Human-centric Computing and Information Sciences

http://link.springer.com/journal/13673

List of Papers (Total 158)

Discriminative histogram taxonomy features for snake species identification

Background Incorrect snake identification from the observable visual traits is a major reason for death resulting from snake bites in tropics. So far no automatic classification method has been proposed to distinguish snakes by deciphering the taxonomy features of snake for the two major species of snakes i.e. Elapidae and Viperidae. We identify 38 different taxonomically relevant ...

Color Directional Local Quinary Patterns for Content Based Indexing and Retrieval

This paper presents a novel evaluationary approach to extract color-texture features for image retrieval application namely Color Directional Local Quinary Pattern (CDLQP). The proposed descriptor extracts the individual R, G and B channel wise directional edge information between reference pixel and its surrounding neighborhoods by computing its grey-level difference based on ...

Adaptive polar transform and fusion for human face image processing and evaluation

Human face processing and evaluation is a problem due to variations in orientation, size, illumination, expression, and disguise. The goal of this work is threefold. First, we aim to show that the variant of polar transformation can be used to register face images against changes in pose and size. Second, implementation of fusion of thermal and visual face images in the wavelet ...

Illumination invariant head pose estimation using random forests classifier and binary pattern run length matrix

In this paper, a novel approach for head pose estimation in gray-level images is presented. In the proposed algorithm, two techniques were employed. In order to deal with the large set of training data, the method of Random Forests was employed; this is a state-of-the-art classification algorithm in the field of computer vision. In order to make this system robust in terms of ...

A low computational complexity V-BLAST/STBC detection mechanism in MIMO system

The idea of multiple antenna arrays has evolved into multiple-input multiple-output (MIMO) system, which provides transmit and receive diversities. It increases robustness of the effect of multipath fading in wireless channels, besides yielding higher capacity, spectral efficiency and better bit error rate (BER) performance. The spatial diversity gain is obtained by transmitting or ...

Performance evaluation of WMN-GA system for different settings of population size and number of generations

Wireless Mesh Networks (WMNs) distinguish for their low cost nature that makes them very attractive for providing wireless Internet connectivity. Such infrastructures can be used to deploy community networks, metropolitan area networks, municipal and corporative networks, and to support applications for urban areas, medical, transport and surveillance systems. The main issues in ...

An effective implementation of security based algorithmic approach in mobile adhoc networks

Mobile Ad-hoc Network one of the prominent area for the researchers and practitioners in assorted domains including security, routing, addressing and many others. A Mobile Ad-hoc Network (MANET) refers to an autonomous group or cluster of mobile users that communicate over relatively bandwidth constrained wireless links. Mobile ad hoc network refers to the moving node rather than ...

All capacities modular cost survivable network design problem using genetic algorithm with completely connection encoding

We study the survivable network design problem (SNDP) for simultaneous unicast and anycast flows in networks where the link cost follows All Capacities Modular Cost (ACMC) model. Given a network modeled by a connected, undirected graph and a set of flow demands, this problem aims at finding a set of connections with a minimized network cost in order to protect the network against ...

A dynamic attention assessment and enhancement tool using computer graphics

Training Programs to enhance Math Solving Skills, Memory, Visualization, etc in children are gaining popularity worldwide. Any skill is better acquired, when attention, the basic cognitive ability of the trainee is improved. This study makes an attempt to devise a technique in the form of a Brain Computer Interface (BCI) Game, to assist the trainers in monitoring and evaluating the ...

SAR assessment on three layered spherical human head model irradiated by mobile phone antenna

With the increasing application of wireless communication devices, mobile phone handsets are used by peoples of various age groups. This paper make an effort to asses the mobile phone radiation exposure effect on 4 years old, 8 years old children and an adult head model. Here, human head is modeled as a three layered sphere composed of skin, skull and brain. Hand held device model ...

Context-aware recommender for mobile learners

As mobile technologies become widespread, new challenges are facing the research community to develop lightweight learning services adapted to the learner’s profile, context, and task at hand. This paper attempts to solve some of these challenges by proposing a knowledge-driven recommender for mobile learning on the Semantic Web. The contribution of this work is an approach for ...

ColShield: an effective and collaborative protection shield for the detection and prevention of collaborative flooding of DDoS attacks in wireless mesh networks

Wireless mesh networks are highly susceptible to Distributed Denial-of-Service attacks due to its self-configuring property. Flooding DDOS attack is one form of collaborative attacks and the transport layer of such networks are extremely affected. In this paper we propose ColShield, an effective and collaborative protection shield which not only detects flooding attacks but also ...

A subjective job scheduler based on a backpropagation neural network

This paper aims to present and discuss the concept of a subjective job scheduler based on a Backpropagation Neural Network (BPNN) and a greedy job alignment procedure. The subjective criteria of the scheduler depend on the solution plan for a given job scheduling problem. When the scheduler is provided with desired job selection criteria for the problem, it generates user ...

Novel user centric, game theory based bandwidth allocation mechanism in WiMAX

Bandwidth allocation plays a crucial role in ensuring overall quality of service in WiMAX. WiMAX supports non-contention based bandwidth allocation mechanism, where the responsibility of bandwidth allocation lies with the base station. In this paper, a novel user- centric, Game Theory-based bandwidth allocation algorithm is proposed. The Users/Mobile Station shall be grouped in ...

"Intelligent Environments: a manifesto"

We explain basic features of an emerging area called Intelligent Environments. We give a short overview on how it has developed, what is the current state of the art and what are the challenges laying ahead. The aim of the article is to make aware the Computer Science community of this new development, the differences with previous dominant paradigms and the opportunities that this ...

Panoramic human structure maintenance based on invariant features of video frames

Panoramic photography is becoming a very popular and commonly available feature in the mobile handheld devices nowadays. In traditional panoramic photography, the human structure often becomes messy if the human changes position in the scene or during the combination step of the human structure and natural background. In this paper, we present an effective method in panorama ...

A comparison between experienced and inexperienced video game players’ perceptions

In this article we examine the relationship between usability, hedonic attributes and general appeal of two types of video games, first-person shooters, and massively multi-player online role playing games. Through the use of a successful example of a game from each genre, we examine the perceptions of both inexperienced and experienced players of each game, and draw conclusions on ...

Smart card based time efficient authentication scheme for global grid computing

Decentralization in every walk of life has resulted in the development of Global Grid networking. Data sharing and access depends on their availability, capability, cost and user requirements. One of the needs for a secure Grid Environment is a strong authentication for users. Since Authentication is the entry point into every network, a novel smart card based authentication scheme ...

Social design feedback: evaluations with users in online ad-hoc groups

Social design feedback is a novel approach to usability evaluation where user participants are asked to comment on designs asynchronously in online ad-hoc groups. Two key features of this approach are that (1) it supports interaction between user participants and development team representatives and (2) user participants can see and respond to other participants’ comments. Two ...

Automatic evaluation technique for certain types of open questions in semantic learning systems

In this paper, we propose a methodology to enhance the evaluation tools in semantic learning systems. Our proposal’s aim is to evaluate two types of open questions in hybrid exams. The proposed technique in the first type MOQ (Multi Operations Question) uses the matrix concept for fuzzy score. But POQ (Proof Open Question) is more complicated so we use direct connect to learning ...

A framework to integrate speech based interface for blind web users on the websites of public interest

Despite many assistive tools available for browsing the web, blind persons are not able to perform the tasks using internet that are done by persons without such disability. Even the futuristic social networking sites and other websites using the features of web 2.0 indicate a lesser accessible/responsible web. In this paper, we propose a framework, which can be used by the ...

The art of software systems development: Reliability, Availability, Maintainability, Performance (RAMP)

The production of software systems with specific demand on reliability, availability, maintenance, and performance (RAMP) is one of the greatest challenges facing software engineers at all levels of the development cycle. Most requirements specification tools are more suited for functional requirements than for non-functional RAMP requirements. RAMP requirements are left ...

Performance evaluation of data aggregation for cluster-based wireless sensor network

In wireless sensor network, data fusion is considered an essential process for preserving sensor energy. Periodic data sampling leads to enormous collection of raw facts, the transmission of which would rapidly deplete the sensor power. In this paper, we have performed data aggregation on the basis of entropy of the sensors. The entropy is computed from the proposed local and ...

Collective intelligence within web video

We present a user-based approach for detecting interesting video segments through simple signal processing of users’ collective interactions with the video player (e.g., seek/scrub, play, pause). Previous research has focused on content-based systems that have the benefit of analyzing a video without user interactions, but they are monolithic, because the resulting key-frames are ...