Search results for: computer usage
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4052

Search results for: computer usage

4052 The Investigation of Counselors Attitudes toward Online Counseling upon Taking Clients Perspective

Authors: Omer Ozer, Murat Yikilmaz, Ahmet Altinok, Ferhat Bayolu

Abstract:

There is an increasing number of online counseling services, studies exploring clients’ and counselors’ attitudes toward online counseling services are needed to provide effective and efficient mental health counseling services. The purpose of this study is to investigate counselors’ attitudes toward online counseling in relation to counselors’ genders, their daily usage of computer, their total usage of computer, and their self-efficacy in computer usage. In this study, Personal Information Form, specific items from the Online Counseling Attitudes Scale, and the Face-to-Face Counseling Attitudes Scale were given to 193 counselors to measure attitudes toward online counseling. Data were analyzed by using independent samples t-test and one-way ANOVA. There were no statistically significant differences counselors’ attitudes toward online counseling and counselors’ gender, their daily usage of computer, their total usage of computer, and their self-efficacy in computer usage. The implications of these findings have been discussed in the literature review to provide some suggestions to researchers in the counseling profession.

Keywords: online counseling, counselor, attitude, counseling service

Procedia PDF Downloads 323
4051 Evaluation of Computer Usage and Related Health Hazards

Authors: B. O. Adegoke, B. O. Ola, D. T. Ademiluyi

Abstract:

This paper examines the use of computer and its related health hazard among computer users in South-Western zone of Nigeria. Two hundred and eighteen (218) computer users constituted the population used to evaluate association between posture, extensive computer use and related health hazard. The instruments for the study are a questionnaire on demographics, lifestyle, body features and work ability index while mean rating, standard deviation and t test were used for data analysis. Identified health related hazard include damages to the eyesight, bad posture, arthritis, musculoskeletal disorders, headache, stress and so on. The results showed that factors such as work demand, posture, closeness to computer screen and excessive working hours on computers constitute health hazards in both old and young computer users of various gender. It is therefore recommended that total number of hours spent with computer should be monitored and controlled.

Keywords: computer-related health hazard, musculoskeletal disorders, computer usage, work ability index

Procedia PDF Downloads 460
4050 Analysis of Public Space Usage Characteristics Based on Computer Vision Technology - Taking Shaping Park as an Example

Authors: Guantao Bai

Abstract:

Public space is an indispensable and important component of the urban built environment. How to more accurately evaluate the usage characteristics of public space can help improve its spatial quality. Compared to traditional survey methods, computer vision technology based on deep learning has advantages such as dynamic observation and low cost. This study takes the public space of Shaping Park as an example and, based on deep learning computer vision technology, processes and analyzes the image data of the public space to obtain the spatial usage characteristics and spatiotemporal characteristics of the public space. Research has found that the spontaneous activity time in public spaces is relatively random with a relatively short average activity time, while social activities have a relatively stable activity time with a longer average activity time. Computer vision technology based on deep learning can effectively describe the spatial usage characteristics of the research area, making up for the shortcomings of traditional research methods and providing relevant support for creating a good public space.

Keywords: computer vision, deep learning, public spaces, using features

Procedia PDF Downloads 37
4049 Requirements Gathering for Improved Software Usability and the Potential for Usage-Centred Design

Authors: Kholod J. Alotaibi, Andrew M. Gravell

Abstract:

Usability is an important software quality that is often neglected at the design stage. Although methods exist to incorporate elements of usability engineering, there is a need for more balanced usability focused methods that can enhance the experience of software usability for users. In this regard, the potential for Usage-Centered Design is explored with respect to requirements gathering and is shown to lead to high software usability besides other benefits. It achieves this through its focus on usage, defining essential use cases, by conducting task modeling, encouraging user collaboration, refining requirements, and so on. The requirements gathering process in UgCD is described in detail.

Keywords: requirements gathering, usability, usage-centred design, computer science

Procedia PDF Downloads 322
4048 Factors Influencing the Usage of ERP in Enterprise Systems

Authors: Mohammad Reza Babaei, Sanaz Kamrani

Abstract:

The main problems That arise In adopting most Enterprise resources planning (ERP) strategies come from organizational, complex information systems like the ERP integrate the data of all business areas within the organization. The implementation of ERP is a difficult process as it involves different types of end users. Based on literature, we proposed a conceptual framework and examined it to find the effect of some of the individual, organizational, and technological factors on the usage of ERP and its impact on the end user. The results of the analysis suggest that computer self-efficacy, organizational support, training, and compatibility have a positive influence on ERP usage which in turn has significant influence on panoptic empowerment and individual performance.

Keywords: factor, influencing, enterprise, system

Procedia PDF Downloads 340
4047 Losing Benefits from Social Network Sites Usage: An Approach to Estimate the Relationship between Social Network Sites Usage and Social Capital

Authors: Maoxin Ye

Abstract:

This study examines the relationship between social network sites (SNS) usage and social capital. Because SNS usage can expand the users’ networks, and people who are connected in this networks may become resources to SNS users and lead them to advantage in some situation, it is important to estimate the relationship between SNS usage and ‘who’ is connected or what resources the SNS users can get. Additionally, ‘who’ can be divided in two aspects – people who possess high position and people who are different, hence, it is important to estimate the relationship between SNS usage and high position people and different people. This study adapts Lin’s definition of social capital and the measurement of position generator which tells us who was connected, and can be divided into the same two aspects as well. A national data of America (N = 2,255) collected by Pew Research Center is utilized to do a general regression analysis about SNS usage and social capital. The results indicate that SNS usage is negatively associated with each factor of social capital, and it suggests that, in fact, comparing with non-users, although SNS users can get more connections, the variety and resources of these connections are fewer. For this reason, we could lose benefits through SNS usage.

Keywords: social network sites, social capital, position generator, general regression

Procedia PDF Downloads 240
4046 Information Needs and Information Usage of the Older Person Club’s Members in Bangkok

Authors: Siriporn Poolsuwan

Abstract:

This research aims to explore the information needs, information usages, and problems of information usage of the older people club’s members in Dusit District, Bangkok. There are 12 clubs and 746 club’s members in this district. The research results use for older person service in this district. Data is gathered from 252 club’s members by using questionnaires. The quantitative approach uses in research by percentage, means and standard deviation. The results are as follows (1) The older people need Information for entertainment, occupation and academic in the field of short story, computer work, and religion and morality. (2) The participants use Information from various sources. (3) The Problem of information usage is their language skills because of the older people’s literacy problem.

Keywords: information behavior, older person, information seeking, knowledge discovery and data mining

Procedia PDF Downloads 246
4045 The Impact of Technology on Computer Systems and Technology

Authors: Bishoy Abouelsoud Saad Amin

Abstract:

This paper examines the use of computer and its related health hazard among computer users in South-Western zone of Nigeria. Two hundred and eighteen (218) computer users constituted the population used to evaluate association between posture, extensive computer use and related health hazard. The instruments for the study are a questionnaire on demographics, lifestyle, body features and work ability index while mean rating, standard deviation and t test were used for data analysis. Identified health related hazard include damages to the eyesight, bad posture, arthritis, musculoskeletal disorders, headache, stress and so on. The results showed that factors such as work demand, posture, closeness to computer screen and excessive working hours on computers constitute health hazards in both old and young computer users of various gender. It is therefore recommended that total number of hours spent with computer should be monitored and controlled.

Keywords: computer game, metaphor, middle school students, virtual environments computer auditing, risk, measures to prevent, information management computer-related health hazard, musculoskeletal disorders, computer usage, work ability index

Procedia PDF Downloads 29
4044 Challenges in Promoting Software Usability and Applying Principles of Usage-Centred Design in Saudi Arabia

Authors: Kholod J. Alotaibi, Andrew M. Gravell

Abstract:

A study was conducted in which 212 software developers in higher education institutions in Saudi Arabia were surveyed to gather an indication of their understanding of the concept of usability, their acceptance of its importance, and to see how well its principles are applied. Interviews were then held with 20 of these developers, and a demonstration of Usage-Centred Design was attempted, a highly usability focused software development methodology, at one select institution for its redesign of an e-learning exam system interface during the requirements gathering phase. The study confirms the need to raise awareness of usability and its importance, and for Usage-Centred Design to be applied in its entirety, also need to encourage greater consultation with potential end-users of software and collaborative practices. The demonstration of Usage-Centred Design confirmed its ability to capture usability requirements more completely and precisely than would otherwise be the case, and hence its usefulness for developers concerned with improving software usability. The concluding discussion delves on the challenges for promoting usability and Usage-Centred Design in light of the research results and findings and recommendations are made for the same.

Keywords: usability, usage-centred, applying principles of usage-centred, Saudi Arabia

Procedia PDF Downloads 360
4043 The Antecedents of Facebook Check in Adoption Intention: The Perspective of Social Influence

Authors: Hsiu-Hua Cheng

Abstract:

Recently, the competition between websites becomes intense. How to make users “adopt” their websites is an issue of urgent importance for online communities companies. Social procedures (such as social influence) can possibly explain how and why users’ technologies usage behaviors affect other people to use the technologies. This study proposes two types of social influences on the initial usage of Facebook Check In-friends and group members. Besides, this study indicates that Facebook friends’ previous usage of Facebook Check In and Facebook group members’ previous usage of Facebook Check In will positively influence focal actors’ Facebook Check In adoption intention. The article concludes with contributions to academic research and practice.

Keywords: social influence, adoption intention, facebook check in, previous usage behavior

Procedia PDF Downloads 423
4042 Component Lifecycle and Concurrency Model in Usage Control (UCON) System

Authors: P. Ghann, J. Shiguang, C. Zhou

Abstract:

Access control is one of the most challenging issues facing information security. Access control is defined as, the ability to permit or deny access to a particular computational resource or digital information by an unauthorized user or subject. The concept of usage control (UCON) has been introduced as a unified approach to capture a number of extensions for access control models and systems. In UCON, an access decision is determined by three factors: Authorizations, obligations and conditions. Attribute mutability and decision continuity are two distinct characteristics introduced by UCON for the first time. An observation of UCON components indicates that, the components are predefined and static. In this paper, we propose a new and flexible model of usage control for the creation and elimination of some of these components; for example new objects, subjects, attributes and integrate these with the original UCON model. We also propose a model for concurrent usage scenarios in UCON.

Keywords: access control, concurrency, digital container, usage control

Procedia PDF Downloads 299
4041 A Human Activity Recognition System Based on Sensory Data Related to Object Usage

Authors: M. Abdullah, Al-Wadud

Abstract:

Sensor-based activity recognition systems usually accounts which sensors have been activated to perform an activity. The system then combines the conditional probabilities of those sensors to represent different activities and takes the decision based on that. However, the information about the sensors which are not activated may also be of great help in deciding which activity has been performed. This paper proposes an approach where the sensory data related to both usage and non-usage of objects are utilized to make the classification of activities. Experimental results also show the promising performance of the proposed method.

Keywords: Naïve Bayesian, based classification, activity recognition, sensor data, object-usage model

Procedia PDF Downloads 294
4040 A Multi Cordic Architecture on FPGA Platform

Authors: Ahmed Madian, Muaz Aljarhi

Abstract:

Coordinate Rotation Digital Computer (CORDIC) is a unique digital computing unit intended for the computation of mathematical operations and functions. This paper presents a multi-CORDIC processor that integrates different CORDIC architectures on a single FPGA chip and allows the user to select the CORDIC architecture to proceed with based on what he wants to calculate and his/her needs. Synthesis show that radix 2 CORDIC has the lowest clock delay, radix 8 CORDIC has the highest LUT usage and lowest register usage while Hybrid Radix 4 CORDIC had the highest clock delay.

Keywords: multi, CORDIC, FPGA, processor

Procedia PDF Downloads 443
4039 Media Usage, Citizenship Norms, and Political Participation of Transition to Democracy in Indonesia

Authors: Najmuddin Najmuddin

Abstract:

The purpose of this study is to determine whether media usage and change of citizenship norms influence political participation. The focus of this study is to examine citizenship norms in the context of the development of information, and communication technology and how it will impact political participation in the context of Indonesia's transition to democracy. The study use survey method. The main theoretical framework is media and political participation. The results of this study reveal that gender, age and educational background of the respondents did not influence significantly media usage and citizenship norms. The Results also show that educational background is not a factor that distinguishes media usage but it becomes differentiating factor in citizenship norms. The results further show that the media usage has a significant correlation with citizenship norms and citizenship norms has a significant relationship with political participation. In addition, media usage and citizenship norms impact significantly to political participation. The sub-dimensions of citizenship norms (compliance, duty, and engaged citizen) provides a significant contribution to the sub-dimensions of political participation (traditional political participation, modern political participation, civic political participation). Based on the findings it can be concluded that the political euphoria in the era of transition to democracy has changed pattern media usage and citizenship norms of among the young generation.

Keywords: media, citizenship, norms, political, participation, democracy

Procedia PDF Downloads 319
4038 Social Media Use’s Influence on Self-Perception

Authors: Bob Wang

Abstract:

This study investigates the impact of social media usage on Chinese adolescents’ appearance anxiety. A total of 366 respondents were surveyed online about their self-perception regarding appearance and their social media usage. Each individual participant was asked about the type and frequency of social media usage as well as their opinion on statements regarding appearance anxiety. Participants were also asked to give short answers about their coping mechanism with appearance anxiety. Social media usage had a complex relationship with appearance anxiety, as most individuals acknowledged the appearance-related pressure generated by social media but also showed resilience towards appearance anxiety. Results suggest a wide impact of appearance anxiety on Chinese adolescents and highlight the person-specific resilience mechanisms adopted by those youths.

Keywords: appearance anxiety, self-perception, social media, coping mechanisms

Procedia PDF Downloads 23
4037 The Effects of Prolonged Social Media Use on Student Health: A Focus on Computer Vision Syndrome, Hand Pain, and Headaches and Mental Status

Authors: Augustine Ndudi Egere, Shehu Adamu, Esther Ishaya Solomon

Abstract:

As internet accessibility and smartphones continue to increase in Nigeria, Africa’s most populous country, social media platforms have become ubiquitous, causing students of 18-25 age brackets to spend more time on social media. The research investigated the impact of prolonged social media use on the physical health of students, with a specific focus on computer vision syndrome, hand pain, headaches and mental status. The study adopted a mixed-methods approach combining quantitative surveys to gather statistical data on usage patterns and symptoms, along with qualitative interviews into the experiences and perceptions of medical practitioners concerning cases under study within the geopolitical region. The result was analyzed using Regression analysis. It was observed that there is a significant correlation between social media usage by the students in the study age bracket concerning computer vision syndrome, hand pain, headache and general mental status. The research concluded by providing valuable insights into potential interventions and strategies to mitigate the adverse effects of excessive social media use on student well-being and recommends, among others, that educational institutions, parents, and students themselves collaborate to implement strategies aimed at promoting responsible and balanced use of social media.

Keywords: social media, student health, computer vision syndrome, hand pain, headaches, mental staus

Procedia PDF Downloads 10
4036 Road Traffic Psychology: A Survey of Seat Belt Usage among Drivers in Ogbomoso, Oyo State, Nigeria

Authors: I. T. Adebayo, J. R. Aworemi, V. A. Ogundele, O. J. Babalola, J. O. Ajayi

Abstract:

The behavior of road users is a critical element in road safety. However, despite the proven effectiveness of the seat belt in reducing injury severity, some drivers still do not use the seat belt. The study, therefore, examined seat belt usage among drivers in Ogbomoso, Oyo State, Nigeria. Face-to-face surveys were conducted to elicit data on seat belt usage and road behaviors on 54,038 drivers plying the General-Lautech Road in Ogbomoso over a period of six months. Data collected were analyzed using both descriptive and inferential statistics. Findings revealed that seat belt usage was moderate among private car drivers in the morning (52.75 percent) and much lower in the evening (37.67 percent), while less than 30 percent of the commercial bus/taxi drivers used the seat during both periods. The paired T-test revealed a significant difference in seat belt usage by all the drivers in the morning and in the evening, as indicated with a T value of 113.977 and the level of significance p < 0.05. The study concluded that there is a significant difference in the usage of the seat belt by both private car and commercial bus/taxi drivers in Ogbomoso as most drivers made use of the seat belt, especially in the morning, to avoid being delayed when flagged down and fined for non-compliance with seat belt usage by the road traffic law enforcement agents. However, most of the drivers cited inadequate/lack of enforcement of compulsory use of seat belts by the relevant agencies and discomfort as the major reasons for not using the seat belt while driving.

