Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (16)
  • Open Access


    Blind and Visually Impaired User Interface to Solve Accessibility Problems

    Azeem Shera1, Muhammad Waseem Iqbal2,*, Syed Khuram Shahzad3, Madeeha Gul1, Natash Ali Mian4, Muhammad Raza Naqvi5, Babar Ayub Khan1

    Intelligent Automation & Soft Computing, Vol.30, No.1, pp. 285-301, 2021, DOI:10.32604/iasc.2021.018009

    Abstract Blind and visually impaired (BVI) users often have interface accessibility problems while using mobile applications. This study was conducted to reduce the cognitive effort required for interface navigation by identifying the accessibility issues according to the user’s mental model. The study evaluated the accessibility of smartphone screens to solve organizational, presentation, and behavioral (OPB) problems of using mobile applications. Usability evaluation of an application was conducted and validated with a specific focus on BVI user experience. A total of 56 BVI participants were included in the evaluation. Overall, four tasks to assess organization, avoidance of redundant information, serialization of content,… More >

  • Open Access


    Usability Evaluation Through Fuzzy AHP-TOPSIS Approach: Security Requirement Perspective

    Yoosef B. Abushark1, Asif Irshad Khan1,*, Fawaz Jaber Alsolami1, Abdulmohsen Almalawi1, Md Mottahir Alam2, Alka Agrawal3, Rajeev Kumar3,4, Raees Ahmad Khan3

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 1203-1218, 2021, DOI:10.32604/cmc.2021.016610

    Abstract Most of the security strategies today are primarily designed to provide security protection, rather than to solve one of the basic security issues related to adequate software product architecture. Several models, frameworks and methodologies have been introduced by the researchers for a secure and sustainable software development life cycle. Therefore it is important to assess the usability of the popular security requirements engineering (SRE) approaches. A significant factor in the management and handling of successful security requirements is the assessment of security requirements engineering method performance. This assessment will allow changes to the engineering process of security requirements. The consistency… More >

  • Open Access


    AI-Based Culture Independent Pervasive M-Learning Prototype Using UI Plasticity Design

    Mahdi H. Miraz1,2,*, Maaruf Ali3, Peter S. Excell2, Sajid Khan4

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 1021-1039, 2021, DOI:10.32604/cmc.2021.015405

    Abstract This paper explains the development of a culturally inclusive ubiquitous M-Learning platform (“Mobile Academy”) with an AI-based adaptive user interface. The rationale and need for this research and development are justified by the continuing widespread adoption of the Internet and Internet enabled devices, especially smartphones. The M-learning platform was designed from the onset for the global traveller. The characteristics and limitations of the application are also discussed. The Mobile Academy, proof of concept prototype, was created to facilitate teaching and learning on the move or in environments where the use of a desktop computer is inconvenient or simply impossible. The… More >

  • Open Access


    Toward the Optimization of the Region-Based P300 Speller

    A. Benabid Najjar1,*, N. AlSahly2, R. AlShamass1, M. Hosny2

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 1169-1189, 2021, DOI:10.32604/cmc.2021.014140

    Abstract Technology has tremendously contributed to improving communication and facilitating daily activities. Brain-Computer Interface (BCI) study particularly emerged from the need to serve people with disabilities such as Amyotrophic Lateral Sclerosis (ALS). However, with the advancements in cost-effective electronics and computer interface equipment, the BCI study is flourishing, and the exploration of BCI applications for people without disabilities, to enhance normal functioning, is increasing. Particularly, the P300-based spellers are among the most promising applications of the BCI technology. In this context, the region-based paradigm for P300 BCI spellers was introduced in an effort to reduce the crowding effect and adjacency problem… More >

  • Open Access


    Investigating the Use of Email Application in Illiterate and SemiIlliterate Population

    Sadeeq Jan1, Imran Maqsood2, Salman Ahmed3, *, Zahid Wadud3, Iftikhar Ahmad4

    CMC-Computers, Materials & Continua, Vol.62, No.3, pp. 1473-1486, 2020, DOI:10.32604/cmc.2020.08917

    Abstract The use of electronic communication has been significantly increased over the last few decades. Email is one of the most well-known means of electronic communication. Traditional email applications are widely used by a large population; however, illiterate and semi-illiterate people face challenges in using them. A major population of Pakistan is illiterate that has little or no practice of computer usage. In this paper, we investigate the challenges of using email applications by illiterate and semiilliterate people. In addition, we also propose a solution by developing an application tailored to the needs of illiterate/semi-illiterate people. Research shows that illiterate people… More >

  • Open Access


    Reusing the Evaluations of Basis Functions in the Integration for Isogeometric Analysis

    Zijun Wu1, Shuting Wang2, Wenjun Shao3, *, Lianqing Yu1

    CMES-Computer Modeling in Engineering & Sciences, Vol.122, No.2, pp. 459-485, 2020, DOI:10.32604/cmes.2020.08697

    Abstract We propose a new approach to reuse the basis function evaluations in the numerical integration of isogeometric analysis. The concept of reusability of the basis functions is introduced according to their symmetrical, translational and proportional features on both the coarse and refined levels. Based on these features and the parametric domain regularity of each basis, we classify the bases on the original level and then reuse them on the refined level, which can reduce the time for basis calculations at integration nodes. By using the sum factorization method and the mean value theorem for the integrals, a new integration method… More >

Displaying 11-20 on page 2 of 16. Per Page