Search results for: phone users
2195 Music of the Openings’ Japanese Animes as a Tool for People with Reduced Visibility: The Case of Shingeki No Kyojin (Attack on Titan)
Authors: María Del Carmen Baena Lupiáñez
Abstract:
Music has been considered for decades as a tool to express emotions. In the case of people with some physical disabilities, they are able to develop what is known as echolocation. It means that the development of some of the senses to compensate the lack of one of them. For instance, it has been proved that people with reduced visibility have a more developed hearing capacity. In series or films, music is fundamental to contextualize the viewer in the story. Music becomes an indispensable element to make people with reduced visibility to understand the plot and to avoid ambiguities, in the absence of an audio description. Since the songs of Japanese animes have not been as studied as other soundtracks from this point of view to our knowledge, the three openings of the anime Shingeki no Kyojin have been chosen to carry out the experiment from which this study will start. It will test the perceptions of people with reduced visibility by reproducing the three opening songs of Shingeki no Kyojin and asking the users questions related to their thoughts about the anime, their feelings when listening to these songs and the possible story that this anime could be about. In fact, users could identify in general the plot of the story and their perceptions corresponded to what the songs should transmit, taking into account its chords and harmonies.Keywords: anime, argumental contextualization, echolocations, emotions
Procedia PDF Downloads 2022194 Decision Analysis Module for Excel
Authors: Radomir Perzina, Jaroslav Ramik
Abstract:
The Analytic Hierarchy Process is frequently used approach for solving decision making problems. There exists wide range of software programs utilizing that approach. Their main disadvantage is that they are relatively expensive and missing intermediate calculations. This work introduces a Microsoft Excel add-in called DAME – Decision Analysis Module for Excel. Comparing to other computer programs DAME is free, can work with scenarios or multiple decision makers and displays intermediate calculations. Users can structure their decision models into three levels – scenarios/users, criteria and variants. Items on all levels can be evaluated either by weights or pair-wise comparisons. There are provided three different methods for the evaluation of the weights of criteria, the variants as well as the scenarios – Saaty’s Method, Geometric Mean Method and Fuller’s Triangle Method. Multiplicative and additive syntheses are supported. The proposed software package is demonstrated on couple of illustrating examples of real life decision problems.Keywords: analytic hierarchy process, multi-criteria decision making, pair-wise comparisons, Microsoft Excel, scenarios
Procedia PDF Downloads 4522193 Users and Non-Users of Social Media: An Exploratory Study of Rural Women in Eastern Uttar Pradesh
Authors: Neha Bhushan
Abstract:
For the purpose of this study a village of district Azamgarh has been selected which is a part of the most populous and backward state of the country, Uttar Pradesh. In the age of information, everyone has the right to acquire information and it becomes important to assess the acceptance and non-acceptance of social media among rural population. Rural women of the state are showing positive trends in the form of increased social media and mobile usage. This study is an effort to know the purpose of rural women for using social media. The study design is exploratory and qualitative in nature. Data collection primarily consisted of 25 semi-structured individual interviews having 10 open-ended specific questions in one of the villages of Azamgarh district of Eastern Uttar Pradesh. Sampling approach is flexible and situational. Data reveals that rural women have become active on social media since last six months to one year. Most of them are using Facebook, Whatsapp, and YouTube for the purpose of interaction, learning new skills, checking out recipes and latest fashion. This pilot study gives a bird eye view of the problem and opens door for exploring this least explored area.Keywords: exploratory research, mobile usage, rural women, social media
Procedia PDF Downloads 1452192 Dependency on Social Media and Psychological Well-Being among Young Adults: Case Study of University Students in Pakistan
Authors: Ghazala Yasmeen, Zahid Yousaf
Abstract:
Frequent social media use has significantly changed people's life and communication styles during the last two decades. Social media use has multiple dimensions, and there are nuanced relationships between it and how it affects different societal subgroups. With the increased popularity and rapid growth of social networking sites, people are experiencing potential social media addiction, which causes severe mental health problems. How social media is dramatically influencing the lives and mental health of its users, and particularly of the students, creating psychological issues, e.g., isolation, depression, and anxiety, will be the primary objective of this study. This research will address the problems confronted by many students who are regular social media users and can undergo mental distress. This study aims to explore how social media use can lead to isolation, depression, and anxiety. This research will also investigate the effects of cyber-bullying on social, emotional, and psychological wellbeing. For this purpose, the researcher will use the survey technique as a method of inquiry. Ryff's theory of Psychological wellbeing will be used as a theoretical framework to explore the association between social media addiction and psychological effects among users. For data collection, the researcher will use the quantitative research method through a survey questionnaire from three universities in Pakistan from the public and private sectors. This study will imply a two-stage random sampling technique. At first, the researcher will select 20% of students from universities. In the second stage, 20% of students using different social networking sites will be chosen, and draw a representative sample from these will be. The intended study will use questionnaires comprising two portions. The first section will consist of social media engagement by the students, following impacts on their mental health and reported attitude towards psychological wellbeing. This study will spotlight the considerations of parents, educationists, and policymakers to take measures against the devastating effects of cyber-crimes on young adults.Keywords: anxiety, depression, isolation, social media, wellbeing
Procedia PDF Downloads 802191 Education-based, Graphical User Interface Design for Analyzing Phase Winding Inter-Turn Faults in Permanent Magnet Synchronous Motors
Authors: Emir Alaca, Hasbi Apaydin, Rohullah Rahmatullah, Necibe Fusun Oyman Serteller
Abstract:
In recent years, Permanent Magnet Synchronous Motors (PMSMs) have found extensive applications in various industrial sectors, including electric vehicles, wind turbines, and robotics, due to their high performance and low losses. Accurate mathematical modeling of PMSMs is crucial for advanced studies in electric machines. To enhance the effectiveness of graduate-level education, incorporating virtual or real experiments becomes essential to reinforce acquired knowledge. Virtual laboratories have gained popularity as cost-effective alternatives to physical testing, mitigating the risks associated with electrical machine experiments. This study presents a MATLAB-based Graphical User Interface (GUI) for PMSMs. The GUI offers a visual interface that allows users to observe variations in motor outputs corresponding to different input parameters. It enables users to explore healthy motor conditions and the effects of short-circuit faults in the one-phase winding. Additionally, the interface includes menus through which users can access equivalent circuits related to the motor and gain hands-on experience with the mathematical equations used in synchronous motor calculations. The primary objective of this paper is to enhance the learning experience of graduate and doctoral students by providing a GUI-based approach in laboratory studies. This interactive platform empowers students to examine and analyze motor outputs by manipulating input parameters, facilitating a deeper understanding of PMSM operation and control.Keywords: magnet synchronous motor, mathematical modelling, education tools, winding inter-turn fault
Procedia PDF Downloads 532190 Book Exchange System with a Hybrid Recommendation Engine
Authors: Nilki Upathissa, Torin Wirasinghe
Abstract:
This solution addresses the challenges faced by traditional bookstores and the limitations of digital media, striking a balance between the tactile experience of printed books and the convenience of modern technology. The book exchange system offers a sustainable alternative, empowering users to access a diverse range of books while promoting community engagement. The user-friendly interfaces incorporated into the book exchange system ensure a seamless and enjoyable experience for users. Intuitive features for book management, search, and messaging facilitate effortless exchanges and interactions between users. By streamlining the process, the system encourages readers to explore new books aligned with their interests, enhancing the overall reading experience. Central to the system's success is the hybrid recommendation engine, which leverages advanced technologies such as Long Short-Term Memory (LSTM) models. By analyzing user input, the engine accurately predicts genre preferences, enabling personalized book recommendations. The hybrid approach integrates multiple technologies, including user interfaces, machine learning models, and recommendation algorithms, to ensure the accuracy and diversity of the recommendations. The evaluation of the book exchange system with the hybrid recommendation engine demonstrated exceptional performance across key metrics. The high accuracy score of 0.97 highlights the system's ability to provide relevant recommendations, enhancing users' chances of discovering books that resonate with their interests. The commendable precision, recall, and F1score scores further validate the system's efficacy in offering appropriate book suggestions. Additionally, the curve classifications substantiate the system's effectiveness in distinguishing positive and negative recommendations. This metric provides confidence in the system's ability to navigate the vast landscape of book choices and deliver recommendations that align with users' preferences. Furthermore, the implementation of this book exchange system with a hybrid recommendation engine has the potential to revolutionize the way readers interact with printed books. By facilitating book exchanges and providing personalized recommendations, the system encourages a sense of community and exploration within the reading community. Moreover, the emphasis on sustainability aligns with the growing global consciousness towards eco-friendly practices. With its robust technical approach and promising evaluation results, this solution paves the way for a more inclusive, accessible, and enjoyable reading experience for book lovers worldwide. In conclusion, the developed book exchange system with a hybrid recommendation engine represents a progressive solution to the challenges faced by traditional bookstores and the limitations of digital media. By promoting sustainability, widening access to printed books, and fostering engagement with reading, this system addresses the evolving needs of book enthusiasts. The integration of user-friendly interfaces, advanced machine learning models, and recommendation algorithms ensure accurate and diverse book recommendations, enriching the reading experience for users.Keywords: recommendation systems, hybrid recommendation systems, machine learning, data science, long short-term memory, recurrent neural network
Procedia PDF Downloads 962189 Measurement of Susceptibility Users Using Email Phishing Attack
Authors: Cindy Sahera, Sarwono Sutikno
Abstract:
Rapid technological developments also have negative impacts, namely the increasing criminal cases based on technology or cybercrime. One technique that can be used to conduct cybercrime attacks are phishing email. The issue is whether the user is aware that email can be misused by others so that it can harm the user's own? This research was conducted to measure the susceptibility of selected targets against email abuse. The objectives of this research are measurement of targets’ susceptibility and find vulnerability in email recipient. There are three steps being taken in this research, (1) the information gathering phase, (2) the design phase, and (3) the execution phase. The first step includes the collection of the information necessary to carry out an attack on a target. The next step is to make the design of an attack against a target. The last step is to send phishing emails to the target. The levels of susceptibility are three: level 1, level 2 and level 3. Level 1 indicates a low level of targets’ susceptibility, level 2 indicates the intermediate level of targets’ susceptibility, and level 3 indicates a high level of targets’ susceptibility. The results showed that users who are on level 1 and level 2 more that level 3, which means the user is not too careless. However, it does not mean the user to be safe. There are still vulnerabilities that may occur, such as automatic location detection when opening emails and automatic downloaded malware as user clicks a link in the email.Keywords: cybercrime, email phishing, susceptibility, vulnerability
Procedia PDF Downloads 2912188 BROTHERS: World-class Ergonomic Sofa Development
Authors: Aminur Rahman
Abstract:
The Unique feature of BROTHERS Furniture sofa stands in ergonomic Design, skilled hand work and art work. Present world market is passing through a contentious competitive situation that is rapidly and dramatic. Competitive strategy concerns how to create competitive advantage in upholstery businesses. In order to competitive advantage in upholstery sofa market, Design and develop a sofa that have to ergonomic features. Design an ergonomic upholstery sofa knowing and understanding the appropriate seat depth, seat height, angle between Seat & back, back height which is concurrent market demand, world class sofa has to incorporate ergonomic factors. The study the relationships between human, seat and context variables comfort and discomfort. We must have conduct market survey among users whose are need and use sofa. Health & safety factors should be examined from a variety of angle. An attractive design and meet customer requirements, ergonomically fit should be considered for sofa development. This paper will explain how to design & develop sofa’s as per standard specifications which have ergonomic features for users all over the world.Keywords: ergonomics, angle between seat & back, standard dimension, seat comfort
Procedia PDF Downloads 1392187 Wireless Sensor Network to Help Low Incomes Farmers to Face Drought Impacts
Authors: Fantazi Walid, Ezzedine Tahar, Bargaoui Zoubeida
Abstract:
This research presents the main ideas to implement an intelligent system composed by communicating wireless sensors measuring environmental data linked to drought indicators (such as air temperature, soil moisture , etc...). On the other hand, the setting up of a spatio temporal database communicating with a Web mapping application for a monitoring in real time in activity 24:00 /day, 7 days/week is proposed to allow the screening of the drought parameters time evolution and their extraction. Thus this system helps detecting surfaces touched by the phenomenon of drought. Spatio-temporal conceptual models seek to answer the users who need to manage soil water content for irrigating or fertilizing or other activities pursuing crop yield augmentation. Effectively, spatio-temporal conceptual models enable users to obtain a diagram of readable and easy data to apprehend. Based on socio-economic information, it helps identifying people impacted by the phenomena with the corresponding severity especially that this information is accessible by farmers and stakeholders themselves. The study will be applied in Siliana watershed Northern Tunisia.Keywords: WSN, database spatio-temporal, GIS, web mapping, indicator of drought
Procedia PDF Downloads 4942186 Searchable Encryption in Cloud Storage
Authors: Ren Junn Hwang, Chung-Chien Lu, Jain-Shing Wu
Abstract:
Cloud outsource storage is one of important services in cloud computing. Cloud users upload data to cloud servers to reduce the cost of managing data and maintaining hardware and software. To ensure data confidentiality, users can encrypt their files before uploading them to a cloud system. However, retrieving the target file from the encrypted files exactly is difficult for cloud server. This study proposes a protocol for performing multikeyword searches for encrypted cloud data by applying k-nearest neighbor technology. The protocol ranks the relevance scores of encrypted files and keywords, and prevents cloud servers from learning search keywords submitted by a cloud user. To reduce the costs of file transfer communication, the cloud server returns encrypted files in order of relevance. Moreover, when a cloud user inputs an incorrect keyword and the number of wrong alphabet does not exceed a given threshold; the user still can retrieve the target files from cloud server. In addition, the proposed scheme satisfies security requirements for outsourced data storage.Keywords: fault-tolerance search, multi-keywords search, outsource storage, ranked search, searchable encryption
Procedia PDF Downloads 3832185 Model of a Context-Aware Middleware for Mobile Workers
Authors: Esraa Moustafa, Gaetan Rey, Stephane Lavirotte, Jean-Yves Tigli
Abstract:
With the development of Internet of Things and Web of Things, computing becomes more pervasive, invisible and present everywhere. In fact, in our environment, we are surrounded by multiple devices that deliver (web) services that meet the needs of the users. However, the mobility of these devices as the users has important repercussions that challenge software design of these applications because the variability of the environment cannot be anticipated at the design time. Thus, it will be interesting to dynamically discover the environment and adapt the application during its execution to the new contextual conditions. We, therefore, propose a model of a context-aware middleware that can address this issue through a monitoring service that is capable of reasoning and observation channels capable of calculating the context during the runtime. The monitoring service evaluates the pre-defined X-Query predicates in the context manager and uses Prolog to deduce the services needed to respond back. An independent Observation Channel for each different predicate is then dynamically generated by the monitoring service depending on the current state of the environment. Each channel sends its result directly to the context manager which consequently calculates the context based on all the predicates’ results while preserving the reactivity of the self-adaptive system.Keywords: auto-adaptation, context-awareness, middleware, reasoning engine
