Skip to main content

Advertisement

Articles

Page 1 of 6

  1. Data fusion has always been a hot research topic in human-centric computing and extended with the development of artificial intelligence. Generally, the coupled data fusion algorithm usually utilizes the infor...

    Authors: Liangfu Lu, Xiaoxu Ren, Kuo-Hui Yeh, Zhiyuan Tan and Jocelyn Chanussot

    Citation: Human-centric Computing and Information Sciences 2020 10:10

    Content type: Research

    Published on:

  2. With the advancement of Information and Communication Technology (ICT) and the proliferation of sensor technologies, the Internet of Things (IoT) is now being widely used in smart home for the purposes of effi...

    Authors: Younghun Lee, Shailendra Rathore, Jin Ho Park and Jong Hyuk Park

    Citation: Human-centric Computing and Information Sciences 2020 10:9

    Content type: Research

    Published on:

  3. The quality and quantity of participation supplied by human beings during the different phases of the design and development of a software artifact are central to studies in human-centered computing. With this...

    Authors: Marco Roccetti, Catia Prandi, Silvia Mirri and Paola Salomoni

    Citation: Human-centric Computing and Information Sciences 2020 10:8

    Content type: Research

    Published on:

  4. The continuous advancement in the Internet of Things technology allows people to connect anywhere at any time, thus showing great potential in technology like smart devices (including smartphones and wearable ...

    Authors: Mohammed A. Alqarni, Sajjad Hussain Chauhdary, Maryam Naseer Malik, Muhammad Ehatisham-ul-Haq and Muhammad Awais Azam

    Citation: Human-centric Computing and Information Sciences 2020 10:7

    Content type: Research

    Published on:

  5. In recent years, statistics have confirmed that the number of elderly people is increasing. Aging always has a strong impact on the health of a human being; from a biological of point view, this process usuall...

    Authors: Giovanni Cicceri, Fabrizio De Vita, Dario Bruneo, Giovanni Merlino and Antonio Puliafito

    Citation: Human-centric Computing and Information Sciences 2020 10:5

    Content type: Research

    Published on:

  6. The latest shifts in technology have brought about new kinds of users who occasionally access unfamiliar systems in new scenarios. This way of use should not request any learning curve. There have been many at...

    Authors: Antonio L. Carrillo and Juan A. Falgueras

    Citation: Human-centric Computing and Information Sciences 2020 10:4

    Content type: Research

    Published on:

  7. The prediction of individual interpersonal communication skills and personality traits is a critical issue in both industrial and organizational psychology and affective computing. In this study, we invited 11...

    Authors: Hung-Yue Suen, Kuo-En Hung and Chien-Liang Lin

    Citation: Human-centric Computing and Information Sciences 2020 10:3

    Content type: Research

    Published on:

  8. Applications of localization range from body tracking, gesture capturing, indoor plan construction to mobile health sensing. Technologies such as inertial sensors, radio frequency signals and cameras have been...

    Authors: Manni Liu, Linsong Cheng, Kun Qian, Jiliang Wang, Jin Wang and Yunhao Liu

    Citation: Human-centric Computing and Information Sciences 2020 10:2

    Content type: Research

    Published on:

  9. The proliferation of social media enables people to express their opinions widely online. However, at the same time, this has resulted in the emergence of conflict and hate, making online environments uninviti...

    Authors: Joni Salminen, Maximilian Hopf, Shammur A. Chowdhury, Soon-gyo Jung, Hind Almerekhi and Bernard J. Jansen

    Citation: Human-centric Computing and Information Sciences 2020 10:1

    Content type: Research

    Published on:

  10. Content cache as well as data cache is vital to Content Centric Network (CCN). A sophisticated cache scheme is necessary but unsatisfied currently. Existing content cache scheme wastes router’s cache capacity ...

    Authors: Hsin-Te Wu, Hsin-Hung Cho, Sheng-Jie Wang and Fan-Hsun Tseng

    Citation: Human-centric Computing and Information Sciences 2019 9:44

    Content type: Research

    Published on:

  11. Unlike retail stores, in which the user is forced to be physically present and active during restricted opening hours, online shops may be more convenient, functional and efficient. However, traditional online...

