Computer Technology and Application
Evanthia Faliagka, Petros Karkoulias, Maria Rigou, Spiros Sirmakessis, Giannis Tzimas and Athanasios Tsakalidis
Abstract: Smart phone application development is a very active field for both research and the market domain. This paper investigates the application of ICONIX, a use case driven, object-oriented (OO) analysis and design methodology, for the development of a smart phone personal assistant. It also studies the integration of hand-held haptic devices in daily work activities by evaluating the usability of the application using as basis test scenarios deriving from the identified use cases. The Tennis Coaching Assistant (TCA) is an iPhone application that provides management and scheduling capabilities for tennis coaches and allows a comprehensive overview of the execution of on-court drills and coaching programs. The use of ICONIX made analysis and design keep a sharp focus on user requirements, assured design and coding documentation, fostered an excellent communication among all participants and stake holders and provided the crucial advantage of high reusability in case of implementing the same application for additional smart phone platforms. The paper also describes the usability evaluation methodology applied and documents the results focusing on interaction difficulties and practical obstacles reported by the users as well as suggestions for future versions of the application, which generally received quite positive feedback.
Key words: Tennis coaching assistant, ICONIX methodology, usability evaluation, iPhone application development, Objective-C.
Yulin Chen, Mayu Urata, Katsuhiro Mouri and Takami Yasuda
Abstract: Curators wonder if the research institution¡¯s news can be gathered efficiently, and how past news can be obtained more conveniently. The point is how to use a different perspective to search for news. To immediately read associated news with an easy browsing tool is necessary. This paper proposes a Curatorial Content Management System (CCMS) to structure news management activities for science museum curators. This system represents astronomy news collecting and news organized interactions in a way suitable for both technical oriented implementations and astronomy materials supporting. It is an interactive system that creates an interface between the curator¡¯s knowledge and the information of astronomical expertise. By this option, curators can acquire the information of the distances and quantities of the news. Moreover, the authors analyzed the presented drawbacks of some web-based news browsing environments and describe how the nature of the system can avoid the existing problems upon news implementation.
Key words: Information visualization, content management system, news, knowledge management, astronomy curator.
Jasmin Cosic and Zoran Cosic
Abstract: Life cycle and chain of digital evidence are very important parts of digital investigation process. It is very difficult to maintain and prove chain of custody. Investigators and expert witness must know all details on how the evidence was handled every step of the way. At each stage in life cycle of digital evidence, there is more impact (human, technical and natural) that can violate digital evidence. This paper presents a basic concept of ¡°chain of custody of digital evidence¡± and ¡°life cycle of digital evidence¡±. It will address a phase in life cycle in digital archiving. The authors also warn of certain shortcomings in terms of answering specific questions, and gives same basic definition.
Key words: Digital evidence, digital forensic, chain of custody, digital evidence integrity, life cycle of digital evidence.
Abstract: In public spaces, there are a number of different contents such as visitors, physical information resources, and virtual information resources via their embedded output devices. Therefore, the author might unexpectedly enter the public spaces that have our unauthorized contents and/or unwanted characteristics. The author¡¯s previous papers have introduced the novel concept of ¡°Secure Spaces¡±, physical environments in which any visitor is protected from being pushed her unwanted information resources on and also any information resource is always protected from being accessed by its unauthorized visitors, and the model and architecture for space entry control and information access control based on their dynamically changing contents. Aiming to build more flexible Secure Spaces, this paper proposes an extended model for context-aware query control and search control based on how preferentially a virtual information resource should be outputted in a Secure Space as well as spatial entry control based on whether a virtual information resource should be granted or denied to be outputted in a Secure Space.
Key words: Access control, authorization, authentication, context-awareness, web search.
Jie Xu, Ping-yu Chen, Scott Uglow, Alison Scott and Enid Montague
Abstract: Many diseases and health risks are the result of unhealthy lifestyles and technology could be used as an intervention. However, designing healthy lifestyle technologies is challenging, as the technology should be able to influence user behavior. In this case study, the design and evaluation process of a persuasive healthy lifestyle assistance technology was investigated. The iterative design and evaluation process included: contextual inquiry, storyboarding, concept generation, paper prototyping, video prototyping, interactive prototyping and user testing. Several design challenges are identified and guidelines are described for designing a technological intervention to encourage healthy lifestyles.
Key words: Persuasive technology, case study, lifestyle, health, wellness.
Schreiber Peter, Bartunek Marian and Moravcik Oliver
Abstract: Rapid development in the field of computer technology enables tests that are progressively more accurate and extensive in the simulations of processes by specialized software. In the field of the automotive industry, the simulations have a wide application. Development of assistance systems is directed towards isolated systems in cars. This is problematic and this slower method is defined by the standards of road danger zones and special markings which are directly designed for the assistance systems, these could then be implemented into cars. The intention of this paper is to describe a simulation for finding the safety distance between two cars on different surfaces which can be used by Pre-crash Braking-control of ACC system. Simulation is provided not only for different surfaces but also for changes between them, changes of a surface gradient and the speed of the cars. The results of the simulation are centered around the cars safety distance. Moreover, the authors propose a solution for the elimination of accidents on road danger zones and railway crossings with special markings and an adapted assistance system.
Key words: Safety, braking distance, braking force, adhesion, simulation.
Hiroki Takada, Masaru Miyao, Masumi Takada, Yasuyuki Matsuura and Tetsuya Yamamoto
Abstract: Recent progress in 3D technology depends greatly on computer innovation. Three-dimensional (3-D) television sets are already available in the market, and they are becoming increasingly popular among consumers. However, asthenopia and motion sickness are potential adverse effects of 3-D movies. Visually induced motion sickness (VIMS) is caused by sensory conflict, i.e., the disagreement between vergence and visual accommodation while viewing stereoscopic images. VIMS can be analyzed subjective and physiologically. The objective of this study is to develop a method for detecting VIMS. The authors quantitatively measured head acceleration and body sway during exposure to a two-dimensional (2-D) image and conventional three-dimensional (3-D) movie. The subjects wore head-mounted displays (HMDs), and they maintained the Romberg posture for the first 60 s and a wide stance (midlines of the heels 20 cm apart) for the next 60 s. Head acceleration was measured using an active tracer at a sampling frequency of 50 Hz. The Simulator Sickness Questionnaire (SSQ) was completed immediately afterward. Statistical analysis was applied to the SSQ subscores and to each index for stabilograms. Transfer function analysis indicates that the acceleration of the head in the anterior-posterior direction while watching a 3-D movie can affect lateral body sway, thereby causing VIMS.
Key words: Visually induced motion sickness, stabilometry, sparse density (SPD), head acceleration, transfer function analysis.
Ahmed Moussa, Brigitte Vannier and Mounir Maouene
Abstract: This paper proposes the authors¡¯ algorithm for gene selection in microarray data analysis comparing conditions with replicates. Based on background noise computation in replicated arrays, this algorithm uses the global False Discovery Rate based on ¡®Inter¡¯ and ¡®Intra¡¯ group comparisons of replicates to select differential expressed gene sets. This method uses two statistic types that lead to improve the selection procedure when confronted to very high background noise. Using simulated and the well known Latin square datasets, the proposed method is compared to some well known algorithms.
Key words: Microarray data analysis, gene selection, replicates, false discovery rate, inter and intra group comparisons.
Ilya A. Mukhin, Zoya V. Puschina, Oleg A. Strikov, Sang Bae Lee, Mikhail P. Levin, Tian Feng and
Abstract: Nowadays multi-core processor platforms are widely used even in embedded devices. Providing debugging of multi-threaded embedded software is a more complicated problem in comparison with usual desktop platforms due to embedded platforms limitations. Embedded resources are enough to perform only pre-defined set of applications, but not for debugging. Most of all known debugging solutions for parallel applications are intended for desktops or high-performance computers, but not for embedded systems. Another problem is that most of debugging solutions don¡¯t give any information on a system-wide application behavior. To solve these problems and help developers to debug their multi-threaded embedded applications is a subject of Thread Visualizer. This tool was developed in Samsung Research Center in Moscow and Samsung Advanced Institute of Technology. Thread Visualizer supports based on ARM architecture platforms and Linux OS.
Key words: Debug, multi-thread, embedded, stack, unwinding.
Pavel Važan, Pavol Tanuška, Gabriela Križanov¨¢ and J¨²lia Kurn¨¢tov¨¢
Abstract: The paper is a contribution to more effective using of simulation optimization. The paper presents the results of the comparison study of selected algorithms of simulation optimization. The authors have tested several algorithms on various simulation models. The simulation models of systems were created in simulator Witness. The main goal was to give the general procedure for effective usage of simulation optimization. The authors point out that the realization of simulation optimization is a compromise between acceptable time and accuracy of found solution. The final procedure involves the process of selection of algorithm, input variables, their set up of range and step selection. The proposal of the authors has already been realized and has brought significant time reduction.
Key words: Simulation, optimization, model, algorithm.
Jiunn-Woei Lian, Hao-Ming Liu and I-Lin Liu
Abstract: There exists a gap between the number of Internet and electronic commerce (EC) user. Previous researches attempt to explore the factors that will affect user acceptance of online shopping, in order to increase the EC market. However, this study insists that for those users who known but never (rarely) use EC services, it is important to understand the reasons of why they refuse to use. Innovation resistance theory is employed in this study to understand this issue. Besides, previous studies indicated that different product types will influence the relationship between factors and user intention in various degrees in the context of online shopping. Therefore, the purpose of this research attempts to integrate innovation resistance theory and product types to explore the moderating effect of different product types. The result indicates that value and image barriers are critical factors for user refused to shop online. The authors also find that ¡°intangible and information products¡± have more strong moderating influence than ¡°tangible and physical products¡± between usage barriers/value barriers and intention to use.
