The proceedings contain 49 papers. The special focus in this conference is on Human-computer Interaction. The topics include: Visualization of Operating system Behavior in a Linux Environment Running in a Browser;rese...
ISBN:
(纸本)9783031619311
The proceedings contain 49 papers. The special focus in this conference is on Human-computer Interaction. The topics include: Visualization of Operating system Behavior in a Linux Environment Running in a Browser;research on the application Situation and Trend of Immersive Design;using Schema Theory to Construct the Designer’s Knowledge Framework;designing Metaphor-Based Character Archetypes for a Story Authoring Tool;UI-DETR: GUI Component Detection from the system Screen with Transformers;the Current Status of the application of Virtual Reality Technology in Display Design: A Bibliometric Analysis;universal Hand Gesture Interaction Vocabulary for Cross-Cultural Users: Challenges and Approaches;applying Co-designing Methods to Information-Seeking systems with North Carolina Foster Parents;exploration of Design Intervention in Eliminating Bias: A Persuasive system Design Approach of Introducing Intermediate Scenarios;a Practical Study of Project-Based Learning in High School General Technology Based on Design Thinking;on the Influence and application of Regional Culture in Interaction Design;supporting Parent-Child Interactions in Child Riding: Exploring Design Opportunities for Digital Interaction Strategies;research and application of Grid system Design for Version Aesthetics in Book Design;Exploration of Alert Response Strategy modeling Method Based on MBSE;the Perceived Impact of Different Types of Ice-Themed Typography on Users;cognitive Biases in the Estimation of the Interface Updates: Facebook Users’ Case;force-Based modeling of a Resilient Helping Role in Coordinated Behavior of a Triad;Automating User Task Performance: Introducing Task Experience Score (TES) for Complex Cloud Platforms;examining the Influence of Front-Facing Camera Layout on the Aesthetic Experience of Smartphone User Interfaces;a Comparative Study of Icon Style Based on Cognitive Behavior.
With the extensive application of information technology in civil aircraft airborne systems, airborne systems are facing the threat of security vulnerabilities. For this reason, this paper adopts model-based system en...
详细信息
ISBN:
(纸本)9798350386783;9798350386776
With the extensive application of information technology in civil aircraft airborne systems, airborne systems are facing the threat of security vulnerabilities. For this reason, this paper adopts model-based system engineering method to analyze the application scenario of vulnerability management alarm for airborne equipment and designs the overall architecture of the vulnerability management and alarm system for civil aircraft airborne equipment, as well as the key subsystems such as vulnerability automatic collection and asset management, vulnerability tracking and alarm, vulnerability management database, which are implemented in Java language, developed based on Spring Boot and VUE frameworks, deployed in microservice mode, with features such as rich functions and easy operation. It's verified by actual use that the system can meet the functional requirements of vulnerability management and alarm of civil aircraft airborne system.
The proceedings contain 304 papers. The topics discussed include: parameter matching and regenerative braking energy recovery strategy for pure electric commercial vehicles;an optimized design of an electric vehicle w...
ISBN:
(纸本)9798350368208
The proceedings contain 304 papers. The topics discussed include: parameter matching and regenerative braking energy recovery strategy for pure electric commercial vehicles;an optimized design of an electric vehicle wireless charging robotic arm;research on automatic classification and recognition system of works of art based on computer vision;research on energy-saving control strategy of residents' smart home;modeling designed for regenerative braking energy recovery of pure electric commercial vehicles;building facade design and optimization based on computer technology and improved genetic algorithm;application research of wireless sensor network in structural health monitoring of civil engineering;and design and application of control strategy for the ‘single forced draft fan, double induced draft fan, and double air preheater’ configuration of air and flue gas system in thermal power units.
In the field of construction, the application of Building Information modeling (BIM) technology combined with computer vision offers a promising avenue for enhancing the quality control and intelligent monitoring of v...
详细信息
Time can be a measure of the success of a job or project. The existence of a schedule is useful to guide humans in making the best use of time and achieving predetermined goals. We design an application to assist user...
详细信息
This article first analyzes the concept and development process of artificial intelligence products, then delves into the application and development of human-computer interaction technology in artificial intelligence...
详细信息
ISBN:
(纸本)9798400709760
This article first analyzes the concept and development process of artificial intelligence products, then delves into the application and development of human-computer interaction technology in artificial intelligence products, and then analyzes the standardization research of human-computer interaction design in artificial intelligence products;Finally, the two-dimensional architecture of human-computer interaction design for artificial intelligence products was elaborated, with detailed discussions and planning in terms of technical and value dimensions. The rapid development of artificial intelligence has driven the emergence of a large number of artificial intelligence products, resulting in a fundamental change in the human-computer interaction mode of products and higher requirements for human-computer interaction design. Therefore, how to construct standardized human-computer interaction design patterns in artificial intelligence products in the new era is a key research topic in the development of artificial intelligence products.
The security and reliability of the Internet routing systems are of great significance for cybersecurity. To accurately depict the behavioral characteristics of the routing system, this paper proposes a modeling techn...
详细信息
ISBN:
(纸本)9798350350227;9798350350210
The security and reliability of the Internet routing systems are of great significance for cybersecurity. To accurately depict the behavioral characteristics of the routing system, this paper proposes a modeling technique for the Internet routing systems based on knowledge graphs. By collecting and analyzing multi-source topology and routing data, it intricately describes complex associations and correspondences among ASes, prefixes, IPs, routers, geographical locations, and other dimensions. By querying and analyzing these relationships, the modeling technique infers implicit features within the routing system, or RPKI system. This inference, in turn, provides valuable insights into key node identification, prefix hijacking detection, and analysis of conflicts between route announcement and ROA authentication.
Fire is a common safety problem both in the industry and household environments. This paper presents research on the development and implementation of a fire detection system designed for both industrial and household...
详细信息
ISBN:
(纸本)9798350370058;9798350370164
Fire is a common safety problem both in the industry and household environments. This paper presents research on the development and implementation of a fire detection system designed for both industrial and household environments. The proposed system utilizes covariance matrix image processing in conjunction with Shape analysis and color analysis algorithms. The device is capable of detecting fire based on its color, leveraging an enrollment process conducted on our web server. To enhance user accessibility, a mobile phone application has been created to serve as the interface for receiving alarms generated by the device. Additionally, a mobile camera facilitates live video streaming of the monitored area. Upon detecting a fire, the device triggers an alarm to be sent to the user's Android mobile phone. The mobile application not only displays real-time footage but also offers users the option to contact the fire station directly.
This study aims to shape application modes of the future intelligent unmanned equipment systems in combat, with a particular emphasis on the tactical confrontation perspective of group intelligence unmanned equipment ...
详细信息
With the progress of information technology such as computerapplication technology and remote sensing technology, real-time meteorological disaster monitoring and early warning and emergency decision-making based on ...
详细信息
暂无评论