433 research outputs found

    Attitudes expressed in online comments about environmental factors in the tourism sector: an exploratory study

    Get PDF
    The object of this exploratory study is to identify the positive, neutral and negative environment factors that affect users who visit Spanish hotels in order to help the hotel managers decide how to improve the quality of the services provided. To carry out the research a Sentiment Analysis was initially performed, grouping the sample of tweets (n = 14459) according to the feelings shown and then a textual analysis was used to identify the key environment factors in these feelings using the qualitative analysis software Nvivo (QSR International, Melbourne, Australia). The results of the exploratory study present the key environment factors that affect the users experience when visiting hotels in Spain, such as actions that support local traditions and products, the maintenance of rural areas respecting the local environment and nature, or respecting air quality in the areas where hotels have facilities and offer services. The conclusions of the research can help hotels improve their services and the impact on the environment, as well as improving the visitors experience based on the positive, neutral and negative environment factors which the visitors themselves identified

    Designing with community health workers: feedback-integrated multimedia learning for rural community health

    Get PDF
    Community Health Workers (CHWs) are an integral part of the rural health system, and it is imperative that their voices are accommodated in digital health projects. In the mobile health education project discussed in this thesis (The Bophelo Haeso project), we sought to find ways to amplify CHWs' voices, enabling them to directly influence design and research processes as well as technological outcomes. The Bophelo Haeso (BH) project equips CHWs with health videos on their mobile phones to use for educating and counselling the rural public. We investigated how to best co-design, with CHWs, a feedback mechanism atop the basic BH health education model, thus enabling their voices in the design process and in the process of community education. This thesis chronicles this inclusive design and research process - a 30-month process that spanned three sub-studies: an 18-month process to co-design the feedback mechanism with CHWs, a 12-month deployment study of the feedback mechanism and, overlapping with the feedback deployment study, a 17-month study looking at the consumption patterns of the BH educational videos. This work contributes to the field of Human Computer Interaction (HCI) in three distinct ways. First, it contributes to the growing knowledge of co-design practice with participants of limited digital experience by introducing a concept we termed co-design readiness. We designed and deployed explorative artefacts and found that by giving CHWs increased technical, contextual, and linguistic capacity to contribute to the design process, they were empowered to unleash their innate creativity, which in turn led to more appropriate and highly-adopted solutions. Secondly, we demonstrate the efficacy of incorporating an effective village-to-clinic feedback mechanism in digital health education programs. We employed two approaches to feedback - asynchronous voice and roleplaying techniques. Both approaches illustrate the combined benefits of implementing creative methods for effective human-to-technology and human-tohuman communication in ways that enable new forms of expression. Finally, based on our longitudinal study of video consumption, we provide empirical evidence of offline video consumption trends in health education settings. We present qualitative and quantitative analyses of video-use patterns as influenced by the CHWs' ways of being and working. Through these analyses, we describe CHWs and their work practices in depth. In addition to the three main contributions, this thesis concludes with critical reflections from the lessons and experiences of the 30-month study. We discuss the introduction of smartphones in rural villages, especially among elderly, low-literate, and non-English-speaking users, and present guidelines for designing relevant and usable smartphones for these populations. The author also reflects on her position as an African-born qualitative researcher in Africa, and how her positionality affected the outcomes of this research

    Survey of Personalized Learning Software Systems: A Taxonomy of Environments, Learning Content, and User Models

    Get PDF
    This paper presents a comprehensive systematic review of personalized learning software systems. All the systems under review are designed to aid educational stakeholders by personalizing one or more facets of the learning process. This is achieved by exploring and analyzing the common architectural attributes among personalized learning software systems. A literature-driven taxonomy is recognized and built to categorize and analyze the reviewed literature. Relevant papers are filtered to produce a final set of full systems to be reviewed and analyzed. In this meta-review, a set of 72 selected personalized learning software systems have been reviewed and categorized based on the proposed personalized learning taxonomy. The proposed taxonomy outlines the three main architectural components of any personalized learning software system: learning environment, learner model, and content. It further defines the different realizations and attributions of each component. Surveyed systems have been analyzed under the proposed taxonomy according to their architectural components, usage, strengths, and weaknesses. Then, the role of these systems in the development of the field of personalized learning systems is discussed. This review sheds light on the field’s current challenges that need to be resolved in the upcoming years

    A Survey on Energy Efficient Routing Protocols in Wireless Sensor Networks

    Get PDF
    Energy efficiency is one of the critical issues in the Wireless Sensor Networks (WSNs), since sensor devices are tiny and integrated with a limited capacity battery. In most of the advanced applications, WSNs operate in very harsh areas and not under supervision of human controls. Routing protocols play a significant role in energy balancing by incorporating the techniques that can reduce control overhead, proper data aggregation method and feasible path selection. It demands a unique requirement due to its frequent topology changes and distributive nature. One of the major concerns in the design of routing protocol in WSNs is efficient energy usage and prolonging Network lifetime. This paper mainly discusses different issues related to energy efficiency in routing protocols of all categories. It incorporates most recent routing protocols which improves the energy efficiency in various application environments. This paper also provides comprehensive details of each protocol which emphasize their principles and explore their advantages and limitations. These protocols belong to different classifications based on Network Structures, communication model, topology and QoS parameters. It also includes more relevant and prominent comparisons with all recent State-of-Art works

