2010 International Conference of Information Science and Management Engineering最新文献

筛选
英文 中文
Analysis on the Demand of Reverse Mortgage Based on Borrowers' Expectation 基于借款人预期的反向抵押贷款需求分析
Yanyan Wu, Shitong Zhang, Yun-dal Sun
{"title":"Analysis on the Demand of Reverse Mortgage Based on Borrowers' Expectation","authors":"Yanyan Wu, Shitong Zhang, Yun-dal Sun","doi":"10.1109/ISME.2010.175","DOIUrl":"https://doi.org/10.1109/ISME.2010.175","url":null,"abstract":"China's old-age security system is facing more and more serious challenge from aging population. So it is important to study the feasibility of implementing the reverse mortgage (RM) business in China. This paper compares two types of RM pricing models (non-redeemable RM and redeemable RM), under taking account of borrowers’ uncertain expectation. Through theoretical analysis and empirical simulating results, we believe that because of borrowers’ strong tendency of heritage motivation, and unstable expectation on life expectancy or house value’s volatility, non-redeemable RM with endogenous instability is not suitable for implementation in China, which can explain the failures of some tries similar to non-redeemable RM in China recently.","PeriodicalId":348878,"journal":{"name":"2010 International Conference of Information Science and Management Engineering","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130983720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Robust Contour Tracking Algorithm 一种新的鲁棒轮廓跟踪算法
Jianjun Xu, Duyan Bi, Zifu Wei
{"title":"A Novel Robust Contour Tracking Algorithm","authors":"Jianjun Xu, Duyan Bi, Zifu Wei","doi":"10.1109/ISME.2010.96","DOIUrl":"https://doi.org/10.1109/ISME.2010.96","url":null,"abstract":"Under the conditions of fasting moving, shape changing and partial occlusion of target, Now mostly tracking algorithms are difficult to get accurate contour of target, for these problems, a novel contour tracking algorithm based on particle filter and fast level set is proposed. Firstly, the particle filter algorithm is adopted to estimate moving target’s boundary contour. Then, according to the nearest neighbor decision method, a new the velocity function of fast level set is found, the strongpoint of the function is that the tracking algorithm is fit for target and background changing. Finally, the contour tracking is realized by evolving the zero level set curve using fast level set algorithm which is proposed in this paper. Experiments for representative image sequences show that this algorithm can track the rigid and non-rigid target contour under the complex environments. The result indicates that this algorithm is robust and accurate compared with other tracking algorithms.","PeriodicalId":348878,"journal":{"name":"2010 International Conference of Information Science and Management Engineering","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127861957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research on the Evaluation of Enterprise's Core Competence Based on Unascertained Measure 基于未确知测度的企业核心能力评价研究
Yao Ligen, Dong Zhenlin
{"title":"Research on the Evaluation of Enterprise's Core Competence Based on Unascertained Measure","authors":"Yao Ligen, Dong Zhenlin","doi":"10.1109/ISME.2010.117","DOIUrl":"https://doi.org/10.1109/ISME.2010.117","url":null,"abstract":"Based on unascertained mathematics theory, the article attempts to conduct a research on the evaluation of enterprise’s core competence from intellectual capital perspective by using multi-level unascertained measure model. After introducing core competence theory and the relationship between core competence and intellectual capital, we constructed an evaluation index system according to the structure of intellectual capital and also established an unascertained measure model. The case analysis presented proves that this model is feasible and simple and the result of appraisal is reasonable and credible.","PeriodicalId":348878,"journal":{"name":"2010 International Conference of Information Science and Management Engineering","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129285482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Study on Key Technologies of MANET MANET关键技术研究
Zhonglin He, He Yuhua
{"title":"Study on Key Technologies of MANET","authors":"Zhonglin He, He Yuhua","doi":"10.1109/ISME.2010.32","DOIUrl":"https://doi.org/10.1109/ISME.2010.32","url":null,"abstract":"As MANET has characteristics like multi-hop wireless connection, dynamic topology, and limited bandwidth, its routing protocol faces great challenges. This paper briefly introduces the concept and characteristics of MANET. It puts an emphasis on the key technologies (wireless resource management technology, space interface theory technology, routing technology, Internet access technology, address automatic allocation technology, domain name system and service quality insurance technology) of MANET; at the same time, it makes a brief analysis on the realization of wireless resource management, space interface theory technology and service quality insurance technology.","PeriodicalId":348878,"journal":{"name":"2010 International Conference of Information Science and Management Engineering","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128879774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
The Disjoint Paths in Enhanced Hypercube 增强超立方体中的不相交路径
Yanjuan Zhang, Hongmei Liu
{"title":"The Disjoint Paths in Enhanced Hypercube","authors":"Yanjuan Zhang, Hongmei Liu","doi":"10.1109/ISME.2010.82","DOIUrl":"https://doi.org/10.1109/ISME.2010.82","url":null,"abstract":"This paper aims to investigate the internally disjoint paths in Q_{n,2}. For this purpose, the structural natures of Q_{n, k}(1 ≤ k ≤ n) are investigated in detail. The properties related to the partition of enhanced hypercube Q_{n,k}. Based on the results, it has been found that for any two distinct vertices x and y there exists n+1 internally disjoint paths connecting x and y, which traverses all vertices of Q_{n,2}. This paper aims to investigate the internally disjoint paths in Q_{n,2}. For this purpose, the structural natures of Q_{n,k}(1 ≤ k ≤ n) are investigated in detail. The properties related to the partition of enhanced hypercube Q_{n,k}. Based on the results, it has been found that for any two distinct vertices x and y there exists n + 1 internally disjoint paths connecting x and y, which traverses all vertices of Q_{n,2}.","PeriodicalId":348878,"journal":{"name":"2010 International Conference of Information Science and Management Engineering","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123303838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Pricing Coordination of Manufacturers Based on Logistics Outsourcing 基于物流外包的制造商价格协调研究
