Objective:To explore the role of specialized group management in the quality control of perioperative nursing.Methods:45 surgical nurses from our hospital were selected as the research subjects.Traditional operating r...Objective:To explore the role of specialized group management in the quality control of perioperative nursing.Methods:45 surgical nurses from our hospital were selected as the research subjects.Traditional operating room management was adopted from July 2019 to June 2020,and specialized group management was adopted from July 2020 to June 2021.The surgeon’s satisfaction,surgical nurses’core professional competence,and surgical patients’satisfaction were obtained through surveys and the results were analyzed.Results:Surgeon satisfaction before the implementation of specialized group management was significantly lower than after its implementation(P<0.05).Besides,surgical nurses’core professional competency scores before the implementation of specialized group management were significantly lower than after its implementation(P<0.05).Lastly,surgical patients’satisfaction before the implementation of specialized group management was significantly lower than after its implementation(P<0.05).Conclusion:Specialized group management helps to improve the quality of perioperative care and should be applied in clinical practice.展开更多
Purpose-Following the regional restructuring,the number of joint-venture railway companies in which the Group participates has significantly increased.This paper aims to explore the challenges faced by China Railway G...Purpose-Following the regional restructuring,the number of joint-venture railway companies in which the Group participates has significantly increased.This paper aims to explore the challenges faced by China Railway Group in managing participation in joint-venture railway companies.The study seeks to propose specific approaches to ensure the effective management of these companies,thereby maximizing the benefits of the regional restructuring and supporting the development of a strong transportation country and a modern infrastructure system.Design/methodology/approach-Based on the change in the shareholding relationship between China Railway Group and the joint-venture railway companies,and considering the current situation of the regional restructuring of these companies,as well as the insights from existing literature and typical case studies,this paper proposes some specific paths for effective management of joint-stock railway companies which China Railway Group participated in.Findings-The problems in participation management are the unclear dual leadership role of the party committee,the lack of discourse power,the lack of synergy between shareholders,the increasing risk of sustainable operation of the loss-making companies and the role of dispatched personnel is not fully played.Based on the theories,combined with the existing research and practical cases,the paper proposed specific approaches,such as perfecting top-level system design,maintaining the discourse power,carrying out differentiated management,arranging personnel rationally,arranging shareholders synergy,and innovating methods to provide references for China Railway Group’s subsequent management of joint venture railway companies.Originality/value-This paper contributes to the existing literature by providing a comprehensive analysis of the challenges faced by China Railway Group in managing participation in joint-venture railway companies following the regional restructuring.The study offers novel insights and practical recommendations for addressing these challenges.The findings can serve as valuable references for China Railway Group’s subsequent management of joint-venture railway companies which participated in,as well as for other stateowned enterprises facing similar challenges in managing their joint ventures.展开更多
By introducing XOR operation and one-way function chains to group key management schemes based on the keys tree, a new group key management scheme based on the keys tree, XOR operation and one-way function chains is p...By introducing XOR operation and one-way function chains to group key management schemes based on the keys tree, a new group key management scheme based on the keys tree, XOR operation and one-way function chains is proposed. Initialization, member adding and member evicting operations are introduced. The new scheme is compared with three other group key management schemes which are based on the keys tree: SKDC, LKH, and OFF. As far as transmission, computation and storage costs are concerned, the performance of the new group key management scheme is the best. The security problem of the new scheme is analyzed. This new scheme provides backward and forward security, i.e.. newly admitted group members cannot read previous multicast messages and evicted members cannot read future multicast messages, even with collusion by many arbitrarily evicted members.展开更多
The key exposure problem is a practical threat for many security applications. In wireless sensor networks (WSNs), keys could be compromised easily due to its limited hardware protections. A secure group key managemen...The key exposure problem is a practical threat for many security applications. In wireless sensor networks (WSNs), keys could be compromised easily due to its limited hardware protections. A secure group key management scheme is responsible for secure distributing group keys among valid nodes of the group. Based on the key-insulated encryption (KIE), we propose a group key management scheme (KIE-GKMS), which integrates the pair-wise key pre-distribution for WSN. The KIE-GKMS scheme updates group keys dynamically when adding or removing nodes. Moreover, the security analysis proves that the KIE-GKMS scheme not only obtains the semantic security, but also provides the forward and backward security. Finally, the theoretical analysis shows that the KIE-GKMS scheme has constant performance on both communication and storage costs in sensor nodes.展开更多
