SDIWC Digital Library
The aim of SDIWC digital library is to deliver a free full text access to published papers of SDIWC and other organizations. If you want to include the papers of your conference or journal, please contact us. The inclusion is Free.
The International Conference on E-Technologies and Business on the Web (EBW2013)
-
A Study on Diverse Learning Strategy Development of Industry-Oriented Electronic Instrument Skill and Verification of Its Results
Under a diverse teaching strategy, this study combined Situational learning and E-learning with Situationalbased E-learning. It collaborated with the industry for designing a “precision electronic ...Authors: Yea-Wen Kung, Yi-Jeng Huang, Nien-Tzu Hsieh
Year Published: 2013 | 1-5 | EBW2013 -
A Study on the Internet Addiction of the Junior High School Students
This article explore the status of New Taipei City junior high school students Internet Addiction. It also aims to analyze the data from the different background variables. These variables include: ...Authors: Su-Huei Chang, uoo-Chin Liu, Kuo-Hsin Lin
Year Published: 2013 | 6-10 | EBW2013 -
Virtualized Honeynet Intrusion Prevention System in Scada Systems
Nowadays, the medium of wars has changed dramatically from traditional wars to cyber wars. This shift has forced governments to invest more on their infrastructure and security solutions. This paper ...Authors: Kaveh Shaerpour, Ali Dehghantanha, Ramlan Mahmod
Year Published: 2013 | 11-15 | EBW2013 -
Opinion Strength Identification in Customer Review Summarizing System Using Association Rule Technique
The purpose of this research is to study opinion strength identification in customer review summarizing system in Thai language. We expect that opinion strength identification will help refining ...Authors: Parnicha Apisuwankun, Janjao Mongkolnavin
Year Published: 2013 | 16-21 | EBW2013 -
Detecting Emergency Events and Geo-Location Awareness from Twitter Streams
The rapidly increasing number of messages on twitter is quite interesting. Through twitter streaming, this paper is capable of delivering tweets for any keywords from clients all around the world or ...Authors: Walisa Romsaiyud
Year Published: 2013 | 22-27 | EBW2013 -
The Value of Business Intelligence Tools: Aligning Business Intelligence Governance with Corporate Governance
Software vendors have developed Business Intelligence (BI) tools to provide an in-depth view about an organisation’s customers, products and services. Use of BI tools by businesses has grown ...Authors: Srimannarayana Grandhi, Ritesh Chugh
Year Published: 2013 | 28-32 | EBW2013 -
A Conceptual Framework for Effectively Addressing the Digital Divide in Thai Primary Schools: A Case Study of Thailand
This research addresses the problems, causes, and solutions of the digital divide in the primary schools of Thailand to propose the conceptual framework for implementing digital divide. This ...Authors: Komes Porntipsatien, Prasert Kanthamanon, Suree Funilkul
Year Published: 2013 | 33-39 | EBW2013 -
The Effectiveness of Technology-Mediation on Learning Second Foreign Language - A Case Study of Vocational College Students
The aim of this study is to explore the impact of technology-mediation courses into Japanese learning effect. The subjects are vocational college students. The study used quasiexperimental design, ...Authors: Hsiu-Ching Shih
Year Published: 2013 | 40-43 | EBW2013 -
A Study on Internet Financial Reporting of Private University in Taiwan and USA: A Perspective from Financial Transparency
This article explore the contents and differences of internet financial reporting (IFR) of Taiwan and US’ private university by examining the university website. We also interview with the ...Authors: Huoo-Chin Liu, Su-Huei Chang
Year Published: 2013 | 44-51 | EBW2013 -
Integrated Architecture for Web Application Development Based on Spring Framework and Activiti Engine
With the prevalence of the Java web application development, there are a lot of frameworks to make the development of Java web application easier, most of them are based on MVC ...Authors: Xiujin Shi, Kuikui Liu, Yue Li
Year Published: 2013 | 52-56 | EBW2013 -
Research and Implementation of Secure Authentication in E-Commerce System Based on PKI and USB Key
With the development of computer science and information technology, E-Commerce has become a new model for business and it breaks traditional face-to-face transactions, people can do business through ...Authors: Xia Xiaoling, Chen Lu
Year Published: 2013 | 57-61 | EBW2013 -
A Web-Based Evaluation Framework for Supporting Novice and Expert Evaluators of Adaptive E-Learning Systems
Based upon the analysed results of an evidence based study conducted over a period of four years, it is clear that it is difficult to identify, for a given evaluation objective, the range of ...Authors: Catherine Mulwa, Vincent Wade
Year Published: 2013 | 62-67 | EBW2013 -
A Parallel AprioriAll-Based Sequential Pattern Mining Algorithm on MapReduce
AprioriAll is a well-known algorithm for sequential pattern mining, an important and very useful for identifying patterns that can be used for predicting behaviors and future trends to answer ...Authors: Patcharee Pianwittayasakun, Hongming Zhu, Xiaowen Yang, You Zhou
Year Published: 2013 | 68-73 | EBW2013 -
A Survey on Key Management of ZigBee Network
ZigBee is short distance, low complexity, and low power consumption wireless personal area network. As ZigBee has several applications in industry and healthcare, its security in the recent years has ...Authors: Zavosh Abdollahzadeh Davani, Azizah Abdul Manaf
Year Published: 2013 | 74-78 | EBW2013 -
Real-Time/Store-and-Forward Telemedicine with Patients' Data Protection by KP-ABE Encryption
In order to protect the privacy and confidentiality of individual medical information in telemedicine system, medical information should be encrypted. This can be realized by using a secure ...Authors: Yar-Ling Tan, Bok-Min Goi, Ryoichi Komiya
Year Published: 2013 | 79-84 | EBW2013 -
An SVD-based Transparent Watermarking Method
A new watermarking method on the basis of Singular Value Decomposition is proposed in this paper. The method is blind and modifies one of the orthonormal matrices of the decomposition of 4x4 block to ...Authors: Yevhen Zolotavkin, Martti Juhola
Year Published: 2013 | 85-90 | EBW2013 -
Assessment of Thai Certificate Authority Using Public Information
The Digital Certificate is required to secure electronic transactions. This research proposes an approach to assess Thai Certificate Authority using public information readily available to customers. ...Authors: Praphawadee Akvong, Yunyong Teng-amnuay
Year Published: 2013 | 91-94 | EBW2013 -
Detection of Cross-Site Scripting Using Web Proxy
This research proposes the detection of cross-site scripting in web application by using web proxy during runtime on a client side. Cross-site scripting is the top three security problems of web ...Authors: Worawitchayawit Worawitchayawit, Krerk Piromsopa
Year Published: 2013 | 95-98 | EBW2013 -
Tuning Performance of E-Business Applications Through Automatic Transformation of Persistent Database Structures
Performance of e-business applications strongly depends on internal implementations of persistent database structures and on effective algorithms processing these structures. Commercial database ...Authors: Janusz R. Getta
Year Published: 2013 | 99-105 | EBW2013 -
Study on Electronic Made to Measure
Electronic Made to Measure (eMTM) is a new mode of clothing production, mainly obtains body size data through the three-dimensional human body measure. The paper describes a new method to extract ...Authors: Xiujin Shi, Kuikui Liu, Jiajin Le
Year Published: 2013 | 106-109 | EBW2013 -
Mining Positive and Negative Association Rules
Mining association rules and especially the negative ones has received a lot of attention and has been proved to be useful in the real world. In this work, a set of algorithms for finding both ...Authors: John Tsiligaridis
Year Published: 2013 | 110-114 | EBW2013 -
Ontological Accounting Information Retrieval System
An accounting information system has improved conventional internal controls of companies computerized information systems. The objectives are to improve practices of managing, retrieving and ...Authors: Seung Hwan Kang
Year Published: 2013 | 115-119 | EBW2013 -
Semantic Documents - Example for CCTS-Based and RDFa-Annotated XHTML Documents
If heterogeneous information systems store documents to the ontology-based document repository, they have to provide ontology-based documents (i.e. semantic documents). In this paper, we present how ...Authors: Heli Lintula, Paula Leinonen, Virpi Hotti
Year Published: 2013 | 120-125 | EBW2013 -
A Study on the Development of the Road Statistics Information System (RSIS) for e-Government in Korea
Ministry of Land, Transport and Maritime Affairs (MLTM) in Korea developed an information system for the Yearbook of Road Statistics which is the records about the annual road extension statistics to ...Authors: Jae-Kyu Lim, Byung-Kon Kim, Seok-Won Lee, Jeong-Kyu Park
Year Published: 2013 | 126-129 | EBW2013 -
A Study on the Development of Road Repair and Maintenance Information System (RRMIS) for e-Government in Korea
Recently, great advances of Information Technology (IT) and IT industry have increased the demand for rapid and diverse statistical information. However, existing data gathering method for road ...Authors: Byung-Kon Kim, Jae-Kyu Lim, Sung-Hee Kim, Jeong-Kyu Park
Year Published: 2013 | 130-133 | EBW2013 -
Choosing Clouds for an Enterprise-Modeling and Evaluation
The development of cloud computing has advanced rapidly over the past few years. Benefitting from the dynamic characteristics of cloud computing, enterprises can purchase cloud services based on ...Authors: Ruay-Shiung Chang, Chuan-Yu Liu, Chih-Shan Liao
Year Published: 2013 | 134-139 | EBW2013 -
Transcoding Cache For Smart Phones
In this paper, we present Transcoding Cache (TC), a new way for caching data in smart phone application using web service. Transcoding Cache adapts the cache data for better utilization of limited ...Authors: Pitiphong Phongpattranont, Krerk Piromsopa
Year Published: 2013 | 140-144 | EBW2013 -
Organizational Commitment in Purchasing and Supply Chain Management - Building an Evaluation Instrument
The concept of organizational commitment has been studied extensively during the past decades, and remains one of the most challenging and studied concepts in organizational research. In purchasing ...Authors: Jarno Einolander, Hannu Vanharanta
Year Published: 2013 | 145-150 | EBW2013 -
Towards a Code Synchronization Mechanism Analysis and Design
This paper presents the first steps of an endeavor for defining and applying equalization among code artifacts. This equalization process is defined as code synchronization. First, meaning of the ...Authors: Ozan Aksoy
Year Published: 2013 | 151-155 | EBW2013 -
Self-Generated Information System
This paper suggests a basic system architecture for a selfgenerated software that builds itself as per its on-going user requirements. The challenge of this research and its recursive future work is ...Authors: Chadi Kallab
Year Published: 2013 | 156-163 | EBW2013 -
Intelligence Explorer (IE): An Agent-Based Tool for E-Learning
Although the theory of multiple intelligences was developed several years ago, unfortunately, many educational based societies and institutions did not utilize the beneficial outcomes generated by ...Authors: AbdulMutalib Masaud-Wahaihsi
Year Published: 2013 | 164-168 | EBW2013 -
Infographics: The New Communication Tools in Digital Age
Infographics were used to support the work of journalism back in 1980s. It may be used to accommodate newsletters, newspapers, magazines, and reports. Now the infographics have been applied for ...Authors: Waralak V. Siricharoen
Year Published: 2013 | 169-174 | EBW2013 -
Persuasion Techniques for Tourism Website Design
Previous studies argue that visual elements possess the power of persuasion and contribute in persuading the end users. However, not much attention has been given in assessing the implementation of ...Authors: Nurulhuda Ibrahim, Mohd Fairuz Shiratuddin, Kevin Wong
Year Published: 2013 | 175-180 | EBW2013 -
Web Support For E-Learning: A Constructivist Computing Approach
The radical implications of emerging web technology for education motivate a reappraisal of the conceptual framework that surrounds computing. Empirical Modelling (EM) has been developed as a way of ...Authors: Timothy Monks, Nicolas Pope, Richard Myers, Antony Harfield, Meurig Beynon, Hui Zhu
Year Published: 2013 | 181-188 | EBW2013 -
Supplier Selection Decision Support System: A Case Study in Malaysian Hypermarket
This paper attempt to classify the criteria in supplier selection, and to provide the decision maker with a systematic decision support system, based on a combination of multi criteria and ...Authors: Raja Nazim Bin Raja Abdullah, Saadiah Yahya, Muhammad Rozi Malim
Year Published: 2013 | 189-194 | EBW2013 -
An Application of An ebXML-Based System in Healthcare Supply Chain in Thailand
The supply chain operations in healthcare industry are one of the most complex systems to operate. To efficiently manage the supply chain in this industry, information technology (IT) plays a ...Authors: Ratapol Sangkasuk, Chayakrit Charoensiriwath
Year Published: 2013 | 195-200 | EBW2013 -
The Analogies Theory in the Design and Application of E-Learning Material
Analogy has been the basic capability for us human when we apply to solve daily problems that we face throughout our lives. In the field of education, it is also viewed as one of the effective ...Authors: Ching-Nan Lin, How-Gao Hsu
Year Published: 2013 | 201-205 | EBW2013 -
Towards Active Software Engineering Ontology
Due to the globalization of software development and for a number of business reasons, software companies have adopted the global software development approach that enables project team members to ...Authors: Udsanee Pakdeetrakulwong, Pornpit Wongthongtham
Year Published: 2013 | 206-211 | EBW2013 -
Factors Influencing the Success of Platform Centric Ecosystem Strategies: A Case Study of Google Android
The past decade has evidenced a rapid growth in the usage of mobile phones around the world. The increase in mobile phone usage has led to the emergence of new mobile phone software platforms that ...Authors: Karthik Jayaraman
Year Published: 2013 | 212-217 | EBW2013 -
Study on the Possibilities of Interpretation to Improve Customer Relationship in Factory Tour
In this century, market trend has been a shift of consumption to experience marketing. Not only the market trend changed but also customer’s lifestyle been influenced by information technology ...Authors: Takahiro Sugiyama, Teeda Sasipreeyajan
Year Published: 2013 | 218-222 | EBW2013 -
Performance Evaluation of Cloud Computing for Mobile Learning over Wireless Networks
Cloud computing is the newest technology which is very convenient for users as it provides limitless storage via network based upon pay-per-use. Besides it also provides other services such as ...Authors: Khaing Sandar Htun
Year Published: 2013 | 223-227 | EBW2013 -
PKI in B2C E-Commerce
General purpose (open) and application-specific (closed) PKIs are two main categories of PKI that support a variety of cryptographic operations for providing secure environment. SSL/TLS and SET are ...Authors: Pita Jarupunphol, Wipawan Buathong
Year Published: 2013 | 228-235 | EBW2013 -
Database Protection Security: ASCII Primary Key Record
In today's electronic world, information security has become one of the most critical issues facing companies. External and internal security threats continue to grow in intensity, threaten the daily ...Authors: Mohammad Ghatasheh, Zahraa Muhsen, Ayman Alnsour
Year Published: 2013 | 236-240 | EBW2013 -
The Development of a Digital Repository: Experimenting with EPrints at the University of the Thai Chamber of Commerce
A growing number of academic institutions are increasingly interested in collecting and preserving digital content for research, teaching, and learning at their institutions. Numerous digital ...Authors: Pajika Voravittayathorn, Panuchart Bunyakiati
Year Published: 2013 | 241-246 | EBW2013 -
Measuring the Adoption and Resistance of E-learning by Students
This paper presents an empirical study that proposes a modified technology acceptance model to explore students’ attitude toward an e-learning system. The research chose the “Wisdom Master Pro” ...Authors: Feng-Peng Cheng, Kai-Hsuan Wang, I-Chun Lin
Year Published: 2013 | 247-249 | EBW2013 -
Data Quality Comparison between Highly Integrated Single and Three Data Storage System Oriented Information Manufacturing System
Sources of the information manufacturing system can be integrated with the data storage system in different degrees. Lowly integrated information manufacturing system uses multiple data storage ...Authors: Mohammad Shamsul Islam, Markus Helfert
Year Published: 2013 | 250-257 | EBW2013 -
Developing a Platform for Mobile Learning Using mLearn
This paper presents preliminary findings of a research study surrounding the development of an integrated architecture for a mobile learning platform. The study builds on prior design specification ...Authors: Mohammed Samaka, John Impagliazzo
Year Published: 2013 | 258-262 | EBW2013 -
An Assessment of the Use of Online Arabic Language Tools in Knowledge Management among University Students
The globalization, the emerged technologies and the contemporary lifestyle rely on communication. Languages are the tools of communication and the English language becomes the common media between ...Authors: El-Zakhem Imad, Melki Antoine
Year Published: 2013 | 263-267 | EBW2013 -
Heuristic Algorithm of VRPTW Based on Single-Pass Multiple Vehicle Collaboration
This paper studies the vehicle routing and scheduling problem with time windows in the pickup and delivery service for customers via vehicles. After discussing the collaborative pattern of vehicles ...Authors: Zhengzheng Xu, Jiafu Tang
Year Published: 2013 | 268-273 | EBW2013 -
Comparative Study of Electronic Government Infrastructure of Nepal with SAARC Nations
Electronic Government Infrastructure (EGI) is a essential part of e-Government Implementation System, which is used to disseminate various services to the citizens. Infrastructure is a necessary ...Authors: Subarna Shakya, Purusottam Kharel
Year Published: 2013 | 274-279 | EBW2013 -
Use BuildAR to Help the Alzheimers Disease Patients
This paper seek to help the Alzheimer's disease Patients to remember the beautiful memories by use BuildAR Software during just show for the patients the picture and the software will explain when ...Authors: Nassir Jabir Al-Khafaji, Mohammed Adel Al-Shaher, Mohammed Jaber Al-Khafaji, Mohammed A. Ahmed Asmail
Year Published: 2013 | 280-284 | EBW2013 -
GEO GRID Platform for Integrated Earth Sensing
An Integrated Earth Sensing demands seamless access to large-scale geospatial data gathered by remote sensing and in-situ sensor network deployments. To that end, the Global Earth Observation (GEO) ...Authors: Sarawut Ninsawat, Yoshio Tanaka, Hirokazu Yamamoto, Sameer Tilak, Peter Arzberger
Year Published: 2013 | 285-290 | EBW2013 -
Sensor-Rocks: A framework to improve software management for sensor networks
Software Operations and Management (O&M), i.e., defining, configuring, and updating thousands of software components within a conventional data center is a well-understood issue [12]. Existing ...Authors: Timothy Telfer, Sameer Tilak, Philip Papadopoulos, and Luca Clementi
Year Published: 2013 | 291-296 | EBW2013