Search results for: user behavior understanding
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 13987

Search results for: user behavior understanding

13567 Relationship between Deliberate Practice of Dribbling and Self-Regulatory Behavior of Male Basketball Players

Authors: Daud Abdia, Aqsa Shamim, Farhan Tabassum

Abstract:

In order to achieve specific goals, basketball players have to use different skills to enhance their motivation, one such skill is deliberate practice. The aim of this study was to explore the relationship between deliberate practice of dribbling and self-regulatory behavior of male basketball players. For this purpose, a sample of 108 basketball players using stratified sampling was taken from public and private sector universities. Sample was divided into two groups that are experimental (n=54) and control group (n=54) using comparative experimental design. Experimental group was involved in the training of deliberate practice of dribbling for 5 weeks. Amounts of weekly practice activity and Self-Regulation of Learning Self-Report Scale (SRL-SRS) were used for self-regulatory behavior to collect data after the deliberate practice. The reliability of amounts of weekly practice activity was found to be 0.852, whereas SRL-SRS was found to be 0.890. The results of the study indicated a strong positive correlation between deliberate practice of dribbling and self-regulatory behavior (r=0.755, n=54, p=.000). Whereas, paired sample t-test; t(53)=1.37, p < 0.005 shows statistically significant improvement in the self-regulatory behavior after the training program of deliberate practice from 3.02 ± 0.64m to 3.21 ± 0.75m (p < 0.005). It was concluded that in order to enhance the self-regulatory behavior of basketball players we should work on the deliberate practice of the players.

Keywords: self-regulatory behavior, deliberate practice, dribbling, basketball

Procedia PDF Downloads 153
13566 Player Experience: A Research on Cross-Platform Supported Games

Authors: Salih Akkemik

Abstract:

User Experience has a characterized perspective based on two fundamentals: the usage process and the product. Digital games can be considered as a special interactive system. This system has a very specific purpose and this is to make the player feel good while playing. At this point, Player Experience (PX) and User Experience (UX) are similar. UX focuses on the user feels good, PX focuses on the player feels good. The most important difference between the two is the action taken. These are actions of using and playing. In this study, the player experience will be examined primarily. PX may differ on different platforms. Nowadays, companies are releasing the successful and high-income games that they have developed with cross-platform support. Cross-platform is the most common expression that an application can run on different operating systems, in other words, be developed to support different operating systems. In terms of digital games, cross-platform support means that a game can be played on a computer, console or mobile device environment, more specifically, the game developed is designed and programmed to be played in the same way on at least two different platforms, such as Windows, MacOS, Linux, iOS, Android, Orbis OS or Xbox OS. Different platforms also accommodate different player groups, profiles and preferences. This study aims to examine these different player profiles in terms of player experience and to determine the effects of cross-platform support on player experience.

Keywords: cross-platform, digital games, player experience, user experience

Procedia PDF Downloads 192
13565 The Corrupt Behavior of Local Government Officials and Its Effect: A Case Study of Muang District, Songkhla Province, Thailand

Authors: C. Noknoi, W. Boripunt

Abstract:

This research aims to compare the corrupt behavior of local government officials and the public’s opinion about the effects of this corruption, as classified by the personal factors of the public. It also analyzes the relationship between the corrupt behavior of local government officials and the public’s opinion toward the effects of this corruption. The sample used in this research comprised 322 voters from Songkhla province, with a questionnaire being used to collect the data. The statistics used in the data analysis were the percentage, mean, standard deviation, t-test, ANOVA, and Pearson correlation. The results showed that the corrupt behavior of local government officials was at a high overall level. The sample’s opinion toward the effects of corrupt local government officials was also at a high overall level. Hypothesis testing indicated that samples with different personal factors did not vary in how they regarded the corrupt behavior of local government officials, and the samples’ opinions toward the effects of corrupt local government officials also did not vary. The corrupt behavior of local government officials and the opinions toward the effect of corrupt local government officials are both at consistently high levels and follow the same trend.

Keywords: corrupt behavior, local government, official, Thailand

Procedia PDF Downloads 319
13564 Customers' Attitudes towards Marketing Mix Affecting Purchasing Behavior of Starbucks Coffee (Thailand) Customers in Bangkok

Authors: Polamorn Tamprateep, Warapong Thakanun

Abstract:

This researchs' objectives are: 1. To study the customer demographics that affects the purchasing behavior; 2. To study the marketing mix that affects the purchasing behavior; 3. To study the relationship between purchasing behavior and customers’ perception of Brand Equity. Population of this research is Starbucks Coffee (Thailand) customers in Bangkok. The tool used in this study was questionnaire created from concepts, theories and related researches. The study showed that, of 400 respondents, overall opinion received high score (xˉ= 3.77). When each item is considered, it was found that ‘Staff are knowledgeable in providing service.’, ‘ Staff are friendly.’, ‘Staff possess good communication skill with customers.’, ‘Staff know all types of coffee well.’, and ‘Staff are enthusiastic in giving service.’, all these items received high score with a mean of 3.92, 3.87, 3.77, 3.71 and 3.63, respectively.

Keywords: mix attitude of the product, consumer, buying behavior, Starbucks

Procedia PDF Downloads 250
13563 Meta Root ID Passwordless Authentication Using ZKP Bitcoin Protocol

Authors: Saransh Sharma, Atharv Dekhne

Abstract:

Passwords stored on central services and hashed are prone to cyberattacks and hacks. Hence, given all these nuisances, there’s a need to eliminate character-based authentication protocols, which would ultimately benefit all developers as well as end-users.To replace this conventional but antiquated protocol with a secure alternative would be Passwordless Authentication. The meta root.id system creates a public and private key, of which the user is only able to access the private key. Further, after signing the key, the user sends the information over the API to the server, which checks its validity with the public key and grants access accordingly.

Keywords: passwordless, OAuth, bitcoin, ZKP, SIN, BIP

Procedia PDF Downloads 80
13562 Behavior of a Vertical Pile under the Effect of an Inclined Load

Authors: Fathi Mohamed Abdrabbo, Khaled Elsayed Gaaver, Musab Musa Eldooma

Abstract:

This paper presents an attempt made to investigate the behavior of a single vertical steel hollow pile embedded in sand subjected to compressive inclined load at various inclination angles α through FEM package MIDAS GTS/NX 2019. The effect of the inclination angle and slenderness ratio on the performance of the pile was investigated. Inclined load caring capacity and pile stiffness, as well as lateral deformation profiles along with the pile, were presented. The global, vertical, and horizontal load displacements, as well as the deformation profiles along with the pile and the pile stiffness, are significantly affected by α. Whereas P-Y curves of the pile are independent of α., also the slenderness ratios are markedly affecting the behavior of the pile. In addition, there was a noticeable effect of the horizontal component on the vertical behavior of the pile, whereas there was no influence of the presence of vertical load on the horizontal behavior of the pile.

Keywords: deep foundations, piles, inclined load, pile deformations

Procedia PDF Downloads 156
13561 Financial Information Transparency on Investor Behavior in the Private Company in Dusit Area

Authors: Yosapon Kidsuntad

Abstract:

The purpose of this dissertation was to explore the relationship between financial transparency and investor behavior. In carrying out this inquiry, the researcher used a questionnaire was utilized as a tool to collect data. Statistics utilized in this research included frequency, percentage, mean, standard deviation, and multiple regression analysis. The results revealed that there are significant differences investor perceptions of the different dimensions of financial information transparency. These differences correspond to demographical variables with the exception of the educational level variable. It was also found that there are relationships between investor perceptions of the dimensions of financial information transparency and investor behavior in the private company in Dusit Area. Finally, the researcher also found that there are differences in investor behavior corresponding to different categories of investor experience.

Keywords: financial information transparency, investor behavior, private company, Dusit Area

Procedia PDF Downloads 310
13560 Power Allocation in User-Centric Cell-Free Massive Multiple-Input Multiple-Output Systems with Limited Fronthaul Capacity

Authors: Siminfar Samakoush Galougah

Abstract:

In this paper, we study two power allocation problems for an uplink user-centric (UC) cell-free massive multiple-input multiple-output (CF-mMIMO) system. Besides, we assume each access point (AP) is connected to a central processing unit (CPU) via a fronthaul link with limited capacity. To efficiently use the fronthaul capacity, two strategies for transmitting signals from APs to the CPU are employed, namely, compress-forward estimate (CFE), estimate-compress-forward (ECF). The capacity of the aforementioned strategies in user-centric CF-mMIMO is drived. Then, we solved the two power allocation problems with minimum Spectral Efficiency (SE) and sum-SE maximization objectives for ECF and CFE strategies.

Keywords: cell-free massive MIMO, limited capacity fronthaul, spectral efficiency

Procedia PDF Downloads 44
13559 Sex Education Training Program Effect on Junior Secondary School Students Knowledge and Practice of Sexual Risk Behavior

Authors: Diyaolu Babajide Olufemi, Oyerinde Oyewole Olusesan

Abstract:

This study examined the effect of sex education training programs on the knowledge and practice of sexual risk behavior among secondary school adolescents in Ibadan North Local Government area of Oyo State. A total of 105 students were sampled from two schools in the Local Government area. Seventy students (70) constituted the experimental group while thirty-five (35) constituted the control group. Pretest-Posttest control group quasi-experimental design was adopted. A self-developed questionnaire was used to test participants’ knowledge and practice of sexual risk behavior before and after the training (α=.62, .82 and .74). Analysis indicated a significant effect of sex education training on participants’ knowledge and practice of sexual risk behavior, a significant gender difference in knowledge of sexual risk behavior but no significant age and gender difference in the practice of sexual risk behavior. It was thus concluded that sex education should be taught in schools and emphasized at homes with no age or gender restrictions.

Keywords: early adolescent, health risk, sexual risk behavior, sex education

Procedia PDF Downloads 122
13558 The Three-dimensional Response of Mussel Plaque Anchoring to Wet Substrates under Directional Tensions

Authors: Yingwei Hou, Tao Liu, Yong Pang

Abstract:

The paper explored the three-dimensional deformation of mussel plaques anchor to wet polydimethylsiloxane (PDMS) substrates under tension stress with different angles. Mussel plaques exhibiting natural adhesive structures, have attracted significant attention for their remarkable adhesion properties. Understanding their behavior under mechanical stress, particularly in a three-dimensional context, holds immense relevance for biomimetic material design and bio-inspired adhesive development. This study employed a novel approach to investigate the 3D deformation of the PDMS substrates anchored by mussel plaques subjected to controlled tension. Utilizing our customized stereo digital image correlation technique and mechanical mechanics analyses, we found the distributions of the displacement and resultant force on the substrate became concentrated under the plaque. Adhesion and sucking mechanisms were analyzed for the mussel plaque-substrate system under tension until detachment. The experimental findings were compared with a developed model using finite element analysis and the results provide new insights into mussels’ attachment mechanism. This research not only contributes to the fundamental understanding of biological adhesion but also holds promising implications for the design of innovative adhesive materials with applications in fields such as medical adhesives, underwater technologies, and industrial bonding. The comprehensive exploration of mussel plaque behavior in three dimensions is important for advancements in biomimicry and materials science, fostering the development of adhesives that emulate nature's efficiency.

Keywords: adhesion mechanism, mytilus edulis, mussel plaque, stereo digital image correlation

Procedia PDF Downloads 41
13557 A Taxonomy of Behavior for a Medical Coordinator by Utlizing Leadership Styles

Authors: Aryana Collins Jackson, Elisabetta Bevacqua, Pierre De Loor, Ronan Querrec

Abstract:

This paper presents a taxonomy of non-technical skills, communicative intentions, and behavior for an individual acting as a medical coordinator. In medical emergency situations, a leader among the group is imperative to both patient health and team emotional and mental health. Situational Leadership is used to make clear and easy-to-follow guidelines for behavior depending on circumstantial factors. Low-level leadership behaviors belonging to two different styles, directive and supporting, are identified from literature and are included in the proposed taxonomy. The high-level information in the taxonomy consists of the necessary non-technical skills belonging to a medical coordinator: situation awareness, decision making, task management, and teamwork. Finally, communicative intentions, dimensions, and functions are included. Thus this work brings high-level and low-level information - medical non-technical skills, communication capabilities, and leadership behavior - into a single versatile taxonomy of behavior.

Keywords: human behavior, leadership styles, medical, taxonomy

Procedia PDF Downloads 142
13556 Investigation on Behavior of Fixed-Ended Reinforced Concrete Deep Beams

Authors: Y. Heyrani Birak, R. Hizaji, J. Shahkarami

Abstract:

Reinforced Concrete (RC) deep beams are special structural elements because of their geometry and behavior under loads. For example, assumption of strain- stress distribution is not linear in the cross section. These types of beams may have simple supports or fixed supports. A lot of research works have been conducted on simply supported deep beams, but little study has been done in the fixed-end RC deep beams behavior. Recently, using of fixed-ended deep beams has been widely increased in structures. In this study, the behavior of fixed-ended deep beams is investigated, and the important parameters in capacity of this type of beams are mentioned.

Keywords: deep beam, capacity, reinforced concrete, fixed-ended

Procedia PDF Downloads 319
13555 Human-Computer Interaction: Strategies for Ensuring the Design of User-Centered Web Interfaces for Smartphones

Authors: Byron Joseph A. Hallar, Annjeannette Alain D. Galang, Maria Visitacion N. Gumabay

Abstract:

The widespread adoption and increasing proliferation of smartphones that started during the first decade of the twenty-first century have enabled their users to communicate and access information in ways that were merely thought of as possibilities in the few years before the smartphone revolution. A product of the convergence of the cellular phone and portable computer, the smartphone provides an additional important function that used to be the exclusive domain of desktop-bound computers and portable computers: Web Browsing. For increasing numbers of users, the smartphone and allied devices such as tablet computers have become their first and often their only means of accessing the World Wide Web. This has led to the development of websites that cater to the needs of the new breed of smartphone-carrying web users. The smaller size of smartphones as compared with conventional computers has provided unique challenges to web interface designers. The smaller screen size and touchscreen interface have made it much more difficult to read and navigate through web pages that were in most part designed for traditional desktop and portable computers. Although increasing numbers of websites now provide an alternate website formatted for smartphones, problems with ease of use, reliability and usability still remain. This study focuses on the identification of the problems associated with smartphone web interfaces, the compliance with accepted standards of user-oriented web interface design, the strategies that could be utilized to ensure the design of user-centric web interfaces for smartphones, and the identification of the current trends and developments related to user-centric web interface design intended for the consumption of smartphone users.

Keywords: human-computer interaction, user-centered design, web interface, mobile, smartphone

Procedia PDF Downloads 333
13554 Accounting Practitioners’ Insight into Distance-Learning Graduates’ Workplace Ethics

Authors: Annelien A. Van Rooyen, Carol S. Binnekade, Deon Scott, Christina C. Shuttleworth

Abstract:

Society expects professional accountants to uphold fundamental principles of professional competence, confidentiality, and ethical behavior. Their work needs to be trusted by the public, clients and other stakeholders. However, self-interest, intimidation and even ignorance could create conditions in which accounting practitioners and their staff may act contradictory to these principles. Similarly, plagiarism and cheating occur regularly at higher education institutions, where students claim ignorance of these actions and the accompanying consequences. Teaching students ethical skills in a distance-learning environment where interaction between students and instructors is limited is a challenge for academics. This also applies to instructors who teach accounting subjects to potential professional accountants. The researchers wanted to understand the concerns of accounting practitioners regarding recently qualified accounting students’ understanding of ethics and the resulting influence on their conduct. A mixed method approach was used to obtain feedback from numerous accounting practitioners in South Africa. The research questions focused mainly on ethical conduct in the workplace and the influence of social media on the behavior of graduates. The findings of the research suggested, inter alia, that accounting practitioners are of the opinion that the ethical conduct of graduates starts at home, but higher education institutions play a pivotal role in providing students with an understanding of ethics in the workplace, including the role of social media. The paper concludes with recommendations on how academics in higher education institutions need to address these challenges.

Keywords: accounting profession, distance learning, ethics, workplace

Procedia PDF Downloads 181
13553 Moderating Role of Psychological Contract in Relationship between Moral Disengagement and Counterproductive Work Behavior

Authors: Afsheen Masood, Sumaira Rashid, Nadia Ijaz, Shama Mazahir

Abstract:

The current study examined the relationship between moral disengagement, psychological contract, organizational citizenship behavior and counterproductive work behavior. It is hypothesized that there is likely to be a significant relationship between moral disengagement, psychological contract, organizational citizenship behavior and counterproductive work behavior. It is hypothesized that moral disengagement is likely to significantly predict counterproductive work behavior. It is hypothesized that psychological contract is likely to moderate the relationship between moral disengagement, and counterproductive work behavior. Cross-sectional survey research design was used for the study. The sample consisted of 500 middle managers, age ranging between 30-45 years working in private and public sector. The measures used were Moral Disengagement Scale, Psychological Contract Scale, and Counterproductive Work Behavior. Series of Correlation analyses, Regression analysis, moderation analysis and t-test was run in order to execute descriptive and inferential analyses. The findings revealed that there was a significant positive relationship between moral disengagement and counterproductive work behaviors. Psychological contract significantly mediated the relationship between moral disengagement and counterproductive work behaviors. There were significant gender differences reported in psychological contract and counterproductive work behaviors. The insightful findings carry significant implication for organizational psychologists and organizational stakeholders.

Keywords: psychological contract, moral disengagement, counterproductive work behaviors, mediation analysis

Procedia PDF Downloads 294
13552 The Role of Dialogue in Shared Leadership and Team Innovative Behavior Relationship

Authors: Ander Pomposo

Abstract:

Purpose: The aim of this study was to investigate the impact that dialogue has on the relationship between shared leadership and innovative behavior and the importance of dialogue in innovation. This study wants to contribute to the literature by providing theorists and researchers a better understanding of how to move forward in the studies of moderator variables in the relationship between shared leadership and team outcomes such as innovation. Methodology: A systematic review of the literature, originally adopted from the medical sciences but also used in management and leadership studies, was conducted to synthesize research in a systematic, transparent and reproducible manner. A final sample of 48 empirical studies was scientifically synthesized. Findings: Shared leadership gives a better solution to team management challenges and goes beyond the classical, hierarchical, or vertical leadership models based on the individual leader approach. One of the outcomes that emerge from shared leadership is team innovative behavior. To intensify the relationship between shared leadership and team innovative behavior, and understand when is more effective, the moderating effects of other variables in this relationship should be examined. This synthesis of the empirical studies revealed that dialogue is a moderator variable that has an impact on the relationship between shared leadership and team innovative behavior when leadership is understood as a relational process. Dialogue is an activity between at least two speech partners trying to fulfill a collective goal and is a way of living open to people and ideas through interaction. Dialogue is productive when team members engage relationally with one another. When this happens, participants are more likely to take responsibility for the tasks they are involved and for the relationships they have with others. In this relational engagement, participants are likely to establish high-quality connections with a high degree of generativity. This study suggests that organizations should facilitate the dialogue of team members in shared leadership which has a positive impact on innovation and offers a more adaptive framework for the leadership that is needed in teams working in complex work tasks. These results uncover the necessity of more research on the role that dialogue plays in contributing to important organizational outcomes such as innovation. Case studies describing both best practices and obstacles of dialogue in team innovative behavior are necessary to gain a more detailed insight into the field. It will be interesting to see how all these fields of research evolve and are implemented in dialogue practices in the organizations that use team-based structures to deal with uncertainty, fast-changing environments, globalization and increasingly complex work.

Keywords: dialogue, innovation, leadership, shared leadership, team innovative behavior

Procedia PDF Downloads 164
13551 Discovering User Behaviour Patterns from Web Log Analysis to Enhance the Accessibility and Usability of Website

Authors: Harpreet Singh

Abstract:

Finding relevant information on the World Wide Web is becoming highly challenging day by day. Web usage mining is used for the extraction of relevant and useful knowledge, such as user behaviour patterns, from web access log records. Web access log records all the requests for individual files that the users have requested from the website. Web usage mining is important for Customer Relationship Management (CRM), as it can ensure customer satisfaction as far as the interaction between the customer and the organization is concerned. Web usage mining is helpful in improving website structure or design as per the user’s requirement by analyzing the access log file of a website through a log analyzer tool. The focus of this paper is to enhance the accessibility and usability of a guitar selling web site by analyzing their access log through Deep Log Analyzer tool. The results show that the maximum number of users is from the United States and that they use Opera 9.8 web browser and the Windows XP operating system.

Keywords: web usage mining, web mining, log file, data mining, deep log analyzer

Procedia PDF Downloads 237
13550 Problem of Services Selection in Ubiquitous Systems

Authors: Malika Yaici, Assia Arab, Betitra Yakouben, Samia Zermani

Abstract:

Ubiquitous computing is nowadays a reality through the networking of a growing number of computing devices. It allows providing users with context aware information and services in a heterogeneous environment, anywhere and anytime. Selection of the best context-aware service, between many available services and providers, is a tedious problem. In this paper, a service selection method based on Constraint Satisfaction Problem (CSP) formalism is proposed. The services are considered as variables and domains; and the user context, preferences and providers characteristics are considered as constraints. The Backtrack algorithm is used to solve the problem to find the best service and provider which matches the user requirements. Even though this algorithm has an exponential complexity, but its use guarantees that the service, that best matches the user requirements, will be found. A comparison of the proposed method with the existing solutions finishes the paper.

Keywords: ubiquitous computing, services selection, constraint satisfaction problem, backtrack algorithm

Procedia PDF Downloads 226
13549 Examining the Investment Behavior of Arab Women in the Stock Market

Authors: Razan Salem

Abstract:

Gender plays a vital role in the stock markets because men and women differ in their behavior when investing in stocks. Accordingly, the role of gender differences in investment behavior is an increasingly important strand in the field of behavioral finance research. The investment behaviors of women relative to men have been examined in the behavioral finance literature, mainly for comparison purposes. Women's roles in the stock market have not been examined in the behavioral finance literature, however, particularly with respect to the Arab region. This study aims to contribute towards a better understanding of the investment behavior of Arab women (in regards to their risk tolerance, investment confidence, and investment literacy levels) relative to Arab men; using a sample from Arab women and men investors living in Saudi Arabia and Jordan. In order to achieve the study's main aim, the researcher used non-parametric tests, as Mann-Whitney U test, along with frequency distribution analysis to analyze the study’s primary data. The researcher distributed close-ended online questionnaires to a sample of 550 Arab male and female individuals investing in stocks in both Saudi Arabia and Jordan. The results confirm that the sample Arab women invest less in stocks compared to Arab men due to their risk-averse behaviors and limited confidence levels. The results also reveal that due to Arab women’s very low investment literacy levels, they fear from taking the risk and invest often in stocks relative to Arab men. Overall, the study’s main variables (risk tolerance, investment confidence, and investment literacy levels) have a combined effect on the investment behavior of Arab women and their limited participation in the stock market. Hence, this study is one of the very first studies that indicate the combined effect of the three main variables (which are usually studied separately in the existing literature) on the investment behavior of women, particularly Arab women. This study makes three important contributions to the growing literature on gender differences in investment behavior. First, while the behavioral finance literature documents evidence on gender differences in investment behaviors in many developed countries, there are very limited studies that investigate such differences in Arab countries. Arab women investors, generally, are ignored from the behavioral finance literature due probably to cultural barriers and data collection difficulties. Thus, this study extends the literature to include Arab women and their investment behaviors when trading stock relative to Arab men. Moreover, the study associates women investment literacy and confidence levels with their financial risk behaviors and participation in the stock market. This study provides direct evidence on Arab women's investment behaviors when trading stocks. Overall, studying Arab women investors is important to investigate whether the investment behavior identified for Western women investors are also found in Arab women investors.

Keywords: Arab women, gender differences, investment behavior, stock markets

Procedia PDF Downloads 167
13548 User Authentication Using Graphical Password with Sound Signature

Authors: Devi Srinivas, K. Sindhuja

Abstract:

This paper presents architecture to improve surveillance applications based on the usage of the service oriented paradigm, with smart phones as user terminals, allowing application dynamic composition and increasing the flexibility of the system. According to the result of moving object detection research on video sequences, the movement of the people is tracked using video surveillance. The moving object is identified using the image subtraction method. The background image is subtracted from the foreground image, from that the moving object is derived. So the Background subtraction algorithm and the threshold value is calculated to find the moving image by using background subtraction algorithm the moving frame is identified. Then, by the threshold value the movement of the frame is identified and tracked. Hence, the movement of the object is identified accurately. This paper deals with low-cost intelligent mobile phone-based wireless video surveillance solution using moving object recognition technology. The proposed solution can be useful in various security systems and environmental surveillance. The fundamental rule of moving object detecting is given in the paper, then, a self-adaptive background representation that can update automatically and timely to adapt to the slow and slight changes of normal surroundings is detailed. While the subtraction of the present captured image and the background reaches a certain threshold, a moving object is measured to be in the current view, and the mobile phone will automatically notify the central control unit or the user through SMS (Short Message System). The main advantage of this system is when an unknown image is captured by the system it will alert the user automatically by sending an SMS to user’s mobile.

Keywords: security, graphical password, persuasive cued click points

Procedia PDF Downloads 521
13547 Low Pricing Strategy of Forest Products in Community Forestry Program: Subsidy to the Forest Users or Loss of Economy?

Authors: Laxuman Thakuri

Abstract:

Community-based forest management is often glorified as one of the best forest management alternatives in the developing countries like Nepal. It is also believed that the transfer of forest management authorities to local communities is decisive to take efficient decisions, maximize the forest benefits and improve the people’s livelihood. The community forestry of Nepal also aims to maximize the forest benefits; share them among the user households and improve their livelihood. However, how the local communities fix the price of forest products and local pricing made by the forest user groups affects to equitable forest benefits-sharing among the user households and their livelihood improvement objectives, the answer is largely silent among the researchers and policy-makers alike. This study examines local pricing system of forest products in the lowland community forestry and its effects on equitable benefit-sharing and livelihood improvement objectives. The study discovered that forest user groups fixed the price of forest products based on three criteria: i) costs incur in harvesting, ii) office operation costs, and iii) livelihood improvement costs through community development and income generating activities. Since user households have heterogeneous socio-economic conditions, the forest user groups have been applied low pricing strategy even for high-value forest products that the access of socio-economically worse-off households can be increased. However, the results of forest products distribution showed that as a result of low pricing strategy the access of socio-economically better-off households has been increasing at higher rate than worse-off and an inequality situation has been created. Similarly, the low pricing strategy is also found defective to livelihood improvement objectives. The study suggests for revising the forest products pricing system in community forest management and reforming the community forestry policy as well.

Keywords: community forestry, forest products pricing, equitable benefit-sharing, livelihood improvement, Nepal

Procedia PDF Downloads 284
13546 A Pervasive System Architecture for Smart Environments in Internet of Things Context

Authors: Patrick Santos, João Casal, João Santos Luis Varandas, Tiago Alves, Carlos Romeiro, Sérgio Lourenço

Abstract:

Nowadays, technology makes it possible to, in one hand, communicate with various objects of the daily life through the Internet, and in the other, put these objects interacting with each other through this channel. Simultaneously, with the raise of smartphones as the most ubiquitous technology on persons lives, emerge new agents for these devices - Intelligent Personal Assistants. These agents have the goal of helping the user manage and organize his information as well as supporting the user in his/her day-to-day tasks. Moreover, other emergent concept is the Cloud Computing, which allows computation and storage to get out of the users devices, bringing benefits in terms of performance, security, interoperability and others. Connecting these three paradigms, in this work we propose an architecture for an intelligent system which provides an interface that assists the user on smart environments, informing, suggesting actions and allowing to manage the objects of his/her daily life.

Keywords: internet of things, cloud, intelligent personal assistant, architecture

Procedia PDF Downloads 496
13545 Performance Analysis of Heterogeneous Cellular Networks with Multiple Connectivity

Authors: Sungkyung Kim, Jee-Hyeon Na, Dong-Seung Kwon

Abstract:

Future mobile networks following 5th generation will be characterized by one thousand times higher gains in capacity; connections for at least one hundred billion devices; user experience capable of extremely low latency and response times. To be close to the capacity requirements and higher reliability, advanced technologies have been studied, such as multiple connectivity, small cell enhancement, heterogeneous networking, and advanced interference and mobility management. This paper is focused on the multiple connectivity in heterogeneous cellular networks. We investigate the performance of coverage and user throughput in several deployment scenarios. Using the stochastic geometry approach, the SINR distributions and the coverage probabilities are derived in case of dual connection. Also, to compare the user throughput enhancement among the deployment scenarios, we calculate the spectral efficiency and discuss our results.

Keywords: heterogeneous networks, multiple connectivity, small cell enhancement, stochastic geometry

Procedia PDF Downloads 307
13544 Automated Testing to Detect Instance Data Loss in Android Applications

Authors: Anusha Konduru, Zhiyong Shan, Preethi Santhanam, Vinod Namboodiri, Rajiv Bagai

Abstract:

Mobile applications are increasing in a significant amount, each to address the requirements of many users. However, the quick developments and enhancements are resulting in many underlying defects. Android apps create and handle a large variety of 'instance' data that has to persist across runs, such as the current navigation route, workout results, antivirus settings, or game state. Due to the nature of Android, an app can be paused, sent into the background, or killed at any time. If the instance data is not saved and restored between runs, in addition to data loss, partially-saved or corrupted data can crash the app upon resume or restart. However, it is difficult for the programmer to manually test this issue for all the activities. This results in the issue of data loss that the data entered by the user are not saved when there is any interruption. This issue can degrade user experience because the user needs to reenter the information each time there is an interruption. Automated testing to detect such data loss is important to improve the user experience. This research proposes a tool, DroidDL, a data loss detector for Android, which detects the instance data loss from a given android application. We have tested 395 applications and found 12 applications with the issue of data loss. This approach is proved highly accurate and reliable to find the apps with this defect, which can be used by android developers to avoid such errors.

Keywords: Android, automated testing, activity, data loss

Procedia PDF Downloads 222
13543 Pro-Environmental Behavioral Intention of Mountain Hikers to the Theory of Planned Behavior

Authors: Mohammad Ehsani, Iman Zarei, Soudabeh Moazemigoudarzi

Abstract:

The aim of this study is to determine Pro-Environmental Behavioral Intention of Mountain Hikers to the Theory of Planned Behavior. According to many researchers nature-based recreation activities play a significant role in the tourism industry and have provided myriad opportunities for the protection of natural areas. It is essential to investigate individuals' behavior during such activities to avoid further damage to precious and dwindling natural resources. This study develops a robust model that provides a comprehensive understanding of the formation of pro-environmental behavioral intentions among climbers of Mount Damavand National Park in Iran. To this end, we combined the theory of planned behavior (TPB), value-belief-norm theory (VBN), and a hierarchical model of leisure constraints to predict individuals’ pro-environmental hiking behavior during outdoor recreation. It was used structural equation modeling to test the theoretical framework. A sample of 787 climbers was analyzed. Among the theory of planned behavior variables, perceived behavioral control showed the strongest association with behavioral intention (β = .57). This relationship indicates that if people feel they can have fewer negative impacts on national resources while hiking, it will result in more environmentally acceptable behavior. Subjective norms had a moderate positive impact on behavioral intention, indicating the importance of other people on the individual's behavior. Attitude had a small positive effect on intention. Ecological worldview positively influenced attitude and personal belief. Personal belief (awareness of consequences and ascribed responsibility) showed a positive association with TPB variables. Although the data showed a high average score in awareness of consequences (mean = 4.219 out of 5), evidence from Damavand Mount shows that there are many environmental issues that need addressing (e.g., vast amounts of garbage). National park managers need to make sure that their solutions result in awareness about proenvironmental behavior (PEB). Findings showed that negative relationship between constraints and all TPB predictors. Providing proper restrooms and parking spaces in campgrounds, strategies controlling limiting capacity and solutions for removing waste from high altitudes are helpful to decrease the negative impact of structural constraints. In order to address intrapersonal constraints, managers should provide opportunities to interest individuals in environmental activities, such as environmental celebrations or making documentaries about environmental issues. Moreover, promoting a culture of environmental protection in the Damavand Mount area would reduce interpersonal constraints. Overall, the proposed model improved the explanatory power of the TPB by predicting 64.7% of intention compared to the original TPB that accounted for 63.8% of the variance in intention.

Keywords: theory of planned behavior, pro-environmental behavior, national park, constraints

Procedia PDF Downloads 83
13542 The User Experience Evaluation Study on Gamified Classroom via Prezi

Authors: Wong Seng Yue

Abstract:

Game dynamics and game mechanics are the two main components that used in gamification to engage and encourage students to learn. The advantages of gamified classroom are engaging students, increasing students interest, preserving students focus and remain a positive behaviour. However, the empirical studies on gamification are still at early stage, especially the effectiveness of various gamification components have not been evaluated. Thus, this study is aimed to conduct a user experience (UX) evaluation on gamified classroom through Prezi, which focused on learning experience, gaming experience, adaptivity, and gameplay experience. This study is a further study extended from the previous exploratory study to explore more on UX of gamified classroom via Prezi by interview. A focus group study, which involves 22 students from a foundation course has been conducted for the study. Besides the empirical data from the previous study, this focus group study has significantly found that 90.9% respondents show their positive perceptions on gaming experience via Prezi. They are interested, feel fresh, good, and highly motivated of the contents of Prezi. 95.5% participants have had a positive learning experience from the gamified classroom via Prezi, which can engage them, made them concentrate on learning and easy to remember what they have learned if compared to the traditional classroom slides. The adaptivity of the gamified classroom also high due to its zooming user interface, narrative, rewards and engagement features. This study has uncovered on how far the impact of gamification components in the classroom, especially UX that implemented in gamified classroom.

Keywords: user experience (UX), gamification, gamified classroom, Prezi

Procedia PDF Downloads 194
13541 The Development of User Behavior in Urban Regeneration Areas by Utilizing the Floating Population Data

Authors: Jung-Hun Cho, Tae-Heon Moon, Sun-Young Heo

Abstract:

A lot of urban problems, caused by urbanization and industrialization, have occurred around the world. In particular, the creation of satellite towns, which was attributed to the explicit expansion of the city, has led to the traffic problems and the hollowization of old towns, raising the necessity of urban regeneration in old towns along with the aging of existing urban infrastructure. To select urban regeneration priority regions for the strategic execution of urban regeneration in Korea, the number of population, the number of businesses, and deterioration degree were chosen as standards. Existing standards had a limit in coping with solving urban problems fundamentally and rapidly changing reality. Therefore, it was necessary to add new indicators that can reflect the decline in relevant cities and conditions. In this regard, this study selected Busan Metropolitan City, Korea as the target area as a leading city, where urban regeneration such as an international port city has been activated like Yokohama, Japan. Prior to setting the urban regeneration priority region, the conditions of reality should be reflected because uniform and uncharacterized projects have been implemented without a quantitative analysis about population behavior within the region. For this reason, this study conducted a characterization analysis and type classification, based on the user behaviors by using representative floating population of the big data, which is a hot issue all over the society in recent days. The target areas were analyzed in this study. While 23 regions were classified as three types in existing Busan Metropolitan City urban regeneration priority region, 23 regions were classified as four types in existing Busan Metropolitan City urban regeneration priority region in terms of the type classification on the basis of user behaviors. Four types were classified as follows; type (Ⅰ) of young people - morning type, Type (Ⅱ) of the old and middle-aged- general type with sharp floating population, type (Ⅲ) of the old and middle aged-24hour-type, and type (Ⅳ) of the old and middle aged with less floating population. Characteristics were shown in each region of four types, and the study results of user behaviors were different from those of existing urban regeneration priority region. According to the results, in type (Ⅰ) young people were the majority around the existing old built-up area, where floating population at dawn is four times more than in other areas. In Type (Ⅱ), there were many old and middle-aged people around the existing built-up area and general neighborhoods, where the average floating population was more than in other areas due to commuting, while in type (Ⅲ), there was no change in the floating population throughout 24 hours, although there were many old and middle aged people in population around the existing general neighborhoods. Type (Ⅳ) includes existing economy-based type, central built-up area type, and general neighborhood type, where old and middle aged people were the majority as a general type of commuting with less floating population. Unlike existing urban regeneration priority region, these types were sub-divided according to types, and in this study, approach methods and basic orientations of urban regeneration were set to reflect the reality to a certain degree including the indicators of effective floating population to identify the dynamic activity of urban areas and existing regeneration priority areas in connection with urban regeneration projects by regions. Therefore, it is possible to make effective urban plans through offering the substantial ground by utilizing scientific and quantitative data. To induce more realistic and effective regeneration projects, the regeneration projects tailored to the present local conditions should be developed by reflecting the present conditions on the formulation of urban regeneration strategic plans.

