Browsing by Keyword "Human-Computer Interaction"
Now showing 1 - 17 of 17
Results Per Page
Sort Options
Item Accessible Ubiquitous Services for Supporting Daily Activities: A Case Study with Young Adults with Intellectual Disabilities(2018-12-28) Aizpurua, Amaia; Miñón, Raúl; Gamecho, Borja; Cearreta, Idoia; Arrue, Myriam; Garay-Vitoria, Nestor; HPAUbiquitous environments have considerable potential to provide services supporting daily activities (using public transportation to and from workplace, using ATM machines, selecting and purchasing goods in ticketing or vending machines, etc.) in order to assist people with disabilities. Nevertheless, the ubiquitous service providers generally supply generic user interfaces which are not usually accessible for all potential end users. In this article, a case study to verify the adequacy of the user interfaces automatically generated by the Egoki system for two supporting ubiquitous services adapted to young adults with moderate intellectual disabilities was presented. The task completion times and the level of assistance required by participants when using the interfaces were analyzed. Participants were able to access services through a tablet and successfully complete the tasks, regardless of their level of expertise and familiarity with the service. Moreover, results indicate that their performance and confidence improved with practice, as they required fewer direct verbal and pointer cues to accomplish tasks. By applying observational methods during the experimental sessions, several potential improvements for the automated interface generation process were also detected.Item Application of full-reference video quality metrics in IPTV(IEEE, 2017-07-20) Sedano, Inigo; Prieto, Gorka; Brunnstrom, Kjell; Kihl, Maria; Montalban, Jon; FACTORYExecuting an accurate full-reference metric such as VQM can take minutes in an average computer for just one user. Therefore, it can be unfeasible to analyze all the videos received by users in an IPTV network for example consisting of 10.000 users using a single computer running the VQM metric. One solution can be to use a lightweight no-reference metrics in addition to the full-reference metric mentioned. Lightweight no-reference metrics can be used for discarding potential situations to evaluate because they are accurate enough for that task, and then the full-reference metric VQM can be used when more accuracy is needed. The work in this paper is focused on determining the maximum number of situations/users that can be analyzed simultaneously using the VQM metric in a computer with good performance. The full-reference metric is applied on the transmitter using a method specified in the recommendation ITU BT.1789. The best performance achieved was 112.8 seconds per process.Item Approaching maker's phenomenon(2016) Tabarés-Gutiérrez, Raúl; Tecnalia Research & Innovation; BIGDATAThe rising of maker's movement in recent years has been spoiled by the popularization of open source technologies like 3d printing and many others. The expiration of a set of patents have made possible the emergence of several and different communities that play and tinker with technology. At the same time, these new sociotechnology based collectivities have its origins in other pre-existing ones such as "Do It Yourself" and "Hackers". Our goal in this paper is to perform a comprehensive analysis of all these trends reviewing the existing literature and identifying the main features, values and aspirations. Moreover, we argue some policy recommendations in order to maximize the impact of these spaces into the urban sphere trying to boost its potential in education and social innovation.Item Augmented Reality for Supporting Workers in Human–Robot Collaboration(2023-04-10) Moya, Ana; Bastida, Leire; Aguirrezabal, Pablo; Pantano, Matteo; Abril-Jiménez, Patricia; ADV_INTER_PLAT; VISUALThis paper discusses the potential benefits of using augmented reality (AR) technology to enhance human–robot collaborative industrial processes. The authors describe a real-world use case at Siemens premises in which an AR-based authoring tool is used to reduce cognitive load, assist human workers in training robots, and support calibration and inspection tasks during assembly tasks. The study highlights the potential of AR as a solution for optimizing human–robot collaboration and improving productivity. The article describes the methodology used to deploy and evaluate the ARContent tool, which demonstrated improved usability, reduced task load, and increased efficiency in the assembly process. However, the study is limited by the restricted availability of workers and their knowledge of assembly tasks with robots. The authors suggest that future work should focus on testing the ARContent tool with a larger user pool and improving the authoring tool based on the shortcomings identified during the study. Overall, this work shows the potential for AR technology to revolutionize industrial processes and improve collaboration between humans and robots.Item Cyber Hygiene Maturity Assessment Framework for Smart Grid Scenarios(2021-03-10) Skarga-Bandurova, Inna; Kotsiuba, Igor; Velasco, Erkuden Rios; CIBERSEC&DLTCyber hygiene is a relatively new paradigm premised on the idea that organizations and stakeholders are able to achieve additional robustness and overall cybersecurity strength by implementing and following sound security practices. It is a preventive approach entailing high organizational culture and education for information cybersecurity to enhance resilience and protect sensitive data. In an attempt to achieve high resilience of Smart Grids against negative impacts caused by different types of common, predictable but also uncommon, unexpected, and uncertain threats and keep entities safe, the Secure and PrivatE smArt gRid (SPEAR) Horizon 2020 project has created an organization-wide cyber hygiene policy and developed a Cyber Hygiene Maturity assessment Framework (CHMF). This article presents the assessment framework for evaluating Cyber Hygiene Level (CHL) in relation to the Smart Grids. Complementary to the SPEAR Cyber Hygiene Maturity Model (CHMM), we propose a self-assessment methodology based on a questionnaire for Smart Grid cyber hygiene practices evaluation. The result of the assessment can be used as a cyber-health check to define countermeasures and to reapprove cyber hygiene rules and security standards and specifications adopted by the Smart Grid operator organization. The proposed methodology is one example of a resilient approach to cybersecurity. It can be applied for the assessment of the CHL of Smart Grids operating organizations with respect to a number of recommended good practices in cyber hygiene.Item DECKUBIK: An unique open building experimental facility aimed to test ict based Ambient Assisted Living products(Association for Computing Machinery, 2014-09-10) Arakistain, Ivan; Albizu, Josu; Castelruiz, Amaia; DIGITALIZACIÓN Y AUTOMATIZACIÓN DE LA CONSTRUCCIÓN; Tecnalia Research & InnovationDECKUBIK is a unique facility for R&D aimed at developing new concepts, products and services for the aging market. This new facility has been installed on the ground floor of the experimental building KUBIK, located in Derio, Vizcaya (Spain). DECKUBIK simulates a dwelling, with two bedrooms, a living room, a kitchen and a bathroom. The spaces are equipped with the necessary infrastructure and are prepared to place new products, interfaces, sensor systems, services and technologies that need to be tested and validated by Ambient Assisted Living (AAL) users. This paper will focus in two of the technologies that we brought into practice which can enhance user experience at AAL infrastructure. Interactive furniture with capacitance based sensing which can provide new non-intrusive functionalities, and self-powered control systems.Item Ethical and legal implications for technological devices in clinical research in Europe: Flowchart design for ethical and legal decisions in clinical research(Association for Computing Machinery, 2021-09-22) Garzo, Ainara; Garay-Vitoria, Nestor; Molina-Tanco, Luis; Manresa-Yee, Cristina; Gonzalez-Gonzalez, Carina; Montalvo-Gallego, Blanca; Reyes-Lecuona, Arcadio; Medical TechnologiesIn recent years engineers developing new technologies with assistive or medical purposes have become aware that to create acceptable and usable solutions they need to involve final users, patients and stakeholders in the design, development and evaluation of systems as well as in the device certification processes. Involving stakeholders in such processes has several ethical and legal implications. It has become evident that it is still difficult for engineers in Europe to know which ethical and legal processes should be carried out as they have not been previously trained in these issues during their studies. This article is a review of the laws, standards and recommendations applicable in Europe concerning human involvement in new technologies research, with the aim of helping researchers in the region in question to identify the ethical and legal issues that could arise during those tasks. This review has been carried out in response to the identified need on the part of technological researchers. The design of a flowchart is presented as a summary of the interpretation of the documentation reviewed with the aim of helping the researchers to take the ethical and legal decisions that apply to research involving humans. The flowchart presented has been validated with various research projects in which the authors have participated. The proposed conceptual design can be used for taking decisions, but it is suggested that a tool based on this design be built with the aim of making decision taking easier for researchers in this area.Item The impact of size and position of reference electrode on the localization of biphasic electrotactile stimulation on the fingertips(2022) Isakovic, Milica; Malesevic, Jovana; Kostic, Milos; Dosen, Strahinja; Strbac, Matija; Tecnalia Research & Innovation; SGDevelopment of haptic interfaces to enrich augmented and virtual reality with the sense of touch is the next frontier for technological advancement of these systems. Among available technologies, electrotactile stimulation enables design of high-density interfaces that can provide natural-like sensation of touch in interaction with virtual objects. The present study investigates the human perception of electrotactile sensations on fingertips, focusing on the sensation localization in function of the size and position of reference electrode. Ten healthy subjects participated in the study, with the task to mark the sensations elicited by stimulating the index fingertip using an 8-pad electrode. The test systematically explored several configurations of the active (position) and reference (position and size) electrode pads. The results indicated that there was a spreading of perceived sensations across the fingertip, but that they were mostly localized below the active pad. The position and size of the reference electrode were shown to affect the location of the perceived sensations, which can potentially be exploited as an additional parameter to modulate the feedback. The present study demonstrates that the fingertip is a promising target for the delivery of high-resolution feedback.Item Learning force patterns with a multimodal system using contextual cues(2018-02) Rodríguez, Jorge; Gutiérrez, Teresa; Portillo, Otniel; Sánchez, Emilio J.; CIRMETALPrevious studies on learning force patterns (fine motor skills) have focused on providing “punctual information”, which means users only receive information about their performance at the current time step. This work proposes a new approach based on “contextual information”, in which users receive information not only about the current time step, but also about the past (how the target force has changed over time) and the future (how the target force will change). A test was run to compare the performance of the contextual approach in relation to the punctual information, in which each participant had to memorize and then reproduce a pattern of force after training with a multimodal system. The findings suggest that the contextual approach is a useful strategy for force pattern learning. The advantage of the contextual information approach over the punctual information approach is that users receive information about the evolution of their performance (helping to correct the errors), and they also receive information about the next forces to be exerted (providing them with a better understanding of the target force profile). Finally, the contextual approach could be implemented in medical training platforms or surgical robots to extend the capabilities of these systems.Item A Pragmatic Approach for Evaluating and Accrediting Digital Competence of Digital Profiles: A Case Study of Entrepreneurs and Remote Workers: A Case Study of Entrepreneurs and Remote Workers(2021-04-29) Bartolomé, Juan; Garaizar, Pablo; Larrucea, Xabier; ADV_INTER_PLAT; Tecnalia Research & InnovationDuring the last decades, digital competence has become essential at workplace. Nowadays, it is difficult to find a job where no ICT skills are required. At the same time, there is a lack of ecosystems for adult reskilling in digital competence. Moreover, most of them do not use of a common language and terminology, decreasing the possibilities of being used by a wider public. In addition, the assessment of digital competence cannot be done using simple self-assessment tests, but more complex tools such as simulations or other activities based on real scenarios. Considering this, we designed a performance-based evaluation system following a pragmatic approach based on DigComp framework. We carried out a needs analysis based on expert consultation (63 teleworkers and 82 entrepreneurs) to create an assessment syllabus and implement the assessment modules. Then, we conducted an analysis by experts (n=21) of the relationship between the content of the tests and the construct it was intended to measure. After refinement, the system was piloted by end-users all over Europe (n=525). Results confirmed that DigComp was the most appropriate reference when considering the transversality of digital competence, providing researchers with well-defined clear criteria.Item REVE 2021: 9th International Workshop on Reverse Variability Engineering: 9th International Workshop on Reverse Variability Engineering(Association for Computing Machinery, 2021-09-06) Assunção, Wesley K.G.; Lopez-Herrejon, Roberto E.; Ziadi, Tewfik; Martinez, Jabier; Mousavi, Mohammad; Schobbens, Pierre-Yves; Araujo, Hugo; Schaefer, Ina; ter Beek, Maurice H.; Devroey, Xavier; Rojas, Jose Miguel; Pinto, Monica; Teixeira, Leopoldo; Berger, Thorsten; Noppen, Johannes; Reinhartz-Berger, Iris; Temple, Paul; Damiani, Ferruccio; Petke, Justyna; SWTSoftware Product Line (SPL) migration remains a challenging endeavour. From organizational issues to purely technical challenges, there is a wide range of barriers that complicates SPL adoption. This workshop aims to foster research about making the most of the two main inputs for SPL migration: 1) domain knowledge and 2) legacy assets. Domain knowledge, usually implicit and spread across an organization, is key to define the SPL scope and to validate the variability model and its semantics. At the technical level, domain expertise is also needed to create or extract the reusable software components. Legacy assets can be, for instance, similar product variants (e.g., requirements, models, source code, etc.) that were implemented using ad-hoc reuse techniques such as clone-and-own. More generally, the workshop REverse Variability Engineering attracts researchers and practitioners contributing to processes, techniques, tools, or empirical studies related to the automatic, semi-automatic or manual extraction or refinement of SPL assets.Item A Review of Shared Control for Automated Vehicles: Theory and Applications(2020-12) Marcano, Mauricio; Diaz, Sergio; Perez, Joshue; Irigoyen, Eloy; CCAMThe last decade has shown an increasing interest on advanced driver assistance systems (ADAS) based on shared control, where automation is continuously supporting the driver at the control level with an adaptive authority. A first look at the literature offers two main research directions: 1) an ongoing effort to advance the theoretical comprehension of shared control, and 2) a diversity of automotive system applications with an increasing number of works in recent years. Yet, a global synthesis on these efforts is not available. To this end, this article covers the complete field of shared control in automated vehicles with an emphasis on these aspects: 1) concept, 2) categories, 3) algorithms, and 4) status of technology. Articles from the literature are classified in theory- and application-oriented contributions. From these, a clear distinction is found between coupled and uncoupled shared control. Also, model-based and model-free algorithms from these two categories are evaluated separately with a focus on systems using the steering wheel as the control interface. Model-based controllers tested by at least one real driver are tabulated to evaluate the performance of such systems. Results show that the inclusion of a driver model helps to reduce the conflicts at the steering. Also, variables such as driver state, driver effort, and safety indicators have a high impact on the calculation of the authority. Concerning the evaluation, driver-in-the-loop simulators are the most common platforms, with few works performed in real vehicles. Implementation in experimental vehicles is expected in the upcoming years.Item Self-healing Multi-Cloud Application Modelling(ACM Digital Library, 2017-08-29) Rios, Erkuden; Iturbe, Eider; Palacios, Maria Carmen; CIBERSEC&DLTCloud computing market forecasts and technology trends confirm that Cloud is an IT disrupting phenomena and that the number of companies with multi-cloud strategy is continuously growing. Cost optimization and increased competitiveness of companies that exploit multi-cloud will only be possible when they are able to leverage multiple cloud offerings, while mastering both the complexity of multiple cloud provider management and the protection against the higher exposure to attacks that multi-cloud brings. This paper presents the MUSA Security modelling language for multi-cloud applications which is based on the Cloud Application Modelling and Execution Language (CAMEL) to overcome the lack of expressiveness of state-of-the-art modelling languages towards easing: a) the automation of distributed deployment, b) the computation of composite Service Level Agreements (SLAs) that include security and privacy aspects, and c) the risk analysis and service match-making taking into account not only functionality and business aspects of the cloud services, but also security aspects. The paper includes the description of the MUSA Modeller as the Web tool supporting the modelling with the MUSA modelling language. The paper introduces also the MUSA SecDevOps framework in which the MUSA Modeller is integrated and with which the MUSA Modeller will be validated.Item Spectrum-based feature localization: A case study using ArgoUML: A case study using ArgoUML(Association for Computing Machinery, 2021-09-06) Michelon, Gabriela K.; Sotto-Mayor, Bruno; Martinez, Jabier; Arrieta, Aitor; Abreu, Rui; Assunção, Wesley K. G.; Mousavi, Mohammad; Schobbens, Pierre-Yves; Araujo, Hugo; Schaefer, Ina; ter Beek, Maurice H.; Devroey, Xavier; Rojas, Jose Miguel; Pinto, Monica; Teixeira, Leopoldo; Berger, Thorsten; Noppen, Johannes; Reinhartz-Berger, Iris; Temple, Paul; Damiani, Ferruccio; Petke, Justyna; SWTFeature localization (FL) is a basic activity in re-engineering legacy systems into software product lines. In this work, we explore the use of the Spectrum-based localization technique for this task. This technique is traditionally used for fault localization but with practical applications in other tasks like the dynamic FL approach that we propose. The ArgoUML SPL benchmark is used as a case study and we compare it with a previous hybrid (static and dynamic) approach from which we reuse the manual and testing execution traces of the features. We conclude that it is feasible and sound to use the Spectrum-based approach providing promising results in the benchmark metrics.Item Substation-Aware. An intrusion detection system for the IEC 61850 protocol.(Association for Computing Machinery, 2022-08-23) Lopez, Jose Antonio; Angulo, Iñaki; Martinez, Saturnino; POWER SYSTEMS; DIGITAL ENERGY; Tecnalia Research & InnovationThe number of cyberattacks against the Smart Grid has increased in the last years. Considered as a critical infrastructure, power system operators must improve the cybersecurity countermeasures of their installations. Intrusion Detection Systems (IDS) appears as a promising solution to detect hidden activity of the hackers before launching the attack. Most detection tools are generalist, designed to find predefined patterns such as frequency of messages, well-known malware packets, source and destination of the messages or the content of each packet itself. These tools also allow plugging modules for different protocols, offering a better understanding of the analysed data, such as the protocol action (read, write, reset...) or data model/schema understanding. However, the semantics of the data transmitted cannot be inferred. The Substation-Aware (SBT-Aware) tool adds the latest feature for primary and secondary substations, taking into account not only the protocols defined in the IEC 61850 standard, but the substation topology as well. In this paper we present the SBT-Aware, an IDS that has been developed and tested in the course of the H2020 SDN-microSENSE project.Item Towards an anonymous incident communication channel for electric smart grids(Association for Computing Machinery, 2018-11-29) Triantafyllou, Anna; Sarigiannidis, Panagiotis; Sarigiannidis, Antonios; Rios, Erkuden; Iturbe, Eider; Mamalis, Basilis; Karanikolas, Nikitas N.; CIBERSEC&DLTThe Electric Smart Grid (ESG) is an intelligent critical infrastructure aiming to create an automated and distributed advanced energy delivery network, while preserving information privacy. This study proposes the implementation of an Anonymous Incident Communication Channel (AICC) amongst smart grids across Europe to improve situational awareness and enhance security of the new electric intelligent infrastructures. All participating organizations will have the ability to broadcast sensitive information, stored anonymously in a repository, without exposing the reputation of the organisation. This work focuses on the requirements of establishment, the possible obstacles and proposed data protection techniques to be applied in the AICC. Furthermore, a discussion is conducted regarding the documentation of cyber-incidents. Last but not least, the benefits and the potential risks of this AICC concept are also provided.Item Validating item response processes in digital competence assessment through eye-tracking techniques(ACM, 2020-10-21) Bartolomé, Juan; Garaizar, Pablo; Bastida, Leire; Garcia-Penalvo, Francisco Jose; ADV_INTER_PLATThis paper reports on an exploratory study with the aim to validate item response processes in digital competence assessment through eye-tracking techniques. When measuring complex cognitive constructs, it is crucial to correctly design the evaluation items to trigger the intended knowledge and skills. Furthermore, to assess the validity of a test requires considering not only the content of the evaluation tasks involved in the test, but also whether examinees respond to the tasks by engaging construct-relevant response processes. The eye tracking observations helped to fill an ‘explanatory gap’ by providing data on variation in item response processes that are not captured by other sources of process data such as think aloud protocols or computer-generated log files. We proposed a set of metrics that could help test designers to validate the different item formats used in the evaluation of digital competence. The gaze data provided detailed information on test item response strategies, enabling profiling of examinee engagement and response processes associated with successful performance. There were notable differences between the participants who correctly solved the tasks and those who failed, in terms of the time spent on solving them, as well as the data on their gazes. Moreover, this included insights into response processes which contributed to the validation of the assessment criteria of each item.