    Applications in security and evasions in machine learning : a survey

    Get PDF
    In recent years, machine learning (ML) has become an important part to yield security and privacy in various applications. ML is used to address serious issues such as real-time attack detection, data leakage vulnerability assessments and many more. ML extensively supports the demanding requirements of the current scenario of security and privacy across a range of areas such as real-time decision-making, big data processing, reduced cycle time for learning, cost-efficiency and error-free processing. Therefore, in this paper, we review the state of the art approaches where ML is applicable more effectively to fulfill current real-world requirements in security. We examine different security applications' perspectives where ML models play an essential role and compare, with different possible dimensions, their accuracy results. By analyzing ML algorithms in security application it provides a blueprint for an interdisciplinary research area. Even with the use of current sophisticated technology and tools, attackers can evade the ML models by committing adversarial attacks. Therefore, requirements rise to assess the vulnerability in the ML models to cope up with the adversarial attacks at the time of development. Accordingly, as a supplement to this point, we also analyze the different types of adversarial attacks on the ML models. To give proper visualization of security properties, we have represented the threat model and defense strategies against adversarial attack methods. Moreover, we illustrate the adversarial attacks based on the attackers' knowledge about the model and addressed the point of the model at which possible attacks may be committed. Finally, we also investigate different types of properties of the adversarial attacks

    Publications from NIAS: January 1988-June 2013 (NIAS Report No. R23-2014)

    Get PDF
    This report has a bibliographic listing of all the publications from NIAS since inception till June 201

    Internet of Things: A Review of Surveys Based on Context Aware Intelligent Services

    Get PDF
    The Internet of Things (IoT) has made it possible for devices around the world to acquire information and store it, in order to be able to use it at a later stage. However, this potential opportunity is often not exploited because of the excessively big interval between the data collection and the capability to process and analyse it. In this paper, we review the current IoT technologies, approaches and models in order to discover what challenges need to be met to make more sense of data. The main goal of this paper is to review the surveys related to IoT in order to provide well integrated and context aware intelligent services for IoT. Moreover, we present a state-of-the-art of IoT from the context aware perspective that allows the integration of IoT and social networks in the emerging Social Internet of Things (SIoT) term.This work has been partially funded by the Spanish Ministry of Economy and Competitiveness (MINECO/FEDER) under the granted Project SEQUOIA-UA (Management requirements and methodology for Big Data analytics) TIN2015-63502-C3-3-R, by the University of Alicante, within the program of support for research, under project GRE14-10, and by the Conselleria de Educación, Investigación, Cultura y Deporte, Comunidad Valenciana, Spain, within the program of support for research, under project GV/2016/087. This work has also been partially funded by projects from the Spanish Ministry of Education and Competitivity TIN2015-65100-R and DIIM2.0 (PROMETEOII/2014/001)

    State of the Art and Recent Research Advances in Software Defined Networking

    Get PDF

    A biography of open source software: community participation and individuation of open source code in the context of microfinance NGOs in North Africa and the Middle East

    Get PDF
    For many, microfinance is about building inclusive financial systems to help the poor gain direct access to financial services. Hundreds of grassroots have specialised in the provision of microfinance services worldwide. Most of them are adhoc organisations, which suffer severe organisational and informational deficiencies. Over the past decades, policy makers and consortia of microfinance experts have attempted to improve their capacity building through ICTs. In particular, there is strong emphasis on open source software (OSS) initiatives, as it is commonly believed that MFIs are uniquely positioned to benefit from the advantages of openness and free access. Furthermore, OSS approaches have recently become extremely popular. The OSS gurus are convinced there is a business case for a purely open source approach, especially across international development spheres. Nonetheless, getting people to agree on what is meant by OSS remains hard to achieve. On the one hand scholarly software research shows a lack of consensus and documents stories in which the OSS meaning is negotiated locally. On the other, the growing literature on ICT-for-international development does not provide answers as research, especially in the microfinance context, presents little empirical scrutiny. This thesis therefore critically explores the OSS in the microfinance context in order to understand itslong-term development and what might be some of the implications for MFIs. Theoretically I draw on the 3rd wave of research within the field of Science and Technology Studies –studies of Expertise and Experience (SEE). I couple the software ‘biography’ approach (Pollock and Williams 2009) with concepts from Simondon’s thesis on the individuation of technical beings (1958) as an integrated framework. I also design a single case study, which is supported by an extensive and longitudinal collection of data and a three-stage approach, including the analysis of sociograms, and email content. This case provides a rich empirical setting that challenges the current understanding of the ontology of software and goes beyond the instrumental views of design, building a comprehensive framework for community participation and software sustainability in the context of the microfinance global industry
    corecore