Procedia PDF Downloads 2512184 Accessibility for the Disabled in Public Buildings: The Case of a Nigerian University
Authors: S. P. Akinbogun, P. Oloruntoyin
Abstract:
One of the millennium development goals is the reduction of illiteracy. The state of user friendliness of the educational buildings is expected to play a significant role in the quest, particularly among the physically challenged. This study considers the state of access of educational buildings to disabled on wheel chair and crutches. It draws context from one of the federal universities in Nigeria. The study is basically qualitative; data were collected through structured interview and observation to assess compliance with the prescribed accessibility standard of academic buildings in the Federal University of Technology Akure. The study found that narrow entrances and routes of buildings, raised steps at entrances of the buildings, and ramps were absent. This implies exclusion as it renders most of the buildings inaccessible to wheelchair users. Perhaps, it accounts for low enrolment of wheelchair users in the institution despite many of them in the city. The implication is a challenge in the achievement of the millennium development goal concerning the reduction in the level of illiteracy in the country. The study suggests that government should strictly ensure that public buildings should satisfy or retrofitted to meet disabled access before development approval. This should be followed with the issuance of certificate of compliance upon completion.Keywords: public building, accessibility, physically challenged, education
Procedia PDF Downloads 2202183 A Comparative Study of Natural Language Processing Models for Detecting Obfuscated Text
Authors: Rubén Valcarce-Álvarez, Francisco Jáñez-Martino, Rocío Alaiz-Rodríguez
Abstract:
Cybersecurity challenges, including scams, drug sales, the distribution of child sexual abuse material, fake news, and hate speech on both the surface and deep web, have significantly increased over the past decade. Users who post such content often employ strategies to evade detection by automated filters. Among these tactics, text obfuscation plays an essential role in deceiving detection systems. This approach involves modifying words to make them more difficult for automated systems to interpret while remaining sufficiently readable for human users. In this work, we aim at spotting obfuscated words and the employed techniques, such as leetspeak, word inversion, punctuation changes, and mixed techniques. We benchmark Named Entity Recognition (NER) using models from the BERT family as well as two large language models (LLMs), Llama and Mistral, on XX_NER_WordCamouflage dataset. Our experiments evaluate these models by comparing their precision, recall, F1 scores, and accuracy, both overall and for each individual class.Keywords: natural language processing (NLP), text obfuscation, named entity recognition (NER), deep learning
Procedia PDF Downloads 102182 Review of Urban Vitality in China: Exploring the Theoretical Framework, Characteristics, and Assessment Systems
Abstract:
As China's urban construction enters a new phase of 'stock optimization,' the key point of urban development has shifted to the development and reuse of existing public space. However, cities still face a series of challenges, such as the shortage of space quantity and insufficient space quality, which indirectly affect urban vitality. A review of the vitality of urban public space will significantly contribute to optimizing the quality of the urban built environment. It firstly analyses the research hotspots of urban vitality at home and abroad, based on a semi-systematic literature review. Then this paper summarizes the theoretical definitions of the vitality of urban public space and sorts out the influencing factors from the perspectives of society, environment, and users. Lastly, the paper concludes with the mainstream quantitative and evaluation methods, such as linear evaluation and integrated evaluation. This paper renders a multi-theoretical perspective to understand the characteristics and evaluation system of the vitality of public space, which helps to acknowledge the dynamic relationship between users, urban environment, and vitality. It also looks forward to providing optimal design strategies for constructing a vigorous public space in future cities.Keywords: public space, quantification of vitality, spatial vitality, urban vitality
Procedia PDF Downloads 1112181 Investigating the Challenges and Opportunities for M-Government Implementation in Saudi Arabia
Authors: Anan Alssbaiheen, Steve Love
Abstract:
Given the lack of research into potential opportunities and challenges which are likely to be associated with the implementation of mobile services in developing countries including Saudi Arabia, the research reported here investigated the challenges and opportunities which are associated with the implementation of mobile government services in Saudi Arabia. By collecting data through surveys from 103 Saudi citizens and 46 employees working at the Ministry of Communication and Information Technology Saudi Arabia, this study indicates that the high level of mobile penetration in the country offers an opportunity for Saudi Arabian government to offer mobile government services in the country. The results also suggest that though a large percentage of populations do not have access to mobile technologies, there is still a strong desire among users for the provision of mobile government services. Moreover, the results suggest that effective implementation of mobile government services would help to increase the technological development of Saudi Arabia. However, there are certain challenges which may prevent the effective implementation of such services. First, there does not appear to be a sufficient level of understanding among the Saudi Arabian population about the benefits which are associated with mobile government services. Secondly, the results suggest that the implementation of the services needs to be closely tailored and personalised to the individual needs of target users. Finally, the lack of access to mobile technologies would be a challenge to the successful introduction of these services.Keywords: challenges, e-government, mobile government, opportunities
Procedia PDF Downloads 4152180 Motor Control Recovery Minigame
Authors: Taha Enes Kon, Vanshika Reddy
Abstract:
