Pub Date : 2004-03-28DOI: 10.1109/EEE.2004.1287325
Tzong-Song Wang, L. Bright
The number of people who yet have either inferior service or no access needs to be a major concern to research and development leaders in engineering and e-commerce. The challenge for cyberspace leaders is to recognize and resolve the problem of the disenfranchised groups in the world who have not yet been touched by the concept of pervasive computing. The continued dominance of urban markets controls the direction of the free enterprise development of computing. Less populated and smaller markets in rural parts of the world go unserved or have to endure much slower, inferior, and non-competitive access. Professional engineering and education societies need systematic plans to increase potential for inclusiveness in the practical implementation of the pervasive computing vision. Innovation unheeded by major parts of society defeats the efforts of exceptional researchers. To further develop a pervasive cyberworld, technologists need to include groups that have been disenfranchised or disinterested.
{"title":"The challenge of exclusions in pervasive cyberspace","authors":"Tzong-Song Wang, L. Bright","doi":"10.1109/EEE.2004.1287325","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287325","url":null,"abstract":"The number of people who yet have either inferior service or no access needs to be a major concern to research and development leaders in engineering and e-commerce. The challenge for cyberspace leaders is to recognize and resolve the problem of the disenfranchised groups in the world who have not yet been touched by the concept of pervasive computing. The continued dominance of urban markets controls the direction of the free enterprise development of computing. Less populated and smaller markets in rural parts of the world go unserved or have to endure much slower, inferior, and non-competitive access. Professional engineering and education societies need systematic plans to increase potential for inclusiveness in the practical implementation of the pervasive computing vision. Innovation unheeded by major parts of society defeats the efforts of exceptional researchers. To further develop a pervasive cyberworld, technologists need to include groups that have been disenfranchised or disinterested.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126456138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-03-28DOI: 10.1109/EEE.2004.1287344
Shun-Tzu Tsai, Chao-Tung Yang
Decision tree is one of the frequently used methods in data mining for searching prediction information. Due to its characteristics which are suitable for parallelism, it has been widely adopted in high performance field and developed into various parallel decision tree algorithms to deal with huge data and complex computation. Following the development of other technology fields, grid computing is regarded as the extension of PC cluster and therefore it future research development is highly valued. This new wave of Internet application is the 3rd generation of Internet applications following the traditional Internet and Web application. We have presented a grid-based decision tree architecture, and hope it can be applied on both parallel and sequential algorithms for the decision tree applications. Also, based on the scope and model of data mining applied in grid environment as well as user equivalent perspective, grid roles can be categorized into three types. We are hoping that through these definitions, software developers can define clear system processes and differentiate the application scope for software applications. To fulfil our architecture, we first apply an existing parallel decision tree algorithm-SPRINT algorithm in the grid environment. The performance and differences in many other areas are compared using different sizes of dataset. The experimental results are used for future reference and further development.
{"title":"Decision tree construction for data mining on grid computing","authors":"Shun-Tzu Tsai, Chao-Tung Yang","doi":"10.1109/EEE.2004.1287344","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287344","url":null,"abstract":"Decision tree is one of the frequently used methods in data mining for searching prediction information. Due to its characteristics which are suitable for parallelism, it has been widely adopted in high performance field and developed into various parallel decision tree algorithms to deal with huge data and complex computation. Following the development of other technology fields, grid computing is regarded as the extension of PC cluster and therefore it future research development is highly valued. This new wave of Internet application is the 3rd generation of Internet applications following the traditional Internet and Web application. We have presented a grid-based decision tree architecture, and hope it can be applied on both parallel and sequential algorithms for the decision tree applications. Also, based on the scope and model of data mining applied in grid environment as well as user equivalent perspective, grid roles can be categorized into three types. We are hoping that through these definitions, software developers can define clear system processes and differentiate the application scope for software applications. To fulfil our architecture, we first apply an existing parallel decision tree algorithm-SPRINT algorithm in the grid environment. The performance and differences in many other areas are compared using different sizes of dataset. The experimental results are used for future reference and further development.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125281819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-03-28DOI: 10.1080/02533839.2005.9671033
Tzone-I Wang, K. Tsai, Ming-Che Lee
We present an e-service framework, designed in allusion to the service-on-demand concept, for the next generation service-based Internet applications. A two-layer cryptographic security infrastructure is laid in the e-service framework for secured services. By separating the service functionality from its operating medium, the framework successfully prevents many security hazards from happening. It also offers a most desirable benefit to both service providers and users. For service providers, deployment of a service is as easy as inserting a plug-n-play interface card and for service users, using a service is as easy as filling out a downloaded form. The main goal of this framework is to offer a total solution for providing and using secured services easily instead of programming for services hardly.
{"title":"A two-layer cryptographic scheme for an e-service framework based on mobile agents","authors":"Tzone-I Wang, K. Tsai, Ming-Che Lee","doi":"10.1080/02533839.2005.9671033","DOIUrl":"https://doi.org/10.1080/02533839.2005.9671033","url":null,"abstract":"We present an e-service framework, designed in allusion to the service-on-demand concept, for the next generation service-based Internet applications. A two-layer cryptographic security infrastructure is laid in the e-service framework for secured services. By separating the service functionality from its operating medium, the framework successfully prevents many security hazards from happening. It also offers a most desirable benefit to both service providers and users. For service providers, deployment of a service is as easy as inserting a plug-n-play interface card and for service users, using a service is as easy as filling out a downloaded form. The main goal of this framework is to offer a total solution for providing and using secured services easily instead of programming for services hardly.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117039515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-03-28DOI: 10.1109/EEE.2004.1287348
Eric Jui-Lin Lu, Chin-Wei Chen
The maturity of wireless technology has led to an ever-increasing interest in mobile ad hoc networks (MANETs). Many applications are expected to be developed using MANETs. However, the connectivity among mobile hosts may change due to their mobility which results in frequent disconnections. Thus, data accessibility in MANETs is lower than that in traditional fixed networks. To ensure high data accessibility, most researches utilized replica allocation methods to improve data accessibility in MANETs. We propose a new replica allocation method for allocating replicas with high access frequencies on mobile ad hoc networks.
{"title":"An enhanced EDCG replica allocation method in ad hoc networks","authors":"Eric Jui-Lin Lu, Chin-Wei Chen","doi":"10.1109/EEE.2004.1287348","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287348","url":null,"abstract":"The maturity of wireless technology has led to an ever-increasing interest in mobile ad hoc networks (MANETs). Many applications are expected to be developed using MANETs. However, the connectivity among mobile hosts may change due to their mobility which results in frequent disconnections. Thus, data accessibility in MANETs is lower than that in traditional fixed networks. To ensure high data accessibility, most researches utilized replica allocation methods to improve data accessibility in MANETs. We propose a new replica allocation method for allocating replicas with high access frequencies on mobile ad hoc networks.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114699060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-03-28DOI: 10.1109/EEE.2004.1287291
Sakuna Vanichvisuttikul, C. Jungthirapanich
We discuss the potential of e-commerce development of the Thai rural people who are the products owners in the government project entitled OTOP (One Tambon or District, One Product) Project in Thailand. It is done by reviewing the awareness and readiness of the products owners who are the regional products champions from all over Thailand. This study also identifies the enabling factors, the limitations, and forecasts the future growth of e-commerce for OTOP Project. Additionally, it is beneficial to both parties; the government and the people in the rural areas, in solving the problem at the grass root level in Thailand. Five hundred products owners were selected from different products categories, 253 out of 500 responded with usable answers. The response rate was 50.6% which is higher than the expected rate for such surveys. The major problems of the existing OTOP production process and business operation are price, lack of funds for stock inventory and piracy of local wisdom. Awareness of e-commerce among these rural people is high but the level of acceptance for the knowledge and technology transferred are rather low, due to the digital divide in Thailand. Most of them are facing the same situations which are about seeking more distribution channels and enhancing more markets.
