679 results on '"*END users (Information technology)"'
Search Results
2. High-performance end-user analysis in pure Julia programming language.
- Author
-
Ling, Jerry and Gál, Tamás
- Subjects
- *
END users (Information technology) , *COMPUTER programming , *PIPELINES , *FINANCIAL leverage , *ENGINES - Abstract
We present tools for high-performance analysis written in pure Julia, a just-in-time (JIT) compiled dynamic programming language with a high-level syntax and performance. The packages we present center around UnROOT.jl, a pure Julia ROOT file I/O package that is optimized for speed, lazy reading, flexibility and thread safety. We discuss what affects performance in Julia, the challenges, and their solutions during the development of UnROOT.jl. We highlight type stability as a challenge and discuss its implication whenever any "compilation" happens (incl. Numba, Jax, C++) as well as Julia's specific ones. We demonstrate the performance and "easy to use" claim by comparing UnROOT.jl against popular alternatives (RDataFrame, Uproot, etc.) in medium-size realistic benchmarks, comparing both performance and code complexity. Finally, we also showcase real ATLAS analysis workflows both locally and on an HPC system, highlighting the composability of UnROOT.jl with multithread/process and out-of-core distributed computing libraries. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
3. Integration of RNTuple in ATLAS Athena.
- Author
-
de Geus, Florine, López-Gómez, Javier, Blomer, Jakob, Nowak, Marcin, and van Gemmeren, Peter
- Subjects
- *
END users (Information technology) , *COMPUTER programming , *PIPELINES , *FINANCIAL leverage , *ENGINES - Abstract
After using ROOT's TTree I/O subsystem for over two decades and storing more than an exabyte of compressed High Energy Physics (HEP) data, advances in technology have motivated a complete redesign, RNTuple, which breaks backward-compatibility to take better advantage of these storage options. The RNTuple I/O subsystem has been designed to address performance bottlenecks and other shortcomings of TTree. Specifically, RNTuple comes with an updated, more compact binary data format that can be stored both in ROOT files and natively in object stores. It is designed for modern storage hardware (e.g. high-throughput low-latency NVMe SSDs), and provides robust and easy to use interfaces. The binary format of RNTuple is scheduled to become production grade in 2024, and recently has become mature enough to start exploring the integration into software used by HEP experiments. In this contribution, we discuss the developments to support the features as required by the ATLAS analysis Event Data Model (EDM) in RNTuple, which will enable its integration into the Athena software framework. With these developments in place, we evaluate the performance of the current most recent versions of RNTuple-based ATLAS data sets and compare this to that of TTree. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
4. EOS software evolution enabling LHC Run 3.
- Author
-
Caffy, Cedric, Amadio, Guilherme, Guenther, Jaroslav, Lekshmanan, Abhishek, Mascetti, Luca, Peters, Andreas, Reis, Manuel, Simon, Michal Kamil, Sindrilaru, Elvin, and Smith, David
- Subjects
- *
COMPUTER software , *CLUSTER analysis (Statistics) , *MACHINERY , *AUTHENTICATION (Law) , *END users (Information technology) - Abstract
EOS has been the main storage system at CERN for more than a decade, continuously improving in order to meet the ever evolving requirements of the LHC experiments and the whole physics user community. In order to satisfy the demands of LHC Run-3, in terms of storage performance and tradeoff between cost and capacity, EOS was enhanced with a set of new functionalities and features that we will detail in this paper. First of all, we describe the use of erasure coded layouts in a large-scale deployment which enables an efficient use of available storage capacity, while at the same time providing end-users with better throughput when accessing their data. This new operating model implies more coupling between the machines in a cluster, which in turn leads to the next set of EOS improvements that we discuss, targeting I/O traffic shaping, better I/O scheduling policies and tagged traffic prioritization. Increasing the size of the EOS clusters to cope with experiment demands, means stringent constraints on the data integrity and durability that we addressed by a re-designed consistency check engine. Another focus area of EOS development was to minimize the operational load by making the internal operational procedures (draining, balancing or conversions) more robust and efficient, to allow managing easily multiple clusters and avoid possible scaling issues. All these improvements available in the EOS 5 release series, are coupled with the new XRootD 5 framework which brings additional security features like TLS support and optimizations for large data transfers like page read and page write functionalities. Last but not least, the area of authentication/authorization methods has seen important developments by adding support for different types of bearer tokens that we will describe along with EOS specific token extensions. We conclude by highlighting potential areas of the EOS architecture that might require further developments or re-design in order to cope with the ever-increasing demands of our end-users. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
5. Improving public library services for the development of rural women in Tirunelveli and Tenkasi districts.
- Author
-
Kattari, Kannan, Seeniapillai, Parvathi, and Arasakumar, Ganesa Murthy
- Subjects
- *
RURAL women , *RURAL development , *MUNICIPAL services , *LIBRARY public services , *COMPUTER networks , *END users (Information technology) , *SERVICE dogs - Abstract
Rural development has always been a priority for women in the Tirunelveli and Tenkasi districts. Various facilities and infrastructure are configured to support rural social and economic development to study the library program's understanding for persons with disabilities in the library service provider. Cultural resources that public libraries offer are an ever-changing society; they have become social and cultural facilities. As a result of these findings, this study is necessary to activate the public library service to secure top priority library development and adequate services to assist the public library functions. There is a need for an Internet connection; there were several recommendations. Hundreds of thousands of the population villages and public libraries should not be entirely dependent on government funding. However, it has been assessed recognition rate of some of the library services is low. The use of library and information services has been directly linked to these services' consciousness. End Users of the continuous improvement of training programmers to ensure a high-speed Internet connection and sufficient network computer. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
6. Resource optimizing federated learning for use with IoT: A systematic review.
- Author
-
da Silva, Leylane Graziele Ferreira, Sadok, Djamel F.H., and Endo, Patricia Takako
- Subjects
- *
INTERNET of things , *LEARNING , *PROBLEM solving , *PENETRATION mechanics , *END users (Information technology) - Abstract
Recently, Federated Learning (FL) has been explored as a new paradigm that preserves both data privacy and end-users knowledge while reducing latency during model training. While often applied between a central server and the edge devices, FL deals with a wide range of end-user applications and devices. Given the Internet of Things (IoT) current popularity, its relevance and its penetration in several new application domains, this work examines the new challenges faced when combining IoT with the classic FL model. The limited resources of IoT edge devices require careful adaptation of the way how FL should be structured in this scenario. In addition, since FL is a distributed paradigm that shares deep learning artifacts through a network, there are also communication issues reminiscent to IoT networks that need special consideration. Thus, it is necessary to optimize the use of both processing and communication resources when considering the use of IoT edge devices as part of a FL. This paper systematically reviews current advances and steps taken towards dealing with resource optimization when using FL as part of IoT scenarios. We examine the published works over the last ten years and discuss the main goals, scenarios, and developed solutions to solve the problems encountered. We also present the main metrics used to quantify the effectiveness and to evaluate the performance of existing IoT based architectures with FL support. • Federated Learning preserves data privacy and end-users knowledge. • Federated Learning deals with a wide range of end-user applications and devices. • Internet of Things application offers a substantial source of data. • Federated Learning is seen as a suitable approach for building smart IoT systems. • Federated Learning and IoT integration present peculiar IoT-scenario challenges. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
7. INFORMATION TECHNOLOGY FOR REAL-TIME MONITORING AND VISUALIZATION OF LOAD IN URBAN PUBLIC OPEN SPACES BASED ON SPATIAL AND STATISTICAL DATA ANALYSES OF HUMAN BEHAVIOUR.
