Human-centric Computing and Information Sciences

http://link.springer.com/journal/13673

List of Papers (Total 180)

Understanding and evaluating the behavior of technical users. A study of developer interaction at StackOverflow

This paper is focused on analyzing the details of one of the most widely used Q&A technical discussion forums on the Internet: StackOverflow. StackOverflow is a huge source of information for both academics and industry practitioners and its analysis can provide useful insights. This is evident by a growing body of work dedicated to the study of this platform. There are several...

Trust reality-mining: evidencing the role of friendship for trust diffusion

Value sensitive design is driven by the motivation of making social and moral values central to the development of ICT systems. Among the most challenging concerns when imparting shared values like accountability, transparency, liberty, fairness and trust into information technology are reliable and comprehensive formal and computational models of those values. This paper...

On hybrid intelligence-based control approach with its application to flexible robot system

Flexible robot system is in general taken into real consideration as most important process in a number of academic and industrial environments. Due to the fact that the aforementioned system is so applicable in real domains, the novel ideas with respect to state-of-the-art in outperforming its performance are always valuable. With this purpose, a number of the soft computing...

Activity-based Twitter sampling for content-based and user-centric prediction models

Increasingly more applications rely on crowd-sourced data from social media. Some of these applications are concerned with real-time data streams, while others are more focused on acquiring temporal footprints from historical data. Nevertheless, determining the subset of “credible” users is crucial. While the majority of sampling approaches focus on individual static networks...

Parallel implementation of color-based particle filter for object tracking in embedded systems

Recently, embedded systems have become popular because of the rising demand for portable, low-power devices. A common task for these devices is object tracking, which is an essential part of various applications. Until now, object tracking in video sequences remains a challenging problem because of the visual properties of objects and their surrounding environments. Among the...

Generating descriptive model for student dropout: a review of clustering approach

The implementation of data mining is widely considered as a powerful instrument for acquiring new knowledge from a pile of historical data, which is normally left unstudied. This data driven methodology has proven effective to improve the quality of decision-making in several domains such as business, medical and complex engineering problems. Recently, educational data mining...

Adopting incentive mechanisms for large-scale participation in mobile crowdsensing: from literature review to a conceptual framework

Mobile crowdsensing is a burgeoning concept that allows smart cities to leverage the sensing power and ubiquitous nature of mobile devices in order to capture and map phenomena of common interest. At the core of any successful mobile crowdsensing application is active user participation, without which the system is of no value in sensing the phenomenon of interest. A major...

Stable geographic forwarding with link lifetime prediction in mobile adhoc networks for battlefield environment

Mobile adhoc network (MANET) is one of the most relevant areas of research in wireless communication that has gained prevalence due to its diversity over large-scale highly mobile networks to small-scale networks having low mobility and power constraints. Adhoc networks are inherently envisioned to be highly vulnerable to dynamic changes because of mobile sensor nodes. Node...

Plausible mass-spring system using parallel computing on mobile devices

Recently the hardware performance of mobile devices have been extremely increased and advanced mobile devices provide multi-cores and high clock speed. In addition, mobile devices have advantages in mobility and portability compared with PC and Console, so many games and simulation programs have been developed under mobile environments. Physically-based simulation is a one of the...

A survey of cloud-based network intrusion detection analysis

As network traffic grows and attacks become more prevalent and complex, we must find creative new ways to enhance intrusion detection systems (IDSes). Recently, researchers have begun to harness both machine learning and cloud computing technology to better identify threats and speed up computation times. This paper explores current research at the intersection of these two...

Evaluation of a channel assignment scheme in mobile network systems

The channel assignment problem is a complex problem which requires that under certain constraints a minimum number of channels have to be assigned to mobile calls in the wireless mobile system. In this paper, we propose a new scheme, which is based on double band frequency and channel borrowing strategy. The proposed scheme takes into account factors such as limited bandwidth of...

A generic framework for ontology-based information retrieval and image retrieval in web data

In the internet era, search engines play a vital role in information retrieval from web pages. Search engines arrange the retrieved results using various ranking algorithms. Additionally, retrieval is based on statistical searching techniques or content-based information extraction methods. It is still difficult for the user to understand the abstract details of every web page...

