BEIJING,March 12(Xinhua)——China′s development of both 4⁃meter⁃diameter and 5⁃meter⁃diameter reusable rockets is being accelerated,with their inaugural flights scheduled for 2025 and 2026,respectively.The manufactur...BEIJING,March 12(Xinhua)——China′s development of both 4⁃meter⁃diameter and 5⁃meter⁃diameter reusable rockets is being accelerated,with their inaugural flights scheduled for 2025 and 2026,respectively.The manufacturing of these two new large reusable launching vehicle models is a response to growing demand in the commercial space market,said the China Aerospace Science and Technology Corporation.展开更多
The apparent contradiction between usability and security has been discussed in the literature for several years.This continuous trade-off requires be acknowledging and handling whenever security solutions are introdu...The apparent contradiction between usability and security has been discussed in the literature for several years.This continuous trade-off requires be acknowledging and handling whenever security solutions are introduced.However,some progressive analysts point out that present security solutions are usually very difficult for several users,and they have expressed a willingness to simplify the security product user experience.Usable security is still mostly unexplored territory in computer science.Which we are all aware with security and usability on many levels,usable security has received little operational attention.Companies have recently focused primarily on usable security.As consumers prefer to discard unsatisfactory solutions,attaining well-balanced degrees of both is a prerequisite for adequate security.Usability should be examined from the viewpoint of security to be properly assessed.The aim of this research study is to explore and discuss universally accepted and solutionindependent factors influencing the perceived usable-security of institutional websites.An integrated Hesitant Fuzzy Linguistic term sets based technique was chosen as the methodology,and the experts and academicians opinion were collected.The use of predetermined selection criteria resulted in the compilation of statistical findings and were used to determine the usable-security of five different instituational websites.展开更多
With the promotion of digital currency,how to effectively solve the authenticity,privacy and usability of digital currency issuance has been a key problem.Redactable signature scheme(RSS)can provide the verification o...With the promotion of digital currency,how to effectively solve the authenticity,privacy and usability of digital currency issuance has been a key problem.Redactable signature scheme(RSS)can provide the verification of the integrity and source of the generated sub-documents and solve the privacy problem in digital currency by removing blocks from the signed documents.Unfortunately,it has not realized the consolidation of signed documents,which can not solve the problem of merging two digital currencies.Now,we introduce the concept of weight based on the threshold secret sharing scheme(TSSS)and present a redactable signature scheme with merge algorithm(RSS-MA)using the quasi-commutative accumulator.Our scheme can reduce the communication overhead by utilizing the merge algorithm when transmitting multiple digital currency signatures.Furthermore,this can effectively hide the scale of users’private monetary assets and the number of transactions between users.While meeting the three properties of digital currency issuance,in order to ensure the availability of digital currency after redacting,editors shall not remove the relevant identification information block form digital currency.Finally,our security proof and the analysis of efficiency show that RSS-MA greatly improves the communication and computation efficiency when transmitting multiple signatures.展开更多
BACKGROUND Traditional paper-based preoperative patient education is a struggle for new nurses and requires extensive training.In this situation,virtual reality technology can help the new nurses.Despite its potential...BACKGROUND Traditional paper-based preoperative patient education is a struggle for new nurses and requires extensive training.In this situation,virtual reality technology can help the new nurses.Despite its potential benefits,there are studies on patient satisfaction but there is limited information on the usability of virtual reality(VR)technology for new nurses in giving preoperative education to patients.AIM To investigate the impact on satisfaction,usability,and burnout of a system using VR technology in preoperative patient education.METHODS The study involved 20 nurses from the plastic surgery ward and 80 patients admitted between April and May 2019.Each nurse taught four patients:Two using traditional verbal education and two using virtual reality.The System Usability Scale,After-Scenario Questionnaire,and Maslach Burnout Inventory(MBI)were employed to evaluate the impact of these education methods.RESULTS The VR education groups showed a statistically higher satisfaction than the traditional verbal education groups.Among the three subscales of the MBI,emotional exhaustion and personal accomplishment improved statistically significantly.VR was also better in terms of usability.CONCLUSION This study suggests VR enhances usability and reduces burnout in nurses,but further research is needed to assess its impact on depersonalization and objective measures like stress and heart rate.展开更多
In times of digitalisation, visual assistance systems in assembly are increasingly important. The design of these assembly systems needs to be highly complex to meet the requirements. Due to the increasing number of v...In times of digitalisation, visual assistance systems in assembly are increasingly important. The design of these assembly systems needs to be highly complex to meet the requirements. Due to the increasing number of variants in production processes, as well as shorter innovation and product life cycles, assistance systems should improve quality and reduce complexity of assembly processes. However, many large kitchen manufacturers still assemble kitchen cabinets manually, due to the high variety of components, such as rails and fittings. This paper focuses on the analysis and evaluation of virtual assistance systems to improve quality and usability in individualised kitchen cabinet assembly processes at a large German manufacturer. A solution is identified and detailed.展开更多
Starting April 27,the Wuhan Tong public transit card can be used in urban Huangshi,Daye,and Yangxin to take buses.The Wuhan Tong card service also covers the following cities within the Wuhan City Cluster:Ezhou,Xiaoga...Starting April 27,the Wuhan Tong public transit card can be used in urban Huangshi,Daye,and Yangxin to take buses.The Wuhan Tong card service also covers the following cities within the Wuhan City Cluster:Ezhou,Xiaogan,Tianmen,Xiantao,Anlu,Yingcheng,and Hanchuan.展开更多
Conventionally,the reliability of a web portal is validated with generalized conventional methods,but they fail to provide the desired results.Therefore,we need to include other quality factors that affect reliability...Conventionally,the reliability of a web portal is validated with generalized conventional methods,but they fail to provide the desired results.Therefore,we need to include other quality factors that affect reliability such as usability for improving the reliability in addition to the conventional reliability testing.Actually,the primary objectives of web portals are to provide interactive integration of multiple functions confirming diverse requirements in an efficient way.In this paper,we employ testing profiles tomeasure the reliability through software operational profile,input space profile and usability profile along with qualitative measures of reliability and usability.Moreover,the case study used for verification is based on aweb application that facilitates information and knowledge sharing among its online members.The proposed scheme is compared with the conventional reliability improvement method in terms of failure detection and reliability.The final results unveil that the computation of reliability by using the traditional method(utilizing failure points with the assistance of Mean Time Between Failures(MTBF)and Mean Time To Failure(MTTF)becomes ineffective under certain situations.Under such situations,the proposed scheme helps to compute the reliability in an effective way.Moreover,the outcomes of the study provide insight recommendations about the testing and measurement of reliability for Web based software or applications.展开更多
The frequent occurrence of seismic events in Italy poses a strategic problem that involves either the culture of preservation of historical heritage or the civil protection action aimed to reduce the risk to people an...The frequent occurrence of seismic events in Italy poses a strategic problem that involves either the culture of preservation of historical heritage or the civil protection action aimed to reduce the risk to people and goods(buildings,bridges,dams,slopes,etc.).Most of the Italian architectural heritage is vulnerable to earthquakes,identifying the vulnerability as the inherent predisposition of the masonry building to suffer damage and collapse during an earthquake.In fact,the structural concept prevailing in these ancient masonry buildings is aimed at ensuring prevalent resistance to vertical gravity loads.Rarely do these ancient masonry structures offer relevant resistance to actions other than vertical ones and then they are intrinsically vulnerable to stresses induced by the earthquakes.One of the main technical activities carried out by the Civil Protection after an earthquake is to assess the damage in the buildings and to evaluate their own usability.Regarding historical buildings,ad-hoc synthetic forms,drafted in agreement between the Italian Civil Protection Department and the Ministry of Cultural Heritage and Activities and Tourism and based on visual inspection,are adopted by qualified technicians.In this paper,such activities are described and discussed along with the Italian Civil Protection System.However,given the complexity of the main technical activities to be performed after an earthquake there is a need for more accurate methods based on Structural Health Monitoring.展开更多
Human-Computer Interaction(HCI)is a sub-area within computer science focused on the study of the communication between people(users)and computers and the evaluation,implementation,and design of user interfaces for com...Human-Computer Interaction(HCI)is a sub-area within computer science focused on the study of the communication between people(users)and computers and the evaluation,implementation,and design of user interfaces for computer systems.HCI has accomplished effective incorporation of the human factors and software engineering of computing systems through the methods and concepts of cognitive science.Usability is an aspect of HCI dedicated to guar-anteeing that human–computer communication is,amongst other things,efficient,effective,and sustaining for the user.Simultaneously,Human activity recognition(HAR)aim is to identify actions from a sequence of observations on the activities of subjects and the environmental conditions.The vision-based HAR study is the basis of several applications involving health care,HCI,and video surveillance.This article develops a Fire Hawk Optimizer with Deep Learning Enabled Activ-ity Recognition(FHODL-AR)on HCI driven usability.In the presented FHODL-AR technique,the input images are investigated for the identification of different human activities.For feature extraction,a modified SqueezeNet model is intro-duced by the inclusion of few bypass connections to the SqueezeNet among Fire modules.Besides,the FHO algorithm is utilized as a hyperparameter optimization algorithm,which in turn boosts the classification performance.To detect and cate-gorize different kinds of activities,probabilistic neural network(PNN)classifier is applied.The experimental validation of the FHODL-AR technique is tested using benchmark datasets,and the outcomes reported the improvements of the FHODL-AR technique over other recent approaches.展开更多
Recently,a specific interest is being taken in the development of mobile application(app)via Model-Based User Interface Development(MBUID)approach.MBUID allows the generation of mobile apps in the target platform(s)fr...Recently,a specific interest is being taken in the development of mobile application(app)via Model-Based User Interface Development(MBUID)approach.MBUID allows the generation of mobile apps in the target platform(s)from conceptual models.As such it simplified the development process of mobile app.However,the interest is only focused on the functional aspects of the mobile app while neglecting the non-functional aspects,such as usability.The latter is largely considered as the main factor leading to the success or failure of any software system.This paper aims at addressing non-functional aspects of mobile apps generated using MBUID approach.As such,we propose a usability-driven approach for the development of mobile apps.The main stages of the proposed approach are defined in a generic way so that they can be integrated with any MBUID method.A case study is presented,in the paper,with the aim of illustrating the feasibility of this approach.展开更多
Street Networks, knitted in the urban fabric, facilitate spatial movement and control the flow of urbanization. The interrelation between a city’s spatial network and how the residents travel over it has always been ...Street Networks, knitted in the urban fabric, facilitate spatial movement and control the flow of urbanization. The interrelation between a city’s spatial network and how the residents travel over it has always been of high interest to scholars. Over the years, multifaceted visualization methods have emerged to better express this travel trend from small to large scale. This study proposes a novel approach to 1) visualize city-wide travel patterns with respect to the street network orientation and 2) analyze the discrepancies between travel patterns and streets to evaluate network usability. The visualizations adopt histograms and rose diagrams to provide several insights into network-wide traffic flows. The visualization of four New York City (NYC) boroughs including Queens, Brooklyn, Bronx, and Staten Island was generated for the daily traffic and the average hourly flows in the morning and evening rush hours. Then the contrasts between built-in street network topology and travel orientation were drawn to show where people travel over the network, travel demand, and finally which segments experience high or light traffic, revealing the true picture of network usability. The findings of the study provide an insight into the novel and innovative approach that can help better understand the travel behavior lucidly and assist policymakers in decision making to maintain a balance between urban topology and travel demands. In addition, the study demonstrates how to further investigate city street networks and urbanization from different diverse dimensions.展开更多
Previous mobile usability studies are only pertinent in the context of ergonomics,physical user interface,and mobility aspects.In addition,much of the previous mobile usability conception was built on desktop co...Previous mobile usability studies are only pertinent in the context of ergonomics,physical user interface,and mobility aspects.In addition,much of the previous mobile usability conception was built on desktop computing measurements,such as desktop and web application checklists,or scarcely addressed the mobile user interface.Moreover,the studies focus mainly on interface features for desktop applications and do not reflect comprehensive mobile interface features such as navigation drawers and spinners.Therefore,conducting usability evaluation using conventional usability measurement would result in irrelevant results.In addition,the resulting works are tailored for usability testing,which requires highly skilled evaluators and usability specialists(e.g.,usability testers and user experience designers),who are rarely integrated into a development team.The lack of expertise could lead to unreliable usability evaluations.This paper presents a review from industrial experts on a comprehensive and feasible usability evaluation framework developed in our previous work.The framework is dedicated to smartphone apps,which integrate evaluator skills and design concerns.However,there is no evidence of its usefulness in practice.Therefore,the usefulness of the framework measurement for evaluating apps’usability in the eyes of non-usability specialists is empirically assessed in this paper through an expert review.The expert review involved eleven industrial developers and was complemented by a semi-structured interview.The method is replicated in comparison with a framework from another study.The findings show that the formulated framework significantly outperformed the framework(p=0.0286)from other studies with large effect sizes(r=1.81)in terms of usefulness.展开更多
River corridors, even if highly modified or degraded, still provide important habitats for numerous biological species, and carry high aesthetic and economic values. One of the keys to urban stream restoration is reco...River corridors, even if highly modified or degraded, still provide important habitats for numerous biological species, and carry high aesthetic and economic values. One of the keys to urban stream restoration is recovery and maintenance of ecological flows sufficient to sustain aquatic ecosystems. In this study, the Hongje Stream in the Seoul metropolitan area of Korea was selected for evaluating a physically-based habitat with and without habitat structures. The potential value of the aquatic habitat was evaluated by a weighted usable area (WUA) using River2D, a two-dimensional hydraulic model. The habitat suitability for Zacco platypus in the Hongje Stream was simulated with and without habitat structures. The computed WUA values for the boulder, spur dike, and riffle increased by about 2%, 7%, and 131%, respectively, after their construction. Also, the three habitat structures, especially the riffle, can contribute to increasing hydraulic heterogeneity and enhancing habitat diversity.展开更多