Keywords: drivers, road , seat belt, traffic psychology

Procedia PDF Downloads 157
4035 The Attitude of High School Teachers in Saudi Arabia towards Computers: Qualitative Study

Authors: Manal O. Alothman, Judy Robertson

Abstract:

Teachers can play a huge role in encouraging students to use computers and can affect students’ attitudes towards computers. So understanding teachers’ beliefs and their use of computers is an important way to create effective motivational systems for teachers to use computers in the classroom in an effective way.A qualitative study (6 focus group) was carried out among Saudi High school teachers, both male and female, to examine their attitudes towards computers and to find out their computer skills and usage. The study showed a gender difference in that females were less likely to attend computer workshops, females also had less computer skills, and they have more negative attitudes towards computers than males. Also, the study found that low computer skills in the classroom made students unlikely to have the lessons presented using computers. Furthermore, the study found some factors that affected teachers’ attitudes towards computers. These factors were computer experience and confidence as much having skills and good experience in computer use, the role and importance of computers had become in their life and in teaching as well.

Keywords: attitude, education, student, teacher, technology

Procedia PDF Downloads 269
4034 Impact of Social Media Usage and Psychological Absenteeism at Workplace on Job Performance

Authors: Quaid Farooq, Zainab Mujtaba

Abstract:

The main aim of this paper was to conduct a research regarding social media usage, psychological absenteeism and job performance at workplace in Pakistan. This research examined the effects of social media usage and psychological absenteeism at workplace on job performance of employees. It was a popular belief that social media usage and psychological absenteeism at workplace have a negative relation with job performance. However, to date there was no study to support this argument, and this compelled us to choose this topic and find out the results. Secondly, this research also found effect of social media usage on psychological absenteeism. Despite the theoretical appeal of these variables and significance in today’s workplace environment, no previous study has investigated the relationship between them in detail. Data was collected from a sample (N = 100 paired responses) of employees and supervisors from different organizations in Pakistan. Study results indicate that performance is negatively related to psychological absenteeism, and such individuals were rated as exhibiting low performance level by their supervisors. However, it had no significant relationship with social media. Moreover, psychological absenteeism was positively related to social media. Individuals, who used more social media at workplace, were more psychologically absent at work according to our results.

Keywords: employee, job performance, psychological absenteeism, social media

Procedia PDF Downloads 361
4033 Expert System: Debugging Using MD5 Process Firewall

Authors: C. U. Om Kumar, S. Kishore, A. Geetha

Abstract:

An Operating system (OS) is software that manages computer hardware and software resources by providing services to computer programs. One of the important user expectations of the operating system is to provide the practice of defending information from unauthorized access, disclosure, modification, inspection, recording or destruction. Operating system is always vulnerable to the attacks of malwares such as computer virus, worm, Trojan horse, backdoors, ransomware, spyware, adware, scareware and more. And so the anti-virus software were created for ensuring security against the prominent computer viruses by applying a dictionary based approach. The anti-virus programs are not always guaranteed to provide security against the new viruses proliferating every day. To clarify this issue and to secure the computer system, our proposed expert system concentrates on authorizing the processes as wanted and unwanted by the administrator for execution. The Expert system maintains a database which consists of hash code of the processes which are to be allowed. These hash codes are generated using MD5 message-digest algorithm which is a widely used cryptographic hash function. The administrator approves the wanted processes that are to be executed in the client in a Local Area Network by implementing Client-Server architecture and only the processes that match with the processes in the database table will be executed by which many malicious processes are restricted from infecting the operating system. The add-on advantage of this proposed Expert system is that it limits CPU usage and minimizes resource utilization. Thus data and information security is ensured by our system along with increased performance of the operating system.