This project focuses on developing a gamified mobile application to aid in stroke rehabilitation by enhancing motor skills through interactive activities. The primary goal was to design a companion app for a passive haptic rehab glove, incorporating Google MediaPipe for gesture tracking and vibrotactile feedback. The app simulates farming activities, offering a fun and engaging experience while addressing the monotony of traditional rehabilitation methods. The prototype focuses on a single minigame, Flower Picking, which uses gesture recognition to interact with virtual elements, encouraging users to perform exercises that improve hand dexterity. The development process involved creating accessible and user-centered designs using Figma, integrating gesture recognition algorithms, and implementing unity-based game mechanics. Real-time feedback and progressive difficulty levels ensured a personalized experience, motivating users to adhere to rehabilitation routines. The prototype achieved a gesture detection precision of 90%, effectively recognizing predefined gestures such as the Fist and OK symbols. Quantitative analysis highlighted a 40% increase in average session duration compared to traditional exercises, while qualitative feedback praised the app’s immersive design and ease of use. Despite its success, challenges included rigidity in gesture recognition, requiring precise hand orientations, and limited gesture support. Future improvements include expanding gesture adaptability and incorporating additional minigames to target a broader range of exercises. The project demonstrates the potential of gamification in stroke rehabilitation, offering a scalable and accessible solution that complements clinical treatments, making recovery engaging and effective for users.Keywords: stroke rehabilitation, haptic feedback, gamification, MediaPipe, motor control
Procedia PDF Downloads 72179 Motivations and Obstacles in the Implementation of Public Policies Encouraging the Sorting of Organic Waste: The Case of a Metropolis of 400,000 Citizens
Authors: Enola Lamy, Jean Paul Mereaux, Jean Claude Lopez
Abstract:
In the face of new regulations related to waste management, it has become essential to understand the organizational process that accompanies this change. Through an experiment on the sorting of food waste in the community of Grand Reims, this research explores the acceptability, behavior, and tools needed to manage the change. Our position within a private company, SUEZ, a key player in the waste management sector, has allowed us to set up a driven team with concerned public organizations. The research was conducted through a theoretical study combined with semi-structured interviews. This qualitative method allowed us to conduct exchanges with users to assess the motivations and obstacles linked to the sorting of bio-waste. The results revealed the action levers necessary for the project's sustainability. Making the sorting gestures accessible and simplified makes it possible to target all populations. Playful communication adapted to each type of persona allows the user and stakeholders to be placed at the heart of the strategy. These recommendations are spotlighted thanks to the combination of theoretical and operational contributions, with the aim of facilitating the new public management and inducing the notion of performance while providing an example of added value.Keywords: bio-waste, CSR approach, stakeholders, users, perception
Procedia PDF Downloads 842178 Other-Generated Disclosure: A Challenge to Privacy on Social Network Sites
Authors: Tharntip Tawnie Chutikulrungsee, Oliver Kisalay Burmeister, Maumita Bhattacharya, Dragana Calic
Abstract:
Sharing on social network sites (SNSs) has rapidly emerged as a new social norm and has become a global phenomenon. Billions of users reveal not only their own information (self disclosure) but also information about others (other-generated disclosure), resulting in a risk and a serious threat to either personal or informational privacy. Self-disclosure (SD) has been extensively researched in the literature, particularly regarding control of individual and existing privacy management. However, far too little attention has been paid to other-generated disclosure (OGD), especially by insiders. OGD has a strong influence on self-presentation, self-image, and electronic word of mouth (eWOM). Moreover, OGD is more credible and less likely manipulated than SD, but lacks privacy control and legal protection to some extent. This article examines OGD in depth, ranging from motivation to both online and offline impacts, based upon lived experiences from both ‘the disclosed’ and ‘the discloser’. Using purposive sampling, this phenomenological study involves an online survey and in-depth interviews. The findings report the influence of peer disclosure as well as users’ strategies to mitigate privacy issues. This article also calls attention to the challenge of OGD privacy and inadequacies in the law related to privacy protection in the digital domain.Keywords: facebook, online privacy, other-generated disclosure, social networks sites (SNSs)
Procedia PDF Downloads 2522177 AI-based Radio Resource and Transmission Opportunity Allocation for 5G-V2X HetNets: NR and NR-U Networks
Authors: Farshad Zeinali, Sajedeh Norouzi, Nader Mokari, Eduard Jorswieck
Abstract:
The capacity of fifth-generation (5G) vehicle-to-everything (V2X) networks poses significant challenges. To ad- dress this challenge, this paper utilizes New Radio (NR) and New Radio Unlicensed (NR-U) networks to develop a heterogeneous vehicular network (HetNet). We propose a new framework, named joint BS assignment and resource allocation (JBSRA) for mobile V2X users and also consider coexistence schemes based on flexible duty cycle (DC) mechanism for unlicensed bands. Our objective is to maximize the average throughput of vehicles while guaranteeing the WiFi users' throughput. In simulations based on deep reinforcement learning (DRL) algorithms such as deep deterministic policy gradient (DDPG) and deep Q network (DQN), our proposed framework outperforms existing solutions that rely on fixed DC or schemes without consideration of unlicensed bands.Keywords: vehicle-to-everything (V2X), resource allocation, BS assignment, new radio (NR), new radio unlicensed (NR-U), coexistence NR-U and WiFi, deep deterministic policy gradient (DDPG), deep Q-network (DQN), joint BS assignment and resource allocation (JBSRA), duty cycle mechanism
Procedia PDF Downloads 1042176 A Contemporary Advertising Strategy on Social Networking Sites
Authors: M. S. Aparna, Pushparaj Shetty D.
