Claim Missing Document
Check
Articles

Found 6 Documents
Search

Near Field Communication Kevin Curran; Amanda Millar; Conor Mc Garvey
International Journal of Electrical and Computer Engineering (IJECE) Vol 2, No 3: June 2012
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (542.713 KB)

Abstract

Near Field Communication (NFC) is a technology that enables a device to communicate with another at a maximum distance of around 20cm or less. Currently, mobile phone manufacturers, banking institutions and mobile network providers are attempting to apply this technology to Smartphones and other handheld devices because of the opportunity to enable the consumer to use commercial services more easily. This paper discusses the expected increase in mobile payments using Near Field Communication, possible uses and the risks associated with carrying out transactions over a wireless network. We also discuss a real world implementation of an NFC based loyalty card system for retail.DOI:http://dx.doi.org/10.11591/ijece.v2i3.234
Indoor Robot Localisation with Active RFID Wei Wei; Kevin Curran
IAES International Journal of Robotics and Automation (IJRA) Vol 1, No 3: September 2012
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (340.764 KB)

Abstract

Radio Frequency Identification (RFID) is a technology of location determination and data capture. An RFID based system relies on the interaction between readers (also known as interrogator) and tags (transponders). Active RFID technology is suitable for tracking costly assets or moving objects such as mobile robots. Once affixed with RFID tags, a robot can be localised. However, there is a tendency for accuracy to vary greatly as well as delay in readings. Those problems may be enlarged in real time applications. This paper provides an overview of implementing RFID in precision tracking of mobile robots.DOI: http://dx.doi.org/10.11591/ijra.v1i3.487
Teaching Java Programming using CABLE in a Collaborative Online Environment Nigel McKelvey; Kevin Curran
International Journal of Evaluation and Research in Education (IJERE) Vol 1, No 1: July 2012
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (95.765 KB)

Abstract

With the emergence and evolution of computer hardware, software and networks - virtual classrooms now exist which enable teachers and students to experience learning activities and to work together at a distance either directly or on a part-time basis. We are increasingly confronted with a need for ‘lifelong training’ and it is becoming increasingly difficult for us to attend physical classrooms on a full-time basis. Research to date has highlighted an area of interest with regard to teaching computer programming in an online environment. We investigate here the use of a Cognitive Apprenticeship-Based Learning Environment (CABLE) in the teaching of Java programming in an attempt to validate its effectiveness. This paper outlines the result of using a pedagogical model which employed a combination of instructional strategies including directive support, responsive cognitive apprenticeship, collaborative learning, stimulating metacognition (organising, motivating (through a “spark”, modifying one’s own skills), and using various technologies via the use of online discussion through Blackboard.DOI: http://dx.doi.org/10.11591/ijere.v1i1.521
Implementing the Payment Card Industry (PCI) Data Security Standard (DSS) Enda Bonner; John O' Raw; Kevin Curran
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 9, No 2: August 2011
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v9i2.709

Abstract

Underpinned by the rise in online criminality, the payment card industry (PCI) data security standards (DSS) were introduced which outlines a subset of the core principals and requirements that must be followed, including precautions relating to the software that processes credit card data. The necessity to implement these requirements in existing software applications can present software owners and developers with a range of issues. We present here a generic solution to the sensitive issue of PCI compliance where aspect orientated programming (AOP) can be applied to meet the requirement of masking the primary account number (PAN).  Our architecture allows a definite amount of code to be added which intercepts all the methods specified in the aspect, regardless of future additions to the system thus reducing the amount of work required to the maintain aspect. We believe that the concepts here will provide an insight into how to approach the PCI requirements to undertake the task. The software artefact should also serve as a guide to developers attempting to implement new applications, where security and design are fundamental elements that should be considered through each phase of the software development lifecycle and not as an afterthought.
Google+ vs Facebook: The Comparison Kevin Curran; Scott Morrison; Stephen Mc Cauley
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 10, No 2: June 2012
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v10i2.814

Abstract

Social networks are a varyingly popular tool used to connect with friends, colleagues and/or family. Recently, Facebook has been at the top of the social network food chain, with Bebo and MySpace decreasing in users and the huge increase of users joining Facebook in such a short time. Google have just recently launched Google+, a social networking site. This is not the first time that Google have attempted to break into the social networking scene but it is possible that these failed attempts may have taught them something. As Facebook’s user base is extremely diverse, spreading across different countries, races, ages, professions, and interests, to name a few, this network is a good model to compare new rival Google+ to. Google+ has set out to do the same things as Facebook but better to try and steal away some of that high power and necessity that Facebook has gained. Facebook has News feed, Google has Stream. Facebook has Lists, Google has circles. Facebook has like’s, Google has +1. Facebook accounts for 10% of overall internet usage. This paper will look at various comparables between the two social networks and analyse the better functionality, design and ease of use. It will then conclude a verdict on which is the better social network to use overall. 
Performance Comparison of Enterprise Applications on Mobile Operating Systems Adrian Mullally; Nigel McKelvey; Kevin Curran
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 9, No 3: December 2011
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v9i3.742

Abstract

Due to the advances in mobile phone technology, Smartphones have the ability to access web services within applications the user interacts with to retrieve and send information from and to web services. As Smartphones have grown in popularity, the utilisation of both new web services and web services already in place will also grow. This paper provides a comparison of the two main types of web services, SOAP and REST.  We evaluate the performance of using SOAP and REST on a smartphone. The tests performed include the time taken to perform a web service call, the RAM used making a web service call and the data transmitted and received while making a web service call.