User-Centric Design and Evolvable Architecture for Science Gateways: A Case Study

Author(s):  
Suresh Marru ◽  
Tanya Kuruvilla ◽  
Eroma Abeysinghe ◽  
Donald McMullen ◽  
Marlon Pierce ◽  
...  
Author(s):  
Farheen Siddiqui ◽  
Parul Agarwal

In this chapter, the authors work at the feature level opinion mining and make a user-centric selection of each feature. Then they preprocess the data using techniques like sentence splitting, stemming, and many more. Ontology plays an important role in annotating documents with metadata, improving the performance of information extraction and reasoning, and making data interoperable between different applications. In order to build ontology in the method, the authors use (product) domain ontology, ConceptNet, and word net databases. They discuss the current approaches being used for the same by an extensive literature survey. In addition, an approach used for ontology-based mining is proposed and exploited using a product as a case study. This is supported by implementation. The chapter concludes with results and discussion.


Author(s):  
Dan Johansson ◽  
Mikael Wiberg

Mobility has become an omnipresent part of our modern IT society. Alongside the general taxonomy of mobile users, terminals, sessions, and services, there are also more specialized forms of mobility. Context-Awareness Supported Application Mobility (CASAM) or “Application Mobility” is one such form that is explored in this chapter. CASAM builds on the idea of using context to move an application between different devices during its execution in order to provide relevant information and/or services. The authors use a concept-driven approach to advance mobile systems research, integrating it with a more traditional user-centric method and a case study, further exploring the concept of CASAM. To empirically situate our design work they conducted an empirical study of a home care service group serving the Swedish municipality of Skellefteå, followed by an exercise in matching the properties of the CASAM concept in relation to problems within current workflow.


Author(s):  
Karin Butler ◽  
Michelle Leger ◽  
Denis Bueno ◽  
Christopher Cuellar ◽  
Michael J. Haass ◽  
...  

Energies ◽  
2021 ◽  
Vol 14 (21) ◽  
pp. 7289
Author(s):  
Yasuhiro Takeda ◽  
Yoichi Nakai ◽  
Tadatoshi Senoo ◽  
Kenji Tanaka

Peer-to-peer (P2P) energy trading is gaining attention as a technology to effectively handle already existing distributed energy resources (DER). In order to manage a large number of DER, it is necessary to increase the number of P2P energy trading participants. For that, designing incentives for participants to engage in P2P energy trading is important. This paper describes a user-centric cooperative mechanism that enhances user participation in P2P energy trading. The key components of this incentive for participants to engage in P2P energy trading are described and evaluated in this study. The goal of the proposal is to make it possible to conduct economic transactions while reflecting the preferences of the traders in the ordering process, making it possible to conduct transactions with minimal effort. As a case study, the Higashi-Fuji demonstration experiment conducted in Japan verified the proposed mechanism. In this experiment, 19 households and 9 plugin hybrid vehicles (PHV) were evaluated. As a result, the study confirmed that prosumers were able to sell their surplus electricity, and consumers were able to preferentially purchase renewable energy when it was available. In addition, those trades were made economically. All trades were made automatically, and this efficiency allowed the users to continue using the P2P energy trading.


Author(s):  
Richard Y.R. Wu ◽  
Mahesh Subramanium

This chapter presents a case study where Web services are used to build a user-centric online security system. It explores complex technical challenges encountered with the use of the Web services and online security technologies. Furthermore, the authors hope that their practical experiences and findings will shed some lights on how the online security system should and can be built in the approach of being user-centric instead of vendor-centric and on the implications of embracing Web services to conventional software engineering processes.


2019 ◽  
Vol 59 ◽  
pp. 100486 ◽  
Author(s):  
W.X. Wilcke ◽  
V. de Boer ◽  
M.T.M. de Kleijn ◽  
F.A.H. van Harmelen ◽  
H.J. Scholten

2021 ◽  
Author(s):  
Tiffany S Liaw ◽  
Nils Gehlenborg

There is a growing demand for the adoption of user-centric design processes for the development of computational biology software as usability becomes a major concern. Our team develops interfaces for a human biomolecular data portal with user-centered design, so we present a case study of the design process of a molecular and cellular query to emphasize the importance of user-centric design and reveal the complications that arise in a complex software development environment. The study follows the design process from user requirement gathering to the prototyping of a minimum viable product.


Sign in / Sign up

Export Citation Format

Share Document