Skip to main content

Advertisement

Articles

Page 4 of 5

  1. Content type: Review

    Up to now, biometric recognition has shown significant advantages as to be considered a reliable solution for security systems in mobile environments. Nevertheless, due to the short lifetime of biometrics in ...

    Authors: Ramon Blanco-Gonzalo, Norman Poh, Rita Wong and Raul Sanchez-Reillo

    Citation: Human-centric Computing and Information Sciences 2015 5:24

    Published on:

  2. Content type: Research

    Keys to successful implementation of smart business require a wide spectrum of domain knowledge, experts, and their correlated experiences. Excluding those external factors—which can be collected by well-deplo...

    Authors: Atsushi Sato, Runhe Huang and Neil Y Yen

    Citation: Human-centric Computing and Information Sciences 2015 5:23

    Published on:

  3. Content type: Research

    INSPECT is a novel interaction technique for 3D object manipulation using a rotation-only tracked touch panel. Motivated by the applicability of the technique on smartphones, we explore this design space by in...

    Authors: Nicholas Katzakis, Robert J Teather, Kiyoshi Kiyokawa and Haruo Takemura

    Citation: Human-centric Computing and Information Sciences 2015 5:22

    Published on:

  4. Content type: Research

    Collaborative filtering (CF) is a popular method for the personalized recommendation. Almost all of the existing CF methods rely only on the rating data while ignoring some important implicit information in no...

    Authors: Weimin Li, Xunfeng Li, Mengke Yao, Jiulei Jiang and Qun Jin

    Citation: Human-centric Computing and Information Sciences 2015 5:21

    Published on:

  5. Content type: Research

    This paper explores the use of data from the Kinect sensor for performing augmented reality, with emphasis on cultural heritage applications. It is shown that the combination of depth and image correspondences...

    Authors: Erkan Bostanci, Nadia Kanwal and Adrian F Clark

    Citation: Human-centric Computing and Information Sciences 2015 5:20

    Published on:

  6. Content type: Research

    Ensuring the cloud data security is a major concern for corporate cloud subscribers and in some cases for the private cloud users. Confidentiality of the stored data can be managed by encrypting the data at th...

    Authors: Md Iftekhar Salam, Wei-Chuen Yau, Ji-Jian Chin, Swee-Huay Heng, Huo-Chong Ling, Raphael C-W Phan, Geong Sen Poh, Syh-Yuan Tan and Wun-She Yap

    Citation: Human-centric Computing and Information Sciences 2015 5:19

    Published on:

  7. Content type: Research

    Online service providers often use challenge questions (a.k.a. knowledge‐based authentication) to facilitate resetting of passwords or to provide an extra layer of security for authentication. While prior sche...

    Authors: Yusuf Albayram, Mohammad Maifi Hasan Khan, Athanasios Bamis, Sotirios Kentros, Nhan Nguyen and Ruhua Jiang

    Citation: Human-centric Computing and Information Sciences 2015 5:17

    Published on:

  8. Content type: Research

    Software as a Service (SaaS) in Cloud Computing offers reliable access to software applications for end users over the Internet without direct investment in infrastructure and software. SaaS providers utilize ...

    Authors: Farzaneh Motavaselalhagh, Faramarz Safi Esfahani and Hamid Reza Arabnia

    Citation: Human-centric Computing and Information Sciences 2015 5:16

    Published on:

  9. Content type: Research

    This article is aimed to describe the method of testing the implementation of voice control over operating and technical functions of Smart Home Come. Custom control over operating and technical functions was ...

    Authors: Jan Vanus, Marek Smolon, Radek Martinek, Jiri Koziorek, Jan Zidek and Petr Bilik

    Citation: Human-centric Computing and Information Sciences 2015 5:15

    Published on:

  10. Content type: Research

    Active contours are used in the image processing application including edge detection, shape modeling, medical image-analysis, detectable object boundaries, etc. Shape is one of the important features for desc...

    Authors: Nguyen Thanh Binh

    Citation: Human-centric Computing and Information Sciences 2015 5:14

    Published on:

  11. Content type: Research

    The objective of this study is to assess the combined performance of textural and morphological features for the detection and diagnosis of breast masses in ultrasound images. We have extracted a total of fort...

    Authors: Kadayanallur Mahadevan Prabusankarlal, Palanisamy Thirumoorthy and Radhakrishnan Manavalan

    Citation: Human-centric Computing and Information Sciences 2015 5:12

    Published on:

  12. Content type: Research

    Since 2008, soaring international oil prices and environmental awareness have pushed bicycle to be a green transport vehicle to reduce greenhouse gas emissions as a significant global trend. Consequently, Taiw...

    Authors: Huan-Ming Chuang and You-Shyang Chen

    Citation: Human-centric Computing and Information Sciences 2015 5:11

    Published on:

  13. Content type: Research

    Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is suitable for data access control on a cloud storage system. In CP-ABE, the data owner encrypts data under the access structure over attributes and a set...

    Authors: Takeru Naruse, Masami Mohri and Yoshiaki Shiraishi

    Citation: Human-centric Computing and Information Sciences 2015 5:8

    Published on:

  14. Content type: Research

    The availability of advanced wireless sensor nodes enable us to use video processing techniques in a wireless sensor network (WSN) platform. Such paradigm can be used to implement video sensor networks (VSNs) ...

    Authors: Bambang AB Sarif, Mahsa T Pourazad, Panos Nasiopoulos, Victor CM Leung and Amr Mohamed

    Citation: Human-centric Computing and Information Sciences 2015 5:7

    Published on:

  15. Content type: Research

    In recent, numerous useful visual analytics tools have been designed to help domain experts solve analytical problems. However, most of the tools do not reflect the nature of solving real-world analytical task...

    Authors: Dong Hyun Jeong, Soo-Yeon Ji, Evan A Suma, Byunggu Yu and Remco Chang

    Citation: Human-centric Computing and Information Sciences 2015 5:5

    Published on:

  16. Content type: Research

    The power-performance trade-off is one of the major considerations in micro-architecture design. Pipelined architecture has brought a radical change in the design to capitalize on the parallel operation of var...

    Authors: Vijayalakshmi Saravanan, Kothari Dwarkadas Pralhaddas, Dwarkadas Pralhaddas Kothari and Isaac Woungang

    Citation: Human-centric Computing and Information Sciences 2015 5:2

    Published on:

    The Erratum to this article has been published in Human-centric Computing and Information Sciences 2015 5:9

  17. Content type: Research

    “BAU GIS” is an efficient and flexible Geographic Information System (GIS) that supports manipulation, analysis, and viewing of geospatial data and associated attribute data in various GIS data formats. “BAU G...

    Authors: Balqies Sadoun, Omar Al-Bayari, Jalal Al-Azizi and Samih Al Rawashdeh

    Citation: Human-centric Computing and Information Sciences 2015 5:1

    Published on:

  18. Content type: Research

    This article describes the development of a visualization application software used to control operational and technical functions in the Smart Home system or Smart Home Care system via the wireless xComfort c...

    Authors: Jan Vanus, Pavel Kucera, Radek Martinek and Jiri Koziorek

    Citation: Human-centric Computing and Information Sciences 2014 4:18

    Published on:

  19. Content type: Research

    Teams are at the heart of today’s organizations and their performance is crucial for organizational success. It is therefore important to understand and monitor team processes. Traditional approaches employ qu...

    Authors: Sebastian Feese, Michael Joseph Burscher, Klaus Jonas and Gerhard Tröster

    Citation: Human-centric Computing and Information Sciences 2014 4:15

    Published on:

  20. Content type: Research

    E-mail communication has become an essential part of collaborative tasks in enterprises. However, when conventional e-mail applications are used for collaborative tasks, problems with task-related resources ma...

    Authors: Masashi Katsumata

    Citation: Human-centric Computing and Information Sciences 2014 4:17

    Published on:

  21. Content type: Research

    Wireless mesh networks are highly susceptible to Distributed Denial-of-Service attacks due to its self-configuring property. Flooding DDOS attack is one form of collaborative attacks and the transport layer of...

    Authors: I Diana Jeba Jingle and Elijah Blessing Rajsingh

    Citation: Human-centric Computing and Information Sciences 2014 4:8

    Published on:

  22. Content type: Research

    As mobile technologies become widespread, new challenges are facing the research community to develop lightweight learning services adapted to the learner’s profile, context, and task at hand. This paper attem...

    Authors: Rachid Benlamri and Xiaoyun Zhang

    Citation: Human-centric Computing and Information Sciences 2014 4:12

    Published on:

  23. Content type: Research

    With the increasing application of wireless communication devices, mobile phone handsets are used by peoples of various age groups. This paper make an effort to asses the mobile phone radiation exposure effect...

    Authors: Balamurugan Rajagopal and Lalithambika Rajasekaran

    Citation: Human-centric Computing and Information Sciences 2014 4:10

    Published on:

  24. Content type: Research

    We study the survivable network design problem (SNDP) for simultaneous unicast and anycast flows in networks where the link cost follows All Capacities Modular Cost (ACMC) model. Given a network modeled by a c...

