Skip to main content

Advertisement

Articles

Page 3 of 6

  1. The ubiquitous nature of the Internet provides an ideal platform for human communication, trade, information sharing and learning. Websites play a central role in these activities as they often act as a key po...

    Authors: Jason R. C. Nurse and Oliver Buckley

    Citation: Human-centric Computing and Information Sciences 2017 7:40

    Content type: Research

    Published on:

  2. One of the key requirements for technological systems that are used to secure independent housing for seniors in their home environment is monitoring of daily living activities (ADL), their classification, and...

    Authors: Jan Vanus, Jana Belesova, Radek Martinek, Jan Nedoma, Marcel Fajkus, Petr Bilik and Jan Zidek

    Citation: Human-centric Computing and Information Sciences 2017 7:30

    Content type: Research

    Published on:

  3. The aim of this study is to identify common usability problematic patterns that belong to top-50 academic websites as a whole and then ranking of these identified usability problems is also provided.

    Authors: Kalpna Sagar and Anju Saha

    Citation: Human-centric Computing and Information Sciences 2017 7:29

    Content type: Research

    Published on:

  4. An infrared transmitting model from the observed finger vein images is proposed in this paper by using multi-light-intensity imaging. This model is estimated from many pixels’ values under different intensity ...

    Authors: Liukui Chen, Hsing-Chung Chen, Zuojin Li and Ying Wu

    Citation: Human-centric Computing and Information Sciences 2017 7:35

    Content type: Research

    Published on:

  5. Virtual Reality (VR) has recently experienced rapid development for human–computer interactions. Users wearing VR headsets gain an immersive experience when interacting with a 3-dimensional (3D) world. We util...

    Authors: Wei Song, Liying Liu, Yifei Tian, Guodong Sun, Simon Fong and Kyungeun Cho

    Citation: Human-centric Computing and Information Sciences 2017 7:39

    Content type: Research

    Published on:

  6. One of the effective factors in increasing sales is the consistency of products with the preference of the customers. Designing the products consistent with customer needs requires the engagement of customers ...

    Authors: Zahra Sheikhi Darani and Marjan Kaedi

    Citation: Human-centric Computing and Information Sciences 2017 7:38

    Content type: Research

    Published on:

  7. Since cloud computing provides computing resources on a pay per use basis, a task scheduling algorithm directly affects the cost for users. In this paper, we propose a novel cloud task scheduling algorithm bas...

    Authors: YoungJu Moon, HeonChang Yu, Joon-Min Gil and JongBeom Lim

    Citation: Human-centric Computing and Information Sciences 2017 7:28

    Content type: Research

    Published on:

  8. This study investigates the possibilities of equipping fixed furniture with touch screens to control laptops or other smart home devices, to create a holistic smart home control system. Although multi-touch sc...

    Authors: Clerc-Manne Taing, Pei-Luen Patrick Rau and Hanjing Huang

    Citation: Human-centric Computing and Information Sciences 2017 7:27

    Content type: Research

    Published on:

  9. Nowadays, large shopping malls provide tools to help and boost customers to buy products. Some of these tools melt down digital operations with physical ones executed by customers into blended commerce experie...

    Authors: Carlo Blundo, Francesco Orciuoli and Mimmo Parente

    Citation: Human-centric Computing and Information Sciences 2017 7:26

    Content type: Research

    Published on:

  10. Discretization plays a major role as a data preprocessing technique used in machine learning and data mining. Recent studies have focused on multivariate discretization that considers relations among attribute...

    Authors: Kittakorn Sriwanna, Tossapon Boongoen and Natthakan Iam-On

    Citation: Human-centric Computing and Information Sciences 2017 7:21

    Content type: Research

    Published on:

  11. In this paper, we propose a novel algorithm that renders motion blurred shadows efficiently on GPUs using a temporal shadow map. Each triangle moves during a frame and for each pixel, it is visible to the ligh...

    Authors: MinhPhuoc Hong and Kyoungsu Oh

    Citation: Human-centric Computing and Information Sciences 2017 7:22

    Content type: Research

    Published on:

  12. As tablet devices become popular, various handwriting applications are used. Some of applications incorporate a specific function, which is generally called palm rejection. Palm rejection enables application u...

    Authors: Atsushi Kitani, Taketo Kimura and Takako Nakatani

    Citation: Human-centric Computing and Information Sciences 2017 7:18

    Content type: Research

    Published on:

  13. This paper presents the development of a Human Activity Recognition (HAR) system that uses a network of nine inertial measurement units situated in different body parts. Every unit provides 3D (3-dimension) ac...

    Authors: Jiadong Zhu, Rubén San-Segundo and José M. Pardo

    Citation: Human-centric Computing and Information Sciences 2017 7:16

    Content type: Research

    Published on:

  14. Satellite networks offer an efficient alternative where no terrestrial networks are available, and can offer a cost effective means of transferring data. Numerous proposals have addressed the problem of resour...

    Authors: Polychronis Koutsakis, Irene Spanou and Aggelos Lazaris

    Citation: Human-centric Computing and Information Sciences 2017 7:15

    Content type: Research

    Published on:

  15. It is a challenging task for all Harbors or Naval Administration to restrict and monitor the movement of defense or commercial ships. Most commonly used techniques of monitoring are radars and satellite images...

    Authors: Madhuri Rao and Narendra Kumar Kamila

    Citation: Human-centric Computing and Information Sciences 2017 7:14

    Content type: Research

    Published on:

  16. In a traditional classroom environment, instructor enthusiasm has been shown to enhance student’s emotion, affective perceptions, intrinsic motivation, and cognitive outcome. Additionally, emotional response t...

    Authors: Tze Wei Liew, Nor Azan Mat Zin and Noraidah Sahari

    Citation: Human-centric Computing and Information Sciences 2017 7:9

    Content type: Research

    Published on:

  17. Digital geographical maps can be regarded as a user interface for understanding and navigating the city. Nevertheless, contemporary digital maps over-emphasize the needs of motor vehicles. Pedestrian routes ha...

    Authors: Ippokratis Kapenekakis and Konstantinos Chorianopoulos

    Citation: Human-centric Computing and Information Sciences 2017 7:10

    Content type: Research

    Published on:

  18. NoSQL databases are capable of storing and processing big data which is characterized by various properties such as volume, variety and velocity. Such databases are used in a variety of user applications that ...

    Authors: María Teresa González-Aparicio, Adewole Ogunyadeka, Muhammad Younas, Javier Tuya and Rubén Casado

    Citation: Human-centric Computing and Information Sciences 2017 7:7

    Content type: Research

    Published on:

  19. Password managers, though commonly recommended by security experts, are still not used by many users. Understanding why some choose to use password managers while others do not is important towards generally u...

    Authors: Michael Fagan, Yusuf Albayram, Mohammad Maifi Hasan Khan and Ross Buck

    Citation: Human-centric Computing and Information Sciences 2017 7:12

    Content type: Research

    Published on:

  20. The article considers the model and method of converged computing and storage to create SCADA systems based on wireless networks for the energy industry. Computing power of modern wireless sensor network nodes...

    Authors: Alexey G. Finogeev, Danila S. Parygin and Anton A. Finogeev

    Citation: Human-centric Computing and Information Sciences 2017 7:11

    Content type: Research

    Published on:

  21. Since the end of 2000, smartphones have explosively spread and have made people’s lives plentiful. With the start of smartphones, new smart devices, including tablet PCs, smart TVs, smart refrigerators, and sm...

    Authors: Won Min Kang, Seo Yeon Moon and Jong Hyuk Park

    Citation: Human-centric Computing and Information Sciences 2017 7:6

    Content type: Research

    Published on:

  22. This paper is focused on analyzing the details of one of the most widely used Q&A technical discussion forums on the Internet: StackOverflow. StackOverflow is a huge source of information for both academics an...

    Authors: Tanveer Ahmed and Abhishek Srivastava

    Citation: Human-centric Computing and Information Sciences 2017 7:8

    Content type: Research

    Published on:

  23. Recently, embedded systems have become popular because of the rising demand for portable, low-power devices. A common task for these devices is object tracking, which is an essential part of various applicatio...

    Authors: Mai Thanh Nhat Truong and Sanghoon Kim

    Citation: Human-centric Computing and Information Sciences 2017 7:2

    Content type: Research

    Published on:

  24. Mobile crowdsensing is a burgeoning concept that allows smart cities to leverage the sensing power and ubiquitous nature of mobile devices in order to capture and map phenomena of common interest. At the core ...

    Authors: R. I. Ogie

    Citation: Human-centric Computing and Information Sciences 2016 6:24

    Content type: Review

    Published on:

  25. Mobile adhoc network (MANET) is one of the most relevant areas of research in wireless communication that has gained prevalence due to its diversity over large-scale highly mobile networks to small-scale netwo...

    Authors: Priyanka Jaiswal and Adwitiya Sinha

    Citation: Human-centric Computing and Information Sciences 2016 6:22

    Content type: Research

    Published on:

  26. As network traffic grows and attacks become more prevalent and complex, we must find creative new ways to enhance intrusion detection systems (IDSes). Recently, researchers have begun to harness both machine l...

    Authors: Nathan Keegan, Soo-Yeon Ji, Aastha Chaudhary, Claude Concolato, Byunggu Yu and Dong Hyun Jeong

    Citation: Human-centric Computing and Information Sciences 2016 6:19

    Content type: Research

    Published on:

  27. Recently the hardware performance of mobile devices have been extremely increased and advanced mobile devices provide multi-cores and high clock speed. In addition, mobile devices have advantages in mobility a...

    Authors: Min Hong, Jae-Hong Jeon, Hyo-Sub Yum and Seung-Hyun Lee

    Citation: Human-centric Computing and Information Sciences 2016 6:23

    Content type: Research

    Published on:

  28. The channel assignment problem is a complex problem which requires that under certain constraints a minimum number of channels have to be assigned to mobile calls in the wireless mobile system. In this paper, ...

    Authors: Nahla Nurelmadina, Ibtehal Nafea and Muhammad Younas

    Citation: Human-centric Computing and Information Sciences 2016 6:21

    Content type: Research

    Published on:

  29. In the internet era, search engines play a vital role in information retrieval from web pages. Search engines arrange the retrieved results using various ranking algorithms. Additionally, retrieval is based on...

    Authors: V. Vijayarajan, M. Dinakaran, Priyam Tejaswin and Mayank Lohani

    Citation: Human-centric Computing and Information Sciences 2016 6:18

    Content type: Research

    Published on:

  30. Medical and health data has become accepted as the highly worthful and useful big data. However, the current medical information systems have aimed for digitalizaing, storing, and transferring clinical materia...

    Authors: Meeyeon Lee, Ye-Seul Park, Myoung-Hee Kim and Jung-Won Lee

    Citation: Human-centric Computing and Information Sciences 2016 6:15

    Content type: Research

    Published on:

  31. Co-located collaboration on large vertical screens has become technically feasible, but users are faced with increased effort, or have to wear intrusive personal identifiers. Previous research on co-located co...

    Authors: Ioannis Leftheriotis, Konstantinos Chorianopoulos and Letizia Jaccheri

    Citation: Human-centric Computing and Information Sciences 2016 6:14

    Content type: Research

    Published on:

  32. Although, intuitive interface signs are crucial elements of a good user interface (UI), prior research ignored these in UI design and usability evaluation process. This paper argues that ontology (the set of c...

    Authors: Muhammad Nazrul Islam and A. K. M. Najmul Islam

    Citation: Human-centric Computing and Information Sciences 2016 6:20

    Content type: Research

    Published on:

  33. To address the limitations of static challenge question based fallback authentication mechanisms (e.g., easy predictability), recently, smartphone based autobiographical authentication mechanisms have been exp...

    Authors: Yusuf Albayram and Mohammad Maifi Hasan Khan

    Citation: Human-centric Computing and Information Sciences 2016 6:16

    Content type: Research

    Published on:

  34. Enterprises enhance their business on the web with the help of web services. This enhancement is achieved by composing the pre-existing services, so that they will be able to provide solutions for the problems...

    Authors: M. Thirumaran and G. Gayathry Brendha

    Citation: Human-centric Computing and Information Sciences 2016 6:13

    Content type: Research

    Published on:

  35. The continual advancement of internet technologies has led to the evolution of how individuals and organizations operate. For example, through the internet, we can now tap a remote workforce to help us accompl...

    Authors: Ria Mae Borromeo and Motomichi Toyama

    Citation: Human-centric Computing and Information Sciences 2016 6:11

    Content type: Review

    Published on:

  36. Phishing is an online criminal act that occurs when a malicious webpage impersonates as legitimate webpage so as to acquire sensitive information from the user. Phishing attack continues to pose a serious risk...

    Authors: S. Carolin Jeeva and Elijah Blessing Rajsingh

    Citation: Human-centric Computing and Information Sciences 2016 6:10

    Content type: Research

    Published on: