Loading...
Search for: user-interfaces
0.007 seconds
Total 47 records

    The effect of room complexity on physical object selection performance in 3-d mobile user interfaces

    , Article IEEE Transactions on Human-Machine Systems ; Volume 50, Issue 4 , 2020 , Pages 349-357 Rezaie, M ; Malekmakan, M ; Nazari Shirehjini, A. A ; Shirmohammadi, S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    An important challenge in smart environments is how to manipulate the smart objects. Although mobile applications are typically used for controlling a smart environment, no previous study has evaluated the users performance in manipulating smart objects under different environmental complexities. This article presents an experimental comparison between three different selection techniques 3-D, 2-D, and physical user interfaces (UIs). We evaluate these techniques across two levels of environment complexity measuring 51 participants timing data and errors. Our results indicate that the 3-D UI is superior for task completion time and error, and the 2-D UI is not a better solution than the... 

    Interactive educational tool for teaching a simple cipher

    , Article Proceedings - 2014 International Symposium on Biometrics and Security Technologies, ISBAST 2014, 26 August 2014 through 27 August 2014 ; 2015 , Pages 102-105 ; 9781479964444 (ISBN) El Farra, A. A. H ; Zahedi, E ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Abstract
    In this paper, a practical educational tool based on Java programming is described. The approach is based on using a fully interactive graphical user interface for teaching cipher algorithms. As an example, a transposition cipher is covered, where students can try different keys and observe the effect of parameters such as key length, choice of letters for the key on the ciphertext. At the same time, the process of breaking the cipher algorithm (cryptanalysis) is rendered possible by students injecting known plaintext. The developed program offers an option where it tries systematically all keys (brute force) to break the cipher. Being extendable, the platform is thought to be able to play a... 

    Using finger for touchscreen devices; Is it safe?

    , Article 53rd Annual IEEE International Carnahan Conference on Security Technology, ICCST 2019, 1 October 2019 through 3 October 2019 ; Volume 2019-October , 2019 ; 10716572 (ISSN); 9781728115764 (ISBN) Merikh Nejadasl, A ; Chizari, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    The use of touchscreen devices become a part of people daily life. Finger is used to communicate with such devices. This paper investigated the interaction between human finger and touch screen devices. A series of experiments was performed to investigate the participants' finger functionality when they press their finger on a touch screen device. The study was concluded that the pain threshold is higher than normal pressing force but for repetitive pressing the level of pain threshold will decrease. © 2019 IEEE  

    A Speech Driven Web Browser

    , M.Sc. Thesis Sharif University of Technology Rashidi Fard, Amin (Author) ; Vosoughi Vahdat, Bijan (Supervisor)
    Abstract
    Generally speaking a web browser is a software application for surfing the World Wide Web. A user with web browser can request some web pages on the Internet. This request would be sent to web server and would be analyzed. The result would be shown to end user by web browser GUI. A web browser has different parts such as HTML parser, Renderer, browser engine and GUI. The GUI is one of the most important parts of each web browser, because the end users interact with GUI. The classical GUI for surfing has been used in various platforms, such as the PC and Laptop Operating systems. Because of the technological advances and the introduction of tablets and other touch screen devices i. e, smart... 

    Real-time multiple face detection and tracking

    , Article 2009 14th International CSI Computer Conference, CSICC 2009, 20 October 2009 through 21 October 2009 ; 2009 , Pages 379-384 ; 9781424442621 (ISBN) Abin, A. A ; Fotouhi, M ; Kasaei, S ; Sharif University of Technology
    Abstract
    In recent years, processing the images that contain human faces has been a growing research interest because of establishment and development of automatic methods especially in security applications, compression, and perceptual user interface. In this paper, a new method has been proposed for multiple face detection and tracking in video frames. The proposed method uses skin color, edge and shape information, face detection, and dynamic movement analysis of faces for more accurate real-time multiple face detection and tracking purposes. One of the main advantages of the proposed method is its robustness against usual challenges in face tracking such as scaling, rotation, scene changes, fast... 