Keywords: floating population, big data, urban regeneration, urban regeneration priority region, type classification

Procedia PDF Downloads 199
13540 Proof of Concept Design and Development of a Computer-Aided Medical Evaluation of Symptoms Web App: An Expert System for Medical Diagnosis in General Practice

Authors: Ananda Perera

Abstract:

Computer-Assisted Medical Evaluation of Symptoms (CAMEOS) is a medical expert system designed to help General Practices (GPs) make an accurate diagnosis. CAMEOS comprises a knowledge base, user input, inference engine, reasoning module, and output statement. The knowledge base was developed by the author. User input is an Html file. The physician user collects data in the consultation. Data is sent to the inference engine at servers. CAMEOS uses set theory to simulate diagnostic reasoning. The program output is a list of differential diagnoses, the most probable diagnosis, and the diagnostic reasoning.

Keywords: CDSS, computerized decision support systems, expert systems, general practice, diagnosis, diagnostic systems, primary care diagnostic system, artificial intelligence in medicine

Procedia PDF Downloads 139
13539 A Method and System for Secure Authentication Using One Time QR Code

Authors: Divyans Mahansaria

Abstract:

User authentication is an important security measure for protecting confidential data and systems. However, the vulnerability while authenticating into a system has significantly increased. Thus, necessary mechanisms must be deployed during the process of authenticating a user to safeguard him/her from the vulnerable attacks. The proposed solution implements a novel authentication mechanism to counter various forms of security breach attacks including phishing, Trojan horse, replay, key logging, Asterisk logging, shoulder surfing, brute force search and others. QR code (Quick Response Code) is a type of matrix barcode or two-dimensional barcode that can be used for storing URLs, text, images and other information. In the proposed solution, during each new authentication request, a QR code is dynamically generated and presented to the user. A piece of generic information is mapped to plurality of elements and stored within the QR code. The mapping of generic information with plurality of elements, randomizes in each new login, and thus the QR code generated for each new authentication request is for one-time use only. In order to authenticate into the system, the user needs to decode the QR code using any QR code decoding software. The QR code decoding software needs to be installed on handheld mobile devices such as smartphones, personal digital assistant (PDA), etc. On decoding the QR code, the user will be presented a mapping between the generic piece of information and plurality of elements using which the user needs to derive cipher secret information corresponding to his/her actual password. Now, in place of the actual password, the user will use this cipher secret information to authenticate into the system. The authentication terminal will receive the cipher secret information and use a validation engine that will decipher the cipher secret information. If the entered secret information is correct, the user will be provided access to the system. Usability study has been carried out on the proposed solution, and the new authentication mechanism was found to be easy to learn and adapt. Mathematical analysis of the time taken to carry out brute force attack on the proposed solution has been carried out. The result of mathematical analysis showed that the solution is almost completely resistant to brute force attack. Today’s standard methods for authentication are subject to a wide variety of software, hardware, and human attacks. The proposed scheme can be very useful in controlling the various types of authentication related attacks especially in a networked computer environment where the use of username and password for authentication is common.

Keywords: authentication, QR code, cipher / decipher text, one time password, secret information

Procedia PDF Downloads 253
13538 User Selections on Social Network Applications

Authors: C. C. Liang

Abstract:

MSN used to be the most popular application for communicating among social networks, but Facebook chat is now the most popular. Facebook and MSN have similar characteristics, including usefulness, ease-of-use, and a similar function, which is the exchanging of information with friends. Facebook outperforms MSN in both of these areas. However, the adoption of Facebook and abandonment of MSN have occurred for other reasons. Functions can be improved, but users’ willingness to use does not just depend on functionality. Flow status has been established to be crucial to users’ adoption of cyber applications and to affects users’ adoption of software applications. If users experience flow in using software application, they will enjoy using it frequently, and even change their preferred application from an old to this new one. However, no investigation has examined choice behavior related to switching from Facebook to MSN based on a consideration of flow experiences and functions. This investigation discusses the flow experiences and functions of social-networking applications. Flow experience is found to affect perceived ease of use and perceived usefulness; perceived ease of use influences information ex-change with friends, and perceived usefulness; information exchange influences perceived usefulness, but information exchange has no effect on flow experience.

Keywords: consumer behavior, social media, technology acceptance model, flow experience

Procedia PDF Downloads 339