Search results for: restricted user story modeling
6907 3D Geological Modeling and Engineering Geological Characterization of Shallow Subsurface Soil and Rock of Addis Ababa, Ethiopia
Authors: Biruk Wolde, Atalay Ayele, Yonatan Garkabo, Trufat Hailmariam, Zemenu Germewu
Abstract:
A comprehensive three-dimensional (3D) geological modeling and engineering geological characterization of shallow subsurface soils and rocks are essential for a wide range of geotechnical and seismological engineering applications, particularly in urban environments. The spatial distribution and geological variation of the shallow subsurface of Addis Ababa city have not been studied so far in terms of geological and geotechnical modeling. This study aims at the construction of a 3D geological model, as well as provides awareness into the engineering geological characteristics of shallow subsurface soil and rock of Addis Ababa city. The 3D geological model was constructed by using more than 1500 geotechnical boreholes, well-drilling data, and geological maps. A well-known geostatistical kriging 3D interpolation algorithm was applied to visualize the spatial distribution and geological variation of the shallow subsurface. Due to the complex nature of geological formations, vertical and lateral variation of the geological profiles horizons-solid command has been selected via the Groundwater Modelling System (GMS) graphical user interface software. For the engineering geological characterization of typical soils and rocks, both index and engineering laboratory tests have been used. The geotechnical properties of soil and rocks vary from place to place due to the uneven nature of subsurface formations observed in the study areas. The constructed model ascertains the thickness, extent, and 3D distribution of the important geological units of the city. This study is the first comprehensive research work on 3D geological modeling and subsurface characterization of soils and rocks in Addis Ababa city, and the outcomes will be important for further future research on subsurface conditions in the city. Furthermore, these findings provide a reference for developing a geo-database for the city.Keywords: 3d geological modeling, addis ababa, engineering geology, geostatistics, horizons-solid
Procedia PDF Downloads 1016906 Music and Movies: Story about a Suicide
Authors: Karen V. Lee
Abstract:
The background and significance of this study involves an autoethnographic story that shares research results about how music and movies influence the suicide of a new music teacher working in a public school. The performative narrative duet demonstrates how music and movies highlight social issues when the new teacher cannot cope with allegations surrounding professional issues. Both university advisors are drawn into deep reflection about the wider political issues that arise around the transition from the student-teacher internship process to the teaching career with the stark reality of teaching profession in the 21st century. This performance of story and music creates a transformative composition of reading, hearing, feeling while provoking visceral and emotional responses. Sometimes, young teachers are forced to take a leave of absence to reflect upon their practice with adolescents. In this extreme circumstance, the outcome was suicide. The qualitative research method involves an autoethnographic story as the author is methodologist, theoretician, and participant. Sub-themes surround film, music education and how movie resources have influenced his tragic misguided decision regarding social, emotional, physical, spiritual, and practical strategies to cope with the allegations. Major findings from this story demonstrate how lived experiences can resonate the importance of providing more education and resources to new teachers. The research provides substantive contribution, aesthetic merit, as the impact of movies and music influences the suicide. The reflexive account of storied sensory experiences situated in culture settings becomes a way to describe and seek verisimilitude by evoking lifelike and believable feelings from others. Sadly, the circumstance surrounding the story involving the allegations of a teacher sexually harassing a student is not uncommon in society. However, the young teacher never received counseling to cope with the allegations but instead was influenced by music and movies and opted for suicide. In conclusion, stories share the implications for film and media studies as music and movies can encourage a moral mission to empower individuals with despair and emotional impairment to embrace professional support to assist with emotional and legal challenges encountered in the field of teaching. It is from media studies that education and awareness surrounding suicide can disseminate information about the tragic outcome.Keywords: music, movies, suicide, narrative, autoethnography
Procedia PDF Downloads 2326905 Effective Editable Emoticon Description Schema for Mobile Applications
Authors: Jiwon Lee, Si-hwan Jang, Sanghyun Joo
Abstract:
The popularity of emoticons are on the rise since the mobile messengers are generalized. At the same time, few problems of emoticons are also occurred due to innate characteristics of emoticons. Too many emoticons make difficult people to select one which is well-suited for user's intention. On the contrary to this, sometimes user cannot find the emoticon which expresses user's exact intention. Poor information delivery of emoticon is another problem due to a major part of current emoticons are focused on emotion delivery. In this situation, we propose a new concept of emoticons, editable emoticons, to solve above drawbacks of emoticons. User can edit the components inside the proposed editable emoticon and send it to express his exact intention. By doing so, the number of editable emoticons can be maintained reasonable, and it can express user's exact intention. Further, editable emoticons can be used as information deliverer according to user's intention and editing skills. In this paper, we propose the concept of editable emoticons and schema based editable emoticon description method. The proposed description method is 200 times superior to the compared screen capturing method in the view of transmission bandwidth. Further, the description method is designed to have compatibility since it follows MPEG-UD international standard. The proposed editable emoticons can be exploited not only mobile applications, but also various fields such as education and medical field.Keywords: description schema, editable emoticon, emoticon transmission, mobile applications
Procedia PDF Downloads 2976904 An Application of Meta-Modeling Methods for Surrogating Lateral Dynamics Simulation in Layout-Optimization for Electric Drivetrains
Authors: Christian Angerer, Markus Lienkamp
Abstract:
Electric vehicles offer a high variety of possible drivetrain topologies with up to 4 motors. Multi-motor-designs can have several advantages regarding traction, vehicle dynamics, safety and even efficiency. With a rising number of motors, the whole drivetrain becomes more complex. All permutations of gearings, drivetrain-layouts, motor-types and –sizes lead up in a very large solution space. Single elements of this solution space can be analyzed by simulation methods. In addition to longitudinal vehicle behavior, which most optimization-approaches are restricted to, also lateral dynamics are important for vehicle dynamics, stability and efficiency. In order to compete large solution spaces and to find an optimal result, genetic algorithm based optimization is state-of-the-art. As lateral dynamics simulation is way more CPU-intensive, optimization takes much more time than in case of longitudinal-only simulation. Therefore, this paper shows an approach how to create meta-models from a 14-degree of freedom vehicle model in order to enable a numerically efficient drivetrain-layout optimization process under consideration of lateral dynamics. Different meta-modelling approaches such as neural networks or DoE are implemented and comparatively discussed.Keywords: driving dynamics, drivetrain layout, genetic optimization, meta-modeling, lateral dynamicx
Procedia PDF Downloads 4186903 Tsada-MobiMinder: A Location Based Alarm Mobile Reminder
Authors: Marylene S. Eder
Abstract:
Existing location based alarm applications has inability to give information to user’s particular direction to a specified place of destination and does not display a particular scenic spot from its current location going to the destination. With this problem, a location based alarm mobile reminder was developed. The application is implemented on Android based smart phones to provide services like providing routing information, helping to find nearby hotels, restaurants and scenic spots and offer many advantages to the mobile users to retrieve the information about their current location and process that data to get more useful information near to their location. It reminds the user about the location when the user enters some predefined location. All the user needs to have is the mobile phone with android platform with version 4.0 and above, and then the user can select the destination and find the destination on the application. The main objective of the project is to develop a location based application that provides tourists with real time information for scenic spots and provides alarm to a specified place of destination. This mobile application service will act as assistance for the frequent travelers to visit new places around the City.Keywords: location based alarm, mobile application, mobile reminder, tourist’s spots
Procedia PDF Downloads 3826902 Interactive and Innovative Environments for Modeling Digital Educational Games and Animations
Authors: Ida Srdić, Luka Mandić, LidijaMandić
Abstract:
Digitization and intensive use of tablets, smartphones, the internet, mobile, and web applications have massively disrupted our habits, and the way audiences (especially youth) consume content. To introduce educational content in games and animations, and at the same time to keep it interesting and compelling for kids, is a challenge. In our work, we are comparing the different possibilities and potentials that digital games could provide to successfully mitigate direct connection with education. We analyze the main directions and educational methods in game-based learning and the possibilities of interactive modeling through questionnaires for user experience and requirements. A pre and post-quantitative survey will be conducted in order to measure levels of objective knowledge as well as the games perception. This approach enables quantitative and objective evaluation of the impact the game has on participants. Also, we will discuss the main barriers to the use of games in education and how games can be best used for learning.Keywords: Bloom’s taxonomy, epistemic games, learning objectives, virtual learning environments
Procedia PDF Downloads 1006901 Modeling User Departure Time Choice for Work Trips in High Traffic Suburban Roads
Authors: Saeed Sayyad Hagh Shomar
Abstract:
Modeling users’ decisions on departure time choice is the main motivation for this research. In particular, it examines the impact of social-demographic features, household, job characteristics and trip qualities on individuals’ departure time choice. Departure time alternatives are presented as adjacent discrete time periods. The choice between these alternatives is done using a discrete choice model. Since a great deal of early morning trips and traffic congestion at that time of the day comprise work trips, the focus of this study is on the work trip over the entire day. Therefore, this study by using the users’ stated preference in questionnaire models users’ departure time choice affected by congestion pricing schemes in high traffic suburban entrance roads of Tehran. The results demonstrate efficient social-demographic impact on work trips’ departure time. These findings have substantial outcomes for the analysis of transportation planning. Particularly, the analysis shows that ignoring the effects of these variables could result in erroneous information and consequently decisions in the field of transportation planning and air quality would fail and cause financial resources loss.Keywords: congestion pricing, departure time, modeling, travel timing, time of the day, transportation planning
Procedia PDF Downloads 2986900 Improved Performance of Cooperative Scheme in the Cellular and Broadcasting System
Authors: Hyun-Jee Yang, Bit-Na Kwon, Yong-Jun Kim, Hyoung-Kyu Song
Abstract:
In the cooperative transmission scheme, both the cellular system and broadcasting system are composed. Two cellular base stations (CBSs) communicating with a user in the cell edge use cooperative transmission scheme in the conventional scheme. In the case that the distance between two CBSs and the user is distant, the conventional scheme does not guarantee the quality of the communication because the channel condition is bad. Therefore, if the distance between CBSs and a user is distant, the performance of the conventional scheme is decreased. Also, the bad channel condition has bad effects on the performance. The proposed scheme uses two relays to communicate well with CBSs when the channel condition between CBSs and the user is poor. Using the relay in the high attenuation environment can obtain both advantages of the high bit error rate (BER) and throughput performance.Keywords: cooperative communications, diversity gain, OFDM, interworking system
Procedia PDF Downloads 5776899 Privacy Label: An Alternative Approach to Present Privacy Policies from Online Services to the User
Authors: Diego Roberto Goncalves De Pontes, Sergio Donizetti Zorzo
Abstract:
Studies show that most users do not read privacy policies from the online services they use. Some authors claim that one of the main causes of this is that policies are long and usually hard to understand, which make users lose interest in reading them. In this scenario, users may agree with terms without knowing what kind of data is being collected and why. Given that, we aimed to develop a model that would present the privacy policies contents in an easy and graphical way for the user to understand. We call it the Privacy Label. Using information recovery techniques, we propose an architecture that is able to extract information about what kind of data is being collected and to what end in the policies and show it to the user in an automated way. To assess our model, we calculated the precision, recall and f-measure metrics on the information extracted by our technique. The results for each metric were 68.53%, 85.61% e 76,13%, respectively, making it possible for the final user to understand which data was being collected without reading the whole policy. Also, our proposal can facilitate the notice-and-choice by presenting privacy policy information in an alternative way for online users.Keywords: privacy, policies, user behavior, computer human interaction
Procedia PDF Downloads 3086898 A Study of the Effect of Early and Late Meal Time on Anthropometric and Biochemical Parameters in Patients of Type 2 Diabetes
Authors: Smriti Rastogi, Narsingh Verma
Abstract:
Background: A vast body of research exists on the use of oral hypoglycaemic drugs, insulin injections and the like in managing diabetes but no such research exists that has taken into consideration the parameter of time restricted meal intake and its positive effects in managing diabetes. The utility of this project is immense as it offers a solution to the woes of diabetics based on circadian rhythm and normal physiology of the human body. Method: 80 Diabetics, enrolled from the Out Patient Department of Endocrinology, KGMU (King George's Medical University) were randomly divided based on consent to early dinner TRM(time restricted meal) group or not (control group). Follow up was done at six months and 12 months for anthropometric measurement, height, weight, waist-hip ratio, neck size, fasting, postprandial blood sugar, HbA1c, serum urea, serum creatinine, and lipid profile. The patient was given a clear understanding of chronomedicine and how it affects their health. A single intervention was done - the timing of dinner was at or around 7 pm for TRM group. Result: 65% of TRM group and 40 %(non- TRM) had normal HbA1c after 12 months. HbA1c in TRM Group (first visit to second follow up) had a significant p value=0.017. A p value of <0.0001 was observed on comparing the values of blood sugar (fasting) in TRM Group from the first visit and second follow up. The values of blood sugar (postprandial) in TRM Group (first visit and second follow up) showed a p-value <0.0001 (highly significant). Values of the three parameters were non- significant in the control group. Hip size(First Visit to Second Follow Up) TRM Group showed a p-value = 0.0344 (Significant) (Difference between means=2.762 ± 1.261)Detailed results of the above parameters and a few newer ones will be presented at the conference. Conclusion: Time restricted meal intake in diabetics shows promise and is worth exploring further. Time Restricted Meal intake in Type 2 diabetics has a significant effect in controlling and maintaining HbA1c as the reduction in HbA1c value was very significant in the TRM group vs. the control group. Similar highly significant results were obtained in the case of fasting and postprandial values of blood sugar in the TRM group when compared to the control group. The effects of time restricted meal intake in diabetics show promise and are worth exploring further. It is one of the first studies which have been undertaken in Indian diabetics, although the initial data obtained is encouraging yet further research and study are required to corroborate results.Keywords: chronomedicine, diabetes, endocrinology, time restricted meal intake
Procedia PDF Downloads 1266897 Evaluating Service Trustworthiness for Service Selection in Cloud Environment
Authors: Maryam Amiri, Leyli Mohammad-Khanli
Abstract:
Cloud computing is becoming increasingly popular and more business applications are moving to cloud. In this regard, services that provide similar functional properties are increasing. So, the ability to select a service with the best non-functional properties, corresponding to the user preference, is necessary for the user. This paper presents an Evaluation Framework of Service Trustworthiness (EFST) that evaluates the trustworthiness of equivalent services without need to additional invocations of them. EFST extracts user preference automatically. Then, it assesses trustworthiness of services in two dimensions of qualitative and quantitative metrics based on the experiences of past usage of services. Finally, EFST determines the overall trustworthiness of services using Fuzzy Inference System (FIS). The results of experiments and simulations show that EFST is able to predict the missing values of Quality of Service (QoS) better than other competing approaches. Also, it propels users to select the most appropriate services.Keywords: user preference, cloud service, trustworthiness, QoS metrics, prediction
Procedia PDF Downloads 2886896 Journey to the East: The Story of Ghanaian Migrants in Guangzhou, China
Authors: Mark Kwaku Mensah Obeng
Abstract:
In the late 1990s and early 2000s, nationals of sub-Saharan Africa who had initially settled in the Middle East and other parts of south east Asia moved to Guangzhou in response to the 1997/8 Asian financial crisis in numbers never witnessed. They were later joined by many more as the Chinese economy improved and as the economic relationship between China and Africa improved. This paper tells the story of identifiable sets of Ghanaians in Guangzhou, China in the 21st century. It details out their respective characteristics and their activities in China, their migratory trajectories and the motivations for travelling to China. Also analyzed is how they are coping with life in the unknown destination. It finally attempt predicting the future of the Ghanaian community in China in terms of their level of community participation and integration.Keywords: Africa in China, Ghana, motivation, Guangzhou
Procedia PDF Downloads 4496895 The Challenges of Implementing Building Information Modeling in Small-Medium Enterprises Architecture Firms in Indonesia
Authors: Furry A. Wilis, Dewi Larasati, Suhendri
Abstract:
Around 96% of architecture firms in Indonesia are classified as small-medium enterprises (SME). This number shows that the SME firms have an important role in architecture, engineering, and construction (AEC) industry in Indonesia. Some of them are still using conventional system (2D based) in arranging construction project documents. This system is fragmented and not fully well-coordinated, so causes many changes in the whole project cycle. Building information modeling (BIM), as a new developed system in Indonesian construction industry, has been assumed can decrease changes in the project. But BIM has not fully implemented in Indonesian AEC industry, especially in SME architecture firms. This article identifies the challenges of implementing BIM in SME architecture firms in Indonesia. Quantitative-explorative research with questionnaire was chosen to achieve the goal of this article. The scarcity of skilled BIM user, low demand from client, high investment cost, and the unwillingness of the firm to switch into BIM were found as the result of this paper.Keywords: architecture consultants, BIM, SME, Indonesia
Procedia PDF Downloads 3436894 Enhancing English Language Skills Integratively through Short Stories
Authors: Dinesh Kumar Yadav
Abstract:
Short stories for language development are deeply rooted elsewhere in any language syllabus. Its relevance is manifold. The short stories have the power to take the students to the target culture directly from the classroom. It works as a crucial factor in enhancing language skills in different ways. This article is an outcome of an experimental study conducted for a month on the 12th graders where they were engaged in different creative and critical-thinking activities along with various tasks that ranged from knowledge level to application level. The sole purpose was to build up their confidence in speaking in the classroom as well as develop all their language skills simultaneously. With the start of the class in August 2021, the students' speaking skill and their confidence in speaking in the class was tested. The test was abruptly followed by a presentation of a short story from their culture. The students were engaged in different tasks related to the story. The PowerPoint slides, handouts with the story, and tasks on photocopy were used as tools whenever needed. A one-month class exclusively on speaking skills through sharing stories was found to be very helpful in developing confidence in the learners. The result was very satisfactory. A large number of students became responsive in the class. The proficiency level was not satisfactory; however, their effort to speak in class showed a very positive sign in language development.Keywords: short stories, relevance, language enhancement, language proficiency
Procedia PDF Downloads 946893 Unlocking E-commerce: Analyzing User Behavior and Segmenting Customers for Strategic Insights
Authors: Aditya Patil, Arun Patil, Vaishali Patil, Sudhir Chitnis, Anjum Patel
Abstract:
Rapid growth has given e-commerce platforms a lot of client behavior and spending data. To maximize their strategy, businesses must understand how customers utilize online shopping platforms and what influences their purchases. Our research focuses on e-commerce user behavior and purchasing trends. This extensive study examines spending and user behavior. Regression and grouping disclose relevant data from the dataset. We can understand user spending trends via multilevel regression. We can analyze how pricing, user demographics, and product categories affect customer purchase decisions with this technique. Clustering groups consumers by spending. Important information was found. Purchase habits vary by user group. Our analysis illuminates the complex world of e-commerce consumer behavior and purchase trends. Understanding user behavior helps create effective e-commerce marketing strategies. This market can benefit from K-means clustering. This study focuses on tailoring strategies to user groups and improving product and price effectiveness. Customer buying behaviors across categories were shown via K-means clusters. Average spending is highest in Cluster 4 and lowest in Cluster 3. Clothing is less popular than gadgets and appliances around the holidays. Cluster spending distribution is examined using average variables. Our research enhances e-commerce analytics. Companies can improve customer service and decision-making with this data.Keywords: e-commerce, regression, clustering, k-means
Procedia PDF Downloads 236892 User-Driven Product Line Engineering for Assembling Large Families of Software
Authors: Zhaopeng Xuan, Yuan Bian, C. Cailleaux, Jing Qin, S. Traore
Abstract:
Traditional software engineering allows engineers to propose to their clients multiple specialized software distributions assembled from a shared set of software assets. The management of these assets however requires a trade-off between client satisfaction and software engineering process. Clients have more and more difficult to find a distribution or components based on their needs from all of distributed repositories. This paper proposes a software engineering for a user-driven software product line in which engineers define a feature model but users drive the actual software distribution on demand. This approach makes the user become final actor as a release manager in software engineering process, increasing user product satisfaction and simplifying user operations to find required components. In addition, it provides a way for engineers to manage and assembly large software families. As a proof of concept, a user-driven software product line is implemented for eclipse, an integrated development environment. An eclipse feature model is defined, which is exposed to users on a cloud-based built platform from which clients can download individualized Eclipse distributions.Keywords: software product line, model-driven development, reverse engineering and refactoring, agile method
Procedia PDF Downloads 4336891 Data Mining to Capture User-Experience: A Case Study in Notebook Product Appearance Design
Authors: Rhoann Kerh, Chen-Fu Chien, Kuo-Yi Lin
Abstract:
In the era of rapidly increasing notebook market, consumer electronics manufacturers are facing a highly dynamic and competitive environment. In particular, the product appearance is the first part for user to distinguish the product from the product of other brands. Notebook product should differ in its appearance to engage users and contribute to the user experience (UX). The UX evaluates various product concepts to find the design for user needs; in addition, help the designer to further understand the product appearance preference of different market segment. However, few studies have been done for exploring the relationship between consumer background and the reaction of product appearance. This study aims to propose a data mining framework to capture the user’s information and the important relation between product appearance factors. The proposed framework consists of problem definition and structuring, data preparation, rules generation, and results evaluation and interpretation. An empirical study has been done in Taiwan that recruited 168 subjects from different background to experience the appearance performance of 11 different portable computers. The results assist the designers to develop product strategies based on the characteristics of consumers and the product concept that related to the UX, which help to launch the products to the right customers and increase the market shares. The results have shown the practical feasibility of the proposed framework.Keywords: consumers decision making, product design, rough set theory, user experience
Procedia PDF Downloads 3146890 An Investigation of the Relationship Between Privacy Crisis, Public Discourse on Privacy, and Key Performance Indicators at Facebook (2004–2021)
Authors: Prajwal Eachempati, Laurent Muzellec, Ashish Kumar Jha
Abstract:
We use Facebook as a case study to investigate the complex relationship between the firm’s public discourse (and actions) surrounding data privacy and the performance of a business model based on monetizing user’s data. We do so by looking at the evolution of public discourse over time (2004–2021) and relate topics to revenue and stock market evolution Drawing from archival sources like Zuckerberg We use LDA topic modelling algorithm to reveal 19 topics regrouped in 6 major themes. We first show how, by using persuasive and convincing language that promises better protection of consumer data usage, but also emphasizes greater user control over their own data, the privacy issue is being reframed as one of greater user control and responsibility. Second, we aim to understand and put a value on the extent to which privacy disclosures have a potential impact on the financial performance of social media firms. There we found significant relationship between the topics pertaining to privacy and social media/technology, sentiment score and stock market prices. Revenue is found to be impacted by topics pertaining to politics and new product and service innovations while number of active users is not impacted by the topics unless moderated by external control variables like Return on Assets and Brand Equity.Keywords: public discourses, data protection, social media, privacy, topic modeling, business models, financial performance
Procedia PDF Downloads 936889 Musicals in Film Adaptation in Bollywood with Special Reference to Basu Bhattacharya's Film Teesari Kasam
Authors: Gokul G. Kshirsagar
Abstract:
Native folk theatre and folk songs have a significant influence on the origin and development of Indian cinema. Therefore, the presence of songs and music has been an integral part and special characteristics of Indian cinema which is popularly known as Bollywood. An Indian cinema without songs, either in Hindi or other regional languages, is simply unimaginable. The present paper, in the first part, attempts to explain the use and need of musical songs and also the psychology of Indian audience in this respect with reference to some of the films which give primary importance to songs. In the second part, the paper tries to situate the present study in the context by referring to the Hindi language drama film Teesari Kasam directed by Basu Bhattacharys. The film is based on the Hindi novelist Phanishwarnath Renu’s short story Teesari Kasam (Mare Gaye Gulfam) in this adapted film, the director has made use of eight songs, but these songs are the extensive versions of the songs as used in the original story. Thus, the main aim of the paper is to underscore the fact that through artistic use of the musical, the director has succeeded in transforming the central feelings conveyed in the original story. Eventually, through the present study of the film adaptation, the relevance of songs in films will be illustrated and understood.Keywords: Bollywood, folk theatre, folk songs, film adaptation
Procedia PDF Downloads 2226888 The Impact of Brand-Related User-Generated Content on Brand Positioning: A Study on Private Higher Education Institutes in Vietnam
Authors: Charitha Harshani Perera, Rajkishore Nayak, Long Thang Van Nguyen
Abstract:
With the advent of social media, Vietnam has changed the way customers perceive the information about the brand. In the context of higher education, the adoption of social media has received attention with the increasing rate of social media usage among undergraduates. Brand-related user-generated content (UGC) on social media emphasizes the social ties between users and users’ participation, which promotes the communication to build and maintain the relationship with the brands. Although brand positioning offers a significant competitive advantage, the association with brand-related user-generated content in social media with brand positioning in the context of higher education is still an under-researched area. Accordingly, using social identity theory and social exchange theory, this research aims to deepen our understanding of the influence of brand-related user-generated content on brand positioning and purchase intention. Employing a quantitative survey design,384 Vietnamese undergraduates were selected based on purposive sampling. The findings suggest that brand-related user-generated content influence brand positioning and brand choice intention. However, there is a significant mediating effect of the reliability and understandability of the content.Keywords: brand positioning, brand-related user-generated content, emerging countries, higher education
Procedia PDF Downloads 1786887 User’s Susceptibility Factors to Malware Attacks: A Systematic Literature Review
Authors: Awad A. Younis, Elise Stronberg, Shifa Noor
Abstract:
Malware attacks due to end-user vulnerabilities have been noticeably increased in the past few years. Investigating the factors that make an end-user vulnerable to those attacks is critical because they can be utilized to set up proactive strategies such as awareness and education to mitigate the impacts of those attacks. Some existing studies investigated demographic, behavioral, and cultural factors that make an end-user susceptible to malware attacks. However, it has been challenging to draw more general conclusions from individual studies due to the varieties in the type of end-users and different types of malware. Therefore, we conducted a systematic literature review (SLR) of the existing research for end-user susceptibility factors to malware attacks. The results showed while some demographic factors are mostly associated with malware infection regardless of the end users' type, age, and gender are not consistent among the same and different types of end-users. Besides, the association of culture and personality factors with malware infection are consistent in most of the selected studies and for all type of end-users. Moreover, malware infection varies based on age, geographic location, and host types. We propose that future studies should carefully take into consideration the type of end-users because different end users may be exposed to different threats or be targeted based on their user domains’ characteristics. Additionally, as different types of malware use different tactics to trick end-users, taking the malware types into consideration is important.Keywords: cybersecurity, malware, end-users, demographics, personality, culture, systematic literature review
Procedia PDF Downloads 2316886 Impact of Task Technology Fit on User Effectiveness, Efficiency and Creativity in Iranian Pharmaceutical Oraganizations
Authors: Milad Keshvardoost, Amir Khanlari, Nader Khalesi
Abstract:
Background: Any firm in the pharmaceutical industry requires efficient and effective management information systems (MIS) to support managerial functions. Purpose: The aim of this study is to investigate the impact of Task-Technology Fit on user effectiveness, efficiency, and creativity in Iranian pharmaceutical companies. Methodology: 345 reliable and validate questionnaires were distributed among selected samples, through the cluster method, to Information system users of eight leading Iranian pharmaceutical companies, based on the likert scale. The proposed model of the article is based on a model with Task technology fit, on user performance with the definition of efficiency, effectiveness, and creativity through mediation effects of perceived usefulness and ease of use. Results: This study confirmed that TTF with definitions of adequacy and compatibility has positive impacts on user performance Conclusion: We concluded that pharmaceutical users of IS, utilizing a system with a precise and intense observation of users' demands, may make facilitation for them to design an exclusive IS framework.Keywords: information systems, user performance, pharmaceuticals, task technology fit
Procedia PDF Downloads 1746885 Story of Sexual Violence: Curriculum as Intervention
Authors: Karen V. Lee
Abstract:
The background and significance of this study involves autoethnographic research about a music teacher learning how education and curriculum planning can help her overcome harmful and lasting career consequences from sexual violence. Curriculum surrounding intervention resources from education helps her cope with consequences influencing her career as music teacher. Basic methodology involves the qualitative method of research as theoretical framework where the author is drawn into a deep storied reflection about political issues surrounding teachers who need to overcome social, psychological, and health risk behaviors from violence. Sub-themes involve counseling, curriculum, adult education to ensure teachers receive social, emotional, physical, spiritual, and intervention resources that evoke visceral, emotional responses from the audience. Major findings share how stories provide helpful resources to teachers who have been victims of violence. It is hoped the research dramatizes an episodic yet incomplete story that highlights the circumstances surrounding the protagonist’s life as teacher with previous sexual violence. In conclusion, the research has a reflexive storied framework with video and music from curriculum planning that embraces harmful and lasting consequences from sexual violence. The reflexive story of the sensory experience critically seeks verisimilitude by evoking lifelike and believable feelings from others. Thus, the scholarly importance of using education and curriculum as intervention resources to accompany storied research can provide transformative aspects that can contribute to social change. Overall, the circumstance surrounding the story about sexual violence is not uncommon in society. Thus, continued education and curriculum that supports the moral mission to help teachers overcome sexual violence that socially impacts their professional lives as victims.Keywords: education, curriculum, sexual violence, storied autoethnography
Procedia PDF Downloads 2616884 Methodologies, Systems Development Life Cycle and Modeling Languages in Agile Software Development
Authors: I. D. Arroyo
Abstract:
This article seeks to integrate different concepts from contemporary software engineering with an agile development approach. We seek to clarify some definitions and uses, we make a difference between the Systems Development Life Cycle (SDLC) and the methodologies, we differentiate the types of frameworks such as methodological, philosophical and behavioral, standards and documentation. We define relationships based on the documentation of the development process through formal and ad hoc models, and we define the usefulness of using DevOps and Agile Modeling as integrative methodologies of principles and best practices.Keywords: methodologies, modeling languages, agile modeling, UML
Procedia PDF Downloads 1876883 Electricity Demand Modeling and Forecasting in Singapore
Authors: Xian Li, Qing-Guo Wang, Jiangshuai Huang, Jidong Liu, Ming Yu, Tan Kok Poh
Abstract:
In power industry, accurate electricity demand forecasting for a certain leading time is important for system operation and control, etc. In this paper, we investigate the modeling and forecasting of Singapore’s electricity demand. Several standard models, such as HWT exponential smoothing model, the ARMA model and the ANNs model have been proposed based on historical demand data. We applied them to Singapore electricity market and proposed three refinements based on simulation to improve the modeling accuracy. Compared with existing models, our refined model can produce better forecasting accuracy. It is demonstrated in the simulation that by adding forecasting error into the forecasting equation, the modeling accuracy could be improved greatly.Keywords: power industry, electricity demand, modeling, forecasting
Procedia PDF Downloads 6416882 Platform-as-a-Service Sticky Policies for Privacy Classification in the Cloud
Authors: Maha Shamseddine, Amjad Nusayr, Wassim Itani
Abstract:
In this paper, we present a Platform-as-a-Service (PaaS) model for controlling the privacy enforcement mechanisms applied on user data when stored and processed in Cloud data centers. The proposed architecture consists of establishing user configurable ‘sticky’ policies on the Graphical User Interface (GUI) data-bound components during the application development phase to specify the details of privacy enforcement on the contents of these components. Various privacy classification classes on the data components are formally defined to give the user full control on the degree and scope of privacy enforcement including the type of execution containers to process the data in the Cloud. This not only enhances the privacy-awareness of the developed Cloud services, but also results in major savings in performance and energy efficiency due to the fact that the privacy mechanisms are solely applied on sensitive data units and not on all the user content. The proposed design is implemented in a real PaaS cloud computing environment on the Microsoft Azure platform.Keywords: privacy enforcement, platform-as-a-service privacy awareness, cloud computing privacy
Procedia PDF Downloads 2276881 Narrative Study to Resilience and Adversity's Response
Authors: Yun Hang Stanley Cheung
Abstract:
In recent years, many educators and entrepreneurs have often suggested that students’ and workers’ ability of the adversity response is very important, it would affect problem-solving strategies and ultimate success in their career or life. The meaning of resilience is discussed as the process of bouncing back and the ability to adapt well in adversity’s response, being resilient does not mean to live without any stress and difficulty, but to grow and thrive under pressure. The purpose of this study is to describe the process of resilience and adversity’s response. The use of the narrative inquiry aims for understanding the experiential process of adversity response, and the problem-solving strategies (such as emotion control, motivation, decisions making process), as well as making the experience become life story, which may be evaluated by its teller and its listeners. The narrative study describes the researcher’s self-experience of adversity’s response to the recovery of the seriously burnt injury from a hill fire at his 12 years old, as well as the adversities and obstacles related to the tragedy after the physical recovery. Sense-Making Theory and McCormack’s Lenses were used for constructive perspective and data analyzing. To conclude, this study has described the life story of fighting the adversities, also, those narratives come out some suggestions, which point out positive thinking is necessary to build up resilience and the ability of immediate adversity response. Also, some problem-solving strategies toward adversities are discussed, which are helpful for resilience education for youth and young adult.Keywords: adversity response, life story, narrative inquiry, resilience
Procedia PDF Downloads 3146880 Regained Oral Tradition and Identity Construction in House Made of Dawn
Authors: Yi Hu
Abstract:
House Made of Dawn is famous novelist N. Scott Momaday’s Pulitzer-winning novel in 1968. The novel tells a story of the struggling life of an Indian named Abel, following the pattern of leaving home, coming home, leaving again, and returning home at the closure of the story. It touches upon the theme of the relationship between Indianness, identity, and tradition. Abel’s confusion over his identity and his constant struggle and exploration of his identity are pivoted on the tradition of oral literature in the form of story-telling. Therefore, this paper aims to analyze the important role of oral tradition in constructing Abel’s Indian cultural identity. The significance of the research lies in two aspects: first of all, the research aims to provide an enlightening perspective for Momaday’s House Made of Dawn in order to gain a better understanding of the novel. Secondly, by emphasizing the importance of traditional culture in identity construction, the research hopes to provide some referential value for people who suffer from identity predicament in modern society. Finally, the paper draws a conclusion that alienation from traditional tribal culture will result in a serious physical and psychological crisis for Indian people. Indian people should adhere to their traditional culture in order to construct their unique cultural identity.Keywords: House Made of Dawn, identity, N.Scott.Momaday, oral tradition
Procedia PDF Downloads 2266879 Modeling Curriculum for High School Students to Learn about Electric Circuits
Authors: Meng-Fei Cheng, Wei-Lun Chen, Han-Chang Ma, Chi-Che Tsai
Abstract:
Recent K–12 Taiwan Science Education Curriculum Guideline emphasize the essential role of modeling curriculum in science learning; however, few modeling curricula have been designed and adopted in current science teaching. Therefore, this study aims to develop modeling curriculum on electric circuits to investigate any learning difficulties students have with modeling curriculum and further enhance modeling teaching. This study was conducted with 44 10th-grade students in Central Taiwan. Data collection included a students’ understanding of models in science (SUMS) survey that explored the students' epistemology of scientific models and modeling and a complex circuit problem to investigate the students’ modeling abilities. Data analysis included the following: (1) Paired sample t-tests were used to examine the improvement of students’ modeling abilities and conceptual understanding before and after the curriculum was taught. (2) Paired sample t-tests were also utilized to determine the students’ modeling abilities before and after the modeling activities, and a Pearson correlation was used to understand the relationship between students’ modeling abilities during the activities and on the posttest. (3) ANOVA analysis was used during different stages of the modeling curriculum to investigate the differences between the students’ who developed microscopic models and macroscopic models after the modeling curriculum was taught. (4) Independent sample t-tests were employed to determine whether the students who changed their models had significantly different understandings of scientific models than the students who did not change their models. The results revealed the following: (1) After the modeling curriculum was taught, the students had made significant progress in both their understanding of the science concept and their modeling abilities. In terms of science concepts, this modeling curriculum helped the students overcome the misconception that electric currents reduce after flowing through light bulbs. In terms of modeling abilities, this modeling curriculum helped students employ macroscopic or microscopic models to explain their observed phenomena. (2) Encouraging the students to explain scientific phenomena in different context prompts during the modeling process allowed them to convert their models to microscopic models, but it did not help them continuously employ microscopic models throughout the whole curriculum. The students finally consistently employed microscopic models when they had help visualizing the microscopic models. (3) During the modeling process, the students who revised their own models better understood that models can be changed than the students who did not revise their own models. Also, the students who revised their models to explain different scientific phenomena tended to regard models as explanatory tools. In short, this study explored different strategies to facilitate students’ modeling processes as well as their difficulties with the modeling process. The findings can be used to design and teach modeling curricula and help students enhance their modeling abilities.Keywords: electric circuits, modeling curriculum, science learning, scientific model
Procedia PDF Downloads 4606878 Replacement Time and Number of Preventive Maintenance Actions for Second-Hand Device
Authors: Wen Liang Chang
Abstract:
In this study, the optimal replacement time and number of preventive maintenance (PM) actions were investigated for a second-hand device. Suppose that a user intends to use a second-hand device for manufacturing products, and that the device is replaced with a new one. Any device failure is rectified through minimal repair, thereby incurring a fixed repair cost to the user. If the new device fails within the FRW period, minimal repair is performed at no cost to the user. After the FRW expires, a failed device is repaired and the cost of repair is incurred by the user. In this study, two profit models were developed, and the optimal replacement time and number of PM actions were determined to maximize profits. Finally, the influence of the optimal replacement time and number of PM actions were elaborated on, using numerical examples.Keywords: second-hand device, preventive maintenance, replacement time, device failure
Procedia PDF Downloads 469