Showing papers in "Computer Standards & Interfaces in 2020"
••
TL;DR: This paper provides more details and offers a thorough investigation concerning UAV communication protocols, networking systems, architectures, and applications as well as highlighting important technical challenges and open research issues requiring further studies and R&D work.
84 citations
••
TL;DR: This paper takes into account legal aspects such as GDPR and it extends the Healthcare Industry architecture reference model, with a set of tools dealing with consent management and data hiding tools.
61 citations
••
TL;DR: It is concluded that a gap exists in normative frameworks that affect the adoption and sustainable use of blockchain technology and closing this gap can support the sustainable useof blockchain technology.
54 citations
••
TL;DR: The results obtained by empirical evaluation indicate that Requengin could potentially contribute to an improvement in students’ acquisition of knowledge about ISO/IEC/IEEE 29148:2011, while also improving levels of motivation.
45 citations
••
TL;DR: An architecture for processing and analysing data from heterogeneous sources with different structures in IoT scopes is provided, allowing researchers to focus on data analysis, without having to worry about the structure of the data sources.
44 citations
••
TL;DR: The results show that the newly proposed requirements prioritization methods tend to use as basis fuzzy logic and machine learning algorithms, which means that the Analytical Hierarchy Process is the most accurate and extensively used requirement prioritization method in industry.
44 citations
••
TL;DR: The paper provides an overview of fundamental concepts in factory communication systems focusing on prevalent wireless and wirebound communication protocols and standards, and research challenges in next generation industrial networks are also taken into account.
41 citations
••
TL;DR: This is the first systematic review to comprehensively synthesise and summarise empirical evidence from disparate CRM research data (quantitative, qualitative, and mixed) in the healthcare environment and revealed that substantial gaps exist in the knowledge of using CRM in the Healthcare environment.
36 citations
••
TL;DR: A systematic literature review in the field of software risk is carried out in an attempt to characterize and present the state of the art of this field, identifying gaps and opportunities for further research.
27 citations
••
TL;DR: The aim of this study is to analyze how modelers build UML models and how good modeling tools are in supporting this task, and to draw some useful lessons that help to improve the (UML) modeling process both by recommending changes on the tools themselves and on how UML is taught.
27 citations
••
TL;DR: This work proposes a novel metamorphic malware identification method, named HLES-MMI (Higher-level Engine Signature based Metamorphic Malware Identification), which firstly constructs a unique graph structure, called as co-opcode graph, for each meetamorphic family, then extracts engine-specific opcode patterns from the graphs.
••
TL;DR: The proportion of trustworthy Facebook fans who post regularly in early and future popularity has been analyzed linearly using PSTIR and SFIBS methods to forecast the popularity of online content reliably in the future.
••
TL;DR: It is concluded that SPSM continues to be a topic that is very much addressed by the scientific community, but each contribution has been proposed with particular goals and it seems that it is strengthening its position among research community in recent years to design new approaches.
••
TL;DR: This research article focuses on the performance and redistribution of different routing protocols in medium or enterprise IP networks, where EIGRP is better in convergence and through put whereas OSPF isbetter in packet delay.
••
TL;DR: The results indicate that the relationship between trust in commodity information and online purchase is mediated by perceived value, which is a valuable reference for professionals working in B2B e-marketplaces.
••
TL;DR: As density increases, DP-AODV shows decrease in delay than AODV and offering better performance for highly populated networks exceeding 200 nodes, and shortening end-to-end delay in medium to high density conditions.
••
TL;DR: An integrated method for safety and security requirements engineering for CPSs at the design stage of the system lifecycle is proposed and its use to the most vulnerable CPSs on board the Cyber-Enabled Ship (C-ES) is demonstrated.
••
TL;DR: Performance results show that utilizing HARQ-II error control scheme for Mica2 and BCH(31,21,5) for Telos improves the network lifetime while meeting the desired application reliability rate.
••
TL;DR: Through a comprehensive simulation-based study, the results show that the proposed NDSA protocol outperformed the random and serialized approaches to neighbor discovery in terms of discovery latency while significantly minimizing the communication overhead.
••
TL;DR: An effort to improve the quality of processes and products by the definition of the foundations of Maintenance Management Systems based on ISO standards that could help companies to strength the organization of work is presented.
••
TL;DR: This paper solves the web condition parameter sparsity problem, uses the k-means clustering method to aggregate past invocation data, incorporates user, service, and web condition parameters to build a reliability feedback matrix, and predicts web service reliability by considering specific web condition environments.
••
TL;DR: An approach to publish statistical data from public repositories by using Semantic Web standards published by the W3C, such as RDF and SPARQL, in order to facilitate the analysis of multidimensional models.
••
TL;DR: This paper presents a solution for the component-wise migration of cloud applications, which relies on the three key ingredients of the trans-cloud approach: A CAMP-based unified API, TOSCA-based agnostic topology descriptions, and mechanisms for the independent specification of target service locations.
••
TL;DR: A new approach to multi-level modelling is proposed that embeds multiple meta-levels within one meta-model, and a tool is proposed – called TOTEM – which implements these concepts.
••
TL;DR: The results indicate that the guidelines considered essential and those most applied by web developers without training have something in common.
••
TL;DR: This research analyses how by defining and monitoring a set of Agile metrics, Agile mature companies can be also conformant with the best practices proposed by the targeted ISO process reference models.
••
TL;DR: This work proposes an artificial-intelligence-based process for generating educational mobile apps from freehand-generated images, based on User Interface Design Pattern (UIDP) representations, and introduces EduMatic, an application development tool.
••
TL;DR: This paper proposes a general framework which allows system designers to decouple functional and non- functional concerns, and express non-functional properties at design time using domain-specific languages, and in the spirit of generative programming, functional models are automatically "augmented" with dependability mechanisms.
••
TL;DR: The main goal of this paper is to investigate if the inclusion of Non functional parameters imposes an effect on the functional size of mobile application development.
••
TL;DR: The goal of this paper is to propose a Software Defined Optical Networks Slicing Architecture (SONA) extension (eSONA).