{"title":"Two-Player Two-Fair-Class Hotel Revenue Management Game with Incomplete Information of Transferred Customers","authors":"Jingpu Song, Qingda Yuan, Yan Mao","doi":"10.1109/ISME.2010.282","DOIUrl":"https://doi.org/10.1109/ISME.2010.282","url":null,"abstract":"In this paper, we studied a two-player two-fare-class(high-fare and low-fare) static game with incomplete information of transfer rate for the hotel room inventory control. We examine the optimal booking policies of each player with different information structures: secret information, private information and public information. Our studies indicated that the value of secret information is always non-negative for both players and there exists a unique Bayesian Nash equilibrium in the game when one player receives the private information of the transfer rate. We also evaluated the values of private and public information for one player and we provided the conditions by which one player might use or drop the information of transferrate. Finally, our numerical experiments show that in the scenario when the booking requests expectations of one hotel are high and the booking requests expectations of the other are low, the value of any type of information is as high as 3% of his total expected revenue.","PeriodicalId":348878,"journal":{"name":"2010 International Conference of Information Science and Management Engineering","volume":"174 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122058727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research Transplanting Method of Embedded Linux Kernel Based on ARM Platform","authors":"Jie Hu, Gen-bao Zhang","doi":"10.1109/ISME.2010.191","DOIUrl":"https://doi.org/10.1109/ISME.2010.191","url":null,"abstract":"A novel transplanting method for embedded linux kernel is presented in this work. Linux kernel as well as its cut, compile and porting process under ARM platform are introduced. Transplantation of the operating system can be divided into configuration, cutting the source code, cross compiler and so on. The article gives a more detailed description of the above steps, including the concrete realization of cutting and the compilation process. Transplantation of linux kernel is the prerequisite and basis for the development of embedded system, giving a great significance for the development of embedded system.","PeriodicalId":348878,"journal":{"name":"2010 International Conference of Information Science and Management Engineering","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124015851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mining Web Log Sequential Patterns with Layer Coded Breadth-First Linked WAP-Tree","authors":"Lizhi Liu, Jun Liu","doi":"10.1109/ISME.2010.271","DOIUrl":"https://doi.org/10.1109/ISME.2010.271","url":null,"abstract":"Sequential mining is the process of applying data mining techniques to a sequential database for the purposes of discovering the correlation relationships that exist among an ordered list of events. An important application of sequential mining techniques is web usage mining, for mining web log accesses, which the sequences of web page accesses made by different web users over a period of time, through a server, are recorded. Web access pattern tree (WAP-tree) mining is a sequential pattern mining technique for web log access sequences. This paper proposes a more efficient approach for using the BFWAP-tree to mine frequent sequences, which reflects ancestor-descendant relationship of nodes in BFWAP tree directly and efficiently. The proposed algorithm builds the frequent header node links of the original WAP-tree in a Breadth-First fashion and uses the layer code of each node to identify the ancestor-descendant relationships between nodes of the tree. It then, finds each frequent sequential pattern, through progressive Breadth-First sequence search, starting with its first Breadth-First subsequence event. Experiments show huge performance gain over the WAP-tree technique.","PeriodicalId":348878,"journal":{"name":"2010 International Conference of Information Science and Management Engineering","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125040824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic Vehicle Detection Algorithm Based on Background Updating and Suppressing","authors":"Li Peng, Ma Hongmei, Huang Chengyu, Xu Bo","doi":"10.1109/ISME.2010.111","DOIUrl":"https://doi.org/10.1109/ISME.2010.111","url":null,"abstract":"In the vision-based traffic system for the moving vehicle detection, the accuracy of vehicle detection is heavily based on exact acquirement of the background, this paper presents a T-distribution background reconstruction algorithm of moving vehicle detection to obtain background pixels, that is, the background image which doesn't contain any moving objects is restored by integrating of several background images, and background image is reconstructed and updated constantly while the background is variational. Then the extract moving area is extracted by background suppression method in based on the RGB color space, and considering the environment’s change, the threshold of the three-channel’s noise variance of RGB image is added to the average value of the gray-level’s change. The experimental results show that the background reconstructed can reflect the real background and extract the more integrated complete moving area comparing with the frame-difference method.","PeriodicalId":348878,"journal":{"name":"2010 International Conference of Information Science and Management Engineering","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129407729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Manufacturer's Product Pricing Model under Waste Self-Selection Disposal Mode","authors":"Di Wu, Chunyou Wu","doi":"10.1109/ISME.2010.177","DOIUrl":"https://doi.org/10.1109/ISME.2010.177","url":null,"abstract":"Under the pressure of environmental regulations and public opinion, manufacturers must take on its responsibility for waste disposal, which caused the increase of its operating cost. Therefore, it is important for studying in product pricing under the waste self-selection disposal mode of manufacturer to advancing the formation of competitive advantage of product price. Based on this, this paper establishes an organic contact between three kind of waste and waste self-selection disposal mode, analyses the basic characteristics of different modes and constructs the pricing models by the method of econometrics. This paper confirms the optimal product pricing and profits of different waste and provides references for manufacturer to choose appropriate disposal modes.","PeriodicalId":348878,"journal":{"name":"2010 International Conference of Information Science and Management Engineering","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129901601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Stock Market, Exchange Rate and Chinese Money Demand","authors":"Xiao Weiguo, Yuan Wei, Zhang Chen","doi":"10.1109/ISME.2010.150","DOIUrl":"https://doi.org/10.1109/ISME.2010.150","url":null,"abstract":"The paper examines the long-term relationship among RMB exchange rate, stock market, interest rate, consumption, general real money balance and their dynamics from 2000 to 2009 by employing Johanson and SVAR methods. The result shows: exchange rate and stock market have significant effects on long-term money demand. In short run, RMB appreciation expectation leads to net increments of real money balance and stock market variation increases real money demand at the first two month. Only small part of the huge international capital caused by RMB appreciation expectation flows to Chinese stock market. The policy suggestions are as follows: Chinese monetary authority should consider exchange rate and stock market when implementing the m2-aiming monetary rule. In the circumstance of incresing RMB appreciattion expextation, the interest rate marketization process should be sped up and interest rate adjustment could moderate the shock of real money balance bought by exchange rate fluctuations.","PeriodicalId":348878,"journal":{"name":"2010 International Conference of Information Science and Management Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128577346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Requirements Engineering Based on Domain Ontology","authors":"Shunxin Li, Leijun Shi","doi":"10.1109/ISME.2010.110","DOIUrl":"https://doi.org/10.1109/ISME.2010.110","url":null,"abstract":"Requirements engineering is the foundation of software engineering, and quality of requirements engineering determines the quality of projects, while the traditional approaches do not meet the changing needs of the environment, it is difficult to describe by the unified and standardized form, but the ontology is a formal description of the concept of sharing, stressing the link between real entities, is the abstract of a specific exist, having sharing, reasoning function, etc.. The ontology applied to requirements engineering makes computer achieving understanding on the semantic level of information. This paper discusses the ontology related concepts and theories, puts forward the general framework of using an ontology needs analysis, and then uses example to illustrate how to use ontology needs analysis, validation and improvement.","PeriodicalId":348878,"journal":{"name":"2010 International Conference of Information Science and Management Engineering","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127112409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Establishment of Database to Protect Chinese Folklore","authors":"C. Sun","doi":"10.1109/ISME.2010.262","DOIUrl":"https://doi.org/10.1109/ISME.2010.262","url":null,"abstract":"To establish folklore database is an important way to protect folklore. This paper constructs a model for folklore database adapted to Chinese realities through theoretical and empirical research. During research on constructing Chinese folklore database, this paper firstly studies the establishment of folklore database body: 1. identify the basic principles of establishing defense-type database; 2. local universities and special research institutes collect materials as the subject; 3. input metadata into the database public retrieval to protect substantial content from being plagiarized. Secondly, this paper studies construction of folklore database platform.","PeriodicalId":348878,"journal":{"name":"2010 International Conference of Information Science and Management Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130206823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Framework Design of Changjiang River Water Traffic Safety Management Information Platform","authors":"Li Cheng, Liu Qing","doi":"10.1109/ISME.2010.12","DOIUrl":"https://doi.org/10.1109/ISME.2010.12","url":null,"abstract":"By analyzing the requirements of Changjiang River water traffic safety management information platform, to determine the system's end-users and intermediate users, and define customer services to connect the user's needs and functions of the platform. Based on summing up the needs of the participants, ultimately define five function modules for the platform and build the logical framework and physical framework. Those works are very significant for the construction of Changjiang River water traffic safety management information platform.","PeriodicalId":348878,"journal":{"name":"2010 International Conference of Information Science and Management Engineering","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131969319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Emergency Logistics Risk Assessment Based on AHM","authors":"Wu Chen, Qiang Feng, qingfeng xu","doi":"10.1109/ISME.2010.91","DOIUrl":"https://doi.org/10.1109/ISME.2010.91","url":null,"abstract":"The research on emergency logistics risk management is an important research study of emergency logistics. In this paper, we analyzed the emergency logistics characteristics and risk characteristics of emergency logistics,and discussed the related content of emergency logistics risk from five aspects of the technology, environment, management, flexibility, operating. Then we use AHM to establish the certified index system, and evaluate the emergency logistics risk. Attribute comprehensive evaluation applied to risk assessment makes the evaluation of emergency logistics risk more scientific, accurate and intelligent","PeriodicalId":348878,"journal":{"name":"2010 International Conference of Information Science and Management Engineering","volume":"8 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130946181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}