Search results for: short message services
7040 Business Marketing Researches and Analysis Effect on Production
Authors: Mirna John Shawky Demian
Abstract:
Mobile phones are now one of the direct marketing tools used to reach hard-to-reach consumers. Cell phones are very personal devices that you can carry with you anytime, anywhere. This gives marketers the ability to create personalized marketing messages and send them at the right time and place. The study examined consumer attitudes towards mobile marketing, particularly SMS marketing. Unlike similar studies, this study does not focus on young people, but the field study included consumers between the ages of 18 and 70.The results showed that the majority of participants found SMS marketing destructive. The biggest problem with SMS marketing is subscribing to message lists without the recipient's consent; large number of messages sent; and the irrelevance of message content. Experiential marketing is an unforgettable experience that remains deeply anchored in the customer's memory. Furthermore, customer satisfaction is defined as the emotional response to the experience provided to the customer in relation to specific products or services purchased. Therefore, experiential marketing activities can influence the level of customer satisfaction and loyalty.In this context, the study aims to examine the relationship between experiential marketing, customer satisfaction and loyalty to beauty products in Konya. The results of this study showed that experiential marketing is an important indicator of customer satisfaction and loyalty and that experiential marketing has a significant positive impact on customer satisfaction and loyalty.Keywords: direct marketing, mobile phones mobile marketing, sms advertising, marketing sponsorship, marketing communication theories, marketing communication tools
Procedia PDF Downloads 477039 Limitations of Selected e-Governance Services in India: Policy Change as Solution for Experience Enhancement of Citizen Services
Authors: Chaitanya Vyas
Abstract:
This paper identifies limitations of existing two e-Governance services viz. railway ticket booking and passport service in India. The comparison has been made as to how in the past these two citizen services were operating manually and how these services are taken online via e-Governance. Different e-Governance projects, investment aspects, and role of corporate are discussed. For Indian Railway online ticketing a comparison has been made between state run booking website and popular private firm run booking website. For passport service, observation through personal visit to passport center is described. Suggestions are made to improve these services further to improve citizen service experiences.Keywords: e-Governance, citizen services, passport, Indian Railways
Procedia PDF Downloads 2467038 Perception of Agricultural Extension Agents of Private Sector Participation in Extension Services in Ogun State, Nigeria
Authors: E. O. Fakoya, B. G. Abiona, J. O. Soetan
Abstract:
The study determined Perception of Agricultural Extension Agents of Private Sector Participation in Extension Services in Ogun State, Nigeria. Data were collected from 80 respondents with a well-structured questionnaire. The result of the findings showed that there is need for private sector participation in extension services (=4.313), private extension services has facilities than public extension services (=4.97). Private sector participated in extension services by: giving of loans and credits to farmers (=4.50). Major constraints identified by the respondents were: Transportation problem (=2.88) and lack of fund (=2.77) A significant relationship (P<0.05) exists between factors affecting public extension services(r = 0.641, p = 0.00) and private sector participation in extension services. It was concluded from the study that there is need for private sector to participate in extension service in order to improve productivity of the farmers.Keywords: agricultural extension, extension agent, private sector, perception
Procedia PDF Downloads 5887037 Relationship Between Expectation (Before) and Satisfaction (After) Receiving Services of Thai Consumers from Domestic Low-Cost Airlines
Authors: Sittichai Charoensettasilp, Chong Wu
Abstract:
This study employs sampling of 400 Thai people who live in Bangkok and have used air transportation to travel. A random convenience sampling technique is used to collect data. The results found that at 0.05 significance level the differences of means of Thai consumers’ expectations (before) and satisfaction (after) receiving services in the service marketing mix, the results of all aspects are different both in general and for each aspect of the service marketing mix. Average levels of expectations before receiving services are higher than satisfaction after receiving services in all aspects, as well. When analyzing further to the correlation between average means, the means of expectations before receiving services are higher than those of satisfaction after receiving services in general. As in all aspects of the service marketing mix, any aspect that has a big difference between expectations before receiving services and satisfaction after receiving services has low correlation.Keywords: domestic low-cost airlines, Thai consumers, relationship, expectation before receiving services, satisfaction after receiving services
Procedia PDF Downloads 4017036 Context-Aware Alert Method in Hajj Pilgrim Location-Based Tracking System
Authors: Syarif Hidayat
Abstract:
As millions of people with different backgrounds perform hajj every year in Saudi Arabia, it brings out several problems. Missing people is among many crucial problems need to be encountered. Some people might have had insufficient knowledge of using tracking system equipment. Other might become a victim of an accident, lose consciousness, or even died, prohibiting them to perform certain activity. For those reasons, people could not send proper SOS message. The major contribution of this paper is the application of the diverse alert method in pilgrims tracking system. It offers a simple yet robust solution to send SOS message by pilgrims during Hajj. Knowledge of context aware computing is assumed herein. This study presents four methods that could be utilized by pilgrims to send SOS. The first method is simple mobile application contains only a button. The second method is based on behavior analysis based off GPS location movement anomaly. The third method is by introducing pressing pattern to smartwatch physical button as a panic button. The fourth method is by identifying certain accelerometer pattern recognition as a sign of emergency situations. Presented method in this paper would be an important part of pilgrims tracking system. The discussion provided here includes easy to use design whilst maintaining tracking accuracy, privacy, and security of its users.Keywords: context aware computing, emergency alert system, GPS, hajj pilgrim tracking, location-based services
Procedia PDF Downloads 2167035 Secure Text Steganography for Microsoft Word Document
Authors: Khan Farhan Rafat, M. Junaid Hussain
Abstract:
Seamless modification of an entity for the purpose of hiding a message of significance inside its substance in a manner that the embedding remains oblivious to an observer is known as steganography. Together with today's pervasive registering frameworks, steganography has developed into a science that offers an assortment of strategies for stealth correspondence over the globe that must, however, need a critical appraisal from security breach standpoint. Microsoft Word is amongst the preferably used word processing software, which comes as a part of the Microsoft Office suite. With a user-friendly graphical interface, the richness of text editing, and formatting topographies, the documents produced through this software are also most suitable for stealth communication. This research aimed not only to epitomize the fundamental concepts of steganography but also to expound on the utilization of Microsoft Word document as a carrier for furtive message exchange. The exertion is to examine contemporary message hiding schemes from security aspect so as to present the explorative discoveries and suggest enhancements which may serve a wellspring of information to encourage such futuristic research endeavors.Keywords: hiding information in plain sight, stealth communication, oblivious information exchange, conceal, steganography
Procedia PDF Downloads 2417034 Application of Chinese Remainder Theorem to Find The Messages Sent in Broadcast
Authors: Ayubi Wirara, Ardya Suryadinata
Abstract:
Improper application of the RSA algorithm scheme can cause vulnerability to attacks. The attack utilizes the relationship between broadcast messages sent to the user with some fixed polynomial functions that belong to each user. Scheme attacks carried out by applying the Chinese Remainder Theorem to obtain a general polynomial equation with the same modulus. The formation of the general polynomial becomes a first step to get back the original message. Furthermore, to solve these equations can use Coppersmith's theorem.Keywords: RSA algorithm, broadcast message, Chinese Remainder Theorem, Coppersmith’s theorem
Procedia PDF Downloads 3417033 Analyzing Factors Influencing Citizen Utilization and Adoption of E-Government Services in Saudi Arabia: A Citizen’s Perspective
Authors: Abdulqader Almasabe, Stephanie Ludi, Mohammed Alenazi
Abstract:
Governments around the world have been increasingly introducing e-government services in order to make processes more efficient and accessible for their citizens. The government of Saudi Arabia has adopted e-government for the effective delivery of services. However, the adoption rate of these services remains low in many countries. This paper aims to explore the determinants of citizens' intention to adopt and use e-government services, focusing on a model of factors influencing the adoption and utilization of e-government services (MFIAUEGS) that has been specially developed for this purpose. By analyzing the factors that influence citizens' decisions to use e-government services we hope to provide insights that help to increase adoption rates and improve the overall effectiveness of these services. In this paper, 562 valid responses were collected and analyzed to shed light on the issue. The results of the research showed that each of the proposed factors in the MFIAUEGS model played a significant role in influencing citizens' intentions to adopt and use e-government services.Keywords: e-government, model acceptance, influencing factors, TAM
Procedia PDF Downloads 737032 Model for Assessment of Quality Airport Services
Authors: Cristina da Silva Torres, José Luis Duarte Ribeiro, Maria Auxiliadora Cannarozzo Tinoco
Abstract:
As a result of the rapid growth of the Brazilian Air Transport, many airports are at the limit of their capacities and have a reduction in the quality of services provided. Thus, there is a need of models for assessing the quality of airport services. Because of this, the main objective of this work is to propose a model for the evaluation of quality attributes in airport services. To this end, we used the method composed by literature review and interview. Structured a working method composed by 5 steps, which resulted in a model to evaluate the quality of airport services, consisting of 8 dimensions and 45 attributes. Was used as base for model definition the process mapping of boarding and landing processes of passengers and luggage. As a contribution of this work is the integration of management process with structuring models to assess the quality of services in airport environments.Keywords: quality airport services, model for identification of attributes quality, air transport, passenger
Procedia PDF Downloads 5357031 A POX Controller Module to Collect Web Traffic Statistics in SDN Environment
Authors: Wisam H. Muragaa, Kamaruzzaman Seman, Mohd Fadzli Marhusin
Abstract:
Software Defined Networking (SDN) is a new norm of networks. It is designed to facilitate the way of managing, measuring, debugging and controlling the network dynamically, and to make it suitable for the modern applications. Generally, measurement methods can be divided into two categories: Active and passive methods. Active measurement method is employed to inject test packets into the network in order to monitor their behaviour (ping tool as an example). Meanwhile the passive measurement method is used to monitor the traffic for the purpose of deriving measurement values. The measurement methods, both active and passive, are useful for the collection of traffic statistics, and monitoring of the network traffic. Although there has been a work focusing on measuring traffic statistics in SDN environment, it was only meant for measuring packets and bytes rates for non-web traffic. In this study, a feasible method will be designed to measure the number of packets and bytes in a certain time, and facilitate obtaining statistics for both web traffic and non-web traffic. Web traffic refers to HTTP requests that use application layer; while non-web traffic refers to ICMP and TCP requests. Thus, this work is going to be more comprehensive than previous works. With a developed module on POX OpenFlow controller, information will be collected from each active flow in the OpenFlow switch, and presented on Command Line Interface (CLI) and wireshark interface. Obviously, statistics that will be displayed on CLI and on wireshark interfaces include type of protocol, number of bytes and number of packets, among others. Besides, this module will show the number of flows added to the switch whenever traffic is generated from and to hosts in the same statistics list. In order to carry out this work effectively, our Python module will send a statistics request message to the switch requesting its current ports and flows statistics in every five seconds; while the switch will reply with the required information in a message called statistics reply message. Thus, POX controller will be notified and updated with any changes could happen in the entire network in a very short time. Therefore, our aim of this study is to prepare a list for the important statistics elements that are collected from the whole network, to be used for any further researches; particularly, those that are dealing with the detection of the network attacks that cause a sudden rise in the number of packets and bytes like Distributed Denial of Service (DDoS).Keywords: mininet, OpenFlow, POX controller, SDN
Procedia PDF Downloads 2357030 Use of Short Piles for Stabilizing the Side Slope of the Road Embankment along the Canal
Authors: Monapat Sasingha, Suttisak Soralump
Abstract:
This research presents the behavior of slope of the road along the canal stabilized by short piles. In this investigation, the centrifuge machine was used, modelling the condition of the water levels in the canal. The centrifuge tests were performed at 35 g. To observe the movement of the soil, visual analysis was performed to evaluate the failure behavior. Conclusively, the use of short piles to stabilize the canal slope proved to be an effective solution. However, the certain amount of settlement was found behind the short pile rows.Keywords: centrifuge test, slope failure, embankment, stability of slope
Procedia PDF Downloads 2687029 Fears of Strangers: Causes of Anonymity Rejection on Virtual World
Authors: Proud Arunrangsiwed
Abstract:
This research is a collaborative narrative research, which is mixed with issues of selected papers and researcher's experience as an anonymous user on social networking sites. The objective of this research is to understand the reasons of the regular users who reject to contact with anonymous users, and to study the communication traditions used in the selected studies. Anonymous users are rejected by regular users, because of the fear of cyber bully, the fear of unpleasant behaviors, and unwillingness of changing communication norm. The suggestion for future research design is to use longitudinal design or quantitative design; and the theory in rhetorical tradition should be able to help develop a strong trust message.Keywords: anonymous, anonymity, online identity, trust message, reliability
Procedia PDF Downloads 3597028 An Analysis of Privacy and Security for Internet of Things Applications
Authors: Dhananjay Singh, M. Abdullah-Al-Wadud
Abstract:
The Internet of Things is a concept of a large scale ecosystem of wireless actuators. The actuators are defined as things in the IoT, those which contribute or produces some data to the ecosystem. However, ubiquitous data collection, data security, privacy preserving, large volume data processing, and intelligent analytics are some of the key challenges into the IoT technologies. In order to solve the security requirements, challenges and threats in the IoT, we have discussed a message authentication mechanism for IoT applications. Finally, we have discussed data encryption mechanism for messages authentication before propagating into IoT networks.Keywords: Internet of Things (IoT), message authentication, privacy, security
Procedia PDF Downloads 3827027 Using Statistical Significance and Prediction to Test Long/Short Term Public Services and Patients' Cohorts: A Case Study in Scotland
Authors: Raptis Sotirios
Abstract:
Health and social care (HSc) services planning and scheduling are facing unprecedented challenges due to the pandemic pressure and also suffer from unplanned spending that is negatively impacted by the global financial crisis. Data-driven can help to improve policies, plan and design services provision schedules using algorithms assist healthcare managers’ to face unexpected demands using fewer resources. The paper discusses services packing using statistical significance tests and machine learning (ML) to evaluate demands similarity and coupling. This is achieved by predicting the range of the demand (class) using ML methods such as CART, random forests (RF), and logistic regression (LGR). The significance tests Chi-Squared test and Student test are used on data over a 39 years span for which HSc services data exist for services delivered in Scotland. The demands are probabilistically associated through statistical hypotheses that assume that the target service’s demands are statistically dependent on other demands as a NULL hypothesis. This linkage can be confirmed or not by the data. Complementarily, ML methods are used to linearly predict the above target demands from the statistically found associations and extend the linear dependence of the target’s demand to independent demands forming, thus groups of services. Statistical tests confirm ML couplings making the prediction also statistically meaningful and prove that a target service can be matched reliably to other services, and ML shows these indicated relationships can also be linear ones. Zero paddings were used for missing years records and illustrated better such relationships both for limited years and in the entire span offering long term data visualizations while limited years groups explained how well patients numbers can be related in short periods or can change over time as opposed to behaviors across more years. The prediction performance of the associations is measured using Receiver Operating Characteristic(ROC) AUC and ACC metrics as well as the statistical tests, Chi-Squared and Student. Co-plots and comparison tables for RF, CART, and LGR as well as p-values and Information Exchange(IE), are provided showing the specific behavior of the ML and of the statistical tests and the behavior using different learning ratios. The impact of k-NN and cross-correlation and C-Means first groupings is also studied over limited years and the entire span. It was found that CART was generally behind RF and LGR, but in some interesting cases, LGR reached an AUC=0 falling below CART, while the ACC was as high as 0.912, showing that ML methods can be confused padding or by data irregularities or outliers. On average, 3 linear predictors were sufficient, LGR was found competing RF well, and CART followed with the same performance at higher learning ratios. Services were packed only if when significance level(p-value) of their association coefficient was more than 0.05. Social factors relationships were observed between home care services and treatment of old people, birth weights, alcoholism, drug abuse, and emergency admissions. The work found that different HSc services can be well packed as plans of limited years, across various services sectors, learning configurations, as confirmed using statistical hypotheses.Keywords: class, cohorts, data frames, grouping, prediction, prob-ability, services
Procedia PDF Downloads 2317026 A State-Of-The-Art Review on Web Services Adaptation
Authors: M. Velasco, D. While, P. Raju, J. Krasniewicz, A. Amini, L. Hernandez-Munoz
Abstract:
Web service adaptation involves the creation of adapters that solve Web services incompatibilities known as mismatches. Since the importance of Web services adaptation is increasing because of the frequent implementation and use of online Web services, this paper presents a literature review of web services to investigate the main methods of adaptation, their theoretical underpinnings and the metrics used to measure adapters performance. Eighteen publications were reviewed independently by two researchers. We found that adaptation techniques are needed to solve different types of problems that may arise due to incompatibilities in Web service interfaces, including protocols, messages, data and semantics that affect the interoperability of the services. Although adapters are non-invasive methods that can improve Web services interoperability and there are current approaches for service adaptation; there is, however, not yet one solution that fits all types of mismatches. Our results also show that only a few research projects incorporate theoretical frameworks and that metrics to measure adapters’ performance are very limited. We conclude that further research on software adaptation should improve current adaptation methods in different layers of the service interoperability and that an adaptation theoretical framework that incorporates a theoretical underpinning and measures of qualitative and quantitative performance needs to be created.Keywords: Web Services Adapters, software adaptation, web services mismatches, web services interoperability
Procedia PDF Downloads 2937025 Adoption and Diffusion of E-Government Services in India: The Impact of User Demographics and Service Quality
Authors: Sayantan Khanra, Rojers P. Joseph
Abstract:
This study attempts to analyze the impact of demography and service quality on the adoption and diffusion of e-Government services in the context of India. The objective of this paper is to study the users' perception about e-Government services and investigate the key variables that are most salient to the Indian populace. At the completion of this study, a research model that would help to understand the relationship involving the demographic variables and service quality dimensions, and the willingness to adopt e-Government services is expected to be developed. Dedicated authorities, particularly those in developing economies, may use that model or its augmented versions to design and update e-Government services and promote their use among citizens. After all, enhanced public participation is required to improve efficiency, engagement and transparency in the implementation of the aforementioned services.Keywords: adoption and diffusion of e-government services, demographic variables, hierarchical regression analysis, service quality dimensions
Procedia PDF Downloads 2907024 Secure Cryptographic Operations on SIM Card for Mobile Financial Services
Authors: Kerem Ok, Serafettin Senturk, Serdar Aktas, Cem Cevikbas
Abstract:
Mobile technology is very popular nowadays and it provides a digital world where users can experience many value-added services. Service Providers are also eager to offer diverse value-added services to users such as digital identity, mobile financial services and so on. In this context, the security of data storage in smartphones and the security of communication between the smartphone and service provider are critical for the success of these services. In order to provide the required security functions, the SIM card is one acceptable alternative. Since SIM cards include a Secure Element, they are able to store sensitive data, create cryptographically secure keys, encrypt and decrypt data. In this paper, we design and implement a SIM and a smartphone framework that uses a SIM card for secure key generation, key storage, data encryption, data decryption and digital signing for mobile financial services. Our frameworks show that the SIM card can be used as a controlled Secure Element to provide required security functions for popular e-services such as mobile financial services.Keywords: SIM card, mobile financial services, cryptography, secure data storage
Procedia PDF Downloads 3117023 Using Focus Group Method to Identify Citizen Requirements to Saudi Mobile Government Services
Authors: S. Alotaibi, D. Roussinov
Abstract:
Mobile government services implementation faces several challenges in developing countries. This paper studies some of those challenges in the context of Saudi Arabia. The study aims to investigate factors affecting m-government acceptance in Saudi Arabia, including ease of use, usefulness, service quality, trust, intention to use and users’ satisfaction. Our investigation will help in integrating the m-government services in citizens’ everyday life. We collected and analyzed our data from focus groups. These focus groups are from King Saud University and Imam Muhammed Bin Saud University, so the samples size are five and seven participants, respectively. We found that there are some factors to identifying citizen requirements to Saudi mobile government services. These services should be easy to use and not require too much effort. Also, these services must be fully trusted.Keywords: e-government, m-government, focus group, Saudi mobile government services
Procedia PDF Downloads 2977022 Greening the Academic Library: Analysis of the Effectiveness of Sustainable Online Services Towards Reducing the Environmental Impact of Academic Libraries
Authors: George Clifford Yamson
Abstract:
As institutions across the world become more focused on sustainability, academic libraries are considering ways to reduce their environmental impact. One strategy is the use of sustainable online services, which can reduce the need for physical materials and transportation. This study aims to analyze the effectiveness of sustainable online services in reducing the environmental impact of academic libraries. Using a mixed-methods approach, the survey will be used to solicit information from library staff and users to gather data on their attitudes towards sustainable online services and their usage patterns. A comparative analysis will be conducted on the costs of traditional library services versus sustainable online services. The findings of this study will contribute to the growing body of literature on green academic libraries and provide insights into the potential of sustainable online services to reduce the environmental impact of academic libraries.Keywords: sustainability, environmental sustainability, academic libraries, green printing, green copying, online services
Procedia PDF Downloads 797021 Determinants of E-Government Services Adoption from the African Students’ Perspective
Authors: Isaac Kofi Mensah, Jianing Mi, Cheng Feng
Abstract:
The patronage of e-government services (demand side of e-government) is vital to the successful implementation of e-government initiatives. The purpose of this study is to explore the predictors determining the willingness of African students in China to adopt and use e-government services. The Unified Theory of Acceptance and Use of Technology (UTAUT) will be used as the theoretical foundation for this research. Research instrument will be developed and administered to 500 African students in China. Factors such as performance expectancy, effort expectancy, social influence, facilitating conditions and culture will be investigated to determine its significant impact on the willingness to use e-government services. This study is a research in progress. The outcome of this study will provide valuable recommendations to improve the provision of public services through e-government.Keywords: e-government, e-government services, predictors, UTAUT
Procedia PDF Downloads 6007020 Multilevel Gray Scale Image Encryption through 2D Cellular Automata
Authors: Rupali Bhardwaj
Abstract:
Cryptography is the science of using mathematics to encrypt and decrypt data; the data are converted into some other gibberish form, and then the encrypted data are transmitted. The primary purpose of this paper is to provide two levels of security through a two-step process, rather than transmitted the message bits directly, first encrypted it using 2D cellular automata and then scrambled with Arnold Cat Map transformation; it provides an additional layer of protection and reduces the chance of the transmitted message being detected. A comparative analysis on effectiveness of scrambling technique is provided by scrambling degree measurement parameters i.e. Gray Difference Degree (GDD) and Correlation Coefficient.Keywords: scrambling, cellular automata, Arnold cat map, game of life, gray difference degree, correlation coefficient
Procedia PDF Downloads 3777019 Experimental and Analytical Study to Investigate the Effect of Tension Reinforcement on Behavior of Reinforced Concrete Short Beams
Authors: Hakan Ozturk, Aydin Demir, Kemal Edip, Marta Stojmanovska, Julijana Bojadjieva
Abstract:
There are many factors that affect the behavior of reinforced concrete beams. These can be listed as concrete compressive and reinforcement yield strength, amount of tension, compression and confinement bars, and strain hardening of reinforcement. In the study, support condition of short beams is selected statically indeterminate to first degree. Experimental and numerical analysis are carried for reinforcement concrete (RC) short beams. Dimensions of cross sections are selected as 250mm width and 500 mm height. The length of RC short beams is designed as 2250 mm and these values are constant in all beams. After verifying accurately finite element model, a numerical parametric study is performed with varied diameter of tension reinforcement. Effect of change in diameter is investigated on behavior of RC short beams. As a result of the study, ductility ratios and failure modes are determined, and load-displacement graphs are obtained in order to understand the behavior of short beams. It is deduced that diameter of tension reinforcement plays very important role on the behavior of RC short beams in terms of ductility and brittleness.Keywords: short beam, reinforced concrete, finite element analysis, longitudinal reinforcement
Procedia PDF Downloads 2107018 Characterization of Onboard Reliable Error Correction Code FORSDRAM Controller
Authors: N. Pitcheswara Rao
Abstract:
In the process of conveying the information there may be a chance of signal being corrupted which leads to the erroneous bits in the message. The message may consist of single, double and multiple bit errors. In high-reliability applications, memory can sustain multiple soft errors due to single or multiple event upsets caused by environmental factors. The traditional hamming code with SEC-DED capability cannot be address these types of errors. It is possible to use powerful non-binary BCH code such as Reed-Solomon code to address multiple errors. However, it could take at least a couple dozen cycles of latency to complete first correction and run at a relatively slow speed. In order to overcome this drawback i.e., to increase speed and latency we are using reed-Muller code.Keywords: SEC-DED, BCH code, Reed-Solomon code, Reed-Muller code
Procedia PDF Downloads 4287017 Characterization of Onboard Reliable Error Correction Code for SDRAM Controller
Authors: Pitcheswara Rao Nelapati
Abstract:
In the process of conveying the information there may be a chance of signal being corrupted which leads to the erroneous bits in the message. The message may consist of single, double and multiple bit errors. In high-reliability applications, memory can sustain multiple soft errors due to single or multiple event upsets caused by environmental factors. The traditional hamming code with SEC-DED capability cannot be address these types of errors. It is possible to use powerful non-binary BCH code such as Reed-Solomon code to address multiple errors. However, it could take at least a couple dozen cycles of latency to complete first correction and run at a relatively slow speed. In order to overcome this drawback i.e., to increase speed and latency we are using reed-Muller code.Keywords: SEC-DED, BCH code, Reed-Solomon code, Reed-Muller code
Procedia PDF Downloads 4297016 The Use of Mobile Phones as a Direct Marketing Tool and Consumer Attitudes
Authors: Abdülcelil Mücahid Zengin, Göksel Şimşek
Abstract:
Mobile phones are one of the direct marketing tools that can be used to reach todays hard to reach consumers. Mobile phones are very personal devices and they are always carried with the consumer, where ever they go. This creates an opportunity for marketers to create personalized marketing communications messages and send them on the right time and place. This study examines consumer attitudes toward mobile marketing, especially toward SMS marketing. Unlike similar studies, this study does not focus on the young, but includes consumers who are in the 18-70 age range to the field research. According to the results, it has been concluded that most participants think SMS marketing is disturbing. Most important problems with SMS marketing are about getting subscribed to message lists without the permission of the receiver; the high number of messages sent; and the irrelevancy of the message content.Keywords: direct marketing, mobile phones mobile marketing, sms advertising, sms marketing
Procedia PDF Downloads 3487015 Short Arc Technique for Baselines Determinations
Authors: Gamal F.Attia
Abstract:
The baselines are the distances and lengths of the chords between projections of the positions of the laser stations on the reference ellipsoid. For the satellite geodesy, it is very important to determine the optimal length of orbital arc along which laser measurements are to be carried out. It is clear that for the dynamical methods long arcs (one month or more) are to be used. According to which more errors of modeling of different physical forces such as earth's gravitational field, air drag, solar radiation pressure, and others that may influence the accuracy of the estimation of the satellites position, at the same time the measured errors con be almost completely excluded and high stability in determination of relative coordinate system can be achieved. It is possible to diminish the influence of the errors of modeling by using short-arcs of the satellite orbit (several revolutions or days), but the station's coordinates estimated by different arcs con differ from each other by a larger quantity than statistical zero. Under the semidynamical ‘short arc’ method one or several passes of the satellite in one of simultaneous visibility from both ends of the chord is known and the estimated parameter in this case is the length of the chord. The comparison of the same baselines calculated with long and short arcs methods shows a good agreement and even speaks in favor of the last one. In this paper the Short Arc technique has been explained and 3 baselines have been determined using the ‘short arc’ method.Keywords: baselines, short arc, dynamical, gravitational field
Procedia PDF Downloads 4637014 Provision of Basic Water and Sanitation Services in South Africa through the Municipal Infrastructure Grant Programme
Authors: Elkington Sibusiso Mnguni
Abstract:
Although South Africa has made good progress in providing basic water and sanitation services to its citizens, there is still a large section of the population that has no access to these services. This paper reviews the performance of the government’s municipal infrastructure grant programme in providing basic water and sanitation services which are part of the constitutional requirements to the citizens. The method used to gather data and information was a desk top study which sought to review the progress made in rolling out the programme. The successes and challenges were highlighted and possible solutions were identified that can accelerate the elimination of the remaining backlogs and improve the level of service to the citizens. Currently, approximately 6.5 million citizens are without access to basic water services and approximately 10 million are without access to basic sanitation services.Keywords: grant, municipal infrastructure, sanitation, services, water
Procedia PDF Downloads 1437013 Perceived Ease-of-Use and Intention to Use E-Government Services in Ghana: The Moderating Role of Perceived Usefulness
Authors: Isaac Kofi Mensah
Abstract:
Public sector organizations, ministries, departments and local government agencies are adopting e-government as a means to provide efficient and quality service delivery to citizens. The purpose of this research paper is to examine the extent to which perceived usefulness (PU) of e-government services moderates between perceived ease-of-use (PEOU) of e-government services and intention to use (IU) e-government services in Ghana. A structured research questionnaire instrument was developed and administered to 700 potential respondents in Ghana, of which 693 responded, representing 99% of the questionnaires distributed. The Technology Acceptance Model (TAM) was used as the theoretical framework for the study. The Statistical Package for Social Science (SPSS) was used to capture and analyze the data. The results indicate that even though predictors such as PU and PEOU are main determiners of citizens’ intention to adopt and use e-government services in Ghana, it failed to show that PEOU and IU e-government services in Ghana is significantly moderated by the PU of e-government services. The implication of this finding on theory and practice is further discussed.Keywords: e-government services, intention to use, moderating role, perceived ease of use, perceived usefulness, Ghana, technology acceptance model
Procedia PDF Downloads 4117012 Influencing Factors to Mandatory versus Non-Mandatory E-Government Services Adoption in India: An Empirical Study
Authors: Rajiv Kumar, Amit Sachan, Arindam Mukherjee
Abstract:
Government agencies around the world, including India, are incorporating digital technologies and processes into their day-to-day operations to become more efficient. Despite low internet penetration (around 34.8% of total population) in India, Government of India has made some public services mandatory to access online (e.g. passport, tax filing).This is insisting citizens to access mandatory public services online. However, due to digital divide, all citizens do not have equal access to internet. In light of this, it is an interesting topic to explore how citizens are able to access mandatory online public services. It is important to understand how citizens are adopting these mandatory e-government services and how the adoption behavior of these mandatory e-government services is different or similar to adoption behavior of non-mandatory e-government services. The purpose of this research is to investigate the factors that influence adoption of mandatory and non-mandatory e-government services in India. A quantitative technique is employed in this study. A conceptual model has been proposed by integrating the influencing factors to adopt e-government services from previous studies. The proposed conceptual model highlights a comprehensive set of potential factors influencing the adoption of e-government services. The proposed model has been validated by keeping in view the local context of Indian society. Online and paper based survey was administered, collected data was analyzed and results have been discussed. A total of 463 valid responses were received and further the responses were analyzed. The research reveals that the influencing factors to adopt e-government services are not same for both mandatory and non-mandatory e-government services. There are some factors that influence adoption of both mandatory and non-mandatory e-government services but there are some which are relevant for either of mandatory and non-mandatory e-government services. The research findings may help government or concerned agencies in successfully implementing e-government services.Keywords: adoption, e-government, India, mandatory, non-mandatory
Procedia PDF Downloads 3187011 Persuading ICT Consumers to Disconnect from Work: An Experimental Study on the Influence of Message Frame, Regulatory Focus, Ad Believability and Attitude toward the Ad on Message Effectiveness
Authors: Katharina Ninaus, Ralf Terlutter, Sandra Diehl
Abstract:
Information and communication technologies (ICT) have become pervasive in all areas of modern life, both in work and leisure. Technological developments and particularly the ubiquity of smartphones have made it possible for ICT consumers to be constantly connected to work, fostering an always-on mentality and increasing the pressure to be accessible at all times. However, performing work tasks outside of working hours using ICT results in a lack of mental detachment and recovery from work. It is, therefore, necessary to develop effective behavioral interventions to increase risk awareness of a constant connection to the workplace in the employed population. Drawing on regulatory focus theory, this study aims to investigate the persuasiveness of tailoring messages to individuals’ chronic regulatory focus in order to encourage ICT consumers to set boundaries by defining fixed times for professional accessibility outside of working hours in order to contribute to the well-being of ICT consumers with high ICT involvement in their work life. The experimental study examines the interaction effect between consumers’ chronic regulatory focus (i.e. promotion focus versus prevention focus) and positive or negative message framing (i.e. gain frame versus loss frame) on consumers’ intention to perform the advocated behavior. Based on the assumption that congruent messages create regulatory fit and increase message effectiveness, it is hypothesized that behavioral intention will be higher in the condition of regulatory fit compared to regulatory non-fit. It is further hypothesized that ad believability and attitude toward the ad will mediate the effect of regulatory fit on behavioral intention given that ad believability and ad attitude both determine consumer behavioral responses. Results confirm that the interaction between regulatory focus and message frame emerged as a predictor of behavioral intention such as that consumers’ intentions to set boundaries by defining fixed times for professional accessibility outside of working hours increased as congruency with their regulatory focus increased. The loss-framed ad was more effective for consumers with a predominant prevention focus, while the gain-framed ad was more effective for consumers with a predominant promotion focus. Ad believability and attitude toward the ad both emerged as predictors of behavioral intention. Mediation analysis revealed that the direct effect of the interaction between regulatory focus and message frame on behavioral intention was no longer significant when including ad believability and ad attitude as mediators in the model, indicating full mediation. However, while the indirect effect through ad believability was significant, the indirect effect through attitude toward the ad was not significant. Hence, regulatory fit increased ad believability, which then increased behavioral intention. Ad believability appears to have a superior effect indicating that behavioral intention does not depend on attitude toward the ad, but it depends on whether or not the ad is perceived as believable. The study shows that the principle of regulatory fit holds true in the context of ICT consumption and responds to calls for more research on mediators of health message framing effects.Keywords: always-on mentality, Information and communication technologies (ICT) consumption, message framing, regulatory focus
Procedia PDF Downloads 210