Considering the special requirements of group enterprise information management software, a new method of massive software development was put forward basing on the component technology and facing the "assemblage". ...Considering the special requirements of group enterprise information management software, a new method of massive software development was put forward basing on the component technology and facing the "assemblage". It generalizes five key parts of the method system including the overall strategy, the application project method basing on the operation "assemblage", the field project method basing on component, the development method facing the component on the basis of the visible component platform, and the software development process model basing on the component "assemblage". Besides, this paper describes the process and principle of this method application with an example of the construction of a Communications Investment Group enterprise's management information system. The method provides a new idea for breaking away from the predicament appeared in the construction of present enterprise informatization and exploring the way of software industrialization.展开更多
The m ajor advantages of EBS-based key rrkanagerrent scheme are its enhanced network survivability, high dynamic performance, and better support for network expansion. But it suffers from the collusion problem, which ...The m ajor advantages of EBS-based key rrkanagerrent scheme are its enhanced network survivability, high dynamic performance, and better support for network expansion. But it suffers from the collusion problem, which means it is prone to the cooperative attack of evicted members. A novel EBS-based collusion resistant group management scheme utilizing the construction of Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is proposed. The new scheme satisfies the desired security properties, such as forward secrecy, backward secrecy and collusion secrecy. Compared with existing EBS-based key rmnagement scheme, the new scheme can resolve EBS collusion problem completely. Even all evicted members work together, and share their individual piece of information, they could not access to the new group key. In addition, our scheme is more efficient in terms of conmnication and computation overhead when the group size is large. It can be well controlled even in the case of large-scale application scenarios.展开更多
Focusing on the two themes of"internal control"and"risk management",this paper makes an in-depth analysis of the current situation of risk management and internal control of Moutai Group.It analyze...Focusing on the two themes of"internal control"and"risk management",this paper makes an in-depth analysis of the current situation of risk management and internal control of Moutai Group.It analyzes the current situation of risk management and internal control of Moutai Group.It is found that the risk management of Moutai Group is not perfect,the information exchange is not smooth,and the internal control assessment is not perfect.Finally,it puts forward some corresponding countermeasures,including establishing an effective information communication mechanism,perfecting the risk assessment system,and strengthening the construction of the professional talent team.展开更多
With the development and widely used of the compute r technology, the CAD has been more and more used in the process of designing prod uct. The number of the engineering drawings will greatly increase because of the c...With the development and widely used of the compute r technology, the CAD has been more and more used in the process of designing prod uct. The number of the engineering drawings will greatly increase because of the continually appearance of the new products. As a result, it has become a badly needed to be solved problem for us that how to rapidly and efficiently search an d appropriately preserve and manage the drawings. In this paper, a method of bui lding the product drawing management system for extrusion aluminum-type materia ls is discussed. This system is designed for the profile graphic of the aluminou s section material management by using Group Technology (GT) principle. Accordin g to the GT, we developed a classifying-coding system and drawing management sy stem about the extrusion aluminum-type materials through analyzing a large numb er of extrusion aluminum-type materials section drawings. The coding system has realized the flexible coding and hidden coding of the extrusion aluminum-type materials and then enhanced the flexibility and the expansible of the system. By supplying the designer with the human-computer interaction interface the drawi ng management system has been able to resolve many difficult problems such as se arch and manage the existed drawings about the extrusion aluminum-type material s very well. At the same time, it also helps the developing work enhance the abi lity of inheriting by applying this kind of variant method. In a word, with the help of this system we can not only shorten the designing time greatly and reduc e the cost of the product but also research the designing drawings rapidly. In o rder to output the data information related to the part drawing, the system uses the data-exchange standard to which the drawing support-software adapted as d ata-exchange interface. The system is advantageous to building a standard of dr awing design and increasing the efficiency of searching drawing and enhancing th e information management, which have had a base for building the best management system in the future. In addition, the paper has a detailed analysis about the principle of flexible classification code and data structure.展开更多
The current multicast model provides no access control mechanism. Any host can send data directly to a multicast address or join a multicast group to become a member, which brings safety problems to multicast. In this...The current multicast model provides no access control mechanism. Any host can send data directly to a multicast address or join a multicast group to become a member, which brings safety problems to multicast. In this paper, we present a new active multicast group access control mechanism that is founded on trust management. This structure can solve the problem that exists in multicast members' access control and distributing authorization of traditional IP multicast.展开更多
