2016 (467)
2015 (448)
2014 (181)
2013 (81)
2012 (22)
2011 (22)
2010 (20)
2009 (22)
2008 (10)
An Access Control Model for Mobile Networks based on the Non-zero-sum Game Theory
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.4 2015.04 pp.1-8
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Access control is the basic of information security. It is always used to protect sensitive information and critical resources from malicious attacks. But the traditional access control models are more adapt to closed network environment. And there are more and more unknown threats and attacks in the open networks, especially the mobile networks. To solve this problem, we propose a new access control model which is applicable to the open mobile networks by using non-zero-sum game theory in this paper. The model is composed by six modules: access evaluation module, access permission determination module, non-zero-sum game theory analysis module, decision-making module, result evaluation module, access feedback module and a prior information database. And in this model, the subjects will choose to be more honest when they make access requests because they all want to get more permission next time. Then we do some experiments to prove this fact.
A Survey on Data Warehouse Constructions, Processes and Architectures
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.4 2015.04 pp.9-16
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Data warehouse is the repository of historical data. Real time data ware housing has been achieved by different tools and techniques. This paper is based on survey on different dimensions of real time data ware housing in different manner. The survey is based on real time data ware house loading methodology in which data is load in real time and its update, different aspects of peer to peer network for cashing of OLAP results, self-maintenance view of different multiple views in data ware house scenarios, for checking the research either it is dead or alive for modeling and design of data ware house, view maintenance in ware housing and also focus the study on the temporal requirements of real time DWH. And also provides the comparison between these specific studies by giving the tables.
VPN Gateway Research in Wireless Network Based on SSL Technology
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.4 2015.04 pp.17-26
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Security is an important issue in the design and deployment of wireless networks. Existing equipment is mainly used in security technology include SSID, MAC address Filtering, WEP and 802.11x etc. There exists certain safety defects in design and not well protect the security of the wireless network. This paper puts forward a VPN technology was applied to the deployment scheme in wireless networks, which design a set of VPN gateway using SSL technology in Linux environment, so as to solve the current security issues in accessing resources within the network through wireless network.
Failure Recovery Dependency Analysis for Web Composition Transactions Based on Extended Petri-Nets
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.4 2015.04 pp.27-36
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
For transactional Composition Web Services (CWS), traditional transaction theory in the database is introduced into the Long Running Transactions (LRTs) domain. In practical application, the typical LRTs employ forward or backward rollback. In order to improve the expansibility of LRTs, it is important to accurately specify the dependency between tasks in composition transaction; contemporary technologies usually statically specify dependency point and avoid implicit interaction in LRTs. In this paper, we propose a task dependency modeling method for LRTs, firstly we present formal description of atomic Web Services (WS) and discuss atomic WS such as pivot, compensable, retriable and vital, then execution logs of LRTs data dependency and action dependency rules between tasks in LRTs are analyzed, specify, finally application of TRP shows that it is feasible to ensure consistent execution of reliable LRTs based dependencies.
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.4 2015.04 pp.37-50
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Today’s and tomorrow’s leaders and managers need to demonstrate competence in employee performance management systems, which should be accurate and fair. This paper describes employee perceptions of the benefits a web-based application for employee performance management (EPMS) on their performance and identifies employee acceptability of the tool. A cross-sectional descriptive study was adopted and a validated self-questionnaire used. The study sample consisted of 48 participants and there was a 75% response rate: 85.7% worked for the government. Two-thirds of the participants had previously used a web-based performance appraisal application. Generally, there was considerable agreement upon the positive effects on all aspects (work relations and teamwork, empowerment, evaluation and impact), with the lowest agreement upon the impact on burnout and turnover. The personal characteristics of the respondents, as well as their skills on computers and the internet, did not have any relation with their agreement or their attitude towards the use of the application.
