Guillaume Koum, Augustin Yekel, T. Sangbong, Raoul M. Tsamo, Arnaud Fosso
{"title":"Mobile Applications and Service-oriented Architecture Integration: A Practical Approach in Incorporating Mobility with Enterprise Information System","authors":"Guillaume Koum, Augustin Yekel, T. Sangbong, Raoul M. Tsamo, Arnaud Fosso","doi":"10.5220/0002113802040208","DOIUrl":"https://doi.org/10.5220/0002113802040208","url":null,"abstract":"Mobile Applications and Service-Oriented Architecture (SOA) are two aspects of Computer Science which offer to Enterprise Information Systems (EIS) more agility and flexibility in order to follow the constant evolution of enterprises business. However, the inadequacy of hardware resources and wireless network availability and bandwidth constitutes a major constraint when developing any mobile application. The challenge is exacerbated for developers when trying to integrate these applications with EIS which are naturally heavier. This document presents this integration in the context of an EIS built on SOA. Added to the basic tools needed for local data storage and communication with the server, a mediator (on the device) is introduced to facilitate interactions between the application and the service. We also study reasons which lead us to the choice of implementing a gateway on the server, in order to facilitate the service consumption.","PeriodicalId":190970,"journal":{"name":"International Conference on e-Business","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128715685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Common Textile Vocabularies and Documents: A Conceptual Foundation of a Globally Interoperable Textile e-Marketplace","authors":"J. Guo, Zhuo Hu","doi":"10.5220/0001909600810088","DOIUrl":"https://doi.org/10.5220/0001909600810088","url":null,"abstract":"This paper has proposed a novel common textile vocabulary and document framework (TexVDF) in a collaborative network to enable cross-domain level business information sharing and business document exchange in a semantically consistent way. The approach to this framework is motivated through presenting some real-world examples of business inquiries with product specifications. By these examples, two problems are detected on how to achieve semantic commonality between cross-domain level business vocabularies for textile e-Marketplace mediators and how to allow specificity of cross-domain level common business document templates for local textile e-Marketplace mediators yet still maintaining semantic consistency. To solve these two problems, this paper has firstly reviewed CONEX technologies relevant to the newly developed TexVDF approach, which includes a TexVDF framework, a P2P collaborative textile concept mapping model and a textile business document template model. These two models have been demonstrated by examples to see how they should work.","PeriodicalId":190970,"journal":{"name":"International Conference on e-Business","volume":"175 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115109954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimization of Dataflow on Mobile Devices in Information System of Home Care Agencies","authors":"O. Krejcar, D. Janckulík, Leona Motalova","doi":"10.5220/0002226801030108","DOIUrl":"https://doi.org/10.5220/0002226801030108","url":null,"abstract":"New kind of complex mobile devices can run full scale applications with same comfort as on desktop devices only with several limitations. One of them is insufficient transfer speed on wireless connectivity. Main area of interest is in a model of a radio-frequency based system enhancement for locating and tracking users of a mobile information system. The experimental framework prototype uses a wireless network infrastructure to let a mobile device determine its indoor or outdoor position. User location is used for data prebuffering and pushing information from server to user’s PDA. The accessing of prebuffered data on mobile device can highly improve response time needed to view large multimedia data. This fact can help with design of new full scale applications for mobile devices. On mobile device the SQL Server CE database is used as a cache. Finally the new way to manage the artifacts throw the framework is described and tested. The prebuffering method is described in context of use on real case of information system of home care agencies.","PeriodicalId":190970,"journal":{"name":"International Conference on e-Business","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121989751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Are Media Cues Really a Key Driver towards Trust in Business to Consumer e-Commerce","authors":"Khalid Al-Diri, Dave J. Hobbs, Rami Qahwaji","doi":"10.5220/0002108602270234","DOIUrl":"https://doi.org/10.5220/0002108602270234","url":null,"abstract":"E-commerce B2C yet suffers from consumers’ lack of trust, and most of the research in e-commerce field focuses on how to build trust through cues that appeal to pursue consumers to do on-line purchasing. Since the nature of the Internet is lack of interpersonal exchanges that enhance trust behaviour, in this study we compared on-line consumers’ initial trust on four on-line vendors with the interpersonal cues of a person representing customer supports (Western photo, Saudi photo, Western video clip) and without photo through an extensive lab experiment. We found that the photograph and the video clip enhanced the initial trust than no photo and that the effect of the culture was stronger with Saudi than Western photo. Nevertheless, we presented many results that benefit the academic and the practitioner respectively.","PeriodicalId":190970,"journal":{"name":"International Conference on e-Business","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125012480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Semantic Profile based Service Discovery for Abstract Process Composition","authors":"Shuying Wang, Miriam A. M. Capretz, H. ElYamany","doi":"10.5220/0002236002580263","DOIUrl":"https://doi.org/10.5220/0002236002580263","url":null,"abstract":"WSBPEL (Web Services for Business Process Execution Language) is a process modelling language for composing Web Services. Abstract processes can be used in WSBPEL as process templates, which describe abstract activities without specifying the execution details and the service bindings. However, it is a challenge to refine an abstract process into a concrete executable process for the purpose of adapting to different business requirements. In order to discover the potential business partners and Web Services, we propose a profile-based service matching and discovery approach for semi-automatic semantic process representation that occurs during design time. Specifically, our approach utilizes semantic profiles to specify the semantic descriptions of process activities. Consequently, our methodology provides substantial flexibility for abstract process composition while reusing existing processes and services.","PeriodicalId":190970,"journal":{"name":"International Conference on e-Business","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116705281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Managing Time in Bank Marketing","authors":"Johanna Ahola, H. Ahola","doi":"10.5220/0002111303350338","DOIUrl":"https://doi.org/10.5220/0002111303350338","url":null,"abstract":"An inlet gas manifold for a vacuum deposition chamber incorporates inlet apertures which increase in diameter or cross-section transverse to the direction of gas flow. The aperture configuration increases the dissociation gases such as nitrogen and, thus increases the rate of silicon nitride deposition provided by nitrogen gas chemistry, without requiring the use of reactants such as ammonia. While one could use ammonia in the deposition gas chemistry if desired, the process provides the option of completely eliminating ammonia. The inlet manifold containing the increasing-diameter gas inlet holes provides enhanced control of the process and the deposited film, and is also useful for forming other dielectrics such as silicon oxide and silicon oxynitride. In particular, silicon oxynitride films are characterized by low hydrogen content and by compositional uniformity.","PeriodicalId":190970,"journal":{"name":"International Conference on e-Business","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116986012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Allan K. Y. Wong, Jackei H. K. Wong, Wilfred W. K. Lin, T. Dillon
{"title":"A Novel Dynamic Greedydual-Size Replacement Strategy to Make Time-Critical Web Applications Successful","authors":"Allan K. Y. Wong, Jackei H. K. Wong, Wilfred W. K. Lin, T. Dillon","doi":"10.5220/0002106800170022","DOIUrl":"https://doi.org/10.5220/0002106800170022","url":null,"abstract":"The GreedyDual-Size (GD-Size) replacement algorithm is a static-cache-size approach that yields a higher hit ratio than the basic LRU replacement algorithm. Yet, maintaining a given hit ratio needs dynamic cache size tuning, and this can only be achieved by the MACSC (model for adaptive cache size control) model so far. Since the GD-Size yields a higher hit ratio than the basic LRU, it is proposed in this paper to replace the LRU unit in MACSC with the GD-Size algorithm. The replacement creates a new and more efficient dynamic cache size tuner, Dynamic GreedyDual-Size (DGD-Size).","PeriodicalId":190970,"journal":{"name":"International Conference on e-Business","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130049180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Valentin Nentwich, Nicolai Fischer, A. Sonnenbichler, A. Geyer-Schulz
{"title":"Computer Aided Exercise Generation - A Framework for Human Interaction in the Automated Exercise Generation Process","authors":"Valentin Nentwich, Nicolai Fischer, A. Sonnenbichler, A. Geyer-Schulz","doi":"10.5220/0005947700570063","DOIUrl":"https://doi.org/10.5220/0005947700570063","url":null,"abstract":"Creating exercises for tutorials and exams is part of lecturers’ daily business. Manually creating new exercises for each course is very time expensive. Literature shows many technical solutions in terms of online learning platforms supporting exercise generation, answer checking and students’ progress follow up. Most approaches solve specific problems and cannot be generalized in a way that a pattern for system design can be deducted. In this paper we point out a generic model for human interaction in the automated exercise generation process by identifying general constructs of exercise generation and by applying them on the outlined user interaction pattern. The application of the findings in a prototype for multi-criteria decision analysis indicates viability of the explained concept.","PeriodicalId":190970,"journal":{"name":"International Conference on e-Business","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127095675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation of Handwriting Characteristic for Two-factor Authentication Interface on Touch-pad Panel","authors":"Moe Sasaki, Masaki Inamura","doi":"10.5220/0005992501060111","DOIUrl":"https://doi.org/10.5220/0005992501060111","url":null,"abstract":"Frequencies of user authentication increase and spread of smartphone and tablet advances rapidly in recent years. However, it is a great challenge that password authentication is easy to be attacked and must be solved. We assume authentication, which use touch panel and handwriting as an authentication element in this paper. As far as we know, there have few papers about generating a digital data from handwriting. Therefore, our contribution of this paper is to define handwriting characteristics of a letter that can convert into a digital data and evaluate possibility of the conversion.","PeriodicalId":190970,"journal":{"name":"International Conference on e-Business","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123236150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Prevention of Location-Spoofing - A Survey on Different Methods to Prevent the Manipulation of Locating-technologies","authors":"M. Decker","doi":"10.5220/0002232601090114","DOIUrl":"https://doi.org/10.5220/0002232601090114","url":null,"abstract":"There are many different locating technologies to determine a mobile device’s current position. Examples for such technologies are the satellite-based Global Positioning System (GPS), the cell-ID method in mobile phone networks or WLAN-based approaches. These technologies are the enabler of so called Lo tion-based Services(LBS): LBS are services to be used with mobile handheld-computers like PDAs or smartphones that evaluate a mobile user’s position. When locating-technologies are discussed in the LBS community, the focus is often on the accuracy of the calculated location whereas the resistance to manipulation attempts by the possessor of the mobile device or by third-parties is almost never considered. But there are examples of LBS where users or external attackers might have an incentive to manipulate the locating system. This is termed as location spoofing . This article presents a survey of different technical approaches to prevent or at least to detect location spoofing.","PeriodicalId":190970,"journal":{"name":"International Conference on e-Business","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129858190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}