Int. J. Wirel. Networks Broadband Technol.最新文献

筛选
英文 中文
Cultural Adaption of Hypermedia: A Contemporary State of the Art of Industrial Practice and Improvements by Multi-Trees 超媒体的文化适应:工业实践的当代艺术状态和多树的改进
Int. J. Wirel. Networks Broadband Technol. Pub Date : 2012-10-01 DOI: 10.4018/ijwnbt.2012100103
Judith Dödtmann, Ralf Wagner
{"title":"Cultural Adaption of Hypermedia: A Contemporary State of the Art of Industrial Practice and Improvements by Multi-Trees","authors":"Judith Dödtmann, Ralf Wagner","doi":"10.4018/ijwnbt.2012100103","DOIUrl":"https://doi.org/10.4018/ijwnbt.2012100103","url":null,"abstract":"Culturally adapted hypermedia design attracts increasing scientific attention. Complementing the conventional human-computer interaction studies we investigate the current state of companies’ cultural adaptation of their websites. This study evaluates a sample of 215 websites with respect to design and navigational aspects. Subsequently, we discuss the possibilities of structuring hypermedia and enabling the adaptation to culturally bounded user expectations. Moreover, we introduce metrics for assessing navigational burdens and outline the advantages of multi-trees for structuring hypermedia.","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133511765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Re-Purposeable Learning Objects Based on Teaching and Learning Styles 基于教学和学习风格的可重新定位的学习对象
Int. J. Wirel. Networks Broadband Technol. Pub Date : 2012-10-01 DOI: 10.4018/ijwnbt.2012100101
J. Dunning, Kellie Donoghue, Abtar Kaur, David Daniels
{"title":"Re-Purposeable Learning Objects Based on Teaching and Learning Styles","authors":"J. Dunning, Kellie Donoghue, Abtar Kaur, David Daniels","doi":"10.4018/ijwnbt.2012100101","DOIUrl":"https://doi.org/10.4018/ijwnbt.2012100101","url":null,"abstract":"The interactive, multimedia learning object has become an important part of high quality online education. The cost of producing such learning objects can be prohibitive. Re-purposeable learning objects made with learning object templates allow instructors with little or no programming experience to produce highly interactive and immersive learning objects. These learning object templates are based on key styles of teaching and learning and can be used to create and customize new learning objects within those styles, without creating new source code. The templates allow instructors to create learning objects simply by inserting text, and media (images, movies, etc.) because they closely mimic specific teaching strategies.","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123201392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Doubly Optimal Secure and Protected Multicasting in Hierarchical Sensor Networks 分层传感器网络中的双最优安全与保护组播
Int. J. Wirel. Networks Broadband Technol. Pub Date : 2012-10-01 DOI: 10.4018/ijwnbt.2012100104
S. Abhijeet, G. R. Murthy
{"title":"Doubly Optimal Secure and Protected Multicasting in Hierarchical Sensor Networks","authors":"S. Abhijeet, G. R. Murthy","doi":"10.4018/ijwnbt.2012100104","DOIUrl":"https://doi.org/10.4018/ijwnbt.2012100104","url":null,"abstract":"This paper presents the research work addressing optimal secure and protected Multicasting in wired and wireless Hierarchical Sensor Networks (HSN). The multicast nodes in a hierarchical set up are associated with†Importance values†that are normalized into probabilities. The security constraint imposed is associated with the concept of “Prefix-free paths†in the associated graph. The optimality constraint is to minimize the average path length based on hop count from root node to multicast nodes. The paper also discusses doubly optimal secure multicasting. A practical Hierarchical Sensor Network is described. Some conditions for satisfying the Kraft inequality are also discussed.","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121716275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Emerging Technologies in Transportation Systems: Challenges and Opportunities 交通运输系统中的新兴技术:挑战与机遇
Int. J. Wirel. Networks Broadband Technol. Pub Date : 2012-10-01 DOI: 10.4018/ijwnbt.2012100102
J. Ibáñez, Carlos A. Flores-Cortés, Pedro Damián-Reyes, J. R. Gutierrez-Pulido
{"title":"Emerging Technologies in Transportation Systems: Challenges and Opportunities","authors":"J. Ibáñez, Carlos A. Flores-Cortés, Pedro Damián-Reyes, J. R. Gutierrez-Pulido","doi":"10.4018/ijwnbt.2012100102","DOIUrl":"https://doi.org/10.4018/ijwnbt.2012100102","url":null,"abstract":"Emerging technologies have been used as a complementary tool to solve different problems that modern society faces every day. One area where the emerging technologies have a big opportunity is transportation. As cities become larger, the number of vehicles and the need for transportation is growing quickly. In this sense, the modern society is facing more traffic congestion, higher fuel bills and the increase of CO2 emissions. It is imperative to improve and develop a sustainable transportation system that uses in a better way the existing infrastructure and that infrastructure have to be complemented with the application of emerging technologies. This work gives readers a global vision of traffic and transportation issues and how merging technologies contribute to solve transportation problems. In addition, it analyzes some of the emerging technologies and how each technology might be used to improve transportation systems. Finally, a classification of applications for transportation systems is explained and some real applications that are being developed in both academic and industrial environment are described.","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114724720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Mobility Support for IPv6-based Next Generation Wireless Networks: A Survey of Related Protocols 基于ipv6的下一代无线网络的移动性支持:相关协议综述
Int. J. Wirel. Networks Broadband Technol. Pub Date : 2012-07-01 DOI: 10.4018/ijwnbt.2012070103
L. Zhang, S. Pierre
{"title":"Mobility Support for IPv6-based Next Generation Wireless Networks: A Survey of Related Protocols","authors":"L. Zhang, S. Pierre","doi":"10.4018/ijwnbt.2012070103","DOIUrl":"https://doi.org/10.4018/ijwnbt.2012070103","url":null,"abstract":"This paper presents an overview of IPv6-based mobility management protocols: mobile IPv6 MIPv6, fast handovers for mobile IPv6 FMIPv6, hierarchical mobile IPv6 HMIPv6, and fast handover for hierarchical mobile IPv6 F-HMIPv6. All these protocols play an important role in the next generation wireless networks, because in such networks, mobile users need to be freely change their access network or domain with on-going real-time multimedia services. The mobility management procedure for each protocol is described in details. Furthermore, handover performance is compared for host-based mobility protocols using analytical modeling. The effect of various wireless network parameters on the performance is studied carefully. Numerical analysis shows that handoff performance in wireless networks is largely dependent on various system parameters such as the user velocity, subnet radius, and session-to-mobility ratio, domain size and binding lifetime; there is a trade-off between performance metrics and such parameters.","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"36 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132318775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Evaluating the Usability of Multimedia, Mobile and Network-Based Products 评估多媒体、移动和网络产品的可用性
Int. J. Wirel. Networks Broadband Technol. Pub Date : 2012-07-01 DOI: 10.4018/ijwnbt.2012070102
P. Kortum
{"title":"Evaluating the Usability of Multimedia, Mobile and Network-Based Products","authors":"P. Kortum","doi":"10.4018/ijwnbt.2012070102","DOIUrl":"https://doi.org/10.4018/ijwnbt.2012070102","url":null,"abstract":"The usability of a product or service can mean the difference between product success or failure in both the field and the marketplace. Successful products are easy to use and intuitive for the user. There are a set of well-defined methods used to determine if a product, service or system is usable and meets the needs of the end user. This paper describes the four major methods of usability assessment: 1 Inquiry Methods, 2 Inspection Methods, 3 Observation Methods and 4 Automated Methods. Each method and its attendant sub-methods are described, as is a discussion of the methods' strengths and weaknesses.","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"372 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126558433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Using the Analytic Hierarchy Process Methodology to Assess the Drivers Affecting the Implementation of Interactive Digital Television as a Commerce Platform 运用层次分析法评估影响交互式数字电视作为商业平台实施的驱动因素
Int. J. Wirel. Networks Broadband Technol. Pub Date : 2012-07-01 DOI: 10.4018/ijwnbt.2012070104
Ching-Ju Chao, Chad Lin, H. Lin, C. Shen, Cheng-Hung Wang
{"title":"Using the Analytic Hierarchy Process Methodology to Assess the Drivers Affecting the Implementation of Interactive Digital Television as a Commerce Platform","authors":"Ching-Ju Chao, Chad Lin, H. Lin, C. Shen, Cheng-Hung Wang","doi":"10.4018/ijwnbt.2012070104","DOIUrl":"https://doi.org/10.4018/ijwnbt.2012070104","url":null,"abstract":"Interactive Digital Television (IDTV) service providers have been looking for ways to maintain their competitive advantage in the marketplace. To do this, IDTV service providers need to carefully evaluate the drivers affecting their existing commercial operations and practices. Hence, this study was undertaken to investigate various adoption drivers for IDTV commerce. A combination of research methods and tools (literature search, semi-structured interviews, mail survey, and the analytic hierarchy process (AHP)) were utilized to identify, examine, analyze, and rank the major adoption drivers for IDTV commerce. The results indicated that the development and implementation of IDTV commerce should be managed and operated in-house. The results also showed that AHP was a powerful tool in assisting decision makers in arriving at the best decision, particular for the IDTV service providers.","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131728949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Laws Associated with Mobile Computing in the Cloud 与云中的移动计算相关的法律
Int. J. Wirel. Networks Broadband Technol. Pub Date : 2012-07-01 DOI: 10.4018/ijwnbt.2012070101
G. Kaupins
{"title":"Laws Associated with Mobile Computing in the Cloud","authors":"G. Kaupins","doi":"10.4018/ijwnbt.2012070101","DOIUrl":"https://doi.org/10.4018/ijwnbt.2012070101","url":null,"abstract":"This article describes the present and potential legal constraints of mobile computing especially related to cloud computing. Numerous American national laws such as the Health Insurance Portability and Accountability Act HIPAA and the Gramm, Leach, Bliley Act provide industry-related guidelines such as providing employee training on data security. Numerous state laws, as in California, get more specific on mandating web privacy policies, warning employees of Web monitoring, and storing and distributing personal customer information. Implications on corporate privacy policies and future legal trends are included.","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114569068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Evolutionary Malware: Mobile Malware, Botnets, and Malware Toolkits 进化恶意软件:移动恶意软件,僵尸网络和恶意软件工具包
Int. J. Wirel. Networks Broadband Technol. Pub Date : 2012-07-01 DOI: 10.4018/ijwnbt.2012070105
Michael Brian Pope, Merrill Warkentin, X. Luo
{"title":"Evolutionary Malware: Mobile Malware, Botnets, and Malware Toolkits","authors":"Michael Brian Pope, Merrill Warkentin, X. Luo","doi":"10.4018/ijwnbt.2012070105","DOIUrl":"https://doi.org/10.4018/ijwnbt.2012070105","url":null,"abstract":"Much as information systems themselves evolve and incorporate innovation, so too has malicious software, or \"malware.\" The increasing threat to those who use and trust in these systems is dangerous to overlook. This article examines recent trends in malware development. Reviewing statistics of dangerous infections of various malware families, it also expands on recent developments of actual exploit code. It further expands on the evolution of recent malware development techniques, particularly the use of malware development kits, or \"exploit kits.\" Mobile exploits taking advantage of smart phones, as well as malicious \"polymorphic\" code that self-mutates to evade detection are also discussed in detail.","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129665028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Cooperative Space Time Coding for Semi Distributed Detection in Wireless Sensor Networks 无线传感器网络半分布式检测的协同空时编码
Int. J. Wirel. Networks Broadband Technol. Pub Date : 2012-04-01 DOI: 10.4018/ijwnbt.2012040101
M. Al-jarrah, N. Al-Ababneh, M. Al-Ibrahim, R. Al-Jarrah
{"title":"Cooperative Space Time Coding for Semi Distributed Detection in Wireless Sensor Networks","authors":"M. Al-jarrah, N. Al-Ababneh, M. Al-Ibrahim, R. Al-Jarrah","doi":"10.4018/ijwnbt.2012040101","DOIUrl":"https://doi.org/10.4018/ijwnbt.2012040101","url":null,"abstract":"Parallel distributed detection in wireless sensor networks (WSNs) is considered in this paper. In parallel architecture, sensors process the observations to make local decisions and send them to a central device called fusion center. Parallel architecture is assumed in this paper with cooperative sensors in order to obtain Alamouti space time block codes (STBCs). A similar idea was discussed by Vosoughi and Ahmadi (2009). Although the likelihood ratio provided in that paper is correct, the simulation results don’t make sense. In this paper, we are going to prove that the results provided in (Vosoughi & Ahmadi, 2009) are not correct. Upper bound for the detection performance is also derived. Furthermore, suboptimal fusion rules are derived to support our results. Moreover, correct results are shown in this paper.","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130969094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信