Human-centric Computing and Information Sciences

http://link.springer.com/journal/13673

List of Papers (Total 168)

Users’ design feedback in usability evaluation: a literature review

As part of usability evaluation, users may be invited to offer their reflections on the system being evaluated. Such reflections may concern the system’s suitability for its context of use, usability problem predictions, and design suggestions. We term the data resulting from such reflections users’ design feedback. Gathering users’ design feedback as part of usability evaluation ...

Toward the reduction of incorrect drawn ink retrieval

As tablet devices become popular, various handwriting applications are used. Some of applications incorporate a specific function, which is generally called palm rejection. Palm rejection enables application users to put the palm of a writing hand onto a touch display. It classifies intended touches and unintended touches so that it prevents accidental inking, which has been known ...

A novel lightweight URL phishing detection system using SVM and similarity index

The phishing is a technique used by cyber-criminals to impersonate legitimate websites in order to obtain personal information. This paper presents a novel lightweight phishing detection approach completely based on the URL (uniform resource locator). The mentioned system produces a very satisfying recognition rate which is 95.80%. This system, is an SVM (support vector machine) ...

Feature extraction for robust physical activity recognition

This paper presents the development of a Human Activity Recognition (HAR) system that uses a network of nine inertial measurement units situated in different body parts. Every unit provides 3D (3-dimension) acceleration, 3D angular velocity, 3D magnetic field orientation, and 4D quaternions. This system identifies 33 different physical activities (walking, running, cycling, lateral ...

Video scene identification and classification for user-tailored QoE in GEO satellites

Satellite networks offer an efficient alternative where no terrestrial networks are available, and can offer a cost effective means of transferring data. Numerous proposals have addressed the problem of resource allocation in geostationary (GEO) satellites, and have been evaluated via various performance metrics related to user Quality of Service (QoS). However, ensuring that on ...

Tracking intruder ship in wireless environment

It is a challenging task for all Harbors or Naval Administration to restrict and monitor the movement of defense or commercial ships. Most commonly used techniques of monitoring are radars and satellite images. These techniques are not reliable as radars can be turned off voluntarily and receptions of images are affected by adverse climatic conditions. This paper proposes a ...

Exploring the affective, motivational and cognitive effects of pedagogical agent enthusiasm in a multimedia learning environment

In a traditional classroom environment, instructor enthusiasm has been shown to enhance student’s emotion, affective perceptions, intrinsic motivation, and cognitive outcome. Additionally, emotional response theory argues that enthusiastic verbal and nonverbal cues of an instructor will induce positive emotional states in learners, which in turn, enact learners’ approach behaviours ...

Citizen science for pedestrian cartography: collection and moderation of walkable routes in cities through mobile gamification

Digital geographical maps can be regarded as a user interface for understanding and navigating the city. Nevertheless, contemporary digital maps over-emphasize the needs of motor vehicles. Pedestrian routes have only been considered as an add-on option in existing digital maps and the respective data collection has not been performed in the field. In this article, we present a ...

A collaborative approach for semantic time-based video annotation using gamification

Efficient access to large scale video assets, may it be our life memories in our hard drive or a broadcaster archive which the company is eager to sell, requires content to be conveniently annotated. Manually annotating video content is, however, an intellectually expensive and time-consuming process. In this paper we argue that crowdsourcing, an approach that relies on a remote ...

Transaction processing in consistency-aware user’s applications deployed on NoSQL databases

NoSQL databases are capable of storing and processing big data which is characterized by various properties such as volume, variety and velocity. Such databases are used in a variety of user applications that need large volume of data which is highly available and efficiently accessible. But they do not enforce or require strong data consistency nor do they support transactions. ...

An investigation into users’ considerations towards using password managers

Password managers, though commonly recommended by security experts, are still not used by many users. Understanding why some choose to use password managers while others do not is important towards generally understanding why some users do what they do and, by extension, designing motivational tools such as video tutorials to help motivate more to use password managers. To ...

The convergence computing model for big sensor data mining and knowledge discovery

The article considers the model and method of converged computing and storage to create SCADA systems based on wireless networks for the energy industry. Computing power of modern wireless sensor network nodes allow the transfer to them some operations sensor data mining and offload the dispatching data centre servers. This fog computing model is used for the aggregation of primary ...

