Abstract: Reverse Logistics (RL) Network is considered as
complex and dynamic network that involves many stakeholders such
as: suppliers, manufactures, warehouse, retails and costumers, this
complexity is inherent in such process due to lack of perfect
knowledge or conflicting information. Ontologies on the other hand
can be considered as an approach to overcome the problem of sharing
knowledge and communication among the various reverse logistics
partners. In this paper we propose a semantic representation based on
hybrid architecture for building the Ontologies in ascendant way, this
method facilitates the semantic reconciliation between the
heterogeneous information systems that support reverse logistics
processes and product data.
Abstract: It is widely believed that mobile device is a promising technology for lending the opportunity for the third wave of electronic commerce. Mobile devices have changed the way companies do business. Many applications are under development or being incorporated into business processes. In this day, mobile applications are a vital component of any industry strategy.One of the greatest benefits of selling merchandise and providing services on a mobile application is that it widens a company’s customer base significantly.Mobile applications are accessible to interested customers across regional and international borders in different electronic business (e-business) area. But there is a dark side to this success story. The security risks associated with mobile devices and applications are very significant. This paper introduces a broad risk analysis for the various threats, vulnerabilities, and risks in mobile e-business applications and presents some important risk mitigation approaches. It reviews and compares two different frameworks for security assurance in mobile e-business applications. Based on the comparison, the paper suggests some recommendations for applications developers and business owners in mobile e-business application development process.
Abstract: Cloud computing (CC) has already gained overall
appreciation in research and practice. Whereas the willingness to
integrate cloud services in various IT environments is still unbroken,
the previous CC procurement processes run mostly in an unorganized
and non-standardized way. In practice, a sufficiently specific, yet
applicable business process for the important acquisition phase is
often lacking. And research does not appropriately remedy this
deficiency yet. Therefore, this paper introduces a field-tested
approach for CC procurement. Based on an extensive literature
review and augmented by expert interviews, we designed a model
that is validated and further refined through an in-depth real-life case
study. For the detailed process description, we apply the event-driven
process chain notation (EPC). The gained valuable insights into the
case study may help CC research to shift to a more socio-technical
area. For practice, next to giving useful organizational instructions
we will provide extended checklists and lessons learned.
Abstract: Locating Radio Controlled (RC) devices using their
unintended emissions has a great interest considering security
concerns. Weak nature of these emissions requires near field
localization approach since it is hard to detect these signals in far
field region of array. Instead of only angle estimation, near field
localization also requires range estimation of the source which makes
this method more complicated than far field models. Challenges of
locating such devices in a near field region and real time environment
are analyzed in this paper. An ESPRIT like near field localization
scheme is utilized for both angle and range estimation. 1-D search
with symmetric subarrays is provided. Two 7 element uniform linear
antenna arrays (ULA) are employed for locating RC source.
Experiment results of location estimation for one unintended emitting
walkie-talkie for different positions are given.
Abstract: E-learning has become an efficient and widespread
means of education at all levels of human activities. Statistics is no
exception. Unfortunately the main focus in statistics teaching is
usually paid to the substitution in formulas. Suitable websites can
simplify and automate calculations and provide more attention and
time to the basic principles of statistics, mathematization of real-life
situations and following interpretation of results. We now introduce
our own web-site for hypothesis testing. Its didactic aspects, the
technical possibilities of the individual tools, the experience of use
and the advantages or disadvantages are discussed in this paper. This
web-site is not a substitute for common statistical software but should
significantly improve the teaching of statistics at universities.