Search results for: service user
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5614

Search results for: service user

3004 The Importance of Applying Established Web Site Design Principles on an Online Performance Management System

Authors: R. W. Brown, P. J. Blignaut

Abstract:

An online performance management system was evaluated, and recommendations were made to improve the system. The study shows the effects of not adhering to the established web design principles and conventions. Furthermore, the study indicates that if the online performance management system is not well designed, it may have negative effects on the overall usability of the system and these negative effects will have consequences for both the employer and employees. The evaluation was done in terms of the usability metrics of effectiveness, efficiency and user satisfaction. Effectiveness was measured in terms of the success rate with which users could execute prescribed tasks in a sandbox system. Efficiency was expressed in terms of the time it took participants to understand what is expected of them and to execute the tasks. Post-test questionnaires were used in order to determine the satisfaction of the participants. Recommendations were made to improve the usability of the online performance management system.

Keywords: eye tracking, human resource management, performance management, usability

Procedia PDF Downloads 208
3003 Students’ Perceptions on Educational Game for Learning Programming Subject: A Case Study

Authors: Roslina Ibrahim, Azizah Jaafar, Khalili Khalil

Abstract:

Educational games (EG) are regarded as a promising teaching and learning tool for the new generation. Growing number of studies and literatures can be found in EG studies. Both academic researchers and commercial developers come out with various educational games prototypes and titles. Despite that, acceptance of educational games still lacks among the students. It is important to understanding students’ perceptions of EG, since they are the main stakeholder of the technology. Thus, this study seeks to understand perceptions of undergraduates’ students using a framework originated from user acceptance theory. The framework consists of six constructs with twenty-eight items. Data collection was done on 180 undergraduate students of Universiti Teknologi Malaysia, Kuala Lumpur using self-developed online EG called ROBO-C. Data analysis was done using descriptive, factor analysis and correlations. Performance expectancy, effort expectancy, attitude, and enjoyment factors were found significantly correlated with the intention to use EG. This study provides more understanding towards the use of educational games among students.

Keywords: educational games, perceptions, acceptance, UTAUT

Procedia PDF Downloads 417
3002 Considering Cultural and Linguistic Variables When Working as a Speech-Language Pathologist with Multicultural Students

Authors: Gabriela Smeckova

Abstract:

The entire world is becoming more and more diverse. The reasons why people migrate are different and unique for each family /individual. Professionals delivering services (including speech-language pathologists) must be prepared to work with clients coming from different cultural and/or linguistic backgrounds. Well-educated speech-language pathologists will consider many factors when delivering services. Some of them will be discussed during the presentation (language spoken, beliefs about health care and disabilities, reasons for immigration, etc.). The communication styles of the client can be different than the styles of the speech-language pathologist. The goal is to become culturally responsive in service delivery.

Keywords: culture, cultural competence, culturallly responsive practices, speech-language pathologist, cultural and linguistical variables, communication styles

Procedia PDF Downloads 82
3001 BER Analysis of Energy Detection Spectrum Sensing in Cognitive Radio Using GNU Radio

Authors: B. Siva Kumar Reddy, B. Lakshmi

Abstract:

Cognitive Radio is a turning out technology that empowers viable usage of the spectrum. Energy Detector-based Sensing is the most broadly utilized spectrum sensing strategy. Besides, it is a lot of generic as receivers does not like any information on the primary user's signals, channel data, of even the sort of modulation. This paper puts forth the execution of energy detection sensing for AM (Amplitude Modulated) signal at 710 KHz, FM (Frequency Modulated) signal at 103.45 MHz (local station frequency), Wi-Fi signal at 2.4 GHz and WiMAX signals at 6 GHz. The OFDM/OFDMA based WiMAX physical layer with convolutional channel coding is actualized utilizing USRP N210 (Universal Software Radio Peripheral) and GNU Radio based Software Defined Radio (SDR). Test outcomes demonstrated the BER (Bit Error Rate) augmentation with channel noise and BER execution is dissected for different Eb/N0 (the energy per bit to noise power spectral density ratio) values.

Keywords: BER, Cognitive Radio, GNU Radio, OFDM, SDR, WiMAX

Procedia PDF Downloads 506
3000 Simplified Mobile AR Platform Design for Augmented Tourism

Authors: Eric Hawkinson, Edgaras Artemciukas

Abstract:

This study outlines iterations of designing mobile augmented reality (MAR) applications for tourism specific contexts. Using a design based research model, several cycles of development to implementation were analyzed and refined upon with the goal of building a MAR platform that would facilitate the creation of augmented tours and environments by non-technical users. The project took on several stages, and through the process, a simple framework was begun to be established that can inform the design and use of MAR applications for tourism contexts. As a result of these iterations of development, a platform was developed that can allow novice computer users to create augmented tourism environments. This system was able to connect existing tools in widespread use such as Google Forms and connect them to computer vision algorithms needed for more advanced augmented tourism environments. The study concludes with a discussion of this MAR platform and reveals design elements that have implications for tourism contexts. The study also points to future case uses and design approaches for augmented tourism.

