The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobile commerce raises a number of security and privacy challenges. To address this, we analyze the security requirements of mobile commerce; present a solution in which the mobile commerce security is enhanced by using Wireless Public Key Infrastructure (WPKI). An WIM (WAP Identity Module or Wireless Identification Module) Bluetooth earphone with ESAM (Embedded Secure Access Module) is connected...
We present an information infrastructure in which Agile Virtual Enterprise (AVE) Supported by Fourth Party Logistics (4PL), named 4PL-AVE. At first, the difference between AVE and 4PL is introduced, and then 4PL-AVE model architecture is given that consists of three-dimensional cube of life-cycle dimension, the view model dimension and universal level dimension which complete describe the 4PL-AVE...
We present an information infrastructure in which Agile Virtual Enterprise (AVE) Supported by Fourth Party Logistics (4PL), named 4PL-AVE. At first, the difference between AVE and 4PL is introduced, and then 4PL-AVE model architecture is given that consists of three-dimensional cube of life-cycle dimension, the view model dimension and universal level dimension which complete describe the 4PL-AVE...
The present study give a process integration evaluation method for supply chain integration of the Fourth Party Logistics (4PL), based on fuzzy theory. First, we study the requirements of 4PL, and then transform the collected logistics requirements into the supply chain process design requirements using quality function deployment (QFD) method. Second, we eliminate the non-value process using benchmarking...
We present an approach in which the business process in The Fourth Party Logistics (4PL) can be integrated and optimized by using value chain analysis. For the purpose of reducing Bull-whip effect of 4PL, we propose the value chain framework, introduce the value chain calculating method for manufacture, design a business process operation model for 4PL value chain integration simulation, and give...
This paper seeks to integrate different impressive access technologies to build a kind of innovative mobile business model. It analyzes the requirements of mobile business in the age of the 3rd generation wireless communication infrastructure (3G), present a set of mobile business solution in which the second generation ID card in China is used instead of all kinds of the existing IC or ID card for...
With the development of the innovative and pioneering education in China, it is necessary to update the concept and content of university education, foster people-oriented, diversity of quality education, establish innovative educational concept. We apply Inquiry-based learning for innovative theory and Co-operative education for engineering ability to the teaching and practice of software engineering,...
The present study puts forward a new method for supply chain integration of the Fourth Party Logistics (4PL), based on value chain analysis method and modern optimal control theory. The proposed method can be described as follows. First, the supply chain of 4PL was defined and transformed into process design requirements based on the benchmarking and quality function deployment (QFD) method. Second,...
We present a RFID application in which the second generation ID card in China is used instead of all kinds of the existing IC or ID card. For the purpose of solving the confusion of different kinds of card used in One-Card system, we design a One-Card in the whole campus solution based on the second generation ID card with adaptable interface to all kinds of utility services in university. It adopts...
With the development of the Co-operative education in China, the Co-operative Studies Supporting System (CSSS) for Software Engineering becomes a task of high priority. We analyze the requirements of integrated study and work term of Co-operative education in software engineering, give a new Integrate Developing Model based on Capability Maturity Model (IPD-CMM) supporting by Team Software Process...
With the increase of the software complexity, the defect measurement becomes a task of high priority. We give a new software defect analytical methodology based on orthogonal classification. This method has two folds. Then a set of orthogonal defect classification (ODC) reference model is given which includes activity, trigger, severity, origin, content and type of defect. In the end, it gives a support...
Mobile E-commerce (M-commerce) service raises a number of security and privacy challenges. To address this, we propose an advanced mobile security solution and related security methodology based on distribute key without changing hardware configuration of the mobile devices. The solution consists of the UE (User Equipment), an electronic security key (eKey) which is connected to the mobile device...
E-commerce and the development of modern enterprise management raise a number of challenges in the process of informatization of small and medium-sized enterprises (SME) in china. To address this, we present an approach in which the informatization is enhanced by using Open Source Software with customized policies. We analyses the main informationization obstacles of SME in china, bring forward that...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.