    Authors: Huynh Thi Thanh Binh and Son Hong Ngo

    Citation: Human-centric Computing and Information Sciences 2014 4:13

    Published on:

  25. Content type: Review

    Mobile Ad-hoc Network one of the prominent area for the researchers and practitioners in assorted domains including security, routing, addressing and many others. A Mobile Ad-hoc Network (MANET) refers to an a...

    Authors: Rajinder Singh, Parvinder Singh and Manoj Duhan

    Citation: Human-centric Computing and Information Sciences 2014 4:7

    Published on:

  26. Content type: Research

    Wireless Mesh Networks (WMNs) distinguish for their low cost nature that makes them very attractive for providing wireless Internet connectivity. Such infrastructures can be used to deploy community networks, ...

    Authors: Admir Barolli, Shinji Sakamoto, Tetsuya Oda, Evjola Spaho, Leonard Barolli and Fatos Xhafa

    Citation: Human-centric Computing and Information Sciences 2014 4:5

    Published on:

  27. Content type: Reasearch

    The idea of multiple antenna arrays has evolved into multiple-input multiple-output (MIMO) system, which provides transmit and receive diversities. It increases robustness of the effect of multipath fading in ...

    Authors: Jin Hui Chong, Chee Kyun Ng, Nor Kamariah Noordin and Borhanuddin Mohd Ali

    Citation: Human-centric Computing and Information Sciences 2014 4:2

    Published on:

  28. Content type: Research

    In this paper, a novel approach for head pose estimation in gray-level images is presented. In the proposed algorithm, two techniques were employed. In order to deal with the large set of training data, the me...

    Authors: Hyunduk Kim, Sang-Heon Lee, Myoung-Kyu Sohn and Dong-Ju Kim

    Citation: Human-centric Computing and Information Sciences 2014 4:9

    Published on:

  29. Content type: Research

    Incorrect snake identification from the observable visual traits is a major reason for death resulting from snake bites in tropics. So far no automatic classification method has been proposed to distinguish sn...

    Authors: Alex Pappachen James, Bincy Mathews, Sherin Sugathan and Dileep Kumar Raveendran

    Citation: Human-centric Computing and Information Sciences 2014 4:3

    Published on:

  30. Content type: Research

    A Multi Agent System that provides a (cared for) person, the subject, with assistance and support through an Ambient Assisted Living Flexible Interface (AALFI) during the day while complementing the night time...

    Authors: James McNaull, Juan Carlos Augusto, Maurice Mulvenna and Paul McCullagh

    Citation: Human-centric Computing and Information Sciences 2014 4:1

    Published on:

  31. Content type: Research

    Despite many assistive tools available for browsing the web, blind persons are not able to perform the tasks using internet that are done by persons without such disability. Even the futuristic social networki...

    Authors: Prabhat Verma, Raghuraj Singh and Avinash Kumar Singh

    Citation: Human-centric Computing and Information Sciences 2013 3:21

    Published on:

  32. Content type: Research

    In this paper, we propose a methodology to enhance the evaluation tools in semantic learning systems. Our proposal’s aim is to evaluate two types of open questions in hybrid exams. The proposed technique in th...

    Authors: Eman Elsayed, Kamal Eldahshan and Shaimaa Tawfeek

    Citation: Human-centric Computing and Information Sciences 2013 3:19

    Published on:

  33. Content type: Research

    Social design feedback is a novel approach to usability evaluation where user participants are asked to comment on designs asynchronously in online ad-hoc groups. Two key features of this approach are that (1)...

    Authors: Asbjørn Følstad, Kasper Hornbæk and Pål Ulleberg

    Citation: Human-centric Computing and Information Sciences 2013 3:18

    Published on:

  34. Content type: Research

    This paper aims to present and discuss the concept of a subjective job scheduler based on a Backpropagation Neural Network (BPNN) and a greedy job alignment procedure. The subjective criteria of the scheduler ...

    Authors: Anilkumar Kothalil Gopalakrishnan

    Citation: Human-centric Computing and Information Sciences 2013 3:17

    Published on:

  35. Content type: Research

    Decentralization in every walk of life has resulted in the development of Global Grid networking. Data sharing and access depends on their availability, capability, cost and user requirements. One of the needs...

    Authors: Jaspher Willsie Kathrine Gnanaraj, Kirubakaran Ezra and Elijah Blessing Rajsingh

    Citation: Human-centric Computing and Information Sciences 2013 3:16

    Published on: