Human-centric Computing and Information Sciences

http://link.springer.com/journal/13673

List of Papers (Total 158)

Personalized fitting recommendation based on support vector regression

Collaborative filtering (CF) is a popular method for the personalized recommendation. Almost all of the existing CF methods rely only on the rating data while ignoring some important implicit information in non-rating properties for users and items, which has a significant impact on the preference. In this study, considering that the average rating of users and items has a certain ...

Re-purchase intentions and virtual customer relationships on social media brand community

The purpose of this study was to demonstrate how to manage digital customer relationships (i.e. relationships with the brand, the product, the company, and other fans) on social media based community (i.e. Facebook brand fan-pages) and to influence post-purchase intentions (i.e. word-of-mouth and re-purchase intentions). This study used partial least squares to test the hypotheses ...

Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage

Ensuring the cloud data security is a major concern for corporate cloud subscribers and in some cases for the private cloud users. Confidentiality of the stored data can be managed by encrypting the data at the client side before outsourcing it to the remote cloud storage server. However, once the data is encrypted, it will limit server’s capability for keyword search since the ...

Designing challenge questions for location‐based authentication systems: a real‐life study

Online service providers often use challenge questions (a.k.a. knowledge‐based authentication) to facilitate resetting of passwords or to provide an extra layer of security for authentication. While prior schemes explored both static and dynamic challenge questions to improve security, they do not systematically investigate the problem of designing challenge questions and its ...

Knowledge-based adaptable scheduler for SaaS providers in cloud computing

Software as a Service (SaaS) in Cloud Computing offers reliable access to software applications for end users over the Internet without direct investment in infrastructure and software. SaaS providers utilize resources of internal datacenters or rent resources from a public Infrastructure as a Service (IaaS) provider in order to serve their customers. Internal hosting can increase ...

Testing of the voice communication in smart home care

This article is aimed to describe the method of testing the implementation of voice control over operating and technical functions of Smart Home Come. Custom control over operating and technical functions was implemented into a model of Smart Home that was equipped with KNX technology. A sociological survey focused on the needs of seniors has been carried out to justify the ...

Image contour based on context aware in complex wavelet domain

Active contours are used in the image processing application including edge detection, shape modeling, medical image-analysis, detectable object boundaries, etc. Shape is one of the important features for describing an object of interest. Even though it is easy to understand the concept of 2D shape, it is very difficult to represent, define and describe it. In this paper, we ...

Assessment of combined textural and morphological features for diagnosis of breast masses in ultrasound

The objective of this study is to assess the combined performance of textural and morphological features for the detection and diagnosis of breast masses in ultrasound images. We have extracted a total of forty four features using textural and morphological techniques. Support vector machine (SVM) classifier is used to discriminate the tumors into benign or malignant. The ...

Effects of blended e-Learning: a case study in higher education tax learning setting

This article has two main objectives. First, we describe the design of an e-learning system for a University Income Tax Law course. Second, we analyze and explore learning results in terms of students’ learning satisfaction and learning achievement. Learning achievement was examined by questions derived from the course content while learning satisfaction was analyzed based on an ...

Identifying the value co-creation behavior of virtual customer environments using a hybrid expert-based DANP model in the bicycle industry

Since 2008, soaring international oil prices and environmental awareness have pushed bicycle to be a green transport vehicle to reduce greenhouse gas emissions as a significant global trend. Consequently, Taiwan’s bicycle industry earned the “bicycle kingdom” has entered a new peak period of demand under popular social trends of bicycling for health conscious and a healthy exercise ...

A novel method for expert finding in online communities based on concept map and PageRank

An online community is a virtual community where people can express their opinions and their knowledge freely. There are a great deal of information in online communities, however there is no way to determine its authenticity. Thus the knowledge which has been shared in online communities is not reliable. By determining expertise level of users and finding experts in online ...

Provably secure attribute-based encryption with attribute revocation and grant function using proxy re-encryption and attribute key for updating

Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is suitable for data access control on a cloud storage system. In CP-ABE, the data owner encrypts data under the access structure over attributes and a set of attributes assigned to users is embedded in user’s secret key. A user is able to decrypt if his attributes satisfy the ciphertext’s access structure. In CP-ABE, processes ...

Performance analysis of E-shaped dual band antenna for wireless hand-held devices

Due to evolution in wireless applications, the high performance dual band handsets were blooming in the market. In this paper, a compact dual band E shaped planar inverted F antenna is presented, which is suitable for GSM application in handheld devices. Here, antenna is described for GSM (900 MHz and 1800 MHz), which covers (831 MHz – 973 MHz and 1700 MHz – 1918 MHz) 10 dB ...

Fairness scheme for energy efficient H.264/AVC-based video sensor network

The availability of advanced wireless sensor nodes enable us to use video processing techniques in a wireless sensor network (WSN) platform. Such paradigm can be used to implement video sensor networks (VSNs) that can serve as an alternative to existing video surveillance applications. However, video processing requires tremendous resources in terms of computation and transmission ...

Designing a collaborative visual analytics system to support users’ continuous analytical processes

In recent, numerous useful visual analytics tools have been designed to help domain experts solve analytical problems. However, most of the tools do not reflect the nature of solving real-world analytical tasks collaboratively because they have been designed for single users in desktop environments. In this paper, a complete visual analytics system is designed for solving ...

A review on stochastic approach for dynamic power management in wireless sensor networks

Wireless sensor networks (WSNs) demand low power and energy efficient hardware and software. Dynamic Power Management (DPM) technique reduces the maximum possible active states of a wireless sensor node by controlling the switching of the low power manageable components in power down or off states. During DPM, it is also required that the deadline of task execution and performance ...

Implementation of hybrid image fusion technique for feature enhancement in medical diagnosis

Image fusion is used to enhance the quality of images by combining two images of same scene obtained from different techniques. In medical diagnosis by combining the images obtained by Computed Tomography (CT) scan and Magnetic Resonance Imaging (MRI) we get more information and additional data from fused image. This paper presents a hybrid technique using curvelet and wavelet ...

An optimizing pipeline stall reduction algorithm for power and performance on multi-core CPUs

The power-performance trade-off is one of the major considerations in micro-architecture design. Pipelined architecture has brought a radical change in the design to capitalize on the parallel operation of various functional blocks involved in the instruction execution process, which is widely used in all modern processors. Pipeline introduces the instruction level parallelism ...

The BAU GIS system using open source mapwindow

“BAU GIS” is an efficient and flexible Geographic Information System (GIS) that supports manipulation, analysis, and viewing of geospatial data and associated attribute data in various GIS data formats. “BAU GIS” system is a stand-alone application, developed using (Map Window Open Source GIS) and (visual basic 10.0). It has been designed and developed to address the need for a GIS ...

Flexible context aware interface for ambient assisted living

A Multi Agent System that provides a (cared for) person, the subject, with assistance and support through an Ambient Assisted Living Flexible Interface (AALFI) during the day while complementing the night time assistance offered by NOCTURNAL with feedback assistance, is presented. It has been tailored to the subject’s requirements profile and takes into account factors associated ...

Development and testing of a visualization application software, implemented with wireless control system in smart home care

This article describes the development of a visualization application software used to control operational and technical functions in the Smart Home system or Smart Home Care system via the wireless xComfort control system. Graphic visualization of a home electrical control system gives the user unprecedented comfort when controlling home systems. The user is able to obtain the ...

Sensing spatial and temporal coordination in teams using the smartphone

Teams are at the heart of today’s organizations and their performance is crucial for organizational success. It is therefore important to understand and monitor team processes. Traditional approaches employ questionnaires, which have low temporal resolution or manual behavior observation, which is labor intensive and thus costly. In this work, we propose to apply mobile behavior ...

Detecting misinformation in online social networks using cognitive psychology

The paper explores the use of concepts in cognitive psychology to evaluate the spread of misinformation, disinformation and propaganda in online social networks. Analysing online social networks to identify metrics to infer cues of deception will enable us to measure diffusion of misinformation. The cognitive process involved in the decision to spread information involves answering ...

Task context-aware e-mail platform for collaborative tasks

E-mail communication has become an essential part of collaborative tasks in enterprises. However, when conventional e-mail applications are used for collaborative tasks, problems with task-related resources management arise. In this paper, we present a task context-aware e-mail platform that helps users to send e-mails quickly and efficiently. This platform also automatically ...