    Correlation and prediction of small to large sized pharmaceuticals solubility, and crystallization in binary and ternary mixed solvents using the UNIQUAC-SAC model

    , Article Fluid Phase Equilibria ; Volume 519 , 2020 Yousefi Seyf, J ; Asgari, M ; Sharif University of Technology
    Elsevier B.V  2020
    Abstract
    The recently reported UNIversal QUAsiChemical Segment Activity coefficient (UNIQUAC-SAC) model [developed by Haghtalab and Yousefi Seyf Ind. Eng. Chem. Res. 2015, 54, 8611] provides a practical thermodynamic framework to be used in VLE, LLE, and SLE calculations. The UNIQUAC-SAC model has the advantage of being independent of area (q) and volume (r) structural parameters used in the combinatorial part. While the UNIFAC or UNIFAC-DMD could not apply to the 47% (44 of 94) of the studied molecules because of the undefined groups. Here, the numbers of solvents with identified segment numbers were extended from 82 to 130 with a slight refinement to the previous values. The model parameters... 

    Design and implementation of a robotic architecture for adaptive teaching: A case study on iranian sign language

    , Article Journal of Intelligent and Robotic Systems: Theory and Applications ; Volume 102, Issue 2 , 2021 ; 09210296 (ISSN) Basiri, S ; Taheri, A ; Meghdari, A ; Alemi, M ; Sharif University of Technology
    Springer Science and Business Media B.V  2021
    Abstract
    Social robots may soon be able to play an important role in expanding communication with the deaf. Based on the literature, adaptive user interfaces lead to greater user acceptance and increased teaching efficiency compared to non-adaptive ones. In this paper, we build a robotic architecture able to simultaneously adjust a robot’s teaching parameters according to both the user’s past and present performance, adapt the content of the training, and then implement it on the RASA robot to teach sign language based on these parameters in a manner similar to a human teacher. To do this, a word to teach in sign language, repetition, speed, and emotional valence were chosen to be adaptive using a... 

    SM3D studio: A 3D model constructor

    , Article Iranian Conference on Machine Vision and Image Processing, MVIP ; 2013 , Pages 10-15 ; 21666776 (ISSN); 9781467361842 (ISBN) Soleimani, V ; Vincheh, F. H ; Zare, E ; Engineers (IEEE) Antennas and Propagation Society; The Institute of Electrical and Electronics ; Sharif University of Technology
    IEEE Computer Society  2013
    Abstract
    In this paper we describe designing and implementation of a powerful, fast and compact simple 3D modeler (SM3D). In addition to saving cost and time (due to high processing speed), 3D objects can be created with minimum system resources by using this application. Easy learning and using are other strengths of this application. Modularity using classification and applying Dynamic-Link Library files are noted aspects that are regarded in writing the source code and this causes separation of main part and user interface, so the application can be easily expanded in the future. Ability to create primary objects and also applying advanced transformations and modifiers have been considered.... 

    Modeling of inelastic mixed hinge and its application in analysis of the frames with reduced beam section

    , Article International Journal of Steel Structures ; Volume 11, Issue 1 , 2011 , Pages 51-63 ; 15982351 (ISSN) Kazemi, M. T ; Asl, M. H ; Sharif University of Technology
    2011
    Abstract
    This paper represents new development of a previously introduced mixed shear-flexural (VM) link element, and its application in inelastic analysis of frames with reduced beam sections. The multi-surfaces concept with dissimilar yield surfaces is used in definition of link element. The yield surfaces are defined in deformation space and the element has the capability of modeling interactive axial-flexural-shear yielding. It is able to consider post yield softening behavior as well as flexibility and strength degradations. It is shown that the analysis results of the new mixed axial-shear-flexural (PVM) link have good agreement with the existing experimental and finite element results. Using... 

    A meta user interface for interaction with mixed reality environments

    , Article 2015 IEEE International Symposium on Haptic, Audio and Visual Environments and Games, HAVE 2015 - Proceedings, 11 October 2015 ; October , 2015 , Page(s): 1 - 6 ; 9781467391757 (ISBN) Mostafazadeh, A ; Shirehjini, A. A. N ; Daraei, S ; Khojasteh, N ; Shirmohammadi, S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Abstract
    The aim of this paper is the design and development of a novel user interface to interact with a meta system. Our focus is rather on interacting with Ambient Intelligence as a whole, which would for example enable users to influence the overall behaviors and attributes of dynamic device compositions. We call such interfaces Meta User Interfaces. The design details of a proposed user interface as well as a cognitive walkthrough evaluation are presented in this paper  

