Search results for: users' satisfaction
3050 Status of Production, Distribution and Determinants of Biomass Briquette Acceptability in Kampala, Uganda
Authors: David B. Kisakye, Paul Mugabi
Abstract:
Biomass briquettes have been identified as a plausible and close alternative to commonly used energy fuels such as charcoal and firewood, whose prices are escalating due to the dwindling natural resource base. However, briquettes do not seem to be as popular as would be expected. This study assessed the production, distribution, and acceptability of the briquettes in the Kampala district. A total of 60 respondents, 50 of whom were briquette users and 10 briquette producers, were sampled from five divisions of Kampala district to evaluate consumer acceptability, preference for briquette type and shape. Households and institutions were identified to be the major consumers of briquettes, while community-based organizations were the major distributors of briquettes. The Chi-square test of independence showed a significant association between briquette acceptability and briquette attributes of substitutability and low cost (p < 0,05). The Kruskal Wallis test showed that low-income class people preferred non-carbonized briquettes. Gender, marital status, and income level also cause variation in preference for spherical, stick, and honeycomb briquettes (p < 0,05). The major challenges faced by briquette users in Kampala were; production of a lot of ash, frequent crushing, and limited access to briquettes. The producers of briquettes were mainly challenged by regular machine breakdown, raw material scarcity, and poor carbonizing units. It was concluded that briquettes have a market and are generally accepted in Kampala. However, user preferences need to be taken into account by briquette produces, suitable cookstoves should be availed to users, and there is a need for standards to ensure the quality of briquettes.Keywords: consumer acceptability, biomass residues, briquettes, briquette producers, distribution, fuel, marketability, wood fuel
Procedia PDF Downloads 1433049 Mass Customization of Chemical Protective Clothing
Authors: Eugenija Strazdiene, Violeta Bytautaite, Daivute Krisciuniene
Abstract:
The object of the investigation is the suit for chemical protection, which totally covers human body together with breathing apparatus, breathing mask and helmet (JSC Ansell Protective Solutions Lithuania). The end users of such clothing are the members of rescue team – firefighters. During the presentation, the results of 3D scanning with stationary Human Solutions scanner and portable Artec Eva scanner will be compared on the basis of the efficiency of scanning procedure and scanning accuracy. Also, the possibilities to exporting scanned bodies into specialized CAD systems for suit design development and material consumption calculation will be analyzed. The necessity to understand and to implement corresponding clothing material properties during 3D visualization of garment on CAD systems will be presented. During the presentation, the outcomes of the project ‘Smart and Safe Work Wear Clothing SWW’ will be discussed. The project is carried out under the Interreg Baltic Sea Region Program as 2014-2020 European territorial cooperation objective. Thematic priority is Capacity for Innovation. The main goal of the project is to improve competitiveness and to increase business possibilities for work wear enterprises in the Baltic Sea Region. The project focuses on mass customization of products for various end users. It engages textile and clothing manufacturing technology researchers, work wear producers, end users, as well as national textile and clothing branch organizations in Finland, Lithuania, Latvia, Estonia and Poland.Keywords: CAD systems, mass customization, 3D scanning, safe work wear
Procedia PDF Downloads 2023048 Factors Affecting Transportation Services in Addis Ababa City
Authors: Yared Yitagesu Tilahun
Abstract:
Every nation, developed or developing, relies on transportation, but Addis Abeba City's transportation service is impacted by a number of variables. The current study's objectives are to determine the factors that influence transportation and gauge consumer satisfaction with such services in Addis Abeba. Customers and employees of Addis Ababa's transportation service authority would be the study's target group. 40 workers of the authority would be counted as part of the 310 000 clients that make up the population of the searcher service. Using a straightforward random selection technique, the researcher only chose 99 customers and 28 staff from this enormous group due to the considerable cost and time involved. Data gathering and analysis options included both quantitative and qualitative approaches. The results of this poll show that young people between the ages of 18 and 25 make up the majority of respondents (51.6%). The majority of employees and customers indicated that they are not satisfied with Addis Ababa's overall transportation system. The Addis Abeba Transportation Authority prioritizes client happiness by providing fair service. The company should have a system in place for managing time, resources, and people effectively. It should also provide employees the opportunity to contribute to client handling policies.Keywords: transportation, customer satisfaction, services, determinants
Procedia PDF Downloads 1243047 Airline Choice Model for Domestic Flights: The Role of Airline Flexibility
Authors: Camila Amin-Puello, Lina Vasco-Diaz, Juan Ramirez-Arias, Claudia Munoz, Carlos Gonzalez-Calderon
Abstract:
Operational flexibility is a fundamental aspect in the field of airlines because although demand is constantly changing, it is the duty of companies to provide a service to users that satisfies their needs in an efficient manner without sacrificing factors such as comfort, safety and other perception variables. The objective of this research is to understand the factors that describe and explain operational flexibility by implementing advanced analytical methods such as exploratory factor analysis and structural equation modeling, examining multiple levels of operational flexibility and understanding how these variable influences users' decision-making when choosing an airline and in turn how it affects the airlines themselves. The use of a hybrid model and latent variables improves the efficiency and accuracy of airline performance prediction in the unpredictable Colombian market. This pioneering study delves into traveler motivations and their impact on domestic flight demand, offering valuable insights to optimize resources and improve the overall traveler experience. Applying the methods, it was identified that low-cost airlines are not useful for flexibility, while users, especially women, found airlines with greater flexibility in terms of ticket costs and flight schedules to be more useful. All of this allows airlines to anticipate and adapt to their customers' needs efficiently: to plan flight capacity appropriately, adjust pricing strategies and improve the overall passenger experience.Keywords: hybrid choice model, airline, business travelers, domestic flights
