


default search action
Human-centric Computing and Information Sciences, Volume 9
Volume 9, 2019
- Dongsik Jo
, Gerard Jounghyun Kim:
IoT + AR: pervasive and augmented environments for "Digi-log" shopping experience. 1 - Bhaskar Gautam
, Annappa Basava
:
Performance prediction of data streams on high-performance architecture. 2 - Tinggui Chen, Jiawen Shi, Jianjun Yang, Gongfa Li:
Enhancing network cluster synchronization capability based on artificial immune algorithm. 3 - Alireza Souri
, Amir Masoud Rahmani
, Nima Jafari Navimipour, Reza Rezaei:
A symbolic model checking approach in formal verification of distributed systems. 4 - Phil Legg
, Jim Smith, Alexander Downing:
Visual analytics for collaborative human-machine confidence in human-centric active learning tasks. 5 - Sunmin Lee, Jinah Kim, Nammee Moon
:
Random forest and WiFi fingerprint-based indoor location recognition system using smart watch. 6 - Yu Liu, Cong Zhang, Bo Hang, Song Wang, Han-Chieh Chao:
An audio attention computational model based on information entropy of two channels and exponential moving average. 7 - San Park, Seoungjae Cho, Jisun Park, Kaisi Huang, Yunsick Sung, Kyungeun Cho
:
Infrared bundle adjusting and clustering method for head-mounted display and Leap Motion calibration. 8 - Malik Jahan Khan
, Hussain Hayat, Irfan Awan:
Hybrid case-base maintenance approach for modeling large scale case-based reasoning systems. 9 - Cheol Shim, Rupali Kiran Shinde
, Min Choi:
Compatibility enhancement and performance measurement for socket interface with PCIe interconnections. 10 - Phil Legg
, Jim Smith, Alexander Downing:
Correction to: Visual analytics for collaborative human-machine confidence in human-centric active learning tasks. 11 - Chao-Tung Yang
, Shuo-Tsung Chen, Yu-Wei Chan
, Yu-Chuan Shen:
On construction of a cloud storage system with heterogeneous software-defined storage technologies. 12 - Daniel T. Ramotsoela
, Gerhard P. Hancke
, Adnan M. Abu-Mahfouz:
Attack detection in water distribution systems using machine learning. 13 - Shayem Saleh Alresheedi, Songfeng Lu, Mohamed E. Abd Elaziz
, Ahmed A. Ewees
:
Improved multiobjective salp swarm optimization for virtual machine placement in cloud computing. 15 - Chunyong Yin
, Shilei Ding, Jin Wang
:
Mobile marketing recommendation method based on user location feedback. 14 - Muhammad Imran
, Muhammad Hanif Durad, Farrukh Aslam Khan
, Abdelouahid Derhab:
Reducing the effects of DoS attacks in software defined networks using parallel flow installation. 16 - Phuong Minh Chu, Seoungjae Cho, Jisun Park, Simon Fong
, Kyungeun Cho
:
Enhanced ground segmentation method for Lidar point clouds in human-centric autonomous robot systems. 17 - Jin Wang
, Xiujian Gu, Wei Liu, Arun Kumar Sangaiah
, Hye-Jin Kim:
An empower hamilton loop based data collection algorithm with mobile agent for WSNs. 18 - Minghao Cai
, Jiro Tanaka:
Go together: providing nonverbal awareness cues to enhance co-located sensation in remote communication. 19 - Minh Le, Stephen W. Clyde, Young-Woo Kwon
:
Enabling multi-hop remote method invocation in device-to-device networks. 20 - Venus Mohammadi
, Amir Masoud Rahmani
, Aso Mohammad Darwesh, Amir Sahafi
:
Trust-based recommendation systems in Internet of Things: a systematic literature review. 21 - Runze Wan, Lixin Ding, Naixue Xiong
, Wanneng Shu, Li Yang:
Dynamic dual threshold cooperative spectrum sensing for cognitive radio under noise power uncertainty. 22 - Shirin Akther Khanam
, Fei Liu
