首页 > 最新文献

Computer Standards & Interfaces最新文献

英文 中文
Who are the best contributors? Designing a multimodal science communication interface based on the ECM, TAM and the Taguchi methods 谁是最佳贡献者?基于 ECM、TAM 和田口方法设计多模式科学传播界面
IF 4.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-29 DOI: 10.1016/j.csi.2024.103921
Mengjun Huang , Yue Luo , Jiwei He , Ling Zhen , Lianfan Wu , Yang Zhang

Science communication conducted through mobile devices and mobile applications is an efficient and widespread phenomenon that requires communicators and design practitioners to further develop suitable design elements and strategies for such platforms. The effective application of multimodal or multisensory design in interfaces provides users with rich experiences. However, there is a lack of guiding recommendations for user interface design in the citizen science community. This study investigated factors affecting users’ perceptions and behavioral intentions toward multimodal scientific communication interface designs and identified the optimal combinations of such factors for such designs. Through a focus group, we defined three design dimensions of a science communication interface: visual, auditory, and haptic. An online experiment involving 916 participants was then conducted and integrated the technology acceptance model, expectation–confirmation model, and Taguchi method to examine the hierarchical combinations with the greatest influence in each dimension. The results indicated that interface design combinations primarily focusing on visual elements, with auditory and haptic as secondary elements, can serve as effective tools for science communication. Moreover, layout, color tones, vibration intensity, and sound volume significantly affected users’ perceptions and behavioral intentions. As one of the few studies using the Taguchi method to explore the design of science communication interfaces, the present findings enrich the multimodal theory from the perspectives of design and communication, highlighting its value in science communication. This paper simultaneously provides insights into how to select and combine multimodal design elements in science communication interfaces, demonstrating the potential of such designs to affect a user perception, satisfaction, confirmation, and continued usage intention.

通过移动设备和移动应用程序进行科学传播是一种高效而普遍的现象,这就要求传播者和设计从业者进一步为这类平台开发合适的设计元素和策略。多模态或多感官设计在界面中的有效应用为用户提供了丰富的体验。然而,公民科学界缺乏用户界面设计的指导性建议。本研究调查了影响用户对多模态科学交流界面设计的看法和行为意向的因素,并确定了这些因素在此类设计中的最佳组合。通过焦点小组,我们定义了科学交流界面的三个设计维度:视觉、听觉和触觉。然后,我们进行了一项有 916 名参与者参与的在线实验,并将技术接受模型、期望-确认模型和田口方法结合起来,研究了对每个维度影响最大的层次组合。结果表明,以视觉元素为主,听觉和触觉为辅的界面设计组合可作为科学交流的有效工具。此外,布局、色调、振动强度和音量也对用户的感知和行为意图产生了重大影响。作为为数不多的使用田口方法探讨科学传播界面设计的研究之一,本研究结果从设计和传播的角度丰富了多模态理论,凸显了其在科学传播中的价值。同时,本文还就如何在科学传播界面中选择和组合多模态设计元素提供了见解,展示了此类设计影响用户感知、满意度、确认度和持续使用意向的潜力。
{"title":"Who are the best contributors? Designing a multimodal science communication interface based on the ECM, TAM and the Taguchi methods","authors":"Mengjun Huang ,&nbsp;Yue Luo ,&nbsp;Jiwei He ,&nbsp;Ling Zhen ,&nbsp;Lianfan Wu ,&nbsp;Yang Zhang","doi":"10.1016/j.csi.2024.103921","DOIUrl":"10.1016/j.csi.2024.103921","url":null,"abstract":"<div><p>Science communication conducted through mobile devices and mobile applications is an efficient and widespread phenomenon that requires communicators and design practitioners to further develop suitable design elements and strategies for such platforms. The effective application of multimodal or multisensory design in interfaces provides users with rich experiences. However, there is a lack of guiding recommendations for user interface design in the citizen science community. This study investigated factors affecting users’ perceptions and behavioral intentions toward multimodal scientific communication interface designs and identified the optimal combinations of such factors for such designs. Through a focus group, we defined three design dimensions of a science communication interface: visual, auditory, and haptic. An online experiment involving 916 participants was then conducted and integrated the technology acceptance model, expectation–confirmation model, and Taguchi method to examine the hierarchical combinations with the greatest influence in each dimension. The results indicated that interface design combinations primarily focusing on visual elements, with auditory and haptic as secondary elements, can serve as effective tools for science communication. Moreover, layout, color tones, vibration intensity, and sound volume significantly affected users’ perceptions and behavioral intentions. As one of the few studies using the Taguchi method to explore the design of science communication interfaces, the present findings enrich the multimodal theory from the perspectives of design and communication, highlighting its value in science communication. This paper simultaneously provides insights into how to select and combine multimodal design elements in science communication interfaces, demonstrating the potential of such designs to affect a user perception, satisfaction, confirmation, and continued usage intention.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"92 ","pages":"Article 103921"},"PeriodicalIF":4.1,"publicationDate":"2024-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142151244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A cellular automata based secured reversible data hiding scheme for dual images using bit-reversal permutation technique 基于蜂窝自动机的双图像安全可逆数据隐藏方案(使用比特反向置换技术
IF 4.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-26 DOI: 10.1016/j.csi.2024.103919
Kankana Datta , Biswapati Jana , Mamata Dalui Chakraborty

With the rapid development of advanced communication technology, protection of confidential data during transmission through public channel has become a challenging issue. In this context, the design of a data hiding scheme needs to ensure reversibility, robustness against various malicious attacks, and unaltered visual quality even after embedding high amount of secret data. To meet the above requirements, Cellular Automata along with Bit-Reversal Permutation technique have been utilized on dual-image with the target to enhance the robustness of suggested scheme due to distribution of secret information within two stego images which is hard to extract without both stego simultaneously. The proposed scheme makes a trade-off among visual quality, security and embedding capacity as essential for ensuring innocuous communication. The experimental results and comparison with the state-of-art methods establishes that the proposed scheme ensures high degree of robustness against different venomous attacks. This approach may be beneficial to private and public sector practitioners and government agencies to protect valuable multimedia secret data from adversarial cyber attacks.