A Queuing Model of the N-design Multi-skill Call Center with Impatient Customers
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.4 2015.04 pp.51-60
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This paper studies a queuing model of the N-design multi-skill call center. In this model, there are two types of customers and two server groups who have different skills. Group 1 consists of specialized servers who can only serve one type of customers, Group 2 consists of flexible servers who can serve both two types of customers. The customers waiting for the service in the queue may leave the system due to impatience. By dividing the system’s state space into several sets of sates, we obtain the equilibrium equations and the steady-state probabilities of the system. We also obtain the computational formula of the service level and the computational procedure of the staffing problem.
A Survey of Emergency Communication Network Architectures
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.4 2015.04 pp.61-68
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The recent severe cyclone storm in India named ‘Hudhud’ was considered as the second strongest tropical cyclone of 2014 within the North Indian Ocean. The entire communication network is lost and power lines were disrupted for three north eastern districts of Andhra Pradesh, India. It took several days to resume the communication services. This lack of robust network connection has become one of the major topics for any discussion of a Disaster Information Network System. Hence, there is huge demand to establish a robust communication network which never fails during emergency times. In this paper, a survey of emergency communication network architectures has been done in detail. The existing network architectures have got several practical issues which need to be addressed. We also highlight the implementation issues of emergency communication networks which may be considered as scope of this topic.
Research on E-commerce Consumer Behavior Prediction based on Rough Sets
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.4 2015.04 pp.69-76
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
To solve the traditional problem of knowledge acquisition bottleneck in e-commerce, an improved algorithm of attribute reduction based on discernibility matrix is proposed. The algorithm is used to attribute reduction for e-commerce consumer behavior prediction. With rule extraction model of rough sets, the rules of e-commerce consumer behavior prediction are acquired. Practical example of consumer behavior prediction shows that the proposed approach can be handled found knowledge effectively and can be converted the available rules easily. It has strong ability of fault tolerance and can improve the speed and quality of knowledge acquisition. The method has good practical value.
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.4 2015.04 pp.77-84
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
A closed-loop supply chain system consisting of one manufacturer with random yield and one retailer with random demand is discussed in this paper. The models of expected profit of supply chain system are founded under centralized decision and decentralized decision, respectively. The optimal strategies of yield and order are obtained in two modes. It is proved that the order of retailer is not affected by yield randomness. That is showed by numerical example, the results show: the scheduled production of new product for manufacture will decrease and the total profit and each participant of supply chain will increase as recovery price increases, when the cost of remanufacturing production is lower than the new product.
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.4 2015.04 pp.85-102
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The economy of a multistory building depends on the spacing of columns which in turn depends on panel size of slab. The objective of this work is to design an economical G+5 building by finding the optimum spacing of columns. This work is limited to plot area of 30 m X 30 m (with Aspect ratio of Panel varied from 1 to 4) for first case and in second case they were 30 m x 30 m, 30 m X 24 m, 30 m X 18 m and 30 m X 12 m (with Aspect ratio of sites varied from 1, 0.8, 0.6 and 0.4 respectively). In case two each plot area is again divided into panels of different aspect ratios. Here, Aspect ratio is ratio of longer dimension to shorter dimension of panel. The structure is modeled, analysed and designed as per IS : 456 – 2000 using Staad.Pro. Failed members are re-designed till all members are safe. This procedure is repeated for all cases and the quantities of steel and concrete are noted. It was observed that for 30 m x 30 m plot area for aspect ratio = 1, in Case 1- Case 41 with 25 columns and in Case 2- Case 31 with 12 columns were observed to be the most economical. In these two cases, Case-1 is more economical. In Case 1, Square module 30 m X 30 m with spacing of columns at 5 m and 25 panels in both sides was found to be cost effective. In Case-2 rectangular module 30 m X 24 m for aspect ratio 0.8 with spacing of columns 15 m X 12 m and 4 panels in both sides was found to be cost effective. For rectangular module 30 m X 18 m for aspect ratio 0.6 with spacing of columns 15 m X 6 m and 6 panels in both sides was found to be cost effective. For rectangular module 30 m X 12 m for aspect ratio 0.4 with spacing of columns 15 m X 6 m and 4 panels in both sides was found to be cost effective.
An Efficient Self-Service Pre-Payment Courier System on Mobile NFC Technology
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.4 2015.04 pp.103-112
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The business and payment can be achieved not only using real money but also virtual one. With the rapid development of e-commerce, the virtual one will be more convenient for transaction. Therefore, an SSPP (Self-Service Pre-Payment) courier system is presented, which characterizes an innovative, convenient and efficient NFC (Near Field Communication) pre-payment system based on card simulation mode. The pre-payment process concerning virtual currency has been supported through a simple NFC device, which operates in RF (Radio Frequency) band. It ensures the micro-payment services of mobile to POS can be achieved. In this paper, an efficient scheme is described to check its feasibility, and some experimental results have also been given to verify that this system is candidate for the future express industry.
Estimation of Surface Runoff Using Remote Sensing and Geographical Information System
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.4 2015.04 pp.113-122
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Accurate estimation of runoff and sediment yield amount is not only an important task in physiographic but also important for proper watershed management (Gajbhiye et al. 2014a; Gajbhiye 2015). Watershed is an ideal unit for planning and management of land and water resources (Gajbhiye et al. 2013; Gajbhiye et al. 2014d). Direct runoff in a catchment depends on soil type, land cover and rainfall. Of the many methods available for estimating runoff from rainfall, the curve number method (SCS-CN) is the most popular. The curve number depends upon soil and land use characteristics. This study was carried out in Kanhaiya nala watershed located in Satna district of Madhya Pradesh using remote sensing and GIS. The total area of watershed 19.53 km2. Soil map, Land Use and slope map were generated in GIS Environment. Since the curve number method is used here as a distributed model, it is necessary to get information concerning a large number of sub-catchments in the basin. Hence remote sensing and GIS techniques have been used. Landsat (ETM) satellite image was used to obtain land cover information by ERDAS 9.1 software. The thematic layers like soil map, elevation map, rainfall map and land cover map were created in Arc GIS 9.3. Curve numbers are assigned for different land cover and soil types. In present study the runoff varies from 1196.93 mm to 1551.17 mm of the study area.
A Fuzzy Random CLRIP Model of B2C E-commerce Distribution System
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.4 2015.04 pp.123-134
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
A fuzzy random model of Combined Location Routing and Inventory Problem (CLRIP) has been presented with continuous review inventory policy in B2C distribution environment for the first time. Demands of customers and distribution centers are uncertain and have been assumed to be fuzzy random variables. To solve the model, first the expected value of fuzzy random variable and the possibilistic mean value have been used to convert the fuzzy random variables to crisp ones. A mythology has been designed for solving determined model. A numerical example has demonstrated the effectiveness of the model and algorithm.
Big Enterprise Tax Risk Management: Warning, Simulation and Application
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.4 2015.04 pp.135-146
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Currently, the construction of “promoting tax compliance as the goal, the risk management as the guidance, taking the information tube tax and the hierarchical classification as the basis, set up tax services, risk monitoring, risk response to the new tax management system”, this tax sources of specialized management model has become the direction of the reform of tax system, tax risk management as a new concept received extensive attention of tax authorities. Big enterprises are of the characteristics of small numbers, large scales, huge taxes and contributions, which is the core of tax collecting management. To strengthen the tax risk management ideas, and to direct taxpayers to perfect the inner tax control system are the important measures to implement individual services and pertinent management. This paper presents a flow chart of tax risk control and the four models: the identification model, the measurement model, the response model, the evaluation model, and simulation applications. Here, we take value-added tax as an example. In 2013, China's domestic value-added tax revenue is 2.8803 trillion yuan, accounting for 26% of the total income tax revenue, is one of China's current major taxes. Therefore, based on the data in the CTAIS to analyze the tax burden, and constructs the VAT tax burden warming system, is the effective measures to keep the rapid growth of VAT.
Business Incubators: Boon or Boondoggle for SMEs and Economic Development of Pakistan
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.4 2015.04 pp.147-158
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In this age of technological development, business incubation system is an important tool, for the government to implement and facilitate technological innovation and entrepreneurship development. An effective business incubation system renders an important role in the nourishment of local, national and regional economies by producing employment opportunities & development of SMEs. This study presents evidence that suggests business incubators are important for economic development especially for developing countries like Pakistan. A comprehensive survey was carried out to analyze the current functional status of business incubators, along with the services provided by those incubators, with their success & shortcoming links with incubation system in Pakistan. The importance of business incubators for the promotion of entrepreneurship, development and technological innovation, addressed with an assessment of the needs of Pakistan economy. This is followed with an evaluation of the requirements to be dealt before incubators can leave the desired effects on the improvements of the entrepreneurship and technological innovation. Finally, the findings reveal implications for the future development programme of business incubators in Pakistan with the policy recommendation.
An Efficient Index Structure for Range Count Query Based on Improved B-tree
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.4 2015.04 pp.159-168
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
With the development of many new technologies, the data grows much faster than before, and most of the data are stored in database. When the data amount in database is huge, it is needed to create appropriate index to keep the performance of database applications. This paper proposes a new index structure, namely MCRC-tree, to solve complicated range count query problem efficiently. Multiple experiments show that the performance of MCRC-tree is similar to that of traditional B-tree, to be specific, MCRC-tree can solve any range count query in O(logcN) I/Os, so is the complexity of insert and delete operations, here C means the disk page size, N is the total data amount.
An Intelligent Approach in Monitoring and Controlling of Bunker Coal Level in Thermal Power Plant
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.4 2015.04 pp.169-178
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Currently coal fired power plant requires bunker or stock piles in order to place the coal for storage purpose and to use it effectively when demand arises. Real time sensors are used to sense level of the coal and to pass data to computational systems for processing hence further actions such as refilling and distributing of coal can be automated. Further the control action in level sensing can be enhanced by using fuzzy logic controller which is an intelligent system. Thus the proposed system of coal unit provides the optimum control with increased efficiency. The simulation results are achieved by using LabVIEW.
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.4 2015.04 pp.179-194
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Fuzzy logic model and entropy model are useful for the geohazard susceptibility zonation in Jianshi County of Qingjiang River Basin. In this paper, the same impact factors were chosen and the geohazard samples were considered in two cases with quantitative analysis method. The first case 162 geohazards chosen as samples and the other one all of 182 geohazards chose as samples. The authors completed the susceptibility zonation in the two different cases using the two models in order to analysis the effects of the two models. The results of the two models in different cases were almost the same in space, except small differences in some areas. The entropy model was more accurate for the analysis of relationship between impact factors and geohazards, but not stable for different geohazard samples. The fuzzy logic model was better for less geohazard samples. According to the analysis process, it was found that the fuzzy γ operation was the best which was defined in terms of the fuzzy algebraic product and the fuzzy algebraic sum. The results of fuzzy logic model were most useful when γ was 0.20. The fuzzy logic model and entropy model were useful for the geohazard susceptibility which was scientific and useful for the government to manage the geohazards and make the preliminary development plans.
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.4 2015.04 pp.195-206
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Consumer relationship proneness (CRP) reflects a consumer’s relatively stable and conscious tendency to engage in relationships. This study takes CRP as an important consumer individual trait and examines the influence of CRP on customer loyalty in service environment from perspective of relational benefits (i.e. confidence benefits, social benefits, special treatment benefits). Concept model is proposed to explain the influence. Then SEM (structural equation modeling) is used to analyze the data collected from online survey to test the proposed model. Empirical results show that CRP has direct influence on customer loyalty. The results also show that CRP indirectly relates to customer loyalty via its impact on perceived confidence benefits and social benefits. This study deepens the understanding about the importance of CRP and provides insights into development and implement of customer relationship management and relationship marketing for service enterprises.
An ANP Based Evaluation Model for Invoicing Solutions
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.4 2015.04 pp.207-224
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In recent years, electronic invoicing has come into sight and plays a vital role in a lot of businesses. Under this circumstance, enterprises need to select from either electronic invoicing solutions or paper-based ones. The electronic invoicing solution can be a self-built or a commercial one. In this paper, an ANP-based evaluation model is proposed aiming at addressing this selection problem. Cost and Effectiveness are the two basic determinants in this model to prioritize invoicing solutions. Cost is categorized by three dimensions: one-off cost, monthly cost and unit cost. Effectiveness is classified into four dimensions: customer experience, supplier performance, enterprise business and invoicing performance. Each dimension has a subset of several elements that give a more specific description of the invoicing process. And the relative importance of these elements and dimensions are calculated by numerical pairwise comparisons which especially pay attention to the interdependencies of dimensions. The overall evaluation of alternative invoicing solutions can be achieved by this model so as to assist enterprise managers to conduct decision-makings. In the end a pilot case about a Chinese e-commerce enterprise demonstrates the feasibility of the proposed approach.
Prognostication of Climate Using Sliding Window Algorithm
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.4 2015.04 pp.225-232
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Weather forecasting is the task of determining future state of the atmosphere. To predict the future’s weather condition, the variation in the conditions in past years must be utilized. The probability that the weather condition of the day in consideration will match the same day in previous year is very less. But the probability that it will match within the span of adjacent sixty days of previous year is very high. A Sliding window algorithm is emerging as a leading methodology for the application of weather prediction. So, the prediction is made based on sliding window algorithm. So, sixty days are considered for previous year a sliding window is selected of size equivalent to fifteen days. Every thirty days of sliding window is then matched with that of current year’s thirty days in consideration. The best matched window is made to participate in the process of predicting weather conditions. The month wise results are being computed for four months to check the accuracy. The experimental results demonstrate that the applied technique gives better predicted weather conditions are quite efficient with an average accuracy of 94.21%.
A Secure NFC-based Electronic Voucher Solution
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.4 2015.04 pp.233-246
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
As the number of mobile Internet users grows rapidly, more and more service providers are distributing electronic vouchers to consumers via mobile phones, which eliminates the need to carry various plastic or paper-based vouchers. Currently, electronic vouchers are available mainly in the form of text message or QR code. However, these types of vouchers are usually stored in the mobile phone that lacks secure storage and trusted execution environment. In addition, it is not efficient enough to input voucher code manually or get voucher QR code scanned when the consumer redeems the voucher. Near Field Communication (NFC) is a short-range wireless communication technology that simplifies the way of interaction between the electronic devices and guarantees a fast and secure information exchange. In this paper, we propose an NFC-based electronic voucher solution, which provides capabilities of distributing, managing and redeeming vouchers in a secure manner. The security of the voucher is ensured by storing it in the Secure Element (SE). With the proposed system, the consumer is enabled to redeem the voucher just by touching the NFC reader at the point of sale with his/her NFC phone, which offers better user experience than traditional electronic voucher solutions.
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.4 2015.04 pp.247-264
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
An Improved Spatial-based Fuzzy Logic Event Detecting Algorithm for Wireless Sensor Networks
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.4 2015.04 pp.265-278
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
An Introspection of Science, Technology, Values and Ethics
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.4 2015.04 pp.279-288
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Values basically emerge from science, both as a product and as a process, and may be redistributed more broadly in the culture or society. Also, scientific discoveries may pose the new challenges of values in the society. Several questions help to guide the disciplined inquiry into ethics and values.
