Human-centric Computing and Information Sciences

http://link.springer.com/journal/13673

List of Papers (Total 179)

Enhancing Wi-Fi fingerprinting for indoor positioning using human-centric collaborative feedback

Position information is an important aspect of a mobile device’s context. While GPS is widely used to provide location information, it does not work well indoors. Wi-Fi network infrastructure is found in many public facilities and can be used for indoor positioning. In addition, the ubiquity of Wi-Fi-capable devices makes this approach especially cost-effective. In recent years...

Performance evaluation of data aggregation for cluster-based wireless sensor network

In wireless sensor network, data fusion is considered an essential process for preserving sensor energy. Periodic data sampling leads to enormous collection of raw facts, the transmission of which would rapidly deplete the sensor power. In this paper, we have performed data aggregation on the basis of entropy of the sensors. The entropy is computed from the proposed local and...

ETSI compliant GeoNetworking protocol layer implementation for IVC simulations

Inter-Vehicle Communication (IVC) is an important component of the ITS architecture, that enables Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) communications. GeoNet project brought the IVC one step further by enabling transparent IP connectivity between vehicles and the infrastructure. Specifications produced by the GeoNet project have been incorporated into...

Publishing and discovering context-dependent services

In service oriented computing, service providers and service requesters are main interacting entities. A service provider publishes the services it wishes to make public using service registries. A service requester initiates a discovery process to find the service that meets its requirements using the service registries. Current approaches for the publication and discovery do...

Dynamic content synchronization between learning management systems over limited bandwidth network

Well-designed instructional material is equally important for successful e-Learning implementation. Teachers and instructors play a major role in terms of designing and building learning content. In one respect, it requires costs in terms of effort, time and experience. In other respects, a good learning content is likely a result of recurring revisions as a result of teaching...

Detecting & interpreting self-manipulating hand movements for student’s affect prediction

Background In this paper, we report on development of a non-intrusive student mental state prediction system from his (her) unintentional hand-touch-head (face) movements. Methods Hand-touch-head (face) movement is a typical case of occlusion of otherwise easily detectable image features due to similar skin color and texture, however, in our proposed scheme, i.e., the Sobel...

A novel energy-aware cluster head selection based on particle swarm optimization for wireless sensor networks

The wireless sensor networks have long been an attractive field to the researchers and scientists for its ease in deployment and maintenance. In this research, we focus on the maximization of network lifetime which has become a critical issue in sensor networks. Clustered organization of nodes with aggregation of data at the cluster head becomes one of the significant means to...

Ranked selection of nearest discriminating features

Background Feature selection techniques use a search-criteria driven approach for ranked feature subset selection. Often, selecting an optimal subset of ranked features using the existing methods is intractable for high dimensional gene data classification problems. Methods In this paper, an approach based on the individual ability of the features to discriminate between...

Quorums-based Replication of Multimedia Objects in Distributed Systems

Background Multimedia objects like music and movies are distributed to peers through downloading and caching in peer-to-peer (P2P) overlay networks. In this paper, we consider multimedia objects which are characterized in terms of not only data structure but also quality of service (QoS) like frame rate and number of colours. For example, there are a pair of replicas o i and o j...

Finding relevant semantic association paths through user-specific intermediate entities

Semantic Associations are complex relationships between entities over metadata represented in a RDF graph. While searching for complex relationships, it is possible to find too many relationships between entities. Therefore, it is important to locate interesting and meaningful relations and rank them before presenting to the end user. In recent years e-learning systems have...

Metis: a profiling toolkit based on the virtualization of hardware performance counters

Background With wide application of virtualization technology, the demand is increasing for performance analysis and system diagnosis in virtualization environment. There are some profiling toolkits based on hardware events, such as OProfile in native Linux and Xenoprof in Xen virtual machine environment. However, sometimes users in different domains need monitor different...

Quality of experience evaluation of voice communication: an affect-based approach

Voice communication systems such as Voice-over IP (VoIP), Public Switched Telephone Networks, and Mobile Telephone Networks, are an integral means of human tele-interaction. These systems pose distinctive challenges due to their unique characteristics such as low volume, burstiness and stringent delay/loss requirements across heterogeneous underlying network technologies...

Implications of E-learning systems and self-efficiency on students outcomes: a model approach

Background This paper presents a model approach to examine the relationships among e-learning systems, self-efficacy, and students' apparent learning results for university online courses. Methods Independent variables included in this study are e-learning system quality, information quality, computer self-efficacy, system-use, self-regulated learning behavior and user...

A novel fault tolerant service selection framework for pervasive computing

Background Service selection in pervasive computing is significant as it requires identifying the best service provider based on users requirements. After identifying the best service provider, when a service is being executed, service disruptions happen due to various faults. Methods Though attempts are made to provide best services to the user, executing the service without...

Embedding edit distance to enable private keyword search

Background Our work is focused on fuzzy keyword search over encrypted data in Cloud Computing. Methods We adapt results on private identification schemes by Bringer et al. to this new context. We here exploit a classical embedding of the edit distance into the Hamming distance. Results Our way of doing enables some flexibility on the tolerated edit distance when looking for close...

Organization and exploration of heterogeneous personal data collected in daily life

This paper describes a study on the organization and the exploration of heterogeneous personal data that are collected from mobile devices and web services in daily use. Although large amounts of personal data can be collected, it is not easy to find effective methods of reusing these data. With regard to collecting personal data, most lifelog research has focused on the capture...

An indoor augmented-reality evacuation system for the Smartphone using personalized Pedometry

There currently exist widely used mobile phone emergency applications for the smartphone and limited mobile emergency applications for indoor environments. However, the outdoor applications only focus primarily on providing accident information to users, and the indoor applications are limited by the unavailability of GPS user-positioning and by WiFi-based access problems. To...

IP Multimedia subsystem authentication protocol in LTE-heterogeneous networks

IP Multimedia Subsystem (IMS) introduces important advantages for users of LTE-femtocell heterogeneous access networks. In order to access services hosted in the IMS layer, the user has to undergo authentication procedure with the access network, followed by an authentication procedure with the IMS layer. This multi-pass authentication procedure is essential for securing IMS from...

An adaptively emerging mechanism for context-aware service selections regulated by feedback distributions

BackgroundIn the cloud computing environments, numerous ambient services may be created speedily and provided to a variety of users. In such a situation, people may be annoyed by how to make a proper and optimal selection quickly and economically.MethodsIn this study, we propose an Adaptively Emerging Mechanism (AEM) to reduce this selection burden with an interdisciplinary...

Medical image analysis and 3-d modeling to quantify changes and functional restoration in denervated muscle undergoing electrical stimulation treatment

Background and purposeMuscle tissue composition can be efficiently analyzed and quantified using images from spiral computed tomography technology (SCT) and the associated values of Hounsfield unit (HU) for different tissues. This work propose a novel approaches to monitor muscle condition in denervated muscle undergoing electrical stimulation (ES) treatment based on image...

MR-Radix: a multi-relational data mining algorithm

BackgroundOnce multi-relational approach has emerged as an alternative for analyzing structured data such as relational databases, since they allow applying data mining in multiple tables directly, thus avoiding expensive joining operations and semantic losses, this work proposes an algorithm with multi-relational approach.MethodsAiming to compare traditional approach performance...

An acoustic communication based AQUA-GLOMO simulator for underwater networks

In an underwater environment there can be various applications relating to the naval monitoring of an area and information gathering through the sensor nodes or underwater vehicles. The information gathered/monitored/detected in this manner can be sent to a group of sensors, or any sensor or vehicle may initiate a query asking for the information of its interest from the subset...

A survey of black hole attacks in wireless mobile ad hoc networks

The black hole attack is one of the well-known security threats in wireless mobile ad hoc networks. The intruders utilize the loophole to carry out their malicious behaviors because the route discovery process is necessary and inevitable. Many researchers have conducted different detection techniques to propose different types of detection schemes. In this paper, we survey the...

A human-centric integrated approach to web information search and sharing

In this paper we argue a user has to be in the center of information seeking task, as in any other task where the user is involved. In addition, an essential part of user-centrism is considering a user not only in his/her individual scope, but expanding it to the user's community participation quintessence. Through our research we make an endeavor to develop a holistic approach...