    Authors: Huiyue Wu, Weizhou Luo, Neng Pan, Shenghuan Nan, Yanyi Deng, Shengqian Fu and Liuqingqing Yang

    Citation: Human-centric Computing and Information Sciences 2019 9:43

    Content type: Research

    Published on:

  12. Brain wave emotion analysis is the most novel method of emotion analysis at present. With the progress of brain science, it is found that human emotions are produced by the brain. As a result, many brain-wave ...

    Authors: Ting-Mei Li, Han-Chieh Chao and Jianming Zhang

    Citation: Human-centric Computing and Information Sciences 2019 9:42

    Content type: Review

    Published on:

  13. Detecting network overlapping community has become a very hot research topic in the literature. However, overlapping community detection for count-value networks that naturally arise and are pervasive in our m...

    Authors: QianCheng Yu, ZhiWen Yu, Zhu Wang, XiaoFeng Wang and YongZhi Wang

    Citation: Human-centric Computing and Information Sciences 2019 9:41

    Content type: Research

    Published on:

  14. In order to solve the problem of human motion recognition in multimedia interaction scenarios in virtual reality environment, a motion classification and recognition algorithm based on linear decision and supp...

    Authors: Fuquan Zhang, Tsu-Yang Wu, Jeng-Shyang Pan, Gangyi Ding and Zuoyong Li

    Citation: Human-centric Computing and Information Sciences 2019 9:40

    Content type: Research

    Published on:

  15. This paper proposes a methodology based on the concept of Human Factors to obtain Cybersecurity profiles. The profiles are determined by a set of parameters that help model the skills of individuals (potential of...

    Authors: Ana Nieto and Ruben Rios

    Citation: Human-centric Computing and Information Sciences 2019 9:39

    Content type: Review

    Published on:

  16. Situation awareness is the first and most important step in emergency management. It is a dynamic step involving evolving conditions and environments. It is an area of active research. This study presents a Ma...

    Authors: Syed Nasir Danial, Jennifer Smith, Faisal Khan and Brian Veitch

    Citation: Human-centric Computing and Information Sciences 2019 9:37

    Content type: Research

    Published on:

  17. This work proposes a methodology to program an artificial agent that can make decisions based on a naturalistic decision-making approach called recognition-primed decision model (RPDM). The proposed methodolog...

    Authors: Syed Nasir Danial, Jennifer Smith, Brian Veitch and Faisal Khan

    Citation: Human-centric Computing and Information Sciences 2019 9:36

    Content type: Research

    Published on:

  18. Aspect-based sentiment analysis (ABSA) is a powerful way of predicting the sentiment polarity of text in natural language processing. However, understanding human emotions and reasoning from text like a human ...

    Authors: Ning Liu, Bo Shen, Zhenjiang Zhang, Zhiyuan Zhang and Kun Mi

    Citation: Human-centric Computing and Information Sciences 2019 9:35

    Content type: Research

    Published on:

  19. Multimodal sensors in healthcare applications have been increasingly researched because it facilitates automatic and comprehensive monitoring of human behaviors, high-intensity sports management, energy expend...

    Authors: Henry Friday Nweke, Ying Wah Teh, Ghulam Mujtaba, Uzoma Rita Alo and Mohammed Ali Al-garadi

    Citation: Human-centric Computing and Information Sciences 2019 9:34

    Content type: Research

    Published on:

  20. Human-centric computing is becoming an important part of data-driven artificial intelligence (AI) and the importance of data mining under Human-centric computing is getting more and more attention. The rapid d...

    Authors: Chunyong Yin, Biao Zhou, Zhichao Yin and Jin Wang

    Citation: Human-centric Computing and Information Sciences 2019 9:33

    Content type: Research

    Published on:

  21. Code-based public key encryption (PKE) is a popular choice to achieve post-quantum security, partly due to its capability to achieve fast encryption/decryption. However, code-based PKE has larger ciphertext an...

    Authors: Peng Zeng, Siyuan Chen and Kim-Kwang Raymond Choo

    Citation: Human-centric Computing and Information Sciences 2019 9:32

    Content type: Research

    Published on:

  22. Image retrieval is the process of retrieving images from a database. Certain algorithms have been used for traditional image retrieval. However, such retrieval involves certain limitations, such as manual imag...

    Authors: Mudhafar Jalil Jassim Ghrabat, Guangzhi Ma, Ismail Yaqub Maolood, Shayem Saleh Alresheedi and Zaid Ameen Abduljabbar

    Citation: Human-centric Computing and Information Sciences 2019 9:31

    Content type: Research

    Published on:

  23. In the recent era, artificial intelligence (AI) is being used to support numerous solutions for human beings, such as healthcare, autonomous transportation, and so on. Cognitive computing is represented as a n...

    Authors: Jin-ho Park, Mikail Mohammed Salim, Jeong Hoon Jo, Jose Costa Sapalo Sicato, Shailendra Rathore and Jong Hyuk Park

    Citation: Human-centric Computing and Information Sciences 2019 9:29

    Content type: Research

    Published on:

  24. Fog computing network is designed as an extension of the cloud due to the need for a supporting platform capable of ensuring the requirements of Internet of Thing (IoT). The growth of fog based fifth generatio...

    Authors: Wided Ben Daoud, Mohammad S. Obaidat, Amel Meddeb-Makhlouf, Faouzi Zarai and Kuei-Fang Hsiao

    Citation: Human-centric Computing and Information Sciences 2019 9:28

    Content type: Research

    Published on:

  25. In the original publication of this article [1], the Acknowledgements and Funding section in Declarations need to be revised.

    Authors: Shakeel Ahmad, Muhammad Zubair Asghar, Fahad M. Alotaibi and Irfanullah Awan

    Citation: Human-centric Computing and Information Sciences 2019 9:27

    Content type: Correction

    Published on:

    The original article was published in Human-centric Computing and Information Sciences 2019 9:24

  26. Group key agreement protocol permits a set of users to create a common key to make sure security of information exchange among members of the group. It is extensively used in secure multiparty computation, res...

    Authors: Vankamamidi S. Naresh, Sivaranjani Reddi and Nistala V. E. S. Murthy

    Citation: Human-centric Computing and Information Sciences 2019 9:26

    Content type: Research

    Published on:

  27. Identification and classification of extremist-related tweets is a hot issue. Extremist gangs have been involved in using social media sites like Facebook and Twitter for propagating their ideology and recruit...

    Authors: Shakeel Ahmad, Muhammad Zubair Asghar, Fahad M. Alotaibi and Irfanullah Awan

    Citation: Human-centric Computing and Information Sciences 2019 9:24

    Content type: Research

    Published on:

    The Correction to this article has been published in Human-centric Computing and Information Sciences 2019 9:27

  28. Constructing an ontology-based machine-readable knowledge base system from different sources with minimum human intervention, also known as ontology-based machine-readable knowledge base construction (OMRKBC),...

    Authors: Shirin Akther Khanam, Fei Liu and Yi-Ping Phoebe Chen

    Citation: Human-centric Computing and Information Sciences 2019 9:23

    Content type: Research

    Published on:

  29. The spectrum sensing performance depends on the accuracy of the detection about whether primary users are busy or idle. Previous studies on cognitive radio spectrum sensing have shown that the cooperation betw...

    Authors: Runze Wan, Lixin Ding, Naixue Xiong, Wanneng Shu and Li Yang

    Citation: Human-centric Computing and Information Sciences 2019 9:22

    Content type: Research

    Published on:

  30. Internet of Things (IoT) creates a world where smart objects and services interacting autonomously. Taking into account the dynamic-heterogeneous characteristic of interconnected devices in IoT, demand for a t...

    Authors: Venus Mohammadi, Amir Masoud Rahmani, Aso Mohammed Darwesh and Amir Sahafi

    Citation: Human-centric Computing and Information Sciences 2019 9:21

    Content type: Research

    Published on:

  31. In wireless sensor networks (WSNs), sensor devices must be equipped with the capabilities of sensing, computation and communication. These devices work continuously through non-rechargeable batteries under har...

    Authors: Jin Wang, Xiujian Gu, Wei Liu, Arun Kumar Sangaiah and Hye-Jin Kim

    Citation: Human-centric Computing and Information Sciences 2019 9:18

    Content type: Research

    Published on:

  32. Ground segmentation is an important step for any autonomous and remote-controlled systems. After separating ground and nonground parts, many works such as object tracking and 3D reconstruction can be performed...

