Search results for: intention of repeat transactions
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1163

Search results for: intention of repeat transactions

593 Meeting User’s Information Need: A Study on the Acceptance of Mobile Library Service at UGM Library

Authors: M. Fikriansyah Wicaksono, Rafael Arief Budiman, M. Very Setiawan

Abstract:

Currently, a wide range of innovative mobile library (M-Library) service is provided for the users in the library. The M-Library service is an innovation that aims to bring the collections of the library to users who currently use their smartphone so often. With M-Library services, it is expected that the users can fulfill their information needs more conveniently and practically. This study aims to find out how users use M-Library services provided by UGM library. This study applied a quantitative approach to investigate how to use the application M-Library. The Technology Acceptance Model (TAM) theory is applied to perform the analysis in terms of perceived usefulness, perceived ease of use, attitude towards behavior, behavioral intention and actual system usage. The results show that overall the users found that the M-Library application is useful to meet their information needs. Such as facilitate user to access e-resources, search UGM library collections, online booking collections, and reminder for returning book.

Keywords: m-library, mobile library services, technology acceptance, library of UGM

Procedia PDF Downloads 204
592 Bitcoin, Blockchain and Smart Contract: Attacks and Mitigations

Authors: Mohamed Rasslan, Doaa Abdelrahman, Mahmoud M. Nasreldin, Ghada Farouk, Heba K. Aslan

Abstract:

Blockchain is a distributed database that endorses transparency while bitcoin is a decentralized cryptocurrency (electronic cash) that endorses anonymity and is powered by blockchain technology. Smart contracts are programs that are stored on a blockchain. Smart contracts are executed when predetermined conditions are fulfilled. Smart contracts automate the agreement execution in order to make sure that all participants immediate-synchronism of the outcome-certainty, without any intermediary's involvement or time loss. Currently, the Bitcoin market worth billions of dollars. Bitcoin could be transferred from one purchaser to another without the need for an intermediary bank. Network nodes through cryptography verify bitcoin transactions, which are registered in a public-book called “blockchain”. Bitcoin could be replaced by other coins, merchandise, and services. Rapid growing of the bitcoin market-value, encourages its counterparts to make use of its weaknesses and exploit vulnerabilities for profit. Moreover, it motivates scientists to define known vulnerabilities, offer countermeasures, and predict future threats. In his paper, we study blockchain technology and bitcoin from the attacker’s point of view. Furthermore, mitigations for the attacks are suggested, and contemporary security solutions are discussed. Finally, research methods that achieve strict security and privacy protocol are elaborated.

Keywords: Cryptocurrencies, Blockchain, Bitcoin, Smart Contracts, Peer-to-Peer Network, Security Issues, Privacy Techniques

Procedia PDF Downloads 56
591 The Impact of Shariah Non-Compliance Risk on Islamic Financial Institutions

Authors: Ibtissam Mharzi Alaoui, Camélia Sehaqui

Abstract:

The success of a bank depends upon its effective risk management. With the growing complexity and diversity of financial products and services, as well as the accelerating pace of globalization over the past decade, risk management is becoming increasingly difficult. thus, all measurement and monitoring functions must be much more vigorous, relevant and adequate. The Shariah non-compliance risk is specific aspect of Islamic finance which ipso facto, deserves particular attention. It affects the validity of all Islamic financial contracts and it turns out to be likely to result in considerable losses on the overall Islamic financial institutions (IFIs). The purpose of this paper is to review the theoretical literature on Shariah non-compliance risk in order to give a clearer understanding of its sources, causes and consequences. Our intention through this work is to bring added value to the Islamic finance industry all over the world. The findings provide a useful reference work for the Islamic banks in structuring (or restructuring) of their own system of shariah risk management and internal control.

Keywords: Shariah non-compliance, risk management, financial products, Islamic finance.

Procedia PDF Downloads 60
590 Efficiency of Using E-Wallets as Payment Method in Marikina City During COVID-19 Pandemic

Authors: Noel Paolo Domingo, James Paul Menina, Laurente Ferrer

Abstract:

Most people were forced to stay at home and limit their physical contact during the COVID-19 pandemic. Due to the situation, strict implementation of government policies and safety protocols encouraged consumers to utilize cashless or digital transactions through e-wallets. In this study, the researchers aim to investigate the efficiency of using e-wallets as a payment method during the COVID-19 pandemic in Marikina City. The study examined the efficiency of e-wallets in terms of Usefulness, Convenience, and Safety and Security based on respondents’ assessment. Questionnaires developed by the researchers were distributed to a total of 400 e-wallet users in Marikina City aged 15 years old and above to gather data by using a purposive sampling technique. The data collected was processed using SPSS version 26. Frequency, percentage, and mean were utilized to describe the profile of respondents and their assessment of e-wallets in terms of the three constructs. ANOVA and t-tests were also employed to test the significant differences in the respondent’s assessment when the demographic profile was considered. The study revealed that when it comes to usefulness, e-wallet is efficient while in terms of convenience, and safety and security, e-wallet has been proven to be very efficient. During the COVID-19 pandemic, utilizing e-wallets has been embraced by most consumers. By enhancing its features, more people will be satisfied with using e-wallets.

Keywords: efficiency of e-wallets, usefulness, convenience, safety and security

Procedia PDF Downloads 97
589 Comparative Outcomes of Percutaneous Coronary Intervention in Smokers versus Non Nonsmokers Patients: Observational Studies

Authors: Pratima Tatke, Archana Avhad, Bhanu Duggal, Meeta Rajivlochan, Sujata Saunik, Pradip Vyas, Nidhi Pandey, Aditee Dalvi, Jyothi Subramanian

Abstract:

Background: Smoking is well established risk factor for the development and progression of coronary artery disease. It is strongly related to morbidity and mortality from cardiovascular causes. The aim of this study is to observe effect of smoking status on percutaneous coronary intervention(PCI) after 1 year. Methods: 2527 patients who underwent PCI at different hospital of Maharashtra(India) from 2012 to 2015 under the health insurance scheme which is launched by Health department, Government of Maharashtra for below poverty line(BPL) families which covers cardiology. Informed consent of patients was taken .They were followed by telephonic survey after 6months to 1year of PCI . Outcomes of interest included myocardial infarction, restenosis, cardiac rehospitalization, death, and a composite of events after PCI. Made group of two non smokers-1861 and smokers (including patients who quit at time of PCI )-659. Results: Statistical Analysis using Pearson’s chi square test revealed that there was trend seen of increasing incidence of death, Myocardial infarction and Restenosis in smokers than non smokers .Smokers had a greater death risk compared to nonsmoker; 5.7% and 5.1% respectively p=0.518. Also Repeat procedures (2.1% vs. 1.5% p=0.222), breathlessness (17.8% vs. 18.20% p=0.1) and Myocardial Infarction (7.3% vs. 10%) high in smoker than non smokers. Conclusion: Major adverse cardiovascular events (MACE) were observed even after successful PCI in smokers. Patients undergoing percutaneous coronary intervention should be encouraged to stop smoking.

Keywords: coronary artery diseases, major adverse cardiovascular events, percutaneous coronary intervention, smoking

Procedia PDF Downloads 184
588 Obioma's 'The Fishermen' and the Redefinition of African Postcolonial Narrative Tragedy

Authors: Ezechi Onyerionwu

Abstract:

If there is a modern world literary culture that has so tremendously patronized the tragic mode, it has to be that of Africa, and this has been largely true to the extent that the African socio-historical process has been given strong projection by its literature and other art forms. From the three-century-long transatlantic slave trade which brutally translocated millions of Africans to the ‘outermost parts of the earth’, to the vicious partitioning of Africa among European powers and the subsequent imposition of colonial authority on a pulverized people, Africa has really been at the receiving end of the big negatives of global transactions. The African tale has largely been one long tragic narrative. However, the postcolonial African tragic saga has presented an interesting variety of forms and approaches, which have seen to the production of some of the most thought-provoking and acclaimed African novels of the late 20th and early 21st century. Some of the defining characteristics of the African tragic prose has been: the exploration of the many neocolonial implications of the African contemporary existence; the significance of the robust interplay between the essentially foreign, and the originally indigenous elements of the modern African society; and the implosive aftermaths of the individual modern African’s attempt to rationalize his position at the centre of a very complex society. Obioma’s incredible novel, The Fishermen, is in many ways, a classic of the African postcolonial narrative tragedy. The reasons for this bold categorization would occupy the present paper.

Keywords: African narrative tragedy, neocolonialism, postcolonial literature, twenty first century African literature

Procedia PDF Downloads 232
587 Transmission of Intergenerational Trauma: Protecting Those who Still Suffer from Pain of their Ancestors’ Trauma

Authors: Bonnie Pollak

Abstract:

As the world continues to suffer grievous injuries, future generations will suffer from trauma that was inflicted on innocent victims. Trauma can result from refugees fleeing their homes, exposure to warfare, loss of loved ones, and lack of shelter and basic necessities. The Holocaust continues to cause pain even though WWII ended nearly 80 years ago. One cannot forget the inhumane treatment and murder of relatives. The pain and trauma may continue for generations. The purpose of the Final Solution was to eliminate Jews in totality. Though Hitler’s plan was not successful, he managed to cause trauma that will continue with no end date in sight. “The Effects of Trauma and Secondary Trauma,” Trauma can cause life-long challenges, eating disorders, cardiovascular disease, cancer, sleeping difficulties, fear of going outside, guilt, separation problems, and epigenetic changes. Secondary Trauma, witnessing a loved one in danger or hearing about the danger, can cause similar symptoms as seen in primary trauma. The transmission of trauma was demonstrated in children of Holocaust survivors and in communities where oppression was commonplace. We are witnessing a repeat of widescale death and horrific injuries today in Ukraine and in other parts of the world, where concern for pain and trauma is not acknowledged by perpetrators. Lessons from the Holocaust can be applied to help others who have been traumatized by widescale terrorism resulting in death of loved ones, loss of home and shelter, food and other life-sustaining measures. The world must help victims by providing basic necessities but also by using trauma-informed care, focusing on strength and resilience, and helping individuals to feel pride in their identity.

Keywords: transmission of intergenerational trauma, impact on religious beliefs and practices, 2nd generation, identity

Procedia PDF Downloads 83
586 Financial Intermediation: A Transaction Two-Sided Market Model Approach

Authors: Carlo Gozzelino

Abstract:

Since the early 2000s, the phenomenon of the two-sided markets has been of growing interest in academic literature as such kind of markets differs by having cross-side network effects and same-side network effects characterizing the transactions, which make the analysis different when compared to traditional seller-buyer concept. Due to such externalities, pricing strategies can be based on subsidizing the participation of one side (i.e. considered key for the platform to attract the other side) while recovering the loss on the other side. In recent years, several players of the Italian financial intermediation industry moved from an integrated landscape (i.e. selling their own products) to an open one (i.e. intermediating third party products). According to academic literature such behavior can be interpreted as a merchant move towards a platform, operating in a two-sided market environment. While several application of two-sided market framework are available in academic literature, purpose of this paper is to use a two-sided market concept to suggest a new framework applied to financial intermediation. To this extent, a model is developed to show how competitors behave when vertically integrated and how the peculiarities of a two-sided market act as an incentive to disintegrate. Additionally, we show that when all players act as a platform, the dynamics of a two-sided markets can allow at least a Nash equilibrium to exist, in which platform of different sizes enjoy positive profit. Finally, empirical evidences from Italian market are given to sustain – and to challenge – this interpretation.

Keywords: financial intermediation, network externalities, two-sided markets, vertical differentiation

Procedia PDF Downloads 138
585 Urgency of Islamic Economic System Implementation in Indonesian Banking

Authors: Muhammad Rifqi Hafizhudin Arif, Mukhamad Zulfal Faradis, Ahmad Hidayatullah

Abstract:

Indonesia is the country that uses conventional financial system adopted from European countries as a form of finance in the national banking system. Many of the derivative products of conventional banks either investment, buy and sell, saving and loan, which is not in accordance with Islamic Ethics. While the majority population in Indonesia are belief in Islam, which Islam has had financial management guide is written in the Quran, the Hadith, as well as the opinions of experts who strongly prohibits the use of interest in each transaction activities. Many different expert opinions on the application of the Islamic financial system in Indonesia. However, as the majority of the population of Indonesia, Islamic community have not been able to get the opportunities to choose the Islamic financial system that has mutual benefit between consumers and banks, particularly fairness in transactions, ethical investment, uphold the values of solidarity and brotherhood in every transaction activities, and avoid speculation. In this paper, we will discuss the reasons for the importance of providing an option for Islamic community as the majority of the population of Indonesia to use the banking system which adopted the Islamic ethical values that have been much discussed by other researchers in various countries. The existence of this research is expected to Government, academia and the general public aware of the urgency of Islamic economic system implementation in Indonesian banking as the solution and justice especially for the Islamic community to use the values which they held.

Keywords: Islamic economic system, conventional system, Islamic value, banking

Procedia PDF Downloads 340
584 Retaining Users in a Commercially-Supported Social Network

Authors: Sasiphan Nitayaprapha

Abstract:

A commercially-supported social network has become an emerging channel for an organization to communicate with and provide services to customers. The success of the commercially-supported social network depends on the ability of the organization to keep the customers in participating in the network. Drawing from the theories of information adoption, information systems continuance, and web usability, the author develops a model to explore how a commercially-supported social network can encourage customers to continue participating and using the information in the network. The theoretical model will be proved through an online survey of customers using the commercially-supported social networking sites of several high technology companies operating in the same sector. The result will be compared with previous studies to learn about the explanatory power of the research model, and to identify the main factors determining users’ intention to continue using a commercially-supported social network. Theoretical and practical implications, and limitations are discussed.

Keywords: social network, information adoption, information systems continuance, web usability, user satisfaction

Procedia PDF Downloads 294
583 The Dark Triad’s Moral Labyrinth: Differentiating Cognitive Processes Involved in Machiavellianism and Psychopathy

Authors: Megan E. Davies

Abstract:

With the intention of identifying cognitive processes uniquely involved in the dark triad personality traits of psychopathy, Machiavellianism, and narcissism, this study aimed to determine further potential differences and parameters of individual traits by explaining a statistically significant amount of variance between the constructs of manipulativeness, impulsiveness, grit, and need for cognition within the dark triad. Applying a cross-sectional design, N = 96 participants self-reported using the MACH-IV, SRP-III, NFC-S, and Grit Scale for Perseverance and Passion for Long-Term Goals. Hierarchical regression analyses showed that only manipulativeness predicted Machiavellianism, whereas manipulativeness and impulsiveness were found to have predictive qualities for psychopathy. Overall, these results found areas of discrepancy and overlap between manipulation and impulsivity regarding psychopathy and Machiavellianism. Additionally, this study serves to preliminarily eliminate the Need for Cognition and grit as predictive variables for Machiavellianism and psychopathy.

Keywords: Machiavellianism, psychopathy, manipulation, impulsiveness, need for cognition, grit, dark triad

Procedia PDF Downloads 78
582 Cultural Knowledge Transfer of the Inherited Karen Backstrap Weaving for the 4th Generation of a Pwo Karen Community

Authors: Suphitcha Charoen-Amornkitt, Chokeanand Bussracumpakorn

Abstract:

The tendency of the Karen backstrap weaving succession has gradually decreased due to the difficulty of weaving techniques and the relocation of the young generation. The Yang Nam Klat Nuea community, Nong Ya Plong District, Phetchaburi, is a Pwo Karen community that is seriously confronted with a lack of cultural heritage. Thus, a group of weavers was formed to revive the knowledge of weaving. However, they have been gradually confronted with culture assimilation to mainstream culture from the desire for marketing acceptance and imperative and forced the extinction of culture due to the disappearance of weaving details and techniques. Although there are practical solutions, i.e., product development, community improvement, knowledge improvement, and knowledge transfer, to inherit the Karen weaving culture, people in the community cannot fulfill their deep intention about the weaving inheritance as most solutions have focused on developing the commercial products and making the income instead of inheriting their knowledge. This research employed qualitative user research with an in-depth user interview to study communal knowledge transfer succession based on the internal involved parties, i.e., four expert weavers, three young weavers, and three 4th generation villagers. The purpose is to explore the correlation and mindset of villagers towards the culture with specific issues, including the psychology of culture, core knowledge and learning methods, cultural inheritance, and cultural engagement. As a result, the existing models of knowledge management mostly focused on tangible strategies, which can notice progress in short terms, such as direct teaching and consistent practicing. At the same time, the motivation and passion of inheritors were abolished while the research found that the young generation who profoundly connected with the textile culture will have a more significant intention to continue the culture. Therefore, this research suggests both internal and external solutions to treat the community. Regarding the internal solutions, family, weaving group, and school have an important role to participate with young villagers by encouraging activities to support the cultivating of Karen’s history, understanding their identities, and adapting the culture as a part of daily life. At the same time, collecting all of the knowledge in the archives, e.g., recorded video, instruction, and books, can crucially prevent the culture from extinction. Regarding the external solutions, this study suggests that working with social media will enhance the intimacy of textile culture, while the community should relieve the roles in marketing competition and start to drive cultural experiences to create a new market position. In conclusion, this research intends to explore the causes and motivation to support the transfer of the culture to the 4th generation villagers and to raise awareness of the diversity of culture in society. With these suggestions and the desire to improve pride and confidence in culture, the community agrees that strengthening the relationships between the young villagers and the weaving culture can bring attention and interest back to the weaving culture.

Keywords: Pwo Karen textile culture, backstrap weaving succession, cultural inheritance, knowledge transfer, knowledge management

Procedia PDF Downloads 67
581 Window Display Design of Thai Craft Product Affecting Perceptions of Thai and Foreign Tourists

Authors: Kanokwan Somoon, Chumporn Moorapun

Abstract:

A product’s perceived value may increase purchase intention. Value perceptions may differ among cultures. Window displays can be used to increase products’ information and value. This study aims to investigate the relationship between window display design elements and value perceptions of local products between two different cultures. The research methodology is based on survey research. Several window displays in favorite of tourist spots were selected as a unit of study. Also, 100 tourists (56 Thai tourists and 44 foreign tourists) were asked to complete a questionnaire. T-Tests were used to analyze the comparison. Then, the results were compared to Thai and foreign tourists. Finally, the results find that Thai and foreign tourists have different perception towards three design elements that are size of the window, props and colour lighting. The differences of their perceptions signify the different cultural values they adhere to.

Keywords: cross-culture, window display, Thai craft product, environmental perception

Procedia PDF Downloads 255
580 Long-term Care Facility for the Elderly and Its Relationship with Energy Efficiency

Authors: Gabriela Sardinha Pacheco

Abstract:

In a context of elderly population growth, the need to provide high quality infrastructure and services to these people becomes even more evident. The act of designing a space dedicated to elderly people goes beyond the concept of well-being and reaches to a point of evaluating and changing the way which society sees this part of the population as well as how it can build a relationship with energy efficiency. In this context, the care facilities for elderly have an extremely important role to provide this infrastructure to the population. A common issue is that, for many times, these facilities face financial issues, and the full operation of the establishment can be impacted. The intention of this work is to develop a project in which the energy efficiency measures can be lived daily and that the residents of the institution can participate actively, directly, or indirectly in the construction of this relationship. The use of energy efficiency strategies should become a natural process when thinking about buildings as it is an essential step to provide increased well-being, climate change mitigation, and cost reduction.

Keywords: energy efficiency, environmental comfort, long-term care facility, well-being

Procedia PDF Downloads 36
579 A Comparative Analysis of Asymmetric Encryption Schemes on Android Messaging Service

Authors: Mabrouka Algherinai, Fatma Karkouri

Abstract:

Today, Short Message Service (SMS) is an important means of communication. SMS is not only used in informal environment for communication and transaction, but it is also used in formal environments such as institutions, organizations, companies, and business world as a tool for communication and transactions. Therefore, there is a need to secure the information that is being transmitted through this medium to ensure security of information both in transit and at rest. But, encryption has been identified as a means to provide security to SMS messages in transit and at rest. Several past researches have proposed and developed several encryption algorithms for SMS and Information Security. This research aims at comparing the performance of common Asymmetric encryption algorithms on SMS security. The research employs the use of three algorithms, namely RSA, McEliece, and RABIN. Several experiments were performed on SMS of various sizes on android mobile device. The experimental results show that each of the three techniques has different key generation, encryption, and decryption times. The efficiency of an algorithm is determined by the time that it takes for encryption, decryption, and key generation. The best algorithm can be chosen based on the least time required for encryption. The obtained results show the least time when McEliece size 4096 is used. RABIN size 4096 gives most time for encryption and so it is the least effective algorithm when considering encryption. Also, the research shows that McEliece size 2048 has the least time for key generation, and hence, it is the best algorithm as relating to key generation. The result of the algorithms also shows that RSA size 1024 is the most preferable algorithm in terms of decryption as it gives the least time for decryption.

