Sort by
Previous Page Page 2 of 6 Next Page
  1. Research

    A survey of cloud-based network intrusion detection analysis

    As network traffic grows and attacks become more prevalent and complex, we must find creative new ways to enhance intrusion detection systems (IDSes). Recently, researchers have begun to harness both machine l...

    Nathan Keegan, Soo-Yeon Ji, Aastha Chaudhary, Claude Concolato, Byunggu Yu and Dong Hyun Jeong

    Human-centric Computing and Information Sciences 2016 6:19

    Published on: 5 December 2016

  2. Research

    Plausible mass-spring system using parallel computing on mobile devices

    Recently the hardware performance of mobile devices have been extremely increased and advanced mobile devices provide multi-cores and high clock speed. In addition, mobile devices have advantages in mobility a...

    Min Hong, Jae-Hong Jeon, Hyo-Sub Yum and Seung-Hyun Lee

    Human-centric Computing and Information Sciences 2016 6:23

    Published on: 28 November 2016

  3. Research

    Evaluation of a channel assignment scheme in mobile network systems

    The channel assignment problem is a complex problem which requires that under certain constraints a minimum number of channels have to be assigned to mobile calls in the wireless mobile system. In this paper, ...

    Nahla Nurelmadina, Ibtehal Nafea and Muhammad Younas

    Human-centric Computing and Information Sciences 2016 6:21

    Published on: 10 November 2016

  4. Research

    Design and implement chords and personal windows for multi-user collaboration on a large multi-touch vertical display

    Co-located collaboration on large vertical screens has become technically feasible, but users are faced with increased effort, or have to wear intrusive personal identifiers. Previous research on co-located co...

    Ioannis Leftheriotis, Konstantinos Chorianopoulos and Letizia Jaccheri

    Human-centric Computing and Information Sciences 2016 6:14

    Published on: 10 September 2016

  5. Research

    Ontology mapping and semantics of web interface signs

    Although, intuitive interface signs are crucial elements of a good user interface (UI), prior research ignored these in UI design and usability evaluation process. This paper argues that ontology (the set of c...

    Muhammad Nazrul Islam and A. K. M. Najmul Islam

    Human-centric Computing and Information Sciences 2016 6:20

    Published on: 8 September 2016

  6. Review

    An investigation of unpaid crowdsourcing

    The continual advancement of internet technologies has led to the evolution of how individuals and organizations operate. For example, through the internet, we can now tap a remote workforce to help us accompl...

    Ria Mae Borromeo and Motomichi Toyama

    Human-centric Computing and Information Sciences 2016 6:11

    Published on: 5 August 2016

  7. Research

    Intelligent phishing url detection using association rule mining

    Phishing is an online criminal act that occurs when a malicious webpage impersonates as legitimate webpage so as to acquire sensitive information from the user. Phishing attack continues to pose a serious risk...

    S. Carolin Jeeva and Elijah Blessing Rajsingh

    Human-centric Computing and Information Sciences 2016 6:10

    Published on: 10 July 2016

  8. Research

    Baiting the hook: factors impacting susceptibility to phishing attacks

    Over the last decade, substantial progress has been made in understanding and mitigating phishing attacks. Nonetheless, the percentage of successful attacks is still on the rise. In this article, we critically...

    Cristian Iuga, Jason R. C. Nurse and Arnau Erola

    Human-centric Computing and Information Sciences 2016 6:8

    Published on: 10 June 2016

  9. Research

    Featuring the e-service quality of online website from a varied perspective

    The websites vigorously grow and inevitably need to provide consumers high-quality service to create excellent experience and win the customers’ heart to establish mutually beneficial and long-term relationshi...

    Huan-Ming Chuang, You-Shyang Chen, Chyuan-Yuh Lin and Pei-Chih Yu

    Human-centric Computing and Information Sciences 2016 6:6

    Published on: 10 May 2016

  10. Research

    Using affective brain-computer interfaces to characterize human influential factors for speech quality-of-experience perception modelling

    As new speech technologies emerge, telecommunication service providers have to provide superior user experience in order to remain competitive. To this end, quality-of-experience (QoE) perception modelling and...

    Rishabh Gupta, Khalil Laghari, Hubert Banville and Tiago H. Falk

    Human-centric Computing and Information Sciences 2016 6:5

    Published on: 5 May 2016

  11. Research

    Heuristics for spatial finding using iterative mobile crowdsourcing

    Crowdsourcing has become a popular method for involving humans in socially-aware computational processes. This paper proposes and investigates algorithms for finding regions of interest using mobile crowdsourc...

    Seng W. Loke

    Human-centric Computing and Information Sciences 2016 6:4

    Published on: 17 April 2016

  12. Research

    SAR reduction in the modelled human head for the mobile phone using different material shields

    Every mobile phone emits radio frequency electromagnetic energy. The amount of this energy absorbed by the human head is measured by the specific absorption rate (SAR). There are standard limits, according to ...

    Prabir Kumar Dutta, Pappu Vankata Yasoda Jayasree and Viriyala Satya Surya Narayana Srinivasa Baba

    Human-centric Computing and Information Sciences 2016 6:3

    Published on: 11 April 2016

  13. Research

    Graph-based motor primitive generation framework

    Unmanned aerial vehicles (UAVs) have many potential applications, such as delivery, leisure, and surveillance. To enable these applications, making the UAVs fly autonomously is the key issue, and requires defi...

    Yunsick Sung, Jeonghoon Kwak and Jong Hyuk Park

    Human-centric Computing and Information Sciences 2015 5:35

    Published on: 15 December 2015

Previous Page Page 2 of 6 Next Page