An enhanced security framework for home appliances in smart home

Since the end of 2000, smartphones have explosively spread and have made people’s lives plentiful. With the start of smartphones, new smart devices, including tablet PCs, smart TVs, smart refrigerators, and smart air conditioners, have emerged, expanding their areas from individuals to business and home. These days, smart home service has drawn a lot of attention as a human-centric ...

Understanding and evaluating the behavior of technical users. A study of developer interaction at StackOverflow

This paper is focused on analyzing the details of one of the most widely used Q&A technical discussion forums on the Internet: StackOverflow. StackOverflow is a huge source of information for both academics and industry practitioners and its analysis can provide useful insights. This is evident by a growing body of work dedicated to the study of this platform. There are several ...

Trust reality-mining: evidencing the role of friendship for trust diffusion

Value sensitive design is driven by the motivation of making social and moral values central to the development of ICT systems. Among the most challenging concerns when imparting shared values like accountability, transparency, liberty, fairness and trust into information technology are reliable and comprehensive formal and computational models of those values. This paper, educated ...

On hybrid intelligence-based control approach with its application to flexible robot system

Flexible robot system is in general taken into real consideration as most important process in a number of academic and industrial environments. Due to the fact that the aforementioned system is so applicable in real domains, the novel ideas with respect to state-of-the-art in outperforming its performance are always valuable. With this purpose, a number of the soft computing ...

Activity-based Twitter sampling for content-based and user-centric prediction models

Increasingly more applications rely on crowd-sourced data from social media. Some of these applications are concerned with real-time data streams, while others are more focused on acquiring temporal footprints from historical data. Nevertheless, determining the subset of “credible” users is crucial. While the majority of sampling approaches focus on individual static networks, ...

Parallel implementation of color-based particle filter for object tracking in embedded systems

Recently, embedded systems have become popular because of the rising demand for portable, low-power devices. A common task for these devices is object tracking, which is an essential part of various applications. Until now, object tracking in video sequences remains a challenging problem because of the visual properties of objects and their surrounding environments. Among the ...

Generating descriptive model for student dropout: a review of clustering approach

The implementation of data mining is widely considered as a powerful instrument for acquiring new knowledge from a pile of historical data, which is normally left unstudied. This data driven methodology has proven effective to improve the quality of decision-making in several domains such as business, medical and complex engineering problems. Recently, educational data mining (EDM) ...

Adopting incentive mechanisms for large-scale participation in mobile crowdsensing: from literature review to a conceptual framework

Mobile crowdsensing is a burgeoning concept that allows smart cities to leverage the sensing power and ubiquitous nature of mobile devices in order to capture and map phenomena of common interest. At the core of any successful mobile crowdsensing application is active user participation, without which the system is of no value in sensing the phenomenon of interest. A major ...

Stable geographic forwarding with link lifetime prediction in mobile adhoc networks for battlefield environment

Mobile adhoc network (MANET) is one of the most relevant areas of research in wireless communication that has gained prevalence due to its diversity over large-scale highly mobile networks to small-scale networks having low mobility and power constraints. Adhoc networks are inherently envisioned to be highly vulnerable to dynamic changes because of mobile sensor nodes. Node ...

Plausible mass-spring system using parallel computing on mobile devices

Recently the hardware performance of mobile devices have been extremely increased and advanced mobile devices provide multi-cores and high clock speed. In addition, mobile devices have advantages in mobility and portability compared with PC and Console, so many games and simulation programs have been developed under mobile environments. Physically-based simulation is a one of the ...

A survey of cloud-based network intrusion detection analysis

As network traffic grows and attacks become more prevalent and complex, we must find creative new ways to enhance intrusion detection systems (IDSes). Recently, researchers have begun to harness both machine learning and cloud computing technology to better identify threats and speed up computation times. This paper explores current research at the intersection of these two fields ...

Evaluation of a channel assignment scheme in mobile network systems

The channel assignment problem is a complex problem which requires that under certain constraints a minimum number of channels have to be assigned to mobile calls in the wireless mobile system. In this paper, we propose a new scheme, which is based on double band frequency and channel borrowing strategy. The proposed scheme takes into account factors such as limited bandwidth of ...

A generic framework for ontology-based information retrieval and image retrieval in web data

In the internet era, search engines play a vital role in information retrieval from web pages. Search engines arrange the retrieved results using various ranking algorithms. Additionally, retrieval is based on statistical searching techniques or content-based information extraction methods. It is still difficult for the user to understand the abstract details of every web page ...