skip to main content
Volume 66, Issue COct 2019
Publisher:
  • Elsevier Science Publishers B. V.
  • PO Box 211 1000 AE Amsterdam
  • Netherlands
ISSN:0920-5489
Reflects downloads up to 31 Jan 2025Bibliometrics
Skip Table Of Content Section
research-article
Adapting card sorting for blind people: Evaluation of the interaction design in TalkBack
Highlights

  • The method as such can be implemented in software development focused on the blind within software engineering.

Abstract

This article reports the results of a research project conducted to address the lack of feedback provided by generic user eXperience (UX) design methods, specifically in the case of applications for blind users. The objective of this ...

research-article
Design of a security-aware routing scheme in Mobile Ad-hoc Network using repeated game model
Highlights

  • We approached game theory for security & reliability of data transmission in MANET.

Abstract

Security is a crucial factor in Mobile Ad hoc Networks (MANET) where inaccessible environments cause assorted categories of security intimidations to provide the malicious-free network. Game theory plays a crucial part in scheming well-...

research-article
Towards a standard SDN-based IPsec management framework
Highlights

  • Scalable management of IPsec security associations.
  • IKE support at the network ...

Abstract

The Software-defined Network (SDN) paradigm enables an efficient management of future networks by decoupling the control plane from the data plane. Specifically, network resources (e.g. switches or routers) only perform Internet ...

research-article
Distance based thresholds for 2-tier relay nodes selection in WSN
Abstract

Relay selection technique approaches are increasingly used to improve the reliability of Wireless Sensor Networks (WSNs) communication, thus providing energy efficiency and reducing energy consumption. Due to the adoption of direct ...

research-article
Using artificial intelligence for modeling of the realistic animal behaviors in a virtual island
Highlights

  • A virtual environment modeled in unity 3D platform, and user – virtual character interactions have been enabled with artificial intelligence.

Abstract

The remarkable development of the computer graphic techniques enables the creation and management of more realistic games and virtual environments. However, placing the Artificial Intelligence (AI) in a virtual world get making these ...

research-article
The impact of Use Cases in real-world software development projects: A systematic mapping study
Highlights

  • Our study selected and analysed 47 primary works from a set of 4431 papers.
  • ...

Abstract Context

There is abundant literature on the application of UML Use Cases. However, the impact that these applications have had on real projects (in industry) is not well known. It is necessary to know what the impact of the ...

research-article
Analysis of the representative shape classification features of Hangul font services
Highlight

  • A representative shape feature set for Hangul font are proposed.
  • Shape-based ...

Abstract

There are various design guidelines for choosing Roman font that can strengthen the effectiveness and significance of visual delivery by using changes in font shape. However, it is not easy to apply Roman font guide directly to Hangul. ...

research-article
Performance analysis of IEEE 802.15.6 for underground disaster cases
Highlights

  • IEEE 802.15.6 based UWC architecture is used firstly in the literature and it is simulated with Riverbed Modeler simulation software.

Abstract

Nowadays, there are many underground working areas, such as mines and tunnels, which are considered with the scope of the hazardous working area. The use of wireless sensor network (WSN) technologies to ensure the safety of the workers ...

research-article
Determinants of survival ratio for de jure standards: AI-related technologies and interaction with patents
Highlights

  • Survival ratios of standards are examined in econometric survival analysis.
  • A ...

Abstract

In this study, I focus on the characteristics of standardized technologies and the effective terms of regional de jure standards to discuss the effectiveness of their management system. To this end, I analyze the determining factors ...

research-article
Transitioning international software engineering standards to academia: Analyzing the results of the adoption of ISO/IEC 29110 in four Mexican universities
Highlights

  • The paper provides an overview of ISO/IEC 29110 and MoProSoft.
  • The paper aims ...

Abstract

Software standards, targeted for the software industry, were developed to contribute to the development of quality products within budget and schedule, by optimizing efforts and resources. For small companies, the largest percentage of ...

research-article
Energy efficient and reliable data gathering using internet of software-defined mobile sinks for WSNs-based smart grid applications
Highlights

  • We propose a software-defined scheme for energy efficient and QoS-aware data gathering for WSNs-based SG applications.

Abstract

The smart grid is an emerging concept that introduces innovative ways to handle the power quality and reliability issues for both service provider and consumers. The key aims of the smart grid (SG) in smart cities (SCs) is to preserve ...

research-article
Understanding physicians’ adoption of electronic medical records: Healthcare technology self-efficacy, service level and risk perspectives
Highlights

  • This study aims to investigate whether the individual characteristics of a physician affect EMR adoption.

Abstract

Most developed countries across the globe are deploying electronic medical record (EMR) as one of the most important initiatives in their healthcare policy. EMR can not only reduce the problems associated with managing paper medical ...

research-article
Based blockchain-PSO-AES techniques in finger vein biometrics: A novel verification secure framework for patient authentication
Abstract

The main objective of this study is to propose a novel verification secure framework for patient authentication between an access point (patient enrolment device) and a node database. For this purpose, two stages are used. Firstly, we ...

research-article
CAN’t track us: Adaptable privacy for ISOBUS controller area networks
Highlights

  • Adaptable privacy concept for ISOBUS communication suited for collaborative Farming.

Abstract

Modern information technologies have revolutionized agriculture in many ways. Today, positioning systems along with Internet of Things technologies enable Smart Faming with site-specific applications and interconnected machinery. ...

research-article
Applying a methodology to develop user eXperience heuristics
Highlights

  • Sets of specific usability/UX heuristics can be used to evaluate domain-specific applications.

Abstract

A heuristic evaluation method allows the evaluation of the usability of application domains. To evaluate applications that have specific domain features, researchers can use sets of specific usability heuristics in addition to the well-...

review-article
System security requirements: A framework for early identification, specification and measurement of related software requirements
Highlights

  • Assisting the developers in specifying system security requirements in early development stages.

Abstract

One of the responsibilities of developers is the early definition of non-functional requirements (NFR) at the system level and their related allocation as functional user requirements (FUR) at the software level. To identify some of ...

review-article
Ten years of visualization of business process models: A systematic literature review
Highlights

  • First systematic review about visualization applied to business process modeling.

Abstract

Business process modeling is an essential task in business process management. Process models that are comprehensively understood by business stakeholders allow organizations to profit from this field. In this work, we report what is ...

research-article
A secure end-to-end proximity NFC-based mobile payment protocol
Highlights

  • We have developed an ECC-based NFC protocol. It is operated in read/write mode used for mobile payments and it is secure against tag cloning and tag ...

Abstract

Near Field Communication (NFC) is one of the fast-growing technologies related to proximity-based mobile payments. In this paper, a secure NFC-enabled payment model that can be used for peer-to-peer (P2P) payments and payer-to-merchant ...

research-article
Analysing compliance and application of usability guidelines on efficient and understandable controls
Highlights

  • This research extracts and analyzes all relevant usability guidelines related to the design of competent data entry systems. Twenty postgraduate students ...

Abstract

Usability is the ease with which a user can navigate through a website. Your goal is to improve the user experience during your interaction with the website. Currently, there are many guidelines and recommendations whose objective is ...

    research-article
    Building a hierarchical structure model of enablers that affect the software process improvement in software SMEs—A mixed method approach
    Highlights

    • RQ1: What are the various indicators for successful SPI in software SMEs? Can these indicators be grouped under various categories, so-called enablers?

    Abstract

    In the present study authors developed a mixed approach based on qualitative and interpretive approaches to model and analyze software process improvement (SPI) enablers in software small and medium-sized enterprises (SMEs). In phase-I ...

    research-article
    EE-CTA: Energy efficient, concurrent and topology-aware virtual network embedding as a multi-objective optimization problem
    Highlights

    • EE-CTA is a new concurrent Virtual Network Embedding (VNE) solution which completes node and link mapping concurrently.

    Abstract

    Network virtualization provides the substruction of various heterogeneous Virtual Networks (VNs) on a single physical infrastructure which is called Virtual Network Embedding (VNE) and is known as an Np-hard problem. The VNE includes ...

    research-article
    Trends in software reuse research: A tertiary study
    Highlights

    • We identified 30 current research topics and 127 proposals for future work.
    • ...

    Abstract Context

    The reuse of software has been a research topic for more than 50 years. Throughout that time, many approaches, tools and proposed techniques have reached maturity. However, it is not yet a widespread practice and ...

    research-article
    A change management model and its application in software development projects
    Highlights

    • Change is inevitable for software projects and should be adopted in project management.

    Abstract

    Change is inevitable in software projects and software engineers strive to find ways to manage changes. A complete task could be easily in a team`s agenda sometime later due to change demands. Change demands are caused by failures and/...

    research-article
    Semiotic clarity of Case Management Model and Notation (CMMN)
    Highlights

    • An analysis of semiotic clarity was conducted, based on Physics of Notations theory for CMMN notation.

    Abstract Context

    Business processes are an important asset of every organisation and can be divided into a group of structured processes (i.e. procedural) and loosely structured ones (i.e. declarative). A good example of procedural ...

    research-article
    Performance comparison of scalable rest application programming interfaces in different platforms
    Highlights

    • WebAPI applications developed with different programming languages are compared with each other regardless of other factors.

    Abstract

    The number of devices connecting to the Internet is increasing day by day. Firstly, people connected the Internet using their personal computers with the purpose of gathering information, then Internet became more accessible with the ...

    Comments