Skip to content

Advertisement

Articles

Page 2 of 5

  1. Content type: Research

    Virtual Reality (VR) has recently experienced rapid development for human–computer interactions. Users wearing VR headsets gain an immersive experience when interacting with a 3-dimensional (3D) world. We util...

    Authors: Wei Song, Liying Liu, Yifei Tian, Guodong Sun, Simon Fong and Kyungeun Cho

    Citation: Human-centric Computing and Information Sciences 2017 7:39

    Published on:

  2. Content type: Research

    One of the effective factors in increasing sales is the consistency of products with the preference of the customers. Designing the products consistent with customer needs requires the engagement of customers ...

    Authors: Zahra Sheikhi Darani and Marjan Kaedi

    Citation: Human-centric Computing and Information Sciences 2017 7:38

    Published on:

  3. Content type: Research

    Since cloud computing provides computing resources on a pay per use basis, a task scheduling algorithm directly affects the cost for users. In this paper, we propose a novel cloud task scheduling algorithm bas...

    Authors: YoungJu Moon, HeonChang Yu, Joon-Min Gil and JongBeom Lim

    Citation: Human-centric Computing and Information Sciences 2017 7:28

    Published on:

  4. Content type: Research

    This study investigates the possibilities of equipping fixed furniture with touch screens to control laptops or other smart home devices, to create a holistic smart home control system. Although multi-touch sc...

    Authors: Clerc-Manne Taing, Pei-Luen Patrick Rau and Hanjing Huang

    Citation: Human-centric Computing and Information Sciences 2017 7:27

    Published on:

  5. Content type: Research

    Nowadays, large shopping malls provide tools to help and boost customers to buy products. Some of these tools melt down digital operations with physical ones executed by customers into blended commerce experie...

    Authors: Carlo Blundo, Francesco Orciuoli and Mimmo Parente

    Citation: Human-centric Computing and Information Sciences 2017 7:26

    Published on:

  6. Content type: Research

    Discretization plays a major role as a data preprocessing technique used in machine learning and data mining. Recent studies have focused on multivariate discretization that considers relations among attribute...

    Authors: Kittakorn Sriwanna, Tossapon Boongoen and Natthakan Iam-On

    Citation: Human-centric Computing and Information Sciences 2017 7:21

    Published on:

  7. Content type: Research

    In this paper, we propose a novel algorithm that renders motion blurred shadows efficiently on GPUs using a temporal shadow map. Each triangle moves during a frame and for each pixel, it is visible to the ligh...

    Authors: MinhPhuoc Hong and Kyoungsu Oh

    Citation: Human-centric Computing and Information Sciences 2017 7:22

    Published on:

  8. Content type: Research

    As tablet devices become popular, various handwriting applications are used. Some of applications incorporate a specific function, which is generally called palm rejection. Palm rejection enables application u...

    Authors: Atsushi Kitani, Taketo Kimura and Takako Nakatani

    Citation: Human-centric Computing and Information Sciences 2017 7:18

    Published on:

  9. Content type: Research

    This paper presents the development of a Human Activity Recognition (HAR) system that uses a network of nine inertial measurement units situated in different body parts. Every unit provides 3D (3-dimension) ac...

    Authors: Jiadong Zhu, Rubén San-Segundo and José M. Pardo

    Citation: Human-centric Computing and Information Sciences 2017 7:16

    Published on:

  10. Content type: Research

    Satellite networks offer an efficient alternative where no terrestrial networks are available, and can offer a cost effective means of transferring data. Numerous proposals have addressed the problem of resour...

    Authors: Polychronis Koutsakis, Irene Spanou and Aggelos Lazaris

    Citation: Human-centric Computing and Information Sciences 2017 7:15

    Published on:

  11. Content type: Research

    It is a challenging task for all Harbors or Naval Administration to restrict and monitor the movement of defense or commercial ships. Most commonly used techniques of monitoring are radars and satellite images...

    Authors: Madhuri Rao and Narendra Kumar Kamila

    Citation: Human-centric Computing and Information Sciences 2017 7:14

    Published on:

  12. Content type: Research

    In a traditional classroom environment, instructor enthusiasm has been shown to enhance student’s emotion, affective perceptions, intrinsic motivation, and cognitive outcome. Additionally, emotional response t...