- Author
-
Cekule, Marita, Mitrofanovs, Ingus, and Cabs, Kaspars
- Subjects
- *
PUBLIC spaces , *HUMAN behavior , *INFORMATION technology , *BEHAVIORAL assessment , *END users (Information technology) , *OPEN spaces - Abstract
The article deals with the information technology development for monitoring and visualization of the load of urban environment public open spaces and human behaviour. The problem of urban public open space load became actual both in everyday life and in the conditions of pandemics. The offered information technology includes several dynamic or real-time data acquisition modules, data server with data processing, clustering and simulation functions and mobile application for end users on their mobile devices. A mobile application warns on public open space load at a certain level of density, recommends residents to visit territory in another times or offer less congested areas or other nearby public open spaces. The solution will also be able to facilitate the events by controlling and gradually changing the flow of visitors. Mobile application will offer users statistical data analysed from the STATBOX registrations modules placed in the parks. This data includes information on activities of the visitors, the number of the visitors in them in real time, visitors with animals, possibilities of recreation at the territory, park load as well as distance to the park and transportation possibilities. The messaging section will provide the possibility to users to send information about pleasant/unpleasant situations as well an interactive social survey. In addition to the information technology, methodology and recommendations for urban public open space visitor load assessment is being developed. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
8. EULA, OR EULOGY? RECKONING END USER LICENSE AGREEMENTS AND NEAR-FUTURE CYBORGS.
- Author
-
Carpenter, Owen
- Subjects
- *
END users (Information technology) , *LICENSE agreements , *BIOTECHNOLOGY , *CYBORGS - Abstract
Integrated biotechnology is a quickly-approaching future legal issue that will blur the line between technology and person. The technology will likely run through some kind of software, and users of the technology will likely need to agree to some type of licensing agreement to use the software. End User License Agreements ("EULAs") as they exist today have terms and clauses that will be problematic when applied to an implanted artificial heart, a replacement for the human eye that enhances vision, or other types of integrated technology. Current FDA regulation and EULAs are insufficient to deal with the problems that technology integration will create. This Note argues for a new form of licensing agreement that will apply to integrated biotechnology, called a Biotechnology Licensing Agreement ("BTLA"). The BTLA will contain certain clauses that strengthen the bargaining power of the future cyborg when dealing with the creators of the integrated technology. Further, for creation of a new subdepartment of the FDA, the Biotechnology Adjudication Bureau ("BAB"). The BAB will handle regulation of integrated biotechnology and will assist cyborgs in the near future world of half-human half-machines. These solutions will dampen the problems and legal issues that will arise as the integrated biotechnology space becomes more mainstream and more pervasive. [ABSTRACT FROM AUTHOR]
- Published
- 2023
9. Children and Young People's Involvement in Designing Applied Games: Scoping Review.
- Author
-
Saiger, Michael John, Deterding, Sebastian, and Gega, Lina
- Subjects
- *
YOUNG adults , *AUGMENTED reality , *PHYSICAL activity , *END users (Information technology) , *INFORMATION technology - Abstract
Background: User involvement is widely accepted as key for designing effective applied games for health. This especially holds true for children and young people as target audiences, whose abilities, needs, and preferences can diverge substantially from those of adult designers and players. Nevertheless, there is little shared knowledge about how concretely children and young people have been involved in the design of applied games, let alone consensus guidance on how to do so effectively. Objective: The aim of this scoping review was to describe which user involvement methods have been used in the design of applied games with children and young people, how these methods were implemented, and in what roles children and young people were involved as well as what factors affected their involvement. Methods: We conducted a systematic literature search and selection across the ACM Digital Library, IEEE Xplore, Scopus, and Web of Science databases using State of the Art through Systematic Review software for screening, selection, and data extraction. We then conducted a qualitative content analysis on the extracted data using NVivo. Results: We retrieved 1085 records, of which 47 (4.33%) met the eligibility criteria. The chief involvement methods were participatory design (20/47, 43%) and co-design (16/47, 37%), spanning a wide range of 45 concrete activities with paper prototyping, group discussions, and playtesting being the most frequent. In only half of the studies (24/47, 51%), children and young people participated as true design partners. Our qualitative content analysis suggested 5 factors that affect their successful involvement: comprehension, cohesion, confidence, accessibility, and time constraints. Conclusions: Co-design, participatory design, and similar high-level labels that are currently used in the field gloss over very uneven degrees of participation in design and a wide variety of implementations that greatly affect actual user involvement. This field would benefit from more careful consideration and documentation of the reason of user involvement. Future research should explore concrete activities and configurations that can address the common challenges of involving children and young people, such as comprehension, cohesion, confidence, and accessibility. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
10. Social welfare professionals willing to participate in client information system development - Results from a large cross-sectional survey.
- Author
-
Martikainen, Susanna, Salovaara, Samuel, Ylönen, Katri, Tynkkynen, Elina, Viitanen, Johanna, Tyllinen, Mari, and Lääveri, Tinja
- Subjects
- *
SOCIAL services , *SYSTEMS development , *INFORMATION storage & retrieval systems , *PROFESSIONAL employees , *AGE groups , *END users (Information technology) - Abstract
Human-centered design methods should be implemented throughout the client information system (CIS) development process to understand social welfare professionals' needs, tasks, and contexts of use. The aim of this study was to examine Finnish social welfare professionals' experiences of participating in CIS development.A national cross-sectional web-based survey on the CIS experiences of social welfare professionals (1145 respondents) was conducted in Finland in spring 2019. This study focused on statements concerning the experiences of end users with CIS development and participation. The results are reported by professional and age groups.Half (50%) of the 1145 respondents had participated in CIS development. Half (56%) knew to whom and how to send feedback to software developers, but most (87%) indicated that changes and corrections were not made according to suggestions and quickly enough. The most preferred methods of participation were telling a person in charge of information systems development about usage problems (53%) and showing developers on site how professionals work (34%); 19% were not interested in participating.Social welfare professionals are willing to participate in CIS development, but vendors and social welfare provider organizations are underutilizing this resource. Social welfare informaticists are needed to interpret the needs of end users to software developers. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
11. Revealing the Critical Role of Human Performance in Software: It's time to appreciate the human side of Internet-facing software systems.
- Author
-
WOODS, DAVID D. and ALLSPAW, JOHN
- Subjects
- *
END users (Information technology) , *ADAPTABILITY (Personality) , *BUSINESS software , *END-user computing , *INTERNET , *COMPUTER software - Abstract
The article focuses on the users of business computer software, focused on the response to challenges posed by complex systems for Internet programs and potential outages. Topics explored include cognitive work, adaptive capacity, coordination across work roles, human performance, extending functionality, coding, and re-achitecting systems.
