233,037 research outputs found
Understanding the user - why, what and how?
Explains the need, importance, purposes and scope of user studies, discusses procedure for conducting sound user studies together with associated problems of research like selection of problem, formulation of hypothesis, design of study, sampling strategy, data collection methods, scaling techniques, pilot study, processing and analysis of data, testing of hypothesis, interpretation, drawing inferences, communication and dissemination of results and finally concludes by highlighting methodological flaws and gaps in user studies
Cyber security investigation for Raspberry Pi devices
Big Data on Cloud application is growing rapidly. When the cloud is attacked, the investigation relies on digital forensics evidence. This paper proposed the data collection via Raspberry Pi devices, in a healthcare situation. The significance of this work is that could be expanded into a digital device array that takes big data security issues into account. There are many potential impacts in health area. The field of Digital Forensics Science has been tagged as a reactive science by some who believe research and study in the field often arise as a result of the need to respond to event which brought about the needs for investigation; this work was carried as a proactive research that will add knowledge to the field of Digital Forensic Science.
The Raspberry Pi is a cost-effective, pocket sized computer that has gained global recognition since its development in 2008; with the wide spread usage of the device for different computing purposes. Raspberry Pi can potentially be a cyber security device, which can relate with forensics investigation in the near future. This work has used a systematic approach to study the structure and operation of the device and has established security issues that the widespread usage of the device can pose, such as health or smart city. Furthermore, its evidential information applied in security will be useful in the event that the device becomes a subject of digital forensic investigation in the foreseeable future. In healthcare system, PII (personal identifiable information) is a very important issue. When Raspberry Pi plays a processor role, its security is vital; consequently, digital forensics investigation on the Raspberry Pies becomes necessary
Engineering of an Extreme Rainfall Detection System using Grid Computing
This paper describes a new approach for intensive rainfall data analysis. ITHACA's Extreme Rainfall Detection System (ERDS) is conceived to provide near real-time alerts related to potential exceptional rainfalls worldwide, which can be used by WFP or other humanitarian assistance organizations to evaluate the event and understand the potentially floodable areas where their assistance is needed. This system is based on precipitation analysis and it uses rainfall data from satellite at worldwide extent. This project uses the Tropical Rainfall Measuring Mission Multisatellite Precipitation Analysis dataset, a NASA-delivered near real-time product for current rainfall condition monitoring over the world. Considering the great deal of data to process, this paper presents an architectural solution based on Grid Computing techniques. Our focus is on the advantages of using a distributed architecture in terms of performances for this specific purpos
Recommended from our members
Investigating design features of a computer-mediated communication system
Computer-mediated communication (CMC) is increasingly used in higher education, but it is not without problems. The effectiveness of CMC depends on many factors, including the characteristics of CMC systems themselves. The research reported here therefore aimed to investigate how an educational CMC system might be improved, in order to support learning more effectively.
The main context for the research was distance learning at the UK Open University (OU). A two-stage, mixed methods research approach was adopted. In the first stage, interviews and observations were carried out to explore the benefits and problems experienced by users. This revealed two major issues: information overload and lack of social presence. Information overload relates to usersâ problems dealing with large numbers of messages. Social presence relates to the need for users to feel connected with each other.
The second stage investigated system features aimed at addressing these issues, implemented in a prototype computer conferencing system. Features to address overload included branched message threading and user recommendations. Features to address social presence were ârĂ©sumĂ©sâ and instant messaging. These features were evaluated using questionnaires, with several cohorts of students in an OU course.
Students expressed approval of the features, although some features were not widely used. Students preferred branched threading to chronological threading because branching helped them to follow âconversationsâ. Students were uncomfortable recommending messages, feeling that the value of a message would vary between people. They were also uncomfortable using instant messaging to contact others whom they did not know. However, the awareness aspect of instant messaging provided a sense of solidarity.
The research demonstrated that the problems of overload and lack of social presence are significant, and each has social aspects which must be addressed. Studentsâ relationships with each other affect whether and how they use the features of CMC systems. We can conclude that particular attention must be paid to the social aspects of online communication, both when designing educational CMC systems and when considering how they are used. To maximise the benefits for learning, students need to feel comfortable with each other online, and there are few short cuts to achieving this
BlogForever D5.2: Implementation of Case Studies
This document presents the internal and external testing results for the BlogForever case studies. The evaluation of the BlogForever implementation process is tabulated under the most relevant themes and aspects obtained within the testing processes. The case studies provide relevant feedback for the sustainability of the platform in terms of potential usersâ needs and relevant information on the possible long term impact
A user perspective of quality of service in m-commerce
This is the post-print version of the Article. The official published version can be accessed from the link below - Copyright @ 2004 Springer VerlagIn an m-commerce setting, the underlying communication system will have to provide a Quality of Service (QoS) in the presence of two competing factorsânetwork bandwidth and, as the pressure to add value to the business-to-consumer (B2C) shopping experience by integrating multimedia applications grows, increasing data sizes. In this paper, developments in the area of QoS-dependent multimedia perceptual quality are reviewed and are integrated with recent work focusing on QoS for e-commerce. Based on previously identified user perceptual tolerance to varying multimedia QoS, we show that enhancing the m-commerce B2C user experience with multimedia, far from being an idealised scenario, is in fact feasible if perceptual considerations are employed
User requirement elicitation for cross-language information retrieval
Who are the users of a cross-language retrieval system? Under what circumstances do they need to perform such multi-language searches? How will the task and the context
of use affect successful interaction with the system? Answers to these questions were explored in a user study performed as part of the design stages of Clarity, a EU
founded project on cross-language information retrieval. The findings resulted in a rethink of the planned user interface and a consequent expansion of the set of services
offered. This paper reports on the methodology and techniques used for the elicitation of user requirements as well as how these were in turn transformed into new design
solutions
- âŠ