Keywords: virus, worm, Trojan horse, back doors, Ransomware, Spyware, Adware, Scareware, sticky software, process table, MD5, CPU usage and resource utilization

Procedia PDF Downloads 388
4032 Linking Remittances and Household Level Development in India: An Analysis of NSSO 64th Round Data

Authors: Rakesh Mishra, Mukunda Upadhyay, Rajni Singh

Abstract:

This paper attempts to link remittances sent by internal as well as international out-migrants and its domestic preferences of usage in three different dimension of Household level development in India and its states. Investment of remittances in these sectors reveals for mixed choices of preferential among the states from where people have out-migrated. The multivariate analysis implies that among all three indicators of human development, health (Investment in Food and Health) is the one that attracts the major investment followed by capital formation and least on Education. Usage of the remittances has been found to be varying across all the states in India as far as usage in health, capital formation and education are concerned. Orissa, Nagaland, Madhya Pradesh, Jharkhand, Gujarat, D & H Haweli are some of the states and union territory that contributes highest of its international remittances on health, while most of the usage of the internal remittances has second or third preferences of investment on the health except for Uttar Pradesh, D & H Haweli, Arunachal Pradesh and A & N Is. This paper tries to access usage of international remittances as well as internal remittances on the flow of remittances at the micro level and its implications across three basic determinants of Human Development that is Health, Capital formation and Education coupled with the preferences of usage in presence of Several Socio economic and Demographic variable.

Keywords: multivariate analysis, household development, remittances, internal and international migration

Procedia PDF Downloads 418
4031 The Cadmium Adsorption Study by Using Seyitomer Fly Ash, Diatomite and Molasses in Wastewater

Authors: N. Tugrul, E. Moroydor Derun, E. Cinar, A. S. Kipcak, N. Baran Acarali, S. Piskin

Abstract:

Fly ash is an important waste, produced in thermal power plants which causes very important environmental pollutions. For this reason the usage and evaluation the fly ash in various areas are very important. Nearly, 15 million tons/year of fly ash is produced in Turkey. In this study, usage of fly ash with diatomite and molasses for heavy metal (Cd) adsorption from wastewater is investigated. The samples of Seyitomer region fly ash were analyzed by X-ray fluorescence (XRF) and Scanning Electron Microscope (SEM) then diatomite (0 and 1% in terms of fly ash, w/w) and molasses (0-0.75 mL) were pelletized under 30 MPa of pressure for the usage of cadmium (Cd) adsorption in wastewater. After the adsorption process, samples of Seyitomer were analyzed using Optical Emission Spectroscopy (ICP-OES). As a result, it is seen that the usage of Seyitomer fly ash is proper for cadmium (Cd) adsorption and an optimum adsorption yield with 52% is found at a compound with Seyitomer fly ash (10 g), diatomite (0.5 g) and molasses (0.75 mL) at 2.5 h of reaction time, pH:4, 20ºC of reaction temperature and 300 rpm of stirring rate.

Keywords: heavy metal, fly ash, molasses, diatomite, adsorption, wastewater

Procedia PDF Downloads 273
4030 Internet Usage Behavior on Mobile Phones of the Faculty of Management Science Students at Suan Sunandha Rajabhat University

Authors: Arpapron Phokajang

Abstract:

The objectives of this research were to study the internet usage, including; date, time, description of using service, network service, telephone charge, and to study the internet usage behavior on mobile phones of the Faculty of Management Science students at Suan Sunandha Rajabhat University. The samples consisted of 395 students from the Faculty of Management Science. Questionnaires were used for collecting the data. Descriptive statistics used in this research including percentage, mean, and standard deviation. The findings of this research found that most respondents were female, aged between 21 and 25 years old, used the monthly AIS network service calls on Monday to Friday around 6.01-12.00 p.m., the internet usage behavior on mobile phones for entertainment was found in the highest level in all aspects, and education, business and commerce, and communication were found in the moderate level and using the internet to watch YouTube in the highest level also.

Keywords: faculty of management science, internet usage behavior, mobile phones, Suan Sunandha Rajabhat University

Procedia PDF Downloads 218
4029 Modeling Usage Patterns of Mobile App Service in App Market Using Hidden Markov Model

Authors: Yangrae Cho, Jinseok Kim, Yongtae Park

Abstract:

Mobile app service ecosystem has been abruptly emerged, explosively grown, and dynamically transformed. In contrast with product markets in which product sales directly cause increment in firm’s income, customer’s usage is less visible but more valuable in service market. Especially, the market situation with cutthroat competition in mobile app store makes securing and keeping of users as vital. Although a few service firms try to manage their apps’ usage patterns by fitting on S-curve or applying other forecasting techniques, the time series approaches based on past sequential data are subject to fundamental limitation in the market where customer’s attention is being moved unpredictably and dynamically. We therefore propose a new conceptual approach for detecting usage pattern of mobile app service with Hidden Markov Model (HMM) which is based on the dual stochastic structure and mainly used to clarify unpredictable and dynamic sequential patterns in voice recognition or stock forecasting. Our approach could be practically utilized for app service firms to manage their services’ lifecycles and academically expanded to other markets.

Keywords: mobile app service, usage pattern, Hidden Markov Model, pattern detection

Procedia PDF Downloads 307
4028 The Usage of Adobe in Historical Structures of Van City

Authors: Mustafa Gülen, Eylem Güzel, Soner Guler

Abstract:

The studies concentrated on the historical background of Van show the fact that Van has had a significant position as a settlement since ancient times and that it has hosted many civilizations during history. With the dominance of Ottoman Empire in 16th century, the region had been re-constructed by building new walls at the southern side of Van Castle. These construction activities had mostly been fulfilled by the usage of adobe which had been a fundamental material for thousands of years. As a result of natural disasters, battles and the move at the threshold of 20th century to the new settlement which is 9 kilometers away from the Ancient City Van is an open-air museum with the ruins of churches, mosques and baths. In this study, the usage of adobe in historical structures of Van city is evaluated in detail.

Keywords: historical structures, adobe, Van city, adobe

Procedia PDF Downloads 586
4027 Analysis of User Data Usage Trends on Cellular and Wi-Fi Networks

Authors: Jayesh M. Patel, Bharat P. Modi

Abstract:

The availability of on mobile devices that can invoke the demonstrated that the total data demand from users is far higher than previously articulated by measurements based solely on a cellular-centric view of smart-phone usage. The ratio of Wi-Fi to cellular traffic varies significantly between countries, This paper is shown the compression between the cellular data usage and Wi-Fi data usage by the user. This strategy helps operators to understand the growing importance and application of yield management strategies designed to squeeze maximum returns from their investments into the networks and devices that enable the mobile data ecosystem. The transition from unlimited data plans towards tiered pricing and, in the future, towards more value-centric pricing offers significant revenue upside potential for mobile operators, but, without a complete insight into all aspects of smartphone customer behavior, operators will unlikely be able to capture the maximum return from this billion-dollar market opportunity.

Keywords: cellular, Wi-Fi, mobile, smart phone

Procedia PDF Downloads 340
4026 Scheduling Method for Electric Heater in HEMS considering User’s Comfort

Authors: Yong-Sung Kim, Je-Seok Shin, Ho-Jun Jo, Jin-O Kim

Abstract:

Home Energy Management System (HEMS) which makes the residential consumers contribute to the demand response is attracting attention in recent years. An aim of HEMS is to minimize their electricity cost by controlling the use of their appliances according to electricity price. The use of appliances in HEMS may be affected by some conditions such as external temperature and electricity price. Therefore, the user’s usage pattern of appliances should be modeled according to the external conditions, and the resultant usage pattern is related to the user’s comfortability on use of each appliances. This paper proposes a methodology to model the usage pattern based on the historical data with the copula function. Through copula function, the usage range of each appliance can be obtained and is able to satisfy the appropriate user’s comfort according to the external conditions for next day. Within the usage range, an optimal scheduling for appliances would be conducted so as to minimize an electricity cost with considering user’s comfort. Among the home appliance, electric heater (EH) is a representative appliance which is affected by the external temperature. In this paper, an optimal scheduling algorithm for an electric heater (EH) is addressed based on the method of branch and bound. As a result, scenarios for the EH usage are obtained according to user’s comfort levels and then the residential consumer would select the best scenario. The case study shows the effects of the proposed algorithm compared with the traditional operation of the EH, and it also represents impacts of the comfort level on the scheduling result.