- Published
- 2020
- Full Text
- View/download PDF
12. A resources ecosystem for digital and heritage-led holistic knowledge in rural regeneration.
- Author
-
Tamborrino, Rosa, Patti, Edoardo, Aliberti, Alessandro, Dinler, Mesut, Orlando, Matteo, de Luca, Claudia, Tondelli, Simona, Barrientos, Francisco, Martin, John, Cunha, Luís F.M., Stam, Andries, Nales, Aad, Egusquiza, Aitziber, Amirzada, Zahra, and Pavlova, Irina
- Subjects
- *
NATURAL landscaping , *ECOSYSTEMS , *CULTURAL landscapes , *DIGITAL technology , *DIGITAL humanities , *END users (Information technology) - Abstract
This paper presents a digital resources ecosystem prototype of integrated tools and resources to support heritage-led regeneration of rural regions, thanks to a deeper understanding of the complexity of cultural natural landscapes throughout their historical and current development. The ecosystem is conceived as a distributed software platform establishing data ecosystem and open standards for the management of information, aimed at providing different services and applications to address the needs of the various end-users identified. The platform has been conceived and realised in the framework of a Horizon 2020 research project, with a view to building a set of holistic knowledge about rural regions and their cultural and natural heritage and making it available for long-lasting heritage-led territorial processes of change. It is the product of a multidisciplinary collaboration amongst heritage, digital humanities and ICTs experts, and combines data and methodologies from a range of approaches to humanities together with the customisation of effective digital tools. It has been designed for deployment also in cloud systems compliant with the Infrastructure-as-a-Service paradigm. All data is Findable, Accessible, Interoperable, Reusable (FAIR data). It hosts and integrates different tools, making the data gathered with/for local stakeholders usable and making the same data re-usable within the tools' functions, generating integrated heritage knowledge. It comprises data on 19 rural pilot territories, where the tools and their integration have been developed and tested, while 62 more are partially included as additional territories which participate in certain activities within the project. The main testers for this platform and its functions are the local stakeholders of these territories. The paper describes and analyses the platform and its impact, discussing the integration of tools as an innovative approach that goes beyond the use of individual tools in shaping a multidimensional vision. It also offers an analysis of the potential of an integrated digital ecosystem in evidence-based and place-based regeneration strategies. Some reflections for developments and cooperation during the pandemic are also presented. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
13. Letter to the Journal Dual-Use Products in the Course of Considering National Security Exceptions under GATT Article XXI.
- Author
-
Chang, Yen-Chiang
- Subjects
- *
NATIONAL security , *END users (Information technology) , *INTERNATIONAL law , *EXCEPTIONS (Law) - Abstract
1. I am writing in partial response to Chao Wang's paper, Invocation of National Security Exceptions under GATT Article XXI: Jurisdiction to Review and Standard of Review, published earlier in this I Journal i (18 Chinese JIL (2019), 695, https://doi: 10.1093/chinesejil/jmz029). In the European Union (EU), Council Regulation (EC) No 428/2009 (otherwise known as the European Union Dual-Use Regulation) establishes an EU-wide regime for the control of exports of dual-use items, software and technology. [Extracted from the article]
- Published
- 2022
- Full Text
- View/download PDF
14. A Taxonomy of Automated Assistants: Rating your intelligent (human or automated) assistant.
- Author
-
Grochow, Jerrold M.
- Subjects
- *
TAXONOMY , *AUTOMATION , *INTELLIGENT personal assistants , *END users (Information technology) , *INTELLIGENT agents - Abstract
The article discusses the potential for the development of a taxonomy for the degree of automation in intelligent personal assistants that is analogous to that of the taxonomy for automated vehicles. It discusses the concept of work-output from the view of the end-user and provides examples of work-output.
- Published
- 2020
- Full Text
- View/download PDF
15. Network IDS alert classification with active learning techniques.
- Author
-
Vaarandi, Risto and Guerra-Manzanares, Alejandro
- Subjects
- *
INTRUSION detection systems (Computer security) , *ACTIVE learning , *MALWARE , *END users (Information technology) , *COMPUTER users - Abstract
A Network Intrusion Detection System (NIDS) is a widely used security monitoring technology for detecting attacks against network services, beaconing activity of infected end user nodes, malware propagation, and other types of malicious network traffic. Unfortunately, NIDS technologies are known to generate a large number of alerts, with a significant proportion of them having low importance. During the last two decades, many machine learning and data mining based approaches have been proposed for highlighting high-importance alerts that require human attention. However, NIDS alert classification systems based on active learning have received marginal attention in the specialized research literature. This neglects the potential benefits of active learning which involves a human expert in the machine learning model life cycle. The current paper fills this research gap and studies the use of active learning techniques for NIDS alert classification. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
16. Library User Education Programme: A Panacea for Effective Library Resources Utilization in Nigerian Universities.
- Author
-
Olubiyo, Peter Olubunmi and Olubiyo, Lydia Mercy
- Subjects
- *
LIBRARY users , *LIBRARY education , *LIBRARY resources , *ACADEMIC libraries , *LIBRARIANS , *LIBRARY orientation , *END users (Information technology) , *LIBRARY research , *ATTITUDE (Psychology) - Abstract
User education programme refers to a well-planned programme of training and educating patrons on the skills and techniques of locating and retrieving library materials. User education is one of the important services of the library organized each year for undergraduates of higher institutions. User education is an academic programme designed by academic libraries to educate her user's especially undergraduates on how to effectively utilize library resources and services. The researchers explained that user education quickens the efforts of the clientele in retrieving and aids utilization of library materials through user education. More importantly, whether information comes from the internet, or the World Wide Web, Online databases, books or document, and other possible sources, users need user education for effective usage of information resources. And this prompted the various methods used for user education in Nigerian University Libraries such as library tour, library orientation, orientation lectures, library instruction, individual instruction, and class instruction to teach library literacy instructions. Users should expect timely access to quality information. This information must be accurate, relevant, comprehensive, and engaging. This can be done successfully by incorporating user education and training components into the academic library programmes and developing continuing professional education and training for the library and information professionals, as well as the end-users who will have to develop learning attitude and network related competence by the use information and communication technologies. This informed university authorities' decision to make frantic efforts to teach university students library literacy skills through formal library instruction programmes. [ABSTRACT FROM AUTHOR]
- Published
- 2022
17. Governing border security infrastructures: Maintaining large-scale information systems.
- Author
-
Glouftsios, Georgios
- Subjects
- *
BORDER security , *INFORMATION storage & retrieval systems , *FORCED labor , *END users (Information technology) , *DIGITIZATION - Abstract
This article explores the maintenance of large-scale information systems that are used for, among other purposes, border security in the European Union. My argument is that information systems do not always operate according to their design scripts. They materialize as unruly, unstable and failing infrastructures that are governed through maintenance in order to correct any identified functional anomalies and address potential future failures by adapting them to emerging technologies and the service needs of end-users (e.g. border guards, police). To conceptualize the maintenance labour through which information systems are governed, I synthesize ideas developed in Michel Foucault's work on biopolitics and governmentality with contributions that explore the agentic forces and proclivities of technoscientific matter. By unearthing the very mechanics of maintenance processes, I make two contributions to the literature that interrogates the digitization and smartening of border security. First, I demonstrate that attending to maintenance permits a more complete understanding of the agency of information systems. Second, I broaden the research agenda that explores border security as practice by directing attention towards the often invisible, but politically significant, labour of maintainers who, by rendering information systems functional, sustain the power to govern international mobility by digital means. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
18. Setup and commissioning of a high-throughput analysis cluster.
- Author
-
Doglioni, C., Kim, D., Stewart, G.A., Silvestris, L., Jackson, P., Kamleh, W., Caspart, René, Fischer, Max, Giffels, Manuel, von Cube, Ralf Florian, Heidecker, Christoph, Kuehn, Eileen, Quast, Günter, Heiss, Andreas, and Petzold, Andreas
- Subjects
- *
CACHE memory , *ELECTRONIC data processing , *COMPUTER input-output equipment , *END users (Information technology) , *BENCHMARKING (Management) - Abstract
Current and future end-user analyses and workflows in High Energy Physics demand the processing of growing amounts of data. This plays a major role when looking at the demands in the context of the High-Luminosity-LHC. In order to keep the processing time and turn-around cycles as low as possible analysis clusters optimized with respect to these demands can be used. Since hyper converged servers offer a good combination of compute power and local storage, they form the ideal basis for these clusters. In this contribution we report on the setup and commissioning of a dedicated analysis cluster setup at Karlsruhe Institute of Technology. This cluster was designed for use cases demanding high data-throughput. Based on hyper converged servers this cluster offers 500 job slots and 1 PB of local storage. Combined with the 100 Gb network connection between the servers and a 200 Gb uplink to the Tier-1 storage, the cluster can sustain a data-throughput of 1 PB per day. In addition, the local storage provided by the hyper converged worker nodes can be used as cache space. This allows employing of caching approaches on the cluster, thereby enabling a more efficient usage of the disk space. In previous contributions this concept has been shown to lead to an expected speedup of 2 to 4 compared to conventional setups. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
19. Involvement of End Users in the Development of Serious Games for Health Care Professions Education: Systematic Descriptive Review.
- Author
-
Maheu-Cadotte, Marc-André, Dubé, Véronique, Cossette, Sylvie, Lapierre, Alexandra, Fontaine, Guillaume, Deschênes, Marie-France, and Lavoie, Patrick
- Subjects
- *
END users (Information technology) , *MEDICAL students , *MEDICAL education , *MEDICAL schools , *EDUCATIONAL games - Abstract
Background: On the basis of ethical and methodological arguments, numerous calls have been made to increase the involvement of end users in the development of serious games (SGs). Involving end users in the development process is considered a way to give them power and control over educational software that is designed for them. It can also help identify areas for improvement in the design of SGs and improve their efficacy in targeted learning outcomes. However, no recognized guidelines or frameworks exist to guide end users' involvement in SG development. Objective: The aim of this study is to describe how end users are involved in the development of SGs for health care professions education. Methods: We examined the literature presenting the development of 45 SGs that had reached the stage of efficacy evaluation in randomized trials. One author performed data extraction using an ad hoc form based on a design and development framework for SGs. Data were then coded and synthesized on the basis of similarities. The coding scheme was refined iteratively with the involvement of a second author. Results are presented using frequencies and percentages. Results: End users' involvement was mentioned in the development of 21 of 45 SGs. The number of end users involved ranged from 12 to 36. End users were often involved in answering specific concerns that arose during the SG design (n=6) or in testing a prototype (n=12). In many cases, researchers solicited input from end users regarding the goals to reach (n=10) or the functional esthetics of the SGs (n=7). Most researchers used self-reported questionnaires (n=7). Conclusions: Researchers mentioned end users' involvement in the development of less than half of the identified SGs, and this involvement was also poorly described. These findings represent significant limitations to evaluating the impact of the involvement of end users on the efficacy of SGs and in making recommendations regarding their involvement. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
20. Users' perception of rural public digital cultural services in China.
- Author
-
Wang, Meng, Sun, Honglei Lia, Chen, Ya, and Hua, Yuwen
- Subjects
- *
ELECTRONIC information resources , *CULTURAL property , *CULTURE , *RURAL geography , *END users (Information technology) - Abstract
In recent years, China has attached great importance to the construction of rural public culture, however, the user loss of rural public digital cultural services (RPDCS) is serious. To reveal users' perception of RPDCS, we employed a mixed‐method to investigate users' perception of RPDCS and explore the relationship between users' perception of RPDCS and user churn of RPDCS. The preliminary findings show that most users believed that RPDCS were not highly related to themselves, and RPDCS had few values but cannot bear to give up. Furthermore, we find that increasing use‐perceived involvement and usefulness will alleviate users' churn of RPDCS. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
21. Teachers' and students' attitudes towards information security: A qualitative study.
- Author
-
Reich, Nurit, Aharony, Noa, and Bouhnik, Dan
- Subjects
- *
INFORMATION technology security , *HIGH school student attitudes , *HIGH school teacher attitudes , *SOCIAL change , *END users (Information technology) - Abstract
The goal of this research study is to examine teenager's and educational staff's attitudes towards the issue of information security (IS). The study focuses on teenagers and on educational staff from high schools from varied socio‐economic groups. The goal of this study is to eventually instigate a cultural change in the area of IS, therefore, it is important to understand the motivations behind end users' actions. The research findings indicate a clear connection between students' and teachers' evaluation of their information sources and the threat they feel by information risks. This, in turn affects their willingness to apply IS measures. In addition, the necessity of integration of IS into the educational curriculum emerged, as it constitutes an indispensable skill in the 21st century. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
22. Inductive Programming Meets the Real World.
- Author
-
GULWANI, SUMIT, HERNÁNDEZ-ORALLO, JOSÉ, KITZELMANN, EMANUEL, MUGGLETON, STEPHEN H., SCHMID, UTE, and ZORN, BENJAMIN
- Subjects
- *
INDUCTIVE logic programming , *APPLICATION software , *END users (Information technology) , *ELECTRONIC spreadsheets , *SCRIPTING languages (Computer science) , *INTELLIGENT tutoring systems - Abstract
The article looks at how the integration of inductive programming (IP) techniques in software applications can support end users in automating complex tasks. Details are provided on the process of learning domain-specific programs from observations on how users interact with the system. Noted applications of IP include spreadsheet tools, scripting, and intelligent program tutors.
- Published
- 2015
- Full Text
- View/download PDF
23. The Case for Disappearing Cyber Security.
- Author
-
Dykstra, Josiah and Spafford, Eugene H.
- Subjects
- *
INTERNET security , *END users (Information technology) , *AUTOMATION , *SOFTWARE upgrades , *COMPUTER software installation - Abstract
The author argues that cyber security should be kept out of sight and out of mind for end users. Topics include the possible deployment of less-vulnerable systems by developers using tools or techniques such as code minimization and type-safe languages, the failure of end users to take actions required to improve cyber security, and end users' acceptance of automatic patch updates built into desktop software.
- Published
- 2018
- Full Text
- View/download PDF
24. Why Agile Teams Fail Without UX Research.
- Author
-
Convertino, Gregorio and Frishberg, Nancy
- Subjects
- *
DESIGN research , *END users (Information technology) , *USER interfaces , *AGILE software development , *CONSUMER attitudes - Abstract
The article discusses the role of user experience (UX) research and design research in relation to agile software teams. Topics include the relation of end user attitudes to the importance of UX, the difference between current customers and target users, and problems with relying on the opinions of executives about products.
- Published
- 2017
- Full Text
- View/download PDF
25. The Case for e-Book Literacy: Undergraduate Students' Experience with e-Books for Course Work.
- Author
-
Muir, Laura and Hawes, Graeme
- Subjects
- *
SCHOLARS , *SCHOLARLY publishing , *ELECTRONIC books , *ELECTRONIC information resources , *END users (Information technology) , *RESEARCH equipment , *RESEARCH methodology - Abstract
This paper investigates how electronic books (e-books) are used for scholarly activity. It focuses on the end-users of e-books in a case study which aimed to establish how scholars use and learn from e-books and the limitations of academic e-books. There have been a number of calls for more user-focussed research on e-books to understand how they are used rather than how often they are used. In-depth case studies of end user behaviour are, by design, very labour and resource intensive and generally limited in terms of the numbers of participants and the ability to generalise from analysis of the results. However, this type of research provides a valuable insight into how scholars interact with e-books to attempt to fulfil their information needs. These studies produce a very rich data set which enables the researcher to understand how scholars use, and wish to use, e-books. Analysis of our empirical results, together with those obtained from previous research examining user needs and experiences of e-books, has enabled us to draw general conclusions about what is required in future e-book design and development. More specifically, we present a typology of e-book interactions relevant to the design of e-books (content and features) and to library/academic instruction in the effective use of e-books (‘e-book literacy’). [Copyright &y& Elsevier]
- Published
- 2013
- Full Text
- View/download PDF
26. THE MICROSTRUCTURE OF A LEXICOGRAPHICAL RESOURCE OF SPOKEN GERMAN: MEANINGS AND FUNCTIONS OF THE LEMMA EBEN.
- Author
-
Möhrs, Christine and Cajo, Sarah Torres
- Subjects
- *
MICROSTRUCTURE , *ORAL communication , *ENCYCLOPEDIAS & dictionaries , *END users (Information technology) - Abstract
This paper presents the corpus-based lexicographical prototype that was developed within the framework of the project Lexik des gesprochenen Deutsch (=LeGeDe) as a thirdparty funded project. Research results regarding the information offered in dictionaries have shown that there is a necessity for information on spoken lexis and its interactional functions. The resulting LeGeDe-prototype is based on these needs and desiderata and is thus an innovative example for the adequate representation of spoken language in online dictionaries. It is available online since September 2019 (https://www.owid.de/legede/). In the following sections, after first focusing on the presentation of the project's goals, the data basis, the intended end user, and the applied methods, we will illustrate the microstructure of the prototype and the information provided in a dictionary entry based on the lemma eben. Finally, we will summarize innovative aspects that are important for the implementation of such a resource. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
27. Computer game licences: The EULA and its discontents.
- Author
-
Corbett, Susan
- Subjects
- *
GAMES industry , *VIDEO games , *ROLEPLAYING games , *LICENSES , *END users (Information technology) , *INTERNATIONAL competition - Abstract
This article considers the legal efficacy of terms found in the end-user licences (EULAs) of Massively Multiplayer Online Role-Playing Games (MMORPGs). The article focuses on selected terms in the EULAs of well-known MMORPGs, Everquest and Runescape as well as a more recent MMORPG, Path of Exile. Although there are many examples of inappropriate and unenforceable terms in EULAs, computer games provide a particularly salient example. Eager for access to a game, players accept the EULA without question and, unaware of their rights or keen to avoid costly litigation, rarely challenge the terms. Given the value of the games industry to the international economy, the article recommends that international guidance for EULA content is needed. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
28. A SYSTEMATIC REVIEW ON SMART CITY SERVICES AND IOT-BASED TECHNOLOGIES.
- Author
-
Bestepe, Firat and Yildirim, Sevgi Ozkan
- Subjects
- *
SMART cities , *INTERNET of things , *LITERATURE reviews , *INFORMATION storage & retrieval systems , *END users (Information technology) - Abstract
Due to the technological developments, Internet of things (IoT) has become a real phenomenon. Accordingly, many IoT-based smart concepts appeared in our daily lives such as smart home, smart healthcare and smart city. There are several factors accelerating or hindering the adoption of such new services and concepts. So, the acceptance of IoT-based smart services is critical and should be analyzed carefully. In this study, we aimed to prepare a proper starting point for future studies on end user acceptance of smart city services and IoT technologies by presenting a comprehensive systematic review of literature. We got 34 articles focusing on the adoption of IoT-based services with a model-based approach among initially resulted 237 papers. Our findings indicate that the adoption of smart services is getting more and more popular in recent years, especially in Asian countries. We also see that most reviewed studies prefer to develop integrated adoption models and deploy the factors of technology acceptance model (TAM). Additionally, our review results show that the researchers studying on this field generally use demographics in adoption models, mostly as control variables. This paper presents valuable findings lightening up the way of researchers who want to develop an adoption model for IoT-based smart services. [ABSTRACT FROM AUTHOR]
- Published
- 2019
29. The Revolution Continues: Resource Sharing and OCLC in the New Century.
- Author
-
Crowe, WilliamJ.
- Subjects
- *
LIBRARY cooperation , *OCLC Interlibrary Loan Subsystem , *END users (Information technology) , *UNIVERSAL bibliography - Abstract
The author explores the theory and practice of resource sharing in the OCLC cooperative. History of the OCLC Interlibrary Loan subsystem and subsequent developments through 2008 are reviewed, and prospects for the future are offered. [ABSTRACT FROM AUTHOR]
- Published
- 2009
- Full Text
- View/download PDF
30. Passively Measuring TCP Round-Trip Times.
- Author
-
STROWES, STEPHEN D.
- Subjects
- *
TCP/IP , *COMPUTER network protocols , *NETWORK operating system , *END users (Information technology) , *COMPUTER networks , *DATA packeting - Abstract
The article explores the measurement of network round-trip time (RTT) using the Transmission Control Protocol (TCP). It discusses the importance of measuring and monitoring RTT, including allowing network operators and end users to understand their network performance and help optimize their environment. The use of the algorithm for calculating RTT by end users is discussed. In addition, the article presents three examples demonstrating bufferbloat: the ability to monitor changing RTT accurately by modifying network; the impact of packet loss; and the impact of oversized buffers.
- Published
- 2013
- Full Text
- View/download PDF
31. When Open Source Came to Microsoft.
- Author
-
Campbell, Richard
- Subjects
- *
OPEN source software , *END users (Information technology) , *COMPUTER software , *MICROSOFT .NET Framework - Abstract
The article offers information on building of open-source software with all the essential elements of open source by Microsoft, an open-source company. Topics discussed include building open source software via GitHub, information technology (IT) service management company; the End User License Agreement (EULA), which changed the definition of ownership of software; and increasing popularity in open source libraries for .NET, software framework, led to installation and versioning problems.
- Published
- 2020
32. Architecture of distributed picture archiving and communication systems for storing and processing high resolution medical images.
- Author
-
Tokareva, Victoria
- Subjects
- *
DIAGNOSTIC imaging , *DISTRIBUTED computing , *END users (Information technology) , *INVERSE problems , *BIG data - Abstract
New generation medicine demands a better quality of analysis increasing the amount of data collected during checkups, and simultaneously decreasing the invasiveness of a procedure. Thus it becomes urgent not only to develop advanced modern hardware, but also to implement special software infrastructure for using it in everyday clinical practice, so-called Picture Archiving and Communication Systems (PACS). Developing distributed PACS is a challenging task for nowadays medical informatics. The paper discusses the architecture of distributed PACS server for processing large high-quality medical images, with respect to technical specifications of modern medical imaging hardware, as well as international standards in medical imaging software. The MapReduce paradigm is proposed for image reconstruction by server, and the details of utilizing the Hadoop framework for this task are being discussed in order to provide the design of distributed PACS as ergonomic and adapted to the needs of end users as possible. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
33. Cloud based Archival storage technology: Importance from end user-view.
- Author
-
Dhananjaya Gunawardhana, L. K. Pulasthi
- Subjects
- *
CLOUD computing , *INNOVATIONS in business , *END users (Information technology) , *CLOUD storage , *SOFTWARE as a service - Abstract
With immerse of new technology many organizations are starting to use cloud technology. Through this paper we are going to explore the possibility of using cloud technology, how organizations can meet their needs of using cloud technology. We are going to discuss how a better performing cloud based archive system built for an organization using existing data. And also we have discussed here about the concept of "SaaS" and how to apply to the archival storage in practice of the new technology. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
34. TESTING OF TRANSMISSION PARAMETERS WITHIN IP NETWORKS BY NEW STANDARD IN ETHERNET SERVICE TESTING.
- Author
-
Filka, Miloslav, Grenar, David, and Slavicek, Karel
- Subjects
- *
INTERNET protocols , *ETHERNET , *QUALITY of service , *END users (Information technology) , *INFORMATION technology - Abstract
Testing of transmission parameters within data networks is necessary for evaluation of quality level of provided services guaranteed in SLA between provider and end user. The main aim of the article is to introduce recommendations ITU-T Y.1564 SAM and demonstrate measurement its own according to these recommendations. The article is focused on efficiency measurement of IP networks with comparison to QoS parameters from different network features, which use 100 megabyte and gigabyte Ethernet interface. For measurement was borrowed two devices EXFO FTB-1 Pro, which have testing application NetBlazer V2. The measurement subject were two testing networks composed of different network features, in which are QoS parameters measured and evaluated according to ITU-T 1564 SAM. In the IP networks can be distinguish two basic models for service quality evaluation. The first QoS metric-based model, which is part of the article, is designed to evaluate the technical parameters of the networks. In the case of the QoS model, however, it cannot be ascertained how the quality of the service satisfied the end customer. This issue deals with QoE discipline. Both models are closely related. Applying the QoS policy to a given type of service will positively affect the quality of service perceived by the end user. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
35. El usuario final y el principio de Protección por Diseño en la creación de sistemas de información.
- Author
-
Madruga Hernández, Denia and Amoroso Fernández, Yarina
- Subjects
- *
COMPUTER software quality control , *COMPUTER software development , *HUMAN-computer interaction , *INFORMATION resources management , *END users (Information technology) - Abstract
El poder de las computadoras se ha extendido más allá del simple procesamiento de datos, convirtiéndose en una asistente para la gestión de información. Mantener protegida la información, díganse los datos personales, es objetivo común de productores, clientes y usuarios finales del software. Esta es una ardua tarea, aún más, si se considera el volumen de datos personales manejados por software actualmente. El principio de Protección por Diseño, promueve una visión de futuro donde la privacidad no puede ser garantizada sólo a través del cumplimiento de los marcos regulatorios; más bien, debe convertirse en el modo de operación predeterminado de cada organización. La presente investigación pretende demostrar que la implementación del principio de Protección por Diseño en el proceso de desarrollo de software, desde etapas tempranas del proceso y manteniendo una estrecha vinculación con el usuario final, permitirá garantizar la seguridad del producto resultante. El resultado más relevante fue la obtención de un marco conceptual, evidenciando la relación bidireccional existente entre el principio de Protección por Diseño, la calidad de software y la satisfacción del usuario final. [ABSTRACT FROM AUTHOR]
- Published
- 2019
36. Do office workers adjust their chairs? End-user knowledge, use and barriers to chair adjustment.
- Author
-
Underwood, Diana and Sims, Ruth
- Subjects
- *
OFFICE chairs , *END users (Information technology) , *EMPLOYEE attitudes , *QUANTITATIVE research , *POSTURE - Abstract
A quantitative field study measured end-user availability, knowledge and use levels of adjustable office chair functions in Korea-based office workers, together with their perceived barriers towards making adjustments. Fifty-one English-speaking workers were interviewed and surveyed in a related design. Results showed that of the number of adjustable functions available on their office chair (M = 5.39, SD = 2.3), participants knew fewer than half of them (M = 2.51, SD = 1.52) and used even less (M = 1.86, SD = 1.21). Fifty-three percent of participants knew two or less and 73% had used only two or less. Ten percent had used none. Results suggested physical needs (such as increased comfort or postural change) were a strong driver for previous chair adjustment behaviour. Perceived cognitive barriers played a more significant role in limiting chair adjustment knowledge and use than physical or organizational barriers. Highly adjustable office chairs have the possibility of satisfying the adjustment needs of most end-users. However, adjustable chair functions need to be both available and known in order to be used. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
37. A dynamic control technique to enhance the flexibility of software artifact reuse in large-scale repository.
- Author
-
Kim, Doohwan, Nam, Seungwoo, and Hong, Jang-Eui
- Subjects
- *
COMPUTER software reusability , *COMPUTER software research , *COMPUTER software development , *END users (Information technology) , *COMPUTER users - Abstract
Reuse is the activity of developing new software systems using software components (or artifacts) that are already proven and reliable. However, traditional reuse-based software development has difficulties in finding the components that have the proper information (feature) to match the developers' needs, or reusing a component without modification, because it has various and mixed information (features). In order to solve these problems, this paper proposes a dynamic control technique to enhance the reusability of software components. In particular, this technique focuses on the reuse of software documents that are created during the software research and development processes. We define a new unit of document reuse as a microComponent; this is a basic unit of reuse defined with a section of a software document. Based on the microComponent, it is possible to fast find more suitable components from a large-scale document repository; to control the reuse granularity from a section to an entire document; and finally, to improve the reusability of existing reusable assets. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
38. Efficient video quality assessment for on-demand video transcoding using intensity variation analysis.
- Author
-
Kim, Hyoungseok and Park, Joonseok
- Subjects
- *
VIDEOS , *TRANSCODING , *VIDEO coding , *END users (Information technology) , *HUMAN-computer interaction - Abstract
Due to the wide spread usage of smart devices, adopting video contents service to the diverse end user's service environment is an essential process. The heterogeneity of end users' devices, usually referred as the device fragmentation, requires video transcoding which is a lossy process. Accordingly, the subsequent video quality degrading is inevitable. In such circumstances, minimizing perceptible quality loss of video is a key issue for the video contents service provider. However, the video quality loss caused in the process of transcoding is very difficult to measure. Because the "video quality" is a subjective term, it is almost impossible to estimate before video contents are delivered and actually serviced. To address this issue, many research efforts have been pursued for estimating subjective quality evaluation score using objective quality assessment metric. Structural Similarity (SSIM) is a well-known objective quality assessment method. Based on previous studies, this method has been used as a very effective quality assessment tool in video coding system. In this paper, we propose new video quality assessment metric using intensity variation analysis. The intensity metric-based video quality assessment has a high correlation with the SSIM regardless of the category of video contents, resolutions and even bitrate setting. The proposed method that measures inter-frame intensity variation (IV) is more efficient than SSIM in VBR transcoding system. Our experimental results show that the proposed video quality assessment shows up to 22 times faster than SSIM in the execution time. Ultimately, to take its advantage of the short latency and low execution overhead, IV-based video assessment is applicable to real on-demand transcoding and streaming environments while minimizing video quality degradation of transcoding. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
39. Genetic algorithm-based adaptive weight decision method for motion estimation framework.
- Author
-
Chae, Jeongsook, Jin, Yong, Wen, Mingyun, Zhang, Weiqiang, Sung, Yunsick, and Cho, Kyungeun
- Subjects
- *
VIRTUAL reality , *GENETIC algorithms , *MOTION estimation (Signal processing) , *END users (Information technology) , *WEIGHT measurement - Abstract
Recently, the diverse virtual reality devices are developed and utilized. Particularly, the devices that recognize the motions of users such as griping hands and opening hands are issued to utilize the motions of the users as input methodology. Traditional research about motion recognition suggests user's motion estimation methods by calculating Bayesian probability after measuring the orientation of the motions by a Myo, which is one of contact-type motion recognition devices. However, the motion estimation methods have the problem of low motion estimation accuracy, given that orientation is defined by x, y, and z, which are calculated separately only considering the values of the corresponding axis. In order to improve motion estimation accuracy, motions should be estimated by considering the values of all axis. This paper proposes a method using genetic algorithm to calculate weights, which are applied to estimate motions through Bayesian probability by considering the values of all axis after measuring user's motions with a Myo. The proposed method consists of three steps. First, the Bayesian probability is calculated by considering the correlations of x, y, and z of the orientation of a Myo. Second, weights are determined by applying genetic algorithm. Third, motions are estimated through the Bayesian probability with the determined weights. Experiments were conducted to compare the Bayesian probability between the traditional method based on min/max and the proposed method, which showed that the proposed method had reduced the difference of the orientations by 32%. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
40. Supporting end-user debugging of trigger-action rules for IoT applications.
- Author
-
Manca, Marco, Fabio, Paternò, Santoro, Carmen, and Corcella, Luca
- Subjects
- *
END users (Information technology) , *INTERNET of things , *INFORMATION technology , *DEBUGGING , *ELECTRONIC data processing - Abstract
Highlights • A method for supporting debugging of trigger-action rules. • A tool supporting the debugging method with the possibility to simulate the corresponding contexts of use. • A solution integrated in the tool for detecting possible conflicts amongst the trigger-action rules. • An empirical validation that the tool allows users to identify and correct mistakes in their trigger-action rules more accurately. Abstract End users need tools to enable them to control and personalise Internet of Things (IoT) applications, which may involve hundreds of interconnected objects. Trigger-action programming has shown to be a useful support for this purpose because it allows users to easily associate dynamic events with the activation of desired effects. End User Development (EUD) tools aim to allow even users without programming experience to define the behaviour of IoT applications. However, users may define rules triggering various actions that may be in conflict, or may specify rules that do not result in the intended behaviour. Although such situations can often occur, there seems to be a lack of tools able to help users understand whether the specified rules actually bring about the desired behaviour and, if not, the reasons why they fail. We present an original solution for filling this gap, which takes into account the specific aspects of trigger-action rules. We describe the design and implementation of this debugging support, and then discuss the results of a first user test. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
41. Generate don’t evaluate: how can codesign benefit communication designers?
- Author
-
Taffe, Simone
- Subjects
- *
COMMUNICATION in health education , *END users (Information technology) , *PARTICIPATORY design , *ASTHMA in children , *DISEASE management - Abstract
Communication designers have historically been accused of neglecting end-user perspectives, believing designers are experts at creating inspired designs. Codesign has been applied to many design fields, however developing methods for engaging end-users have had little traction in communication design practice. In an era of end-user engagement, communication designers are left wondering how and when to include end-users in the design process and if codesign offers any benefits to project outcomes. This study trialled codesign workshops across two communication design case studies. Both studies involved non-profit contexts where designers and staff co-created communication design strategies, one for sustainable cleaning in childcare centres and the other for asthma management and awareness. The findings reveal that structured, hands-on generative toolkits conducted in small groups, sparked conversation and prompted innovative ideas whereas evaluating ideas with ranking toolkits blocked dialogue and hindered idea progression. Evaluation tooolkits based on ranking ideas created unexpected barriers to engagement, as end-users disengaged from the codesign process. I argue codesign can benefit communication design when structured hands-on generative toolkits simulate a perceived familiar environment, creating a conversational forum for ideas to flow while participants enjoy creating things with their hands. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
42. An end user development platform based on dataflow approach for IoT devices.
- Author
-
Eun, Seongbae, Jung, Jinman, Yun, Young-Sun, So, Sun Sup, Heo, Junyoung, Min, Hong, and Hwang, Seong Oun
- Subjects
- *
END users (Information technology) , *DATA flow computing , *INTERNET of things , *COMPUTER users , *APPLICATION software - Abstract
IoT devices are diverse in their characteristics and made by many vendors, hence the inter-operation among them is difficult. Especially, end users can't make their own programs by do-it-yourselves. IFTTT and Zapier platforms are designed to help end users to make them inter-operable easily and prevail in these days. Their approach is categorized into a Trigger-Action-Programming, in which trigger conditions and actions are already made by professional programmers of several IoT vendors and end users composite them into their own applications easily. But, their drawback is that the composition can be made at once in the first level, hence end users can't make more complicated applications. Our approach is based on a dataflow programming paradigm which resembles the TAP in that the internal actions are triggered when all the inputs of a node are prepared. In our approach, a composition of some atomic nodes becomes another atomic node, so the composition would continue iteratively. This feature is so generous that several visual programming languages like LabView are relied on the approach for various fields. We propose the overall architecture of our system and explain them. We also present Internet of Things examples of our approach, which shows that atomic dataflow objects can be associated to produce composite dataflow objects. And they are also composited to make more complex applications iteratively. We compare IFTTT, Zapier, and our approach qualitatively and show that end users can make more diverse and flexible applications in our approach. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
43. Automatic production of end user documentation for DSLs.
- Author
-
Le Moulec, Gwendal, Blouin, Arnaud, Gouranton, Valérie, and Arnaldi, Bruno
- Subjects
- *
END users (Information technology) , *LEARNING curve , *COMPUTER software , *DIGITAL subscriber lines - Abstract
Highlights • This paper describes a model-driven approach that allows the automatic production of end user documentations that explain and illustrate the different concepts of a Domain-Specific Language (DSL). • The approach produces end user documentation from artifacts of the implementation phase of DSLs: the metamodel, the grammar, and models that cover all the concepts of a DSL. • Our implementation, called Docywood , targets two platforms: Markdown documentations for static web sites and Xtext code fragments for live documentation while modeling. • The evaluation exhibits that the proposed approach improves the correctness of ThingML models created by novice end users. Abstract Domain-specific languages (DSL) are developed for answering specific problems by leveraging the expertise of domain stakeholders. The development of DSLs requires a significant software engineering effort: editors, code generators, etc, must be developed to make a DSL usable. Documenting a DSL is also a major and time-consuming task required to promote it and address its learning curve. Recent research work in software language engineering focus on easing the development of DSLs. This work focuses on easing the production of documentation of textual DSLs. The API documentation domain identified challenges we adapted to DSL documentation. Based on these challenges we propose a model-driven approach that relies on DSL artifacts to extract information required to build documentation. Our implementation, called Docywood , targets two platforms: Markdown documentation for static web sites and Xtext code fragments for live documentation while modeling. We used Docywood on two DSLs, namely ThingML and Target Platform Definition. Feedback from end users and language designers exhibits qualitative benefits of the proposal with regard to the DSL documentation challenges. End user experiments conducted on ThingML and Target Platform Definition show benefits on the correctness of the created models when using Docywood on ThingML. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
44. The Space Rider Programme: End user's needs and payload applications survey as driver for mission and system definition.
- Author
-
Fedele, Alberto, Guidotti, Giuseppe, Rufolo, Giuseppe, Malucchi, Giovanni, Denaro, Angelo, Massobrio, Federico, Dussy, Stephane, Mancuso, Salvatore, and Tumino, Giorgio
- Subjects
- *
END users (Information technology) , *SPACE exploration , *SPACE vehicles , *ORBITS (Astronomy) , *SPACE flight - Abstract
Abstract The Space Rider Programme, previously named Pride, is an ESA programme whose objective is to define and develop an affordable reusable European space transportation system to be launched by VEGA-C, to be used as a platform for several types of payload applications. Payloads and related applications strongly drive the definition of Space Rider mission and system, then an analysis of end user's needs has been necessary to adequately feed the design process. This paper reports a survey and an analysis with respect to the following payloads classes: 1- Free-Flyer (Micro-gravity experimentation and Radiation exposure); 2- In-Orbit Demonstrations and Validation for several technologies (Exploration, Orbital infrastructures servicing, Earth observation, Earth science, Telecommunication, Reentry); 3- In-Orbit applications (Earth monitoring and Satellites inspection). In particular, the analysis has been carried out with investigation of the current microgravity platforms and payloads needs, In-Orbit Demonstrations (IOD) flight opportunities status and demand from different stakeholders both on scientific and industrial side. Key assets of the Space Rider platform with respect to payload have been defined and the results of the work has been flow down into the identification of a set of requirements for the Space Rider mission and system focusing on main aspects as operations, mass, power, volume and interfaces. Highlights • The Space Rider Programme objective is to define and develop an affordable reusable European space transportation system. • Payloads and related applications strongly drive the definition of Space Rider mission and system. • An analysis of end user's needs has been necessary to adequately feed the design process. • This paper reports a survey and an analysis with respect to several payloads classes. • The results of the work have been translated in a set of mission and system requirements. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
45. Modelling user quality of experience from objective and subjective data sets using fuzzy logic.
- Author
-
Matulin, Marko and Mrvelj, Štefica
- Subjects
- *
QUALITY of service , *ARTIFICIAL intelligence , *END users (Information technology) , *HUMAN research subjects , *INTERNET users - Abstract
One of the paramount research questions in the scientific community today is how to remotely assess user quality of experience (QoE) for a specific service. To this end, various user QoE assessment models have been developed; however, they are mostly based on the data gathered from controlled environment experimentation. The aim of this research was to model user QoE for the User Datagram Protocol-based video streaming service from the results of uncontrolled subjective tests. Specifically, using fuzzy logic, we have correlated the values of three objective network parameters (the packet loss rate and the number and duration of packet loss occurrences in one streaming session) with test subjects’ subjective perception about perceived quality distortions. The dependencies between different values of the parameters and the subjects’ perception of video quality were used to develop a no reference objective video quality assessment model for assessing user QoE. The key distinguishing feature of the developed model lays in the process of subjective evaluation, which was conducted with a panel of 602 test subjects who evaluated the quality of 1-h video in home environments. For this purpose, 72 different test sequences were prepared for rating. We showed that a strong positive linear relationship exists between the assessed QoE of the model and the Mean Opinion Scores of the subjects (a Pearson correlation coefficient equal to 0.8841). [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
46. Communicating physics-based wave model predictions of coral reefs using Bayesian belief networks.
- Author
-
Callaghan, David P., Baldock, Tom E., Shabani, Behnam, and Mumby, Peter J.
- Subjects
- *
CORAL reefs & islands , *BAYESIAN analysis , *THEORY of wave motion , *END users (Information technology) , *PROBABILISTIC automata - Abstract
The use of physics-based wave propagation predictions requires a considerable time commitment, a high level of expertise and extensive climate and reef data that are not always available when undertaking planning for management of coasts and coral reef ecosystems. Bayesian belief networks (BBNs) have at least three attributes that make them an excellent choice to communicate physics-based wave model predictions. First, BBNs subsume thousands of predictions to provide probabilistic outcomes. Second, by using prior probabilities, a practitioner can still obtain predictions of wave outcomes even when their knowledge of input parameters is incomplete. Third, BBNs can propagate evidence from outputs to inputs, which can be used to identify input conditions that are most likely to deliver a chosen outcome. These three attributes are tested and found to hold for a BBN developed for this purpose. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
47. How disruptive is 5G?
- Author
-
Cave, Martin
- Subjects
- *
5G networks , *ECONOMIC demand , *BUSINESS enterprises , *COMMERCIAL products , *END users (Information technology) - Abstract
The hypothesis is put forward that, after three decades of stability, there is now the prospect of significant change in the vertical and horizontal structure of the mobile market place. On the supply side, significant factors are, first, the availability of a new and very powerful form of mobile connectivity in the shape of 5G, and second, software defined networking, which allows a single network to provide a variety of heterogeneous services or ‘slices’. On the demand side, the digital transformation of the whole economy (and not just the communications sector) creates the need for diverse communications functions operating in a universe with a much wider set of digitally transformed services. Mobile operators will find themselves contesting customer relationship with firms or other organisations providing these services in an integrated fashion, and thus risk replacing their direct link with end users with becoming the wholesale supplier of an expanded but ‘commoditised’ communications product. We may also observe fewer radio access networks; more competitive backhaul; and the (partial) vertical disintegration of mobile network operators. The regulatory changes implied may include heavier regulation of fewer RANs, and the need for market analyses to confront situations in which network operators sell more and more of their services to a variety of heterogeneous content and application providers – some of them exercising substantial levels of market power. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
48. Do CHANGE platform: A service-based architecture for secure aggregation and distribution of health and wellbeing data.
- Author
-
Ayoola, Idowu, Wetzels, Mart, Peters, Peter, van Berlo, Sander, and Feijs, Loe
- Subjects
- *
MEDICAL informatics , *COMPUTING platforms , *APPLICATION program interfaces , *ACQUISITION of data , *DATA distribution , *DISTRIBUTED computing , *END users (Information technology) - Abstract
Over the last decade, the adoption of open API standards offers new services meaningful in the domain of health informatics and behavior change. We present our privacy-oriented solution to support personal data collection, distribution, and usage. Given the new General Data Protection Regulations in Europe, the proposed platform is designed with requirements in mind to position citizens as the controllers of their data. The proposed result uses NodeJS servers, OAuth protocol for Authentication and Authorization, a publish-subscribe semantic for real-time data notification and Cron for APIs without a notification strategy. It uses Distributed Data Protocol to control and securely provision data to distributed frameworks utilizing the data and those distributed applications are exemplified. The platform design is transparent and modularized for research projects and small businesses to set-up and manage, and to allow them to focus on the application layer utilizing personal information. This solution can easily be configured to support custom or new data sources with open API and can scale. In our use cases, maintaining the separate ecosystem services was trivial. The adopted distributed protocol was the most challenging to manage due to its high RAM usage. And implementing a fine-grained privacy control by end-users was challenging in an existing clinical enterprise system. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
49. Evaluating the agreement of users with usability problems identified by heuristic evaluation.
- Author
-
Khajouei, Reza, Ameri, Arefeh, and Jahani, Yunes
- Subjects
- *
HEURISTIC , *HEALTH information services , *SYSTEMS design , *ELECTRONIC data processing , *END users (Information technology) - Abstract
Objective: Heuristic evaluation (HE) is an inspection method that can be used for identifying usability problems of health information systems. There is insufficient evidence to what extent these problems are experienced by users in their working environment. The objective of this study was to investigate the agreement of real end users of a health information system with the problems identified by HE.Methods: First, the emergency information system of educational hospitals in Kerman, Iran was evaluated by a heuristic evaluation. Then, a valid and reliable (Cronbach's alpha = 0.95) electronic questionnaire was designed based on the results of the first phase.Results: Among 127 identified problems, the highest number of problems was related to the "consistency and standards" heuristic (18.9%). The user agreement coefficient with heuristic results was 0.5. The highest agreement of the participants was on the problems related to the "help user recognize, diagnose and recover from errors" heuristic (78%). There was a significant relationship between participants age and work experience with a computer (p < 0.05).Conclusion: The agreement rate of real end users with the results of HE was at a medium level. Therefore, in some areas, the perception of evaluators in using this method is not consistent with the users experience with a system. This can result in identifying minor issues and ignoring important system-critical usability issues. The HE is appropriate for identifying specific problems, such as problems related to identifying and correcting errors, but in some areas, such as consistency and standards in the design of a system, it identifies minor or ineffective problems. [ABSTRACT FROM AUTHOR]- Published
- 2018
- Full Text
- View/download PDF
50. Designing Plush Toys with a Computer.
- Author
-
Igarashi, Yuki and Igarashi, Takeo
- Subjects
- *
THREE-dimensional printing , *SIMULATION methods & models , *PLUSH , *END users (Information technology) , *COMPUTER-aided design , *COMPUTER-aided engineering , *TOY making - Abstract
We introduce Plushie, an interactive system that allows nonprofessional users to design their own original plush toys. To design a plush toy, one needs to construct an appropriate two-dimensional (2D) pattern. However, it is difficult for nonprofessional users to appropriately design a 2D pattern. Some recent systems automatically generate a 2D pattern for a given three-dimensional (3D) model, but constructing a 3D model is itself a challenge. Furthermore, an arbitrary 3D model cannot necessarily be realized as a real plush toy, and the final sewn result can be very different from the original 3D model. We avoid this mismatch by constructing appropriate 2D patterns and applying simple physical simulation to it on the fly during 3D modeling. In this way, the model on the screen is always a good approximation of the final sewn result, which makes the design process much more efficient. We use a sketching interface for 3D modeling and also provide various editing operations tailored for plush-toy design. Internally, the system constructs a 2D cloth pattern in such a way that the simulation result matches the user's input stroke. We successfully demonstrated that nonprofessional users could design plush toys or balloon easily using Plushie. [ABSTRACT FROM AUTHOR]
- Published
- 2009
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.