Journal of Guangxi Normal University(Natural Science Edition) ›› 2013, Vol. 31 ›› Issue (4): 28-32.

Previous Articles     Next Articles

Quality Control Implementation of CI System:Nash Equilibrium and Screening

YU Hai-dong1,2,3, LUO Yun-feng3   

  1. 1.College of Electrical Engineering and New Energy,China Three Gorges University,Yichang Hubei 443002,China;
    2.Library of China Three Gorges University,Yichang Hubei 443002,China;
    3.School of Automation,Huazhong University of Science and Technology,Wuhan Hubei 430074,China
  • Received:2013-05-18 Online:2013-12-20 Published:2018-11-26

Abstract: Competitive intelligence system enhances the ability of using huge amounts of complex data sets to obtain knowledge and insight,which ensures its practicality and security.Thus it is necessary to pay attention to the quality control of competitive intelligence system.For guaranteing the quality standard of competitive intelligence system,rational mechanism design can help the enterprise to identify the most optimal from the service provider groups in advance.The research shows that financial compensation proportion could regulate R&D spending adversely as much as the enterprise had expected.Furthermore,it constructs a game model for the enterprise to screen the ability of shortlisted service providers and provides a quantitative description in formulating reasonable quality standard of competitive intelligence system.

Key words: competitive intelligence system, quality control, Nash equilibrium, separating equilibrium

CLC Number: 

  • TP393
[1] SALLES M.Decision making in SMEs and information requirements for competitive intelligence[J].Production Planning and Control,2006,17(3):229-237.
[2] XIONG Li,LIU Ling.PeerTrust:sopporting reputation-based trust for peer-to-peer electronic communities[J].IEEE Transactions on Knowledge and Data Engineering,2004,16(7):843-857.
[3] SONG Shan-shan,HWANG Kai,ZHOU Run-fang,et al.Trusted P2P transactions with fuzzy reputation aggregation[J].IEEE Internet Computing,2005,9(6):24-34.
[4] 姜守旭,李建中.一种P2P电子商务系统中基于声誉的信任机制[J].软件学报,2007,18(10):2551-2563.
[5] 黄晓斌,钟辉新.基于大数据的企业竞争情报系统模型构建[J].情报杂志,2013,32(3):37-43.
[6] 罗云峰.博弈论教程[M].北京:清华大学出版社,2007.
[1] XIAO Fayuan,LI Haowei. A Routing Optimization Algorithm for Wireless Sensor Network Based on Fuzzy Theory [J]. Journal of Guangxi Normal University(Natural Science Edition), 2017, 35(1): 37-43.
[2] HUANG Hengjie, GONG Xiaolong, WANG Gaocai. An Area Coverage Control Algorithm Based on Connected Dominating Set for Sensor Networks [J]. Journal of Guangxi Normal University(Natural Science Edition), 2016, 34(4): 19-25.
[3] TAO Xiaoling , YU Meng , WANG Yong. Dynamic Selection Method of Path for Concurrent Multipath Transfer [J]. Journal of Guangxi Normal University(Natural Science Edition), 2016, 34(2): 46-53.
[4] LIU Hong, WANG Qi-tao, XIA Wei-jun. The Three-dimensional Positioning Method of WSN Based on Quantum Genetic Algorithm [J]. Journal of Guangxi Normal University(Natural Science Edition), 2015, 33(4): 49-54.
[5] YUE Cai-jie, CHEN Yuan-yan, ZHU Xin-hua. An Effective Area Query Algorithm in Sensor Network [J]. Journal of Guangxi Normal University(Natural Science Edition), 2015, 33(1): 52-58.
[6] LIAO Yuan-xiu, ZHOU Sheng-ming, QIN Shao-hua. The Internet of Things with Knowledge Service Functionality [J]. Journal of Guangxi Normal University(Natural Science Edition), 2014, 32(2): 42-47.
[7] YANG Wen, LI Wen-jing, LI Shuang, LI Shu-ju, LIN Zhong-ming. Parallel Classification Compression Algorithm for Stream-Data Based on Granular Analysis and Storage of GEP [J]. Journal of Guangxi Normal University(Natural Science Edition), 2013, 31(3): 87-93.
[8] LIU Yi-jun, YANG Wei, CHEN Jing-yu. Improved Long-Range Link Inserction Algorithm Based on Rule Topology [J]. Journal of Guangxi Normal University(Natural Science Edition), 2013, 31(3): 114-118.
[9] DOU Xian-zhen, XU Chen, ZUO Yang. Energy Priority-based Optimal Gradient Routing Protocol for Wireless Sensor Networks [J]. Journal of Guangxi Normal University(Natural Science Edition), 2013, 31(3): 157-163.
[10] CHEN Yan, WU Wen-kang, LIANG Jun-bin. High Safety Scheme of Key Pre-distribution with a Mobile Sink in Wireless Sensor Network [J]. Journal of Guangxi Normal University(Natural Science Edition), 2013, 31(3): 164-168.
[11] HE Qing, XIONG Chuan, QIU Xiao-qiang. GRID Platform Integrating Hospital Information Systems [J]. Journal of Guangxi Normal University(Natural Science Edition), 2013, 31(3): 184-190.
[12] LI Xian-xian, GAO Qi. A Distributed Routing Approach for Datacenter-oriented Virtual Network [J]. Journal of Guangxi Normal University(Natural Science Edition), 2012, 30(3): 100-108.
[13] SUN Sheng-jie, LIAO Yu-li, YU Yan-cong. An Efficient Balance Scheme Between Continuous and Real Time Playbacks for Streaming Media [J]. Journal of Guangxi Normal University(Natural Science Edition), 2012, 30(2): 29-34.
[14] ZHANG Ming, LIU Yu, XI Ya-hui. Acquisition of Deep Web Content Based on Domain-Ontology [J]. Journal of Guangxi Normal University(Natural Science Edition), 2011, 29(1): 162-166.
[15] YU Hong, LIU Man. Solving QoS-Aware Web Service Selection Problem with AND/OR Graph [J]. Journal of Guangxi Normal University(Natural Science Edition), 2011, 29(4): 45-48.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!