Keywords: load scheduling, usage pattern, user’s comfort, copula function, branch and bound, electric heater

Procedia PDF Downloads 555
4025 The Relationship between Mobile Phone Usage and Secondary School Students’ Academic Performance: Work Experience at an International School

Authors: L. N. P. Wedikandage, Mohamed Razmi Zahir

Abstract:

Technology is a global imperative because of its contributions to human existence and because it has improved global socioeconomic relations. As a result, the mobile phone has become the most important mode of communication today. Smartphones, Internet-enabled devices with built-in computer software and applications, are one of the most significant inventions of the twenty-first century. Technology is advantageous to many people, especially those involved in education. It is an important learning tool for today's schoolchildren. It enables students to access online learning platforms and course resources and interact digitally. Senior secondary students, in particular, have some of the most expensive and sophisticated mobile phones, tablets, and iPads capable of connecting to the internet and various social media platforms, other websites, and so on. At present, the use of mobile phones' potential for effective teaching and learning is growing. This is due to the benefits of mobile learning, including the ability to share knowledge without any limits in space or Time and the capacity to facilitate the development of critical thinking, participatory learning, problem-solving, and the development of lifelong communication skills. However, it is yet unclear how mobile devices may affect education and how they may affect opportunities for learning. As a result, the purpose of this research was to ascertain the relationship between mobile phone usage and the academic Performance of secondary-level students at an international school in Sri Lanka. The study's sample consisted of 523 secondary-level students from an international school, ranging from Form 1 to Upper 6. For the study, a survey research design and questionnaires were used. Google Forms was used to create the students' survey. There were three hypotheses tested to find out the relationship between mobile phone usage and academic preference. The findings show that there is a positive relationship between mobile phone usage and academic performance among secondary school students (the number of students obtaining simple passes is significantly higher when mobile phones are being used for more than 7 hours), no relationship between mobile phone usage and academic performance among secondary school students of different parents' occupations, and a relationship between the frequency of mobile phone usage and academic performance among secondary school students.

Keywords: mobile phone, academic performance, secondary level, international schools

Procedia PDF Downloads 59
4024 Trends of Change of Political Participation of Young Voters in Indonesia

Authors: Najmuddin Rasul

Abstract:

The purpose of this study is to determine whether media usage and change of citizenship norms influence trends of change of political participation of young voters in Indonesia. The focus of this study is to examine citizenship norms in the context of the development of information and communication technology influence political participation in the context of Indonesia's transition to democracy. The main theoretical framework is media and political participation. For data gathering, 384 young voters between the ages of 17 to 40 years were interviewed in Padang, West Sumatra, Indonesia. The results of this study reveal that gender, age and educational background of respondents did not influence significantly media usage and citizenship norms. The results also show that educational background is not a factor that distinguishes media usage but it becomes differentiating factor in citizenship norms. The results further show that media usage has a significant correlation with citizenship norms and citizenship norms has a significant relationship with political participation. In addition, media usage and citizenship norm significantly influence political participation. The sub-dimensions the citizenship norms (compliance, duty, and engaged citizenship) provides a significant contribution to the sub-dimensions of political participation (traditional political participation, modern political participation, civic political participation). Based on the findings it can be concluded that the political euphoria in the era of transition to democracy has changed pattern of media usage and citizenship norms among the young generation in Indonesia.

Keywords: political participation, media, citizenship norms, democracy, young voters, Indonesia

Procedia PDF Downloads 179
4023 Discovering User Behaviour Patterns from Web Log Analysis to Enhance the Accessibility and Usability of Website

Authors: Harpreet Singh

Abstract:

Finding relevant information on the World Wide Web is becoming highly challenging day by day. Web usage mining is used for the extraction of relevant and useful knowledge, such as user behaviour patterns, from web access log records. Web access log records all the requests for individual files that the users have requested from the website. Web usage mining is important for Customer Relationship Management (CRM), as it can ensure customer satisfaction as far as the interaction between the customer and the organization is concerned. Web usage mining is helpful in improving website structure or design as per the user’s requirement by analyzing the access log file of a website through a log analyzer tool. The focus of this paper is to enhance the accessibility and usability of a guitar selling web site by analyzing their access log through Deep Log Analyzer tool. The results show that the maximum number of users is from the United States and that they use Opera 9.8 web browser and the Windows XP operating system.

Keywords: web usage mining, web mining, log file, data mining, deep log analyzer

Procedia PDF Downloads 221