Fangyan Yang, Dejin Liu, Yanwei Chen, Zhongcheng Li
{"title":"The application of UML in the development of CRM sale system online","authors":"Fangyan Yang, Dejin Liu, Yanwei Chen, Zhongcheng Li","doi":"10.1109/FITME.2010.5656548","DOIUrl":"https://doi.org/10.1109/FITME.2010.5656548","url":null,"abstract":"Information technology and network technology is developing rapidly, the relationship between firms and customers are becoming increasingly important. According to the management characteristics of CRM, the paper applies modeling methods and tools of UML to analyze and design sale management system online. This paper builds system development models, including the use case diagrams, the class diagrams, the activity diagrams and the timing diagrams, and develops the system for a sale company. It proves that UML can be used in sale system online designing and make the progress more easy and effective.","PeriodicalId":421597,"journal":{"name":"2010 International Conference on Future Information Technology and Management Engineering","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126635520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The K-nearest neighbor fast searching algorithm of scattered data","authors":"Zhu Ge-jun, M. Changsheng, Xie Feng","doi":"10.1109/FITME.2010.5655716","DOIUrl":"https://doi.org/10.1109/FITME.2010.5655716","url":null,"abstract":"The paper has put forward an improved K-nearest searching algorithm of scattered data, which is significant to the technology of surface recreate of reverse engineering. Firstly, the initial segmentation of point cloud space is made by adopting the traditional block algorithm, and then estimates the average dot pitch of point cloud. Re-divide the point cloud space according to average dot pitch. The block result decreases the searching range of k-nearest neighbor searching algorithm.","PeriodicalId":421597,"journal":{"name":"2010 International Conference on Future Information Technology and Management Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116030900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Notice of RetractionStudy on the management ethics in performance management","authors":"Cai Xiang, Lv Fenfen","doi":"10.1109/FITME.2010.5655793","DOIUrl":"https://doi.org/10.1109/FITME.2010.5655793","url":null,"abstract":"Since performance management was brought into China in 1990s, many enterprises had taken it into the practice of the management. Being an effective management method, performance management can contribute to total performance of enterprises, but improper performance management will arose some ethical problems. The paper list a series of implicit or dominant ethical problems in every stage of the performance management, then gave some practical advices to eliminate these problems and make a balance between the performance management and the ethics.","PeriodicalId":421597,"journal":{"name":"2010 International Conference on Future Information Technology and Management Engineering","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122333810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of E-commerce system security evaluation model","authors":"Xiaohong Zhang, Huiqin Wang, Bo He","doi":"10.1109/FITME.2010.5654805","DOIUrl":"https://doi.org/10.1109/FITME.2010.5654805","url":null,"abstract":"The evaluation of EC security often copies the standard of information security, the effect of evaluation is rough and partial. This paper firstly constructs the security frame of EC system, which includes five layers based on TCP/IP protocol and introduces the security technologies in each layer; and then designs the security evaluation model of EC system bases on the analytic hierarchy process(AHP), which includes the evaluation layer(A), four main factors(B1 to B4) and 12 sub-factors(C1 to C12). Thirdly this paper establishes the assessment matrixes of A-B and B-C and check their consistency to get the assessment matrixes of A-C. In addition, this paper calculates the total evaluation coefficient of three EC systems and the best one was choosed. At last, the conclusion is that the model of EC security can get the satisfied result of evaluation using AHP.","PeriodicalId":421597,"journal":{"name":"2010 International Conference on Future Information Technology and Management Engineering","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122667171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The reform of armored equipment maintenance based on lean six sigma","authors":"B. Jiao, Tian-qing Chang, Bing Liang","doi":"10.1109/FITME.2010.5654798","DOIUrl":"https://doi.org/10.1109/FITME.2010.5654798","url":null,"abstract":"Based on lean six sigma (LSS), the reform is carried out in our armored equipment maintenance. The process is divided into five stages: definition, measurement and analysis, improvement, test working and control. In the definition stage, the problems of our armored maintenance, reformed aim and effect, are proposed, respectively. After our army's practice is analyzed deeply by LSS tools, main contents of armed maintenance reform are proposed. Circumstantialities and the effect of the LSS reform in a certain unit are introduced.","PeriodicalId":421597,"journal":{"name":"2010 International Conference on Future Information Technology and Management Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122620217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of automated oscillometric electronic sphygmomanometer based on MSP430F449","authors":"Pinwei Zhu, Linkai Chen","doi":"10.1109/FITME.2010.5656647","DOIUrl":"https://doi.org/10.1109/FITME.2010.5656647","url":null,"abstract":"This paper presents an automated oscillometric electronic sphygmomanometer. It uses MSP430F449 single-chip microcomputer as the