The integration of international economy dominated wi th the financial market leads to fierce competition. This requires firms impleme nt modern corporate financial mechanism. From the view of the current situation of...The integration of international economy dominated wi th the financial market leads to fierce competition. This requires firms impleme nt modern corporate financial mechanism. From the view of the current situation of financial management in China, we demonstrates the differences in financial m anagement between Chinese enterprises and international companies by describing detailed case studies of typical large enterprises in China. To transform the enterprise management mechanism, the enterprise financial m echanism must be transformed accordingly. The basic ideas for its transformation and establishment include: 1. Changing the managerial ideology, that is, completing the ideological chan ge from the management of goods to the management of capital; 2. Establishing a scientific organizational mechanism for financial managemen t; 3. Establishing a mechanism for scientific management, supervision and assess ment; 4. Training high-level financial management personnel with modern management knowledge; 5. Dividing promotion center, distribution center, cost center and profit cen ter in financial division. In view of the above basic ideas and basic principles for the transformation and establishment of enterprise financial mechanism, we found that: the basic conte nt that needs transformation in the theory of China’s traditional enterprise fin ancial mechanism should include the content of finance main body, the content of financial objectives, the content of financial organizational structure and the content of environment for financial management. At the same time the following theories should be introduced, particularly the theories of capital time value, of risk in finance management and risk management, of the capital cost and capi tal structure, so as to establish a basic theoretical framework for the modern e nterprise financial mechanism. Based on the analyses, this paper discusses the impacts of economic globaliz ation to Chinese large enterprises and their financial management systems. From the current situation of Chinese companies’ financial management, this paper dem onstrates the adaptations to the differences in financial management of Chin ese enterprises with case study.展开更多
Considering some drawbacks of the mainstream approach to environmental management (EM),the conception and basic idea of Participatory EM(PEM) are put forward.PEM possesses some main features and benefits that are supe...Considering some drawbacks of the mainstream approach to environmental management (EM),the conception and basic idea of Participatory EM(PEM) are put forward.PEM possesses some main features and benefits that are superior to the mainstream approach,but also faces the crucial constraint in decision-making.The dilemma can be effectively settled by applying an advanced decision-making support tool-group decision support system(GDSS).On the basis of recognizing the complex decision-making environment of PEM,this paper describes the components of GDSS for PEM(PEM-GDSS) and further discusses the basic requirement of PEM-GDSS.展开更多
Several muhicast key management schemes such as those proposed by Wallner et al and Wong et al are based on a multilevel, logical hierarchy (or tree) of key-encrypting keys. When used in conjunction with a reliahle ...Several muhicast key management schemes such as those proposed by Wallner et al and Wong et al are based on a multilevel, logical hierarchy (or tree) of key-encrypting keys. When used in conjunction with a reliahle muhicast infrastructure, this approach results in a highly efficient key update mechanism in which the number of muhicast messages transmitted upon a membership update is proportional to the depth of the tree, which is logarithmic to the size of the secure muhicast group. But this is based on the hypothesis that the tree is maintained in a balanced manner. This paper proposes a scalable rekeying scheme---link-tree structure for implementing secure group communication. Theoretical calculation and experimentation show that this scheme has better performance than the tree structure and the star structure, and at the same time still keep the link-tree structure balanced.展开更多
Cloud data sharing service, which allows a group of people to work together to access and modify the shared data, is one of the most popular and efficient working styles in the enterprises. However, the cloud server i...Cloud data sharing service, which allows a group of people to work together to access and modify the shared data, is one of the most popular and efficient working styles in the enterprises. However, the cloud server is not completely trusted, and its security could be compromised by monetary reasons or caused by hacking and hardware errors. Therefore, despite of having advantages of scalability and flexibility, cloud storage service comes with privacy and the security concerns. A straightforward method to protect the user's privacy is to encrypt the data stored at the cloud. To enable the authenticated users to access the encrypted cloud data, a practical group key management algorithm for the cloud data sharing application is highly desired. The existing group key management mechanisms presume that the server is trusted. But, the cloud data service mode does not always meet this condition. How to manage the group keys to support the scenario of the cloud storage with a semi-trusted cloud server is still a challenging task. Moreover, the cloud storage system is a large-scale and open application, in which the user group is dynamic. To address this problem, we propose a practical group key management algorithm based on a proxy re-encryption mechanism in this paper. We use the cloud server to act as a proxy tore-encrypt the group key to allow authorized users to decrypt and get the group key by their private key. To achieve the hierarchical access control policy, our scheme enables the cloud server to convert the encrypted group key of the lower group to the upper group. The numerical analysis and experimental results further validate the high efficiency and security of the proposed scheme.展开更多
