Search results for "ta113"
showing 10 items of 530 documents
Modeling visual sampling on in-car displays: The challenge of predicting safety-critical lapses of control
2015
In this article, we study how drivers interact with in-car interfaces, particularly by focusing on understanding driver in-car glance behavior when multitasking while driving. The work focuses on using an in-car touch screen to find a target item from a large number of unordered visual items spread across multiple screens. We first describe a cognitive model that aims to represent a driver?s visual sampling strategy when interacting with an in-car display. The proposed strategy assumes that drivers are aware of the passage of time during the search task; they try to adjust their glances at the display to a time limit, after which they switch back to the driving task; and they adjust their t…
The Applications of Cognitive Mechanism of Verbal Humour to the Adjustment of Depressive Mood
2018
Aims: To apply the findings of neurolinguistic research to the practical technological artifact design, the cognitive mechanism of verbal humour is comprehensively investigated and designed with EEG-based Brain Computer interfaces and Mobile Health, under the guidance of technology design theory, to help with the adjustment of depressive mood. Application Base: The intervention effect of verbal humour on depressive mood is rooted in their cognitive mechanisms. The right hemisphere of the brain has a dominant effect on both verbal humour and depressive mood; some specific brain regions, such as amygdala, nucleus accumbens, hippocampus etc., are particularly activated during the processing of…
Teaching types with a cognitively effective worked example format
2015
AbstractTeaching functional programming as a second programming paradigm is often difficult as students can have strong preconceptions about programming. When most of these preconceived ideas fail to be confirmed, functional programming may be seen as an unnecessarily difficult topic. A typical topic that causes such difficulties is the language of types employed by many modern functional languages. In this paper, we focus on addressing this difficulty through the use of step-by-step calculations of type expressions. The outcome of the study is an elaboration of a worked example format and a methodical approach for teaching types to beginner functional programmers.
Metaphor as a Focal Concept in Sound Design
2014
A central challenge in the design of non-speech sounds is to understand the relating conceptualisation process. In the current paper, we propose the use of metaphor theories as a framework to understand what sound design is fundamentally all about. In the proposed framework, we handle metaphors as conceptual entities, which are the basic constituents of meaning making.
Radical innovation by theoretical abstraction - a challenge for the user-centred designer
2016
AbstractIt is generally accepted that scientific disciplines such as psychology, sociology, and anthropology contribute beneficially to design by providing understanding of users’ needs, experiences, and desires. Arguably, however, these disciplines have more to contribute, because they include theories and models that can be applied as design frames and principles. More specifically, goal-setting, visualization, thematization, and conceptual reconfiguration are general mechanisms through which theories translate into design contributions. Actualizing radical design solutions via these mechanisms is discussed: theories provide appropriate means of abstraction, which allows ‘distance’ from u…
Hypervisor-based Protection of Code
2019
The code of a compiled program is susceptible to reverse-engineering attacks on the algorithms and the business logic that are contained within the code. The main existing countermeasure to reverse-engineering is obfuscation. Generally, obfuscation methods suffer from two main deficiencies: 1) the obfuscated code is less efficient than the original and 2) with sufficient effort, the original code may be reconstructed. We propose a method that is based on cryptography and virtualization. The most valuable functions are encrypted and remain inaccessible even during their execution, thus preventing their reconstruction. A specially crafted hypervisor is responsible for decryption, execution, a…
Adaptive Service Offloading for Revenue Maximization in Mobile Edge Computing With Delay-Constraint
2019
Mobile Edge Computing (MEC) is an important and effective platform to offload the computational services of modern mobile applications, and has gained tremendous attention from various research communities. For delay and resource constrained mobile devices, the important issues include: 1) minimization of the service latency; 2) optimal revenue maximization; 3) high quality-of-service (QoS) requirement to offload the computational service offloading. To address the above issues, an adaptive service offloading scheme is designed to provide the maximum revenue and service utilization to MEC. Unlike most of the existing works, we consider both the delay-tolerant and delay-constraint services i…
SAGECELL: Software-Defined Space-Air-Ground Integrated Moving Cells
2018
Ultra-dense networks (UDNs) provide an effective solution to accommodate the explosively growing data traffic of multimedia services and real-time applications. However, the densification of large numbers of static small cells faces many fundamental challenges, including deployment cost, energy consumption and control, and so on. This motivates us to develop software-defined space-air-ground integrated moving cells (SAGECELL), a programmable, scalable, and flexible framework to integrate space, air, and ground resources for matching dynamic traffic demands with network capacity supplies. First, we provide a comprehensive review of state-of-the-art literature. Then the conceptual architectur…
On optimal deployment of low power nodes for high frequency next generation wireless systems
2018
Recent development of wireless communication systems and standards is characterized by constant increase of allocated spectrum resources. Since lower frequency ranges cannot provide sufficient amount of bandwidth, new bands are allocated at higher frequencies, for which operators resort to deploy more base stations to ensure the same coverage and to utilize more efficiently higher frequencies spectrum. Striving for deployment flexibility, mobile operators can consider deploying low power nodes that could be either small cells connected via the wired backhaul or relays that utilize the same spectrum and the wireless access technology. However, even though low power nodes provide a greater fl…
Everyday Appropriations of Information Technology: A Study of Creative Uses of Digital Cameras
2011
Repurposive appropriation is a creative everyday act in which a user invents a novel use for information technology (IT) and adopts it. This study is the first to address its prevalence and predictability in the consumer IT context. In all, 2,379 respondents filled in an online questionnaire on creative uses of digital cameras, such as using them as scanners, periscopes, and storage media. The data reveal that such creative uses are adopted by about half of the users, on average, across different demographic backgrounds. Discovery of a creative use on one's own is slightly more common than is learning it from others. Most users discover the creative uses either completely on their own or wh…