Papers by Keyword: Enterprise Information System

Paper TitlePage

Authors: Ke Yu, Xing Xin Nie, Qing Fan
Abstract: This paper establishes an enterprise information system configuration management model based on graph theory. Comb all nodes support enterprise information systems for the application system, host, operating system, middleware, database, applications, a database instance, network devices, storage devices, virtual host, virtual platform,11 kinds of configuration items. And sort out the relationships between them to no effect, no effect of virtual relationship, positive impact, positive impact of virtual relationships, reverse impact, reverse impact of virtual relations,6 kinds of relationships. All configurations supporting enterprise information systems and the relationships of them is seen as a weighted digraph. Then the weighted digraph is represented as an edge weight matrix. The edge weight matrix of a particular application system configuration relationships graph is solved according to the edge weight matrix of global configuration relationships graph, Help Operations staff clearly identify the composition of the information systems. The edge weight matrix of the impact of a change on a configuration item is solved according to the edge weight matrix of global configuration relationships graph. Provides a valuable reference views to operations staff when they repair a configuration.
Authors: Chao Gai Xue, Hai Wang Cao
Abstract: This paper deals with a new approach to formal reconfiguration of enterprise information system (EIS) flow based on object-based knowledge meshes (OKM) and binary tree. Firstly, information system flow and its corresponding OKM form are discussed. Then the relations between knowledge points are defined, and the approach to structure expression of OKM is proposed, by which the EIS flows can be formally represented. And then, based on the formal representation, EIS flows can be reconfigured according to mapping rules between practical flow and structure expression of OKM. Finally, an order management flow in an EIS is taken as an example to show the feasibility and effectiveness of the approach.
Authors: Ling Qiu, Zheng Xi Wei, Yong Liu
Abstract: RFID middleware is a key technology of Internet of things. It achieves data recognition and data filtering between hardware devices and software applications. A design scheme for RFID middleware framework is presented in the paper. According to functional analysis and layered design ideas, we define a hierarchy of RFID middleware and construct an application framework, in which RFID event manager module is responsible for processing data streams and RFID information service module is responsible for system integration. Simulation results verify the correctness of the design project. Its recognition rate, redundant data filtering capability and other performance indicators have reached the preset requirements.
Authors: Hai Wang Cao, Chao Gai Xue
Abstract: This paper deals with an approach to the approximation measurement on the enterprise information system (EIS) based on its formal representation. To explore the approximation between modules in EISs and lay foundation for the reconfiguration of EIS, an approximation measurement on the object-based knowledge mesh (OKM) and information transfer relationship mesh (ITRM) corresponding to EIS is proposed. Firstly, based on the definitions of the approximation on atom knowledge point (KP) and relationships, the approximation measurement on OKM with only atom KPs is proposed. Then, the approximation measurement on ITRM is also given, with the steps of the approximation measurement on EIS presented in detail as well. Finally, based upon the above, the approximation measurement on EISs is illustrated by an example to show the application of the proposed method.
Authors: Ru Xin Gou, Ting Jie Lu
Abstract: With the development of computer and network science, enterprises have built lots of information systems for enterprise management, the security management of the information systems if becoming more and more important for most of the enterprises.In this study of information security management plan,enterprises can implement a set of controls based on the controls checklists obtained from risk assesment to achieve information security.
Authors: Yu Shan Tian
Abstract: The effective coordination of enterprise information resources is maintaining its consistency, integrity and efficient utilization of inevitable requirement, but also is the main means to solve the information resource content and structure is becoming more and more diversified and complex. To realize the effective and efficient means of information coordination is the standardization of information resources, structured and hierarchical organization and management. This article first discusses the necessity of enterprise system integration, and put forward the basic principle of the integrated system. For the corresponding implementation method, this paper studied the enterprise information system integration framework based on message, overall design, system access and the message interaction design and data integration model design, to explore the access instant feasible scheme of information sharing between enterprises and internal data and external between enterprise and enterprise.
Authors: Hai Wang Cao, Chao Gai Xue
Abstract: In order to avoid enterprise information system (EIS) risk, the self-organization mechanism of EIS based on complex adaptive system (CAS) is studied. Firstly, self-organization properties of EIS are analyzed, which include open system, nonlinear characteristics, far from equilibrium and fluctuations. Secondly, the complex properties and complex adaptive properties of EIS self-organization are studied. The complex properties include multi-agent, active adaptation of agents, multi-level nature, technology complexity, organizational complexity, process complexity and environment complexity. The complex adaptive properties include aggregation mechanism, identification mechanism, non-linear characteristics flow characteristics, diversity characteristics, internal model mechanism and block characteristics. Finally, architecture model of EIS self-organization is proposed as well as its macro and micro models, which provides a new perspective for EIS and helps understand the rules of EIS implementation.
Showing 1 to 7 of 7 Paper Titles