Keywords: SMS, RSA, McEliece, RABIN

Procedia PDF Downloads 143
578 An Empirical Investigation of Mobile Banking Services Adoption in Pakistan

Authors: Aijaz A. Shaikh, Richard Glavee-Geo, Heikki Karjaluoto

Abstract:

Adoption of Information Systems (IS) is receiving increasing attention such that its implications have been closely monitored and studied by the IS management community, industry and professional gatekeepers. Building on previous research regarding the adoption of technology, this paper develops and validates an integrated model of the adoption of mobile banking. The model originates from the Technology Acceptance Model (TAM) and the Theory of Planned Behaviour (TPB). This paper intends to offer a preliminary scrutiny of the antecedents of the adoption of mobile banking services in the context of a developing country. Data was collected from Pakistan. The findings showed that an integrated TAM and TPB model greatly explains the adoption intention of mobile banking; and perceived behavioural control and its antecedents play a significant role in predicting adoption Theoretical and managerial implications of findings are presented and discussed.

Keywords: developing country, mobile banking service adoption, technology acceptance model, theory of planned behavior

Procedia PDF Downloads 395
577 The Effect of Brand Mascots on Consumers' Purchasing Behaviors

Authors: Isari Pairoa, Proud Arunrangsiwed

Abstract:

Brand mascots are the cartoon characters, which are mainly designed for advertising or other related marketing purposes. Many brand mascots are extremely popular, since they were presented in commercial advertisements and Line Stickers. Brand Line Stickers could lead the users to identify with the brand and brand mascots, where might influence users to become loyal customers, and share the identity with the brand. The objective of the current study is to examine the effect of brand mascots on consumers’ decision and consumers’ intention to purchase the product. This study involved 400 participants, using cluster sampling from 50 districts in Bangkok metropolitan area. The descriptive analysis shows that using brand mascot causes consumers' positive attitude toward the products, and also heightens the possibility to purchasing the products. The current study suggests the new type of marketing strategy, which is brand fandom. This study has also contributed the knowledge to the area of integrated marketing communication and identification theory.

Keywords: brand mascot, consumers’ behavior, marketing communication, purchasing

Procedia PDF Downloads 235
576 Analysis of the Reaction to the Fire of a Composite Material the Base of Scrapes of Tires and Latex for Thermal Isolation in Vehicles

Authors: Elmo Thiao Lins Cöuras Ford, Valentina Alessandra Carvalho do Vale, R. M. Nascimento, J. U. L. Mendes

Abstract:

Now the great majority of the applications of thermal isolation in the strip of drops and averages temperatures (up to 200ºC), it is made being used from aggressive materials to the nature such an as: glass wool, rock wool, polystyrene, EPS among others. Such materials, in spite of the effectiveness in the retention of the flow of heat, possess considerable cost and when discarded they are long years to be to decompose. In that context, trying to adapt the world politics the about of the preservation of the environment, a study began with intention of developing a material composite, with properties of thermal, originating from insulating industrial residues. In this research, the behavior of the composite was analyzed, as submitted the fire. For this, the reaction rehearsals were accomplished to the fire for the composites 2:1; 1:1; 1:2 and for the latex, based in the "con" experiment in agreement with the norm ASTM–E 1334-90. As consequence, in function of the answers of the system, was possible to observe to the acting of each mixture proportion.

Keywords: composite, Latex, reacion to the fire, thermal isolation

Procedia PDF Downloads 416
575 The Role of Entrepreneurship Education in Developing the Entrepreneurial Passion: A Gender Comparative Study

Authors: Rabeeya Raoof, Abrar Ul-Haq, Muhammad Arshad

Abstract:

The current study is trying to explain the relationship between entrepreneurial education and entrepreneurial passion. This study introduces multiple mechanisms by which entrepreneurial education may induce entrepreneurial passion in business graduates. With the help of expectancy theory, we proposed that entrepreneurial education develops entrepreneurial passion through the mediation of desirability and feasibility. Furthermore, desirability is also influencing feasibility. Therefore, desirability and feasibility may also play their role as double mediators in the relationship between entrepreneurial education and passion. The role of gender has become very vital in entrepreneurship studies. Therefore, we also incorporated the role of gender as a moderator while studying the indirect effect of entrepreneurial education on entrepreneurial passion via desirability and feasibility. We proposed that entrepreneurial education may influence the passion of male individuals primarily through feasibility. On the other hand, entrepreneurial education may impact on the entrepreneurial passion of female individuals primarily through the mediation of desirability. Learning orientation may increase the direct effect of entrepreneurial education on entrepreneurial passion.

Keywords: entrepreneurial passion, perceived desirability, perceived feasibility, entrepreneurial intention

Procedia PDF Downloads 88
574 Students' Willingness to Accept Virtual Lecturing Systems: An Empirical Study by Extending the UTAUT Model

Authors: Ahmed Shuhaiber

Abstract:

The explosion of the World Wide Web and the electronic trend of university teaching have transformed the learning style to become more learner-centred, Which has popularized the digital delivery of mediated lectures as an alternative or an adjunct to traditional lectures. Despite its potential and popularity, virtual lectures have not been adopted yet in Jordanian universities. This research aimed to fill this gap by studying the factors that influence student’s willingness to accept virtual lectures in one Jordanian University. A quantitative approach was followed by obtaining 216 survey responses and statistically applying the UTAUT model with some modifications. Results revealed that performance expectancy, effort expectancy, social influences and self-efficacy could significantly influence student’s attitudes towards virtual lectures. Additionally, facilitating conditions and attitudes towards virtual lectures were found with significant influence on student’s intention to take virtual lectures. Research implications and future work were specified afterwards.

Keywords: E-learning, student willingness, UTAUT, virtual Lectures, web-based learning systems

Procedia PDF Downloads 272
573 Students’ Perceptions on Educational Game for Learning Programming Subject: A Case Study

Authors: Roslina Ibrahim, Azizah Jaafar, Khalili Khalil

Abstract:

Educational games (EG) are regarded as a promising teaching and learning tool for the new generation. Growing number of studies and literatures can be found in EG studies. Both academic researchers and commercial developers come out with various educational games prototypes and titles. Despite that, acceptance of educational games still lacks among the students. It is important to understanding students’ perceptions of EG, since they are the main stakeholder of the technology. Thus, this study seeks to understand perceptions of undergraduates’ students using a framework originated from user acceptance theory. The framework consists of six constructs with twenty-eight items. Data collection was done on 180 undergraduate students of Universiti Teknologi Malaysia, Kuala Lumpur using self-developed online EG called ROBO-C. Data analysis was done using descriptive, factor analysis and correlations. Performance expectancy, effort expectancy, attitude, and enjoyment factors were found significantly correlated with the intention to use EG. This study provides more understanding towards the use of educational games among students.

Keywords: educational games, perceptions, acceptance, UTAUT

Procedia PDF Downloads 391
572 Consortium Blockchain-based Model for Data Management Applications in the Healthcare Sector

Authors: Teo Hao Jing, Shane Ho Ken Wae, Lee Jin Yu, Burra Venkata Durga Kumar

Abstract:

Current distributed healthcare systems face the challenge of interoperability of health data. Storing electronic health records (EHR) in local databases causes them to be fragmented. This problem is aggravated as patients visit multiple healthcare providers in their lifetime. Existing solutions are unable to solve this issue and have caused burdens to healthcare specialists and patients alike. Blockchain technology was found to be able to increase the interoperability of health data by implementing digital access rules, enabling uniformed patient identity, and providing data aggregation. Consortium blockchain was found to have high read throughputs, is more trustworthy, more secure against external disruptions and accommodates transactions without fees. Therefore, this paper proposes a blockchain-based model for data management applications. In this model, a consortium blockchain is implemented by using a delegated proof of stake (DPoS) as its consensus mechanism. This blockchain allows collaboration between users from different organizations such as hospitals and medical bureaus. Patients serve as the owner of their information, where users from other parties require authorization from the patient to view their information. Hospitals upload the hash value of patients’ generated data to the blockchain, whereas the encrypted information is stored in a distributed cloud storage.

Keywords: blockchain technology, data management applications, healthcare, interoperability, delegated proof of stake

Procedia PDF Downloads 118
571 Genomic and Evolutionary Diversity of Long Terminal Repeat (LTR) Retrotransposons in Date Palm (Phoenix dactylifera)

Authors: Faisal Nouroz, Mukaramin Mukaramin

Abstract:

Of the transposable elements (TEs), the retrotransposons are the most copious elements identified from many sequenced genomes. They have played a major role in genome evolution, rearrangement, and expansions based on their copy and paste mode of proliferation. They are further divided into LTR and Non-LTR retrotransposons. The purpose of the current study was to identify the LTR REs in sequenced Phoenix dactylifera genome and to study their structural diversity. A total of 150 P. dactylifera BAC sequences with > 60kb sizes were randomly retrieved from National Center for Biotechnology Information (NCBI) database and screened for the presence of LTR retrotransposons. Seven bacterial artificial chromosomes (BAC) sequences showed full-length LTR Retrotransposons with 4 Copia and 3 Gypsy families having variable copy numbers in respective families. Reverse transcriptase (RT) domain was found as the most conserved domain among Copia and Gypsy superfamilies and was used to deduce evolutionary analysis. The amino acid residues among various RT sequences showed variability in their percentages indicating post divergence evolution. Amino acid Leucine was found in highest proportions followed by Lysine, while Methionine and Tryptophan were in lowest percentages. The phylogenetic analysis based on RT domains confirmed that although having most conserved RT regions, several evolutionary events occurred causing nucleotide polymorphisms and hence clustering of Gypsy and Copia superfamilies into their respective lineages. The study will be helpful in identification and annotation of these elements in other species and genera and their distribution patterns on chromosomes by fluorescent in situ hybridization techniques.

