Page 6 of 21
Abstract Code-based public key encryption (PKE) is a popular choice to achieve post-quantum security, partly due to its capability to achieve fast encryption/decryption. However, code-based PKE has l…
Peng Zeng, Siyuan Chen & Kim-Kwang Raymond Choo
Human-centric Computing and Information Sciences 2019 9:32Abstract Image retrieval is the process of retrieving images from a database. Certain algorithms have been used for traditional image retrieval. However, such retrieval involves certain limitations, …
Mudhafar Jalil Jassim Ghrabat, Guangzhi Ma, Ismail Yaqub Maolood, Shayem Saleh Alresheedi & Zaid Ameen Abduljabbar
Human-centric Computing and Information Sciences 2019 9:31Abstract With the increasing advance of computer and information technologies, numerous research papers have been published online as well as offline, and as new research fields have been continuingl…
Sang-Woon Kim & Joon-Min Gil
Human-centric Computing and Information Sciences 2019 9:30Abstract In the recent era, artificial intelligence (AI) is being used to support numerous solutions for human beings, such as healthcare, autonomous transportation, and so on. Cognitive computing is…
Jin-ho Park, Mikail Mohammed Salim, Jeong Hoon Jo, Jose Costa Sapalo Sicato, Shailendra Rathore & Jong Hyuk Park
Human-centric Computing and Information Sciences 2019 9:29Abstract Fog computing network is designed as an extension of the cloud due to the need for a supporting platform capable of ensuring the requirements of Internet of Thing (IoT). The growth of fog ba…
Wided Ben Daoud, Mohammad S. Obaidat, Amel Meddeb-Makhlouf, Faouzi Zarai & Kuei-Fang Hsiao
Human-centric Computing and Information Sciences 2019 9:28In the original publication of this article [1], the Acknowledgements and Funding section in Declarations need to be revised. The updated note should be: This project was funded by the Deanship of …
Shakeel Ahmad, Muhammad Zubair Asghar, Fahad M. Alotaibi & Irfanullah Awan
Human-centric Computing and Information Sciences 2019 9:27Abstract Group key agreement protocol permits a set of users to create a common key to make sure security of information exchange among members of the group. It is extensively used in secure multipar…
Vankamamidi S. Naresh, Sivaranjani Reddi & Nistala V. E. S. Murthy
Human-centric Computing and Information Sciences 2019 9:26Abstract Mobile crowdsourcing has emerged as a promising collaboration paradigm in which each spatial task requires a set of mobile workers in near vicinity to the target location. Considering the de…
Yong Sun & Wenan Tan
Human-centric Computing and Information Sciences 2019 9:25Abstract Identification and classification of extremist-related tweets is a hot issue. Extremist gangs have been involved in using social media sites like Facebook and Twitter for propagating their i…
Shakeel Ahmad, Muhammad Zubair Asghar, Fahad M. Alotaibi & Irfanullah Awan
Human-centric Computing and Information Sciences 2019 9:24Abstract Constructing an ontology-based machine-readable knowledge base system from different sources with minimum human intervention, also known as ontology-based machine-readable knowledge base con…
Shirin Akther Khanam, Fei Liu & Yi-Ping Phoebe Chen
Human-centric Computing and Information Sciences 2019 9:23Abstract The spectrum sensing performance depends on the accuracy of the detection about whether primary users are busy or idle. Previous studies on cognitive radio spectrum sensing have shown that t…
Runze Wan, Lixin Ding, Naixue Xiong, Wanneng Shu & Li Yang
Human-centric Computing and Information Sciences 2019 9:22Abstract Internet of Things (IoT) creates a world where smart objects and services interacting autonomously. Taking into account the dynamic-heterogeneous characteristic of interconnected devices in …
Venus Mohammadi, Amir Masoud Rahmani, Aso Mohammed Darwesh & Amir Sahafi
Human-centric Computing and Information Sciences 2019 9:21Abstract To avoid shrinking down the performance and preserve energy, low-end mobile devices can collaborate with the nearby ones by offloading computation intensive code. However, despite the long r…
Minh Le, Stephen Clyde & Young-Woo Kwon
Human-centric Computing and Information Sciences 2019 9:20Abstract Nowadays, people are easy to have a remote conferencing in different scenarios. However, the potential of mobile video communication has yet to be fully exploited. In our research, we explor…
Minghao Cai & Jiro Tanaka
Human-centric Computing and Information Sciences 2019 9:19Abstract In wireless sensor networks (WSNs), sensor devices must be equipped with the capabilities of sensing, computation and communication. These devices work continuously through non-rechargeable …
Jin Wang, Xiujian Gu, Wei Liu, Arun Kumar Sangaiah & Hye-Jin Kim
Human-centric Computing and Information Sciences 2019 9:18