The apparent contradiction between usability and security has been discussed in the literature for several years.This continuous trade-off requires be acknowledging and handling whenever security solutions are introdu...The apparent contradiction between usability and security has been discussed in the literature for several years.This continuous trade-off requires be acknowledging and handling whenever security solutions are introduced.However,some progressive analysts point out that present security solutions are usually very difficult for several users,and they have expressed a willingness to simplify the security product user experience.Usable security is still mostly unexplored territory in computer science.Which we are all aware with security and usability on many levels,usable security has received little operational attention.Companies have recently focused primarily on usable security.As consumers prefer to discard unsatisfactory solutions,attaining well-balanced degrees of both is a prerequisite for adequate security.Usability should be examined from the viewpoint of security to be properly assessed.The aim of this research study is to explore and discuss universally accepted and solutionindependent factors influencing the perceived usable-security of institutional websites.An integrated Hesitant Fuzzy Linguistic term sets based technique was chosen as the methodology,and the experts and academicians opinion were collected.The use of predetermined selection criteria resulted in the compilation of statistical findings and were used to determine the usable-security of five different instituational websites.展开更多
BEIJING,March 12(Xinhua)——China′s development of both 4⁃meter⁃diameter and 5⁃meter⁃diameter reusable rockets is being accelerated,with their inaugural flights scheduled for 2025 and 2026,respectively.The manufactur...BEIJING,March 12(Xinhua)——China′s development of both 4⁃meter⁃diameter and 5⁃meter⁃diameter reusable rockets is being accelerated,with their inaugural flights scheduled for 2025 and 2026,respectively.The manufacturing of these two new large reusable launching vehicle models is a response to growing demand in the commercial space market,said the China Aerospace Science and Technology Corporation.展开更多
Sustainable power sources for outdoor wearable electronics are essential for the continuous operation of wearable devices.However,the current lack of engineering design that can harvest energy regardless of weather co...Sustainable power sources for outdoor wearable electronics are essential for the continuous operation of wearable devices.However,the current lack of engineering design that can harvest energy regardless of weather conditions presents a significant challenge.In this regard,this study introduces a wearable,breathable all-weather usable dual energy harvester(AWuDEH)that can seamlessly generate electrical energy regardless of weather conditions.In this study,the AWuDEH integrated with the thermoelectric generator and the droplet-based electricity generator is demonstrated.The AWuDEH,especially engineered with a bi-functional top substrate for radiative cooling and electrification,achieves sustainable energy harvesting outdoors,thereby addressing the conventional challenge associated with the necessity for separate energy harvesters tailored to outdoor usage contingent on weather conditions.The device reaches a maximum power output of 14.6μW cm^(-2)under simulated sunny conditions and generates a much more enhanced thermoelectric power of 74.78μW cm^(-2)and a droplet-based electric power of 256.25 mW m^(-2)in rainy conditions.As proof,this study developed self-powered wearable electronics capable of acquiring physiological signals in simulated outdoor scenarios.This study presents a promising advancement in wearable technology,offering a potent solution for sustainable energy harvesting independent of weather conditions.展开更多
Starting April 27,the Wuhan Tong public transit card can be used in urban Huangshi,Daye,and Yangxin to take buses.The Wuhan Tong card service also covers the following cities within the Wuhan City Cluster:Ezhou,Xiaoga...Starting April 27,the Wuhan Tong public transit card can be used in urban Huangshi,Daye,and Yangxin to take buses.The Wuhan Tong card service also covers the following cities within the Wuhan City Cluster:Ezhou,Xiaogan,Tianmen,Xiantao,Anlu,Yingcheng,and Hanchuan.展开更多
The Chinese Society of Clinical Oncology Non-small Cell Lung Cancer(CSCO NSCLC)guidelines were first published in 2016,ranking among the earliest-released guidelines within the CSCO series.In 2020 the CSCO published s...The Chinese Society of Clinical Oncology Non-small Cell Lung Cancer(CSCO NSCLC)guidelines were first published in 2016,ranking among the earliest-released guidelines within the CSCO series.In 2020 the CSCO published separate guidelines for NSCLC and small cell lung cancer(SCLC)for the first time to improve clinical usability.展开更多
Objective:To evaluate mobile applications available for patients undergoing assisted reproduction and assess the extent of their clinical validation.Methods:A systematic search was conducted in the Apple App Store and...Objective:To evaluate mobile applications available for patients undergoing assisted reproduction and assess the extent of their clinical validation.Methods:A systematic search was conducted in the Apple App Store and Google Play between September 1,2023 and September 30,2023 to identify mobile applications related to assisted reproduction.Apps were evaluated using the mobile app rating scale(MARS).In parallel,a literature search of PubMed,Scopus,Embase,and Web of Science was performed to identify clinical studies related to mobile applications in assisted reproduction.Clinical validation status and MARS scores were recorded,and findings were synthesized to highlight the gap between commercially available apps and research-based evidence.Results:From 1143 apps screened,11 met the inclusion criteria.Mean MARS score across apps was 3.63,with Leeaf scoring the highest(4.60).However,only one application(Embie)was supported by published research.The literature research identified 13 relevant studies,mostly randomized controlled trials,cohort studies,or usability studies.While research-based apps demonstrated clinical utility(e.g.,MediEmo,PreLiFe,Patient Journey App),most were unavailable on app stores.This revealed a disconnect between research-backed applications and those accessible to patients.Conclusions:Although several mobile apps for assisted reproduction demonstrate high usability and quality,few are clinically validated.The lack of integration between research and practice highlights the need for stronger collaboration between researchers,developers,and policymakers to ensure that patients access safe and effective tools.展开更多
Background Schizophrenia is characterised by pervasive cognitive deficits that significantly impair daily functioning and quality of life.Pharmacological treatments have limited efficacy in addressing these deficits,h...Background Schizophrenia is characterised by pervasive cognitive deficits that significantly impair daily functioning and quality of life.Pharmacological treatments have limited efficacy in addressing these deficits,highlighting the need for adjunctive interventions like computerised cognitive training(CCT).Aims This study aimed to evaluate the effects of a 30-session CCT programme on mental well-being and cognitive performance in individuals with schizophrenia.Additionally,it assessed the usability and acceptability of CCT in this population.Methods A double-blind,randomised clinical trial was conducted with 54 participants assigned to intervention and control groups.Cognitive and mental health outcomes were assessed using validated tools such as the Depression Anxiety Stress Scale 21,the Warwick-Edinburgh Mental Wellbeing Scale and the Cambridge Neuropsychological Test Automated Battery.Usability was measured with the System Usability Scale(SUS).Assessments were conducted at baseline,post-intervention and 3 months post-follow-up.Results The CCT intervention significantly improved mental well-being,reduced stress and enhanced working memory(paired associate learning,spatial working memory and spatial span)compared with controls.However,no significant effects were observed for anxiety,depression or executive function.Usability scores were high(SUS=83.51),and compliance rates were strong(92.7%),indicating favourable participant engagement.Conclusion CCT demonstrated potential as an adjunctive treatment for schizophrenia,with significant improvements in targeted cognitive and mental health domains.The high usability and compliance rates support its feasibility for broader implementation.Further research is needed to optimise protocols and explore long-term benefits.CCT offers a promising approach to addressing mental health and cognitive challenges in schizophrenia,particularly for stress and working memory.Its usability and acceptability suggest it could be seamlessly integrated into clinical practice.展开更多
This manuscript critically evaluates the randomized controlled trial(RCT)conducted by Phiri et al,which assessed the effectiveness of virtual reality(VR)training for psychiatric staff in reducing restrictive practices...This manuscript critically evaluates the randomized controlled trial(RCT)conducted by Phiri et al,which assessed the effectiveness of virtual reality(VR)training for psychiatric staff in reducing restrictive practices(RPs).Specifically,this RCT investigated the impact of VR on the handling of aggressive patients by psychiatric staff compared to traditional training methods.Despite significant reductions in perceived discrimination in the VR group,there were no major improvements in self-efficacy or anxiety levels.The system usability scale rated the VR platform highly,but it did not consistently outperform traditional training methods.Indeed,the study shows the potential for VR to reduce RPs,although fluctuations in RP rates suggest that external factors,such as staff turnover,influenced the outcomes.This manuscript evaluates the study’s methodology,results,and broader implications for mental health training.Additionally,it highlights the need for more comprehensive research to establish VR as a standard tool for psychiatric staff education,focusing on patient care outcomes and real-world applicability.Finally,this study explores future research di-rections,technological improvements,and the potential impact of policies that could enhance the integration of VR in clinical training.展开更多
This study takes children as the research subjects to explore the rationality of integrating food and agriculture education with serious games,thereby consolidating children’s agricultural knowledge,fostering agricul...This study takes children as the research subjects to explore the rationality of integrating food and agriculture education with serious games,thereby consolidating children’s agricultural knowledge,fostering agricultural skills,and developing healthy eating habits.Based on the game mechanics of serious games,combined with children’s cognitive and behavioral characteristics,this study identifies the core indicators of food and agriculture education,refines them into specific design elements,constructs a serious game design model for children’s food and agriculture education,and conducts usability evaluation through the design of corresponding game interfaces.The contextual and incentive properties of serious game mechanics are crucial factors in enhancing children’s acquisition of food and agriculture knowledge,skills,and healthy eating habits.The game design integrating food and agriculture education with serious games can significantly improve the level of children’s food and agriculture education,and has important guiding value for promoting the design and development of children’s educational games.展开更多
River corridors, even if highly modified or degraded, still provide important habitats for numerous biological species, and carry high aesthetic and economic values. One of the keys to urban stream restoration is reco...River corridors, even if highly modified or degraded, still provide important habitats for numerous biological species, and carry high aesthetic and economic values. One of the keys to urban stream restoration is recovery and maintenance of ecological flows sufficient to sustain aquatic ecosystems. In this study, the Hongje Stream in the Seoul metropolitan area of Korea was selected for evaluating a physically-based habitat with and without habitat structures. The potential value of the aquatic habitat was evaluated by a weighted usable area (WUA) using River2D, a two-dimensional hydraulic model. The habitat suitability for Zacco platypus in the Hongje Stream was simulated with and without habitat structures. The computed WUA values for the boulder, spur dike, and riffle increased by about 2%, 7%, and 131%, respectively, after their construction. Also, the three habitat structures, especially the riffle, can contribute to increasing hydraulic heterogeneity and enhancing habitat diversity.展开更多
In this paper we investigate the effectiveness of ensemble-based learners for web robot session identification from web server logs. We also perform multi fold robot session labeling to improve the performance of lear...In this paper we investigate the effectiveness of ensemble-based learners for web robot session identification from web server logs. We also perform multi fold robot session labeling to improve the performance of learner. We conduct a comparative study for various ensemble methods (Bagging, Boosting, and Voting) with simple classifiers in perspective of classification. We also evaluate the effectiveness of these classifiers (both ensemble and simple) on five different data sets of varying session length. Presently the results of web server log analyzers are not very much reliable because the input log files are highly inflated by sessions of automated web traverse software’s, known as web robots. Presence of web robots access traffic entries in web server log repositories imposes a great challenge to extract any actionable and usable knowledge about browsing behavior of actual visitors. So web robots sessions need accurate and fast detection from web server log repositories to extract knowledge about genuine visitors and to produce correct results of log analyzers.展开更多
This paper presents the systematic Summation of the investigation and the re-examination results,and the overall analysis of the quntity, quality, distribution, principle and way of development of water resource in Sa...This paper presents the systematic Summation of the investigation and the re-examination results,and the overall analysis of the quntity, quality, distribution, principle and way of development of water resource in Sanjiang plain.展开更多
With the background of offshore wind energy projects, this paper studies aerodynamic performance and geometric characteristics of large capacity wind turbine rotors (1 to 10 MW), and the main characteristic paramete...With the background of offshore wind energy projects, this paper studies aerodynamic performance and geometric characteristics of large capacity wind turbine rotors (1 to 10 MW), and the main characteristic parameters such as the rated wind speed, blade tip speed, and rotor solidity. We show that the essential criterion of a high- performance wind turbine is a highest possible annual usable energy pattern factor and a smallest possible dimension, capturing the maximum wind energy and producing the maximum annual power. The influence of the above-mentioned three parameters on the pattern factor and rotor geometry of wind turbine operated in China's offshore meteoro- logical environment is investigated. The variation patterns of aerodynamic and geometric parameters are obtained, analyzed, and compared with each other. The present method for aerodynamic analysis and its results can form a basis for evaluating aerodynamic performance of large-scale offshore wind turbine rotors.展开更多
With continuous evolution in software industry, security is becoming very important in software projects. However, in many development methodologies, security is thought to be added in the project at later stages of t...With continuous evolution in software industry, security is becoming very important in software projects. However, in many development methodologies, security is thought to be added in the project at later stages of the development lifecycle. There are also many proposed methodologies where the security measures are considered at requirement engineering stage of the development lifecycle, but many of them still do not seem adequate for applicability due to the reason that these approaches do not provide sufficient support for mapping the security requirements to the later stages of development. So, we are in need of a software requirement engineering approach, which is not only helpful in security requirement specification at requirement engineering stage but also provides support for using the specified security requirements at later stages of development. To meet this requirement, we introduce a new method Secure and Traceable Requirement Engineering Process (STREP). This method also helps the non-security-expert requirement engineers to specify requirements in such a way that the specified requirements can be used to derive security related test cases. STREP method not only deals with security issues of the system at requirement engineering stage, but also makes the security requirements more traceable to be used at later stages of development lifecycle, and as a result, secure systems are produced that are also usable as the customer wishes.展开更多
The recent explosion of biological data and the concomitant proliferation of distributed databases make it challenging for biologists and bioinformaticians to discover the best data resources for their needs, and the ...The recent explosion of biological data and the concomitant proliferation of distributed databases make it challenging for biologists and bioinformaticians to discover the best data resources for their needs, and the most efficient way to access and use them For the biologist, running bioinformatics analyses involve a time-consuming management of data and tools. Users need support to organize their work, retrieve parameters and reproduce their analyses. They also need to be able to combine their analytic tools using a safe data flow software mechanism. Finally we have designed a system, Bioinfo-Portal, to provide a flexible and usable web environment for defining and running bioinformatics analyses. It embeds simple yet powerful data management features that allow the user to reproduce analyses and to combine tools using an adobe flex tool. Bioinfo-Portal can also act as a front end to provide a unified view of already-existing collections of bioinformatics resources. Users can analyze genomic and proteomic data by using the tools that has been integrated in the portal (tools for alignments, dotplots, motif detection, domain analysis, profile searching and tertiary structure prediction). The sequences that user obtained from portal's nucleotide and protein databases are easily analyzed by the portal tools on the same interface in no time. User can also take benefit from the animations.展开更多
Source:MIT Technology ntroduction Not all breakthroughs are created equal.Some arrive more or less as usable things;others mainly set the stage for innovations that emerge later,and we have to estimate when that will ...Source:MIT Technology ntroduction Not all breakthroughs are created equal.Some arrive more or less as usable things;others mainly set the stage for innovations that emerge later,and we have to estimate when that will be.But we’d bet that every one of the milestones on this list will be worth following in the coming years.1.Magic展开更多
In 1803, the USA paid France $15,000,000 for the Louisiana Territory(地域, 领土), an area more than four times the size of France. The land which was bought included everything between the Rocky Mountains and the Miss...In 1803, the USA paid France $15,000,000 for the Louisiana Territory(地域, 领土), an area more than four times the size of France. The land which was bought included everything between the Rocky Mountains and the Mississippi River except Texas. The main port for the second longest river system in the world was within this territory. Although few realized it at that time, the purchase included the vast forests of Arkansas and Minnesota, the oilfields of Oklahoma, the cornfields of Iowa, the wheat lands of the Dakotas, the copper, silver, and gold of Colorado and Montana, the rice and sugar of Louisiana. Without doubt, the Louisiana Purchase was one of the greatest events in the history of the United States. In a single action, as planned, a thirdclass nation successfully doubled its size, united its states and population, and became a great power in the world.展开更多
Most of the security strategies today are primarily designed to provide security protection,rather than to solve one of the basic security issues related to adequate software product architecture.Several models,framew...Most of the security strategies today are primarily designed to provide security protection,rather than to solve one of the basic security issues related to adequate software product architecture.Several models,frameworks and methodologies have been introduced by the researchers for a secure and sustainable software development life cycle.Therefore it is important to assess the usability of the popular security requirements engineering(SRE)approaches.A significant factor in the management and handling of successful security requirements is the assessment of security requirements engineering method performance.This assessment will allow changes to the engineering process of security requirements.The consistency of security requirements depends heavily on the usability of security requirements engineering.Several SRE approaches are available for use and each approach takes into account several factors of usability but does not cover every element of usability.There seems to be no realistic implementation of such models because the concept of usability is not specific.This paper aims at specifying the different taxonomy of usability and design hierarchical usability model.The taxonomy takes into account the common quality assessment parameters that combine variables,attributes,and characteristics identified in different approaches used for security requirements engineering.The multiple-criteria decision-making(MCDM)model used in this paper for usability evaluation is called the fuzzy AHP-TOPSIS model which can conveniently be incorporated into the current approach of software engineering.Five significant usability criteria are identified and used to evaluate the six different alternatives.Such strategies are graded as per their expected values of usability.展开更多
基金Funding for this study was received from the Deanship of Scientific Research(DSR)at King Abdulaziz University,Jeddah,Kingdom of Saudi Arabia under the Grant No.G:095-611-14422.
文摘The apparent contradiction between usability and security has been discussed in the literature for several years.This continuous trade-off requires be acknowledging and handling whenever security solutions are introduced.However,some progressive analysts point out that present security solutions are usually very difficult for several users,and they have expressed a willingness to simplify the security product user experience.Usable security is still mostly unexplored territory in computer science.Which we are all aware with security and usability on many levels,usable security has received little operational attention.Companies have recently focused primarily on usable security.As consumers prefer to discard unsatisfactory solutions,attaining well-balanced degrees of both is a prerequisite for adequate security.Usability should be examined from the viewpoint of security to be properly assessed.The aim of this research study is to explore and discuss universally accepted and solutionindependent factors influencing the perceived usable-security of institutional websites.An integrated Hesitant Fuzzy Linguistic term sets based technique was chosen as the methodology,and the experts and academicians opinion were collected.The use of predetermined selection criteria resulted in the compilation of statistical findings and were used to determine the usable-security of five different instituational websites.
文摘BEIJING,March 12(Xinhua)——China′s development of both 4⁃meter⁃diameter and 5⁃meter⁃diameter reusable rockets is being accelerated,with their inaugural flights scheduled for 2025 and 2026,respectively.The manufacturing of these two new large reusable launching vehicle models is a response to growing demand in the commercial space market,said the China Aerospace Science and Technology Corporation.
基金supported by the National Research Foundation of Korea(NRF)(RS-2024-00343512,RS-2024-00416938).
文摘Sustainable power sources for outdoor wearable electronics are essential for the continuous operation of wearable devices.However,the current lack of engineering design that can harvest energy regardless of weather conditions presents a significant challenge.In this regard,this study introduces a wearable,breathable all-weather usable dual energy harvester(AWuDEH)that can seamlessly generate electrical energy regardless of weather conditions.In this study,the AWuDEH integrated with the thermoelectric generator and the droplet-based electricity generator is demonstrated.The AWuDEH,especially engineered with a bi-functional top substrate for radiative cooling and electrification,achieves sustainable energy harvesting outdoors,thereby addressing the conventional challenge associated with the necessity for separate energy harvesters tailored to outdoor usage contingent on weather conditions.The device reaches a maximum power output of 14.6μW cm^(-2)under simulated sunny conditions and generates a much more enhanced thermoelectric power of 74.78μW cm^(-2)and a droplet-based electric power of 256.25 mW m^(-2)in rainy conditions.As proof,this study developed self-powered wearable electronics capable of acquiring physiological signals in simulated outdoor scenarios.This study presents a promising advancement in wearable technology,offering a potent solution for sustainable energy harvesting independent of weather conditions.
文摘Starting April 27,the Wuhan Tong public transit card can be used in urban Huangshi,Daye,and Yangxin to take buses.The Wuhan Tong card service also covers the following cities within the Wuhan City Cluster:Ezhou,Xiaogan,Tianmen,Xiantao,Anlu,Yingcheng,and Hanchuan.
文摘The Chinese Society of Clinical Oncology Non-small Cell Lung Cancer(CSCO NSCLC)guidelines were first published in 2016,ranking among the earliest-released guidelines within the CSCO series.In 2020 the CSCO published separate guidelines for NSCLC and small cell lung cancer(SCLC)for the first time to improve clinical usability.
基金funded by Vietnam National University Ho Chi Minh City(VNU-HCM)under grant number NCM2020-28-01.
文摘Objective:To evaluate mobile applications available for patients undergoing assisted reproduction and assess the extent of their clinical validation.Methods:A systematic search was conducted in the Apple App Store and Google Play between September 1,2023 and September 30,2023 to identify mobile applications related to assisted reproduction.Apps were evaluated using the mobile app rating scale(MARS).In parallel,a literature search of PubMed,Scopus,Embase,and Web of Science was performed to identify clinical studies related to mobile applications in assisted reproduction.Clinical validation status and MARS scores were recorded,and findings were synthesized to highlight the gap between commercially available apps and research-based evidence.Results:From 1143 apps screened,11 met the inclusion criteria.Mean MARS score across apps was 3.63,with Leeaf scoring the highest(4.60).However,only one application(Embie)was supported by published research.The literature research identified 13 relevant studies,mostly randomized controlled trials,cohort studies,or usability studies.While research-based apps demonstrated clinical utility(e.g.,MediEmo,PreLiFe,Patient Journey App),most were unavailable on app stores.This revealed a disconnect between research-backed applications and those accessible to patients.Conclusions:Although several mobile apps for assisted reproduction demonstrate high usability and quality,few are clinically validated.The lack of integration between research and practice highlights the need for stronger collaboration between researchers,developers,and policymakers to ensure that patients access safe and effective tools.
基金supported by a grant from University of Social Welfare and Rehabilitation Sciences for the research expenses.
文摘Background Schizophrenia is characterised by pervasive cognitive deficits that significantly impair daily functioning and quality of life.Pharmacological treatments have limited efficacy in addressing these deficits,highlighting the need for adjunctive interventions like computerised cognitive training(CCT).Aims This study aimed to evaluate the effects of a 30-session CCT programme on mental well-being and cognitive performance in individuals with schizophrenia.Additionally,it assessed the usability and acceptability of CCT in this population.Methods A double-blind,randomised clinical trial was conducted with 54 participants assigned to intervention and control groups.Cognitive and mental health outcomes were assessed using validated tools such as the Depression Anxiety Stress Scale 21,the Warwick-Edinburgh Mental Wellbeing Scale and the Cambridge Neuropsychological Test Automated Battery.Usability was measured with the System Usability Scale(SUS).Assessments were conducted at baseline,post-intervention and 3 months post-follow-up.Results The CCT intervention significantly improved mental well-being,reduced stress and enhanced working memory(paired associate learning,spatial working memory and spatial span)compared with controls.However,no significant effects were observed for anxiety,depression or executive function.Usability scores were high(SUS=83.51),and compliance rates were strong(92.7%),indicating favourable participant engagement.Conclusion CCT demonstrated potential as an adjunctive treatment for schizophrenia,with significant improvements in targeted cognitive and mental health domains.The high usability and compliance rates support its feasibility for broader implementation.Further research is needed to optimise protocols and explore long-term benefits.CCT offers a promising approach to addressing mental health and cognitive challenges in schizophrenia,particularly for stress and working memory.Its usability and acceptability suggest it could be seamlessly integrated into clinical practice.
基金Supported by Basic Science Research Program Through the National Research Foundation of Korea(NRF)Funded by the Ministry of Education,No.NRF-RS-2023-00237287 and No.NRF-2021S1A5A8062526Local Government-University Cooperation-Based Regional Innovation Projects,No.2021RIS-003.
文摘This manuscript critically evaluates the randomized controlled trial(RCT)conducted by Phiri et al,which assessed the effectiveness of virtual reality(VR)training for psychiatric staff in reducing restrictive practices(RPs).Specifically,this RCT investigated the impact of VR on the handling of aggressive patients by psychiatric staff compared to traditional training methods.Despite significant reductions in perceived discrimination in the VR group,there were no major improvements in self-efficacy or anxiety levels.The system usability scale rated the VR platform highly,but it did not consistently outperform traditional training methods.Indeed,the study shows the potential for VR to reduce RPs,although fluctuations in RP rates suggest that external factors,such as staff turnover,influenced the outcomes.This manuscript evaluates the study’s methodology,results,and broader implications for mental health training.Additionally,it highlights the need for more comprehensive research to establish VR as a standard tool for psychiatric staff education,focusing on patient care outcomes and real-world applicability.Finally,this study explores future research di-rections,technological improvements,and the potential impact of policies that could enhance the integration of VR in clinical training.
文摘This study takes children as the research subjects to explore the rationality of integrating food and agriculture education with serious games,thereby consolidating children’s agricultural knowledge,fostering agricultural skills,and developing healthy eating habits.Based on the game mechanics of serious games,combined with children’s cognitive and behavioral characteristics,this study identifies the core indicators of food and agriculture education,refines them into specific design elements,constructs a serious game design model for children’s food and agriculture education,and conducts usability evaluation through the design of corresponding game interfaces.The contextual and incentive properties of serious game mechanics are crucial factors in enhancing children’s acquisition of food and agriculture knowledge,skills,and healthy eating habits.The game design integrating food and agriculture education with serious games can significantly improve the level of children’s food and agriculture education,and has important guiding value for promoting the design and development of children’s educational games.
文摘River corridors, even if highly modified or degraded, still provide important habitats for numerous biological species, and carry high aesthetic and economic values. One of the keys to urban stream restoration is recovery and maintenance of ecological flows sufficient to sustain aquatic ecosystems. In this study, the Hongje Stream in the Seoul metropolitan area of Korea was selected for evaluating a physically-based habitat with and without habitat structures. The potential value of the aquatic habitat was evaluated by a weighted usable area (WUA) using River2D, a two-dimensional hydraulic model. The habitat suitability for Zacco platypus in the Hongje Stream was simulated with and without habitat structures. The computed WUA values for the boulder, spur dike, and riffle increased by about 2%, 7%, and 131%, respectively, after their construction. Also, the three habitat structures, especially the riffle, can contribute to increasing hydraulic heterogeneity and enhancing habitat diversity.
文摘In this paper we investigate the effectiveness of ensemble-based learners for web robot session identification from web server logs. We also perform multi fold robot session labeling to improve the performance of learner. We conduct a comparative study for various ensemble methods (Bagging, Boosting, and Voting) with simple classifiers in perspective of classification. We also evaluate the effectiveness of these classifiers (both ensemble and simple) on five different data sets of varying session length. Presently the results of web server log analyzers are not very much reliable because the input log files are highly inflated by sessions of automated web traverse software’s, known as web robots. Presence of web robots access traffic entries in web server log repositories imposes a great challenge to extract any actionable and usable knowledge about browsing behavior of actual visitors. So web robots sessions need accurate and fast detection from web server log repositories to extract knowledge about genuine visitors and to produce correct results of log analyzers.
文摘This paper presents the systematic Summation of the investigation and the re-examination results,and the overall analysis of the quntity, quality, distribution, principle and way of development of water resource in Sanjiang plain.
基金supported by the National Basic Research Program of China (973 Program) (No. 2007CB714605)
文摘With the background of offshore wind energy projects, this paper studies aerodynamic performance and geometric characteristics of large capacity wind turbine rotors (1 to 10 MW), and the main characteristic parameters such as the rated wind speed, blade tip speed, and rotor solidity. We show that the essential criterion of a high- performance wind turbine is a highest possible annual usable energy pattern factor and a smallest possible dimension, capturing the maximum wind energy and producing the maximum annual power. The influence of the above-mentioned three parameters on the pattern factor and rotor geometry of wind turbine operated in China's offshore meteoro- logical environment is investigated. The variation patterns of aerodynamic and geometric parameters are obtained, analyzed, and compared with each other. The present method for aerodynamic analysis and its results can form a basis for evaluating aerodynamic performance of large-scale offshore wind turbine rotors.
