106,236 research outputs found

    Effect of Values and Technology Use on Exercise: Implications for Personalized Behavior Change Interventions

    Full text link
    Technology has recently been recruited in the war against the ongoing obesity crisis; however, the adoption of Health & Fitness applications for regular exercise is a struggle. In this study, we present a unique demographically representative dataset of 15k US residents that combines technology use logs with surveys on moral views, human values, and emotional contagion. Combining these data, we provide a holistic view of individuals to model their physical exercise behavior. First, we show which values determine the adoption of Health & Fitness mobile applications, finding that users who prioritize the value of purity and de-emphasize values of conformity, hedonism, and security are more likely to use such apps. Further, we achieve a weighted AUROC of .673 in predicting whether individual exercises, and we also show that the application usage data allows for substantially better classification performance (.608) compared to using basic demographics (.513) or internet browsing data (.546). We also find a strong link of exercise to respondent socioeconomic status, as well as the value of happiness. Using these insights, we propose actionable design guidelines for persuasive technologies targeting health behavior modification

    The role of primitive part modelling within an integrative simulation environment

    Get PDF
    The component-based modeling approach to the simulation of HVAC systems has been in used for many years. The approach not only supports plant simulation but also allows the integration of the building and plant domains. Frequently, however, the plant models do not match exactly the types being used in a given project and where they do, may not be able to provide the required information. To address such limitations research has been undertaken into alternative approaches. The aim of such research is to provide a modeling approach that is widely applicable and offers efficient code management and data sharing. Primitive Part (PP) modeling is one such effort, which employs generic, process-based elements to attain modeling flexibility. Recent efforts have been on the development of data structure and graphics that facilitates PP auto-connection via computer interface. This paper describes the approach using an example application and its suggested role within an integrative simulation environment

    Simulation synergy : expanding TRNSYS capabilities and usability

    Get PDF
    Developers of simulation packages are now able to take advantage of the increase in available desktop computing power to expand the capabilities and usability of their programs. This paper will illustrate these opportunities by discussing the different techniques the developers of the TRNSYS software package have used to try and create a synergy between TRNSYS and external programs and between the developers and users of the program

    Combining different validation techniques for continuous software improvement - Implications in the development of TRNSYS 16

    Get PDF
    Validation using published, high quality test suites can serve to identify different problems in simulation software: modeling and coding errors, missing features, frequent sources of user confusion. This paper discusses the application of different published validation procedures during the development of a new TRNSYS version: BESTEST/ASHRAE 140 (Building envelope), HVAC BESTEST (mechanical systems) and IEA ECBCS Annex 21 / SHC Task 12 empirical validation (performance of a test cell with a very simple mechanical system). It is shown that each validation suite has allowed to identify different types of problems. Those validation tools were also used to diagnose and fix some of the identified problems, and to assess the influence of code modifications. The paper also discusses some limitations of the selected validation tools

    Architectural implications for context adaptive smart spaces

    Get PDF
    Buildings and spaces are complex entities containing complex social structures and interactions. A smart space is a composite of the users that inhabit it, the IT infrastructure that supports it, and the sensors and appliances that service it. Rather than separating the IT from the buildings and from the appliances that inhabit them and treating them as separate systems, pervasive computing combines them and allows them to interact. We outline a reactive context architecture that supports this vision of integrated smart spaces and explore some implications for building large-scale pervasive systems

    Accessible user profile modeling for academic services based on MOOCs

    Get PDF
    MOOCs are examples of the evolution of eLearning environments, it is a fact that the flexibility of the learning services allows students to learn at their own time, place and pace, enhances continuous communication and interaction between all participants in knowledge and community building, benefits people with disabilities and therefore can improve their level of employability and social inclusion. MOOCs are leading a revolutionary computer and mobile-based scenario along with social technologies that will emergence new kinds of learning applications that enhance communication and collaboration processes, for that reason a strategy of the use of metadata regarding the achievement of accessibility from content to user preferences is presented in this paper, in order to achieve a better accessibility level while designing new learning services for people with functional diversity based upon MOOCs

    Pricing and Investments in Internet Security: A Cyber-Insurance Perspective

    Full text link
    Internet users such as individuals and organizations are subject to different types of epidemic risks such as worms, viruses, spams, and botnets. To reduce the probability of risk, an Internet user generally invests in traditional security mechanisms like anti-virus and anti-spam software, sometimes also known as self-defense mechanisms. However, such software does not completely eliminate risk. Recent works have considered the problem of residual risk elimination by proposing the idea of cyber-insurance. In this regard, an important research problem is the analysis of optimal user self-defense investments and cyber-insurance contracts under the Internet environment. In this paper, we investigate two problems and their relationship: 1) analyzing optimal self-defense investments in the Internet, under optimal cyber-insurance coverage, where optimality is an insurer objective and 2) designing optimal cyber-insurance contracts for Internet users, where a contract is a (premium, coverage) pair
    • 

    corecore