Search results for: marketing theory and applications
10529 A Proof of the Fact that a Finite Morphism is Proper
Authors: Ying Yi Wu
Abstract:
In this paper, we present a proof of the fact that a finite morphism is proper. We show that a finite morphism is universally closed and of finite type, which are the conditions for properness. Our proof is based on the theory of schemes and involves the use of the projection formula and the base change theorem. We first show that a finite morphism is of finite type and then proceed to show that it is universally closed. We use the fact that a finite morphism is also an affine morphism, which allows us to use the theory of coherent sheaves and their modules. We then show that the map induced by a finite morphism is flat and that the module it induces is of finite type. We use these facts to show that a finite morphism is universally closed. Our proof is constructive, and we provide details for each step of the argument.Keywords: finite, morphism, schemes, projection.
Procedia PDF Downloads 10910528 Life Stage Customer Segmentation by Fine-Tuning Large Language Models
Authors: Nikita Katyal, Shaurya Uppal
Abstract:
This paper tackles the significant challenge of accurately classifying customers within a retailer’s customer base. Accurate classification is essential for developing targeted marketing strategies that effectively engage this important demographic. To address this issue, we propose a method that utilizes Large Language Models (LLMs). By employing LLMs, we analyze the metadata associated with product purchases derived from historical data to identify key product categories that act as distinguishing factors. These categories, such as baby food, eldercare products, or family-sized packages, offer valuable insights into the likely household composition of customers, including families with babies, families with kids/teenagers, families with pets, households caring for elders, or mixed households. We segment high-confidence customers into distinct categories by integrating historical purchase behavior with LLM-powered product classification. This paper asserts that life stage segmentation can significantly enhance e-commerce businesses’ ability to target the appropriate customers with tailored products and campaigns, thereby augmenting sales and improving customer retention. Additionally, the paper details the data sources, model architecture, and evaluation metrics employed for the segmentation task.Keywords: LLMs, segmentation, product tags, fine-tuning, target segments, marketing communication
Procedia PDF Downloads 2310527 Methods Used to Perform Requirements Elicitation for Healthcare Software Development
Authors: Tang Jiacheng, Fang Tianyu, Liu Yicen, Xiang Xingzhou
Abstract:
The proportion of healthcare services is increasing throughout the globe. The convergence of mobile technology is driving new business opportunities, innovations in healthcare service delivery and the promise of a better life tomorrow for different populations with various healthcare needs. One of the most important phases for the combination of health care and mobile applications is to elicit requirements correctly. In this paper, four articles from different research directions with four topics on healthcare were detailed analyzed and summarized. We identified the underlying problems in guidance to develop mobile applications to provide healthcare service for Older adults, Women in menopause, Patients undergoing covid. These case studies cover several elicitation methods: survey, prototyping, focus group interview and questionnaire. And the effectiveness of these methods was analyzed along with the advantages and limitations of these methods, which is beneficial to adapt the elicitation methods for future software development process.Keywords: healthcare, software requirement elicitation, mobile applications, prototyping, focus group interview
Procedia PDF Downloads 14810526 Reformulation of Theory of Critical Distances to Predict the Strength of Notched Plain Concrete Beams under Quasi Static Loading
Authors: Radhika V., J. M. Chandra Kishen
Abstract:
The theory of critical distances (TCD), due to its appealing characteristics, has been successfully used in the past to predict the strength of brittle as well as ductile materials, weakened by the presence of stress risers under both static and fatigue loading. By utilising most of the TCD's unique features, this paper summarises an attempt for a reformulation of the point method of the TCD to predict the strength of notched plain concrete beams under mode I quasi-static loading. A zone of micro cracks, which is responsible for the non-linearity of concrete, is taken into account considering the concept of an effective elastic crack. An attempt is also made to correlate the value of the material characteristic length required for the application of TCD with the maximum aggregate size in the concrete mix, eliminating the need for any extensive experimentation prior to the application of TCD. The devised reformulation and the proposed power law based relationship is found to yield satisfactory predictions for static strength of notched plain concrete beams, with geometric dimensions of the beam, tensile strength, and maximum aggregate size of the concrete mix being the only needed input parameters.Keywords: characteristic length, effective elastic crack, inherent material strength, modeI loading, theory of critical distances
Procedia PDF Downloads 9810525 Automated Testing to Detect Instance Data Loss in Android Applications
Authors: Anusha Konduru, Zhiyong Shan, Preethi Santhanam, Vinod Namboodiri, Rajiv Bagai
Abstract:
Mobile applications are increasing in a significant amount, each to address the requirements of many users. However, the quick developments and enhancements are resulting in many underlying defects. Android apps create and handle a large variety of 'instance' data that has to persist across runs, such as the current navigation route, workout results, antivirus settings, or game state. Due to the nature of Android, an app can be paused, sent into the background, or killed at any time. If the instance data is not saved and restored between runs, in addition to data loss, partially-saved or corrupted data can crash the app upon resume or restart. However, it is difficult for the programmer to manually test this issue for all the activities. This results in the issue of data loss that the data entered by the user are not saved when there is any interruption. This issue can degrade user experience because the user needs to reenter the information each time there is an interruption. Automated testing to detect such data loss is important to improve the user experience. This research proposes a tool, DroidDL, a data loss detector for Android, which detects the instance data loss from a given android application. We have tested 395 applications and found 12 applications with the issue of data loss. This approach is proved highly accurate and reliable to find the apps with this defect, which can be used by android developers to avoid such errors.Keywords: Android, automated testing, activity, data loss
Procedia PDF Downloads 23710524 Leadership Styles and Adoption of Risk Governance in Insurance and Energy Industry: A Comparative Case Study
Authors: Ruchi Agarwal
Abstract:
In today’s world, companies are operating in dynamic, uncertain and ambiguous business environments. Globally, more companies are failing due to Environmental, Social and Governance (ESG) factors than ever. Corporate governance and risk management are intertwined in nature. For decades, corporate governance and risk management have been influenced by internal and external factors. Three schools of thought have influenced risk governance for decades: Agency theory, Contingency theory, and Institutional theory. Agency theory argues that agents have interests conflicting with principal interests and the information problem. Contingency theory suggests that risk management adoption is influenced by internal and external factors, while Institutional theory suggests that organizations legitimize risk management with regulators, competitors, and professional bodies. The conflicting objectives of theories have created problems for executives in organizations in the adoption of Risk Governance. So far, there are many studies that discussed risk culture and the role of actors in risk governance, but there are rare studies discussing the role of risk culture in the adoption of risk governance from a leadership style perspective. This study explores the adoption of risk governance in two contrasting industries, such as the Insurance and energy business, to understand whether risk governance is influenced by internal/external factors or whether risk culture is influenced by leaders. We draw empirical evidence by comparing the cases of an Indian insurance company and a renewable energy-based firm in India. We interviewed more than 20 senior executives of companies and collected annual reports, risk management policies, and more than 10 PPTs and other reports from 2017 to 2024. We visited the company for follow-up questions several times. The findings of my research revealed that both companies have used risk governance for strategic renewal of the company. Insurance companies use a transactional leadership style based on performance and reward for improving risk, while energy companies use rather symbolic management to make debt restructuring meaningful for stakeholders. Overall, both companies turned from loss-making to profitable ones in a few years. This comparative study highlights the role of different leadership styles in the adoption of risk governance. The study is also distinct as previous research rarely studied risk governance in two contrasting industries in reference to leadership styles.Keywords: leadership style, corporate governance, risk management, risk culture, strategic renewal
Procedia PDF Downloads 4810523 Security Risks Assessment: A Conceptualization and Extension of NFC Touch-And-Go Application
Authors: Ku Aina Afiqah Ku Adzman, Manmeet Mahinderjit Singh, Zarul Fitri Zaaba
Abstract:
NFC operates on low-range 13.56 MHz frequency within a distance from 4cm to 10cm, and the applications can be categorized as touch and go, touch and confirm, touch and connect, and touch and explore. NFC applications are vulnerable to various security and privacy attacks such due to its physical nature; unprotected data stored in NFC tag and insecure communication between its applications. This paper aims to determine the likelihood of security risks happening in an NFC technology and application. We present an NFC technology taxonomy covering NFC standards, types of application and various security and privacy attack. Based on observations and the survey presented to evaluate the risk assessment within the touch and go application demonstrates two security attacks that are high risks namely data corruption and DOS attacks. After the risks are determined, risk countermeasures by using AHP is adopted. The guideline and solutions to these two high risks, attacks are later applied to a secure NFC-enabled Smartphone Attendance System.Keywords: Near Field Communication (NFC), risk assessment, multi-criteria decision making, Analytical Hierarchy Process (AHP)
Procedia PDF Downloads 30210522 Investigating the Feasibility of Promoting Safety in Civil Projects by BIM System Using Fuzzy Logic
Authors: Mohammad Reza Zamanian
Abstract:
The construction industry has always been recognized as one of the most dangerous available industries, and the statistics of accidents and injuries resulting from it say that the safety category needs more attention and the arrival of up-to-date technologies in this field. Building information modeling (BIM) is one of the relatively new and applicable technologies in Iran, that the necessity of using it is increasingly evident. The main purposes of this research are to evaluate the feasibility of using this technology in the safety sector of construction projects and to evaluate the effectiveness and operationality of its various applications in this sector. These applications were collected and categorized after reviewing past studies and researches then a questionnaire based on Delphi method criteria was presented to 30 experts who were thoroughly familiar with modeling software and safety guidelines. After receiving and exporting the answers to SPSS software, the validity and reliability of the questionnaire were assessed to evaluate the measuring tools. Fuzzy logic is a good way to analyze data because of its flexibility in dealing with ambiguity and uncertainty issues, and the implementation of the Delphi method in the fuzzy environment overcomes the uncertainties in decision making. Therefore, this method was used for data analysis, and the results indicate the usefulness and effectiveness of BIM in projects and improvement of safety status at different stages of construction. Finally, the applications and the sections discussed were ranked in order of priority for efficiency and effectiveness. Safety planning is considered as the most influential part of the safety of BIM among the four sectors discussed, and planning for the installation of protective fences and barriers to prevent falls and site layout planning with a safety approach based on a 3D model are the most important applications of BIM among the 18 applications to improve the safety of construction projects.Keywords: building information modeling, safety of construction projects, Delphi method, fuzzy logic
Procedia PDF Downloads 16710521 The Analysis of the Effect of Brand Image on Creating Brand Loyalty with the Structural Equation Model: A Research Study on the Sports Equipment Brand Users
Authors: Murat Erdoğdu, Murat Koçyiğit
Abstract:
Brand image and brand loyalty are among the most important relational marketing elements for brand owners to be able to set up long – term relationships with their customers and to maintain these relationships. Brand owners improve their brand images with the positive perceptions remaining in the consumers’ minds. In addition, they try to find the customers that are both emotionally and behaviourally faithful to themselves in order to set up long – term relationships. Therefore, the aim of this study is to analyse the effects of the brand image that has a very important role among relational marketing elements on the brand loyalty in terms of the variables such as the perceived value, the trust in brand and the brand satisfaction. In this context, a conceptual model was created to determine the effect of the brand image on the brand loyalty thanks to the Structural Equation Model (SEM). According to this aim and this model, the study was carried out in the scope of the data collected through the questionnaires in Konya with the method of convenience sampling. The results of the research showed that the brand image has positive significant effects on the perceived value and the trust in brand and that the trust in brand has positive significant effects on the brand satisfaction, and that the brand satisfaction has positive significant effects on the brand loyalty. Thus, the hypotheses that the brand image has direct effects on the perceived value and the trust in brand and that the trust in brand has direct effects on the brand satisfaction and that the brand satisfaction has direct effects on the brand loyalty were supported. In addition, the findings about whether the perceived value has a significant effect on the brand satisfaction were also acquired.Keywords: brand image, brand loyalty, perceived value, satisfaction, trust
Procedia PDF Downloads 44010520 Exploring the Effects of Cuisine Experience, Emotions, Place Attachment on Heritage Tourists’ Revisit Behavioral Intentions: The Case Study of Lu-Kang
Authors: An-Na Li, Ying-Yu Chen, Yu-Lung Lin
Abstract:
Food tourism is one of the growing industries in the tourism industry today. The Destination Marketing Organizations (DMOs) are aware of the importance of gastronomy to stimulate local and regional economic development. From the heritage and cultural aspects, gastronomy is becoming a more important part of the cultural heritage of the region. Heritage destinations provide culinary heritage, which fits the current interest in traditional food, and cuisine is a part of a general desire for authentic experience. However, few studies have empirically examined antecedents of food tourists’ behavioral intentions. This study examined the effects of cuisine experience; emotions, place attachment and tourists’ revisit behavioral intentions. A total of 408 individuals responded to the on-site survey in the historic town of Lu-Kang in Taiwan. The results indicated that tourists’ cuisine experience include place flavor, media recommendation, local learning, life transfer and interpersonal share. In addition, cuisine experience had significant impacts on emotions and place attachment, emotions had significant effects on place attachment, furthermore, which in turn place attachment had significant effects on tourists’ revisit behavioral intentions. The findings suggested that the cuisine experience is a multi-dimensions construct. On the other hands, the good quality of cuisine experience could evoke tourists’ positive emotions and it could play a significant role in promoting tourist revisit intentions or word of mouth. Implications for theory and practice are discussed.Keywords: culinary tourism, cuisine experiences, emotions, revisit intentions
Procedia PDF Downloads 24710519 Industrial Revolution: Army Production
Authors: M. Şimşek
Abstract:
Additive manufacturing (AM) or generally known as three dimensional (3D) printing provides great opportunities for both civilian and military applications by which 3D has become the biggest nominee of breakthrough of 21th century. When properly used, it has a wide spectrum of applications that make production easier and more profitable. Considering the advantages of AM, every firm has an intention of catching up with this new trend. As well as reducing costs and thus increasing benefits, 3D printing provides opportunities for national armies by reducing maintenance and repair time and increasing operational readiness.Keywords: additive manufacturing, operational cost, operational readiness, supply chain, three dimensional printing
Procedia PDF Downloads 39610518 TransDrift: Modeling Word-Embedding Drift Using Transformer
Authors: Nishtha Madaan, Prateek Chaudhury, Nishant Kumar, Srikanta Bedathur
Abstract:
In modern NLP applications, word embeddings are a crucial backbone that can be readily shared across a number of tasks. However, as the text distributions change and word semantics evolve over time, the downstream applications using the embeddings can suffer if the word representations do not conform to the data drift. Thus, maintaining word embeddings to be consistent with the underlying data distribution is a key problem. In this work, we tackle this problem and propose TransDrift, a transformer-based prediction model for word embeddings. Leveraging the flexibility of the transformer, our model accurately learns the dynamics of the embedding drift and predicts future embedding. In experiments, we compare with existing methods and show that our model makes significantly more accurate predictions of the word embedding than the baselines. Crucially, by applying the predicted embeddings as a backbone for downstream classification tasks, we show that our embeddings lead to superior performance compared to the previous methods.Keywords: NLP applications, transformers, Word2vec, drift, word embeddings
Procedia PDF Downloads 9110517 Solving Mean Field Problems: A Survey of Numerical Methods and Applications
Authors: Amal Machtalay
Abstract:
In this survey, we aim to review the rapidly growing literature on numerical methods to solve different forms of mean field problems, namely mean field games (MFG), mean field controls (MFC), potential MFGs, and master equations, as well as their corresponding recent applications. Here, we distinguish two families of numerical methods: iterative methods based on mesh generation and those called mesh-free, normally related to neural networking and learning frameworks.Keywords: mean-field games, numerical schemes, partial differential equations, complex systems, machine learning
Procedia PDF Downloads 11310516 The Influence of Social Media on the Body Image of First Year Female Medical Students of University of Khartoum, 2022
Authors: Razan Farah, Siham Ballah
Abstract:
Facebook, Instagram, TikTok and other social media applications have become an integral component of everyone’s social life, particularly among younger generations and adolescences. These social apps have been changing a lot of conceptions and believes in the population by representing public figures and celebrities as role models. The social comparison theory, which says that people self-evaluate based on comparisons with similar others, is commonly used to explore the impact of social media on body image. There is a need to study the influence of those social platforms on the body image as there have been an increase in body dissatisfaction in the recent years. This cross sectional study used a self administered questionnaire on a simple random sample of 133 female medical students of the first year. Finding shows that the response rate was 75%. There was an association between social media usage and noticing how the person look(p value = .022), but no significant association between social media use and body image influence or dissatisfaction was found. This study implies more research under this topic in Sudan as the literature are scarce.Keywords: body image, body dissatisfaction, social media, adolescences
Procedia PDF Downloads 7110515 Designing an Effective Accountability Model for Islamic Azad University Using the Qualitative Approach of Grounded Theory
Authors: Davoud Maleki, Neda Zamani
Abstract:
The present study aims at exploring the effective accountability model of Islamic Azad University using a qualitative approach of grounded theory. The data of this study were obtained from semi-structured interviews with 25 professors and scholars in Islamic Azad University of Tehran who were selected by theoretical sampling method. In the data analysis, the stepwise method and Strauss and Corbin analytical methods (1992) were used. After identification of the main component (balanced response to stakeholders’ needs) and using it to bring the categories together, expressions and ideas representing the relationships between the main and subcomponents, and finally, the revealed components were categorized into six dimensions of the paradigm model, with the relationships among them, including causal conditions (7 components), main component (balanced response to stakeholders’ needs), strategies (5 components), environmental conditions (5 components), intervention features (4 components), and consequences (3 components). Research findings show an exploratory model for describing the relationships between causal conditions, main components, accountability strategies, environmental conditions, university environmental features, and that consequences.Keywords: accountability, effectiveness, Islamic Azad University, grounded theory
Procedia PDF Downloads 8610514 A Comprehensive Theory of Communication with Biological and Non-Biological Intelligence for a 21st Century Curriculum
Authors: Thomas Schalow
Abstract:
It is commonly recognized that our present curriculum is not preparing students to function in the 21st century. This is particularly true in regard to communication needs across cultures - both human and non-human. In this paper, a comprehensive theory of communication-based on communication with non-human cultures and intelligences is presented to meet the following three imminent contingencies: communicating with sentient biological intelligences, communicating with extraterrestrial intelligences, and communicating with artificial super-intelligences. The paper begins with the argument that we need to become much more serious about communicating with the non-human, intelligent life forms that already exists around us here on Earth. We need to broaden our definition of communication and reach out to other sentient life forms in order to provide humanity with a better perspective of its place within our ecosystem. The paper next examines the science and philosophy behind CETI (communication with extraterrestrial intelligences) and how it could prove useful even in the absence of contact with alien life. However, CETI’s assumptions and methodology need to be revised in accordance with the communication theory being proposed in this paper if we are truly serious about finding and communicating with life beyond Earth. The final theme explored in this paper is communication with non-biological super-intelligences. Humanity has never been truly compelled to converse with other species, and our failure to seriously consider such intercourse has left us largely unprepared to deal with communication in a future that will be mediated and controlled by computer algorithms. Fortunately, our experience dealing with other cultures can provide us with a framework for this communication. The basic concepts behind intercultural communication can be applied to the three types of communication envisioned in this paper if we are willing to recognize that we are in fact dealing with other cultures when we interact with other species, alien life, and artificial super-intelligence. The ideas considered in this paper will require a new mindset for humanity, but a new disposition will yield substantial gains. A curriculum that is truly ready for the 21st century needs to be aligned with this new theory of communication.Keywords: artificial intelligence, CETI, communication, language
Procedia PDF Downloads 36410513 The Effects of Yield and Yield Components of Some Quality Increase Applications on Ismailoglu Grape Type in Turkey
Authors: Yaşar Önal, Aydın Akın
Abstract:
This study was conducted Ismailoglu grape type (Vitis vinifera L.) and its vine which was aged 15 was grown on its own root in a vegetation period of 2013 in Nevşehir province in Turkey. In this research, it was investigated whether the applications of Control (C), 1/3 cluster tip reduction (1/3 CTR), shoot tip reduction (STR), 1/3 CTR + STR, TKI-HUMAS (TKI-HM) (Soil) (S), TKI-HM (Foliar) (F), TKI-HM (S + F), 1/3 CTR + TKI-HM (S), 1/3 CTR + TKI-HM (F), 1/3 CTR + TKI-HM (S+F), STR + TKI-HM (S), STR + TKI-HM (F), STR + TKI-HM (S + F), 1/3 CTR + STR+TKI-HM (S), 1/3 CTR + STR + TKI-HM (F), 1/3 CTR + STR + TKI-HM (S + F) on yield and yield components of Ismailoglu grape type. The results were obtained as the highest fresh grape yield (16.15 kg/vine) with TKI-HM (S), as the highest cluster weight (652.39 g) with 1/3 CTR + STR, as the highest 100 berry weight (419.07 g) with 1/3 CTR + STR + TKI-HM (F), as the highest maturity index (44.06) with 1/3 CTR, as the highest must yield (810.00 ml) with STR + TKI-HM (F), as the highest intensity of L* color (42.04) with TKI-HM (S + F), as the highest intensity of a* color (2.60) with 1/3 CTR + TKI-HM (S), as the highest intensity of b* color (7.16) with 1/3 CTR + TKI-HM (S) applications. To increase the fresh grape yield of Ismailoglu grape type can be recommended TKI-HM (S) application.Keywords: 1/3 cluster tip reduction, shoot tip reduction, TKI-Humas application, yield and yield components
Procedia PDF Downloads 39910512 Design and Simulation of Step Structure RF MEMS Switch for K Band Applications
Authors: G. K. S. Prakash, Rao K. Srinivasa
Abstract:
MEMS plays an important role in wide range of applications like biological, automobiles, military and communication engineering. This paper mainly investigates on capacitive shunt RF MEMS switch with low actuation voltage and low insertion losses. To trim the pull-in voltage, a step structure has introduced to trim air gap between the beam and the dielectric layer with that pull in voltage is trim to 2.9 V. The switching time of the proposed switch is 39.1μs, and capacitance ratio is 67. To get more isolation, we have used aluminum nitride as dielectric material instead of silicon nitride (Si₃N₄) and silicon dioxide (SiO₂) because aluminum nitride has high dielectric constant (εᵣ = 9.5) increases the OFF capacitance and eventually increases the isolation of the switch. The results show that the switch is ON state involves return loss (S₁₁) less than -25 dB up to 40 GHz and insertion loss (S₂₁) is more than -1 dB up to 35 GHz. In OFF state switch shows maximum isolation (S₂₁) of -38 dB occurs at a frequency of 25-27 GHz for K band applications.Keywords: RF MEMS, actuation voltage, isolation loss, switches
Procedia PDF Downloads 36210511 Traditional Industries Innovation and Brand Value Analysis in Taiwan: Case Study of a Certain Plastic Company
Authors: Ju Shan Lin
Abstract:
The challenges for traditional industries in Taiwan the past few years are the changes of overall domestic and foreign industry structure, the entrepreneurs not only need to keep on improving their profession skills but also continuously research and develop new products. It is also necessary for the all traditional industries to keep updating the business strategy, let the enterprises continue to progress, and won't be easily replaced by the other industries. The traditional industry in Taiwan attach great importance to the field of enterprises upgrading and innovation in recent years, by the enterprise innovation and transformation can enhance the overall business situation also enable them to obtain more additional profits than in the past. Except the original industry structure's need to transform and upgrade, the brand's business and marketing strategy are also essential. This study will take a certain plastic company as case analysis, for the brand promotion of traditional industries, brand values and business innovation model for further exploration. It will also be mentioned that the other traditional industries cases which were already achieved success on the enterprise's upgrading and innovation, at the same time, the difficulties which they faced with and the way they overcome will be explored as well. This study will use the case study method combined with expert interviews to discuss and analyze this certain plastic company's current business situation, the existing products and the possible trends in the future. Looking forward to providing an innovative business model that will enable this plastic company to upgrade its corporate image and the brand could transform successfully.Keywords: brand marketing strategy, enterprise upgrade, industrial transformation, traditional industry
Procedia PDF Downloads 23910510 Natural User Interface Adapter: Enabling Natural User Interface for Non-Natural User Interface Applications
Authors: Vijay Kumar Kolagani, Yingcai Xiao
Abstract:
Adaptation of Natural User Interface (NUI) has been slow and limited. NUI devices like Microsoft’s Kinect and Ultraleap’s Leap Motion can only interact with a handful applications that were specifically designed and implemented for them. A NUI device just can’t be used to directly control millions of applications that are not designed to take NUI input. This is in the similar situation like the adaptation of color TVs. At the early days of color TV, the broadcasting format was in RGB, which was not viewable by blackand-white TVs. TV broadcasters were reluctant to produce color programs due to limited viewership. TV viewers were reluctant to buy color TVs because there were limited programs to watch. Color TV’s breakthrough moment came after the adaptation of NTSC standard which allowed color broadcasts to be compatible with the millions of existing black-and-white TVs. This research presents a framework to use NUI devices to control existing non-NUI applications without reprogramming them. The methodology is to create an adapter to convert input from NUI devices into input compatible with that generated by CLI (Command Line Input) and GUI (Graphical User Interface) devices. The CLI/GUI compatible input is then sent to the active application through the operating system just like any input from a CLI/GUI device to control the non-NUI program that the user is controlling. A sample adapter has been created to convert input from Kinect to keyboard strokes, so one can use the input from Kinect to control any applications that take keyboard input, such as Microsoft’s PowerPoint. When the users use the adapter to control their PowerPoint presentations, they can free themselves from standing behind a computer to use its keyboard and can roam around in front of the audience to use hand gestures to control the PowerPoint. It is hopeful such adapters can accelerate the adaptation of NUI devices.Keywords: command line input, graphical user interface, human computer interaction, natural user interface, NUI adapter
Procedia PDF Downloads 1510509 Implementation of Geo-Crowdsourcing Mobile Applications in e-Government of V4 Countries: A State-of-the-Art Survey
Authors: Barbora Haltofová
Abstract:
In recent years, citizens have become an important source of geographic information and, therefore, geo-crowdsourcing, often known as volunteered geographic information, has provided an interesting alternative to traditional mapping practices which are becoming expensive, resource-intensive and unable to capture the dynamic nature of urban environments. In order to address a gap in research literature, this paper deals with a survey conducted to assess the current state of geo-crowdsourcing, a recent phenomenon popular with people who collect geographic information using their smartphones. This article points out that there is an increasing body of knowledge of geo-crowdsourcing mobile applications in the Visegrad countries marked by the ubiquitous Internet connection and the current massive proliferation of smartphones. This article shows how geo-crowdsourcing can be used as a complement, or in some cases a replacement, to traditionally generated sources of spatial data and information in public management. It discusses the new spaces of citizen participation constructed by these geo-crowdsourcing practices.Keywords: citizen participation, e-Government, geo-crowdsourcing, participatory mapping, mobile applications
Procedia PDF Downloads 33410508 Assessment of Highly Sensitive Dielectric Modulated GaN-FinFET for Label-Free Biosensing Applications
Authors: Ajay Kumar, Neha Gupta
Abstract:
This work presents the sensitivity assessment of Gallium Nitride (GaN) material-based FinFET by dielectric modulation in the nanocavity gap for label-free biosensing applications. The significant deflection is observed in the electrical characteristics such as drain current (ID), transconductance (gm), surface potential, energy band profile, electric field, sub-threshold slope (SS), and threshold voltage (Vth) in the presence of biomolecules owing to GaN material. Further, the device sensitivity is evaluated to identify the effectiveness of the proposed biosensor and its capability to detect the biomolecules with high precision or accuracy. Higher sensitivity is observed for Gelatin (k=12) in terms of on-current (SION), threshold voltage (SVth), and switching ratio (SSR) by 104.88%, 82.12%, and 119.73%, respectively. This work is performed using a powerful tool 3D Sentaurus TCAD using a well-calibrated structure. All the results pave the way for GaN-FinFET as a viable candidate for label-free dielectric modulated biosensor applications.Keywords: biosensor, biomolecules, FinFET, sensitivity
Procedia PDF Downloads 20510507 A Study of Permission-Based Malware Detection Using Machine Learning
Authors: Ratun Rahman, Rafid Islam, Akin Ahmed, Kamrul Hasan, Hasan Mahmud
Abstract:
Malware is becoming more prevalent, and several threat categories have risen dramatically in recent years. This paper provides a bird's-eye view of the world of malware analysis. The efficiency of five different machine learning methods (Naive Bayes, K-Nearest Neighbor, Decision Tree, Random Forest, and TensorFlow Decision Forest) combined with features picked from the retrieval of Android permissions to categorize applications as harmful or benign is investigated in this study. The test set consists of 1,168 samples (among these android applications, 602 are malware and 566 are benign applications), each consisting of 948 features (permissions). Using the permission-based dataset, the machine learning algorithms then produce accuracy rates above 80%, except the Naive Bayes Algorithm with 65% accuracy. Of the considered algorithms TensorFlow Decision Forest performed the best with an accuracy of 90%.Keywords: android malware detection, machine learning, malware, malware analysis
Procedia PDF Downloads 16910506 Industrial Applications of Additive Manufacturing and 3D Printing Technology: A Review from South Africa Perspective
Authors: Micheal O. Alabi
Abstract:
Additive manufacturing (AM) is the official industry standard term (ASTM F2792) for all applications of the technology which is also known as 3D printing technology. It is defined as the process of joining materials to make objects from 3D model data, and it is usually layer upon layer, as opposed to subtractive manufacturing methodologies. This technology has gained significant interest within the academic, research institute and industry because of its ability to create complex geometries with customizable material properties. Despite the late adoption of the technology, additive manufacturing has been active in South Africa for past 21 years and it is predicted that additive manufacturing technology will play a significant and game-changing role in the fourth industrial revolution and in particular it promises to play an ever-growing role in efforts to re-industrialize the economy of South Africa. At the end of 2006, there are approximately ninety 3D printers in South Africa and in 2015 it was estimated that there are 3500 additive manufacturing systems and 3D printers in circulation in South Africa. A reasonable number of these additive manufacturing machines are in the high end of the market, in science councils and higher education institutions and this shows that the future of additive manufacturing in South Africa is very brighter compared to other African countries. This paper reviews the past and current industrial applications of additive manufacturing in South Africa from the academic research and industry perspective and what are the benefits of this technology to manufacturing companies and industrial sectors in the country.Keywords: additive manufacturing, 3D printing technology, industrial applications, manufacturing
Procedia PDF Downloads 47210505 The Effect of Sustainability Reporting on Company Profitability Using Literature Review Method (Asian Sphere)
Authors: Kesya Terinda Natalie, Marcellina Natasha, Rosinta Ria Panggabean
Abstract:
Purpose: Over the last few years, the company has been implementing sustainability practices to ensure business continuity. However, there are pros and cons regarding the impact of financial reports if companies provide non-financial reports. So this paper aims to prove what the effect of Sustainability Reporting (SR) has on company profitability, as well as things that can be considered as the decision-making of SR disclosure. Methodology: This paper uses the literature review method to describe the results of published articles concerning Sustainability Reporting and Profitability. This study links and analyzes the essence of 50 previous studies related to SR on company profitability, most of which were conducted in Asia. Therefore this research is limited to only 23 studies in Asia. Findings: Sustainability Reporting does not have a significant impact on company profitability because the SR quality of each company varies based on Agency & Legitimacy Theory considerations. Stakeholders are required to focus not only on profitability but also on the long-term of the company. Thus, it is found that SR is used by companies as a sustainable investment, which can improve overall company performance by reducing capital costs and generating positive company value in increasing reputation capital. Value: This paper focuses on how sustainability reporting affects company profitability, as well as things that can be considered as the decision-making of SR disclosure.Keywords: sustainability reporting, profitability, agency theory, legitimacy theory
Procedia PDF Downloads 8910504 Teachers’ Perceptions Related to the Guiding Skills within the Application Courses
Authors: Tanimola Kazeem Abiodun
Abstract:
In Nigeria, both formal education and distance learning opportunities are used in teacher training. Practical courses aim to improve the skills of teacher candidates in a school environment. Teacher candidates attend kindergarten classes under the supervision of a teacher. In this context, the guiding skills of teachers gain importance in terms of shaping candidates’ perceptions about teaching profession. In this study, the teachers’ perceptions related to the guiding skills within the practical courses were determined. Also, the perceptions and applications related to guiding skills were compared. A Likert scale questionnaire and an open-ended question were used to determine perceptions and applications. 120 questionnaires were taken into consideration and analyses of data were performed by using percentage distribution and QSR Nvivo 8 program. In this study, statements related to teachers’ perceptions about the guiding skills were asked and it is determined that almost all the teachers agreed about the importance of these statements. On the other hand, how these guidance skills are applied by teachers is also queried with an open-ended question. Finally, thoughts and applications related to guidance skills were compared to each other. Based on this comparison, it is seen that there are some differences between the thoughts and applications especially related with time management, planning, feedbacks, curriculum, workload, rules and guidance. It can be said that some guidance skills cannot be controlled only by teachers. For example, candidates’ motivation, attention, population and educational environment are also determinative factors for effective guidance. In summary, it is necessary to have prior conditions for teachers to apply these idealized guidance skills for training more successful candidates to pre-school education era. At this point, organization of practical courses by the faculties gains importance and in this context it is crucial for faculties to revise their applications based on more detailed researches.Keywords: teacher training, guiding skills, education, practical courses
Procedia PDF Downloads 44710503 Use of Protection Motivation Theory to Assess Preventive Behaviors of COVID-19
Authors: Maryam Khazaee-Pool, Tahereh Pashaei, Koen Ponnet
Abstract:
Background: The global prevalence and morbidity of Coronavirus disease 2019 (COVID-19) are high. Preventive behaviors are proven to reduce the damage caused by the disease. There is a paucity of information on determinants of preventive behaviors in response to COVID-19 in Mazandaran province, north of Iran. So, we aimed to evaluate the protection motivation theory (PMT) in promoting preventive behaviors of COVID-19 in Mazandaran province. Materials and Methods: In this descriptive cross-sectional study, 1220 individuals participated. They were selected via social networks using convenience sampling in 2020. Data were collected online using a demographic questionnaire and a valid and reliable scale based on PMT. Data analysis was done using the Pearson correlation coefficient and linear regression in SPSS V24. Result: The mean age of the participants was 39.34±8.74 years. The regression model showed perceived threat (ß =0.033, P =0.007), perceived costs (ß=0.039, P=0.045), perceived self-efficacy (ß =0.116, P>0.001), and perceived fear (ß=0.131, P>0.001) as the significant predictors of COVID-19 preventive behaviors. This model accounted for 78% of the variance in these behaviors. Conclusion: According to constructs of the PMT associated with protection against COVID-19, educational programs and health promotion based on the theory and benefiting from social networks could be helpful in increasing the motivation of people towards protective behaviors against COVID-19.Keywords: questionnaire development, validation, intention, prevention, covid-19
Procedia PDF Downloads 4210502 Nineteenth Century Colonial Discourse and Marxist Theory
Authors: Nikolaos Mavropoulos
Abstract:
Imperialism and colonialism had and still have a predominantly negative nuisance. In many ways the two terms are synonyms of racist behavior, exploitation, and oppression, imposed by the supposedly civilized West at Africa’s and Asia’s expense. Paradoxically enough, imperialism was not thoroughly negative for some Marxist scholars. For them, in reality, it served a historical necessity as the only mean to liberate the backward societies from their millennial stagnation and to introduce them to industrialization and progress. To Marx as immoral and cruel the imposition of imperial rule and the eradication of traditional structures may have been, the process is still a progressive step towards the formation of class consciousness, global revolution and socialism in a world scale. Overlooking the fact that imperialism could actually delay and put an end to capitalist development, some Marxists proponents considered it as a positive development for the colonized peoples.Keywords: Colonialism, , Marxist theory, Modern history, , 19th century Imperialism,
Procedia PDF Downloads 12510501 A Social Cognitive Investigation in the Context of Vocational Training Performance of People with Disabilities
Authors: Majid A. AlSayari
Abstract:
The study reported here investigated social cognitive theory (SCT) in the context of Vocational Rehab (VR) for people with disabilities. The prime purpose was to increase knowledge of VR phenomena and make recommendations for improving VR services. The sample consisted of 242 persons with Spinal Cord Injuries (SCI) who completed questionnaires. A further 32 participants were Trainers. Analysis of questionnaire data was carried out using factor analysis, multiple regression analysis, and thematic analysis. The analysis suggested that, in motivational terms, and consistent with research carried out in other academic contexts, self-efficacy was the best predictor of VR performance. The author concludes that that VR self-efficacy predicted VR training performance.Keywords: people with physical disabilities, social cognitive theory, self-efficacy, vocational training
Procedia PDF Downloads 31410500 An Empirical Enquiry on Cultural Influence and Purchase Decision for Durable Goods in Nigeria
Authors: Bright C. Opara, Gideon C. Uboegbulam
Abstract:
This study can be appreciated from the significant role culture exert in purchase decision of durable goods the world over. This study is motivated by cultural diversity in Nigeria and socio-economic changes that have taken place in the recent times. These call for the validation of similarly studies in order to formulate informed marketing strategies that will enhance purchase behaviour. This study therefore, is set out to examine the cultural influence in family purchase decision-making for durable goods in the three major ethnic groups in Nigeria (Hausa, Ibo, and Yoruba). The primary data was sourced using structured and semi-structured research questionnaire, while the secondary information was generated from existing / available relevant literature journals / periodicals. A judgmental sampling technique was used to determine the sample size of 300 households. The Analysis of Variance (ANOVA) statistical tool was used to test the hypotheses, with the aid of Statistical Packages for Social Sciences (SPSS) version 17.0. The finding showed that cultural influence on the family Purchase Decision of Durable Goods does not significantly differ in three ethnic groups, and that family Purchase Decision Making for Durable Goods does not significantly differ in the three ethnic groups. We therefore, conclude that culture do not really impact significantly on the purchase behaviour of the three ethnic groups in the Nigeria as it does in some others. However, there is need for marketers and marketing decision makers not to generalise the findings of this study. This is because of the significant role culture play in purchase behaviour which differs from one culture or country to another.Keywords: cultural, durable goods, influence, purchase decision
Procedia PDF Downloads 393