Skip main navigation

Cookies Notification

We use cookies on this site to enhance your user experience. By continuing to browse the site, you consent to the use of our cookies. Learn More
×

System Upgrade on Tue, May 28th, 2024 at 2am (EDT)

Existing users will be able to log into the site and access content. However, E-commerce and registration of new users may not be available for up to 12 hours.
For online purchase, please visit us again. Contact us at customercare@wspc.com for any enquiries.

SEARCH GUIDE  Download Search Tip PDF File

  Bestsellers

  • articleNo Access

    FAST PURSUIT OF MOBILE NODES USING TPR TREES

    In this paper, we consider a set of mobile nodes, each of which moves with constant velocity. We present algorithms to determine which of these mobile nodes can be captured the soonest by a set of one or more pursuers. We use a time parameterized R-tree (TPR-tree) to index these moving points. We then develop algorithms that operate on the TPR-tree to answer three query variations: (1) a single pursuer that is faster than all of the mobile nodes, (2) a single pursuer that is slower than some of the mobile nodes and (3) multiple pursuers. Experimental results show that our algorithms are simpler and faster than other approaches to solve the problem.

  • articleNo Access

    A SEQUENCE ALIGNMENT APPROACH APPLIED TO A MOBILE AUTHENTICATION TECHNIQUE BASED ON GESTURES

    In this paper, a biometric technique based on gesture recognition is proposed to improve the security of operations requiring authentication in mobile phones. Users are authenticated by making a gesture invented by them holding a mobile phone embedding an accelerometer on their hand. An analysis method based on sequence alignment is proposed and evaluated in different experiments. Firstly, a test of distinctiveness of gestures has been proposed obtaining an equal error rate (EER) of 4.98% with a database of 30 users and four repetitions. With the same database, a second experiment representing the unicity of accessing attempts has resulted in an EER value of 1.92%. Finally, a third experiment to evaluate the robustness of the technique has examined a database of 40 users with eight repetitions and real falsification attempts, performed by three impostors from the study of recordings of the carrying out of the original gestures, resulting in an EER of 2.5%.

  • articleNo Access

    Visualized Awareness Support for Collaborative Software Development on Mobile Devices

    To foster innovation and competition, an increasing number of software teams are becoming distributed. Such a distribution makes continuous collaboration and continuous awareness support a necessity and also a great challenge. Traditional desktop-based approaches are insufficient for the requirements of continuous awareness. In software development practice, an awareness tool on mobile devices is also desirable for team members to obtain the awareness information continuously. This paper addresses how to effectively present collaborative development activities using aesthetic visualization on mobile screens. Our approach supports multiple views suitable for software developers as well as team leaders. A baseline usability experiment and an eye-tracking experiment have evaluated the effectiveness and usability of the visualization method.

  • articleNo Access

    PIRAP: Chaotic Fuzzy Encryption (CFE) Technique and Greedy Chemical Reaction Optimization (GCRO) Algorithm-Based Secured Mobi-Cloud Framework

    This paper uses the chaotic fuzzy encryption (CFE) technique and a greedy chemical reaction optimization algorithm based on mobile cloud computing to protect data from any assault. Mobile users who use protected mobile cloud computing (Mobi-Cloud) must trust the cloud service provider to keep the data sent from their mobile devices safe when mobile users express strong reservations about storing personal information in the public cloud. The Greedy Chemical Reaction Optimization (G-CRO) algorithm reduces critical limitations by determining the offloading end with motion at run time, i.e. the task’s operating time, CPU usage, memory utilization, and energy usage. The experimental results show that the proposed method performs better in terms of file uploading time, file downloading time, memory usage in file uploading, memory usage in file downloading, encryption time, decryption time, memory usage on file encryption, memory usage on file decryption, security levels, and key generation time. Compared to the Proxy Re-Encryption (PRE) algorithm, the suggested method consumes less time for key creation (26.04).

  • articleNo Access

    Applications of Mobile Payment Services in Financial Strategies: State-of-the-Art, Taxonomy and Upcoming Directions with a Focus on Pandemic Crisis

    Amid the pandemic infection, people are bound to use contactless mobile payment (M-Payment) services. M-Payment is a payment method using an application in a mobile device, such as a mobile phone, and gadget. Owing to the convenience, reliability and contact-free feature of M-Payment, it has been diffusely adopted to reduce the direct and indirect contacts in transactions, allowing social distancing to be maintained and facilitating the stabilization of the social economy. Consequently, it has become one of the day’s most important topics. Therefore, the purpose of this study is to provide a systematic literature review (SLR) on the applications of M-payment services in financial strategies, focusing on the pandemic crisis. 19 papers were collected and divided into three groups for further analysis. The results showed that M-Payments applications in financial strategies during the pandemic crisis could help reduce the spread of infection risks by hastening the transition to touchless habits.

