Showing 201 - 220 results of 286 for search '"human–computer interaction"', query time: 0.07s Refine Results
  1. 201

    The Interactive Design of Library Information Sharing in View of Network Communication Technology by Yeping Zhen

    Published 2022-01-01
    “…It is formulated based on a humanized and flexible human-computer interaction model. The interaction process between computers and humans requires careful thinking and design. …”
    Get full text
    Article
  2. 202

    A re-examination of information seeking behaviour in the context of activity theory by Wilson T.D.

    Published 2006-01-01
    “…</b> Activity theory, developed in the USSR as a Marxist alternative to Western psychology, has been applied widely in educational studies and increasingly in human-computer interaction research. Argument. The key elements of activity theory, Motivation, Goal, Activity, Tools, Object, Outcome, Rules, Community and Division of labour are all directly applicable to the conduct of information behaviour research. …”
    Get full text
    Article
  3. 203

    Human Motion Gesture Recognition Based on Computer Vision by Rui Ma, Zhendong Zhang, Enqing Chen

    Published 2021-01-01
    “…Human motion gesture recognition is the most challenging research direction in the field of computer vision, and it is widely used in human-computer interaction, intelligent monitoring, virtual reality, human behaviour analysis, and other fields. …”
    Get full text
    Article
  4. 204

    User authentication of industrial internet based on HHT transform of mouse behavior by Yigong ZHANG, Qian YI, Jian LI, Congbo LI, Aijun YIN, Shuping YI

    Published 2022-06-01
    “…The rapid development of the industrial internet had caused widespread concern about the network security, and the end-user authentication technology was considered a research hotspot.According to the characteristics of human-computer interaction in industrial internet, an experimental website was designed.24 users' mouse behavior data in an uncontrolled environment were collected within 2.5 years to conduct case studies.Hilbert-Huang transform (HHT) was used to extract frequency domain features of mouse behavior signals, combined with time domain features to form a time-frequency joint domain feature matrix of 163-dimensional to characterize user mouse behavior patterns.Bagged tree, support vector machine (SVM), Boost tree and K-nearest neighbor (KNN) were used to build a user authentication model, and the comparison result showed that the Bagged tree had the best internal detection effect in this case, with an average false acceptance rate (FAR) of 0.12% and an average false rejection rate (FRR) of 0.28%.In external detection, the FAR was 1.47%.Compared with the traditional mouse dynamics method, the frequency domain information of mouse behavior extracted by HHT can better realize the user authentication, and provide technical support the security of the industrial internet.…”
    Get full text
    Article
  5. 205

    The Bibliography of Articles of the Republican Era 1923-1999: A Critical Review by Yaşar Tonta, Umut Al

    Published 2013-11-01
    “…This paper critically reviews the Bibliography on the basis of its user interface, database design and data quality. Human-computer interaction (HCI) issues and the usability criteria seem to have not been taken into account when designing the user interface of the BARE CD-ROM. …”
    Get full text
    Article
  6. 206

    The Potential of AI in Information Provision in Energy-Efficient Renovations: A Narrative Review of Literature by C. Koray Bingöl, Tong Wang, Aksel Ersoy, Ellen van Bueren

    Published 2025-01-01
    “…Findings show that tools often overlook methodologies in human–computer interaction and the potential of textual and visual AI methods. …”
    Get full text
    Article
  7. 207

    A Design Methodology for Exploring and Communicating System Values and Assumptions by Daniel Carter

    Published 2014-01-01
    “…Borrowing models of design research from the fields of design and human-computer interaction, I argue that prototypes can be used to create new conceptual knowledge, to investigate the values and assumptions of sociotechnical systems, and to communicate alternative visions of those systems. …”
    Get full text
    Article
  8. 208

    Utilizing sensors networks to develop a smart and context-aware solution for people with disabilities at the workplace (design and implementation) by Ghassan Kbar, Ahmad Al-Daraiseh, Syed Hammad Mian, Mustufa Haider Abidi

    Published 2016-09-01
    “…The developments and improvements in human–computer interaction and information and communication technologies have resulted in innovative assistive technology (AT) solutions for the people with disabilities (PWDs). …”
    Get full text
    Article
  9. 209

    Computational Model of Recommender System Intervention by Adegoke Ojeniyi, Samuel-Soma M. Ajibade, Christiana Kehinde Obafunmiso, Tawakalit Adegbite-Badmus

    Published 2022-01-01
    “…This system is commonly implemented in human-computer-interaction (HCI) intervention because of its information filtering and personalization. …”
    Get full text
    Article
  10. 210

    The Machine as an Autonomous Explanatory Agent by Dilek Yargan

    Published 2024-07-01
    “…The third part delves into whether and to what extent the state-of-the-art machine learning models function as autonomous explanatory agents, based on the exploration in the second part and considering the field of Human-Computer Interaction.…”
    Get full text
    Article
  11. 211

    Public attitude and media governance of biometric information dissemination in the era of digital intelligence by Wenyi Zhang, Hengtian Zhang, Zhouyang Deng