Value Management (VM) is a rigorous and systematic approach to improve the value and optimise the overall cost of a facility. It identifies opportunities to remove unnecessary costs while assuring that quality, reliab...Value Management (VM) is a rigorous and systematic approach to improve the value and optimise the overall cost of a facility. It identifies opportunities to remove unnecessary costs while assuring that quality, reliability, performance, and other critical factors will meet or exceed the customers’ expectations. It has been widely used in the construction industry in a number of countries. A recent survey, however, revealed several problems that hinder the wider use of this methodology in the industry. To overcome these problems, a feasibility study has been conducted to investigate whether or not a Group Support System (GSS) can support collaborative works in VM workshops. This paper introduces the development and structure of a prototype GSS which is designed to support the collaborative works of stakeholders in VM workshops. It begins with an introduction to the conceptual GSS framework and job plan, illustrating what GSS supports can be provided to VM workshops. This is followed by a detailed description of the GSS prototype system to demonstrate how these supports can be performed as an integrated computer system. The testing of the system is also discussed. The research findings provide strong evidence in supporting the notion of using GSS to improve VM implementation. The information support of GSS has been ranked to be the most useful GSS functions and most of the practitioners interviewed are highly interested in applying GSS to support VM workshops in the future.展开更多
As the times of knowledge-based economy comes, if the enterprise wants to gain dominant position in the international arena, it must pay attention to the human resources strategy. Firstly, this paper defines the basic...As the times of knowledge-based economy comes, if the enterprise wants to gain dominant position in the international arena, it must pay attention to the human resources strategy. Firstly, this paper defines the basic theory of human resource management, and then in Lenovo case, this paper focused on analyzing Lenovo's acquisition of IBM's PC business, analyzed the condition of Lenovo PC business and mobile Intemet business by using traditional Boston matrix, and concluded that effect of Lenovo acquisition is not significant, then put forward some improving measures.展开更多
Broadcast network, telecommunications network and Internet underpin the development of the information industry. The integration of them three is an inevitable trend of the modern IT industry. In this context, provinc...Broadcast network, telecommunications network and Internet underpin the development of the information industry. The integration of them three is an inevitable trend of the modern IT industry. In this context, provincial broadcast groups are confronted with unprecedented challenges and opportunities, among which customers are a key element. This paper explores the customer-oriented sales management mode based on the marketized operation of provincial broadcast groups with Henan CATV Group as the illustrative case.展开更多
Given that the classical performance evaluation models can not deal with the group decision making problems since they simply average the index,we propose an enterprise knowledge management evaluation model based on m...Given that the classical performance evaluation models can not deal with the group decision making problems since they simply average the index,we propose an enterprise knowledge management evaluation model based on multiple attribute group decision making (MAGDM). Find the differences between Ordered Weighted Averaging (OWA) and methods for uncertain decision making. Also,analyze the multiple attribute group decision making process and implement the algorithm. Finally,apply the method on performance evaluation of four enterprises and make sensitivity analysis towards the evaluation results.展开更多
Intelligent transportation system (ITS) is proposed as the most effective way to improve road safety and traffic efficiency. However, the future of ITS for large scale transportation infrastructures deployment highl...Intelligent transportation system (ITS) is proposed as the most effective way to improve road safety and traffic efficiency. However, the future of ITS for large scale transportation infrastructures deployment highly depends on the security level of vehicular communication systems (VCS). Security applications in VCS are fulfilled through secured group broadcast. Therefore, secure key management schemes are considered as a critical research topic for network security. In this paper, we propose a framework for providing secure key management within heterogeneous network. The seeurity managers (SMs) play a key role in the framework by retrieving the vehicle departnre infi^rmation, encapsulating block to transport keys and then executing rekeying to vehicles within the same security domain. The first part of this framework is a novel Group Key Management (GKM) scheme basing on leaving probability (LP) of vehicles to depart current VCS region. Vehicle's LP factor is introduced into GKM scheme to achieve a more effieient rekeying scheme and less rekeying costs. The second component of the framework using the blockchain concept to simplify the distributed key management in heterogeneous VCS domains. Extensive simulations and analysis are provided to show the effectiveness and effieiency of the proposed framework: Our GKM results demonstrate that probability-based BR reduees rekeying eost compared to the benchmark scheme, while the blockchain deereases the time eost of key transmission over heterogeneous net-works.展开更多
With the rapid development and furthering of higher education, most Chinese colleges have carried out large-scale enrollment program, which is a necessary improvement toward higher education reform. Meanwhile, the inc...With the rapid development and furthering of higher education, most Chinese colleges have carried out large-scale enrollment program, which is a necessary improvement toward higher education reform. Meanwhile, the increasing number of students has posed new problems and requirements for the old teaching method: the English teachers are facing more students and larger classes. In Zhejiang University, City College (ZUCC) the credit system and course selection has challenged the English teachers on a higher level. Every English teacher is facing classes of more than 40 students from various departments with sharp contrast among individual students in their English proficiency level and local background. How can every student actively participate in teaching activity so as to achieve better performance in English class? Many teachers, therefore, have adopted team activity and cooperative teaching method to stimulate student participation in class. Inspired by the management theory to optimize student groups into independent teams, the concept of team construction and team management has been introduced into College English Teaching in ZUCC, which has given new meaning to team activity--it will become an interdisciplinary teaching method with its own feature.展开更多
基金Hebei University Affiliated Hospital Youth Fund Scientific Research Project Project Number:2019Q017。
文摘Objective:To explore the role of specialized group management in the quality control of perioperative nursing.Methods:45 surgical nurses from our hospital were selected as the research subjects.Traditional operating room management was adopted from July 2019 to June 2020,and specialized group management was adopted from July 2020 to June 2021.The surgeon’s satisfaction,surgical nurses’core professional competence,and surgical patients’satisfaction were obtained through surveys and the results were analyzed.Results:Surgeon satisfaction before the implementation of specialized group management was significantly lower than after its implementation(P<0.05).Besides,surgical nurses’core professional competency scores before the implementation of specialized group management were significantly lower than after its implementation(P<0.05).Lastly,surgical patients’satisfaction before the implementation of specialized group management was significantly lower than after its implementation(P<0.05).Conclusion:Specialized group management helps to improve the quality of perioperative care and should be applied in clinical practice.
基金China State Railway Group Co.,Ltd.has supported this work as a critical project(Grant No.:N2022Z020).
文摘Purpose-Following the regional restructuring,the number of joint-venture railway companies in which the Group participates has significantly increased.This paper aims to explore the challenges faced by China Railway Group in managing participation in joint-venture railway companies.The study seeks to propose specific approaches to ensure the effective management of these companies,thereby maximizing the benefits of the regional restructuring and supporting the development of a strong transportation country and a modern infrastructure system.Design/methodology/approach-Based on the change in the shareholding relationship between China Railway Group and the joint-venture railway companies,and considering the current situation of the regional restructuring of these companies,as well as the insights from existing literature and typical case studies,this paper proposes some specific paths for effective management of joint-stock railway companies which China Railway Group participated in.Findings-The problems in participation management are the unclear dual leadership role of the party committee,the lack of discourse power,the lack of synergy between shareholders,the increasing risk of sustainable operation of the loss-making companies and the role of dispatched personnel is not fully played.Based on the theories,combined with the existing research and practical cases,the paper proposed specific approaches,such as perfecting top-level system design,maintaining the discourse power,carrying out differentiated management,arranging personnel rationally,arranging shareholders synergy,and innovating methods to provide references for China Railway Group’s subsequent management of joint venture railway companies.Originality/value-This paper contributes to the existing literature by providing a comprehensive analysis of the challenges faced by China Railway Group in managing participation in joint-venture railway companies following the regional restructuring.The study offers novel insights and practical recommendations for addressing these challenges.The findings can serve as valuable references for China Railway Group’s subsequent management of joint-venture railway companies which participated in,as well as for other stateowned enterprises facing similar challenges in managing their joint ventures.
文摘By introducing XOR operation and one-way function chains to group key management schemes based on the keys tree, a new group key management scheme based on the keys tree, XOR operation and one-way function chains is proposed. Initialization, member adding and member evicting operations are introduced. The new scheme is compared with three other group key management schemes which are based on the keys tree: SKDC, LKH, and OFF. As far as transmission, computation and storage costs are concerned, the performance of the new group key management scheme is the best. The security problem of the new scheme is analyzed. This new scheme provides backward and forward security, i.e.. newly admitted group members cannot read previous multicast messages and evicted members cannot read future multicast messages, even with collusion by many arbitrarily evicted members.
基金Project(61100201) supported by National Natural Science Foundation of ChinaProject(12ZZ019) supported by Technology Innovation Research Program,Shang Municipal Education Commission,China+1 种基金Project(LYM11053) supported by the Foundation for Distinguished Young Talents in Higher Education of Guangdong Province,ChinaProject(NCET-12-0358) supported by New Century Excellent Talentsin University,Ministry of Education,China
文摘The key exposure problem is a practical threat for many security applications. In wireless sensor networks (WSNs), keys could be compromised easily due to its limited hardware protections. A secure group key management scheme is responsible for secure distributing group keys among valid nodes of the group. Based on the key-insulated encryption (KIE), we propose a group key management scheme (KIE-GKMS), which integrates the pair-wise key pre-distribution for WSN. The KIE-GKMS scheme updates group keys dynamically when adding or removing nodes. Moreover, the security analysis proves that the KIE-GKMS scheme not only obtains the semantic security, but also provides the forward and backward security. Finally, the theoretical analysis shows that the KIE-GKMS scheme has constant performance on both communication and storage costs in sensor nodes.