Keywords: augmented tourism, augmented reality, user experience, mobile design, e-tourism

Procedia PDF Downloads 221
2999 Understanding Systemic Barriers (and Opportunities) to Increasing Uptake of Subcutaneous Medroxy Progesterone Acetate Self-Injection in Health Facilities in Nigeria

Authors: Oluwaseun Adeleke, Samuel O. Ikani, Fidelis Edet, Anthony Nwala, Mopelola Raji, Simeon Christian Chukwu

Abstract:

Background: The DISC project collaborated with partners to implement demand creation and service delivery interventions, including the MoT (Moment of Truth) innovation, in over 500 health facilities across 15 states. This has increased the voluntary conversion rate to self-injection among women who opt for injectable contraception. While some facilities recorded an increasing trend in key performance indicators, few others persistently performed sub-optimally due to provider and system-related barriers. Methodology: Twenty-two facilities performing sub-optimally were selected purposively from three Nigerian states. Low productivity was appraised using low reporting rates and poor SI conversion rates as indicators. Interviews were conducted with health providers across these health facilities using a rapid diagnosis tool. The project also conducted a data quality assessment that evaluated the veracity of data elements reported across the three major sources of family planning data in the facility. Findings: The inability and sometimes refusal of providers to support clients to self-inject effectively was associated with the misunderstanding of its value to their work experience. It was also observed that providers still held a strong influence over clients’ method choices. Furthermore, providers held biases and misconceptions about DMPA-SC that restricted the access of obese clients and new acceptors to services – a clear departure from the recommendations of the national guidelines. Additionally, quality of care standards was compromised because job aids were not used to inform service delivery. Facilities performing sub-optimally often under-reported DMPA-SC utilization data, and there were multiple uncoordinated responsibilities for recording and reporting. Additionally, data validation meetings were not regularly convened, and these meetings were ineffective in authenticating data received from health facilities. Other reasons for sub-optimal performance included poor documentation and tracking of stock inventory resulting in commodity stockouts, low client flow because of poor positioning of health facilities, and ineffective messaging. Some facilities lacked adequate human and material resources to provide services effectively and received very few supportive supervision visits. Supportive supervision visits and Data Quality Audits have been useful to address the aforementioned performance barriers. The project has deployed digital DMPA-SC self-injection checklists that have been aligned with nationally approved templates. During visits, each provider and community mobilizer is accorded special attention by the supervisor until he/she can perform procedures in line with best practice (protocol). Conclusion: This narrative provides a summary of a range of factors that identify health facilities performing sub-optimally in their provision of DMPA-SC services. Findings from this assessment will be useful during project design to inform effective strategies. As the project enters its final stages of implementation, it is transitioning high-impact activities to state institutions in the quest to sustain the quality of service beyond the tenure of the project. The project has flagged activities, as well as created protocols and tools aimed at placing state-level stakeholders at the forefront of improving productivity in health facilities.

Keywords: family planning, contraception, DMPA-SC, self-care, self-injection, barriers, opportunities, performance

Procedia PDF Downloads 86
2998 Early Help Family Group Conferences: An Analysis of Family Plans

Authors: Kate Parkinson

Abstract:

A Family Group Conference (FGC) is a family-led decision-making process through which a family/kinship group, rather than the professionals involved, is asked to develop a plan for the care or the protection of children in the family. In England and Wales, FGCs are used in 76% of local authorities and in recent years, have tended to be used in cases where the local authority are considering the court process to remove children from their immediate family, to explore kinship alternatives to local authority care. Some local authorities offer the service much earlier, when families first come to the attention of children's social care, in line with research that suggests the earlier an FGC is held, the more likely they are to be successful. Family plans that result from FGCs are different from professional plans in that they are unique to a family and, as a result, reflect the diversity of families. Despite the fact that FGCs are arguable the most researched area of social work globally, there is a dearth of research that examines the nature of family plans and their substance. This paper presents the findings of a documentary analysis of 42 Early Help FGC plans from local authorities in England, with the aim of exploring the level and type of support that family members offer at a FGC. A thematic analysis identified 5 broad areas of support: Practical Support, Building Relationships, Child-care Support, Emotional Support and Social Support. In the majority of cases, family members did not want or ask for any formal support from the local authority or other agencies. Rather, the families came together to agree a plan of support, which was within the parameters of the resources that they as a family could provide. Perhaps then the role of the Early Help professional should be one of a facilitating and enabling role, to support families to develop plans that address their own specific difficulties, rather than the current default option, which is to either close the case because the family do not meet service thresholds or refer to formal support if they do, which may offer very specific support, have rigid referral criteria, long waiting lists and may not reflect the diverse and unique nature of families. FGCs are argued to be culturally appropriate social work practices in that they are appropriate for families from a range of cultural backgrounds and can be adapted to meet particular cultural needs. Furthermore, research on the efficacy of FGCs at an Early Help Level has demonstrated that Early Help FGCs have the potential to address difficulties in family life and prevent the need for formal support services, which are potentially stigmatising and do not reflect the uniqueness and diversity of families. The paper concludes with a recommendation for the use of FGCs across Early Help Services in England and Wales.

Keywords: family group conferences, family led decision making, early help, prevention

Procedia PDF Downloads 97
2997 Prospects for the Development of e-Commerce in Georgia

Authors: Nino Damenia

Abstract:

E-commerce opens a new horizon for business development, which is why the presence of e-commerce is a necessary condition for the formation, growth, and development of the country's economy. Worldwide, e-commerce turnover is growing at a high rate every year, as the electronic environment provides great opportunities for product promotion. E-commerce in Georgia is developing at a fast pace, but it is still a relatively young direction in the country's economy. Movement restrictions and other public health measures caused by the COVID-19 pandemic have reduced economic activity in most economic sectors and countries, significantly affecting production, distribution, and consumption. The pandemic has accelerated digital transformation. Digital solutions enable people and businesses to continue part of their economic and social activities remotely. This has also led to the growth of e-commerce. According to the data of the National Statistics Service of Georgia, the share of online trade is higher in cities (27.4%) than in rural areas (9.1%). The COVID-19 pandemic has forced local businesses to expand their digital offerings. The size of the local market increased 3.2 times in 2020 to 138 million GEL. And in 2018-2020, the share of local e-commerce increased from 11% to 23%. In Georgia, the state is actively engaged in the promotion of activities based on information technologies. Many measures have been taken for this purpose, but compared to other countries, this process is slow in Georgia. The purpose of the study is to determine development prospects for the economy of Georgia based on the analysis of electronic commerce. Research was conducted around the issues using Georgian and foreign scientists' articles, works, reports of international organizations, collections of scientific conferences, and scientific electronic databases. The empirical base of the research is the data and annual reports of the National Statistical Service of Georgia, internet resources of world statistical materials, and others. While working on the article, a questionnaire was developed, based on which an electronic survey of certain types of respondents was conducted. The conducted research was related to determining how intensively Georgian citizens use online shopping, including which age category uses electronic commerce, for what purposes, and how satisfied they are. Various theoretical and methodological research tools, as well as analysis, synthesis, comparison, and other types of methods, are used to achieve the set goal in the research process. The research results and recommendations will contribute to the development of e-commerce in Georgia and economic growth based on it.

Keywords: e-commerce, information technology, pandemic, digital transformation

Procedia PDF Downloads 79
2996 Low-Cost Embedded Biometric System Based on Fingervein Modality

Authors: Randa Boukhris, Alima Damak, Dorra Sellami

Abstract:

Fingervein biometric authentication is one of the most popular and accurate technologies. However, low cost embedded solution is still an open problem. In this paper, a real-time implementation of fingervein recognition process embedded in Raspberry-Pi has been proposed. The use of Raspberry-Pi reduces overall system cost and size while allowing an easy user interface. Implementation of a target technology has guided to opt some specific parallel and simple processing algorithms. In the proposed system, we use four structural directional kernel elements for filtering finger vein images. Then, a Top-Hat and Bottom-Hat kernel filters are used to enhance the visibility and the appearance of venous images. For feature extraction step, a simple Local Directional Code (LDC) descriptor is applied. The proposed system presents an Error Equal Rate (EER) and Identification Rate (IR), respectively, equal to 0.02 and 98%. Furthermore, experimental results show that real-time operations have good performance.

Keywords: biometric, Bottom-Hat, Fingervein, LDC, Rasberry-Pi, ROI, Top-Hat

Procedia PDF Downloads 207
2995 Equilibrium Modeling of a Two Stage Downdraft Gasifier Using Different Gasification Fluids

Authors: F. R. M. Nascimento, E. E. S. Lora, J. C. E. Palácio

Abstract:

A mathematical model to investigate the performance of a two stage fixed bed downdraft gasifier operating with air, steam and oxygen mixtures as the gasifying fluid has been developed. The various conditions of mixtures for a double stage fluid entry, have been performed. The model has been validated through a series of experimental tests performed by NEST – The Excellence Group in Thermal and Distributed Generation of the Federal University of Itajubá. Influence of mixtures are analyzed through the Steam to Biomass (SB), Equivalence Ratio (ER) and the Oxygen Concentration (OP) parameters in order to predict the best operating conditions to obtain adequate output gas quality, once is a key parameter for subsequent gas processing in the synthesis of biofuels, heat and electricity generation. Results show that there is an optimal combination in the steam and oxygen content of the gasifying fluid which allows the user find the best conditions to design and operate the equipment according to the desired application.

Keywords: air, equilibrium, downdraft, fixed bed gasification, mathematical modeling, mixtures, oxygen steam

Procedia PDF Downloads 483
2994 Decoding Urban Stress Mapping Criteria in Urban Heritage Cores: Gandhi Park, Kerala Case Study

Authors: Ansal D'cruz, Anurup K., Saritha G. Parambath

Abstract:

Physical and mental strain is a growing concern arising from various stressors in an urban context. However, these stressors are relatively less explored in the domain of urban design, especially in Indian cities where the central business district falls within the heritage core. An attempt is made in the context of the heritage core of Thiruvananthapuram city, Kerala, to understand and identify the connection between the built environment and urban stress. The criteria for establishing the indicators were obtained through a systematic literature review. A thorough study conducted in Gandhi Park, East Fort area using the identified criteria resulted in valuable insights into various urban stressors. Onsite surveys established the correlation between the built environment and user stress levels. The study concludes with guidelines for approaching urban stress in urban parks in an Indian context.

Keywords: urban stress, built environment, mental health, urban stressors, urban design

Procedia PDF Downloads 70
2993 The Effect of Physical Evidence of Themed Casino Hotels on Customer Value and Satisfaction

Authors: Tao Zhang, Fen Zhang

Abstract:

Physical evidence has emerged as an important concept for understanding customers' behavior in the service industry. While it is still not clear about the effect of physical evidence of themed casino hotels on customer value and satisfaction. After deciding on the research context, the processes of this research started with a review of literature in three subject areas: physical evidence, customer value, and customer satisfactions. Insights from the literature review and pilot interviews are important input that informs the development of the specific research questions. Data collection for this research will be done for two studies: a photo elicitation study and an in-depth interview study.

Keywords: casino, customer value, customer satisfaction, hotel, physical evidence

Procedia PDF Downloads 412
2992 Performance Evaluation of DSR and OLSR Routing Protocols in MANET Using Varying Pause Time

Authors: Yassine Meraihi, Dalila Acheli, Rabah Meraihi

Abstract:

MANET for Mobile Ad hoc NETwork is a collection of wireless mobile nodes that communicates with each other without using any existing infrastructure, access point or centralized administration, due to the higher mobility and limited radio transmission range, routing is an important issue in ad hoc network, so in order to ensure reliable and efficient route between to communicating nodes quickly, an appropriate routing protocol is needed. In this paper, we present the performance analysis of two mobile ad hoc network routing protocols namely DSR and OLSR using NS2.34, the performance is determined on the basis of packet delivery ratio, throughput, average jitter and end to end delay with varying pause time.

Keywords: DSR, OLSR, quality of service, routing protocols, MANET

Procedia PDF Downloads 556
2991 Detection Method of Federated Learning Backdoor Based on Weighted K-Medoids

Authors: Xun Li, Haojie Wang

Abstract:

Federated learning is a kind of distributed training and centralized training mode, which is of great value in the protection of user privacy. In order to solve the problem that the model is vulnerable to backdoor attacks in federated learning, a backdoor attack detection method based on a weighted k-medoids algorithm is proposed. First of all, this paper collates the update parameters of the client to construct a vector group, then uses the principal components analysis (PCA) algorithm to extract the corresponding feature information from the vector group, and finally uses the improved k-medoids clustering algorithm to identify the normal and backdoor update parameters. In this paper, the backdoor is implanted in the federation learning model through the model replacement attack method in the simulation experiment, and the update parameters from the attacker are effectively detected and removed by the defense method proposed in this paper.

