1,065 research outputs found

    Persuasive Technology in Games: A Brief Review and Reappraisal

    Get PDF
    Persuasive technology is a new field of research that has attracted considerable attention from game designers since there is a growing interest in games promoting positive behavioral changes. Persuasive games have been exploited to tremendous effect with applications ranging from mobile healthcare, which persuade users to exercise more often and adopt a healthy lifestyle, to government programs encouraging civic engagement. Therefore, persuasive technologies have become an indispensable part of the modern game designer’s toolkit, and their importance is only set to grow with time. In this paper, we begin by reviewing the existing body of work in this field while also explaining the pros and cons of emerging design models and theoretical frameworks. We then uncover major pitfalls in the current work and suggest directions for future research. Hopefully, this article will prove instructive to game designers and leave them with a better understanding of the central concepts in the field of persuasive technology

    User Transmit Power Minimization through Uplink Resource Allocation and User Association in HetNets

    Full text link
    The popularity of cellular internet of things (IoT) is increasing day by day and billions of IoT devices will be connected to the internet. Many of these devices have limited battery life with constraints on transmit power. High user power consumption in cellular networks restricts the deployment of many IoT devices in 5G. To enable the inclusion of these devices, 5G should be supplemented with strategies and schemes to reduce user power consumption. Therefore, we present a novel joint uplink user association and resource allocation scheme for minimizing user transmit power while meeting the quality of service. We analyze our scheme for two-tier heterogeneous network (HetNet) and show an average transmit power of -2.8 dBm and 8.2 dBm for our algorithms compared to 20 dBm in state-of-the-art Max reference signal received power (RSRP) and channel individual offset (CIO) based association schemes

    Impact of public debt on growth in Belt & Road countries –Pre and Post Analysis of Financial Crisis 2007-2008

    Get PDF
    The study seeks to investigate the role of external debt on the growth performance of Belt & Road countries for the pre & post financial crisis period. Using panel data methodologies like fixed effect model and GMM, the study finds a significant negative relationship between external debt and economic growth. Similarly, various specifications are estimated for robustness check like dividing the period into sub-periods, dividing the countries according to continent basis, and applying the generalized method of moment’s techniques. The robustness checks confirm the negative relationship between debt and economic growth. Keywords: External debt, BRI, growth JEL Classification: C33; H63; O43 DOI: 10.7176/RJFA/10-18-18 Publication date:September 30th 201

    Detection algorithm for the cross country earth faults in medium voltage network

    Get PDF
    The protection of electricity distribution network has been the important topic in terms of reliable and safe power supply for the customers. The field of distribution automation deals with the protection and safety of the electricity distribution network. Recently the topic of centralized protection system has become a hot topic for research and many companies, who are dealing with protection relays, have been working on centralized protection architectures. Traditional protection relays (intelligent electronic device, IED) have the protection blocks for the faults classified as single phase to earth fault, short circuit faults but it is lacking the ability to detect the type of the earth faults termed as cross country earth faults. In cross country earth faults two different phases of the same or different feeder are experiencing the earth fault at different position along the feeder. When the phases are earthed then they are short circuited through the ground. The objective of this thesis is to develop an algorithm to detect the cross country fault using the available protection tools so that the algorithm can be implemented in centralized protection without the need of any new measuring device. The thesis is divided into two parts. In the literature study part, different types of faults of medium voltage network (e.g. single phase to earth fault, double phase short circuit fault, phase to phase to earth fault and cross country fault), have been discussed along with some of protection techniques for these faults. The details about the IEC61850 standard, the research prototype of centralized protection system of ABB and its protection blocks are also the part of the literature study. The medium voltage network can have neutral isolated or compensated but for this thesis neutral isolated network was the main focus for the research. In the research part, basics of the algorithm for the detection of the cross country fault are explained with the help of the flow charts. The algorithm was tested by different fault scenarios in the PSCAD simulation environment in which three medium voltage (MV) overhead feeders were modelled and also in the real time digital simulator (RTDS) in which two feeders were overhead MV lines while one feeder was MV cable feeder. In each test case, the fault resistances were varied and behavior of the algorithm was observed. The observations obtained from the testing of algorithm through simulations have proved that algorithm is able to detect the cross country fault and separate the cross country fault from other types of double phase faults. The algorithm is using the protec-tion block signal (i.e. directional earth fault protection block of the IED) for getting triggered. The practical issues relating to its implementation in centralized protection system are highlighted at the end of the thesis. Moreover the algorithm has reduced the time of operation against the cross country fault as compared to the directional earth fault protection block of IED. It was also observed that there are some cases when the fault resistances and the distance between the faults are small then the algorithm detect the cross country fault as the phase to phase to earth fault. For future there is still space for the improvement of the algorithm especially in the cases where the fault is wrongly detected. In addition the algorithm for the compensated neutral network still needs to be developed for the detection of cross country faults. In the nut shell, it can be said that the new developed algorithm for the detection of the cross country fault covers almost all the cases and it does not need any new measur-ing device for working. It is also using the protection block of IEDs of ABB so it is easy to implement it in centralized protection system as IEDs are basic blocks for this kind of system

    Access Permissions for Apple Watch Applications: A Study on Users\u27 Perceptions

    Get PDF
    © 2020 IEEE. The pervasiveness and sheer ubiquity of wearables, such as smartwatches, has given rise to a myriad of privacy concerns. In this paper, we examine the privacy issues which arise from the permission requests framework on Apple wearables and explore how end user\u27s perception of these can inform better and more inclusive privacy. We conduct an empirical study which explores issues pertaining to data protection, safety, trust, ethics, and cybersecurity. We conducted two Amazon Mechanical Turk studies that investigate users\u27 perception on app permission requests for different smartwatch applications. Our findings suggest that most users lack proper understanding of the cybersecurity risks posed and were unable to construe the rationale for permissions requests for popular smartwatch applications. Furthermore, the respondents believed that app developers might misuse their data, thereby, indicating lack of trust towards these app development enterprises. The respondents also believe that the application development companies should be held accountable for their alleged involvement in data breaches and privacy issues. Further, the majority of survey respondents indicated having some unease towards data usage policies of developers. Moreover, respondents consider all common types of private data (location, health and fitness, photos etc.) susceptible to some level of data breach. Lastly, our results indicate that the study participants experienced confusion in the \u27usability\u27 versus \u27security\u27 conundrum-while a bare majority of the users wanted ease of access, a similar minority preferred a higher level of security. We conclude by presenting a discussion to the quandaries that can help us interweave towards reliable, secure, trustworthy, and ethical technologies

    The Accuracy of 4D Ultrasonography in Determining Fetal Behavior

    Get PDF
    Ultrasonography has been used for decades as a reliable diagnostic tool to detect fetal anomalies. Aside from technological improvements, image quality has become significantly better. The latest form of fetal ultrasonography is four-dimensional (4D) ultrasound that provides real-time imaging capabilities with impressive image quality. As 4D ultrasonography is becoming widely used in the perinatal screening of fetal anomalies and detection of fetal behavior, the debate of this device’s accuracy is still ongoing.One key factor that determines the accuracy of 4D ultrasonography in assessing fetal behavior is the experience of the user in fields of fetal anomalies and the associated behavioral characteristics. This paper will tackle the topic of 4D ultrasound accuracy in detecting fetal behavior and screening for underlying pathologies. Keywords: fetal behavior, fetal anomaly, 4D ultrasonography DOI: 10.7176/JHMN/80-02 Publication date:September 30th 202

    Study on the evolution and regional comparison of organic agriculture in the world

    Get PDF
    This paper reviewed the development and evolution of organic agriculture in the world. The development course was divided into the stage of emergence, production, development and growth and also introduces the main features of each stage. In Oceania, North America, Europe and Asia, the typical comparative analysis of the development of organic agriculture was performed to analyze the better region. The analysis was based on the selection of organic farmland area, organic agricultural practitioners and organic products sales indicators. It further evaluates the dynamic development trends of organic farming in the world and also summarizes the development of organic agriculture throughout the regional successful experience. Consequently, it put forward the countermeasures to develop the future of organic agriculture in the world. Keywords: organic agriculture, regional comparison, evolutio
    • …
    corecore