Capacitive Touchscreen
نویسندگان
چکیده
منابع مشابه
Turnector: Tangible ControlWidgets For Capacitive Touchscreen Devices
This paper details the development of Turnector, a control system based upon tangible widgets that are manipulated on the touchscreen of a capacitive touch device. Turnector widgets are modelled on rotary faders and aim to connect the user to parameters in their audio software in a manner analogous to the one-to-one control mapping utilised in analogue studio equipment. The system aims to strea...
متن کاملElectronic trigger for capacitive touchscreen and extension of ISO 15781 standard time lag measurements to smartphones
We present in this paper a novel capacitive device that stimulates the touchscreen interface of a smartphone (or of any imaging device equipped with a capacitive touchscreen) and synchronizes triggering with the DxO LED Universal Timer to measure shooting time lag and shutter lag according to ISO 15781:2013. The device and protocol extend the time lag measurement beyond the standard by includin...
متن کاملTouchscreen interaction for healthcare applications
Topicus is a provider of healthcare related applications. Currently all applications are developed for use on regular computers with a monitor, keyboard and mouse. My research focussed on the question if it would be feasible to offer both a regular interface as well as a touchscreen interface to the users. This way the application could still be used like it is used today, but new ways of inter...
متن کاملRemote Touchscreen-Controlled Defense Turret
Sensitive or intruder-vulnerable areas are, by definition, in need of some form of defense. In such cases, it is potentially desirable to remove human physical presence from the defense, without eliminating human influence. Thus, it was decided that a turret should be made to guard these types of areas, which could be remotely controlled with only simple user input. Due to the variety of potent...
متن کاملTouchscreen Biometrics Across Multiple Devices
As the cost of mobile devices decreases, it is becoming increasingly common for users to own more than one. The presence of multiple pieces of mobile technology complicates the question of how to secure them. Utilizing different authentication solutions on different devices may create usability challenges, while using the same authentication technique on more than one device raises the possibil...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The Journal of The Institute of Image Information and Television Engineers
سال: 2013
ISSN: 1342-6907,1881-6908
DOI: 10.3169/itej.67.1069