Continuous assessment of task difficulty and mental workload is essential in improving the usability and accessibility of interactive systems. Eye tracking data has often been investigated to achieve this ability, wit...
详细信息
Background: Health-related hazards have a detrimental impact on society. The health emergency and disaster management system (Health EDMS), such as a contact-tracing application, is used to respond to and cope with he...
详细信息
Background: Health-related hazards have a detrimental impact on society. The health emergency and disaster management system (Health EDMS), such as a contact-tracing application, is used to respond to and cope with health-related hazards. User compliance with Health EDMS warnings is key to its success. However, it was reported that user compliance with such a system remains low. Objective: Through a systematic literature review, this study aims to identify the theories and corresponding factors that explain user compliance with the warning message provided by Health EDMS. Methods: The systematic literature review was conducted using Preferred Reporting Items for Systematic reviews and Meta-Analyses 2020 guidelines. The search was performed using the online databases Scopus, scienceDirect, ProQuest, IEEE, and PubMed, for English journal papers published between January 2000 and February 2022. Results: A total of 14 papers were selected for the review based on our inclusion and exclusion criteria. Previous research adopted 6 theories when examining user compliance, and central to the research was Health EDMS. To better understand Health EDMS, based on the literature reviewed, we mapped the activities and features of Health EDMS with the key stakeholders involved. We identified features that require involvement from individual users, which are surveillance and monitoring features and medical care and logistic assistance features. We then proposed a framework showing the individual, technological, and social influencing factors of the use of these features, which in turn affects compliance with the warning message from Health EDMS. Conclusions: Research on the Health EDMS topic increased rapidly in 2021 due to the COVID-19 pandemic. An in-depth understanding of Health EDMS and user compliance before designing the system is essential for governments and developers to increase the effectiveness of Health EDMS. Through a systematic literature review, this study proposed a
Software Defined Networking enhances network management and security through centralized control, vital for the growth of consumer electronics. With the rise of smart devices and IoT systems, the demand for scalable n...
详细信息
ISBN:
(数字)9798331521165
ISBN:
(纸本)9798331521172
Software Defined Networking enhances network management and security through centralized control, vital for the growth of consumer electronics. With the rise of smart devices and IoT systems, the demand for scalable network management has intensified. While SDN streamlines network operations and supports essential technologies, it remains vulnerable to DDoS attacks that can disrupt these services. However, SDN environments are vulnerable to Distributed Denial of Service (DDoS) attacks, posing significant risks to operational integrity. This paper analyzes the performance of various machine learning models at the individual level, providing insights into their effectiveness in detecting DDoS attacks. Based on these findings, a hybrid model is introduced, utilizing stacking techniques with a Deep Neural Network (DNN) as the meta-learner. The hybrid approach achieves a remarkable accuracy of 99.09%. The results underscore the crucial role of machine learning, particularly deep learning methodologies, in safeguarding SDN networks against cyber threats. As reliance on complex networked systems in consumer electronics increases, enhancing the security of SDN environments becomes essential for maintaining seamless operations.
Visual Simultaneous Localization and Mapping (vSLAM) has achieved great progress in the computer vision and robotics communities, and has been successfully used in many fields such as autonomous robot navigation and A...
详细信息
Text rewriting with differential privacy (DP) provides concrete theoretical guarantees for protecting the privacy of individuals in textual documents. In practice, existing systems may lack the means to validate their...
详细信息
Video Question Answering (VidQA) exhibits remarkable potential in facilitating advanced machine reasoning capabilities within the domains of Intelligent Traffic Monitoring and Intelligent Transportation Systems. Never...
详细信息
A common denominator for most therapy treatments for children who suffer from an anxiety disorder is daily practice routines to learn techniques needed to overcome anxiety. However, applying those techniques while exp...
详细信息
Automated shuttle buses (ASBs) are a promising technology for enhancing public transportation, but their acceptance and adoption depend on various factors, such as trust, expectations, and age. This study examined how...
详细信息
Single image depth prediction is considerably difficult since depth cannot be estimated from pixel correspondences. Thus, prior knowledge, such as registered pixel and depth information from the user is required. Anot...
详细信息
暂无评论