Adapting card sorting for blind people: Evaluation of the interaction design in TalkBack
- Teresita de Jesús Álvarez Robles,
- Francisco Javier Álvarez Rodríguez,
- Edgard Benítez-Guerrero,
- Cristian Rusu
- The method as such can be implemented in software development focused on the blind within software engineering.
This article reports the results of a research project conducted to address the lack of feedback provided by generic user eXperience (UX) design methods, specifically in the case of applications for blind users. The objective of this ...
Design of a security-aware routing scheme in Mobile Ad-hoc Network using repeated game model
- Subramanian Balaji,
- Eanoch Golden Julie,
- Yesudhas Harold Robinson,
- Raghvendra Kumar,
- Pham Huy Thong,
- Le Hoang Son
- We approached game theory for security & reliability of data transmission in MANET.
Security is a crucial factor in Mobile Ad hoc Networks (MANET) where inaccessible environments cause assorted categories of security intimidations to provide the malicious-free network. Game theory plays a crucial part in scheming well-...
Towards a standard SDN-based IPsec management framework
- Scalable management of IPsec security associations.
- IKE support at the network ...
The Software-defined Network (SDN) paradigm enables an efficient management of future networks by decoupling the control plane from the data plane. Specifically, network resources (e.g. switches or routers) only perform Internet ...
Distance based thresholds for 2-tier relay nodes selection in WSN
Relay selection technique approaches are increasingly used to improve the reliability of Wireless Sensor Networks (WSNs) communication, thus providing energy efficiency and reducing energy consumption. Due to the adoption of direct ...
Using artificial intelligence for modeling of the realistic animal behaviors in a virtual island
- A virtual environment modeled in unity 3D platform, and user – virtual character interactions have been enabled with artificial intelligence.
The remarkable development of the computer graphic techniques enables the creation and management of more realistic games and virtual environments. However, placing the Artificial Intelligence (AI) in a virtual world get making these ...
The impact of Use Cases in real-world software development projects: A systematic mapping study
- Our study selected and analysed 47 primary works from a set of 4431 papers.
- ...
There is abundant literature on the application of UML Use Cases. However, the impact that these applications have had on real projects (in industry) is not well known. It is necessary to know what the impact of the ...
Analysis of the representative shape classification features of Hangul font services
- A representative shape feature set for Hangul font are proposed.
- Shape-based ...
There are various design guidelines for choosing Roman font that can strengthen the effectiveness and significance of visual delivery by using changes in font shape. However, it is not easy to apply Roman font guide directly to Hangul. ...
Performance analysis of IEEE 802.15.6 for underground disaster cases
- IEEE 802.15.6 based UWC architecture is used firstly in the literature and it is simulated with Riverbed Modeler simulation software.
Nowadays, there are many underground working areas, such as mines and tunnels, which are considered with the scope of the hazardous working area. The use of wireless sensor network (WSN) technologies to ensure the safety of the workers ...
Determinants of survival ratio for de jure standards: AI-related technologies and interaction with patents
- Survival ratios of standards are examined in econometric survival analysis.
- A ...
In this study, I focus on the characteristics of standardized technologies and the effective terms of regional de jure standards to discuss the effectiveness of their management system. To this end, I analyze the determining factors ...
Transitioning international software engineering standards to academia: Analyzing the results of the adoption of ISO/IEC 29110 in four Mexican universities
- The paper provides an overview of ISO/IEC 29110 and MoProSoft.
- The paper aims ...
Software standards, targeted for the software industry, were developed to contribute to the development of quality products within budget and schedule, by optimizing efforts and resources. For small companies, the largest percentage of ...
Energy efficient and reliable data gathering using internet of software-defined mobile sinks for WSNs-based smart grid applications
- We propose a software-defined scheme for energy efficient and QoS-aware data gathering for WSNs-based SG applications.
The smart grid is an emerging concept that introduces innovative ways to handle the power quality and reliability issues for both service provider and consumers. The key aims of the smart grid (SG) in smart cities (SCs) is to preserve ...
Understanding physicians’ adoption of electronic medical records: Healthcare technology self-efficacy, service level and risk perspectives
- This study aims to investigate whether the individual characteristics of a physician affect EMR adoption.
Most developed countries across the globe are deploying electronic medical record (EMR) as one of the most important initiatives in their healthcare policy. EMR can not only reduce the problems associated with managing paper medical ...
Based blockchain-PSO-AES techniques in finger vein biometrics: A novel verification secure framework for patient authentication
The main objective of this study is to propose a novel verification secure framework for patient authentication between an access point (patient enrolment device) and a node database. For this purpose, two stages are used. Firstly, we ...
CAN’t track us: Adaptable privacy for ISOBUS controller area networks
- Adaptable privacy concept for ISOBUS communication suited for collaborative Farming.
Modern information technologies have revolutionized agriculture in many ways. Today, positioning systems along with Internet of Things technologies enable Smart Faming with site-specific applications and interconnected machinery. ...
Applying a methodology to develop user eXperience heuristics
- Sets of specific usability/UX heuristics can be used to evaluate domain-specific applications.
A heuristic evaluation method allows the evaluation of the usability of application domains. To evaluate applications that have specific domain features, researchers can use sets of specific usability heuristics in addition to the well-...
System security requirements: A framework for early identification, specification and measurement of related software requirements
- Assisting the developers in specifying system security requirements in early development stages.
One of the responsibilities of developers is the early definition of non-functional requirements (NFR) at the system level and their related allocation as functional user requirements (FUR) at the software level. To identify some of ...
Ten years of visualization of business process models: A systematic literature review
- First systematic review about visualization applied to business process modeling.
Business process modeling is an essential task in business process management. Process models that are comprehensively understood by business stakeholders allow organizations to profit from this field. In this work, we report what is ...
A secure end-to-end proximity NFC-based mobile payment protocol
- We have developed an ECC-based NFC protocol. It is operated in read/write mode used for mobile payments and it is secure against tag cloning and tag ...
Near Field Communication (NFC) is one of the fast-growing technologies related to proximity-based mobile payments. In this paper, a secure NFC-enabled payment model that can be used for peer-to-peer (P2P) payments and payer-to-merchant ...
Analysing compliance and application of usability guidelines on efficient and understandable controls
- This research extracts and analyzes all relevant usability guidelines related to the design of competent data entry systems. Twenty postgraduate students ...
Usability is the ease with which a user can navigate through a website. Your goal is to improve the user experience during your interaction with the website. Currently, there are many guidelines and recommendations whose objective is ...
Building a hierarchical structure model of enablers that affect the software process improvement in software SMEs—A mixed method approach
- RQ1: What are the various indicators for successful SPI in software SMEs? Can these indicators be grouped under various categories, so-called enablers?
In the present study authors developed a mixed approach based on qualitative and interpretive approaches to model and analyze software process improvement (SPI) enablers in software small and medium-sized enterprises (SMEs). In phase-I ...
EE-CTA: Energy efficient, concurrent and topology-aware virtual network embedding as a multi-objective optimization problem
- EE-CTA is a new concurrent Virtual Network Embedding (VNE) solution which completes node and link mapping concurrently.
Network virtualization provides the substruction of various heterogeneous Virtual Networks (VNs) on a single physical infrastructure which is called Virtual Network Embedding (VNE) and is known as an Np-hard problem. The VNE includes ...
Trends in software reuse research: A tertiary study
- We identified 30 current research topics and 127 proposals for future work.
- ...
The reuse of software has been a research topic for more than 50 years. Throughout that time, many approaches, tools and proposed techniques have reached maturity. However, it is not yet a widespread practice and ...
A change management model and its application in software development projects
- Change is inevitable for software projects and should be adopted in project management.
Change is inevitable in software projects and software engineers strive to find ways to manage changes. A complete task could be easily in a team`s agenda sometime later due to change demands. Change demands are caused by failures and/...
Semiotic clarity of Case Management Model and Notation (CMMN)
- An analysis of semiotic clarity was conducted, based on Physics of Notations theory for CMMN notation.
Business processes are an important asset of every organisation and can be divided into a group of structured processes (i.e. procedural) and loosely structured ones (i.e. declarative). A good example of procedural ...
Performance comparison of scalable rest application programming interfaces in different platforms
- WebAPI applications developed with different programming languages are compared with each other regardless of other factors.
The number of devices connecting to the Internet is increasing day by day. Firstly, people connected the Internet using their personal computers with the purpose of gathering information, then Internet became more accessible with the ...