-
301
Evaluation of an assistive exosuit for alleviating neck and shoulder muscle fatigue during prolonged flexed neck posture
Published 2024-12-01“…The exosuit received an average system usability scale score of 66.83. Conclusions Based on both qualitative and quantitative evaluations, our proposed assistive exosuit demonstrated that it promises the significant reduction of muscle fatigue in the neck and shoulders.…”
Get full text
Article -
302
Patient and public involvement in the co-design and assessment of unobtrusive sensing technologies for care at home: a user-centric design approach
Published 2025-01-01“…For successful implementation, developers of healthcare technologies should prioritize privacy, usability, and clear communication with end-users and caregivers.…”
Get full text
Article -
303
UWSP: sleeping algorithms for underwater sensor network
Published 2013-08-01“…This algo-rithm has no collision and no channel reservation and its usability and capability have been verified by simulation meth-ods.…”
Get full text
Article -
304
Safe communicated model of SIP network based on improved SIP protocol
Published 2007-01-01“…Through analyzing the security of SIP,combining PKI technology,digital time authentication,digital certifi-cate and the characteristic of SIP network,the safe communicated model of SIP network based on improved SIP protocol was put forward.New call established protocol was constituted used the primary flow for reference,new register protocol and roam register protocol were constituted,time synchronization protocol and negotiating key protocol was added for this model,and test the safe communicated model in real circumstance.The result of the experiment proved that this model improved the confidentiality,integrality,usability,non-repudiation and novelty of the SIP network with the millisecond delay which can be accepted.…”
Get full text
Article -
305
Digital geocomputational technologies for the metaproject of urban green infrastructures
Published 2022-06-01“…The results of the experiment validate the model in terms of usability and replicability highlighting its added value as a support tool for decision-makers, in particular for the meta-design of green infrastructures in urban areas. …”
Get full text
Article -
306
Key technology and validation of roadside sensing system for vehicle-road cooperation
Published 2024-12-01“…The necessity of key technologies, the usability of existing standards, and the high value of testing tools have all been confirmed.…”
Get full text
Article -
307
Determinants of customer trust in fintech as a means of payment through an approach technology acceptance model
Published 2023-09-01“…The perception of ease of use and the perception of usability have a positive and significant effect on attitudes. …”
Get full text
Article -
308
Research of duality and multi-level security model based on intransitive noninterference theory
Published 2009-01-01“…A novel duality and multi-level security model(DMLSM) based on intransitive noninterference theory was proposed,which protects confidentiality of information based on BLP model and integrity based on Biba model.To en-hance the usability of model,it introduces confidentiality trusted domain and integrality trusted domain which check the operations that violate the security policy in confidentiality check-room or integrity check-room respectively,then allow or refuse the access.The strict formal description of the model based on intransitive noninterference theory of informa-tion flow is given;furthermore,it proves the security of the model.The implementation of the model in Linux operating system is discussed and the application of model in practice is also demonstrated.The research gives Some contributes on the protection for sensitive important information and national information content security infrastructure.…”
Get full text
Article -
309
Interference and Protection in Satellite Laser Communication
Published 2023-06-01“…In order to explore the safety protection technologies for various external interferences in satellite laser communication, four interference sources in the satellite laser communication link and their principles were introduced, included atmospheric turbulence, space background noise, weak light interference, and strong laser interference.And numerical models commonly used in theoretical analysis of the first two interferences were provided.Weak light interference and strong laser interference, also known as laser active interference, were artificial interference methods.From the scheme of communication, the impact of these four interference sources on coherent and incoherent communication systems was analyzed, and the current mainstream protection technologies for these four interferences under different systems were provided.The characteristics of various protection technologies were compared from versatility, cost, usability and their main application scenarios in satellite laser communication were explained.…”
Get full text
Article -
310
Generalized Grad-CAM attacking method based on adversarial patch
Published 2021-03-01“…To verify the fragility of the Grad-CAM, a Grad-CAM attack method based on adversarial patch was proposed.By adding a constraint to the Grad-CAM in the classification loss function, an adversarial patch could be optimized and the adversarial image could be synthesized.The adversarial image guided the Grad-CAM interpretation result towards the patch area while the classification result remains unchanged, so as to attack the interpretations.Meanwhile, through batch-training on the dataset and increasing perturbation norm constraint, the generalization and the multi-scene usability of the adversarial patch were improved.Experimental results on the ILSVRC2012 dataset show that compared with the existing methods, the proposed method can attack the interpretation results of the Grad-CAM more simply and effectively while maintaining the classification accuracy.…”
Get full text
Article -
311
Location publishing technology based on differential privacy-preserving for big data services
Published 2016-09-01“…Aiming at dealing with prospect knowledge and complex combinatorial attack,a new location big data publishing mechanism under differential privacy technology was given.And innovative usability evaluation feedback mechanism was designed.It gave corresponding solution details for the sensitive attributes and the identity recognition to analyze the quality of service,aimed at privacy protecting for location based big data under situations like combination of location information and non-location information and attacker’s arbitrary background knowledge.Simulation results based on different spatial indexing technology proved that the new publishing model has a higher accuracy under specified privacy conditions for the location query service.…”
Get full text
Article -
312
Design and sensory quality. Materials and performance for communication in museum spaces
Published 2020-06-01“…Making a space communicative by enhancing its usability entails anticipating perceptive processes and pursuing better quality for human-environment interaction. …”
Get full text
Article -
313
Research on Large-Scale Social Network Graph Data Mining in Telecommunication
Published 2015-01-01“…The distribute and stand-alone graph computing frameworks and tools were researched for mining large-scale social network graph data like telecommunication network, and at the end the feasibility and usability of Graphchi in large-scale graph datasets were verified and a graph mining application was made with telecommunication data using stand-alone graph data processing tool—Graphchi.…”
Get full text
Article -
314
Coupled Coincidence Points in Partially Ordered Cone Metric Spaces with a c-Distance
Published 2012-01-01“…Also, we introduce an example to support the usability of our results.…”
Get full text
Article -
315
An information-DNA based method of information dissemination and evolution on Internet
Published 2022-11-01“…To solve the problem of how to trace the information content dissemination and evolution process on the Internet, an information DNA-based method of information dissemination and evolution on Internet was proposed.Firstly, semantic extraction of Internet information content was performed based on domain knowledge to form a key feature set of information content.Then, using the key feature set of information content, an information DNA construction method based on locally sensitive hashing was proposed.Finally, the usability and effectiveness of the proposed method were verified by public dataset.The problem of traceability of Internet homologous information dissemination and evolution process was solved by using information DNA as the core identifier, which was of great practical significance for the study of Internet information content dissemination, evolution tracing and the governance and guidance of Internet public opinion events.…”
Get full text
Article -
316
Modeling and simulation of meteor burst channel
Published 2016-09-01“…In the test of the actual performance of communication device and software based on meteor burst,a model of meteor burst communication channel was established to solve the complexity of channel and difficulty of measurement.By analyzing the mathematic models of meteor burst channel,single underdense meteor trail channel and single overdense meteor trial channel were modeled as basis.Underdense meteor cluster and multipath channel were proposed to built a hybrid model based on probability principles.Combining with meteor arrival interval model,the simulation of meteor burst channel was realized by C++ programming tool.The simulation result can provide underdense meteor trail,overdense meteor trial,underdense meteor cluster and multipath channel.It indicates that the characteristics of the meteor burst channel model are basically matched with those of real channel.The result verifies usability and justifiability of the model.…”
Get full text
Article -
317
Generalized Contractive Mappings and Weakly α-Admissible Pairs in G-Metric Spaces
Published 2014-01-01“…Moreover, some examples are provided here to illustrate the usability of the obtained results.…”
Get full text
Article -
318
Comparative analysis of frameworks for creating user interfaces in iOS Systems
Published 2024-12-01“…The application was developed in two versions: one using SwiftUI and the other using Storyboard and UIKit, allowing for a direct comparison of performance, flexibility, and usability of both frameworks. The thesis "SwiftUI is more efficient during the startup of applications handling a data collection" was confirmed. …”
Get full text
Article -
319
Design and implementation of proxy-protected proxy signature based on SM2
Published 2017-09-01“…Based on the SM2 digital signature standard,a proxy-protected proxy signature scheme was designed.Through the design of the agent authorization mechanism,the protection of the proxy signer was realized.The proxy signature was realized by the proxy signer who represents the original signer through the improvement of the SM2 digital signature algorithm.The security analysis shows that the designed algorithm is verifiable,identifiable,distinguishable,non-repudiation,and strong unforgeability.Finally,the program was implemented using the C language and the Polarssl library,and the performance was compared with the SM2 digital signature.The analysis shows that the algorithm has good usability in performance.…”
Get full text
Article -
320
Differential Difference Current Conveyor Transconductance Amplifier: A New Analog Building Block for Signal Processing
Published 2011-01-01“…A new active building block for analog signal processing, namely, differential difference current conveyor transconductance amplifier (DDCCTA), is presented, and performance is checked through PSPICE simulations which show the usability of the proposed element is up to 201 MHz. …”
Get full text
Article