Human-centric Computing and Information Sciences

http://link.springer.com/journal/13673

List of Papers (Total 168)

Personal destination pattern analysis with applications to mobile advertising

Many researchers expect mobile advertising to be the killer application in mobile business. In this paper, we introduce a trajectory prediction algorithm called personal destination pattern analysis (P-DPA) to analyse the different destinations in various trajectories of an individual, and to predict a trajectory or a set of destinations that could be visited by that individual. ...

A convergence data model for medical information related to acute myocardial infarction

Medical and health data has become accepted as the highly worthful and useful big data. However, the current medical information systems have aimed for digitalizaing, storing, and transferring clinical materials. Therefore, many experts assert the needs for the intelligent management and utilization of medical information. In this paper, in order to manage medical data which is ...

Design and implement chords and personal windows for multi-user collaboration on a large multi-touch vertical display

Co-located collaboration on large vertical screens has become technically feasible, but users are faced with increased effort, or have to wear intrusive personal identifiers. Previous research on co-located collaboration has assumed that all users perform exactly the same task (e.g., moving and resizing photos), or that they negotiate individual actions in turns. However, there is ...

Ontology mapping and semantics of web interface signs

Although, intuitive interface signs are crucial elements of a good user interface (UI), prior research ignored these in UI design and usability evaluation process. This paper argues that ontology (the set of concepts and skills for understanding the referential meaning of an interface sign) mapping is critical for intuitive sign design. An experiment with fourteen participants and ...

Evaluating smartphone-based dynamic security questions for fallback authentication: a field study

To address the limitations of static challenge question based fallback authentication mechanisms (e.g., easy predictability), recently, smartphone based autobiographical authentication mechanisms have been explored where challenge questions are not predetermined and are instead generated dynamically based on users’ day-to-day activities captured by smartphones. However, as ...

Incremental stages of a semantic framework for automating the changes on long term composed services

Enterprises enhance their business on the web with the help of web services. This enhancement is achieved by composing the pre-existing services, so that they will be able to provide solutions for the problems on the web. Due to rapid development in technology, the need for making changes in the composed services by the respective analysts becomes an essential task. Thus, the ...

An investigation of unpaid crowdsourcing

The continual advancement of internet technologies has led to the evolution of how individuals and organizations operate. For example, through the internet, we can now tap a remote workforce to help us accomplish certain tasks, a phenomenon called crowdsourcing. Crowdsourcing is an approach that relies on people to perform activities that are costly or time-consuming using ...

Cooperative privacy game: a novel strategy for preserving privacy in data publishing

Achieving data privacy before publishing has been becoming an extreme concern of researchers, individuals and service providers. A novel methodology, Cooperative Privacy Game (CoPG), has been proposed to achieve data privacy in which Cooperative Game Theory is used to achieve the privacy and is named as Cooperative Privacy (CoP). The core idea of CoP is to play the best strategy ...

Intelligent phishing url detection using association rule mining

Phishing is an online criminal act that occurs when a malicious webpage impersonates as legitimate webpage so as to acquire sensitive information from the user. Phishing attack continues to pose a serious risk for web users and annoying threat within the field of electronic commerce. This paper focuses on discerning the significant features that discriminate between legitimate and ...

Understanding people with human activities and social interactions for human-centered computing

An ultimate goal of human-centered computing is making human beings the center of computing technologies. To make people a core component of the technology, first of all, we need to understand people and society in which people live. In this paper, we propose two important factors in order to understand people and their social interactions. Proposed human activity recognition and ...

Baiting the hook: factors impacting susceptibility to phishing attacks

Over the last decade, substantial progress has been made in understanding and mitigating phishing attacks. Nonetheless, the percentage of successful attacks is still on the rise. In this article, we critically investigate why that is the case, and seek to contribute to the field by highlighting key factors that influence individuals’ susceptibility to phishing attacks. For our ...

Style classification and visualization of art painting’s genre using self-organizing maps

With the spread of digitalization of art paintings, research on diverse scientific approaches on painted images has become active. In this paper, the method of classifying painting styles by extracting various features from paintings is suggested. Global features are extracted using the color-based statistical computation and composition-based local features of paintings are ...

Featuring the e-service quality of online website from a varied perspective

The websites vigorously grow and inevitably need to provide consumers high-quality service to create excellent experience and win the customers’ heart to establish mutually beneficial and long-term relationship. Consequently, the e-service quality attracts priority-concerns. The research purpose differentiates three service quality models that make the effects on consumer ...

