4,297 research outputs found
Demonstration of a Response Time Based Remaining Useful Life (RUL) Prediction for Software Systems
Prognostic and Health Management (PHM) has been widely applied to hardware
systems in the electronics and non-electronics domains but has not been
explored for software. While software does not decay over time, it can degrade
over release cycles. Software health management is confined to diagnostic
assessments that identify problems, whereas prognostic assessment potentially
indicates when in the future a problem will become detrimental. Relevant
research areas such as software defect prediction, software reliability
prediction, predictive maintenance of software, software degradation, and
software performance prediction, exist, but all of these represent diagnostic
models built upon historical data, none of which can predict an RUL for
software. This paper addresses the application of PHM concepts to software
systems for fault predictions and RUL estimation. Specifically, this paper
addresses how PHM can be used to make decisions for software systems such as
version update and upgrade, module changes, system reengineering, rejuvenation,
maintenance scheduling, budgeting, and total abandonment. This paper presents a
method to prognostically and continuously predict the RUL of a software system
based on usage parameters (e.g., the numbers and categories of releases) and
performance parameters (e.g., response time). The model developed has been
validated by comparing actual data, with the results that were generated by
predictive models. Statistical validation (regression validation, and k-fold
cross validation) has also been carried out. A case study, based on publicly
available data for the Bugzilla application is presented. This case study
demonstrates that PHM concepts can be applied to software systems and RUL can
be calculated to make system management decisions.Comment: This research methodology has opened up new and practical
applications in the software domain. In the coming decades, we can expect a
significant amount of attention and practical implementation in this area
worldwid
Inclusive Intelligent Learning Management System Framework - Application of Data Science in Inclusive Education
Dissertation presented as the partial requirement for obtaining a Master's degree in Data Science and Advanced Analytics, specialization in Data ScienceBeing a disabled student the author faced higher education with a handicap which as experience
studying during COVID 19 confinement periods matched the findings in recent research about the
importance of digital accessibility through more e-learning intensive academic experiences. Narrative
and systematic literature reviews enabled providing context in World Health Organizationâs
International Classification of Functioning, Disability and Health, legal and standards framework and
information technology and communication state-of-the art. Assessing Portuguese higher education
institutionsâ web sites alerted to the fact that only outlying institutions implemented near perfect,
accessibility-wise, websites.
Therefore a gap was identified in how accessible the Portuguese higher education websites are, the
needs of all students, including those with disabilities, and even the accessibility minimum legal
requirements for digital products and the services provided by public or publicly funded organizations.
Having identified a problem in society and exploring the scientific base of knowledge for context and
state of the art was a first stage in the Design Science Research methodology, to which followed
development and validation cycles of an Inclusive Intelligent Learning Management System
Framework. The framework blends various Data Science study fields contributions with accessibility
guidelines compliant interface design and content upload accessibility compliance assessment.
Validation was provided by a focus group whose inputs were considered for the version presented in
this dissertation. Not being the purpose of the research to deliver a complete implementation of the
framework and lacking consistent data to put all the modules interacting with each other, the most
relevant modules were tested with open data as proof of concept.
The rigor cycle of DSR started with the inclusion of the previous thesis on Atlântica University Institute
Scientific Repository and is to be completed with the publication of this thesis and the already started
PhDâs findings in relevant journals and conferences
Technologies and Applications for Big Data Value
This open access book explores cutting-edge solutions and best practices for big data and data-driven AI applications for the data-driven economy. It provides the reader with a basis for understanding how technical issues can be overcome to offer real-world solutions to major industrial areas. The book starts with an introductory chapter that provides an overview of the book by positioning the following chapters in terms of their contributions to technology frameworks which are key elements of the Big Data Value Public-Private Partnership and the upcoming Partnership on AI, Data and Robotics. The remainder of the book is then arranged in two parts. The first part âTechnologies and Methodsâ contains horizontal contributions of technologies and methods that enable data value chains to be applied in any sector. The second part âProcesses and Applicationsâ details experience reports and lessons from using big data and data-driven approaches in processes and applications. Its chapters are co-authored with industry experts and cover domains including health, law, finance, retail, manufacturing, mobility, and smart cities. Contributions emanate from the Big Data Value Public-Private Partnership and the Big Data Value Association, which have acted as the European data community's nucleus to bring together businesses with leading researchers to harness the value of data to benefit society, business, science, and industry. The book is of interest to two primary audiences, first, undergraduate and postgraduate students and researchers in various fields, including big data, data science, data engineering, and machine learning and AI. Second, practitioners and industry experts engaged in data-driven systems, software design and deployment projects who are interested in employing these advanced methods to address real-world problems
The Multifaceted Nature of Food and Nutrition Insecurity around the World and Foodservice Business
The international concept of food security is a situation where all people have physical, social, and economic access at all times to sufficient, safe, and nutritious food that meets their dietary needs and food preferences for an active and healthy life. All four parameters (availability, access, utilization, and stability) should therefore be measured to determine food security status.Taking into account these premises, this book aims to present original research articles and reviews concerning the following: Agriculture and food security; Agri-tourism and its potential to assist with food security; Businessâscience cooperation to advance food security; Competing demands and tradeoffs for land and water resources; Consumer behavior, nutritional security and food assistance programs; Food and health; Global and local analyses of food security and its drivers; Global governance and food security; Infectious and non-infectious diseases and food security; Reducing food loss and waste; Reducing risks to food production and distribution from climate change; Supply chains and food security; Technological breakthroughs to help feed the globe; Tourism food security relationship; Urbanization, food value chains, and the sustainable, secure sourcing of food; Food and service quality at food catering establishments; Consumer behavior at foodservice operations (restaurants, cafĂŠs, hotels)
Child Obesity and Nutrition Promotion Intervention
Childhood obesity continues to be a global problem, with several regions showing increasing rates and others having one in every three children overweight despite an apparent halt or downward trend. Children are exposed to nutritional, social, and obesogenic environmental risks from different settings, and this affects their lifelong health. There is a consensus that high-quality multifaceted smart and cost-effective interventions enable children to grow with a healthy set of habits that have lifelong benefits to their wellbeing. The literature has shown that dietary approaches play key roles in improving childrenâs health, not only on a nutritional level but also in diet quality and patterns. An association between the nutritional strategy and other lifestyle components promotes a more comprehensive approach and should be envisioned in intervention studies. This Special Issue entitled âChild Obesity and Nutrition Promotion Interventionâ combines original research manuscripts or reviews of the scientific literature concerning classic or innovative approaches to tackle this public health issue. It presents several nutritional interventions alongside lifestyle health factors, and outcome indicators of effectiveness and sustainability from traditional to ground-breaking methods to exploit both qualitative and quantitative approaches in tackling child obesity
Advances in Forensic Genetics
The book has 25 articles about the status and new directions in forensic genetics. Approximately half of the articles are invited reviews, and the remaining articles deal with new forensic genetic methods. The articles cover aspects such as sampling DNA evidence at the scene of a crime; DNA transfer when handling evidence material and how to avoid DNA contamination of items, laboratory, etc.; identification of body fluids and tissues with RNA; forensic microbiome analysis with molecular biology methods as a supplement to the examination of human DNA; forensic DNA phenotyping for predicting visible traits such as eye, hair, and skin colour; new ancestry informative DNA markers for estimating ethnic origin; new genetic genealogy methods for identifying distant relatives that cannot be identified with conventional forensic DNA typing; sensitive DNA methods, including single-cell DNA analysis and other highly specialised and sensitive methods to examine ancient DNA from unidentified victims of war; forensic animal genetics; genetics of visible traits in dogs; statistical tools for interpreting forensic DNA analyses, including the most used IT tools for forensic STR-typing and DNA sequencing; haploid markers (Y-chromosome and mitochondria DNA); inference of ethnic origin; a comprehensive logical framework for the interpretation of forensic genetic DNA data; and an overview of the ethical aspects of modern forensic genetics
Z-Numbers-Based Approach to Hotel Service Quality Assessment
In this study, we are analyzing the possibility of using Z-numbers for
measuring the service quality and decision-making for quality improvement in the
hotel industry. Techniques used for these purposes are based on consumer evalu-
ations - expectations and perceptions. As a rule, these evaluations are expressed
in crisp numbers (Likert scale) or fuzzy estimates. However, descriptions of the
respondent opinions based on crisp or fuzzy numbers formalism not in all cases
are relevant. The existing methods do not take into account the degree of con-
fidence of respondents in their assessments. A fuzzy approach better describes
the uncertainties associated with human perceptions and expectations. Linguis-
tic values are more acceptable than crisp numbers. To consider the subjective
natures of both service quality estimates and confidence degree in them, the two-
component Z-numbers Z = (A, B) were used. Z-numbers express more adequately
the opinion of consumers. The proposed and computationally efficient approach
(Z-SERVQUAL, Z-IPA) allows to determine the quality of services and iden-
tify the factors that required improvement and the areas for further development.
The suggested method was applied to evaluate the service quality in small and
medium-sized hotels in Turkey and Azerbaijan, illustrated by the example
Investigating and mitigating the role of neutralisation techniques on information security policies violation in healthcare organisations
Healthcare organisations today rely heavily on Electronic Medical Records systems (EMRs), which have become highly crucial IT assets that require significant security efforts to safeguard patientsâ information. Individuals who have legitimate access to an organisationâs assets to perform their day-to-day duties but intentionally or unintentionally violate information security policies can jeopardise their organisationâs information security efforts and cause significant legal and financial losses. In the information security (InfoSec) literature, several studies emphasised the necessity to understand why employees behave in ways that contradict information security requirements but have offered widely different solutions. In an effort to respond to this situation, this thesis addressed the gap in the information security academic research by providing a deep understanding of the problem of medical practitionersâ behavioural justifications to violate information security policies and then determining proper solutions to reduce this undesirable behaviour. Neutralisation theory was used as the theoretical basis for the research. This thesis adopted a mixed-method research approach that comprises four consecutive phases, and each phase represents a research study that was conducted in light of the results from the preceding phase. The first phase of the thesis started by investigating the relationship between medical practitionersâ neutralisation techniques and their intention to violate information security policies that protect a patientâs privacy. A quantitative study was conducted to extend the work of Siponen and Vance [1] through a study of the Saudi Arabia healthcare industry. The data was collected via an online questionnaire from 66 Medical Interns (MIs) working in four academic hospitals. The study found that six neutralisation techniquesâ(1) appeal to higher loyalties, (2) defence of necessity, (3) the metaphor of ledger, (4) denial of responsibility, (5) denial of injury, and (6) condemnation of condemnersâsignificantly contribute to the justifications of the MIs in hypothetically violating information security policies. The second phase of this research used a series of semi-structured interviews with IT security professionals in one of the largest academic hospitals in Saudi Arabia to explore the environmental factors that motivated the medical practitioners to evoke various neutralisation techniques. The results revealed that social, organisational, and emotional factors all stimulated the behavioural justifications to breach information security policies. During these interviews, it became clear that the IT department needed to ensure that security policies fit the daily tasks of the medical practitioners by providing alternative solutions to ensure the effectiveness of those policies. Based on these interviews, the objective of the following two phases was to improve the effectiveness of InfoSec policies against the use of behavioural justification by engaging the end users in the modification of existing policies via a collaborative writing process. Those two phases were conducted in the UK and Saudi Arabia to determine whether the collaborative writing process could produce a more effective security policy that balanced the security requirements with daily business needs, thus leading to a reduction in the use of neutralisation techniques to violate security policies. The overall result confirmed that the involvement of the end users via a collaborative writing process positively improved the effectiveness of the security policy to mitigate the individual behavioural justifications, showing that the process is a promising one to enhance security compliance
Examining the Impact of Personal Social Media Use at Work on Workplace Outcomes
A noticable shift is underway in todayâs multi-generational workforce. As younger employees propel digital workforce transformation and embrace technology adoption in the workplace, organisations need to show they are forward-thinking in their digital transformation strategies, and the emergent integration of social media in organisations is reshaping internal communication strategies, in a bid to improve corporate reputations and foster employee engagement. However, the impact of personal social media use on psychological and behavioural workplace outcomes is still debatebale with contrasting results in the literature identifying both positive and negative effects on workplace outcomes among organisational employees.
This study seeks to examine this debate through the lens of social capital theory and study personal social media use at work using distinct variables of social use, cognitive use, and hedonic use. A quantitative analysis of data from 419 organisational employees in Jordan using SEM-PLS reveals that personal social media use at work is a double-edged sword as its impact differs by usage types. First, the social use of personal social media at work reduces job burnout, turnover intention, presenteeism, and absenteeism; it also increases job involvement and organisational citizen behaviour. Second, the cognitive use of personal social media at work increases job involvement, organisational citizen behaviour, employee adaptability, and decreases presenteeism and absenteeism; it also increases job burnout and turnover intention. Finally, the hedonic use of personal social media at work carries only negative effects by increasing job burnout and turnover intention.
This study contributes to managerial understanding by showing the impact of different types of personal social media usage and recommends that organisations not limit employee access to personal social media within work time, but rather focus on raising awareness of the negative effects of excessive usage on employee well-being and encourage low to moderate use of personal social media at work and other personal and work-related online interaction associated with positive workplace outcomes. It also clarifies the need for further research in regions such as the Middle East with distinct cultural and socio-economic contexts
- âŚ