skip to main content
Volume 50, Issue CFebruary 2017
Publisher:
  • Elsevier Science Publishers B. V.
  • PO Box 211 1000 AE Amsterdam
  • Netherlands
ISSN:0920-5489
Reflects downloads up to 20 Jan 2025Bibliometrics
Skip Table Of Content Section
research-article
J3 Model

In the real-time systems and safety critical domains, software quality assurance adheres to protocols such as DO-178C standard. Regarding these issues, concolic testing generates test cases that can attain high coverage using an augmented approach based ...

research-article
A new full-reference image quality metric based on just noticeable difference

An Image Quality Metric (IQM) is used to measure how the image on which modifications are carried out is distorted. Knowing the distortion scale of the image is of significance for the intended purposes (compression, forensic, medical, etc.). The amount ...

research-article
Policy-controlled signatures and their applications

In this paper, we present a new cryptographic primitive called "policy-controlled signatures". In this notion, a signer can sign a message and attach it with some policies. Only a verifier who satisfies the policies attached can verify the authenticity ...

research-article
Home automation networks

Home Automation Networks provide a promising opportunity in designing smart home systems and applications. In this context, Machine-to-Machine (M2M) networks are emerging as an efficient means to provide automated communication among distributed ...

research-article
Application of Data Mining techniques to identify relevant Key Performance Indicators

Currently dashboards are the preferred tool across organizations to monitor business performance. Dashboards are often composed of different data visualization techniques, amongst which are Key Performance Indicators (KPIs) which play a crucial role in ...

research-article
CSS3 extensions for setting web content in a 3D view volume and its stereoscopic 3D display

Over recent years, the development of electronic devices such as mobile devices and smart TVs has been remarkable; meanwhile, the emergence of 3D TV has given rise to a rapid increase of the demand for 3D expressions. The objective of this study is the ...

research-article
Mass surveillance and technological policy options

The 2013 Snowden revelations ignited a vehement debate on the legitimacy and breadth of intelligence operations that monitor the Internet and telecommunications worldwide. The ongoing invasion of the private sphere of individuals around the world by ...

research-article
Distributed control system for ship engines using dual fieldbus

This paper describes a distributed control system (DCS) for ship engines using a dual fieldbus. Communication among DCS entities is provided by considering the redundancy between Modbus and the controller area network (CAN) bus. The dual fieldbus ...

research-article
Formal verification of LTE-UMTS and LTE-LTE handover procedures

Long Term Evolution (LTE) is the most recent standard in mobile communications, introduced by 3rd Generation Partnership Project (3GPP). Most of the works in literature about LTE security analyze authentication procedures, while handover procedures are ...

research-article
Exploring software security approaches in software development lifecycle

There is an increase use of security driven approaches to support software development activities, such as requirements, design and implementation. The objective of this paper is to identify the existing software security approaches used in the software ...

research-article
Applying standards to systematize learning analytics in serious games

Learning Analytics is an emerging field focused on analyzing learners' interactions with educational content. One of the key open issues in learning analytics is the standardization of the data collected. This is a particularly challenging issue in ...

research-article
A domain independent readability metric for web service descriptions

Web Services are influencing most IT-based industries as the basic building block of business infrastructures. A Web Service has an interface described in a machine-processable format (specifically WSDL). Service providers expose their services by ...

research-article
The Intelligenter method (III) for "smarter" standards development and standardisation instruments

This paper shows the need for innovation in the development of standards and standardisation instruments. While standardisation activity overall is growing in terms of the number of standards being developed, exploration of new domains, organisations ...

research-article
Remote length measurement system using a single point laser distance sensor and an inertial measurement unit

In this paper, we propose a remote measurement system consisting of a single point laser distance sensor and an IMU (Inertial Measurement Unit). The movement of the system is estimated using a strapdown inertial navigation algorithm. This movement ...

research-article
Experimental validation of a set of cultural-oriented usability heuristics

With the fast growth of the Latin America electronic commerce (e-Commerce), it is indispensable to design effective websites. Evaluating usability issues allows improving the design. One popular method for detecting usability problems is the heuristic ...

research-article
An analysis of safety evidence management with the Structured Assurance Case Metamodel

SACM (Structured Assurance Case Metamodel) is a standard for assurance case specification and exchange. It consists of an argumentation metamodel and an evidence metamodel for justifying that a system satisfies certain requirements. For assurance of ...

research-article
Harmonizing IEC 61850 and CIM for connectivity of substation automation

A smart grid is an electrical power grid infrastructure for improving efficiency and reliability of power systems. CIM and IEC 61850 are major standards in the smart grid domain for modeling substations and their management. Due to heavy data exchanges ...

research-article
Improving stego image quality in image interpolation based data hiding

Jung and Yoo proposed a new image interpolation method, neighbor mean interpolation, on which they first constructed image interpolation based data hiding (IIDH) scheme. However, the authors only adopted a simple method by adding the decimal value of ...

research-article
ISO 21500

The purpose of this research is to contribute to a better understanding of information systems (IS) project management practice, by investigating the ISO 21500:2012/PMBoK 5 processes implemented by project managers in this kind of projects. Responses to ...

research-article
Coexistence server in Cognitive Networks

In Cognitive Networks, coexistence is one of the main issues to be addressed. The release of TV White Spaces (TVWS) for use in various regions of the world presents an opportunity for better spectrum utilization and asks for new techniques of spectrum ...

research-article
Model transformation between OPC UA and UML

OPC Unified Architecture (UA) is a platform-independent standard for message-based communication between clients and servers on various types of network to facilitate information exchange. OPC UA has been adopted in various domains such as power grids, ...

research-article
Moving average fuzzy resource scheduling for virtualized cloud data services

Cloud computing offers simplified system maintenance and scalable resource management with Virtual Machines (VMs). Users access resources of data centers by allocating VMs to hosts. Therefore, to improve the quality of cloud computing environment, not ...

research-article
Handling heterogeneous partitioned systems through ARINC-653 and DDS

Many cyber-physical systems in the avionics domain are mission- or safety-critical systems. In this context, standard distribution middleware has recently emerged as a potential solution to interconnect heterogeneous partitioned systems, as it would ...

Comments