{"title":"Multi-stage Layout Optimization for Reverse Logistics Network of Rural E-Commerce under B2C Mode: A Case Study of E-Commerce Enterprises on 3C Products","authors":"Feng Cao, Jianquan Guo, Chengji Liang","doi":"10.1109/ICEBE.2016.056","DOIUrl":"https://doi.org/10.1109/ICEBE.2016.056","url":null,"abstract":"The reverse logistics network of rural E-commerce under B2C mode is optimized by the multi-stage optimization model, which can solve the return and recycling problems of online-shopping products. The minimum of network cost and the maximum of customer satisfaction are taken as the objective function. Then the feasibility of optimization model is validated by applying a two-phase heuristic algorithm nesting GA with a calculation example. The results reveal that the multi-stage model not only reduces the uncertain risk of the system, but optimizes the input of different resources during the whole operation process. This study could provide a reference for the design of the reverse logistics network on online-shopping products, especially for that of rural E-commerce. And proper use of proposed process could help E-commerce enterprise manage the returning and recycling flow of online-shopping products effectively.","PeriodicalId":305614,"journal":{"name":"2016 IEEE 13th International Conference on e-Business Engineering (ICEBE)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128734001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Differential-Privacy-Based Citizen Privacy Preservation in E-Government Applications","authors":"Yajuan Shi, Chunhui Piao, Xiao Pan","doi":"10.1109/ICEBE.2016.035","DOIUrl":"https://doi.org/10.1109/ICEBE.2016.035","url":null,"abstract":"In the era of big data, opening of the information in e-government applications and sharing of the information resources among government departments have become the requirements of the times, while how to protect the privacy of citizens has become one of the focus issues of the government and public. To prevent the disclosure or abuse of the citizens' privacy information, the citizens' privacy needs to be preserved in the process of information opening and sharing. However, most of the existing privacy preserving models cannot to be used to resist attacks with continuously growing background knowledge. This paper presents the method of applying differential privacy to protect the citizens' privacy information. By generalizing the citizens' sensitive information, the anonymity sets satisfying (K, L)-anonymity model are constructed, then differential method is used to add Laplace noise in the anonymity sets. Thus the citizen's privacy information can be protected even if the attacker gets strong background knowledge. Because the grouped information reduces the sensitivity of the query, the availability of citizens' information after adding noise can be guaranteed. The steps and usefulness of the discussed privacy preservation method is illustrated by an example.","PeriodicalId":305614,"journal":{"name":"2016 IEEE 13th International Conference on e-Business Engineering (ICEBE)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117182796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Testing of AJAX-Based Web Applications Using Hierarchical State Model","authors":"Chien-Hung Liu, Chiachih Wu, Hsi-Min Chen","doi":"10.1109/ICEBE.2016.050","DOIUrl":"https://doi.org/10.1109/ICEBE.2016.050","url":null,"abstract":"As Ajax, a widely used web development technique, is able to dynamically construct the structures of DOM elements on the browser side, more and more executions of business logic have been shifted from back-end servers to front-end browsers. Moreover, by means of Ajax technique, updates of Web content can take place asynchronously in the background without requesting the whole web pages from servers so it gains the benefit from reducing the amount of network traffic between browsers and web servers. However, in term of web application testing, the existing approaches, adopting web-browsing paths as test cases, are failed to apply in such web applications. In this paper, we propose a test model for Ajax-based web applications based on a hierarchical state machine. The test model is established from observing the state changes of HTML element's attributes and the events that trigger the changes, and then transformed into state transition test trees. Finally, it generates corresponding test cases composed by triggered events to test the behavior of Ajax-based web applications.","PeriodicalId":305614,"journal":{"name":"2016 IEEE 13th International Conference on e-Business Engineering (ICEBE)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116258537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ping Wang, K. Chao, Hsiao-Chung Lin, Wen-Hui Lin, Chi-Chun Lo
{"title":"An Efficient Flow Control Approach for SDN-Based Network Threat Detection and Migration Using Support Vector Machine","authors":"Ping Wang, K. Chao, Hsiao-Chung Lin, Wen-Hui Lin, Chi-Chun Lo","doi":"10.1109/ICEBE.2016.020","DOIUrl":"https://doi.org/10.1109/ICEBE.2016.020","url":null,"abstract":"Most existing approaches for solving the network threat problems focus on the specific security mechanisms, for example, network intrusion detection system (NIDS) detection, firewall configuration, rather than on flow management approaches to defend network threats with an SDN (Software Defined Networking) architecture. Accordingly, this study proposes an improved behaviour-based SVM (support vector machine) with learning algorithm for use in the security monitoring system (SMS) to categorize network threats for network intrusion detection system. The model also adopted the ID3 decision tree theory to outrank raw features and determine the most qualified features to train support vector classifier (SVC) considering the overall detection precision rate of experiments which speeds up the learning of normal and intrusive patterns and and increases the accuracy of detecting intrusion. By using sFlow collector and analyzer associated with sFlow-RT toolset, the experimental results proved that the SMS enables a defender to classify the network threats with defence strategies and defend network threats.","PeriodicalId":305614,"journal":{"name":"2016 IEEE 13th International Conference on e-Business Engineering (ICEBE)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126206067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study of Innovation Approach for Business Model in Internet Enterprises","authors":"Xiaoke Nan, Qu Wenfeng","doi":"10.1109/ICEBE.2016.037","DOIUrl":"https://doi.org/10.1109/ICEBE.2016.037","url":null,"abstract":"In face of the problems such as profit difficulty and oligopoly, the innovation of business model has become the indispensable choice of the Internet enterprises. Through review of the business model theory and features of Internet enterprises, this paper proposes that the business model in Internet enterprises is composed of four dimensions including value proposition, profit model, resource capability and isolating mechanism as well as eight elements. Innovation of business model can be realized through changing or regrouping the constituting elements. This paper also employs a case analysis of the business model innovation of Amazon and proposes the enlightenment and reference.","PeriodicalId":305614,"journal":{"name":"2016 IEEE 13th International Conference on e-Business Engineering (ICEBE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128111237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Pricing of Cloud Computing with Preferential Policies","authors":"Zhang Rui, Bingyong Tang","doi":"10.1109/ICEBE.2016.047","DOIUrl":"https://doi.org/10.1109/ICEBE.2016.047","url":null,"abstract":"At present, the studies of cloud computing pricing remain at a single period market, and the change of customer demand as well as carrier strategy has been neglected. In this paper, we discuss the dynamic pricing and marketing strategies of carriers in the two-stage market by adding the factor of discount, compare the pricing models of one-stage market and two-stage market, and analyze the effects of network effects, switching costs and transportation cost to the prices. The result shows that cloud computing carriers usually set a higher price in the first stage and then a lower price in the second stage, carriers set the prices for various types of customers on the basis of switching cost in the second stage of the market, cloud carriers can widen the gap with others and improve their revenue by improving the features of their services and products.","PeriodicalId":305614,"journal":{"name":"2016 IEEE 13th International Conference on e-Business Engineering (ICEBE)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121692272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Investigation into the Regular and Chaotic States of Microblogging Networks as Applied to Social Media Monitoring","authors":"A. Dmitriev, O. Tsukanova, S. Maltseva","doi":"10.1109/ICEBE.2016.057","DOIUrl":"https://doi.org/10.1109/ICEBE.2016.057","url":null,"abstract":"The present paper is devoted to the investigation into the evolutionary dynamics of social microblogging networks. Different network states are considered. Regular and chaotic states of networks are described. A new model of a social microblogging network as a point dissipative system is suggested. Dynamic variables of such system are represented by the variations of tweet/retweet number around the equilibrium values. It is pointed out, that the system is in a condition