Human-centric Computing and Information Sciences

http://www.hcis-journal.com/

List of Papers (Total 268)

Modelling email traffic workloads with RNN and LSTM models

Analysis of time series data has been a challenging research subject for decades. Email traffic has recently been modelled as a time series function using a Recurrent Neural Network (RNN) and RNNs were shown to provide higher prediction accuracy than previous probabilistic models from the literature. Given the exponential rise of email workloads which need to be handled by email...

SD2PA: a fully safe driving and privacy-preserving authentication scheme for VANETs

The basic idea behind the vehicular ad-hoc network (VANET) is the exchange of traffic information between vehicles and the surrounding environment to offer a better driving experience. Privacy and security are the main concerns for meeting the safety aims of the VANET system. In this paper, we analyse recent VANET schemes that utilise a group authentication technique and found...

A collaborative healthcare framework for shared healthcare plan with ambient intelligence

The fast propagation of the Internet of Things (IoT) devices has driven to the development of collaborative healthcare frameworks to support the next generation healthcare industry for quality medical healthcare. This paper presents a generalized collaborative framework named collaborative shared healthcare plan (CSHCP) for cognitive health and fitness assessment of people using...

Ensuring user authentication and data integrity in multi-cloud environment

The necessity to improve security in a multi-cloud environment has become very urgent in recent years. Although in this topic, many methods using the message authentication code had been realized but, the results of these methods are unsatisfactory and heavy to apply, which, is why the security problem remains unresolved in this environment. This article proposes a new model that...

Transient ischemic attack analysis through non-contact approaches

The transient ischemic attack (TIA) is a kind of sudden disease, which has the characteristics of short duration and high frequency. Since most patients can return to normal after the onset of the disease, it is often neglected. Medical research has proved that patients are prone to stroke in a relatively short time after the transient ischemic attacks. Therefore, it is extremely...

Generalization of intensity distribution of medical images using GANs

The performance of a CNN based medical-image classification network depends on the intensities of the trained images. Therefore, it is necessary to generalize medical images of various intensities against degradation of performance. For lesion classification, features of generalized images should be carefully maintained. To maintain the performance of the medical image...

Indoor positioning and wayfinding systems: a survey

Navigation systems help users access unfamiliar environments. Current technological advancements enable users to encapsulate these systems in handheld devices, which effectively increases the popularity of navigation systems and the number of users. In indoor environments, lack of Global Positioning System (GPS) signals and line of sight with orbiting satellites makes navigation...

A secure electronic medical record authorization system for smart device application in cloud computing environments

As cloud computing technology matures, along with an increased application of distributed networks, increasingly larger amounts of data are being stored in the cloud, and are thus available for pervasive application. At the same time, current independent medical record systems tend to be inefficient, and most previous studies in this field fail to meet the security requirements...

CNN-based 3D object classification using Hough space of LiDAR point clouds

With the wide application of Light Detection and Ranging (LiDAR) in the collection of high-precision environmental point cloud information, three-dimensional (3D) object classification from point clouds has become an important research topic. However, the characteristics of LiDAR point clouds, such as unstructured distribution, disordered arrangement, and large amounts of data...

Cyclist detection and tracking based on multi-layer laser scanner

The technology of Artificial Intelligence (AI) brings tremendous possibilities for autonomous vehicle applications. One of the essential tasks of autonomous vehicle is environment perception using machine learning algorithms. Since the cyclists are the vulnerable road users, cyclist detection and tracking are important perception sub-tasks for autonomous vehicles to avoid vehicle...

An anonymous authenticated key-agreement scheme for multi-server infrastructure

Due to single-time registration, the multi-server authentication provides benefit for getting services from different servers through trusted agent. Generally, users feel hesitation for registering themselves individually with all service providers due to the problem of memorizing the multiple passwords. The multi-server authentication allows a quick access to services by real...

A deep learning approach for pressure ulcer prevention using wearable computing

In recent years, statistics have confirmed that the number of elderly people is increasing. Aging always has a strong impact on the health of a human being; from a biological of point view, this process usually leads to several types of diseases mainly due to the impairment of the organism. In such a context, healthcare plays an important role in the healing process, trying to...