    Authors: Tze Wei Liew, Nor Azan Mat Zin and Noraidah Sahari

    Citation: Human-centric Computing and Information Sciences 2017 7:9

    Published on:

  13. Content type: Research

    Digital geographical maps can be regarded as a user interface for understanding and navigating the city. Nevertheless, contemporary digital maps over-emphasize the needs of motor vehicles. Pedestrian routes ha...

    Authors: Ippokratis Kapenekakis and Konstantinos Chorianopoulos

    Citation: Human-centric Computing and Information Sciences 2017 7:10

    Published on:

  14. Content type: Research

    NoSQL databases are capable of storing and processing big data which is characterized by various properties such as volume, variety and velocity. Such databases are used in a variety of user applications that ...

    Authors: María Teresa González-Aparicio, Adewole Ogunyadeka, Muhammad Younas, Javier Tuya and Rubén Casado

    Citation: Human-centric Computing and Information Sciences 2017 7:7

    Published on:

  15. Content type: Research

    Password managers, though commonly recommended by security experts, are still not used by many users. Understanding why some choose to use password managers while others do not is important towards generally u...

    Authors: Michael Fagan, Yusuf Albayram, Mohammad Maifi Hasan Khan and Ross Buck

    Citation: Human-centric Computing and Information Sciences 2017 7:12

    Published on:

  16. Content type: Research

    The article considers the model and method of converged computing and storage to create SCADA systems based on wireless networks for the energy industry. Computing power of modern wireless sensor network nodes...

    Authors: Alexey G. Finogeev, Danila S. Parygin and Anton A. Finogeev

    Citation: Human-centric Computing and Information Sciences 2017 7:11

    Published on:

  17. Content type: Research

    Since the end of 2000, smartphones have explosively spread and have made people’s lives plentiful. With the start of smartphones, new smart devices, including tablet PCs, smart TVs, smart refrigerators, and sm...

    Authors: Won Min Kang, Seo Yeon Moon and Jong Hyuk Park

    Citation: Human-centric Computing and Information Sciences 2017 7:6

    Published on:

  18. Content type: Research

    This paper is focused on analyzing the details of one of the most widely used Q&A technical discussion forums on the Internet: StackOverflow. StackOverflow is a huge source of information for both academics an...

    Authors: Tanveer Ahmed and Abhishek Srivastava

    Citation: Human-centric Computing and Information Sciences 2017 7:8

    Published on:

  19. Content type: Research

    Recently, embedded systems have become popular because of the rising demand for portable, low-power devices. A common task for these devices is object tracking, which is an essential part of various applicatio...

    Authors: Mai Thanh Nhat Truong and Sanghoon Kim

    Citation: Human-centric Computing and Information Sciences 2017 7:2

    Published on:

  20. Content type: Review

    Mobile crowdsensing is a burgeoning concept that allows smart cities to leverage the sensing power and ubiquitous nature of mobile devices in order to capture and map phenomena of common interest. At the core ...

    Authors: R. I. Ogie

    Citation: Human-centric Computing and Information Sciences 2016 6:24

    Published on:

  21. Content type: Research

    Mobile adhoc network (MANET) is one of the most relevant areas of research in wireless communication that has gained prevalence due to its diversity over large-scale highly mobile networks to small-scale netwo...

    Authors: Priyanka Jaiswal and Adwitiya Sinha

    Citation: Human-centric Computing and Information Sciences 2016 6:22

    Published on:

  22. Content type: Research

    As network traffic grows and attacks become more prevalent and complex, we must find creative new ways to enhance intrusion detection systems (IDSes). Recently, researchers have begun to harness both machine l...

    Authors: Nathan Keegan, Soo-Yeon Ji, Aastha Chaudhary, Claude Concolato, Byunggu Yu and Dong Hyun Jeong

    Citation: Human-centric Computing and Information Sciences 2016 6:19

    Published on:

  23. Content type: Research

    Recently the hardware performance of mobile devices have been extremely increased and advanced mobile devices provide multi-cores and high clock speed. In addition, mobile devices have advantages in mobility a...

    Authors: Min Hong, Jae-Hong Jeon, Hyo-Sub Yum and Seung-Hyun Lee

    Citation: Human-centric Computing and Information Sciences 2016 6:23

    Published on:

  24. Content type: Research

    The channel assignment problem is a complex problem which requires that under certain constraints a minimum number of channels have to be assigned to mobile calls in the wireless mobile system. In this paper, ...

