首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Text-rich driver–vehicle interfaces are increasingly common in new vehicles, yet the effects of different typeface characteristics on task performance in this brief off-road based glance context remains sparsely examined. Subjects completed menu selection tasks while in a driving simulator. Menu text was set either in a ‘humanist’ or ‘square grotesque’ typeface. Among men, use of the humanist typeface resulted in a 10.6% reduction in total glance time as compared to the square grotesque typeface. Total response time and number of glances showed similar reductions. The impact of typeface was either more modest or not apparent for women. Error rates for both males and females were 3.1% lower for the humanist typeface. This research suggests that optimised typefaces may mitigate some interface demands. Future work will need to assess whether other typeface characteristics can be optimised to further reduce demand, improve legibility, increase usability and help meet new governmental distraction guidelines.

Practitioner Summary: Text-rich in-vehicle interfaces are increasingly common, but the effects of typeface on task performance remain sparsely studied. We show that among male drivers, menu selection tasks are completed with 10.6% less visual glance time when text is displayed in a ‘humanist’ typeface, as compared to a ‘square grotesque’.  相似文献   


2.
Many attempts1, 7, 8, 35 have been made to overcome the limit imposed by the Turing Machine34 to realise general mathematical functions and models of (physical) phenomena.

They center around the notion of computability.

In this paper we propose a new definition of computability which lays the foundations for a theory of cybernetic and intelligent machines in which the classical limits imposed by discrete algorithmic procedures are offset by the use of continuous operators on unlimited data. This data is supplied to the machine in a totally parallel mode, as a field or wave.

This theory of machines draws its concepts from category theory, Lie algebras, and general systems theory. It permits the incorporation of intelligent control into the design of the machine as a virtual element. The incorporated control can be realized in many (machine) configurations of which we give three:

a) a quantum mechanical realization appropriate to a possible understanding of the quantum computer and other models of the physical microworld,

b) a stochastic realization based on Kolmogorov-Gabor theory leading to a possible understanding of generalised models of the physical or thermodynamic macroworld, and lastly

c) a classical mechanical realization appropriate lo the study of a new class of robots.

Particular applications at a fundamental level are cited in geometry, mathematics, biology, acoustics, aeronautics, quantum mechanics, general relativity and. Markov chains. The proposed theory therefore opens a new way towards understanding the processes that underlie intelligence.  相似文献   


3.
This paper is a study of an adaptive quality control system from a viewpoint of quality goal. The main purpose is to introduce a conceptual framework for setting up quality goals which are in accordance with the external environment and internal capacity of quality control systems. We apply a mathematical general systems approach.

The results of our paper are summarized as follows:

1)As important decision-making in adaptive QCS, the decision-making for estimalion of fitness and examination of attainability are proposed and formalized mathematically.

2)A refinement process is formalized in which models are revised according to the changes of market.

3)Basic steps for setting quality goals are obtained which are based on the above formalization.  相似文献   


4.
Purpose: Identify location and intensity of discomfort experienced by healthy participants wearing cervical orthoses.

Method: Convenience sample of 34 healthy participants wore Stro II, Philadelphia, Headmaster, and AspenVista® cervical orthoses for four-hour periods. Participants reported discomfort level (scale 0–6) and location.

Results: Participants reported mean discomfort for all orthoses over the four-hour test between ‘a little discomfort’ and ‘very uncomfortable’ (mean discomfort score = 1.64, SD = 1.50). Seven participants prematurely stopped tests due to pain and six reported maximum discomfort scores. Significant linear increase in discomfort with duration of wear was found for all orthoses. Significantly less discomfort was reported with Stro II than Headmaster and Philadelphia. Age correlated with greater perceived discomfort. Orthoses differed in the location discomfort was experienced.

Conclusion: Existing cervical orthoses cause discomfort influenced by design and duration of wear with orthoses’ design the more significant factor. This work informed the design of a new orthosis and future orthoses developments.

Practitioner Summary: The purpose of this study was to gain greater knowledge about the discomfort caused by wearing of existing neck orthoses in order to inform the design and development of a new neck orthosis. This study gathers empirical data from a surrogate population and concludes that orthosis design is more influential than the duration of wear.  相似文献   


5.
The last few years have seen the development of Discrete Event-Dynamic Net Systems1,2 as instruments for modeling complex systems. They are able to achieve the following objectives:

—formality of the modeling methodology

—ability to model static and dynamic aspects

—ability to pass between levels of differently rich structures by morphisms

—uniform representation of the communication process as

—an information process

—a decision process and

—a control process

—homogeneity of the representation and modeling methods

—ability to derive qualitative and quantitative statements.

The foundation is provided by a Discrete Event-Dynamic Net System which includes the axiomatic declaration of general Petri nets. In order to calculate the structural and dynamic aspects, so-called Petri net machines are developed. It is shown that this approach can even be used to treat the following aspects:

—use of time during the process

—increase of costs during the generation and transportation of information

—augmentation, evaluation and transformation of information objects.

Recursive formulas are derived and some examples calculated.  相似文献   


6.
Background: Smartphones have reached levels of popularity and penetration where they are now suitable for use in population health interventions. A key feature of smartphones is push notification or in app messaging service, which can be used to alert users to messages or instructions pertaining to an installed app. Little evidence exists as to the persuasive power of these messages.

Method: We conducted a 24-week live user evaluation of push notifications used in a behavior-based mobile app for a meal replacement program to understand the role of push notifications in persuading users to engage with self-monitoring tasks.

Results: User perception of the prompts were verified through questionnaires, which in conjunction with the interaction logs show that users were tolerant of multiple daily prompts. The decline in compliance to the tasks set, however, shows that while the participants did not object to receiving prompts, they were less likely to respond to them as the study progressed.

Conclusions: Push notifications and user tasks are appropriate mechanisms to engage users with mobile technology in the short term.  相似文献   


7.
Book reviews     
Crime and the Computer, Martin Wasik, 1991, Oxford: Clarendon Press. £35.00.

Yearbook of Law, Computers and Technology, Volume 5. K.V. Russell (Ed.), 1991. London: Butterworths. £29.50.

Computers, Artificial Intelligence and the Law. Mervyn E. Bennun (Ed.), 1991. London: Ellis Horwood. xx +132 (including bibliography & index), £26.50

Modelling Legal Argument: reasoning with cases and hypotheticals. Kevin D. Ashley, 1990. Cambridge: MIT Press. 329 pp.  相似文献   


8.
Simon S. W. Li 《Ergonomics》2016,59(11):1494-1504
Change in sagittal spinal curvature from the neutral upright stance is an important measure of the heaviness and correctness of backpack use. As current recommendations, with respect to spinal profile, of backpack load thresholds were based on the significant curvature change in individual spinal region only, this study investigated the most critical backpack load by assessing simultaneously the spinal curvature changes along the whole spine. A motion analysis system was used to measure the curvature changes in cervical, upper thoracic, lower thoracic and lumbar regions with backpack load at 0, 5, 10, 15 and 20% of body weight. A multi-objective goal programming model was adopted to determine the global critical load of maximum curvature change of the whole spine in accordance with the maximum curvature changes of the four spinal regions. Results suggested that the most critical backpack load was 13% of body weight for healthy male college students.

Practitioner Summary: As current recommendations of backpack load thresholds were based on the significant curvature change in individual spinal region only, this study investigated the backpack load by considering simultaneously the spinal curvature changes along the whole spine. The recommendation, in terms of the global critical load, was 13% of body weight for healthy male college students.  相似文献   


9.
Book reviews     
Computer Software: legal protection in the United Kingdom Henry Carr & Richard Arnold, 1992 London: Sweet & Maxwell, 2nd ed, xv + 312 pp., £45.00 (hardback)

Advanced Information Systems for Lawyers V. Mital & L. Johnson, 1992 London: Chapman & Hall. pp. 306, £35.00

Law of Contract Laurence Koffman & Elizabeth MacDonald, 1992 London: Fourmat Publishing, 430 pp., paperback £22.50

The Electronic Media and the Transformation of Law M. Ethan Katsh, 1991 Oxford: Oxford University Press. £13.95  相似文献   


10.
Book reviews     
Electronic Finance Law Chris Reed, 1993 Hemel Hempstead: Woodhead‐Faulkner. 450 pp. £50.00

Introduction to Computer Law, 2nd Edn David I. Bainbridge, 1993 London: Pitman £18.99

Deontic Logic in Computer Science: normative system specification John‐Jules CH. Meyer & Roel J. Wieringa, 1993 London: John Wiley £34.95, xiv + 317pp.  相似文献   


11.
The construction of automatic control and modelling environments has been attempted using shallow reasoning expert systems. The inadequacy of this approach for real-life systems has become apparent, and the need for deeper knowledge—which can only be obtained by extensive simulation—is now acknowledged.

The simulation process, which consists of model building and model selection, followed by the generation and execution of a software simulator, can be partially automated if an Object-Oriented methodology is adopted. In this article, a methodology is presented, which is presently under investigation in the DESiRE (Dynamic Expert Systems in Robotic Experimentation)project

In the modelling phase, a hierarchical, uniform way of describing and manipulating continuous and discrete models is needed, if the highly desirable reusability of submodels is to be achieved. This is only possible if a clear distinction is made between bare models (and information about their intrinsic coupling) and causal simulation experiment-related data.

In the simulation phase, before generating numerical simulation code, a symbolic reduction of the continuous parts of the model is performed, thus eliminating inaccuracy introduced by the untimely application of possibly unstable numerical algorithms.

Finally, from the reduced representation, executable simulator-objects are produced for use in a distributed environment.  相似文献   


12.
The Problem

Internet of Things (IoT) is providing new services and insights by sensing contextual data but there are growing concerns of privacy risks from users that need immediate attention.

The Reason

The IoT devices and smart services can capture Personally Identifiable Information (PII) without user knowledge or consent. The IoT technology has not reached the desired level of maturity to standardize security and privacy requirements.

The Solution

IoT Privacy by Design is a user-centric approach for enabling privacy with security and safety as a ‘win-win’ positive outcome of IoT offerings, irrespective of business domain. The Proactive and Preventive Privacy (3P) Framework proposed in this paper should be adopted by the IoT stakeholders for building trust and confidence in end users about IoT devices and smart services.  相似文献   


13.
The growing use of second-screen devices stresses the importance of finding a balance between engagement, distraction, and disturbance of its users, while simultaneously watching television. In this framework, this article reports on a study designed to analyze the efficiency, impact, and interference of different notification strategies aiming to identify the best approach to be used when an alert is needed in second-screen scenarios.

A prototype able to deliver synchronized information related with TV content, with intervals of 10, 30 and 60 s, followed by individual or combined notifications (e.g., audio, visual, and haptic—on the tablet and visual—on the TV) was developed. A laboratory adapted to replicate a living room was set up and a test that involved watching three segments of a 20-min clip while using the prototype was carried with 30 participants, under a cognitive walk-through protocol.

Quantitative and qualitative results show that receiving notifications while watching TV is effective in alerting users about new information, despite its inherent cognitive disturbance for the TV viewing experience. It was also possible to highlight that in an HCI perspective, the most suitable strategy for integrating notifications (considering type and cadence) should be based on a combination of a visual notification (displayed only on the TV screen) along with a haptic notification (vibration on the tablet); spaced by an interval of at least 30 s.  相似文献   


14.
In the practice of Japanese company-wide quality control, some tools which help us to coordinate company-wide activities are developed. One of the main functions of these tools is to organise the diversified information related to the company-wide activities

This report discusses the basic recognition underlying the use of these tools, and presents on a conceptual level an essential philosophy and methodology of coordinating company-wide activities

The basic idea of this report is to make an additional subsystem which helps us to organize the diversified information of activities in order to coordinate activities easily.  相似文献   


15.
Book reviews     
Patent Harmonization Harold C. Wegner London, Sweet & Maxwell, 1993 xx + 376 pp., £70.00 (hardback)

Of Authors and Origins: essays on copyright law Brad Sherman & Alain Strowel (Eds) Oxford, Clarendon Press, 1994 xiv + 313 pp., £30.00 (hardback)

Future Air Navigation Systems Werner Guldimann & Stefan Kaiser Dordrecht, Martinus Nijhoff, 1993 Utrecht Studies in Air and Space Law, Vol. 13 viii + 281 pp., £76.50 (hardback)

The Law of Copyright Terence Prime London, Fourmat Publishing, 1992, xxiv + 313 pp., £30.00 (paperback)  相似文献   


16.
Lal Balkaran 《EDPACS》2016,54(3):1-10
A company’s strategic plan is its long-term outlook that sets out the plans, goals, objectives and actions for the next three to ten years. The board needs an objective assurance that the plan was properly developed. The internal audit function is best positioned to provide this assurance. The reason: it is one of the board’s most powerful mechanisms for understanding the full spectrum of key governance, risk, and control issues facing the company embodied in the strategic plan.

Auditing a strategic plan begins with a review of what it constitutes (its elements) and the methodology (its process) used in developing the plan. It thus becomes much easier to focus the audit effort in determining whether the output for each step along the way in these two broad streams has been achieved.

If not carefully planned and executed, a strategic plan audit could do irreparable damage to the reputation of the audit effort throughout the organization. As a result, it requires a multi-talented team with a high-powered leader, preferably the chief audit executive.

Although a strategic plan fails due to such common factors as planning teams lacking an understanding of the business, lack of commitment, not having the right people, or not adapting to a changing environment to take full advantage of technological developments, there is a key reason often overlooked: lack of an audit of the plan itself which, if done properly, could uncover these reasons for failure long before they happen.  相似文献   


17.
The problem of illegal waste burial is a serious threat to human health and ecosystems. These illegal activities occur most often in areas which have been heavily modified and considered degraded, mainly quarry areas and landfills, even if it is licensed.

To identify the areas where there is suspicion of illegal waste burial, a great amount of time is often necessary. As a matter of fact, the detection of suspicious areas is often based on a comparison of available airborne images with high temporal and spatial resolution, and surveys. This is also done to gather significant aspect of change as deep soil reshuffle in small excavation areas. These methods however, take a long time to be applied because large areas have to be analysed within sub-areas. Consequently, there is loss of understanding related to a wider and complete phenomenon that allows us to have information of all the territory that has undergone heavy transformations, especially if due to illegal conduct of waste disposal. As a result, there are no enough data to strategically evaluate how to counteract such illegal activities.

Since these areas have already been heavily disturbed and subjected to continuous changes over time, one or more detection techniques in a standardized procedure might only be applicable in some contexts. The above method comparison and survey is certainly a useful tool for detecting areas affected by excavation activities or waste illegal disposal. It also provides information where significant transformations have occurred in a short time.

The purpose of this work is the development of a processing procedure with Landsat images applicable to agro-ecosystems that can produce results in heavily transformed areas where suspicion of illegal waste burial is high.  相似文献   


18.
Fighter pilots’ heart rate (HR), heart rate variation (HRV) and performance during instrument approaches were examined. The subjects were required to fly instrument approaches in a high-fidelity simulator under various levels of task demand. The task demand was manipulated by increasing the load on the subjects by reducing the range at which they commenced the approach. HR and the time domain components of HRV were used as measures of pilot mental workload (PMWL). The findings of this study indicate that HR and HRV are sensitive to varying task demands. HR and HRV were able to distinguish the level of PMWL after which the subjects were no longer able to cope with the increasing task demands and their instrument landing system performance fell to a sub-standard level. The major finding was the HR/HRV’s ability to differentiate the sub-standard performance approaches from the high-performance approaches.

Practitioner Summary:

This paper examined if HR and HRV were sensitive to varying task demands in a fighter aviation environment and if these measures were related to variations in pilot’s performance.  相似文献   


19.
A general methodology for empirical investigaiion is described which consists of: (i) the selection of a system on the object of investigation with respect to the purpose and constraints of investigation, (ii) the gathering of data for the system and organizing them in the form of activity arrays, (iii) the processing of the data through which certain time-invariant properties representing the data are determined, (iv) the interpretation of these time-invariant data representations from the standpoint of the purpose of investigation.

It is shown that each activity array yields many different representations. A procedure through which the various representations can be obtained is described that consists of: (1) the selection of a mask specifying a pattern for sampling the data, (2) the sampling procedure through which certain types of time-invariant relations are determined for the given mask, (3) the simplification of the time-invariant relations, if necessary or desirable.

A basis for the objective comparison of possible representations and ascertainment of the representation with the highest possible degree of determinism, subject to given constraints, is developed.

The procedure is applicable to both well defined and fuzzy variables of any scale. No classification into input and output variables is required, although it is not prohibited.  相似文献   


20.
In this study we investigated the relationship between body movement during virtual reality (VR) analgesia and the experience of pain. Thermal (cold) stimulation was used to inflict pain. Two measures of pain were used—pain tolerance and pain intensity. Participants were wearing head mounted displays (Oculus Rift DK2) and were playing a game created by authors of the study.

Forty-six students of Wroclaw University participated in a within-subject design experiment. Each subject participated in a non-VR control condition and in two experimental conditions. Participants navigated the VR game using a computer mouse, but the mouse sensitivity (and therefore amount of physical movement necessary to navigate) was different in each experimental condition. We also measured feeling of presence in VR, game behavior, and attitudes toward the game.

The amount of body movement while steering the game was related to a decrease in pain intensity, but not in pain tolerance. This was an opposite result to our previously published experiment where we found an effect on pain tolerance but not on sensitivity. There was no significant correlation between presence and any of the pain measures.  相似文献   


设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号