    Published 2025-01-01
    “…Abstract Absrtact: In the era of digital intelligence, biometrics plays a critical role in mediating sensitive information dissemination, human-computer interaction, and governance in both virtual and real-world settings, including the evolving metaverse. …”
    Get full text
    Article
  12. 212

    Optimization of Music Feature Recognition System for Internet of Things Environment Based on Dynamic Time Regularization Algorithm by Hong Kai

    Published 2021-01-01
    “…The results of this study can meet the needs of composers’ assisted creation and music researchers’ analysis of a large amount of music data, and the results can be further transferred to deep music learning research, human-computer interaction music creation, application-based music creation, and other fields for expansion.…”
    Get full text
    Article
  13. 213

    Beyond communication - research as communicating: making user and audience studies matter - paper 2 by Brenda Dervin, CarrieLynn Reinhard, Fei C. Shen

    Published 2006-01-01
    “…The paper is linked to the Invited Paper in this issue and like that paper, reports on a project involving a dialogue between researchers and practitioners in library and information science, human computer interaction, and communication focusing on gaps in our understandings of users and audiences as well as in our efforts to collaborate with each other to conduct and apply research to the design and implementation of information, library, communication, and media systems. …”
    Get full text
    Article
  14. 214

    Toward cultural interpretability: A linguistic anthropological framework for describing and evaluating large language models by Graham M Jones, Shai Satran, Arvind Satyanarayan

    Published 2025-03-01
    “…By focusing attention on the communicative competence involved in the way human users and AI chatbots coproduce meaning in the articulatory interface of human-computer interaction, CI emphasizes how the dynamic relationship between language and culture makes contextually sensitive, open-ended conversation possible. …”
    Get full text
    Article
  15. 215

    CNN-Based Pupil Center Detection for Wearable Gaze Estimation System by Warapon Chinsatit, Takeshi Saitoh

    Published 2017-01-01
    “…Potentially, the pupil center position of a user’s eye can be used in various applications, such as human-computer interaction, medical diagnosis, and psychological studies. …”
    Get full text
    Article
  16. 216

    Digital Media Design for Dynamic Gesture Interaction with Image Processing by Xiaoli Xiong, Yongguang Hou

    Published 2022-01-01
    “…With the rapid development of human-computer interaction technology and research in the fields of ergonomics and user experience, people have increasingly demanded robot availability and ease of use. …”
    Get full text
    Article
  17. 217

    Evaluating Affective User-Centered Design of Video Games Using Qualitative Methods by Yiing Y’ng Ng, Chee Weng Khong, Robert Jeyakumar Nathan

    Published 2018-01-01
    “…In recent years, researchers and practitioners in the human-computer interaction (HCI) community have placed a lot of focus in developing methods and processes for use in the gaming field. …”
    Get full text
    Article
  18. 218

    Scalable Context-Based Facial Emotion Recognition Using Facial Landmarks and Attention Mechanism by Savina Jassica Colaco, Dong Seog Han

    Published 2025-01-01
    “…This advancement is expected to contribute substantially to fields such as augmented reality, medical imaging, and sophisticated human-computer interaction systems.…”
    Get full text
    Article
  19. 219

    Privacy view and target of differential privacy by Jingyu JIA, Chang TAN, Zhewei LIU, Xinhao LI, Zheli LIU, Tao ZHANG

    Published 2023-10-01
    “…The study aimed to address the challenges in understanding the privacy goals of differential privacy by analyzing the privacy controversies surrounding it in various fields.It began with the example of data correlation and highlighted the differing perspectives among scholars regarding the targets of privacy protection.In cases where records in a dataset were correlated, adversaries can exploit this correlation to infer sensitive information about individuals, thereby sparking a debate on whether this violates privacy protection.To investigate the influence of privacy theories in the legal domain on defining privacy, two mainstream privacy theories in the computer field were examined.The first theory, limited access to personal information, focuses on preventing others from accessing an individual’s sensitive information.According to this theory, privacy mechanisms should aim to prevent adversaries from accessing a user’s actual information.In contrast, the second theory, control over personal information, emphasizes an individual’s right to communicate personal information to others.This theory suggests that the disclosure of personal information due to the relevance of others sharing data should not be considered a breach of privacy.Then the controversies of differential privacy were analyzed in the fields of computer science, social science, ethics and human-computer interaction due to their different understandings of privacy.By exploring the privacy concept of differential privacy from a multidisciplinary perspective, this study helps readers gain a correct understanding of the privacy viewpoint and goals of differential privacy while enhancing their understanding of the concept of “privacy” itself.…”
    Get full text
    Article
  20. 220

    Facial expression recognition using singular values and wavelet‐based LGC‐HD operator by Durga G. Rao Kola, Srinivas K. Samayamantula

    Published 2021-03-01
    “…Abstract Facial expression recognition (FER) is a significant research area in the human–computer interaction. The performance of FER systems depends on an efficient feature extraction method. …”
    Get full text
    Article