Skip to content

Advertisement

Articles

Page 5 of 5

  1. Content type: Research

    This paper presents an adaptive neuro/fuzzy system which can be trained to detect the current human emotions from a set of measured responses. Six models are built using different types of input/output members...

    Authors: Mohammad Malkawi and Omayya Murad

    Citation: Human-centric Computing and Information Sciences 2013 3:3

    Published on:

  2. Content type: Research

    Position information is an important aspect of a mobile device’s context. While GPS is widely used to provide location information, it does not work well indoors. Wi-Fi network infrastructure is found in many ...

    Authors: Yan Luo, Orland Hoeber and Yuanzhu Chen

    Citation: Human-centric Computing and Information Sciences 2013 3:2

    Published on:

  3. Content type: Research

    In service oriented computing, service providers and service requesters are main interacting entities. A service provider publishes the services it wishes to make public using service registries. A service reques...

    Authors: Naseem Ibrahim, Mubarak Mohammad and Vangalur Alagar

    Citation: Human-centric Computing and Information Sciences 2013 3:1

    Published on:

  4. Content type: Research

    Well-designed instructional material is equally important for successful e-Learning implementation. Teachers and instructors play a major role in terms of designing and building learning content. In one respec...

    Authors: Royyana M Ijtihadie, Bekti C Hidayanto, Achmad Affandi, Yoshifumi Chisaki and Tsuyoshi Usagawa

    Citation: Human-centric Computing and Information Sciences 2012 2:17

    Published on:

  5. Content type: Research

    The wireless sensor networks have long been an attractive field to the researchers and scientists for its ease in deployment and maintenance. In this research, we focus on the maximization of network lifetime ...

    Authors: Buddha Singh and Daya Krishan Lobiyal

    Citation: Human-centric Computing and Information Sciences 2012 2:13

    Published on:

  6. Content type: Research

    Feature selection techniques use a search-criteria driven approach for ranked feature subset selection. Often, selecting an optimal subset of ranked features using the existing methods is intractable for high ...

    Authors: Alex Pappachen James and Sima Dimitrijev

    Citation: Human-centric Computing and Information Sciences 2012 2:12

    Published on:

  7. Content type: Research

    Multimedia objects like music and movies are distributed to peers through downloading and caching in peer-to-peer (P2P) overlay networks. In this paper, we consider multimedia objects which are characterized i...

    Authors: Tadateru Ohkawara, Ailixier Aikebaier, Tomoya Enokido and Makoto Takizawa

    Citation: Human-centric Computing and Information Sciences 2012 2:11

    Published on:

  8. Content type: Letter

    Muscle tissue composition can be efficiently analyzed and quantified using images from spiral computed tomography technology (SCT) and the associated values of Hounsfield unit (HU) for different tissues. This ...

    Authors: Paolo Gargiulo, Thordur Helgason, Páll Ingvarsson, Winfried Mayr, Helmut Kern and Ugo Carraro

    Citation: Human-centric Computing and Information Sciences 2012 2:10

    Published on:

  9. Content type: Research

    With wide application of virtualization technology, the demand is increasing for performance analysis and system diagnosis in virtualization environment. There are some profiling toolkits based on hardware eve...

    Authors: Xia Xie, Haiou Jiang, Hai Jin, Wenzhi Cao, Pingpeng Yuan and Laurence Tianruo Yang

    Citation: Human-centric Computing and Information Sciences 2012 2:8

    Published on:

  10. Content type: Research

    This paper presents a model approach to examine the relationships among e-learning systems, self-efficacy, and students' apparent learning results for university online courses.

    Authors: Tanzila Saba

    Citation: Human-centric Computing and Information Sciences 2012 2:6

    Published on:

    The Retraction Note to this article has been published in Human-centric Computing and Information Sciences 2013 3:11

  11. Content type: Research

    Service selection in pervasive computing is significant as it requires identifying the best service provider based on users requirements. After identifying the best service provider, when a service is being ex...

    Authors: Salaja Silas, Kirubakaran Ezra and Elijah Blessing Rajsingh

    Citation: Human-centric Computing and Information Sciences 2012 2:5

    Published on:

  12. Content type: Research

    Once multi-relational approach has emerged as an alternative for analyzing structured data such as relational databases, since they allow applying data mining in multiple tables directly, thus avoiding expensi...

    Authors: Carlos Roberto Valêncio, Fernando Takeshi Oyama, Paulo Scarpelini Neto, Angelo Cesar Colombini, Adriano Mauro Cansian, Rogéria Cristiane Gratão de Souza and Pedro Luiz Pizzigatti Corrêa

    Citation: Human-centric Computing and Information Sciences 2012 2:4

    Published on:

  13. Content type: Research

    Information systems are being shifted to scalable architectures like Cloud and peer-to-peer (P2P) models. In this paper, we consider the P2P model as a fully distributed, scalable system different from central...

    Authors: Ailixier Aikebaier, Tomoya Enokido and Makoto Takizawa

    Citation: Human-centric Computing and Information Sciences 2011 1:6

    Published on:

  14. Content type: Review

    The prevalence of multimedia applications has drastically increased the amount of multimedia data. With the drop of the hardware cost, more and more mobile devices with higher capacities are now used. The wide...

    Authors: Hongli Luo and Mei-Ling Shyu

    Citation: Human-centric Computing and Information Sciences 2011 1:5

    Published on:

  15. Content type: Research

    The black hole attack is one of the well-known security threats in wireless mobile ad hoc networks. The intruders utilize the loophole to carry out their malicious behaviors because the route discovery process...

    Authors: Fan-Hsun Tseng, Li-Der Chou and Han-Chieh Chao

    Citation: Human-centric Computing and Information Sciences 2011 1:4

    Published on:

  16. Content type: Research

    Mobile ad hoc networks are attracting attention for their potential use in several fields such as collaborative computing and communications in indoor areas. Mobility and the absence of any fixed infrastructur...

    Authors: Masahiro Hiyama, Elis Kulla, Tetsuya Oda, Makoto Ikeda and Leonard Barolli

    Citation: Human-centric Computing and Information Sciences 2011 1:3

    Published on: