Showing 361 - 380 results of 932 for search '"usability"', query time: 0.04s Refine Results
  1. 361

    Klasifikasi Siswa Slow Learner untuk Mendukung Sekolah dalam Meningkatkan Pemahaman Siswa Menggunakan Algoritma Naïve Bayes by Abdul Harris Wicaksono, Ahmad Afif Supianto, Satrio Hadi Wijoyo, Didik Krisnandi, Ana Heryana

    Published 2022-06-01
    “…Hasil pengujian didapatkan nilai akurasi 0.92857, precison  0.94736, recall 0.97297 , dan F-measure 0.96 serta hasil pengujian visualisasi dashboard menggunakan kuesioner System Usability Scale yang menghasilkan skor 71.75 atau acceptable. …”
    Get full text
    Article
  2. 362

    Perancangan User Experience Aplikasi E-Business Pasar Tradisional Dengan Metode Human Centered Design (Studi Kasus: Pasar Oro-Oro Dowo) by Indrihana Kharismaning Larasati, Widhy Hayuhardhika Nugraha Putra, Retno Indah Rokhmawati

    Published 2022-02-01
    “…Pengujian rancangan prototype aplikasi tersebut dilakukan dengan pendekatan usability testing yang mengukur aspek efektivitas, efisiensi dan kepuasan pengguna. …”
    Get full text
    Article
  3. 363

    Person-based design and evaluation of MIA, a digital medical interview assistant for radiology by Kerstin Denecke, Daniel Reichenpfader, Dominic Willi, Karin Kennel, Harald Bonel, Harald Bonel, Knud Nairz, Nikola Cihoric, Damien Papaux, Hendrik von Tengg-Kobligk

    Published 2024-08-01
    “…The system was evaluated according to an existing evaluation framework that covers a broad range of aspects related to the technical quality of a conversational agent including usability, but also accessibility and security.ResultsThirty-six patients recruited from two Swiss hospitals (Lindenhof group and Inselspital, Bern) and two patient organizations conducted the usability test. …”
    Get full text
    Article
  4. 364

    Urban Green Infrastructure in Latin America – A strategy for Bogota courtyards by Julia Nerantzia Tzortzi, Maria Stella Lux, Natalia Pardo Delgado

    Published 2024-06-01
    “…In this regard, this contribution provides an analytical and design framework for integrating nature-based solutions in dense urban contexts for microclimate mitigation and improved usability. It is constructed by considering the morphological, historical, climatic, and administrative peculiarities of Latin America, and it has been applied and tested in the case study of Bogotá (Colombia). …”
    Get full text
    Article
  5. 365

    Multilevel Thresholding for Image Segmentation Using Mean Gradient by Abubakar M. Ashir

    Published 2022-01-01
    “…In spite of the enormous number of research studies in this field over the years, huge challenges still exist hampering the usability of some existing algorithms. Some of these challenges include high computational cost, insufficient performance, lack of generalization and flexibility, lack of capacity to capture various image degradations, and many more. …”
    Get full text
    Article
  6. 366

    A A Fingerprint-Based Attendance System for Improved Efficiency by Olayiwola Charles Adesoba, Israel Mojolaoluwa Joseph

    Published 2025-01-01
    “…The system's effectiveness, usability, and scalability are discussed, highlighting its potential for widespread adoption. …”
    Get full text
    Article
  7. 367

    Differentially private sequence generative adversarial networks for data privacy masking by Yu ZHANG, Xixiang LYU, Yucong ZOU, Yige LI

    Published 2020-08-01
    “…Based on generative adversary networks and the differential privacy mechanism,a differentially private sequence generative adversarial net (DP-SeqGAN) was proposed,with which the privacy of text sequence data sets can be filtered out.DP-SeqGAN can be used to automatically extract important features of a data set and then generate a new data set which was close to the original one in terms of data distributions.Based on differential privacy,randomness is introduced to the model,which improves the privacy of the generated data set and further reduces the over fitting of the discriminator.The proposed DP-SeqGAN was universal,so there is no need to adjust the model adaptively for datasets or design complex masking rules against dataset characters.The experiments show that the privacy and usability of a sequence data set are both improved significantly after it is processed by the DP-SeqGAN model,and DP-SeqGAN can greatly reduce the success rate of member inference attacks against the generated data set.…”
    Get full text
    Article
  8. 368

    Challenges and Prospects of Sensing Technology for the Promotion of Tele-Physiotherapy: A Narrative Review by Kei Kakegawa, Tadamitsu Matsuda

    Published 2024-12-01
    “…To further enhance the effectiveness and the scope of tele-physiotherapy, it is essential to further develop sensing and data analysis technologies. However, there are usability and analysis issues that have limited its use. …”
    Get full text
    Article
  9. 369

    A Simple Mathematical Model of Cyclic Circadian Learning by J. Šimon, M. Bulko

    Published 2014-01-01
    “…By the use of these functions and by formalism of differential equations, the concurrent processes of learning and forgetting are described mathematically. The usability of this model is limited to scenarios where logical bonds (connections to prior learning) are not created and mnemonic devices cannot be utilized during the learning process.…”
    Get full text
    Article
  10. 370

    New non‐homogeneous Poisson process software reliability model based on a 3‐parameter S‐shaped function by Hung‐Cuong Nguyen, Quyet‐Thang Huynh

    Published 2022-04-01
    “…Real data from industrial software development projects are used to verify the usability of the proposed model. The proposed model is shown to perform better than the existing models, especially with respect to the predictive performance. …”
    Get full text
    Article
  11. 371

    Credible distributed identity authentication system of microgrid based on blockchain by Guanqun YANG, Yin LIU, Hao XU, Hongwei XING, Jianhui ZHANG, Entang LI

    Published 2021-12-01
    “…Most of the blockchain-based identity authentication systems are based on public blockchain, which are still essentially traditional centralized identity management and verification methods, making it difficult to meet the needs of trusted access and fine-grained access control in microgrids.Therefore, based on the FISCO BCOS consortium blockchain technology, a distributed identity authentication system supporting multi-center was designed.A DID-based identity management protocol to achieve autonomous control of user identity in a practical scenarios was designed.Distributed trusted access technology for end nodes in microgrids was studied, and privacy-protecting credentials based on zero-knowledge proof were designed.This scheme meets the requirements of trustworthy and verifiable user identity in different privacy security scenarios, and achieves autonomous control of entity identity, fine-grained access control and trusted data exchange.The usability and effectiveness of the proposed algorithm are demonstrated through system experiments and performance analysis.…”
    Get full text
    Article
  12. 372

    Collaborative Exploration with a Micro Aerial Vehicle: A Novel Interaction Method for Controlling a MAV with a Hand-Held Device by David Pitman, Mary L. Cummings

    Published 2012-01-01
    “…PFO control utilizes a position feedback control loop to fly the MAV while presenting rate feedback to the operator. A usability study was conducted to evaluate MAV-VUE. …”
    Get full text
    Article
  13. 373

    Shape similarity differential privacy trajectory protection mechanism based on relative entropy and K-means by Suxia ZHU, Shulun LIU, Guanglu SUN

    Published 2021-02-01
    “…To solve the problem that most studies had not fully considered the sensitivity of location to privacy budget and the influence of trajectory shape, which made the usability of published trajectory poor, a shape similarity differential privacy trajectory protection mechanism based on relative entropy and K-means was proposed.Firstly, according to the topological relationship of geographic space, relative entropy was used to calculate the sensitivity of real location to privacy budget, a real-time calculation method of location sensitive privacy level was designed, and a new privacy model was built in combination with differential privacy budget.Secondly, K-means algorithm was used to cluster the release position to obtain the release position set that was most similar to the real position direction, and Fréchet distance was introduced to measure the similarity between the release track and the real track, so as to improve the availability of the release track.Experiments on real data sets show that the proposed trajectory protection mechanism has obvious advantages in trajectory availability compared with others.…”
    Get full text
    Article
  14. 374

    Differential privacy protection scheme based on edge betweenness model by Haiping HUANG, Kai WANG, Xiong TANG, Dongjun ZHANG

    Published 2019-05-01
    “…With the continuous development of social network application,user’s personal social data is so sensitive that the problem of privacy protection needs to be solved urgently.In order to reduce the network data sensitivity,a differential privacy protection scheme BCPA based on edge betweenness model was proposed.The 2K sequence corresponding to the graph structure based on the dK model was captured,and 2K sequences based on the edge betweenness centrality were reordered.According to the result of reordering,the 2K sequence was grouped into several sub-sequences,and each sub-sequence was respectively added with noise by a dK perturbation algorithm.Finally,a social network graph satisfying differential privacy was generated according to the new 2K sequences after integration.Based on the real datasets,the scheme was compared with the classical schemes through simulation experiments.The results demonstrate that it improves the accuracy and usability of data while ensuring desired privacy protection level.…”
    Get full text
    Article
  15. 375

    The Effect of Recycled Pervious Concrete Aggregate Substitution on Properties of Pervious Concrete by Demet Yavuz

    Published 2024-12-01
    “…This study investigated the usability of recycled aggregates obtained from pervious concrete produced in a laboratory environment for use in pervious concrete production. …”
    Get full text
    Article
  16. 376

    Supporting Collaborative Privacy-Observant Information Sharing Using RFID-Tagged Objects by Shin'ichi Konomi, Chang S. Nam

    Published 2009-01-01
    “…Our experiments of RFID-triggered information sharing have identified usability, deployment, and privacy issues of physically based information systems. …”
    Get full text
    Article
  17. 377

    Big data classification method of non relational distributed submission information under differentiated requirements by Lu HAN, Weiyu CHEN, Fei ZHANG, Jianfeng HE, Huaizhen SU

    Published 2023-06-01
    “…The classification method of non-relational distributed submitted information big data under the differentiated demand was studied, aiming at the problem of multi-source heterogeneous, widely distributed submitted information with more differentiated application requirements and inability to distinguish the available information.Firstly, the usability, openness and expansibility of the non-relational distributed submission information database were analyzed.The unstructured database storage TRIP was used to store non-relational distributed submission information by combining the basic requirements of field types.Then, the hashing process within the Hamming hash family was analyzed.Under the constraint of linearity level requirements, cellular automata with multiple attractors were used to optimize the system.The optimal parameters of the multiple attractor cellular automata classifier were improved through genetic algorithm, thus improving the big data classification method.Experimental results show that this method can effectively identify and classify structured data and unstructured data in non relational distributed submission information, and has high classification accuracy.…”
    Get full text
    Article
  18. 378

    The investigation into the relationship between seismic design and architectural education: a systematic literature review by Arabacıoğlu Feride Pınar, Er İhsan Erdem, Tastan Hasan

    Published 2025-02-01
    “…A review of numerous studies reveals key insights: seismic design is underemphasized in design studios, there is a scarcity of experimental research, and existing studies primarily focus on satisfaction and usability rather than assessing student performance. …”
    Get full text
    Article
  19. 379

    The history, current state and future possibilities of the non-invasive brain computer interfaces by Frederico Caiado, Arkadiy Ukolov

    Published 2025-03-01
    “…Solutions to overcome technological and ethical challenges are explored to improve usability, user experience, and impact in areas such as healthcare, rehabilitation, entertainment, and cognitive enhancement.…”
    Get full text
    Article
  20. 380

    How 3D Interaction Metaphors Affect User Experience in Collaborative Virtual Environment by Hamid Hrimech, Leila Alem, Frederic Merienne

    Published 2011-01-01
    “…We found that there is a significant difference in the user experience by changing the interaction metaphor on the copresence, awareness, involvement, collaborative effort, satisfaction usability, and preference. These findings provide a basis for designing 3D navigation techniques in a CVE.…”
    Get full text
    Article