Advances in Human Factors, Software, and Systems Engineering

Proceedings of the AHFE 2017 International Conference on Human Factors, Software, and Systems Engineering, July 17-21, 2017, The Westin Bonaventure Hotel, Los Angeles, California, USA
 
 
Springer (Verlag)
  • erschienen am 10. Juni 2017
  • |
  • X, 196 Seiten
 
E-Book | PDF mit Adobe-DRM | Systemvoraussetzungen
E-Book | PDF mit Wasserzeichen-DRM | Systemvoraussetzungen
978-3-319-60011-6 (ISBN)
 

This book provides a platform for addressing human factors in software and systems engineering, both pushing the boundaries of current research and responding to new challenges, fostering new research ideas in the process. Topics include evolutionary and complex systems, human systems integration, smart grids and infrastructure, workforce training requirements, systems engineering education, and defense and aerospace. Based on the AHFE 2017 International Conference on Human Factors, Software, and Systems Engineering, held on July 17-21, 2017, Los Angeles, USA, this book is an inspiring guide for all researchers and professionals in the field of human factors, software and systems engineering.

weitere Ausgaben werden ermittelt
  • Intro
  • Advances in Human Factors and Ergonomics 2017
  • Preface
  • Contents
  • Methods and Techniques
  • Usage Perspective Development Approach in the Fuzzy Front End
  • Abstract
  • 1 Introduction
  • 2 Purpose
  • 3 Methodology
  • 4 The Electric Vehicle Survey
  • 4.1 Structure and Conduction
  • 4.2 Participants of the Electric Vehicle Survey
  • 4.3 Evaluation of the Survey with Regard to the Usage Model
  • 5 Open Innovation Survey
  • 5.1 Participants of the OI Survey
  • 5.2 Evaluation of the OI Survey
  • 5.3 Results of the OI Survey
  • 6 Expert Interviews with Aspiring Engineers
  • 6.1 Results of the Engineer Interviews
  • 7 Results
  • 8 Conclusion
  • References
  • Human Factors Approach to Study Border Control Automation Impacts and Needs: Methodology and Preliminary Results of Field Studies
  • Abstract
  • 1 Introduction
  • 2 Methodology
  • 3 First Results
  • 3.1 Tasks Performed at Border Check
  • 3.2 Organizational Aspects
  • 3.3 Technological Aspects
  • 4 Discussion
  • Acknowledgements
  • References
  • Strategies to Improve At-risk Students' Learning and Achievement: Undergraduate Software Engineering Course Case Study
  • Abstract
  • 1 Introduction
  • 2 Background
  • 3 Plan for the Intervention
  • 4 Methodology
  • 5 Reflections on the Intervention
  • 6 Conclusion
  • References
  • Bibliometric Analysis of Human Factors Research: Intellectual Structure and Evolution
  • Abstract
  • 1 Introduction
  • 2 Material and Method
  • 2.1 Subject
  • 2.2 Apparatus and Software
  • 3 Procedure
  • 3.1 Data Analysis
  • 3.2 Analysis of Co-citation
  • 4 Conclusions
  • Acknowledgment
  • References
  • Building the Knowledge-Based System of Machining Supplier Matching
  • Abstract
  • 1 Introduction
  • 2 Methods
  • 2.1 Structure Design of Intelligent System for Machine Tool
  • 2.2 Knowledge Representation of Machine Process Selection
  • 2.3 On-Line Matchmaking Process
  • 2.4 Planning Hierarchy
  • 3 Case Study
  • 4 Conclusions
  • References
  • Software Cost Estimation for User-Centered Mobile App Development in Large Enterprises
  • Abstract
  • 1 Introduction
  • 2 Related Work
  • 2.1 Cost and Effort Estimation in Mobile App Development
  • 2.2 Web Tools for Cost and Effort Estimation
  • 2.3 Other Tools for Cost and Effort Estimation
  • 3 Approach and Evaluation
  • 3.1 Methodology
  • 3.2 Procedure
  • 4 Results
  • 5 Discussion
  • 6 Managerial Implications
  • 7 Conclusion
  • Acknowledgements
  • References
  • Assessing the Effectiveness of Emoticon-Like Scripting in Computer Programming
  • Abstract
  • 1 Introduction
  • 2 Methods
  • 2.1 Human-Readability of Programming Languages
  • 2.2 Properties
  • 3 Implementation
  • 4 Experimental Results
  • 4.1 Manual Observation of Student Coding Patterns
  • 4.2 Quantitative Analysis
  • 4.3 Perceived Usefulness and Perceived Ease of Use
  • 5 Conclusions
  • References
  • Adaptive Interface Combined to Interface Patterns in Human Factors
  • Abstract
  • 1 Introduction
  • 2 Human-Computer Interaction
  • 2.1 Concepts and Human Factors
  • 2.2 Adaptive Interface
  • 2.3 Interface Patterns
  • 3 Interface Patterns for Adaptive Interface
  • 4 Conclusion
  • Acknowledgments
  • References
  • A Stochastic Programming Model for Resource Allocation with Uncertainties and Carbon Emission Constraints
  • Abstract
  • 1 Introduction
  • 2 Literature Review
  • 3 Model Formulation
  • 4 Structural Properties
  • 4.1 Theorem 1
  • 4.2 Theorem 2
  • 5 Numerical Example
  • 6 Conclusion
  • Acknowledgments
  • References
  • Body Temperature Monitoring System for Slaughterhouse Workers
  • Abstract
  • 1 Introduction
  • 2 Market Research
  • 3 Hardware and Software
  • 3.1 Introduction
  • 3.2 Zigbee Network Technology
  • 3.3 Personal Measurement Module
  • 3.4 Environmental Measurement Module
  • 3.5 User Interface
  • 4 Results and Discussion
  • 5 Conclusion
  • References
  • Applications