Low-rate DoS attack detection based on two-step cluster analysis and UTR analysis

Low-rate denial of service (LDoS) attacks send attacking bursts intermittently to the network which can severely degrade the victim system’s Quality of Service (QoS). The low-rate nature of such attacks complicates attack detection. LDoS attacks repeatedly trigger the congestion control mechanism, which can make TCP traffic extremely unstable. This paper investigates the network...

Identifying smartphone users based on how they interact with their phones

The continuous advancement in the Internet of Things technology allows people to connect anywhere at any time, thus showing great potential in technology like smart devices (including smartphones and wearable devices). However, there is a possible risk of unauthorized access to these devices and technologies. Unfortunately, frequently used authentication schemes for protecting...

Designing human-centric software artifacts with future users: a case study

The quality and quantity of participation supplied by human beings during the different phases of the design and development of a software artifact are central to studies in human-centered computing. With this paper, we have investigated on what kind of experienced people should be engaged to design a new computational artifact, when a participatory approach is adopted. We...

A blockchain-based smart home gateway architecture for preventing data forgery

With the advancement of Information and Communication Technology (ICT) and the proliferation of sensor technologies, the Internet of Things (IoT) is now being widely used in smart home for the purposes of efficient resource management and pervasive sensing. In smart homes, various IoT devices are connected to each other, and these connections are centered on gateways. The role of...

Exploring coupled images fusion based on joint tensor decomposition

Data fusion has always been a hot research topic in human-centric computing and extended with the development of artificial intelligence. Generally, the coupled data fusion algorithm usually utilizes the information from one data set to improve the estimation accuracy and explain related latent variables of other coupled datasets. This paper proposes several kinds of coupled...

Text and phone calls: user behaviour and dual-channel communication prediction

The contact list size of modern mobile phone users has increased up to hundreds of contacts, making contact retrieval a relatively difficult task. Various algorithms have been designed to predict the contact that a user will call at a given time. These algorithms use historical call data to make this prediction. However, modern mobile users do not just make calls, but also rely...

A multilevel features selection framework for skin lesion classification

Melanoma is considered to be one of the deadliest skin cancer types, whose occurring frequency elevated in the last few years; its earlier diagnosis, however, significantly increases the chances of patients’ survival. In the quest for the same, a few computer based methods, capable of diagnosing the skin lesion at initial stages, have been recently proposed. Despite some success...

Information cascades prediction with attention neural network

Cascade prediction helps us uncover the basic mechanisms that govern collective human behavior in networks, and it also is very important in extensive other applications, such as viral marketing, online advertising, and recommender systems. However, it is not trivial to make predictions due to the myriad factors that influence a user’s decision to reshare content. This paper...

An improved object detection algorithm based on multi-scaled and deformable convolutional neural networks

Object detection methods aim to identify all target objects in the target image and determine the categories and position information in order to achieve machine vision understanding. Numerous approaches have been proposed to solve this problem, mainly inspired by methods of computer vision and deep learning. However, existing approaches always perform poorly for the detection of...

Indoor acoustic localization: a survey

Applications of localization range from body tracking, gesture capturing, indoor plan construction to mobile health sensing. Technologies such as inertial sensors, radio frequency signals and cameras have been deeply excavated to locate targets. Among all the technologies, the acoustic signal gains enormous favor considering its comparatively high accuracy with common...

Intelligent video interview agent used to predict communication skill and perceived personality traits

The prediction of individual interpersonal communication skills and personality traits is a critical issue in both industrial and organizational psychology and affective computing. In this study, we invited 114 participants, including 57 interviewers and 57 interviewees, to collect the ground truth of interviewees’ communication skills and personality traits as perceived by real...

Proposal and testing goals-guided interaction for occasional users

The latest shifts in technology have brought about new kinds of users who occasionally access unfamiliar systems in new scenarios. This way of use should not request any learning curve. There have been many attempts to help this kind of users: agents, floating help, tooltips, direct video demonstrations, etc., elements that support the appealing direct manipulation style (DM...

Developing an online hate classifier for multiple social media platforms

The proliferation of social media enables people to express their opinions widely online. However, at the same time, this has resulted in the emergence of conflict and hate, making online environments uninviting for users. Although researchers have found that hate is a problem across multiple platforms, there is a lack of models for online hate detection using multi-platform data...