Volume 5 Issue 1

Authors: Awais Ahmad; Razi Iqbal; Dawer Saeed

Abstract: Near Field Communication (NFC) is a short-range wireless technology used to transmit data between two devices. In order to transmit data, NFC has three working modes. The card emulation mode has the greatest potential because it allows a smart phone to emulate passive NFC tags and contactless smart cards. Hence, it enables a smart phone to instantly share data with an NFC-enabled by a single tap on the NFC reader. Major applications of the card emulation mode include financial transactions such as purchasing a ticket at bus stop or a cinema hall, etc., so a secure storage space is required to locally store the data. The card emulation mode utilizes a Secure Element (SE) for the secure storage of data, and has no provisions for third party developers to write on this storage. This paper discusses the challenges of implementing card emulation in the Android Operating System for smart phones. Furthermore, emulation of a smart card defined by ISO 7816-4 for multiple application scenarios is discussed. The paper will go into detail regarding the implementation of card emulation mode and how it can help third party applications to read and write to and from SE while maintaining reasonable security.

Keywords: Near Field Communication; Secure Element; Smart Card; Software Card Emulation; Two-way Communication; Short Range Wireless Communication

Doi:10.5963/IJCSAI0501002

Authors: Víctor Hugo Medina García; Jorge Eliecer Posada Pinzón; José Fernando López Quintero

Abstract: This paper presents a comparative analysis of question-and-answers websites, embedded or applied in one of the most relevant models of knowledge management with the aim to appreciate the application of web mining in order to strengthen knowledge. The applied hypothesis s is that it is possible to implement a comprehensive Organizational Knowledge Management System (KMS) based on a Q&A site if properly configured for this purpose. Finally, this paper presents a question-and-answer system architecture based on knowledge management that, in addition to visualizing the structure of its main components, describes the operation of a Q&A system.

Keywords: Q&A Sites; Knowledge Management; Knowledge Management Systems; Web Mining

Doi:10.5963/IJCSAI0501003

Authors: Lunshan (Shaun) GAO

Abstract: This paper describes the derivation of the expected payoff function of polymatrix games according to the induction method. It also presents a new algorithm for calculating mixed Nash equilibrium (NE) in polymatrix games. Results indicate that the new algorithm can compute mixed NEs for polymatrix games within polynomial time. This paper is a continuation result of previous research which describes that the expected payoff function of 2-player games in normal form is identical to the mathematical representation of the fuzzy average of two linguistic values of a linguistic variable; this paper extends the identification of 2-player games to polymatrix games.

Keywords: N-player Non-cooperative Game in Normal Form; Polymatrix Games; Nash Equilibrium; Expected Payoff Function; Fuzzy Average; Linguistic Variables; Triangular Fuzzy Number

Doi:10.5963/IJCSAI0501001

Authors: Hao Chen; Li Pan

Abstract: This study attempts to reduce the hidden danger of Android application installation. Regular methods for detecting malicious software need a great amount of sample data to implement the feature extraction and behavior matching, which makes the detection difficult and complex. We propose an automatic modeling method based on the analysis of the source code to describe the behavior of the application with its components. An attack graph was then drawn to visualize the application framework and elements related safety, with which the users could have a deeper acknowledgment about the hidden danger instead of the fuzzy recognition of the traditional show of permission applied before the installation of the application. The automatic modeling method allows the user to protect their private data with little difficulty, and less complexity than traditional software analysis methods.

Keywords: Android Safety; Component; Attack Graph; Static Analysis; Visualization

Doi:10.5963/IJCSAI0501004