Development and Exploitation of Software Complex of Virtual Community Life Cycle Organization ....1
Olha Trach and Solomia Fedushko
Systematic Review of Persuasive Health Technology Design and Evaluation Models..........................12
Kasali Funmilayo, Kuyoro Afolashade and Awodele Oludele
Designing Condition-based Maintenance Management Systems for High-Speed Fleet .......................28
Gopalakrishna Palem
The Verification Of Virtual Community Member’s Socio-Demographic Profileacijjournal
This article considers the current problem of investigation and development of method of web-members’
socio-demographic characteristics’ profile validation based on analysis of socio-demographic
characteristics. The topicality of the paper is determined by the necessity to identify the web-community
member by means of computer-linguistic analysis of their information track (all information about webcommunity
members, which posted on the Internet). The formal model of basic socio-demographic
characteristics of virtual communities’ member is formed. The algorithm of these characteristics
verification is developed.
THE VERIFICATION OF VIRTUAL COMMUNITY MEMBER’S SOCIO-DEMOGRAPHIC PROFILE acijjournal
This article considers the current problem of investigation and development of method of web-members’
socio-demographic characteristics’ profile validation based on analysis of socio-demographic
characteristics. The topicality of the paper is determined by the necessity to identify the web-community
member by means of computer-linguistic analysis of their information track (all information about webcommunity
members, which posted on the Internet). The formal model of basic socio-demographic
characteristics of virtual communities’ member is formed. The algorithm of these characteristics
verification is developed.
User behavior model & recommendation on basis of social networks Shah Alam Sabuj
At present social networks play an important role to express people's sentiment and interest in a particular field. Extracting a user's public social network data (what the user shares with friends and relatives and how the user reacts over others' thought) means extracting the user's behavior. Defining some determined hypothesis if we make machine understand human sentiment and interest, it is possible to recommend a user about his/her personal interest on basis of the user's sentiment analyzed by machine. Our main approach is to suggest a user regarding the user's specific interest that is anticipated by analyzing the user's public data. This can be extended to further business analysis to suggest products or services of different companies depending on the consumer's personal choice. This automation will also help to choose the correct candidate for any questionnaire. This system will also help anyone to know about himself or herself, how one's behavior may influence others. It is possible to identify different types of people such as- dependable people, leadership skilled, people of supportive mentality, people of negative mentality etc.
Emerged computer interaction with humanity social computingijcsa
In the 21st century, everywhere people analyze & measure societal. The new trend to compute the societal is
known as social computing. The emerging trend of research focuses interaction of technologies with
humanity. This interaction can be either man machine interaction or human computer interaction. This
article conveys the brief description of social computing and social impact of computing into variant
environment. It optimises the interaction technology, ubiquitous computing and pervasive computing.
Subsequently affective computing is discussed with artificial intelligence to motivate the automation of
technology in social computing.
E-Commerce Mobile Marketing Model Resolving Users Acceptance Criteria IJMIT JOURNAL
The growth of e-commerce and mobile services has been creating business opportunities. Among these,
mobile marketing is predicted to be a new trend of marketing. As mobile devices are personal tools such
that the services ought to be unique, in the last few years, researches have been conducted studies related
to the user acceptance of mobile services and produced results. This research aims to develop a model of
mobile e-commerce mobile marketing system, in the form of computer-based information system (CBIS)
that addresses the recommendations or criteria formulated by researchers. In this paper, the criteria
formulated by researches are presented then each of the criteria is resolved and translated into mobile
services. A model of CBIS, which is an integration of a website and a mobile application, is designed to
materialize the mobile services. The model is presented in the form of business model, system procedures,
network topology, software model of the website and mobile application, and database models.
The Verification Of Virtual Community Member’s Socio-Demographic Profileacijjournal
This article considers the current problem of investigation and development of method of web-members’
socio-demographic characteristics’ profile validation based on analysis of socio-demographic
characteristics. The topicality of the paper is determined by the necessity to identify the web-community
member by means of computer-linguistic analysis of their information track (all information about webcommunity
members, which posted on the Internet). The formal model of basic socio-demographic
characteristics of virtual communities’ member is formed. The algorithm of these characteristics
verification is developed.
THE VERIFICATION OF VIRTUAL COMMUNITY MEMBER’S SOCIO-DEMOGRAPHIC PROFILE acijjournal
This article considers the current problem of investigation and development of method of web-members’
socio-demographic characteristics’ profile validation based on analysis of socio-demographic
characteristics. The topicality of the paper is determined by the necessity to identify the web-community
member by means of computer-linguistic analysis of their information track (all information about webcommunity
members, which posted on the Internet). The formal model of basic socio-demographic
characteristics of virtual communities’ member is formed. The algorithm of these characteristics
verification is developed.
User behavior model & recommendation on basis of social networks Shah Alam Sabuj
At present social networks play an important role to express people's sentiment and interest in a particular field. Extracting a user's public social network data (what the user shares with friends and relatives and how the user reacts over others' thought) means extracting the user's behavior. Defining some determined hypothesis if we make machine understand human sentiment and interest, it is possible to recommend a user about his/her personal interest on basis of the user's sentiment analyzed by machine. Our main approach is to suggest a user regarding the user's specific interest that is anticipated by analyzing the user's public data. This can be extended to further business analysis to suggest products or services of different companies depending on the consumer's personal choice. This automation will also help to choose the correct candidate for any questionnaire. This system will also help anyone to know about himself or herself, how one's behavior may influence others. It is possible to identify different types of people such as- dependable people, leadership skilled, people of supportive mentality, people of negative mentality etc.
Emerged computer interaction with humanity social computingijcsa
In the 21st century, everywhere people analyze & measure societal. The new trend to compute the societal is
known as social computing. The emerging trend of research focuses interaction of technologies with
humanity. This interaction can be either man machine interaction or human computer interaction. This
article conveys the brief description of social computing and social impact of computing into variant
environment. It optimises the interaction technology, ubiquitous computing and pervasive computing.
Subsequently affective computing is discussed with artificial intelligence to motivate the automation of
technology in social computing.
E-Commerce Mobile Marketing Model Resolving Users Acceptance Criteria IJMIT JOURNAL
The growth of e-commerce and mobile services has been creating business opportunities. Among these,
mobile marketing is predicted to be a new trend of marketing. As mobile devices are personal tools such
that the services ought to be unique, in the last few years, researches have been conducted studies related
to the user acceptance of mobile services and produced results. This research aims to develop a model of
mobile e-commerce mobile marketing system, in the form of computer-based information system (CBIS)
that addresses the recommendations or criteria formulated by researchers. In this paper, the criteria
formulated by researches are presented then each of the criteria is resolved and translated into mobile
services. A model of CBIS, which is an integration of a website and a mobile application, is designed to
materialize the mobile services. The model is presented in the form of business model, system procedures,
network topology, software model of the website and mobile application, and database models.
Determination of the Account Personal Data Adequacy of Web Community Member .............................. 1
Solomia Fedushko, Yuriy Syerov, Andriy Peleschyshyn and Korzh Roman
Layered Defense Approach: Towards Total Network Security............................................................13
Kalaivani Chellappan, Ahmed Shamil Mustafa, Mohammed Jabbar Mohammed and Aqeel Mezher
Thajeel
Millennials: Entitled Networking Business Leaders............................................................................23
Dr. Caroline Akhras
Modeling of Citizen Claims Processing by Means of Queuing System ................................................36
Oleksandr Markovets and Andriy Peleschychyn
Suggestions for Informational Influence on a Virtual Community ......................................................47
R. V. Huminskyi, A. M. Peleshchyshyn and Z. Holub
VoIP Security: Improving Quality of Service through the Analysis of Secured Transmission ...............66
Uchenna P. Daniel Ani and Mohammed Mustapha
Application of Savings and Loan Cooperative ServicesYogeshIJTSRD
Information technology knowledge has become a necessity. Most of a persons daily activities involve the assistance of information technology, both teaching and learning activities, working in institutions and entrepreneurship. In addition, knowledge of information technology is a persons main asset to be able to compete in the digital era. A cooperative is an institution that runs on the principle of kinship. So that in carrying out its activities prioritizing the welfare of its members and aiming to increase the economic growth of the community. The goal to be achieved in this community service activity is to produce an android based system of savings and loan cooperative service that is able to facilitate the delivery of information from management to members in real time and can provide solutions for speed, accuracy and accuracy. The method used in this research and development research uses the waterfall model, which is a process or steps to develop a new product or improve an existing product. The system analysis was carried out with the initial stages of the research method, the communication stage was carried out by the interview and observation process. The observation process is carried out by making direct observations to get an overview and the interview process is carried out by conducting questions and answers to match the data and information. After designing the next step is build an android system based of savings and loan cooperative service. Dimas Indra Laksmana | Maranatha Wijayaningtyas | Kiswandono "Application of Savings and Loan Cooperative Services" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-3 , April 2021, URL: https://www.ijtsrd.com/papers/ijtsrd40065.pdf Paper URL: https://www.ijtsrd.com/management/mis-and-retail-management/40065/application-of-savings-and-loan-cooperative-services/dimas-indra-laksmana
The Business Case for Smart Cities
• What is a Smart City?
• Where are the Smart Cities?
• Does Smart = Sustainable?
• How can the investment be justified?
• How can success be measured?
Communication, culture, competency, and stakeholder that contribute to requi...IJECEIAES
In the context of software development, requirement engineering is one of the crucial phases that leads to software project success or failure. According to several disruptive changes in the software engineering landscape as well as the world’s challenge of virus pandemic, the provision of practical and innovative software applications is required. Therefore, issues resolution in requirement elicitation is potentially one of the key success factors resulting in enhanced quality of system requirement. The authors have striven to create new ways of requirement elicitation according to factor effects of communication, culture, competency, and stakeholder, by incorporating tools, processes, methods, and techniques to solve the problems comprehensively, and then proposed an adaptive and applicable conceptual framework. To illustrate these effects, the authors performed a literature review from the past 8 years, and then data analysis from interviews of 27 practitioners, observations and focus groups of software development in real-life projects.
Analysis and Design of Information Systems Financial Reports with Object Orie...ijceronline
Micro, Small and Medium Enterprises (SMEs) are a group effort proved resistant to a wide range of economic crisis shocks. But in the operation of their business financial management is still not transparent and are also still mixed between business finance and personal finance. So that needs to be done with good financial management. In this research, analysis and information system design financial reports as a basis for the development of the system. Software development life cycle (SDLC) using the model of the object oriented approach. With object-oriented approach, the tools used by the notation Unified Modelling Language (UML). In object-oriented approach all systems applications are Viewed as a collection of objects that allow organisasi interloking and end users to Easily understand logical entities. Object-oriented approach Provides the benefits of the reuse of codes and saves the time for developing quality product.
Ijcsit12REQUIREMENTS ENGINEERING OF A WEB PORTAL USING ORGANIZATIONAL SEMIOTI...ijcsit
The requirements of software are key elements that contribute to the quality and users satisfaction of the
final system. In this work, Requirements Engineering (RE) of web sites is presented using an organizational
semiotics perspective. They are shown as being part of an organization, with particular practices, rules
and views considering stakeholders several differences and opinions. The main contribution of this paper is
to relate an experience, from elicitation to validation, showing how organizational semiotics artifacts were
exploited in a collaborative and participatory way to RE of a web portal. A case study is described in order
to demonstrate the feasibility of using such artifacts to RE when we think about the system as being part of
a social organization.
ICSME 2016 keynote: An ecosystemic and socio-technical view on software maint...Tom Mens
These are the slides of my ICSME 2016 keynote, presented on 5 October 2016 in Raleigh, North Carolina. I focus on the difficulties of maintaining and evolving software ecosystems, large collections of interacting software components that are maintained by a large and active community of contributors and that evolve together in the same environment. Software ecosystems are becoming ubiquitous due to the omnipresence of open source software. I present several problems that arise during maintenance and evolution of software ecosystems, and I argue how some of these challenges should be addressed by adopting a socio-technical view and by relying on a multidisciplinary and mixed methods research approach. I illustrate this with examples of social network analysis, complex systems research, ecological biodiversity, and survival analysis.
MOBILE APPLICATION FOR DONATION OF ITEMSvivatechijri
Development of NGO is also development of society prestige, which makes significance contribution to diverse areas. Since NGO are non-profit organization, they always lack resources. Thus, to fulfill the requirements “UNNATI SAMAJ “app will be a rescue. Using this app any donor can donate food, clothes, and other items which can be utilize by needy ones. For e.g. from big organized parties, often food gets wasted, so using the app’s Google API technology people can donate the food to nearest NGO without needed to search up for contact information. Thus, our app will be a direct bridge between all NGOs and donors.
Volunteered Geographic Information System Design: Project and Participation G...José Pablo Gómez Barrón S.
Link: https://doi.org/10.3390/ijgi5070108
Gómez-Barrón, J.-P., Manso-Callejo, M.-Á., Alcarria, R., & Iturrioz, T. (2016). Volunteered Geographic Information System Design: Project and Participation Guidelines. ISPRS International Journal of Geo-Information, 5(7), 108.
This article sets forth the early phases of a methodological proposal for designing and developing Volunteered Geographic Information (VGI) initiatives based on a system perspective analysis in which the components depend and interact dynamically among each other. First, it focuses on those characteristics of VGI projects that present different goals and modes of organization, while using a crowdsourcing strategy to manage participants and contributions. Next, a tool is developed in order to design the central crowdsourced processing unit that is best suited for a specific project definition, associating it with a trend towards crowd-based or community-driven approaches. The design is structured around the characterization of different ways of participating, and the task cognitive demand of working on geo-information management, spatial problem solving and ideation, or knowledge acquisition. Then, the crowdsourcing process design helps to identify what kind of participants are needed and outline subsequent engagement strategies. This is based on an analysis of differences among volunteers’ participatory behaviors and the associated set of factors motivating them to contribute, whether on a crowd or community-sourced basis. From a VGI system perspective, this paper presents a set of guidelines and methodological steps in order to align project goals, processes and volunteers and thus successfully attract participation. This methodology helps establish the initial requirements for a VGI system, and, in its current state, it mainly focuses on two components of the system: project and participants.
LINKING SOFTWARE DEVELOPMENT PHASE AND PRODUCT ATTRIBUTES WITH USER EVALUATIO...csandit
This paper presents an evaluation methodology to reveal the relationships between the
attributes of software products, practices applied during the development phase and the user
evaluation of the products. For the case study, the games sector has been chosen due to easy
access to the user evaluation of this type of software products. Product attributes and practices
applied during the development phase have been collected from the developers via
questionnaires. User evaluation results were collected from a group of independent evaluators.
Two bipartite networks were created using the gathered data. The first network maps software
products to the practices applied during the development phase and the second network maps
the products to the product attributes. According to the links, similarities were determined and
subgroups of products were obtained according to selected development phase practices. By
this way, the effect of development phase on the user evaluation has been investigated.
An Adaptive and Real-Time Fraud Detection Algorithm in Online Transactions....................................1
Yiming WU, Siyong CAI
Agronomic Disaster Management using Artificial Intelligence - A Case Study.....................................13
M Sudha
Household Power Optimisation and Monitoring System ...................................................................23
John Batani, Silence Dzambo, Israel Magodi
Scalable Rough C-Means clustering using Firefly algorithm..................................................................1
Abhilash Namdev and B.K. Tripathy
Significance of Embedded Systems to IoT................................................................................................. 15
P. R. S. M. Lakshmi, P. Lakshmi Narayanamma and K. Santhi Sri
Cognitive Abilities, Information Literacy Knowledge and Retrieval Skills of Undergraduates: A
Comparison of Public and Private Universities in Nigeria ........................................................................ 24
Janet O. Adekannbi and Testimony Morenike Oluwayinka
Risk Assessment in Constructing Horseshoe Vault Tunnels using Fuzzy Technique................................ 48
Erfan Shafaghat and Mostafa Yousefi Rad
Evaluating the Adoption of Deductive Database Technology in Augmenting Criminal Intelligence in
Zimbabwe: Case of Zimbabwe Republic Police......................................................................................... 68
Mahlangu Gilbert, Furusa Samuel Simbarashe, Chikonye Musafare and Mugoniwa Beauty
Analysis of Petrol Pumps Reachability in Anand District of Gujarat ....................................................... 77
Nidhi Arora
Determination of the Account Personal Data Adequacy of Web Community Member .............................. 1
Solomia Fedushko, Yuriy Syerov, Andriy Peleschyshyn and Korzh Roman
Layered Defense Approach: Towards Total Network Security............................................................13
Kalaivani Chellappan, Ahmed Shamil Mustafa, Mohammed Jabbar Mohammed and Aqeel Mezher
Thajeel
Millennials: Entitled Networking Business Leaders............................................................................23
Dr. Caroline Akhras
Modeling of Citizen Claims Processing by Means of Queuing System ................................................36
Oleksandr Markovets and Andriy Peleschychyn
Suggestions for Informational Influence on a Virtual Community ......................................................47
R. V. Huminskyi, A. M. Peleshchyshyn and Z. Holub
VoIP Security: Improving Quality of Service through the Analysis of Secured Transmission ...............66
Uchenna P. Daniel Ani and Mohammed Mustapha
Application of Savings and Loan Cooperative ServicesYogeshIJTSRD
Information technology knowledge has become a necessity. Most of a persons daily activities involve the assistance of information technology, both teaching and learning activities, working in institutions and entrepreneurship. In addition, knowledge of information technology is a persons main asset to be able to compete in the digital era. A cooperative is an institution that runs on the principle of kinship. So that in carrying out its activities prioritizing the welfare of its members and aiming to increase the economic growth of the community. The goal to be achieved in this community service activity is to produce an android based system of savings and loan cooperative service that is able to facilitate the delivery of information from management to members in real time and can provide solutions for speed, accuracy and accuracy. The method used in this research and development research uses the waterfall model, which is a process or steps to develop a new product or improve an existing product. The system analysis was carried out with the initial stages of the research method, the communication stage was carried out by the interview and observation process. The observation process is carried out by making direct observations to get an overview and the interview process is carried out by conducting questions and answers to match the data and information. After designing the next step is build an android system based of savings and loan cooperative service. Dimas Indra Laksmana | Maranatha Wijayaningtyas | Kiswandono "Application of Savings and Loan Cooperative Services" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-3 , April 2021, URL: https://www.ijtsrd.com/papers/ijtsrd40065.pdf Paper URL: https://www.ijtsrd.com/management/mis-and-retail-management/40065/application-of-savings-and-loan-cooperative-services/dimas-indra-laksmana
The Business Case for Smart Cities
• What is a Smart City?
• Where are the Smart Cities?
• Does Smart = Sustainable?
• How can the investment be justified?
• How can success be measured?
Communication, culture, competency, and stakeholder that contribute to requi...IJECEIAES
In the context of software development, requirement engineering is one of the crucial phases that leads to software project success or failure. According to several disruptive changes in the software engineering landscape as well as the world’s challenge of virus pandemic, the provision of practical and innovative software applications is required. Therefore, issues resolution in requirement elicitation is potentially one of the key success factors resulting in enhanced quality of system requirement. The authors have striven to create new ways of requirement elicitation according to factor effects of communication, culture, competency, and stakeholder, by incorporating tools, processes, methods, and techniques to solve the problems comprehensively, and then proposed an adaptive and applicable conceptual framework. To illustrate these effects, the authors performed a literature review from the past 8 years, and then data analysis from interviews of 27 practitioners, observations and focus groups of software development in real-life projects.
Analysis and Design of Information Systems Financial Reports with Object Orie...ijceronline
Micro, Small and Medium Enterprises (SMEs) are a group effort proved resistant to a wide range of economic crisis shocks. But in the operation of their business financial management is still not transparent and are also still mixed between business finance and personal finance. So that needs to be done with good financial management. In this research, analysis and information system design financial reports as a basis for the development of the system. Software development life cycle (SDLC) using the model of the object oriented approach. With object-oriented approach, the tools used by the notation Unified Modelling Language (UML). In object-oriented approach all systems applications are Viewed as a collection of objects that allow organisasi interloking and end users to Easily understand logical entities. Object-oriented approach Provides the benefits of the reuse of codes and saves the time for developing quality product.
Ijcsit12REQUIREMENTS ENGINEERING OF A WEB PORTAL USING ORGANIZATIONAL SEMIOTI...ijcsit
The requirements of software are key elements that contribute to the quality and users satisfaction of the
final system. In this work, Requirements Engineering (RE) of web sites is presented using an organizational
semiotics perspective. They are shown as being part of an organization, with particular practices, rules
and views considering stakeholders several differences and opinions. The main contribution of this paper is
to relate an experience, from elicitation to validation, showing how organizational semiotics artifacts were
exploited in a collaborative and participatory way to RE of a web portal. A case study is described in order
to demonstrate the feasibility of using such artifacts to RE when we think about the system as being part of
a social organization.
ICSME 2016 keynote: An ecosystemic and socio-technical view on software maint...Tom Mens
These are the slides of my ICSME 2016 keynote, presented on 5 October 2016 in Raleigh, North Carolina. I focus on the difficulties of maintaining and evolving software ecosystems, large collections of interacting software components that are maintained by a large and active community of contributors and that evolve together in the same environment. Software ecosystems are becoming ubiquitous due to the omnipresence of open source software. I present several problems that arise during maintenance and evolution of software ecosystems, and I argue how some of these challenges should be addressed by adopting a socio-technical view and by relying on a multidisciplinary and mixed methods research approach. I illustrate this with examples of social network analysis, complex systems research, ecological biodiversity, and survival analysis.
MOBILE APPLICATION FOR DONATION OF ITEMSvivatechijri
Development of NGO is also development of society prestige, which makes significance contribution to diverse areas. Since NGO are non-profit organization, they always lack resources. Thus, to fulfill the requirements “UNNATI SAMAJ “app will be a rescue. Using this app any donor can donate food, clothes, and other items which can be utilize by needy ones. For e.g. from big organized parties, often food gets wasted, so using the app’s Google API technology people can donate the food to nearest NGO without needed to search up for contact information. Thus, our app will be a direct bridge between all NGOs and donors.
Volunteered Geographic Information System Design: Project and Participation G...José Pablo Gómez Barrón S.
Link: https://doi.org/10.3390/ijgi5070108
Gómez-Barrón, J.-P., Manso-Callejo, M.-Á., Alcarria, R., & Iturrioz, T. (2016). Volunteered Geographic Information System Design: Project and Participation Guidelines. ISPRS International Journal of Geo-Information, 5(7), 108.
This article sets forth the early phases of a methodological proposal for designing and developing Volunteered Geographic Information (VGI) initiatives based on a system perspective analysis in which the components depend and interact dynamically among each other. First, it focuses on those characteristics of VGI projects that present different goals and modes of organization, while using a crowdsourcing strategy to manage participants and contributions. Next, a tool is developed in order to design the central crowdsourced processing unit that is best suited for a specific project definition, associating it with a trend towards crowd-based or community-driven approaches. The design is structured around the characterization of different ways of participating, and the task cognitive demand of working on geo-information management, spatial problem solving and ideation, or knowledge acquisition. Then, the crowdsourcing process design helps to identify what kind of participants are needed and outline subsequent engagement strategies. This is based on an analysis of differences among volunteers’ participatory behaviors and the associated set of factors motivating them to contribute, whether on a crowd or community-sourced basis. From a VGI system perspective, this paper presents a set of guidelines and methodological steps in order to align project goals, processes and volunteers and thus successfully attract participation. This methodology helps establish the initial requirements for a VGI system, and, in its current state, it mainly focuses on two components of the system: project and participants.
LINKING SOFTWARE DEVELOPMENT PHASE AND PRODUCT ATTRIBUTES WITH USER EVALUATIO...csandit
This paper presents an evaluation methodology to reveal the relationships between the
attributes of software products, practices applied during the development phase and the user
evaluation of the products. For the case study, the games sector has been chosen due to easy
access to the user evaluation of this type of software products. Product attributes and practices
applied during the development phase have been collected from the developers via
questionnaires. User evaluation results were collected from a group of independent evaluators.
Two bipartite networks were created using the gathered data. The first network maps software
products to the practices applied during the development phase and the second network maps
the products to the product attributes. According to the links, similarities were determined and
subgroups of products were obtained according to selected development phase practices. By
this way, the effect of development phase on the user evaluation has been investigated.
An Adaptive and Real-Time Fraud Detection Algorithm in Online Transactions....................................1
Yiming WU, Siyong CAI
Agronomic Disaster Management using Artificial Intelligence - A Case Study.....................................13
M Sudha
Household Power Optimisation and Monitoring System ...................................................................23
John Batani, Silence Dzambo, Israel Magodi
Scalable Rough C-Means clustering using Firefly algorithm..................................................................1
Abhilash Namdev and B.K. Tripathy
Significance of Embedded Systems to IoT................................................................................................. 15
P. R. S. M. Lakshmi, P. Lakshmi Narayanamma and K. Santhi Sri
Cognitive Abilities, Information Literacy Knowledge and Retrieval Skills of Undergraduates: A
Comparison of Public and Private Universities in Nigeria ........................................................................ 24
Janet O. Adekannbi and Testimony Morenike Oluwayinka
Risk Assessment in Constructing Horseshoe Vault Tunnels using Fuzzy Technique................................ 48
Erfan Shafaghat and Mostafa Yousefi Rad
Evaluating the Adoption of Deductive Database Technology in Augmenting Criminal Intelligence in
Zimbabwe: Case of Zimbabwe Republic Police......................................................................................... 68
Mahlangu Gilbert, Furusa Samuel Simbarashe, Chikonye Musafare and Mugoniwa Beauty
Analysis of Petrol Pumps Reachability in Anand District of Gujarat ....................................................... 77
Nidhi Arora
Various Common Control Channel Assignment Schemes in CRNs: A Survey .........................................1
Jagsir Singh, Inderdeep Kaur Aulakh and Roopali Garg
Framework for Threat Modelling for a Power Utility: Case of Zimbabwe Power Utility Company.......... 8
Samuel Musungwini, Gilbert Mahlangu, Beauty Mugoniwa, and Samuel Simbarashe Furusa
Enhanced-bandwidth Compact Printed Inverted F Antenna Suitable for LTE/GSM Mobile Phone ....... 24
S. Jesse Jackson and T. Thomas
Implementation of e-Government Services using Java Technologies: A Methodological Guide in
Improving an e-Police Management System in Zimbabwe ...................................................................... 32
Mahlangu Gilbert, Chikonye Musafare, Furusa Samuel Simbarashe and Mugoniwa Beauty
Onto Tagger: Ontology Focused Image Tagging System Incorporating Semantic Deviation Computing
and Strategic Set Expansion ...................................................................................................................... 44
Gerard Deepak and Sheeba Priyadarshini J
Design of Industrial Robot Sorting System Based on A * Search Algorithm...........................................1
Wang Hongmei, Zhao Xueliang and Du Haitao Zhang Lanhua
Digitizing Traditional Filmmaking Process for Education and Industry.................................................... 14
Zeeshan Jawed and Dr Nandita Sengupta
The Socio-Economic Impact of Identity Thefts and Cybercrime: Preventive Measures and Solutions . 32
Dr. Nabie Y. Conteh and Quinnesha N. Staton
Synthetic Vision Systems – Terrain Database, Symbology and Display Requirements...........................1
Srikanth K P and Dr Abhay A Pashilkar
A Conjoint Analysis of Customer Preferences for VoIP Service in Pakistan............................................. 22
Amir Manzoor
Impact of Human Capital Development on the Managerial Workforce of SMEs in Sabah, Malaysia ......1
Noraini Abdullah and Nurul Fatihah Rosli
A Survey of Mobile Cloud Computing: Advantages, Challenges and Approaches................................14
Mohammad Rasoul Momeni
An Efficient Authentication Protocol for Mobile Cloud Environments using ECC.................................29
Mohammad Rasoul Momeni
A Hybrid Algorithm for Improvement of XML Documents Clustering ...................................................1
Somayeh Ghazanfari and Hassan Naderi
A Novel Collaborative Filtering Friendship Recommendation Based on Smartphones ......................... 16
Dhananjaya G. M., Sachin C. Raykar and Mushtaq Ahmed D. M
Efficient Computational Tools for Nonlinear Flight Dynamic Analysis in the Full Envelope .................. 26
P. Lathasree and Abhay A. Pashilkar
Quantitative Aspects of Knowledge Knowledge Potential and Utility..................................................... 45
Syed V. Ahamed
A Novel Approach for Recommending Items based on Association Rule Mining ................................... 60
Vasundhara M. S.and Gururaj K. S.
Cluster Integrated Self Forming Wireless Sensor Based System for Intrusion Detection and Perimeter
Defense Applications ................................................................................................................................. 70
A. Inigo Mathew, M. Raj Kumar, S. R. Boselin Prabhu and Dr. S. Sophia
Enhancing AODV Routing Protocol to Eliminate Black Hole Attack in MANET.......................................1
Ei Ei Khin and Thandar Phyu
Adaptive Search Information Technology in the University Library ........................................................ 15
Andriy Andrukhiv and Dmytro Tarasov
Educational Data Mining: Performance Evaluation of Decision Tree and Clustering Techniques Using
WEKA Platform........................................................................................................................................... 26
Ritika Saxena
Hamiltonian cycle in graphs 흈4 ≥ ퟐn....................................................................................................... 38
Nguyen Huu Xuan Truong and Vu Dinh Hoa
A Review of Efficient Information Delivery and Clustering for Drip Irrigation Management using WSN.1
S. R. Boselin Prabhu, Dr. S. Sophia and A. Inigo Mathew
Dual Hybrid Algorithm for Job Shop Scheduling Problem ........................................................................ 14
Do Tuan Hanh, Vu Dinh Hoa and Nguyen Huu Mui
CThe Comparative Analysis of Power Optimization in Clustered Sleep Transistors................................ 25
M. Divya Sree, Y. Kranthi Kiran and Vijaya Vardhan Kancharla
Cyber Crimes Incidents in Financial Institutions of Tanzania ................................................................... 37
Edison Wazoel Lubua (PhD)
An Optimal Solution to the Linear Programming Problem using Lingo Solver: A Case Study of an
Apparel Production Plant of Sri Lanka.................................................................................................1
Z. A. M. S. Juman and W. B. Daundasekara
Analysis of BT and SMS based Mobile Malware Propagation ................................................................. 16
Prof. R. S. Sonar and Sonal Mohite
Behavioral Pattern of Internet Use among University Students of Pakistan........................................... 25
Amir Manzoor
BER Analysis of BPSK and QAM Modulation Schemes using RS Encoding over Rayleigh Fading Channel
.................................................................................................................................................................... 37
Faisal Rasheed Lone and Sanjay Sharma
Harnessing Mobile Technology (MT) to Enhancy the Sustainable Livelihood of Rural Women in
Zimbabwe: Case of Mobile Money Transfer (MMT) ................................................................................ 46
Samuel Musungwini, Tinashe Gwendolyn Zhou, Munyaradzi Zhou, Caroline Ruvinga and Raviro Gumbo
Design and Evaluation of a Comprehensive e-Learning System using the Tools on Web 2.0 ................ 58
Maria Dominic, Anthony Philomenraj and Sagayaraj Francis
Critical Success Factors for the Adoption of School Administration and Management System in South
African Schools ...............................................................................................................................74
Mokwena Nicolas Sello
Efficient and Trust Based Black Hole Attack Detection and Prevention in WSN ................................... 93
Symmetric Image Encryption Algorithm Using 3D Rossler System........................................................1
Vishnu G. Kamat and Madhu Sharma
Node Monitoring with Fellowship Model against Black Hole Attacks in MANET.................................... 14
Rutuja Shah, M.Tech (I.T.-Networking), Lakshmi Rani, M.Tech (I.T.-Networking) and S. Sumathy, AP [SG]
Load Balancing using Peers in an E-Learning Environment ...................................................................... 22
Maria Dominic and Sagayaraj Francis
E-Transparency and Information Sharing in the Public Sector ................................................................ 30
Edison Lubua (PhD)
A Survey of Frequent Subgraphs and Subtree Mining Methods ............................................................. 39
Hamed Dinari and Hassan Naderi
A Model for Implementation of IT Service Management in Zimbabwean State Universities ................ 58
Munyaradzi Zhou, Caroline Ruvinga, Samuel Musungwini and Tinashe Gwendolyn Zhou
Present a Way to Find Frequent Tree Patterns using Inverted Index ..................................................... 66
Saeid Tajedi and Hasan Naderi
An Approach for Customer Satisfaction: Evaluation and Validation ....................................................... 79
Amina El Kebbaj and A. Namir
Spam Detection in Twitter – A Review...................................................................................................... 92
C. Divya Gowri and Professor V. Mohanraj
A Novel Facial Recognition Method using Discrete Wavelet Transform Multiresolution Pyramid..........1
G. Preethi
Enhancing Energy Efficiency in WSN using Energy Potential and Energy Balancing Concepts ................. 9
Sheetalrani R. Kawale
DNS: Dynamic Network Selection Scheme for Vertical Handover in Heterogeneous Wireless Networks
.................................................................................................................................................................... 19
M. Deva Priya, D. Prithviraj and Dr. M. L Valarmathi
Implementation of Image based Flower Classification System................................................................ 35
Tanvi Kulkarni and Nilesh. J. Uke
A Survey on Knowledge Analytics of Text from Social Media .................................................................. 45
Dr. J. Akilandeswari and K. Rajalakshm
Progression of String Matching Practices in Web Mining – A Survey ..................................................... 62
Kaladevi A. C. and Nivetha S. M.
Virtualizing the Inter Communication of Clouds ...............................................................................72
Subho Roy Chowdhury, Sambit Kumar Patel, Ankita Vinod Mandekar and G. Usha Devi
Tracing the Adversaries using Packet Marking and Packet Logging ....................................................... 86
A. Santhosh and Dr. J. Senthil Kumar
An Improved Energy Efficient Clustering Algorithm for Non Availability of Spectrum in Cognitive Radio
Users ....................................................................................................................................................... 101
Improving Ranking Web Documents using User’s Feedbacks...............................................................1
Fatemeh Ehsanifar and Hasan Naderi
A Survey on Sparse Representation based Image Restoration ............................................................... 11
Dr. S. Sakthivel and M. Parameswari
Simultaneous Use of CPU and GPU to Real Time Inverted Index Updating in Microblogs
.................................................................................................................................................................... 25
Sajad Bolhasani and Hasan Naderi
A Survey on Prioritization Methodologies to Prioritize Non-Functional Requirements ........................ 32
Saranya. B., Subha. R and Dr. Palaniswami. S.
A Review on Various Visual Cryptography Schemes ................................................................................ 45
Nagesh Soradge and Prof. K. S. Thakare
Web Page Access Prediction based on an Integrated Approach ............................................................. 55
Phyu Thwe
A Survey on Bi-Clustering and its Applications ..................................................................................65
K. Sathish Kumar, M. Ramalingam and Dr. V. Thiagarasu
Pixel Level Image Fusion: A Neuro-Fuzzy Approach ................................................................................ 71
Swathy Nair, Bindu Elias and VPS Naidu
A Comparative Analysis on Visualization of Microarray Gene Expression Data...................................... 87
Poornima. S and Dr. J. Jeba Emilyn
Energy- Aware QoS Based Routing Protocols for Heterogeneous WSNs: A Survey ...............................1
Sridevi S., Rumeniya G. and Usha M.
Optimization of Outsourcing ICT Projects in Public Organizations; Case Study: Public Center of Iranian
ICT Studies ................................................................................................................................................. 20
Majid Nili Ahmadabadi, Abbas Bagheri and Fariba Abolghasemi
An Optimized CBIR Using Particle Swarm Optimization Algorithm ......................................................... 40
Subhakala S., Bhuvana S. and Radhakrishnan R.
Study of Satisfaction Assessment Techniques for Textual Requirements .............................................. 56
K. S. Divya, R. Subha and Dr. S. Palaniswami
Survey of MAC Protocols for Heterogeneous Traffic in Wireless Sensor Networks ............................... 67
Sridevi S., Priyadharshini R. and Usha M.
Harnessing Social Media for Business Success. Case Study of Zimbabwe ............................................... 80
Musungwini Samuel, Zhou Tinashe Gwendolyn, Zhou Munyaradzi and Ruvinga Caroline
Quality Platforms for Innovation and Breakthrough................................................................................ 90
Dr. Hima Gupta
Development of Virtual Experiment on Waveform Conversion Using Virtual Intelligent SoftLab ...... 107
Bhaskar Y. Kathane
Cloud Architecture for Search Engine Application ...............................................................................1
A. L. Saranya and B. Senthil Murugan
Efficient Numerical Integration and Table Lookup Techniques for Real Time Flight Simulation.............. 8
P. Lathasree and Abhay A. Pashilkar
A Review of Literature on Cloud Brokerage Services................................................................................ 25
Dr. J. Akilandeswari and C. Sushanth
Improving Recommendation Quality with Enhanced Correlation Similarity in Modified Weighted Sum
.................................................................................................................................................................... 41
Khin Nila Win and Thiri Haymar Kyaw
Bounded Area Estimation of Internet Traffic Share Curve ...................................................................... 54
Dr. Sharad Gangele, Kapil Verma and Dr. Diwakar Shukla
Information Systems Projects for Sustainable Development and Social Change ................................... 68
James K. Ho and Isha Shah
Software Architectural Pattern to Improve the Performance and Reliability of a Business Application
using the Model View Controller .............................................................................................................. 83
G. Manjula and Dr. G. Mahadevan
A Predictive Stock Data Analysis with SVM-PCA Model .......................................................................1
Divya Joseph and Vinai George Biju
HOV-kNN: A New Algorithm to Nearest Neighbor Search in Dynamic Space.......................................... 12
Mohammad Reza Abbasifard, Hassan Naderi and Mohadese Mirjalili
A Survey on Mobile Malware: A War without End................................................................................... 23
Sonal Mohite and Prof. R. S. Sonar
An Efficient Design Tool to Detect Inconsistencies in UML Design Models............................................. 36
Mythili Thirugnanam and Sumathy Subramaniam
An Integrated Procedure for Resolving Portfolio Optimization Problems using Data Envelopment
Analysis, Ant Colony Optimization and Gene Expression Programming ................................................. 45
Chih-Ming Hsu
Emerging Technologies: LTE vs. WiMAX ................................................................................................... 66
Mohammad Arifin Rahman Khan and Md. Sadiq Iqbal
Introducing E-Maintenance 2.0 ................................................................................................................. 80
Abdessamad Mouzoune and Saoudi Taibi
Detection of Clones in Digital Images........................................................................................................ 91
Minati Mishra and Flt. Lt. Dr. M. C. Adhikary
The Significance of Genetic Algorithms in Search, Evolution, Optimization and Hybridization: A Short
Review ...................................................................................................................................................... 103
An Integrated Distributed Clustering Algorithm for Large Scale WSN...................................................1
S. R. Boselin Prabhu, S. Sophia, S. Arthi and K. Vetriselvi
An Efficient Connection between Statistical Software and Database Management System ................... 1
Sunghae Jun
Pragmatic Approach to Component Based Software Metrics Based on Static Methods ......................... 1
S. Sagayaraj and M. Poovizhi
SDI System with Scalable Filtering of XML Documents for Mobile Clients ............................................... 1
Yi Yi Myint and Hninn Aye Thant
An Easy yet Effective Method for Detecting Spatial Domain LSB Steganography .................................... 1
Minati Mishra and Flt. Lt. Dr. M. C. Adhikary
Minimizing the Time of Detection of Large (Probably) Prime Numbers ................................................... 1
Dragan Vidakovic, Dusko Parezanovic and Zoran Vucetic
Design of ATL Rules for TransformingUML 2 Sequence Diagrams into Petri Nets..................................... 1
Elkamel Merah, Nabil Messaoudi, Dalal Bardou and Allaoua Chaoui
A Hybrid Approach for Supervised Twitter Sentiment Classification ....................................................1
K. Revathy and Dr. B. Sathiyabhama
A Survey of Dynamic Duty Cycle Scheduling Scheme at Media Access Control Layer for Energy
Conservation .....................................................................................................................................1
Prof. M. V. Nimbalkar and Sampada Khandare
A Survey on Privacy Preserving Data Mining Techniques ....................................................................1
A. K. Ilavarasi, B. Sathiyabhama and S. Poorani
An Ontology Based System for Predicting Disease using SWRL Rules ...................................................1
Mythili Thirugnanam, Tamizharasi Thirugnanam and R. Mangayarkarasi
Performance Evaluation of Web Services in C#, JAVA, and PHP ..........................................................1
Dr. S. Sagayaraj and M. Santhosh Kumar
Semi-Automated Polyhouse Cultivation Using LabVIEW......................................................................1
Prathiba Jonnala and Sivaji Satrasupalli
Performance of Biometric Palm Print Personal Identification Security System Using Ordinal Measures 1
V. K. Narendira Kumar and Dr. B. Srinivasan
MIMO System for Next Generation Wireless Communication..............................................................1
Sharif, Mohammad Emdadul Haq and Md. Arif Rana
An Efficient Classification Mechanism For Network Intrusion Detection System Based on Data Mining
Techniques:A Survey..........................................................................................................................1
Subaira A. S. and Anitha P.
Automated Biometric Verification: A Survey on Multimodal Biometrics ..............................................1
Rupali L. Telgad, Almas M. N. Siddiqui and Dr. Prapti D. Deshmukh
Design and Implementation of Intelligence Car Parking Systems ........................................................1
Ogunlere Samson, Maitanmi Olusola and Gregory Onwodi
Intrusion Detection Techniques for Mobile Ad Hoc and Wireless Sensor Networks..............................1
Rakesh Sharma, V. A. Athavale and Pinki Sharma
Performance Evaluation of Sentiment Mining Classifiers on Balanced and Imbalanced Dataset ...........1
G.Vinodhini and R M. Chandrasekaran
Demosaicing and Super-resolution for Color Filter Array via Residual Image Reconstruction and Sparse
Representation..................................................................................................................................1
Jie Yin, Guangling Sun and Xiaofei Zhou
Determining Weight of Known Evaluation Criteria in the Field of Mehr Housing using ANP Approach ..1
Saeed Safari, Mohammad Shojaee, Mohammad Tavakolian and Majid Assarian
Application of the Collaboration Facets of the Reference Model in Design Science Paradigm ...............1
Lukasz Ostrowski and Markus Helfert
Personalizing Education News Articles Using Interest Term and Category Based Recommender
Approaches .......................................................................................................................................1
Implementation of Ear Biometrics as Emerging Technology in Human Identification System ...............1
B. Srinivasan and V. K. Narendira Kumar
Determining the Security Enhancement of Biometrics in Internet Passport Scheme using Cryptographic
Algorithms ........................................................................................................................................1
B. Srinivasan and V. K. Narendira Kumar
Novel Image Fusion Techniques using DCT .........................................................................................1
V. P. S. Naidu
High Performance Data mining by Genetic Neural Network ................................................................1
Dadmehr Rahbari
Parallel Ensemble Techniques for Data Mining Application .................................................................1
M. Govindarajan
A Hybrid Cryptosystem for Image using Chaotic Mapping ...................................................................1
Nidhi Sethi and Sandip Vijay
Investigating Factors Affecting Adoption and Implementation of m-Government in the South African
Department of Home Affairs: An on-going Research ..........................................................................1
Maleshoane Sepeame and Emmanuel Babatunde Ajala
Prospects of Thermal Management Techniques in Microprocessor Architecture .................................1
Ajaegbu Chigozirim, Shodiya A.S and Kuyoro Shade O.
Capacity Based Clustering Model for Dense Wireless Sensor Networks ...............................................1
S. R. Boselin Prabhu and S. Sophia
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
1. ISSN: 1694-2507 (Print)
ISSN: 1694-2108 (Online)
International Journal of Computer Science
and Business Informatics
(IJCSBI.ORG)
VOL 17, NO 1
JANUARY-JUNE 2017
2. Table of Contents VOL 17, NO 1 JANUARY-JUNE 2017
Development and Exploitation of Software Complex of Virtual Community Life Cycle Organization ....1
Olha Trach and Solomia Fedushko
Systematic Review of Persuasive Health Technology Design and Evaluation Models..........................12
Kasali Funmilayo, Kuyoro Afolashade and Awodele Oludele
Designing Condition-based Maintenance Management Systems for High-Speed Fleet .......................28
Gopalakrishna Palem
IJCSBI.ORG
3. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 1. JANUARY-JUNE 2017 1
Development and Exploitation of
Software Complex of Virtual
Community Life Cycle
Organization
Olha Trach and Solomia Fedushko
Social Communications and Information Activities Department,
L'viv Polytechnic National University,
Ukraine, L'viv, S. Bandera Street 12
ABSTRACT
This paper presents development of software complex of virtual community life cycle
organization. The investigations stages and directions of virtual community life cycle,
introduction of indicators of tasks directions of virtual community life cycle organization,
determination of criticality of indicators of virtual community life cycle organization,
definition of socially-oriented risk of virtual community life cycle are enabled to develop a
software complex of virtual community life cycle organization. Software complex of virtual
community life cycle organization consists of three levels: management level, level of
performance, level of databases and information resources. Developed software tool
"Virtual organization of community life cycle" is an important and actual task. The
software tool is the basis for increasing the efficiency of creating a virtual community and
improving its functioning throughout its existence. The attainment of the objectives and the
development of virtual communities based on software complex of virtual community life
cycle organization are developed in this studies.
Keywords
Virtual community, lifecycle, directions, indicator, manager, software tool
1. INTRODUCTION
Virtual communities have become an extremely popular phenomenon, and
with each passing day their number is growing, and existing communities
are rapidly developing. As a result, the creation of virtual communities grew
into a separate type of professional activity, and virtual communities
become a certain type of project. However, observations showed that often
treating to virtual community as a project (with clear goals, objectives,
sequence of steps) they were failures. That is because the virtual
communities treated as a traditional project, but there are things that go
beyond the traditional project. In this paper, we investigate the appearance
of the project by type of the virtual community, its features complex of
works associated with the project activity of the virtual community.
4. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 1. JANUARY-JUNE 2017 2
2. RELATED WORKS
Considering the rapid development of virtual communities actual are the
following directions of scientific research:
Safety and information wars in virtual communities (propaganda or
disinformation spreading) [1];
creation and management of virtual communities [2, 3];
creation and management of information content of the virtual
community [4];
users attraction and monitoring of virtual community, socio-
demographic characteristics users of the virtual communities [5, 6];
marketing and advertising in the virtual community [7];
research of virtual community life cycle organization [8-11].
Monitoring of users, content, marketing component help to highlight the
directions for virtual community life cycle organization. Also, these studies
are needed to allocate the parameters of the indicator directions for tasks of
virtual community life cycle organization. Research on security of virtual
communities help еo form socially-oriented risks with virtual community
life cycle organization.
However research on virtual community life cycle organization is
incomplete and imperfect, are sporadic. The researchers representing only
conceptual models of virtual community life cycle, models frequently
consist of only four elements.
3. BACKGROUND STUDY
Any project consists of a sequence of stages, which have title and certain
characteristics, namely project life cycle. A virtual community life cycle –
execution of tasks and it stages by time period, from planning to create a
community to full its liquidation. For qualitative creation and management
of virtual community structured life cycle, includes the following steps:
planning, analysis, designing, development, testing, implementation,
exploitation, comprehensive verification, conservation community,
liquidation. And dedicated stage, characteristics of the virtual community,
was named virtual community life cycle directions [12]:
user direction (processing of activities of participants and users of
virtual communities);
informational direction (content of virtual community);
resource direction (technical and technological support for creating
and managing of virtual community);
5. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 1. JANUARY-JUNE 2017 3
reputational direction (support of content of activity and its virtual
community ranking, positioning of the virtual community).
Virtual community life cycle directions – is the focus of the implementation
stage of virtual community life cycle organization, resulting tasks
performed during all directions.
The process of implementation stage in four directions is distributed nature,
separate components that perform performers of virtual community life
cycle organization [13]:
manager of creation of virtual community – a specialist responsible
for success of virtual community life cycle organization;
analyst – responsible for analyzing the data in a certain field;
performer of stages – responsible for the implementation stages;
performer of directions – responsible for execution of tasks
directions.
For effective implementation of stages of virtual community life cycle
happening execution of tasks directions. For perform the tasks directions of
virtual community life cycle organization introduced indicators [14]:
Planned indicator (IndPlan), which consists with reference
indicator (IndReference) and indicators analysis of the subject area
of virtual community (IndAnalysis);
Real indicator (IndReal), which consists with input indicator (IndIn)
and output indicator (IndOut).
Highlighted basic indicators of tasks directions of virtual community life
cycle organization, which are the primary data of the community:
indicators of the user direction Ind_Us(Taski);
indicators of the informational direction Ind_Inf(Taski);
indicators of the reputational direction Ind_Rp(Taski).
Tasks of resource direction performed without indicators а based on
technical and technological characteristics. Set of indicators of tasks
directions of virtual community life cycle organization is show next (Figure
1).
6. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 1. JANUARY-JUNE 2017 4
Informational
direction
User direction
Resource
direction
Reputational
direction
indicator of the number
of participants
age indicator
geographical indicator
lingual indicator
writing activity indicator
reading activity
indicator
indicator of the number
of content
posts indicator
indicator of the number
comments
indicator of the number
multimedia
indicator of theme
content
indicator of uniqueness
content
indicator of
responsibility
indicator of
protection trolling
indicator of
communicative
aggression
INDICATORS OF DIRECTIONS TASKS OF THE ORGANIZATION OF
LIFE CYCLE OF VIRTUAL COMMUNITY
technical and
technological data
Figure 1. Indicators of tasks directions of virtual community life cycle organization
According to organizational management algorithm for the effective
implementation of stages of virtual community life cycle happening perform
the tasks directions, as shown in the following scheme (Figure 2):
Forming the task
Choosing
direction
Choosing
indicators
Performing
tasks
Report About
perform the task
Forming planned
indicator
Determining
criticality of
indicators
Informational
direction
Reputational
direction
Getting real
indicator
Resource direction
User direction
Figure 2. Formation of the tasks directions
The process of forming of planned indicator to perform tasks directions of
the organization of life cycle of virtual community [14] is described in the
following scheme (Figure 3):
IndAnalysis
IndEtalon
Indicators analysis of
the subject area of
virtual community
Reference
indicator
Determining
zone
IndPlan
Indicators
Figure 3. The scheme of forming planned indicator of virtual community life cycle
organization
7. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 1. JANUARY-JUNE 2017 5
The process of determination of the criticality indicators to perform tasks
directions of the organization of life cycle of virtual community [14] is
described in in the following scheme (Figure 4):
User direction
Informational
direction Processing
indicators
Reputational
direction
Resource
direction
Critical
Non-critical
Indicators
Important
Forming indicators to
form the tasks of
virtual community
life cycle
organization
Indicators
Figure 4. The scheme of determination of the criticality indicators to perform tasks
directions of the organization of life cycle of virtual community
Creating a virtual community has its own specifics and in risks in particular.
Therefore, the description of virtual community life cycle organization
highlighted a number of socially-oriented risks and described in [15],
namely:
the risk of a negative-minded audience ;
risk of reducing the quality of content;
the risk of anti-legal materials and activities of community;
the risk of losing control of the community.
Based on conducted researches, highlighted the features of virtual
communities and developed a software and algorithmic complex of virtual
community life cycle organization (Figure 5).
4. METHODOLOGY
The structure of the program complex of virtual community life cycle
organization shown next.
8. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 1. JANUARY-JUNE 2017 6
PROGRAM COMPLEX OF VIRTUAL COMMUNITY LIFE CYCLE ORGANIZATION
COMPONENT
OF FORMING
PLANNED
INDICATOR
TASKS
FORMING
COMPONENT
COMPONENT OF
CERTAINTY
CRITICALITY
INDICATORS
COMPONENT OF
FUNCTIONAL-
NETWORK
MODEL
DATABASE OF
REPORTS
PROTECTION
FROM RISKS
COMPONENT
TEAM "PROJECT MANAGEMENT"
TEAM «DIRECTIONS PERFORMERS»
MANAGEMENT
LEVEL
LEVEL OF
PERFORMANCE
PROCESSING
OF TASKS
COMPONENT
USER DIRECTION
PERFORMER
REPUTATIONAL
DIRECTION
PERFORMER
RESOURCE
DIRECTION
PERFORMER
INFORMATIONAL
DIRECTION
PERFORMER
ANALYSTMANAGER
DATABASE OF
INDICATORS
VIRTUAL
COMMUNITY
SITES
SOCIAL
NETWORKS
LEVEL OF DATABASES
AND INFORMATION
RESOURCES
INFORMATION RESOURCES
Figure 5. Structure of the program complex of virtual community life cycle
organization
The structure of the program complex of virtual community life cycle
organization consists of three levels:
management level;
level of performance;
level of databases and information resources.
4.1 Management level
Fulfills duties of this level team of performers, which provide process of
implementation of virtual community life cycle organization. The
functionality of this level are used throughout the life cycle of the virtual
community. Management level consists of two teams and six workplaces.
Team "Project Management" – team of performers, which provide process
of implementation of virtual community life cycle organization. Performers
of this team engaged in formulation of tasks, analysis, adoption key
decisions of virtual community life cycle organization. Team "Project
manager" has two workplaces "Manager" and "Analyst". Workplaces
"Manager" responsible for virtual community life cycle organization. The
main functions of the workplace is to create tasks, distribution of tasks
between performers team "Artists", documentation and acceptance the key
decisions regarding the organizational process of creating of the virtual
community. Workplace "Analyst" responsible for analyzing the data in a
certain field. Specialist of the workplace is the analyst. Due to project
constraints of the virtual community, analysts may be several. As the analyst
is not a particular profession, by specialty analyst is divided into: marketing
analyst, systems analyst, financial analyst and others.
9. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 1. JANUARY-JUNE 2017 7
Team «Directions performers» – team of performers, which responsible for
implementing the tasks directions of virtual community life cycle
organization. Workplaces correspond to directions of virtual community life
cycle organization, namely: user, informational, reputational, resource. The
workplace can be attached several performers depending on the specific
virtual community created. «User direction performer» responsible for
activities related to the participants of the virtual community.
«Informational direction performer» responsible for activities related to
the information content of the virtual community. «Reputational direction
performer» responsible for activities associated with maintaining the
reputation of the virtual community. «Resource direction performer»
responsible for activities related to technical and technological
characteristics of the virtual community.
4.2 Level of performance.
Level of performance of virtual community life cycle organization
responsible for executive components of virtual community life cycle.
Performers of component of this level is a manager, analyst and directions
performers.
«Component of functional-network model». Functional-network model of
virtual community life cycle organization based on Petri net. The model
corresponds to the functioning of the virtual community [17].
«Tasks forming component». Component responsible for structuring the
process of forming tasks of virtual community life cycle organization.
Manager creates the task and delegate to performers of tasks directions of
virtual community life cycle organization.
«Component of certainty criticality indicators». For quick and efficient
perform the tasks, according to the purpose and objectives of a virtual
community, appears necessity to define criticality of tasks indicators of
virtual community life cycle organization. To determine the criticality of
indicators necessary real and planned indicators of tasks performs of virtual
community life cycle organization.
«Component of forming planned indicator». Planned indicators are close
to ideal indicators and have an important role (especially when there is a
critical comparison). Generates planned indicator manager of virtual
community. To forming qualitative planned indicator of virtual community
life cycle organization necessary to obtained from analyst reference
indicator and indicators analysis of the subject area of virtual community.
«Processing of tasks component». Responsible for structuring of
processing of performs tasks direction of virtual community life cycle
organization. For performance of management algorithm processing of tasks
10. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 1. JANUARY-JUNE 2017 8
direction of virtual community life cycle organization corresponds direction
performer, appointed by the manager of the virtual community.
«Protection from risks component». Responsible for protecting the
appearance of socially oriented risks, which provides measures with
counteraction. Performers of component are direction performers and
manager of virtual community life cycle organization.
4.3 Level of databases and information resources.
Level includes database of tasks indicators and database of reports of virtual
community life cycle organization. Also includes information resources.
«Database of reports» used as a data source about of virtual community life
cycle organization. «Database of reports» including reports about
performance of tasks directions of virtual community life cycle
organization.
«Database of indicators». Information about indicators of tasks directions
of virtual community life cycle organization includes the following
information: planned indicator, reference indicator, indicators analysis of the
subject area of virtual community, real indicator, input indicator, output
indicator of virtual community life cycle organization.
«Information resources». Includes a set of information environment of
WWW, necessary for analysis of the subject area and reference community.
Necessary information resources for analysis: virtual community, sites,
social networks.
5. RESULTS
Based on software and algorithmic complex developed software tool
«Virtual community life cycle organization» (Figure 6).
Potential users of the software «Virtual community life cycle organization»
can be: owners and managers of virtual communities; marketers; PR-
professionals companies, political parties, famous personalities.
11. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 1. JANUARY-JUNE 2017 9
Figure 6. The user interface software.
After completion of the works on stage manager evaluates performance
directions to 10-point scale. Graph of job evaluation added to the general
documents of virtual community life cycle organization. Figure 7.
Evaluation stages of «Department SCIA» presented the example of
evaluation stages of virtual community life cycle organization «Department
SCIA» in the social network Facebook.
Figure 7. Evaluation stages of «Department SCIA»
6. CONCLUSIONS
Complex research on developing mathematical and software of virtual
community life cycle organization has provided an opportunity to develop a
software tool «Virtual community life cycle organization Complex research
provides predictable create a virtual community; predictable sequence of
steps and documentation; increases the level of control and the needs of
creators and customers of the community.
12. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 1. JANUARY-JUNE 2017 10
REFERENCES
[1] Huminskyi R.V., Peleshchyshyn A.M. and Holub Z., 2015. Suggestions for
Informational Influence on a Virtual Community. International Journal of Computer
Science and Business Informatics, Vol. 15, No. 1, pp. 47-65.
[2] An Ostrand, A., Wolfe, S., Arredondo, A., Skinner, A. M., Visaiz, R., Jones, M. &
Jenkins, J. J. 2016. Creating Virtual Communities That Work: Best Practices for Users
and Developers of E-Collaboration Software. International Journal of E-
Collaboration, 12, pp. 41-60.
[3] Wang, J. T., Yang, J. M., Chen, Q. & Tsai, S. B. 2016. Creating the sustainable
conditions for knowledge information sharing in virtual community. Springerplus, 5,
pp. 9.
[4] Tamjidyamcholo, A., Bin Baba, M. S., Shuib, N. L. M. & Rohani, V. A. 2014.
Evaluation model for knowledge sharing in information security professional virtual
community. Computers & Security, 43, pp. 19-34.
[5] Fedushko S., 2016. Development of verification system of socio-demographic data of
virtual community member. Radio Electronics Computer Science Control, Article no.
3, pp. 87-92.
[6] Fedushko S., Syerov Yu., and Korzh R., 2016. Validation of the user accounts personal
data of online academic community. IEEE XIIIth Intern. Conf. “Modern Problems of
Radio Engineering, Telecommunications and Computer Science”, Lviv-Slavske,
February 23 – 26, pp. 863-866.
[7] Jungwirth, B. 2011. The New Community Rules: Marketing on the Social Web.
Technical Communication, 58, pp. 90-91.
[8] Porter, C. E., Devaraj, S. & Sun, D. 2013. A Test of Two Models of Value Creation in
Virtual Communities. Journal of Management Information Systems, 30, pp. 261-292.
[9] Shen, K. N. & Khalifa, M. 2013. Effects of technical and social design on virtual
community identification: a comparison approach. Behaviour & Information
Technology, 32, pp. 986-997.
[10]Mousavidin E., Goel L., 2009. A Life Cycle Model of Virtual Communities.
Proceedings of the 42nd Hawaii International Conference on System Sciences.
[11]Howard R. HOW TO: Manage a Sustainable Online Community [Electronic resource].
– Mode of access: http://mashable.com/2010/07/30/sustainable-online-community/. –
Title from the screen.
[12]Syerov Yu., Trach O., Fedushko S., 2016. Effect of Implementation of improved
Methods of the Life Cycle Stages Organisation to the Online Community Management.
International Journal of Computational Research and Development, V. 1, I.1. pp. 1-5.
[13]Trach O., Vus V., Tymovchak-Maksymets O., 2016. Typical algorithm of stage
completion when creating a virtual community of a HEI. IEEE XIIIth Intern. Conf.
“Modern Problems of Radio Engineering, Telecommunications and Computer
Science”, Lviv-Slavske, February 23 – 26, pp. 849-851.
[14]Trach O., Peleshchyshyn A., 2017. Development of directions tasks indicators of
virtual community life cycle organization. International Scientific and Technical
Conference “Computer Science and Information Technologies”. [In print]
[15]Trach O., 2017 Socially-oriented risks in the organization of the life cycle of the virtual
community. Information activity, Documentation, Library: History, Present and
Prospects: Materials III All-Ukrainian. nauk. and practical. Conf., pp. 40-44.
13. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 1. JANUARY-JUNE 2017 11
[16]Trach O., Peleshchyshyn A., 2016.Functional-network model of tasks performance of
virtual communication life cycle directions. Proceedings of the XIth International
Scientific and Technical Conference (CSIT 2016), Lviv Polytechnic Publishing House,
pp. 108-110.
This paper may be cited as:
Trach O., Fedushko S., 2017. Development and exploitation software
complex of virtual community life cycle organization. International Journal
of Computer Science and Business Informatics, Vol. 17, No. 1, pp. 1-11.
14. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 1. JANUARY-JUNE 2017 12
Systematic Review of Persuasive
Health Technology Design and
Evaluation Models
Kasali Funmilayo
Babcock University, Ilisan, Ogun State
Nigeria
Kuyoro Afolashade
Babcock University, Ilisan, Ogun State
Nigeria
Awodele Oludele
Babcock University, Ilisan, Ogun State
Nigeria
ABSTRACT
Persuasive technologies for promoting physical fitness, good nutrition and other healthy
behaviors have been growing in popularity. Despite their appeal, the design and evaluation
of these technologies remains a challenge and usually require a fully functional prototype
and long term deployment just like any other information system. Hence, the focus of this
paper is to review some persuasive and behavioral change models used in designing and
evaluating persuasive technologies and identify their inherent limitations. To achieve the
stated objectives, the systematic review method of research was done to understand the
various persuasive system models and relevant information was extracted using the
Inductive approach. Currently, the Persuasive System Design (PSD) framework is
considered to be one of the commonly and most comprehensive framework for designing
and evaluation of persuasive systems. However, some of its design features overlap and are
difficult to analyze. This review research has brought to light the need to extend the PSD
theoretical model with a measurable and integrated usability model which can adequately
measure the efficiency and effectiveness of persuasive design outputs at the early phase of
persuasive system development in future studies.
Keywords
Behavioral change models, Persuasive health applications, Persuasive systems, PSD model.
1. INTRODUCTION
More recently, social technology continues to penetrate into every areas of
human lives at break-neck speed, most present medium of mass media have
integrated some sort of social interaction and awareness into their messages.
Social networks such as Facebook, Twitter, Netflix, Tumblr, Instagram,
online dating sites, educational sites, amongst others, continue to draw and
15. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 1. JANUARY-JUNE 2017 13
lure millions of people into using social technology for multiple purposes.
The influence of technology on humanity is affecting all sectors of human
life both public and private, on-line and off-line [23] and one way or the
other its effect on people‟s behavior cannot be over emphasized. The word
influence comes under the umbrella of the word persuasion which is an
effort to influence/motivate/inspire people‟s beliefs, thoughts, actions,
feelings, motivations, intentions or behaviors [44] and in a scenario where
software systems are designed to achieve such purpose, it is termed
persuasive technology. Fogg, a leading and foremost researcher in
persuasive technology, was the first scientist to invent the word Captology
in 1996 which is “concerned with the domain of research, design, analysis
and application of Persuasive Technology” [15]. Captology describes the
area where technology and persuasion intersect as depicted in Fig. 1.
Technological Medium Persuasion
Fig. 1: Captology in view
Persuasion technologies are normally used in most areas of human lives
ranging from education, politics, religion, marketing, sustainability, health,
and training in any form amongst other applications. The main aim of
persuasive applications is to change human attitude or behavior through the
power of software designs [37].
There currently exist numerous persuasive technologies in existence whose
purpose is to encourage or facilitate attitudinal change towards a healthier
lifestyle [2] but evaluating these technologies remains a challenge and they
normally require a system that has been fully designed and deployed for use
over some period of time [25]. At the recently concluded 11th
International
Conference on Persuasive technology held in Austria, [1] also affirmed that
most persuasive applications need to be tested before deployment but the
problem is that there is really generally no agreeable way among such
systems developers as designing these systems require lots of planning, time
and other resources and what available models do is just to guide such
applications developers during the design process of persuasive systems.
Persuasive technology is basically about automating behavior change, and
in other to successfully code knowledge that results in behavioral change,
there is a need for practical understanding of human psychology, precisely,
16. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 1. JANUARY-JUNE 2017 14
intuition about the causal factors of behavior change as also corroborated by
[16] if not, researchers of persuasive technologies will just be replicating
concepts that actually work without a thorough understanding of why those
concepts work.
Hence, the focus of this work which is intended to serve as an overture
towards further research, is to review the Persuasive System Design (PSD)
model which is currently a highly rated approach to the design and
evaluation of persuasive technologies [35] and other behavioral change
models that are aimed at changing peoples‟ poor attitude to exercise and
good diet that can help towards the prevention of diseases in other to come
up with a more useful model that can aid researchers and developers
towards the design of more usable, reliable, maintainable and more efficient
persuasive systems that can readily be evaluated even before such systems
are deployed. The remaining part of this work is arranged as follows:
Section 2 gives the literature review presenting some common health
behavioural change models and popular persuasive design models explains
in detail the applicability of some models toward the design of persuasive
systems, Section 3 explains the Methodology employed for this research,
while Section 4 gives the conclusion and recommendations for further
studies.
2. BACKGROUND STUDY
The current upsurge in untimely death and human ravishing sickness as a
result of different diseases that can be prevented warrant urgent attention
and behavioural change towards a healthier lifestyle by using a more
technological and pragmatic approach towards preventing such diseases.
There have been various Information systems that have been designed in an
attempt at using technology to control/prevent/monitor or treat diseases such
as expert systems, decision support systems and Persuasive technology
systems that are aimed at changing people‟s attitude towards a healthier
lifestyle [24] [47] [29].
The rise of social web and the use of mobile applications to create, share
and access information in innovative ways has accelerated the opportunities
for developing new kinds of Interactive Information Systems for influencing
users.
In recent years, researchers‟ interest have continued to sway towards Human
Computer Interaction (HCI) in designing persuasive systems that are aimed
at improving man‟s quality of life [38]. Despite the plethora of research into
Interactive Information Systems aimed at behaviour change [36], health-
related behaviour change has attracted lots of attention e.g., physical activity
[27] [10], diet [40], cardiac rehabilitation [30], and even the management of
chronic illnesses (e.g. diabetes [31] [46], healthy sleep behaviors [14],
kidney disease [45], asthma [26] amongst others.
17. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 1. JANUARY-JUNE 2017 15
The benefits of using computers to promote quality of life by persuading
users as against traditional media is its interactivity and over human-human
persuasion includes six distinctive reasons, as highlighted by [15] ranging
from the fact that persuasive applications tend to be more persistent than
human beings, they offer greater anonymity, they can manage large volumes
of data especially in this big data era, they can use many tactics to influence,
scale easily and lastly they are more ubiquitous.
Developing persuasive systems usually put a heavy strain on developers, so
design issues should deserve more attention as they have real implications
because if the systems are not properly designed then the persuasion
potential will not really be achieved. More so, the most commonly studied
and applied model to building Persuasive technologies is the PSD model but
despite its use as a model to guide developers in designing Persuasive
systems, its use as an evaluation tool for persuasive systems has been
subject to criticisms amongst persuasive systems researchers. There is also
a need for persuasive systems developers and researchers to understand the
sociological, psychological and philosophical context behind various
models that can be employed towards designing effective persuasive
systems if not they will just be imitating other information systems and
ascribing them as being persuasive in nature although some information
systems have persuasive features but they cannot be said to be persuasive
applications which have distinctive persuasive characteristics and features as
also speculated in the PSD model.
2.1 Overview of Existing Health Behavioural change and Persuasive
Design and Evaluation Models
[5] proposed the Health Belief Model (HBM) which was developed to
figure out why people used or did not use preventive health services by
public health departments. HBM theorizes that people‟s beliefs about
whether or not they are at risk of a health issue, and their perceptions of the
benefits of taking action to avoid it, influence their readiness to take action.
[41] came up with the Trans-theoretical model (TTM) based on the concept
of “stage of change” and it suggests that people are at different stages of
readiness to adopt healthful behaviors. The notion of readiness to change, or
stage of change, has been examined in health behavior research and found
useful in explaining and predicting changes for a variety of behaviors
including smoking, physical activity, and eating habits. The TTM has also
been applied in many settings.
[4] introduced the Social Cognitive Theory (SCT) which is the cognitive
formulation of social learning theory explains human behavior in terms of a
three-way, dynamic, reciprocal model in which personal factors,
environmental influences, and behavior continually interact. SCT
synthesizes concepts and processes from cognitive, behavioristic, and
18. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 1. JANUARY-JUNE 2017 16
emotional models of behavior change. A basic concept of SCT is that people
learn not only through their own experiences, but also by observing the
actions of others and the results of those actions. There also exist the Social
Ecological Model (SEM) which is based on the principles of social
ecological models and these principles are also consistent with social
cognitive theory concepts which suggest that creating an environment
conducive to change is important to making it easier to adopt healthy
behaviors as shown in Fig. 2. [17].
Fig. 2: Social Ecological Model [13]
Fishbein and Ajzen in 1980 proposed the Theory of Reasoned Action (TRA)
which is based on the fact that that actual behavior could be determined by
considering intention with beliefs associated with the given behavior as
cited in [11]. They also claimed that behavioural intention could be
determined by considering both attitude towards the actual behavior and the
subjective norm associated with the behavior in question. A limitation of
TRA is that some behaviors are not under a person‟s control and in other to
address this limitation, Ajzen in 1985 went further by introducing the
concept of perceived behavioural control just to improve on the predictive
capabilities of the TRA and named this enhanced model Theory of Planned
Behaviour (TPB).
Looking at health behaviour change from Elaboration Likelihood Theorists,
[39] promulgated the Elaboration Likelihood Model (ELM). The model
described how attitudes are formed and strengthened by persuasive
arguments. The model proposed that people convey either high or low
elaboration which is their level of effort when they are faced with a
persuasive message. The level of elaboration will now decide which
processing route the message will take either central or peripheral. [52] gave
a very detailed and simple explanation on both routes in his online article on
how to apply the ELM to design. The ELM is very similar to the Heuristic-
Systematic model (HSM) proposed by [8] which just tries to describe how
people receive and process persuasive messages.
[43], a German professor of psychology proposed the Health Action Process
Approach Model (HAPA) which is an open framework of various
19. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 1. JANUARY-JUNE 2017 17
motivational and volitional concepts that are presumed to explain and
predict individual changes in unhealthy behaviors towards a better one.
HAPA suggests that the adoption, initiation, and maintenance of health
behaviors should be conceived of as a structured process including a
motivation phase and a volition phase. Motivation phase describes the
intention development while the Volition refers to planning, and action. The
model accentuate the particular role of perceived self-efficacy at different
stages of health behavior change as shown in Fig. 3.
Fig. 3: HAPA Model [43]
Fogg Behaviour Model for persuasive Design (FBM) was proposed in 2009
to understand human behavior, he opined that behavior is a product of three
factors which are motivation, ability, and triggers, each of which with its
own modules as shown in Fig. 4. The FBM asserts that for a person to
perform a target behavior, he or she must be sufficiently motivated, have the
ability to perform the behavior, and be triggered to perform the behavior
with each of these behaviors happening simultaneously if not, the behaviour
is highly unlikely to happen. Fogg‟s behavior model provides an
understanding of relationships between motivations, abilities and triggers.
However, it does not explicitly discuss persuasive features implementation
in designing a persuasive system.
20. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 1. JANUARY-JUNE 2017 18
Fig. 4: FBM with the 3 factors and their subcomponents [16]
Dan Lockton addressed behaviour change from a perspective dubbed
“Design with Intent” (DwI) which he defined as a “design intended to
influence or result in certain user behaviour” [28]. The DwI Method is
intended to be generally applicable to influencing user behaviour. The latest
iteration of the model is comprised of two modes: „Inspiration‟ and
„Prescription.‟ In the „Inspiration‟ mode, the designer takes inspiration from
a set of headline design patterns that are applicable to a wide range of target
behaviors, grouped into six different „lenses,‟ representing particular
disciplinary perspectives on using design to influence behaviour. In the
„Prescription‟ mode, the designer formulates a range of target behaviors or
intended outcomes describing interactions and, as a consequence, a subset of
the most applicable design patterns from each „lens‟ is presented for each
target behavior.
Health theories help to understand why people do/do not practice health
promoting behaviors, identify what information is needed to design an
effective intervention strategy and provide insight into how to design a
successful persuasive health program. They help to explain behavior and
also suggest how to develop more effective ways to influence and change
behavior although the success of the adoption of persuasive technologies
will largely depend on the grounded understandings of these theories as
noted by [9] but the reality is that there exist numerous theories aimed at
behavior change but they are majorly used as a checklist or rules of thumb
for software systems rather than a systematic design methodology to the
design of user interface.
[3] also presented this same view in their conference paper produced for the
Global Summit on telemedicine and eHealth. A lot of these behavioural
change models are psychological in nature and offer little information on
how to design and implement persuasive systems as also confirmed by [32]
21. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 1. JANUARY-JUNE 2017 19
which is why researchers interested in persuasive systems tend to focus
more on Fogg‟s persuasive design principles and the PSD model although
there exist other persuasive design models but they are yet to be as popular
and widely accepted as Fogg and PSD model.
Fogg‟s model is a functional triad and the design principles introduced in it
signify the first and highly used generalization of persuasive technology.
The model was developed by [15], a leading researcher and an authority in
the field of persuasive technology. In his eight step model, developers are
guided towards creating a persuasive technology. However, Fogg asserts
that “the eight steps are not intended to be a rigid formula; instead, the
steps serve as milestones to make the design process more effective”. These
steps are highlighted and well explained in [48].
Fogg also explained the three roles computing technology can play in the
functional triad which are to act as a tool, media or social actor in the act of
persuasion from users‟ perspectives. Fogg also identified persuasive
technology tools which are interactive products that are designed to change
attitudes or behaviors or both by making desired outcomes easy to achieve.
Such tools include Reduction, Tailoring, Tunneling, Suggestion, Self-
monitoring, Surveillance and Conditioning.
The model just helps to understand the concept of persuasive technologies
better but it is too restrictive to be applied directly to persuasive system
development and/or evaluation. The major weakness that is inherent in this
model as claimed by [35] is that it does not really indicate how the proposed
design principles can be modified into software requirements and moreover
executed as software features; but to be able to design and evaluate the
persuasiveness of a software system, it is very important to understand both
the information content and the software functionalities which is what gave
the PSD model more popularity in its usage as against the Fogg‟s model in
designing persuasive systems.
The PSD model is a conceptual framework for developing persuasive
systems and it was postulated by [35]. It has gained so much popularity
amongst persuasive systems designers and researchers. The model has been
successfully applied in so many domain like in health, education, amongst
others. It explains the means of designing and evaluating persuasive systems
and also explain what kind of content and software functionality may be
found in the final product as depicted in Fig. 5 below. The model lay
emphasis on seven fundamental assumptions or hypothesis behind
persuasive systems where two of these postulates relate to how users are
seen in general, two of the postulates relate to persuasion strategies, and
three of the postulates address actual system features. The model highlights
ways to analyze the persuasion context which include the intent (this could
be exogenous, endogenous or autogenous), the event and the strategy. It also
22. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 1. JANUARY-JUNE 2017 20
lists twenty eight design principles for persuasive system content and
functionality.
Fig 5: Phases in Persuasive System Development [35]
This model is an improved version of Fogg‟s model and most of the design
principles in this model was adopted and modified from Fogg‟s model. The
PSD model has been widely acknowledged as being suitable for designing
persuasive systems but it cannot promise the success on any behavioural
change support system [34]. The goal of the PSD model is not really to
implement all the design features suggested in it but to choose the right
features based on the system‟s context of use and domain as claimed by its
proponents. Its limitation is that some of these features overlap with one
another and usually difficult to analyze. Hence, new persuasion techniques
to evaluate and fortify persuasive components need to be ascertained. Other
models include the 3D-RAB model proposed by [50] and they showed how
it can be applied in classifying users based on changes in levels of cognitive
dissonance. The model tends to present a method that can be used to analyze
the user context on the PSD model. In the model, it was postulated that eight
states of cognitive dissonance among users should be considered. This
approach was evaluated using an already existing BCSS and designers were
encouraged to apply the 3D-RAB model in order to design solutions for
targeted users.
The model is just an approach to analyze targeted users and it cannot be
used to design persuasive technologies as also claimed by its proponents.
[33] aimed to look at analyzing persuasive designs from a data analytics
point of view by trying to integrate analytical models into persuasive
designs for improved results and the researcher also tried to describe how to
represent human behaviour as a mathematical model so as to overcome the
limitations of a systematic approach to persuasive design evaluation as seen
in other models, theories and frameworks for persuasive design. Although
this is very novel approach to systematic persuasive applications design, the
idea is still very abstract in nature as the actual mathematical model based
23. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 1. JANUARY-JUNE 2017 21
on their identified factors was not shown as it is still a research work in
progress although this model comes closest at trying to analyze persuasive
applications both quantitatively and qualitatively.
2.2 Applicability of Models in the design of Persuasive Systems
[49] described an interface during an attempt to develop a persuasive system
that is aimed at motivating physical activity among university students in
their day to day activities to curb the modern issue of obesity. The trans-
theoretical model of behaviour change and Fishbein and Ajzen‟s theory of
reasoned action were used as the principle that governed the interface
design. Several prototypes were developed for this study and each prototype
was evaluated both for design and functionality with a total number of 41
users. The system could not be implemented as the work was just a
conceptual description. As a part of the PEGASO European project, [6]
created a persuasive system based on mobile technology in motivating
teenagers to easily adopt a healthy lifestyle. They used the Virtual
Individual model (VIM) and some of Fogg‟s behavioural model idea like
Tailoring, social network integration and the trigger concept. They intended
doing pilot studies in 3 different countries to validate the effectiveness of
their approach after the successful completion of their project.
[42] designed a fictional system called Fit4Life; a system that encourages
individual to address the larger goal of reducing obesity in society by
promoting individual healthy behaviors by using the PSD model to outline
the persuasion context, its technology, its use of persuasion messages and an
experimental design to test the system‟s efficacy. [22] designed a persuasive
mobile application to support controlled alcohol usage by using the user
centered design approach based on ISO 9241-210 and Google Inc. user
experience design experience on an android platform. The persuasive
features in the system was evaluated using 12 of the design principles in the
PSD model as against the 28 defined principles.
[19] did a field trial of the Polar FT60; a fitness watch with Global
Positioning System (GPS) and heart rate monitor to describe and understand
findings from a three month long qualitative field trial to explore how a
training program in a new prototype heart rate monitor promotes proper
exercising. The PSD model was used to identify distinct strategies and
techniques that were embedded into the system and 12 users‟ responses to
these strategies were also explored. They only demonstrated how persuasive
techniques can be identified, embedded into system functionality and also
how persuasive techniques function together in real world settings. They
were able to find out that leveraging goal settings, tracking performance,
adopting social roles along with a high overall perceived credibility
influences user behaviour. The studied persuasive principles were limited to
the design of the particular product that was investigated and the researchers
24. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 1. JANUARY-JUNE 2017 22
did not participate in the design process. [18] investigated how the PSD
model can be utilized so as to support the development of personal health
and well-being systems. In other to achieve this, they integrated the PSD
model into the development of 2 health related Behaviour Change Support
System (BCSS). In the first study, their aim was to use the PSD model to
identify new persuasive functionality within a fall risk assessment and fall
preventive system. In the second study, their aim was to use the PSD model
to identify new persuasive functionality and new service concepts within an
existing smart phone app for mental well-being. Their study showed that the
PSD model can be used in the development of BCSSs to describe the overall
process, analyze the persuasion context and design qualities. They also used
the PSD model to evaluate both systems by providing heuristics of expert
evaluation and systematic ways to analyze user experience data. Both
human centered and iterative process were used in designing both systems.
As a result of their research, they were able to ascertain that although the
PSD model purposes how persuasive systems should be developed in a very
holistic manner, its limitation is that it does not explicitly give advice on
how to include a framework or theory into the development of the content
delivered via the system and users it does not also give advice on how to
include users in the development process which is very important according
to [21].
[51] designed a persuasive fitness app that can enhance physical activity
behaviour of individuals by conceptualizing the persuasive technology
design principles embedded in social cognitive theory which suggests that
individual behaviour is determined by triadic, dynamic and reciprocal
interaction among cognitive, personal factors and environmental influences.
[7] focused on building a persuasive system for behaviour modification
around emotional eating by undertaking 3 user studies. The first study was
done to gather emotional eating patterns using a custom built app called
EmoTree so as to understand users‟ emotions associated with eating. The
second study was done to learn about a suitable intervention technique for
emotional eating based on self-reported ratings of emotions to gather early
feedback before actual system implementation and they found out that there
exist lots of individual differences in emotional eating behaviour. Their last
objective was to build a wearable, sensor system for detecting emotions
using a machine learning approach to predict users‟ emotions. In this work,
no particular design method was followed and no formal theory of
behaviour change was considered.
As noted from various attempts at designing persuasive systems, developing
persuasive systems puts a very rigorous burden on software developers as
there are lots of theories, design approaches and principles to be considered
at the early design stage hence effective evaluation at the early design phase
is an important requirement that needs to be strictly adhered to so as to save
25. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 1. JANUARY-JUNE 2017 23
cost and reduce designers time as evaluating a system after the overall
product has been designed can be very tasking, time consuming and
expensive. Most of the existing health behavioral change theories help to
explain, understand behaviors and also suggest how to develop more
efficient ways to influence and change behavior but most of them can only
act as guide towards designing persuasive systems as to our knowledge,
there presently exist no tool or framework yet for evaluating persuasive
technologies except for the PSD model whose limitation is that some of the
28 design features coincide with one another and are usually difficult to
analyze, moreover most of these features are also just to guide designers in
making persuasive systems more influential hence, new persuasive
techniques to evaluate and fortify persuasive components need to be
ascertained. In addition, most of the recent work in persuasive design using
the PSD model are still at the conceptual level.
3. METHODOLOGY
To achieve the stated objectives, the systematic review method of research
was done to understand the various behavioral change and Persuasive
System models and relevant information was extracted using the Inductive
approach towards research in which past theories for designing and
evaluating persuasive designs was thoroughly analyzed. Patterns,
resemblances and regularities in past theoretical premises were observed to
identify their limitations and a new theory/model was proposed to be
generated in subsequent studies without discarding ideas gotten from past
models. This form of research is mostly based on grounded theories
according to [12]. It starts with observations and theories which are
proposed towards the end of the research process as a result of the
observations which is depicted in Fig. 6 below.
Fig. 6: Inductive approach
Most of the papers reviewed were gotten from Google, Google scholar and
Association for Computing Machinery (ACM) databases using keywords
such as Persuasive technology, behavioral change models, and persuasive
design models amongst others.
Discussion and
Recommendations
Identify
patterns and
limitations
Study past
persuasive
design models
26. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 1. JANUARY-JUNE 2017 24
4. CONCLUSIONS
Persuasive technologies for promoting physical fitness, good nutrition and
other healthy behaviors have been growing in popularity. Despite their
appeal, the design and evaluation of these technologies remains a challenge
and usually require a fully functional prototype and long term deployment
just like any other information system. Most health behavioral change
models cannot adequately measure the effectiveness of persuasive systems
as they can only be used as guides during the design process by most
persuasive systems developers and researchers. The PSD model is currently
the most widely used model in designing and evaluating persuasive
technologies but its limitation still remains apparent especially in evaluation
purposes.
A new framework will be proposed and evaluated in subsequent studies to
extend the PSD model by integrating the requirement engineering approach,
new Human Computer Interaction (HCI)/User centered principles and
effectiveness evaluation using a the Integrated Measurement Model for
Evaluating Usability Attributes designed by [20]. A prototype health
application will be designed and an attempt will be made to predict the
usability of such systems at the early phase of the design process using the
fuzzy analytical hierarchy process as usability has also been identified as
one of the most important construct used in evaluating the effectiveness of a
system. The Evaluation framework is also being proposed in further studies
to be formalized using Fuzzy logic to deal with imprecise usability attributes
and to also enable a more systematic approach to persuasive technology
evaluation.
5. ACKNOWLEDGMENTS
We wish to thank Prof. Goga, Dr Akinsanya, Dr Eze and 2016/2017
doctoral students of Babcock University, Computer Science Department for
their constructive and objective criticisms towards the successful
completion of this work.
REFERENCES
[1] Abdessettar, S., Gardoni, M. & Abdulrazak, B. (2016). Enhancing Persuasive Design‟s
productivity: towards a Domain-Specific Language for persuasion strategies. Adjunct
Proceedings of the 11th
International Conference on Persuasive Technology, Retrieved
January 16, 2017 from persuasive2016.org>uploads>2016/04
[2] Al Ayubi S. U., Parmanto, B., Branch, R. & Dinq, D. (2014). A Persuasive and Social
mHealth Application for Physical Activity: A Usability and Feasibility Study, JMIR
Publications DOI: 10.2196/mhealth.2902, Vol. 2, No 2, mhealth.jmir.org/2014/2/e25
[3] Anandhi, V. D., Lauries, P. & Alex, K. (2015). Application of Persuasive techniques in
the design of mobile eHealth systems. A conference paper produced for Cambridge
Conservative Initiative, retrieved Nov. 14, 2015 from cam.ac.uk/resource/talks-and-
presentations.
27. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 1. JANUARY-JUNE 2017 25
[4] Bandura, A., (1986). Social Foundations of Thought and Action: A Social Cognitive
Theory. Prentice-Hall. P. 24.
[5] Caon, M. et al., (2014). A Persuasive System for Obesity Prevention in Teenagers: A
concept. Second International Workshop on Behaviour Change Support System,
Retrieved Nov. 6, 2016 from ceur-ws.org>Vol-153>Paper_2
[6] Becker, M. H. & Maiman, L. A., (1975). Socio-behavioral determinants of compliance
with health and medical care recommendations. Medical Care, 134(1), 10-24. Figure 1,
p. 12
[7] Caroll, E. A., Czerwinski, M., Roseway A. & Schraefel M. C. (2013). Food and Mood:
Just-in-Time Support for Emotional Eating, Retrieved Nov. 17, 2016 from
eprints.soton.ac.uk>FoodMood
[8] Chaiken, S. (1980). Heuristic Versus Systematic Information Processing and the use of
Source Versus Message cues in Persuasion. Journal of Personality and Social
Psychology, Vol. 39, No. 5, Pg. 752-766. Neuron4.psych.ubc.ca>Chaiken1980
[9] Chatterjee, S., & Price, A. (2009). Healthy Living with Persuasive Technologies:
Framework, Issues and Challenges. Journal of the American Medical Informatics
Association, Vol. 16, Issue 2, Pg. 171-178. doi: 10.1197/jamia.M2859, PMCID:
PMC2649327. www.ncbi.nlm.nih.gov/pmc/articles/PMC2649327
[10]Consolvo, S., McDonald, D. W., Toscos, T., Chen, M.Y., Froehlich, J., Harrison, B.,
Klasnja, P., LaMarca, A., LeGrand, L., Libby, R., Smith, I., & Landay, J. A. (2008).
Activity Sensing in the Wild: A Field Trial of UbiFit Garden. Proc. ACM Press, pp.
1797-1806.
[11]Davis, F., Bagozzi, R. P., & Warshaw, P. R. (1989). User acceptance of computer
technology: a comparison of two theoretical models. Management Science, 35 (8), pp.
982-1003
[12]Dudovskiy, J. (2016). Research Methodology. Retrieved February 5, 2017 from
research-methodology.netresearch-methodology/research
[13]E-Source, Behavioural and Social Sciences Research (2016). Social and Behavioural
Theories, Retrieved October 24, 2016 from www.eSourceresearch.org/eSource
Book/Social and Behavioural Theories
[14]Eun, K. C., Sunny, C., Nathaniel, F. W. & Julie, A. K. (2011). Opportunities for
Computing Technologies to Support Healthy Sleep Behaviors, Vancouver, BC,
Canada. ACM 978-1-4503-0267-8/11/05.
[15]Fogg, B. J., (2003). Persuasive Technology: Using Computers to Change What We
Think and Do, San Francisco: Morgan Kaufman Publisher.
[16]Fogg, B. J. (2009). A Behaviour Model for Persuasive Design, ACM, ISBN: 978-1-
60558-376-1/09/04, www.bjfogg.com/fbm_files/page4_1.pdf
[17]Glanz, K., Rimer, B. K. & Viswanath, K. (2008). Health Behavior and Health
Education: Theory, Research, and Practice (4th Ed.). San Francisco: Jossey-Bass
[18]Harjumaa, M. & Muuraiskangas, S. (2013). Building Persuasiveness into Information
Systems. Electronic Journal of Information Systems Evaluation, Vol. 16, Issue 4, Pg.
278-290, Academic Publishing International Ltd. www.ejise.com
[19]Harjumaa, M., Segerstahl, K. & Oinas-Kukkonen, H. (2009). Understanding
Persuasive Software Functionality in Practice: A field trial of Polar FT60, ACM
Proceedings of the Fourth International Conference on Persuasive Technology, ISBN:
978-1-60558-376-1/09/04, Claremont, California, USA.
[20]Hasan, L. A & Al-Sarayreh, K. T. (2015). An Integrated Measurement Model for
Evaluating Usability Attributes. IPAC conference paper, ACM. ISBN 978 - 1- 4503-
3458, DOI: 10.1145/2816839.2816861
[21]ISO 9421-210 (2010). Ergonomics of human-system interaction -- Part 210: Human-
centered design for interactive systems. Retrieved November 14, 2016 from
www.iso.org>iso>catalogue_detail
28. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 1. JANUARY-JUNE 2017 26
[22]Jarvinen, T. (2014). Motivator: A Persuasive Mobile app to support Controlled Alcohol
usage: Behavioural change with persuasive design. Retrieved December 5, 2016 from
www. soberit.hut.fi>di-Toni-Jarvinen
[23]Jay, D. (2011). The influence of technology on Humanity, Retrieved October 14, 2016
from relationship-economy.com/2011/01/technology-influence-over-humans
[24]Jeffrey, H., Pearl, L., Lillian, O., & Lindsay, T. (2006). A Responsive and Persuasive
Audio Device to Stimulate Exercise and Fitness in Children Montréal, Québec,
Canada, ACM 1-59593-298-4/06/0004
[25]Julie, A. K., Eun, K. C., Brennen, B., Robert, M., Amanda, F., Chelsey, G & Jen, M.
(2010). Heuristic Evaluation of Persuasive Health Technologies, ACM 978-1-4503-
0030-8/10/11, Arlington, Virginia, USA.
[26]Lee, H. R., Panont, W. R., Plattenburg, B., de la Croix, J., Patharachalam, D., Abowd,
G. A. (2010). Empowering Asthmatic Children‟s Self-Management with a Virtual Pet.
Proc CHI 2010, ACM Press, Pg. 3583-3588.
[27]Lin, J. J., Mamykina, L., Lindtner, S., Delajoux, G. & Strub, H. B. (2006).
Fish„n‟Steps: Encouraging Physical Activity with an Interactive Computer Game.
Proc. Ubicomp, LNCS, pp. 261-278
[28]Lockton, D. (2013). Design with intent toolkit wiki. Retrieved November 10, 2016
from http://www.danlockton.com/dwi/Main_Page
[29]Luca, C. (2015). Mobile Persuasion for Health and Safety Promotion, ACM 978-1-
4503-3653-6/15/08, Mobile HCI, Copenhagen, Denmark,
http://dx.doi.org/10.1145/2786567.2786570
[30]Maitland, J. & Chalmers, M. (2010) Self-monitoring, self-awareness, and self-
determination in cardiac rehabilitation. Proc. ACM Press, pp. 1213-1222.
[31]Mamykina, L., Mynatt, E., D., & Kaufman, D., R. (2006). Investigating Health
Management Practices of Individuals with Diabetes. Proc. CHI 2006, ACM Press, pp.
927-936
[32] Mohr, D. C., Schueller, M. S., & Rashidi, P. (2014). The Behavioural Intervention
Technology Model: An Integrated Conceptual and Technological Framework for
eHealth and mHealth Interventions. Journal of Medical Internet Research, Vol. 16,
Issue 6: e146. www.ncbi.nim.nih.gov>articles
[33]Mukhtar, H. (2016). Towards Analytical Modeling for Persuasive Design Choices in
Mobile Apps, International Journal of Advanced Computer Science and Applications,
Vol. 7, No. 11, www.ijacsa.thesai.org
[34]Nor Aziah, D., Noraidah, S. A. & Zurina, M. (2015). Initial Validation of Persuasive
Model for Web-Based Learning Journal of Theoretical and Applied Information
Technology, Vol.81. No.2, ISSN: 1992-8645, E-ISSN: 1817-3195, www.jatit.org
[35]Oinas-Kukkonen, H. & Harjumaa, M. (2009) Persuasive Systems Design: Key Issues,
Process Model, and System Features. Communications of the Association for
Information Systems, Vol. 24, Article 28, pp. 485-500
[36]Oinas-Kukkonen, H. (2010). Behavior Change Support Systems: The Next Frontier for
Web Science. Web Science Conf.
[37]Oinas-Kukkonen, H. (2013). A foundation for the study of behaviour change support
systems, Pers Ubiquit Comput 17:1223–1235 DOI 10.1007/s00779-012-0591-5,
Springer-Verlag London Limited
[38]Oren, Z. & Ayelet, G. (2014), Deconstructing gamification: evaluating the
effectiveness of continuous measurement, virtual rewards, and social comparison for
promoting physical activity, Pers Ubiquit Comput Vol. 18, Pg. 1705–1719 DOI
10.1007/s00779-014-0783-2, Springer-Verlag, London
[39]Petty, R. E. & Cacioppo, J. T. (1986). The Elaboration Likelihood Model of
Persuasion. Advances in Experimental Social Psychology, Vol. 19. www.psy.ohio-
state.edu/petty/documents/1986ADVANCESsPettyCacioppo.pdf
29. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 1. JANUARY-JUNE 2017 27
[40]Pollak, J. P., Gay, G., Byrne, S., Wagner, E., Retelny, D. & Humphreys, L. (2010). It‟s
Time to Eat! Using Mobile Games to Promote Healthy Eating. Pervasive Computing,
IEEE CS, pp. 21-27
[41]Prochaska, J. O. & Di Clemente, C. C., (1982). Transtheoretical therapy: Toward a
more integrative model of change. Psychotherapy: Theory, Research and Practice,
19(3), 276-288. Figure 2, p. 283.
[42]Purpura, S., Schwanda, V., Williams, K., Stubler, W. & Sengers P. (2011). Fit4Life:
The Design of a Persuasive Technology Promoting Healthy Behavior and Ideal
Weight. ACM 978-1-4503-0267-8/11/05, CHI 2011, Vancouver, BC, Canada
[43]Schwarzer, R. (2008). Modeling Health Behavior Change: How to Predict and Modify
the Adoption and Maintenance of Health Behaviors. International Association of
Applied Psychology, Blackwell Publishing, 57 (1), 1–29 doi: 10.1111/j.1464-
0597.2007.00325.x
[44]Seiter, Robert, H. G. & John, S. (2010). Persuasion, Social influence and compliance
gaining 4th ed. Boston; Allyn & Bacon, p. 33. ISBN: 0-205-6981-2
[45]Siek, K. A., Connelly, K. H., Rogers, Y., Rohwer, P., Lambert, D., & Welch, J., L.
(2006). When do We Eat? An Evaluation of Food Items Input into an Electronic Food
Monitoring Application. Proc. Pervasive Health, IEEE
[46]Smith, B. K., Frost, J., Albayrak, M., & Sudhakar, R. (2007). Integrating glucometers
and digital photography as experience capture tools to enhance patient understanding
and communication of diabetes self-management practices. PUC, 2007, 11(4), pp. 273-
286.
[47]Stephen, R. S., Jonathan, A. S. & Latika, E. (2015). Make It Usable: Highlighting the
Importance of Improving the Intuitiveness and Usability of a Computer-Based Training
Simulation, ACM 978-1-4673-9743-8/15
[48]Torning, K. (2013). A Review of Four Persuasive Design Models, International Journal
of Conceptual Structures and Smart Applications, Vol, 1, Issue 2, Pg. 17-27
[49]Vikash, S. & Anijo, P. M. (2007). WalkMSU: An intervention to motivate Physical
activity in university students. ACM 978-1-59593-642-4-4/07/004, CHI 2007, San
Jose, California, USA
[50]Wiafe, I., Nakata, K., & Gulliver, S. (2014). Categorizing users in behavior change
support systems based on cognitive dissonance Pers Ubiquit Comput, 18:1677–1687
Springer-Verlag London, DOI 10.1007/s00779-014-0782-3
[51]Yoganathan, D. & Kajanan, S. (2013). Persuasive Technology for Smartphone Fitness
Apps, Retrieved November 12, 2016 from www.pacis-net.org>PACIS2013-185
[52]Yokko, V. (2014). Persuasion: Applying the Elaboration Likelihood Model to Design.
Retrieved January 27, 2017 from alistapart.com/article/persuasion-applying-the-
elaboration-likelihood-model-to-design
This paper may be cited as:
Kasali, F. A., Kuyoro, A. and Awodele, O. 2017. Systematic Review of
Persuasive Health Technology Design and Evaluation Models. International
Journal of Computer Science and Business Informatics, Vol. 17, No. 1, pp.
1-27.
30. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 1. JANUARY-JUNE 2017 28
Designing Condition-based
Maintenance Management Systems
for High-Speed Fleet
Gopalakrishna Palem
Cenacle Research, 520012 IN
ABSTRACT
Advancement in the big-data technologies in combination with machine-to-machine
(M2M) interconnectivity and predictive analytics is creating new possibilities for real-time
analysis of machine components for identifying and avoiding breakdowns in the early
stages ahead of time. Designing such a condition-based maintenance system for high-speed
fleet requires special attention to the design methodologies used in collecting the operating
requirements from the users and translating them into big-data parallel architectures that are
capable of exhibiting fault-tolerant behavior and load-balancing possibilities to sustain the
real-time data processing demands. This paper discusses the M2M approach for the big-
data condition-based maintenance system and the requirement specification steps involved
in building such a system, along with the cost-savings benefited from the system.
Keywords
Condition-based maintenance, Fleet-management, M2M Telematics, Predictive Analytics
1. INTRODUCTION
Approximately 30% of the life-cycle costs of a high-speed vehicle are spent
on the maintenance of the vehicle, the largest spend besides energy [1]. The
overall life-cycle cost distribution for a high-speed fleet is as shown below.
31. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 1. JANUARY-JUNE 2017 29
Figure 1. Life-cycle costs of high-speed fleet
Pain-points that customers usually complain about such life-cycle costs are:
Maintenance is the highest cost factor in the operations of high
speed vehicles, besides energy and depreciation.
Over a period of time, maintenance costs exceed the depreciation.
Approximately 40% of the maintenance goes for the material / spare
parts costs, while the remaining 60% amounts to personnel costs.
For an operational fleet, the depreciation and energy costs stay
constant during the fleet’s life-cycle, leaving the maintenance cost as
the only major cost position available for optimization [1][2].
Thus, reducing the maintenance costs highly improves the profit margins for
operators. The different maintenance strategies followed by manufacturers
and operators in this regard are as follows:
Corrective Maintenance: This is a Run-till-Failure methodology without
any specific plan of maintenance in place. Vehicle is considered to be
functional and fit until it breaks-down.
o Cons:
Unexpected and uncontrolled production downtimes.
Risk of secondary failures and collateral damage.
Uncontrolled costs of spare parts and overtime labor.
o Pros:
Zero overhead of planning or condition monitoring costs.
Machines are not over-maintained.
Preventive Maintenance: A periodic maintenance strategy popular with
the current manufacturers and vehicle service operators. Based on the
asset design parameters, a potential breakdown period is pre-calculated
and a schedule is pre-determined for preventive maintenance. Vehicle is
subjected to regular maintenance periodically on those intervals,
32. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 1. JANUARY-JUNE 2017 30
irrespective of the usage pattern or the condition of the asset, assuming
that the vehicle is going to break-down otherwise.
o Cons:
A time-driven procedure. Assets are subjected to repair
even in the absence of any faults.
Unscheduled breakdowns can still happen
o Pros:
Maintenance cost estimates are known beforehand.
Inventory control and spare-parts planning is possible.
Fewer catastrophic failures and lesser collateral damage.
Predictive Maintenance (PdM): This is an emerging strategy that applies
predictive analytics to the real-time data gathered from the vehicles with
the aim of detecting any deviations in the functional and behavioral
parameters that can lead to vehicle breakdowns. Such anomaly detection
procedures help identify the breakdowns as soon as their potential cause
arises in real-time long before the break-down happens.
o Cons:
Additional investment needed for the monitoring system
Skilled labor specially trained to effectively use the
system may be required.
o Pros:
Parts are ordered on the need basis and maintenance is
performed during convenient schedules.
Unexpected breakdowns are eliminated.
Reduced breakdowns result in maximum asset utilization.
Predictive maintenance, is also often commonly referred to as the
Condition-based Maintenance (CBM), as it avoids the unnecessary
inspection and repair costs by recommending a maintenance schedule that is
based on the prevailing conditions of the machine in the real-world
operating conditions [3].
33. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 1. JANUARY-JUNE 2017 31
Figure 2. Predictive Maintenance reduces costs by detecting failures in early stages
To understand this, let us consider a typical periodic maintenance scenario
for a vehicle. In a normal periodic maintenance mode, the vehicle owners
are expected to change the engine-oil frequently at regular periods, such as
after every 4 or 5 thousand Kilometers traveled. In such cases, the real
condition of the vehicle or the performance capabilities of the engine-oil are
not taken into consideration. Maintenance is carried out purely because it is
as per the schedule. Had the owner had a way to realize the underlying
vehicle condition (the remaining useful life, RUL), or the engine oil
lubrication contamination levels at that instance, he or she could potentially
either postpone the oil change, to a later point where the change is really
needed, or even pre-pone it as per the prevailing conditions. CBM provides
such capability to gain insight into the actual operating conditions of the
vehicle and use them to accurately predict the maintenance requirements.
Our earlier paper [3] presented an in-depth review on the inner workings of
CBM systems and how in conjunction with sensor arrays and telematics
they facilitate predictive maintenance.
Increased component availability, better worker safety and improved asset
usage etc. are some of the compelling reasons why more and more operators
and manufacturers are actively embracing CBM based fleet management
solutions.
Benefits for workers:
– Work-life balance with predictable schedules
– Turn-key solutions with zero paper work
– Increased on-road safety
– Navigation helpers and landmark guides
Benefits for Management:
– Reduced maintenance costs with Predictive Maintenance
34. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 1. JANUARY-JUNE 2017 32
– Increased asset usage with zero unplanned downtime
– Operational costs are reduced and idle times are eliminated
with smart scheduling
– Improved customer loyalty with always on-time deliveries
– Theft and misuse prevention with real-time asset tracking
In the following sections, we present the methodology involved in designing
such a condition-based maintenance management system using the
machine-to-machine (M2M) approach, and showcase the architectural
outline for one of our recently built system, along with the open-source
tools and frameworks used in building the system and the cost-savings
reported by the customers using it.
2. M2M APPROACH TO THE CBM
A Condition-based Maintenance Management (CBMM) solution designed
around M2M operates on three major technology directives:
1. Remote Sensor Monitoring & Data Capturing.
2. Real-time Stream Processing of Sensor Data.
3. Predictive Analytics.
Sensors are attached to the remote assets to collect various data about the
assets’ operating behavior and send it in real-time to a centralized
monitoring station. The data arrives as continuous streams at the monitoring
station, and is subjected to analysis using anomaly detection mathematical
models to identify patterns of deviations in the expected functionality. Once
any such anomaly is identified by the algorithms, owners are immediately
notified indicating the potential failure and suggesting the appropriate
corrective action. Handling such anomalies in timely manner prevents
further functional degradation of the vehicle, thus avoiding potential costly
breakdowns down the line. Often times the centralized monitoring station
resides on the same network as that of the sensors (such as control area
network) or it could be in a distant remote location connected through
satellite networks or WAN.
35. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 1. JANUARY-JUNE 2017 33
Figure 3. M2M facilitates real-time failure detection and prediction
During their operations, devices such as On-Train Monitoring Recorder
(OTMR) for trains and Flight Data Recorder for flights record events in
real-time from their connected vehicles, and either store them on-board for
later processing when they reach their destination, or relay the events to the
centralized processing system in real-time enroute using the machine-to-
machine (M2M) telematics procedures and get processed on the fly to detect
any current anomalies and predict future failures [4]. Nature of some of the
data collected and analyzed for this purpose could be as follows:
On-board Diagnostics (OBD) data: Vehicle speed, RPM, fuel etc.
Driving Patterns: Acceleration patterns, braking patterns etc.
GPS data: Locations, routing, length of stay of vehicle etc.
OTMR data: Door close status, Air suspension pressure, Brake
dragging, HVAC failure etc.
In a nutshell, the concept of CBM is centered around: detect failures in their
early stages so that you can prevent them from happening in the later
stages. At the minimal level one can expect the below listed functionality
from a well-designed CBMM system [7][8][9]:
Find the Remaining Useful Life of assets
Estimate the Failure Rate for assets
Design a Predictive Maintenance Schedule
Maintain right levels of Inventory for spare parts
Schedule right skilled and sized workforce
Optimize Inspection routines
Decide right Warranty period at design time
36. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 1. JANUARY-JUNE 2017 34
Evaluate What If alternate scenarios
Compare different designs for reliability evaluation
A major challenge in implementing a CBMM system for high-speed fleet,
however, is: processing the enormous volumes of data streamed-in from
sensors attached to the high-speed vehicle in real-time. This requires:
Parallel architectures capable of handling large volumes of data,
Low payload data-structures that optimize sensor data bandwidth,
Fault-tolerance capabilities that can deal with packet drops and
fragile networks for real-time data streaming,
Adaptable ontologies capable of supporting varied data types and
protocols in parallel,
Proof based security to ensure data privacy and anonymity.
Latest advancements in the Big-data open-source family of technologies
offer viable solutions for the above requirements [5][6]. However, before
one can design such big-data solution for the CBMM, the design process
has to go through the requirement gathering and specification mapping
stages to be able to accurately capture the customer requirements and realize
them in software. The following section elaborates on this.
3. THE CBMM SYSTEM DESIGN PROCESS
The design process starts with requirement gathering, which can be
classified as addressing the three solution enabler stages as indicated below:
Stage 1: Sensor data capturing stage
Stage 2: Real-time stream processing stage
Stage 3: Predictive failure-detection stage
The requirement gathering for stage 1 encompasses collecting information
from the customer on the requirements of data capturing and real-time
monitoring. Some of the questions that help gathering information from the
customers at this stage are:
What data should be collected and which sensors should be used?
E.g. thermal imagery, audio signals, etc.
What are the components and parts that need monitoring? E.g.
Engine Oil, Train brakes, Engine Crank Time, etc.
How frequently the data should be collected? Hourly, daily etc.
How to identify and handle faulty sensors?
37. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 1. JANUARY-JUNE 2017 35
In the requirement gathering for stage 2, the focus is on real-time processing
of the collected data and some of the questions that customers need to
answer in this stage are:
What is the expected data processing latency?
What should happen to the collected data post processing?
How to address missing data points and inaccuracies? For example,
a faulty sensor sending incorrect data.
For the final stage, the emphasis is on the analytical-subsystem. Customer
requirements for this stage are collected through questions such as:
Define the acceptable behavior and define the anomaly.
What are the response actions for each anomaly class?
What is the maximum acceptable time lag after the detection of the
anomaly, before the corresponding corrective action takes place?
How to deal with multiple anomalies detected at the same time?
Once complete, the gathered requirements are then formulated into a system
specification that gives a formal outline of what is the expected from the
CBMM. E.g. for the stage 1 requirements, the specifications outline what
should be the operational level notifications possible in case of network
unreachability for the sensors during the data capturing stage.
Similarly, stage 2 requirement specifications formalize the data-processing
functionality. The specifications for this stage result in a matrix like
structure as shown in the below table, where each component that is being
monitored is listed alongside the possible events it can generate and the
criticality of each event, along with what action, if any, should be carried
out by the ground/operating crew monitoring that event.
Component Event Source Event
Criticality
Control
Center
Alert
Event reaction
Door Closed after
the train
started moving
Door
side
camera
Low - -
Break Emergency
break tripped
OTMR Critical SMS/Email/
Escalation
Matrix
Check power
supply, air
pressure
38. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 1. JANUARY-JUNE 2017 36
For example, in the above, one can see the component door being monitored
for the close event, with a low criticality being attributed to it, while an
emergency brake event is being monitored with high criticality attribution.
Also, in case of emergency brake event, the event reactions list possible
course of action, such as checking the power supply and air-brake pressure,
which act as resolution guidelines for the crew and/or automated resolution
solver system.
The specifications for the final stage revolve around failure prediction.
Formal guidelines are established as to how a failure should be predicted
and which data source and event should be used in the process. For
example, the below table lists trend analysis criteria and pattern matching
criteria as the stipulated methods for the door and break failure respectively.
Component Event Failure Indication
Door Closed after the train
started moving
1. Delay increasing, or 2. Happening for the last
n observations (n > threshold)
Break Abnormal break
pressure patterns
Pattern matches with historical failure data
Based on these specifications, the CBMM system collects the data at the
specified intervals from the sensors and utilizes the below methodologies to
assert the asset’s condition:
Critical range and limits: Various statistical tests are performed to
assert if the captured sensor data falls inside a critical failure range
decided by the expert and requirement specifications [10].
Trend Analysis: Verify if the vehicle condition is in a deteriorating
mode with an immediate downwards trend towards breakdown [11].
Pattern recognition: Establishes the causal relations between the
events and the vehicle breakdowns [12].
Statistical process analysis: Historical failure record data, collected
through case-study histories, warranty claims and data archives, is
processed with statistical procedures to find a suitable analytical
model for the failure curves. As new data is gathered from the
sensors, it is compared against those statistical models to predict the
future breakdowns [13].
Trend analysis and critical range limit violations can be detected with real-
time monitoring and stream processing of data. However, the pattern
recognition and statistical process analysis requires historical data to be
analyzed and compared against the real-time live data for insights. Usually
39. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 1. JANUARY-JUNE 2017 37
such historical data is gathered through warranty-claims and maintenance
records.
Advancements in the Big-data technologies and predictive analytics are
enabling the stream processing of high volume live-data in real-time and
matching it with the voluminous historical data offline. A reference
architecture that was created for one of our large high-speed fleet
management clients using the afore-mentioned design methodology on Big-
data using M2M is as shown below:
Figure 4. Reference architecture for condition-based maintenance mgmt. system
The layered architecture enables one to easily customize or upgrade only
particular part of the system without completely replacing the whole system.
The XML schemas used as the base to store and operate on the operating
design specifications allow cross-platform compatibility and open-systems
interoperability. Sensors communicate with the data acquisition and
manipulation layers using the M2M framework, while the condition-
detection, prognosis and health-assessment layers were implemented using
Big-data parallelism. The maintenance support layers take care of the
required notifications for the administrators and operating crew using the
report dashboards and HMI visualizations along with security restrictions.
To achieve this level of sophistication, we integrated and customized
multiple open-source frameworks to our requirements, some of which are
listed below.
40. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 1. JANUARY-JUNE 2017 38
Remote sensor monitoring & data capturing: OpenXc
Real-time stream processing: Storm, Kestrel, ZMQ, MQTT
Predictive analytics: R
Real-time anomaly detection: Esper, CEP
Distributed fault-tolerant storage: Hadoop, HBase
Failure report dashboards: HTML 5
Control center visualization: OpenGl, Vtk, Qt, HMI
The value-add in integrating and customizing these frameworks lies in
achieving the required level of functionality with commodity hardware,
enabling it to handle large volumes of data with adaptable ontologies all the
while reducing the sensor data bandwidth. In their native form, individually,
these open-source frameworks will not be able to achieve the afore-
mentioned objectives in a manner suitable for enterprise customers [14].
The integration and interconnection of different technologies used for
implementing this solution is as shown below:
Figure 5. Technology stack integration for our condition-based maintenance
management solution
After the initiation of a fully functional CBMM system, our customer
reports have indicated the following year-wise average savings resulted
across their business units:
Reduction in maintenance costs: 25% to 30%
Spare parts inventories reduced: 20% to 30%
Reduction in equipment downtime: 35% to 45%
Elimination of breakdowns: 70% to 75%
Overtime expenses reduced: 20% to 50%
41. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 1. JANUARY-JUNE 2017 39
Asset life increased: 20% to 40%
Increase in production: 20% to 25%
While the predictive technology reduced the unexpected brake-downs, the
collateral benefits, such as work-life balance (with no unexpected brake-
down calls), reduction of over-time expenses and improved asset
availability contributed to the production increase rates.
4. CONCLUSIONS
Advancement in the big-data technologies in combination with M2M and
predictive analytics is creating new possibilities for real-time analysis of
machine components for detecting failures in the early stages and avoiding
them ahead of time. Increased component availability, improved worker
and environment safety, better asset usage etc. are some of the reasons that
are attracting more operators and manufacturers to embrace condition-based
maintenance strategy in their operations. Designing such a system for high-
speed fleet, however, requires special attention to the design methodologies
used for collecting the operating requirements from the users and translating
them into big-data parallel architectures that are capable of exhibiting fault-
tolerant behavior and load-balancing possibilities to sustain the real-time
data processing demands. This paper presented reference architecture for
one of our big-data M2M systems we designed as a large fleet-management
solution for a customer and showcased the technology framework
interconnects used in the said system. With more and more customers
becoming interested in these solutions, one can expect more solutions built
on these architectures using the listed frameworks and suggested design
methodologies in the future.
REFERENCES
[1] Romain Bosquet, Pierre-Olivier Vandanjon, Alex Coiret, and Tristan Lorino,
Model of High-Speed Train Energy Consumption, World Academy of Science,
Engineering and Technology, 2013.
[2] Jui-Sheng Chou, Changwan Kim, Yao-Chen Kuo, Nai-Chi Ou, Deploying
effective service strategy in the operations stage of high-speed rail, Transportation
Research Part E: Logistics and Transportation Review, 47(4):507-519, July 2011.
[3] Gopalakrishna Palem, Condition-Based Maintenance using Sensor Arrays and
Telematics, International Journal of Mobile Network Communications &
Telematics, 3(3):19-28, 2013.
[4] Gopalakrishna Palem, M2M Telematics & Predictive Analytics, Technical Report,
Symphony Teleca Corp., 2013
[5] Dino Citraro, Expanding Real-Time Data Insight at PARC, Big Data, 1(2): 78-81,
2013
42. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 1. JANUARY-JUNE 2017 40
[6] Okuya Shigeru, M2M and Big Data to Realize the Smart City, NEC Technical
Journal, 7(2), 2012
[7] Moubray, John. Reliability-Centered Maintenance. Industrial Press. New York,
NY. 1997
[8] Nowlan, F. Stanley, and Howard F. Heap. Reliability-Centered Maintenance.
Department of Defense, Washington, D.C. 1978. Report Number AD-A066579
[9] NFPA 1911, Standard for the Inspection, Maintenance, Testing, and Retirement of
In-Service Automotive Fire Apparatus, 2007 Edition, 6.1.5.1, p1911-14
[10] Hodge, V.J. and Austin, J A survey of outlier detection methodologies, Artificial
Intelligence Review, 22 (2). pp. 85-126, 2004
[11] Sematech, Failure Reporting, Analysis and Corrective Action System, 1993
[12] Felix Salfner, Predicting Failures with Hidden Markov Models, In Proceedings of
the 5th European Dependable Computing Conference (EDCC-5), 2005
[13] Weibull, W. A statistical distribution function of wide applicability, Journal of
Applied Mechanics-Trans. ASME 18 (3): 293–297. 1951
[14] Tristan Müller, How to choose a free and open source integrated library system,
OCLC Systems & Services, 27(1): pp.57 – 78, 2011
This paper may be cited as:
Gopalakrishna, P. 2017. Designing Condition-based Maintenance
Management Systems for High-Speed Fleet. International Journal of
Computer Science and Business Informatics, Vol. 17, No. 1, pp. 28-40.