{"title":"Information Extraction of Strategic Activities Based on Semi-structured Text","authors":"Xubu Ma, Ju-e Guo","doi":"10.1109/CSO.2014.114","DOIUrl":"https://doi.org/10.1109/CSO.2014.114","url":null,"abstract":"The paper constructed the information extraction method to extract description characteristic of execution process from the description text to provide data support for the evaluation of enterprise strategy execution effectiveness. The constructed information extraction method included two stages, i.e., Feature information extraction and information integration. It overcame some weaknesses of the current information extraction technology, such as its mere use for extracting time, address and other named entities. Firstly, the information extraction process of descriptive information is designed through establishing substantial GATE vocabularies and compiling ordinary and special extraction rules to avoid the disadvantages of the identification of GATE in Chinese named entity. Then, rules of integration of description characteristics information are established on the basis of semantic relation, positional relation to structurally represent the process of executing strategic activities.","PeriodicalId":174800,"journal":{"name":"2014 Seventh International Joint Conference on Computational Sciences and Optimization","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124112448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Prediction on Diesel Price in China with an Exponential Smoothing Method","authors":"Yang Ding, Quan Wen, Boya Shen","doi":"10.1109/CSO.2014.150","DOIUrl":"https://doi.org/10.1109/CSO.2014.150","url":null,"abstract":"This paper starts from the changes of diesel price in China, and then makes the seasonal adjustment and trend decomposition based on the diesel prices time series data from December 2009 to January 2013 to predict the price of diesel by an exponential smoothing method. The results show that the diesel price (10 #) in China still has the rising trend and the predicted diesel (10 #) prices will reach a maximum of 10,161.84 Yuan/ton in May 2014 according to a multiplicative model. The accurately predicted diesel prices can serve to the strategy development in the related industries.","PeriodicalId":174800,"journal":{"name":"2014 Seventh International Joint Conference on Computational Sciences and Optimization","volume":"845 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125437054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Key Element Identification in Cooperative Technological Innovation Risk on Social Network Analysis","authors":"Xiao-chun Ge","doi":"10.1109/CSO.2014.66","DOIUrl":"https://doi.org/10.1109/CSO.2014.66","url":null,"abstract":"Cooperative technological innovation, with various hidden risks, often leads to technological innovation aborted. In order to deal with risks, this paper defines cooperative technological innovation risk element networks from the viewpoint of system theory. Based on the network characteristics, the paper introduces Social Network Analysis (SNA) to build a key element recognition model through the three dimensions of factor analysis, relations analysis, matrix analysis from cooperative technological innovation risk elements. Finally, the paper tests the model based on an example and identifies eight key elements of cooperative technological innovation risks.","PeriodicalId":174800,"journal":{"name":"2014 Seventh International Joint Conference on Computational Sciences and Optimization","volume":"2197 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130132470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Discussion on the Statistical Analysis Method","authors":"Hong Liu","doi":"10.1109/CSO.2014.80","DOIUrl":"https://doi.org/10.1109/CSO.2014.80","url":null,"abstract":"There are many methods in statistical analysis, but the basic approach is quantitative analysis. Statistical analysis requires a combination of quantitative and qualitative analysis. Qualitative analysis is fundamental, and a quantitative analysis, which is the core of statistical analysis, is based on the precision of the qualitative analysis. The process of statistical analysis includes qualitative analysis-quantitative analysis-qualitative analysis. According to different nature of statistical analysis contents, there are kinds of methods can be used: state analysis, factor analysis, link analysis, trend analysis, decision analysis, multi-level analysis.","PeriodicalId":174800,"journal":{"name":"2014 Seventh International Joint Conference on Computational Sciences and Optimization","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125013507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Virtualization in Enterprises' Different Growth Stages and Its Motives: A Classical Grounded Theory Research","authors":"Xudong Jia, Liang Heng","doi":"10.1109/CSO.2014.49","DOIUrl":"https://doi.org/10.1109/CSO.2014.49","url":null,"abstract":"Virtualization is taken as a special operating phenomenon, which is widely applied in industry circles and becoming a hot spot in academic circles. So, in order to explain the phenomenon and solve the problem of the motives in different stages of enterprises' development, two Chinese indigenous companies' interviews and cases are used in this paper. By introducing the classical grounded theory and its coding technique, a large number of primary sources and secondary sources are integrated and optimized to explain the enterprises' virtualization phenomenon. For illustration, empirical analysis results show that enterprises choose virtualization in pioneering stage that we define it as pioneering stage virtualization and the other enterprises do the same things in developing stage that we define it as developing stage virtualization in the process of open coding and selective coding. In the stage of theoretical coding, comparing the two stages of virtualization, their different motives emerged. By exploring the regulation underlying the phenomenon, we develop a specific conceptual model that the motives of virtualization are in enterprises' different growth stages. Motives model reveal the reasons why enterprises take virtualization as the optimized choice in different stages. The model will help practitioners and researchers fully understand enterprises' virtualization from a unique perspective. Our findings provide insights to literature of virtualization, and contribute general knowledge to theories of virtualization.","PeriodicalId":174800,"journal":{"name":"2014 Seventh International Joint Conference on