thumbnail

Human-centric Computing and Information Sciences

SCIE-ISI SCOPUS (2011-2023)

  2192-1962

 

 

Cơ quản chủ quản:  KOREA INFORMATION PROCESSING SOC , Korea Information Processing Society

Lĩnh vực:
Computer Science (miscellaneous)

Các bài báo tiêu biểu

A survey of cloud-based network intrusion detection analysis
- 2016
Nathan Keegan, Soo-Yeon Ji, Aastha Chaudhary, Claude Concolato, Byunggu Yu, Dong Hyun Jeong
AbstractAs network traffic grows and attacks become more prevalent and complex, we must find creative new ways to enhance intrusion detection systems (IDSes). Recently, researchers have begun to harness both machine learning and cloud computing technology to better identify threats and speed up computation times. This paper explores current research at the intersec...... hiện toàn bộ
3D face recognition: a survey
- 2018
Song Zhou, Shuangjiu Xiao
Abstract 3D face recognition has become a trending research direction in both industry and academia. It inherits advantages from traditional 2D face recognition, such as the natural recognition process and a wide range of applications. Moreover, 3D face recognition systems could accurately recognize human faces even under dim lights and with variant ...... hiện toàn bộ
A guide for the selection of routing protocols in WBAN for healthcare applications
Tập 7 Số 1 - 2017
V. Bhanumathi, C. Sangeetha
AbstractIn the present scenario, the term wireless body area network (WBAN) is becoming an integral part of human day to day life due its wide variety of applications, especially in the field of healthcare systems. To design such a reliable body area network system, there are a number of factors to be considered both in hardware and software levels. One of such fac...... hiện toàn bộ
Don’t click: towards an effective anti-phishing training. A comparative literature review
- 2020
Daniel Jampen, Gürkan Gür, Thomas Schmid Sutter, Bernhard Tellenbach
AbstractEmail is of critical importance as a communication channel for both business and personal matters. Unfortunately, it is also often exploited for phishing attacks. To defend against such threats, many organizations have begun to provide anti-phishing training programs to their employees. A central question in the development of such programs is how they can ...... hiện toàn bộ
Testing of the voice communication in smart home care
Tập 5 - Trang 1-22 - 2015
Jan Vanus, Marek Smolon, Radek Martinek, Jiri Koziorek, Jan Zidek, Petr Bilik
This article is aimed to describe the method of testing the implementation of voice control over operating and technical functions of Smart Home Come. Custom control over operating and technical functions was implemented into a model of Smart Home that was equipped with KNX technology. A sociological survey focused on the needs of seniors has been carried out to justify the implementation of voice...... hiện toàn bộ
A dynamic attention assessment and enhancement tool using computer graphics
- 2014
Geeta U. Navalyal, Rahul Gavas
AbstractTraining Programs to enhance Math Solving Skills, Memory, Visualization, etc in children are gaining popularity worldwide. Any skill is better acquired, when attention, the basic cognitive ability of the trainee is improved. This study makes an attempt to devise a technique in the form of a Brain Computer Interface (BCI) Game, to assist the trainers in moni...... hiện toàn bộ
Collaborative design of software applications: the role of users
- 2018
Silvia Mirri, Marco Roccetti, Paola Salomoni
AbstractDrawing on a 1-year application design, implementation and evaluation experience, this paper examines how engaging users in the early design phases of a software application is tightly bound to the success of that application in use. Through the comparison between two different approaches to collaborative application design (namely, user-centered vs partici...... hiện toàn bộ
A symbolic model checking approach in formal verification of distributed systems
Tập 9 Số 1 - 2019
Alireza Souri, Amir Masoud Rahmani, Nima Jafari Navimipour, R. Rezaei
AbstractModel checking is an influential method to verify complex interactions, concurrent and distributed systems. Model checking constructs a behavioral model of the system using formal concepts such as operations, states, events and actions. The model checkers suffer some weaknesses such as state space explosion problem that has high memory consumption and time ...... hiện toàn bộ
Mobile marketing recommendation method based on user location feedback
- 2019
Chunyong Yin, Shilei Ding, Jin Wang
Abstract Location-based mobile marketing recommendation has become one of the hot spots in e-commerce. The current mobile marketing recommendation system only treats location information as a recommended attribute, which weakens the role of users and shopping location information in the recommendation. This paper focuses on location feedback data of ...... hiện toàn bộ
Understanding freehand gestures: a study of freehand gestural interaction for immersive VR shopping applications
- 2019
Huiyue Wu, Weizhou Luo, Neng Pan, Shenghuan Nan, Yanyi Deng, Shengqian Fu, Liuqingqing Yang
Abstract Unlike retail stores, in which the user is forced to be physically present and active during restricted opening hours, online shops may be more convenient, functional and efficient. However, traditional online shops often have a narrow bandwidth for product visualizations and interactive techniques and lack a compelling shopping context. In ...... hiện toàn bộ