Skip to content

Advertisement

Articles

Page 3 of 5

  1. Content type: Research

    Although, intuitive interface signs are crucial elements of a good user interface (UI), prior research ignored these in UI design and usability evaluation process. This paper argues that ontology (the set of c...

    Authors: Muhammad Nazrul Islam and A. K. M. Najmul Islam

    Citation: Human-centric Computing and Information Sciences 2016 6:20

    Published on:

  2. Content type: Research

    To address the limitations of static challenge question based fallback authentication mechanisms (e.g., easy predictability), recently, smartphone based autobiographical authentication mechanisms have been exp...

    Authors: Yusuf Albayram and Mohammad Maifi Hasan Khan

    Citation: Human-centric Computing and Information Sciences 2016 6:16

    Published on:

  3. Content type: Research

    Enterprises enhance their business on the web with the help of web services. This enhancement is achieved by composing the pre-existing services, so that they will be able to provide solutions for the problems...

    Authors: M. Thirumaran and G. Gayathry Brendha

    Citation: Human-centric Computing and Information Sciences 2016 6:13

    Published on:

  4. Content type: Review

    The continual advancement of internet technologies has led to the evolution of how individuals and organizations operate. For example, through the internet, we can now tap a remote workforce to help us accompl...

    Authors: Ria Mae Borromeo and Motomichi Toyama

    Citation: Human-centric Computing and Information Sciences 2016 6:11

    Published on:

  5. Content type: Research

    Phishing is an online criminal act that occurs when a malicious webpage impersonates as legitimate webpage so as to acquire sensitive information from the user. Phishing attack continues to pose a serious risk...

    Authors: S. Carolin Jeeva and Elijah Blessing Rajsingh

    Citation: Human-centric Computing and Information Sciences 2016 6:10

    Published on:

  6. Content type: Research

    Over the last decade, substantial progress has been made in understanding and mitigating phishing attacks. Nonetheless, the percentage of successful attacks is still on the rise. In this article, we critically...

    Authors: Cristian Iuga, Jason R. C. Nurse and Arnau Erola

    Citation: Human-centric Computing and Information Sciences 2016 6:8

    Published on:

  7. Content type: Research

    The websites vigorously grow and inevitably need to provide consumers high-quality service to create excellent experience and win the customers’ heart to establish mutually beneficial and long-term relationshi...

    Authors: Huan-Ming Chuang, You-Shyang Chen, Chyuan-Yuh Lin and Pei-Chih Yu

    Citation: Human-centric Computing and Information Sciences 2016 6:6

    Published on:

  8. Content type: Research

    As new speech technologies emerge, telecommunication service providers have to provide superior user experience in order to remain competitive. To this end, quality-of-experience (QoE) perception modelling and...

    Authors: Rishabh Gupta, Khalil Laghari, Hubert Banville and Tiago H. Falk

    Citation: Human-centric Computing and Information Sciences 2016 6:5

    Published on:

  9. Content type: Research

    Every mobile phone emits radio frequency electromagnetic energy. The amount of this energy absorbed by the human head is measured by the specific absorption rate (SAR). There are standard limits, according to ...

    Authors: Prabir Kumar Dutta, Pappu Vankata Yasoda Jayasree and Viriyala Satya Surya Narayana Srinivasa Baba

    Citation: Human-centric Computing and Information Sciences 2016 6:3

    Published on:

  10. Content type: Research

    Cooperative communication systems use cooperative relays for transmitting their data packets to the destination. Cooperative communication schemes having all relays participating in transmission may cause unne...

    Authors: Md. Arifur Rahman, Young-Doo Lee and Insoo Koo

    Citation: Human-centric Computing and Information Sciences 2016 6:2

    Published on:

  11. Content type: Research

    Software update messages are commonly used to inform users about software updates, recent bug fixes, and various system vulnerabilities, and to suggest recommended actions (e.g., updating software). While vari...

    Authors: Michael Fagan, Mohammad Maifi Hasan Khan and Nhan Nguyen

    Citation: Human-centric Computing and Information Sciences 2015 5:36

    Published on:

  12. Content type: Research

    Unmanned aerial vehicles (UAVs) have many potential applications, such as delivery, leisure, and surveillance. To enable these applications, making the UAVs fly autonomously is the key issue, and requires defi...

    Authors: Yunsick Sung, Jeonghoon Kwak and Jong Hyuk Park

    Citation: Human-centric Computing and Information Sciences 2015 5:35

    Published on:

  13. Content type: Research

    Recently, traffic jams and accidents increase due to increase of traffic volume. Thus, intelligent transport system (ITS) is developed to provide efficient road situation and information is actively studying....

    Authors: Jeong Kyu Lee, Young Sik Jeong and Jong Hyuk Park

    Citation: Human-centric Computing and Information Sciences 2015 5:34

    Published on:

  14. Content type: Research

    This paper attempts to establish a correlation between the human speech, emotions and human heart rate. The study highlights a possible contactless human heart rate measurement technique useful for monitoring ...

    Authors: Alex Pappachen James

    Citation: Human-centric Computing and Information Sciences 2015 5:33

    Published on:

  15. Content type: Research

    Pervasive computing has the potential to offer low-cost, high performance, and user centric solutions to exchange the information and communicate seamlessly in highly dynamic, heterogeneous environment. Here s...

    Authors: Madhu Sharma Gaur and Bhaskar Pant

    Citation: Human-centric Computing and Information Sciences 2015 5:32

    Published on:

  16. Content type: Research

    Today, personal data is becoming a new economic asset. Personal data which generated from our smartphone can be used for many purposes such as identification, recommendation system, and etc. The purposes of ou...

    Authors: Rischan Mafrur, I. Gde Dharma Nugraha and Deokjai Choi

    Citation: Human-centric Computing and Information Sciences 2015 5:31

    Published on:

  17. Content type: Research

    Spatial data warehouses store a large amount of historized and aggregated data. They are usually exploited by Spatial OLAP (SOLAP) systems to extract relevant information. Extracting such information may be c...

    Authors: Saida Aissi, Mohamed Salah Gouider, Tarek Sboui and Lamjed Ben Said

    Citation: Human-centric Computing and Information Sciences 2015 5:30

    Published on:

  18. Content type: Research

    This study examined the effectiveness of two example-based instructional procedures. One procedure examines the effect of example-problem pairs when they are simultaneously presented to a participant. The othe...

    Authors: Yi-Hung Huang, Kuan-Cheng Lin, Xiang Yu and Jason C. Hung

    Citation: Human-centric Computing and Information Sciences 2015 5:29

    Published on:

  19. Content type: Research

    Power management is a major concern for computer architects and system designers. As reported by the International Technology Roadmap for Semiconductors (ITRS), energy consumption has become one of the most do...

    Authors: Vijayalakshmi Saravanan, Alagan Anpalagan and Isaac Woungang

    Citation: Human-centric Computing and Information Sciences 2015 5:28

    Published on:

  20. Content type: Research

    A high-precision full quaternion based finite-time three-axis cascade attitude control strategy is considered in the present research with respect to state-of-the-art to deal with a class of overactuated space...

    Authors: A. H. Mazinan

    Citation: Human-centric Computing and Information Sciences 2015 5:27

    Published on:

  21. Content type: Review

    Up to now, biometric recognition has shown significant advantages as to be considered a reliable solution for security systems in mobile environments. Nevertheless, due to the short lifetime of biometrics in ...

    Authors: Ramon Blanco-Gonzalo, Norman Poh, Rita Wong and Raul Sanchez-Reillo

    Citation: Human-centric Computing and Information Sciences 2015 5:24

    Published on:

  22. Content type: Research

    Keys to successful implementation of smart business require a wide spectrum of domain knowledge, experts, and their correlated experiences. Excluding those external factors—which can be collected by well-deplo...

    Authors: Atsushi Sato, Runhe Huang and Neil Y Yen

    Citation: Human-centric Computing and Information Sciences 2015 5:23

    Published on:

  23. Content type: Research

    INSPECT is a novel interaction technique for 3D object manipulation using a rotation-only tracked touch panel. Motivated by the applicability of the technique on smartphones, we explore this design space by in...

    Authors: Nicholas Katzakis, Robert J Teather, Kiyoshi Kiyokawa and Haruo Takemura

    Citation: Human-centric Computing and Information Sciences 2015 5:22

    Published on:

  24. Content type: Research

    Collaborative filtering (CF) is a popular method for the personalized recommendation. Almost all of the existing CF methods rely only on the rating data while ignoring some important implicit information in no...

    Authors: Weimin Li, Xunfeng Li, Mengke Yao, Jiulei Jiang and Qun Jin

    Citation: Human-centric Computing and Information Sciences 2015 5:21

    Published on:

  25. Content type: Research

    This paper explores the use of data from the Kinect sensor for performing augmented reality, with emphasis on cultural heritage applications. It is shown that the combination of depth and image correspondences...

    Authors: Erkan Bostanci, Nadia Kanwal and Adrian F Clark

    Citation: Human-centric Computing and Information Sciences 2015 5:20

    Published on:

  26. Content type: Research

    Ensuring the cloud data security is a major concern for corporate cloud subscribers and in some cases for the private cloud users. Confidentiality of the stored data can be managed by encrypting the data at th...

    Authors: Md Iftekhar Salam, Wei-Chuen Yau, Ji-Jian Chin, Swee-Huay Heng, Huo-Chong Ling, Raphael C-W Phan, Geong Sen Poh, Syh-Yuan Tan and Wun-She Yap

    Citation: Human-centric Computing and Information Sciences 2015 5:19

    Published on:

  27. Content type: Research

    Online service providers often use challenge questions (a.k.a. knowledge‐based authentication) to facilitate resetting of passwords or to provide an extra layer of security for authentication. While prior sche...

    Authors: Yusuf Albayram, Mohammad Maifi Hasan Khan, Athanasios Bamis, Sotirios Kentros, Nhan Nguyen and Ruhua Jiang

    Citation: Human-centric Computing and Information Sciences 2015 5:17

    Published on:

  28. Content type: Research

    Software as a Service (SaaS) in Cloud Computing offers reliable access to software applications for end users over the Internet without direct investment in infrastructure and software. SaaS providers utilize ...

    Authors: Farzaneh Motavaselalhagh, Faramarz Safi Esfahani and Hamid Reza Arabnia

    Citation: Human-centric Computing and Information Sciences 2015 5:16

    Published on:

  29. Content type: Research

    This article is aimed to describe the method of testing the implementation of voice control over operating and technical functions of Smart Home Come. Custom control over operating and technical functions was ...

    Authors: Jan Vanus, Marek Smolon, Radek Martinek, Jiri Koziorek, Jan Zidek and Petr Bilik

    Citation: Human-centric Computing and Information Sciences 2015 5:15

    Published on:

  30. Content type: Research

    Active contours are used in the image processing application including edge detection, shape modeling, medical image-analysis, detectable object boundaries, etc. Shape is one of the important features for desc...

    Authors: Nguyen Thanh Binh

    Citation: Human-centric Computing and Information Sciences 2015 5:14

    Published on:

  31. Content type: Research

    The objective of this study is to assess the combined performance of textural and morphological features for the detection and diagnosis of breast masses in ultrasound images. We have extracted a total of fort...

    Authors: Kadayanallur Mahadevan Prabusankarlal, Palanisamy Thirumoorthy and Radhakrishnan Manavalan

    Citation: Human-centric Computing and Information Sciences 2015 5:12

    Published on:

  32. Content type: Research

    Since 2008, soaring international oil prices and environmental awareness have pushed bicycle to be a green transport vehicle to reduce greenhouse gas emissions as a significant global trend. Consequently, Taiw...

    Authors: Huan-Ming Chuang and You-Shyang Chen

    Citation: Human-centric Computing and Information Sciences 2015 5:11

    Published on:

  33. Content type: Research

    Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is suitable for data access control on a cloud storage system. In CP-ABE, the data owner encrypts data under the access structure over attributes and a set...

    Authors: Takeru Naruse, Masami Mohri and Yoshiaki Shiraishi

    Citation: Human-centric Computing and Information Sciences 2015 5:8

    Published on:

  34. Content type: Research

    The availability of advanced wireless sensor nodes enable us to use video processing techniques in a wireless sensor network (WSN) platform. Such paradigm can be used to implement video sensor networks (VSNs) ...

    Authors: Bambang AB Sarif, Mahsa T Pourazad, Panos Nasiopoulos, Victor CM Leung and Amr Mohamed

    Citation: Human-centric Computing and Information Sciences 2015 5:7

    Published on:

  35. Content type: Research

    In recent, numerous useful visual analytics tools have been designed to help domain experts solve analytical problems. However, most of the tools do not reflect the nature of solving real-world analytical task...

    Authors: Dong Hyun Jeong, Soo-Yeon Ji, Evan A Suma, Byunggu Yu and Remco Chang

    Citation: Human-centric Computing and Information Sciences 2015 5:5

    Published on: