Human-centric Computing and Information Sciences

http://link.springer.com/journal/13673

List of Papers (Total 168)

Ranked selection of nearest discriminating features

Background Feature selection techniques use a search-criteria driven approach for ranked feature subset selection. Often, selecting an optimal subset of ranked features using the existing methods is intractable for high dimensional gene data classification problems. Methods In this paper, an approach based on the individual ability of the features to discriminate between different ...

Quorums-based Replication of Multimedia Objects in Distributed Systems

Background Multimedia objects like music and movies are distributed to peers through downloading and caching in peer-to-peer (P2P) overlay networks. In this paper, we consider multimedia objects which are characterized in terms of not only data structure but also quality of service (QoS) like frame rate and number of colours. For example, there are a pair of replicas o i and o j of ...

Medical image analysis and 3-d modeling to quantify changes and functional restoration in denervated muscle undergoing electrical stimulation treatment

Background and purpose Muscle tissue composition can be efficiently analyzed and quantified using images from spiral computed tomography technology (SCT) and the associated values of Hounsfield unit (HU) for different tissues. This work propose a novel approaches to monitor muscle condition in denervated muscle undergoing electrical stimulation (ES) treatment based on image ...

Finding relevant semantic association paths through user-specific intermediate entities

Semantic Associations are complex relationships between entities over metadata represented in a RDF graph. While searching for complex relationships, it is possible to find too many relationships between entities. Therefore, it is important to locate interesting and meaningful relations and rank them before presenting to the end user. In recent years e-learning systems have become ...

Metis: a profiling toolkit based on the virtualization of hardware performance counters

Background With wide application of virtualization technology, the demand is increasing for performance analysis and system diagnosis in virtualization environment. There are some profiling toolkits based on hardware events, such as OProfile in native Linux and Xenoprof in Xen virtual machine environment. However, sometimes users in different domains need monitor different hardware ...

Quality of experience evaluation of voice communication: an affect-based approach

Voice communication systems such as Voice-over IP (VoIP), Public Switched Telephone Networks, and Mobile Telephone Networks, are an integral means of human tele-interaction. These systems pose distinctive challenges due to their unique characteristics such as low volume, burstiness and stringent delay/loss requirements across heterogeneous underlying network technologies. Effective ...

Implications of E-learning systems and self-efficiency on students outcomes: a model approach

Background This paper presents a model approach to examine the relationships among e-learning systems, self-efficacy, and students' apparent learning results for university online courses. Methods Independent variables included in this study are e-learning system quality, information quality, computer self-efficacy, system-use, self-regulated learning behavior and user satisfaction ...

A novel fault tolerant service selection framework for pervasive computing

Background Service selection in pervasive computing is significant as it requires identifying the best service provider based on users requirements. After identifying the best service provider, when a service is being executed, service disruptions happen due to various faults. Methods Though attempts are made to provide best services to the user, executing the service without ...

MR-Radix: a multi-relational data mining algorithm

Background Once multi-relational approach has emerged as an alternative for analyzing structured data such as relational databases, since they allow applying data mining in multiple tables directly, thus avoiding expensive joining operations and semantic losses, this work proposes an algorithm with multi-relational approach. Methods Aiming to compare traditional approach ...

An acoustic communication based AQUA-GLOMO simulator for underwater networks

In an underwater environment there can be various applications relating to the naval monitoring of an area and information gathering through the sensor nodes or underwater vehicles. The information gathered/monitored/detected in this manner can be sent to a group of sensors, or any sensor or vehicle may initiate a query asking for the information of its interest from the subset of ...

Embedding edit distance to enable private keyword search

Background Our work is focused on fuzzy keyword search over encrypted data in Cloud Computing. Methods We adapt results on private identification schemes by Bringer et al. to this new context. We here exploit a classical embedding of the edit distance into the Hamming distance. Results Our way of doing enables some flexibility on the tolerated edit distance when looking for close ...

Organization and exploration of heterogeneous personal data collected in daily life

This paper describes a study on the organization and the exploration of heterogeneous personal data that are collected from mobile devices and web services in daily use. Although large amounts of personal data can be collected, it is not easy to find effective methods of reusing these data. With regard to collecting personal data, most lifelog research has focused on the capture of ...

A survey of black hole attacks in wireless mobile ad hoc networks

The black hole attack is one of the well-known security threats in wireless mobile ad hoc networks. The intruders utilize the loophole to carry out their malicious behaviors because the route discovery process is necessary and inevitable. Many researchers have conducted different detection techniques to propose different types of detection schemes. In this paper, we survey the ...

A human-centric integrated approach to web information search and sharing

In this paper we argue a user has to be in the center of information seeking task, as in any other task where the user is involved. In addition, an essential part of user-centrism is considering a user not only in his/her individual scope, but expanding it to the user's community participation quintessence. Through our research we make an endeavor to develop a holistic approach ...

Quality of service provision in mobile multimedia - a survey

The prevalence of multimedia applications has drastically increased the amount of multimedia data. With the drop of the hardware cost, more and more mobile devices with higher capacities are now used. The widely deployed wireless LAN and broadband wireless networks provide the ubiquitous network access for multimedia applications. Provision of Quality of Service (QoS) is ...

Trustworthy Group Making Algorithm in Distributed Systems

Information systems are being shifted to scalable architectures like Cloud and peer-to-peer (P2P) models. In this paper, we consider the P2P model as a fully distributed, scalable system different from centralized coordinated systems in Cloud and Grid systems. A P2P system is composed of peer processes (peers). Here, applications are realized by activities of peers and cooperations ...

Application of a MANET Testbed for horizontal and vertical scenarios: performance evaluation using delay and jitter metrics

Mobile ad hoc networks are attracting attention for their potential use in several fields such as collaborative computing and communications in indoor areas. Mobility and the absence of any fixed infrastructure make MANETs very attractive for mobility and rescue operations and time-critical applications. Considering mobility of the terminals, routing is a key process for operation ...

Integrating body language movements in augmented reality learning environment

Due to excessive use of computer and other low activity learning systems in many schools the physical health status of young students is deteriorating at an alarming rate throughout the world and more seriously in Taiwan upon recent national survey. We address this growing global problem with student learning process in mind in this study we examine making a better use of ...