{"title":"A Feature Extracting Method for Tamper Detection in Printed Documents","authors":"Yoshiyasu Takahashi, Takaaki Yamada, S. Susaki","doi":"10.5220/0001905804290432","DOIUrl":"https://doi.org/10.5220/0001905804290432","url":null,"abstract":"In this paper, we propose our feature extracting method for tamper detection in printed documents. To detect the tamper of the printed document, a feature extracting method is needed. In this paper, we describe our feature extracting method. Our feature extracting method is based on the location of the mean point of each dot. We have estimated our feature extracting method’s probability of the collision, its uniformity of the distribution, its invariability during D/A and A/D transform and its invariability during the ordinal change of paper. We have found that our feature extracting method can extract desirable feature value.","PeriodicalId":190970,"journal":{"name":"International Conference on e-Business","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132762593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Thiago Curvelo dos Anjos, L. H. Freitas, Guido Lemos de Souza Filho, Tiago Salmito
{"title":"THOTH - A Framework for Building Secure TV Broadcasters Networks over the Internet","authors":"Thiago Curvelo dos Anjos, L. H. Freitas, Guido Lemos de Souza Filho, Tiago Salmito","doi":"10.5220/0002113500570062","DOIUrl":"https://doi.org/10.5220/0002113500570062","url":null,"abstract":"Nowadays satellite link are costly. Small TV stations can not afford such expenses and big TV stations make huge investments on such infrastructures. Instead of satellite, IPTV based technologies allow real time distribution of digital content with lower costs. Security is one of the main impairments for using IPTV on such type of applications. Considering security as a mandatory requirement we designed Thoth: a framework for creating secure virtual organizations platforms to share TV content among a scalable number","PeriodicalId":190970,"journal":{"name":"International Conference on e-Business","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115347366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Internet-Based Embedded System Architectures - End-User Development Support for Embedded System Applications","authors":"M. Svéda, R. Vrba","doi":"10.5220/0001424300630068","DOIUrl":"https://doi.org/10.5220/0001424300630068","url":null,"abstract":"This paper presents an approach to industrial embedded system networking that offers a reusable design pattern for the class of Internet-based applications. It deals with an integrated networking framework stemming (1) from the IEEE 1451.1 smart transducer interface standard, which is an object-based networking model supporting among others publish-subscribe approach to group messaging, and (2) from the Internet Protocol (IP) multicast communication, mediating efficient and unified access to smart sensors through Internet. The kernel of this paper focuses on adaptations and tuning of those concepts and on their utilization for a gas pipes pressure measurement system as an application example. Furthermore, the contribution brings this scheme in form suitable not only for framework builders, but also for end-user","PeriodicalId":190970,"journal":{"name":"International Conference on e-Business","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128405638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Operational and Behavioural Dimensions of e-Supply Chains Among Malaysian's SMEs","authors":"K. Keoy, M. Zairi, K. Hafeez","doi":"10.5220/0001906703620369","DOIUrl":"https://doi.org/10.5220/0001906703620369","url":null,"abstract":"This paper reviews the available literature to identify theoretical and empirical gaps regarding e-Supply chain adoption among small and medium sized enterprises (SMEs). We argue that a generic e-Supply chain framework should employ appropriate operational and behavioural perspectives. We propose that e-Supply chain operation can succeed only when integrated with an efficient supply chain network and a strategic plan committed to e-Business. Survey data from 208 Malaysian SMEs are collected and Structural Equation Modelling (SEM) is employed to apply the proposed framework. More specifically, a set of three empirical models are examined to evaluate the validity and impact of supply chain strategy, e-Business adoption, and the interaction of these constructs on business performance. Our review suggests that much of the existing e-Supply chain adoption and implementation literature is not firmly grounded in theory. We have suggested that the systems engineering tradition of focusing on the interactions of technology, organizational structure, and personnel provides a useful framework for understanding the business performance of e-Business. The technology-organisational and people (TOP) dimensions are based on sound systems engineering principles that are widely recognised and accepted for improving manufacturing organisation. We suggest that these principles are equally valid for the e-Business oriented and virtual organisations. These expectations are supported by our empirical results. We find that measures based on the TOP conceptual scheme provide reliable and valid scales that are equally applicable to both e-Business and non-e-Business firms.","PeriodicalId":190970,"journal":{"name":"International Conference on e-Business","volume":"26 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114134438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Ontology-Based Architecture for Multi-Agent System Environment","authors":"Roberto Paiano, A. Guido, Enrico Pulimeno","doi":"10.5220/0001913301010106","DOIUrl":"https://doi.org/10.5220/0001913301010106","url":null,"abstract":"The increasing interest towards e-business systems, and thus the need of the companies to communicate with other companies in an efficient and flexible way, brings to a new way of thinking about information systems that open itself towards distributed systems where the exchange of information may happen. The problem is in the way that this exchange can be made both from the technology point of view and from the conceptual point of view. If from a side a recent technology for information exchange (DDSData Distribution Service) can help us from the other one it seem interesting the use of ontology as representation tool of application domain that must open itself to the communication. In this paper we present an architecture that is oriented to a