随着先进通信技术的飞速发展,在公共信道传输过程中保护机密数据已成为一个具有挑战性的问题。在这种情况下,数据隐藏方案的设计需要确保可逆性、对各种恶意攻击的鲁棒性,以及即使嵌入大量秘密数据后仍保持不变的视觉质量。为了满足上述要求,我们在双图像上使用了蜂窝自动机和比特反向置换技术,目的是增强建议方案的鲁棒性,因为秘密信息分布在两张偷窃图像中,如果没有两张偷窃图像同时存在,就很难提取出来。所建议的方案在视觉质量、安全性和嵌入能力之间进行了权衡,这对于确保无害通信至关重要。实验结果以及与最先进方法的比较表明,所提出的方案可确保对不同毒液攻击的高度鲁棒性。这种方法可能有利于私营和公共部门从业人员以及政府机构保护有价值的多媒体秘密数据免受对抗性网络攻击。
{"title":"A cellular automata based secured reversible data hiding scheme for dual images using bit-reversal permutation technique","authors":"Kankana Datta ,&nbsp;Biswapati Jana ,&nbsp;Mamata Dalui Chakraborty","doi":"10.1016/j.csi.2024.103919","DOIUrl":"10.1016/j.csi.2024.103919","url":null,"abstract":"<div><p>With the rapid development of advanced communication technology, protection of confidential data during transmission through public channel has become a challenging issue. In this context, the design of a data hiding scheme needs to ensure reversibility, robustness against various malicious attacks, and unaltered visual quality even after embedding high amount of secret data. To meet the above requirements, Cellular Automata along with Bit-Reversal Permutation technique have been utilized on dual-image with the target to enhance the robustness of suggested scheme due to distribution of secret information within two stego images which is hard to extract without both stego simultaneously. The proposed scheme makes a trade-off among visual quality, security and embedding capacity as essential for ensuring innocuous communication. The experimental results and comparison with the state-of-art methods establishes that the proposed scheme ensures high degree of robustness against different venomous attacks. This approach may be beneficial to private and public sector practitioners and government agencies to protect valuable multimedia secret data from adversarial cyber attacks.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"92 ","pages":"Article 103919"},"PeriodicalIF":4.1,"publicationDate":"2024-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142087777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Authentication communication by using visualization cryptography for UAV networks 利用可视化加密技术进行无人机网络验证通信
IF 4.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-18 DOI: 10.1016/j.csi.2024.103918
Aqeel Thamer Jawad , Rihab Maaloul , Lamia Chaari

Utilizing unmanned aerial vehicles (UAVs) to support V2X requirements leverages their versatility and line-of-sight communication. Our prior work explored a multi-agent learning approach for resource optimization, maximizing task offloading while maintaining QoS. This paper focuses on securing UAV communication, particularly authentication. Traditional methods are often unsuitable due to UAV limitations. We propose a novel authentication mechanism for a single ground control station (GCS) interacting with multiple UAVs across flight sessions. The system utilizes a key generation method based on chaotic maps to create unique flight session keys for each pre-defined flight plan. These keys, along with flight plans, are registered in a secure database. During flight, the GCS verifies UAV identity by employing the flight session key and corresponding flight plan for message authentication. This approach reduces computational and communication overhead compared to traditional certificate exchanges and asymmetric cryptography, which are energy-intensive for UAVs. While not a comprehensive security solution, this method provides an initial layer of protection for the UAV network.

利用无人飞行器(UAV)来支持 V2X 要求,可充分利用其多功能性和视距通信。我们之前的工作探索了一种用于资源优化的多代理学习方法,在保持服务质量的同时最大限度地卸载任务。本文重点关注无人机通信安全,尤其是身份验证。由于无人机的局限性,传统方法往往不适用。我们为单个地面控制站(GCS)与多架无人机在飞行会话中的交互提出了一种新型认证机制。该系统利用基于混沌图的密钥生成方法,为每个预定义的飞行计划创建唯一的飞行会话密钥。这些密钥与飞行计划一起注册到安全数据库中。在飞行过程中,GCS 通过使用飞行会话密钥和相应的飞行计划来验证无人机身份。与传统的证书交换和非对称加密技术相比,这种方法减少了计算和通信开销,而传统的证书交换和非对称加密技术对无人机来说是能源密集型的。虽然这不是一个全面的安全解决方案,但这种方法为无人机网络提供了一个初始保护层。
{"title":"Authentication communication by using visualization cryptography for UAV networks","authors":"Aqeel Thamer Jawad ,&nbsp;Rihab Maaloul ,&nbsp;Lamia Chaari","doi":"10.1016/j.csi.2024.103918","DOIUrl":"10.1016/j.csi.2024.103918","url":null,"abstract":"<div><p>Utilizing unmanned aerial vehicles (UAVs) to support V2X requirements leverages their versatility and line-of-sight communication. Our prior work explored a multi-agent learning approach for resource optimization, maximizing task offloading while maintaining QoS. This paper focuses on securing UAV communication, particularly authentication. Traditional methods are often unsuitable due to UAV limitations. We propose a novel authentication mechanism for a single ground control station (GCS) interacting with multiple UAVs across flight sessions. The system utilizes a key generation method based on chaotic maps to create unique flight session keys for each pre-defined flight plan. These keys, along with flight plans, are registered in a secure database. During flight, the GCS verifies UAV identity by employing the flight session key and corresponding flight plan for message authentication. This approach reduces computational and communication overhead compared to traditional certificate exchanges and asymmetric cryptography, which are energy-intensive for UAVs. While not a comprehensive security solution, this method provides an initial layer of protection for the UAV network.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"92 ","pages":"Article 103918"},"PeriodicalIF":4.1,"publicationDate":"2024-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142002235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Large language models for code completion: A systematic literature review 用于代码自动补全的大型语言模型:系统性文献综述
IF 4.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-18 DOI: 10.1016/j.csi.2024.103917
Rasha Ahmad Husein , Hala Aburajouh , Cagatay Catal

