Method: We conducted a 24-week live user evaluation of push notifications used in a behavior-based mobile app for a meal replacement program to understand the role of push notifications in persuading users to engage with self-monitoring tasks.
Results: User perception of the prompts were verified through questionnaires, which in conjunction with the interaction logs show that users were tolerant of multiple daily prompts. The decline in compliance to the tasks set, however, shows that while the participants did not object to receiving prompts, they were less likely to respond to them as the study progressed.
Conclusions: Push notifications and user tasks are appropriate mechanisms to engage users with mobile technology in the short term. 相似文献
Internet of Things (IoT) is providing new services and insights by sensing contextual data but there are growing concerns of privacy risks from users that need immediate attention.
The Reason
The IoT devices and smart services can capture Personally Identifiable Information (PII) without user knowledge or consent. The IoT technology has not reached the desired level of maturity to standardize security and privacy requirements.
The Solution
IoT Privacy by Design is a user-centric approach for enabling privacy with security and safety as a ‘win-win’ positive outcome of IoT offerings, irrespective of business domain. The Proactive and Preventive Privacy (3P) Framework proposed in this paper should be adopted by the IoT stakeholders for building trust and confidence in end users about IoT devices and smart services. 相似文献
—formality of the modeling methodology
—ability to model static and dynamic aspects
—ability to pass between levels of differently rich structures by morphisms
—uniform representation of the communication process as
—an information process
—a decision process and
—a control process
—homogeneity of the representation and modeling methods
—ability to derive qualitative and quantitative statements.
The foundation is provided by a Discrete Event-Dynamic Net System which includes the axiomatic declaration of general Petri nets. In order to calculate the structural and dynamic aspects, so-called Petri net machines are developed. It is shown that this approach can even be used to treat the following aspects:
—use of time during the process
—increase of costs during the generation and transportation of information
—augmentation, evaluation and transformation of information objects.
Recursive formulas are derived and some examples calculated. 相似文献
In this article, the authors present the results of an effort toward the complete cryptanalysis of the messages, and an analysis of their contents. The authors present a new computerized method for the ciphertext-only cryptanalysis of ADFGVX messages which they developed for that purpose. They also provide details on how all the keys were recovered and almost all the messages decrypted, despite the low quality of significant parts of the intercepted material.
The analysis of the messages in their historical context provides a unique insight into key events, such as the withdrawal of the German troops from Romania, and the impact of the Kiel Mutiny on communications. Both events had major political and military consequences for Germany in the Eastern Front. Cryptanalysis allowed the Entente Powers to closely monitor those events as well as others developments, also highlighting inherent weaknesses in German cryptographic and cryptanalytic capabilities. The authors plan to publish online all the decrypted messages. 相似文献
Practitioner Summary: The out-of-the-loop performance problem is a major potential consequence of automation, leaving operators helpless to takeover automation in case of failure. Using an aircraft supervision task, the following article illustrates how the psychological approach of agency can help improving human–system interactions by designing more acceptable and more controllable automated interfaces 相似文献
They center around the notion of computability.
In this paper we propose a new definition of computability which lays the foundations for a theory of cybernetic and intelligent machines in which the classical limits imposed by discrete algorithmic procedures are offset by the use of continuous operators on unlimited data. This data is supplied to the machine in a totally parallel mode, as a field or wave.
This theory of machines draws its concepts from category theory, Lie algebras, and general systems theory. It permits the incorporation of intelligent control into the design of the machine as a virtual element. The incorporated control can be realized in many (machine) configurations of which we give three:
a) a quantum mechanical realization appropriate to a possible understanding of the quantum computer and other models of the physical microworld,
b) a stochastic realization based on Kolmogorov-Gabor theory leading to a possible understanding of generalised models of the physical or thermodynamic macroworld, and lastly
c) a classical mechanical realization appropriate lo the study of a new class of robots.
Particular applications at a fundamental level are cited in geometry, mathematics, biology, acoustics, aeronautics, quantum mechanics, general relativity and. Markov chains. The proposed theory therefore opens a new way towards understanding the processes that underlie intelligence. 相似文献
The results of our paper are summarized as follows:
1)As important decision-making in adaptive QCS, the decision-making for estimalion of fitness and examination of attainability are proposed and formalized mathematically.
2)A refinement process is formalized in which models are revised according to the changes of market.
3)Basic steps for setting quality goals are obtained which are based on the above formalization. 相似文献
Method: Convenience sample of 34 healthy participants wore Stro II, Philadelphia, Headmaster, and AspenVista® cervical orthoses for four-hour periods. Participants reported discomfort level (scale 0–6) and location.
Results: Participants reported mean discomfort for all orthoses over the four-hour test between ‘a little discomfort’ and ‘very uncomfortable’ (mean discomfort score = 1.64, SD = 1.50). Seven participants prematurely stopped tests due to pain and six reported maximum discomfort scores. Significant linear increase in discomfort with duration of wear was found for all orthoses. Significantly less discomfort was reported with Stro II than Headmaster and Philadelphia. Age correlated with greater perceived discomfort. Orthoses differed in the location discomfort was experienced.
Conclusion: Existing cervical orthoses cause discomfort influenced by design and duration of wear with orthoses’ design the more significant factor. This work informed the design of a new orthosis and future orthoses developments.
Practitioner Summary: The purpose of this study was to gain greater knowledge about the discomfort caused by wearing of existing neck orthoses in order to inform the design and development of a new neck orthosis. This study gathers empirical data from a surrogate population and concludes that orthosis design is more influential than the duration of wear. 相似文献
Up to now, “information process” has not had a scientifically conclusive definition nor its implicit structure.
The presenting information process performs logical operations with discrete information units (Bits) to achieve a goal, integrating the discrete mutually connected sequence of symbols and the extracting process’ hidden information in the structure of an information Observer. The probing time-space observation develops the unit of space-time geometry-memorizing logic.
The defined information process starts generating observations of a random process via the logic of probing impulses, sequentially cutting the process entropy measure and creating the discrete information units whose integration enfolds the information geometrical structure of an Observer. Found composite stages of the information process and the synthesized optimal process trajectory minimize observation time in an artificially designed information Observer with intellectual searching logic. The analytical modeling, computer simulations, and experimental applications validate the results. 相似文献
Advanced Information Systems for Lawyers V. Mital & L. Johnson, 1992 London: Chapman & Hall. pp. 306, £35.00
Law of Contract Laurence Koffman & Elizabeth MacDonald, 1992 London: Fourmat Publishing, 430 pp., paperback £22.50
The Electronic Media and the Transformation of Law M. Ethan Katsh, 1991 Oxford: Oxford University Press. £13.95 相似文献
Yearbook of Law, Computers and Technology, Volume 5. K.V. Russell (Ed.), 1991. London: Butterworths. £29.50.
Computers, Artificial Intelligence and the Law. Mervyn E. Bennun (Ed.), 1991. London: Ellis Horwood. xx +132 (including bibliography & index), £26.50
Modelling Legal Argument: reasoning with cases and hypotheticals. Kevin D. Ashley, 1990. Cambridge: MIT Press. 329 pp. 相似文献
Practitioner Summary:
The construction workers’ uniform currently used in Hong Kong during summer was unsatisfactory. Following DeJonge’s functional clothing design process, an anti-heat stress uniform was developed by testing 30 fabrics and predicting clothing thermal functional performance using S-smart system. The new uniform could reduce the workers’ heat stress and improve their comfort and work performance. 相似文献
Practitioner Summary: Experimental investigation of human responses was conducted in an aircraft cabin. Analysis showed that the subjects maintained their comfort in a wider range of the thermal environment when the behavioural adjustments existed compared to when they did not. Thus, a suggestion was made for behavioural adjustments to be provided in aircraft cabins. 相似文献
Practitioner Summary:
Worldwide, a significant interest in industrial exoskeletons does exist, but a lack of specific safety standards and several technical issues hinder mainstay practical use of exoskeletons in industry. Specific issues include discomfort (for passive and active exoskeletons), weight of device, alignment with human anatomy and kinematics, and detection of human intention to enable smooth movement (for active exoskeletons). 相似文献
The simulation process, which consists of model building and model selection, followed by the generation and execution of a software simulator, can be partially automated if an Object-Oriented methodology is adopted. In this article, a methodology is presented, which is presently under investigation in the DESiRE (Dynamic Expert Systems in Robotic Experimentation)project
In the modelling phase, a hierarchical, uniform way of describing and manipulating continuous and discrete models is needed, if the highly desirable reusability of submodels is to be achieved. This is only possible if a clear distinction is made between bare models (and information about their intrinsic coupling) and causal simulation experiment-related data.
In the simulation phase, before generating numerical simulation code, a symbolic reduction of the continuous parts of the model is performed, thus eliminating inaccuracy introduced by the untimely application of possibly unstable numerical algorithms.
Finally, from the reduced representation, executable simulator-objects are produced for use in a distributed environment. 相似文献
Introduction to Computer Law, 2nd Edn David I. Bainbridge, 1993 London: Pitman £18.99
Deontic Logic in Computer Science: normative system specification John‐Jules CH. Meyer & Roel J. Wieringa, 1993 London: John Wiley £34.95, xiv + 317pp. 相似文献
This report discusses the basic recognition underlying the use of these tools, and presents on a conceptual level an essential philosophy and methodology of coordinating company-wide activities
The basic idea of this report is to make an additional subsystem which helps us to organize the diversified information of activities in order to coordinate activities easily. 相似文献
To identify the areas where there is suspicion of illegal waste burial, a great amount of time is often necessary. As a matter of fact, the detection of suspicious areas is often based on a comparison of available airborne images with high temporal and spatial resolution, and surveys. This is also done to gather significant aspect of change as deep soil reshuffle in small excavation areas. These methods however, take a long time to be applied because large areas have to be analysed within sub-areas. Consequently, there is loss of understanding related to a wider and complete phenomenon that allows us to have information of all the territory that has undergone heavy transformations, especially if due to illegal conduct of waste disposal. As a result, there are no enough data to strategically evaluate how to counteract such illegal activities.
Since these areas have already been heavily disturbed and subjected to continuous changes over time, one or more detection techniques in a standardized procedure might only be applicable in some contexts. The above method comparison and survey is certainly a useful tool for detecting areas affected by excavation activities or waste illegal disposal. It also provides information where significant transformations have occurred in a short time.
The purpose of this work is the development of a processing procedure with Landsat images applicable to agro-ecosystems that can produce results in heavily transformed areas where suspicion of illegal waste burial is high. 相似文献
Practitioner Summary: This study investigated whether noise during surgeries influenced the communication within surgical teams. During abdominal surgeries, noise levels were measured and communication was observed. Results showed that high noise peaks reduced the frequency of patient-related communication, but did not reduce patient-irrelevant communication. Noise may negatively affect team coordination in surgeries. 相似文献