, Yi-Ping Phoebe Chen
:
Comprehensive structured knowledge base system construction with natural language presentation. 23 - Shakeel Ahmad, Muhammad Zubair Asghar
, Fahad M. Alotaibi, Irfanullah Awan:
Detection and classification of social media-based extremist affiliations using sentiment analysis techniques. 24 - Yong Sun
, Wenan Tan:
A trust-aware task allocation method using deep q-learning for uncertain mobile crowdsourcing. 25 - Vankamamidi Srinivasa Naresh
, Reddi Sivaranjani, Nistala V. E. S. Murthy:
A provably secure cluster-based hybrid hierarchical group key agreement for large wireless ad hoc networks. 26 - Shakeel Ahmad, Muhammad Zubair Asghar, Fahad M. Alotaibi, Irfanullah Awan:
Correction to: Detection and classification of social media-based extremist affiliations using sentiment analysis techniques. 27 - Wided Ben Daoud, Mohammad S. Obaidat, Amel Meddeb-Makhlouf
, Faouzi Zarai
, Kuei-Fang Hsiao:
TACRM: trust access control and resource management mechanism in fog computing. 28 - Jin Ho Park, Mikail Mohammed Salim, Jeong Hoon Jo
, Jose Costa Sapalo Sicato, Shailendra Rathore, Jong Hyuk Park
:
CIoT-Net: a scalable cognitive IoT based smart city network architecture. 29 - Sang-Woon Kim, Joon-Min Gil
:
Research paper classification systems based on TF-IDF and LDA schemes. 30 - Mudhafar Jalil Jassim Ghrabat
, Guangzhi Ma, Ismail Yaqub Maolood, Shayem Saleh Alresheedi, Zaid Ameen Abduljabbar
:
An effective image retrieval based on optimized genetic algorithm utilized a novel SVM-based convolutional neural network classifier. 31 - Peng Zeng, Siyuan Chen, Kim-Kwang Raymond Choo:
An IND-CCA2 secure post-quantum encryption scheme and a secure cloud storage use case. 32 - Chunyong Yin
, Biao Zhou, Zhichao Yin, Jin Wang:
Local privacy protection classification based on human-centric computing. 33 - Henry Friday Nweke
, Ying Wah Teh
, Ghulam Mujtaba, Uzoma Rita Alo, Mohammed Ali Al-garadi
:
Multi-sensor fusion based on multiple classifier systems for human activity identification. 34 - Ning Liu
, Bo Shen
, Zhenjiang Zhang, Zhiyuan Zhang, Kun Mi:
Attention-based Sentiment Reasoner for aspect-based sentiment analysis. 35 - Syed Nasir Danial
, Jennifer Smith, Brian Veitch, Faisal Khan
:
On the realization of the recognition-primed decision model for artificial agents. 36 - Syed Nasir Danial
, Jennifer Smith, Faisal Khan
, Brian Veitch:
Situation awareness modeling for emergency management on offshore platforms. 37 - Turki Ali Alghamdi
:
Convolutional technique for enhancing security in wireless sensor networks against malicious nodes. 38 - Ana Nieto
, Ruben Rios:
Cybersecurity profiles based on human-centric IoT devices. 39 - Fuquan Zhang, Tsu-Yang Wu
, Jeng-Shyang Pan
, Gangyi Ding, Zuoyong Li:
Human motion recognition based on SVM in VR art media interaction environment. 40 - Qiancheng Yu
, Zhiwen Yu
, Zhu Wang, Xiaofeng Wang, Yongzhi Wang:
Overlapping community detection for count-value networks. 41 - Ting-Mei Li, Han-Chieh Chao, Jianming Zhang
:
Emotion classification based on brain wave: a survey. 42 - Huiyue Wu
, Weizhou Luo
, Neng Pan, Shenghuan Nan, Yanyi Deng, Shengqian Fu, Liuqingqing Yang:
Understanding freehand gestures: a study of freehand gestural interaction for immersive VR shopping applications. 43 - Hsin-Te Wu
, Hsin-Hung Cho, Sheng-Jie Wang, Fan-Hsun Tseng
:
Intelligent data cache based on content popularity and user location for Content Centric Networks. 44

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.