    Authors: Phuong Minh Chu, Seoungjae Cho, Jisun Park, Simon Fong and Kyungeun Cho

    Citation: Human-centric Computing and Information Sciences 2019 9:17

    Content type: Research

    Published on:

  33. Software defined networking (SDN) is becoming more and more popular due to its key features, such as monitoring, fine-grained control, flexibility and scalability. The centralized control of SDN makes it vulne...

    Authors: Muhammad Imran, Muhammad Hanif Durad, Farrukh Aslam Khan and Abdelouahid Derhab

    Citation: Human-centric Computing and Information Sciences 2019 9:16

    Content type: Research

    Published on:

  34. The threat to critical water system infrastructure has increased in recent years as is evident from the increasing number of reported attacks against these systems. Preventative security mechanisms are often n...

    Authors: Daniel T. Ramotsoela, Gerhard P. Hancke and Adnan M. Abu-Mahfouz

    Citation: Human-centric Computing and Information Sciences 2019 9:13

    Content type: Research

    Published on:

  35. In data center companies, cloud computing can host multiple types of heterogeneous virtual machines (VMs) and provide many features, including flexibility, security, support, and even better maintenance than t...

    Authors: Shayem Saleh Alresheedi, Songfeng Lu, Mohamed Abd Elaziz and Ahmed A. Ewees

    Citation: Human-centric Computing and Information Sciences 2019 9:15

    Content type: Research

    Published on:

  36. With the rapid development of networks and Information technologies, cloud computing is not only becoming popular, the types of cloud services available are also increasing. Through cloud services, users can u...

    Authors: Chao-Tung Yang, Shuo-Tsung Chen, Yu-Wei Chan and Yu-Chuan Shen

    Citation: Human-centric Computing and Information Sciences 2019 9:12

    Content type: Research

    Published on:

  37. In the original publication of this article [1], some labels in the left column are incorrect in Fig. 3. They are revised in the updated figure below:

    Authors: Phil Legg, Jim Smith and Alexander Downing

    Citation: Human-centric Computing and Information Sciences 2019 9:11

    Content type: Correction

    Published on:

    The original article was published in Human-centric Computing and Information Sciences 2019 9:5

  38. Case-based reasoning (CBR) is a nature inspired paradigm of machine learning capable to continuously learn from the past experience. Each newly solved problem and its corresponding solution is retained in its ...

    Authors: Malik Jahan Khan, Hussain Hayat and Irfan Awan

    Citation: Human-centric Computing and Information Sciences 2019 9:9

    Content type: Research

    Published on:

  39. Today the key technology of high-performance computing systems is the emergence of interconnect technology that makes multiple computers into one computer cluster. This technique is a general method in which e...

    Authors: Cheol Shim, Rupali Shinde and Min Choi

    Citation: Human-centric Computing and Information Sciences 2019 9:10

    Content type: Research

    Published on:

  40. Leap Motion has become widely used due to its ability to recognize intuitive hand gestures or accurate finger positions. Attaching a Leap Motion to a virtual reality head-mounted display (VR HMD) is highly int...

    Authors: San Park, Seoungjae Cho, Jisun Park, Kaisi Huang, Yunsick Sung and Kyungeun Cho

    Citation: Human-centric Computing and Information Sciences 2019 9:8

    Content type: Research

    Published on:

  41. The main down-top attention model usually uses some characteristics of audio signal to extract the auditory saliency map at present. But existing audio attention computational model based image saliency mostly...

    Authors: Yu Liu, Cong Zhang, Bo Hang, Song Wang and Han-Chieh Chao

    Citation: Human-centric Computing and Information Sciences 2019 9:7

    Content type: Research

    Published on:

  42. Various technologies such as WiFi, Bluetooth, and RFID are being used to provide indoor location-based services (LBS). In particular, a WiFi base using a WiFi AP already installed in an indoor space is widely ...

    Authors: Sunmin Lee, Jinah Kim and Nammee Moon

    Citation: Human-centric Computing and Information Sciences 2019 9:6

    Content type: Research

    Published on:

  43. Active machine learning is a human-centric paradigm that leverages a small labelled dataset to build an initial weak classifier, that can then be improved over time through human-machine collaboration. As new ...

    Authors: Phil Legg, Jim Smith and Alexander Downing

    Citation: Human-centric Computing and Information Sciences 2019 9:5

    Content type: Research

    Published on:

    The Correction to this article has been published in Human-centric Computing and Information Sciences 2019 9:11