Procedia PDF Downloads 123046 Study on the Effects of Indigenous Biological Face Treatment
Authors: Saron Adisu Gezahegn
Abstract:
Commercial cosmetic has been affecting human health due to their contents and dosage composition. Chemical base cosmetics exposes users to unnecessary health problems and financial cost. Some of the cosmetics' interaction with the environment has negative impacts on health such as burning, cracking, coloring, and so on. The users are looking for a temporary service without evaluating the side effects of cosmetics that contain chemical compositions that result in irritation, burning, allergies, cracking, and the nature of the face. Every cosmetic contains a heavy metal such as lead, zinc, cadmium, silicon, and other heavy cosmetics materials. The users may expose at the end of the day to untreatable diseases like cancer. The objective of the research is to study the effects of indigenous biological face treatment without any additives like chemicals. In ancient times this thought was highly tremendous in the world but things were changing bit by bit and reached chemical base cosmetics to maintain the beauty of hair, skin, and faces. The side effects of the treatment on the face were minimum and the side effects with the interaction of the environment were almost nil. But this thought is changed and replaces the indigenous substances with chemical substances by adding additives like heavy chemical lead and cadmium in the sense of preservation, pigments, dye, and shining. Various studies indicated that cosmetics have dangerous side effects that expose users to health problems and expensive financial loss. This study focuses on a local indigenous plant called Kulkual. Kulkual is available everywhere in a study area and sustainable products can harvest to use as indigenous face treatment materials.25 men and 25 women were selected as a sample population randomly to conduct the study effectively.The plant is harvested from the guard in the productive season. The plant was exposed to the sun dry for a week. Then the peel was removed from the plant fruit and the peels were taken to a bath filled with water to soak for three days. Then the flesh of the peel was avoided from the fruit and ready to use as a face treatment. The fleshy peel was smeared on each sample for almost a week and continued for a week. The result indicated that the effects of the treatment were a positive response with minimum cost and minimum side effects due to the environment. The beauty shines, smoothness, and color are better than chemical base cosmetics. Finally, the study is recommended that all users prefer a biological method of treatment with minimum cost and minimums side effects on health with the interaction of the environment.Keywords: cosmetic, indigneous, heavymetals, toxic
Procedia PDF Downloads 1063045 Performance Study of Classification Algorithms for Consumer Online Shopping Attitudes and Behavior Using Data Mining
Authors: Rana Alaa El-Deen Ahmed, M. Elemam Shehab, Shereen Morsy, Nermeen Mekawie
Abstract:
With the growing popularity and acceptance of e-commerce platforms, users face an ever increasing burden in actually choosing the right product from the large number of online offers. Thus, techniques for personalization and shopping guides are needed by users. For a pleasant and successful shopping experience, users need to know easily which products to buy with high confidence. Since selling a wide variety of products has become easier due to the popularity of online stores, online retailers are able to sell more products than a physical store. The disadvantage is that the customers might not find products they need. In this research the customer will be able to find the products he is searching for, because recommender systems are used in some ecommerce web sites. Recommender system learns from the information about customers and products and provides appropriate personalized recommendations to customers to find the needed product. In this paper eleven classification algorithms are comparatively tested to find the best classifier fit for consumer online shopping attitudes and behavior in the experimented dataset. The WEKA knowledge analysis tool, which is an open source data mining workbench software used in comparing conventional classifiers to get the best classifier was used in this research. In this research by using the data mining tool (WEKA) with the experimented classifiers the results show that decision table and filtered classifier gives the highest accuracy and the lowest accuracy classification via clustering and simple cart.Keywords: classification, data mining, machine learning, online shopping, WEKA
Procedia PDF Downloads 3513044 Impact of Proposed Modal Shift from Private Users to Bus Rapid Transit System: An Indian City Case Study
Authors: Rakesh Kumar, Fatima Electricwala
Abstract:
One of the major thrusts of the Bus Rapid Transit System is to reduce the commuter’s dependency on private vehicles and increase the shares of public transport to make urban transportation system environmentally sustainable. In this study, commuter mode choice analysis is performed that examines behavioral responses to the proposed Bus Rapid Transit System (BRTS) in Surat, with estimation of the probable shift from private mode to public mode. Further, evaluation of the BRTS scenarios, using Surat’s transportation ecological footprint was done. A multi-modal simulation model was developed in Biogeme environment to explicitly consider private users behaviors and non-linear environmental impact. The data of the different factors (variables) and its impact that might cause modal shift of private mode users to proposed BRTS were collected through home-interview survey using revealed and stated preference approach. A multi modal logit model of mode-choice was then calibrated using the collected data and validated using proposed sample. From this study, a set of perception factors, with reliable and predictable data base, to explain the variation in modal shift behaviour and their impact on Surat’s ecological environment has been identified. A case study of the proposed BRTS connecting the Surat Industrial Hub to the coastal area is provided to illustrate the approach.Keywords: BRTS, private modes, mode choice models, ecological footprint
Procedia PDF Downloads 5193043 Linux Security Management: Research and Discussion on Problems Caused by Different Aspects
Authors: Ma Yuzhe, Burra Venkata Durga Kumar
Abstract:
The computer is a great invention. As people use computers more and more frequently, the demand for PCs is growing, and the performance of computer hardware is also rising to face more complex processing and operation. However, the operating system, which provides the soul for computers, has stopped developing at a stage. In the face of the high price of UNIX (Uniplexed Information and Computering System), batch after batch of personal computer owners can only give up. Disk Operating System is too simple and difficult to bring innovation into play, which is not a good choice. And MacOS is a special operating system for Apple computers, and it can not be widely used on personal computers. In this environment, Linux, based on the UNIX system, was born. Linux combines the advantages of the operating system and is composed of many microkernels, which is relatively powerful in the core architecture. Linux system supports all Internet protocols, so it has very good network functions. Linux supports multiple users. Each user has no influence on their own files. Linux can also multitask and run different programs independently at the same time. Linux is a completely open source operating system. Users can obtain and modify the source code for free. Because of these advantages of Linux, it has also attracted a large number of users and programmers. The Linux system is also constantly upgraded and improved. It has also issued many different versions, which are suitable for community use and commercial use. Linux system has good security because it relies on a file partition system. However, due to the constant updating of vulnerabilities and hazards, the using security of the operating system also needs to be paid more attention to. This article will focus on the analysis and discussion of Linux security issues.Keywords: Linux, operating system, system management, security
Procedia PDF Downloads 1083042 Analysis of Productivity and Poverty Status among Users of Improved Sorghum Varieties in Kano State, Nigeria
Authors: Temitope Adefunsho Olatoye, Julius Olabode Elega
Abstract:
Raising agricultural productivity is an important policy goal for governments and development agencies, and this is central to growth, income distribution, improved food security, and poverty alleviation among practitioners. This study analyzed the productivity and poverty status among users of improved sorghum varieties in Kano State, Nigeria. A multistage sampling technique was adopted in the selection of 131 sorghum farmers who were users of improved sorghum varieties. Data collected were analyzed using both descriptive (frequency distribution and percentage) and inferential (productivity index and FGT model) statistics. The result of the socioeconomic characteristics of the sorghum farmers showed a mean age of 40 years, with about 93.13% of the sorghum farmers being male. Also, as indicated by the result, the majority (82.44%) of the farmers were married, with most of them having qur’anic education with a mean farm size of 3.6 ha, as reported in the study area. Furthermore, the result showed that the mean farming experience of the sorghum farmers in the study area was 19 years, with an average monthly income of about ₦48,794, as reported in the study area. The result of the productivity index showed a ratio of 192,977kg/ha, while the result of poverty status shows that 62.88% were in the non-poor category, 21.21% were poor, and 15.91% were very poor, respectively. The result also showed that the incidence of poverty for sorghum farmers was 16%, indicating that the incidence of poverty was prevalent in the study area. Based on the findings of this study, it was therefore recommended that seed companies should facilitate the spread of improved sorghum varieties as it has an impact on the productivity and poverty status of sorghum farmers in the study area.Keywords: Foster Greer Thorbecke model, improved sorghum varieties, productivity, poverty status
Procedia PDF Downloads 733041 A Multi-Criteria Model for Scheduling of Stochastic Single Machine Problem with Outsourcing and Solving It through Application of Chance Constrained
Authors: Homa Ghave, Parmis Shahmaleki
Abstract:
This paper presents a new multi-criteria stochastic mathematical model for a single machine scheduling with outsourcing allowed. There are multiple jobs processing in batch. For each batch, all of job or a quantity of it can be outsourced. The jobs have stochastic processing time and lead time and deterministic due dates arrive randomly. Because of the stochastic inherent of processing time and lead time, we use the chance constrained programming for modeling the problem. First, the problem is formulated in form of stochastic programming and then prepared in a form of deterministic mixed integer linear programming. The objectives are considered in the model to minimize the maximum tardiness and outsourcing cost simultaneously. Several procedures have been developed to deal with the multi-criteria problem. In this paper, we utilize the concept of satisfaction functions to increases the manager’s preference. The proposed approach is tested on instances where the random variables are normally distributed.Keywords: single machine scheduling, multi-criteria mathematical model, outsourcing strategy, uncertain lead times and processing times, chance constrained programming, satisfaction function
Procedia PDF Downloads 2643040 Affordances in Boating Performative Practices: The Case of Leisure Boating from the Swedish West Coast
Authors: Neva Leposa
Abstract:
While environmental policy makers are trying to increase pro-environmental behavior among tourists or outdoor recreation users through changing users’ attitudes, the focus of this paper is turned to the importance of so far marginalized – materiality in the users’ practices. The case study of leisure boating in Sweden used in this paper demonstrates how through the change of materiality (i.e. equipment and physical size of the leisure boats) emergent affordances in materially bound practices are transformed, and the boater-boat-sea nexus is redefined. Participatory observation and in-depth interviewing of Swedish West Coast visitors reveal two stories, first one points to the fact that sail boating practice is becoming increasingly motorized and second one describes how leisure boats are becoming increasingly perceived and used as mobile summer houses. Hence, such practice increases energy and matter consumption. This paper describes how that change happens through practice theory and affordance theory, thus points to visibility and the importance of materiality in shaping human nature nexus. Boating practice changes through the change of the materiality of the boats. In particular, energy consumption increases through the change of engagement with the matter. This study puts focus environmental attitudes focused strivings in question, for the fact that it is too individual-centered and lacks contextual understanding of the materially bound practices and may fail in the very thing it is aiming to do - reduce the environmental impacts.Keywords: practice theory, affordance theory, leisure boating, materiality
Procedia PDF Downloads 2693039 Cultural Identity and Self-Censorship in Social Media: A Qualitative Case Study
Authors: Nastaran Khoshsabk
Abstract:
The evolution of communication through the Internet has influenced shaping and reshaping the self-presentation of social media users. Online communities both connect people and give voice to the voiceless allowing them to present themselves nationally and globally. People all around the world are experiencing censorship in different aspects of their life. Censorship can be externally imposed because of the political situations, or it can be self-imposed. Social media users choose the content they want to share and decide about the online audiences with whom they want to share this content. Most social media networks, such as Facebook, enable their users to be selective about the shared content and its availability to other people. However, sometimes instead of targeting a specific audience, users self-censor themselves or decide not to share various forms of information. These decisions are of particular importance in countries such as Iran where Internet is not the arena of free self-presentation and people are encouraged to stay away from political participation in the country and acting against the Islamic values. Facebook and some other social media tools are blocked in countries such as Iran. This project investigates the importance of social media in the life of Iranians to explore how they present themselves and construct their digital selves. The notion of cultural identity is applied in this research to explore the educational and informative role of social media in the identity formation and cultural representation of Facebook users. This study explores the self-censorship of Iranian adult Facebook users through their online self-representation and communication on the Internet. The data in this qualitative multiple case study have been collected through individual synchronous online interviews with the researcher’s Facebook friends and through the analysis of the participants’ Facebook profiles and activities over a period of six months. The data is analysed with an emphasis on the identity formation of participants through the recognition of the underlying themes. The exploration of online interviews is on the basis of participants’ personal accounts of self-censorship and cultural understanding through using social media. The driven codes and themes have been categorised considering censorship and place of culture on representation of self. Participants were asked to explain their views about censorship and conservatism through using social media. They reported their thoughts about deciding which content to share on Facebook and which to self-censor and their reasons behind these decisions. The codes and themes have been categorised considering censorship and its role in representation of idealised self. The ‘actual self’ showed to be hidden by an individual for different reasons such as its influence on their social status, academic achievements and job opportunities. It is hoped that this research will have implications for education contexts in countries that are experiencing social media filtering by offering an increased understanding of the importance of online communities; which can provide an educational environment to talk and learn about social taboos and constructing adults’ identity in virtual environment and through cultural self-presentation.Keywords: cultural identity, identity formation, online communities, self-censorship
Procedia PDF Downloads 2373038 Critical Success Factors Quality Requirement Change Management
Authors: Jamshed Ahmad, Abdul Wahid Khan, Javed Ali Khan
Abstract:
Managing software quality requirements change management is a difficult task in the field of software engineering. Avoiding incoming changes result in user dissatisfaction while accommodating to many requirement changes may delay product delivery. Poor requirements management is solely considered the primary cause of the software failure. It becomes more challenging in global software outsourcing. Addressing success factors in quality requirement change management is desired today due to the frequent change requests from the end-users. In this research study, success factors are recognized and scrutinized with the help of a systematic literature review (SLR). In total, 16 success factors were identified, which significantly impacted software quality requirement change management. The findings show that Proper Requirement Change Management, Rapid Delivery, Quality Software Product, Access to Market, Project Management, Skills and Methodologies, Low Cost/Effort Estimation, Clear Plan and Road Map, Agile Processes, Low Labor Cost, User Satisfaction, Communication/Close Coordination, Proper Scheduling and Time Constraints, Frequent Technological Changes, Robust Model, Geographical distribution/Cultural differences are the key factors that influence software quality requirement change. The recognized success factors and validated with the help of various research methods, i.e., case studies, interviews, surveys and experiments. These factors are then scrutinized in continents, database, company size and period of time. Based on these findings, requirement change will be implemented in a better way.Keywords: global software development, requirement engineering, systematic literature review, success factors
Procedia PDF Downloads 1973037 The Application of Fuzzy Set Theory to Mobile Internet Advertisement Fraud Detection
Authors: Jinming Ma, Tianbing Xia, Janusz Getta
Abstract:
This paper presents the application of fuzzy set theory to implement of mobile advertisement anti-fraud systems. Mobile anti-fraud is a method aiming to identify mobile advertisement fraudsters. One of the main problems of mobile anti-fraud is the lack of evidence to prove a user to be a fraudster. In this paper, we implement an application by using fuzzy set theory to demonstrate how to detect cheaters. The advantage of our method is that the hardship in detecting fraudsters in small data samples has been avoided. We achieved this by giving each user a suspicious degree showing how likely the user is cheating and decide whether a group of users (like all users of a certain APP) together to be fraudsters according to the average suspicious degree. This makes the process more accurate as the data of a single user is too small to be predictable.Keywords: mobile internet, advertisement, anti-fraud, fuzzy set theory
Procedia PDF Downloads 1813036 SIPTOX: Spider Toxin Database Information Repository System of Protein Toxins from Spiders by Using MySQL Method
Authors: Iftikhar Tayubi, Tabrej Khan, Rayan Alsulmi, Abdulrahman Labban
Abstract:
