The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The role of technical communicators is expanding due to technology. However, many individuals throughout Europe gain employment as technical communicators without undergoing specialized training. TecCOMFrame, a three-year project funded by the European Union, aims to develop: 1) a common academic qualification and competence framework for technical communication; 2) prototypes of technical communication...
This paper presents a process for designing an online Community of Practice (CoP) system for nurses. First, we used Value Sensitive Design by identifying the four features: benefits, harms, future trend, and pervasiveness of the CoP system to stakeholders. Next, we created two personas that represent direct stakeholders. We then incorporated the four features and personas into value scenarios. Based...
The back propagation algorithm has wide range of applications for training of feed forward neural networks. Over the years, many researchers have used back propagation algorithm to train their neural network based systems without emphasizing on how to fine tune the parameters of the algorithm. The paper throws the light on how researchers can manipulate and experiment with the parameters of the back...
Hundreds of vulnerabilities and security defects are disclosed by hackers, developers, and users. The better way to improve software security is to enhance security process into SDLC processes. To keep software secure, security enhancement of the SDLC process involves lots of practices and activities to achieve goal of security. However, how to adopt these activities well to improve software security...
This paper reports the development process of an educational resource prototype named Poligonopolis. Its content is focused on learning the content Polygons. The instructional design project of the educational resource was written considering gamification elements and accessibility guidelines, which served as requirements to develop the prototype. The Poligonopolis prototype was evaluated by a group...
Fuzzy logic is commonly useful to represent the human logic behavior, and in particular in the design of both decision-making systems and classifiers. A big part of its accuracy is provided by the membership functions which usually are selected from a traditional group, e.g., triangular, pi and gamma functions, without considering the data behavior in the scope of application. Therefore, a wrong selection...
Operating forklifts in warehouses is becoming an increasingly difficult task due to higher shelves and narrower aisles. We investigate how Augmented Reality (AR) could aid forklift operators in performing their pallet racking and pick up tasks by superimposing virtual guidelines over a real world camera feed. To test this, we designed and developed a prototype system based on a toy forklift and conducted...
Recent studies argue that Augmented Reality Game-Based Learning (ARGBL) benefit learning and teaching processes. However, creating and leveraging ARGBL experiences is not easy for teachers, since they lack the expertise and time to design and construct them. Using Co Design strategies that combine the expertise of different actors in the creation can solve this. In this paper, we introduce Co-CreARGBL...
New capabilities in spaceflight missions are enabled by new technologies. Transitioning new technology to spaceflight elements is difficult and introduces risk, but finding the right balance between benefit and risk leads to scientific advancements and novel space missions. A clear understanding of the risks of new technology can create an environment where innovation is nurtured rather than avoided...
With the current trend of spending time socialising via mobile applications, students at institutes of higher learning often seek new knowledge and manage their learning from the virtual world. From the concept of personal learning and social learning environment, it is found that personal knowledge management (PKM) processes occurred in this virtual environment, in which opportunities of expanding...
An Information Systems Design Theory is a prescriptive theory that offers theory-based principles, which can guide practitioners and scholars in the design of effective information systems and set an agenda for on-going research. This paper introduces and describes an ISDT for adaptable E-Learning. We formulate our ISDT based on two cycles of Action Design Research. The cycles were conducted in an...
Inductive power transfer technology has proven to be a promising solution for powering implantable heart pumps such as left ventricular assist devices, eliminating the need for a percutaneous driveline and reducing the risk of severe infections significantly. However, the required high power transfer capability of a Transcutaneous Energy Transfer (TET) system raises questions about human safety regarding...
In programmable virtual networks, simple tasks, like installing software, can be extremely complex. This complexity occurs mainly because the code transfer and initial functional settings in network execution environments are not automated. In addition, the same tasks have different requirements in each service lifecycle stage. In this sense, we propose the App2net platform for enabling the transfer...
Crime incidents tend to increase steadily. To effectively respond to the incidents, police officers need to have a highly efficient incident reporting system. However, the telephone-based incident reporting system currently used has some limitations. It cannot cope with current problems and meet all requirements. Since mobile devices, especially smartphones, are prevalent, widely used and can transmit...
A dependable system must be internally consistent. In order to implement a dependable system, any inconsistency in the design of the system must be eliminated before it can be implemented. In this paper, we describe a tool supported inspection method that can help inspectors effectively and efficiently exam the system specification for detecting inconsistency. The underlying inspection principle is...
This work presents a systematic review of state-of-the-art usability heuristics in the area of clinical laboratories, and compiles evaluates usability heuristics customized for clinical laboratory systems by unifying and mapping them. In addition, the resulting set of heuristics is evaluated through a case study comparing results from the application of heuristics and usability tests.
Since 2012, hospitals have spent 37% percent of their budgets on modernization, renovation, and new construction projects. A major cost driver for this spending is the inflexibility of current headwall systems: the central hub for patient monitoring, communications, and equipment [1]. There is a pressing demand for a modern and versatile all-in-one device that provides medical staff with the essential...
This paper aims at presenting the experience of the renewable energy group at the United Arab Emirates University (UAEU) in the organization of the “Engineering Students Renewable Energy Competition (ESREC)” for undergraduate engineering and technical college students in the United Arab Emirates (UAE). The benefits of such competition to students are that it allows them to use and apply the technical...
Game is a kind of software with goal to provide entertainment. However, during the real game development practice, simply adopting the software development life cycle (SDLC) is not enough, as the developers face several challenges during its life cycle. To address the problem, game development uses a kind of specific approach called game development life cycle (GDLC) to direct the game development...
The Web Content Accessibility Guidelines (WCAG) have been used by web developers to develop accessible web pages. However, touch screen accessibility varies with web site accessibility. This research is dedicated to the improvement of accessibility of e-assessment in mobile touch screen for blind users. We chose IMS' Question and Test Interoperability specification (QTI) as a basis to generate the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.