Code completion serves as a fundamental aspect of modern software development, improving developers' coding processes. Integrating code completion tools into an Integrated Development Environment (IDE) or code editor enhances the coding process and boosts productivity by reducing errors and speeding up code writing while reducing cognitive load. This is achieved by predicting subsequent tokens, such as keywords, variable names, types, function names, operators, and more. Different techniques can achieve code completion, and recent research has focused on Deep Learning methods, particularly Large Language Models (LLMs) utilizing Transformer algorithms. While several research papers have focused on the use of LLMs for code completion, these studies are fragmented, and there is no systematic overview of the use of LLMs for code completion. Therefore, we aimed to perform a Systematic Literature Review (SLR) study to investigate how LLMs have been applied for code completion so far. We have formulated several research questions to address how LLMs have been integrated for code completion-related tasks and to assess the efficacy of these LLMs in the context of code completion. To achieve this, we retrieved 244 papers from scientific databases using auto-search and specific keywords, finally selecting 23 primary studies based on an SLR methodology for in-depth analysis. This SLR study categorizes the granularity levels of code completion achieved by utilizing LLMs in IDEs, explores the existing issues in current code completion systems, how LLMs address these challenges, and the pre-training and fine-tuning methods employed. Additionally, this study identifies open research problems and outlines future research directions. Our analysis reveals that LLMs significantly enhance code completion performance across several programming languages and contexts, and their capability to predict relevant code snippets based on context and partial input boosts developer productivity substantially.

代码自动补全是现代软件开发的一个基本方面,可改善开发人员的编码过程。将代码自动补全工具集成到集成开发环境(IDE)或代码编辑器中,可以减少错误,加快代码编写速度,同时减轻认知负担,从而增强编码过程,提高生产率。这是通过预测后续标记(如关键字、变量名、类型、函数名、运算符等)来实现的。不同的技术可以实现代码自动补全,最近的研究主要集中在深度学习方法上,特别是利用变换器算法的大型语言模型(LLM)。虽然已有多篇研究论文关注使用 LLMs 进行代码补全,但这些研究并不完整,也没有关于使用 LLMs 进行代码补全的系统概述。因此,我们旨在开展一项系统性文献综述(SLR)研究,调查迄今为止如何将 LLMs 用于代码补全。我们提出了几个研究问题,以探讨如何将 LLMs 集成到代码补全相关任务中,并评估这些 LLMs 在代码补全中的功效。为此,我们使用自动搜索和特定关键词从科学数据库中检索了 244 篇论文,最后根据 SLR 方法选择了 23 项主要研究进行深入分析。本 SLR 研究对集成开发环境中利用 LLM 实现的代码自动完成的粒度进行了分类,探讨了当前代码自动完成系统中存在的问题、LLM 如何应对这些挑战,以及所采用的预培训和微调方法。此外,本研究还确定了有待解决的研究问题,并概述了未来的研究方向。我们的分析表明,在多种编程语言和上下文中,LLM 都能显著提高代码自动补全性能,而且它们能够根据上下文和部分输入预测相关代码片段,从而大幅提高开发人员的工作效率。
{"title":"Large language models for code completion: A systematic literature review","authors":"Rasha Ahmad Husein ,&nbsp;Hala Aburajouh ,&nbsp;Cagatay Catal","doi":"10.1016/j.csi.2024.103917","DOIUrl":"10.1016/j.csi.2024.103917","url":null,"abstract":"<div><p>Code completion serves as a fundamental aspect of modern software development, improving developers' coding processes. Integrating code completion tools into an Integrated Development Environment (IDE) or code editor enhances the coding process and boosts productivity by reducing errors and speeding up code writing while reducing cognitive load. This is achieved by predicting subsequent tokens, such as keywords, variable names, types, function names, operators, and more. Different techniques can achieve code completion, and recent research has focused on Deep Learning methods, particularly Large Language Models (LLMs) utilizing Transformer algorithms. While several research papers have focused on the use of LLMs for code completion, these studies are fragmented, and there is no systematic overview of the use of LLMs for code completion. Therefore, we aimed to perform a Systematic Literature Review (SLR) study to investigate how LLMs have been applied for code completion so far. We have formulated several research questions to address how LLMs have been integrated for code completion-related tasks and to assess the efficacy of these LLMs in the context of code completion. To achieve this, we retrieved 244 papers from scientific databases using auto-search and specific keywords, finally selecting 23 primary studies based on an SLR methodology for in-depth analysis. This SLR study categorizes the granularity levels of code completion achieved by utilizing LLMs in IDEs, explores the existing issues in current code completion systems, how LLMs address these challenges, and the pre-training and fine-tuning methods employed. Additionally, this study identifies open research problems and outlines future research directions. Our analysis reveals that LLMs significantly enhance code completion performance across several programming languages and contexts, and their capability to predict relevant code snippets based on context and partial input boosts developer productivity substantially.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"92 ","pages":"Article 103917"},"PeriodicalIF":4.1,"publicationDate":"2024-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0920548924000862/pdfft?md5=8314175bcf57b70427dd5c869ea42978&pid=1-s2.0-S0920548924000862-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142076551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Best of two worlds: Efficient, usable and auditable biometric ABC on the blockchain 两全其美:区块链上高效、可用、可审计的生物识别 ABC
IF 4.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-13 DOI: 10.1016/j.csi.2024.103916
Neyire Deniz Sarier

In García-Rodríguez et al. 2024, two generic constructions for biometric-based non-transferable Attribute Based Credentials (biometric ABC) are presented, which offer different trade-offs between efficiency and trust assumptions. In this paper, we focus on the second scheme denoted as BioABC-ZK that tries to remove the strong (and unrealistic) trust assumption on the Reader R, and we show that BioABC-ZK has a security flaw for a colluding R and Verifier V. Besides, BioABC-ZK lacks GDPR-compliance, which requires secure processing of biometrics, for instance in form of Fuzzy Extractors, as opposed to (i) storing the reference biometric template aBio in the user’s mobile phone and (ii) processing of biometrics using an external untrusted R, whose foreign manufacturers are unlikely to adjust their products according to GDPR.

The contributions of this paper are threefold. First, we review efficient biometric ABC schemes to identify the privacy-by-design criteria for them. In view of these principles, we propose a new architecture for biometric ABC of Sarier 2021 by adapting the recently introduced core/helper setting. Briefly, a user in our modified setting is composed of a constrained core device (a SIM card) inside a helper device (a smart phone with dual SIM and face recognition feature), which – as opposed to García-Rodríguez et al. 2024 – does not need to store aBio. This way, the new design provides Identity Privacy without the need for an external R and/or a dedicated hardware per user such as a biometric smart card reader or a tamper proof smart card as in current hardware-bound credential systems. Besides, the new system maintains minimal hardware requirements on the SIM card – only responsible for storing ABC and helper data –, which results in easy adoption and usability without loosing efficiency, if deep face fuzzy vault and our modified ABC scheme are employed together. As a result, a total overhead of 500 ms to a showing of a comparable non-biometric ABC is obtained instead of the 2.1 s in García-Rodríguez et al. 2024 apart from the removal of computationally expensive pairings. Finally, as different from García-Rodríguez et al. 2024, auditing is achieved via Blockchain instead of proving in zero-knowledge the actual biometric matching by the user to reveal malicious behavior of R and V.

García-Rodríguez 等人在 2024 年提出了两种基于生物特征的不可转移属性凭证(biometric ABC)的通用结构,它们在效率和信任假设之间做出了不同的权衡。本文重点讨论第二种方案,即 BioABC-ZK,该方案试图消除对阅读器 R 的强(不现实)信任假设,并证明 BioABC-ZK 在 R 和验证器 V 串通的情况下存在安全漏洞。此外,BioABC-ZK 不符合 GDPR 要求,而 GDPR 要求生物识别的安全处理,例如以模糊提取器的形式,而不是(i)将参考生物识别模板 aBio 存储在用户的手机中,以及(ii)使用外部不信任的 R 处理生物识别,国外制造商不太可能根据 GDPR 调整其产品。首先,我们回顾了有效的生物识别 ABC 方案,以确定其隐私设计标准。根据这些原则,我们通过调整最近引入的核心/助手设置,为 Sarier 2021 生物识别 ABC 提出了一种新的架构。简而言之,在我们修改后的设置中,用户由一个受限的核心设备(SIM 卡)和一个辅助设备(具有双 SIM 卡和人脸识别功能的智能手机)组成,与 García-Rodríguez 等人 2024 的设置不同,辅助设备不需要存储生物特征。因此,新设计无需外部 R 和/或每个用户的专用硬件,如生物识别智能卡读写器或防篡改智能卡,就能提供身份隐私保护,就像目前的硬件绑定证书系统一样。此外,新系统对 SIM 卡的硬件要求极低(仅负责存储 ABC 和辅助数据),因此,如果同时采用深层人脸模糊保险库和我们改进的 ABC 方案,则可以在不降低效率的情况下轻松采用新系统并提高其可用性。因此,除了去掉计算成本高昂的配对之外,显示类似的非生物识别 ABC 的总开销为 500 毫秒,而不是 García-Rodríguez 等人 2024 中的 2.1 秒。最后,与 García-Rodríguez 等人的论文 2024 不同的是,审计是通过区块链实现的,而不是通过零知识证明用户的实际生物特征匹配来揭示 R 和 V 的恶意行为。
{"title":"Best of two worlds: Efficient, usable and auditable biometric ABC on the blockchain","authors":"Neyire Deniz Sarier","doi":"10.1016/j.csi.2024.103916","DOIUrl":"10.1016/j.csi.2024.103916","url":null,"abstract":"<div><p>In García-Rodríguez et al. 2024, two generic constructions for biometric-based non-transferable Attribute Based Credentials (biometric ABC) are presented, which offer different trade-offs between efficiency and trust assumptions. In this paper, we focus on the second scheme denoted as BioABC-ZK that tries to remove the strong (and unrealistic) trust assumption on the Reader R, and we show that BioABC-ZK has a security flaw for a colluding R and Verifier V. Besides, BioABC-ZK lacks GDPR-compliance, which requires secure processing of biometrics, for instance in form of Fuzzy Extractors, as opposed to (<span><math><mi>i</mi></math></span>) storing the reference biometric template <span><math><msub><mrow><mi>a</mi></mrow><mrow><mi>B</mi><mi>i</mi><mi>o</mi></mrow></msub></math></span> in the user’s mobile phone and (<span><math><mrow><mi>i</mi><mi>i</mi></mrow></math></span>) processing of biometrics using an external untrusted R, whose foreign manufacturers are unlikely to adjust their products according to GDPR.</p><p>The contributions of this paper are threefold. First, we review efficient biometric ABC schemes to identify the privacy-by-design criteria for them. In view of these principles, we propose a new architecture for <em>biometric ABC</em> of Sarier 2021 by adapting the recently introduced <em>core/helper setting</em>. Briefly, a user in our modified setting is composed of a constrained core device (a SIM card) inside a helper device (a smart phone with dual SIM and face recognition feature), which – as opposed to García-Rodríguez et al. 2024 – does not need to store <span><math><msub><mrow><mi>a</mi></mrow><mrow><mi>B</mi><mi>i</mi><mi>o</mi></mrow></msub></math></span>. This way, the new design provides <em>Identity Privacy</em> without the need for an external R and/or a dedicated hardware per user such as a biometric smart card reader or a tamper proof smart card as in current hardware-bound credential systems. Besides, the new system maintains minimal hardware requirements on the SIM card – only responsible for storing ABC and helper data –, which results in easy adoption and usability without loosing efficiency, if deep face fuzzy vault and our modified ABC scheme are employed together. As a result, a total overhead of 500 ms to a showing of a comparable non-biometric ABC is obtained instead of the 2.1 s in García-Rodríguez et al. 2024 apart from the removal of computationally expensive pairings. Finally, as different from García-Rodríguez et al. 2024, auditing is achieved via Blockchain instead of proving in zero-knowledge the actual biometric matching by the user to reveal malicious behavior of R and V.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"92 ","pages":"Article 103916"},"PeriodicalIF":4.1,"publicationDate":"2024-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141979792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A theory on human factors in DevOps adoption DevOps 应用中的人为因素理论
IF 4.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-12 DOI: 10.1016/j.csi.2024.103907
Juanjo Pérez-Sánchez , Saima Rafi , Juan Manuel Carrillo de Gea , Joaquín Nicolás Ros , José Luis Fernández Alemán

Context:

DevOps is a software engineering paradigm that enables faster deliveries and higher quality products. However, DevOps adoption is a complex process that is still insufficiently supported by research. In addition, human factors are the main difficulty for a successful DevOps adoption, although very few studies address this topic.

Objective:

This paper addresses two research gaps identified in literature, namely: (1) the characterization of DevOps from the perspective of human factors, i.e. the description of DevOps’ human characteristics to better define it, and (2) the identification and analysis of human factors’ effect in the adoption of DevOps.

Method:

We employed a hybrid methodology that included a Systematic Mapping Study followed by the application of a clustering technique. A questionnaire for DevOps practitioners (n=15) was employed as an evaluation method.

Results:

A total of 59 human factors related to DevOps were identified, described, and synthesized. The results were used to build a theory on DevOps human factors.

Conclusion:

The main contribution of this paper is a theory proposal regarding human factors in DevOps adoption. The evaluation results show that almost every human factor identified in the mapping study was found relevant in DevOps adoption. The results of the study represent an extension of DevOps characterization and a first approximation to human factors in DevOps adoption.

背景:DevOps 是一种软件工程范式,可加快交付速度,提高产品质量。然而,DevOps 的采用是一个复杂的过程,目前仍缺乏足够的研究支持。此外,人为因素是成功采用 DevOps 的主要困难,但很少有研究涉及这一主题。目的:本文针对文献中发现的两个研究空白,即:(1)从人为因素的角度描述 DevOps,即描述 DevOps 的人为特征,以便更好地定义 DevOps;(2)识别和分析人为因素在采用 DevOps 过程中的影响。结果:共识别、描述和归纳了 59 个与 DevOps 相关的人为因素。结论:本文的主要贡献在于就 DevOps 应用中的人为因素提出了理论建议。评估结果表明,映射研究中发现的几乎所有人为因素都与 DevOps 的采用相关。研究结果是对 DevOps 特征的扩展,也是对 DevOps 应用中人为因素的第一近似值。
{"title":"A theory on human factors in DevOps adoption","authors":"Juanjo Pérez-Sánchez ,&nbsp;Saima Rafi ,&nbsp;Juan Manuel Carrillo de Gea ,&nbsp;Joaquín Nicolás Ros ,&nbsp;José Luis Fernández Alemán","doi":"10.1016/j.csi.2024.103907","DOIUrl":"10.1016/j.csi.2024.103907","url":null,"abstract":"<div><h3>Context:</h3><p>DevOps is a software engineering paradigm that enables faster deliveries and higher quality products. However, DevOps adoption is a complex process that is still insufficiently supported by research. In addition, human factors are the main difficulty for a successful DevOps adoption, although very few studies address this topic.</p></div><div><h3>Objective:</h3><p>This paper addresses two research gaps identified in literature, namely: (1) the characterization of DevOps from the perspective of human factors, i.e. the description of DevOps’ human characteristics to better define it, and (2) the identification and analysis of human factors’ effect in the adoption of DevOps.</p></div><div><h3>Method:</h3><p>We employed a hybrid methodology that included a Systematic Mapping Study followed by the application of a clustering technique. A questionnaire for DevOps practitioners (<span><math><mrow><mi>n</mi><mo>=</mo><mn>15</mn></mrow></math></span>) was employed as an evaluation method.</p></div><div><h3>Results:</h3><p>A total of 59 human factors related to DevOps were identified, described, and synthesized. The results were used to build a theory on DevOps human factors.</p></div><div><h3>Conclusion:</h3><p>The main contribution of this paper is a theory proposal regarding human factors in DevOps adoption. The evaluation results show that almost every human factor identified in the mapping study was found relevant in DevOps adoption. The results of the study represent an extension of DevOps characterization and a first approximation to human factors in DevOps adoption.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"92 ","pages":"Article 103907"},"PeriodicalIF":4.1,"publicationDate":"2024-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S092054892400076X/pdfft?md5=8a197a8035fc3bc559533baac7028e12&pid=1-s2.0-S092054892400076X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141993505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy-efficient neural network training through runtime layer freezing, model quantization, and early stopping 通过运行时层冻结、模型量化和提前停止实现高能效神经网络训练
IF 4.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-09 DOI: 10.1016/j.csi.2024.103906
Álvaro Domingo Reguero , Silverio Martínez-Fernández , Roberto Verdecchia

Background:

In the last years, neural networks have been massively adopted by industry and research in a wide variety of contexts. Neural network milestones are generally reached by scaling up computation, completely disregarding the carbon footprint required for the associated computations. This trend has become unsustainable given the ever-growing use of deep learning, and could cause irreversible damage to the environment of our planet if it is not addressed soon.

Objective:

In this study, we aim to analyze not only the effects of different energy saving methods for neural networks but also the effects of the moment of intervention, and what makes certain moments optimal.

Method:

We developed a novel dataset by training convolutional neural networks in 12 different computer vision datasets and applying runtime decisions regarding layer freezing, model quantization and early stopping at different epochs in each run. We then fit an auto-regressive prediction model on the data collected capable to predict the accuracy and energy consumption achieved on future epochs for different methods. The predictions on accuracy and energy are used to estimate the optimal training path.

Results:

Following the predictions of the model can save 56.5% of energy consumed while also increasing validation accuracy by 2.38% by avoiding overfitting.The prediction model developed can predict the validation accuracy with a 8.4% of error, the energy consumed with a 14.3% of error and the trade-off between both with a 8.9% of error.

Conclusions:

This prediction model could potentially be used by the training algorithm to decide which methods apply to the model and at what moment in order to maximize the accuracy-energy trade-off.

背景:在过去几年中,神经网络被工业界和研究领域广泛采用。神经网络的里程碑通常是通过扩大计算量来实现的,完全无视相关计算所需的碳足迹。鉴于深度学习的使用越来越多,这种趋势已变得不可持续,如果不尽快解决,可能会对我们的地球环境造成不可逆转的破坏。目标:在本研究中,我们不仅要分析不同节能方法对神经网络的影响,还要分析干预时刻的影响,以及是什么使某些时刻成为最佳时刻。方法:我们在 12 个不同的计算机视觉数据集中训练卷积神经网络,并在每次运行的不同时间段应用有关层冻结、模型量化和提前停止的运行时决策,从而开发了一个新的数据集。然后,我们在收集到的数据上拟合了一个自动回归预测模型,该模型能够预测不同方法在未来历时中所达到的精度和能耗。结果:根据模型的预测,可以节省 56.5% 的能耗,同时通过避免过度拟合,还能提高 2.38% 的验证精度。结论:该预测模型有可能被训练算法用于决定哪些方法适用于该模型,以及在什么时候使用,以便最大限度地实现准确性-能源权衡。
{"title":"Energy-efficient neural network training through runtime layer freezing, model quantization, and early stopping","authors":"Álvaro Domingo Reguero ,&nbsp;Silverio Martínez-Fernández ,&nbsp;Roberto Verdecchia","doi":"10.1016/j.csi.2024.103906","DOIUrl":"10.1016/j.csi.2024.103906","url":null,"abstract":"<div><h3>Background:</h3><p>In the last years, neural networks have been massively adopted by industry and research in a wide variety of contexts. Neural network milestones are generally reached by scaling up computation, completely disregarding the carbon footprint required for the associated computations. This trend has become unsustainable given the ever-growing use of deep learning, and could cause irreversible damage to the environment of our planet if it is not addressed soon.</p></div><div><h3>Objective:</h3><p>In this study, we aim to analyze not only the effects of different energy saving methods for neural networks but also the effects of the moment of intervention, and what makes certain moments optimal.</p></div><div><h3>Method:</h3><p>We developed a novel dataset by training convolutional neural networks in 12 different computer vision datasets and applying runtime decisions regarding layer freezing, model quantization and early stopping at different epochs in each run. We then fit an auto-regressive prediction model on the data collected capable to predict the accuracy and energy consumption achieved on future epochs for different methods. The predictions on accuracy and energy are used to estimate the optimal training path.</p></div><div><h3>Results:</h3><p>Following the predictions of the model can save 56.5% of energy consumed while also increasing validation accuracy by 2.38% by avoiding overfitting.The prediction model developed can predict the validation accuracy with a 8.4% of error, the energy consumed with a 14.3% of error and the trade-off between both with a 8.9% of error.</p></div><div><h3>Conclusions:</h3><p>This prediction model could potentially be used by the training algorithm to decide which methods apply to the model and at what moment in order to maximize the accuracy-energy trade-off.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"92 ","pages":"Article 103906"},"PeriodicalIF":4.1,"publicationDate":"2024-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0920548924000758/pdfft?md5=9fe0b023bddfc875c825b0c53e63af06&pid=1-s2.0-S0920548924000758-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142087778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Uncharted dimensions, gaps, and future trends of serious games in software engineering 软件工程中的严肃游戏的未知层面、差距和未来趋势
IF 4.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-08 DOI: 10.1016/j.csi.2024.103915
Manal Kharbouch , Aurora Vizcaino , José Alberto García-Berná , Félix García , Ambrosio Toval , Oscar Pedreira , Ali Idri , José Luis Fernández-Alemán

Objective

Serious Games (SG) are a rising trend in Software Engineering (SE) education, for this reason, and since this topic is still immature and further research was encouraged, it is important to investigate how SGs are integrated into SE education. In this line, this study explores the landscape of SGs in SE) education, focusing on their categorization according to their addressed SWEBOK areas and Bloom's levels, extracted their key elements, mechanics and dynamics, exploring in depth their most portrayed player profiles, finding what makes them successful SGs in this field, and last addressing their resulting challenges in the realm of SE education.

Methodology

A systematic search was conducted across prominent databases: Science Direct, IEEE Xplore, ACM, Scopus, and Wiley. Initially, 125 papers met our initial inclusion criteria, from which 46 remained after rigorous full-text review. Utilizing snowball sampling, we added 28 additional studies, resulting in a total of 74 selected papers for comprehensive analysis.

Results

Among the selected papers, which spanned from the early 2000s to May 2021, a notable increase in publications on SGs in SE was observed, particularly since 2010. The majority of these studies focused on validation research (60 %), followed by solution proposals (17.56 %) and evaluation research (13.51 %). Publication channels predominantly included conferences (79.73 %), underscoring the emerging nature of SGs in SE research, with a smaller proportion appearing in journal articles (20.27 %). Specific focus areas within SE, such as Software Engineering Management (33.78 %) and SE Professional Practice (13.51 %), received significant attention, while others, like SE Models and Methods, showed minimal representation. Furthermore, SGs were found to effectively target higher-order cognitive skills based on Bloom's Taxonomy, with notable implementations of game dynamics such as Teams and Realism to enhance learning experiences. Despite these advancements, there remains a predominant focus on player profiles like Achievers (48.64 %) and Players (47.30 %), suggesting potential gaps in addressing a broader spectrum of learner types within SGs designed for SE education.

Conclusion

This study underscores the evolving role of SGs in SE education, emphasizing the need for diverse approaches to enhance engagement and educational outcomes. Future research should focus on optimizing SG potential across educational and industrial settings by expanding publication visibility, integrating artificial intelligence (AI), and conducting comprehensive evaluations of SGs tailored to SE contexts.

目的严肃游戏(SG)是软件工程(SE)教育中的一种新兴趋势,因此,由于这一课题尚不成熟,鼓励进一步研究,因此研究如何将严肃游戏融入SE教育是非常重要的。因此,本研究探讨了软件工程(SE)教育中的软件即服务(SGs)的情况,重点是根据其所涉及的 SWEBOK 领域和布卢姆等级对其进行分类,提取其关键要素、机制和动态,深入探讨其最典型的参与者情况,找出使其在这一领域取得成功的软件即服务的原因,最后探讨其在软件工程教育领域所面临的挑战:在以下著名数据库中进行了系统搜索:Science Direct、IEEE Xplore、ACM、Scopus 和 Wiley。最初有 125 篇论文符合我们的初步纳入标准,经过严格的全文审阅后,剩下 46 篇。结果从 2000 年代初到 2021 年 5 月,在所选论文中,我们观察到有关 SE 中秘书长的论文明显增加,尤其是自 2010 年以来。这些研究大多侧重于验证研究(60%),其次是解决方案建议(17.56%)和评估研究(13.51%)。发表渠道主要包括会议(79.73%),这凸显了秘书长在社会经济研究中的新兴性质,而发表在期刊论文中的比例较小(20.27%)。社会科学研究中的特定重点领域,如软件工程管理(33.78 %)和社会科学专业实践(13.51 %),受到了极大关注,而其他领域,如社会科学模型和方法,所占比例很小。此外,研究还发现,基于布鲁姆分类法的 SG 能够有效地针对高阶认知技能,并通过显著实施团队和现实主义等游戏动态来增强学习体验。尽管取得了这些进步,但仍主要集中在 "成就者"(48.64%)和 "玩家"(47.30%)等玩家类型上,这表明在为 SE 教育而设计的 SG 中,在处理更广泛的学习者类型方面存在潜在差距。未来的研究应侧重于通过扩大出版物的知名度、整合人工智能(AI)以及对适合 SE 环境的 SG 进行全面评估,来优化 SG 在教育和工业环境中的潜力。
{"title":"Uncharted dimensions, gaps, and future trends of serious games in software engineering","authors":"Manal Kharbouch ,&nbsp;Aurora Vizcaino ,&nbsp;José Alberto García-Berná ,&nbsp;Félix García ,&nbsp;Ambrosio Toval ,&nbsp;Oscar Pedreira ,&nbsp;Ali Idri ,&nbsp;José Luis Fernández-Alemán","doi":"10.1016/j.csi.2024.103915","DOIUrl":"10.1016/j.csi.2024.103915","url":null,"abstract":"<div><h3>Objective</h3><p>Serious Games (SG) are a rising trend in Software Engineering (SE) education, for this reason, and since this topic is still immature and further research was encouraged, it is important to investigate how SGs are integrated into SE education. In this line, this study explores the landscape of SGs in SE) education, focusing on their categorization according to their addressed SWEBOK areas and Bloom's levels, extracted their key elements, mechanics and dynamics, exploring in depth their most portrayed player profiles, finding what makes them successful SGs in this field, and last addressing their resulting challenges in the realm of SE education.</p></div><div><h3>Methodology</h3><p>A systematic search was conducted across prominent databases: Science Direct, IEEE Xplore, ACM, Scopus, and Wiley. Initially, 125 papers met our initial inclusion criteria, from which 46 remained after rigorous full-text review. Utilizing snowball sampling, we added 28 additional studies, resulting in a total of 74 selected papers for comprehensive analysis.</p></div><div><h3>Results</h3><p>Among the selected papers, which spanned from the early 2000s to May 2021, a notable increase in publications on SGs in SE was observed, particularly since 2010. The majority of these studies focused on validation research (60 %), followed by solution proposals (17.56 %) and evaluation research (13.51 %). Publication channels predominantly included conferences (79.73 %), underscoring the emerging nature of SGs in SE research, with a smaller proportion appearing in journal articles (20.27 %). Specific focus areas within SE, such as Software Engineering Management (33.78 %) and SE Professional Practice (13.51 %), received significant attention, while others, like SE Models and Methods, showed minimal representation. Furthermore, SGs were found to effectively target higher-order cognitive skills based on Bloom's Taxonomy, with notable implementations of game dynamics such as Teams and Realism to enhance learning experiences. Despite these advancements, there remains a predominant focus on player profiles like Achievers (48.64 %) and Players (47.30 %), suggesting potential gaps in addressing a broader spectrum of learner types within SGs designed for SE education.</p></div><div><h3>Conclusion</h3><p>This study underscores the evolving role of SGs in SE education, emphasizing the need for diverse approaches to enhance engagement and educational outcomes. Future research should focus on optimizing SG potential across educational and industrial settings by expanding publication visibility, integrating artificial intelligence (AI), and conducting comprehensive evaluations of SGs tailored to SE contexts.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"92 ","pages":"Article 103915"},"PeriodicalIF":4.1,"publicationDate":"2024-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0920548924000849/pdfft?md5=aabc12b8df17cadc4147fd2af50e915d&pid=1-s2.0-S0920548924000849-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142122606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prototype, method, and experiment for evaluating usability of smart home user interfaces 评估智能家居用户界面可用性的原型、方法和实验
IF 4.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-03 DOI: 10.1016/j.csi.2024.103903
Renat Faizrakhmanov , Mohammad Reza Bahrami , Alexey Platunov

Despite the widespread adoption of smart devices and home automation systems, users still face usability challenges. Additionally, evaluating the usability of smart home systems is not straightforward. Our paper focuses on building a Smart Home Prototype, selecting, and evaluating software User Interfaces (UI). We have chosen the smart home heating system as the basis, but the principles are applicable to other applications. To discuss smart home UIs, it is necessary to understand the components, implementation scenarios, configuration, and operation of smart home systems. Therefore, we devote considerable attention to these topics in the paper. Our smart home system utilizes a Raspberry Pi computer, temperature sensors, servo drives, an Android-based smartphone, and other necessary hardware. We installed and configured open-source software and third-party services on the experimental setup. We provided a brief description of each selected software. We used the Home Assistant operating system, its mobile application, voice assistant Alice, and Telegram chatbot. In our study, we described a methodology for evaluating user interfaces in smart homes and conducted an experiment to assess their usability. The experiment results indicated which interface was more user-friendly and identified the drawbacks of each. In conclusion, we discuss UI features that can improve usability and available options for building a smart home based on capabilities.

尽管智能设备和家庭自动化系统已被广泛采用,但用户仍然面临着可用性方面的挑战。此外,评估智能家居系统的可用性并不简单。本文的重点是构建智能家居原型、选择和评估软件用户界面(UI)。我们选择智能家居供暖系统作为基础,但其原理也适用于其他应用。要讨论智能家居用户界面,就必须了解智能家居系统的组件、实施方案、配置和操作。因此,我们在本文中对这些主题给予了相当大的关注。我们的智能家居系统使用了 Raspberry Pi 计算机、温度传感器、伺服驱动器、基于安卓的智能手机和其他必要的硬件。我们在实验装置上安装并配置了开源软件和第三方服务。我们简要介绍了所选的每个软件。我们使用了 Home Assistant 操作系统、其移动应用程序、语音助手 Alice 和 Telegram 聊天机器人。在研究中,我们介绍了评估智能家居用户界面的方法,并进行了一项实验来评估它们的可用性。实验结果表明了哪种界面对用户更友好,并指出了每种界面的缺点。最后,我们讨论了可提高可用性的用户界面功能,以及根据功能构建智能家居的可用选项。
{"title":"Prototype, method, and experiment for evaluating usability of smart home user interfaces","authors":"Renat Faizrakhmanov ,&nbsp;Mohammad Reza Bahrami ,&nbsp;Alexey Platunov","doi":"10.1016/j.csi.2024.103903","DOIUrl":"10.1016/j.csi.2024.103903","url":null,"abstract":"<div><p>Despite the widespread adoption of smart devices and home automation systems, users still face usability challenges. Additionally, evaluating the usability of smart home systems is not straightforward. Our paper focuses on building a Smart Home Prototype, selecting, and evaluating software User Interfaces (UI). We have chosen the smart home heating system as the basis, but the principles are applicable to other applications. To discuss smart home UIs, it is necessary to understand the components, implementation scenarios, configuration, and operation of smart home systems. Therefore, we devote considerable attention to these topics in the paper. Our smart home system utilizes a Raspberry Pi computer, temperature sensors, servo drives, an Android-based smartphone, and other necessary hardware. We installed and configured open-source software and third-party services on the experimental setup. We provided a brief description of each selected software. We used the Home Assistant operating system, its mobile application, voice assistant Alice, and Telegram chatbot. In our study, we described a methodology for evaluating user interfaces in smart homes and conducted an experiment to assess their usability. The experiment results indicated which interface was more user-friendly and identified the drawbacks of each. In conclusion, we discuss UI features that can improve usability and available options for building a smart home based on capabilities.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"92 ","pages":"Article 103903"},"PeriodicalIF":4.1,"publicationDate":"2024-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141991092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on the construction and mapping model of knowledge organization system driven by standards 标准驱动的知识组织系统构建与映射模型研究
IF 4.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-03 DOI: 10.1016/j.csi.2024.103905
Jingshu Yuan, Kexin Zhai, Hongxin Li, Man Yuan

