Search results for: secondary users.
1424 Total Quality Management: The Socio- Demographic and Operational-Financial Determinants for Users- Perception of the Services Quality
Authors: H. Silvestre
Abstract:
The aim of this paper is to know the sociodemographic and operational-financial determinants of the services quality perceived by users of the national health services. Through the use of an inquiry conducted by the Ministry of Health, comprehending 16.936 interviews in 2006, we intend to find out if there is any characteristic that determines the 2006 inquiry results. With the revision of the literature we also want to know if the operational-financial results have implications in hospitals users- perception on the quality of the received services. In order to achieve our main goals we will make use of the regression analysis to find out the possible dimensions that determine those results.Keywords: Management by Results, Quality Approach, Tableau de Bord, Total Quality Management, Services quality.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 14151423 Students’ Views on Mathematics Learning: A Cross-Sectional Survey of Senior Secondary Schools Students in Katsina State of Nigeria
Authors: Fahad Suleiman
Abstract:
The aim of this paper is to study students’ view on mathematics learning in Katsina State Senior Secondary Schools of Nigeria, such as their conceptions of mathematics, attitudes toward mathematics learning, etc. A questionnaire was administered to a random sample of 1,225 senior secondary two (SS II) students of Katsina State in Nigeria. The data collected showed a clear picture of the hurdles that affect the teaching and learning of mathematics in our schools. Problems such as logistics and operational which include shortage of mathematics teachers, non–availability of a mathematics laboratory, etc. were identified. It also depicted the substantial trends of changing views and attitudes toward mathematics across secondary schools. Students’ responses to the conception of mathematics were consistent and they demonstrated some specific characteristics of their views in learning mathematics. This survey has provided useful information regarding students’ needs and aspirations in mathematics learning for curriculum planners and frontline teachers for future curriculum reform and implementation.Keywords: Attitude, education, mathematics, students.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 10701422 Evaluating per-user Fairness of Goal-Oriented Parallel Computer Job Scheduling Policies
Authors: Sangsuree Vasupongayya
Abstract:
Fair share objective has been included into the goaloriented parallel computer job scheduling policy recently. However, the previous work only presented the overall scheduling performance. Thus, the per-user performance of the policy is still lacking. In this work, the details of per-user fair share performance under the Tradeoff-fs(Tx:avgX) policy will be further evaluated. A basic fair share priority backfill policy namely RelShare(1d) is also studied. The performance of all policies is collected using an event-driven simulator with three real job traces as input. The experimental results show that the high demand users are usually benefited under most policies because their jobs are large or they have a lot of jobs. In the large job case, one job executed may result in over-share during that period. In the other case, the jobs may be backfilled for performances. However, the users with a mixture of jobs may suffer because if the smaller jobs are executing the priority of the remaining jobs from the same user will be lower. Further analysis does not show any significant impact of users with a lot of jobs or users with a large runtime approximation error.Keywords: deviation, fair share, discrepancy search, priority scheduling.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 13581421 Toward Community-Based Personal Cloud Computing
Authors: Weichang Du
Abstract:
This paper proposes a new of cloud computing for individual computer users to share applications in distributed communities, called community-based personal cloud computing (CPCC). The paper also presents a prototype design and implementation of CPCC. The users of CPCC are able to share their computing applications with other users of the community. Any member of the community is able to execute remote applications shared by other members. The remote applications behave in the same way as their local counterparts, allowing the user to enter input, receive output as well as providing the access to the local data of the user. CPCC provides a peer-to-peer (P2P) environment where each peer provides applications which can be used by the other peers that are connected CPCC.
