy for venture capitalists (VCs). Development of internal knowledge is the basic strategy for their acquisition of knowledge; Seeking of knowledge resources from the external world is their expansion strategy. The syndicated investments have been the best channels for inter-organizational learning for VCs. Furthermore, we develops a knowledge strategy decision model for VCs based on transformative economic society and probes into the influence of transformation of economic society on the choices of VCs towards knowledge strategy as well as the dynamic process of transition of social capital from a "Guanxi"-based ones to an "embedded" type. The model could be expanded to analyze the influence of firm size and project innovativeness on the knowledge strategy decision of VCs.
{"title":"Knowledge strategy of venture capitalists and the decision model","authors":"Baolin Xu, Yangqing Xiao","doi":"10.1109/ICIME.2010.5477441","DOIUrl":"https://doi.org/10.1109/ICIME.2010.5477441","url":null,"abstract":"This paper analyses knowledge strategy space and decision model of venture capitalists (VCs). Drawing from the knowledge-based view, we examine the space of knowledge strategy for venture capitalists (VCs). Development of internal knowledge is the basic strategy for their acquisition of knowledge; Seeking of knowledge resources from the external world is their expansion strategy. The syndicated investments have been the best channels for inter-organizational learning for VCs. Furthermore, we develops a knowledge strategy decision model for VCs based on transformative economic society and probes into the influence of transformation of economic society on the choices of VCs towards knowledge strategy as well as the dynamic process of transition of social capital from a \"Guanxi\"-based ones to an \"embedded\" type. The model could be expanded to analyze the influence of firm size and project innovativeness on the knowledge strategy decision of VCs.","PeriodicalId":382705,"journal":{"name":"2010 2nd IEEE International Conference on Information Management and Engineering","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123327384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-04-16DOI: 10.1109/ICIME.2010.5477807
Shan Zhong, Kaijian Xia, Xudong Yin, Jin-yi Chang
Reason about action of intelligent agent is surely one of the most exciting and challenging areas in Artificial Intelligence. Intelligent agents are embedded in an incomplete, dynamic environment to reason about action from the initial state to the final state. The Petri net as a mathematical model has the characteristics of dynamics, asynchronous, concurrent, and other features which make it can perfectly represent reasoning about action for agents and has the intuitive graphic representation for analysis. A new formalized representation method-CPNRA net (Colored Petri Net for reasoning about action) is advanced, the actions, states and the compound actions are formalized. And then a method for generating CPNRA net system is introduced which can make the agent reason about actions automatically and goal-targeted in the dynamic environment. Finally, the example office sending coffee is simulated and proves CPNRA net model as an effective method to represent reason about action.
{"title":"The representation and simulation for reasoning about action based on Colored Petri Net","authors":"Shan Zhong, Kaijian Xia, Xudong Yin, Jin-yi Chang","doi":"10.1109/ICIME.2010.5477807","DOIUrl":"https://doi.org/10.1109/ICIME.2010.5477807","url":null,"abstract":"Reason about action of intelligent agent is surely one of the most exciting and challenging areas in Artificial Intelligence. Intelligent agents are embedded in an incomplete, dynamic environment to reason about action from the initial state to the final state. The Petri net as a mathematical model has the characteristics of dynamics, asynchronous, concurrent, and other features which make it can perfectly represent reasoning about action for agents and has the intuitive graphic representation for analysis. A new formalized representation method-CPNRA net (Colored Petri Net for reasoning about action) is advanced, the actions, states and the compound actions are formalized. And then a method for generating CPNRA net system is introduced which can make the agent reason about actions automatically and goal-targeted in the dynamic environment. Finally, the example office sending coffee is simulated and proves CPNRA net model as an effective method to represent reason about action.","PeriodicalId":382705,"journal":{"name":"2010 2nd IEEE International Conference on Information Management and Engineering","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123347470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-04-16DOI: 10.1109/ICIME.2010.5478135
Jianmin Xie, Qin Qin
Proposed based on wavelet transform of digital image watermark embedding and extraction algorithms, according to the algorithm designed and implemented with an intuitive visual significance of the binary image and extract the hidden watermark, and Of the algorithm of filtering, noise, geometry and other attacks on experiments. To quantitatively validate the robustness of the algorithm, using Normalized Cross-Correlation to Verify extracted watermark with the original watermark similarity, using PeakSignal-to-Noise Ratio to evaluate the difference between the original image and the watermarked image. The experimental results show that the algorithm research paper is feasible, simple, easy to implement.
{"title":"Study of image digital watermarking algorithm and robustness based on the wavelet transform techniques","authors":"Jianmin Xie, Qin Qin","doi":"10.1109/ICIME.2010.5478135","DOIUrl":"https://doi.org/10.1109/ICIME.2010.5478135","url":null,"abstract":"Proposed based on wavelet transform of digital image watermark embedding and extraction algorithms, according to the algorithm designed and implemented with an intuitive visual significance of the binary image and extract the hidden watermark, and Of the algorithm of filtering, noise, geometry and other attacks on experiments. To quantitatively validate the robustness of the algorithm, using Normalized Cross-Correlation to Verify extracted watermark with the original watermark similarity, using PeakSignal-to-Noise Ratio to evaluate the difference between the original image and the watermarked image. The experimental results show that the algorithm research paper is feasible, simple, easy to implement.","PeriodicalId":382705,"journal":{"name":"2010 2nd IEEE International Conference on Information Management and Engineering","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123628253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-04-16DOI: 10.1109/ICIME.2010.5477623
A. Sengupta
This paper aims to discuss a few factors that have to be taken into consideration before you really decide to jump into the bandwagon of this huge investment. Two specific case studies have been examined in detail.
本文旨在讨论在您真正决定投入这一巨大投资之前必须考虑的几个因素。详细审查了两个具体的案例研究。
{"title":"Enterprise information system with ERP — Pitfalls and way to overcome: A case study","authors":"A. Sengupta","doi":"10.1109/ICIME.2010.5477623","DOIUrl":"https://doi.org/10.1109/ICIME.2010.5477623","url":null,"abstract":"This paper aims to discuss a few factors that have to be taken into consideration before you really decide to jump into the bandwagon of this huge investment. Two specific case studies have been examined in detail.","PeriodicalId":382705,"journal":{"name":"2010 2nd IEEE International Conference on Information Management and Engineering","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121191043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-04-16DOI: 10.1109/ICIME.2010.5477983
Zhigang Yang, Huokun Li, Lianghui Li
Based on reliability theory of total Probability, with the concept of sample's weighting coefficient, the minimum sample size can be obtained according to the numerical characteristic values of random variables and the minor sample t-distribution estimation under a certain expected value. And then the design of Uniform Experimental is used to system analysis, which can greatly reduce the number of experiments of stochastic FEM. Meanwhile, the weight coefficients of the random sample combinations are determined using the Bayes formula, and different sample combinations are taken as the input for system analysis. According to one-to-one mapping between the input sample combination and the output coefficient, the reliability index can be obtained with the multiplication principle. According to the weighting coefficient of corresponding random samples, the reliability index is obtained by the use of Bayes formula. At last the reliability method of system analysis based on sample's weighting -uniform experimental-stochastic FEM is tested to be feasible and effective for large and complex system analysis and practical experience in engineering project.
{"title":"An system analysis of the reliability method based on sample's weighting — Uniform experimental-stochastic FEM","authors":"Zhigang Yang, Huokun Li, Lianghui Li","doi":"10.1109/ICIME.2010.5477983","DOIUrl":"https://doi.org/10.1109/ICIME.2010.5477983","url":null,"abstract":"Based on reliability theory of total Probability, with the concept of sample's weighting coefficient, the minimum sample size can be obtained according to the numerical characteristic values of random variables and the minor sample t-distribution estimation under a certain expected value. And then the design of Uniform Experimental is used to system analysis, which can greatly reduce the number of experiments of stochastic FEM. Meanwhile, the weight coefficients of the random sample combinations are determined using the Bayes formula, and different sample combinations are taken as the input for system analysis. According to one-to-one mapping between the input sample combination and the output coefficient, the reliability index can be obtained with the multiplication principle. According to the weighting coefficient of corresponding random samples, the reliability index is obtained by the use of Bayes formula. At last the reliability method of system analysis based on sample's weighting -uniform experimental-stochastic FEM is tested to be feasible and effective for large and complex system analysis and practical experience in engineering project.","PeriodicalId":382705,"journal":{"name":"2010 2nd IEEE International Conference on Information Management and Engineering","volume":"169 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114098129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-04-16DOI: 10.1109/ICIME.2010.5477810
Wu Shaoyan, Lian Xiaoqin
From the perspective of system science, multiple objectives of a construction project can be regarded as a system. The degree of coordination of the objective system is improved by multi-objective synergy optimization. The concepts of efficacy coefficient and the extent of system coordination are introduced, sub-objective system efficacy function of cost, time, quality and resources are set up separately and an optimization model of coordination extent of objective system of construction project is proposed accordingly. A new algorithm is employed to conduct the model optimization. After introducing the basic theory of the algorithms, a numerical example is given.
{"title":"New perspective of multi-objective synergy optimization of a construction project","authors":"Wu Shaoyan, Lian Xiaoqin","doi":"10.1109/ICIME.2010.5477810","DOIUrl":"https://doi.org/10.1109/ICIME.2010.5477810","url":null,"abstract":"From the perspective of system science, multiple objectives of a construction project can be regarded as a system. The degree of coordination of the objective system is improved by multi-objective synergy optimization. The concepts of efficacy coefficient and the extent of system coordination are introduced, sub-objective system efficacy function of cost, time, quality and resources are set up separately and an optimization model of coordination extent of objective system of construction project is proposed accordingly. A new algorithm is employed to conduct the model optimization. After introducing the basic theory of the algorithms, a numerical example is given.","PeriodicalId":382705,"journal":{"name":"2010 2nd IEEE International Conference on Information Management and Engineering","volume":"93 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114100676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-04-16DOI: 10.1109/ICIME.2010.5478165
Guo Jian, Jia Chuang-liang, L. Ai-hua
Project risk evaluation is the basis of project risk management, and it is the sticking point of the successful project implementation. In this paper, a group decision making approach based on multi-granularity linguistic assessment information is used to evaluate the project risk. The linguistic 2-tuple representation model and computing model are taken for dealing with multi-granular linguistic assessment information. Firstly, the experts linguistic assessment information is represented in the form of 2-tuple. Secondly, the basic linguistic term set is chosen from multi-granularity, linguistic term sets and the computational formulae are given to uniform the multi-granular linguistic assessment information into the normalized representation of the 2-tuple linguistic. Then, the experts' weights in each attribute are obtained, and the group evaluation results of the project risk are determined according to an optimization model. Finally, a numerical example of ERP project illustrates the effectiveness of the proposed approach.
{"title":"An approach for project risk evaluation based on linguistic assessment information","authors":"Guo Jian, Jia Chuang-liang, L. Ai-hua","doi":"10.1109/ICIME.2010.5478165","DOIUrl":"https://doi.org/10.1109/ICIME.2010.5478165","url":null,"abstract":"Project risk evaluation is the basis of project risk management, and it is the sticking point of the successful project implementation. In this paper, a group decision making approach based on multi-granularity linguistic assessment information is used to evaluate the project risk. The linguistic 2-tuple representation model and computing model are taken for dealing with multi-granular linguistic assessment information. Firstly, the experts linguistic assessment information is represented in the form of 2-tuple. Secondly, the basic linguistic term set is chosen from multi-granularity, linguistic term sets and the computational formulae are given to uniform the multi-granular linguistic assessment information into the normalized representation of the 2-tuple linguistic. Then, the experts' weights in each attribute are obtained, and the group evaluation results of the project risk are determined according to an optimization model. Finally, a numerical example of ERP project illustrates the effectiveness of the proposed approach.","PeriodicalId":382705,"journal":{"name":"2010 2nd IEEE International Conference on Information Management and Engineering","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114109129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-04-16DOI: 10.1109/ICIME.2010.5477757
Heyong Wang, Mingjian Li, Bingchuan Chen
During the data integration process, it puts forward the accelerating trend comparison method to deal with the outlier data in this paper. Namely outlier data is discovered through the accelerating trend comparison. At the end of this article, it gives a specific description of the algorithm of outlier data cleaning results. It can improve the detection of outlier data and the data quality through the experiments.
{"title":"The research of outlier data cleaning based on accelerating method","authors":"Heyong Wang, Mingjian Li, Bingchuan Chen","doi":"10.1109/ICIME.2010.5477757","DOIUrl":"https://doi.org/10.1109/ICIME.2010.5477757","url":null,"abstract":"During the data integration process, it puts forward the accelerating trend comparison method to deal with the outlier data in this paper. Namely outlier data is discovered through the accelerating trend comparison. At the end of this article, it gives a specific description of the algorithm of outlier data cleaning results. It can improve the detection of outlier data and the data quality through the experiments.","PeriodicalId":382705,"journal":{"name":"2010 2nd IEEE International Conference on Information Management and Engineering","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114511799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}