Keywords: transposable elements, Phoenix dactylifera, retrotransposons, phylogenetic analysis

Procedia PDF Downloads 113
570 Enunciation on Complexities of Selected Tree Searching Algorithms

Authors: Parag Bhalchandra, S. D. Khamitkar

Abstract:

Searching trees is a most interesting application of Artificial Intelligence. Over the period of time, many innovative methods have been evolved to better search trees with respect to computational complexities. Tree searches are difficult to understand due to the exponential growth of possibilities when increasing the number of nodes or levels in the tree. Usually it is understood when we traverse down in the tree, traverse down to greater depth, in the search of a solution or a goal. However, this does not happen in reality as explicit enumeration is not a very efficient method and there are many algorithmic speedups that will find the optimal solution without the burden of evaluating all possible trees. It was a common question before all researchers where they often wonder what algorithms will yield the best and fastest result The intention of this paper is two folds, one to review selected tree search algorithms and search strategies that can be applied to a problem space and the second objective is to stimulate to implement recent developments in the complexity behavior of search strategies. The algorithms discussed here apply in general to both brute force and heuristic searches.

Keywords: trees search, asymptotic complexity, brute force, heuristics algorithms

Procedia PDF Downloads 288
569 Analysis of Intra-Varietal Diversity for Some Lebanese Grapevine Cultivars

Authors: Stephanie Khater, Ali Chehade, Lamis Chalak

Abstract:

The progressive replacement of the Lebanese autochthonous grapevine cultivars during the last decade by the imported foreign varieties almost resulted in the genetic erosion of the local germplasm and the confusion with cultivars' names. Hence there is a need to characterize these local cultivars and to assess the possible existing variability at the cultivar level. This work was conducted in an attempt to evaluate the intra-varietal diversity within Lebanese traditional cultivars 'Aswad', 'Maghdoushe', 'Maryame', 'Merweh', 'Meksese' and 'Obeide'. A total of 50 accessions distributed over five main geographical areas in Lebanon were collected and submitted to both ampelographic description and ISSR DNA analysis. A set of 35 ampelographic descriptors previously established by the International Office of Vine and Wine and related to leaf, bunch, berry, and phenological stages, were examined. Variability was observed between accessions within cultivars for blade shape, density of prostrate and erect hairs, teeth shape, berry shape, size and color, cluster shape and size, and flesh juiciness. At the molecular level, nine ISSR (inter-simple sequence repeat) primers, previously developed for grapevine, were used in this study. These primers generated a total of 35 bands, of which 30 (85.7%) were polymorphic. Totally, 29 genetic profiles were differentiated, of which 9 revealed within 'Obeide', 6 for 'Maghdoushe', 5 for 'Merweh', 4 within 'Maryame', 3 for 'Aswad' and 2 within 'Meksese'. Findings of this study indicate the existence of several genotypes that form the basis of the main indigenous cultivars grown in Lebanon and which should be further considered in the establishment of new vineyards and selection programs.

Keywords: ampelography, autochthonous cultivars, ISSR markers, Lebanon, Vitis vinifera L.

Procedia PDF Downloads 122
568 Powering Connections: Synergizing Sales and Marketing for Electronics Engineering with Web Development.

Authors: Muhammad Awais Kiani, Abdul Basit Kiani, Maryam Kiani

Abstract:

Synergizing Sales and Marketing for Electronics Engineering with Web Development, explores the dynamic relationship between sales, marketing, and web development within the electronics engineering industry. This study is important for the power of digital platforms to connect with customers. Which increases brand visibility and drives sales. It highlights the need for collaboration between sales and marketing teams, as well as the integration of web development strategies to create seamless user experiences and effective lead generation. Furthermore, It also emphasizes the role of data analytics and customer insights in optimizing sales and marketing efforts in the ever-evolving landscape of electronics engineering. Sales and marketing play a crucial role in driving business growth, and in today's digital landscape, web development has become an integral part of these strategies. Web development enables businesses to create visually appealing and user-friendly websites that effectively showcase their products or services. It allows for the integration of e-commerce functionalities, enabling seamless online transactions. Furthermore, web development helps businesses optimize their online presence through search engine optimization (SEO) techniques, social media integration, and content management systems. This abstract highlights the symbiotic relationship between sales marketing in the electronics industry and web development, emphasizing the importance of a strong online presence in achieving business success.

Keywords: electronics industry, web development, sales, marketing

Procedia PDF Downloads 91
567 Consumer Trust and Online Payment Options: Determinants of E-Commerce in the Least Developed Countries

Authors: Mohamed Muse Hassan

Abstract:

Selling through the Internet is changing the norms of doing business globally. Today, selling and buying from the Internet is not only an option but the dominant form of shopping. But, this phenomenon is not thriving in the developing countries, mainly in Africa. Therefore, although previous studies focused on the e-retailers’ side, this study investigates the effect of consumer trust and online payment options on the awareness and perception of e-commerce in Africa. We developed a five-construct model and empirically tested the model by targeting professionals and college students who reside in Somalia. We employed structural equation modeling (SEM) technique for path analysis to probe answers for the variables under study. The main findings of the study show that there is significant evidence that online payment option impacts both the awareness level and perception of e-commerce in Somalia. Consumer trust was also found to determine both the awareness and perception of online shopping in the country. Moreover, the current global payment options available ignore local technologies popular in Africa. For example, the inclusion of a mobile payment option alone would make a big difference in Africa. The paper also determined that consumer trust toward online retailers is very low and this can be solved if consumers are given assurances for their financial transactions. The paper concludes that increased online payment options are needed in Somalia and, in Africa, in general. Limitations and further research suggestions are also included at the end of this paper.