    Authors: Nahla Nurelmadina, Ibtehal Nafea and Muhammad Younas

    Citation: Human-centric Computing and Information Sciences 2016 6:21

    Published on:

  25. Content type: Research

    In the internet era, search engines play a vital role in information retrieval from web pages. Search engines arrange the retrieved results using various ranking algorithms. Additionally, retrieval is based on...

    Authors: V. Vijayarajan, M. Dinakaran, Priyam Tejaswin and Mayank Lohani

    Citation: Human-centric Computing and Information Sciences 2016 6:18

    Published on:

  26. Content type: Research

    Medical and health data has become accepted as the highly worthful and useful big data. However, the current medical information systems have aimed for digitalizaing, storing, and transferring clinical materia...

    Authors: Meeyeon Lee, Ye-Seul Park, Myoung-Hee Kim and Jung-Won Lee

    Citation: Human-centric Computing and Information Sciences 2016 6:15

    Published on:

  27. Content type: Research

    Co-located collaboration on large vertical screens has become technically feasible, but users are faced with increased effort, or have to wear intrusive personal identifiers. Previous research on co-located co...

    Authors: Ioannis Leftheriotis, Konstantinos Chorianopoulos and Letizia Jaccheri

    Citation: Human-centric Computing and Information Sciences 2016 6:14

    Published on:

  28. Content type: Research

    Although, intuitive interface signs are crucial elements of a good user interface (UI), prior research ignored these in UI design and usability evaluation process. This paper argues that ontology (the set of c...

    Authors: Muhammad Nazrul Islam and A. K. M. Najmul Islam

    Citation: Human-centric Computing and Information Sciences 2016 6:20

    Published on:

  29. Content type: Research

    To address the limitations of static challenge question based fallback authentication mechanisms (e.g., easy predictability), recently, smartphone based autobiographical authentication mechanisms have been exp...

    Authors: Yusuf Albayram and Mohammad Maifi Hasan Khan

    Citation: Human-centric Computing and Information Sciences 2016 6:16

    Published on:

  30. Content type: Research

    Enterprises enhance their business on the web with the help of web services. This enhancement is achieved by composing the pre-existing services, so that they will be able to provide solutions for the problems...

    Authors: M. Thirumaran and G. Gayathry Brendha

    Citation: Human-centric Computing and Information Sciences 2016 6:13

    Published on:

  31. Content type: Review

    The continual advancement of internet technologies has led to the evolution of how individuals and organizations operate. For example, through the internet, we can now tap a remote workforce to help us accompl...

    Authors: Ria Mae Borromeo and Motomichi Toyama

    Citation: Human-centric Computing and Information Sciences 2016 6:11

    Published on:

  32. Content type: Research

    Phishing is an online criminal act that occurs when a malicious webpage impersonates as legitimate webpage so as to acquire sensitive information from the user. Phishing attack continues to pose a serious risk...

    Authors: S. Carolin Jeeva and Elijah Blessing Rajsingh

    Citation: Human-centric Computing and Information Sciences 2016 6:10

    Published on:

  33. Content type: Research

    Over the last decade, substantial progress has been made in understanding and mitigating phishing attacks. Nonetheless, the percentage of successful attacks is still on the rise. In this article, we critically...

    Authors: Cristian Iuga, Jason R. C. Nurse and Arnau Erola

    Citation: Human-centric Computing and Information Sciences 2016 6:8

    Published on:

  34. Content type: Research

    The websites vigorously grow and inevitably need to provide consumers high-quality service to create excellent experience and win the customers’ heart to establish mutually beneficial and long-term relationshi...

    Authors: Huan-Ming Chuang, You-Shyang Chen, Chyuan-Yuh Lin and Pei-Chih Yu

    Citation: Human-centric Computing and Information Sciences 2016 6:6

    Published on:

  35. Content type: Research

    As new speech technologies emerge, telecommunication service providers have to provide superior user experience in order to remain competitive. To this end, quality-of-experience (QoE) perception modelling and...

    Authors: Rishabh Gupta, Khalil Laghari, Hubert Banville and Tiago H. Falk

    Citation: Human-centric Computing and Information Sciences 2016 6:5

    Published on: