scispace - formally typeset
Search or ask a question

Showing papers by "Tainan University of Technology published in 2013"


Journal ArticleDOI
TL;DR: In this paper, the authors combined GrSCM and food and beverage management to develop green restaurant standards, and primarily adopts the Delphi Technique to develop the green standards of restaurant management.

205 citations


Journal ArticleDOI
24 Jul 2013-Sensors
TL;DR: It is pointed out that Xue et al.'s scheme cannot resist stolen-verifier, insider, off-line password guessing, smart card lost problem and many logged-in users' attacks and these security weaknesses make the scheme inapplicable to practical WSN applications.
Abstract: Wireless sensor networks (WSNs) can be quickly and randomly deployed in any harsh and unattended environment and only authorized users are allowed to access reliable sensor nodes in WSNs with the aid of gateways (GWNs). Secure authentication models among the users, the sensor nodes and GWN are important research issues for ensuring communication security and data privacy in WSNs. In 2013, Xue et al. proposed a temporal-credential-based mutual authentication and key agreement scheme for WSNs. However, in this paper, we point out that Xue et al.'s scheme cannot resist stolen-verifier, insider, off-line password guessing, smart card lost problem and many logged-in users' attacks and these security weaknesses make the scheme inapplicable to practical WSN applications. To tackle these problems, we suggest a simple countermeasure to prevent proposed attacks while the other merits of Xue et al.'s authentication scheme are left unchanged.

120 citations


Journal ArticleDOI
TL;DR: In this paper, the authors developed a career competency model by examining the relationships among career competencies and career success from a career development viewpoint and used the AMOS statistical software package to perform structural equation modeling (SEM) for analysis.
Abstract: Purpose – This study aimed to focus on developing a career competency model by examining the relationships among career competencies and career success from a career development viewpoint Design/methodology/approach – This study adopted questionnaire survey to collect data from a sample of 277 respondents at 36 international tourist hotels and used the AMOS statistical software package to perform structural equation modeling (SEM) for analysis Findings – The results showed that career competency model is a multifaceted construct comprising four competency dimensions that influence the career success of food and beverage (F&B) department employees in international tourist hotels In particular, the competencies related to “career adjustment and control” competency dimension were the most influential competencies for career success Originality/value – The career competencies detailed in this study are a potential reference for the planning of core or general education courses in the hospitality domain H

98 citations


Journal ArticleDOI
TL;DR: A scheme utilizing three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps, which is more efficient and secure than previously proposed schemes.
Abstract: In this paper, we propose a scheme utilizing three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps, which is more efficient and secure than previously proposed schemes. In order to enhance the efficiency and security, we use the extended chaotic maps to encrypt and decrypt the information transmitted by the user or the server. In addition, the proposed protocol provides user anonymity to guarantee the identity of users, which is transmitted in the insecure public network.

85 citations


Journal ArticleDOI
TL;DR: In this paper, a survey of Taiwanese hotel employees showed that ethical context was a significant predictor of job satisfaction and turnover intention and that work values and perceived organizational support moderate and mediate respectively the relationship between an ethical context and job responses.

63 citations


Journal ArticleDOI
TL;DR: It is believed that the appropriate application of natural bioactives or phytochemicals should be a supplementary and safe way to prevent carcinogenesis and/or to enhance the efficacy of cancer therapy.
Abstract: Natural bioactives or phytochemicals are generally referred to as the compounds that have specific biological activity in human. Studies have shown that natural phytochemicals derived from certain plants have the capability to prevent carcinogenesis. In this special issue, we collected numerous studies which provide novel evidence to support the opinion. For instance, [6]-gingerol prevents disassembly of cell junctions and activities of MMPs in invasive human pancreas cancer cells; butein inhibits angiogenesis of human endothelial progenitor cells; the anticancer effects of sterol fraction come from red algae porphyra dentata; zeaxanthin induces apoptosis in human uveal melanoma cells; and ocotillol enhanced the antitumor activity of doxorubicin. It is therefore believed that the appropriate application of natural bioactives or phytochemicals should be a supplementary and safe way to prevent carcinogenesis and/or to enhance the efficacy of cancer therapy. Shun-Fa Yang Chia-Jui Weng Gautam Sethi Dan-Ning Hu

62 citations


Journal ArticleDOI
TL;DR: A detailed literature review found that respiratory, cardiovascular and certain neurological presentations are warning signs of severe neonicotinoid intoxication, and the amounts and concentration are not useful guides for the management of intoxicated patients.
Abstract: Neonicotinoids are a new class of insecticides widely applied for crop protection. These insecticides act as agonists at nicotinic acetylcholine receptors, which cause insect paralysis and death. The high specificity for receptors in insects was considered to possess highly selective toxicity to insects and relative sparing of mammals. However, an increasing number of cases of acute neonicotinoid poisoning have been reported in recent years. We reported a man who developed respiratory failure and shock after ingestion of neonicotinoid insecticide. A detailed literature review found that respiratory, cardiovascular and certain neurological presentations are warning signs of severe neonicotinoid intoxication. The amounts of ingested neonicotinoid insecticide and the plasma neonicotinoid concentration are not useful guides for the management of intoxicated patients. Supportive treatment and decontamination are the practical methods for the management of all neonicotinoid-poisoned patients.

58 citations


Journal ArticleDOI
01 Jan 2013-Displays
TL;DR: It was discovered that text direction, screen size, and character size all produced an effect on search time, and the small character size of the text was the main cause of visual fatigue.

53 citations


Journal ArticleDOI
TL;DR: Heat acclimation can be achieved with five sessions of high-intensity cycling exercise in the heat in trained athletes, and redistribution of cutaneous blood flow in the skin and exercising muscle, and enhanced cardiovascular adaptations provide the heat-acclimated athletes with the capability to increase their endurance time in the hot environment.
Abstract: Background To examine whether short-term, ie, five daily sessions, vigorous dynamic cycling exercise and heat exposure could achieve heat acclimation in trained athletes and the effect of heat acclimation on cutaneous blood flow in the active and nonactive limb Methods Fourteen male badminton and table tennis athletes (age = 196 ± 12 years) were randomized into a heat acclimation (EXP, n = 7) or nonheat acclimation (CON, n = 7) group For 5 consecutive days, the EXP group was trained using an upright leg cycle ergometer in a hot environment (384°C ± 04°C), while the CON group trained in a thermoneutral environment (241°C ± 03°C) For both groups, the training intensity and duration increased from a work rate of 10% below ventilatory threshold (VT) and 25 minutes per session on day 1, to 10% above VT and 45 minutes per session on day 5 Subjects performed two incremental leg cycle exercise tests to exhaustion at baseline and post-training in both hot and thermoneutral conditions Study outcome measurements include: maximum oxygen uptake (VO2max); exercise heart rate (HR); O2 pulse; exercise time to exhaustion (tmax); skin blood flow in the upper arm (SkBFa) and quadriceps (SkBFq); and mean skin (Tsk) Results The significant heat-acclimated outcome measurements obtained during high-intensity leg cycling exercise in the high ambient environment are: (1) 56%-100% reduction in cutaneous blood flow to the active limbs during leg cycling exercise; (2) 28% drop in cutaneous blood flow in nonactive limbs at peak work rate; (3) 5%-10% reduction in heart rate (HR); (4) 10% increase in maximal O2 pulse; and (5) 66% increase in tmax Conclusion Heat acclimation can be achieved with five sessions of high-intensity cycling exercise in the heat in trained athletes, and redistribution of cutaneous blood flow in the skin and exercising muscle, and enhanced cardiovascular adaptations provide the heat-acclimated athletes with the capability to increase their endurance time in the hot environment

46 citations


Journal ArticleDOI
TL;DR: An extended chaotic map and dynamic ID-based user authentication scheme against DoS attacks that is suitable for use in pervasive computing environments such as online financial authentication since it can ensure security while maintaining efficiency.
Abstract: As the era of pervasive and ubiquitous computing comes close, hand-held and smart devices are expected to achieve the dream of all time everywhere computing. Remote user authentication is important to verify the legitimacy of a login user over an insecure communication channel. Furthermore, in order to protect user privacy such that others cannot trace login users by eavesdropping the communication messages, several researchers proposed some dynamic ID-based remote user authentication schemes for providing user anonymity. On the other hand, the denial-of-service (DoS) attacks may make legal users unable to access a remote server by intercepting the authentication message which a login user sends to the remote server. It will make the latest user identities kept by login user and the remote server differ from each other. To ensure user anonymity and prevent such DoS attacks, we propose an extended chaotic map and dynamic ID-based user authentication scheme against DoS attacks. The proposed scheme is suitable for use in pervasive computing environments such as online financial authentication since it can ensure security while maintaining efficiency.

46 citations


Journal ArticleDOI
20 Dec 2013-Energies
TL;DR: In this article, the authors investigated the product yields and the solid product characteristics from corncob waste torrefaction at the temperatures of 250 °C and 300 °C for 1 h.
Abstract: Biomass is a promising energy source due to its abundant, carbon-fixing, and carbon-neutral properties. Torrefaction can be employed to improve the properties of biomass in an oxygen-free or nitrogen atmosphere. This study investigates the product yields and the solid product characteristics from corncob waste torrefaction at the temperatures of 250 °C and 300 °C for 1 h. Nitrogen, carbon dioxide, and a gas mixture of air and carbon dioxide are employed as the carrier gases. The solid product characteristics approach those of coal at the higher temperature, regardless of what the carrier gases are. The fixed carbon, higher heating value, and solid and energy yields using carbon dioxide as a carrier gas at 300 °C are close to those using nitrogen. The product safety and storage properties before and after torrefaction are revealed by the measurements of ignition temperature and hygroscopicity. A higher torrefaction temperature leads to a higher ignition temperature of treated biomass, except using the mixture of air and carbon dioxide as the carrier gas. Carbon dioxide is a better carrier gas than nitrogen for biomass torrefaction, from the storage and transportation points of view.

Journal ArticleDOI
TL;DR: The mechanisms underlying several select CA derivatives against invasion of human lung adenocarcinoma A549 cells were explored and it was revealed that caffeic acid (CAA), chlorogenic acid (CHA), and ferulic acid (FA) can inhibit phorbol-12-myristate-13-acetate (PMA)-stimulated invasion of A550 cells at a concentration of ≥100 μM.
Abstract: Patients with lung adenocarcinoma are often diagnosed with metastasizing symptoms and die of early and distal metastasis. Metastasis is made up of a cascade of interrelated and sequential steps, including cell adhesion, extracellular matrix degradation, cell movement, and invasion. Hence, substances carrying the ability to stop one of the metastasis-associated steps could be a potential candidate for preventing tumor cells from metastasizing and prolonging the life of cancer patients. Cinnamic acid (CA) was demonstrated to be such a candidate for human lung adenocarcinoma cells. Nevertheless, the effectiveness of CA derivatives on invasion of lung cancer cells is still unclear. The aims of this study were to explore the mechanisms underlying several select CA derivatives against invasion of human lung adenocarcinoma A549 cells. The results revealed that caffeic acid (CAA), chlorogenic acid (CHA), and ferulic acid (FA) can inhibit phorbol-12-myristate-13-acetate (PMA)-stimulated invasion of A549 cells at a...

Journal ArticleDOI
TL;DR: The purpose of this study was to investigate whether near‐continual transtympanic steroid perfusion is more effective than intermittent intratympanic steroids injection as a salvage therapy for idiopathic sudden sensorineural hearing loss.
Abstract: Objectives/Hypothesis The purpose of this study was to investigate whether near-continual transtympanic steroid perfusion is more effective than intermittent intratympanic steroid injection as a salvage therapy for idiopathic sudden sensorineural hearing loss. Study Design Case control study. Methods We designed a case-control study consisting of 60 patients with sudden sensorineural hearing loss who did not respond well to systemic steroid therapy. From November 2008 to October 2010, we prospectively enrolled subjects for the transtympanic steroid perfusion therapy. We retrospectively collected data from age- and sex-matched patients who had undergone intratympanic steroid injection between January 2003 and October 2008. The audiological results of the two groups were compared. Results The presalvage pure tone threshold was 65.4 ± 13.5 dB in the transtympanic steroid perfusion group. After the therapy, the hearing threshold was improved by an average of 15.0 ± 9.7 dB, and 53.3% of subjects had improved by 10 dB or more. The speech discrimination score was improved from 12.6% ± 7.0% to 54.4 ± 6.4%. In the intratympanic steroid injection group, the presalvage pure tone threshold was 68.8 ± 16.0 dB. After the therapy, the hearing threshold was improved by an average of 10.7 ± 9.8 dB, and 43.3% of subjects had improved by 10 dB or more. The speech discrimination score was improved from 13.3 ± 6.0% to 46.4 ± 12%. The degree of hearing improvement was significantly greater in the transtympanic group. Conclusions Both transtympanic steroid perfusion and intratympanic steroid injection can be used as salvage therapies for idiopathic sudden sensorineural hearing loss. Near-continual transtympanic steroid perfusions may provide better audiological results. Level of Evidence: 3b. Laryngoscope, 123:2264–2269, 2013

Journal ArticleDOI
TL;DR: In this article, the authors used fuzzy Delphi method (FDM) and fuzzy analytic hierarchy process (FAHP) to determine the criteria weight in a fashion design scheme evaluation system.
Abstract: Purpose – The purpose of this research is to determinate the criteria weight in a fashion design scheme evaluation system.Design/methodology/approach – The first stage is to use the fuzzy Delphi method (FDM) by fashion design experts of academia and industries for fashion design evaluation criteria. The second stage is based on the use of a fuzzy analytic hierarchy process (FAHP) to find the criteria weight. Finally, an empirical example is used to illustrate the procedure of obtaining the criteria weights for the evaluation of a fashion design scheme.Findings – The result shows that there are eight evaluation criteria to be obtained for fashion design scheme selection. The evaluation characteristic weights of theme and innovation score almost 90 percent (88.93 percent), the criteria weights of the first five, fashion forecast theme story, best‐seller modification, new idea and product position, score almost 80 percent (79.96 percent) and the criteria weights of the first two, fashion forecast and theme s...

Journal ArticleDOI
TL;DR: The weighted GDOP (WGDOP), instead of GDOP, is employed, to select measurement units so as to improve the accuracy of location and can reduce the computational complexity required for computing the matrix inversion.
Abstract: To achieve high accuracy in wireless positioning systems, both accurate measurements and good geometric relationship between the mobile device and the measurement units are required. Geometric dilution of precision (GDOP) is widely used as a criterion for selecting measurement units, since it represents the geometric effect on the relationship between measurement error and positioning determination error. In the calculation of GDOP value, the maximum volume method does not necessarily guarantee the selection of the optimal four measurement units with minimum GDOP. The conventional matrix inversion method for GDOP calculation demands a large amount of operation and causes high power consumption. To select the subset of the most appropriate location measurement units which give the minimum positioning error, we need to consider not only the GDOP effect but also the error statistics property. In this paper, we employ the weighted GDOP (WGDOP), instead of GDOP, to select measurement units so as to improve the accuracy of location. The handheld global positioning system (GPS) devices and mobile phones with GPS chips can merely provide limited calculation ability and power capacity. Therefore, it is very imperative to obtain WGDOP accurately and efficiently. This paper proposed two formations of WGDOP with less computation when four measurements are available for location purposes. The proposed formulae can reduce the computational complexity required for computing the matrix inversion. The simpler WGDOP formulae for both the 2D and the 3D location estimation, without inverting a matrix, can be applied not only to GPS but also to wireless sensor networks (WSN) and cellular communication systems. Furthermore, the proposed formulae are able to provide precise solution of WGDOP calculation without incurring any approximation error.

Journal ArticleDOI
TL;DR: The cis- and trans-form of CA should be a safe and potential agent to prevent lung tumor cells from metastasizing and disclosed the molecular mechanism underlying the anti-invasive activity of cis-CA andtrans-CA.

Journal ArticleDOI
TL;DR: In this paper, a three-dimensional Dirac-cone structure composed of tilted anisotropic Dirac cones around spirally located Dirac points is derived, which can be realized in rhombohedral graphite.
Abstract: We derive a three-dimensional Dirac-cone structure composed of tilted anisotropic Dirac cones around spirally located Dirac points. The Dirac points form a nodal spiral in momentum space due to accidental degeneracy, which can be realized in rhombohedral graphite. Under the interlayer electron hoppings, the Dirac cone varies in orientation and shape along this Dirac-point spiral, like a magic gyro precessing and deforming with time. The cone precession is governed by the hopping along the rhombohedral primitive unit vectors. In a perpendicular magnetic field, the electron orbits are related to different Landau level energies under the same quantization condition. The Landau subbands are thus characterized by a dispersion factor in addition to the zero-mode spectrum determined by the Dirac-point spiral.

Journal ArticleDOI
TL;DR: In this article, the authors used grey system theory to solve the problem of forecasting in the pilot run stage of the wafer-level packaging process, where the number of observations collected in the early stages of this process is usually too few to use with traditional forecasting techniques, and thus inaccurate results are obtained.
Abstract: The wafer-level packaging process is an important technology used in semiconductor manufacturing, and how to effectively control this manufacturing system is thus an important issue for packaging firms. One way to aid in this process is to use a forecasting tool. However, the number of observations collected in the early stages of this process is usually too few to use with traditional forecasting techniques, and thus inaccurate results are obtained. One potential solution to this problem is the use of grey system theory, with its feature of small dataset modeling. This study thus uses the AGM(1,1) grey model to solve the problem of forecasting in the pilot run stage of the packaging process. The experimental results show that the grey approach is an appropriate and effective forecasting tool for use with small datasets and that it can be applied to improve the wafer-level packaging process.

Journal ArticleDOI
13 Jun 2013-PLOS ONE
TL;DR: Antibiotic treatment that were effective to both Gram-positive cocci and Gram-negative bacilli are recommended for patients with limbs emerged in the water, which lasted for 3 weeks.
Abstract: OBJECTIVE The flood after a typhoon may lead to increase in patients with cellulitis of lower limbs. However, the microbiological features of these cases are rarely reported. We conducted a study of patients with lower extremity cellulitis after a typhoon followed in southern Taiwan to study the risk factors of cellulitis and the bacteriological features of the patients. METHODS We reviewed all the medical records of cellulitis at emergency departments of two teaching hospitals in southern Taiwan 30 days before and after the landing of Typhoon Morakot and collected data on the demographic and bacteriological characteristics. In addition, we evaluated the relationship between the daily number of patients and the rainfall in the Tainan area. RESULTS The number of cellulitis patients increased from 183 to 344 during the 30-day period after the typhoon. The number peaked in the third and fourth days and lasted for 3 weeks. The proportion of patients with water immersion of the affected limb was higher after the typhoon (6% vs. 37%, odds ratio [OR]: 9.0, 95% Confidence interval [CI]: 4.7-17.2). We found cultures from the infected limbs with immersion had more polymicrobial (73% vs. 26%, OR: 7.8, 95% CI: 3.2-19.2) and Gram-negative bacilli infection (86% vs. 34%, OR: 11.8, 95% CI: 4.1-34.5). CONCLUSIONS Flood arose from Typhoon Morakot caused increases in cellulitis patients, which lasted for 3 weeks. Antibiotic treatment that were effective to both Gram-positive cocci and Gram-negative bacilli are recommended for patients with limbs emerged in the water.

Journal ArticleDOI
TL;DR: In this paper, the authors examined the potential market for solar water heaters using the statistical data from end users and the 2010 Population and Housing Census, and showed that the current effective utilization rate of residential SWHs in terms of potential number of systems installed is estimated to be 11.8%.

Journal ArticleDOI
TL;DR: In this paper, the authors incorporated the concept of real option into a modified Harris-Todaro model to investigate the relationship between higher education and unemployment rates and found that the real option value of waiting to invest in graduate school education will decrease when the expected wage rate of labors with an undergraduate degree becomes relatively lower than that with a graduate degree.

