Search results for "End user"
showing 10 items of 51 documents
Cost-efficiency assessments of marine monitoring methods lack rigor—a systematic mapping of literature and an end-user view on optimal cost-efficienc…
2021
Global deterioration of marine ecosystems, together with increasing pressure to use them, has created a demand for new, more efficient and cost-efficient monitoring tools that enable assessing changes in the status of marine ecosystems. However, demonstrating the cost-efficiency of a monitoring method is not straightforward as there are no generally applicable guidelines. Our study provides a systematic literature mapping of methods and criteria that have been proposed or used since the year 2000 to evaluate the cost-efficiency of marine monitoring methods. We aimed to investigate these methods but discovered that examples of actual cost-efficiency assessments in literature were rare, contr…
The author's reply to N.R. Haddaway.
2017
Abstract In this reply we respond to the commentary of Dr. Haddaway addressed in searching for pitfalls in our systematic mapping exercise “Collating science-based evidence to inform public opinion on the environmental effects of marine drilling platforms in the Mediterranean Sea” recently published in Journal of Environmental Management (Mangano, M.C. and Sara, G. 2017. Journal of Environmental Management 188: 195–202). We discussed each so called “pitfalls” and, in our opinion, the main cornerstones of systematic map – SM (repeatability, comprehensiveness, transparency, traceability, quality, generalizability) are safe guaranteeing the “gold standard” required by this technique. Where nee…
Security and Privacy in Wireless IoT
2018
The 13 articles in this special section focus on security and privacy in wireless Internet of Things (IoT). IoT is a paradigm that involves networked physical objects with embedded technologies to collect, communicate, sense, and interact with the external environment through wireless or wired connections. With rapid advancements in IoT technology, the number of IoT devices is expected to surpass 50 billion by 2020, which has also drawn the attention of attackers who seek to exploit the merits of this new technology for their own benefits. There are many potential security and privacy threats to IoT, such as attacks against IoT systems and unauthorized access to private information of end u…
Improving the Translational Medicine Process: Moving Patients From "End-Users" to "Engaged Collaborators".
2019
Translational medicine works through the definition of unmet medical needs, their understanding and final resolution. In this complex and multi-disciplinary process patients have always been regarded as "end-users" or no more than "data provider." Considering that the translational practice is nowadays highly inefficient (i.e., large intellectual and economical resources are wasted with limited impact on people health) here we propose to reverse the process: start from patients, engage them, and keep them at the center. A new partnership needs to be formed between the patients and the health care professionals, as well as the treating physicians, to make the most out of the current "health …
Risks in neural machine translation
2020
Abstract The new paradigm of neural machine translation is leading to profound changes in the translation industry. Surprisingly good results have led to high expectations; however, there are substantial risks that have not yet been sufficiently taken into account. Risks exist on three levels: first, what kind of damage can clients and end users incur in safety-critical domains if the NMT result contains errors; second, who is liable for damage caused by the use of NMT; third, what cyber risks can the use of NMT entail, especially when free online engines are used. When establishing sustainable measures to reduce such risks, we also need to consider general principles of human behaviour if …
Downstream Services for Rice Crop Monitoring in Europe: From Regional to Local Scale
2017
The ERMES agromonitoring system for rice cultivations integrates EO data at different resolutions, crop models, and user-provided in situ data in a unified system, which drives two operational downstream services for rice monitoring. The first is aimed at providing information concerning the behavior of the current season at regional/rice district scale, while the second is dedicated to provide farmers with field-scale data useful to support more efficient and environmentally friendly crop practices. In this contribution, we describe the main characteristics of the system, in terms of overall architecture, technological solutions adopted, characteristics of the developed products, and funct…
End-user Need based Creation of a Medical Device: An Experience of Co-design to Struggle Pathological Scars
2020
International audience; Scar is a common visible mark of human tissue healing. Sometimes pathological phenomena lead to abnormal hypertrophic or keloid scars, with evolutions varying depending on different conditions: origin of the tissue barrier disruption, concerned body area, or ethnic origin. Based on these statements, care procedures have been developed to avoid aesthetical or functional impairments: drugs injection, surgery, cryotherapy or mechanical compression. The story will relate the matching of a multi-disciplinary team that focused on covering an unmet need for ear lobe keloid treatment, providing patients an optimal and holistic care. The benefits researched lied in improving …
Identifying relevant segments of AI applications adopters : Expanding the UTAUT2’s variables
2021
Artificial intelligence (AI) is a future-defining technology, and AI applications are becoming mainstream in the developed world. Many consumers are adopting and using AI-based apps, devices, and services in their everyday lives. However, research examining consumer behavior in using AI apps is scant. We examine critical factors in AI app adoption by extending and validating a well-established unified theory of adoption and use of technology, UTAUT2. We also explore the possibility of unobserved heterogeneity in consumers’ behavior, including potentially relevant segments of AI app adopters. To augment the knowledge of end users’ engagement and relevant segments, we have added two new antec…
ViziQuer: A Visual Notation for RDF Data Analysis Queries
2019
Visual SPARQL query notations aim at easing the RDF data querying task. At the current state of the art there is still no generally accepted visual graph-based notation suitable to describe RDF data analysis queries that involve aggregation and subqueries. In this paper we present a visual diagram-centered notation for SPARQL select query formulation, capable to handle aggregate/statistics queries and hierarchic queries with subquery structure. The notation is supported by a web-based prototype tool. We present the notation examples, describe its syntax and semantics and describe studies with possible end users, involving both IT and medicine students.
Voltage Rise Issues and Mitigation Techniques Due to High PV Penetration into the Distribution Network
2018
Integration of photovoltaic systems (PV)into the low voltage (LV)grid is seen as a viable and globally accepted optionto meet the ever-increasing energy demands. However, the high PV penetration into the LV distribution grid has raised up many concerns for various stakeholders e.g. distribution company, industry partners, end users etc. The suddenchanges in the voltage level, is one of the main issues due to the reverse power flowfrom distributed energy sources to the grid, has significantly affected the behavior of the traditional LV grid. This paper has reviewed the impacts on voltage profile due to high PV penetration and different techniques used for mitigation these issues such as acti…