Skip to main content

Advertisement

Articles

Page 1 of 5

  1. Content type: Correction

    In the original publication of this article [1], the Acknowledgements and Funding section in Declarations need to be revised.

    Authors: Shakeel Ahmad, Muhammad Zubair Asghar, Fahad M. Alotaibi and Irfanullah Awan

    Citation: Human-centric Computing and Information Sciences 2019 9:27

    Published on:

    The original article was published in Human-centric Computing and Information Sciences 2019 9:24

  2. Content type: Research

    Group key agreement protocol permits a set of users to create a common key to make sure security of information exchange among members of the group. It is extensively used in secure multiparty computation, res...

    Authors: Vankamamidi S. Naresh, Sivaranjani Reddi and Nistala V. E. S. Murthy

    Citation: Human-centric Computing and Information Sciences 2019 9:26

    Published on:

  3. Content type: Research

    Identification and classification of extremist-related tweets is a hot issue. Extremist gangs have been involved in using social media sites like Facebook and Twitter for propagating their ideology and recruit...

    Authors: Shakeel Ahmad, Muhammad Zubair Asghar, Fahad M. Alotaibi and Irfanullah Awan

    Citation: Human-centric Computing and Information Sciences 2019 9:24

    Published on:

    The Correction to this article has been published in Human-centric Computing and Information Sciences 2019 9:27

  4. Content type: Research

    Constructing an ontology-based machine-readable knowledge base system from different sources with minimum human intervention, also known as ontology-based machine-readable knowledge base construction (OMRKBC),...

    Authors: Shirin Akther Khanam, Fei Liu and Yi-Ping Phoebe Chen

    Citation: Human-centric Computing and Information Sciences 2019 9:23

    Published on:

  5. Content type: Research

    The spectrum sensing performance depends on the accuracy of the detection about whether primary users are busy or idle. Previous studies on cognitive radio spectrum sensing have shown that the cooperation betw...

    Authors: Runze Wan, Lixin Ding, Naixue Xiong, Wanneng Shu and Li Yang

    Citation: Human-centric Computing and Information Sciences 2019 9:22

    Published on:

  6. Content type: Research

    Internet of Things (IoT) creates a world where smart objects and services interacting autonomously. Taking into account the dynamic-heterogeneous characteristic of interconnected devices in IoT, demand for a t...

    Authors: Venus Mohammadi, Amir Masoud Rahmani, Aso Mohammed Darwesh and Amir Sahafi

    Citation: Human-centric Computing and Information Sciences 2019 9:21

    Published on:

  7. Content type: Research

    In wireless sensor networks (WSNs), sensor devices must be equipped with the capabilities of sensing, computation and communication. These devices work continuously through non-rechargeable batteries under har...

    Authors: Jin Wang, Xiujian Gu, Wei Liu, Arun Kumar Sangaiah and Hye-Jin Kim

    Citation: Human-centric Computing and Information Sciences 2019 9:18

    Published on:

  8. Content type: Research

    Ground segmentation is an important step for any autonomous and remote-controlled systems. After separating ground and nonground parts, many works such as object tracking and 3D reconstruction can be performed...

    Authors: Phuong Minh Chu, Seoungjae Cho, Jisun Park, Simon Fong and Kyungeun Cho

    Citation: Human-centric Computing and Information Sciences 2019 9:17

    Published on:

  9. Content type: Research

    Software defined networking (SDN) is becoming more and more popular due to its key features, such as monitoring, fine-grained control, flexibility and scalability. The centralized control of SDN makes it vulne...

    Authors: Muhammad Imran, Muhammad Hanif Durad, Farrukh Aslam Khan and Abdelouahid Derhab

    Citation: Human-centric Computing and Information Sciences 2019 9:16

    Published on:

  10. Content type: Research

    The threat to critical water system infrastructure has increased in recent years as is evident from the increasing number of reported attacks against these systems. Preventative security mechanisms are often n...

