Page 21 of 26
Abstract Online service providers often use challenge questions (a.k.a. knowledge‐based authentication) to facilitate resetting of passwords or to provide an extra layer of security for authenticatio…
Yusuf Albayram, Mohammad Maifi Hasan Khan, Athanasios Bamis, Sotirios Kentros, Nhan Nguyen & Ruhua Jiang
Human-centric Computing and Information Sciences 2015 5:17Abstract Software as a Service (SaaS) in Cloud Computing offers reliable access to software applications for end users over the Internet without direct investment in infrastructure and software. SaaS…
Farzaneh Motavaselalhagh, Faramarz Safi Esfahani & Hamid Reza Arabnia
Human-centric Computing and Information Sciences 2015 5:16Abstract This article is aimed to describe the method of testing the implementation of voice control over operating and technical functions of Smart Home Come. Custom control over operating and techn…
Jan Vanus, Marek Smolon, Radek Martinek, Jiri Koziorek, Jan Zidek & Petr Bilik
Human-centric Computing and Information Sciences 2015 5:15Abstract Active contours are used in the image processing application including edge detection, shape modeling, medical image-analysis, detectable object boundaries, etc. Shape is one of the importan…
Nguyen Thanh Binh
Human-centric Computing and Information Sciences 2015 5:14Abstract This article has two main objectives. First, we describe the design of an e-learning system for a University Income Tax Law course. Second, we analyze and explore learning results in terms o…
Li-Tze Lee & Jason C Hung
Human-centric Computing and Information Sciences 2015 5:13Abstract The objective of this study is to assess the combined performance of textural and morphological features for the detection and diagnosis of breast masses in ultrasound images. We have extrac…
Kadayanallur Mahadevan Prabusankarlal, Palanisamy Thirumoorthy & Radhakrishnan Manavalan
Human-centric Computing and Information Sciences 2015 5:12Abstract Since 2008, soaring international oil prices and environmental awareness have pushed bicycle to be a green transport vehicle to reduce greenhouse gas emissions as a significant global trend.…
Huan-Ming Chuang & You-Shyang Chen
Human-centric Computing and Information Sciences 2015 5:11Abstract An online community is a virtual community where people can express their opinions and their knowledge freely. There are a great deal of information in online communities, however there is n…
Majid Rafiei & Ahmad A Kardan
Human-centric Computing and Information Sciences 2015 5:10Erratum In the original published version of this article [1], the third co-author’s name Kothari Dwarkadas Pralhaddas appears twice, and the name of the second co-author Alagan Anpalagan is missing.…
Vijayalakshmi Saravanan, Alagan Anpalagan, Kothari Dwarkadas Pralhaddas & Isaac Woungang
Human-centric Computing and Information Sciences 2015 5:09Abstract Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is suitable for data access control on a cloud storage system. In CP-ABE, the data owner encrypts data under the access structure over a…
Takeru Naruse, Masami Mohri & Yoshiaki Shiraishi
Human-centric Computing and Information Sciences 2015 5:08Abstract The availability of advanced wireless sensor nodes enable us to use video processing techniques in a wireless sensor network (WSN) platform. Such paradigm can be used to implement video sens…
Bambang AB Sarif, Mahsa T Pourazad, Panos Nasiopoulos, Victor CM Leung & Amr Mohamed
Human-centric Computing and Information Sciences 2015 5:07Abstract Due to evolution in wireless applications, the high performance dual band handsets were blooming in the market. In this paper, a compact dual band E shaped planar inverted F antenna is prese…
Balamurugan Rajagopal & Lalithambika Rajasekaran
Human-centric Computing and Information Sciences 2015 5:06Abstract In recent, numerous useful visual analytics tools have been designed to help domain experts solve analytical problems. However, most of the tools do not reflect the nature of solving real-wo…
Dong Hyun Jeong, Soo-Yeon Ji, Evan A Suma, Byunggu Yu & Remco Chang
Human-centric Computing and Information Sciences 2015 5:05Abstract Wireless sensor networks (WSNs) demand low power and energy efficient hardware and software. Dynamic Power Management (DPM) technique reduces the maximum possible active states of a wireless…
Anuradha Pughat & Vidushi Sharma
Human-centric Computing and Information Sciences 2015 5:04Abstract Image fusion is used to enhance the quality of images by combining two images of same scene obtained from different techniques. In medical diagnosis by combining the images obtained by Compu…
Jyoti Agarwal & Sarabjeet Singh Bedi
Human-centric Computing and Information Sciences 2015 5:03