{"title":"Cultural Adaption of Hypermedia: A Contemporary State of the Art of Industrial Practice and Improvements by Multi-Trees","authors":"Judith Dödtmann, Ralf Wagner","doi":"10.4018/ijwnbt.2012100103","DOIUrl":"https://doi.org/10.4018/ijwnbt.2012100103","url":null,"abstract":"Culturally adapted hypermedia design attracts increasing scientific attention. Complementing the conventional human-computer interaction studies we investigate the current state of companies’ cultural adaptation of their websites. This study evaluates a sample of 215 websites with respect to design and navigational aspects. Subsequently, we discuss the possibilities of structuring hypermedia and enabling the adaptation to culturally bounded user expectations. Moreover, we introduce metrics for assessing navigational burdens and outline the advantages of multi-trees for structuring hypermedia.","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133511765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Dunning, Kellie Donoghue, Abtar Kaur, David Daniels
{"title":"Re-Purposeable Learning Objects Based on Teaching and Learning Styles","authors":"J. Dunning, Kellie Donoghue, Abtar Kaur, David Daniels","doi":"10.4018/ijwnbt.2012100101","DOIUrl":"https://doi.org/10.4018/ijwnbt.2012100101","url":null,"abstract":"The interactive, multimedia learning object has become an important part of high quality online education. The cost of producing such learning objects can be prohibitive. Re-purposeable learning objects made with learning object templates allow instructors with little or no programming experience to produce highly interactive and immersive learning objects. These learning object templates are based on key styles of teaching and learning and can be used to create and customize new learning objects within those styles, without creating new source code. The templates allow instructors to create learning objects simply by inserting text, and media (images, movies, etc.) because they closely mimic specific teaching strategies.","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123201392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Doubly Optimal Secure and Protected Multicasting in Hierarchical Sensor Networks","authors":"S. Abhijeet, G. R. Murthy","doi":"10.4018/ijwnbt.2012100104","DOIUrl":"https://doi.org/10.4018/ijwnbt.2012100104","url":null,"abstract":"This paper presents the research work addressing optimal secure and protected Multicasting in wired and wireless Hierarchical Sensor Networks (HSN). The multicast nodes in a hierarchical set up are associated with†Importance values†that are normalized into probabilities. The security constraint imposed is associated with the concept of “Prefix-free paths†in the associated graph. The optimality constraint is to minimize the average path length based on hop count from root node to multicast nodes. The paper also discusses doubly optimal secure multicasting. A practical Hierarchical Sensor Network is described. Some conditions for satisfying the Kraft inequality are also discussed.","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121716275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Ibáñez, Carlos A. Flores-Cortés, Pedro Damián-Reyes, J. R. Gutierrez-Pulido
{"title":"Emerging Technologies in Transportation Systems: Challenges and Opportunities","authors":"J. Ibáñez, Carlos A. Flores-Cortés, Pedro Damián-Reyes, J. R. Gutierrez-Pulido","doi":"10.4018/ijwnbt.2012100102","DOIUrl":"https://doi.org/10.4018/ijwnbt.2012100102","url":null,"abstract":"Emerging technologies have been used as a complementary tool to solve different problems that modern society faces every day. One area where the emerging technologies have a big opportunity is transportation. As cities become larger, the number of vehicles and the need for transportation is growing quickly. In this sense, the modern society is facing more traffic congestion, higher fuel bills and the increase of CO2 emissions. It is imperative to improve and develop a sustainable transportation system that uses in a better way the existing infrastructure and that infrastructure have to be complemented with the application of emerging technologies. This work gives readers a global vision of traffic and transportation issues and how merging technologies contribute to solve transportation problems. In addition, it analyzes some of the emerging technologies and how each technology might be used to improve transportation systems. Finally, a classification of applications for transportation systems is explained and some real applications that are being developed in both academic and industrial environment are described.","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114724720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobility Support for IPv6-based Next Generation Wireless Networks: A Survey of Related Protocols","authors":"L. Zhang, S. Pierre","doi":"10.4018/ijwnbt.2012070103","DOIUrl":"https://doi.org/10.4018/ijwnbt.2012070103","url":null,"abstract":"This paper presents an overview of IPv6-based mobility management protocols: mobile IPv6 MIPv6, fast handovers for mobile IPv6 FMIPv6, hierarchical mobile IPv6 HMIPv6, and fast handover for hierarchical mobile IPv6 F-HMIPv6. All these protocols play an important role in the next generation wireless networks, because in such networks, mobile users need to be freely change their access network or domain with on-going real-time multimedia services. The mobility management procedure for each protocol is described in details. Furthermore, handover performance is compared for host-based mobility protocols using analytical modeling. The effect of various wireless network parameters on the performance is studied carefully. Numerical analysis shows that handoff performance in wireless networks is largely dependent on various system parameters such as the user velocity, subnet radius, and session-to-mobility ratio, domain size and binding lifetime; there is a trade-off between performance metrics and such parameters.","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"36 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132318775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluating the Usability of Multimedia, Mobile and Network-Based Products","authors":"P. Kortum","doi":"10.4018/ijwnbt.2012070102","DOIUrl":"https://doi.org/10.4018/ijwnbt.2012070102","url":null,"abstract":"The usability of a product or service can mean the difference between product success or failure in both the field and the marketplace. Successful products are easy to use and intuitive for the user. There are a set of well-defined methods used to determine if a product, service or system is usable and meets the needs of the end user. This paper describes the four major methods of usability assessment: 1 Inquiry Methods, 2 Inspection Methods, 3 Observation Methods and 4 Automated Methods. Each method and its attendant sub-methods are described, as is a discussion of the methods' strengths and weaknesses.","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"372 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126558433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ching-Ju Chao, Chad Lin, H. Lin, C. Shen, Cheng-Hung Wang
{"title":"Using the Analytic Hierarchy Process Methodology to Assess the Drivers Affecting the Implementation of Interactive Digital Television as a Commerce Platform","authors":"Ching-Ju Chao, Chad Lin, H. Lin, C. Shen, Cheng-Hung Wang","doi":"10.4018/ijwnbt.2012070104","DOIUrl":"https://doi.org/10.4018/ijwnbt.2012070104","url":null,"abstract":"Interactive Digital Television (IDTV) service providers have been looking for ways to maintain their competitive advantage in the marketplace. To do this, IDTV service providers need to carefully evaluate the drivers affecting their existing commercial operations and practices. Hence, this study was undertaken to investigate various adoption drivers for IDTV commerce. A combination of research methods and tools (literature search, semi-structured interviews, mail survey, and the analytic hierarchy process (AHP)) were utilized to identify, examine, analyze, and rank the major adoption drivers for IDTV commerce. The results indicated that the development and implementation of IDTV commerce should be managed and operated in-house. The results also showed that AHP was a powerful tool in assisting decision makers in arriving at the best decision, particular for the IDTV service providers.","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131728949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Laws Associated with Mobile Computing in the Cloud","authors":"G. Kaupins","doi":"10.4018/ijwnbt.2012070101","DOIUrl":"https://doi.org/10.4018/ijwnbt.2012070101","url":null,"abstract":"This article describes the present and potential legal constraints of mobile computing especially related to cloud computing. Numerous American national laws such as the Health Insurance Portability and Accountability Act HIPAA and the Gramm, Leach, Bliley Act provide industry-related guidelines such as providing employee training on data security. Numerous state laws, as in California, get more specific on mandating web privacy policies, warning employees of Web monitoring, and storing and distributing personal customer information. Implications on corporate privacy policies and future legal trends are included.","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114569068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evolutionary Malware: Mobile Malware, Botnets, and Malware Toolkits","authors":"Michael Brian Pope, Merrill Warkentin, X. Luo","doi":"10.4018/ijwnbt.2012070105","DOIUrl":"https://doi.org/10.4018/ijwnbt.2012070105","url":null,"abstract":"Much as information systems themselves evolve and incorporate innovation, so too has malicious software, or \"malware.\" The increasing threat to those who use and trust in these systems is dangerous to overlook. This article examines recent trends in malware development. Reviewing statistics of dangerous infections of various malware families, it also expands on recent developments of actual exploit code. It further expands on the evolution of recent malware development techniques, particularly the use of malware development kits, or \"exploit kits.\" Mobile exploits taking advantage of smart phones, as well as malicious \"polymorphic\" code that self-mutates to evade detection are also discussed in detail.","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129665028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Al-jarrah, N. Al-Ababneh, M. Al-Ibrahim, R. Al-Jarrah
{"title":"Cooperative Space Time Coding for Semi Distributed Detection in Wireless Sensor Networks","authors":"M. Al-jarrah, N. Al-Ababneh, M. Al-Ibrahim, R. Al-Jarrah","doi":"10.4018/ijwnbt.2012040101","DOIUrl":"https://doi.org/10.4018/ijwnbt.2012040101","url":null,"abstract":"Parallel distributed detection in wireless sensor networks (WSNs) is considered in this paper. In parallel architecture, sensors process the observations to make local decisions and send them to a central device called fusion center. Parallel architecture is assumed in this paper with cooperative sensors in order to obtain Alamouti space time block codes (STBCs). A similar idea was discussed by Vosoughi and Ahmadi (2009). Although the likelihood ratio provided in that paper is correct, the simulation results don’t make sense. In this paper, we are going to prove that the results provided in (Vosoughi & Ahmadi, 2009) are not correct. Upper bound for the detection performance is also derived. Furthermore, suboptimal fusion rules are derived to support our results. Moreover, correct results are shown in this paper.","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130969094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}