Skip to main content

Advertisement

Articles

Page 5 of 5

  1. In this paper, we propose a methodology to enhance the evaluation tools in semantic learning systems. Our proposal’s aim is to evaluate two types of open questions in hybrid exams. The proposed technique in th...

    Authors: Eman Elsayed, Kamal Eldahshan and Shaimaa Tawfeek

    Citation: Human-centric Computing and Information Sciences 2013 3:19

    Content type: Research

    Published on:

  2. Social design feedback is a novel approach to usability evaluation where user participants are asked to comment on designs asynchronously in online ad-hoc groups. Two key features of this approach are that (1)...

    Authors: Asbjørn Følstad, Kasper Hornbæk and Pål Ulleberg

    Citation: Human-centric Computing and Information Sciences 2013 3:18

    Content type: Research

    Published on:

  3. This paper aims to present and discuss the concept of a subjective job scheduler based on a Backpropagation Neural Network (BPNN) and a greedy job alignment procedure. The subjective criteria of the scheduler ...

    Authors: Anilkumar Kothalil Gopalakrishnan

    Citation: Human-centric Computing and Information Sciences 2013 3:17

    Content type: Research

    Published on:

  4. Decentralization in every walk of life has resulted in the development of Global Grid networking. Data sharing and access depends on their availability, capability, cost and user requirements. One of the needs...

    Authors: Jaspher Willsie Kathrine Gnanaraj, Kirubakaran Ezra and Elijah Blessing Rajsingh

    Citation: Human-centric Computing and Information Sciences 2013 3:16

    Content type: Research

    Published on:

  5. Panoramic photography is becoming a very popular and commonly available feature in the mobile handheld devices nowadays. In traditional panoramic photography, the human structure often becomes messy if the hum...

    Authors: Shih-Ming Chang, Hon-Hang Chang, Shwu-Huey Yen and Timothy K Shih

    Citation: Human-centric Computing and Information Sciences 2013 3:14

    Content type: Research

    Published on:

  6. We explain basic features of an emerging area called Intelligent Environments. We give a short overview on how it has developed, what is the current state of the art and what are the challenges laying ahead. T...

    Authors: Juan C Augusto, Vic Callaghan, Diane Cook, Achilles Kameas and Ichiro Satoh

    Citation: Human-centric Computing and Information Sciences 2013 3:12

    Content type: Research

    Published on:

  7. We present a user-based approach for detecting interesting video segments through simple signal processing of users’ collective interactions with the video player (e.g., seek/scrub, play, pause). Previous rese...

    Authors: Konstantinos Chorianopoulos

    Citation: Human-centric Computing and Information Sciences 2013 3:10

    Content type: Research

    Published on:

  8. Advancement in the area of software engineering, mobile computing together with web technologies have paved way for myriad range of applications, including good quality E-learning software’s, delivering online...

    Authors: Varun Gupta, Durg Singh Chauhan and Kamlesh Dutta

    Citation: Human-centric Computing and Information Sciences 2013 3:8

    Content type: Research

    Published on:

  9. In this paper, a mechanism generating RDF Semantic Web schema from Web document set as the semantic metadata is proposed. Analyzing both the structural and un-structural content of Web documents, semi-structur...

    Authors: Hsiang-Yuan Hsueh, Chun-Nan Chen and Kun-Fu Huang

    Citation: Human-centric Computing and Information Sciences 2013 3:7

    Content type: Research

    Published on:

  10. In this paper, the development of a shared virtual presentation board (VPB) for real-time e-Meeting on the Web-based e-Learning System (WebELS) platform is introduced. WebELS is a general-purpose e-Learning sy...

    Authors: Arjulie John Berena, Sila Chunwijitra, Hitoshi Okada and Haruki Ueno

    Citation: Human-centric Computing and Information Sciences 2013 3:6

    Content type: Research

    Published on:

  11. This paper presents an adaptive neuro/fuzzy system which can be trained to detect the current human emotions from a set of measured responses. Six models are built using different types of input/output members...

    Authors: Mohammad Malkawi and Omayya Murad

    Citation: Human-centric Computing and Information Sciences 2013 3:3

    Content type: Research

    Published on:

  12. Position information is an important aspect of a mobile device’s context. While GPS is widely used to provide location information, it does not work well indoors. Wi-Fi network infrastructure is found in many ...

    Authors: Yan Luo, Orland Hoeber and Yuanzhu Chen

    Citation: Human-centric Computing and Information Sciences 2013 3:2

    Content type: Research

    Published on:

  13. In service oriented computing, service providers and service requesters are main interacting entities. A service provider publishes the services it wishes to make public using service registries. A service reques...

    Authors: Naseem Ibrahim, Mubarak Mohammad and Vangalur Alagar

    Citation: Human-centric Computing and Information Sciences 2013 3:1

    Content type: Research

    Published on:

  14. Well-designed instructional material is equally important for successful e-Learning implementation. Teachers and instructors play a major role in terms of designing and building learning content. In one respec...

    Authors: Royyana M Ijtihadie, Bekti C Hidayanto, Achmad Affandi, Yoshifumi Chisaki and Tsuyoshi Usagawa

    Citation: Human-centric Computing and Information Sciences 2012 2:17

    Content type: Research

    Published on:

  15. The wireless sensor networks have long been an attractive field to the researchers and scientists for its ease in deployment and maintenance. In this research, we focus on the maximization of network lifetime ...

    Authors: Buddha Singh and Daya Krishan Lobiyal

    Citation: Human-centric Computing and Information Sciences 2012 2:13

    Content type: Research

    Published on:

  16. Feature selection techniques use a search-criteria driven approach for ranked feature subset selection. Often, selecting an optimal subset of ranked features using the existing methods is intractable for high ...

    Authors: Alex Pappachen James and Sima Dimitrijev

    Citation: Human-centric Computing and Information Sciences 2012 2:12

    Content type: Research

    Published on:

  17. Multimedia objects like music and movies are distributed to peers through downloading and caching in peer-to-peer (P2P) overlay networks. In this paper, we consider multimedia objects which are characterized i...

    Authors: Tadateru Ohkawara, Ailixier Aikebaier, Tomoya Enokido and Makoto Takizawa

    Citation: Human-centric Computing and Information Sciences 2012 2:11

    Content type: Research

    Published on:

  18. Muscle tissue composition can be efficiently analyzed and quantified using images from spiral computed tomography technology (SCT) and the associated values of Hounsfield unit (HU) for different tissues. This ...

    Authors: Paolo Gargiulo, Thordur Helgason, Páll Ingvarsson, Winfried Mayr, Helmut Kern and Ugo Carraro

    Citation: Human-centric Computing and Information Sciences 2012 2:10

    Content type: Letter

    Published on:

  19. With wide application of virtualization technology, the demand is increasing for performance analysis and system diagnosis in virtualization environment. There are some profiling toolkits based on hardware eve...

    Authors: Xia Xie, Haiou Jiang, Hai Jin, Wenzhi Cao, Pingpeng Yuan and Laurence Tianruo Yang

    Citation: Human-centric Computing and Information Sciences 2012 2:8

    Content type: Research

    Published on:

  20. This paper presents a model approach to examine the relationships among e-learning systems, self-efficacy, and students' apparent learning results for university online courses.

    Authors: Tanzila Saba

    Citation: Human-centric Computing and Information Sciences 2012 2:6

    Content type: Research

    Published on:

    The Retraction Note to this article has been published in Human-centric Computing and Information Sciences 2013 3:11

  21. Service selection in pervasive computing is significant as it requires identifying the best service provider based on users requirements. After identifying the best service provider, when a service is being ex...

    Authors: Salaja Silas, Kirubakaran Ezra and Elijah Blessing Rajsingh

    Citation: Human-centric Computing and Information Sciences 2012 2:5

    Content type: Research

    Published on:

  22. Once multi-relational approach has emerged as an alternative for analyzing structured data such as relational databases, since they allow applying data mining in multiple tables directly, thus avoiding expensi...

    Authors: Carlos Roberto Valêncio, Fernando Takeshi Oyama, Paulo Scarpelini Neto, Angelo Cesar Colombini, Adriano Mauro Cansian, Rogéria Cristiane Gratão de Souza and Pedro Luiz Pizzigatti Corrêa

    Citation: Human-centric Computing and Information Sciences 2012 2:4

    Content type: Research

    Published on:

  23. Information systems are being shifted to scalable architectures like Cloud and peer-to-peer (P2P) models. In this paper, we consider the P2P model as a fully distributed, scalable system different from central...

    Authors: Ailixier Aikebaier, Tomoya Enokido and Makoto Takizawa

    Citation: Human-centric Computing and Information Sciences 2011 1:6

    Content type: Research

    Published on:

  24. The prevalence of multimedia applications has drastically increased the amount of multimedia data. With the drop of the hardware cost, more and more mobile devices with higher capacities are now used. The wide...

    Authors: Hongli Luo and Mei-Ling Shyu

    Citation: Human-centric Computing and Information Sciences 2011 1:5

    Content type: Review

    Published on:

  25. The black hole attack is one of the well-known security threats in wireless mobile ad hoc networks. The intruders utilize the loophole to carry out their malicious behaviors because the route discovery process...

    Authors: Fan-Hsun Tseng, Li-Der Chou and Han-Chieh Chao

    Citation: Human-centric Computing and Information Sciences 2011 1:4

    Content type: Research

    Published on:

  26. Mobile ad hoc networks are attracting attention for their potential use in several fields such as collaborative computing and communications in indoor areas. Mobility and the absence of any fixed infrastructur...

    Authors: Masahiro Hiyama, Elis Kulla, Tetsuya Oda, Makoto Ikeda and Leonard Barolli

    Citation: Human-centric Computing and Information Sciences 2011 1:3

    Content type: Research

    Published on: