Skip to content

Advertisement

Articles

Page 3 of 5

  1. Content type: Research

    Every mobile phone emits radio frequency electromagnetic energy. The amount of this energy absorbed by the human head is measured by the specific absorption rate (SAR). There are standard limits, according to ...

    Authors: Prabir Kumar Dutta, Pappu Vankata Yasoda Jayasree and Viriyala Satya Surya Narayana Srinivasa Baba

    Citation: Human-centric Computing and Information Sciences 2016 6:3

    Published on:

  2. Content type: Research

    Cooperative communication systems use cooperative relays for transmitting their data packets to the destination. Cooperative communication schemes having all relays participating in transmission may cause unne...

    Authors: Md. Arifur Rahman, Young-Doo Lee and Insoo Koo

    Citation: Human-centric Computing and Information Sciences 2016 6:2

    Published on:

  3. Content type: Research

    Software update messages are commonly used to inform users about software updates, recent bug fixes, and various system vulnerabilities, and to suggest recommended actions (e.g., updating software). While vari...

    Authors: Michael Fagan, Mohammad Maifi Hasan Khan and Nhan Nguyen

    Citation: Human-centric Computing and Information Sciences 2015 5:36

    Published on:

  4. Content type: Research

    Unmanned aerial vehicles (UAVs) have many potential applications, such as delivery, leisure, and surveillance. To enable these applications, making the UAVs fly autonomously is the key issue, and requires defi...

    Authors: Yunsick Sung, Jeonghoon Kwak and Jong Hyuk Park

    Citation: Human-centric Computing and Information Sciences 2015 5:35

    Published on:

  5. Content type: Research

    Recently, traffic jams and accidents increase due to increase of traffic volume. Thus, intelligent transport system (ITS) is developed to provide efficient road situation and information is actively studying....

    Authors: Jeong Kyu Lee, Young Sik Jeong and Jong Hyuk Park

    Citation: Human-centric Computing and Information Sciences 2015 5:34

    Published on:

  6. Content type: Research

    This paper attempts to establish a correlation between the human speech, emotions and human heart rate. The study highlights a possible contactless human heart rate measurement technique useful for monitoring ...

    Authors: Alex Pappachen James

    Citation: Human-centric Computing and Information Sciences 2015 5:33

    Published on:

  7. Content type: Research

    Pervasive computing has the potential to offer low-cost, high performance, and user centric solutions to exchange the information and communicate seamlessly in highly dynamic, heterogeneous environment. Here s...

    Authors: Madhu Sharma Gaur and Bhaskar Pant

    Citation: Human-centric Computing and Information Sciences 2015 5:32

    Published on:

  8. Content type: Research

    Today, personal data is becoming a new economic asset. Personal data which generated from our smartphone can be used for many purposes such as identification, recommendation system, and etc. The purposes of ou...

    Authors: Rischan Mafrur, I. Gde Dharma Nugraha and Deokjai Choi

    Citation: Human-centric Computing and Information Sciences 2015 5:31

    Published on:

  9. Content type: Research

    Spatial data warehouses store a large amount of historized and aggregated data. They are usually exploited by Spatial OLAP (SOLAP) systems to extract relevant information. Extracting such information may be c...

    Authors: Saida Aissi, Mohamed Salah Gouider, Tarek Sboui and Lamjed Ben Said

    Citation: Human-centric Computing and Information Sciences 2015 5:30

    Published on:

  10. Content type: Research

    This study examined the effectiveness of two example-based instructional procedures. One procedure examines the effect of example-problem pairs when they are simultaneously presented to a participant. The othe...

    Authors: Yi-Hung Huang, Kuan-Cheng Lin, Xiang Yu and Jason C. Hung

    Citation: Human-centric Computing and Information Sciences 2015 5:29

    Published on:

  11. Content type: Research

    Power management is a major concern for computer architects and system designers. As reported by the International Technology Roadmap for Semiconductors (ITRS), energy consumption has become one of the most do...

    Authors: Vijayalakshmi Saravanan, Alagan Anpalagan and Isaac Woungang

    Citation: Human-centric Computing and Information Sciences 2015 5:28

    Published on:

  12. Content type: Research

    A high-precision full quaternion based finite-time three-axis cascade attitude control strategy is considered in the present research with respect to state-of-the-art to deal with a class of overactuated space...

    Authors: A. H. Mazinan

    Citation: Human-centric Computing and Information Sciences 2015 5:27

    Published on:

  13. Content type: Review

    Up to now, biometric recognition has shown significant advantages as to be considered a reliable solution for security systems in mobile environments. Nevertheless, due to the short lifetime of biometrics in ...

    Authors: Ramon Blanco-Gonzalo, Norman Poh, Rita Wong and Raul Sanchez-Reillo

    Citation: Human-centric Computing and Information Sciences 2015 5:24

    Published on:

  14. Content type: Research

    Keys to successful implementation of smart business require a wide spectrum of domain knowledge, experts, and their correlated experiences. Excluding those external factors—which can be collected by well-deplo...

    Authors: Atsushi Sato, Runhe Huang and Neil Y Yen

    Citation: Human-centric Computing and Information Sciences 2015 5:23

    Published on:

  15. Content type: Research

    INSPECT is a novel interaction technique for 3D object manipulation using a rotation-only tracked touch panel. Motivated by the applicability of the technique on smartphones, we explore this design space by in...

    Authors: Nicholas Katzakis, Robert J Teather, Kiyoshi Kiyokawa and Haruo Takemura

    Citation: Human-centric Computing and Information Sciences 2015 5:22

    Published on:

  16. Content type: Research

    This paper explores the use of data from the Kinect sensor for performing augmented reality, with emphasis on cultural heritage applications. It is shown that the combination of depth and image correspondences...

    Authors: Erkan Bostanci, Nadia Kanwal and Adrian F Clark

    Citation: Human-centric Computing and Information Sciences 2015 5:20

    Published on:

  17. Content type: Research

    Collaborative filtering (CF) is a popular method for the personalized recommendation. Almost all of the existing CF methods rely only on the rating data while ignoring some important implicit information in no...

    Authors: Weimin Li, Xunfeng Li, Mengke Yao, Jiulei Jiang and Qun Jin

    Citation: Human-centric Computing and Information Sciences 2015 5:21

    Published on:

  18. Content type: Research

    Ensuring the cloud data security is a major concern for corporate cloud subscribers and in some cases for the private cloud users. Confidentiality of the stored data can be managed by encrypting the data at th...

    Authors: Md Iftekhar Salam, Wei-Chuen Yau, Ji-Jian Chin, Swee-Huay Heng, Huo-Chong Ling, Raphael C-W Phan, Geong Sen Poh, Syh-Yuan Tan and Wun-She Yap

    Citation: Human-centric Computing and Information Sciences 2015 5:19

    Published on:

  19. Content type: Research

    Online service providers often use challenge questions (a.k.a. knowledge‐based authentication) to facilitate resetting of passwords or to provide an extra layer of security for authentication. While prior sche...

    Authors: Yusuf Albayram, Mohammad Maifi Hasan Khan, Athanasios Bamis, Sotirios Kentros, Nhan Nguyen and Ruhua Jiang

    Citation: Human-centric Computing and Information Sciences 2015 5:17

    Published on:

  20. Content type: Research

    Software as a Service (SaaS) in Cloud Computing offers reliable access to software applications for end users over the Internet without direct investment in infrastructure and software. SaaS providers utilize ...

    Authors: Farzaneh Motavaselalhagh, Faramarz Safi Esfahani and Hamid Reza Arabnia

    Citation: Human-centric Computing and Information Sciences 2015 5:16

    Published on:

  21. Content type: Research

    This article is aimed to describe the method of testing the implementation of voice control over operating and technical functions of Smart Home Come. Custom control over operating and technical functions was ...

    Authors: Jan Vanus, Marek Smolon, Radek Martinek, Jiri Koziorek, Jan Zidek and Petr Bilik

    Citation: Human-centric Computing and Information Sciences 2015 5:15

    Published on:

  22. Content type: Research

    Active contours are used in the image processing application including edge detection, shape modeling, medical image-analysis, detectable object boundaries, etc. Shape is one of the important features for desc...

    Authors: Nguyen Thanh Binh

    Citation: Human-centric Computing and Information Sciences 2015 5:14

    Published on:

  23. Content type: Research

    The objective of this study is to assess the combined performance of textural and morphological features for the detection and diagnosis of breast masses in ultrasound images. We have extracted a total of fort...

    Authors: Kadayanallur Mahadevan Prabusankarlal, Palanisamy Thirumoorthy and Radhakrishnan Manavalan

    Citation: Human-centric Computing and Information Sciences 2015 5:12

    Published on:

  24. Content type: Research

    Since 2008, soaring international oil prices and environmental awareness have pushed bicycle to be a green transport vehicle to reduce greenhouse gas emissions as a significant global trend. Consequently, Taiw...

    Authors: Huan-Ming Chuang and You-Shyang Chen

    Citation: Human-centric Computing and Information Sciences 2015 5:11

    Published on:

  25. Content type: Research

    Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is suitable for data access control on a cloud storage system. In CP-ABE, the data owner encrypts data under the access structure over attributes and a set...

    Authors: Takeru Naruse, Masami Mohri and Yoshiaki Shiraishi

    Citation: Human-centric Computing and Information Sciences 2015 5:8

    Published on:

  26. Content type: Research

    The availability of advanced wireless sensor nodes enable us to use video processing techniques in a wireless sensor network (WSN) platform. Such paradigm can be used to implement video sensor networks (VSNs) ...

    Authors: Bambang AB Sarif, Mahsa T Pourazad, Panos Nasiopoulos, Victor CM Leung and Amr Mohamed

    Citation: Human-centric Computing and Information Sciences 2015 5:7

    Published on:

  27. Content type: Research

    In recent, numerous useful visual analytics tools have been designed to help domain experts solve analytical problems. However, most of the tools do not reflect the nature of solving real-world analytical task...

    Authors: Dong Hyun Jeong, Soo-Yeon Ji, Evan A Suma, Byunggu Yu and Remco Chang

    Citation: Human-centric Computing and Information Sciences 2015 5:5

    Published on:

  28. Content type: Research

    The power-performance trade-off is one of the major considerations in micro-architecture design. Pipelined architecture has brought a radical change in the design to capitalize on the parallel operation of var...

    Authors: Vijayalakshmi Saravanan, Kothari Dwarkadas Pralhaddas, Dwarkadas Pralhaddas Kothari and Isaac Woungang

    Citation: Human-centric Computing and Information Sciences 2015 5:2

    Published on:

    The Erratum to this article has been published in Human-centric Computing and Information Sciences 2015 5:9

  29. Content type: Research

    “BAU GIS” is an efficient and flexible Geographic Information System (GIS) that supports manipulation, analysis, and viewing of geospatial data and associated attribute data in various GIS data formats. “BAU G...

    Authors: Balqies Sadoun, Omar Al-Bayari, Jalal Al-Azizi and Samih Al Rawashdeh

    Citation: Human-centric Computing and Information Sciences 2015 5:1

    Published on:

  30. Content type: Research

    This article describes the development of a visualization application software used to control operational and technical functions in the Smart Home system or Smart Home Care system via the wireless xComfort c...

    Authors: Jan Vanus, Pavel Kucera, Radek Martinek and Jiri Koziorek

    Citation: Human-centric Computing and Information Sciences 2014 4:18

    Published on:

  31. Content type: Research

    Teams are at the heart of today’s organizations and their performance is crucial for organizational success. It is therefore important to understand and monitor team processes. Traditional approaches employ qu...

    Authors: Sebastian Feese, Michael Joseph Burscher, Klaus Jonas and Gerhard Tröster

    Citation: Human-centric Computing and Information Sciences 2014 4:15

    Published on:

  32. Content type: Research

    E-mail communication has become an essential part of collaborative tasks in enterprises. However, when conventional e-mail applications are used for collaborative tasks, problems with task-related resources ma...

    Authors: Masashi Katsumata

    Citation: Human-centric Computing and Information Sciences 2014 4:17

    Published on:

  33. Content type: Research

    Wireless mesh networks are highly susceptible to Distributed Denial-of-Service attacks due to its self-configuring property. Flooding DDOS attack is one form of collaborative attacks and the transport layer of...

    Authors: I Diana Jeba Jingle and Elijah Blessing Rajsingh

    Citation: Human-centric Computing and Information Sciences 2014 4:8

    Published on:

  34. Content type: Research

    As mobile technologies become widespread, new challenges are facing the research community to develop lightweight learning services adapted to the learner’s profile, context, and task at hand. This paper attem...

    Authors: Rachid Benlamri and Xiaoyun Zhang

    Citation: Human-centric Computing and Information Sciences 2014 4:12

    Published on:

  35. Content type: Research

    With the increasing application of wireless communication devices, mobile phone handsets are used by peoples of various age groups. This paper make an effort to asses the mobile phone radiation exposure effect...

    Authors: Balamurugan Rajagopal and Lalithambika Rajasekaran

    Citation: Human-centric Computing and Information Sciences 2014 4:10

    Published on:

  36. Content type: Research

    We study the survivable network design problem (SNDP) for simultaneous unicast and anycast flows in networks where the link cost follows All Capacities Modular Cost (ACMC) model. Given a network modeled by a c...

    Authors: Huynh Thi Thanh Binh and Son Hong Ngo

    Citation: Human-centric Computing and Information Sciences 2014 4:13

    Published on: