Human-centric Computing and Information Sciences

http://link.springer.com/journal/13673

List of Papers (Total 168)

Designing a collaborative visual analytics system to support users’ continuous analytical processes

In recent, numerous useful visual analytics tools have been designed to help domain experts solve analytical problems. However, most of the tools do not reflect the nature of solving real-world analytical tasks collaboratively because they have been designed for single users in desktop environments. In this paper, a complete visual analytics system is designed for solving ...

A review on stochastic approach for dynamic power management in wireless sensor networks

Wireless sensor networks (WSNs) demand low power and energy efficient hardware and software. Dynamic Power Management (DPM) technique reduces the maximum possible active states of a wireless sensor node by controlling the switching of the low power manageable components in power down or off states. During DPM, it is also required that the deadline of task execution and performance ...

Implementation of hybrid image fusion technique for feature enhancement in medical diagnosis

Image fusion is used to enhance the quality of images by combining two images of same scene obtained from different techniques. In medical diagnosis by combining the images obtained by Computed Tomography (CT) scan and Magnetic Resonance Imaging (MRI) we get more information and additional data from fused image. This paper presents a hybrid technique using curvelet and wavelet ...

An optimizing pipeline stall reduction algorithm for power and performance on multi-core CPUs

The power-performance trade-off is one of the major considerations in micro-architecture design. Pipelined architecture has brought a radical change in the design to capitalize on the parallel operation of various functional blocks involved in the instruction execution process, which is widely used in all modern processors. Pipeline introduces the instruction level parallelism ...

The BAU GIS system using open source mapwindow

“BAU GIS” is an efficient and flexible Geographic Information System (GIS) that supports manipulation, analysis, and viewing of geospatial data and associated attribute data in various GIS data formats. “BAU GIS” system is a stand-alone application, developed using (Map Window Open Source GIS) and (visual basic 10.0). It has been designed and developed to address the need for a GIS ...

Flexible context aware interface for ambient assisted living

A Multi Agent System that provides a (cared for) person, the subject, with assistance and support through an Ambient Assisted Living Flexible Interface (AALFI) during the day while complementing the night time assistance offered by NOCTURNAL with feedback assistance, is presented. It has been tailored to the subject’s requirements profile and takes into account factors associated ...

Development and testing of a visualization application software, implemented with wireless control system in smart home care

This article describes the development of a visualization application software used to control operational and technical functions in the Smart Home system or Smart Home Care system via the wireless xComfort control system. Graphic visualization of a home electrical control system gives the user unprecedented comfort when controlling home systems. The user is able to obtain the ...

Sensing spatial and temporal coordination in teams using the smartphone

Teams are at the heart of today’s organizations and their performance is crucial for organizational success. It is therefore important to understand and monitor team processes. Traditional approaches employ questionnaires, which have low temporal resolution or manual behavior observation, which is labor intensive and thus costly. In this work, we propose to apply mobile behavior ...

Detecting misinformation in online social networks using cognitive psychology

The paper explores the use of concepts in cognitive psychology to evaluate the spread of misinformation, disinformation and propaganda in online social networks. Analysing online social networks to identify metrics to infer cues of deception will enable us to measure diffusion of misinformation. The cognitive process involved in the decision to spread information involves answering ...

Task context-aware e-mail platform for collaborative tasks

E-mail communication has become an essential part of collaborative tasks in enterprises. However, when conventional e-mail applications are used for collaborative tasks, problems with task-related resources management arise. In this paper, we present a task context-aware e-mail platform that helps users to send e-mails quickly and efficiently. This platform also automatically ...

Discriminative histogram taxonomy features for snake species identification

Background Incorrect snake identification from the observable visual traits is a major reason for death resulting from snake bites in tropics. So far no automatic classification method has been proposed to distinguish snakes by deciphering the taxonomy features of snake for the two major species of snakes i.e. Elapidae and Viperidae. We identify 38 different taxonomically relevant ...

Color Directional Local Quinary Patterns for Content Based Indexing and Retrieval

This paper presents a novel evaluationary approach to extract color-texture features for image retrieval application namely Color Directional Local Quinary Pattern (CDLQP). The proposed descriptor extracts the individual R, G and B channel wise directional edge information between reference pixel and its surrounding neighborhoods by computing its grey-level difference based on ...

Adaptive polar transform and fusion for human face image processing and evaluation

Human face processing and evaluation is a problem due to variations in orientation, size, illumination, expression, and disguise. The goal of this work is threefold. First, we aim to show that the variant of polar transformation can be used to register face images against changes in pose and size. Second, implementation of fusion of thermal and visual face images in the wavelet ...

Illumination invariant head pose estimation using random forests classifier and binary pattern run length matrix

In this paper, a novel approach for head pose estimation in gray-level images is presented. In the proposed algorithm, two techniques were employed. In order to deal with the large set of training data, the method of Random Forests was employed; this is a state-of-the-art classification algorithm in the field of computer vision. In order to make this system robust in terms of ...

A low computational complexity V-BLAST/STBC detection mechanism in MIMO system

The idea of multiple antenna arrays has evolved into multiple-input multiple-output (MIMO) system, which provides transmit and receive diversities. It increases robustness of the effect of multipath fading in wireless channels, besides yielding higher capacity, spectral efficiency and better bit error rate (BER) performance. The spatial diversity gain is obtained by transmitting or ...

Performance evaluation of WMN-GA system for different settings of population size and number of generations

Wireless Mesh Networks (WMNs) distinguish for their low cost nature that makes them very attractive for providing wireless Internet connectivity. Such infrastructures can be used to deploy community networks, metropolitan area networks, municipal and corporative networks, and to support applications for urban areas, medical, transport and surveillance systems. The main issues in ...

An effective implementation of security based algorithmic approach in mobile adhoc networks

Mobile Ad-hoc Network one of the prominent area for the researchers and practitioners in assorted domains including security, routing, addressing and many others. A Mobile Ad-hoc Network (MANET) refers to an autonomous group or cluster of mobile users that communicate over relatively bandwidth constrained wireless links. Mobile ad hoc network refers to the moving node rather than ...

All capacities modular cost survivable network design problem using genetic algorithm with completely connection encoding

We study the survivable network design problem (SNDP) for simultaneous unicast and anycast flows in networks where the link cost follows All Capacities Modular Cost (ACMC) model. Given a network modeled by a connected, undirected graph and a set of flow demands, this problem aims at finding a set of connections with a minimized network cost in order to protect the network against ...

A dynamic attention assessment and enhancement tool using computer graphics

Training Programs to enhance Math Solving Skills, Memory, Visualization, etc in children are gaining popularity worldwide. Any skill is better acquired, when attention, the basic cognitive ability of the trainee is improved. This study makes an attempt to devise a technique in the form of a Brain Computer Interface (BCI) Game, to assist the trainers in monitoring and evaluating the ...

SAR assessment on three layered spherical human head model irradiated by mobile phone antenna

With the increasing application of wireless communication devices, mobile phone handsets are used by peoples of various age groups. This paper make an effort to asses the mobile phone radiation exposure effect on 4 years old, 8 years old children and an adult head model. Here, human head is modeled as a three layered sphere composed of skin, skull and brain. Hand held device model ...

Context-aware recommender for mobile learners

As mobile technologies become widespread, new challenges are facing the research community to develop lightweight learning services adapted to the learner’s profile, context, and task at hand. This paper attempts to solve some of these challenges by proposing a knowledge-driven recommender for mobile learning on the Semantic Web. The contribution of this work is an approach for ...

ColShield: an effective and collaborative protection shield for the detection and prevention of collaborative flooding of DDoS attacks in wireless mesh networks

Wireless mesh networks are highly susceptible to Distributed Denial-of-Service attacks due to its self-configuring property. Flooding DDOS attack is one form of collaborative attacks and the transport layer of such networks are extremely affected. In this paper we propose ColShield, an effective and collaborative protection shield which not only detects flooding attacks but also ...

A subjective job scheduler based on a backpropagation neural network

This paper aims to present and discuss the concept of a subjective job scheduler based on a Backpropagation Neural Network (BPNN) and a greedy job alignment procedure. The subjective criteria of the scheduler depend on the solution plan for a given job scheduling problem. When the scheduler is provided with desired job selection criteria for the problem, it generates user ...

Novel user centric, game theory based bandwidth allocation mechanism in WiMAX

Bandwidth allocation plays a crucial role in ensuring overall quality of service in WiMAX. WiMAX supports non-contention based bandwidth allocation mechanism, where the responsibility of bandwidth allocation lies with the base station. In this paper, a novel user- centric, Game Theory-based bandwidth allocation algorithm is proposed. The Users/Mobile Station shall be grouped in ...

"Intelligent Environments: a manifesto"

We explain basic features of an emerging area called Intelligent Environments. We give a short overview on how it has developed, what is the current state of the art and what are the challenges laying ahead. The aim of the article is to make aware the Computer Science community of this new development, the differences with previous dominant paradigms and the opportunities that this ...