Computational Sciences and Optimization","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126952418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Evaluation of Land Use Sustainability of \"City Village\" Reconstruction Project: A Case Study of North ShaPo Village, Xi'an","authors":"P. Bai, Pengrui Bai","doi":"10.1109/CSO.2014.133","DOIUrl":"https://doi.org/10.1109/CSO.2014.133","url":null,"abstract":"Xi'an is in a critical period of urbanization. The quantitative assessment of renovation sustainability of \"city village\" provides a theoretical basis for the sustainable development monitoring by the city government and the urban development planning. According to the connotation of sustainable land use and combining the characteristics of urbanization in Xi'an, 18 land use factors were chosen. Then the study established an evaluation index system, and used the comprehensive index method to evaluate the level of sustainable land use of Xi'an north ShaPo Village during 2005-2012. The results show that from 2005 to 2012, the sustainable land use status of Xi'an North ShaPo Village rises from a lower level to a higher level. Then through the Secondary Comprehensive Evaluation, the final result shows that the village's overall sustainable land use level is in the initial stage, even worse it is still in the preliminary stages of a low-level.","PeriodicalId":174800,"journal":{"name":"2014 Seventh International Joint Conference on Computational Sciences and Optimization","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122003475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Transfer Learning Based Classifier Ensemble Model for Customer Credit Scoring","authors":"Jin Xiao, Runzhe Wang, Ge-Er Teng, Y. Hu","doi":"10.1109/CSO.2014.21","DOIUrl":"https://doi.org/10.1109/CSO.2014.21","url":null,"abstract":"Customer credit scoring is an important concern for numerous domestic and global industries. It is difficult to achieve satisfactory performance by traditional models constructed on the assumption that the training and test data are subject to the same distribution, because the customers usually come from different districts and may be subject to different distributions in reality. This study combines ensemble learning and transfer learning, and proposes a clustering and selecting based dynamic transfer ensemble (CSTE) model to transfer the related source domains to target domain for assisting in modeling. The experimental results in a large customer credit scoring dataset show that CSTE model outperforms two traditional credit scoring models, as well as three existing transfer learning models.","PeriodicalId":174800,"journal":{"name":"2014 Seventh International Joint Conference on Computational Sciences and Optimization","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127875391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Modified Storage Format for Accelerating SPMV","authors":"Jin Tian, Fei Wu, Guohui Zeng, Li Gong","doi":"10.1109/CSO.2014.106","DOIUrl":"https://doi.org/10.1109/CSO.2014.106","url":null,"abstract":"This paper aims to study how to choose an effective storage format to accelerate sparse matrix vector product (SMVP) occurring in different numerical methods. We discuss and analyze the storage formats of SMVP which implemented on a GPU. The formats are used for hastening the solution of equations arising from numerical methods. The research in this paper can provide fast selects, which allow low storage space and make memory accesses efficiency, for numerical methods to accelerate SMVP.","PeriodicalId":174800,"journal":{"name":"2014 Seventh International Joint Conference on Computational Sciences and Optimization","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127461409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Real Options Pricing Framework for Valuation of Security Professionals","authors":"Jun Wang, Hongyu Guo","doi":"10.1109/CSO.2014.101","DOIUrl":"https://doi.org/10.1109/CSO.2014.101","url":null,"abstract":"Many organizations have to invest necessarily security technologies and facilities to defense malicious attacks. However, those security technology facilities will not be effective to mitigate damages without the security professionals to operate them correctly. Demonstrating security professional' value in these areas will, therefore, be crucial. In this paper, we analyze professionals of security as human resources investments using the real options approach, and develop a framework for determining the financial value of information security professionals to prospective protecting organizations assets. The pricing framework gains an understanding of how information security professionals to create value and reveal the optimal investments critical point. The pricing of security professionals is based on a fraction of diminished future malicious attacks to prospective protecting organizations assets. It can help organization decide the timing of the investment, i.e., Decide to purchase or develop security technology facilities and to recruit security professionals now or later.","PeriodicalId":174800,"journal":{"name":"2014 Seventh International Joint Conference on Computational Sciences and Optimization","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129151763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved FMEA Application to Evaluation of Supply Chain Vulnerability","authors":"Jiaguo Liu, Yuexiang Zhou","doi":"10.1109/CSO.2014.63","DOIUrl":"https://doi.org/10.1109/CSO.2014.63","url":null,"abstract":"How to find out the vulnerability and the potential failure mode in supply chain, then evaluating them means much to the protection and controlling of supply chain risks. Based on the supply chain reference operation model SCOR, this paper first gets the evaluation index system and the corresponding potential failure mode, then combined with the fuzzy set theory and grey relational theory, constructs evaluation model of supply chain vulnerability considering the index weight of all levels and the decision factors weight, and finally uses the evaluation model into some enterprises for empirical study. The result shows that the model can provide practical process guidance for enterprise in supply chain vulnerability evaluation and have practical value in management of supply chain vulnerability.","PeriodicalId":174800,"journal":{"name":"2014 Seventh International Joint Conference on Computational Sciences and Optimization","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128124913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}