Human-centric Computing and Information Sciences

http://link.springer.com/journal/13673

List of Papers (Total 173)

Enhancing recurrent neural network-based language models by word tokenization

Different approaches have been used to estimate language models from a given corpus. Recently, researchers have used different neural network architectures to estimate the language models from a given corpus using unsupervised learning neural networks capabilities. Generally, neural networks have demonstrated success compared to conventional n-gram language models. With languages...

When social computing meets soft computing: opportunities and insights

The characteristics of the massive social media data, diverse mobile sensing devices as well as the highly complex and dynamic user’s social behavioral patterns have led to the generation of huge amounts of high dimension, uncertain, imprecision and noisy data from social networks. Thanks to the emerging soft computing techniques which unlike the conventional hard computing. It...

Behavioural Computer Science: an agenda for combining modelling of human and system behaviours

The rapidly increasing pervasiveness and integration of computers in human society calls for a broad discipline under which this development can be studied. We argue that to design and use technology one needs to develop and use models of humans and machines in all their aspects, including cognitive and memory models, but also social influence and (artificial) emotions. We call...

User characteristics that influence judgment of social engineering attacks in social networks

Social engineering is a growing source of information security concern. Exploits appear to evolve, with increasing levels of sophistication, in order to target multiple victims. Despite increased concern with this risk, there has been little research activity focused upon social engineering in the potentially rich hunting ground of social networks. In this setting, factors that...

Efficient policing for screen mirroring traffic

The greediness of multimedia applications in terms of their bandwidth demands calls for new and efficient network traffic control mechanisms, especially in wireless networks where the bandwidth is limited. In an enterprise-like environment, an additional burden is expected to be added to the network by screen mirroring traffic. Smart mobile devices are displacing personal...

A state-of-the-art survey of malware detection approaches using data mining techniques

Data mining techniques have been concentrated for malware detection in the recent decade. The battle between security analyzers and malware scholars is everlasting as innovation grows. The proposed methodologies are not adequate while evolutionary and complex nature of malware is changing quickly and therefore turn out to be harder to recognize. This paper presents a systematic...

Recent advances of the signal processing techniques in future smart grids

Smart grid is an emerging research field of the current decade. The distinguished features of the smart grid are monitoring capability with data integration, advanced analysis to support system control, enhanced power security and effective communication to meet the power demand. Efficient energy consumption and minimum costs are also included in the prodigious features of smart...

Exploring the support for high performance applications in the container runtime environment

Cloud computing is the driving power behind the current technological era. Virtualization is rightly referred to as the backbone of cloud computing. Impacts of virtualization employed in high performance computing (HPC) has been much reviewed by researchers. The overhead in the virtualization layer was one of the reasons which hindered its application in the HPC environment...

Determining device position through minimal user input

In many co-located, collaborative systems there is a need for the constituent devices used to be aware of the physical positions of their networked counterparts. This paper addresses this challenge by presenting a novel method of utilising users’ judgement of direction to obtain the location and orientation of a touch interface. The technique requires a user to draw several...

SensDeploy: efficient sensor deployment strategy for real-time localization

In order to estimate the location of the user, the previous studies introduced many sensor deployment methods applying the sensor network. The important issues to consider when placing the sensors are a configuration cost and detection area of a sensor network. In other words, the sensors consisting the network should be optimally deployed by taking into account the coverage and...

Optimization of sentiment analysis using machine learning classifiers

Words and phrases bespeak the perspectives of people about products, services, governments and events on social media. Extricating positive or negative polarities from social media text denominates task of sentiment analysis in the field of natural language processing. The exponential growth of demands for business organizations and governments, impel researchers to accomplish...

Image recognition performance enhancements using image normalization

When recognizing a specific object in an image captured by a camera, we extract local descriptors to compare it with or try direct comparison of images through learning methods using convolutional neural networks. The more the number of objects with many features, the greater the number of images used in learning, the easier it is to compare features. It also makes it easier to...

Development of an automatic sorting system for fresh ginsengs by image processing techniques

This study was conducted with the objective of implementing a smart IoT (internet of things) factory consisting of an automatic 6-year-old fresh ginseng grade classification device. Conventionally, washed 6-year-old ginseng from farmlands is manually sorted into three grades using classification criteria such as weight and shape. However, the cost associated with this...