With the rapid development of artificial intelligence and enterprise digital transformation, the standardization organization, storage and management of semantic knowledge in computers have become the current research focus. As the core theory of knowledge system construction, knowledge organization (KO) provides theoretical support for the study of semantic knowledge organization and representation, among which knowledge organization system (KOS) is the important tool of semantic organization. At present, many scholars have carried out research from different perspectives of KOS based on theory, which provides the direction for the sustainable development of KOS. However, most of these studies focus on some aspects of KOS, which are in a "scattered" state, lacking systematic analysis of the basic principles of KOS construction and semantic organization based on theories and international standards. Therefore, this paper firstly constructs KOS theoretical models in the conceptual world and computer world respectively through a comprehensive study of multi-disciplinary basic theories such as semantics, logic, system theory, and international standards such as ISO 1087:2019, ISO 25964:2013, and ISO 11179:2023, and traces the iterative construction, organization and mapping process from "concept" in the conceptual world to "metadata" knowledge and semantics in the computer world. The semantic organization based on metadata is realized in computer. Secondly, on this basis, in order to realize ontology representation of domain knowledge, the ontology construction method based on MDR metadata is proposed. Finally, taking the semantic organization and ontology construction of Epicentre model in petroleum field as an example, the feasibility of the ideas and methods proposed in this paper is verified. The model and method proposed in this paper is independent of the specific type of KOS, so it is innovative and universal. The methodology is also applicable to other fields of conceptual system modeling, metadata standard construction, and data model modeling.

随着人工智能和企业数字化转型的快速发展,计算机中语义知识的标准化组织、存储和管理成为当前研究的重点。知识组织(KO)作为知识体系构建的核心理论,为语义知识的组织与表征研究提供了理论支撑,其中知识组织系统(KOS)是语义组织的重要工具。目前,许多学者基于理论从不同角度对知识组织系统进行了研究,为知识组织系统的可持续发展提供了方向。然而,这些研究大多集中在 KOS 的某些方面,处于 "散点 "状态,缺乏基于理论和国际标准对 KOS 构建和语义组织基本原理的系统分析。因此,本文首先通过对语义学、逻辑学、系统论等多学科基础理论和ISO 1087:2019、ISO 25964:2013、ISO 11179:2023等国际标准的综合研究,分别构建了概念世界和计算机世界的KOS理论模型,并追溯了从概念世界的 "概念 "到计算机世界的 "元数据 "知识和语义的迭代构建、组织和映射过程。基于元数据的语义组织在计算机中得以实现。其次,在此基础上,为了实现领域知识的本体表示,提出了基于 MDR 元数据的本体构建方法。最后,以石油领域 Epicentre 模型的语义组织和本体构建为例,验证了本文提出的思路和方法的可行性。本文提出的模型和方法不受 KOS 具体类型的限制,具有创新性和普适性。该方法也适用于概念系统建模、元数据标准构建和数据建模等其他领域。
{"title":"Research on the construction and mapping model of knowledge organization system driven by standards","authors":"Jingshu Yuan,&nbsp;Kexin Zhai,&nbsp;Hongxin Li,&nbsp;Man Yuan","doi":"10.1016/j.csi.2024.103905","DOIUrl":"10.1016/j.csi.2024.103905","url":null,"abstract":"<div><p>With the rapid development of artificial intelligence and enterprise digital transformation, the standardization organization, storage and management of semantic knowledge in computers have become the current research focus. As the core theory of knowledge system construction, knowledge organization (KO) provides theoretical support for the study of semantic knowledge organization and representation, among which knowledge organization system (KOS) is the important tool of semantic organization. At present, many scholars have carried out research from different perspectives of KOS based on theory, which provides the direction for the sustainable development of KOS. However, most of these studies focus on some aspects of KOS, which are in a \"scattered\" state, lacking systematic analysis of the basic principles of KOS construction and semantic organization based on theories and international standards. Therefore, this paper firstly constructs KOS theoretical models in the conceptual world and computer world respectively through a comprehensive study of multi-disciplinary basic theories such as semantics, logic, system theory, and international standards such as ISO 1087:2019, ISO 25964:2013, and ISO 11179:2023, and traces the iterative construction, organization and mapping process from \"concept\" in the conceptual world to \"metadata\" knowledge and semantics in the computer world. The semantic organization based on metadata is realized in computer. Secondly, on this basis, in order to realize ontology representation of domain knowledge, the ontology construction method based on MDR metadata is proposed. Finally, taking the semantic organization and ontology construction of Epicentre model in petroleum field as an example, the feasibility of the ideas and methods proposed in this paper is verified. The model and method proposed in this paper is independent of the specific type of KOS, so it is innovative and universal. The methodology is also applicable to other fields of conceptual system modeling, metadata standard construction, and data model modeling.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"92 ","pages":"Article 103905"},"PeriodicalIF":4.1,"publicationDate":"2024-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141941207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computer Standards & Interfaces
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1