65 resultados para user requirement
Resumo:
It is proposed that games, which are designed to generate positive affect, are most successful when they facilitate flow (Csikszentmihalyi 1992). Flow is a state of concentration, deep enjoyment, and total absorption in an activity. The study of games, and a resulting understanding of flow in games can inform the design of non-leisure software for positive affect. The paper considers the ways in which computer games contravene Nielsen's guidelines for heuristic evaluation ( Nielsen and Molich 1990) and how these contraventions impact on flow. The paper also explores the implications for research that stem from the differences between games played on a personal computer and games played on a dedicated console. This research takes important initial steps towards de. ning how flow in computer games can inform affective design.
Resumo:
The data structure of an information system can significantly impact the ability of end users to efficiently and effectively retrieve the information they need. This research develops a methodology for evaluating, ex ante, the relative desirability of alternative data structures for end user queries. This research theorizes that the data structure that yields the lowest weighted average complexity for a representative sample of information requests is the most desirable data structure for end user queries. The theory was tested in an experiment that compared queries from two different relational database schemas. As theorized, end users querying the data structure associated with the less complex queries performed better Complexity was measured using three different Halstead metrics. Each of the three metrics provided excellent predictions of end user performance. This research supplies strong evidence that organizations can use complexity metrics to evaluate, ex ante, the desirability of alternate data structures. Organizations can use these evaluations to enhance the efficient and effective retrieval of information by creating data structures that minimize end user query complexity.
Resumo:
Mitchell critiques Georges Perec's Life a User's Manual, which articulates compellingly the confluence of literature and architecture studies that emerged in the late twentieth century. She argues the Perec's novel diverges from this tradition, for, rather than being a search for origins and true expression, Life a User's Manual denies the very possibility of originality. She adds that Perec's architext is de-constructive and ironic.
Resumo:
This paper arises out of a research study into the online help facilities provided in popular software applications such as word processors. Its particular focus is on experimental methods of evaluating the effectiveness and usability of those facilities. Focus groups, questionnaires, and online surveys had already been used in other phases of the study, but it was judged that these approaches would be unsuitable for measuring effectiveness and usability because they are susceptible to respondents' subjectivity. Direct observation of people working on set word-processing tasks was ruled out initially because of a lack of trained observers; it would have taken too long for the investigator to observe a large enough sample by himself. Automatic recording of users' actions was also rejected, as it would have demanded equipment and/or software that was not available and seemed too expensive to acquire. The approach and techniques described here were an attempt to overcome these difficulties by using observers drawn from the same population of students that provided the test subjects; as a by-product, this may also have enhanced the acceptability (and hence possibly the validity) of the experiments by reducing the exam pressure perceived by participants.
Resumo:
Specific 3-azabicyclo[3.3.1]nonane derivatives undergo skeletal cleavage when subjected to light or Lewis acidic conditions affording novel heteratricycles, which is in stark contrast to 3-oxabicyclo[3.3.1]nonanes. (c) 2005 Elsevier Ltd. All rights reserved.
Resumo:
The non-use provisions of the Trade Marks Act 1995 (Cth) have attracted some attention in recent reviews of the trade marks system and some reform of these provisions now seems likely. Unfortunately, however, there has been a failure to confront the full range of problems that hamper the effectiveness of the current non-use provisions. Once these problems are properly understood, it can be seen that more wide-reaching reforms than those being canvassed at present merit serious consideration.
Resumo:
SFTI-1 is a small cyclic peptide from sunflower seeds that is one of the most potent trypsin inhibitors of any naturally occurring peptide and is related to the Bowman-Birk family of inhibitors (BBIs). BBIs are involved in the defense mechanisms of plants and also have potential as cancer chemopreventive agents. At only 14 amino acids in size, SFTI-1 is thought to be a highly optimized scaffold of the BBI active site region, and thus it is of interest to examine its important structural and functional features. In this study, a suite of 12 alanine mutants of SFTI-1 has been synthesized, and their structures and activities have been determined. SFTI-1 incorporates a binding loop that is clasped together with a disulfide bond and a secondary peptide loop making up the circular backbone. We show here that the secondary loop stabilizes the binding loop to the consequences of sequence variations. In particular, full-length BBIs have a conserved cis-proline that has been shown previously to be required for well defined structure and potent activity, but we show here that the SFTI-1 scaffold can accommodate mutation of this residue and still have a well defined native-like conformation and nanomolar activity in inhibiting trypsin. Among the Ala mutants, the most significant structural perturbation occurred when Asp(14) was mutated, and it appears that this residue is important in stabilizing the trans peptide bond preceding Pro(13) and is thus a key residue in maintaining the highly constrained structure of SFTI-1. This aspartic acid residue is thought to be involved in the cyclization mechanism associated with excision of SFTI-1 from its 58-amino acid precursor. Overall, this mutational analysis of SFTI-1 clearly defines the optimized nature of the SFTI-1 scaffold and demonstrates the importance of the secondary loop in maintaining the active conformation of the binding loop.
Resumo:
User requirements of multimedia authentication are various. In some cases, the user requires an authentication system to monitor a set of specific areas with respective sensitivity while neglecting other modification. Most current existing fragile watermarking schemes are mixed systems, which can not satisfy accurate user requirements. Therefore, in this paper we designed a sensor-based multimedia authentication architecture. This system consists of sensor combinations and a fuzzy response logic system. A sensor is designed to strictly respond to given area tampering of a certain type. With this scheme, any complicated authentication requirement can be satisfied, and many problems such as error tolerant tamper method detection will be easily resolved. We also provided experiments to demonstrate the implementation of the sensor-based system