Human-centric Computing and Information Sciences

http://link.springer.com/journal/13673

List of Papers (Total 153)

Qualitative usability feature selection with ranking: a novel approach for ranking the identified usability problematic attributes for academic websites using data-mining techniques

Objective The aim of this study is to identify common usability problematic patterns that belong to top-50 academic websites as a whole and then ranking of these identified usability problems is also provided. Methods In this study, a novel approach is proposed that is based upon the integration of conventional usability testing and heuristic evaluation with data-mining knowledge ...

A fusion approach based on infrared finger vein transmitting model by using multi-light-intensity imaging

An infrared transmitting model from the observed finger vein images is proposed in this paper by using multi-light-intensity imaging. This model is estimated from many pixels’ values under different intensity light in the same scene. Due to the fusion method could be applied in biometric system, the vein images of finger captured in the system, we proposed in this paper, will be ...

Handpad: a virtual mouse for controlling laptops in a smart home

This study investigates the possibilities of equipping fixed furniture with touch screens to control laptops or other smart home devices, to create a holistic smart home control system. Although multi-touch screens have recently been integrated into desktop use, most users prefer a classical mouse for desktop input. This study introduces Handpad, which is a new indirect touch input ...

An AmI-based and privacy-preserving shopping mall model

Nowadays, large shopping malls provide tools to help and boost customers to buy products. Some of these tools melt down digital operations with physical ones executed by customers into blended commerce experiences. On the other hand, ambient intelligence (AmI) represents a paradigm focused on equipping physical environments to define ergonomic spaces for people interacting with ...

A climbing motion recognition method using anatomical information for screen climbing games

Screen climbing games have made a new category of gaming experience between a human climber and a virtual game projected onto an artificial climbing wall. Here, climbing motion recognition is required to interact with the game. In existing climbing games, motion recognition is based on a simple calculation using the depth difference between the climber’s body area and the climbing ...

A guide for the selection of routing protocols in WBAN for healthcare applications

In the present scenario, the term wireless body area network (WBAN) is becoming an integral part of human day to day life due its wide variety of applications, especially in the field of healthcare systems. To design such a reliable body area network system, there are a number of factors to be considered both in hardware and software levels. One of such factors still developing is ...

Rethinking self-reported measure in subjective evaluation of assistive technology

Self-reporting is used as a subjective measure of usability study of technology solutions. In assistive technology research, more than often the ‘a coordinator’ directly assist the ‘subject’ in the scoring process. This makes the rating process slower and also introduces bias, such as, ‘Forer effect’ and/or ‘Hawthorne’ effect. To address these issues we propose to use technology ...

Graph clustering-based discretization of splitting and merging methods (GraphS and GraphM)

Discretization plays a major role as a data preprocessing technique used in machine learning and data mining. Recent studies have focused on multivariate discretization that considers relations among attributes. The general goal of this method is to obtain the discrete data, which preserves most of the semantics exhibited by original continuous data. However, many techniques ...

Efficient motion blurred shadows using a temporal shadow map

In this paper, we propose a novel algorithm that renders motion blurred shadows efficiently on GPUs using a temporal shadow map. Each triangle moves during a frame and for each pixel, it is visible to the light in a range of time. The main idea of our algorithm is to find such visible ranges and store in the temporal shadow map. For each sample which is visible to the camera at a ...

PLC-based design of monitoring system for ICT-integrated vertical fish farm

The common cause of the mass mortality of fishes in a fish farm is a power failure. There can be many reasons for the power failures but most of them are the result of natural disasters, systematic faults, ill-willed sabotages, or mistakes of employees. Such incidents usually have a bad influence upon small or medium-scale farmers. To deal with unexpected power failures, this ...

Users’ design feedback in usability evaluation: a literature review

As part of usability evaluation, users may be invited to offer their reflections on the system being evaluated. Such reflections may concern the system’s suitability for its context of use, usability problem predictions, and design suggestions. We term the data resulting from such reflections users’ design feedback. Gathering users’ design feedback as part of usability evaluation ...

Toward the reduction of incorrect drawn ink retrieval

As tablet devices become popular, various handwriting applications are used. Some of applications incorporate a specific function, which is generally called palm rejection. Palm rejection enables application users to put the palm of a writing hand onto a touch display. It classifies intended touches and unintended touches so that it prevents accidental inking, which has been known ...

