Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 3 de 3
Filtrar
Mais filtros










Base de dados
Intervalo de ano de publicação
1.
Sci Data ; 10(1): 831, 2023 11 25.
Artigo em Inglês | MEDLINE | ID: mdl-38007459

RESUMO

This article introduces a dataset of human-machine interactions collected in a controlled and structured manner. The aim of this dataset is to provide insights into user behavior and support the development of adaptive Human-Machine Interfaces (HMIs). The dataset was generated using a custom-built application that leverages formally defined User Interfaces (UIs). The resulting interactions underwent processing and analysis to create a suitable dataset for professionals and data analysts interested in user interface adaptations. The data processing stage involved cleaning the data, ensuring its consistency and completeness. A data profiling analysis was conducted for checking the consistency of elements in the interaction sequences. Furthermore, for the benefit of researchers, the code used for data collection, data profiling, and usage notes on creating adaptive user interfaces are made available. These resources offer valuable support to those interested in exploring and utilizing the dataset for their research and development efforts in the field of human-machine interfaces.

2.
Sensors (Basel) ; 22(6)2022 Mar 09.
Artigo em Inglês | MEDLINE | ID: mdl-35336299

RESUMO

The rapid evolution of industrial components, the paradigm of Industry 4.0, and the new connectivity features introduced by 5G technology all increase the likelihood of cybersecurity incidents. Such incidents are caused by the vulnerabilities present in these components. Designing a secure system is critical, but it is also complex, costly, and an extra factor to manage during the lifespan of the component. This paper presents a model to analyze the known vulnerabilities of industrial components over time. The proposed Extended Dependency Graph (EDG) model is based on two main elements: a directed graph representation of the internal structure of the component, and a set of quantitative metrics based on the Common Vulnerability Scoring System (CVSS). The EDG model can be applied throughout the entire lifespan of a device to track vulnerabilities, identify new requirements, root causes, and test cases. It also helps prioritize patching activities. The model was validated by application to the OpenPLC project. The results reveal that most of the vulnerabilities associated with OpenPLC were related to memory buffer operations and were concentrated in the libssl library. The model was able to determine new requirements and generate test cases from the analysis.


Assuntos
Benchmarking , Segurança Computacional , Probabilidade
3.
Healthcare (Basel) ; 3(2): 310-23, 2015 May 21.
Artigo em Inglês | MEDLINE | ID: mdl-27417764

RESUMO

The prevalence of Gestational Diabetes Mellitus (GDM) is increasing worldwide. Controlling blood sugar levels is fundamental to the management of GDM. Current practice in Norway includes patients registering blood sugar levels in a booklet and receiving verbal and/or written health information. A smartphone application may provide patients individually targeted and easily available advice to control blood sugar levels. The aim of this paper is to document the process of designing and developing a smartphone application (the Pregnant+ app) that automatically transfers blood sugar levels from the glucometer and has information about healthy eating and physical activity. This formative research included expert-group discussions among health professionals, researchers and experts in data privacy and security. User-involvement studies were conducted to discuss prototypes of the app. Results indicated that the content of the application should be easy to understand given the varying degree of patients' literacy and in line with the information they receive at clinics. The final version of the app incorporated behavior change techniques such as self-monitoring and cues to action. Results from the first round of interactions show the importance of involving expert groups and patients when developing a mobile health-care device.

SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA
...