基金Supported by the National Natural Science Foundation of China (60572162)
文摘Considering the special requirements of group enterprise information management software, a new method of massive software development was put forward basing on the component technology and facing the "assemblage". It generalizes five key parts of the method system including the overall strategy, the application project method basing on the operation "assemblage", the field project method basing on component, the development method facing the component on the basis of the visible component platform, and the software development process model basing on the component "assemblage". Besides, this paper describes the process and principle of this method application with an example of the construction of a Communications Investment Group enterprise's management information system. The method provides a new idea for breaking away from the predicament appeared in the construction of present enterprise informatization and exploring the way of software industrialization.
基金Acknowledgements The authors would like to thank the reviewers for their detailed reviews and constructive comments, which have helped improve the quality of this paper. This work was supported by the National Natural Science Foundation of China under Crant No. 60873231, the Natural Science Foundation of Jiangsu Province under Grant No. BK2009426, Major State Basic Research Development Program of China under Cwant No.2011CB302903 and Key University Science Research Project of Jiangsu Province under Crant No. 11KJA520002.
文摘The m ajor advantages of EBS-based key rrkanagerrent scheme are its enhanced network survivability, high dynamic performance, and better support for network expansion. But it suffers from the collusion problem, which means it is prone to the cooperative attack of evicted members. A novel EBS-based collusion resistant group management scheme utilizing the construction of Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is proposed. The new scheme satisfies the desired security properties, such as forward secrecy, backward secrecy and collusion secrecy. Compared with existing EBS-based key rmnagement scheme, the new scheme can resolve EBS collusion problem completely. Even all evicted members work together, and share their individual piece of information, they could not access to the new group key. In addition, our scheme is more efficient in terms of conmnication and computation overhead when the group size is large. It can be well controlled even in the case of large-scale application scenarios.
文摘Focusing on the two themes of"internal control"and"risk management",this paper makes an in-depth analysis of the current situation of risk management and internal control of Moutai Group.It analyzes the current situation of risk management and internal control of Moutai Group.It is found that the risk management of Moutai Group is not perfect,the information exchange is not smooth,and the internal control assessment is not perfect.Finally,it puts forward some corresponding countermeasures,including establishing an effective information communication mechanism,perfecting the risk assessment system,and strengthening the construction of the professional talent team.
文摘With the development and widely used of the compute r technology, the CAD has been more and more used in the process of designing prod uct. The number of the engineering drawings will greatly increase because of the continually appearance of the new products. As a result, it has become a badly needed to be solved problem for us that how to rapidly and efficiently search an d appropriately preserve and manage the drawings. In this paper, a method of bui lding the product drawing management system for extrusion aluminum-type materia ls is discussed. This system is designed for the profile graphic of the aluminou s section material management by using Group Technology (GT) principle. Accordin g to the GT, we developed a classifying-coding system and drawing management sy stem about the extrusion aluminum-type materials through analyzing a large numb er of extrusion aluminum-type materials section drawings. The coding system has realized the flexible coding and hidden coding of the extrusion aluminum-type materials and then enhanced the flexibility and the expansible of the system. By supplying the designer with the human-computer interaction interface the drawi ng management system has been able to resolve many difficult problems such as se arch and manage the existed drawings about the extrusion aluminum-type material s very well. At the same time, it also helps the developing work enhance the abi lity of inheriting by applying this kind of variant method. In a word, with the help of this system we can not only shorten the designing time greatly and reduc e the cost of the product but also research the designing drawings rapidly. In o rder to output the data information related to the part drawing, the system uses the data-exchange standard to which the drawing support-software adapted as d ata-exchange interface. The system is advantageous to building a standard of dr awing design and increasing the efficiency of searching drawing and enhancing th e information management, which have had a base for building the best management system in the future. In addition, the paper has a detailed analysis about the principle of flexible classification code and data structure.
基金Supported by the National Natural Science Foun-dation of China (60363001 ,60373087 ,90104005 ,60473023)
文摘The current multicast model provides no access control mechanism. Any host can send data directly to a multicast address or join a multicast group to become a member, which brings safety problems to multicast. In this paper, we present a new active multicast group access control mechanism that is founded on trust management. This structure can solve the problem that exists in multicast members' access control and distributing authorization of traditional IP multicast.
文摘The integration of international economy dominated wi th the financial market leads to fierce competition. This requires firms impleme nt modern corporate financial mechanism. From the view of the current situation of financial management in China, we demonstrates the differences in financial m anagement between Chinese enterprises and international companies by describing detailed case studies of typical large enterprises in China. To transform the enterprise management mechanism, the enterprise financial m echanism must be transformed accordingly. The basic ideas for its transformation and establishment include: 1. Changing the managerial ideology, that is, completing the ideological chan ge from the management of goods to the management of capital; 2. Establishing a scientific organizational mechanism for financial managemen t; 3. Establishing a mechanism for scientific management, supervision and assess ment; 4. Training high-level financial management personnel with modern management knowledge; 5. Dividing promotion center, distribution center, cost center and profit cen ter in financial division. In view of the above basic ideas and basic principles for the transformation and establishment of enterprise financial mechanism, we found that: the basic conte nt that needs transformation in the theory of China’s traditional enterprise fin ancial mechanism should include the content of finance main body, the content of financial objectives, the content of financial organizational structure and the content of environment for financial management. At the same time the following theories should be introduced, particularly the theories of capital time value, of risk in finance management and risk management, of the capital cost and capi tal structure, so as to establish a basic theoretical framework for the modern e nterprise financial mechanism. Based on the analyses, this paper discusses the impacts of economic globaliz ation to Chinese large enterprises and their financial management systems. From the current situation of Chinese companies’ financial management, this paper dem onstrates the adaptations to the differences in financial management of Chin ese enterprises with case study.
文摘Considering some drawbacks of the mainstream approach to environmental management (EM),the conception and basic idea of Participatory EM(PEM) are put forward.PEM possesses some main features and benefits that are superior to the mainstream approach,but also faces the crucial constraint in decision-making.The dilemma can be effectively settled by applying an advanced decision-making support tool-group decision support system(GDSS).On the basis of recognizing the complex decision-making environment of PEM,this paper describes the components of GDSS for PEM(PEM-GDSS) and further discusses the basic requirement of PEM-GDSS.
基金Sponsored by the National Natural Science Foundation of China (Grant No.60203012) and Shanghai Rising-Star Program in Science and Technology (Grant No.02QD14027).
文摘Several muhicast key management schemes such as those proposed by Wallner et al and Wong et al are based on a multilevel, logical hierarchy (or tree) of key-encrypting keys. When used in conjunction with a reliahle muhicast infrastructure, this approach results in a highly efficient key update mechanism in which the number of muhicast messages transmitted upon a membership update is proportional to the depth of the tree, which is logarithmic to the size of the secure muhicast group. But this is based on the hypothesis that the tree is maintained in a balanced manner. This paper proposes a scalable rekeying scheme---link-tree structure for implementing secure group communication. Theoretical calculation and experimentation show that this scheme has better performance than the tree structure and the star structure, and at the same time still keep the link-tree structure balanced.
基金partially supported by National Natural Science Foundation of China No.61202034,61232002,61303026,6157237861402339CCF Opening Project of Chinese Information Processing No.CCF2014-01-02+2 种基金the Program for Innovative Research Team of Wuhan No.2014070504020237Fundamental Application Research Plan of Suzhou City No.SYG201312Natural Science Foundation of Wuhan University No.2042016gf0020
文摘Cloud data sharing service, which allows a group of people to work together to access and modify the shared data, is one of the most popular and efficient working styles in the enterprises. However, the cloud server is not completely trusted, and its security could be compromised by monetary reasons or caused by hacking and hardware errors. Therefore, despite of having advantages of scalability and flexibility, cloud storage service comes with privacy and the security concerns. A straightforward method to protect the user's privacy is to encrypt the data stored at the cloud. To enable the authenticated users to access the encrypted cloud data, a practical group key management algorithm for the cloud data sharing application is highly desired. The existing group key management mechanisms presume that the server is trusted. But, the cloud data service mode does not always meet this condition. How to manage the group keys to support the scenario of the cloud storage with a semi-trusted cloud server is still a challenging task. Moreover, the cloud storage system is a large-scale and open application, in which the user group is dynamic. To address this problem, we propose a practical group key management algorithm based on a proxy re-encryption mechanism in this paper. We use the cloud server to act as a proxy tore-encrypt the group key to allow authorized users to decrypt and get the group key by their private key. To achieve the hierarchical access control policy, our scheme enables the cloud server to convert the encrypted group key of the lower group to the upper group. The numerical analysis and experimental results further validate the high efficiency and security of the proposed scheme.