Key words: Innovation resistance theory, online shopping, moderating effect, different product types.
Abdul Hafeez-Baig and Raj Gururajan
Abstract: The use of wireless technologies is not new in healthcare. For many years dental chairs and other ophthalmic instruments were communicating patient information to other devices. With the advent of wireless networks, the handheld devices and integration of real time data from medical devices to computer networks is made more simply. In addition to improving patient care, the wireless infrastructure has improved healthcare management, including bed management, billing and pharmaceuticals. While the wireless infrastructure appears to be picking up in developed countries, developing countries such as Pakistan are also embracing these technologies in healthcare for a number of reasons. While private healthcare agencies can afford these technologies in Pakistan, the overall awareness of properly using these technologies and associated benefits appears be relatively low in Pakistan. In order to understand those factors that influence the use of wireless technology, a study was commissioned by this team. A total of 300 physicians were approached for filling in a survey, with 97 usable surveys received. Data analysis clearly shows that physicians are particular about usefulness and outcomes offered by the technology as major determinants. The outcomes reported are quite different from many other studies that reported outcomes in terms of ease of use. This is reported in this study.
Key words: Pakistani healthcare systems, adoption of wireless, use of wireless technology, PDAs, handheld computers.
This is Computer Technology and Application (Print ISSN: 1934-7332; Online ISSN: 1934-7340, USA), an international academic journal published monthly across the United States by David Publishing Company. Its topics include computer science and engineering in general, bio-science, image sciences, signal sciences, mathematical sciences, social and management sciences, nano sciences, intelligent systems, ubiquitous computing, etc.
It welcomes the submission of original manuscripts reporting innovations or investigations related to these topics.
It also seeks researchers who have deep research in and outstanding contribution to Computer Technology and Application area to be our reviewers/editors. If you are interested in the journals, please send us your CV.
Information for Authors
1. The manuscript should be original, and has not been published previously. Do not submit material that is currently being considered by another journal.
2. The manuscript should be written in English, and it may be 3000-10000 words or longer if approved by the editor, including an abstract, texts, tables, footnotes, appendixes, and references. The title should be on page 1 and not exceed 15 words, and should be followed by an abstract of 150 ¨C 300 words. 3-5 keywords or key phrases are required.
3. The manuscript should be in MS Word format, submitted as an email attachment to our email address.
4. Authors of the articles being accepted are required to sign the Transfer of Copyright Agreement form.
5. Author will receive 2copies of the issue of the journal containing their article.
6. The author will be charged a service fee incurred in reviewing, editing and printing. The flat price is USD 60 per page.
Peer Review Policy
CTA is the refereed journal. All research articles in the journal undergo rigorous peer review, based on initial editor screening and anonymous refereeing by at least two anonymous referees.
All papers considered appropriate for the journal is reviewed anonymously by at least two outside reviewers. The review process usually takes four to five weeks. Papers are accepted for publication subject to no substantive, stylistic editing. The Editor reserves the right to make any necessary changes in the papers, or request the author to do so, or reject the paper submitted. A copy of the edited paper along with the first proofs will be sent to the author for proofreading. They should be corrected and returned to the Editor within seven days. Once the final version of the paper has been accepted, authors are requested not to make further changes to the text.
Submission of Manuscript
All manuscripts submitted will be considered for publication. The Manuscripts can be sent online (http://www.davidpublishing.com/submission_online.asp) or as an email attachment to: email@example.com; firstname.lastname@example.org; email@example.com; firstname.lastname@example.org.
Computer Technology and Application
Tel: 1-323-984-7526; 1-323-410-1082 Fax: 1-323-984-7374; 1-323-908-0457355
¡ï Cabell¡¯s Directory, USA
¡ï Chinese Database of CEPS, American Federal Computer Library Center (OCLC), USA
¡ï Chinese Scientific Journals Database, VIP Corporation, Chongqing, China
¡ï Database of EBSCO, Massachusetts, USA
¡ï Index Copernicus, Poland
¡ï Norwegian Social Science Data Services (NSD), Norway
¡ï ProQuest/CSA Technology Research Database, USA
¡ï Summon Serials Solutions
¡ï Ulrich¡¯s International Periodicals Directory, USA
¡ï Google Scholar
¡ï Electronic Journals Library
¡ï CiteFactor (USA)
¡ï Scientific Indexing Services
¡ï INNO SPACE