Personal destination pattern analysis with applications to mobile advertising

Many researchers expect mobile advertising to be the killer application in mobile business. In this paper, we introduce a trajectory prediction algorithm called personal destination pattern analysis (P-DPA) to analyse the different destinations in various trajectories of an individual, and to predict a trajectory or a set of destinations that could be visited by that individual...

A convergence data model for medical information related to acute myocardial infarction

Medical and health data has become accepted as the highly worthful and useful big data. However, the current medical information systems have aimed for digitalizaing, storing, and transferring clinical materials. Therefore, many experts assert the needs for the intelligent management and utilization of medical information. In this paper, in order to manage medical data which is...

Design and implement chords and personal windows for multi-user collaboration on a large multi-touch vertical display

Co-located collaboration on large vertical screens has become technically feasible, but users are faced with increased effort, or have to wear intrusive personal identifiers. Previous research on co-located collaboration has assumed that all users perform exactly the same task (e.g., moving and resizing photos), or that they negotiate individual actions in turns. However, there...

Ontology mapping and semantics of web interface signs

Although, intuitive interface signs are crucial elements of a good user interface (UI), prior research ignored these in UI design and usability evaluation process. This paper argues that ontology (the set of concepts and skills for understanding the referential meaning of an interface sign) mapping is critical for intuitive sign design. An experiment with fourteen participants...

Evaluating smartphone-based dynamic security questions for fallback authentication: a field study

To address the limitations of static challenge question based fallback authentication mechanisms (e.g., easy predictability), recently, smartphone based autobiographical authentication mechanisms have been explored where challenge questions are not predetermined and are instead generated dynamically based on users’ day-to-day activities captured by smartphones. However, as...

Incremental stages of a semantic framework for automating the changes on long term composed services

Enterprises enhance their business on the web with the help of web services. This enhancement is achieved by composing the pre-existing services, so that they will be able to provide solutions for the problems on the web. Due to rapid development in technology, the need for making changes in the composed services by the respective analysts becomes an essential task. Thus, the...

An investigation of unpaid crowdsourcing

The continual advancement of internet technologies has led to the evolution of how individuals and organizations operate. For example, through the internet, we can now tap a remote workforce to help us accomplish certain tasks, a phenomenon called crowdsourcing. Crowdsourcing is an approach that relies on people to perform activities that are costly or time-consuming using...

Cooperative privacy game: a novel strategy for preserving privacy in data publishing

Achieving data privacy before publishing has been becoming an extreme concern of researchers, individuals and service providers. A novel methodology, Cooperative Privacy Game (CoPG), has been proposed to achieve data privacy in which Cooperative Game Theory is used to achieve the privacy and is named as Cooperative Privacy (CoP). The core idea of CoP is to play the best strategy...

Intelligent phishing url detection using association rule mining

Phishing is an online criminal act that occurs when a malicious webpage impersonates as legitimate webpage so as to acquire sensitive information from the user. Phishing attack continues to pose a serious risk for web users and annoying threat within the field of electronic commerce. This paper focuses on discerning the significant features that discriminate between legitimate...

Understanding people with human activities and social interactions for human-centered computing

An ultimate goal of human-centered computing is making human beings the center of computing technologies. To make people a core component of the technology, first of all, we need to understand people and society in which people live. In this paper, we propose two important factors in order to understand people and their social interactions. Proposed human activity recognition and...

Baiting the hook: factors impacting susceptibility to phishing attacks

Over the last decade, substantial progress has been made in understanding and mitigating phishing attacks. Nonetheless, the percentage of successful attacks is still on the rise. In this article, we critically investigate why that is the case, and seek to contribute to the field by highlighting key factors that influence individuals’ susceptibility to phishing attacks. For our...

Style classification and visualization of art painting’s genre using self-organizing maps

With the spread of digitalization of art paintings, research on diverse scientific approaches on painted images has become active. In this paper, the method of classifying painting styles by extracting various features from paintings is suggested. Global features are extracted using the color-based statistical computation and composition-based local features of paintings are...

Featuring the e-service quality of online website from a varied perspective

The websites vigorously grow and inevitably need to provide consumers high-quality service to create excellent experience and win the customers’ heart to establish mutually beneficial and long-term relationship. Consequently, the e-service quality attracts priority-concerns. The research purpose differentiates three service quality models that make the effects on consumer loyalty...