Keywords: applications, cloud computing, services, software.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 20591420 Analyzing Behaviour of the Utilization of the Online News Clipping Database: Experience in Suan Sunandha Rajabhat University
Authors: Siriporn Poolsuwan, Kanyarat Bussaban
Abstract:
This research aims to investigate and analyze user’s behaviour towards the utilization of the online news clipping database at Suan Sunandha Rajabhat University, Thailand. Data is gathered from 214 lecturers and 380 undergraduate students by using questionnaires. Findings show that most users knew the online news clipping service from their friends, library’s website and their teachers. The users learned how to use it by themselves and others learned by training of SSRU library. Most users used the online news clipping database one time per month at home and always used the service for general knowledge, up-to-date academic knowledge and assignment reference. Moreover, the results of using the online news clipping service problems include the users themselves, service management, service device- computer and tools – and the network, service provider, and publicity. This research would be benefit for librarians and teachers for planning and designing library services in their works and organization
Keywords: Online Database, User Behaviour.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16271419 An Algorithm for Secure Visible Logo Embedding and Removing in Compression Domain
Authors: Hongyuan Li, Guang Liu, Yuewei Dai, Zhiquan Wang
Abstract:
Digital watermarking is the process of embedding information into a digital signal which can be used in DRM (digital rights managements) system. The visible watermark (often called logo) can indicate the owner of the copyright which can often be seen in the TV program and protects the copyright in an active way. However, most of the schemes do not consider the visible watermark removing process. To solve this problem, a visible watermarking scheme with embedding and removing process is proposed under the control of a secure template. The template generates different version of watermarks which can be seen visually the same for different users. Users with the right key can completely remove the watermark and recover the original image while the unauthorized user is prevented to remove the watermark. Experiment results show that our watermarking algorithm obtains a good visual quality and is hard to be removed by the illegally users. Additionally, the authorized users can completely remove the visible watermark and recover the original image with a good quality.Keywords: digital watermarking, visible and removablewatermark, secure template, JPEG compression
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15401418 Visualizing Transit Through a Web Based Geographic Information System
Authors: Ricardo Hoar
Abstract:
Currently in many major cities, public transit schedules are disseminated through lists of routes, grids of stop times and static maps. This paper describes a web based geographic information system which disseminates the same schedule information through intuitive GIS techniques. Using data from Calgary, Canada, an map based interface has been created to allow users to see routes, stops and moving buses all at once. Zoom and pan controls as well as satellite imagery allows users to apply their personal knowledge about the local geography to achieve faster, and more pertinent transit results. Using asynchronous requests to web services, users are immersed in an application where buses and stops can be added and removed interactively, without the need to wait for responses to HTTP requests.Keywords: Geographic Information Systems, Public Transit, WebServices, AJAX, Human Computer Interface
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 18731417 A Framework for Personalized Multi-Device Information Communicating System
Authors: Rohiza Ahmad, Rozana Kasbon, Eliza Mazmee Mazlan, Aliza Sarlan
Abstract:
Due to the mobility of users, many information systems are now developed with the capability of supporting retrieval of information from both static and mobile users. Hence, the amount, content and format of the information retrieved will need to be tailored according to the device and the user who requested for it. Thus, this paper presents a framework for the design and implementation of such a system, which is to be developed for communicating final examination related information to the academic community at one university in Malaysia. The concept of personalization will be implemented in the system so that only highly relevant information will be delivered to the users. The personalization concept used will be based on user profiling as well as context. The system in its final state will be accessible through cell phones as well as intranet connected personal computers.Keywords: System framework, personalization, informationcommunicating system, multi-device.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 13901416 Interest of the Sequences Pseudo Noises Codes of Different Lengths for the Reduction from the Interference between Users of CDMA Network
Authors: Nerguè Kassahan Kone, Souleymane Oumtanaga
Abstract:
The third generation (3G) of cellular system adopted the spread spectrum as solution for the transmission of the data in the physical layer. Contrary to systems IS-95 or CDMAOne (systems with spread spectrum of the preceding generation), the new standard, called Universal Mobil Telecommunications System (UMTS), uses long codes in the down link. The system is conceived for the vocal communication and the transmission of the data. In particular, the down link is very important, because of the asymmetrical request of the data, i.e., more remote loading towards the mobiles than towards the basic station. Moreover, the UMTS uses for the down link an orthogonal spreading out with a variable factor of spreading out (OVSF for Orthogonal Variable Spreading Factor). This characteristic makes it possible to increase the flow of data of one or more users by reducing their factor of spreading out without changing the factor of spreading out of other users. In the current standard of the UMTS, two techniques to increase the performances of the down link were proposed, the diversity of sending antenna and the codes space-time. These two techniques fight only fainding. The receiver proposed for the mobil station is the RAKE, but one can imagine a receiver more sophisticated, able to reduce the interference between users and the impact of the coloured noise and interferences to narrow band. In this context, where the users have long codes synchronized with variable factor of spreading out and ignorance by the mobile of the other active codes/users, the use of the sequences of code pseudo-noises different lengths is presented in the form of one of the most appropriate solutions.Keywords: DS-CDMA, multiple access interference, ratio Signal / interference + Noise.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 13551415 Practical Problems as Tools for the Development of Secondary School Students’ Motivation to Learn Mathematics
Authors: M. Rodionov, Z. Dedovets
Abstract:
This article discusses plausible reasoning use for solution to practical problems. Such reasoning is the major driver of motivation and implementation of mathematical, scientific and educational research activity. A general, practical problem solving algorithm is presented which includes an analysis of specific problem content to build, solve and interpret the underlying mathematical model. The author explores the role of practical problems such as the stimulation of students' interest, the development of their world outlook and their orientation in the modern world at the different stages of learning mathematics in secondary school. Particular attention is paid to the characteristics of those problems which were systematized and presented in the conclusions.
Keywords: Mathematics, motivation, secondary school, student, practical problem.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 10681414 How to Connect User Research and not so Forthcoming Technology Scenarios – The Extended Home Environment Case Study
Authors: E. Guercio, A. Marcengo, A. Rapp
Abstract:
This paper draws a methodological framework adopted within an internal Telecomitalia project aimed to identify, on a user centred base, the potential interest towards a technological scenario aimed to extend on a personal bubble the typical communication and media fruition home environment. The problem is that involving user in the early stage of the development of such disruptive technology scenario asking users opinions on something that users actually do not manage even in a rough manner could lead to wrong or distorted results. For that reason we chose an approach that indirectly aim to understand users hidden needs in order to obtain a meaningful picture of the possible interest for a technological proposition non yet easily understandable.
Keywords: Personas, focus groups, scenarios, extended home environment, telecommunication, media.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15961413 Acceptance of Mobile Learning: a Respecification and Validation of Information System Success
Authors: Chin-Cheh Yi, Pei-Wen Liao, Chin-Feng Huang, I-Hui Hwang
Abstract:
With the proliferation of mobile computing technology, mobile learning (m-learning) will play a vital role in the rapidly growing electronic learning market. However, the acceptance of m-learning by individuals is critical to the successful implementation of m-learning systems. Thus, there is a need to research the factors that affect users- intention to use m-learning. Based on an updated information system (IS) success model, data collected from 350 respondents in Taiwan were tested against the research model using the structural equation modeling approach. The data collected by questionnaire were analyzed to check the validity of constructs. Then hypotheses describing the relationships between the identified constructs and users- satisfaction were formulated and tested.
Keywords: m-learning, information system success, users' satisfaction, perceived value.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 19971412 Strategies for Connectivity Configuration to Access e-Learning Resources: Case of Rural Secondary Schools in Tanzania
Authors: F. Simba, L. Trojer, N.H. Mvungi, B.M. Mwinyiwiwa, E.M. Mjema
Abstract:
In response to address different development challenges, Tanzania is striving to achieve its fourth attribute of the National Development Vision, i.e. to have a well educated and learned society by the year 2025. One of the most cost effective methods that can reach a large part of the society in a short time is to integrate ICT in education through e-learning initiatives. However, elearning initiatives are challenged by limited or lack of connectivity to majority of secondary schools, especially those in rural and remote areas. This paper has explores the possibility for rural secondary school to access online e-Learning resources from a centralized e- Learning Management System (e-LMS). The scope of this paper is limited to schools that have computers irrespective of internet connectivity, resulting in two categories schools; those with internet access and those without. Different connectivity configurations have been proposed according to the ICT infrastructure status of the respective schools. However, majority of rural secondary schools in Tanzania have neither computers nor internet connection. Therefore this is a challenge to be addressed for the disadvantaged schools to benefit from e-Learning initiatives.
Keywords: connectivity, configuration, e-Learning, replication, rural.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 19741411 Organic Contribution on Particles Formed on Pacific Ocean: From Phytoplankton Blooms to Climate
Authors: Petri Vaattovaara, Luke Cravigan, Zoran Ristovski, Marc Mallet, Ari Laaksonen, Sarah Lawson, Nick Talbot, Gustavo Olivares, Mike Harvey, Cliff Law
Abstract:
These SOAP project Pacific Ocean measurements reveal that phytoplankton blooms with sunny conditions make possible secondary organic contribution to ultrafine particles size and composition, and thus on cloud formation ability, and finally on climate. This is in agreement with other biologically active region observations about the presence of secondary organics even the exact fraction is also depending on the local marine life (e.g. plankton blooms, seaweeds, corals). An organic contribution is clearly needed to add to CLAW hypothesis.
Keywords: Climate, marine aerosols, phytoplankton, secondary organics, CLAW hypothesis.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 18411410 General Awareness of Teenagers in Information Security
Authors: Magdalena Naplavova, Tomas Ludik, Petr Hruza, Frantisek Bozek
Abstract:
The use of IT equipment has become a part of every day. However, each device that is part of cyberspace should be secured against unauthorized use. It is very important to know the basics of these security devices, but also the basics of safe conduct their owners. This information should be part of every curriculum computer science education in primary and secondary schools. Therefore, the work focuses on the education of pupils in primary and secondary schools on the Internet. Analysis of the current state describes approaches to the education of pupils in security issues on the Internet. The paper presents a questionnaire-based survey which was carried out in the Czech Republic, whose task was to ascertain the level of opinion pupils in primary and secondary schools on the issue of communication in social networks. The research showed that awareness of socio-pathological phenomena on the Internet environment is very low. Based on the results it was proposed appropriate ways of teaching to this issue and its inclusion a proposal of curriculum for primary and secondary schools.
Keywords: Cyberspace, educational system, general awareness, information security, questionnaire, socio-pathological phenomena.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 23571409 Collaborative Car Pooling System
Authors: João Ferreira, Paulo Trigo, Porfírio Filipe
Abstract:
This paper describes the architecture for a collaborative Car Pooling System based on a credits mechanism to motivate the cooperation among users. Users can spend the accumulated credits on parking facilities. For this, we propose a business model to support the collaboration between a car pooling system and parking facilities. The Portuguese Lisbon-s Metropolitan area is used as application scenario.
Keywords: Car Pooling, Collaboration, Sustainable Mobility
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 28801408 A Laser Point Interaction System Integrating Mouse Functions
Authors: Ching-Sheng Wang, Lun-Ping Hung, Sheng-Yu Peng, Li-Chieh Cheng
Abstract:
The computer has become an essential tool in modern life, and the combined use of a computer with a projector is very common in teaching and presentations. However, as typical computer operating devices involve a mouse or keyboard, when making presentations, users often need to stay near the computer to execute functions such as changing pages, writing, and drawing, thus, making the operation time-consuming, and reducing interactions with the audience. This paper proposes a laser pointer interaction system able to simulate mouse functions in order that users need not remain near the computer, but can directly use laser pointer operations from at a distance. It can effectively reduce the users- time spent by the computer, allowing for greater interactions with the audience.Keywords: laser pointer, presentation, interaction, mousefunction
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16601407 The Development of a Narrative Management System: Storytelling in Knowledge Management
Authors: Savita K.S, Hazwani H., Kalid K. S.
Abstract:
This paper presents a narrative management system for organizations to capture organization's tacit knowledge through stories. The intention of capturing tacit knowledge is to address the problem that comes with the mobility of workforce in organisation. Storytelling in knowledge management context is seen as a powerful management tool to communicate tacit knowledge in organization. This narrative management system is developed firstly to enable uploading of many types of knowledge sharing stories, from general to work related-specific stories and secondly, each video has comment functionality where knowledge users can post comments to other knowledge users. The narrative management system allows the stories to browse, search and view by the users. In the system, stories are stored in a video repository. Stories that were produced from this framework will improve learning, knowledge transfer facilitation and tacit knowledge quality in an organization.Keywords: Knowledge Management, Storytelling, Stories, Tacit Knowledge
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 24501406 Users- Motivation and Satisfaction with IS
Authors: Abbas Moshref Razavi, Rodina Ahmad
Abstract:
To motivate users to adopt and use information systems effectively, the nature of motivation should be carefully investigated. People are usually motivated within ongoing processes which include a chain of states such as perception, stimulation, motivation, actions and reactions and finally, satisfaction. This study assumes that the relevant motivation processes should be executed in a proper and continuous manner to be able to persistently motivate and re-motivate people in organizational settings and towards information systems. On this basis, the study attempts to propose possible relationships between this process-nature view of motivation in terms of the common chain of states and the nearly unique properties of information systems as is perceived by users in the sense of a knowledgeable and authoritative entity. In the conclusion section, some guidelines for practitioners are suggested to ease their tasks for motivating people to adopt and use information systems.Keywords: Information Systems, Satisfaction, Motivation
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 12961405 Learning and Relationships in the Cyberspace
Authors: Gioacchino Lavanco, Viviana Catania, Anna Milio, Floriana Romano
Abstract:
The cyberspace is an instrument through which internet users could get new experiences. It could contribute to foster one-s own growth, widening cognitive, creative and communicative abilities and promoting relationships. In the cyberspace, in fact, it is possible to create virtual learning communities where internet users improve their interpersonal sphere, knowledge and skills. The main element of e-learning is the establishment of online relationships, that are often collaborative.Keywords: Internet addiction, learner support, virtual relationships.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16731404 Curbing Cybercrime by Application of Internet Users’ Identification System (IUIS) in Nigeria
Authors: K. Alese Boniface, K. Adu Michael
Abstract:
Cybercrime is now becoming a big challenge in Nigeria apart from the traditional crime. Inability to identify perpetrators is one of the reasons for the growing menace. This paper proposes a design for monitoring internet users’ activities in order to curbing cybercrime. It requires redefining the operations of Internet Service Providers (ISPs) which will now mandate users to be authenticated before accessing the internet. In implementing this work which can be adapted to a larger scale, a virtual router application is developed and configured to mimic a real router device. A sign-up portal is developed to allow users to register with the ISP. The portal asks for identification information which will include bio-data and government issued identification data like National Identity Card number, et cetera. A unique username and password are chosen by the user to enable access to the internet which will be used to reference him to an Internet Protocol Address (IP Address) of any system he uses on the internet and thereby associating him to any criminal act related to that IP address at that particular time. Questions such as “What happen when another user knows the password and uses it to commit crime?” and other pertinent issues are addressed.
Keywords: Cybercrime, Sign-up Portal, Internet Service Provider (ISP), Internet Protocol Address (IP address).
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 22471403 Use of Persuasive Technology to Change End-Users- IT Security Aware Behaviour: A Pilot Study
Authors: Ai Cheo Yeo, Md. Mahbubur Rahim, Yin Ying Ren
Abstract:
Persuasive technology has been applied in marketing, health, environmental conservation, safety and other domains and is found to be quite effective in changing people-s attitude and behaviours. This research extends the application domains of persuasive technology to information security awareness and uses a theory-driven approach to evaluate the effectiveness of a web-based program developed based on the principles of persuasive technology to improve the information security awareness of end users. The findings confirm the existence of a very strong effect of the webbased program in raising users- attitude towards information security aware behavior. This finding is useful to the IT researchers and practitioners in developing appropriate and effective education strategies for improving the information security attitudes for endusers.Keywords: Information security, persuasive technology, ITsecurity-aware behaviour, theory of planned behaviour survey.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 24131402 Building Trust of Mobile Users and their Adoption of M-Commerce
Authors: Shafiq Ur Rehman, Jane-Lisa Coughlan
Abstract:
One challenging direction of mobile commerce (mcommerce) that is getting a great deal of attention globally is mobile financing. The smart-phone and PDA users all around the world are facing difficulties to become accustomed and trust in m-commerce. The main rationale can be the slow variation and lack of trust in mobile payment systems. Mobile payment systems that are in use need to be more effective and efficient. This paper proposes: the interface design is not the only factor affecting the m-commerce adoption and lack of trust; in fact it is the combined effect of interface usability and trustworthy mobile payment systems, because it-s the money that the user has to spend at the end of the day, which the user requires to get transferred securely. The purpose of this research is to identify the problems regarding the trust and adaption of m-commerce applications by mobile users and to provide the best possible solution with respect to human computer interaction (HCI) principles.Keywords: m-commerce, usability, mobile payment method, interface design.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 22471401 Usability in E-Commerce Websites: Results of Eye Tracking Evaluations
Authors: Beste Kaysı, Yasemin Topaloğlu
Abstract:
Usability is one of the most important quality attributes for web-based information systems. Specifically, for e-commerce applications, usability becomes more prominent. In this study, we aimed to explore the features that experienced users seek in e-commerce applications. We used eye tracking method in evaluations. Eye movement data are obtained from the eye-tracking method and analyzed based on task completion time, number of fixations, as well as heat map and gaze plot measures. The results of the analysis show that the eye movements of participants' are too static in certain areas and their areas of interest are scattered in many different places. It has been determined that this causes users to fail to complete their transactions. According to the findings, we outlined the issues to improve the usability of e-commerce websites. Then we propose solutions to identify the issues. In this way, it is expected that e-commerce sites will be developed which will make experienced users more satisfied.
Keywords: E-commerce websites, eye tracking method, usability, website evaluations.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 12731400 Web Proxy Detection via Bipartite Graphs and One-Mode Projections
Authors: Zhipeng Chen, Peng Zhang, Qingyun Liu, Li Guo
Abstract:
With the Internet becoming the dominant channel for business and life, many IPs are increasingly masked using web proxies for illegal purposes such as propagating malware, impersonate phishing pages to steal sensitive data or redirect victims to other malicious targets. Moreover, as Internet traffic continues to grow in size and complexity, it has become an increasingly challenging task to detect the proxy service due to their dynamic update and high anonymity. In this paper, we present an approach based on behavioral graph analysis to study the behavior similarity of web proxy users. Specifically, we use bipartite graphs to model host communications from network traffic and build one-mode projections of bipartite graphs for discovering social-behavior similarity of web proxy users. Based on the similarity matrices of end-users from the derived one-mode projection graphs, we apply a simple yet effective spectral clustering algorithm to discover the inherent web proxy users behavior clusters. The web proxy URL may vary from time to time. Still, the inherent interest would not. So, based on the intuition, by dint of our private tools implemented by WebDriver, we examine whether the top URLs visited by the web proxy users are web proxies. Our experiment results based on real datasets show that the behavior clusters not only reduce the number of URLs analysis but also provide an effective way to detect the web proxies, especially for the unknown web proxies.
Keywords: Bipartite graph, clustering, one-mode projection, web proxy detection.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 7521399 TFRank: An Evaluation of Users Importance with Fractal Views in Social Networks
Abstract:
One of research issues in social network analysis is to evaluate the position/importance of users in social networks. As the information diffusion in social network is evolving, it seems difficult to evaluate the importance of users using traditional approaches. In this paper, we propose an evaluation approach for user importance with fractal view in social networks. In this approach, the global importance (Fractal Importance) and the local importance (Topological Importance) of nodes are considered. The basic idea is that the bigger the product of fractal importance and topological importance of a node is, the more important of the node is. We devise the algorithm called TFRank corresponding to the proposed approach. Finally, we evaluate TFRank by experiments. Experimental results demonstrate our TFRank has the high correlations with PageRank algorithm and potential ranking algorithm, and it shows the effectiveness and advantages of our approach.Keywords: TFRank, Fractal Importance, Topological Importance, Social Network
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15211398 Thrust Vectoring Control of Supersonic Flow Through an Orifice Injector
Authors: Ibrahim Mnafeg, Azgal Abichou, Lotfi Beji
Abstract:
Traditional mechanical control systems in thrust vectoring are efficient in rocket thrust guidance but their costs and their weights are excessive. The fluidic injection in the nozzle divergent constitutes an alternative procedure to achieve the goal. In this paper, we present a 3D analytical model for fluidic injection in a supersonic nozzle integrating an orifice. The fluidic vectoring uses a sonic secondary injection in the divergent. As a result, the flow and interaction between the main and secondary jet has built in order to express the pressure fields from which the forces and thrust vectoring are deduced. Under various separation criteria, the present analytical model results are compared with the existing numerical and experimental data from the literature.Keywords: Flow separation, Fluidic thrust vectoring, Nozzle, Secondary jet, Shock wave.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 21351397 Factors Influencing the Continuance Usage of Online Mobile Payment Apps: A Case Study of WECHAT Users in China
Authors: Isaac Kofi Mensah, Jianing Mi, Feng Cheng
Abstract:
This research paper seeks to investigate the factors determining the continuance usage of online mobile payment applications among WECHAT users in China. Technology Acceptance Model (TAM) and the Diffusion of Innovation (DOI) theory would both be applied as the theoretical foundation for this study. A developed instrument would be administered to the targeted sample of 1000 WECHAT Users in the City of Harbin, China, through an online questionnaire administration platform. Factors such as perceived usefulness, perceived ease of use, perceived service quality, social influence, trust in the internet, internet self-efficacy, relative advantage, compatibility, and complexity would be explored to determine its significant impact on the continuance intention to use mobile payment apps. This study is at the development and implementation stage. The successful completion of this research article would not only provide an insightful understanding of the factors influencing the decision of WECHAT users in China to use mobile payment applications but also enrich the e-commerce adoption literature.
Keywords: Diffusion of innovation (DOI), e-commerce, mobile payment, technology acceptance model (TAM), WECHAT.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16271396 Secondary Science Teachers’ Views about Purposes of Practical Works in School Science
Authors: Kew-Cheol Shim, Sung-Hwan Moon, Ji-Hyon Kil, Kyoungho Kim
Abstract:
The purpose of this paper was to examine views of secondary school science teachers about purposes to use practical works in school science. The instrument to survey consisted eighteen items, which were categorized into four components as follows: ‘Scientific inquiry’, ‘Scientific knowledge’, ‘Science-related attitude’, and ‘STS (science-technology-society)’. Subjects were 152 secondary school science teachers (male 70 and female 82; middle school 50 and high school 102), who are teaching in 42 schools of 8 provinces. On the survey, science teachers were asked to answer on 5-point Lickert scale (from 1 to 5) how they thought of using practical works on purposes with domains of science objectives in school. They had positive views about using practical works for improving scientific inquiry process skills, science-related attitudes, and perceptions about STS literacy, and acquiring scientific knowledge. They would have the most willingness of using practical works for ‘Scientific Inquiry’ among domains of science objectives in school.
Keywords: Secondary school, science teacher, practical work, scientific inquiry, scientific knowledge, science-related attitude, STS.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 23271395 Electrokinetic Remediation of Uranium Contaminated Soil by Ion Exchange Membranes
Authors: Z. H. Shi, T. J. Dou, H. Zhang, H. X. Huang, N. Zeng
Abstract:
The contamination of significant quantities of soils and sediments with uranium and other actinide elements as a result of nuclear activity poses many environmental risks. The electrokinetic process is one of the most promising remediation techniques for sludge, sediment, and saturated or unsaturated soils contaminated with heavy metals and radionuclides. However, secondary waste is a major concern for soil contaminated with nuclides. To minimize the generation of secondary wastes, this study used the anion and cation exchange membranes to improve the performance of the experimental apparatus. Remediation experiments of uranium-contaminated soil were performed with different agents. The results show that using acetic acid and EDTA as chelating agents clearly enhances the migration ability of the uranium. The ion exchange membranes (IEMs) used in the experiments not only reduce secondary wastes, but also, keep the soil pH stable.Keywords: Electrokinetic remediation, ion exchange membranes, soil, uranium.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1409