  • articleNo Access

    PRIMATE ANATOMY, KINEMATICS, AND PRINCIPLES FOR HUMANOID DESIGN

    The primate order of animals is investigated for clues in the design of humanoid robots. The pursuit is directed with a theory that kinematics, musculature, perception, and cognition can be optimized for specific tasks by varying the proportions of limbs, and in particular, the points of branching in kinematic trees such as the primate skeleton. Called the Bifurcated Chain Hypothesis, the theory is that the branching proportions found in humans may be superior to other animals and primates for the tasks of dexterous manipulation and other human specialties. The primate taxa are defined, contemporary primate evolution hypotheses are critiqued, and variations within the order are noted. The kinematic branching points of the torso, limbs and fingers are studied for differences in proportions across the order, and associated with family and genus capabilities and behaviors. The human configuration of a long waist, long neck, and short arms is graded using a kinematic workspace analysis and a set of design axioms for mobile manipulation robots. It scores well. The re-emergence of the human waist, seen in early prosimians and monkeys for arboreal balance, but lost in the terrestrial pongidae, is postulated as benefiting human dexterity. The human combination of an articulated waist and neck will be shown to enable the use of smaller arms, achieving greater regions of workspace dexterity than the larger limbs of gorillas and other hominoidea.

  • articleNo Access

    Investigating Determinants and Interaction Quality Effects on Tourists' Intention to Use Mobile Tourism Guide

    This study investigates model of tourist intention in the context of mobile tourism guide (MTG). We extend the innovation diffusion theory with the interaction quality construct. Partial least squares is used for data analysis. The results show four innovation characteristics such as relative advantage, compatibility, complexity and trialability significantly related to international tourists' intention to use MTG. Furthermore, the interaction quality has an impact on the relationship between lack of complexity and tourists' intention to use MTG. We propose theoretical model for mobile research and provides an important guideline for development and implementation.

  • articleNo Access

    Innovations in Mobile Value-Added Services: Findings from Cases in India

    Convergence of internet and mobile technologies has fueled growth in service innovations in the telecommunication sector. Digitization has transformed telecommunication value chain from linear to nonlinear web, presenting the role of telecom operators in a dilemma. Objective of the research is to understand the dynamics of technology and service innovation for development of mobile value-added services (VAS). We study the process of service innovation in select mobile VAS in India and map their delivery process on enhanced telecom operations map (eTOM) framework. Our findings indicate challenges in managing sector-crossing service innovations effectively, presenting an opportunity to extend the existing framework.

  • articleNo Access

    A Comparative Study of Factors’ Influences Affecting Tourists’ Intention to Use Mobile Food Information: Independent Tourists and Package Tourists

    The purpose of this paper is to investigate a comprehensive model of international tourists’ intentions to use mobile food information (MFI). The study compares the intentions of independent tourists and package tourists focusing on the influences of mobile design qualities and tourists’ perceptions. The model is based on the technology acceptance model. The results revealed that the proposed model more efficiently predicted intention in groups of independent tourists than in groups of package tour. Furthermore, there are some differences between these groups. The proposed model could contribute to future collaboration between tourist agents and mobile-based developers to achieve the implementation of MFI.

  • articleNo Access

    User-Generated Video Composition Based on Device Context Measurements

    Instant sharing of user-generated video recordings has become a widely used service on platforms such as YouNow, Facebook.Live or uStream. Yet, providing such services with a high QoE for viewers is still challenging, given that mobile upload speed and capacities are limited, and the recording quality on mobile devices greatly depends on the users’ capabilities. One proposed solution to address these issues is video composition. It allows to switch between multiple recorded video streams, selecting the best source at any given time, for composing a live video with a better overall quality for the viewers. Previous approaches have required an in-depth visual analysis of the video streams, which usually limited the scalability of these systems. In contrast, our work allows the stream selection to be realized solely on context information, based on video- and service-quality aspects from sensor and network measurements.

    The implemented monitoring service for a context-aware upload of video streams is evaluated in different network conditions, with diverse user behavior, including camera shaking and user mobility. We have evaluated the system’s performance based on two studies. First, in a user study, we show that a higher efficiency for the video upload as well as a better QoE for viewers can be achieved when using our proposed system. Second, by examining the overall delay for the switching between streams based on sensor readings, we show that a composition view change can efficiently be achieved in approximately four seconds.

  • chapterNo Access

    GMSME: An Architecture for Heterogeneous Collaboration with Mobile Devices

    The importance of network-ready personal devices in collaborative systems is becoming apparent. The participants of a collaborative environment use mobile devices to overcome the physical constraint of using a conventional PC. However, the integration of disparate devices like mobile devices and PCs is difficult, because of the connectivity and the computing power limitations of a mobile device. We believe a dedicated middleware layer that supports universal access, event mapping, user management, and content adaptation is a great help to integrate mobile devices into the collaborative system. In this paper, we propose a ubiquitous computing environment architecture for a collaborative system called Garnet Message System Micro Edition (GMSME). This architecture provides the environment to resolve those issues and is designed efficiently considering the computing resource limitations of mobile devices.