Spider produces a special kind of substance. This special kind of substance is called a toxin. The toxin is composed of many types of protein, which differs from species to species. Spider toxin consists of several proteins and non-proteins that include various categories of toxins like myotoxin, neurotoxin, cardiotoxin, dendrotoxin, haemorrhagins, and fibrinolytic enzyme. Protein Sequence information with references of toxins was derived from literature and public databases. From the previous findings, the Spider toxin would be the best choice to treat different types of tumors and cancer. There are many therapeutic regimes, which causes more side effects than treatment hence a different approach must be adopted for the treatment of cancer. The combinations of drugs are being encouraged, and dramatic outcomes are reported. Spider toxin is one of the natural cytotoxic compounds. Hence, it is being used to treat different types of tumors; especially its positive effect on breast cancer is being reported during the last few decades. The efficacy of this database is that it can provide a user-friendly interface for users to retrieve the information about Spiders, toxin and toxin protein of different Spiders species. SPIDTOXD provides a single source information about spider toxins, which will be useful for pharmacologists, neuroscientists, toxicologists, medicinal chemists. The well-ordered and accessible web interface allows users to explore the detail information of Spider and toxin proteins. It includes common name, scientific name, entry id, entry name, protein name and length of the protein sequence. The utility of this database is that it can provide a user-friendly interface for users to retrieve the information about Spider, toxin and toxin protein of different Spider species. The database interfaces will satisfy the demands of the scientific community by providing in-depth knowledge about Spider and its toxin. We have adopted the methodology by using A MySQL and PHP and for designing, we used the Smart Draw. The users can thus navigate from one section to another, depending on the field of interest of the user. This database contains a wealth of information on species, toxins, and clinical data, etc. This database will be useful for the scientific community, basic researchers and those interested in potential pharmaceutical Industry.Keywords: siptoxd, php, mysql, toxin
Procedia PDF Downloads 1823035 The Antecedent Variables of Government Financial Accounting System (SAKD) Implementation and Its Consequences: Empirical Study on the Device of Regional Coordinating Agency for Development of Cross County, City Region III Central Java Province, Indo
Authors: Dona Primasari
Abstract:
This study examines the antecedent variables of Government Financial Acccounting System (SAKD) implementation and its consequence. The antecedent variables are: decentralization of decision making, adaptation, and the manager support. The consequences are satisfaction and performance officer. This research represents the empirical test which used convenience sampling technics in data collection. The data were collected from 167 officers of local government in the Regional Coordinating Agency for Development of Cross County/City Region III Central Java Province. Data analysis used Structural Equation Model (SEM) with the AMOS 18.0 program. The result of hypothesis examination indicates that six raised hypothesis are accepted and two hypothesis are rejected.Keywords: decentralization of decision making, adaptation officer, manager support, implementation of Government Accounting Financial System (SAKD), satisfaction and performance officer
Procedia PDF Downloads 3893034 User Experience in Relation to Eye Tracking Behaviour in VR Gallery
Authors: Veslava Osinska, Adam Szalach, Dominik Piotrowski
Abstract:
Contemporary VR technologies allow users to explore virtual 3D spaces where they can work, socialize, learn, and play. User's interaction with GUI and the pictures displayed implicate perceptual and also cognitive processes which can be monitored due to neuroadaptive technologies. These modalities provide valuable information about the users' intentions, situational interpretations, and emotional states, to adapt an application or interface accordingly. Virtual galleries outfitted by specialized assets have been designed using the Unity engine BITSCOPE project in the frame of CHIST-ERA IV program. Users interaction with gallery objects implies the questions about his/her visual interests in art works and styles. Moreover, an attention, curiosity, and other emotional states are possible to be monitored and analyzed. Natural gaze behavior data and eye position were recorded by built-in eye-tracking module within HTC Vive headset gogle for VR. Eye gaze results are grouped due to various users’ behavior schemes and the appropriate perpetual-cognitive styles are recognized. Parallelly usability tests and surveys were adapted to identify the basic features of a user-centered interface for the virtual environments across most of the timeline of the project. A total of sixty participants were selected from the distinct faculties of University and secondary schools. Users’ primary knowledge about art and was evaluated during pretest and this way the level of art sensitivity was described. Data were collected during two months. Each participant gave written informed consent before participation. In data analysis reducing the high-dimensional data into a relatively low-dimensional subspace ta non linear algorithms were used such as multidimensional scaling and novel technique technique t-Stochastic Neighbor Embedding. This way it can classify digital art objects by multi modal time characteristics of eye tracking measures and reveal signatures describing selected artworks. Current research establishes the optimal place on aesthetic-utility scale because contemporary interfaces of most applications require to be designed in both functional and aesthetical ways. The study concerns also an analysis of visual experience for subsamples of visitors, differentiated, e.g., in terms of frequency of museum visits, cultural interests. Eye tracking data may also show how to better allocate artefacts and paintings or increase their visibility when possible.Keywords: eye tracking, VR, UX, visual art, virtual gallery, visual communication
Procedia PDF Downloads 423033 Effect of Gender Norms and Gender Equality on Depression and Quality of Life among Young and Old Married Couples
Authors: Musarrat Jabeen, Fatima Zahra Khan, Hamida Bano, Faiza Anjum, Sara Tahir, Kainat Umar, Uzma Azam
Abstract:
The aim of this study was to examine the effect of gender norms and gender equality on depression and quality of life among young and old married couples. The sample consisted of 60 old and 100 young married couples. It was mainly conducted in Islamabad, Pakistan. However, since it was convenient and snowball sampling, we were able to get the data from other cities of Pakistan as well. By using Beck Depression Scale (Aaron T. Beck), Satisfaction with Life Scale (Diener), the Ambivalent Sexism Inventory (Glick & Fiske,1996), and Gender Norms Attitude Scale(Waszak et al., 2000). It was found that the old couples have a high quality of life than young couples, which further proved them to have positive attitude towards gender equality, negative attitude towards gender norms and low level of depression. Also, couples having positive attitude towards gender equality have high level of satisfaction with life than the ones having negative attitude towards gender norms, who have low level of depression. Also, having a negative attitude towards gender norms has adverse effects on the level of depression. To achieve a high quality of life, it would be helpful to evolve with the world, especially with respect to the concepts of gender norms and equality.Keywords: depression, gender equality, gender norms, married couples, quality of life