controller kernel. Firstly the tiny signal which is detected by MPS2107 pressure sensor is amplified by the dedicated chip INA128, then the amplified signal will be divided into cuff-pressure oscillation signal (AC) and cuff pressure signal (DC). Secondly AC and DC signals are filtered and conditioned by the OP amp LM324. Thirdly the filtered and amplified signal will be sampled by ADC module of MSP430F449. AC and DC voltage series will be got. By oscillometric method, systolic pressure and diastolic pressure can be calculated out and displayed in LCD. The serial communication and real-time clock are also included in the system. The automated electronic sphygmomanometer performs satisfactorily when compared with conventional auscultation method and has realized accurate measurement of blood pressure.","PeriodicalId":421597,"journal":{"name":"2010 International Conference on Future Information Technology and Management Engineering","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128786425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multiple description based distributive compression for hyperspectral images","authors":"Naveed A. Abbasi, Fatima Syeda Narjis, Yangyu Fan","doi":"10.1109/FITME.2010.5656291","DOIUrl":"https://doi.org/10.1109/FITME.2010.5656291","url":null,"abstract":"In our paper, we propose a distributed source coding scheme exploiting the principle of multiple description coding for a simple encoder implementation of hyperspectral image compression. Multiple descriptions hold great significance in scenarios where highly fidelity reconstruction is desired after transmission over error and loss prone transmission channels. Lossy Wyner Ziv coding is deployed in conjunction with multiple descriptions resulting in generation of multiple correlated independent substreams of key bands which are employed as side information at the decoder. In addition, adaptive parity generation is supported that provides a more dynamic reconstruction in terms of variable bit rate generation. The inherently compliant multiple description based distributive source coding paradigm is not only appropriate for limited onboard processing but also aids the establishment of independent processing nodes distributing the aggregate onboard computational load over multiple nodes for efficient transmission. The proposed scheme offers a thoughtful perspective on prevailing challenges in the design of robust hyperspectral imaging algorithms. Experimental results of PSNR performance depict that our scheme offers competitive performance as compared to various schemes in the same arena.","PeriodicalId":421597,"journal":{"name":"2010 International Conference on Future Information Technology and Management Engineering","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128572328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study on ERP implementation and business process reengineering","authors":"Liu Ai-hong","doi":"10.1109/FITME.2010.5654708","DOIUrl":"https://doi.org/10.1109/FITME.2010.5654708","url":null,"abstract":"Business processing needs to be recomposed and rebuilt in order to develop the advantages of ERP. ERP successful implementation depends on BPR. They are conditions, complement each other and they serve enterprise overall strategic objectives together. Starting from the overall efficiency of supply chain, choose the department or business which can easily get periodic income to reengineer, or choose a key process which have important influence of the strategic goal as the object of restructuring, to restructure and optimize for the existing business processes.","PeriodicalId":421597,"journal":{"name":"2010 International Conference on Future Information Technology and Management Engineering","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124653802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Frame length adjustment method research of dynamic framed slotted ALOHA algorithm","authors":"Yinpu Zhang, Yujun Guan, Tao Bo, Jie Sun","doi":"10.1109/FITME.2010.5654722","DOIUrl":"https://doi.org/10.1109/FITME.2010.5654722","url":null,"abstract":"Multi-tag RFID systems for the collision problem, analyzed the dynamic frame slotted ALOHA algorithm, the algorithm is a key part of the frame length adjustment. The mathematical theory of combining frame length, obtained three ways. Validated by simulation analysis estimated that the number of improved labeling method can reflect the dynamic real-time collision case the current frame, the system identification efficiency has improved significantly.","PeriodicalId":421597,"journal":{"name":"2010 International Conference on Future Information Technology and Management Engineering","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124716175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on knowledge diffusion within R&D team based on the knowledge gap","authors":"Xiang Cai, Yanping Yang, Peng Wang","doi":"10.1109/FITME.2010.5655794","DOIUrl":"https://doi.org/10.1109/FITME.2010.5655794","url":null,"abstract":"Based on the previous research foundation, this paper first defines “knowledge gap”.Then, it analyzes seven context factors of knowledge gap, including knowledge foundation and cultural background, knowledge attributes, willingness to participate, absorptive capacity, tools and platforms, trust,team culture,and how they influence intra-team knowledge diffusion. Accordingly, establishes influence mechanism model of knowledge diffusion within R&D team. Finally,the paper puts forward relevant suggestions.","PeriodicalId":421597,"journal":{"name":"2010 International Conference on Future Information Technology and Management Engineering","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129925515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}