Page 10 of 26
Abstract This paper proposes a methodology based on the concept of Human Factors to obtain Cybersecurity profiles. The profiles are determined by a set of parameters that help model the skills of ind…
Ana Nieto & Ruben Rios
Human-centric Computing and Information Sciences 2019 9:39Abstract Wireless sensor networks (WSNs) comprise tiny devices known as sensors. These devices are frequently employed in short-range communications and can perform various operations such as monitor…
Turki Ali Alghamdi
Human-centric Computing and Information Sciences 2019 9:38Abstract Situation awareness is the first and most important step in emergency management. It is a dynamic step involving evolving conditions and environments. It is an area of active research. This …
Syed Nasir Danial, Jennifer Smith, Faisal Khan & Brian Veitch
Human-centric Computing and Information Sciences 2019 9:37Abstract This work proposes a methodology to program an artificial agent that can make decisions based on a naturalistic decision-making approach called recognition-primed decision model (RPDM). The …
Syed Nasir Danial, Jennifer Smith, Brian Veitch & Faisal Khan
Human-centric Computing and Information Sciences 2019 9:36Abstract Aspect-based sentiment analysis (ABSA) is a powerful way of predicting the sentiment polarity of text in natural language processing. However, understanding human emotions and reasoning from…
Ning Liu, Bo Shen, Zhenjiang Zhang, Zhiyuan Zhang & Kun Mi
Human-centric Computing and Information Sciences 2019 9:35Abstract Multimodal sensors in healthcare applications have been increasingly researched because it facilitates automatic and comprehensive monitoring of human behaviors, high-intensity sports manage…
Henry Friday Nweke, Ying Wah Teh, Ghulam Mujtaba, Uzoma Rita Alo & Mohammed Ali Al-garadi
Human-centric Computing and Information Sciences 2019 9:34Abstract Human-centric computing is becoming an important part of data-driven artificial intelligence (AI) and the importance of data mining under Human-centric computing is getting more and more att…
Chunyong Yin, Biao Zhou, Zhichao Yin & Jin Wang
Human-centric Computing and Information Sciences 2019 9:33Abstract Code-based public key encryption (PKE) is a popular choice to achieve post-quantum security, partly due to its capability to achieve fast encryption/decryption. However, code-based PKE has l…
Peng Zeng, Siyuan Chen & Kim-Kwang Raymond Choo
Human-centric Computing and Information Sciences 2019 9:32Abstract Image retrieval is the process of retrieving images from a database. Certain algorithms have been used for traditional image retrieval. However, such retrieval involves certain limitations, …
Mudhafar Jalil Jassim Ghrabat, Guangzhi Ma, Ismail Yaqub Maolood, Shayem Saleh Alresheedi & Zaid Ameen Abduljabbar
Human-centric Computing and Information Sciences 2019 9:31Abstract With the increasing advance of computer and information technologies, numerous research papers have been published online as well as offline, and as new research fields have been continuingl…
Sang-Woon Kim & Joon-Min Gil
Human-centric Computing and Information Sciences 2019 9:30Abstract In the recent era, artificial intelligence (AI) is being used to support numerous solutions for human beings, such as healthcare, autonomous transportation, and so on. Cognitive computing is…
Jin-ho Park, Mikail Mohammed Salim, Jeong Hoon Jo, Jose Costa Sapalo Sicato, Shailendra Rathore & Jong Hyuk Park
Human-centric Computing and Information Sciences 2019 9:29Abstract Fog computing network is designed as an extension of the cloud due to the need for a supporting platform capable of ensuring the requirements of Internet of Thing (IoT). The growth of fog ba…
Wided Ben Daoud, Mohammad S. Obaidat, Amel Meddeb-Makhlouf, Faouzi Zarai & Kuei-Fang Hsiao
Human-centric Computing and Information Sciences 2019 9:28In the original publication of this article [1], the Acknowledgements and Funding section in Declarations need to be revised. The updated note should be: This project was funded by the Deanship of …
Shakeel Ahmad, Muhammad Zubair Asghar, Fahad M. Alotaibi & Irfanullah Awan
Human-centric Computing and Information Sciences 2019 9:27Abstract Group key agreement protocol permits a set of users to create a common key to make sure security of information exchange among members of the group. It is extensively used in secure multipar…
Vankamamidi S. Naresh, Sivaranjani Reddi & Nistala V. E. S. Murthy
Human-centric Computing and Information Sciences 2019 9:26Abstract Mobile crowdsourcing has emerged as a promising collaboration paradigm in which each spatial task requires a set of mobile workers in near vicinity to the target location. Considering the de…
Yong Sun & Wenan Tan
Human-centric Computing and Information Sciences 2019 9:25