Procedia PDF Downloads 1623032 Building User Behavioral Models by Processing Web Logs and Clustering Mechanisms
Authors: Madhuka G. P. D. Udantha, Gihan V. Dias, Surangika Ranathunga
Abstract:
Today Websites contain very interesting applications. But there are only few methodologies to analyze User navigations through the Websites and formulating if the Website is put to correct use. The web logs are only used if some major attack or malfunctioning occurs. Web Logs contain lot interesting dealings on users in the system. Analyzing web logs has become a challenge due to the huge log volume. Finding interesting patterns is not as easy as it is due to size, distribution and importance of minor details of each log. Web logs contain very important data of user and site which are not been put to good use. Retrieving interesting information from logs gives an idea of what the users need, group users according to their various needs and improve site to build an effective and efficient site. The model we built is able to detect attacks or malfunctioning of the system and anomaly detection. Logs will be more complex as volume of traffic and the size and complexity of web site grows. Unsupervised techniques are used in this solution which is fully automated. Expert knowledge is only used in validation. In our approach first clean and purify the logs to bring them to a common platform with a standard format and structure. After cleaning module web session builder is executed. It outputs two files, Web Sessions file and Indexed URLs file. The Indexed URLs file contains the list of URLs accessed and their indices. Web Sessions file lists down the indices of each web session. Then DBSCAN and EM Algorithms are used iteratively and recursively to get the best clustering results of the web sessions. Using homogeneity, completeness, V-measure, intra and inter cluster distance and silhouette coefficient as parameters these algorithms self-evaluate themselves to input better parametric values to run the algorithms. If a cluster is found to be too large then micro-clustering is used. Using Cluster Signature Module the clusters are annotated with a unique signature called finger-print. In this module each cluster is fed to Associative Rule Learning Module. If it outputs confidence and support as value 1 for an access sequence it would be a potential signature for the cluster. Then the access sequence occurrences are checked in other clusters. If it is found to be unique for the cluster considered then the cluster is annotated with the signature. These signatures are used in anomaly detection, prevent cyber attacks, real-time dashboards that visualize users, accessing web pages, predict actions of users and various other applications in Finance, University Websites, News and Media Websites etc.Keywords: anomaly detection, clustering, pattern recognition, web sessions
Procedia PDF Downloads 2883031 DURAFILE: A Collaborative Tool for Preserving Digital Media Files
Authors: Santiago Macho, Miquel Montaner, Raivo Ruusalepp, Ferran Candela, Xavier Tarres, Rando Rostok
Abstract:
During our lives, we generate a lot of personal information such as photos, music, text documents and videos that link us with our past. This data that used to be tangible is now digital information stored in our computers, which implies a software dependence to make them accessible in the future. Technology, however, constantly evolves and goes through regular shifts, quickly rendering various file formats obsolete. The need for accessing data in the future affects not only personal users but also organizations. In a digital environment, a reliable preservation plan and the ability to adapt to fast changing technology are essential for maintaining data collections in the long term. We present in this paper the European FP7 project called DURAFILE that provides the technology to preserve media files for personal users and organizations while maintaining their quality.Keywords: artificial intelligence, digital preservation, social search, digital preservation plans
Procedia PDF Downloads 4453030 Bring Your Own Device Security Model in a Financial Institution of South Africa
Authors: Michael Nthabiseng Moeti, Makhulu Relebogile Langa, Joey Jansen van Vuuren
Abstract:
This paper examines the utilization of personal electronic devices like laptops, tablets, and smartphones for professional duties within a financial organization. This phenomenon is known as bring your own device (BYOD). BYOD accords employees the freedom to use their personal devices to access corporate resources from anywhere in the world with Internet access. BYOD arrangements introduce significant security risks for both organizations and users. These setups change the threat landscape for enterprises and demand unique security strategies, as conventional tools tailored for safeguarding managed devices fall short in adequately protecting enterprise assets without active user cooperation. This paper applies protection motivation theory (PMT) to highlight behavioral risks from BYOD users that may impact the security of financial institutions. Thematic analysis was applied to gain a comprehensive understanding of how users perceive this phenomenon. These findings demonstrates that the existence of a security policy does not ensure that all employees will take measures to protect their personal devices. Active promotion of BYOD security policies is crucial for financial institution employees and management. This paper developed a BYOD security model which is useful for understanding compliant behaviors. Given that BYOD security is becoming a major concern across financial sector, it is important. The paper recommends that future research could expand the number of universities from which data is collected.Keywords: BYOD, information security, protection motivation theory, security risks, thematic analysis
Procedia PDF Downloads 313029 Reading the Interior Furnishings of the Houses through Turkish Films in the 1980's
Authors: Dicle Aydın, Tuba Bulbul Bahtiyar, Esra Yaldız
Abstract:
Housing offers a confirmed space for individuals. In the sense of interior decoration design, housing is a kind of typology in which user’s profile and individual preferences are considered as primary determinants. In Turkish society, the transition from traditional residences to apartment buildings brings the change in interior fittings depending upon the location of houses in its wake. The social status of the users in the residence and the differences of their everyday life can be represented more evident in these interior fittings. Hence, space becomes a tool to carry the information of users and the act. From this aspect, space as a concrete tool also enables a multidirectional communication with the cinema which reflects the social, cultural and economic changes of the society. While space takes a virtual or real part of the cinema, architecture discipline has also been influenced by cinematic phenomenas in its own practice. The subject of the movie and its content commune with the space, therefore, the design of the space is formed to support the subject. The purpose of this study is to analyze the space through motion pictures that convey the information of social life with an objective perspective. In addition, this study aims to determine the space, fittings and the use of fittings with respect to the social status of users. Morever, three films in 1980s in which Kemal Sunal, protagonist of the scripts that reflect society in many ways, performed are examined in this study. Movie sets are considered in many ways. For instance, in one of these movies, different houses from an apartment are analyzed vis a vis the perspective of the study.Keywords: housing, interior, furniture, furnishing, user
Procedia PDF Downloads 2023028 Comparison of the Effectiveness of Communication between the Traditional Lecture and IELS
Authors: Ahmed R. Althobaiti, Malcolm Munro
Abstract:
Communication and effective information exchange within technology has become a crucial part of delivering knowledge to students during the learning process. It enables better understanding, builds trust, respect and increase the knowledge between students. This paper examines the communication between undergraduate students and their lecturers during the Traditional lecture and in using the Interactive Electronic Lecture System (IELS). The IELS is an application that offers a set of components, which support the effective communication between students, themselves and their lecturers. Moreover, this paper highlights the communication skills such as sender, receiver, channel and feedback. It will show how the IELS creates a rich communication environment between its users and how they communicate effectively. To examine and check the effectiveness of communication an experiment has been conducted for groups of users; students and lecturers. The first group communicated during the Traditional lecture while the second group communicated by the IELS application. The result showed that there was an effective communication between the second group more than the first group.Keywords: communication, effective information exchange, lecture, student
Procedia PDF Downloads 4043027 Combining Mobile Intelligence with Formation Mechanism for Group Commerce
Authors: Lien Fa Lin, Yung Ming Li, Hsin Chen Hsieh
Abstract:
The rise of smartphones brings new concept So-Lo-Mo (social-local-mobile) in mobile commerce area in recent years. However, current So-Lo-Mo services only focus on individual users but not a group of users, and the development of group commerce is not enough to satisfy the demand of real-time group buying and less to think about the social relationship between customers. In this research, we integrate mobile intelligence with group commerce and consider customers' preference, real-time context, and social influence as components in the mechanism. With the support of this mechanism, customers are able to gather near customers with the same potential purchase willingness through mobile devices when he/she wants to purchase products or services to have a real-time group-buying. By matching the demand and supply of mobile group-buying market, this research improves the business value of mobile commerce and group commerce further.Keywords: group formation, group commerce, mobile commerce, So-Lo-Mo, social influence
Procedia PDF Downloads 4143026 Nursing Students Assessment to the Clinical Learning Environment and Mentoring in Children Nursing
Authors: Lily Parm, Irma Nool, Liina Männiksaar, Mare Tupits, Ivi Prits, Merilin Kuhi, Valentina Raudsepp
Abstract:
Background: The results of previous clinical satisfaction surveys show that nursing students swhounderw entinternships in the pediatricwardhadthelowestsatisfactioncomparedtootherwards, but the quality of students' practicaltrainingexperienceisanimportant determinant in nursing education. The aim of theresearchwastodescribenursingstudents` assessment to the clinical learning environment and supervision in pediatric wards Method: Theresearchisquantitative. All studentswhohadpracticaltraining in the pediatric ward participated in the study (N = 39). FordatacollectionClinicalLearningEnvironment, Supervision, and NurseTeacher (CLES + T) evaluationscalewasused, wherethescalewasanswered on a 5-point Likert scale. In addition, 10 backgroundvariableswereused in the questionnaire. IBM SPSS Statistics 28.0 wasusedfordataanalysis. Descriptive statistics and Spearmanncorrelationanalysiswasusedtofindcorrelatinsbetweenbackgroundvariables and satisfaction with supervision.Permissiontoconductthestudy (No 695) hasbeenobtainedbytheEthicsCommittee of theInstituteforHealthDevelopment. Results: Of therespondents, 28 (71.8%) werefirst-year, 9 (23.1%) second-year and 2 (5.1%) fourth-yearstudents. Thelargestshare of the last practicaltrainigwas in nursing, with 27 (69.2%) respondents. Mainlythementorswerenursesfor 32 (82,1%) of students.Satisfactionwiththementoring (4.4 ± 0.83) and wardnursemanager`sleaderhiostyle (4.4 ± 0.7), ratedthehighest and therole of thenurseteacherwasratedthelowest (3,7 ± 0.83.In Spearmann'scorrelationanalysis, therewas a statisticallystrongcorrelationbetween a positiveattitudetowardsthesupervisor'ssupervision and receivingfeedbackfromthesupervisor (r =0.755; p <0.001), studentsatisfactionwithsupervision (r = 0.742; p <0.001), supervisionbased on cooperation (r = 0.77) and instructionbased on theprinciple of equalitythatpromotedlearning (r = 0.755; p <0.001). Conclusions: Theresults of theresearchshowedhighsatisfactionwiththesupervisionand therole of wardmanager. Stillbettercooperationisneededbetweenpracticalplacement and nursingschooltoenhancethestudents`satisfactionwithsupervision.Keywords: CLES+T, clinical environment, nurse teacher, statisfaction, pediatric ward, mentorship
Procedia PDF Downloads 2173025 Secure Intelligent Information Management by Using a Framework of Virtual Phones-On Cloud Computation
Authors: Mohammad Hadi Khorashadi Zadeh
Abstract:
Many new applications and internet services have been emerged since the innovation of mobile networks and devices. However, these applications have problems of security, management, and performance in business environments. Cloud systems provide information transfer, management facilities, and security for virtual environments. Therefore, an innovative internet service and a business model are proposed in the present study for creating a secure and consolidated environment for managing the mobile information of organizations based on cloud virtual phones (CVP) infrastructures. Using this method, users can run Android and web applications in the cloud which enhance performance by connecting to other CVP users and increases privacy. It is possible to combine the CVP with distributed protocols and central control which mimics the behavior of human societies. This mix helps in dealing with sensitive data in mobile devices and facilitates data management with less application overhead.Keywords: BYOD, mobile cloud computing, mobile security, information management