Keywords: Africa, consumer trust, e-commerce, online payment

Procedia PDF Downloads 226
566 Clothes Identification Using Inception ResNet V2 and MobileNet V2

Authors: Subodh Chandra Shakya, Badal Shrestha, Suni Thapa, Ashutosh Chauhan, Saugat Adhikari

Abstract:

To tackle our problem of clothes identification, we used different architectures of Convolutional Neural Networks. Among different architectures, the outcome from Inception ResNet V2 and MobileNet V2 seemed promising. On comparison of the metrices, we observed that the Inception ResNet V2 slightly outperforms MobileNet V2 for this purpose. So this paper of ours proposes the cloth identifier using Inception ResNet V2 and also contains the comparison between the outcome of ResNet V2 and MobileNet V2. The document here contains the results and findings of the research that we performed on the DeepFashion Dataset. To improve the dataset, we used different image preprocessing techniques like image shearing, image rotation, and denoising. The whole experiment was conducted with the intention of testing the efficiency of convolutional neural networks on cloth identification so that we could develop a reliable system that is good enough in identifying the clothes worn by the users. The whole system can be integrated with some kind of recommendation system.

Keywords: inception ResNet, convolutional neural net, deep learning, confusion matrix, data augmentation, data preprocessing

Procedia PDF Downloads 165
565 Intelligent Agent-Based Model for the 5G mmWave O2I Technology Adoption

Authors: Robert Joseph M. Licup

Abstract:

The deployment of the fifth-generation (5G) mobile system through mmWave frequencies is the new solution in the requirement to provide higher bandwidth readily available for all users. The usage pattern of the mobile users has moved towards either the work from home or online classes set-up because of the pandemic. Previous mobile technologies can no longer meet the high speed, and bandwidth requirement needed, given the drastic shift of transactions to the home. The millimeter-wave (mmWave) underutilized frequency is utilized by the fifth-generation (5G) cellular networks that support multi-gigabit-per-second (Gbps) transmission. However, due to its short wavelengths, high path loss, directivity, blockage sensitivity, and narrow beamwidth are some of the technical challenges that need to be addressed. Different tools, technologies, and scenarios are explored to support network design, accurate channel modeling, implementation, and deployment effectively. However, there is a big challenge on how the consumer will adopt this solution and maximize the benefits offered by the 5G Technology. This research proposes to study the intricacies of technology diffusion, individual attitude, behaviors, and how technology adoption will be attained. The agent based simulation model shaped by the actual applications, technology solution, and related literature was used to arrive at a computational model. The research examines the different attributes, factors, and intricacies that can affect each identified agent towards technology adoption.

Keywords: agent-based model, AnyLogic, 5G O21, 5G mmWave solutions, technology adoption

Procedia PDF Downloads 83
564 Allele Mining for Rice Sheath Blight Resistance by Whole-Genome Association Mapping in a Tail-End Population

Authors: Naoki Yamamoto, Hidenobu Ozaki, Taiichiro Ookawa, Youming Liu, Kazunori Okada, Aiping Zheng

Abstract:

Rice sheath blight is one of the destructive fungal diseases in rice. We have thought that rice sheath blight resistance is a polygenic trait. Host-pathogen interactions and secondary metabolites such as lignin and phytoalexins are likely to be involved in defense against R. solani. However, to our knowledge, it is still unknown how sheath blight resistance can be enhanced in rice breeding. To seek for an alternative genetic factor that contribute to sheath blight resistance, we mined relevant allelic variations from rice core collections created in Japan. Based on disease lesion length on detached leaf sheath, we selected 30 varieties of the top tail-end and the bottom tail-end, respectively, from the core collections to perform genome-wide association mapping. Re-sequencing reads for these varieties were used for calling single nucleotide polymorphisms among the 60 varieties to create a SNP panel, which contained 1,137,131 homozygous variant sites after filitering. Association mapping highlighted a locus on the long arm of chromosome 11, which is co-localized with three sheath blight QTLs, qShB11-2-TX, qShB11, and qSBR-11-2. Based on the localization of the trait-associated alleles, we identified an ankyryn repeat-containing protein gene (ANK-M) as an uncharacterized candidate factor for rice sheath blight resistance. Allelic distributions for ANK-M in the whole rice population supported the reliability of trait-allele associations. Gene expression characteristics were checked to evaluiate the functionality of ANK-M. Since an ANK-M homolog (OsPIANK1) in rice seems a basal defense regulator against rice blast and bacterial leaf blight, ANK-M may also play a role in the rice immune system.

Keywords: allele mining, GWAS, QTL, rice sheath blight

Procedia PDF Downloads 57