文摘With continuous evolution in software industry, security is becoming very important in software projects. However, in many development methodologies, security is thought to be added in the project at later stages of the development lifecycle. There are also many proposed methodologies where the security measures are considered at requirement engineering stage of the development lifecycle, but many of them still do not seem adequate for applicability due to the reason that these approaches do not provide sufficient support for mapping the security requirements to the later stages of development. So, we are in need of a software requirement engineering approach, which is not only helpful in security requirement specification at requirement engineering stage but also provides support for using the specified security requirements at later stages of development. To meet this requirement, we introduce a new method Secure and Traceable Requirement Engineering Process (STREP). This method also helps the non-security-expert requirement engineers to specify requirements in such a way that the specified requirements can be used to derive security related test cases. STREP method not only deals with security issues of the system at requirement engineering stage, but also makes the security requirements more traceable to be used at later stages of development lifecycle, and as a result, secure systems are produced that are also usable as the customer wishes.
文摘The recent explosion of biological data and the concomitant proliferation of distributed databases make it challenging for biologists and bioinformaticians to discover the best data resources for their needs, and the most efficient way to access and use them For the biologist, running bioinformatics analyses involve a time-consuming management of data and tools. Users need support to organize their work, retrieve parameters and reproduce their analyses. They also need to be able to combine their analytic tools using a safe data flow software mechanism. Finally we have designed a system, Bioinfo-Portal, to provide a flexible and usable web environment for defining and running bioinformatics analyses. It embeds simple yet powerful data management features that allow the user to reproduce analyses and to combine tools using an adobe flex tool. Bioinfo-Portal can also act as a front end to provide a unified view of already-existing collections of bioinformatics resources. Users can analyze genomic and proteomic data by using the tools that has been integrated in the portal (tools for alignments, dotplots, motif detection, domain analysis, profile searching and tertiary structure prediction). The sequences that user obtained from portal's nucleotide and protein databases are easily analyzed by the portal tools on the same interface in no time. User can also take benefit from the animations.
文摘Source:MIT Technology ntroduction Not all breakthroughs are created equal.Some arrive more or less as usable things;others mainly set the stage for innovations that emerge later,and we have to estimate when that will be.But we’d bet that every one of the milestones on this list will be worth following in the coming years.1.Magic
文摘In 1803, the USA paid France $15,000,000 for the Louisiana Territory(地域, 领土), an area more than four times the size of France. The land which was bought included everything between the Rocky Mountains and the Mississippi River except Texas. The main port for the second longest river system in the world was within this territory. Although few realized it at that time, the purchase included the vast forests of Arkansas and Minnesota, the oilfields of Oklahoma, the cornfields of Iowa, the wheat lands of the Dakotas, the copper, silver, and gold of Colorado and Montana, the rice and sugar of Louisiana. Without doubt, the Louisiana Purchase was one of the greatest events in the history of the United States. In a single action, as planned, a thirdclass nation successfully doubled its size, united its states and population, and became a great power in the world.
基金Funding for this study is received from the Ministry of Education and Deanship of Scientific Research at King Abdulaziz University,Kingdom of Saudi Arabia under Grant No.IFPHI-269-611-2020.
文摘Most of the security strategies today are primarily designed to provide security protection,rather than to solve one of the basic security issues related to adequate software product architecture.Several models,frameworks and methodologies have been introduced by the researchers for a secure and sustainable software development life cycle.Therefore it is important to assess the usability of the popular security requirements engineering(SRE)approaches.A significant factor in the management and handling of successful security requirements is the assessment of security requirements engineering method performance.This assessment will allow changes to the engineering process of security requirements.The consistency of security requirements depends heavily on the usability of security requirements engineering.Several SRE approaches are available for use and each approach takes into account several factors of usability but does not cover every element of usability.There seems to be no realistic implementation of such models because the concept of usability is not specific.This paper aims at specifying the different taxonomy of usability and design hierarchical usability model.The taxonomy takes into account the common quality assessment parameters that combine variables,attributes,and characteristics identified in different approaches used for security requirements engineering.The multiple-criteria decision-making(MCDM)model used in this paper for usability evaluation is called the fuzzy AHP-TOPSIS model which can conveniently be incorporated into the current approach of software engineering.Five significant usability criteria are identified and used to evaluate the six different alternatives.Such strategies are graded as per their expected values of usability.