Abstract:
Nowadays social networking sites have become so popular that the producers or the sellers look for these sites as one of the best options to target the right audience to market their products. There are several tools available to monitor or analyze the social networks. Our task is to identify the right community web pages and find out the behavior analysis of the members by using these tools and formulate an appropriate strategy to market the products or services to achieve the set goals. The advertising becomes more effective when the information of the product/ services come from a known source. The strategy explores great buying influence in the audience on referral marketing. Our methodology proceeds with critical budget analysis and promotes viral influence propagation. In this context, we encompass the vital bits of budget evaluation such as the number of optimal seed nodes or primary influential users activated onset, an estimate coverage spread of nodes and maximum influence propagating distance from an initial seed to an end node. Our proposal for Buyer Prediction mathematical model arises from the urge to perform complex analysis when the probability density estimates of reliable factors are not known or difficult to calculate. Order Statistics and Buyer Prediction mapping function guarantee the selection of optimal influential users at each level. We exercise an efficient tactics of practicing community pages and user behavior to determine the product enthusiasts on social networks. Our approach is promising and should be an elementary choice when there is little or no prior knowledge on the distribution of potential buyers on social networks. In this strategy, product news propagates to influential users on or surrounding networks. By applying the same technique, a user can search friends who are capable to advise better or give referrals, if a product interests him.Keywords: viral marketing, social network analysis, community web pages, buyer prediction, influence propagation, budget constraints
Procedia PDF Downloads 2632175 Femtocell Stationed Flawless Handover in High Agility Trains
Authors: S. Dhivya, M. Abirami, M. Farjana Parveen, M. Keerthiga
Abstract:
The development of high-speed railway makes people’s lives more and more convenient; meanwhile, handover is the major problem on high-speed railway communication services. In order to overcome that drawback the architecture of Long-Term Evolution (LTE) femtocell networks is used to improve network performance, and the deployment of a femtocell is a key for bandwidth limitation and coverage issues in conventional mobile network system. To increase the handover performance this paper proposed a multiple input multiple output (MIMO) assisted handoff (MAHO) algorithm. It is a technique used in mobile telecom to transfer a mobile phone to a new radio channel with stronger signal strength and improved channel quality.Keywords: flawless handover, high-speed train, home evolved Node B, LTE, mobile femtocell, RSS
Procedia PDF Downloads 4742174 Older Consumer’s Willingness to Trust Social Media Advertising: An Australian Case
Authors: Simon J. Wilde, David M. Herold, Michael J. Bryant
Abstract:
Social media networks have become the hotbed for advertising activities, due mainly to their increasing consumer/user base, and secondly, owing to the ability of marketers to accurately measure ad exposure and consumer-based insights on such networks. More than half of the world’s population (4.8 billion) now uses social media (60%), with 150 million new users having come online within the last 12 months (to June 2022). As the use of social media networks by users grows, key business strategies used for interacting with these potential customers have matured, especially social media advertising. Unlike other traditional media outlets, social media advertising is highly interactive and digital channel-specific. Social media advertisements are clearly targetable, providing marketers with an extremely powerful marketing tool. Yet despite the measurable benefits afforded to businesses engaged in social media advertising, recent controversies (such as the relationship between Facebook and Cambridge Analytica in 2018) have only heightened the role trust and privacy play within these social media networks. The purpose of this exploratory paper is to investigate the extent to which social media users trust social media advertising. Understanding this relationship will fundamentally assist marketers in better understanding social media interactions and their implications for society. Using a web-based quantitative survey instrument, survey participants were recruited via a reputable online panel survey site. Respondents to the survey represented social media users from all states and territories within Australia. Completed responses were received from a total of 258 social media users. Survey respondents represented all core age demographic groupings, including Gen Z/Millennials (18-45 years = 60.5% of respondents) and Gen X/Boomers (46-66+ years = 39.5% of respondents). An adapted ADTRUST scale, using a 20 item 7-point Likert scale, measured trust in social media advertising. The ADTRUST scale has been shown to be a valid measure of trust in advertising within traditional different media, such as broadcast media and print media, and more recently, the Internet (as a broader platform). The adapted scale was validated through exploratory factor analysis (EFA), resulting in a three-factor solution. These three factors were named reliability, usefulness and affect, and the willingness to rely on. Factor scores (weighted measures) were then calculated for these factors. Factor scores are estimates of the scores survey participants would have received on each of the factors had they been measured directly, with the following results recorded (Reliability = 4.68/7; Usefulness and Affect = 4.53/7; and Willingness to Rely On = 3.94/7). Further statistical analysis (independent samples t-test) determined the difference in factor scores between the factors when age (Gen Z/Millennials vs. Gen X/Boomers) was utilised as the independent, categorical variable. The results showed the difference in mean scores across all three factors to be statistically significant (p<0.05) for these two core age groupings: Gen Z/Millennials Reliability = 4.90/7 vs Gen X/Boomers Reliability = 4.34/7; Gen Z/Millennials Usefulness and Affect = 4.85/7 vs Gen X/Boomers Usefulness and Affect = 4.05/7; and Gen Z/Millennials Willingness to Rely On = 4.53/7 vs Gen X/Boomers Willingness to Rely On = 3.03/7. The results clearly indicate that older social media users lack trust in the quality of information conveyed in social media ads, when compared to younger, more social media-savvy consumers. This is especially evident with respect to Factor 3 (Willingness to Rely On), whose underlying variables reflect one’s behavioural intent to act based on the information conveyed in advertising. These findings can be useful to marketers, advertisers, and brand managers in that the results highlight a critical need to design ‘authentic’ advertisements on social media sites to better connect with these older users, in an attempt to foster positive behavioural responses from within this large demographic group – whose engagement with social media sites continues to increase year on year.Keywords: social media advertising, trust, older consumers, online
Procedia PDF Downloads 832173 The Role of Demographics and Service Quality in the Adoption and Diffusion of E-Government Services: A Study in India
