Objective: This study comprehensively analyzes the current status and characteristics of the application of mental models in the field of Chinese design literature. Methods: Design-related literature incorporating men...
详细信息
ISBN:
(纸本)9783031601064;9783031601071
Objective: This study comprehensively analyzes the current status and characteristics of the application of mental models in the field of Chinese design literature. Methods: Design-related literature incorporating mental model applications, indexed by CNKI, served as the data source. Scientific literature visualization tools, VOSviewer and CiteSpace, were employed. A scientific knowledge map was constructed, visualizing aspects such as the distribution of literature by year, research institutions, authors, and keyword clusters to reveal the research trends. Conclusion: Research findings indicate an overall increasing trend in literature within the scope of this study. Leading institutions in engineering and management dominate the application ofmental models in the field of Chinese design. Research focuses primarily on user satisfaction, needs, analytic hierarchy process (AHP), user experience, service design, and product design. Highly cited papers form the primary knowledge base, linking a significant portion of the research. Future development trends include cultural and creative design, CMF design, as well as the analysis of personalized and differentiated user demands. However, current research faces limitations such as a lack of apparent methodological innovation, limited research collaboration, and a scarcity of highly productive authors.
Social media content posted by users during an evacuation phase of a disaster can provide a valuable source of information for situational awareness of emergency responders for decision making. However, understanding ...
详细信息
ISBN:
(纸本)9783031722400;9783031722417
Social media content posted by users during an evacuation phase of a disaster can provide a valuable source of information for situational awareness of emergency responders for decision making. However, understanding different aspects of the situation from unstructured data of social media and how they can be categorized to help emergency responders are the challenges that must be addressed. In this work, we design and conduct an integrated analytical framework using content and graph analysis methods to address these challenges by first detecting communities on the graph of user-entity interactions, followed by understanding different aspects of the users' interests by topic modeling. Experimenting on a dataset of Twitter/X posts from hurricane Irma in 2017, our results reveal that the users mainly discussed about different aspects of the evacuation situation including locations, time of action, empathy and mental health issues, family constraints, pets and sheltering, event descriptors, transportation and supplies, and accommodation. Additionally, our experiments show the significant alignment between topic representation based on, simple yet effective, frequent set of entities and topic prediction by BERTopic as a popular topic modeling method.
The global GNSS markets are expected to grow considerably in future, thus the number of threats against GNSS services will also increase. Understanding how GNSS services are utilized on a national level is crucial for...
详细信息
ISBN:
(数字)9783031621390
ISBN:
(纸本)9783031621383;9783031621390
The global GNSS markets are expected to grow considerably in future, thus the number of threats against GNSS services will also increase. Understanding how GNSS services are utilized on a national level is crucial for the resilience, safety and quality of these services. This study summarises interviews of authorities and specialists in the given GNSS segments, national and international research on related GNSS markets and analysis of related technologies. We provide an introduction to the current state of GNSS-based services, important shortcomings related to security of supply, and the GNSS user needs in relation to GNSS security of supply. We discuss ways to mitigate threats aimed against GNSS services, for example GNSS monitoring and provide suggestions to improve the security of supply of GNSS services. The GNSS markets are becoming increasingly vulnerable to interference, thus resilient navigation and timing solutions are needed. The authentication services of the Galileo-system are aimed to solve these problems, but they are not fully operational. The security of supply and the safety of the GNSS-based services should become a key feature in national cybersecurity planning.
We provide an overview of three different operating modes of cellular automata. A classical point of view is to consider cellular automata as acceptors for formal languages. As usual, these systems then act as decider...
详细信息
ISBN:
(数字)9783031661594
ISBN:
(纸本)9783031661587;9783031661594
We provide an overview of three different operating modes of cellular automata. A classical point of view is to consider cellular automata as acceptors for formal languages. As usual, these systems then act as deciders whose output is yes or no. A second point of view takes the perspective of more complex outputs. Now cellular automata not only compute a binary output, but they transform inputs into outputs, that is, they act as transducers. In the third case, cellular automata are considered that generate outputs from almost nothing, only the length of the pattern to be generated is given. A brief comparative overview of the basic capabilities in all three cases is given.
Incorporating emotional design, user-centered design, music education insights, and cognitive load management, this study investigates the integration of AI into cello learning. Through competitive analysis and qualit...
详细信息
ISBN:
(纸本)9783031613586;9783031613593
Incorporating emotional design, user-centered design, music education insights, and cognitive load management, this study investigates the integration of AI into cello learning. Through competitive analysis and qualitative user research, including detailed observations and interviews, we introduce interaction design solutions of "Goal-Oriented Three Practice Modes", "Interactive Learning", and "Personalized Practice Plans". This research aims to make classical music education more efficient, accessible and personalized, addressing economic and geographical limitations. By integrating technological innovations, we seek to enrich the classical music tradition, enhance the cello learning experience, and expand the community for cello learners and enthusiasts.
In the realm of virtual reality, the evolution and innovation of human-computer interaction are ongoing. Kinesics language interaction, which encompasses communication via gestures, facial expressions, body movements,...
详细信息
ISBN:
(纸本)9783031613586;9783031613593
In the realm of virtual reality, the evolution and innovation of human-computer interaction are ongoing. Kinesics language interaction, which encompasses communication via gestures, facial expressions, body movements, and gaze, is being increasingly recognized as a vital strategy for interaction. This paper delves into the significance and current development of kinesics language interaction, enumerates the effects of kinesics language interaction on user experience in virtual environments, and explores the importance of kinesics language interaction from the perspectives of facial expressions, gaze, gestures, and postures. The paper proposes that future research and development should be centered on comprehensive kinesics language interaction to investigate the cognitive impact on users and potential adverse effects.
Blended learning (BL) combines face-to-face and computer-aided resources, promoting students' engagement and independence. However, teachers may struggle due to a lack of technological skills and pedagogical chall...
详细信息
ISBN:
(纸本)9783031490644;9783031490651
Blended learning (BL) combines face-to-face and computer-aided resources, promoting students' engagement and independence. However, teachers may struggle due to a lack of technological skills and pedagogical challenges. Serious games have proven to be an efficient tool for enhancing teachers' training, providing immersive and interactive learning experiences, and allowing teachers to develop classroom management strategies in a risk-free environment. We present the design and implementation of BlendMaster, a collaborative board game for training teachers in BL. The game challenges players to make decisions, addressing classroom challenges in both face-to-face and online settings. By exploring the game's mechanics, dynamics, and aesthetics, we foster reflection on BL while creating an engaging experience. Feedback from players during a training session shows BlendMaster is positively received by teachers and provides insights for further improvements and future directions for the game.
The Data Sins project aims to provoke reflection on the concept of data colonialism by exploring its key underpinnings as an emerging phenomenon in the early 21st century. Through the discipline of speculative design,...
详细信息
ISBN:
(纸本)9783031613500;9783031613517
The Data Sins project aims to provoke reflection on the concept of data colonialism by exploring its key underpinnings as an emerging phenomenon in the early 21st century. Through the discipline of speculative design, the project seeks to emphasize how many of the rationales surrounding the ideals of connectivity and progress within the realm of big data, in fact, conceal a new form of neocolonial appropriation. The storytelling is based on conjectures that reveal contemporary aspects of the interconnected relationships between political, economic, and religious power. In this context, the rise of conservative right-wing movements observed in Brazil over the last decade solidifies the marriage between religious moralism, authoritarianism, and economic liberalism. The materialization of the project adopted a discursive approach, with the methodology relying on the use of artificial intelligence to construct the visual universe of speculative scenario. Furthermore, it was crucial for recognizing and highlighting biases and prejudices related to gender, race, and culture within the training models of the platform.
This paper investigates the use of generative AI to prepare oral examinations. The aim is to support oral exams regardless of whether the student uses generative AI. Oral exams have long been viewed as inefficient, su...
详细信息
ISBN:
(纸本)9783031630279;9783031630286
This paper investigates the use of generative AI to prepare oral examinations. The aim is to support oral exams regardless of whether the student uses generative AI. Oral exams have long been viewed as inefficient, subjective, or unfair. Generative AI has the potential to mitigate some of these concerns. This paper reports on a prototype developed to prepare vivas for essays in software engineering. This position paper discusses underlying principles, a proposed design and workflow, as well as limitations on both the technology and its use.
Data-driven advancements significantly contribute to societal progress, yet they also pose substantial risks to privacy. In this landscape, differential privacy (DP) has become a cornerstone in privacy preservation ef...
详细信息
ISBN:
(纸本)9783031680236;9783031680243
Data-driven advancements significantly contribute to societal progress, yet they also pose substantial risks to privacy. In this landscape, differential privacy (DP) has become a cornerstone in privacy preservation efforts. However, the adequacy of DP in scenarios involving correlated datasets has sometimes been questioned and multiple studies have hinted at potential vulnerabilities. In this work, we delve into the nuances of applying DP to correlated datasets by leveraging the concept of pointwise maximal leakage (PML) for a quantitative assessment of information leakage. Our investigation reveals that DP's guarantees can be arbitrarily weak for correlated databases when assessed through the lens of PML. More precisely, we prove the existence of a pure DP mechanism with PML levels arbitrarily close to that of a mechanism which releases individual entries from a database without any perturbation. By shedding light on the limitations of DP on correlated datasets, our work aims to foster a deeper understanding of subtle privacy risks and highlight the need for the development of more effective privacy-preserving mechanisms tailored to diverse scenarios.
暂无评论