A few practical remarks on the user-friendliness of online systems

1980 ◽  
Vol 2 (6) ◽  
pp. 277-283 ◽  
Author(s):  
V. Stibic

A list of general properties of a user-friendly online sys tem is presented. Unfortunately, the requirements of experi enced users on the one hand, and of the beginners or inci dental users on the other hand, are contradictory. Synonymous commands, less strictly formalized input data transformed to standardized formats by intelligent input programs, explicit as well as implicit input data, free choice between default or user's own parameters and procedures or macrocommands, can make any system more friendly even for heterogeneous user population. Similarly, flexibility of output (e.g. elo quent natural-language messages for non-experienced users and concise coded and abbreviated output for experts) im proves acceptance of the system by all users. Examples of flexible, free forms of commands, input and output data are given.

2016 ◽  
Vol 15 (12) ◽  
pp. 7308-7315
Author(s):  
Festim HALILI HALILI ◽  
Avni RUSTEMI

Always before we start creating or accessing a particular system, it is more than necessary to have a clearer picture of how to create, respectively, how to approach a certain system, in this case of a e-business system. It is much easier as for systems makers, as well as for ordinary users when they have before them a model of how to be accessed in such a system, because such a thing will orient users much easier to purchase products online through various systems on the one hand, but on the other hand it would help makers of systems create much easier such systems when they have already before them the right design. Modeling systems may be done in different ways, depending on the context of its research, but we in this paper we will use UML diagrams for modeling online system where we will make a comparison between UML diagrams and we will present each type of UML diagram in terms of customer access in online systems. Also using predictive techniques as CPM and PERT techniques in the paper we will present the main activities required for access to an online system by different users, and their graphic presentation and critical path finding, which shows the best way to approach such a system. There shall not fail and the description of business models and the introduction of some e-business models that are commonly used in practice in the days of today.


Author(s):  
Benjamin Röhm ◽  
Reiner Anderl

Abstract The Department of Computer Integrated Design (DiK) at the TU Darmstadt deals with the Digital Twin topic from the perspective of virtual product development. A concept for the architecture of a Digital Twin was developed, which allows the administration of simulation input and output data. The concept was built under consideration of classical CAE process chains in product development. The central part of the concept is the management of simulation input and output data in a simulation data management system in the Digital Twin (SDM-DT). The SDM-DT takes over the connection between Digital Shadow and Digital Master for simulation data and simulation models. The concept is prototypically implemented. For this purpose, real product condition data were collected via a sensor network and transmitted to the Digital Shadow. The condition data were prepared and sent as a simulation input deck to the SDM-DT in the Digital Twin based on the product development results. Before the simulation data and models are simulated, there is a comparison between simulation input data with historical input data from product development. The developed and implemented concept goes beyond existing approaches and deals with a central simulation data management in Digital Twins.


Author(s):  
Sylvia L. Osborn

With the widespread use of online systems, there is an increasing focus on maintaining the privacy of individuals and information about them. This is often referred to as a need for privacy protection. The author briefly examines definitions of privacy in this context, roughly delineating between keeping facts private and statistical privacy that deals with what can be inferred from data sets. Many of the mechanisms used to implement what is commonly thought of as access control are the same ones used to protect privacy. This chapter explores when this is not the case and, in general, the interplay between privacy and access control on the one hand and, on the other hand, the separation of these models from mechanisms for their implementation.


Author(s):  
Michael O'Rourke

This chapter presents a critical review of research on referential intentions, in the fields of philosophy, linguistics, and psychology, focusing both on what makes them referential and how they function as intentions. This project is distinctively philosophical—the concept referential intention combines elements of language with those of action, and a full account of it should blend theoretical work on reference in linguistics and the philosophy of language with theoretical work on intention in psychology and the philosophy of action. While such an account is beyond the scope of this chapter, the aim is to make progress toward it by outlining ways in which referential intentions are conceptually constrained by reference on the one side and intention on the other. The goal is to supply an overview of these states that does justice to their variety while introducing constraints on their implementation in semantic and pragmatic theories of natural language.


2020 ◽  
Vol 40 (3) ◽  
pp. 295-316
Author(s):  
Lilian Bermejo-Luque

In “Deductivism as an Interpretative Strategy: A Reply to Groarke’s Defense of Reconstructive Deductivism,” David Godden (2005) distinguished two notions of deductivism. On the one hand, as an interpretative thesis, deductivism is the view that all-natural language argumentation must be interpreted as being deductive. On the other hand, as an evaluative thesis, deductivism is the view that for a conclusion to follow, it has to follow of necessity from the premises—or, in other words, that being a good inference implies being deductive. The main goal of this paper is to show that evaluative deductivism is wrong.


Author(s):  
Davide Picca ◽  
Dominique Jaccard ◽  
Gérald Eberlé

In the last decades, Natural Language Processing (NLP) has obtained a high level of success. Interactions between NLP and Serious Games have started and some of them already include NLP techniques. The objectives of this paper are twofold: on the one hand, providing a simple framework to enable analysis of potential uses of NLP in Serious Games and, on the other hand, applying the NLP framework to existing Serious Games and giving an overview of the use of NLP in pedagogical Serious Games. In this paper we present 11 serious games exploiting NLP techniques. We present them systematically, according to the following structure:  first, we highlight possible uses of NLP techniques in Serious Games, second, we describe the type of NLP implemented in the each specific Serious Game and, third, we provide a link to possible purposes of use for the different actors interacting in the Serious Game.


Author(s):  
Christian Rode

This article examines the role of the mediaeval theory of the propositio in re, as proposed by Walter Burley and others, which bears a striking resemblance to the theory of the “proposition” advocated by G. E. Moore and B. Russell. Burley’s proposition composed of real things has the function of an ultimate significate for every sentence of natural language. The main problems of such a theory are on the one hand absurdities like a bird flying between the subject and predicate of a sentence, on the other hand Burley’s assumption that a relation of identity holds between subject and predicate, which might render propositiones in re tautological. Moreover, the particular nature of this relation is left unexplained. But these difficulties can be solved: The former by applying objective being, being as being cognized, to the terms of a propositio, as did Scotus and Franciscus de Prato, the latter by specifying multiple forms of real predication as being or being-in-something apart from a mere identity-relation (e. g. William Milverley).


2020 ◽  
pp. 99-114
Author(s):  
Cameron Domenico Kirk-Giannini ◽  
Ernie Lepore

In his final lecture, Davidson turns away from the project of providing semantic analyses for particular natural language constructions. He outlines his theory of radical translation—that is, his theory of how one can come to know that a candidate T-theory for a given object language is correct. By assuming (on the one hand) that whenever an object-language speaker accepts a sentence, that sentence is true, and (on the other hand) that we as theoreticians generally have correct beliefs about the world, Davidson argues that we can arrive at a correct T-theory for an object language. He concludes with some reflections on the fact that this procedure seems to make it inevitable that we will discover the recursive structure of our own language in the languages of others, as well as the preponderance of our beliefs in the minds of our peers.


Author(s):  
Nelson Baza-Solares ◽  
Ruben Velasquez-Martínez ◽  
Cristian Torres-Bohórquez ◽  
Yerly Martínez-Estupiñán ◽  
Cristian Poliziani

The analysis of traffic problems in large urban centers often requires the use of computational tools, which give the possibility to make a more detailed analysis of the issue, suggest solutions, predict behaviors and, above all, support efficient decision-making. Transport microsimulation software programs are a handy set of tools for this type of analysis. This research paper shows a case study where functions and limitations of Aimsun version 8.2.0, a commercial-like European software and Sumo version 1.3.1, a European open-source software, are presented. The input and output data are similar in both software and the interpretation of results is quite intuitive for both, as well. However, Aimsun's graphical interface interprets results more user-friendly, because Sumo is an open-access software presented as an effective alternative tool for transport modeling.


Dialogue ◽  
1962 ◽  
Vol 1 (3) ◽  
pp. 239-258 ◽  
Author(s):  
Bernard Wand
Keyword(s):  

Whether or not men have free choice is a question which arises within two distinct moral contexts. At issue in the one is their ability to decide among genuine alternatives; in the other their ability to do what they think they ought to do although their desire to perform their duty is weaker than their desire to do otherwise. The former has to do with moral decision; (he latter with moral effort. Although the two are distinct they are not unrelated. For in any moral decision a fully conscious, or rather self-conscious agent, will always take into account the likelihood of his effort succeeding in action and this will have an important bearing on the decision he makes.


Sign in / Sign up

Export Citation Format

Share Document