  • chapterNo Access

    Mobile multi-node recharging in heterogeneous wireless sensor networks

    The wireless energy transfer technology has evolved as a reliable approach to solve the energy limitation problem for Wireless Sensor Networks. Major work has been carried out to recharge only the static sensor node through wireless charging vehicle. Some of the wireless sensor networks applications require complete mobility and the proposed techniques cannot be applied to mobile sensor networks since the positions of the nodes are changing at regular intervals. This paper extends the prior approach in mobile sensor networks through which the lifetime of the mobile nodes have been significantly enhanced. The charging schedule of the nodes ensure that the nodes never run out energy.

  • chapterNo Access

    The development of mobile end web system development based on HTML5 + CSS3 + java framework

    With the popularity of mobile terminals, Web system must adapt to the mobile terminals. In this paper, introduction mobile web systems development, analyze the characteristics of HTML5, CSS3, JavaScript and popular framework technology. On this basis, to explore the development of a more rational structure, information architecture comb. Proposed two JavaScript script code optimization program to make system development more lightweight, improves data transfer speeds.

  • chapterNo Access

    Design and Implementation of Intelligent Mobile Information System for Campus Safety Management

    If information technology can be utilized for campus safety, it would be helpful for school staff to monitor all situations in schools. This study is based on campus safety management and is aimed at establishing an intelligent mobile information system in colleges; this will facilitate the installation of video recorders in the rush areas (at the entrance and exit of the campus) and inconspicuous places on campuses. This study adopts the Windows Media Player along the RTP/RTSP protocol in order to embed the mobile information system into the users' machines (personal digital assistants or smart phones). In this study, we randomly select 40 school staff and 100 students to test the intelligent system. Further, the results were compared with those from a conventional school safety system. Forty-two percent of users were satisfied with the conventional safety system and 96% of the users were satisfied with the intelligent mobile system when using personal digital assistants. The software integrity satisfaction was 99.99%; usability satisfaction, 96%; correctness, 95%; and reliability, 95%.

  • chapterNo Access

    DESIGN OF MAGNETIC SWITCHABLE DEVICE (MSD) AND APPLICATIONS IN CLIMBING ROBOT

    A Magnetic Switchable Device (MSD) is a ferromagnetic circuit using permanent magnets where the flux can circulate between different paths when its configuration is changed. This routes or cancels the flux trough specific surfaces, and thus turns on or off adhesion forces. We present classic and innovative magnetic configuration to realize powerful MSD. We designed and prototyped some miniature systems and give their characteristics. Finally various robotics applications for gripper, anchor and climbing robot are unveiled where the MSD solution has proved to be advantageous.

  • chapterNo Access

    Cy-mag3D: A SIMPLE AND MINIATURE CLIMBING ROBOT WITH ADVANCE MOBILITY IN FERROMAGNETIC ENVIRONMENT

    Cy-mag3D is a miniature climbing robot with advanced mobility and magnetic adhesion. It is very compact: a cylindrical shape with 28 mm of diameter and 62 mm of width. Its design is very simple: two wheels, hence two degrees of freedom, and an advanced magnetic circuit. Despite its simplicity, Cy-mag3D has an amazing mobility on ferromagnetic sheets. From an horizontal sheet, it can make transition to almost any intersecting sheet from 10° to 360° – we baptise the last one surface flip. It passes inner and outer straight corners in any almost inclination of the gravity. Cy-mag3D opens new possibilities to use mobile robots for industrial inspection with stringent size limitations, as found in generators. A patent is pending on this system.

  • chapterNo Access

    AN INTRODUCTION INTO ROBOT ORGANISMS BASED ON CoSMO MODULES

    Within this paper, several robot organisms assembled from multiple CoSMO modules are presented. CoSMO is a mobile modular self-reconfigurable robot platform, capable of working autonomously on its own or connected to other modules building a robot organism. The paper provides an introduction of the possibilities and the diversity of the CoSMO platform and the resulting capabilities to solve different tasks depending on the circumstances.

  • chapterNo Access

    Mobile and GIS Framework for Plantations and Nursery (E-Plantations)

    Forests are essential for survival and sustenance of life. Their growth should be optimized so that greater benefits are derived from them. With such a large establishment and geographical base, the monitoring and decision making becomes very critical. The inherent delays hamper the decision process required at a particular time. The increasing area covered by forest plantations creates a demand for trustworthy mechanisms to ensure they are responsibly established and managed. However, most are focused exclusively or prevalently on natural or semi-natural forests, while only a few are specific to planted forests or plantations. The main aim is to assess whether and to what extent planted forests are properly considered within the existing sets of standards/guidelines and to identify areas for improvements, is based on a series of comparative analysis. This paper focus to carry out the full potential of convergence of GIS and Mobile Technology for plantation, with emphasis on technically viable infrastructure solution based on sustainability principles. Integration of GIS and Mobile is being proposed with an objective to enable a single window access to information and services being provided by various formations and to establish a collaborated environment.