Human-centric Computing and Information Sciences

http://link.springer.com/journal/13673

List of Papers (Total 179)

Design of a human-centric de-identification framework for utilizing various clinical research data

For better life, medical and IT technology are converging and data plays a key role in this convergence. Data in the medical field is information about humans, and these data are sensitive. Because this type of data is frequently accessed by multiple users, a high degree of caution is required during handling. In addition, systematic security precautions must be followed to...

An energy-efficient sleep scheduling mechanism with similarity measure for wireless sensor networks

In wireless sensor networks, the high density of node’s distribution will result in transmission collision and energy dissipation of redundant data. To resolve the above problems, an energy-efficient sleep scheduling mechanism with similarity measure for wireless sensor networks (ESSM) is proposed, which will schedule the sensors into the active or sleep mode to reduce energy...

An enhanced sum rate in the cluster based cognitive radio relay network using the sequential approach for the future Internet of Things

The cognitive radio relay plays a vital role in cognitive radio networking (CRN), as it can improve the cognitive sum rate, extend the coverage, and improve the spectral efficiency. However, cognitive relay aided CRNs cannot obtain a maximal sum rate, when the existing sensing approach is applied to a CRN. In this paper, we present an enhanced sum rate in the cluster based...

Comparative analysis of affective and physiological responses to emotional movies

In this research, we investigated on user’s affective and physiological responses to the emotional movies. The emotional movies provide continuous feedback such as changes in saturation, brightness and contrast of the movie in response to users’ emotional states. In the user study, the subjects watched the emotional movies, edited by fearful and joyful scenes, and presented in 2D...

Enhancing recurrent neural network-based language models by word tokenization

Different approaches have been used to estimate language models from a given corpus. Recently, researchers have used different neural network architectures to estimate the language models from a given corpus using unsupervised learning neural networks capabilities. Generally, neural networks have demonstrated success compared to conventional n-gram language models. With languages...

Intelligent smart home energy efficiency model using artificial TensorFlow engine

Smart home and IoT-related technologies are developing rapidly, and various smart devices are being developed to help users enjoy a more comfortable lifestyle. However, the existing smart homes are limited by a scarcity of operating systems to integrate the devices that constitute the smart home environment. This is because these devices use independent IoT platforms developed by...

When social computing meets soft computing: opportunities and insights

The characteristics of the massive social media data, diverse mobile sensing devices as well as the highly complex and dynamic user’s social behavioral patterns have led to the generation of huge amounts of high dimension, uncertain, imprecision and noisy data from social networks. Thanks to the emerging soft computing techniques which unlike the conventional hard computing. It...

Behavioural Computer Science: an agenda for combining modelling of human and system behaviours

The rapidly increasing pervasiveness and integration of computers in human society calls for a broad discipline under which this development can be studied. We argue that to design and use technology one needs to develop and use models of humans and machines in all their aspects, including cognitive and memory models, but also social influence and (artificial) emotions. We call...

Collaborative design of software applications: the role of users

Drawing on a 1-year application design, implementation and evaluation experience, this paper examines how engaging users in the early design phases of a software application is tightly bound to the success of that application in use. Through the comparison between two different approaches to collaborative application design (namely, user-centered vs participatory), we reveal how...

User characteristics that influence judgment of social engineering attacks in social networks

Social engineering is a growing source of information security concern. Exploits appear to evolve, with increasing levels of sophistication, in order to target multiple victims. Despite increased concern with this risk, there has been little research activity focused upon social engineering in the potentially rich hunting ground of social networks. In this setting, factors that...

Efficient policing for screen mirroring traffic

The greediness of multimedia applications in terms of their bandwidth demands calls for new and efficient network traffic control mechanisms, especially in wireless networks where the bandwidth is limited. In an enterprise-like environment, an additional burden is expected to be added to the network by screen mirroring traffic. Smart mobile devices are displacing personal...

A state-of-the-art survey of malware detection approaches using data mining techniques

Data mining techniques have been concentrated for malware detection in the recent decade. The battle between security analyzers and malware scholars is everlasting as innovation grows. The proposed methodologies are not adequate while evolutionary and complex nature of malware is changing quickly and therefore turn out to be harder to recognize. This paper presents a systematic...

