Abstract: Today’s technology is heavily dependent on web applications. Web applications are being accepted by users at a very rapid pace. These have made our work efficient. These include webmail, online retail sale, online gaming, wikis, departure and arrival of trains and flights and list is very long. These are developed in different languages like PHP, Python, C#, ASP.NET and many more by using scripts such as HTML and JavaScript. Attackers develop tools and techniques to exploit web applications and legitimate websites. This has led to rise of web application security; which can be broadly classified into Declarative Security and Program Security. The most common attacks on the applications are by SQL Injection and XSS which give access to unauthorized users who totally damage or destroy the system. This paper presents a detailed literature description and analysis on Web Application Security, examples of attacks and steps to mitigate the vulnerabilities.
Abstract: Food mileage is one of the important issues concerning environmental sustainability. In this research we have utilized a prototype platform with iterative user-centered testing. With these findings we successfully demonstrate the use of the context of persuasive methods to influence users- attitudes towards the sustainable concept.
Abstract: Fuzzy fingerprint vault is a recently developed cryptographic construct based on the polynomial reconstruction problem to secure critical data with the fingerprint data. However, the previous researches are not applicable to the fingerprint having a few minutiae since they use a fixed degree of the polynomial without considering the number of fingerprint minutiae. To solve this problem, we use an adaptive degree of the polynomial considering the number of minutiae extracted from each user. Also, we apply multiple polynomials to avoid the possible degradation of the security of a simple solution(i.e., using a low-degree polynomial). Based on the experimental results, our method can make the possible attack difficult 2192 times more than using a low-degree polynomial as well as verify the users having a few minutiae.
Abstract: The burst noise is a kind of noises that are destructive
and frequently found in semiconductor devices and ICs, yet detecting
and removing the noise has proved challenging for IC designers or users. According to the properties of burst noise, a methodological
approach is presented (proposed) in the paper, by which the burst noise
can be analysed and detected in time domain. In this paper, principles
and properties of burst noise are expounded first, Afterwards,
feasibility (viable) of burst noise detection by means of wavelet
transform in the time domain is corroborated in the paper, and the multi-resolution characters of Gaussian noise, burst noise and blurred
burst noise are discussed in details by computer emulation. Furthermore, the practical method to decide parameters of wavelet
transform is acquired through a great deal of experiment and data statistics. The methodology may yield an expectation in a wide variety of applications.
Abstract: E-tailing websites are often perceived to be static, impersonal and distant. However, with the movement of the World Wide Web to Web 2.0 in recent years, these online websites have been found to display personalities akin to 'humanistic' qualities and project impressions much like its retailing counterpart i.e. salespeople. This paper examines the personality of e-tailing websites and their impact on consumers- initial trust towards the sites. A total of 239 Internet users participated in this field experiment study which utilized 6 online book retailers- websites that the participants had not previously visited before. Analysis revealed that out of four website personalities (sincerity, competence, excitement and sophistication) only sincerity and competence are able to exert an influence in building consumers- trust upon their first visit to the website. The implications of the findings are further elaborated in this paper.
Abstract: Privacy issues commonly discussed among
researchers, practitioners, and end-users in pervasive healthcare.
Pervasive healthcare systems are applications that can support
patient-s need anytime and anywhere. However, pervasive healthcare
raises privacy concerns since it can lead to situations where patients
may not be aware that their private information is being shared and
becomes vulnerable to threat. We have systematically analyzed the
privacy issues and present a summary in tabular form to show the
relationship among the issues. The six issues identified are medical
information misuse, prescription leakage, medical information
eavesdropping, social implications for the patient, patient difficulties
in managing privacy settings, and lack of support in designing
privacy-sensitive applications. We narrow down the issues and chose
to focus on the issue of 'lack of support in designing privacysensitive
applications' by proposing a privacy-sensitive architecture
specifically designed for pervasive healthcare monitoring systems.
Abstract: Managing the emergency situations at the Emergency
Staff requires a high co-operation between its members and their fast
decision making. For these purpose it is necessary to prepare Emergency Staff members adequately. The aim of this paper is to
describe the development of information support that focuses to
emergency staff processes and effective decisions. The information
support is based on the principles of process management, and
Process Framework for Emergency Management was used during the
development. The output is the information system that allows users
to simulate an emergency situation, including effective decision making. The system also evaluates the progress of the emergency
processes solving by quantitative and qualitative indicators. By using
the simulator, a higher quality education of specialists can be achieved. Therefore, negative impacts resulting from arising emergency situations can be directly reduced.
Abstract: With the development of Internet and databases application techniques, the demand that lots of databases in the Internet are permitted to remote query and access for authorized users becomes common, and the problem that how to protect the copyright of relational databases arises. This paper simply introduces the knowledge of cloud model firstly, includes cloud generators and similar cloud. And then combined with the property of the cloud, a method of protecting relational databases copyright with cloud watermark is proposed according to the idea of digital watermark and the property of relational databases. Meanwhile, the corresponding watermark algorithms such as cloud watermark embedding algorithm and detection algorithm are proposed. Then, some experiments are run and the results are analyzed to validate the correctness and feasibility of the watermark scheme. In the end, the foreground of watermarking relational database and its research direction are prospected.
Abstract: There is a real threat on the VIPs personal pages on
the Social Network Sites (SNS). The real threats to these pages is
violation of privacy and theft of identity through creating fake pages
that exploit their names and pictures to attract the victims and spread
of lies. In this paper, we propose a new secure architecture that
improves the trusting and finds an effective solution to reduce fake
pages and possibility of recognizing VIP pages on SNS. The
proposed architecture works as a third party that is added to
Facebook to provide the trust service to personal pages for VIPs.
Through this mechanism, it works to ensure the real identity of the
applicant through the electronic authentication of personal
information by storing this information within content of their
website. As a result, the significance of the proposed architecture is
that it secures and provides trust to the VIPs personal pages.
Furthermore, it can help to discover fake page, protect the privacy,
reduce crimes of personality-theft, and increase the sense of trust and
satisfaction by friends and admirers in interacting with SNS.
Abstract: Latvia is the fourth in the world by means of broadband internet speed. The total number of internet users in Latvia exceeds 70% of its population. The number of active mailboxes of the local internet e-mail service Inbox.lv accounts for 68% of the population and 97.6% of the total number of internet users. The Latvian portal Draugiem.lv is a phenomenon of social media, because 58.4 % of the population and 83.5% of internet users use it. A majority of Latvian company profiles are available on social networks, the most popular being Twitter.com. These and other parameters prove the fact consumers and companies are actively using the Internet.
However, after the authors in a number of studies analyzed how enterprises are employing the e-environment, namely, e-environment tools, they arrived to the conclusions that are not as flattering as the aforementioned statistics. There is an obvious contradiction between the statistical data and the actual studies. As a result, the authors have posed a question: Why are entrepreneurs resistant to e-tools? In order to answer this question, the authors have addressed the Technology Acceptance Model (TAM). The authors analyzed each phase and determined several factors affecting the use of e-environment, reaching the main conclusion that entrepreneurs do not have a sufficient level of e-literacy (digital literacy).
The authors employ well-established quantitative and qualitative methods of research: grouping, analysis, statistic method, factor analysis in SPSS 20 environment etc.
The theoretical and methodological background of the research is formed by, scientific researches and publications, that from the mass media and professional literature, statistical information from legal institutions as well as information collected by the author during the survey.
Abstract: The need for multilingual communication in Japan has
increased due to an increase in the number of foreigners in the
country. When people communicate in their nonnative language,
the differences in language prevent mutual understanding among
the communicating individuals. In the medical field, communication
between the hospital staff and patients is a serious problem. Currently,
medical translators accompany patients to medical care facilities, and
the demand for medical translators is increasing. However, medical
translators cannot necessarily provide support, especially in cases in
which round-the-clock support is required or in case of emergencies.
The medical field has high expectations from information technology.
Hence, a system that supports accurate multilingual communication is
required. Despite recent advances in machine translation technology,
it is very difficult to obtain highly accurate translations. We have
developed a support system called M3 for multilingual medical
reception. M3 provides support functions that aid foreign patients in
the following respects: conversation, questionnaires, reception procedures,
and hospital navigation; it also has a Q&A function. Users
can operate M3 using a touch screen and receive text-based support.
In addition, M3 uses accurate translation tools called parallel texts
to facilitate reliable communication through conversations between
the hospital staff and the patients. However, if there is no parallel
text that expresses what users want to communicate, the users cannot
communicate. In this study, we have developed a circulating support
environment for multilingual medical communication using parallel
texts. The proposed environment can circulate necessary parallel texts
through the following procedure: (1) a user provides feedback about
the necessary parallel texts, following which (2) these parallel texts
are created and evaluated.
Abstract: Due to the mobility of users, many information
systems are now developed with the capability of supporting retrieval
of information from both static and mobile users. Hence, the
amount, content and format of the information retrieved will need to
be tailored according to the device and the user who requested for it.
Thus, this paper presents a framework for the design and
implementation of such a system, which is to be developed for
communicating final examination related information to the
academic community at one university in Malaysia. The concept of
personalization will be implemented in the system so that only highly
relevant information will be delivered to the users. The
personalization concept used will be based on user profiling as well
as context. The system in its final state will be accessible through cell
phones as well as intranet connected personal computers.
Abstract: The network traffic data provided for the design of
intrusion detection always are large with ineffective information and
enclose limited and ambiguous information about users- activities.
We study the problems and propose a two phases approach in our
intrusion detection design. In the first phase, we develop a
correlation-based feature selection algorithm to remove the worthless
information from the original high dimensional database. Next, we
design an intrusion detection method to solve the problems of
uncertainty caused by limited and ambiguous information. In the
experiments, we choose six UCI databases and DARPA KDD99
intrusion detection data set as our evaluation tools. Empirical studies
indicate that our feature selection algorithm is capable of reducing the
size of data set. Our intrusion detection method achieves a better
performance than those of participating intrusion detectors.
Abstract: This study analyzes on the Social Network Game
(SNG), ANIPANG, in order to discover its unique fun elements, so
that suggest new methodologies for development of SNGs. ANIPANG
is the most popular SNG in the South Korea on 2012. Recently, the
game industry is paying close attention to mobile-based SNGs due to
the rapid prevalence of smart-phones and social network services.
However, SNGs are not online games simply. Although the fun of
most online games is the victory through competition with other
players or the game system, the fun of SNG is the communication
through the collaboration with other players. Thus, features of users
and environments of game should be considered for the game industry
and for the fun of SNG to users.
Abstract: With the proliferation of World Wide Web,
development of web-based technologies and the growth in web
content, the structure of a website becomes more complex and web
navigation becomes a critical issue to both web designers and users.
In this paper we define the content and web pages as two important
and influential factors in website navigation and paraphrase the
enhancement in the website navigation as making some useful
changes in the link structure of the website based on the
aforementioned factors. Then we suggest a new method for
proposing the changes using fuzzy approach to optimize the website
architecture. Applying the proposed method to a real case of Iranian
Civil Aviation Organization (CAO) website, we discuss the results of
the novel approach at the final section.
Abstract: Interactive push VOD system is a new kind of system
that incorporates push technology and interactive technique. It can
push movies to users at high speeds at off-peak hours for optimal
network usage so as to save bandwidth. This paper presents effective
software-based solution for processing mass downstream data at
terminals of interactive push VOD system, where the service can
download movie according to a viewer-s selection. The downstream
data is divided into two catalogs: (1) the carousel data delivered
according to DSM-CC protocol; (2) IP data delivered according to
Euro-DOCSIS protocol. In order to accelerate download speed and
reduce data loss rate at terminals, this software strategy introduces
caching, multi-thread and resuming mechanisms. The experiments
demonstrate advantages of the software-based solution.
Abstract: In this paper we investigate how wide-ranging
organizational support and the more specific form of support,
namely management support, may influence on tourism workers
satisfaction with a cash transaction system. The IS continuance
theory, proposed by Bhattacherjee in 2001, is utilized as a
theoretical framework. This implies that both perceived usefulness
and ease of use is included in the research model, in addition to
organizational and management support. The sample consists of
500 workers from 10 cruise and tourist ferries in Scandinavia that
use a cash transaction system to perform their work tasks. Using
structural equation modelling, results indicate that organizational
support and ease of use perceptions is critical for the users- level of
satisfaction with the cash transaction system.The findings have
implications for business managers and IS practitioners that want
to increase the quality of IT-based business processes within the
tourism industry.
Abstract: The advancement of smartphones, wireless
networking and Near Field Communication (NFC) technology have
opened up a new approach to indoor navigation. Although NFC
technology has been used to support electronic commerce, access
control, and ticketing, there is a lack of research work on building
NFC-based indoor navigation system for smartphone users. This
paper presents an indoor interactive navigation system (named
I2Navi) based on NFC technology for users to navigate within a
building with ease using their smartphones. The I2Navi system has
been implemented at the Faculty of Engineering (FOE), Multimedia
University (MMU) to enable students, parents, visitors who own
NFC-enabled Android smartphones to navigate themselves within the
faculty. An evaluation is carried out and the results show positive
response to the proposed indoor navigation system using NFC and
smartphone technologies.
Abstract: The cyberspace is an instrument through which
internet users could get new experiences. It could contribute to foster
one-s own growth, widening cognitive, creative and communicative
abilities and promoting relationships. In the cyberspace, in fact, it is
possible to create virtual learning communities where internet users
improve their interpersonal sphere, knowledge and skills. The main
element of e-learning is the establishment of online relationships, that
are often collaborative.
Abstract: A new approach for timestamp ordering problem in
serializable schedules is presented. Since the number of users using
databases is increasing rapidly, the accuracy and needing high
throughput are main topics in database area. Strict 2PL does not
allow all possible serializable schedules and so does not result high
throughput. The main advantages of the approach are the ability to
enforce the execution of transaction to be recoverable and the high
achievable performance of concurrent execution in central databases.
Comparing to Strict 2PL, the general structure of the algorithm is
simple, free deadlock, and allows executing all possible serializable
schedules which results high throughput. Various examples which
include different orders of database operations are discussed.