Skip to content

Advertisement

Articles

Sort by
Page 1 of 8
  1. Content type: Research

    In wireless sensor networks, the high density of node’s distribution will result in transmission collision and energy dissipation of redundant data. To resolve the above problems, an energy-efficient sleep sch...

    Authors: Runze Wan, Naixue Xiong and Nguyen The Loc

    Citation: Human-centric Computing and Information Sciences 2018 8:18

    Published on:

  2. Content type: Research

    The cognitive radio relay plays a vital role in cognitive radio networking (CRN), as it can improve the cognitive sum rate, extend the coverage, and improve the spectral efficiency. However, cognitive relay ai...

    Authors: Md Sipon Miah, Michael Schukat and Enda Barrett

    Citation: Human-centric Computing and Information Sciences 2018 8:16

    Published on:

  3. Content type: Research

    In the age of big data, plenty of valuable sensing data have been shared to enhance scientific innovation. However, this may cause unexpected privacy leakage. Although numerous privacy preservation techniques,...

    Authors: Fengjun Xiao, Mingming Lu, Ying Zhao, Soumia Menasria, Dan Meng, Shangsheng Xie, Juncai Li and Chengzhi Li

    Citation: Human-centric Computing and Information Sciences 2018 8:13

    Published on:

  4. Content type: Research

    The recent advances in information technology for mobile devices have increased the work efficiency of users, the mobility of compact mobile devices, and the convenience of location independence. However, mobi...

    Authors: Hyun-Woo Kim and Young-Sik Jeong

    Citation: Human-centric Computing and Information Sciences 2018 8:11

    Published on:

  5. Content type: Research

    Sentiment analysis is about the classification of sentiments expressed in review documents. In order to improve the classification accuracy, feature selection methods are often used to rank features so that no...

    Authors: Tuba Parlar, Selma Ayşe Özel and Fei Song

    Citation: Human-centric Computing and Information Sciences 2018 8:10

    Published on:

  6. Content type: Research

    The development of a novel depth-data based real-time obstacle detection and avoidance application for visually impaired (VI) individuals to assist them in navigating independently in indoors environments is p...

    Authors: Rabia Jafri and Marwa Mahmoud Khan

    Citation: Human-centric Computing and Information Sciences 2018 8:14

    Published on:

  7. Content type: Research

    Different approaches have been used to estimate language models from a given corpus. Recently, researchers have used different neural network architectures to estimate the language models from a given corpus u...

    Authors: Hatem M. Noaman, Shahenda S. Sarhan and Mohsen. A. A. Rashwan

    Citation: Human-centric Computing and Information Sciences 2018 8:12

    Published on:

  8. Content type: Research

    The rapidly increasing pervasiveness and integration of computers in human society calls for a broad discipline under which this development can be studied. We argue that to design and use technology one needs...

    Authors: Tore Pedersen, Christian Johansen and Audun Jøsang

    Citation: Human-centric Computing and Information Sciences 2018 8:7

    Published on:

  9. Content type: Research

    Drawing on a 1-year application design, implementation and evaluation experience, this paper examines how engaging users in the early design phases of a software application is tightly bound to the success of ...

    Authors: Silvia Mirri, Marco Roccetti and Paola Salomoni

    Citation: Human-centric Computing and Information Sciences 2018 8:6

    Published on:

  10. Content type: Research

    Social engineering is a growing source of information security concern. Exploits appear to evolve, with increasing levels of sophistication, in order to target multiple victims. Despite increased concern with ...

    Authors: Samar Muslah Albladi and George R. S. Weir

    Citation: Human-centric Computing and Information Sciences 2018 8:5

    Published on:

  11. Content type: Research

    The greediness of multimedia applications in terms of their bandwidth demands calls for new and efficient network traffic control mechanisms, especially in wireless networks where the bandwidth is limited. In ...

    Authors: Orestis-Stavros Loizides, Marios Kastrinakis, Ghada Badawy, Mohammed N. Smadi, David Murray and Polychronis Koutsakis

    Citation: Human-centric Computing and Information Sciences 2018 8:4

    Published on:

  12. Content type: Review

    Smart grid is an emerging research field of the current decade. The distinguished features of the smart grid are monitoring capability with data integration, advanced analysis to support system control, enhanc...

    Authors: Zahoor Uddin, Ayaz Ahmad, Aamir Qamar and Muhammad Altaf

    Citation: Human-centric Computing and Information Sciences 2018 8:2

    Published on:

  13. Content type: Research

    Cloud computing is the driving power behind the current technological era. Virtualization is rightly referred to as the backbone of cloud computing. Impacts of virtualization employed in high performance compu...

    Authors: John Paul Martin, A. Kandasamy and K. Chandrasekaran

    Citation: Human-centric Computing and Information Sciences 2018 8:1

    Published on:

  14. Content type: Research

    In many co-located, collaborative systems there is a need for the constituent devices used to be aware of the physical positions of their networked counterparts. This paper addresses this challenge by presenti...

    Authors: James McNaughton, Tom Crick and Andrew Hatch

    Citation: Human-centric Computing and Information Sciences 2017 7:37

    Published on:

  15. Content type: Research

    Words and phrases bespeak the perspectives of people about products, services, governments and events on social media. Extricating positive or negative polarities from social media text denominates task of sen...

    Authors: Jaspreet Singh, Gurvinder Singh and Rajinder Singh

    Citation: Human-centric Computing and Information Sciences 2017 7:32

    Published on:

  16. Content type: Review

    Health monitoring using biomedical sensors has witnessed significant attention in recent past due to the evolution of a new research area in sensor network known as Wireless Body Area Networks (WBANs). In WBAN...

    Authors: Fasee Ullah, Abdul Hanan Abdullah, Omprakash Kaiwartya, Sushil Kumar and Marina Md. Arshad

    Citation: Human-centric Computing and Information Sciences 2017 7:34

    Published on:

  17. Content type: Research

    When recognizing a specific object in an image captured by a camera, we extract local descriptors to compare it with or try direct comparison of images through learning methods using convolutional neural netwo...

    Authors: Kyung-Mo Koo and Eui-Young Cha

    Citation: Human-centric Computing and Information Sciences 2017 7:33

    Published on:

  18. Content type: Research

    While prior research has examined the effects of interactive e-commerce avatars that simulate the roles of virtual assistants and recommender agents, there is lack of empirical study that investigates the effe...

    Authors: Tze Wei Liew, Su-Mae Tan and Hishamuddin Ismail

    Citation: Human-centric Computing and Information Sciences 2017 7:42

    Published on:

  19. Content type: Research

    This study was conducted with the objective of implementing a smart IoT (internet of things) factory consisting of an automatic 6-year-old fresh ginseng grade classification device. Conventionally, washed 6-ye...

    Authors: Seokhoon Jeong, Yong-Min Lee and Sangjoon Lee

    Citation: Human-centric Computing and Information Sciences 2017 7:41

    Published on:

Page 1 of 8