Recent advances of the signal processing techniques in future smart grids

Smart grid is an emerging research field of the current decade. The distinguished features of the smart grid are monitoring capability with data integration, advanced analysis to support system control, enhanced power security and effective communication to meet the power demand. Efficient energy consumption and minimum costs are also included in the prodigious features of smart...

Exploring the support for high performance applications in the container runtime environment

Cloud computing is the driving power behind the current technological era. Virtualization is rightly referred to as the backbone of cloud computing. Impacts of virtualization employed in high performance computing (HPC) has been much reviewed by researchers. The overhead in the virtualization layer was one of the reasons which hindered its application in the HPC environment...

Determining device position through minimal user input

In many co-located, collaborative systems there is a need for the constituent devices used to be aware of the physical positions of their networked counterparts. This paper addresses this challenge by presenting a novel method of utilising users’ judgement of direction to obtain the location and orientation of a touch interface. The technique requires a user to draw several...

SensDeploy: efficient sensor deployment strategy for real-time localization

In order to estimate the location of the user, the previous studies introduced many sensor deployment methods applying the sensor network. The important issues to consider when placing the sensors are a configuration cost and detection area of a sensor network. In other words, the sensors consisting the network should be optimally deployed by taking into account the coverage and...

Optimization of sentiment analysis using machine learning classifiers

Words and phrases bespeak the perspectives of people about products, services, governments and events on social media. Extricating positive or negative polarities from social media text denominates task of sentiment analysis in the field of natural language processing. The exponential growth of demands for business organizations and governments, impel researchers to accomplish...

Image recognition performance enhancements using image normalization

When recognizing a specific object in an image captured by a camera, we extract local descriptors to compare it with or try direct comparison of images through learning methods using convolutional neural networks. The more the number of objects with many features, the greater the number of images used in learning, the easier it is to compare features. It also makes it easier to...

Development of an automatic sorting system for fresh ginsengs by image processing techniques

This study was conducted with the objective of implementing a smart IoT (internet of things) factory consisting of an automatic 6-year-old fresh ginseng grade classification device. Conventionally, washed 6-year-old ginseng from farmlands is manually sorted into three grades using classification criteria such as weight and shape. However, the cost associated with this...

Exploring the effects of a non-interactive talking avatar on social presence, credibility, trust, and patronage intention in an e-commerce website

While prior research has examined the effects of interactive e-commerce avatars that simulate the roles of virtual assistants and recommender agents, there is lack of empirical study that investigates the effects of non-interactive talking avatars in e-commerce. This is unfortunate, as many websites today utilize non-interactive talking avatars that provide one-way dialogue in...

Analyzing of incremental high utility pattern mining based on tree structures

Since the concept of high utility pattern mining was proposed to solve the drawbacks of traditional frequent pattern mining approach that cannot handle various features of real-world applications, many different techniques and algorithms for high utility pattern mining have been developed. Moreover, several advanced methods for incremental data processing have been proposed in...

Monitoring of the daily living activities in smart home care

One of the key requirements for technological systems that are used to secure independent housing for seniors in their home environment is monitoring of daily living activities (ADL), their classification, and recognition of routine daily patterns and habits of seniors in Smart Home Care (SHC). To monitor daily living activities, the use of a temperature, CO2, humidity sensors...

Behind the scenes: a cross-country study into third-party website referencing and the online advertising ecosystem

The ubiquitous nature of the Internet provides an ideal platform for human communication, trade, information sharing and learning. Websites play a central role in these activities as they often act as a key point of interaction for individuals in navigating through cyberspace. In this article, we look beyond the visual interface of websites to consider exactly what occurs when a...

Qualitative usability feature selection with ranking: a novel approach for ranking the identified usability problematic attributes for academic websites using data-mining techniques

Objective The aim of this study is to identify common usability problematic patterns that belong to top-50 academic websites as a whole and then ranking of these identified usability problems is also provided. Methods In this study, a novel approach is proposed that is based upon the integration of conventional usability testing and heuristic evaluation with data-mining knowledge...

A fusion approach based on infrared finger vein transmitting model by using multi-light-intensity imaging

An infrared transmitting model from the observed finger vein images is proposed in this paper by using multi-light-intensity imaging. This model is estimated from many pixels’ values under different intensity light in the same scene. Due to the fusion method could be applied in biometric system, the vein images of finger captured in the system, we proposed in this paper, will be...