This research delves into the intricate interplay between mental workload and facial temperature among participants undergoing simulated aircraft takeoff scenarios. Our objective was to discern how workload impacts fa...
详细信息
ISBN:
(纸本)9783031630309;9783031630316
This research delves into the intricate interplay between mental workload and facial temperature among participants undergoing simulated aircraft takeoff scenarios. Our objective was to discern how workload impacts facial temperature within the context of a flight simulator. Ten individuals were enlisted to serve as pilots in simulated A-320 flights, navigating through six distinct scenarios designed to mimic various levels of mental workload during takeoff, including both routine and emergency situations. Wemeticulously collected data, amassing a total of 120 takeoff instances and over 10 h of time-series data encompassing heart rate, workload assessments, and facial thermal images and temperatures. Through thorough comparative analysis of EEG data and different types of thermal images, compelling insights emerged. Notably, we observed a pronounced inverse relationship between workload and facial muscle temperatures, alongside facial landmark points. The implications of these findings extend beyond mere academic curiosity, offering valuable insights into the physiological repercussions ofworkload. Moreover, they hold promise for enhancing aviation safety protocols and optimizing pilot performance in demanding scenarios involving human interaction.
As a new production system that highly integrates tangible products and intangible services, the product service system provides an opportunity for the transformation from discrete production to integrated production....
详细信息
ISBN:
(纸本)9783031613616;9783031613623
As a new production system that highly integrates tangible products and intangible services, the product service system provides an opportunity for the transformation from discrete production to integrated production. Product Service System Design, proposed on this basis, involves systematic planning and design of related strategies, concepts, products, usage, processes, etc. However, existing literature shows a relative lack of attention on the role of "Media" during product service system design. Hence, this study, grounded in Product Service System design procedures and Uses & Gratifications theory, constructed the Double UG Design Model encompassing four phases - Unearth, Generation, Uses & Gratifications - with reference to the Double Diamond Design Model. The model emphasizes the working mechanism of "Media" across the entire design process, explores more possibilities brought by interdisciplinary research, provides new ideas to subsequent studies on Product Service System Design, and expands the application boundary of media in design research.
Organizations are increasingly adopting cloud-based, collaborative IS like Microsoft 365 to enhance collaboration and productivity, which was accelerated by the Covid-19 pandemic. Higher productivity through these sys...
详细信息
ISBN:
(数字)9783031613562
ISBN:
(纸本)9783031613555;9783031613562
Organizations are increasingly adopting cloud-based, collaborative IS like Microsoft 365 to enhance collaboration and productivity, which was accelerated by the Covid-19 pandemic. Higher productivity through these systems also offers a solution to potential workforce shortages. However, introducing such IS often faces challenges, including user reluctance to change existing habits and software. For example, low willingness to change and poor communication exacerbate this problem, especially with suites like Microsoft 365, which help transitioning from software to cloud-based, collaborative solutions. The key challenge in integrating new applications is engaging users effectively, as poor engagement leads to unsatisfactory experiences and poor value. Understanding user needs and providing support are crucial for promoting adoption. For collaborative IS, such as conversational agents, their value depends on user interaction. Addressing these challenges requires a structured method focusing on user feedback and requirements during the lifecycle design phase. This study examines the introduction and increased adoption of Microsoft 365 in a multinational organization. Despite expectations for high usage, fostering user engagement remains a significant hurdle. Therefore, we developed a systematic, survey-based approach in a case organization, aiming to stimulate user interaction by repeated fostering of interactions, and, consequently, add value for users.
Platforms are nowadays typically equipped with trusted execution environments (TEEs), such as Intel SGX or ARM TrustZone. However, recent microarchitectural attacks on TEEs repeatedly broke their confidentiality guara...
详细信息
ISBN:
(纸本)9783031477539;9783031477546
Platforms are nowadays typically equipped with trusted execution environments (TEEs), such as Intel SGX or ARM TrustZone. However, recent microarchitectural attacks on TEEs repeatedly broke their confidentiality guarantees, including the leakage of long-term cryptographic secrets. These systems are typically also equipped with a cryptographic coprocessor, such as a TPM or Google Titan. These coprocessors offer a unique set of security features focused on safeguarding cryptographic secrets. Still, despite their simultaneous availability, the integration between these technologies is practically nonexistent, which prevents them from benefitting from each other's strengths. In this paper, we propose TALUS, a general design and a set of three main requirements for a secure symbiosis between TEEs and cryptographic coprocessors. We implement a proof-of-concept of TALUS based on Intel SGX and a hardware TPM. We show that with TALUS, the long-term secrets used in the SGX life cycle can be moved to the TPM. We demonstrate that our design is robust even in the presence of transient execution attacks, preventing an entire class of attacks due to the reduced attack surface on the shared hardware.
Game-based learning has become a research hotspot in the field of educational technology, but how to design scientific, happy and effective educational games is still an important challenge. In this paper, we discuss ...
详细信息
ISBN:
(纸本)9789819744411;9789819744428
Game-based learning has become a research hotspot in the field of educational technology, but how to design scientific, happy and effective educational games is still an important challenge. In this paper, we discuss the design method of educational games based on the research case of Lab of Learning sciences at Peking University. Based on learning sciences perspective, our research presents a pentagonal model of educational game design and points out 4 specific design principles.
Novice programmers face various errors during the learning of a programming language. Most of them need help from instructors since they lack error resolution skills. On the other side, instructors spend a lot of time...
详细信息
ISBN:
(纸本)9783031630279;9783031630286
Novice programmers face various errors during the learning of a programming language. Most of them need help from instructors since they lack error resolution skills. On the other side, instructors spend a lot of time figuring out students' error causes. Long error detection times result in delayed and failed feedback, leading to a loss of student motivation. To support instructor's fast feedback, a detection method of error cause is needed. Existing detection methods, which are code-based, detect common and specific errors that can be identified by analyzing source code. These methods do not cover the diverse error patterns of novice programmers sufficiently, such as logical defects. To resolve this issue, it may be beneficial to detect rough and correct error causes of diverse error patterns. In this paper, a prediction method of rough error cause is proposed by considering not only source code, but also problem information, execution results, and the cognitive level indicating programming skills. We assume that different programming skills lead to different error patterns, which can help roughly but precisely predict error causes of runtime and logic errors in novice programmers. For performance evaluation, data from two introductory programming courses are used to validate the effectiveness of the cognitive level. Additionally, the usability for fast feedback is validated by comparing the error causes detection times of the instructors in each case.
Teacher-led lessons can successfully convey concepts depending on the teacher's preparation. However, it is challenging to convey a specific concept in an online environment without a well-designed learning path t...
详细信息
ISBN:
(纸本)9783031630279;9783031630286
Teacher-led lessons can successfully convey concepts depending on the teacher's preparation. However, it is challenging to convey a specific concept in an online environment without a well-designed learning path to guide students. Learning paths allow students to backtrack the prerequisite content from a specific lesson inwhich they areweak or skip to related content inwhich they have a strong understanding, resulting in efficient learning. Knowledge maps, as the basis of personalized learning paths, can be generated from educational data by deriving prerequisite relationships between two knowledge concepts. We have aimed to enhance knowledge maps by adding the prerequisite relationships obtained by applying deductive reasoning to previous maps. Using test data from Company D, we first generated prerequisite relationships using the least absolute shrinkage and selection operator, random forest, and hidden Markov model for three datasets of the company. Next, we derived additional prerequisite relationships by applying deductive reasoning. The results showed that the knowledge maps of the three datasets had accuracies of 59%, 55%, and 84%, respectively, which were 3%, 10%, and 4% higher than those of the prior maps. As a result, "at risk" students can perform better using the enhanced knowledge maps by applying deductive reasoning.
This paper presents a new theoretical approach to analyzing the relationship between Bitcoin's market price and its mining cost, aiming to substantiate the self-sustaining nature of Bitcoin's security. Previou...
详细信息
ISBN:
(纸本)9783031488054;9783031488061
This paper presents a new theoretical approach to analyzing the relationship between Bitcoin's market price and its mining cost, aiming to substantiate the self-sustaining nature of Bitcoin's security. Previous empirical studies reveal a long-term correlation between price and cost, while shorter-term analysis often reveals significant divergences, particularly during price bubbles. The correlation between price and cost is a critical feature for the safe confirmation of transactions and suggests that the crypto asset has a fundamental value. On the other hand, divergences, which yield profit for miners, should serve as a factor that encourages organized mining operations, raising the mining cost and thereby enhancing Bitcoin's security. Thus, Bitcoin's security seems organically maintained by an interplay of correlation and recurring divergences. Understanding the dynamics of mining costs and the mechanism driving the correlation and divergences between price and cost is essential for comprehending Bitcoin's security and how it is sustained. By leveraging recursive methods in economics, this paper introduces a new theoretical model in which the rational decisions of miners determine mining costs. According to this model, the proof-of-work (PoW) mechanism combined with fluctuating Bitcoin price drives the long-term correlation and recurring divergences between price and cost. It demonstrates a rationale for the self-sustainability of Bitcoin's security.
In the past fifteen years, cryptocurrencies have grown from a whitepaper released on a mailing list to an ecosystem supporting millions of transactions a day using a whole host of technology never imagined before. How...
详细信息
ISBN:
(纸本)9783031488054;9783031488061
In the past fifteen years, cryptocurrencies have grown from a whitepaper released on a mailing list to an ecosystem supporting millions of transactions a day using a whole host of technology never imagined before. However, governments have been slow to keep up. We present an analysis of regulatory developments from within the EU and by the Financial Action Task Force (FATF). These regulatory responses focus on intermediaries such as cryptocurrency exchanges, and wallet providers. We trace the AML/CFT policy recommendationsmade by the FATF, and examine the EU's Fifth Anti-Money Laundering Directive and upcoming Markets in Crypto-Assets (MiCA) regulation. Here we find a natural tension: the pace of regulation is slower than the pace of technology, so the scope is non-comprehensive, yet current trials to accelerate this pace are leading to subtle conflicting errors. These findings present a deeper understanding of the ongoing regulatory dilemma, its essence, and suggest directions for the future of cryptocurrency regulation.
The EU Regulation 2022/868 (Data Governance Act) designs a European data governance framework to facilitate data sharing, shaping the role of the Data Intermediation Service Provider. This paper aims to clarify, from ...
详细信息
ISBN:
(纸本)9783031680236;9783031680243
The EU Regulation 2022/868 (Data Governance Act) designs a European data governance framework to facilitate data sharing, shaping the role of the Data Intermediation Service Provider. This paper aims to clarify, from a levelism perspective, the main features of the Data Governance Act framing it as a macro-level model, and to explore the data intermediation service provider's role as one of multiple subjective stand-points in this data governance model. In doing so, it attempts to capture the main legal properties of data intermediation service and it brings them to the fore, identifying potential semantic constraints that may need to be addressed when engineering a data governance model in line with legally desirable outcomes. This paper builds on the existing cross-sectoral literature at the intersection of law and technology by relying on the research method of legal analysis and lays the groundwork for implementing a data governance model that integrates and consolidates different levels, dimensions, and facets of the in-force legal framework.
暂无评论