Journal: Personal and Ubiquitous Computing

Volume 22, Issue 5-6

879 -- 882Gunasekaran Manogaran, Naveen Chilamkurti, Ching-Hsien Hsu. Emerging trends, issues, and challenges in Internet of Medical Things and wireless networks
883 -- 893T. V. Padmavathy, D. S. Bhargava, P. Venkatesh, N. Sivakumar. Design and development of microstrip patch antenna with circular and rectangular slot for structural health monitoring
895 -- 902Weiping Zhang, Jingzhi Yang, Hang Su, Mohit Kumar, Yihua Mao. Medical data fusion algorithm based on Internet of things
903 -- 910Guizhen He, Jun Yang, Seven Behnke. Research on geometric features and point cloud properties for tree skeleton extraction
911 -- 919M. S. Murali Dhar, R. Manimegalai. A policy-oriented secured service for the e-commerce applications in cloud
921 -- 936Ching-Hsue Cheng, You-Shyang Chen, Arun Kumar Sangaiah, Yin-Hsiu Su. Evidence-based personal applications of medical computing models in risk factors of cardiovascular disease for the middle-aged and elderly
937 -- 942Maozhu Jin, Hua Wang, Lijun Song, Yuxue Li, Yucheng Zeng. Man-machine dialogue system optimization based on cloud computing
943 -- 950I. Chandra, K. Helen Prabha, N. Sivakumar. Optimization of QoS parameters using scheduling techniques in heterogeneous network
951 -- 959V. Sivakumar, D. Rekha. Node scheduling problem in underwater acoustic sensor network using genetic algorithm
961 -- 970M. TamilNidhi, K. Gunaseelan. Examining the variation of vascular structure in digital fundus images using textural pattern
971 -- 985Yue-Feng Zheng, Ying Li, Gang Wang 0013, Yu-Peng Chen, Qian Xu, Jia-Hao Fan, Xue-Ting Cui. A novel hybrid algorithm for feature selection
987 -- 1004Chunzhe Zhao, Donghai Li, Jianwei Cui, Lingling Tian. Decentralized low-order ADRC design for MIMO system with unknown order and relative degree
1005 -- 1015Linwei Fan, Huiyu Li, Mengjun Li, Yan Zhang, Jinjiang Li, Caiming Zhang. Photographer trajectory detection from images
1017 -- 1027Chunling Wu. Recurrent learning of context for salient region detection
1029 -- 1037Fan Aiwan, Yang Zhaofeng. Image spam filtering using convolutional neural networks
1039 -- 1047Ting Gao, Yaguang Hao, Haipeng Zhang, Lina Hu, Hongzhi Li, Hui Li, Li Hong Hu, Bing Han. Predicting pathological response to neoadjuvant chemotherapy in breast cancer patients based on imbalanced clinical data
1049 -- 1060Hang Qin, Min Wang, Zhongbo Wu. Efficiency-based multi-item bargaining design in cognitive radio networks with spectrum coordination
1061 -- 1073Dong Wang 0020, Yujing Chen, Dan Chen. Efficiency optimization and simulation to manufacturing and service systems based on manufacturing technology Just-In-Time
1075 -- 1081Haibo Yi, Zhe Nie. On the security of MQ cryptographic systems for constructing secure Internet of medical things
1083 -- 1091B. Kanisha, S. Lokesh, Priyan Malarvizhi Kumar, P. Parthasarathy, Gokulnath Chandra Babu. Speech recognition with improved support vector machine using dual classifiers and cross fitness validation
1093 -- 1098T. V. Padmavathy, M. N. Vimalkumar, N. Sivakumar. Region-specific multi-attribute white mass estimation-based mammogram classification
1099 -- 1107Yumei Wu, Yuanyuan Fang, Bin Liu, Zehui Zhao. A novel service deployment approach based on resilience metrics for service-oriented system
1109 -- 1116Dingju Zhu. Deep learning over IoT big data-based ubiquitous parking guidance robot for parking near destination especially hospital
1117 -- 1132Mohamed Abdel Basset, Gunasekaran Manogaran, Laila Abdel-Fatah, Seyedali Mirjalili. An improved nature inspired meta-heuristic algorithm for 1-D bin packing problems
1133 -- 1139Ying Sheng, Tie Zhang. The finite volume method for two-dimensional Burgers' equation
1141 -- 1151S. Priya, R. Varatharajan, Gunasekaran Manogaran, Revathi Sundarasekar, Priyan Malarvizhi Kumar. Paillier homomorphic cryptosystem with poker shuffling transformation based water marking method for the secured transmission of digital medical images
1153 -- 1163Zaoli Yang, Jinping Chang. Solving dynamic normal distribution stochastic decision-making problems based on time degree and vertical projection distance
1165 -- 1179S. Periyanayagi, V. Sumathy. Swarm-based defense technique for tampering and cheating attack in WSN using CPHS

Volume 22, Issue 4

621 -- 632Ofer Bergman, Nimrod Yanai. Personal information retrieval: smartphones vs. computers, emails vs. files
633 -- 646Katrin Plaumann, Matthias Weing, Christian Winkler, Michael Müller, Enrico Rukzio. Towards accurate cursorless pointing: the effects of ocular dominance and handedness
647 -- 670Luis Valente, Bruno Feijó, Julio Cesar Sampaio do Prado Leite, Esteban Clua. A method to assess pervasive qualities in mobile games
671 -- 688Elena Vildjiounaite, Johanna Kallio, Vesa Kyllönen, Mikko Nieminen, Ilmari Määttänen, Mikko Lindholm, Jani Mäntyjärvi, Georgy L. Gimel'farb. Unobtrusive stress detection on the basis of smartphone usage data
689 -- 0Elena Vildjiounaite, Johanna Kallio, Vesa Kyllönen, Mikko Nieminen, Ilmari Määttänen, Mikko Lindholm, Jani Mäntyjärvi, Georgy L. Gimel'farb. Correction to: Unobtrusive stress detection on the basis of smartphone usage data
691 -- 705Lisa A. Thomas, Elaine Farrow, Matthew P. Aylett, Pam Briggs. A life story in three parts: the use of triptychs to make sense of personal digital data
707 -- 720Tim Walton, Michael Evans, David Kirk, Frank Melchior. Exploring object-based content adaptation for mobile audio
721 -- 0Tim Walton, Michael Evans, David Kirk, Frank Melchior. Correction to: Exploring object-based content adaptation for mobile audio
723 -- 737Aaron Springer, Victoria Hollis, Steve Whittaker. Mood modeling: accuracy depends on active logging and reflection
739 -- 750Kher Hui Ng, Hai Huang, Claire O'Malley. Treasure codes: augmenting learning from physical museum exhibits through treasure hunting
751 -- 770Alessio Bellino. SEQUENCE: a remote control technique to select objects by matching their rhythm
771 -- 785Marco Furini, Manuela Montangero. Sentiment analysis and Twitter: a game proposal
787 -- 805Bin Yu 0004, Jun Hu 0001, Mathias Funk, Loe M. G. Feijs. DeLight: biofeedback through ambient light for stress intervention and relaxation assistance
807 -- 824Tuomas Vaittinen, David K. McGookin. Uncover: supporting city exploration with egocentric visualizations of location-based content
825 -- 838Zhao Xiao, Yuelei Li, Kang Zhang. Visual analysis of risks in peer-to-peer lending market
839 -- 866Alissa Nicole Antle, Leslie Chesick, Srilekha Kirshnamachari Sridharan, Emily S. Cramer. East meets west: a mobile brain-computer system that helps children living in poverty learn to self-regulate
867 -- 877Elizabeth Rey, Aadhar Jain, Saeed Abdullah, Tanzeem Choudhury, David Erickson. Personalized stress monitoring: a smartphone-enabled system for quantification of salivary cortisol

Volume 22, Issue 3

449 -- 452Yunchuan Sun, Junsheng Zhang, Rongfang Bie, Jiguo Yu. Advancing researches on IoT systems and intelligent applications
453 -- 469Jinbao Wang, Zhipeng Cai, Yingshu Li, Donghua Yang, Ji Li, Hong Gao. Protecting query privacy with differentially private k-anonymity in location-based services
471 -- 487Junling Lu, Zhipeng Cai, Xiaoming Wang 0001, Lichen Zhang 0001, Peng Li 0016, Zaobo He. User social activity-based routing for cognitive radio networks
489 -- 501Shiwei Cheng, Jing Fan, Anind K. Dey. Smooth Gaze: a framework for recovering tasks across devices using eye tracking
503 -- 510Yi Du, Lei Ren 0001, Yuanchun Zhou, Jianhui Li, Feng Tian 0001, Guozhong Dai. Banded choropleth map
511 -- 524Yingwei Zhang, Yiqiang Chen, Hanchao Yu, Xiaodong Yang 0005, Wang Lu, Hong Liu. Wearing-independent hand gesture recognition method based on EMG armband
525 -- 533Lu Wang, Laikuan Wong, Yajie Xu, Xiao Zhou, Siyuan Qiu, Xiangxu Meng, Chenglei Yang. The design and empirical evaluations of 3D positioning techniques for pressure-based touch control on mobile devices
535 -- 544Anton Kos, Anton Umek. Smart sport equipment: SmartSki prototype for biofeedback applications in skiing
545 -- 559Shaoqing Wang, Jiguo Yu, Mohammed Atiquzzaman, Honglong Chen, Lina Ni. CRPD: a novel clustering routing protocol for dynamic wireless sensor networks
561 -- 573Gangyong Jia, Guangjie Han, Jinfang Jiang, Sammy Chan, Yuxin Liu. Dynamic cloud resource management for efficient media applications in mobile computing environments
575 -- 587Yunchuan Sun, Mengting Fang, Xinyu Wang. A novel stock recommendation system using Guba sentiment analysis
589 -- 596Jianen Yan, Hongli Zhang, Haiyan Xu, Zhaoxin Zhang. Discrete PSO-based workload optimization in virtual machine placement
597 -- 613Haodi Ping, ZhangBing Zhou, Zhensheng Shi, Taj Rahman Siddiqi. Accurate and energy-efficient boundary detection of continuous objects in duty-cycled wireless sensor networks
615 -- 619Rashid Mehmood, Saeed El-Ashram, Rongfang Bie, Yunchuan Sun. Effective cancer subtyping by employing density peaks clustering by using gene expression microarray

Volume 22, Issue 2

225 -- 0Guglielmo Cola, Alessio Vecchio. Wearable systems for e-health and wellbeing
227 -- 243Antonio L. Alfeo, Paolo Barsocchi, Mario G. C. A. Cimino, Davide La Rosa, Filippo Palumbo, Gigliola Vaglini. Sleep behavior assessment via smartwatch and stigmergic receptive fields
245 -- 257Saumil Dharia, Magdalini Eirinaki, Vijesh Jain, Jvalant Patel, Iraklis Varlamis, Jainikkumar Vora, Rizen Yamauchi. Social recommendations for personalized fitness assistance
259 -- 274Yinlong Zhang, Wei Liang, Yang Li, Haibo An, Jindong Tan. Robust orientation estimate via inertial guided visual sample consensus
275 -- 287Wen-Fong Wang, Ching-Yu Yang, Yan-Fu Wu. SVM-based classification method to identify alcohol consumption using ECG and PPG monitoring
289 -- 292Alan Chamberlain, Andy Crabtree, Hamed Haddadi, Richard Mortier. Special theme on privacy and the Internet of things
293 -- 315Peter Tolmie, Andy Crabtree. The practical politics of sharing personal data
317 -- 332Lachlan Urquhart, Neelima Sailaja, Derek McAuley. Realising the right to data portability for the domestic Internet of things
333 -- 344Thomas F. J.-M. Pasquier, Jatinder Singh, Julia E. Powles, David M. Eyers, Margo Seltzer, Jean Bacon. Data provenance to audit compliance with privacy policy in the Internet of Things
345 -- 364Ilaria Torre, Odnan Ref Sanchez, Frosina Koceva, Giovanni Adorni. Supporting users to take informed decisions on privacy settings of personal devices
365 -- 377Joseph Korpela, Takuya Maekawa. Privacy preserving recognition of object-based activities using near-infrared reflective markers
379 -- 390Caroline L. van Straten, Iris Smeekens, Emilia I. Barakova, Jeffrey Glennon, Jan K. Buitelaar, Aoju Chen. Effects of robots' intonation and bodily appearance on robot-mediated communicative treatment outcomes for children with autism spectrum disorder
391 -- 407Thilina Halloluwa, Dhaval Vyas, Hakim Usoof, K. Priyantha Hewagamage. Gamification for development: a case of collaborative learning in Sri Lankan primary schools
409 -- 431Haeyong Chung, Chris North. SAViL: cross-display visual links for sensemaking in display ecologies
433 -- 448Mohammad Hossein Jarrahi, Nicci C. L. Gafinowitz, Grace Shin. Activity trackers, prior motivation, and perceived informational and motivational affordances

Volume 22, Issue 1

1 -- 2Cheonshik Kim, Bryan Kim, Joel J. P. C. Rodrigues, James C. N. Yang. Special issue: Advanced technology for smart home automation and entertainment
3 -- 10Namje Park, Donghyeok Lee. Electronic identity information hiding methods using a secret sharing scheme in multimedia-centric internet of things environment
11 -- 22Cheonshik Kim, Dongkyoo Shin, Ching-Nung Yang. Self-embedding fragile watermarking scheme to restoration of a tampered image using AMBTC
23 -- 34Seongkee Lee, Sanghoon Lee, Taein Kang, Miyoung Kwon, Nohbok Lee, Hoonkyu Kim. Resiliency of mobile OS security for secure personal ubiquitous computing
35 -- 44Yong Joon Lee, Namkyun Baik, Cheonshik Kim, Ching-Nung Yang. Study of detection method for spoofed IP against DDoS attacks
45 -- 53Cheng-Yu Yang, Cheng-Ta Huang, Ya-Ping Wang, Yen-Wen Chen, Shiuh-Jeng Wang. File changes with security proof stored in cloud service systems
55 -- 67Da-Zhi Sun, Yi Mu, Willy Susilo. Man-in-the-middle attacks on Secure Simple Pairing in Bluetooth standard V5.0 and its countermeasure
69 -- 0Da-Zhi Sun, Yi Mu, Willy Susilo. Correction to: Man-in-the-middle attacks on Secure Simple Pairing in Bluetooth standard V5.0 and its countermeasure
71 -- 80Jing Sang, Hongxia Wang, Qing Qian, Hanzhou Wu, Yi Chen. An efficient fingerprint identification algorithm based on minutiae and invariant moment
81 -- 91Peng-Cheng Huang, Alan Chin-Chen Chang, Yung-hui Li, Yanjun Liu. Efficient access control system based on aesthetic QR code
93 -- 104Lu Leng, Fumeng Gao, Qi Chen, Cheonshik Kim. Palmprint recognition system on mobile devices with double-line-single-point assistance
105 -- 110Byung Wook Kim. Suboptimal LED selection for distributed MIMO visible light communications
111 -- 120Xiaodong Liu, Qi Liu. A virtual uneven grid-based routing protocol for mobile sink-based WSNs in a smart home system
121 -- 134Jie Zhang, Zhili Zhou, Shu Li, Leilei Gan, Xuyun Zhang, Lianyong Qi, Xiaolong Xu, Wanchun Dou. Hybrid computation offloading for smart home automation in mobile cloud computing
135 -- 141Tae-Jung Kim, Chang-Ki Kim, Byung-Gyu Kim. An efficient hybrid delivery technology for a broadcast TV service
143 -- 152Doowon Kim, Jinsuk Baek, Paul S. Fisher, Sangchul Kim. fFTP: a fast file transfer protocol for home N-screen platform
153 -- 162Min Lei, Yu Yang, Nan Ma, Huizhong Sun, Chunru Zhou, Minyao Ma. Dynamically enabled defense effectiveness evaluation of a home Internet based on vulnerability analysis and attack layer measurement
163 -- 172Avishek Saha, Young-Woon Lee, Young-Sup Hwang, Kostas E. Psannis, Byung-Gyu Kim. Context-aware block-based motion estimation algorithm for multimedia internet of things (IoT) platform
173 -- 184Nam-Uk Kim, Yung Lyul Lee. Blocking-artifact detection in frequency domain for frame-rate up-conversion
185 -- 199Pradeep Kumar 0002, Rajkumar Saini, Partha Pratim Roy, Pawan Kumar Sahu, Debi Prosad Dogra. Envisioned speech recognition using EEG sensors
201 -- 218Yunjin Nam, Dongkyoo Shin, Dongil Shin. Personal search system based on android using lifelog and machine learning
219 -- 224Paul S. Fisher, Jimmy James II, Jinsuk Baek, Cheonshik Kim. Mining intelligent solution to compensate missing data context of medical IoT devices