    Authors: Daniel T. Ramotsoela, Gerhard P. Hancke and Adnan M. Abu-Mahfouz

    Citation: Human-centric Computing and Information Sciences 2019 9:13

    Published on:

  11. Content type: Research

    In data center companies, cloud computing can host multiple types of heterogeneous virtual machines (VMs) and provide many features, including flexibility, security, support, and even better maintenance than t...

    Authors: Shayem Saleh Alresheedi, Songfeng Lu, Mohamed Abd Elaziz and Ahmed A. Ewees

    Citation: Human-centric Computing and Information Sciences 2019 9:15

    Published on:

  12. Content type: Research

    With the rapid development of networks and Information technologies, cloud computing is not only becoming popular, the types of cloud services available are also increasing. Through cloud services, users can u...

    Authors: Chao-Tung Yang, Shuo-Tsung Chen, Yu-Wei Chan and Yu-Chuan Shen

    Citation: Human-centric Computing and Information Sciences 2019 9:12

    Published on:

  13. Content type: Correction

    In the original publication of this article [1], some labels in the left column are incorrect in Fig. 3. They are revised in the updated figure below:

    Authors: Phil Legg, Jim Smith and Alexander Downing

    Citation: Human-centric Computing and Information Sciences 2019 9:11

    Published on:

    The original article was published in Human-centric Computing and Information Sciences 2019 9:5

  14. Content type: Research

    Case-based reasoning (CBR) is a nature inspired paradigm of machine learning capable to continuously learn from the past experience. Each newly solved problem and its corresponding solution is retained in its ...

    Authors: Malik Jahan Khan, Hussain Hayat and Irfan Awan

    Citation: Human-centric Computing and Information Sciences 2019 9:9

    Published on:

  15. Content type: Research

    Today the key technology of high-performance computing systems is the emergence of interconnect technology that makes multiple computers into one computer cluster. This technique is a general method in which e...

    Authors: Cheol Shim, Rupali Shinde and Min Choi

    Citation: Human-centric Computing and Information Sciences 2019 9:10

    Published on:

  16. Content type: Research

    Leap Motion has become widely used due to its ability to recognize intuitive hand gestures or accurate finger positions. Attaching a Leap Motion to a virtual reality head-mounted display (VR HMD) is highly int...

    Authors: San Park, Seoungjae Cho, Jisun Park, Kaisi Huang, Yunsick Sung and Kyungeun Cho

    Citation: Human-centric Computing and Information Sciences 2019 9:8

    Published on:

  17. Content type: Research

    The main down-top attention model usually uses some characteristics of audio signal to extract the auditory saliency map at present. But existing audio attention computational model based image saliency mostly...

    Authors: Yu Liu, Cong Zhang, Bo Hang, Song Wang and Han-Chieh Chao

    Citation: Human-centric Computing and Information Sciences 2019 9:7

    Published on:

  18. Content type: Research

    Various technologies such as WiFi, Bluetooth, and RFID are being used to provide indoor location-based services (LBS). In particular, a WiFi base using a WiFi AP already installed in an indoor space is widely ...

    Authors: Sunmin Lee, Jinah Kim and Nammee Moon

    Citation: Human-centric Computing and Information Sciences 2019 9:6

    Published on:

  19. Content type: Research

    Active machine learning is a human-centric paradigm that leverages a small labelled dataset to build an initial weak classifier, that can then be improved over time through human-machine collaboration. As new ...

    Authors: Phil Legg, Jim Smith and Alexander Downing

    Citation: Human-centric Computing and Information Sciences 2019 9:5

    Published on:

    The Correction to this article has been published in Human-centric Computing and Information Sciences 2019 9:11

  20. Content type: Research

    Model checking is an influential method to verify complex interactions, concurrent and distributed systems. Model checking constructs a behavioral model of the system using formal concepts such as operations, ...

    Authors: Alireza Souri, Amir Masoud Rahmani, Nima Jafari Navimipour and Reza Rezaei

    Citation: Human-centric Computing and Information Sciences 2019 9:4

    Published on:

  21. Content type: Research

    With the deeper study on complex networks, more and more attention has been paid to the research on the cluster synchronization phenomena based on complex networks. In the real world, synchronization phenomena...

    Authors: Tinggui Chen, Jiawen Shi, Jianjun Yang and Gongfa Li

    Citation: Human-centric Computing and Information Sciences 2019 9:3

    Published on:

  22. Content type: Research

    The amount of movie has increased to become more congested; therefore, to find a movie what users are looking for through the existing technologies are very hard. For this reason, the users want a system that ...

    Authors: Phonexay Vilakone, Doo-Soon Park, Khamphaphone Xinchang and Fei Hao

    Citation: Human-centric Computing and Information Sciences 2018 8:38

    Published on:

  23. Content type: Research

    Based on the stimulus-organism-reaction model, we study the direct effects of the three interpersonal attraction factors (perceived similarity, perceived familiarity, and perceived expertise) on purchase inten...

    Authors: Yaqin Liu, Xinxing Luo and Yi Cao

    Citation: Human-centric Computing and Information Sciences 2018 8:37

    Published on:

  24. Content type: Research

    This paper investigates various structures of neural network models and various types of stacked ensembles for singing voice detection. The studied models include convolutional neural networks (CNN), long shor...

    Authors: Shingchern D. You, Chien-Hung Liu and Woei-Kae Chen

    Citation: Human-centric Computing and Information Sciences 2018 8:34

    Published on:

  25. Content type: Review

    3D face recognition has become a trending research direction in both industry and academia. It inherits advantages from traditional 2D face recognition, such as the natural recognition process and a wide range...

    Authors: Song Zhou and Sheng Xiao

    Citation: Human-centric Computing and Information Sciences 2018 8:35

    Published on:

  26. Content type: Research

    In this paper, we report an effective facial expression recognition system for classifying six or seven basic expressions accurately. Instead of using the whole face region, we define three kinds of active reg...

    Authors: Ai Sun, Yingjian Li, Yueh-Min Huang, Qiong Li and Guangming Lu

    Citation: Human-centric Computing and Information Sciences 2018 8:33

    Published on:

  27. Content type: Research

    Virtual reality technologies (VR) have advanced rapidly in the last few years. Prime examples include the Oculus RIFT and HTC Vive that are both head-worn/mounted displays (HMDs). VR HMDs enable a sense of imm...

    Authors: Vijayakumar Nanjappan, Hai-Ning Liang, Feiyu Lu, Konstantinos Papangelis, Yong Yue and Ka Lok Man

    Citation: Human-centric Computing and Information Sciences 2018 8:31

    Published on:

  28. Content type: Research

    Emerging technological advances in wireless communication and networking have led to the design of large scale networks and small sensor units with minimal power requirements and multifunctional processing. Th...

    Authors: Hana Rhim, Karim Tamine, Ryma Abassi, Damien Sauveron and Sihem Guemara

    Citation: Human-centric Computing and Information Sciences 2018 8:30

    Published on:

  29. Content type: Research

    Due to object recognition accuracy limitations, unmanned ground vehicles (UGVs) must perceive their environments for local path planning and object avoidance. To gather high-precision information about the UGV...

    Authors: Wei Song, Shuanghui Zou, Yifei Tian, Simon Fong and Kyungeun Cho

    Citation: Human-centric Computing and Information Sciences 2018 8:29

    Published on:

  30. Content type: Research

    This article describes the design and verification of the indirect method of predicting the course of CO2 concentration (ppm) from the measured temperature variables Tindoor (°C) and the relative humidity rHindoo...

