2019 IEEE 10th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), 2019
Development of web based data collection and resource management system is a time consuming, reso... more Development of web based data collection and resource management system is a time consuming, resource demanding process, as it contains multiple layers of back-end and front-end services. And the process is often prone to errors. Efforts have been made in research communities as well as in the software industry to automate this process. However there is no solution that produces a complete and ready-to-use system. In this paper we propose a novel approach to automate the development process with code generation and dynamic form rendering using the latest technology stacks available. By abstracting the data schema definition and configuration away from the actual implementation, code generation reduces development time dramatically, standardizes system architecture and is less prone to human errors. Our approach is also capable to generate a ready to use system including front-end and backend components.
Ubiquitous multimedia computing becomes a major focus in scientific research due to recent flouri... more Ubiquitous multimedia computing becomes a major focus in scientific research due to recent flourishing of wireless communication infrastructures such as 3G, WiMax and RFID. There have been many surveys were written based on various ubiquitous multimedia computing related topics. If we can find a way to dash out the latest development in this particular science and technology field, it would be valuable to scientist and researchers. However, it is a challenging task to promptly and efficiently penetrate information for elevating scholastic research efficiency in large volume of information. The goal of this paper is to help us comprehend the scope and major themes of ubiquitous multimedia computing research. Different perspectives and methods were introduced to analyze leading research theme in particular in ubiquitous computing field is proposed. Factor analysis, pathfinder network and context-based ontology techniques are presented to display research directions by clustering scien...
As broadband Internet access has become ubiquitously available, the thin client technology is now... more As broadband Internet access has become ubiquitously available, the thin client technology is now widely adopted. Unfortunately, the old saying “the same knife cuts bread and fingers” applies to the thin client technology perfectly. While it makes people’s life easier, malicious attackers are ever happier. Once an attacker compromises a victim’s computer and installs a remote controllable backdoor on it, the attacker can do virtually anything the victim can do on his own computer. As far as we know, there are no general solutions for detecting whether a system is remotely controlled or not. In this paper, we propose Physical Presence Verification (PPV), a test to ensure a system is controlled by a local user. If an application is considered critical, it can invoke a PPV test to ensure the user is locally present and prevent an attacker from performing mission-critical actions and accessing private information remotely. Our user studies indicate that PPV tests are effective, reliable...
International Journal of Software Engineering and Knowledge Engineering
The pre-built knowledge of traditional expert systems is only capable of limited responses to cha... more The pre-built knowledge of traditional expert systems is only capable of limited responses to changes in the operating environment. If the data input is imperfect, a traditional system may fail to reach any rational conclusions. In this paper, we introduce the concept of self-adaptability to the inference process of an expert system, and propose a model that is capable of handling unexpected user input effectively and efficiently. Such a system can formulate operational knowledge on the move for inference. With this self-adaptive capability, an expert system can reach useful conclusions, even when the input data is insufficient. The architecture of the proposed system encodes domain knowledge with semantic networks. It also defines four types of adaptation, namely, condition knowledge adaptation, operational knowledge adaptation, conclusion knowledge adaptation, and presentation adaptation, and focuses on how the first three contribute to the adaptive capability of the system. In ad...
Most reports have indicated the antioxidant capacity of quinoa seeds. However, the leaves of Quin... more Most reports have indicated the antioxidant capacity of quinoa seeds. However, the leaves of Quinoa (Chenopodium quinoa Willd.) are usually worthless and little known about their biological activities. In this study, the antioxidant and immunomodulatory potential of the quinoa leaf extracts were explored. The crude leaf extracts of quinoa were extracted using water, 50% ethanol or 95% ethanol as solvent, denoted WQL, 50% EQL and 95% EQL, respectively. The antioxidant activities of quinoa leaf extracts were assessed by the ability of 1,1-diphenyl-2-picrylhydrazyl (DPPH) scavenging and iron chelating. The total phenolic content was determined. Inhibition of nitric oxide (NO) production in the lipopolysaccharide (LPS)-induced murine macrophage RAW 264.7 cells was examined to gauge the anti-inflammatory activity. The 95% EQL showed a higher level of total phenolic content (569.5 mg GAE/g extract) and better DPPH scavenging activity. The WQL exhibited a better iron chelating capacity (28...
