Search results for "Task analysis"
showing 10 items of 86 documents
Multiple Authentic Project-Based Experiences and Persistent Learning?
2019
This work-in-progress paper in the research category investigates students’ experiences of learning over two project-based courses, of which the first is taken during bachelor studies and the second is taken during master studies. The research goal was to explore if and how the first project experience was considered beneficial to the latter. A pilot interview was conducted and analyzed for qualitatively different themes. Transformative learning theory (TLT) is introduced as the theoretical framework because of its focus on persistent learning originating in transformations in meaning perspectives. The results are discussed in the context of TLT, and they inform curriculum design and resear…
Incentive Mechanism for Edge Computing-Based Blockchain: A Sequential Game Approach
2022
The development of the blockchain framework is able to provide feasible solutions for a wide range of Industrial Internet of Things (IIoT) applications. While the IIoT devices are usually resource-limited, how to make sure the acquisition of computational resources and participation of the devices will be the driving force to realize blockchain. In this work, an edge computing-based blockchain framework is considered, where multiple edge service providers (ESPs) can provide computational resources to the IIoT devices. We focus on investigating the trading between the devices and ESPs, where ESPs are the sellers and devices are the buyers. A sequential game is formulated and by exploring the…
Towards multi-concern software development with Everything-as-Code
2022
As software is becoming a central element in our lives, more and more stakeholders have concerns. Unlike today, when developers stop their coding activities to satisfy these stakeholder concerns, we propose dealing with them as part of the coding workflow, the central element of programmers’ daily duties. This can be achieved by extending the approach that we call Everything-as-Code (EaC) beyond software engineers and operators. peerReviewed
Latency-Oblivious Distributed Task Scheduling for Mobile Edge Computing
2018
Mobile Edge Computing (MEC) is emerging as one of the effective platforms for offloading the resource- and latency-constrained computational services of modern mobile applications. For latency- and resource-constrained mobile devices, the important issues include: 1) minimize end-to-end service latency; 2) minimize service completion time; 3) high quality-of-service (QoS) requirement to offload the complex computational services. To address the above issues, a latencyoblivious distributed task scheduling scheme is designed in this work to maximize the QoS performance and goodput for the MEC services. Unlike most of the existing works, we consider the latency-oblivious property of different …
Cognitive-Behavioural Treatment Package for Teaching Grooming Skills to a Man with an Intellectual Disability
2000
A combination of health education, use of picture cues based on task analyses, a system of least prompts and social reinforcement was applied to teach various grooming skills to a man with a moderate intellectual disability. A multiple baseline design across behaviours was employed to show the effects. The results indicated rapid learning of lacking skills such as tooth brushing, shaving, showering and washing of arms and face.
Towards Practical Cybersecurity Mapping of STRIDE and CWE — a Multi-perspective Approach
2021
Software vulnerabilities are identified during their whole life-cycle; some vulnerabilities may be caused by flaws on the design while other appear due to advances on the technologies around the systems. Frameworks such as OWASP are well- known and are used for testing a systems security before or after implementation, and such testing is carried out against the existing system. Threat modeling however focuses on the early stages of the system design when it is feasible and easy to fix security-related flaws and prevent possible damage caused by them. For example, STRIDE is one very popular threat modeling framework. A STRIDE threat modelling specialist deals with abstract categorizations o…
Time-Course of Grammatical Processing in Deaf Readers: An Eye-Movement Study.
2019
Abstract Twenty participants who were deaf and 20 chronological age-matched participants with typical hearing (TH) (mean age: 12 years) were asked to judge the correctness of written sentences with or without a grammatically incongruent word while their eye movements were registered. TH participants outperformed deaf participants in grammaticality judgment accuracy. For both groups, First Pass and Total Fixation Times of target words in correct trials were significantly longer in the incongruent condition than in the congruent one. However, whereas TH students showed longer First Pass in the target area than deaf students across congruity conditions, deaf students made more fixations than t…
Video-assisted surgery: suggestions for failure prevention in laparoscopic cholecystectomy
2014
Background: Surgery differs from other medical specialties in its execution. It is often complex and includes considerable individual variations. Observing problems in operating theatres (OT) allows for the identification of system failures which should be defined for learning purposes to increase patient safety and enhance general safety culture within hospital organizations. This study evaluates a common video-assisted surgical procedure, laparoscopic cholecystectomy (LC) through failure analysis. The profile of the LC procedure and failure sources is presented. Methods: Data consisted video-observations and interviews concerning twelve LC operations performed at a day surgery unit. All o…
Comparative ergonomic workflow and user experience analysis of MRI versus fluoroscopy-guided vascular interventions: an iliac angioplasty exemplar ca…
2014
A methodological framework is introduced to assess and compare a conventional fluoroscopy protocol for peripheral angioplasty with a new magnetic resonant imaging (MRI)-guided protocol. Different scenarios were considered during interventions on a perfused arterial phantom with regard to time-based and cognitive task analysis, user experience and ergonomics. Three clinicians with different expertise performed a total of 43 simulated common iliac angioplasties (9 fluoroscopic, 34 MRI-guided) in two blocks of sessions. Six different configurations for MRI guidance were tested in the first block. Four of them were evaluated in the second block and compared to the fluoroscopy protocol. Relevant…
Minimalism for the Win : User-Centered Design for Guidance in Industrial Maintenance
2022
Background: We conducted an exploratory study to test the delivery of technical instructions built on the principles of minimalism. The aim was to investigate how we could support target users’ skill levels in a context-sensitive manner. Literature review: Related work examines minimalism, user needs and profiling, and industrial maintenance and technician experience. Research questions: 1. How can the semantic structure of DITA XML be utilized in delivering technical information to users based on their skill levels? 2. How would a layered system of information support the principles of minimalism? Methodology: We created material and tested the concept in user studies with maintenance pers…