    Authors: Jan Vanus, Jaroslav Machac, Radek Martinek, Petr Bilik, Jan Zidek, Jan Nedoma and Michal Fajkus

    Citation: Human-centric Computing and Information Sciences 2018 8:28

    Published on:

  31. Content type: Research

    Research and education through computer simulation has been actively conducted in various scientific and engineering fields including computational science engineering. Accordingly, there have been a lot of at...

    Authors: Young-Kyoon Suh and Ki Yong Lee

    Citation: Human-centric Computing and Information Sciences 2018 8:27

    Published on:

  32. Content type: Research

    Efficient resource management in dynamic cloud computing is receiving more and more attentions. Many works are still ongoing, since federated cloud computing is an open environment. We present in this paper a ...

    Authors: Sofiane Kemchi, Abdelhafid Zitouni and Mahieddine Djoudi

    Citation: Human-centric Computing and Information Sciences 2018 8:26

    Published on:

  33. Content type: Research

    Online social networks have become demanded ways for users to show themselves and connect and share information with each other among these social networks. Facebook is the most popular social network. Persona...

    Authors: Alireza Souri, Shafigheh Hosseinpour and Amir Masoud Rahmani

    Citation: Human-centric Computing and Information Sciences 2018 8:24

    Published on:

  34. Content type: Research

    In the new era of the Internet of Things (IoT), all information related to the environment, things and humans is connected to networks. Humans, too, can be considered an integral part of the IoT ecosystem. The...

    Authors: Pradip Kumar Sharma, Jung Hyun Ryu, Kyung Yeob Park, Jin Ho Park and Jong Hyuk Park

    Citation: Human-centric Computing and Information Sciences 2018 8:23

    Published on:

  35. Content type: Research

    In recent years, situation awareness has been recognised as a critical part of effective decision making, in particular for crisis management. One way to extract value and allow for better situation awareness ...

    Authors: Charlie Kingston, Jason R. C. Nurse, Ioannis Agrafiotis and Andrew Burke Milich

    Citation: Human-centric Computing and Information Sciences 2018 8:22

    Published on:

  36. Content type: Research

    Each software application running on Android powered devices consists of application components that communicate with each other to support application’s functionality for enhanced user experience of mobile co...

    Authors: Wilayat Khan, Habib Ullah, Aakash Ahmad, Khalid Sultan, Abdullah J. Alzahrani, Sultan Daud Khan, Mohammad Alhumaid and Sultan Abdulaziz

    Citation: Human-centric Computing and Information Sciences 2018 8:21

    Published on:

  37. Content type: Research

    Reliability and high availability have always been a major concern in distributed systems. Providing highly available and reliable services in cloud computing is essential for maintaining customer confidence a...

    Authors: Mohammad Reza Mesbahi, Amir Masoud Rahmani and Mehdi Hosseinzadeh

    Citation: Human-centric Computing and Information Sciences 2018 8:20

    Published on:

  38. Content type: Research

    For better life, medical and IT technology are converging and data plays a key role in this convergence. Data in the medical field is information about humans, and these data are sensitive. Because this type o...

    Authors: Jaedong Lee, Jipmin Jung, Phillip Park, Seunghyun Chung and Hyosoung Cha

    Citation: Human-centric Computing and Information Sciences 2018 8:19

    Published on:

  39. Content type: Research

    In wireless sensor networks, the high density of node’s distribution will result in transmission collision and energy dissipation of redundant data. To resolve the above problems, an energy-efficient sleep sch...

    Authors: Runze Wan, Naixue Xiong and Nguyen The Loc

    Citation: Human-centric Computing and Information Sciences 2018 8:18

    Published on:

  40. Content type: Research

    The cognitive radio relay plays a vital role in cognitive radio networking (CRN), as it can improve the cognitive sum rate, extend the coverage, and improve the spectral efficiency. However, cognitive relay ai...

    Authors: Md Sipon Miah, Michael Schukat and Enda Barrett

    Citation: Human-centric Computing and Information Sciences 2018 8:16

    Published on: