Search results for: internet usage
2027 A Study of the Trap of Multi-Homing in Customers: A Comparative Case Study of Digital Payments
Authors: Shari S. C. Shang, Lynn S. L. Chiu
Abstract:
In the digital payment market, some consumers use only one payment wallet while many others play multi-homing with a variety of payment services. With the diffusion of new payment systems, we examined the determinants of the adoption of multi-homing behavior. This study aims to understand how a digital payment provider dynamically expands business touch points with cross-business strategies to enrich the digital ecosystem and avoid the trap of multi-homing in customers. By synthesizing platform ecosystem literature, we constructed a two-dimensional research framework with one determinant of user digital behavior from offline to online intentions and the other determinant of digital payment touch points from convenient accessibility to cross-business platforms. To explore on a broader scale, we selected 12 digital payments from 5 countries of UK, US, Japan, Korea, and Taiwan. With the interplays of user digital behaviors and payment touch points, we group the study cases into four types: (1) Channel Initiated: users originated from retailers with high access to in-store shopping with face-to-face guidance for payment adoption. Providers offer rewards for customer loyalty and secure the retailer’s efficient cash flow management. (2) Social Media Dependent: users usually are digital natives with high access to social media or the internet who shop and pay digitally. Providers might not own physical or online shops but are licensed to aggregate money flows through virtual ecosystems. (3) Early Life Engagement: digital banks race to capture the next generation from popularity to profitability. This type of payment aimed to give children a taste of financial freedom while letting parents track their spending. Providers are to capitalize on the digital payment and e-commerce boom and hold on to new customers into adulthood. (4) Traditional Banking: plastic credit cards are purposely designed as a control group to track the evolvement of business strategies in digital payments. Traditional credit card users may follow the bank’s digital strategy to land on different types of digital wallets or mostly keep using plastic credit cards. This research analyzed business growth models and inter-firms’ coopetition strategies of the selected cases. Results of the multiple case analysis reveal that channel initiated payments bundled rewards with retailer’s business discount for recurring purchases. They also extended other financial services, such as insurance, to fulfill customers’ new demands. Contrastively, social media dependent payments developed new usages and new value creation, such as P2P money transfer through network effects among the virtual social ties, while early life engagements offer virtual banking products to children who are digital natives but overlooked by incumbents. It has disrupted the banking business domains in preparation for the metaverse economy. Lastly, the control group of traditional plastic credit cards has gradually converted to a BaaS (banking as a service) model depending on customers’ preferences. The multi-homing behavior is not avoidable in digital payment competitions. Payment providers may encounter multiple waves of a multi-homing threat after a short period of success. A dynamic cross-business collaboration strategy should be explored to continuously evolve the digital ecosystems and allow users for a broader shopping experience and continual usage.Keywords: digital payment, digital ecosystems, multihoming users, cross business strategy, user digital behavior intentions
Procedia PDF Downloads 1602026 Smartphone Video Source Identification Based on Sensor Pattern Noise
Authors: Raquel Ramos López, Anissa El-Khattabi, Ana Lucila Sandoval Orozco, Luis Javier García Villalba
Abstract:
An increasing number of mobile devices with integrated cameras has meant that most digital video comes from these devices. These digital videos can be made anytime, anywhere and for different purposes. They can also be shared on the Internet in a short period of time and may sometimes contain recordings of illegal acts. The need to reliably trace the origin becomes evident when these videos are used for forensic purposes. This work proposes an algorithm to identify the brand and model of mobile device which generated the video. Its procedure is as follows: after obtaining the relevant video information, a classification algorithm based on sensor noise and Wavelet Transform performs the aforementioned identification process. We also present experimental results that support the validity of the techniques used and show promising results.Keywords: digital video, forensics analysis, key frame, mobile device, PRNU, sensor noise, source identification
Procedia PDF Downloads 4282025 The Outcome of the Discontinuation of Cheques on Bank Reconciliation
Authors: Estelle Abrahams, Tania Pretorius
Abstract:
A joint media statement by the South African Reserve Bank, the Banking Association of South Africa, the Financial Sector Conduct Authority, and the Payments Association of South Africa was recently published, stating that the receipt or acceptance of cheques will terminate effectively on 31 December 2020. All stakeholders are urged to cease accepting or issuing cheques as a payment method. The purpose of the study is to examine the effect that the discontinuation of the usage of cheques has on bank reconciliations for the subject: economic and management sciences. A literature study was performed to gain insight into the bank reconciliation process to be able to draw conclusions on the outcome of the discontinuation of cheques on the bank reconciliation. The study found that the teaching of the bank reconciliation process will change to introduce new replacement source documents for digital payments, and this impacts the teaching of reconciling differences.Keywords: bank reconciliation, internal control, accounting education, source documents
Procedia PDF Downloads 1082024 Cursive Handwriting in an Internet Age
Authors: Karen Armstrong
Abstract:
Recent concerns about the value of teaching cursive handwriting in the classroom are based on the belief that cursive handwriting or penmanship is an outdated and unnecessary skill in today’s online world. The discussion of this issue begins with a description of current initiatives to eliminate handwriting instruction in schools. This is followed by a brief history of cursive writing through the ages. Next considered is a description of its benefits as a preliminary process for younger children as compared with immediate instruction in keyboarding, particularly in the areas of vision, cognition, motor skills and automatic fluency. Also considered, is cursive’s companion, paper itself, and the impact of a paperless, “screen and keyboard” environment. The discussion concludes with a consideration of the unique contributions of cursive and keyboarding as written forms of communication, along with their respective surfaces, paper and screen. Finally, an assessment of the practical utility of each skill is followed by an informal assessment of what is lost and what remains as we move from a predominantly paper and pen world of handwriting to texting and keyboarding in an environment of screens.Keywords: asemic writing, cursive, handwriting, keyboarding, paper
Procedia PDF Downloads 2702023 A Hybrid Approach for Thread Recommendation in MOOC Forums
Authors: Ahmad. A. Kardan, Amir Narimani, Foozhan Ataiefard
Abstract:
Recommender Systems have been developed to provide contents and services compatible to users based on their behaviors and interests. Due to information overload in online discussion forums and users diverse interests, recommending relative topics and threads is considered to be helpful for improving the ease of forum usage. In order to lead learners to find relevant information in educational forums, recommendations are even more needed. We present a hybrid thread recommender system for MOOC forums by applying social network analysis and association rule mining techniques. Initial results indicate that the proposed recommender system performs comparatively well with regard to limited available data from users' previous posts in the forum.Keywords: association rule mining, hybrid recommender system, massive open online courses, MOOCs, social network analysis
Procedia PDF Downloads 2942022 Enzyme Redesign: From Metal-Dependent to Metal-Independent, a Symphony Orchestra without Concertmasters
Authors: Li Na Zhao, Arieh Warshel
Abstract:
The design of enzymes is an extremely challenging task, and this is also true for metalloenzymes. In the case of naturally evolved enzymes, one may consider the active site residues as the musicians in the enzyme orchestra, while the metal can be considered as their concertmaster. Together they catalyze reactions as if they performed a masterpiece written by nature. The Lactonase can be thought as a member of the amidohydrolase family, with two concertmasters, Fe and Zn, at its active site. It catalyzes the quorum sensing signal- N-acyl homoserine lactones (AHLs or N-AHLs)- by hydrolyzing the lactone ring. This process, known as quorum quenching, provides a strategy in the treatment of infectious diseases without introducing selection pressure. However, the activity of lactonase is metal-dependent, and this dependence hampers the clinic usage. In our study, we use the empirical valence bond (EVB) approach to evaluate the catalytic contributions decomposing them to electrostatic and other components.Keywords: enzyme redesign, empirical valence bond, lactonase, quorum quenching
Procedia PDF Downloads 2532021 E-Hailing Taxi Industry Management Mode Innovation Based on the Credit Evaluation
Authors: Yuan-lin Liu, Ye Li, Tian Xia
Abstract:
There are some shortcomings in Chinese existing taxi management modes. This paper suggests to establish the third-party comprehensive information management platform and put forward an evaluation model based on credit. Four indicators are used to evaluate the drivers’ credit, they are passengers’ evaluation score, driving behavior evaluation, drivers’ average bad record number, and personal credit score. A weighted clustering method is used to achieve credit level evaluation for taxi drivers. The management of taxi industry is based on the credit level, while the grade of the drivers is accorded to their credit rating. Credit rating determines the cost, income levels, the market access, useful period of license and the level of wage and bonus, as well as violation fine. These methods can make the credit evaluation effective. In conclusion, more credit data will help to set up a more accurate and detailed classification standard library.Keywords: credit, mobile internet, e-hailing taxi, management mode, weighted cluster
Procedia PDF Downloads 3252020 Interactive and Innovative Environments for Modeling Digital Educational Games and Animations
Authors: Ida Srdić, Luka Mandić, LidijaMandić
Abstract:
Digitization and intensive use of tablets, smartphones, the internet, mobile, and web applications have massively disrupted our habits, and the way audiences (especially youth) consume content. To introduce educational content in games and animations, and at the same time to keep it interesting and compelling for kids, is a challenge. In our work, we are comparing the different possibilities and potentials that digital games could provide to successfully mitigate direct connection with education. We analyze the main directions and educational methods in game-based learning and the possibilities of interactive modeling through questionnaires for user experience and requirements. A pre and post-quantitative survey will be conducted in order to measure levels of objective knowledge as well as the games perception. This approach enables quantitative and objective evaluation of the impact the game has on participants. Also, we will discuss the main barriers to the use of games in education and how games can be best used for learning.Keywords: Bloom’s taxonomy, epistemic games, learning objectives, virtual learning environments
Procedia PDF Downloads 982019 Semi-automatic Design and Fabrication of Ring-Bell Control by IoT
Authors: Samart Rungjarean, Benchalak Muangmeesri, Dechrit Maneetham
Abstract:
Monks' and Novices' chimes may have some restrictions, such as during the rain when a structure or location chimes or at a certain period. Alternately, certain temple bells may be found atop a tall, difficult-to-reach bell tower. As a result, the concept of designing a brass bell for use with a mobile phone over great distances was proposed. The Internet of Things (IoT) system will be used to regulate the bell by testing each of the three beatings with a wooden head. A stone-beating head and a steel beater. The sound resonates nicely, with the distance and rhythm of the hit contributing to this. An ESP8266 microcontroller is used by the control system to manage its operations and will communicate with the pneumatic system to convey a signal. Additionally, a mobile phone will be used to operate the entire system. In order to precisely direct and regulate the rhythm, There is a resonance of roughly 50 dB for this test, and the operating distance can be adjusted. Timing and accuracy were both good.Keywords: automatic ring-bell, microcontroller, ring-bell, iot
Procedia PDF Downloads 1112018 Auteur 3D Filmmaking: From Hitchcock’s Protrusion Technique to Godard’s Immersion Aesthetic
Authors: Delia Enyedi
Abstract:
Throughout film history, the regular return of 3D cinema has been discussed in connection to crises caused by the advent of television or the competition of the Internet. In addition, the three waves of stereoscopic 3D (from 1952 up to 1983) and its current digital version have been blamed for adding a challenging technical distraction to the viewing experience. By discussing the films Dial M for Murder (1954) and Goodbye to Language (2014), the paper aims to analyze the response of recognized auteurs to the use of 3D techniques in filmmaking. For Alfred Hitchcock, the solution to attaining perceptual immersion paradoxically resided in restraining the signature effect of 3D, namely protrusion. In Jean-Luc Godard’s vision, 3D techniques allowed him to explore perceptual absorption by means of depth of field, for which he had long advocated as being central to cinema. Thus, both directors contribute to the foundation of an auteur aesthetic in 3D filmmaking.Keywords: Alfred Hitchcock, authorship, 3D filmmaking, Jean-Luc Godard, perceptual absorption, perceptual immersion
Procedia PDF Downloads 2902017 Improving Fingerprinting-Based Localization (FPL) System Using Generative Artificial Intelligence (GAI)
Authors: Getaneh Berie Tarekegn, Li-Chia Tai
Abstract:
With the rapid advancement of artificial intelligence, low-power built-in sensors on Internet of Things devices, and communication technologies, location-aware services have become increasingly popular and have permeated every aspect of people’s lives. Global navigation satellite systems (GNSSs) are the default method of providing continuous positioning services for ground and aerial vehicles, as well as consumer devices (smartphones, watches, notepads, etc.). However, the environment affects satellite positioning systems, particularly indoors, in dense urban and suburban cities enclosed by skyscrapers, or when deep shadows obscure satellite signals. This is because (1) indoor environments are more complicated due to the presence of many objects surrounding them; (2) reflection within the building is highly dependent on the surrounding environment, including the positions of objects and human activity; and (3) satellite signals cannot be reached in an indoor environment, and GNSS doesn't have enough power to penetrate building walls. GPS is also highly power-hungry, which poses a severe challenge for battery-powered IoT devices. Due to these challenges, IoT applications are limited. Consequently, precise, seamless, and ubiquitous Positioning, Navigation and Timing (PNT) systems are crucial for many artificial intelligence Internet of Things (AI-IoT) applications in the era of smart cities. Their applications include traffic monitoring, emergency alarming, environmental monitoring, location-based advertising, intelligent transportation, and smart health care. This paper proposes a generative AI-based positioning scheme for large-scale wireless settings using fingerprinting techniques. In this article, we presented a novel semi-supervised deep convolutional generative adversarial network (S-DCGAN)-based radio map construction method for real-time device localization. We also employed a reliable signal fingerprint feature extraction method with t-distributed stochastic neighbor embedding (t-SNE), which extracts dominant features while eliminating noise from hybrid WLAN and long-term evolution (LTE) fingerprints. The proposed scheme reduced the workload of site surveying required to build the fingerprint database by up to 78.5% and significantly improved positioning accuracy. The results show that the average positioning error of GAILoc is less than 0.39 m, and more than 90% of the errors are less than 0.82 m. According to numerical results, SRCLoc improves positioning performance and reduces radio map construction costs significantly compared to traditional methods.Keywords: location-aware services, feature extraction technique, generative adversarial network, long short-term memory, support vector machine
Procedia PDF Downloads 472016 Influence and Dissemination of Solecism among Moroccan High School and University Students
Authors: Rachid Ed-Dali, Khalid Elasri
Abstract:
Mass media seem to provide a rich content for language acquisition. Exposure to television, the Internet, the mobile phone and other technological gadgets and devices helps enrich the student’s lexicon positively as well as negatively. The difficulties encountered by students while learning and acquiring second languages in addition to their eagerness to comprehend the content of a particular program prompt them to diversify their methods so as to achieve their targets. The present study highlights the significance of certain media channels and their involvement in language acquisition with the employment of the Natural Approach to further grasp whether students, especially secondary and high school students, learn and acquire errors through watching subtitled television programs. The chief objective is investigating the deductive and inductive relevance of certain programs beside the involvement of peripheral learning while acquiring mistakes.Keywords: errors, mistakes, Natural Approach, peripheral learning, solecism
Procedia PDF Downloads 1172015 Studying the Spatial Aspects of Visual Attention Processing in Global Precedence Paradigm
Authors: Shreya Borthakur, Aastha Vartak
Abstract:
This behavioral experiment aimed to investigate the global precedence phenomenon in a South Asian sample and its correlation with mobile screen time. The global precedence effect refers to the tendency to process overall structure before attending to specific details. Participants completed attention tasks involving global and local stimuli with varying consistencies. The results showed a tendency towards local precedence, but no significant differences in reaction times were found between consistency levels or attention conditions. However, the correlation analysis revealed that participants with higher screen time exhibited a stronger negative correlation with local attention, suggesting that excessive screen usage may impact perceptual organization. Further research is needed to explore this relationship and understand the influence of screen time on cognitive processing.Keywords: global precedence, visual attention, perceptual organization, screen time, cognition
Procedia PDF Downloads 682014 [Keynote Talk]: Determination of the Quality of the Machined Surface Using Fuzzy Logic
Authors: Dejan Tanikić, Jelena Đoković, Saša Kalinović, Miodrag Manić, Saša Ranđelović
Abstract:
This paper deals with measuring and modelling of the quality of the machined surface of the metal machining process. The average surface roughness (Ra) which represents the quality of the machined part was measured during the dry turning of the AISI 4140 steel. A large number of factors with the unknown relations among them influences this parameter, and that is why mathematical modelling is extremely complicated. Different values of cutting speed, feed rate, depth of cut (cutting regime) and workpiece hardness causes different surface roughness values. Modelling with soft computing techniques may be very useful in such cases. This paper presents the usage of the fuzzy logic-based system for determining metal machining process parameter in order to find the proper values of cutting regimes.Keywords: fuzzy logic, metal machining, process modeling, surface roughness
Procedia PDF Downloads 1592013 Experimental and Numerical Processes of Open Die Forging of Multimetallic Materials with the Usage of Different Lubricants
Authors: Isik Cetintav, Cenk Misirli, Yilmaz Can, Damla Gunel
Abstract:
This work investigates experimental and numerical analysis of open die forging of multimetallic materials. Multimetallic material production has recently become an interesting research field. The mechanical properties of the materials to be used for the formation of multimetallic materials and the mechanical properties of the multimetallic materials produced will be compared and the material flows of the use of different lubricants will be examined. Furthermore, in this work, the mechanical properties of multimetallic metallic materials produced using different materials will be examined by using different lubricants. The advantages and disadvantages of different lubricants will be approached with the bi-metallic material to be produced. Cylindrical specimens consisting of two different materials were used in the experiments. Specimens were prepared as aluminum sleeve and copper core and upset at different reduction. This metal combination present a material model of which chemical composition is different. ABAQUS software was used for the simulations. Simulation and experimental results have also shown reasonable agreement.Keywords: multimetallic, forging, experimental, numerical
Procedia PDF Downloads 2782012 Evaluation and Selection of SaaS Product Based on User Preferences
Authors: Boussoualim Nacira, Aklouf Youcef
Abstract:
Software as a Service (SaaS) is a software delivery paradigm in which the product is not installed on-premise, but it is available on Internet and Web. The customers do not pay to possess the software itself but rather to use it. This concept of pay per use is very attractive. Hence, we see increasing number of organizations adopting SaaS. However, each customer is unique, which leads to a very large variation in the requirements off the software. As several suppliers propose SaaS products, the choice of this latter becomes a major issue. When multiple criteria are involved in decision making, we talk about a problem of «Multi-Criteria Decision-Making» (MCDM). Therefore, this paper presents a method to help customers to choose a better SaaS product satisfying most of their conditions and alternatives. Also, we know that a good method of adaptive selection should be based on the correct definition of the different parameters of choice. This is why we started by extraction and analysis the various parameters involved in the process of the selection of a SaaS application.Keywords: cloud computing, business operation, Multi-Criteria Decision-Making (MCDM), Software as a Service (SaaS)
Procedia PDF Downloads 4832011 Thai Arts and Culture the Formation of Thai Identity Letter Font Designed
Authors: Kreetha Thumcharoensathit
Abstract:
The purpose of the analysis of Thai Arts and Culture which concerning the formation of Thai identity letter font designed is to identify The Aumphawa local community identity so as to select the suitable letter font which can applicable to the computer software usage. The populated survey was from the group of local people who live in Aumphawa sub-district. The methodological is cluster sampling from 100 surveyed, those 50 were from people who have household registration done in Aumphawa sub-district and other from people who live outside. In order to analyze and design the Thai identity letter font computer software designed for both Thai and English language version, the analysis had been completed by compiling of document and field survey from local people’s opinion on their Arts and Culture identity. The out-put will be submitted to the experts for evaluation.Keywords: Thai arts, design, font, identity
Procedia PDF Downloads 4772010 New Requirements of the Fifth Dimension of War: Planning of Cyber Operation Capabilities
Authors: Mehmet Kargaci
Abstract:
Transformation of technology and strategy has been the main factor for the evolution of war. In addition to land, maritime, air and space domains, cyberspace has become the fifth domain with emerge of internet. The current security environment has become more complex and uncertain than ever before. Moreover, warfare has evaluated from conventional to irregular, asymmetric and hybrid war. Weak actors such as terrorist organizations and non-state actors has increasingly conducted cyber-attacks against strong adversaries. Besides, states has developed cyber capabilities in order to defense critical infrastructure regarding the cyber threats. Cyber warfare will be key in future security environment. Although what to do has been placed in operational plans, how to do has lacked and ignored as to cyber defense and attack. The purpose of the article is to put forward a model for how to conduct cyber capabilities in a conventional war. First, cyber operations capabilities will be discussed. Second put forward the necessities of cyberspace environment and develop a model for how to plan an operation using cyber operation capabilities, finally the assessment of the applicability of cyber operation capabilities and offers will be presented.Keywords: cyber war, cyber threats, cyber operation capabilities, operation planning
Procedia PDF Downloads 3352009 Utilizing IoT for Waste Collection: A Review of Technologies for Eco-Friendly Waste Management
Authors: Fatemehsadat Mousaviabarbekouh
Abstract:
Population growth and changing consumption patterns have led to waste management becoming a significant global challenge. With projections indicating that nearly 67% of the Earth's population will live in megacities by 2050, there is a pressing need for smart solutions to address citizens' demands. Waste collection, facilitated by the Internet of Things (IoT), offers an efficient and cost-effective approach. This study aims to review the utilization of IoT for waste collection and explore technologies that promote eco-friendly waste management. The research focuses on information and communication technologies (ICTs), including spatial, identification, acquisition, and data communication technologies. Additionally, the study examines various energy harvesting technologies to further reduce costs. The findings indicate that the application of these technologies can lead to significant cost savings, energy efficiency, and ultimately reshape the future of waste management.Keywords: waste collection, IoT, smart cities, eco-friendly, information and communication technologies, energy harvesting
Procedia PDF Downloads 1112008 Critical Review of Web Content Mining Extraction Mechanisms
Authors: Rabia Bashir, Sajjad Akbar
Abstract:
There is an inevitable demand of web mining due to rapid increase of huge information on the Internet, but the striking variety of web structures has made required content retrieval a difficult task. To counter this issue, Web Content Mining (WCM) emerges as a potential candidate which extracts and integrates suitable resources of data to users. In past few years, research has been done on several extraction techniques for WCM i.e. agent-based, template-based, assumption-based, statistic-based, wrapper-based and machine learning. However, it is still unclear that either these approaches are efficiently tackling the significant challenges of WCM or not. To answer this question, this paper identifies these challenges such as language independency, structure flexibility, performance, automation, dynamicity, redundancy handling, intelligence, relevant content retrieval, and privacy. Further, mapping of these challenges is done with existing extraction mechanisms which helps to adopt the most suitable WCM approach, given some conditions and characteristics at hand.Keywords: content mining challenges, web content mining, web content extraction approaches, web information retrieval
Procedia PDF Downloads 5482007 Evaluating the Effectiveness of Electronic Response Systems in Technology-Oriented Classes
Authors: Ahmad Salman
Abstract:
Electronic Response Systems such as Kahoot, Poll Everywhere, and Google Classroom are gaining a lot of popularity when surveying audiences in events, meetings, and classroom. The reason is mainly because of the ease of use and the convenience these tools bring since they provide mobile applications with a simple user interface. In this paper, we present a case study on the effectiveness of using Electronic Response Systems on student participation and learning experience in a classroom. We use a polling application for class exercises in two different technology-oriented classes. We evaluate the effectiveness of the usage of the polling applications through statistical analysis of the students performance in these two classes and compare them to the performances of students who took the same classes without using the polling application for class participation. Our results show an increase in the performances of the students who used the Electronic Response System when compared to those who did not by an average of 11%.Keywords: Interactive Learning, Classroom Technology, Electronic Response Systems, Polling Applications, Learning Evaluation
Procedia PDF Downloads 1292006 Privacy Preserving Data Publishing Based on Sensitivity in Context of Big Data Using Hive
Authors: P. Srinivasa Rao, K. Venkatesh Sharma, G. Sadhya Devi, V. Nagesh
Abstract:
Privacy Preserving Data Publication is the main concern in present days because the data being published through the internet has been increasing day by day. This huge amount of data was named as Big Data by its size. This project deals the privacy preservation in the context of Big Data using a data warehousing solution called hive. We implemented Nearest Similarity Based Clustering (NSB) with Bottom-up generalization to achieve (v,l)-anonymity. (v,l)-Anonymity deals with the sensitivity vulnerabilities and ensures the individual privacy. We also calculate the sensitivity levels by simple comparison method using the index values, by classifying the different levels of sensitivity. The experiments were carried out on the hive environment to verify the efficiency of algorithms with Big Data. This framework also supports the execution of existing algorithms without any changes. The model in the paper outperforms than existing models.Keywords: sensitivity, sensitive level, clustering, Privacy Preserving Data Publication (PPDP), bottom-up generalization, Big Data
Procedia PDF Downloads 2952005 Decreasing of Oil Absorption in Vacuum Fried Mango Chips by Using Hydrocolloids
Authors: Nuntaporn Aukkanit
Abstract:
Objective of this study was to investigate hydrocolloids (pectin, carboxyl methylcellulose, and alginate) for their influences on the oil absorption in vacuum fried mango chips. Usage of hydrocolloids significantly (p≤0.05) affected fried mango oil uptake. Control samples (without hydrocolloids) had high fat content at 24.57g/100g whereas other samples, treated with 0.5g pectin/100ml water exhibited the highest decrease of oil absorption. Fat content of chips, treated with 0.5 g pectin /100ml was 14.01g/100g. With this concentration of pectin at 0.5 g /100ml, fat content could be reduced by 43%. Moreover, chips treated with 0.5 g pectin/100ml water had the highest sensory scores (color, appearance, crispiness and overall acceptability). These results showed that pectin was the most effective hydrocolloid for low fat vacuum fried mango chips production.Keywords: alginate, carboxyl methylcellulose, hydrocolloids, oil absorption, pectin, vacuum fried mango chips
Procedia PDF Downloads 2372004 Data Management and Analytics for Intelligent Grid
Authors: G. Julius P. Roy, Prateek Saxena, Sanjeev Singh
Abstract:
Power distribution utilities two decades ago would collect data from its customers not later than a period of at least one month. The origin of SmartGrid and AMI has subsequently increased the sampling frequency leading to 1000 to 10000 fold increase in data quantity. This increase is notable and this steered to coin the tern Big Data in utilities. Power distribution industry is one of the largest to handle huge and complex data for keeping history and also to turn the data in to significance. Majority of the utilities around the globe are adopting SmartGrid technologies as a mass implementation and are primarily focusing on strategic interdependence and synergies of the big data coming from new information sources like AMI and intelligent SCADA, there is a rising need for new models of data management and resurrected focus on analytics to dissect data into descriptive, predictive and dictatorial subsets. The goal of this paper is to is to bring load disaggregation into smart energy toolkit for commercial usage.Keywords: data management, analytics, energy data analytics, smart grid, smart utilities
Procedia PDF Downloads 7792003 Research into Factors Affecting the Attitudes of University Students towards WeChat Marketing Based on AISAS Mode
Authors: Du Zhiqin
Abstract:
WeChat is an instant messaging service similar to WhatsApp developed by Tencent, one of China's largest and most used Internet service portals. This paper investigates the penetration of WeChat among university students through a questionnaire, analyzes the effect of brand influence, information quality, interactivity, opinions of opinion-leaders, promotion, personal interests on the attitudes of university students towards WeChat marketing. This paper concludes that the penetration rate of WeChat marketing among university students is generally high enough, WeChat has generally been accepted by students as a way for businesses to market their products, and that all the above-mentioned five factors play a positive role in the process of WeChat marketing. It also proposes that businesses could maximize the effect of WeChat marketing by focusing more resources on the increase of brand influence, and the interactivity of WeChat contents and the use of opinions of opinion-leaders.Keywords: WeChat, university students, marketing, AISAS
Procedia PDF Downloads 5932002 Design Optimisation of Compound Parabolic Concentrator (CPC) for Improved Performance
Authors: R. Abd-Rahman, M. M. Isa, H. H. Goh
Abstract:
A compound parabolic concentrator (CPC) is a well known non-imaging concentrator that will concentrate the solar radiation onto receiver (PV cell). One of disadvantage of CPC is has tall and narrow height compared to its diameter entry aperture area. Therefore, for economic reason, a truncation had been done by removed from the top of the full height CPC. This is also will lead to the decreases of concentration ratio but it will be negligible. In this paper, the flux distribution of untruncated and truncated 2-D hollow compound parabolic trough concentrator (hCPTC) design is presented. The untruncated design has initial height, H=193.4mm with concentration ratio, C_(2-D)=4. This paper presents the optical simulation of compound parabolic trough concentrator using ray-tracing software TracePro. Results showed that, after the truncation, the height of CPC reduced 45% from initial height with the geometrical concentration ratio only decrease 10%. Thus, the cost of reflector and material dielectric usage can be saved especially at manufacturing site.Keywords: compound parabolic trough concentrator, optical modelling, ray-tracing analysis, improved performance
Procedia PDF Downloads 4622001 Disrupting Traditional Industries: A Scenario-Based Experiment on How Blockchain-Enabled Trust and Transparency Transform Nonprofit Organizations
Authors: Michael Mertel, Lars Friedrich, Kai-Ingo Voigt
Abstract:
Based on principle-agent theory, an information asymmetry exists in the traditional donation process. Consumers cannot comprehend whether nonprofit organizations (NPOs) use raised funds according to the designated cause after the transaction took place (hidden action). Therefore, charity organizations have tried to appear transparent and gain trust by using the same marketing instruments for decades (e.g., releasing project success reports). However, none of these measures can guarantee consumers that charities will use their donations for the purpose. With awareness of misuse of donations rising due to the Ukraine conflict (e.g., funding crime), consumers are increasingly concerned about the destination of their charitable purposes. Therefore, innovative charities like the Human Rights Foundation have started to offer donations via blockchain. Blockchain technology has the potential to establish profound trust and transparency in the donation process: Consumers can publicly track the progress of their donation at any time after deciding to donate. This ensures that the charity is not using donations against its original intent. Hence, the aim is to investigate the effect of blockchain-enabled transactions on the willingness to donate. Sample and Design: To investigate consumers' behavior, we use a scenario-based experiment. After removing participants (e.g., due to failed attention checks), 3192 potential donors participated (47.9% female, 62.4% bachelor or above). Procedure: We randomly assigned the participants to one of two scenarios. In all conditions, the participants read a scenario about a fictive charity organization called "Helper NPO." Afterward, the participants answered questions regarding their perception of the charity. Manipulation: The first scenario (n = 1405) represents a typical donation process, where consumers donate money without any option to track and trace. The second scenario (n = 1787) represents a donation process via blockchain, where consumers can track and trace their donations respectively. Using t-statistics, the findings demonstrate a positive effect of donating via blockchain on participants’ willingness to donate (mean difference = 0.667, p < .001, Cohen’s d effect size = 0.482). A mediation analysis shows significant effects for the mediation of transparency (Estimate = 0.199, p < .001), trust (Estimate = 0.144, p < .001), and transparency and trust (Estimate = 0.158, p < .001). The total effect of blockchain usage on participants’ willingness to donate (Estimate = 0.690, p < .001) consists of the direct effect (Estimate = 0.189, p < .001) and the indirect effects of transparency and trust (Estimate = 0.501, p < .001). Furthermore, consumers' affinity for technology moderates the direct effect of blockchain usage on participants' willingness to donate (Estimate = 0.150, p < .001). Donating via blockchain is a promising way for charities to engage consumers for several reasons: (1) Charities can emphasize trust and transparency in their advertising campaigns. (2) Established charities can target new customer segments by specifically engaging technology-affine consumers in the future. (3) Charities can raise international funds without previous barriers (e.g., setting up bank accounts). Nevertheless, increased transparency can also backfire (e.g., disclosure of costs). Such cases require further research.Keywords: blockchain, social sector, transparency, trust
Procedia PDF Downloads 992000 Importance of Ethics in Cloud Security
Authors: Pallavi Malhotra
Abstract:
This paper examines the importance of ethics in cloud computing. In the modern society, cloud computing is offering individuals and businesses an unlimited space for storing and processing data or information. Most of the data and information stored in the cloud by various users such as banks, doctors, architects, engineers, lawyers, consulting firms, and financial institutions among others require a high level of confidentiality and safeguard. Cloud computing offers centralized storage and processing of data, and this has immensely contributed to the growth of businesses and improved sharing of information over the internet. However, the accessibility and management of data and servers by a third party raise concerns regarding the privacy of clients’ information and the possible manipulations of the data by third parties. This document suggests the approaches various stakeholders should take to address various ethical issues involving cloud-computing services. Ethical education and training is key to all stakeholders involved in the handling of data and information stored or being processed in the cloud.Keywords: IT ethics, cloud computing technology, cloud privacy and security, ethical education
Procedia PDF Downloads 3251999 Risk Management of Water Derivatives: A New Commodity in The Market
Authors: Daniel Mokatsanyane, Johnny Jansen Van Rensburg
Abstract:
This paper is a concise introduction of the risk management on the water derivatives market. Water, a new commodity in the market, is one of the most important commodity on earth. As important to life and planet as crops, metals, and energy, none of them matters without water. This paper presents a brief overview of water as a tradable commodity via a new first of its kind futures contract on the Nasdaq Veles California Water Index (NQH2O) derivative instrument, TheGeneralised Autoregressive Conditional Heteroscedasticity (GARCH) statistical model will be the used to measure the water price volatility of the instrument and its performance since it’s been traded. describe the main products and illustrate their usage in risk management and also discuss key challenges with modeling and valuation of water as a traded commodity and finally discuss how water derivatives may be taken as an alternative asset investment class.Keywords: water derivatives, commodity market, nasdaq veles california water Index (NQH2O, water price, risk management
Procedia PDF Downloads 1361998 An Analysis of Sequential Pattern Mining on Databases Using Approximate Sequential Patterns
Authors: J. Suneetha, Vijayalaxmi
Abstract:
Sequential Pattern Mining involves applying data mining methods to large data repositories to extract usage patterns. Sequential pattern mining methodologies used to analyze the data and identify patterns. The patterns have been used to implement efficient systems can recommend on previously observed patterns, in making predictions, improve usability of systems, detecting events, and in general help in making strategic product decisions. In this paper, identified performance of approximate sequential pattern mining defines as identifying patterns approximately shared with many sequences. Approximate sequential patterns can effectively summarize and represent the databases by identifying the underlying trends in the data. Conducting an extensive and systematic performance over synthetic and real data. The results demonstrate that ApproxMAP effective and scalable in mining large sequences databases with long patterns.Keywords: multiple data, performance analysis, sequential pattern, sequence database scalability
Procedia PDF Downloads 340