文摘Value Management (VM) is a rigorous and systematic approach to improve the value and optimise the overall cost of a facility. It identifies opportunities to remove unnecessary costs while assuring that quality, reliability, performance, and other critical factors will meet or exceed the customers’ expectations. It has been widely used in the construction industry in a number of countries. A recent survey, however, revealed several problems that hinder the wider use of this methodology in the industry. To overcome these problems, a feasibility study has been conducted to investigate whether or not a Group Support System (GSS) can support collaborative works in VM workshops. This paper introduces the development and structure of a prototype GSS which is designed to support the collaborative works of stakeholders in VM workshops. It begins with an introduction to the conceptual GSS framework and job plan, illustrating what GSS supports can be provided to VM workshops. This is followed by a detailed description of the GSS prototype system to demonstrate how these supports can be performed as an integrated computer system. The testing of the system is also discussed. The research findings provide strong evidence in supporting the notion of using GSS to improve VM implementation. The information support of GSS has been ranked to be the most useful GSS functions and most of the practitioners interviewed are highly interested in applying GSS to support VM workshops in the future.
文摘As the times of knowledge-based economy comes, if the enterprise wants to gain dominant position in the international arena, it must pay attention to the human resources strategy. Firstly, this paper defines the basic theory of human resource management, and then in Lenovo case, this paper focused on analyzing Lenovo's acquisition of IBM's PC business, analyzed the condition of Lenovo PC business and mobile Intemet business by using traditional Boston matrix, and concluded that effect of Lenovo acquisition is not significant, then put forward some improving measures.
文摘Broadcast network, telecommunications network and Internet underpin the development of the information industry. The integration of them three is an inevitable trend of the modern IT industry. In this context, provincial broadcast groups are confronted with unprecedented challenges and opportunities, among which customers are a key element. This paper explores the customer-oriented sales management mode based on the marketized operation of provincial broadcast groups with Henan CATV Group as the illustrative case.
文摘Given that the classical performance evaluation models can not deal with the group decision making problems since they simply average the index,we propose an enterprise knowledge management evaluation model based on multiple attribute group decision making (MAGDM). Find the differences between Ordered Weighted Averaging (OWA) and methods for uncertain decision making. Also,analyze the multiple attribute group decision making process and implement the algorithm. Finally,apply the method on performance evaluation of four enterprises and make sensitivity analysis towards the evaluation results.
文摘Intelligent transportation system (ITS) is proposed as the most effective way to improve road safety and traffic efficiency. However, the future of ITS for large scale transportation infrastructures deployment highly depends on the security level of vehicular communication systems (VCS). Security applications in VCS are fulfilled through secured group broadcast. Therefore, secure key management schemes are considered as a critical research topic for network security. In this paper, we propose a framework for providing secure key management within heterogeneous network. The seeurity managers (SMs) play a key role in the framework by retrieving the vehicle departnre infi^rmation, encapsulating block to transport keys and then executing rekeying to vehicles within the same security domain. The first part of this framework is a novel Group Key Management (GKM) scheme basing on leaving probability (LP) of vehicles to depart current VCS region. Vehicle's LP factor is introduced into GKM scheme to achieve a more effieient rekeying scheme and less rekeying costs. The second component of the framework using the blockchain concept to simplify the distributed key management in heterogeneous VCS domains. Extensive simulations and analysis are provided to show the effectiveness and effieiency of the proposed framework: Our GKM results demonstrate that probability-based BR reduees rekeying eost compared to the benchmark scheme, while the blockchain deereases the time eost of key transmission over heterogeneous net-works.
文摘With the rapid development and furthering of higher education, most Chinese colleges have carried out large-scale enrollment program, which is a necessary improvement toward higher education reform. Meanwhile, the increasing number of students has posed new problems and requirements for the old teaching method: the English teachers are facing more students and larger classes. In Zhejiang University, City College (ZUCC) the credit system and course selection has challenged the English teachers on a higher level. Every English teacher is facing classes of more than 40 students from various departments with sharp contrast among individual students in their English proficiency level and local background. How can every student actively participate in teaching activity so as to achieve better performance in English class? Many teachers, therefore, have adopted team activity and cooperative teaching method to stimulate student participation in class. Inspired by the management theory to optimize student groups into independent teams, the concept of team construction and team management has been introduced into College English Teaching in ZUCC, which has given new meaning to team activity--it will become an interdisciplinary teaching method with its own feature.