Procedia PDF Downloads 3173024 Development of a Scale for Evaluating the Efficacy of Vacationing
Authors: Ju Yeon Lee, Seol Ah Oh, Hong il Kim, Hae Yong Do, Sung Won Choi
Abstract:
The purpose of this study was to develop a Well-being and Moments Scale (WAMS) for evaluating the efficacy of ‘vacationing’ as a form of mental health recuperation. ‘Vacationing’ is defined as a going outside one’s usual environment to seek refreshment and relief from one’s daily life. To develop WAMS, we followed recommended procedures for scale development, including reviewing related studies, conducting focus group interviews to elucidate the need for this assessment area, and modifying items based on expert opinion. Through this process, we developed the WAMS. The psychometric properties of the WAMS were then tested in two separate samples. Exploratory factor analysis (EFA) was conducted using 1.41 participants (mean age = 30.45 years; range: 20-50 years) to identify the underlying 3-factor structure of 'Positive Emotions', 'Life Satisfaction' and 'Self-Confidence.' The 26 items retained based on the EFA procedures were associated with excellent reliability (i.e., α = 0.93). Confirmatory factor analysis was then conducted using 200 different participants (mean age = 29.51 years; range: 20-50 years) and revealed good model fit for our hypothesized 3-factor model. Convergent validity tests also revealed correlations with other scales in the expected direction and range. Study limitations as well as the importance and utility of WMAS are also discussed.Keywords: vacationing, positive affect, life satisfaction, self-confidence, WAMS
Procedia PDF Downloads 3393023 Societal Impacts of Algorithmic Recommendation System: Economy, International Relations, Political Ideologies, and Education
Authors: Maggie Shen
Abstract:
Ever since the late 20th century, business giants have been competing to provide better experiences for their users. One way they strive to do so is through more efficiently connecting users with their goals, with recommendation systems that filter out unnecessary or less relevant information. Today’s top online platforms such as Amazon, Netflix, Airbnb, Tiktok, Facebook, and Google all utilize algorithmic recommender systems for different purposes—Product recommendation, movie recommendation, travel recommendation, relationship recommendation, etc. However, while bringing unprecedented convenience and efficiency, the prevalence of algorithmic recommendation systems also influences society in many ways. In using a variety of primary, secondary, and social media sources, this paper explores the impacts of algorithms, particularly algorithmic recommender systems, on different sectors of society. Four fields of interest will be specifically addressed in this paper: economy, international relations, political ideologies, and education.Keywords: algorithms, economy, international relations, political ideologies, education
Procedia PDF Downloads 1993022 WHSS: A Platform for Designing Water Harvesting Systems for Multiple Purposes
Authors: Ignacio Sanchez Cohen, Aurelio Pedroza Sandoval, Ricardo Trejo Calzada
Abstract:
Water harvesting systems (WHS) has become the unique alternative that farmers in dry areas accounts for surviving dry periods. Nevertheless, technicians, agronomists, and users, in general, have to cope with the difficulty of finding suitable technology for optimal design of WHS. In this paper, we describe a user-friendly computer program that uses readily available information for the design of multiple WHS depending upon the water final use (agriculture, household, conservation, etc). The application (APP) itself contains several links to help the user complete the input requirements. It is not a prerequisite to have any computer skills for the use of the APP. Outputs of the APP are the dimensions of the WHS named terraces, micro-catchments, cisterns, and small household cisterns for roof water catchment. The APP also provides guidance on crops for backyard agriculture. We believe that this tool may guide users to better optimize WHS for multiple purposes and to widen the possibility of copping with dry spells in arid lands.Keywords: rainfall-catchment, models, computer aid, arid lands
Procedia PDF Downloads 1773021 The Examination of Parents’ Perceptions and Motivations Regarding Type 1 Diabetes Management Technologies
Authors: Maria Dora Horvath, Norbert Buzas, Zsanett Tesch
Abstract:
Diabetes management poses many unique challenges for children and their parents. The use of a diabetes management device should not be one of these challenges as the purpose of these devices is to make the management more convenient. The objective of our study was to examine how demographical, psychological and diabetes-related factors determine the choices parents make regarding their child’s diabetes management technologies and how they perceive advanced devices. We conducted the study using an online questionnaire with 318 parents (mostly mothers). The questions of the survey were about demographical, diabetes-related and psychological factors (diabetes management problems, diabetes management competence). In addition, we asked the parents opinions about advanced diabetes management devices. We expanded our data with semi-structured in-depth interviews. 61 % of the participants Self-Monitored Blood Glucose (SMBG), and 39 % used a Continuous Glucose Monitoring System (CGM). Considering insulin administration, 58 % used Multiple Daily Insulin Injections (MDII) and 42 % used Continuous Subcutaneous Insulin Infusion (CSII). Parents who used diverse combinations of diabetes management devices showed significant differences in age (parents’ and child’s), the monthly cost of diabetes, the duration of diabetes, the highest level of education and average monthly household income. CGM users perceived diabetes management problems significantly more severe than SMBG users and CSII users felt significantly more competent in diabetes management than MDII users. Avoiding CGM use due to lack of financial resources was determined by diagnosis duration. While avoiding its use by the cause of the child rejecting, it was determined by the child’s age and diabetes competence. Using MDII instead of CSII because of the child’s rejection was determined by the monthly cost of diabetes and child’s age. We conducted a complex empirical study in which we examined perceptions and experiences of advanced and less advanced diabetes management technologies comprehensively. Our study highlights the factors that fundamentally influence parents’ motivations and choices about diabetes management technologies. These results could contribute to developing diabetes management technologies more suitable for children living with type 1 diabetes and their parents.Keywords: advanced diabetes management technologies, children living with type 1 diabetes, diabetes management, motivation, parents
Procedia PDF Downloads 135