Authors: Sayantan Khanra, Rojers P. Joseph
Abstract:
Background and Significance: This study is aimed at analyzing the role of demographic and service quality variables in the adoption and diffusion of e-government services among the users in India. The study proposes to examine the users' perception about e-Government services and investigate the key variables that are most salient to the Indian populace. Description of the Basic Methodologies: The methodology to be adopted in this study is Hierarchical Regression Analysis, which will help in exploring the impact of the demographic variables and the quality dimensions on the willingness to use e-government services in two steps. First, the impact of demographic variables on the willingness to use e-government services is to be examined. In the second step, quality dimensions would be used as inputs to the model for explaining variance in excess of prior contribution by the demographic variables. Present Status: Our study is in the data collection stage in collaboration with a highly reliable, authentic and adequate source of user data. Assuming that the population of the study comprises all the Internet users in India, a massive sample size of more than 10,000 random respondents is being approached. Data is being collected using an online survey questionnaire. A pilot survey has already been carried out to refine the questionnaire with inputs from an expert in management information systems and a small group of users of e-government services in India. The first three questions in the survey pertain to the Internet usage pattern of a respondent and probe whether the person has used e-government services. If the respondent confirms that he/she has used e-government services, then an aggregate of 15 indicators are used to measure the quality dimensions under consideration and the willingness of the respondent to use e-government services, on a five-point Likert scale. If the respondent reports that he/she has not used e-government services, then a few optional questions are asked to understand the reason(s) behind the same. Last four questions in the survey are dedicated to collect data related to the demographic variables. An indication of the Major Findings: Based on the extensive literature review carried out to develop several propositions; a research model is prescribed to start with. A major outcome expected at the completion of the study is the development of a research model that would help to understand the relationship involving the demographic variables and service quality dimensions, and the willingness to adopt e-government services, particularly in an emerging economy like India. Concluding Statement: Governments of emerging economies and other relevant agencies can use the findings from the study in designing, updating, and promoting e-government services to enhance public participation, which in turn, would help to improve efficiency, convenience, engagement, and transparency in implementing these services.Keywords: adoption and diffusion of e-government services, demographic variables, hierarchical regression analysis, service quality dimensions
Procedia PDF Downloads 2692172 A Methodological Approach to the Betterment of the Retail Store's Interior Design: The Example of Dereboyu Street, Nicosia
Authors: Nazanin Reza Nejad, Kamil Guley
Abstract:
Shopping is one of the most entertaining activities of daily life. In parallel to this, the successful settings of the stores impress the customers and made it more appealing for the users. The design of the atmosphere is the language of the interior space, and this design directly affects users’ emotions and perceptions. One of the goals of interior design is to increase the quality of the designed space. A well-designed venue satisfies the user and ensures happiness and safety. Thus, customers are turned into frequent users of the store. Spaces without the right designs negatively influence the user. The accurate interior design of the stores becomes crucial at this point. This study aims to act as a guideline for the betterment of the interior design of a newly designed or already existing clothing store located on the shopping streets of the cities. In light of the relevant literature review, the most important point in interior store design is the design and ambiance factors and how these factors are used in the interior space of the stores. Within the scope of this study, 27 clothing stores located on Dereboyu, the largest shopping street in Nicosia, the capital of North Cyprus, were examined. The examined stores were grouped as brand stores and non-brand stores which sell products from different production sites. The observation regarding the interiors of the selected stores was analyzed through qualitative and quantitative research methods. The arrangements of the sub-functions in the stores were analyzed through various reading methods over the plan schemes and recorded images. The sub-functions of all examined stores are compared against the ambiance and design factors in the literature, and results were interpreted accordingly. At the end of the study, the differences among stores that belong to a brand with an identity and stores which have not yet established an identity were identified and compared. The results of the comparisons were used to offer implications for the betterment of the interior design on a future or already existing store on the street. Thus, the study was concluded to be a guideline for people interested in interior store design.Keywords: atmosphere, ambiance factors, clothing store, identity, interior design
Procedia PDF Downloads 2032171 Standard Resource Parameter Based Trust Model in Cloud Computing
Authors: Shyamlal Kumawat
Abstract:
Cloud computing is shifting the approach IT capital are utilized. Cloud computing dynamically delivers convenient, on-demand access to shared pools of software resources, platform and hardware as a service through internet. The cloud computing model—made promising by sophisticated automation, provisioning and virtualization technologies. Users want the ability to access these services including infrastructure resources, how and when they choose. To accommodate this shift in the consumption model technology has to deal with the security, compatibility and trust issues associated with delivering that convenience to application business owners, developers and users. Absent of these issues, trust has attracted extensive attention in Cloud computing as a solution to enhance the security. This paper proposes a trusted computing technology through Standard Resource parameter Based Trust Model in Cloud Computing to select the appropriate cloud service providers. The direct trust of cloud entities is computed on basis of the interaction evidences in past and sustained on its present performances. Various SLA parameters between consumer and provider are considered in trust computation and compliance process. The simulations are performed using CloudSim framework and experimental results show that the proposed model is effective and extensible.Keywords: cloud, Iaas, Saas, Paas
Procedia PDF Downloads 3322170 Real, Ideal, or False Self- Presentation among Young Adult and Middle Adult Facebook Users
Authors: Maria Joan Grafil, Hannah Wendam, Christine Joyce Yu
Abstract:
The use of social networking sites had been a big part of life of most people. One of the most popular among these is Facebook. Users range from young adults to late adults. While it is more popular among emerging and young adults, this social networking site gives people opportunities to express the self. Via Facebook, people have the opportunity to think about what they prefer to show others. This study identified which among the multiple facets of the self (real self, false self or ideal self) is dominantly presented by young adults and middle adults in using the social networking site Facebook. South Metro Manila was the locale of this study where 100 young adult participants (aged 18-25) were students from nearby universities and the 100 middle adult participants (aged 35-45) were working residents within the area. Participants were comprised of 53% females and 47% males. The data was gathered using a self-report questionnaire to determine which online self-presentation (real self-presentation, false self-presentation, or ideal self-presentation) of the participants has greater extent when engaging in the social networking site Facebook. Using means comparison, results showed that both young adults and middle adults engaged primarily in real self-presentation.Keywords: false self, ideal self, middle adult, real self, self presentation, young adult
Procedia PDF Downloads 2882169 Design Guidelines for an Enhanced Interaction Experience in the Domain of Smartphone-Based Applications for Sport and Fitness
Authors: Paolo Pilloni, Fabrizio Mulas, Salvatore Carta
Abstract:
Nowadays, several research studies point up that an active lifestyle is essential for physical and mental health benefits. Mobile phones have greatly influenced people’s habits and attitudes also in the way they exercise. Our research work is mainly focused on investigating how to exploit mobile technologies to favour people’s exertion experience. To this end, we developed an exertion framework users can exploit through a real world mobile application, called BLINDED, designed to act as a virtual personal trainer to support runners during their trainings. In this work, inspired by both previous findings in the field of interaction design for people with visual impairments, feedback gathered from real users of our framework, and positive results obtained from two experimentations, we present some new interaction facilities we designed to enhance the interaction experience during a training. The positive obtained results helped us to derive some interaction design recommendations we believe will be a valid support for designers of future mobile systems conceived to be used in circumstances where there are limited possibilities of interaction.Keywords: human computer interaction, interaction design guidelines, persuasive mobile technologies for sport and health
Procedia PDF Downloads 5332168 Effective Design Factors for Bicycle-Friendly Streets
Authors: Zohreh Asadi-Shekari, Mehdi Moeinaddini, Muhammad Zaly Shah, Amran Hamzah
Abstract:
Bicycle level of service (BLOS) is a measure for evaluating street conditions for cyclists. Currently, various methods are proposed for BLOS. These analytical methods however have some drawbacks: they usually assume cyclists as users that can share street facilities with motorized vehicles, it is not easy to link them to design process and they are not easy to follow. In addition, they only support a narrow range of cycling facilities and may not be applicable for all situations. Along this, the current paper introduces various effective design factors for bicycle-friendly streets. This study considers cyclists as users of streets who have special needs and facilities. Therefore, the key factors that influence BLOS based on different cycling facilities that are proposed by developed guidelines and literature are identified. The combination of these factors presents a complete set of effective design factors for bicycle-friendly streets. In addition, the weight of each factor in existing BLOS models is estimated and these effective factors are ranked based on these weights. These factors and their weights can be used in further studies to propose special bicycle-friendly street design model.Keywords: bicycle level of service, bicycle-friendly streets, cycling facilities, rating system, urban streets
Procedia PDF Downloads 4882167 Forest Policy and Its Implications on Private Forestry Development: A Case Study in Rautahat District, Nepal
Authors: Dammar Bahadur Adhikari
Abstract:
Community forestry in Nepal has got disproportionately high level of support from government and other actors in forestry sector. Even though master plan for forestry sector (1989) has highlighted community and private forestry as one component, the government policies and other intervention deliberately left out private forestry in its structure and programs. The study aimed at providing the pathway for formulating appropriate policies to address need of different kind of forest management regimes in Rautahat district, Nepal. The key areas the research focused were assessment of current status of private forestry, community forest users' understanding on private forestry; criteria for choosing species of private forestry and factors affecting establishment of private forestry in the area. Qualitative and quantitative data were collected employing questionnaire survey, rapid forest assessment and key informant interview. The study found out that forest policies are imposed due to intense pressure of exogenous forces than due to endogenous demand. Most of the local people opine that their traditional knowledge and skills are not sufficient for private forestry and hence need training on the matter. Likewise, local use, market value and rotation dictate the choice of species for plantation in private forests. Currently district forest office is the only government institution working in the area of private forestry all other governmental and non-governmental organizations have condoned. private forestry. Similarly, only permanent settlers in the area are found to establish private forests other forest users such as migrants and forest encroachers follow opportunistic behavior to meet their forest product need from community and national forests. In this regard, the study recommends taking appropriate step to support other forest management system including private forestry provide community forestry the benefits of competition as suggested by Darwin in 18th century, one and half century back and to help alleviate poverty by channelizing benefits to household level.Keywords: community forest, forest management, poverty, private forest, users’ group
Procedia PDF Downloads 3412166 A Review on Predictive Sound Recognition System
Authors: Ajay Kadam, Ramesh Kagalkar
Abstract:
The proposed research objective is to add to a framework for programmed recognition of sound. In this framework the real errand is to distinguish any information sound stream investigate it & anticipate the likelihood of diverse sounds show up in it. To create and industrially conveyed an adaptable sound web crawler a flexible sound search engine. The calculation is clamor and contortion safe, computationally productive, and hugely adaptable, equipped for rapidly recognizing a short portion of sound stream caught through a phone microphone in the presence of frontal area voices and other predominant commotion, and through voice codec pressure, out of a database of over accessible tracks. The algorithm utilizes a combinatorial hashed time-recurrence group of stars examination of the sound, yielding ordinary properties, for example, transparency, in which numerous tracks combined may each be distinguished.Keywords: fingerprinting, pure tone, white noise, hash function
Procedia PDF Downloads 324