{"title":"The assessment of e-commerce awareness on highly valuable traditional products in Thailand","authors":"Sakuna Vanichvisuttikul, C. Jungthirapanich","doi":"10.1109/EEE.2004.1287291","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287291","url":null,"abstract":"We discuss the potential of e-commerce development of the Thai rural people who are the products owners in the government project entitled OTOP (One Tambon or District, One Product) Project in Thailand. It is done by reviewing the awareness and readiness of the products owners who are the regional products champions from all over Thailand. This study also identifies the enabling factors, the limitations, and forecasts the future growth of e-commerce for OTOP Project. Additionally, it is beneficial to both parties; the government and the people in the rural areas, in solving the problem at the grass root level in Thailand. Five hundred products owners were selected from different products categories, 253 out of 500 responded with usable answers. The response rate was 50.6% which is higher than the expected rate for such surveys. The major problems of the existing OTOP production process and business operation are price, lack of funds for stock inventory and piracy of local wisdom. Awareness of e-commerce among these rural people is high but the level of acceptance for the knowledge and technology transferred are rather low, due to the digital divide in Thailand. Most of them are facing the same situations which are about seeking more distribution channels and enhancing more markets.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126900304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-03-28DOI: 10.1109/EEE.2004.1287306
Chuang-Cheng Chiu, Chieh-Yuan Tsai
A Web services-based collaborative scheme for credit card fraud detection is proposed. With the proposed scheme, participant banks can share the knowledge about fraud patterns in a heterogeneous and distributed environment and further enhance their fraud detection capability and reduce financial loss.
{"title":"A Web services-based collaborative scheme for credit card fraud detection","authors":"Chuang-Cheng Chiu, Chieh-Yuan Tsai","doi":"10.1109/EEE.2004.1287306","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287306","url":null,"abstract":"A Web services-based collaborative scheme for credit card fraud detection is proposed. With the proposed scheme, participant banks can share the knowledge about fraud patterns in a heterogeneous and distributed environment and further enhance their fraud detection capability and reduce financial loss.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124490501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-03-28DOI: 10.1109/EEE.2004.1287283
Tao Yu, Kwei-Jay Lin
QoS (quality of service) support in Web services is an important issue. We present a QoS-capable Web service architecture, QCWS, by introducing a QoS broker module between service clients and providers (servers). The functions of the QoS broker module include collecting QoS information about servers, making selection decisions for clients, and negotiating with servers to get QoS commitments. We propose two resource allocation algorithms (HQ and RQ) used by QoS broker when broker acts as the front-end of a server. The goals of algorithms are to maximize the server resource usage while minimizing the QoS instability for each client. The QoS performance and instability tradeoffs of both algorithms are studied by simulation.
{"title":"The design of QoS broker algorithms for QoS-capable Web services","authors":"Tao Yu, Kwei-Jay Lin","doi":"10.1109/EEE.2004.1287283","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287283","url":null,"abstract":"QoS (quality of service) support in Web services is an important issue. We present a QoS-capable Web service architecture, QCWS, by introducing a QoS broker module between service clients and providers (servers). The functions of the QoS broker module include collecting QoS information about servers, making selection decisions for clients, and negotiating with servers to get QoS commitments. We propose two resource allocation algorithms (HQ and RQ) used by QoS broker when broker acts as the front-end of a server. The goals of algorithms are to maximize the server resource usage while minimizing the QoS instability for each client. The QoS performance and instability tradeoffs of both algorithms are studied by simulation.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128923140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-03-28DOI: 10.1109/EEE.2004.1287317
Shu-Chin Wang, K. Yan, C. Wei
Internet brings us convenient communication and changes many aspects of existing businesses and generated new companies with new business models, business opportunity. In order to achieve a sustainable competitive advantage, enterprises must first understand then please their customers. To satisfy customer needs, enterprises have to reach personalized and interaction channels. We proposed electronic ticket (eTickets), self-organization map (SOM) and decision tree arrive at personalized mobile advertising recommend mechanism. All of these technological processes mainly aim at promoting the products and enhancing customer loyalty as well as providing appropriate personalized mobile advertising for more profit to achieve win-win result.
{"title":"Mobile target advertising by combining self-organization map and decision tree","authors":"Shu-Chin Wang, K. Yan, C. Wei","doi":"10.1109/EEE.2004.1287317","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287317","url":null,"abstract":"Internet brings us convenient communication and changes many aspects of existing businesses and generated new companies with new business models, business opportunity. In order to achieve a sustainable competitive advantage, enterprises must first understand then please their customers. To satisfy customer needs, enterprises have to reach personalized and interaction channels. We proposed electronic ticket (eTickets), self-organization map (SOM) and decision tree arrive at personalized mobile advertising recommend mechanism. All of these technological processes mainly aim at promoting the products and enhancing customer loyalty as well as providing appropriate personalized mobile advertising for more profit to achieve win-win result.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"478 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123056248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-03-28DOI: 10.1109/EEE.2004.1287345
Chao-Tung Yang, Yu-Lun Kuo, Chuan-Lin Lai
The popular technologies, Internet computing and grid technologies promise to change the way we tackle complex problems. They enable large-scale aggregation and sharing of computational, data and other resources across institutional boundaries. And harnessing these new technologies effectively transforms scientific disciplines ranging from high-energy physics to the life sciences. The computational analysis of biological sequences is a kind of computation driven science. Cause the biology data growing quickly and these databases are heterogeneous. We can use the grid system sharing and integrating the heterogeneous biology database. As we know, bioinformatics tools can speed up analysis the large-scale sequence data, especially about sequence alignment and analysis. The FASTA is a tool for aligning multiple protein or nucleotide sequences. These two bioinformatics software, which we used is a distributed and parallel version. The software uses a message-passing library called MPI (message passing interface) and runs on distributed workstation clusters as well as on traditional parallel computers. A grid computing environment is proposed and constructed on multiple Linux PC clusters by using globus toolkit (GT) and SUN grid engine (SGE). The experimental results and performances of the bioinformatics tool using on grid system are also presented.
{"title":"Design and implementation of a computational grid for bioinformatics","authors":"Chao-Tung Yang, Yu-Lun Kuo, Chuan-Lin Lai","doi":"10.1109/EEE.2004.1287345","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287345","url":null,"abstract":"The popular technologies, Internet computing and grid technologies promise to change the way we tackle complex problems. They enable large-scale aggregation and sharing of computational, data and other resources across institutional boundaries. And harnessing these new technologies effectively transforms scientific disciplines ranging from high-energy physics to the life sciences. The computational analysis of biological sequences is a kind of computation driven science. Cause the biology data growing quickly and these databases are heterogeneous. We can use the grid system sharing and integrating the heterogeneous biology database. As we know, bioinformatics tools can speed up analysis the large-scale sequence data, especially about sequence alignment and analysis. The FASTA is a tool for aligning multiple protein or nucleotide sequences. These two bioinformatics software, which we used is a distributed and parallel version. The software uses a message-passing library called MPI (message passing interface) and runs on distributed workstation clusters as well as on traditional parallel computers. A grid computing environment is proposed and constructed on multiple Linux PC clusters by using globus toolkit (GT) and SUN grid engine (SGE). The experimental results and performances of the bioinformatics tool using on grid system are also presented.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125464695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-03-28DOI: 10.1109/EEE.2004.1287302
T. Pham
We present a quantitative approach to using e-commerce data to measure, monitor, and control the performance of a supply chain. The performance is measured in terms of the turn-around time for a business transaction. This performance is monitored and correlated to a set of parameters so that the resulting mathematical relation is used as a model to design control measures to bring the performance to a desirable level. A computational algorithm is presented in the modeling process, and design of control measures is derived based on this model.
{"title":"Quantitative approach to using e-commerce data to monitor and control the performance of a supply chain","authors":"T. Pham","doi":"10.1109/EEE.2004.1287302","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287302","url":null,"abstract":"We present a quantitative approach to using e-commerce data to measure, monitor, and control the performance of a supply chain. The performance is measured in terms of the turn-around time for a business transaction. This performance is monitored and correlated to a set of parameters so that the resulting mathematical relation is used as a model to design control measures to bring the performance to a desirable level. A computational algorithm is presented in the modeling process, and design of control measures is derived based on this model.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127853572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}