Searched for: subject%3A%22usability%22
(1 - 20 of 108)

Pages

document
Bestebreur, Timon (author)
The versatility of the internet enables many applications that play an increasingly bigger role in our society. However, users have little control over the route that their internet traffic takes, which prevents them from controlling who sees their packets and how their traffic is handled. Researchers have proposed an extension to the internet,...
master thesis 2024
document
Rätz, R. (author), Ratschat, A.L. (author), Cividanes Garcia, N. (author), Ribbers, G.M. (author), Marchal Crespo, L. (author)
In stroke rehabilitation, simple robotic devices hold the potential to increase the training dosage in group therapies and to enable continued therapy at home after hospital discharge. However, we identified a lack of portable and cost-effective devices that not only focus on improving motor functions but also address sensory deficits. Thus, we...
journal article 2024
document
Anker, Thomas (author)
Post-mortem interval estimation (PMI) is a key part of forensic investigation. Accurately obtaining a PMI early in the investigative process improves the reconstruction of events, directs follow-up research and narrows down suspects in case of homicide. Currently, PMI is determined using Henssge’s nomogram requiring ambient temperature, rectal...
master thesis 2023
document
Moonen, Anne (author)
This project addresses the subject of integrating Computerized Maintenance Management Systems (CMMS) into low-to-middle income healthcare contexts, with a specific focus on Nepal. CMMS play a prominent role in enabling Biomedical Equipment Technicians (BMETs) to monitor and optimize the performance of medical equipment (WHO, 2012), streamline...
master thesis 2023
document
Juhošová, Sára (author)
Formal verification is a powerful tool for ensuring program correctness but is often hard to learn to use and has not yet spread into the commercial world. This thesis focuses on finding an easy-to-use solution to make formal verification available in popular programming language ecosystems. We propose a solution where users can write code in an...
master thesis 2023
document
Voorneveld, Elvira (author)
Behavior support applications aim to provide personalized and flexible support to users in various domains. To achieve this, understanding users' preferences, values, and context is crucial. Creating user models that incorporate users' norms and values has been proposed as a solution to capture the relationship between desired behaviors and...
bachelor thesis 2023
document
Abdelgawad, Ahmed A. (author), Comes, M. (author)
Evaluation and testing are significant steps in developing any information system. More attention must be devoted to these steps if the system is to be used in high-risk contexts, such as the response to conflict disasters. Several testing methodologies are designed to guarantee that software fulfills technology requirements; others will assure...
book chapter 2023
document
Cardaioli, Matteo (author), Conti, M. (author), Orazi, Gabriele (author), Tricomi, Pier Paolo (author), Tsudik, Gene (author)
Authentication and de-authentication phases should occur at the beginning and end of secure user sessions, respectively. A secure session requires the user to pass the former, but the latter is often underestimated or ignored. Unattended or dangling sessions expose users to well-known Lunchtime Attacks. To mitigate this threat, researchers...
journal article 2023
document
Meijer, Mirjam (author)
In this graduation project for the start-up Dispertech, the usability and workflow of their NanoCET device is improved. The NanoCET is a research tool used in hospital and university laboratories, for which the following problem was stated: researchers and technicians working in labs have difficulty setting up and using the NanoCET device and...
master thesis 2022
document
Cardaioli, Matteo (author), Conti, M. (author), Tricomi, Pier Paolo (author), Tsudik, Gene (author)
Ideally, secure user sessions should start and end with authentication and de-Authentication phases, respectively. While the user must pass the former to start a secure session, the latter's importance is often ignored or underestimated. Dangling or unattended sessions expose users to well-known Lunchtime Attacks. To mitigate this threat, the...
conference paper 2022
document
Rometsch, Flavie A.A.S.D.T. (author), Casini, Andrea E.M. (author), Drepper, Anne (author), Cowley, Aidan (author), de Winter, J.C.F. (author), Guo, J. (author)
Humans are embarking on a new era of space exploration with the plan of sending crewed spacecraft to the Moon, Mars, and beyond. Extravehicular activities (EVAs) will be an essential part of the scientific activities to be carried out in these missions, and they will involve extensive geological fieldwork. These EVAs entail many challenges as...
journal article 2022
document
Dorronzoro-Zubiete, Enrique (author), Rivera-Romero, Octavio (author), Giunti, Guido (author), Sevillano, José Luis (author)
The lifespan of older people is growing together with their proportion in the population growth in the older population. This leads to an increasing need for support services for older adults who will inevitably experience a significant decrease in their cognitive capabilities and mental health conditions. Cognitive functions, including...
book chapter 2022
document
Pilshchikova, L. (author), Zuiderwijk-van Eijk, A.M.G. (author), Janssen, M.F.W.H.A. (author)
Non-profit organisations (NPOs) are one type of open data intermediaries connecting different actors in the open data ecosystem. They perform a number of activities, from requesting the government to open up the data to application development. Such activities can have an effect on open data usability barriers that other actors in the open data...
conference paper 2022
document
Bengtson, M.L. (author), Onasanya, A.A. (author), Oyibo, P.O. (author), Meulah, Brice (author), Samenjo, K.T. (author), Braakman, I.G. (author), Andi, Wellington Oyibo (author), Diehl, J.C. (author)
Schistosomiasis is a neglected tropical disease thatis predominantly diagnosed by conventional microscopy in Sub-Saharan Africa. However, effective diagnosis by conventional microscopy is limited by multiple technical and logistic barriers.Alternative diagnostic techniques are needed. The Schistoscope is a digital optical device that has been...
conference paper 2022
document
Wenk, Nicolas (author), Buetler, Karin A. (author), Penalver-Andres, Joaquin (author), Müri, René M. (author), Marchal Crespo, L. (author)
Background: The relearning of movements after brain injury can be optimized by providing intensive, meaningful, and motivating training using virtual reality (VR). However, most current solutions use two-dimensional (2D) screens, where patients interact via symbolic representations of their limbs (e.g., a cursor). These 2D screens lack depth...
journal article 2022
document
Faber, Robin (author)
Agent-based simulation models are rising in popularity recently due to their ability to model real-world problems in a wide range of domains. Inherent to these types of simulations is the fact that an enormous amount of data can be generated, which needs to be analysed in order to make the simulation useful. At the moment, the available tools to...
master thesis 2021
document
Steenbergen, Merel (author)
Self-sovereign identity (SSI) provides users of the internet control over their own data by letting them store it on their own device or in a decentralized way, such as on a blockchain. The Super App is an SSI application currently under development by the Delft Blockchain Lab, but it still lacks one of the core features of SSI, which is...
bachelor thesis 2021
document
Beeris, Casper (author)
Nacra is a catamaran builder focused on racing catamarans. Nacra wants to broader its target market. The design goal is to develop a solution that makes Nacra’s recreational catamarans accessible but look and feel high-performance. The project results in a more accessible catamaran for novice sailors and sailors without prior<br/>experience on a...
master thesis 2021
document
Wenk, N. (author), Penalver-Andres, J. (author), Buetler, K. A. (author), Nef, T. (author), Müri, R. M. (author), Marchal Crespo, L. (author)
Virtual reality (VR) is a promising tool to promote motor (re)learning in healthy users and brain-injured patients. However, in current VR-based motor training, movements of the users performed in a three-dimensional space are usually visualized on computer screens, televisions, or projection systems, which lack depth cues (2D screen), and...
journal article 2021
document
Li, Wenting (author), Cheng, Haibo (author), Wang, Ping (author), Liang, K. (author)
Multi-factor authentication (MFA) has been widely used to safeguard high-value assets. Unlike single-factor authentication (e.g., password-only login), t-factor authentication (tFA) requires a user always to carry and present t specified factors so as to strengthen the security of login. Nevertheless, this may restrict user experience in...
journal article 2021
Searched for: subject%3A%22usability%22
(1 - 20 of 108)

Pages