Using affective brain-computer interfaces to characterize human influential factors for speech quality-of-experience perception modelling

As new speech technologies emerge, telecommunication service providers have to provide superior user experience in order to remain competitive. To this end, quality-of-experience (QoE) perception modelling and measurement has become a key priority. QoE models rely on three influence factors: technological, contextual and human. Existing solutions have typically relied on the former ...

Heuristics for spatial finding using iterative mobile crowdsourcing

Crowdsourcing has become a popular method for involving humans in socially-aware computational processes. This paper proposes and investigates algorithms for finding regions of interest using mobile crowdsourcing. The algorithms are iterative, using cycles of crowd-querying and feedback till specified targets are found, each time adjusting the query according to the feedback using ...

SAR reduction in the modelled human head for the mobile phone using different material shields

Every mobile phone emits radio frequency electromagnetic energy. The amount of this energy absorbed by the human head is measured by the specific absorption rate (SAR). There are standard limits, according to which phones sold should be below certain SAR level. To maintain these limits, shields can be used for the mobile phones. In this paper using ANSYS HFSS, modelling of the ...

An efficient transmission mode selection based on reinforcement learning for cooperative cognitive radio networks

Cooperative communication systems use cooperative relays for transmitting their data packets to the destination. Cooperative communication schemes having all relays participating in transmission may cause unnecessary wastes of most valuable spectrum resources. So it is mandatory to effectively select a transmission mode for cooperative cognitive radio networks (CCRNs). In this ...

Design and test bed experiments of server operation system using virtualization technology

According to current researches, much of the electric power is being consumed by the server cooling system at the Data Center. Moreover, the power consumption rate increases when the number of the equipments and servers expands. Thus, the proposed server operation system has been designed to decrease power consumption rate and CO2 emission volume by minimizing the number of these ...

A people-centric framework for mobile augmented reality systems (MARS) design: ArcHIVE 4Any

This paper introduces a generic people-centric mobile augmented reality systems (MARS) framework to leverage the application system design and implementation. Proposed 4Any framework could be used as a meta architecture to guide the development of MARS. The main challenge in MARS design is providing a generic framework flexible enough to allow rapid development of applications to ...

How does this message make you feel? A study of user perspectives on software update/warning message design

Software update messages are commonly used to inform users about software updates, recent bug fixes, and various system vulnerabilities, and to suggest recommended actions (e.g., updating software). While various design features (e.g., update options, message layout, update message presentation) of these messages can influence the actions taken by users, no prior study can be found ...

Graph-based motor primitive generation framework

Unmanned aerial vehicles (UAVs) have many potential applications, such as delivery, leisure, and surveillance. To enable these applications, making the UAVs fly autonomously is the key issue, and requires defining UAV motor primitives. Diverse attempts have been made to automatically generate motor primitives for UAVs and robots. However, given that UAVs usually do not fly as ...

s-ITSF: a service based intelligent transportation system framework for smart accident management

Recently, traffic jams and accidents increase due to increase of traffic volume. Thus, intelligent transport system (ITS) is developed to provide efficient road situation and information is actively studying. However, it is mainly focused on traffic jam and management of traffic situation that a systematic management is not provided when an accident occurs. An action to prevent an ...

Heart rate monitoring using human speech spectral features

This paper attempts to establish a correlation between the human speech, emotions and human heart rate. The study highlights a possible contactless human heart rate measurement technique useful for monitoring of patient condition from real-time speech recordings. The distance between the average peak-to-peak distances in speech Mel-frequency cepstral coefficients are used as the ...

Trusted and secure clustering in mobile pervasive environment

Pervasive computing has the potential to offer low-cost, high performance, and user centric solutions to exchange the information and communicate seamlessly in highly dynamic, heterogeneous environment. Here small and influential dissimilar devices or nodes have to set up independent network unknown by the user. Communicating devices are resource-restricted and equipped with micro ...

Modeling and discovering human behavior from smartphone sensing life-log data for identification purpose

Today, personal data is becoming a new economic asset. Personal data which generated from our smartphone can be used for many purposes such as identification, recommendation system, and etc. The purposes of our research are to discover human behavior based on their smartphone life log data and to build behavior model which can be used for human identification. In this research, we ...