{"title":"Secure Network Coding against Content Pollution Attacks in Named Data Network","authors":"Tao Feng, Xiaomei Ma, Xian Guo, Jing Wang","doi":"10.18178/JACN.2015.3.4.187","DOIUrl":"https://doi.org/10.18178/JACN.2015.3.4.187","url":null,"abstract":"","PeriodicalId":104722,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Computer and Information Engineering","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124543950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"VCloud: A Security Framework for VANET","authors":"W. M. Danquah, D. Altilar","doi":"10.1007/978-3-662-47669-7_1","DOIUrl":"https://doi.org/10.1007/978-3-662-47669-7_1","url":null,"abstract":"","PeriodicalId":104722,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Computer and Information Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126595224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobile Application Testing Matrix and Challenges","authors":"Bakhtiar Amen, S. M. Mahmood, Joan Lu","doi":"10.5121/csit.2015.50403","DOIUrl":"https://doi.org/10.5121/csit.2015.50403","url":null,"abstract":"The adoption of smart phones and the usages of mobile applications are increasing rapidly. Consequently, within limited time-range, mobile Internet usages have managed to take over the desktop usages particularly since the first smart phone-touched application released by iPhone in 2007. This paper is proposed to provide solution and answer the most demandable questions related to mobile application automated and manual testing limitations. Moreover, Mobile application testing requires agility and physically testing. Agile testing is to detect bugs through automated tools, whereas the compatibility testing is more to ensure that the apps operates on mobile OS (Operation Systems) as well as on the different real devices. Moreover, we have managed to answer automated or manual questions through two mobile application case studies MES (Mobile Exam System) and MLM (Mobile Lab Mate) by creating test scripts for both case studies and our experiment results have been discussed and evaluated on whether to adopt test on real devices or on emulators? In addition to this, we have introduced new mobile application testing matrix for the testers and some enterprises to obtain knowledge from","PeriodicalId":104722,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Computer and Information Engineering","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121491537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"RFID Based Indoor Navigation with Obstacle Detection Based on A* Algorithm for the Visually Impaired","authors":"J. Sanchez, A. Yumang, F. Caluyo","doi":"10.7763/ijiee.2015.v5.572","DOIUrl":"https://doi.org/10.7763/ijiee.2015.v5.572","url":null,"abstract":"—The visually impaired individual may use a cane, guide dog or ask for assistance from a person. This study implemented the RFID technology which consists of a low-cost RFID reader and passive RFID tag cards. The passive RFID tag cards served as checkpoints for the visually impaired. The visually impaired was guided through audio output from the system while traversing the path. The study implemented an ultrasonic sensor in detecting static obstacles. The system generated an alternate path based on A* algorithm to avoid the obstacles. Alternate paths were also generated in case the visually impaired traversed outside the intended path to the destination. A* algorithm generated the shortest path to the destination by calculating total cost of movement. The algorithm then selected the smallest movement cost as a successor to the current tag card. Several trials were conducted to determine the effect of obstacles in the time traversal of the visually impaired. Dependent-sample t-test was applied for the statistical analysis of the study. Based on the analysis, the obstacles along the path generated delays while requesting for the alternate path because of the delay in transmission from the laptop to the device via ZigBee modules.","PeriodicalId":104722,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Computer and Information Engineering","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117020205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of Artificial Neural Network and Background Subtraction for Determining Body Mass Index (BMI) in Android Devices Using Bluetooth","authors":"Neil Erick Q. Madariaga, N. Linsangan","doi":"10.7763/ijet.2016.v8.914","DOIUrl":"https://doi.org/10.7763/ijet.2016.v8.914","url":null,"abstract":"","PeriodicalId":104722,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Computer and Information Engineering","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133392684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Hilera, S. Otón, Cristian Timbi-Sisalima, Juan Aguado-Delgado, Francisco J. Estrada-Martínez, Héctor R. Amado-Salvatierra
{"title":"Combining Multiple Web Accessibility Evaluation Reports using Semantic Web Technologies","authors":"J. Hilera, S. Otón, Cristian Timbi-Sisalima, Juan Aguado-Delgado, Francisco J. Estrada-Martínez, Héctor R. Amado-Salvatierra","doi":"10.1007/978-3-319-74817-7_5","DOIUrl":"https://doi.org/10.1007/978-3-319-74817-7_5","url":null,"abstract":"","PeriodicalId":104722,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Computer and Information Engineering","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122599040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comfort Sensor Using Fuzzy Logic and Arduino","authors":"S. Sharanya, Samuel N. John","doi":"10.1007/978-981-10-1645-5_13","DOIUrl":"https://doi.org/10.1007/978-981-10-1645-5_13","url":null,"abstract":"","PeriodicalId":104722,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Computer and Information Engineering","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133884867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}