of an asymptotically stable equilibrium when the intensity values of an external information are small (the number of tweets eventually tends to its equilibrium value). So far as the intensity values of external information do not exceed the critical value, the stable (almost harmonic) oscillations of tweets take place in the system. If the intensity values of external information exceed the critical value, then the chaotic oscillations of tweets are to be observed. A case of Twitter network is examined.","PeriodicalId":305614,"journal":{"name":"2016 IEEE 13th International Conference on e-Business Engineering (ICEBE)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122055042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Placement Optimization Approach in Hybrid Cloud Based on Genetic Algorithm","authors":"Wissem Abbes, Zied Kechaou, A. Alimi","doi":"10.1109/ICEBE.2016.046","DOIUrl":"https://doi.org/10.1109/ICEBE.2016.046","url":null,"abstract":"With the evolution of cloud computing technology, companies develop their private cloud to deploy and run applications. A company can also combine public and private cloud services through the deployment of a hybrid cloud. Thus, if the company needs exceed the capacity of the private cloud, they can migrate to the public cloud. The deployment of new applications consists to choose the placement of some components in the private cloud and some others in the public cloud. Our objective is to minimize the costs caused by the applications deployment in the public cloud and communication costs between application of the private and public cloud. For this purpose, we have proposed a new service placement optimization approach based on genetic algorithm. The experimental results show that our approach outperforms the related works and seems to be promising in respect to optimal solution.","PeriodicalId":305614,"journal":{"name":"2016 IEEE 13th International Conference on e-Business Engineering (ICEBE)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124619498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rashedul Hassan, K. Markantonakis, Raja Naeem Akram
{"title":"Can You Call the Software in Your Device be Firmware?","authors":"Rashedul Hassan, K. Markantonakis, Raja Naeem Akram","doi":"10.1109/ICEBE.2016.040","DOIUrl":"https://doi.org/10.1109/ICEBE.2016.040","url":null,"abstract":"In addition to storing a plethora of code and functionality, devices also possess a certain set of data and commands, known as firmware. The ability of devices to perform specific tasks relies on the firmware. In order to understand the scope of firmware we conducted a qualitative analysis of its properties, functionalities and security. We examined the use of the terminology over a period of years and found that \"firmware\" is used in numerous situations in a range of contexts. In this paper, we propose a taxonomy of firmware to classify the field and understand it better.","PeriodicalId":305614,"journal":{"name":"2016 IEEE 13th International Conference on e-Business Engineering (ICEBE)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131164209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cost-Efficient Cooperative Sharing of a Complete Wi-Fi Signature Scheme for Indoor Localization in Shopping Malls","authors":"Min Zhang, Juntao Wang, Xiaotie Deng","doi":"10.1109/ICEBE.2016.041","DOIUrl":"https://doi.org/10.1109/ICEBE.2016.041","url":null,"abstract":"Wi-Fi-based indoor localization has drawn much attention since the last decade. However, the current Wi-Fi localization system highly depend on the demanding conditions of the environment, hindering its applications such as in shopping malls, a large, complex but profitable application scenario. To prompt the adoption of Wi-Fi localization system in shopping malls, we propose a coarse-grained Wi-Fi localization system constructed by the shops for mobile phone users at the shop level. The two objectives we pursue of the Wi-Fi localization system are the cost-efficiency, where only minimum number of access points (APs) are deployed, and incentives, where each shop is well-motivated to follow our scheme to install the APs. For the first objective, we propose a dynamic programming to compute the minimum Wi-Fi deployment scheme. For the second objective, we propose a valuation sharing scheme in cooperative game theory to balance the interest of each shop. Our results shed insight on how cost efficiency can be achieved for Wi-Fi localization system and on how to motivate agents to contribute to Wi-Fi localization system.","PeriodicalId":305614,"journal":{"name":"2016 IEEE 13th International Conference on e-Business Engineering (ICEBE)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116283559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}