Hua Liu, Chunhui Hu
{"title":"The Pricing Coordination of Manufacturers Based on Logistics Outsourcing","authors":"Hua Liu, Chunhui Hu","doi":"10.1109/ISME.2010.90","DOIUrl":"https://doi.org/10.1109/ISME.2010.90","url":null,"abstract":"The static cooperation model between two manufacturers and a Third-party Logistics (3PLs) provider is represented in this paper. Under 3PLs provider’s restriction on service prices, manufacturers decide wholesale prices and reclaiming prices in independent decisions scenario and joint decisions scenario respectively. Comparing with the profit of manufacturers and 3PLs provider, we establish a mechanisms: Coordinating with Discounts of Logistics Prices based on four assumptions and three partners’ abilities of negotiating. Finally, we illustrate our mechanism with a numerical example.","PeriodicalId":348878,"journal":{"name":"2010 International Conference of Information Science and Management Engineering","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115856616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Video Storage Algorithm Based on Buffer and Anomaly Detection 基于缓冲区和异常检测的视频存储算法
Jinna Lv, Xiao-zhong Li, Zhi-Jun Zhang, Guohong Gao, Shun Wang
{"title":"A Video Storage Algorithm Based on Buffer and Anomaly Detection","authors":"Jinna Lv, Xiao-zhong Li, Zhi-Jun Zhang, Guohong Gao, Shun Wang","doi":"10.1109/ISME.2010.130","DOIUrl":"https://doi.org/10.1109/ISME.2010.130","url":null,"abstract":"In order to improve the efficiency of video information storage of the video surveillance system, this paper proposes a mechanism based on buffer and anomaly detection algorithm for video storage. The algorithm uses anomaly detection mechanism, only stored anomaly video, and uses buffer mechanism to completely store exception video information. Compared with the current algorithm, while maintaining the integrity of the video information it can effectively save the video storage space and improve video surveillance system of video storage efficiency.","PeriodicalId":348878,"journal":{"name":"2010 International Conference of Information Science and Management Engineering","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116618791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Study of Microwave Dielectric Resonator Oscillator Frequency Degradation Model for Intelligent Maintenance Systems 智能维修系统微波介质谐振振荡器频率退化模型研究
Jinyong Yao, Haibo Su, Xiaogang Li
{"title":"Study of Microwave Dielectric Resonator Oscillator Frequency Degradation Model for Intelligent Maintenance Systems","authors":"Jinyong Yao, Haibo Su, Xiaogang Li","doi":"10.1109/ISME.2010.238","DOIUrl":"https://doi.org/10.1109/ISME.2010.238","url":null,"abstract":"This paper presents a modeling method to model and assess the Dielectric Resonator Oscillator (DRO) performance degradation to supply a basis for the fault diagnoses, health state estimates and life prediction of the DRO in the Intelligent Maintenance Systems (IMS). In our research, the model combines internal state transition model with the Brownian motion stochastic process to show the degradation mechanism and random factors respectively. The degradation models parameters were recognized by the degradation data coming from the Accelerated Degradation Test. The result indicates that the model significantly describes the DRO practical degradation process with an impressively small sum of squared residuals. We also resolved the curvilinear boundary crossing issue of Brownian motion with optimal linear approximation methods and presented an approximate life distribution.","PeriodicalId":348878,"journal":{"name":"2010 International Conference of Information Science and Management Engineering","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121789131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling and Simulation of Knowledge Transfer within an Inter-firm Network 企业网络中知识转移的建模与仿真
Y. Shou, Yu Sun
{"title":"Modeling and Simulation of Knowledge Transfer within an Inter-firm Network","authors":"Y. Shou, Yu Sun","doi":"10.1109/ISME.2010.137","DOIUrl":"https://doi.org/10.1109/ISME.2010.137","url":null,"abstract":"This paper aims to model the mechanism of knowledge transfer within an inter-firm network. An agent-based simulation model was established to examine the non-linear behavior and the determinant factors of knowledge transfer. Factors such as network size, tie density and link creation rules are included in the model. Eight scenarios were experimented to investigate the impacts of different factors on knowledge transfer performance. The results show that initial network size and link creation rules have significant influence on dynamics of inter-firm network knowledge systems, especially on network structure evolution.","PeriodicalId":348878,"journal":{"name":"2010 International Conference of Information Science and Management Engineering","volume":"177 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132359689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Method to Streamline the TCP/IP Protocol Stack at Embedded Systems 嵌入式系统中简化TCP/IP协议栈的方法
Jiang Xingguo, Qi Yulin, Yang Jiancheng
{"title":"A Method to Streamline the TCP/IP Protocol Stack at Embedded Systems","authors":"Jiang Xingguo, Qi Yulin, Yang Jiancheng","doi":"10.1109/ISME.2010.147","DOIUrl":"https://doi.org/10.1109/ISME.2010.147","url":null,"abstract":"The issue is a brief introduction of solution to realize the embedded Ethernet: Single Chip Microcomputer embedded TCP/IP Protocol Stack. We put forward the general thinking of the whole design program based on this solution and give the block diagram of the hardware system design. We focused on the specific design of software system and proposal to streamline the TCP/IP protocol stack. For the TCP/IP protocol stack may be used at all levels of the protocol: ARP, IP, ICMP, UDP analysis it thoroughly and give the work flow chart and the corresponding software design method to detail all levels of the protocol.","PeriodicalId":348878,"journal":{"name":"2010 International Conference of Information Science and Management Engineering","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133213561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信