multi-agent communication that uses ontologies and DDS as information exchange protocol. The architecture here presented must be repeat without difficulties on an e-business system assuming that each agent of the proposed architecture is a company in an e-business system.","PeriodicalId":190970,"journal":{"name":"International Conference on e-Business","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115391186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"e-Business @ School - The Technology Adoption Advantage","authors":"R. Grewal","doi":"10.5220/0002109602500255","DOIUrl":"https://doi.org/10.5220/0002109602500255","url":null,"abstract":"A process for forming a multilayer film, which comprises applying, onto a substrate, (A) a liquid solid-color coating which comprises a thermosetting resin composition and a metal powder coated with a coloring pigment, and (B) a clear coating in this order without substantially curing the resulting films of the coatings (A) and (B) and then heating the two films to crosslink and cure them simultaneously. The process of the present invention provides a multilayer film of smaller thickness, excellent hiding power and improved properties such as surface smoothness, chipping resistance and the like.","PeriodicalId":190970,"journal":{"name":"International Conference on e-Business","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115670743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"e-Procurement Adoption by Suppliers - Enablers, Barriers and Critical Sucess Factors","authors":"Paulo Andrade, B. Alturas","doi":"10.5220/0002184101960201","DOIUrl":"https://doi.org/10.5220/0002184101960201","url":null,"abstract":"This paper presents a current research with the aim to identify the enablers, barriers and critical success factors for e-procurement adoption by suppliers. Any successful e-procurement system needs suppliers disposed to trade electronically. We present a review of the actual literature about e-Procurement, with focus on the barriers, enabler s and CSF s already identified. A research methodology is proposed to study the problem, and this work will contribute to better address the issues faced by suppliers on e-procurement","PeriodicalId":190970,"journal":{"name":"International Conference on e-Business","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127221358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multilayer Solution using Multimap for Develope a Mobile Application","authors":"L. Rusu, M. Sârbu, M. Podean","doi":"10.5220/0002226601350138","DOIUrl":"https://doi.org/10.5220/0002226601350138","url":null,"abstract":"For developing mobile application virtual globes software products offer several features and capacities. The paper presents the system objective, function, component modules and key techniques in the procedure of system development. The system, based on the spatial information and attribute information of vehicle and road, was developed and applied in MCLocator. The system, based on platform independent solution and virtual globe software integrate sensors’ information of vehicle parameters and geo position dates obtained from MultiMap, based on the GIS’s strongpoint on spatial analyzing and use of location and communication equipment based on GPS and GPRS.","PeriodicalId":190970,"journal":{"name":"International Conference on e-Business","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126103589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Performance Evaluation of an Ultra-Thin Client System","authors":"C. Pattinson, Tahir Siddiqui","doi":"10.5220/0001904200050011","DOIUrl":"https://doi.org/10.5220/0001904200050011","url":null,"abstract":"Power consumption of individual devices is often ignored in the development of computer networks. The traditional approach to a local areas network, such as might be deployed in a cyber-café or classroom environment, has a number of workstations attached to a server, where the workstations have very similar specifications (and hence power demands) to the server. Intuitively, this means there is significant over specification of the workstation, and that much of the capability of the device is not used, with consequential wasted energy. Alternative topologies exist, particularly those which make use of thin client technology, and are meeting with success particularly in developing countries, where cost and power consumption take on a much greater importance. One such design is the ndiyo project, which is delivering thin-client based network solutions to a number of nations, allowing IT support to be deployed in places where it would not have otherwise been achievable. In this paper, we report our work in developing a simulation model to allow us to study the behaviour and operation of ndiyo, offering us the opportunity to carry out some “what if” analyses of the behaviour of such systems under differing network loads.","PeriodicalId":190970,"journal":{"name":"International Conference on e-Business","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130782481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Search Tree Generation for Business Process Repository Management in the Exception Handling of the e-Commerce Delivery Process","authors":"J. Shin, D. Choi","doi":"10.5220/0002237401210128","DOIUrl":"https://doi.org/10.5220/0002237401210128","url":null,"abstract":"BPMS (business process management system) offers the facility to define new processes or update the existing processes. However, exceptional or non-routine tasks require the intervention of domain experts or generation of the situation specific resolution process. This paper assumes that sufficient amount of business process exception handling cases are stored in the process repository. Since the retrieval of the best exception handling process requires good understanding about the exceptional situation, context awareness is an important issue. To facilitate the representation of the exceptional situation and to enable the selection of the best exception handling process, we adopted the 'situation variable' and 'decision variable' construct. A case example for exception handling in the e-commerce delivery process is provided to illustrate how the proposed construct works. We applied the C5.0 algorithm to build the optimum search tree.","PeriodicalId":190970,"journal":{"name":"International Conference on e-Business","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121902969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}