2019 IEEE 10th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), 2019
Development of web based data collection and resource management system is a time consuming, reso... more Development of web based data collection and resource management system is a time consuming, resource demanding process, as it contains multiple layers of back-end and front-end services. And the process is often prone to errors. Efforts have been made in research communities as well as in the software industry to automate this process. However there is no solution that produces a complete and ready-to-use system. In this paper we propose a novel approach to automate the development process with code generation and dynamic form rendering using the latest technology stacks available. By abstracting the data schema definition and configuration away from the actual implementation, code generation reduces development time dramatically, standardizes system architecture and is less prone to human errors. Our approach is also capable to generate a ready to use system including front-end and backend components.
Ubiquitous multimedia computing becomes a major focus in scientific research due to recent flouri... more Ubiquitous multimedia computing becomes a major focus in scientific research due to recent flourishing of wireless communication infrastructures such as 3G, WiMax and RFID. There have been many surveys were written based on various ubiquitous multimedia computing related topics. If we can find a way to dash out the latest development in this particular science and technology field, it would be valuable to scientist and researchers. However, it is a challenging task to promptly and efficiently penetrate information for elevating scholastic research efficiency in large volume of information. The goal of this paper is to help us comprehend the scope and major themes of ubiquitous multimedia computing research. Different perspectives and methods were introduced to analyze leading research theme in particular in ubiquitous computing field is proposed. Factor analysis, pathfinder network and context-based ontology techniques are presented to display research directions by clustering scien...
As broadband Internet access has become ubiquitously available, the thin client technology is now... more As broadband Internet access has become ubiquitously available, the thin client technology is now widely adopted. Unfortunately, the old saying “the same knife cuts bread and fingers” applies to the thin client technology perfectly. While it makes people’s life easier, malicious attackers are ever happier. Once an attacker compromises a victim’s computer and installs a remote controllable backdoor on it, the attacker can do virtually anything the victim can do on his own computer. As far as we know, there are no general solutions for detecting whether a system is remotely controlled or not. In this paper, we propose Physical Presence Verification (PPV), a test to ensure a system is controlled by a local user. If an application is considered critical, it can invoke a PPV test to ensure the user is locally present and prevent an attacker from performing mission-critical actions and accessing private information remotely. Our user studies indicate that PPV tests are effective, reliable...
International Journal of Software Engineering and Knowledge Engineering
The pre-built knowledge of traditional expert systems is only capable of limited responses to cha... more The pre-built knowledge of traditional expert systems is only capable of limited responses to changes in the operating environment. If the data input is imperfect, a traditional system may fail to reach any rational conclusions. In this paper, we introduce the concept of self-adaptability to the inference process of an expert system, and propose a model that is capable of handling unexpected user input effectively and efficiently. Such a system can formulate operational knowledge on the move for inference. With this self-adaptive capability, an expert system can reach useful conclusions, even when the input data is insufficient. The architecture of the proposed system encodes domain knowledge with semantic networks. It also defines four types of adaptation, namely, condition knowledge adaptation, operational knowledge adaptation, conclusion knowledge adaptation, and presentation adaptation, and focuses on how the first three contribute to the adaptive capability of the system. In ad...
Most reports have indicated the antioxidant capacity of quinoa seeds. However, the leaves of Quin... more Most reports have indicated the antioxidant capacity of quinoa seeds. However, the leaves of Quinoa (Chenopodium quinoa Willd.) are usually worthless and little known about their biological activities. In this study, the antioxidant and immunomodulatory potential of the quinoa leaf extracts were explored. The crude leaf extracts of quinoa were extracted using water, 50% ethanol or 95% ethanol as solvent, denoted WQL, 50% EQL and 95% EQL, respectively. The antioxidant activities of quinoa leaf extracts were assessed by the ability of 1,1-diphenyl-2-picrylhydrazyl (DPPH) scavenging and iron chelating. The total phenolic content was determined. Inhibition of nitric oxide (NO) production in the lipopolysaccharide (LPS)-induced murine macrophage RAW 264.7 cells was examined to gauge the anti-inflammatory activity. The 95% EQL showed a higher level of total phenolic content (569.5 mg GAE/g extract) and better DPPH scavenging activity. The WQL exhibited a better iron chelating capacity (28...
Uploads
Papers by Tsung Teng Chen