  • Efficient Language Model Generation Algorithm for Mobile Voice Commands
  • Abstract
  • 1 Overview
  • 2 SMASH Voice Command Workflow
  • 3 Enabling Always Listening Voice Command Operation in SMASH with the CMU PocketSphinx Speech Recognizer
  • 3.1 Always Listening Voice Command Service
  • 3.2 Grammar Graph Generation
  • 3.3 Notification Generation
  • 4 Automated Model Optimization Data (AMOD)
  • 5 On-the-Fly Automated Language Model Creation in SMASH
  • 5.1 Generate Orthographies
  • 5.2 Generate Vocabulary
  • 5.3 Pick and Determine Number of AMOD Words
  • 5.4 Generate AMOD Orthographies
  • 5.5 Create a Final Orthography List
  • 5.6 Generate the Language Model
  • 5.7 Generate the Dictionary
  • 6 Future Work on SMASH and AMOD
  • References
  • The Modeling of Technological Trade-off in Battery System Design Based on an Ergonomic and Low-Cost Alternative Battery Technology
  • Abstract
  • 1 Introduction
  • 2 The Ergonomic and Low-Cost Alternative Battery Technology
  • 3 The Trade-off Model
  • 4 Ultimate Objective: Optimization
  • 5 Discussion
  • Acknowledgments
  • References
  • The Construction of the Picture Database for Different Ethnic Life Styles: A Case Study of Lifestyles of Health and Sustainability (LOHAS)
  • Abstract
  • 1 Introduction
  • 2 Literature Review
  • 2.1 Image Board
  • 2.2 Image Map
  • 2.3 Images and Life Style
  • 2.4 Semantic Differential Scale
  • 3 Research Methods
  • 4 Research Results
  • 5 Conclusions and Suggestions
  • Acknowledgments
  • References
  • Defining 'Architecture' for Software Engineering - A Review of Terminology
  • Abstract
  • 1 Introduction
  • 2 Perspectives
  • 2.1 Enterprise Architecture
  • 2.2 Business Architecture
  • 2.3 Information Architecture
  • 2.4 Solutions Architecture
  • 2.5 Infrastructure Architecture
  • 2.6 Systems Architecture
  • 2.7 Integration Architecture
  • 2.8 Applications Architecture
  • 2.9 Technologies Architecture
  • 2.10 Software Architecture
  • 3 Proposal
  • 3.1 Enterprise Architecture
  • 3.2 Business Architecture
  • 3.3 Information Architecture
  • 3.4 Solutions Architecture
  • 3.5 Infrastructure Architecture
  • 3.6 Systems Architecture
  • 3.7 Integration Architecture
  • 3.8 Application Architecture
  • 3.9 Technology Architecture
  • 3.10 Software Architecture
  • 4 Discussion
  • Acknowledgments
  • References
  • Design of a Secure Location Based Service for Mobile Cloud Applications
  • Abstract
  • 1 Introduction
  • 2 Review on Mobile Cloud Computing and Applications
  • 2.1 Advantages of Mobile Cloud
  • 3 Proposed System
  • 3.1 A Components of Location Based Mobile Cloud Model
  • 4 Conclusion
  • References
  • Ground Penetrating Radar for Measuring Thickness of an Unbound Layer of a Pavement
  • Abstract
  • 1 Introduction
  • 2 Objectives
  • 3 Test Background
  • 3.1 GPR
  • 3.2 Percometer
  • 4 Field and Laboratory Tests
  • 4.1 Field
  • 4.2 Laboratory
  • 5 Results and Discussion
  • 5.1 Dielectric Constant
  • 5.2 Base Layer Thickness
  • 6 Conclusion
  • Acknowledgments
  • References
  • Research on Paper Submission Management System by Using Automatic Text Categorization
  • Abstract
  • 1 Introduction
  • 2 Paper Submission Management System
  • 3 Document Categorization
  • 3.1 Content-Based Versus Request-Based Classification
  • 3.2 Classification Versus Indexing
  • 3.3 Automatic Document Classification (ADC)
  • 3.4 Applications
  • 4 Paper Submission Management System by Using Automatic Text Categorization
  • 5 SVM
  • 6 Conclusion
  • References
  • Impact Analysis of Demonetization on Service Sector: An Indian Experience
  • Abstract
  • 1 Introduction
  • 2 Money, Monetization and Demonetization
  • 2.1 Operational Framework/Practice
  • 2.2 Current Debate
  • 3 Impact Analysis
  • 3.1 Massive Decline in Currency in Circulation
  • 3.2 Economic Growth
  • 3.3 Inflation
  • 3.4 Black Money and Counterfeit Currency
  • 3.5 Impact on the Union Budget
  • 4 Impact on the Service Sector
  • 4.1 Low Income Service Providers are Not Aware of the Concept or the Consequence of Demonetization
  • 4.2 The Man on the Road is Not Aware of Black Money but Has a Perception that Rich People Have Black Money
  • 4.3 Demonetization is Pro-poor Because It is Anti-rich
  • 4.4 The Role of RBI as the Creator & Destroyer of Money Never Surfaced Since the Prime Minister Became the Visible Face of Demonetization
  • 4.5 Ignorance of the Masses Helped the Government Surmount the Procedural Ambiguity & Opacity
  • 5 Conclusion
  • Acknowledgements
  • References
  • The Key Success Factors in the Development of Platform-Based Business in China - Case Study on Alibaba and Jingdong
  • Abstract
  • 1 Preface
  • 2 The Situation of E-commerce Retail Trade in China
  • 3 The Development Trend of Retail E-commerce
  • 3.1 Omni-Channel Business Model
  • 3.2 Some Features of Omni-Channel Business Model
  • 3.3 Comparison Between Ali and JD as a Service Platform
  • 4 The Key Factors in Shift to Platform-Based Business in China
  • 4.1 Quality of Product
  • 4.2 Quality of Service
  • 4.3 The Employee
  • 5 Conclusion
  • References
  • Author Index