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.4 2015.04 pp.289-296
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In the context of mass customization, to address the issues about method based on Constraint Satisfaction Problem (CSP) in the field of product configuration, a combined product configuration method based on the CSP and Bayesian Network (BN) is proposed in this paper. On the basis of CSP and BN theory, a product configuration model established based on CSP and BN, and the specific method for solving was given, Including the reasoning on posterior probability by establishing the Bayesian Network model and the reasoning on Constraint Satisfaction Problem. Finally, to assemble the computer as an example, a configuration system of assembly computer product is developed so as to verify the feasibility and effectiveness.
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.4 2015.04 pp.297-310
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
To provide objective basis for the quality improvement and quality risk control in supply chain (abr. SC) for some manufacturing enterprises in Zhejiang province, China, the general quality status of SC should to be researched. To do it, through expert interviews and reading literature, questionnaire topics are designed, and the statistical approach of SPSS is used to emphatically analyze the 7 quality indexes which can provide us these critical factors of quality. Moreover, some key quality factors are presented as reference to SC quality management. But beyond that, to perceive the culture about quality of SC in these enterprises, the employees’ recognition on the quality of SC should also to be surveyed. Because China's research on supply chain quality is still in its infancy, especially in which the study on the status of quality of supply chain in manufacturing enterprise is very little, the topics design and the status analysis for the pointed survey questionnaire are relatively lack. Therefore, this research has certain reference value to this study, and to managers grasping quality management idea according to critical quality factors.
Collaborative Filtering Recommendation Algorithm Based on User Interests
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.4 2015.04 pp.311-320
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
To overcome the problem of too much sparse by scoring matrix, the paper proposes from the part of user interests the collaborative filtering recommendation algorithm based on such interest. In the e-commerce websites, recommendation items have various appearance, function and category attributes. Items which hold similar characteristics generally gain approximate scoring values. The aforesaid method extracts useful information for improvement from user interests. Users’ scorings about different items imply their modes of interest. Interest association exists amongst items that were evaluated by the same user. Since individual interest shifts, the intensity of such correlation will gradually change along with days. By building interest intensity model with time decay, and discovering interest correlation among different items through that model, the proposed algorithm can predict scoring matrix and fill it, which is helpful to alleviate problems with sparse caused by user-item scoring matrix.
Deploying an Interactive Mobile Learning System in the Classroom
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.4 2015.04 pp.321-330
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The great development of mobile technologies has made instructional messages to be sent from the educators to the learners easily through their mobile devices such as Smartphones, Apple iPhones, Pocket Pcs, Mobile Computers, Android phones, Tablets, Ipads etc. Communication between the instructors and the students can be done through text messages, voice as well as through images. This paper presents the architecture and the implementation of an interactive mobile learning system to enhance learning in the classroom.
Portfolio Risk of Chinese Stock Market Measured by VaR Method
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.4 2015.04 pp.331-338
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In recent years, financial risk has become the attention focus of the economic entities around the world. How to effectively control financial risks has become a hotspot in financial community. Currently, the popular financial risk management method is Value at Risk (VaR), which has more practical values and reference values compared with the traditional financial risk management models. Taking the new composite index of Shanghai Stock Exchange (SSE) as sample, this paper calculated the VaR of GARCH, EGARCH and PARCHES models as well as their corresponding GARCH-M, EGARCH -M and PARCH-M models, analyzed the applicability of the model at different confidence levels under different distributional assumptions and evaluated the models by loss function test method. The results show that: 1) the VaR under t distribution is greatly overestimated, so t distribution does not apply to Chinese stock market; 2) the generalized error distribution describes the market risk more accurately than the normal distribution and the VaR calculated in PARCH (1,1) model under generalized error distribution is the best; 3)the VaR-PARCH (1,1)-GED model is more suitable to measure the investment risk of Chinese stock market.
0개의 논문이 장바구니에 담겼습니다.
선택하신 파일을 압축중입니다.
잠시만 기다려 주십시오.