Human-centric Computing and Information Sciences

http://link.springer.com/journal/13673

List of Papers (Total 168)

A spatial data warehouse recommendation approach: conceptual framework and experimental evaluation

Spatial data warehouses store a large amount of historized and aggregated data. They are usually exploited by Spatial OLAP (SOLAP) systems to extract relevant information. Extracting such information may be complex and difficult. The user might ignore what part of the warehouse contains the relevant information and what the next query should be. On the other hand, recommendation ...

Comparison of different approaches on example-based learning for novice and proficient learners

This study examined the effectiveness of two example-based instructional procedures. One procedure examines the effect of example-problem pairs when they are simultaneously presented to a participant. The other procedure involved studying an example and then removing it and having the participant solve a similar problem. Participants were assigned randomly to two above procedures. ...

An energy-delay product study on chip multi-processors for variable stage pipelining

Power management is a major concern for computer architects and system designers. As reported by the International Technology Roadmap for Semiconductors (ITRS), energy consumption has become one of the most dominant issues for the semiconductor industry when the size of transistors scales down from 22 to 11 nm nodes. In this regard, current existing techniques such as dynamic ...

High-precision full quaternion based finite-time cascade attitude control strategy considering a class of overactuated space systems

A high-precision full quaternion based finite-time three-axis cascade attitude control strategy is considered in the present research with respect to state-of-the-art to deal with a class of overactuated space systems. The main idea behind the subject is to design a new quaternion based proportional derivative approach, which is realized along with the linear quadratic regulator ...

Local quantized extrema patterns for content-based natural and texture image retrieval

This paper proposes a novel feature descriptor, named local quantized extrema patterns (LQEP) for content based image retrieval. The standard local quantized patterns (LQP) collect the directional relationship between the center pixel and its surrounding neighbors and the directional local extrema patterns (DLEP) collect the directional information based on local extrema in 0°, ...

A method of designing a generic actor model for a professional social network

The emergence of social networks have opened a new paradigm for professional groups to student groups to exchange their information with their contemporaries quickly and efficiently. The social networking enables to set up relations among the people (called actors) who share common interests, activities or connections. An actor or a person plays a predominant role in sharing social ...

Time evolution of face recognition in accessible scenarios

Up to now, biometric recognition has shown significant advantages as to be considered a reliable solution for security systems in mobile environments. Nevertheless, due to the short lifetime of biometrics in mobile devices, a handful of concerns regarding usability and accessibility need to be covered in order to meet users’ requirements. This work is focused on analysing the ...

Design of fusion technique-based mining engine for smart business

Keys to successful implementation of smart business require a wide spectrum of domain knowledge, experts, and their correlated experiences. Excluding those external factors—which can be collected by well-deployed sensors—being aware of user (or consumer) has the highest priority on the to-do-list. The more user is understood, the more user can be satisfied from an intuitive point ...

INSPECT: extending plane-casting for 6-DOF control

INSPECT is a novel interaction technique for 3D object manipulation using a rotation-only tracked touch panel. Motivated by the applicability of the technique on smartphones, we explore this design space by introducing a way to map the available degrees of freedom and discuss the design decisions that were made. We subjected INSPECT to a formal user study against a baseline wand ...

Augmented reality applications for cultural heritage using Kinect

This paper explores the use of data from the Kinect sensor for performing augmented reality, with emphasis on cultural heritage applications. It is shown that the combination of depth and image correspondences from the Kinect can yield a reliable estimate of the location and pose of the camera, though noise from the depth sensor introduces an unpleasant jittering of the rendered ...

Personalized fitting recommendation based on support vector regression

Collaborative filtering (CF) is a popular method for the personalized recommendation. Almost all of the existing CF methods rely only on the rating data while ignoring some important implicit information in non-rating properties for users and items, which has a significant impact on the preference. In this study, considering that the average rating of users and items has a certain ...

Re-purchase intentions and virtual customer relationships on social media brand community

The purpose of this study was to demonstrate how to manage digital customer relationships (i.e. relationships with the brand, the product, the company, and other fans) on social media based community (i.e. Facebook brand fan-pages) and to influence post-purchase intentions (i.e. word-of-mouth and re-purchase intentions). This study used partial least squares to test the hypotheses ...

Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage

Ensuring the cloud data security is a major concern for corporate cloud subscribers and in some cases for the private cloud users. Confidentiality of the stored data can be managed by encrypting the data at the client side before outsourcing it to the remote cloud storage server. However, once the data is encrypted, it will limit server’s capability for keyword search since the ...

Designing challenge questions for location‐based authentication systems: a real‐life study

Online service providers often use challenge questions (a.k.a. knowledge‐based authentication) to facilitate resetting of passwords or to provide an extra layer of security for authentication. While prior schemes explored both static and dynamic challenge questions to improve security, they do not systematically investigate the problem of designing challenge questions and its ...

Knowledge-based adaptable scheduler for SaaS providers in cloud computing

Software as a Service (SaaS) in Cloud Computing offers reliable access to software applications for end users over the Internet without direct investment in infrastructure and software. SaaS providers utilize resources of internal datacenters or rent resources from a public Infrastructure as a Service (IaaS) provider in order to serve their customers. Internal hosting can increase ...

Testing of the voice communication in smart home care

This article is aimed to describe the method of testing the implementation of voice control over operating and technical functions of Smart Home Come. Custom control over operating and technical functions was implemented into a model of Smart Home that was equipped with KNX technology. A sociological survey focused on the needs of seniors has been carried out to justify the ...

Image contour based on context aware in complex wavelet domain

Active contours are used in the image processing application including edge detection, shape modeling, medical image-analysis, detectable object boundaries, etc. Shape is one of the important features for describing an object of interest. Even though it is easy to understand the concept of 2D shape, it is very difficult to represent, define and describe it. In this paper, we ...

Assessment of combined textural and morphological features for diagnosis of breast masses in ultrasound

The objective of this study is to assess the combined performance of textural and morphological features for the detection and diagnosis of breast masses in ultrasound images. We have extracted a total of forty four features using textural and morphological techniques. Support vector machine (SVM) classifier is used to discriminate the tumors into benign or malignant. The ...

Effects of blended e-Learning: a case study in higher education tax learning setting

This article has two main objectives. First, we describe the design of an e-learning system for a University Income Tax Law course. Second, we analyze and explore learning results in terms of students’ learning satisfaction and learning achievement. Learning achievement was examined by questions derived from the course content while learning satisfaction was analyzed based on an ...

Identifying the value co-creation behavior of virtual customer environments using a hybrid expert-based DANP model in the bicycle industry

Since 2008, soaring international oil prices and environmental awareness have pushed bicycle to be a green transport vehicle to reduce greenhouse gas emissions as a significant global trend. Consequently, Taiwan’s bicycle industry earned the “bicycle kingdom” has entered a new peak period of demand under popular social trends of bicycling for health conscious and a healthy exercise ...

A novel method for expert finding in online communities based on concept map and PageRank

An online community is a virtual community where people can express their opinions and their knowledge freely. There are a great deal of information in online communities, however there is no way to determine its authenticity. Thus the knowledge which has been shared in online communities is not reliable. By determining expertise level of users and finding experts in online ...

Provably secure attribute-based encryption with attribute revocation and grant function using proxy re-encryption and attribute key for updating

Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is suitable for data access control on a cloud storage system. In CP-ABE, the data owner encrypts data under the access structure over attributes and a set of attributes assigned to users is embedded in user’s secret key. A user is able to decrypt if his attributes satisfy the ciphertext’s access structure. In CP-ABE, processes ...

Performance analysis of E-shaped dual band antenna for wireless hand-held devices

Due to evolution in wireless applications, the high performance dual band handsets were blooming in the market. In this paper, a compact dual band E shaped planar inverted F antenna is presented, which is suitable for GSM application in handheld devices. Here, antenna is described for GSM (900 MHz and 1800 MHz), which covers (831 MHz – 973 MHz and 1700 MHz – 1918 MHz) 10 dB ...

Fairness scheme for energy efficient H.264/AVC-based video sensor network

The availability of advanced wireless sensor nodes enable us to use video processing techniques in a wireless sensor network (WSN) platform. Such paradigm can be used to implement video sensor networks (VSNs) that can serve as an alternative to existing video surveillance applications. However, video processing requires tremendous resources in terms of computation and transmission ...