Keywords: federated learning, backdoor attack, PCA, k-medoids, backdoor defense

Procedia PDF Downloads 117
2990 Impact of Solar Radiation Effects on the Physicochemical Properties of Unformulated Polyethylene (PE) Plastic Film

Authors: A. Adelhafidhi, I. M. Babaghayou, S. F. Chabira, M. Sebaa

Abstract:

This study deals with the photodegradation of unformulated polyethylene films for greenhouse covering. The UV range of solar light appears as the most deleterious factor of plastic degradation in outdoor exposure. The reasons of this photosensitivity are structural defects which are light-absorbing. The use of FTIR as an investigation tool has revealed that the material reacts with surrounding oxygen via a photooxidation process. Although the photochemical process is quite complex, it appears through this study than crosslinking and chain scissions are the most important events taking place during aging These two key reactions change irremediably the average molecular weight affecting thus drastically the mechanical properties and reducing, in the same way, the service lifetime of the films.

Keywords: polyethylene, films, unformulated, FTIR, ageing

Procedia PDF Downloads 373
2989 Quick Reference: Cyber Attacks Awareness and Prevention Method for Home Users

Authors: Haydar Teymourlouei

Abstract:

It is important to take security measures to protect your computer information, reduce identify theft, and prevent from malicious cyber-attacks. With cyber-attacks on the continuous rise, people need to understand and learn ways to prevent from these attacks. Cyber-attack is an important factor to be considered if one is to be able to protect oneself from malicious attacks. Without proper security measures, most computer technology would hinder home users more than such technologies would help. Knowledge of how cyber-attacks operate and protective steps that can be taken to reduce chances of its occurrence are key to increasing these security measures. The purpose of this paper is to inform home users on the importance of identifying and taking preventive steps to avoid cyberattacks. Throughout this paper, many aspects of cyber-attacks will be discuss: what a cyber-attack is, the affects of cyber-attack for home users, different types of cyber-attacks, methodology to prevent such attacks; home users can take to fortify security of their computer.

Keywords: cyber-attacks, home user, prevention, security, technology

Procedia PDF Downloads 400
2988 Triadic Relationship of Icon Design for Semi-Literate Communities

Authors: Peng-Hui Maffee Wan, Klarissa Ting Ting Chang, Rax Suen Chun Lung

Abstract:

Icons, or pictorial and graphical objects, are commonly used in Human-Computer Interaction (HCI) fields as the mediator in order to communicate information to users. Yet there has been little studies focusing on a majority of the world’s population, semi-literate communities, in terms of the fundamental know-how for designing icons for such population. In this study, two sets of icons belonging in different icon taxonomy, abstract and concrete are designed for a mobile application for semi-literate agricultural communities. In this paper, we propose a triadic relationship of an icon, namely meaning, task and mental image, which inherits the triadic relationship of a sign. User testing with the application and a post-pilot questionnaire are conducted as the experimental approach in two rural villages in India. Icons belonging to concrete taxonomy perform better than abstract icons on the premise that the design of the icon fulfills the underlying rules of the proposed triadic relationship.

Keywords: icon, GUI, mobile app, semi-literate

Procedia PDF Downloads 492
2987 School Counseling in Sri Lanka: Analysis of the past Recommending a Way Forward

Authors: Buddhiprabha D. D. Pathirana

Abstract:

Despite a rapid increase in the number of school counselors in the recent past; procuring the service of school counselors is a luxury that many Sri Lankan schools cannot afford. In addition, school counseling in Sri Lanka also faces new challenges in implementation due to the fact that a generally agreed consensus on training, ethical standards, role identity, counseling model, and structures for school counselors has not been reached. Therefore, this paper has several objectives. First, it reviews a brief history of school counseling in Sri Lanka and describes its current status. Second, it describes current trends/ problems specific to Sri Lankan school counseling milieu which have limited the progress of school counseling as a practice. Third, it discusses societal and cultural issues that are important to consider when implementing school counseling as a practices in Sri Lanka and provides recommendations to improve it.

Keywords: school counseling, Sri Lanka, current situation, recommendations

Procedia PDF Downloads 551
2986 Developing a Cybernetic Model of Interdepartmental Logistic Interactions in SME

Authors: Jonas Mayer, Kai-Frederic Seitz, Thorben Kuprat

Abstract:

In today’s competitive environment production’s logistic objectives such as ‘delivery reliability’ and ‘delivery time’ and distribution’s logistic objectives such as ‘service level’ and ‘delivery delay’ are attributed great importance. Especially for small and mid-sized enterprises (SME) attaining these objectives pose a key challenge. Within this context, one of the difficulties is that interactions between departments within the enterprise and their specific objectives are insufficiently taken into account and aligned. Interdepartmental independencies along with contradicting targets set within the different departments result in enterprises having sub-optimal logistic performance capability. This paper presents a research project which will systematically describe the interactions between departments and convert them into a quantifiable form.

Keywords: department-specific actuating and control variables, interdepartmental interactions, cybernetic model, logistic objectives

Procedia PDF Downloads 377
2985 Modern Trends in Pest Management Agroindustry

Authors: Amarjit S Tanda

Abstract:

Integrated Pest Management Technology (IPMT) offers a crop protection model with sustainable agriculture production with minimum damage to the environment and human health. A concept of agro-ecological crop protection seems unsuitable under dynamic environmental systems. To remedy this, we are proposing Genetically Engineered Crop Protection System (GECPS), as an alternate concept in IPMT that suggests how GE cultivars can be optimally put to the service of crop protection. Genetically engineered cultivars which are developed by gene editing biotechnology may provide a preventive defense against the insect pests and plant diseases, a suitable alternative crop system for blending in IPMT program, in the future agro-industry.

Keywords: integrated, pest, management, technology

Procedia PDF Downloads 77
2984 The Effect of User Comments on Traffic Application Usage

Authors: I. Gokasar, G. Bakioglu

Abstract:

With the unprecedented rates of technological improvements, people start to solve their problems with the help of technological tools. According to application stores and websites in which people evaluate and comment on the traffic apps, there are more than 100 traffic applications which have different features with respect to their purpose of usage ranging from the features of traffic apps for public transit modes to the features of traffic apps for private cars. This study focuses on the top 30 traffic applications which were chosen with respect to their download counts. All data about the traffic applications were obtained from related websites. The purpose of this study is to analyze traffic applications in terms of their categorical attributes with the help of developing a regression model. The analysis results suggest that negative interpretations (e.g., being deficient) does not lead to lower star ratings of the applications. However, those negative interpretations result in a smaller increase in star rate. In addition, women use higher star rates than men for the evaluation of traffic applications.

Keywords: traffic app, real–time information, traffic congestion, regression analysis, dummy variables

Procedia PDF Downloads 431
2983 E-Service and the Nigerian Banking Sector: A Review of ATM Architecture and Operations

Authors: Bashir Aliyu Yauri, Rufai Aliyu Yauri

Abstract:

With the introduction of cash-less society policy by the Central Bank of Nigeria, the concept of e-banking services has experienced a significant improvement over the years. Today quite a number of people are embracing e-banking activities especially ATM, thereby moving away from the conventional banking system. This paper presents a review of the underlying Architectural Layout of Intra-Bank and Inter-Bank ATM connectivity in Nigeria. The paper further investigates and discusses factors affecting the Intra-Bank and Inter-Bank ATM connectivity in Nigeria. And as well possible solutions to these factors affecting ATM Connectivity and Operations are proposed.

Keywords: architectural layout, automated teller machine, e-services, postilion

Procedia PDF Downloads 638
2982 Cultural Dynamics in Online Consumer Behavior: Exploring Cross-Country Variances in Review Influence

Authors: Eunjung Lee

Abstract:

This research investigates the intricate connection between cultural differences and online consumer behaviors by integrating Hofstede's Cultural Dimensions theory with analysis methodologies such as text mining, data mining, and topic analysis. Our aim is to provide a comprehensive understanding of how national cultural differences influence individuals' behaviors when engaging with online reviews. To ensure the relevance of our investigation, we systematically analyze and interpret the cultural nuances influencing online consumer behaviors, especially in the context of online reviews. By anchoring our research in Hofstede's Cultural Dimensions theory, we seek to offer valuable insights for marketers to tailor their strategies based on the cultural preferences of diverse global consumer bases. In our methodology, we employ advanced text mining techniques to extract insights from a diverse range of online reviews gathered globally for a specific product or service like Netflix. This approach allows us to reveal hidden cultural cues in the language used by consumers from various backgrounds. Complementing text mining, data mining techniques are applied to extract meaningful patterns from online review datasets collected from different countries, aiming to unveil underlying structures and gain a deeper understanding of the impact of cultural differences on online consumer behaviors. The study also integrates topic analysis to identify recurring subjects, sentiments, and opinions within online reviews. Marketers can leverage these insights to inform the development of culturally sensitive strategies, enhance target audience segmentation, and refine messaging approaches aligned with cultural preferences. Anchored in Hofstede's Cultural Dimensions theory, our research employs sophisticated methodologies to delve into the intricate relationship between cultural differences and online consumer behaviors. Applied to specific cultural dimensions, such as individualism vs. collectivism, masculinity vs. femininity, uncertainty avoidance, and long-term vs. short-term orientation, the study uncovers nuanced insights. For example, in exploring individualism vs. collectivism, we examine how reviewers from individualistic cultures prioritize personal experiences while those from collectivistic cultures emphasize communal opinions. Similarly, within masculinity vs. femininity, we investigate whether distinct topics align with cultural notions, such as robust features in masculine cultures and user-friendliness in feminine cultures. Examining information-seeking behaviors under uncertainty avoidance reveals how cultures differ in seeking detailed information or providing succinct reviews based on their comfort with ambiguity. Additionally, in assessing long-term vs. short-term orientation, the research explores how cultural focus on enduring benefits or immediate gratification influences reviews. These concrete examples contribute to the theoretical enhancement of Hofstede's Cultural Dimensions theory, providing a detailed understanding of cultural impacts on online consumer behaviors. As online reviews become increasingly crucial in decision-making, this research not only contributes to the academic understanding of cultural influences but also proposes practical recommendations for enhancing online review systems. Marketers can leverage these findings to design targeted and culturally relevant strategies, ultimately enhancing their global marketing effectiveness and optimizing online review systems for maximum impact.

Keywords: comparative analysis, cultural dimensions, marketing intelligence, national culture, online consumer behavior, text mining

Procedia PDF Downloads 53
2981 Forensic Analysis of Thumbnail Images in Windows 10

Authors: George Kurian, Hongmei Chi

Abstract:

Digital evidence plays a critical role in most legal investigations. In many cases, thumbnail databases show important information in that investigation. The probability of having digital evidence retrieved from a computer or smart device has increased, even though the previous user removed data and deleted apps on those devices. Due to the increase in digital forensics, the ability to store residual information from various thumbnail applications has improved. This paper will focus on investigating thumbnail information from Windows 10. Thumbnail images of interest in forensic investigations may be intact even when the original pictures have been deleted. It is our research goal to recover useful information from thumbnails. In this research project, we use various forensics tools to collect left thumbnail information from deleted videos or pictures. We examine and describe the various thumbnail sources in Windows and propose a methodology for thumbnail collection and analysis from laptops or desktops. A machine learning algorithm is adopted to help speed up content from thumbnail pictures.

Keywords: digital forensic, forensic tools, soundness, thumbnail, machine learning, OCR

Procedia PDF Downloads 138
2980 Specification of Requirements to Ensure Proper Implementation of Security Policies in Cloud-Based Multi-Tenant Systems

Authors: Rebecca Zahra, Joseph G. Vella, Ernest Cachia

Abstract:

The notion of cloud computing is rapidly gaining ground in the IT industry and is appealing mostly due to making computing more adaptable and expedient whilst diminishing the total cost of ownership. This paper focuses on the software as a service (SaaS) architecture of cloud computing which is used for the outsourcing of databases with their associated business processes. One approach for offering SaaS is basing the system’s architecture on multi-tenancy. Multi-tenancy allows multiple tenants (users) to make use of the same single application instance. Their requests and configurations might then differ according to specific requirements met through tenant customisation through the software. Despite the known advantages, companies still feel uneasy to opt for the multi-tenancy with data security being a principle concern. The fact that multiple tenants, possibly competitors, would have their data located on the same server process and share the same database tables heighten the fear of unauthorised access. Security is a vital aspect which needs to be considered by application developers, database administrators, data owners and end users. This is further complicated in cloud-based multi-tenant system where boundaries must be established between tenants and additional access control models must be in place to prevent unauthorised cross-tenant access to data. Moreover, when altering the database state, the transactions need to strictly adhere to the tenant’s known business processes. This paper focuses on the fact that security in cloud databases should not be considered as an isolated issue. Rather it should be included in the initial phases of the database design and monitored continuously throughout the whole development process. This paper aims to identify a number of the most common security risks and threats specifically in the area of multi-tenant cloud systems. Issues and bottlenecks relating to security risks in cloud databases are surveyed. Some techniques which might be utilised to overcome them are then listed and evaluated. After a description and evaluation of the main security threats, this paper produces a list of software requirements to ensure that proper security policies are implemented by a software development team when designing and implementing a multi-tenant based SaaS. This would then assist the cloud service providers to define, implement, and manage security policies as per tenant customisation requirements whilst assuring security for the customers’ data.

Keywords: cloud computing, data management, multi-tenancy, requirements, security

Procedia PDF Downloads 158
2979 Development of a Data Security Model Using Steganography

Authors: Terungwa Simon Yange, Agana Moses A.

Abstract:

This paper studied steganography and designed a simplistic approach to a steganographic tool for hiding information in image files with the view of addressing the security challenges with data by hiding data from unauthorized users to improve its security. The Structured Systems Analysis and Design Method (SSADM) was used in this work. The system was developed using Java Development Kit (JDK) 1.7.0_10 and MySQL Server as its backend. The system was tested with some hypothetical health records which proved the possibility of protecting data from unauthorized users by making it secret so that its existence cannot be easily recognized by fraudulent users. It further strengthens the confidentiality of patient records kept by medical practitioners in the health setting. In conclusion, this work was able to produce a user friendly steganography software that is very fast to install and easy to operate to ensure privacy and secrecy of sensitive data. It also produced an exact copy of the original image and the one carrying the secret message when compared with each.

Keywords: steganography, cryptography, encryption, decryption, secrecy

Procedia PDF Downloads 268
2978 Design and Implementation of an AI-Enabled Task Assistance and Management System

Authors: Arun Prasad Jaganathan

Abstract:

In today's dynamic industrial world, traditional task allocation methods often fall short in adapting to evolving operational conditions. This paper introduces an AI-enabled task assistance and management system designed to overcome the limitations of conventional approaches. By using artificial intelligence (AI) and machine learning (ML), the system intelligently interprets user instructions, analyzes tasks, and allocates resources based on real-time data and environmental factors. Additionally, geolocation tracking enables proactive identification of potential delays, ensuring timely interventions. With its transparent reporting mechanisms, the system provides stakeholders with clear insights into task progress, fostering accountability and informed decision-making. The paper presents a comprehensive overview of the system architecture, algorithm, and implementation, highlighting its potential to revolutionize task management across diverse industries.

Keywords: artificial intelligence, machine learning, task allocation, operational efficiency, resource optimization

Procedia PDF Downloads 64
2977 Cost-Based Analysis of Cloud and Traditional ERP Systems in Small and Medium Enterprises

Authors: Indu Saini, Ashu Khanna, S. K. Peddoju

Abstract:

Cloud computing is the new buzz word today attracting high interest among various domains like business enterprises, Particularly in Small and Medium Enterprises. As it is a pay-per-use model, SMEs have high expectations that adapting this model will not only make them flexible, hassle-free but also economic. In view of such expectations, this paper analyses the possibility of adapting cloud computing technologies in SMEs in light of economic concerns. In this paper, two hypotheses are developed to compare the average annual per-user costs of using Enterprise Resource Planning systems in two ways, The traditional approach and the cloud approach. A web based survey is conducted apart from the Interviews with the peers to collect the data across the selected SMEs and t-test is performed to compare both the technologies on the proposed hypothesis. Results achieved are produced and discussed.

Keywords: cloud computing, small and medium enterprises, enterprise resource solutions, interviews

Procedia PDF Downloads 343
2976 Continuous Wave Interference Effects on Global Position System Signal Quality

Authors: Fang Ye, Han Yu, Yibing Li

Abstract:

Radio interference is one of the major concerns in using the global positioning system (GPS) for civilian and military applications. Interference signals are produced not only through all electronic systems but also illegal jammers. Among different types of interferences, continuous wave (CW) interference has strong adverse impacts on the quality of the received signal. In this paper, we make more detailed analysis for CW interference effects on GPS signal quality. Based on the C/A code spectrum lines, the influence of CW interference on the acquisition performance of GPS receivers is further analysed. This influence is supported by simulation results using GPS software receiver. As the most important user parameter of GPS receivers, the mathematical expression of bit error probability is also derived in the presence of CW interference, and the expression is consistent with the Monte Carlo simulation results. The research on CW interference provides some theoretical gist and new thoughts on monitoring the radio noise environment and improving the anti-jamming ability of GPS receivers.

Keywords: GPS, CW interference, acquisition performance, bit error probability, Monte Carlo

Procedia PDF Downloads 265
2975 The Effect of Artificial Intelligence on Construction Development

Authors: Shady Gamal Aziz Shehata

Abstract:

Difficulty in defining construction quality arises due to perception based on the nature and requirements of the market, the different partners themselves and the results they want. Quantitative research was used in this constructivist research. A case-based study was conducted to assess the structures of positive attitudes and expectations in the context of quality improvement. A survey based on expert opinions was analyzed among construction organizations/companies operating in the construction industry in Pakistan. The financial strength, management structure and construction experience of the construction companies formed the basis of their selection. A good concept is visible at the project level and is seen as the most valuable part of the construction project. Each quality improvement technique was expected to increase the user's profits by improving the efficiency of the construction project. The Survey is useful for construction professionals to evaluate current construction concepts and expectations for the application of quality improvement techniques in construction projects.

Keywords: correlation analysis, lean construction tools, lean construction, logistic regression analysis, risk management, safety construction quality, expectation, improvement, perception

Procedia PDF Downloads 64