Search results for: car users
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2487

Search results for: car users

2397 Investigating Gender Differences in M-Learning Gameplay Adoption

Authors: Chih-Ping Chen

Abstract:

Despite the increasing popularity of and interest in mobile games, there has been little research that evaluates gender differences in users’ actual preferences for mobile game content, and the factors that influence entertainment and mobile-learning habits. To fill this void, this study examines different gender users’ experience of mobile English learning game adoption in order to identify the areas of development in Taiwan, using Uses and Gratification Theory, Expectation Confirmation Theory and experiential value. The integration of these theories forms the basis of an extended research concept. Users’ responses to questions about cognitive perceptions, confirmation, gratifications and continuous use were collected and analyzed with various factors derived from the theories.

Keywords: expectation confirmation theory, experiential value, gender difference, mobile game, uses and gratification

Procedia PDF Downloads 331
2396 Transparency Obligations under the AI Act Proposal: A Critical Legal Analysis

Authors: Michael Lognoul

Abstract:

In April 2021, the European Commission released its AI Act Proposal, which is the first policy proposal at the European Union level to target AI systems comprehensively, in a horizontal manner. This Proposal notably aims to achieve an ecosystem of trust in the European Union, based on the respect of fundamental rights, regarding AI. Among many other requirements, the AI Act Proposal aims to impose several generic transparency obligationson all AI systems to the benefit of natural persons facing those systems (e.g. information on the AI nature of systems, in case of an interaction with a human). The Proposal also provides for more stringent transparency obligations, specific to AI systems that qualify as high-risk, to the benefit of their users, notably on the characteristics, capabilities, and limitations of the AI systems they use. Against that background, this research firstly presents all such transparency requirements in turn, as well as related obligations, such asthe proposed obligations on record keeping. Secondly, it focuses on a legal analysis of their scope of application, of the content of the obligations, and on their practical implications. On the scope of transparency obligations tailored for high-risk AI systems, the research notably notes that it seems relatively narrow, given the proposed legal definition of the notion of users of AI systems. Hence, where end-users do not qualify as users, they may only receive very limited information. This element might potentially raise concern regarding the objective of the Proposal. On the content of the transparency obligations, the research highlights that the information that should benefit users of high-risk AI systems is both very broad and specific, from a technical perspective. Therefore, the information required under those obligations seems to create, prima facie, an adequate framework to ensure trust for users of high-risk AI systems. However, on the practical implications of these transparency obligations, the research notes that concern arises due to potential illiteracy of high-risk AI systems users. They might not benefit from sufficient technical expertise to fully understand the information provided to them, despite the wording of the Proposal, which requires that information should be comprehensible to its recipients (i.e. users).On this matter, the research points that there could be, more broadly, an important divergence between the level of detail of the information required by the Proposal and the level of expertise of users of high-risk AI systems. As a conclusion, the research provides policy recommendations to tackle (part of) the issues highlighted. It notably recommends to broaden the scope of transparency requirements for high-risk AI systems to encompass end-users. It also suggests that principles of explanation, as they were put forward in the Guidelines for Trustworthy AI of the High Level Expert Group, should be included in the Proposal in addition to transparency obligations.

Keywords: aI act proposal, explainability of aI, high-risk aI systems, transparency requirements

Procedia PDF Downloads 315
2395 The Positive Impact of Wheelchair Service Provision on the Health and Overall Satisfaction of Wheelchair Users with the Devices

Authors: Archil Undilashvili, Ketevan Stvilia, Dustin Gilbreath, Giorgi Dzneladze, Gordon Charchward

Abstract:

Introduction: In recent years, diverse types of wheelchairs, both local production and imported, have been made available on the Georgian market for wheelchair users. Some types of wheelchairs are sold together with a service package, while the others, including the State Program, Supported locally-produced ones, don’t provide adjustment and maintenance service packages to users. Within the USAID Physical Rehabilitation Project in Georgia, a study was conducted to assess the impact of the wheelchair service provision in line with the WHO guidelines on the health and overall satisfaction of wheelchair users in Georgia. Methodology: A cross-sectional survey was conducted in May 2021. A structured questionnaire was used for telephone interviews that, along with socio-demographic characteristics, included questions for assessment of accessibility, availability, timeliness, cost and quality of wheelchair services received. Out of 1060 individuals listed in the census of wheelchair users, 752 were available for interview, with an actual response rate of 73.4%. 552 wheelchair users (31%) or their caregivers (69%) agreed to participate in the survey. In addition to using descriptive statistics, the study used multivariate matching of wheelchair users who received wheelchair services and who did not (control group). In addition, to evaluate satisfaction with service provision, respondents were asked to assess services. Findings: The majority (67%) of wheelchair users included in the survey were male. The average age of participants was 43. The three most frequently named reasons for using a wheelchair were cerebral palsy (29%), followed by stroke (18%), and amputation (12%). Users have had their current chair for four years on average. Overall, 60% of respondents reported that they were assessed before providing a wheelchair, but only half of them reported that their preferences and needs were considered. Only 13% of respondents had services in line with WHO guidelines and only 22% of wheelchair users had training when they received their current chair. 16% of participants said they had follow-up services, and 41% received adjustment services after receiving the chair. A slight majority (56%) of participants were satisfied with the quality of service provision and the service provision overall. Similarly, 55% were satisfied with the accessibility of service provision. A slightly larger majority (61%) were satisfied with the timeliness of service provision. The matching analysis suggests that users that received services in line with WHO guidelines were more satisfied with their chairs (the difference 17 point/0-100 scale) and they were four percentage points less likely to have health problems attributed to the chair. The regression analysis provides a similar finding of a 21 point increase in satisfaction attributable to services. Conclusion: The provision of wheelchair services in line with WHO guidelines and with follow-up services is likely to have a positive impact on the daily lives of wheelchair users in Georgia. Wheelchair services should be institutionalized as a standard component of wheelchair provision in Georgia.

Keywords: physical rehabilitation, wheelchair users, persons with disabilities, wheelchair production

Procedia PDF Downloads 106
2394 Service Users’ Opinions and Experiences of Health Care Practitioners’ Right to Conscientiously Object to Abortion: A Liberal Feminist Approach

Authors: B. Self, V. Fleming, C. Maxwell

Abstract:

The fourth clause of the UK 1967 Abortion Act allows individuals (including health care practitioners) to conscientiously object to participating in an abortion. Individuals are able to object if they consider that participating is incompatible with their religious, moral, philosophical, ethical, or personal beliefs. Currently, there is no research on service users’ opinions and understandings of conscientious objection or the impact of conscientious objection from the UK service users’ perspective. This perspective is imperative in understanding the real-world consequences and impact of conscientious objection and essential when creating policy and guidelines. This qualitative research took a liberal feminist approach. It provided a platform for service users to share their experiences of abortion and conscientious objection, as well as their opinions and understandings of conscientious objection. The method employed was semi-structured interviews. Findings indicated that conscientious objection could work in practice. However, it is currently failing some individuals, as health care practitioners are not always referring and informing service users. Participants didn’t experience burdens such as long waiting times and were still able to access legal abortion. However, participants did experience negative emotional effects, as they were often left feeling scared, angry, and hopeless when they were not referred. Moreover, participants’ opinions on conscientious objection in the UK varied greatly. The majority supported the most common approach within the literature and in practice, whereby health care practitioners are able to object so long as they refer and inform the service user. However, the opinion that health care practitioners should not be allowed to object or should be able to object without referring and informing was also present. Without this research, the impact that conscientious objection is having on service users in the UK and service users’ opinions on conscientious objection wouldn’t be known. These findings will be used to inform national policy and guidelines, making access to abortion fairer and safer for all.

Keywords: conscientious objection, abortion, medical ethics, reproductive justice

Procedia PDF Downloads 144
2393 Research on Users' Obesity and Office Tower Core-Tube Design from the Perspective of Physical Activities

Authors: Ming Ma, Zhenyu Cai, Rui Li

Abstract:

People are more vulnerable to health problems than ever before, such as overweight and obesity due to the change of built environment. In the high-rise buildings, the core-tube layout is closely associated with user’s physical activities which will affect human’s health in a long-term. As for the white-collars who spends the amount of time working in the office tower, using staircase seems to provide an opportunity for them to increase the physical activities in the workplaces. This paper is aiming to find out the specific relationship between health and core-tube in the office tower through analyzing the correlation between staircase’s layout and user’s health. The variables of staircase’s layout are consisted of two indicators: plan layout and space design, including nine factors while health variable is applying BIM as the only main factor. 14 office towers in downtown Shanghai are selected as the research samples because of its typical users’ pattern and similar core-tube layout. In the result, it is obvious that the users from these 14 cases have higher BMI than average partly because that the staircases are mainly designed for emergency and fire instead of daily use. After the regression and correlation analysis of the variables of health and staircases, it’s found that users’ BMI is significantly associated with the factors of floor guide-signs and distance from lobby to the staircase. In addition, the factors of comfort level of staircase such as width and daylighting have a certain correlation with users’ BMI.

Keywords: office tower, staircase, design, obesity, physical activity

Procedia PDF Downloads 226
2392 Analysis of Effect of Microfinance on the Profit Level of Small and Medium Scale Enterprises in Lagos State, Nigeria

Authors: Saheed Olakunle Sanusi, Israel Ajibade Adedeji

Abstract:

The study analysed the effect of microfinance on the profit level of small and medium scale enterprises in Lagos. The data for the study were obtained by simple random sampling, and total of one hundred and fifty (150) small and medium scale enterprises (SMEs) were sampled for the study. Seventy-five (75) each are microfinance users and non-users. Data were analysed using descriptive statistics, logit model, t-test and ordinary least square (OLS) regression. The mean profit of the enterprises using microfinance is ₦16.8m, while for the non-users of microfinance is ₦5.9m. The mean profit of microfinance users is statistically different from the non-users. The result of the logit model specified for the determinant of access to microfinance showed that three of specified variables- educational status of the enterprise head, credit utilisation and volume of business investment are significant at P < 0.01. Enterprises with many years of experience, highly educated enterprise heads and high volume of business investment have more potential access to microfinance. The OLS regression model indicated that three parameters namely number of school years, the volume of business investment and (dummy) participation in microfinance were found to be significant at P < 0.05. These variables are therefore significant determinants of impacts of microfinance on profit level in the study area. The study, therefore, concludes and recommends that to improve the status of small and medium scale enterprises for an increase in profit, the full benefit of access to microfinance can be enhanced through investment in social infrastructure and human capital development. Also, concerted efforts should be made to encouraged non-users of microfinance among SMEs to use it in order to boost their profit.

Keywords: credit utilisation, logit model, microfinance, small and medium enterprises

Procedia PDF Downloads 205
2391 Managing Change in the Academic Libraries in the Perspective of Web 2.0

Authors: Raj Kumar, Navjyoti Dhingra

Abstract:

Academic libraries are the hubs in which knowledge is a major resource and the performances of these knowledge in terms of adding and delivering value to their users depend upon their ability and effectiveness in engendering, arranging, managing, and using this knowledge. Developments in Information and Communication Technology’s (ICT), the libraries have been incorporated at the electronic edge to facilitate a rapid transfer of information on a global scale. Web2.0 refers to the development of online services that encourage collaboration, communication and information sharing. Web 2.0 reflects changes in how one can use the web rather than describing any technical or structural change. Libraries provide manifold channels of Information access to its e-users. The rapid expansion of tools, formats, services and technologies has presented many options to unfold Library Collection. Academic libraries must develop ways and means to meet their user’s expectations and remain viable. Web 2.0 tools are the first step on that journey. Web 2.0 has been widely used by the libraries to promote functional services like access to catalogue or for external activities like information or photographs of library events, enhancement of usage of library resources and bringing users closer to the library. The purpose of this paper is to provide a reconnaissance of Web 2.0 tools for enhancing library services in India. The study shows that a lot of user-friendly tools can be adopted by information professionals to effectively cater to information needs of its users. The authors have suggested a roadmap towards a revitalized future for providing various information opportunities to techno-savvy users.

Keywords: academic libraries, change management, social media, Web 2.0

Procedia PDF Downloads 210
2390 A Structured Mechanism for Identifying Political Influencers on Social Media Platforms: Top 10 Saudi Political Twitter Users

Authors: Ahmad Alsolami, Darren Mundy, Manuel Hernandez-Perez

Abstract:

Social media networks, such as Twitter, offer the perfect opportunity to either positively or negatively affect political attitudes on large audiences. The existence of influential users who have developed a reputation for their knowledge and experience of specific topics is a major factor contributing to this impact. Therefore, knowledge of the mechanisms to identify influential users on social media is vital for understanding their effect on their audience. The concept of the influential user is related to the concept of opinion leaders' to indicate that ideas first flow from mass media to opinion leaders and then to the rest of the population. Hence, the objective of this research was to provide reliable and accurate structural mechanisms to identify influential users, which could be applied to different platforms, places, and subjects. Twitter was selected as the platform of interest, and Saudi Arabia as the context for the investigation. These were selected because Saudi Arabia has a large number of Twitter users, some of whom are considerably active in setting agendas and disseminating ideas. The study considered the scientific methods that have been used to identify public opinion leaders before, utilizing metrics software on Twitter. The key findings propose multiple novel metrics to compare Twitter influencers, including the number of followers, social authority and the use of political hashtags, and four secondary filtering measures. Thus, using ratio and percentage calculations to classify the most influential users, Twitter accounts were filtered, analyzed and included. The structured approach is used as a mechanism to explore the top ten influencers on Twitter from the political domain in Saudi Arabia.

Keywords: Twitter, influencers, structured mechanism, Saudi Arabia

Procedia PDF Downloads 118
2389 Curbing Cybercrime by Application of Internet Users’ Identification System (IUIS) in Nigeria

Authors: K. Alese Boniface, K. Adu Michael

Abstract:

Cybercrime is now becoming a big challenge in Nigeria apart from the traditional crime. Inability to identify perpetrators is one of the reasons for the growing menace. This paper proposes a design for monitoring internet users’ activities in order to curbing cybercrime. It requires redefining the operations of Internet Service Providers (ISPs) which will now mandate users to be authenticated before accessing the internet. In implementing this work which can be adapted to a larger scale, a virtual router application is developed and configured to mimic a real router device. A sign-up portal is developed to allow users to register with the ISP. The portal asks for identification information which will include bio-data and government issued identification data like National Identity Card number, et cetera. A unique username and password are chosen by the user to enable access to the internet which will be used to reference him to an Internet Protocol Address (IP Address) of any system he uses on the internet and thereby associating him to any criminal act related to that IP address at that particular time. Questions such as “What happen when another user knows the password and uses it to commit crime?” and other pertinent issues are addressed.

Keywords: cybercrime, sign-up portal, internet service provider (ISP), internet protocol address (IP address)

Procedia PDF Downloads 279
2388 Outreach Intervention Addressing Crack Cocaine Addiction in Users with Co-Occurring Opioid Use Disorder

Authors: Louise Penzenstadler, Tiphaine Robet, Radu Iuga, Daniele Zullino

Abstract:

Context: The outpatient clinic of the psychiatric addiction service of Geneva University Hospital has been providing support to individuals affected by various narcotics for 30 years. However, the increasing consumption of crack cocaine in Geneva has presented a new challenge for the healthcare system. Research Aim: The aim of this research is to evaluate the impact of an outreach intervention on crack cocaine addiction in users with co-occurring opioid use disorder. Methodology: The research utilizes a combination of quantitative and qualitative retrospective data analysis to evaluate the effectiveness of the outreach intervention. Findings: The data collected from October 2023 to December 2023 show that the outreach program successfully made 1,071 contacts with drug users and led to 15 new requests for care and enrollment in treatment. Patients expressed high satisfaction with the intervention, citing easy and rapid access to treatment and social support. Theoretical Importance: This research contributes to the understanding of the challenges and specific needs of a complex group of drug users who face severe health problems. It highlights the importance of outreach interventions in establishing trust, connecting users with care, and facilitating medication-assisted treatment for opioid addiction. Data Collection: Data was collected through the outreach program's interactions with drug users, including street outreach interventions and presence at locations frequented by users. Patient satisfaction surveys were also utilized. Analysis Procedures: The collected data was analyzed using both quantitative and qualitative methods. The quantitative analysis involved examining the number of contacts made, new requests for care, and treatment enrollment. The qualitative analysis focused on patient satisfaction and their perceptions of the intervention. Questions Addressed: The research addresses the following questions: What is the impact of an outreach intervention on crack cocaine addiction in users with co-occurring opioid use disorder? How effective is the outreach program in connecting drug users with care and initiating medication-assisted treatment? Conclusion: The outreach program has proven to be an effective intervention in establishing trust with crack users, connecting them with care, and initiating medication-assisted treatment for opioid addiction. It has also highlighted the importance of addressing the specific challenges faced by this group of drug users.

Keywords: crack addiction, outreach treatment, peer intervention, polydrug use

Procedia PDF Downloads 64
2387 Clicking Based Graphical Password Scheme Resistant to Spyware

Authors: Bandar Alahmadi

Abstract:

The fact that people tend to remember pictures better than texts, motivates researchers to develop graphical passwords as an alternative to textual passwords. Graphical passwords as such were introduced as a possible alternative to traditional text passwords, in which users prove their identity by clicking on pictures rather than typing alphanumerical text. In this paper, we present a scheme for graphical passwords that are resistant to shoulder surfing attacks and spyware attacks. The proposed scheme introduces a clicking technique to chosen images. First, the users choose a set of images, the images are then included in a grid where users can click in the cells around each image, the location of the click and the number of clicks are saved. As a result, the proposed scheme can be safe from shoulder surface and spyware attacks.

Keywords: security, password, authentication, attack, applications

Procedia PDF Downloads 164
2386 Impact of ICT on Efficient Services Providing to Users by LIPs in NCR India

Authors: Mani Gupta

Abstract:

This study deals with question: i) Whether ICT plays a positive role in improvement of efficiency of LIPs in terms of providing efficient services to the Users in LICs? and ii) Role of finance in terms of required technological logistics and infrastructure for usage of ICT based services to comfort in accessing databases by Users in LICs. This is based on primary data which are collected from various libraries and Information Centers of NCR Delhi. The survey conducted during December 15 and 31, 2010 on 496 respondents across 96 libraries and information centers in NCR Delhi through electronic data collection method. There is positive and emphatic relationship between ICT and its effect on improving the level of efficient services providing by LIPs in LICs in NCR Delhi. This is divided into 6 sub-headings and finally the outcomes.

Keywords: modern globalization, linear correlation, efficient service, internet revolution, logistics

Procedia PDF Downloads 357
2385 A QoE-driven Cross-layer Resource Allocation Scheme for High Traffic Service over Open Wireless Network Downlink

Authors: Liya Shan, Qing Liao, Qinyue Hu, Shantao Jiang, Tao Wang

Abstract:

In this paper, a Quality of Experience (QoE)-driven cross-layer resource allocation scheme for high traffic service over Open Wireless Network (OWN) downlink is proposed, and the related problem about the users in the whole cell including the users in overlap region of different cells has been solved.A method, in which assess models of the BestEffort service and the no-reference assess algorithm for video service are adopted, to calculate the Mean Opinion Score (MOS) value for high traffic service has been introduced. The cross-layer architecture considers the parameters in application layer, media access control layer and physical layer jointly. Based on this architecture and the MOS value, the Binary Constrained Particle Swarm Optimization (B_CPSO) algorithm is used to solve the cross-layer resource allocation problem. In addition,simulationresults show that the proposed scheme significantly outperforms other schemes in terms of maximizing average users’ MOS value for the whole system as well as maintaining fairness among users.

Keywords: high traffic service, cross-layer resource allocation, QoE, B_CPSO, OWN

Procedia PDF Downloads 541
2384 Cybercrimes in Nigeria: Its Causes, Effects and Solutions

Authors: Uzoma Igboji

Abstract:

Cybercrimes involves crimes committed on the internet using the computer as a tool or targeted victim. In Nigeria today, there are many varieties of crimes that are committed on the internet daily, some are directed to the computers while the others are directed to the computer users. Cyber terrorism, identity theft, internet chat room, piracy and hacking are identified as types of cyber crimes. Usually, these crimes are perpetrated in forms of like sending of fraudulent and bogus financial proposals from cyber crimes to innocent internet users. The increasing rates of cyber crimes have become strong threats to the society, organizations and country’s reputation, E-commerce growth, denial of innocent Nigerian opportunity abroad and reduced productivity. This study identified some of the causes of cybercrimes to include urbanization, high rate of unemployment, corruption, easy accessibility to internet and weak implementation of cyber crimes in Nigeria. Therefore, internet users should inculcate the habit of continuously updating their knowledge about the ever changing ICTs through this, they can be well informed about the current trends in cybercrimes and how the cybercrimes carryout their dubious activities. Thus, how they can devise means of protecting their information from cyber criminals. Internet users should be security conscious at all times .Recommendations were proposed on how these crimes can be minimized if not completely eradicated.

Keywords: cyber-crimes, cyber-terrorism, cyber-criminals, Nigeria

Procedia PDF Downloads 537
2383 Design and Implementation of Remote Application Virtualization in Cloud Environments

Authors: Shuen-Tai Wang, Ying-Chuan Chen, Hsi-Ya Chang

Abstract:

Cloud computing is a paradigm of computing that shifts the way computing has been done in the past. The users can use cloud resources such as application software or storage space from the cloud without needing to own them. This paper is focused on solutions that are anticipated to introduce IaaS idea to build cloud base services and enable the individual remote user's applications in cloud environments, which appear as if they are running on the end user's local computer. The available features of application delivery solution have been developed based on our previous research on the virtualization technology to offer applications independent of location so that the users can work online, offline, anywhere, with appropriate device and at any time. This proposed effort has the potential to positively provide an efficient, resilience and elastic environment for cloud service. Users no longer need to burden the system managers and drastically reduces the overall cost of hardware and software licenses. Moreover, this flexible remote application virtualization service represents the next significant step to the mobile workplace, and it lets users access their applications remotely through cloud services anywhere. This is also made possible by the low administrative costs as well as relatively inexpensive end-user terminals and reduced energy expenses.

Keywords: cloud computing, IaaS, virtualization, application delivery

Procedia PDF Downloads 281
2382 Symbol Synchronization and Resource Reuse Schemes for Layered Video Multicast Service in Long Term Evolution Networks

Authors: Chung-Nan Lee, Sheng-Wei Chu, You-Chiun Wang

Abstract:

LTE (Long Term Evolution) employs the eMBMS (evolved Multimedia Broadcast/Multicast Service) protocol to deliver video streams to a multicast group of users. However, it requires all multicast members to receive a video stream in the same transmission rate, which would degrade the overall service quality when some users encounter bad channel conditions. To overcome this problem, this paper provides two efficient resource allocation schemes in such LTE network: The symbol synchronization (S2) scheme assumes that the macro and pico eNodeBs use the same frequency channel to deliver the video stream to all users. It then adopts a multicast transmission index to guarantee the fairness among users. On the other hand, the resource reuse (R2) scheme allows eNodeBs to transmit data on different frequency channels. Then, by introducing the concept of frequency reuse, it can further improve the overall service quality. Extensive simulation results show that the S2 and R2 schemes can respectively improve around 50% of fairness and 14% of video quality as compared with the common maximum throughput method.

Keywords: LTE networks, multicast, resource allocation, layered video

Procedia PDF Downloads 389
2381 Usability in E-Commerce Websites: Results of Eye Tracking Evaluations

Authors: Beste Kaysı, Yasemin Topaloğlu

Abstract:

Usability is one of the most important quality attributes for web-based information systems. Specifically, for e-commerce applications, usability becomes more prominent. In this study, we aimed to explore the features that experienced users seek in e-commerce applications. We used eye tracking method in evaluations. Eye movement data are obtained from the eye-tracking method and analyzed based on task completion time, number of fixations, as well as heat map and gaze plot measures. The results of the analysis show that the eye movements of participants' are too static in certain areas and their areas of interest are scattered in many different places. It has been determined that this causes users to fail to complete their transactions. According to the findings, we outlined the issues to improve the usability of e-commerce websites. Then we propose solutions to identify the issues. In this way, it is expected that e-commerce sites will be developed which will make experienced users more satisfied.

Keywords: e-commerce websites, eye tracking method, usability, website evaluations

Procedia PDF Downloads 182
2380 Scheduling Residential Daily Energy Consumption Using Bi-criteria Optimization Methods

Authors: Li-hsing Shih, Tzu-hsun Yen

Abstract:

Because of the long-term commitment to net zero carbon emission, utility companies include more renewable energy supply, which generates electricity with time and weather restrictions. This leads to time-of-use electricity pricing to reflect the actual cost of energy supply. From an end-user point of view, better residential energy management is needed to incorporate the time-of-use prices and assist end users in scheduling their daily use of electricity. This study uses bi-criteria optimization methods to schedule daily energy consumption by minimizing the electricity cost and maximizing the comfort of end users. Different from most previous research, this study schedules users’ activities rather than household appliances to have better measures of users’ comfort/satisfaction. The relation between each activity and the use of different appliances could be defined by users. The comfort level is at the highest when the time and duration of an activity completely meet the user’s expectation, and the comfort level decreases when the time and duration do not meet expectations. A questionnaire survey was conducted to collect data for establishing regression models that describe users’ comfort levels when the execution time and duration of activities are different from user expectations. Six regression models representing the comfort levels for six types of activities were established using the responses to the questionnaire survey. A computer program is developed to evaluate electricity cost and the comfort level for each feasible schedule and then find the non-dominated schedules. The Epsilon constraint method is used to find the optimal schedule out of the non-dominated schedules. A hypothetical case is presented to demonstrate the effectiveness of the proposed approach and the computer program. Using the program, users can obtain the optimal schedule of daily energy consumption by inputting the intended time and duration of activities and the given time-of-use electricity prices.

Keywords: bi-criteria optimization, energy consumption, time-of-use price, scheduling

Procedia PDF Downloads 59
2379 Mobile Network Users Amidst Ultra-Dense Networks in 5G Using an Improved Coordinated Multipoint (CoMP) Technology

Authors: Johnson O. Adeogo, Ayodele S. Oluwole, O. Akinsanmi, Olawale J. Olaluyi

Abstract:

In this 5G network, very high traffic density in densely populated areas, most especially in densely populated areas, is one of the key requirements. Radiation reduction becomes one of the major concerns to secure the future life of mobile network users in ultra-dense network areas using an improved coordinated multipoint technology. Coordinated Multi-Point (CoMP) is based on transmission and/or reception at multiple separated points with improved coordination among them to actively manage the interference for the users. Small cells have two major objectives: one, they provide good coverage and/or performance. Network users can maintain a good quality signal network by directly connecting to the cell. Two is using CoMP, which involves the use of multiple base stations (MBS) to cooperate by transmitting and/or receiving at the same time in order to reduce the possibility of electromagnetic radiation increase. Therefore, the influence of the screen guard with rubber condom on the mobile transceivers as one major piece of equipment radiating electromagnetic radiation was investigated by mobile network users amidst ultra-dense networks in 5g. The results were compared with the same mobile transceivers without screen guards and rubber condoms under the same network conditions. The 5 cm distance from the mobile transceivers was measured with the help of a ruler, and the intensity of Radio Frequency (RF) radiation was measured using an RF meter. The results show that the intensity of radiation from various mobile transceivers without screen guides and condoms was higher than the mobile transceivers with screen guides and condoms when call conversation was on at both ends.

Keywords: ultra-dense networks, mobile network users, 5g, coordinated multi-point.

Procedia PDF Downloads 103
2378 Web Proxy Detection via Bipartite Graphs and One-Mode Projections

Authors: Zhipeng Chen, Peng Zhang, Qingyun Liu, Li Guo

Abstract:

With the Internet becoming the dominant channel for business and life, many IPs are increasingly masked using web proxies for illegal purposes such as propagating malware, impersonate phishing pages to steal sensitive data or redirect victims to other malicious targets. Moreover, as Internet traffic continues to grow in size and complexity, it has become an increasingly challenging task to detect the proxy service due to their dynamic update and high anonymity. In this paper, we present an approach based on behavioral graph analysis to study the behavior similarity of web proxy users. Specifically, we use bipartite graphs to model host communications from network traffic and build one-mode projections of bipartite graphs for discovering social-behavior similarity of web proxy users. Based on the similarity matrices of end-users from the derived one-mode projection graphs, we apply a simple yet effective spectral clustering algorithm to discover the inherent web proxy users behavior clusters. The web proxy URL may vary from time to time. Still, the inherent interest would not. So, based on the intuition, by dint of our private tools implemented by WebDriver, we examine whether the top URLs visited by the web proxy users are web proxies. Our experiment results based on real datasets show that the behavior clusters not only reduce the number of URLs analysis but also provide an effective way to detect the web proxies, especially for the unknown web proxies.

Keywords: bipartite graph, one-mode projection, clustering, web proxy detection

Procedia PDF Downloads 245
2377 Impact of E-Resources and Its Acceessability by Faculty and Research Scholars of Academic Libraries: A Case Study

Authors: M. Jaculine Mary

Abstract:

Today electronic resources are considered as an integral part of information sources to impart efficient services to the people aspiring to acquire knowledge in different fields. E-resources are those resources which include documents in e-format that can be accessed via the Internet in a digital library environment. The present study focuses on accessibility and use of e-resources by faculty and research scholars of academic libraries of Coimbatore, TamilNadu, India. The main objectives are to identify their purpose of using e-resources, know the users’ Information and Communication Technology (ICT) skills, identify satisfaction level of availability of e-resources, use of different e-resources, overall user satisfaction of using e-resources, impact of e-resources on their research and problems faced by them in the access of e-resources. The research methodology adopted to collect data for this study includes analysis of survey reports carried out by distributing questionnaires to the users. The findings of the research are based on the study of responses received from questionnaires distributed to a sample population of 200 users. Among the 200 respondents, 55 percent of research students and 45 percent of faculty members were users of e-resources. It was found that a majority of the users agreed that relevant, updated information at a fast pace had influenced them to use e-resources. Most of the respondents were of the view that more numbers of computers in the library would facilitate quick learning. Academic libraries have to take steps to arrange various training and orientation programmes for research students and faculty members to use the availability of e-resources. This study helps the librarian in planning and development of e-resources to provide modern services to their users of libraries. The study recommends that measures should be taken to increase the accessibility level of e-resource services among the information seekers for increasing the best usage of available electronic resources in the academic libraries.

Keywords: academic libraries, accessibility, electronic resources, satisfaction level, survey

Procedia PDF Downloads 142
2376 A Structured Mechanism for Identifying Political Influencers on Social Media Platforms Top 10 Saudi Political Twitter Users

Authors: Ahmad Alsolami, Darren Mundy, Manuel Hernandez-Perez

Abstract:

Social media networks, such as Twitter, offer the perfect opportunity to either positively or negatively affect political attitudes on large audiences. A most important factor contributing to this effect is the existence of influential users, who have developed a reputation for their awareness and experience on specific subjects. Therefore, knowledge of the mechanisms to identify influential users on social media is vital for understanding their effect on their audience. The concept of the influential user is based on the pioneering work of Katz and Lazarsfeld (1959), who created the concept of opinion leaders' to indicate that ideas first flow from mass media to opinion leaders and then to the rest of the population. Hence, the objective of this research was to provide reliable and accurate structural mechanisms to identify influential users, which could be applied to different platforms, places, and subjects. Twitter was selected as the platform of interest, and Saudi Arabia as the context for the investigation. These were selected because Saudi Arabia has a large number of Twitter users, some of whom are considerably active in setting agendas and disseminating ideas. The study considered the scientific methods that have been used to identify public opinion leaders before, utilizing metrics software on Twitter. The key findings propose multiple novel metrics to compare Twitter influencers, including the number of followers, social authority and the use of political hashtags, and four secondary filtering measures. Thus, using ratio and percentage calculations to classify the most influential users, Twitter accounts were filtered, analyzed and included. The structured approach is used as a mechanism to explore the top ten influencers on Twitter from the political domain in Saudi Arabia.

Keywords: twitter, influencers, structured mechanism, Saudi Arabia

Procedia PDF Downloads 137
2375 Explaining E-Learning Systems Usage in Higher Education Institutions: UTAUT Model

Authors: Muneer Abbad

Abstract:

This research explains the e-learning usage in a university in Jordan. Unified theory of acceptance and use of technology (UTAUT) model has been used as a base model to explain the usage. UTAUT is a model of individual acceptance that is compiled mainly from different models of technology acceptance. This research is the initial part from full explanations of the users' acceptance model that use Structural Equation Modelling (SEM) method to explain the users' acceptance of the e-learning systems based on UTAUT model. In this part data has been collected and prepared for further analysis. The main factors of UTAUT model has been tested as different factors using exploratory factor analysis (EFA). The second phase will be confirmatory factor analysis (CFA) and SEM to explain the users' acceptance of e-learning systems.

Keywords: e-learning, moodle, adoption, Unified Theory of Acceptance and Use of Technology (UTAUT)

Procedia PDF Downloads 407
2374 Factors Influencing the Continuance Usage of Online Mobile Payment Apps: A Case Study of WECHAT Users in China

Authors: Isaac Kofi Mensah, Jianing Mi, Feng Cheng

Abstract:

This research paper seeks to investigate the factors determining the continuance usage of online mobile payment applications among WECHAT users in China. Technology Acceptance Model (TAM) and the Diffusion of Innovation (DOI) theory would both be applied as the theoretical foundation for this study. A developed instrument would be administered to the targeted sample of 1000 WECHAT Users in the City of Harbin, China, through an online questionnaire administration platform. Factors such as perceived usefulness, perceived ease of use, perceived service quality, social influence, trust in the internet, internet self-efficacy, relative advantage, compatibility, and complexity would be explored to determine its significant impact on the continuance intention to use mobile payment apps. This study is at the development and implementation stage. The successful completion of this research article would not only provide an insightful understanding of the factors influencing the decision of WECHAT users in China to use mobile payment applications but also enrich the e-commerce adoption literature.

Keywords: diffusion of innovation (DOI), e-commerce, mobile payment, technology acceptance model (TAM), WECHAT

Procedia PDF Downloads 192
2373 Cyber Violence Behaviors Among Social Media Users in Ghana: An Application of Self-Control Theory and Social Learning Theory

Authors: Aisha Iddrisu

Abstract:

The proliferation of cyberviolence in the wave of increased social media consumption calls for immediate attention both at the local and global levels. With over 4.70 billion social media users worldwide and 8.8 social media users in Ghana, various forms of violence have become the order of the day in most countries and communities. Cyber violence is defined as producing, retrieving, and sharing of hurtful or dangerous online content to cause emotional, psychological, or physical harm. The urgency and severity of cyber violence have led to the enactment of laws in various countries though lots still need to be done, especially in Ghana. In Ghana, studies on cyber violence have not been extensively dealt with. Existing studies concentrate only on one form or the other form of cyber violence, thus cybercrime and cyber bullying. Also, most studies in Africa have not explored cyber violence forms using empirical theories and the few that existed were qualitatively researched, whereas others examine the effect of cyber violence rather than examining why those who involve in it behave the way they behave. It is against this backdrop that this study aims to examine various cyber violence behaviour among social media users in Ghana by applying the theory of Self-control and Social control theory. This study is important for the following reasons. The outcome of this research will help at both national and international level of policymaking by adding to the knowledge of understanding cyberviolence and why people engage in various forms of cyberviolence. It will also help expose other ways by which such behaviours are enforced thereby serving as a guide in the enactment of the rightful rules and laws to curb such behaviours. It will add to literature on consequences of new media. This study seeks to confirm or reject to the following research hypotheses. H1 Social media usage has direct significant effect of cyberviolence behaviours. H2 Ineffective parental management has direct significant positive relation to Low self-control. H3 Low self-control has direct significant positive effect on cyber violence behaviours among social, H4 Differential association has significant positive effect on cyberviolence behaviour among social media users in Ghana. H5 Definitions have a significant positive effect on cyberviolence behaviour among social media users in Ghana. H6 Imitation has a significant positive effect on cyberviolence behaviour among social media users in Ghana. H7 Differential reinforcement has a significant positive effect on cyberviolence behaviour among social media users in Ghana. H8 Differential association has a significant positive effect on definitions. H9 Differential association has a significant positive effect on imitation. H10 Differential association has a significant positive effect on differential reinforcement. H11 Differential association has significant indirect positive effects on cyberviolence through the learning process.

Keywords: cyberviolence, social media users, self-control theory, social learning theory

Procedia PDF Downloads 84
2372 The Analysis of One Million Reddit Confessions Corpus: The Use of Emotive Verbs and First Person Singular Pronoun as Linguistic Psychotherapy Features

Authors: Natalia Wojarnik

Abstract:

The paper aims to present the analysis of a Reddit confessions corpus. The interpretation focuses on the use of emotional language, in particular emotive verbs, in the context of personal pronouns. The analysis of the linguistic properties answers the question of what the Reddit users confess about and who is the subject of confessions. The study reveals that the specific language patterns used in Reddit confessions reflect the language of depression and the language used by patients during different stages of their psychotherapy sessions. The paper concludes that Reddit users are more willing to confess about their own experiences, not rarely very private and intimate, extensively using the first person singular pronoun I. It indicates that the Reddit users use the language of depression and the language used by psychotherapy patients. The language they use is very emotionally impacted and includes many emotive verbs such as want, feel, need, hate, love. This finding in Reddit confessions correlates with the extensive use of stative affective verbs in the first stages of the psychotherapy sessions. Lastly, the paper refers to the positive and negative lexicon and helps determine how online posts can serve as a depression detector and “talking cure” for the users.

Keywords: confessions, emotional language, emotive verbs, pronouns, first person pronoun, language of depression, depression detection, psychotherapy language

Procedia PDF Downloads 119
2371 Context Detection in Spreadsheets Based on Automatically Inferred Table Schema

Authors: Alexander Wachtel, Michael T. Franzen, Walter F. Tichy

Abstract:

Programming requires years of training. With natural language and end user development methods, programming could become available to everyone. It enables end users to program their own devices and extend the functionality of the existing system without any knowledge of programming languages. In this paper, we describe an Interactive Spreadsheet Processing Module (ISPM), a natural language interface to spreadsheets that allows users to address ranges within the spreadsheet based on inferred table schema. Using the ISPM, end users are able to search for values in the schema of the table and to address the data in spreadsheets implicitly. Furthermore, it enables them to select and sort the spreadsheet data by using natural language. ISPM uses a machine learning technique to automatically infer areas within a spreadsheet, including different kinds of headers and data ranges. Since ranges can be identified from natural language queries, the end users can query the data using natural language. During the evaluation 12 undergraduate students were asked to perform operations (sum, sort, group and select) using the system and also Excel without ISPM interface, and the time taken for task completion was compared across the two systems. Only for the selection task did users take less time in Excel (since they directly selected the cells using the mouse) than in ISPM, by using natural language for end user software engineering, to overcome the present bottleneck of professional developers.

Keywords: natural language processing, natural language interfaces, human computer interaction, end user development, dialog systems, data recognition, spreadsheet

Procedia PDF Downloads 311
2370 The Impact of the Fitness Center Ownership Structure on the Service Quality Perception in the Fitness in Serbia

Authors: Dragan Zivotic, Mirjana Ilic, Aleksandra Perovic, Predrag Gavrilovic

Abstract:

As with the provision of other services, the service quality perception is one of the key factors that the modern manager must pay attention to. Countries in which the state regulation is in transition also have specific features in providing fitness services. Identification of the dimensions in which the most significant different service quality perception between different types of fitness centers, enables managers to profile the offer according to the wishes and expectations of users. The aim of the paper was the comparison of the quality of services perception in the field of fitness in Serbia between three categories of fitness centers: the privately owned centers, the publicly owned centers, and the Public-private partnership centers. For this research 350 respondents of both genders (174 men and 176 women) were interviewed, aged between 18 and 68 years, being beneficiaries of fitness services for at least 1 year. Administered questionnaire with 100 items provided information about the 15 basic areas in which they expressed the service quality perception in the gym. The core sample was composed of 212 service users in private fitness centers, 69 service users in public fitness centers and 69 service users in the public-private partnership. Sub-samples were equal in representation of women and men, as well as by age and length of use of fitness services. The obtained results were subject of univariate analysis with the Kruskal-Wallis non-parametric analysis of variance. Significant differences between the analyzed sub-samples were not found solely in the areas of rapid response and quality outcomes. In the multivariate model, the results were processed by backward stepwise discriminant analysis that extracted 3 areas that maximize the differences between sub-samples: material and technical basis, secondary facilities and coaches. By applying the classification function 93.87% of private centers services users, 62.32% of public centers services users and 85.51% of the public-private partnership centers users of services were correctly classified (total 86.00%). These results allow optimizing the allocation of the necessary resources in profiling offers of a fitness center in order to optimally adjust it to the user’s needs and expectations.

Keywords: fitness, quality perception, management, public ownership, private ownership, public-private partnership, discriminative analysis

Procedia PDF Downloads 293
2369 Prevalence and Pattern of Drug Usage among Youth in Ogbomoso, Nigeria

Authors: Samson F. Agberotimi, Rachel B. Asagba, Choja Oduaran

Abstract:

Disturbing rate of use of different substances such as cannabis, alcohol, as well as pharmaceutical drugs among Nigerian youth in recent times has been affirmed in the literature. There is, however, a paucity of literature addressing the pattern of usage of such drugs, especially for clinical relevance and intervention planning. The present study investigated the prevalence and pattern of drug usage among youth in Ogbomoso, Nigeria. A cross-sectional survey involving 92 purposively selected participants comprising of 82 males and 10 females aged between 15 and 24 years was conducted. A measure of drug involvement and demographic characteristics was administered to the participants. Descriptive analysis was done using the SPSS v.21. Cannabis (79.4%), alcohol (77.2%), codeine (70.7%), tobacco (65.2%) and tramadol (47.8%) are the five most frequently used substances. However, the majority of the users of tobacco (68.3%) and alcohol (62.0%) are casual users indicating a mild level of use of the substances among the participants. On the other hand, 49.2% of the codeine users, 27.3% of the tramadol users, and 21.9% of the cannabis users reported harmful/intensive levels of use. Furthermore, the results revealed individuals at the pathological level of use as 28.8% for cannabis, 25.0% for tramadol, and 21.6% for codeine, and thus require clinical/therapeutic intervention. In conclusion, cannabis remains the most frequently used substance among youths. However, there appears to be a shift from the use of conventional psychoactive substances to pharmaceutical/prescription drugs such as codeine and tramadol. The findings of this study raised the need for both preventive and therapeutic interventions addressing the problem of substance use disorder among youth in contemporary society.

Keywords: Ogbomoso, pattern of drug use, prevalence of drug use, youth

Procedia PDF Downloads 168
2368 End-Users Tools to Empower and Raise Awareness of Behavioural Change towards Energy Efficiency

Authors: G. Calleja-Rodriguez, N. Jimenez-Redondo, J. J. Peralta Escalante

Abstract:

This research work aims at developing a solution to take advantage of the potential energy saving related to occupants behaviour estimated in between 5-30 % according to existing studies. For that purpose, the following methodology has been followed: 1) literature review and gap analysis, 2) define concept and functional requirements, 3) evaluation and feedback by experts. As result, the concept for a tool-box that implements continuous behavior change interventions named as engagement methods and based on increasing energy literacy, increasing energy visibility, using bonus system, etc. has been defined. These engagement methods are deployed through a set of ICT tools: Building Automation and Control System (BACS) add-ons services installed in buildings and Users Apps installed in smartphones, smart-TVs or dashboards. The tool-box called eTEACHER identifies energy conservation measures (ECM) based on energy behavioral change through a what-if analysis that collects information about the building and its users (comfort feedback, behavior, etc.) and carry out cost-effective calculations to provide outputs such us efficient control settings of building systems. This information is processed and showed in an attractive way as tailored advice to the energy end-users. Therefore, eTEACHER goal is to change the behavior of building´s energy users towards energy efficiency, comfort and better health conditions by deploying customized ICT-based interventions taking into account building typology (schools, residential, offices, health care centres, etc.), users profile (occupants, owners, facility managers, employers, etc.) as well as cultural and demographic factors. One of the main findings of this work is the common failure when technological interventions on behavioural change are done to not consult, train and support users regarding technological changes leading to poor performance in practices. As conclusion, a strong need to carry out social studies to identify relevant behavioural issues and to identify effective pro-evironmental behavioral change strategies has been identified.

Keywords: energy saving, behavioral bhange, building users, engagement methods, energy conservation measures

Procedia PDF Downloads 170