Dateiformat: PDF
Kopierschutz: Adobe-DRM (Digital Rights Management)

Systemvoraussetzungen:

Computer (Windows; MacOS X; Linux): Installieren Sie bereits vor dem Download die kostenlose Software Adobe Digital Editions (siehe E-Book Hilfe).

Tablet/Smartphone (Android; iOS): Installieren Sie bereits vor dem Download die kostenlose App Adobe Digital Editions (siehe E-Book Hilfe).

E-Book-Reader: Bookeen, Kobo, Pocketbook, Sony, Tolino u.v.a.m. (nicht Kindle)

Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Mit Adobe-DRM wird hier ein "harter" Kopierschutz verwendet. Wenn die notwendigen Voraussetzungen nicht vorliegen, können Sie das E-Book leider nicht öffnen. Daher müssen Sie bereits vor dem Download Ihre Lese-Hardware vorbereiten.

Bitte beachten Sie bei der Verwendung der Lese-Software Adobe Digital Editions: wir empfehlen Ihnen unbedingt nach Installation der Lese-Software diese mit Ihrer persönlichen Adobe-ID zu autorisieren!

Weitere Informationen finden Sie in unserer E-Book Hilfe.


Dateiformat: PDF
Kopierschutz: Wasserzeichen-DRM (Digital Rights Management)

Systemvoraussetzungen:

Computer (Windows; MacOS X; Linux): Verwenden Sie zum Lesen die kostenlose Software Adobe Reader, Adobe Digital Editions oder einen anderen PDF-Viewer Ihrer Wahl (siehe E-Book Hilfe).

Tablet/Smartphone (Android; iOS): Installieren Sie die kostenlose App Adobe Digital Editions oder eine andere Lese-App für E-Books (siehe E-Book Hilfe).

E-Book-Reader: Bookeen, Kobo, Pocketbook, Sony, Tolino u.v.a.m. (nur bedingt: Kindle)

Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Mit Wasserzeichen-DRM wird hier ein "weicher" Kopierschutz verwendet. Daher ist technisch zwar alles möglich - sogar eine unzulässige Weitergabe. Aber an sichtbaren und unsichtbaren Stellen wird der Käufer des E-Books als Wasserzeichen hinterlegt, sodass im Falle eines Missbrauchs die Spur zurückverfolgt werden kann.

Weitere Informationen finden Sie in unserer E-Book Hilfe.


Download (sofort verfügbar)

149,79 €
inkl. 7% MwSt.
Download / Einzel-Lizenz
PDF mit Adobe-DRM
siehe Systemvoraussetzungen
E-Book bestellen

149,79 €
inkl. 7% MwSt.
Download / Einzel-Lizenz
PDF mit Wasserzeichen-DRM
siehe Systemvoraussetzungen
E-Book bestellen