Exploring the effects of a non-interactive talking avatar on social presence, credibility, trust, and patronage intention in an e-commerce website

While prior research has examined the effects of interactive e-commerce avatars that simulate the roles of virtual assistants and recommender agents, there is lack of empirical study that investigates the effects of non-interactive talking avatars in e-commerce. This is unfortunate, as many websites today utilize non-interactive talking avatars that provide one-way dialogue in...

Analyzing of incremental high utility pattern mining based on tree structures

Since the concept of high utility pattern mining was proposed to solve the drawbacks of traditional frequent pattern mining approach that cannot handle various features of real-world applications, many different techniques and algorithms for high utility pattern mining have been developed. Moreover, several advanced methods for incremental data processing have been proposed in...

Monitoring of the daily living activities in smart home care

One of the key requirements for technological systems that are used to secure independent housing for seniors in their home environment is monitoring of daily living activities (ADL), their classification, and recognition of routine daily patterns and habits of seniors in Smart Home Care (SHC). To monitor daily living activities, the use of a temperature, CO2, humidity sensors...

Behind the scenes: a cross-country study into third-party website referencing and the online advertising ecosystem

The ubiquitous nature of the Internet provides an ideal platform for human communication, trade, information sharing and learning. Websites play a central role in these activities as they often act as a key point of interaction for individuals in navigating through cyberspace. In this article, we look beyond the visual interface of websites to consider exactly what occurs when a...

Qualitative usability feature selection with ranking: a novel approach for ranking the identified usability problematic attributes for academic websites using data-mining techniques

Objective The aim of this study is to identify common usability problematic patterns that belong to top-50 academic websites as a whole and then ranking of these identified usability problems is also provided. Methods In this study, a novel approach is proposed that is based upon the integration of conventional usability testing and heuristic evaluation with data-mining knowledge...

A fusion approach based on infrared finger vein transmitting model by using multi-light-intensity imaging

An infrared transmitting model from the observed finger vein images is proposed in this paper by using multi-light-intensity imaging. This model is estimated from many pixels’ values under different intensity light in the same scene. Due to the fusion method could be applied in biometric system, the vein images of finger captured in the system, we proposed in this paper, will be...

A 3D localisation method in indoor environments for virtual reality applications

Virtual Reality (VR) has recently experienced rapid development for human–computer interactions. Users wearing VR headsets gain an immersive experience when interacting with a 3-dimensional (3D) world. We utilise a light detection and ranging (LiDAR) sensor to detect a 3D point cloud from the real world. To match the scale between a virtual environment and a user’s real world...

Improving the interactive genetic algorithm for customer-centric product design by automatically scoring the unfavorable designs

One of the effective factors in increasing sales is the consistency of products with the preference of the customers. Designing the products consistent with customer needs requires the engagement of customers in the product design process. One way to achieve this goal is the use of interactive evolutionary algorithms. During the running of such algorithms, the customer acts as a...

A slave ants based ant colony optimization algorithm for task scheduling in cloud computing environments

Since cloud computing provides computing resources on a pay per use basis, a task scheduling algorithm directly affects the cost for users. In this paper, we propose a novel cloud task scheduling algorithm based on ant colony optimization that allocates tasks of cloud users to virtual machines in cloud computing environments in an efficient manner. To enhance the performance of...

Handpad: a virtual mouse for controlling laptops in a smart home

This study investigates the possibilities of equipping fixed furniture with touch screens to control laptops or other smart home devices, to create a holistic smart home control system. Although multi-touch screens have recently been integrated into desktop use, most users prefer a classical mouse for desktop input. This study introduces Handpad, which is a new indirect touch...

An AmI-based and privacy-preserving shopping mall model

Nowadays, large shopping malls provide tools to help and boost customers to buy products. Some of these tools melt down digital operations with physical ones executed by customers into blended commerce experiences. On the other hand, ambient intelligence (AmI) represents a paradigm focused on equipping physical environments to define ergonomic spaces for people interacting with...

A climbing motion recognition method using anatomical information for screen climbing games

Screen climbing games have made a new category of gaming experience between a human climber and a virtual game projected onto an artificial climbing wall. Here, climbing motion recognition is required to interact with the game. In existing climbing games, motion recognition is based on a simple calculation using the depth difference between the climber’s body area and the...