specification method
Recently Published Documents


TOTAL DOCUMENTS

151
(FIVE YEARS 16)

H-INDEX

11
(FIVE YEARS 1)

2022 ◽  
Vol 12 (1) ◽  
pp. 479
Author(s):  
Victor Ponce ◽  
Bessam Abdulrazak

Context-aware application development frameworks enable context management and environment adaptation to automatize people’s activities. New technologies such as 5G and the Internet of Things (IoT) increase environment context (from devices/services), making functionalities available to augment context-aware applications. The result is an increased deployment of context-aware applications to support end-users in everyday activities. However, developing applications in context-aware frameworks involve diverse technologies, so that it traditionally involves software experts. In general, context-aware applications are limited in terms of personalization for end-users. They include configurations to personalize applications, but non-software experts can only change some of these configurations. Nowadays, advances in human–computer interaction provide techniques/metaphors to approach non-software experts. One approach is end-user development (EUD)—a set of activities and development tools that considers non-software experts as application builders. In this paper, we present our analysis of existing EUD approaches for building context-aware applications. We present a literature review of 37 screened papers obtained from research databases. This review aims to identify the methods, techniques, and tools proposed to build context-aware applications. Specifically, we reviewed EUD building techniques and implementations. Building techniques include metaphors/interaction styles proposed for application specification, composition, and testing. The implementations include a specification method to integrate and process context on the target application platforms. We also present the adoption trend and challenges of context-aware end-user development.


2021 ◽  
Vol 5 (4) ◽  
pp. 131
Author(s):  
Xingjian Wei ◽  
Abhinav Bhardwaj ◽  
Li Zeng ◽  
Zhijian Pei

PolyJet 3D printing can produce any color by mixing multiple materials. However, there are often large deviations between the measured color of printed samples and the target color (when the target color is used as the specified color in the printer software). Therefore, to achieve a target color on a printed sample, the specified color in the printer software should not be the same as the target color. This study applies response surface methodology (RSM) to determine the optimal color specification to compensate for color deviations of the measured color of printed samples from the target color in PolyJet 3D printing. The RSM has three steps. First, a set of experiments are designed for a target color according to central composite design. Second, the experimental data are used to develop a second-order multivariate multiple regression model to predict the deviation between the measured color and the target color. Third, the optimal color specification (often different from the target color) is determined by using the developed predictive model and the desirability function. When the optimal color specification is used as the specified color in the printer software, the deviation between the predicted color of the printed sample and the target color is minimized. The proposed method is applied to four target colors to demonstrate its effectiveness. The results show that the proposed method performs better than the conventional color specification method without compensation in achieving the four target colors by 33% on average.


Sensitive secret data transmission through internet has been of great security concern which can be overcome by steganographic methods achieved through secret image sharing. Two novel steganographic secret algorithms based on colour visual cryptography and exact histogram specification is proposed in the present study. The former approach combines colour visual cryptography with a secret key to produce less distorted meaningful share images. A specified histogram acts as the key for the second approach and provides better security and data obscurity compared to conventional approaches. A novel histogram specification method is also proposed which exactly matches the histogram of an image to a specified histogram


Sign in / Sign up

Export Citation Format

Share Document