Showing 301 - 320 results of 932 for search '"usability"', query time: 0.06s Refine Results
  1. 301

    Evaluation of an assistive exosuit for alleviating neck and shoulder muscle fatigue during prolonged flexed neck posture by Hang Man Cho, Jae-Ryeong Choi, Jung-Hwan Moon, Kyu-Jin Cho, Seung-Won Kim

    Published 2024-12-01
    “…The exosuit received an average system usability scale score of 66.83. Conclusions Based on both qualitative and quantitative evaluations, our proposed assistive exosuit demonstrated that it promises the significant reduction of muscle fatigue in the neck and shoulders.…”
    Get full text
    Article
  2. 302

    Patient and public involvement in the co-design and assessment of unobtrusive sensing technologies for care at home: a user-centric design approach by Jenny Sharma, Nazia Gillani, Imran Saied, Aaesha Alzaabi, Tughrul Arslan

    Published 2025-01-01
    “…For successful implementation, developers of healthcare technologies should prioritize privacy, usability, and clear communication with end-users and caregivers.…”
    Get full text
    Article
  3. 303

    UWSP: sleeping algorithms for underwater sensor network by Lu HONG, Feng HONG

    Published 2013-08-01
    “…This algo-rithm has no collision and no channel reservation and its usability and capability have been verified by simulation meth-ods.…”
    Get full text
    Article
  4. 304

    Safe communicated model of SIP network based on improved SIP protocol by ZHANG Zhao-xin1, FANG Bin-xing1, ZHANG Hong-li1, JIANG Chun-xiang2

    Published 2007-01-01
    “…Through analyzing the security of SIP,combining PKI technology,digital time authentication,digital certifi-cate and the characteristic of SIP network,the safe communicated model of SIP network based on improved SIP protocol was put forward.New call established protocol was constituted used the primary flow for reference,new register protocol and roam register protocol were constituted,time synchronization protocol and negotiating key protocol was added for this model,and test the safe communicated model in real circumstance.The result of the experiment proved that this model improved the confidentiality,integrality,usability,non-repudiation and novelty of the SIP network with the millisecond delay which can be accepted.…”
    Get full text
    Article
  5. 305

    Digital geocomputational technologies for the metaproject of urban green infrastructures by Valeria D’Ambrosio, Ferdinando Di Martino, Marina Rigillo

    Published 2022-06-01
    “…The results of the experiment validate the model in terms of usability and replicability highlighting its added value as a support tool for decision-makers, in particular for the meta-design of green infrastructures in urban areas. …”
    Get full text
    Article
  6. 306

    Key technology and validation of roadside sensing system for vehicle-road cooperation by BAO Xuyan, GONG Zheng, LI Boxiong, YU Bingyan

    Published 2024-12-01
    “…The necessity of key technologies, the usability of existing standards, and the high value of testing tools have all been confirmed.…”
    Get full text
    Article
  7. 307

    Determinants of customer trust in fintech as a means of payment through an approach technology acceptance model by Adele Mailangkay, Edhi Juwono

    Published 2023-09-01
    “…The perception of ease of use and the perception of usability have a positive and significant effect on attitudes. …”
    Get full text
    Article
  8. 308

    Research of duality and multi-level security model based on intransitive noninterference theory by LIU Wei-peng1, ZHANG Xing2

    Published 2009-01-01
    “…A novel duality and multi-level security model(DMLSM) based on intransitive noninterference theory was proposed,which protects confidentiality of information based on BLP model and integrity based on Biba model.To en-hance the usability of model,it introduces confidentiality trusted domain and integrality trusted domain which check the operations that violate the security policy in confidentiality check-room or integrity check-room respectively,then allow or refuse the access.The strict formal description of the model based on intransitive noninterference theory of informa-tion flow is given;furthermore,it proves the security of the model.The implementation of the model in Linux operating system is discussed and the application of model in practice is also demonstrated.The research gives Some contributes on the protection for sensitive important information and national information content security infrastructure.…”
    Get full text
    Article
  9. 309

    Interference and Protection in Satellite Laser Communication by Chenzhe LAO, Jianfeng SUN

    Published 2023-06-01
    “…In order to explore the safety protection technologies for various external interferences in satellite laser communication, four interference sources in the satellite laser communication link and their principles were introduced, included atmospheric turbulence, space background noise, weak light interference, and strong laser interference.And numerical models commonly used in theoretical analysis of the first two interferences were provided.Weak light interference and strong laser interference, also known as laser active interference, were artificial interference methods.From the scheme of communication, the impact of these four interference sources on coherent and incoherent communication systems was analyzed, and the current mainstream protection technologies for these four interferences under different systems were provided.The characteristics of various protection technologies were compared from versatility, cost, usability and their main application scenarios in satellite laser communication were explained.…”
    Get full text
    Article
  10. 310

    Generalized Grad-CAM attacking method based on adversarial patch by Nianwen SI, Wenlin ZHANG, Dan QU, Heyu CHANG, Shengxiang LI, Tong NIU

    Published 2021-03-01
    “…To verify the fragility of the Grad-CAM, a Grad-CAM attack method based on adversarial patch was proposed.By adding a constraint to the Grad-CAM in the classification loss function, an adversarial patch could be optimized and the adversarial image could be synthesized.The adversarial image guided the Grad-CAM interpretation result towards the patch area while the classification result remains unchanged, so as to attack the interpretations.Meanwhile, through batch-training on the dataset and increasing perturbation norm constraint, the generalization and the multi-scene usability of the adversarial patch were improved.Experimental results on the ILSVRC2012 dataset show that compared with the existing methods, the proposed method can attack the interpretation results of the Grad-CAM more simply and effectively while maintaining the classification accuracy.…”
    Get full text
    Article
  11. 311

    Location publishing technology based on differential privacy-preserving for big data services by Lin ZHANG, Yan LIU, Ru-chuan WANG

    Published 2016-09-01
    “…Aiming at dealing with prospect knowledge and complex combinatorial attack,a new location big data publishing mechanism under differential privacy technology was given.And innovative usability evaluation feedback mechanism was designed.It gave corresponding solution details for the sensitive attributes and the identity recognition to analyze the quality of service,aimed at privacy protecting for location based big data under situations like combination of location information and non-location information and attacker’s arbitrary background knowledge.Simulation results based on different spatial indexing technology proved that the new publishing model has a higher accuracy under specified privacy conditions for the location query service.…”
    Get full text
    Article
  12. 312

    Design and sensory quality. Materials and performance for communication in museum spaces by Teresa Villani

    Published 2020-06-01
    “…Making a space communicative by enhancing its usability entails anticipating perceptive processes and pursuing better quality for human-environment interaction. …”
    Get full text
    Article
  13. 313

    Research on Large-Scale Social Network Graph Data Mining in Telecommunication by Lijiao Liu, Juncai Tao, Xiaojun Xiao, Yu Lu

    Published 2015-01-01
    “…The distribute and stand-alone graph computing frameworks and tools were researched for mining large-scale social network graph data like telecommunication network, and at the end the feasibility and usability of Graphchi in large-scale graph datasets were verified and a graph mining application was made with telecommunication data using stand-alone graph data processing tool—Graphchi.…”
    Get full text
    Article
  14. 314

    Coupled Coincidence Points in Partially Ordered Cone Metric Spaces with a c-Distance by Wasfi Shatanawi, Erdal Karapınar, Hassen Aydi

    Published 2012-01-01
    “…Also, we introduce an example to support the usability of our results.…”
    Get full text
    Article
  15. 315

    An information-DNA based method of information dissemination and evolution on Internet by Panpan LI, Zhengxia XIE, Zengkai WANG, Rui JIN

    Published 2022-11-01
    “…To solve the problem of how to trace the information content dissemination and evolution process on the Internet, an information DNA-based method of information dissemination and evolution on Internet was proposed.Firstly, semantic extraction of Internet information content was performed based on domain knowledge to form a key feature set of information content.Then, using the key feature set of information content, an information DNA construction method based on locally sensitive hashing was proposed.Finally, the usability and effectiveness of the proposed method were verified by public dataset.The problem of traceability of Internet homologous information dissemination and evolution process was solved by using information DNA as the core identifier, which was of great practical significance for the study of Internet information content dissemination, evolution tracing and the governance and guidance of Internet public opinion events.…”
    Get full text
    Article
  16. 316

    Modeling and simulation of meteor burst channel by Bing XIA, Linlin LI, Yanshan ZHENG

    Published 2016-09-01
    “…In the test of the actual performance of communication device and software based on meteor burst,a model of meteor burst communication channel was established to solve the complexity of channel and difficulty of measurement.By analyzing the mathematic models of meteor burst channel,single underdense meteor trail channel and single overdense meteor trial channel were modeled as basis.Underdense meteor cluster and multipath channel were proposed to built a hybrid model based on probability principles.Combining with meteor arrival interval model,the simulation of meteor burst channel was realized by C++ programming tool.The simulation result can provide underdense meteor trail,overdense meteor trial,underdense meteor cluster and multipath channel.It indicates that the characteristics of the meteor burst channel model are basically matched with those of real channel.The result verifies usability and justifiability of the model.…”
    Get full text
    Article
  17. 317

    Generalized Contractive Mappings and Weakly α-Admissible Pairs in G-Metric Spaces by N. Hussain, V. Parvaneh, S. J. Hoseini Ghoncheh

    Published 2014-01-01
    “…Moreover, some examples are provided here to illustrate the usability of the obtained results.…”
    Get full text
    Article
  18. 318

    Comparative analysis of frameworks for creating user interfaces in iOS Systems by Sebastian Słupny, Edyta Łukasik

    Published 2024-12-01
    “…The application was developed in two versions: one using SwiftUI and the other using Storyboard and UIKit, allowing for a direct comparison of performance, flexibility, and usability of both frameworks. The thesis "SwiftUI is more efficient during the startup of applications handling a data collection" was confirmed. …”
    Get full text
    Article
  19. 319

    Design and implementation of proxy-protected proxy signature based on SM2 by Qing-xiao GUO, Da-wei ZHANG, Liang CHANG, Xiao-dong LIU, Jing-wen SONG

    Published 2017-09-01
    “…Based on the SM2 digital signature standard,a proxy-protected proxy signature scheme was designed.Through the design of the agent authorization mechanism,the protection of the proxy signer was realized.The proxy signature was realized by the proxy signer who represents the original signer through the improvement of the SM2 digital signature algorithm.The security analysis shows that the designed algorithm is verifiable,identifiable,distinguishable,non-repudiation,and strong unforgeability.Finally,the program was implemented using the C language and the Polarssl library,and the performance was compared with the SM2 digital signature.The analysis shows that the algorithm has good usability in performance.…”
    Get full text
    Article
  20. 320

    Differential Difference Current Conveyor Transconductance Amplifier: A New Analog Building Block for Signal Processing by Neeta Pandey, Sajal K. Paul

    Published 2011-01-01
    “…A new active building block for analog signal processing, namely, differential difference current conveyor transconductance amplifier (DDCCTA), is presented, and performance is checked through PSPICE simulations which show the usability of the proposed element is up to 201 MHz. …”
    Get full text
    Article