    Trust-based user-role assignment in Role-Based Access Control

    , Article 2007 IEEE/ACS International Conference on Computer Systems and Applications, AICCSA 2007, Amman, 13 May 2007 through 16 May 2007 ; June , 2007 , Pages 807-814 ; 1424410312 (ISBN); 9781424410316 (ISBN) Takabi, H ; Amini, M ; Jalili, A ; Sharif University of Technology
    2007
    Abstract
    Role Based Access Control (RBAC) model is naturally suitable to organizations where users are assigned organizational roles with well-defined privileges. Nowadays, many organizations and enterprises such as banks, insurance industry and utility companies, provide online services to their veiy large number of users. This shows that assigning users to roles is a intolerable task and maintaining user-role assignment up-to-date is costly and error-prone. Also, with the increasing number of users, RBAC may have problems in prohibiting cheat and changing roles of users. To overcome these problems, user-role assignment decision can be made based on how much we trust him/her. In this paper, we... 

    Collage steganography

    , Article 5th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2006. In conjunction with 1st IEEE/ACIS International Workshop on Component-Based Software Engineering, Software Architecture and Reuse, COMSAR 2006, Honolulu, HI, 10 July 2006 through 12 July 2006 ; Volume 2006 , 2006 , Pages 316-321 ; 0769526136 (ISBN); 9780769526133 (ISBN) Shirali Shahreza, M ; Shirali Shahreza, S ; Sharif University of Technology
    2006
    Abstract
    Establishing hidden communication is an important subject of discussion that has gained increasing importance nowadays with the development of the Internet. One of the methods introduced for establishing hidden communication is steganography. Methods of steganography have been mostly applied on images while the major characteristic of these methods is the change in the structure and features of the images so as not to be identifiable by human users. However, on the other hand, many methods have been proposed for breaking and extracting information (steganalysis) for these methods. This paper presents a method for hiding information in images by changing the appearance of the picture instead... 

    Quality improvement of digitized radiographs by filtering technique development based on morphological transformations

    , Article 2004 Nuclear Science Symposium, Medical Imaging Conference, Symposium on Nuclear Power Systems and the 14th International Workshop on Room Temperature Semiconductor X- and Gamma- Ray Detectors, Rome, 16 October 2004 through 22 October 2004 ; Volume 3 , 2004 , Pages 1845-1849 ; 10957863 (ISSN) Movafeghi, A ; Taheri, M ; Kargarnovin, M. H ; Ghasemi, F ; Rokrok, B ; Seiedi, M ; Edaalati, K ; Kermani, A ; Rastkhah, N ; Sharif University of Technology
    2004
    Abstract
    Radiographic inspection is the most appreciated technique among the other non-destructive testing methods due to producing unique finger print record as the film. Converting of radiographs to a digital format and further digital image processing is the best method of enhancing the image quality and assisting the interpreter on his evaluation. In this research, different algorithms were used for image enhancement and radiograph interpretation in MATLAB environment. A graphical user interface (GUI) was created for implementation of different algorithms. Both spatial and frequency (wavelet) domains techniques were used for image enhancement. Results showed that the defect recognition... 

    Generating Mutants for User Interface Testing in Web-based Applications

    , M.Sc. Thesis Sharif University of Technology Naderi, Mohammad Javad (Author) ; Mirian Hosseinabadi, Hassan (Supervisor)
    Abstract
    In recent years, the user interface of web-based applications has become more and more complicated. Various technologies, architectures, and tools are being used to create a modern user interface. Users interact directly with the user interface, so its functionality has a significant impact on their satisfaction and it is required to design special test suites for the user interface. Furthermore, we need a method to measure the quality and effectiveness of test suites. An effective test suite is a test suite which is able to detect real faults. But this definition is ambiguous, and hence, not practical. A method called Mutation Testing solves this problem and instead of real faults, uses... 

    Improving the Design of Menus in User Interfaces

    , M.Sc. Thesis Sharif University of Technology Kargaran Khouzani, Amir Hossein (Author) ; Heydarnoori, Abbas (Supervisor)
    Abstract
    The design and development process of menu systems has always been a focus of researchers and engineers in the fields of software engineering and human-computer interaction. Considering the large and complex nature of the design space, it is nec- essary to provide automatic methods that aid designers during the design process. In this study, natural language processing is used to investigate the semantic relationship between menu system commands. Users expect related commands to be conveniently located next to each other, and a properly designed interface satisfies this need. As a result of this research, a fast-text-based model is developed that uses the data of past menu systems. In a... 

    Design and Implementation of a Software and Control Unit for a Cone-beam CT scan with Capability of the Quantificaion of Images

    , M.Sc. Thesis Sharif University of Technology Pourgholi, Alireza (Author) ; Boroushaki, Mehrdad (Supervisor) ; Kamali Asl, Alireza (Supervisor)
    Abstract
    High-resolution computed tomography (CT) or micro-CT is the preclinical equivalent of CT and is largely used to study small-animal models of human disease. The translation of clinical imaging methods from human to rodents presents scaling challenges for all modalities including micro-CT. Generally, tomography imaging systems include X-ray tube, detector, electrical and mechanical circuits for rotating system and main processing system which should be able to data acquisitioning, data reconstructing and represent user friendly interface. Exposure time, tube current, number of projections, detector and tube distance should be control by processing system, since final images quality and... 

    Numerical study of Slotted-Web-Reduced-Flange moment connection

    , Article Journal of Constructional Steel Research ; Volume 69, Issue 1 , February , 2012 , Pages 1-7 ; 0143974X (ISSN) Maleki, S ; Tabbakhha, M ; Sharif University of Technology
    2012
    Abstract
    Reduced Beam Section (RBS) and Slotted Beam Web (SBW) are two types of seismic resistant moment connections that were introduced after the 1994 Northridge earthquake. These connections have been tested under cyclic loading and have had acceptable performance. In this paper, a new hybrid connection is introduced that is composed of RBS and SBW and is named Slotted-Web-Reduced- Flange (SWRF). Nonlinear finite element analyses are performed on SWRF under cyclic loading. It is shown that the new connection in some cases performs better than its RBS and SBW predecessors. The effects of panel zone strength, continuity plates and slot length are also investigated  

    A meta user interface for understandable and predictable interaction in AAL

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2 August 2015 through 7 August 2015 ; Volume 9194 , July , 2015 , Pages 456-464 ; 03029743 (ISSN) ; 9783319209128 (ISBN) Mostafazadeh, A ; Nazari Shirehjin, A. A ; Daraei, S ; Sharif University of Technology
    Springer Verlag  2015
    Abstract
    The aim of this paper is the design and development of a novel user interface to interact with a meta system. Our focus is rather on interacting with Ambient Intelligence as a whole, which would for example enable users to influence the overall behavior and attributes of dynamic device compositions. We call such interfaces Meta User Interfaces. The design details of a proposed user interface as well as a cognitive walkthrough evaluation are presented in this paper  

    Towards interacting with smarter systems

    , Article Journal of Ambient Intelligence and Humanized Computing ; Volume 9, Issue 1 , February , 2018 , Pages 187-209 ; 18685137 (ISSN) Mostafazadeh Davani, A ; Nazari Shirehjini, A. A ; Daraei, S ; Sharif University of Technology
    Springer Verlag  2018
    Abstract
    The aim of this article is the requirement analysis, design, proof-of-concept implementation and user evaluation of a novel user interface that is specifically developed to support interaction with ambient intelligence systems. The focus of the user interface is rather on interacting with ambient intelligence, a meta system that comes into existence as the result of the coherent behavior and collective intelligence of interconnected smart devices and systems of a domain such as meeting rooms or smart homes. To design the user interface, we conducted an empirical user and task analysis and elaborated requirements, defining the scope of human interaction with ambient intelligence. The captured... 

    Asymptotically optimum detection of primary user in cognitive radio networks

    , Article IET Communications ; Volume 1, Issue 6 , December , 2007 , Pages 1138-1145 ; 17518628 (ISSN) Taherpour, A ; Norouzi, Y ; Nasiri Kenari, M ; Jamshidi, A ; Zeinalpour Yazdi, Z ; Sharif University of Technology
    2007
    Abstract
    Traditionally, the frequency spectrum is licensed to users by government agencies in a fixed manner where the licensee has exclusive right to access the allocated band. However, with increasing demand for the spectrum and scarcity of vacant bands, a spectrum policy reform seems inevitable. Meanwhile, recent measurements suggest the possibility of sharing spectrum among different parties subject to interference-protection constraints. In order to enable access to an unused licensed spectrum, a secondary user has to monitor licensed bands and opportunistically transmit whenever no primary signal is detected. Spectrum-sharing between a primary licensee and a group of secondary users has been...