A novel lightweight URL phishing detection system using SVM and similarity index

The phishing is a technique used by cyber-criminals to impersonate legitimate websites in order to obtain personal information. This paper presents a novel lightweight phishing detection approach completely based on the URL (uniform resource locator). The mentioned system produces a very satisfying recognition rate which is 95.80%. This system, is an SVM (support vector machine) ...

Feature extraction for robust physical activity recognition

This paper presents the development of a Human Activity Recognition (HAR) system that uses a network of nine inertial measurement units situated in different body parts. Every unit provides 3D (3-dimension) acceleration, 3D angular velocity, 3D magnetic field orientation, and 4D quaternions. This system identifies 33 different physical activities (walking, running, cycling, lateral ...

Video scene identification and classification for user-tailored QoE in GEO satellites

Satellite networks offer an efficient alternative where no terrestrial networks are available, and can offer a cost effective means of transferring data. Numerous proposals have addressed the problem of resource allocation in geostationary (GEO) satellites, and have been evaluated via various performance metrics related to user Quality of Service (QoS). However, ensuring that on ...

Tracking intruder ship in wireless environment

It is a challenging task for all Harbors or Naval Administration to restrict and monitor the movement of defense or commercial ships. Most commonly used techniques of monitoring are radars and satellite images. These techniques are not reliable as radars can be turned off voluntarily and receptions of images are affected by adverse climatic conditions. This paper proposes a ...

Exploring the affective, motivational and cognitive effects of pedagogical agent enthusiasm in a multimedia learning environment

In a traditional classroom environment, instructor enthusiasm has been shown to enhance student’s emotion, affective perceptions, intrinsic motivation, and cognitive outcome. Additionally, emotional response theory argues that enthusiastic verbal and nonverbal cues of an instructor will induce positive emotional states in learners, which in turn, enact learners’ approach behaviours ...

Citizen science for pedestrian cartography: collection and moderation of walkable routes in cities through mobile gamification

Digital geographical maps can be regarded as a user interface for understanding and navigating the city. Nevertheless, contemporary digital maps over-emphasize the needs of motor vehicles. Pedestrian routes have only been considered as an add-on option in existing digital maps and the respective data collection has not been performed in the field. In this article, we present a ...

A collaborative approach for semantic time-based video annotation using gamification

Efficient access to large scale video assets, may it be our life memories in our hard drive or a broadcaster archive which the company is eager to sell, requires content to be conveniently annotated. Manually annotating video content is, however, an intellectually expensive and time-consuming process. In this paper we argue that crowdsourcing, an approach that relies on a remote ...

Transaction processing in consistency-aware user’s applications deployed on NoSQL databases

NoSQL databases are capable of storing and processing big data which is characterized by various properties such as volume, variety and velocity. Such databases are used in a variety of user applications that need large volume of data which is highly available and efficiently accessible. But they do not enforce or require strong data consistency nor do they support transactions. ...

An investigation into users’ considerations towards using password managers

Password managers, though commonly recommended by security experts, are still not used by many users. Understanding why some choose to use password managers while others do not is important towards generally understanding why some users do what they do and, by extension, designing motivational tools such as video tutorials to help motivate more to use password managers. To ...

The convergence computing model for big sensor data mining and knowledge discovery

The article considers the model and method of converged computing and storage to create SCADA systems based on wireless networks for the energy industry. Computing power of modern wireless sensor network nodes allow the transfer to them some operations sensor data mining and offload the dispatching data centre servers. This fog computing model is used for the aggregation of primary ...

An enhanced security framework for home appliances in smart home

Since the end of 2000, smartphones have explosively spread and have made people’s lives plentiful. With the start of smartphones, new smart devices, including tablet PCs, smart TVs, smart refrigerators, and smart air conditioners, have emerged, expanding their areas from individuals to business and home. These days, smart home service has drawn a lot of attention as a human-centric ...

Understanding and evaluating the behavior of technical users. A study of developer interaction at StackOverflow

This paper is focused on analyzing the details of one of the most widely used Q&A technical discussion forums on the Internet: StackOverflow. StackOverflow is a huge source of information for both academics and industry practitioners and its analysis can provide useful insights. This is evident by a growing body of work dedicated to the study of this platform. There are several ...

Trust reality-mining: evidencing the role of friendship for trust diffusion

Value sensitive design is driven by the motivation of making social and moral values central to the development of ICT systems. Among the most challenging concerns when imparting shared values like accountability, transparency, liberty, fairness and trust into information technology are reliable and comprehensive formal and computational models of those values. This paper, educated ...