{"title":"Analysis on the Demand of Reverse Mortgage Based on Borrowers' Expectation","authors":"Yanyan Wu, Shitong Zhang, Yun-dal Sun","doi":"10.1109/ISME.2010.175","DOIUrl":"https://doi.org/10.1109/ISME.2010.175","url":null,"abstract":"China's old-age security system is facing more and more serious challenge from aging population. So it is important to study the feasibility of implementing the reverse mortgage (RM) business in China. This paper compares two types of RM pricing models (non-redeemable RM and redeemable RM), under taking account of borrowers’ uncertain expectation. Through theoretical analysis and empirical simulating results, we believe that because of borrowers’ strong tendency of heritage motivation, and unstable expectation on life expectancy or house value’s volatility, non-redeemable RM with endogenous instability is not suitable for implementation in China, which can explain the failures of some tries similar to non-redeemable RM in China recently.","PeriodicalId":348878,"journal":{"name":"2010 International Conference of Information Science and Management Engineering","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130983720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Robust Contour Tracking Algorithm","authors":"Jianjun Xu, Duyan Bi, Zifu Wei","doi":"10.1109/ISME.2010.96","DOIUrl":"https://doi.org/10.1109/ISME.2010.96","url":null,"abstract":"Under the conditions of fasting moving, shape changing and partial occlusion of target, Now mostly tracking algorithms are difficult to get accurate contour of target, for these problems, a novel contour tracking algorithm based on particle filter and fast level set is proposed. Firstly, the particle filter algorithm is adopted to estimate moving target’s boundary contour. Then, according to the nearest neighbor decision method, a new the velocity function of fast level set is found, the strongpoint of the function is that the tracking algorithm is fit for target and background changing. Finally, the contour tracking is realized by evolving the zero level set curve using fast level set algorithm which is proposed in this paper. Experiments for representative image sequences show that this algorithm can track the rigid and non-rigid target contour under the complex environments. The result indicates that this algorithm is robust and accurate compared with other tracking algorithms.","PeriodicalId":348878,"journal":{"name":"2010 International Conference of Information Science and Management Engineering","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127861957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on the Evaluation of Enterprise's Core Competence Based on Unascertained Measure","authors":"Yao Ligen, Dong Zhenlin","doi":"10.1109/ISME.2010.117","DOIUrl":"https://doi.org/10.1109/ISME.2010.117","url":null,"abstract":"Based on unascertained mathematics theory, the article attempts to conduct a research on the evaluation of enterprise’s core competence from intellectual capital perspective by using multi-level unascertained measure model. After introducing core competence theory and the relationship between core competence and intellectual capital, we constructed an evaluation index system according to the structure of intellectual capital and also established an unascertained measure model. The case analysis presented proves that this model is feasible and simple and the result of appraisal is reasonable and credible.","PeriodicalId":348878,"journal":{"name":"2010 International Conference of Information Science and Management Engineering","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129285482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study on Key Technologies of MANET","authors":"Zhonglin He, He Yuhua","doi":"10.1109/ISME.2010.32","DOIUrl":"https://doi.org/10.1109/ISME.2010.32","url":null,"abstract":"As MANET has characteristics like multi-hop wireless connection, dynamic topology, and limited bandwidth, its routing protocol faces great challenges. This paper briefly introduces the concept and characteristics of MANET. It puts an emphasis on the key technologies (wireless resource management technology, space interface theory technology, routing technology, Internet access technology, address automatic allocation technology, domain name system and service quality insurance technology) of MANET; at the same time, it makes a brief analysis on the realization of wireless resource management, space interface theory technology and service quality insurance technology.","PeriodicalId":348878,"journal":{"name":"2010 International Conference of Information Science and Management Engineering","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128879774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Disjoint Paths in Enhanced Hypercube","authors":"Yanjuan Zhang, Hongmei Liu","doi":"10.1109/ISME.2010.82","DOIUrl":"https://doi.org/10.1109/ISME.2010.82","url":null,"abstract":"This paper aims to investigate the internally disjoint paths in Q_{n,2}. For this purpose, the structural natures of Q_{n, k}(1 ≤ k ≤ n) are investigated in detail. The properties related to the partition of enhanced hypercube Q_{n,k}. Based on the results, it has been found that for any two distinct vertices x and y there exists n+1 internally disjoint paths connecting x and y, which traverses all vertices of Q_{n,2}. This paper aims to investigate the internally disjoint paths in Q_{n,2}. For this purpose, the structural natures of Q_{n,k}(1 ≤ k ≤ n) are investigated in detail. The properties related to the partition of enhanced hypercube Q_{n,k}. Based on the results, it has been found that for any two distinct vertices x and y there exists n + 1 internally disjoint paths connecting x and y, which traverses all vertices of Q_{n,2}.","PeriodicalId":348878,"journal":{"name":"2010 International Conference of Information Science and Management Engineering","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123303838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Pricing Coordination of Manufacturers Based on Logistics Outsourcing","authors":"Hua Liu, Chunhui Hu","doi":"10.1109/ISME.2010.90","DOIUrl":"https://doi.org/10.1109/ISME.2010.90","url":null,"abstract":"The static cooperation model between two manufacturers and a Third-party Logistics (3PLs) provider is represented in this paper. Under 3PLs provider’s restriction on service prices, manufacturers decide wholesale prices and reclaiming prices in independent decisions scenario and joint decisions scenario respectively. Comparing with the profit of manufacturers and 3PLs provider, we establish a mechanisms: Coordinating with Discounts of Logistics Prices based on four assumptions and three partners’ abilities of negotiating. Finally, we illustrate our mechanism with a numerical example.","PeriodicalId":348878,"journal":{"name":"2010 International Conference of Information Science and Management Engineering","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115856616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jinna Lv, Xiao-zhong Li, Zhi-Jun Zhang, Guohong Gao, Shun Wang
{"title":"A Video Storage Algorithm Based on Buffer and Anomaly Detection","authors":"Jinna Lv, Xiao-zhong Li, Zhi-Jun Zhang, Guohong Gao, Shun Wang","doi":"10.1109/ISME.2010.130","DOIUrl":"https://doi.org/10.1109/ISME.2010.130","url":null,"abstract":"In order to improve the efficiency of video information storage of the video surveillance system, this paper proposes a mechanism based on buffer and anomaly detection algorithm for video storage. The algorithm uses anomaly detection mechanism, only stored anomaly video, and uses buffer mechanism to completely store exception video information. Compared with the current algorithm, while maintaining the integrity of the video information it can effectively save the video storage space and improve video surveillance system of video storage efficiency.","PeriodicalId":348878,"journal":{"name":"2010 International Conference of Information Science and Management Engineering","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116618791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study of Microwave Dielectric Resonator Oscillator Frequency Degradation Model for Intelligent Maintenance Systems","authors":"Jinyong Yao, Haibo Su, Xiaogang Li","doi":"10.1109/ISME.2010.238","DOIUrl":"https://doi.org/10.1109/ISME.2010.238","url":null,"abstract":"This paper presents a modeling method to model and assess the Dielectric Resonator Oscillator (DRO) performance degradation to supply a basis for the fault diagnoses, health state estimates and life prediction of the DRO in the Intelligent Maintenance Systems (IMS). In our research, the model combines internal state transition model with the Brownian motion stochastic process to show the degradation mechanism and random factors respectively. The degradation models parameters were recognized by the degradation data coming from the Accelerated Degradation Test. The result indicates that the model significantly describes the DRO practical degradation process with an impressively small sum of squared residuals. We also resolved the curvilinear boundary crossing issue of Brownian motion with optimal linear approximation methods and presented an approximate life distribution.","PeriodicalId":348878,"journal":{"name":"2010 International Conference of Information Science and Management Engineering","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121789131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling and Simulation of Knowledge Transfer within an Inter-firm Network","authors":"Y. Shou, Yu Sun","doi":"10.1109/ISME.2010.137","DOIUrl":"https://doi.org/10.1109/ISME.2010.137","url":null,"abstract":"This paper aims to model the mechanism of knowledge transfer within an inter-firm network. An agent-based simulation model was established to examine the non-linear behavior and the determinant factors of knowledge transfer. Factors such as network size, tie density and link creation rules are included in the model. Eight scenarios were experimented to investigate the impacts of different factors on knowledge transfer performance. The results show that initial network size and link creation rules have significant influence on dynamics of inter-firm network knowledge systems, especially on network structure evolution.","PeriodicalId":348878,"journal":{"name":"2010 International Conference of Information Science and Management Engineering","volume":"177 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132359689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Method to Streamline the TCP/IP Protocol Stack at Embedded Systems","authors":"Jiang Xingguo, Qi Yulin, Yang Jiancheng","doi":"10.1109/ISME.2010.147","DOIUrl":"https://doi.org/10.1109/ISME.2010.147","url":null,"abstract":"The issue is a brief introduction of solution to realize the embedded Ethernet: Single Chip Microcomputer embedded TCP/IP Protocol Stack. We put forward the general thinking of the whole design program based on this solution and give the block diagram of the hardware system design. We focused on the specific design of software system and proposal to streamline the TCP/IP protocol stack. For the TCP/IP protocol stack may be used at all levels of the protocol: ARP, IP, ICMP, UDP analysis it thoroughly and give the work flow chart and the corresponding software design method to detail all levels of the protocol.","PeriodicalId":348878,"journal":{"name":"2010 International Conference of Information Science and Management Engineering","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133213561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}