In this paper we investigate the effectiveness of ensemble-based learners for web robot session identification from web server logs. We also perform multi fold robot session labeling to improve the performance of lear...In this paper we investigate the effectiveness of ensemble-based learners for web robot session identification from web server logs. We also perform multi fold robot session labeling to improve the performance of learner. We conduct a comparative study for various ensemble methods (Bagging, Boosting, and Voting) with simple classifiers in perspective of classification. We also evaluate the effectiveness of these classifiers (both ensemble and simple) on five different data sets of varying session length. Presently the results of web server log analyzers are not very much reliable because the input log files are highly inflated by sessions of automated web traverse software’s, known as web robots. Presence of web robots access traffic entries in web server log repositories imposes a great challenge to extract any actionable and usable knowledge about browsing behavior of actual visitors. So web robots sessions need accurate and fast detection from web server log repositories to extract knowledge about genuine visitors and to produce correct results of log analyzers.展开更多
This paper presents the systematic Summation of the investigation and the re-examination results,and the overall analysis of the quntity, quality, distribution, principle and way of development of water resource in Sa...This paper presents the systematic Summation of the investigation and the re-examination results,and the overall analysis of the quntity, quality, distribution, principle and way of development of water resource in Sanjiang plain.展开更多
With the background of offshore wind energy projects, this paper studies aerodynamic performance and geometric characteristics of large capacity wind turbine rotors (1 to 10 MW), and the main characteristic paramete...With the background of offshore wind energy projects, this paper studies aerodynamic performance and geometric characteristics of large capacity wind turbine rotors (1 to 10 MW), and the main characteristic parameters such as the rated wind speed, blade tip speed, and rotor solidity. We show that the essential criterion of a high- performance wind turbine is a highest possible annual usable energy pattern factor and a smallest possible dimension, capturing the maximum wind energy and producing the maximum annual power. The influence of the above-mentioned three parameters on the pattern factor and rotor geometry of wind turbine operated in China's offshore meteoro- logical environment is investigated. The variation patterns of aerodynamic and geometric parameters are obtained, analyzed, and compared with each other. The present method for aerodynamic analysis and its results can form a basis for evaluating aerodynamic performance of large-scale offshore wind turbine rotors.展开更多
With continuous evolution in software industry, security is becoming very important in software projects. However, in many development methodologies, security is thought to be added in the project at later stages of t...With continuous evolution in software industry, security is becoming very important in software projects. However, in many development methodologies, security is thought to be added in the project at later stages of the development lifecycle. There are also many proposed methodologies where the security measures are considered at requirement engineering stage of the development lifecycle, but many of them still do not seem adequate for applicability due to the reason that these approaches do not provide sufficient support for mapping the security requirements to the later stages of development. So, we are in need of a software requirement engineering approach, which is not only helpful in security requirement specification at requirement engineering stage but also provides support for using the specified security requirements at later stages of development. To meet this requirement, we introduce a new method Secure and Traceable Requirement Engineering Process (STREP). This method also helps the non-security-expert requirement engineers to specify requirements in such a way that the specified requirements can be used to derive security related test cases. STREP method not only deals with security issues of the system at requirement engineering stage, but also makes the security requirements more traceable to be used at later stages of development lifecycle, and as a result, secure systems are produced that are also usable as the customer wishes.展开更多
The recent explosion of biological data and the concomitant proliferation of distributed databases make it challenging for biologists and bioinformaticians to discover the best data resources for their needs, and the ...The recent explosion of biological data and the concomitant proliferation of distributed databases make it challenging for biologists and bioinformaticians to discover the best data resources for their needs, and the most efficient way to access and use them For the biologist, running bioinformatics analyses involve a time-consuming management of data and tools. Users need support to organize their work, retrieve parameters and reproduce their analyses. They also need to be able to combine their analytic tools using a safe data flow software mechanism. Finally we have designed a system, Bioinfo-Portal, to provide a flexible and usable web environment for defining and running bioinformatics analyses. It embeds simple yet powerful data management features that allow the user to reproduce analyses and to combine tools using an adobe flex tool. Bioinfo-Portal can also act as a front end to provide a unified view of already-existing collections of bioinformatics resources. Users can analyze genomic and proteomic data by using the tools that has been integrated in the portal (tools for alignments, dotplots, motif detection, domain analysis, profile searching and tertiary structure prediction). The sequences that user obtained from portal's nucleotide and protein databases are easily analyzed by the portal tools on the same interface in no time. User can also take benefit from the animations.展开更多
文摘BEIJING,March 12(Xinhua)——China′s development of both 4⁃meter⁃diameter and 5⁃meter⁃diameter reusable rockets is being accelerated,with their inaugural flights scheduled for 2025 and 2026,respectively.The manufacturing of these two new large reusable launching vehicle models is a response to growing demand in the commercial space market,said the China Aerospace Science and Technology Corporation.
基金Funding for this study was received from the Deanship of Scientific Research(DSR)at King Abdulaziz University,Jeddah,Kingdom of Saudi Arabia under the Grant No.G:095-611-14422.
文摘The apparent contradiction between usability and security has been discussed in the literature for several years.This continuous trade-off requires be acknowledging and handling whenever security solutions are introduced.However,some progressive analysts point out that present security solutions are usually very difficult for several users,and they have expressed a willingness to simplify the security product user experience.Usable security is still mostly unexplored territory in computer science.Which we are all aware with security and usability on many levels,usable security has received little operational attention.Companies have recently focused primarily on usable security.As consumers prefer to discard unsatisfactory solutions,attaining well-balanced degrees of both is a prerequisite for adequate security.Usability should be examined from the viewpoint of security to be properly assessed.The aim of this research study is to explore and discuss universally accepted and solutionindependent factors influencing the perceived usable-security of institutional websites.An integrated Hesitant Fuzzy Linguistic term sets based technique was chosen as the methodology,and the experts and academicians opinion were collected.The use of predetermined selection criteria resulted in the compilation of statistical findings and were used to determine the usable-security of five different instituational websites.
基金supported by Support Plan of Scientific and Technological Innovation Team in Universities of Henan Province(20IRTSTHN013)Shaanxi Key Laboratory of Information Communication Network and Security,Xi’an University of Posts&Telecommunications,Xi’an,Shaanxi 710121,China(ICNS202006)The National Natural Science Fund(No.61802117).
文摘With the promotion of digital currency,how to effectively solve the authenticity,privacy and usability of digital currency issuance has been a key problem.Redactable signature scheme(RSS)can provide the verification of the integrity and source of the generated sub-documents and solve the privacy problem in digital currency by removing blocks from the signed documents.Unfortunately,it has not realized the consolidation of signed documents,which can not solve the problem of merging two digital currencies.Now,we introduce the concept of weight based on the threshold secret sharing scheme(TSSS)and present a redactable signature scheme with merge algorithm(RSS-MA)using the quasi-commutative accumulator.Our scheme can reduce the communication overhead by utilizing the merge algorithm when transmitting multiple digital currency signatures.Furthermore,this can effectively hide the scale of users’private monetary assets and the number of transactions between users.While meeting the three properties of digital currency issuance,in order to ensure the availability of digital currency after redacting,editors shall not remove the relevant identification information block form digital currency.Finally,our security proof and the analysis of efficiency show that RSS-MA greatly improves the communication and computation efficiency when transmitting multiple signatures.
基金Research Fund of Chungnam National University,Chungnam National University,the Ministry of Trade,Industry,and Energy,Korea,under the“Regional industry-based organization support program”,No.P0001940the Korea Institute for Advancement of Technology,and a grant of the Korea Health Technology R&D Project through the Korea Health Industry Development Institute,funded by the Ministry of Health&Welfare,Republic of Korea,No.HI20C2088.
文摘BACKGROUND Traditional paper-based preoperative patient education is a struggle for new nurses and requires extensive training.In this situation,virtual reality technology can help the new nurses.Despite its potential benefits,there are studies on patient satisfaction but there is limited information on the usability of virtual reality(VR)technology for new nurses in giving preoperative education to patients.AIM To investigate the impact on satisfaction,usability,and burnout of a system using VR technology in preoperative patient education.METHODS The study involved 20 nurses from the plastic surgery ward and 80 patients admitted between April and May 2019.Each nurse taught four patients:Two using traditional verbal education and two using virtual reality.The System Usability Scale,After-Scenario Questionnaire,and Maslach Burnout Inventory(MBI)were employed to evaluate the impact of these education methods.RESULTS The VR education groups showed a statistically higher satisfaction than the traditional verbal education groups.Among the three subscales of the MBI,emotional exhaustion and personal accomplishment improved statistically significantly.VR was also better in terms of usability.CONCLUSION This study suggests VR enhances usability and reduces burnout in nurses,but further research is needed to assess its impact on depersonalization and objective measures like stress and heart rate.
文摘In times of digitalisation, visual assistance systems in assembly are increasingly important. The design of these assembly systems needs to be highly complex to meet the requirements. Due to the increasing number of variants in production processes, as well as shorter innovation and product life cycles, assistance systems should improve quality and reduce complexity of assembly processes. However, many large kitchen manufacturers still assemble kitchen cabinets manually, due to the high variety of components, such as rails and fittings. This paper focuses on the analysis and evaluation of virtual assistance systems to improve quality and usability in individualised kitchen cabinet assembly processes at a large German manufacturer. A solution is identified and detailed.
文摘Starting April 27,the Wuhan Tong public transit card can be used in urban Huangshi,Daye,and Yangxin to take buses.The Wuhan Tong card service also covers the following cities within the Wuhan City Cluster:Ezhou,Xiaogan,Tianmen,Xiantao,Anlu,Yingcheng,and Hanchuan.
基金This study was supported by Suranaree University of Technology.
文摘Conventionally,the reliability of a web portal is validated with generalized conventional methods,but they fail to provide the desired results.Therefore,we need to include other quality factors that affect reliability such as usability for improving the reliability in addition to the conventional reliability testing.Actually,the primary objectives of web portals are to provide interactive integration of multiple functions confirming diverse requirements in an efficient way.In this paper,we employ testing profiles tomeasure the reliability through software operational profile,input space profile and usability profile along with qualitative measures of reliability and usability.Moreover,the case study used for verification is based on aweb application that facilitates information and knowledge sharing among its online members.The proposed scheme is compared with the conventional reliability improvement method in terms of failure detection and reliability.The final results unveil that the computation of reliability by using the traditional method(utilizing failure points with the assistance of Mean Time Between Failures(MTBF)and Mean Time To Failure(MTTF)becomes ineffective under certain situations.Under such situations,the proposed scheme helps to compute the reliability in an effective way.Moreover,the outcomes of the study provide insight recommendations about the testing and measurement of reliability for Web based software or applications.
文摘The frequent occurrence of seismic events in Italy poses a strategic problem that involves either the culture of preservation of historical heritage or the civil protection action aimed to reduce the risk to people and goods(buildings,bridges,dams,slopes,etc.).Most of the Italian architectural heritage is vulnerable to earthquakes,identifying the vulnerability as the inherent predisposition of the masonry building to suffer damage and collapse during an earthquake.In fact,the structural concept prevailing in these ancient masonry buildings is aimed at ensuring prevalent resistance to vertical gravity loads.Rarely do these ancient masonry structures offer relevant resistance to actions other than vertical ones and then they are intrinsically vulnerable to stresses induced by the earthquakes.One of the main technical activities carried out by the Civil Protection after an earthquake is to assess the damage in the buildings and to evaluate their own usability.Regarding historical buildings,ad-hoc synthetic forms,drafted in agreement between the Italian Civil Protection Department and the Ministry of Cultural Heritage and Activities and Tourism and based on visual inspection,are adopted by qualified technicians.In this paper,such activities are described and discussed along with the Italian Civil Protection System.However,given the complexity of the main technical activities to be performed after an earthquake there is a need for more accurate methods based on Structural Health Monitoring.
文摘Human-Computer Interaction(HCI)is a sub-area within computer science focused on the study of the communication between people(users)and computers and the evaluation,implementation,and design of user interfaces for computer systems.HCI has accomplished effective incorporation of the human factors and software engineering of computing systems through the methods and concepts of cognitive science.Usability is an aspect of HCI dedicated to guar-anteeing that human–computer communication is,amongst other things,efficient,effective,and sustaining for the user.Simultaneously,Human activity recognition(HAR)aim is to identify actions from a sequence of observations on the activities of subjects and the environmental conditions.The vision-based HAR study is the basis of several applications involving health care,HCI,and video surveillance.This article develops a Fire Hawk Optimizer with Deep Learning Enabled Activ-ity Recognition(FHODL-AR)on HCI driven usability.In the presented FHODL-AR technique,the input images are investigated for the identification of different human activities.For feature extraction,a modified SqueezeNet model is intro-duced by the inclusion of few bypass connections to the SqueezeNet among Fire modules.Besides,the FHO algorithm is utilized as a hyperparameter optimization algorithm,which in turn boosts the classification performance.To detect and cate-gorize different kinds of activities,probabilistic neural network(PNN)classifier is applied.The experimental validation of the FHODL-AR technique is tested using benchmark datasets,and the outcomes reported the improvements of the FHODL-AR technique over other recent approaches.
基金supported by the Deanship of Scientific Research at Prince Sattam bin Abdulaziz University under the research project\#2021/01/17815.
文摘Recently,a specific interest is being taken in the development of mobile application(app)via Model-Based User Interface Development(MBUID)approach.MBUID allows the generation of mobile apps in the target platform(s)from conceptual models.As such it simplified the development process of mobile app.However,the interest is only focused on the functional aspects of the mobile app while neglecting the non-functional aspects,such as usability.The latter is largely considered as the main factor leading to the success or failure of any software system.This paper aims at addressing non-functional aspects of mobile apps generated using MBUID approach.As such,we propose a usability-driven approach for the development of mobile apps.The main stages of the proposed approach are defined in a generic way so that they can be integrated with any MBUID method.A case study is presented,in the paper,with the aim of illustrating the feasibility of this approach.
文摘Street Networks, knitted in the urban fabric, facilitate spatial movement and control the flow of urbanization. The interrelation between a city’s spatial network and how the residents travel over it has always been of high interest to scholars. Over the years, multifaceted visualization methods have emerged to better express this travel trend from small to large scale. This study proposes a novel approach to 1) visualize city-wide travel patterns with respect to the street network orientation and 2) analyze the discrepancies between travel patterns and streets to evaluate network usability. The visualizations adopt histograms and rose diagrams to provide several insights into network-wide traffic flows. The visualization of four New York City (NYC) boroughs including Queens, Brooklyn, Bronx, and Staten Island was generated for the daily traffic and the average hourly flows in the morning and evening rush hours. Then the contrasts between built-in street network topology and travel orientation were drawn to show where people travel over the network, travel demand, and finally which segments experience high or light traffic, revealing the true picture of network usability. The findings of the study provide an insight into the novel and innovative approach that can help better understand the travel behavior lucidly and assist policymakers in decision making to maintain a balance between urban topology and travel demands. In addition, the study demonstrates how to further investigate city street networks and urbanization from different diverse dimensions.
基金partially funded by the Research University Grant Scheme(RUGS),Universiti Putra Malaysia(UPM).
文摘Previous mobile usability studies are only pertinent in the context of ergonomics,physical user interface,and mobility aspects.In addition,much of the previous mobile usability conception was built on desktop computing measurements,such as desktop and web application checklists,or scarcely addressed the mobile user interface.Moreover,the studies focus mainly on interface features for desktop applications and do not reflect comprehensive mobile interface features such as navigation drawers and spinners.Therefore,conducting usability evaluation using conventional usability measurement would result in irrelevant results.In addition,the resulting works are tailored for usability testing,which requires highly skilled evaluators and usability specialists(e.g.,usability testers and user experience designers),who are rarely integrated into a development team.The lack of expertise could lead to unreliable usability evaluations.This paper presents a review from industrial experts on a comprehensive and feasible usability evaluation framework developed in our previous work.The framework is dedicated to smartphone apps,which integrate evaluator skills and design concerns.However,there is no evidence of its usefulness in practice.Therefore,the usefulness of the framework measurement for evaluating apps’usability in the eyes of non-usability specialists is empirically assessed in this paper through an expert review.The expert review involved eleven industrial developers and was complemented by a semi-structured interview.The method is replicated in comparison with a framework from another study.The findings show that the formulated framework significantly outperformed the framework(p=0.0286)from other studies with large effect sizes(r=1.81)in terms of usefulness.
文摘River corridors, even if highly modified or degraded, still provide important habitats for numerous biological species, and carry high aesthetic and economic values. One of the keys to urban stream restoration is recovery and maintenance of ecological flows sufficient to sustain aquatic ecosystems. In this study, the Hongje Stream in the Seoul metropolitan area of Korea was selected for evaluating a physically-based habitat with and without habitat structures. The potential value of the aquatic habitat was evaluated by a weighted usable area (WUA) using River2D, a two-dimensional hydraulic model. The habitat suitability for Zacco platypus in the Hongje Stream was simulated with and without habitat structures. The computed WUA values for the boulder, spur dike, and riffle increased by about 2%, 7%, and 131%, respectively, after their construction. Also, the three habitat structures, especially the riffle, can contribute to increasing hydraulic heterogeneity and enhancing habitat diversity.
文摘In this paper we investigate the effectiveness of ensemble-based learners for web robot session identification from web server logs. We also perform multi fold robot session labeling to improve the performance of learner. We conduct a comparative study for various ensemble methods (Bagging, Boosting, and Voting) with simple classifiers in perspective of classification. We also evaluate the effectiveness of these classifiers (both ensemble and simple) on five different data sets of varying session length. Presently the results of web server log analyzers are not very much reliable because the input log files are highly inflated by sessions of automated web traverse software’s, known as web robots. Presence of web robots access traffic entries in web server log repositories imposes a great challenge to extract any actionable and usable knowledge about browsing behavior of actual visitors. So web robots sessions need accurate and fast detection from web server log repositories to extract knowledge about genuine visitors and to produce correct results of log analyzers.
文摘This paper presents the systematic Summation of the investigation and the re-examination results,and the overall analysis of the quntity, quality, distribution, principle and way of development of water resource in Sanjiang plain.
基金supported by the National Basic Research Program of China (973 Program) (No. 2007CB714605)
文摘With the background of offshore wind energy projects, this paper studies aerodynamic performance and geometric characteristics of large capacity wind turbine rotors (1 to 10 MW), and the main characteristic parameters such as the rated wind speed, blade tip speed, and rotor solidity. We show that the essential criterion of a high- performance wind turbine is a highest possible annual usable energy pattern factor and a smallest possible dimension, capturing the maximum wind energy and producing the maximum annual power. The influence of the above-mentioned three parameters on the pattern factor and rotor geometry of wind turbine operated in China's offshore meteoro- logical environment is investigated. The variation patterns of aerodynamic and geometric parameters are obtained, analyzed, and compared with each other. The present method for aerodynamic analysis and its results can form a basis for evaluating aerodynamic performance of large-scale offshore wind turbine rotors.
文摘With continuous evolution in software industry, security is becoming very important in software projects. However, in many development methodologies, security is thought to be added in the project at later stages of the development lifecycle. There are also many proposed methodologies where the security measures are considered at requirement engineering stage of the development lifecycle, but many of them still do not seem adequate for applicability due to the reason that these approaches do not provide sufficient support for mapping the security requirements to the later stages of development. So, we are in need of a software requirement engineering approach, which is not only helpful in security requirement specification at requirement engineering stage but also provides support for using the specified security requirements at later stages of development. To meet this requirement, we introduce a new method Secure and Traceable Requirement Engineering Process (STREP). This method also helps the non-security-expert requirement engineers to specify requirements in such a way that the specified requirements can be used to derive security related test cases. STREP method not only deals with security issues of the system at requirement engineering stage, but also makes the security requirements more traceable to be used at later stages of development lifecycle, and as a result, secure systems are produced that are also usable as the customer wishes.
文摘The recent explosion of biological data and the concomitant proliferation of distributed databases make it challenging for biologists and bioinformaticians to discover the best data resources for their needs, and the most efficient way to access and use them For the biologist, running bioinformatics analyses involve a time-consuming management of data and tools. Users need support to organize their work, retrieve parameters and reproduce their analyses. They also need to be able to combine their analytic tools using a safe data flow software mechanism. Finally we have designed a system, Bioinfo-Portal, to provide a flexible and usable web environment for defining and running bioinformatics analyses. It embeds simple yet powerful data management features that allow the user to reproduce analyses and to combine tools using an adobe flex tool. Bioinfo-Portal can also act as a front end to provide a unified view of already-existing collections of bioinformatics resources. Users can analyze genomic and proteomic data by using the tools that has been integrated in the portal (tools for alignments, dotplots, motif detection, domain analysis, profile searching and tertiary structure prediction). The sequences that user obtained from portal's nucleotide and protein databases are easily analyzed by the portal tools on the same interface in no time. User can also take benefit from the animations.