Journal ArticleDOI
TL;DR: The approach is to employ the resilient backpropagation (Rprop), an artificial neural network learning algorithm, to compute weighted geometric dilution of precision (WGDOP), which represents the geometric effect on the relationship between measurement error and positioning error.
Abstract: This paper considers location methods that are applicable in global positioning systems (GPS), wireless sensor networks (WSN), and cellular communication systems. The approach is to employ the resilient backpropagation (Rprop), an artificial neural network learning algorithm, to compute weighted geometric dilution of precision (WGDOP), which represents the geometric effect on the relationship between measurement error and positioning error. The original four kinds of input-output mapping based on BPNN for GDOP calculation are extended to WGDOP based on Rprop. In addition, we propose two novel Rprop–based architectures to approximate WGDOP. To further reduce the complexity of our approach, the first is to select the serving BS and then combines it with three other measurements to estimate MS location. As such, the number of subsets is reduced greatly without compromising the location estimation accuracy. We further employed another Rprop that takes the higher precision MS locations of the first several minimum WGDOPs as the inputs into consideration to determine the final MS location estimation. This method can not only eliminate the poor geometry effects but also significantly improve the location accuracy.

Journal ArticleDOI
TL;DR: In this article, the authors used the overall reclassification of industries policy to explore the postannouncement performance from a behavioral finance perspective, suggesting a link between the presentation framing of industries and investors' behavior.
Abstract: This study utilizes the overall reclassification of industries policy to explore the postannouncement performance from a behavioral finance perspective. The presentation framing of the biotechnology and medical care industry is one with certainty prospects. This suggests that investors tend to buy more of these stocks because the government emphasizes the importance of this industry since 2002, which induces a significantly positive price effect. However, the reclassified eight electronic-related industries reveal presentation framings with uncertainty prospects. The heterogeneity of the high-technology industry thus leaves investors less tendency to hold these stocks and in turn a negative price effect. This paper shows some evidence and implication, suggesting a link between the presentation framing of industries and investors’ behavior.

Journal ArticleDOI
TL;DR: A feasible approach for converting ontological declarations into topological relations and geometric features, which would then assist users to retrieve relevant cases from the case library is proposed.
Abstract: This paper proposes a feasible approach named “Smart Spatial Ontology” for converting ontological declarations into topological relations and geometric features, which would then assist users to retrieve relevant cases from the case library. The purpose of this project is to extend the knowledge representing abilities of our design case library, which develops smart retrieval of spatial topology within plan drawings for assisting architectural design.

Journal ArticleDOI
TL;DR: In this article, the authors present an initial analysis of critical design elements to maximize economic welfare while implementing patent policy in developing and technology-importing economies, including patent policy objectives, limitations to patentable subject matter, the height of the inventive step, the privileges provided by patents; incentives, penalties and strategic gaming; and transparency issues particularly oversight, evaluation and audit.
Abstract: As intellectual property chapters are now regularly part of free trade agreements, countries need to have a clear view of what elements of a patent system will encourage domestic innovation and what elements will simply raise the cost of goods and services. Drawing on the range of empirical material available about patent systems this paper presents an initial analysis of critical design elements to maximize economic welfare while implementing patent policy in developing and technology-importing economies. Key issues considered are: patent policy objectives; limitations to patentable subject matter; the height of the inventive step; the privileges provided by patents; incentives, penalties and strategic gaming; and transparency issues particularly oversight, evaluation and audit. Development of a set of policy principles which align with maximizing national economic well-being goes some way to meeting the goals of the Development Agenda Group put forward in the context of WIPO's Committee on Development and Intellectual Property. Such a set of principles would also play a useful role in assessing the value of patents in trading for improved market access for goods and services thus assisting an evidence-based approach to trade negotiations.

Journal ArticleDOI
TL;DR: The purpose of VAT is to extend the knowledge representation ability of a design case library, and to provide a foundation for the development of adesignassistance tool performing the conversion and processing of semantic and geometric design information.
Abstract: This paper aims to develop a tool entitled “Visual Architectural Topology (VAT)” for encoding topological information within a case library. By applying previous research results, such as interactive spatial topology encoding and retrieval tools, VAT can annotate design objects and their topological information within unstructured information, such as pictures or plan drawings of a design case. By applying an ontology-based topological validation mechanism, VAT aims to establish a visual language for representing the “topological knowledge” of architectural design objects in a case library. The purpose of VAT is to extend the knowledge representation ability of a design case library, and to provide a foundation for the development of a designassistance tool performing the conversion and processing of semantic and geometric design information.

01 Jan 2013
TL;DR: An improved version of Chang and Lee's e-voting scheme based on the blind signature and the Diffie-Hellman key exchange methods for ensuring voter anonymity and performance efficiency is proposed that enhances the security of their e-Voting scheme.
Abstract: Voter anonymity and voting correctness are important issues for electronic voting mechanisms. Compared electronic voting with traditional 1elections, an electronic voter is able to cast his/her ballot through the Internet in any place and at any time if he/she can access the network. Therefore, convenience and mobility make electronic voting become more and more popular and electronic voting can be adopted in the real world with higher feasibility. Recently, Chang and Lee presented an electronic voting (e-voting) scheme based on the blind signature and the Diffie-Hellman key exchange methods for ensuring voter anonymity and performance efficiency. They claimed that numerous essential requirements of general electronic voting can be ensured in their e-voting scheme. Unfortunately, we found that Chang-Lee's e-voting scheme suffers from susceptibility to security attacks and some critical security requirements of their e-voting scheme may be compromised. To prevent security weaknesses of Chang-Lee's e-voting scheme, in this paper, an improved version on their e-voting scheme is proposed that not only keeps the merits of Chang-Lee's e-voting scheme but also enhances the security of their e-voting scheme.

Book ChapterDOI
13 Nov 2013
TL;DR: An improved scheme that not only inherits the advantages of Li’s password authentication scheme but also remedies the serious security weakness of not being able to withstand insider attack is proposed.
Abstract: Remote password authentication has been widely used in network systems and it aims to provide secure remote access control. In 2013, Li proposed a novel password authentication scheme based on elliptic curve cryptography and smart card [17]. However, we found that Li’s authentication scheme has a serious security problem in that all registered users’ sensitive passwords can be easily derived by the privileged-insider of remote server. Therefore, in this paper, we propose a slight modification on Li’s scheme to prevent the shortcomings. Our improved scheme not only inherits the advantages of Li’s password authentication scheme but also remedies the serious security weakness of not being able to withstand insider attack.

Journal ArticleDOI
TL;DR: In this article, the authors examined the threshold effects in the adjustment towards the long-run equilibrium relationship between housing prices and household credit in Taiwan and verified the potential for regime shifts in the dynamically adjusted relationship between the two variables and showed that the hidden effect of the limitations on housing and credit markets is to raise the thresholds of the self-adjustment mechanisms.
Abstract: Given the credit market imperfections in Taiwan, this paper examines the threshold effects in the adjustment towards the long-run equilibrium relationship between housing prices and household credit. The empirical findings verify the potential for regime shifts in the dynamically adjusted relationship between housing prices and household credit. Only when the benefits cover the cost of market imperfections, do housing and credit markets trigger convergence to their long-run equilibrium. The hidden effect of the limitations on housing and credit markets is to raise the thresholds of the self-adjustment mechanisms. As a result, economic boom-bust cycles will be more severe and increase the fragility of financial sectors.

Journal ArticleDOI
TL;DR: In this article, the authors applied the fictitious time integration method (FTIM) to investigate wave propagation over an arbitrary bathymetry with measured uncertainty, which has the advantage to describe wave transformation from deep water to shallow water region in a large coastal area with numerical efficiency.
Abstract: In this study, the fictitious time integration method (FTIM) is applied to investigate wave propagation over an arbitrary bathymetry with measured uncertainty. The FTIM is used to convert the higher-order elliptic mild-slope equation (EMSE) into a FTIM like EMSE (FTIMEMSE). It has the advantage to describe wave transformation from deep water to shallow water region in a large coastal area with numerical efficiency. The validity of the noise resistance for the measured uncertainty of the bathymetry is also studied. In addition, typical examples for waves propagating over an elliptic shoal rest on a horizontal and sloping bottom is presented. It is concluded that the FTIM is robust in the numerical stability and capable of against the noise of the measurement.