To see the other types of publications on this topic, follow the link: USER'S AWARENESS.

Journal articles on the topic 'USER'S AWARENESS'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'USER'S AWARENESS.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Pinheiro, Manuele Kirsch, and Carine Souveyet. "Is Group-Awareness Context-Awareness?" International Journal of e-Collaboration 15, no. 3 (July 2019): 1–19. http://dx.doi.org/10.4018/ijec.2019070101.

Full text
Abstract:
This article discusses the interest of emerging a unified view for group awareness and context information on groupware and context-aware systems. Group awareness corresponds to an important concept on Groupware applications, allowing individual users to be kept aware of group's activities and status. Context is defined by ubiquitous computing as any relevant information that can be used to characterize the situation of an entity. We assume that group awareness information should be considered as context information and handled as such. Group awareness information is often employed for decision making, contributing to users' activities and decisions, but it gives also an important clue about user's context, characterizing individual's actions regarding the group. As such, group awareness may be used for adaptation purposes, adapting the system behavior, the supplied content or its services. Besides, architectural concerns adopted on context-aware system should also be considered when developing new groupware applications that are more and more designed as context-aware systems.
APA, Harvard, Vancouver, ISO, and other styles
2

Rahman, Dr Akim M., and Saadi Islam. "Social-Costs Perspective Impacts of Cybercrime in World-Economy, Country-Wise: Policy-Guidance under Piecemeal Approach." Information Management and Business Review 13, no. 2(I) (November 3, 2021): 43–55. http://dx.doi.org/10.22610/imbr.v13i2(i).3229.

Full text
Abstract:
Today’s technology-driven human-society(s) country-wise are counted more than ever before where UAE-society is no exception. Tech-users here compete for comparative time-saving options for marginalizing operating costs. It has resulted in huge data usages, a high number of users & devices, which has attracted criminals for taking advantage, which is called cybercrime. Addressing cybercrime, the UAE, like many countries, is not out of control by-laws. However, laws like cybercrime for its society are not always for absolutely eliminating the crime. Thus, besides cybercrime law in place, UAE needs a piecemeal approach in practice where one department may vary from approaches of other-department. With awareness about risky online behaviors & options, tech-users as defenders are needed to invest their efforts. This study has laid out the foundation of the proposal, Akim’s Model-2021, using the Theory of Consumer Choice & Behaviors and Welfare Analysis. Tech-user’s actual utility-received is the sum of utility-received from awareness & own-effort and utility-received from cybercrime-law. Any changes to services received from joint efforts may risk tech-user, to be a victim. Welfare analysis shows tech user's actions - awareness & own-effort, besides cybercrime-law can create, Net Social-gain, which largely depends on tech user's actions. Tech-user’s economic surplus is greater than government expenses for implementation of cybercrime law in UAE. Net-loss to the UAE is the sum of deadweight loss and net-loss to tech producers for underutilized resources.
APA, Harvard, Vancouver, ISO, and other styles
3

Noh, Younghee. "A study on next‐generation digital library using context‐awareness technology." Library Hi Tech 31, no. 2 (June 7, 2013): 236–53. http://dx.doi.org/10.1108/07378831311329031.

Full text
Abstract:
PurposeThis study seeks to examine the concepts of context, context‐awareness, and context‐awareness technology needed for applying context‐awareness technology to the next‐generation of digital libraries, and proposed context‐aware services that can be applied to any situation by illustrating some library contexts.Design/methodology/approachThe paper investigated both theoretical research and case analysis studies before suggesting a service model for context‐awareness‐based libraries by examining the context, context‐awareness, and context‐awareness technology in depth.FindingsThis paper derived possible library services which could be provided if context‐awareness services are implemented by examining and analyzing case studies and systems constructed in other fields. A library‐applied context‐aware system could recognize users entering the library and provide optimal services tailored to each situation for both new and existing users. In addition, the context‐awareness‐based library could provide context‐awareness‐based reference services, context‐awareness‐based loan services, and cater to other user needs in the stacks, research space, and a variety of other information spaces. The context‐awareness‐based library could also recognize users in need of emergency assistance by detecting the user's behavior, movement path, and temperature, etc. Comfort or climate‐control services could provide the user with control of the temperature, humidity, illumination and other environmental elements to fit the circumstances of users, books, and instruments through context‐aware technology.Practical implicationsNext‐generation digital libraries apply new concepts such as semantic retrieval, real‐time web, cloud computing, mobile web, linked data, and context‐awareness. Context‐awareness‐based libraries can provide applied context‐awareness access service, reactive space according to the user's access, applied context‐awareness lobbies, applied context‐awareness reference services, and applied context‐awareness safety services, context‐awareness‐based comfort services and so on.Originality/valueReal instances of libraries applying context‐aware technology are few, according to the investigative results of this study. The study finds that the next‐generation digital library using context‐awareness technology can provide the best possible service for the convenience of its users.
APA, Harvard, Vancouver, ISO, and other styles
4

Mijuskovic, Adriana, and Mexhid Ferati. "Cloud Storage Privacy and Security User Awareness." International Journal of Human Capital and Information Technology Professionals 7, no. 3 (July 2016): 1–18. http://dx.doi.org/10.4018/ijhcitp.2016070101.

Full text
Abstract:
There are many factors influencing the user awareness level of privacy and security concerns when storing data on the cloud. One such factor is the users' cultural background, which has been an inspiration to many studies comparing various cultures. Along those lines, this paper compares the user awareness level between Dutch and Macedonian users, which has not been investigated before. An online study was conducted to measure users' attitude towards privacy and security of data in the cloud-based systems. The research process was conducted by delivering an online survey to Computer Science students and employees working in different software companies in the Netherlands and Macedonia. The comparative analysis indicates that there are differences in user's attitude towards storing private data in the cloud. The results of this paper demonstrate that Dutch compared to Macedonian users in general have higher level of awareness regarding the privacy and security of cloud storage.
APA, Harvard, Vancouver, ISO, and other styles
5

Martínez Reyes, Fernando, and Chris Greenhalgh. "The User's Touch." International Journal of Advanced Pervasive and Ubiquitous Computing 1, no. 4 (October 2009): 14–28. http://dx.doi.org/10.4018/japuc.2009100102.

Full text
Abstract:
The home of the future will be able to offer comfortable, safe and supportive home spaces. Smart systems and artefacts will know users’ routines and anticipate their needs. While the vision of the home of the future is promissory, it is the user who supports UbiComp systems, but certain technical and social challenges must be addressed before the smart home can become a reality. Unexpected human behavior makes it difficult to identify and predict domestic activity. Thus, if a system is not reliable or trusted enough to take actions on behalf of users, context-aware designs must allow for user participation to support the systems’ performance. In this article, the authors use their experience designing a context-aware system to illustrate how the users’ “touch”, that is, their active involvement, is still a requirement for today’s UbiComp designs. The configurable system described supports parents awareness of their children’s activity. Responses from a user study indicate that parents engaged positively with this kind of mediated, rather than proactive, computing-based support.
APA, Harvard, Vancouver, ISO, and other styles
6

Wang, Jing, and Da Wei Chu. "Survey on Collaborative Awareness Model for CSCW and Trends of the New Age." Applied Mechanics and Materials 155-156 (February 2012): 357–62. http://dx.doi.org/10.4028/www.scientific.net/amm.155-156.357.

Full text
Abstract:
Currently Computer Supported Cooperative Work (CSCW) has become an important area of research in computer science. The main purpose of CSCW system is to support people interact cooperation, and collaborative awareness between users must be the basis for multi-user collaborative work, and each user's behavior or the operation of the shared object should be immediately perceived by other users. Therefore, collaborative awareness is one of the key issues to be resolved in CSCW system. In this paper, collaborative awareness models are the object of study, and we discussed the collaborative awareness models respectively based on space, role and event, and a lot of critical theories and techniques about them. The analysis of existing theory helped us to further understand various collaborative awareness models, to study the development trend of them, and establish the appropriate framework for collaborative awareness.
APA, Harvard, Vancouver, ISO, and other styles
7

Naga Malleswari, D., A. Dhavalya, V. Divya Sai, and K. Srikanth. "A detailed study on risk assessment of mobile app permissions." International Journal of Engineering & Technology 7, no. 1.1 (December 21, 2017): 297. http://dx.doi.org/10.14419/ijet.v7i1.1.9706.

Full text
Abstract:
Mobile phone have user’s personal and private information. When mobile applications have the permission to access to this information they may leak it to third parties without user’s consent for their own benefits. As users are not aware of how their personal information would be used once applications are installed and permissions are granted, this raises a potential privacy concern. Therefore, there is a need for a risk assessment model that can intimate the users about the threats the mobile application poses to the user's private information. We propose an approach that helps in increasing user’s awareness of the privacy risk involved with granting permissions to Android applications. The proposed model focuses on the requested permissions of the application and determines the risk based on the permission set asked and gives a risk score.
APA, Harvard, Vancouver, ISO, and other styles
8

Russell, I. "Registered designs: prior art and the informed user's 'design awareness'." Journal of Intellectual Property Law & Practice 8, no. 2 (January 24, 2013): 111–12. http://dx.doi.org/10.1093/jiplp/jps195.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ha, Sang-Won, and Hyoung-Joong Kim. "The Effects of User's Security Awareness on Password Security Behavior." Journal of Digital Contents Society 14, no. 2 (June 30, 2013): 179–89. http://dx.doi.org/10.9728/dcs.2013.14.2.179.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Morrison-Smith, Sarah, Lydia B. Chilton, and Jaime Ruiz. "AmbiTeam." XRDS: Crossroads, The ACM Magazine for Students 28, no. 2 (December 2021): 60–65. http://dx.doi.org/10.1145/3495265.

Full text
Abstract:
AmbiTeam is an ambient display designed to communicate contextual or background information in the periphery of the user's awareness and only requires the user's attention when it is appropriate or desired.
APA, Harvard, Vancouver, ISO, and other styles
11

Luo, Lili. "Text a librarian: a look from the user perspective." Reference Services Review 42, no. 1 (February 4, 2014): 34–51. http://dx.doi.org/10.1108/rsr-10-2012-0067.

Full text
Abstract:
Purpose – The aim of this paper is to provide an in-depth examination of the use and non-use of text reference service among library users, seeking to evaluate the service from library users' perspective and hence enhance the professional understanding of the best practices of text reference service. Design/methodology/approach – A survey study was conducted among library users, examining user demographics, user's texting behavior, user awareness of text reference service, and users' use or non-use of the service. Findings – Findings suggest that the majority of library users have not used the service and their non-use is primarily attributed to their lack of awareness. Users who have used the service report a high degree of satisfaction and appreciate the convenience, ease of use and speediness of the service. Practical implications – The paper helps interested libraries develop an enriched view of texting's affordance as a reference service venue and thus make more informed decisions in successfully implementing the service. Originality/value – Text reference is the most recent reference development and it does not have a large body of literature. Current reports are primarily of a single library's experience and rarely investigate users' experience with text reference service. This paper fills the void in the literature by presenting a thorough study of text reference service from the user's point-of-view.
APA, Harvard, Vancouver, ISO, and other styles
12

Modaresnezhad, Minoo, and Hamid Nemati. "Participatory Sensing or Sensing of Participation." International Journal of Technology and Human Interaction 16, no. 3 (July 2020): 124–43. http://dx.doi.org/10.4018/ijthi.2020070108.

Full text
Abstract:
Smart devices have become a basic necessity in this technically advanced era. Many smart device applications, when installed, collect personal data and track users' online behavior for marketing or other purposes. This study aims to explore whether users are aware of related privacy issues and whether their knowledge influences the usage of their apps. Cognate-based views of privacy indicate that privacy concern is dynamic and varies depending on an individual's characteristics and the context. Adopting this view creates the attempt to understand the effect of privacy awareness on user's behavior, considering the moderating effects of individual characteristics and application categories. The study was conducted by surveying smart devices' users and analyzing their responses to the privacy awareness treatment across eight groups of applications. Results indicate that privacy awareness impacts smart device user preferences for app usage. This influence varies depending on individual user characteristics and different application categories.
APA, Harvard, Vancouver, ISO, and other styles
13

Idoughi, Djilali, and Djeddi Abdelhakim. "Developing Countries E-Government Services Evaluation Identifying and Testing Antecedents of Satisfaction Case of Algeria." International Journal of Electronic Government Research 14, no. 1 (January 2018): 63–85. http://dx.doi.org/10.4018/ijegr.2018010104.

Full text
Abstract:
Because user's satisfaction is considered one of the most important factors in e-government success assessment, this study examines impacts of system quality, information quality, service quality, digital skills, access means, service awareness, trust, and perceived usefulness on expressed satisfaction about e-government services. Using survey, 1453 valid responses were collected from e-government services users across Algeria. The study empirical outcomes shows eight out of nine identified factors have significant impacts on users' satisfaction with e-government services.
APA, Harvard, Vancouver, ISO, and other styles
14

CEPERO GARCÍA, MARÍA TERESA, LUIS GERARDO MONTANE JIMENEZ, GUADALUPE TOLEDO TOLEDO, EDGARD IVAN BENITEZ GUERRERO, and CARMEN MEZURA GODOY. "HEURISTICS FOR AWARENESS SUPPORT IN GROUPWARE SYSTEMS." DYNA NEW TECHNOLOGIES 8, no. 1 (March 1, 2021): [11 p.]. http://dx.doi.org/10.6036/nt9980.

Full text
Abstract:
ABSTRACT: Groupware Systems (GS) or collaborative systems are software systems that support the development of activities in which a group of users interacts to combine their skills, abilities, and work to achieve a common goal. In this area, an important concept is awareness, which is the information that helps people be aware of events beyond their current tasks. This information makes smoother the use of a collaborative system, so it is a fundamental element in this kind of software. In the design and construction of these types of systems, heuristics are used as design guidelines that serve as a useful evaluation tool for product designers and usability professionals. The current heuristics and guidelines for the design of awareness support focus on supporting the awareness of the team in the shared workspace, without considering elements to support the information needs of the user's own and individual interaction within the workspace. To address this problem and to facilitate the design and integration of awareness support, we developed 13 heuristics that integrate principles of Human-Computer Interaction and Computer Supported Cooperative Work to help groupware designers meet individual and team awareness needs. For evaluating the validity of the proposed heuristics, a structured and iterative consultation process was carried out with experts in Human-Computer Interaction and Computer-Supported Cooperative Work. The proposed heuristics can help software engineers develop collaborative systems that integrate awareness information and satisfy users' contextual information needs. Keywords: Awareness, virtual groups, collaborative work, heuristics.
APA, Harvard, Vancouver, ISO, and other styles
15

HongHyunjin, 강미희, 정대근, and Younghee Noh. "A Research on User's Awareness of Subject Guide of Korean Modern Literature." Journal of Korean Library and Information Science Society 46, no. 3 (September 2015): 381–405. http://dx.doi.org/10.16981/kliss.46.3.201509.381.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Jailani, Abdul Kadir. "ENJOYING CULTURAL HERITAGE EXPERIENCES AS INFORMAL LEARNING THROUGH USER'S NATIONALITY CONTEXT-AWARENESS." International Journal of E-Learning and Educational Technologies in the Digital Media 2, no. 3 (2016): 120–27. http://dx.doi.org/10.17781/p002211.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Bunnage, Rosemary. "Current Awareness from the User's Perspective: A Survey of Harvard Legal Academics." Legal Reference Services Quarterly 17, no. 4 (December 1999): 115–28. http://dx.doi.org/10.1300/j113v17n04_08.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Pal, Singh, Pankaj Mishra, and Ayesha Farooq. "An assessment of user's awareness about Indian telecom industry and their assessment of affordability of telecom services in India." Industrija 48, no. 3 (2020): 59–88. http://dx.doi.org/10.5937/industrija48-26035.

Full text
Abstract:
India announced its first National Telecom Policy in 1994 and since then its telecommunications Industry has witnessed tremendous growth. At a teledensity of 89.92% (TRAI 2019), it is the second largest telecom market in the world. The policy maker, Department of Telecommunication (DoT) and the regulator, Telecom Regulatory Authority of India (TRAI) have taken several initiatives to ensure affordable services to telecom users. TRAI also drives initiatives to increase the level of awareness about telecom industry among users. To analyse impact of these initiatives by TRAI and DoT, this study presents an objective assessment of user's awareness and their assessment of affordability of telecom services. A structured questionnaire is used to collect data by surveying a sample of 408 telecom users. It was found that half of the respondents were aware of DoT; more than half were aware of the regulator TRAI and Indian governments vision for telecommunications and 85% of survey respondents found telecom services affordable. The level of affordability varied across gender, age group and education levels. Through regression analysis, the study found that awareness about telecom industry influences users' assessment of service affordability. Hence, TRAI and DoT should take actions to increase the level of awareness, which will improve users' perception of affordability and may lead to increased adoption of telecom services. In addition, it is suggested that affordability of female users can be addressed through customized tariff plan and schemes.
APA, Harvard, Vancouver, ISO, and other styles
19

Ash, James. "Emerging Spatialities of the Screen: Video Games and the Reconfiguration of Spatial Awareness." Environment and Planning A: Economy and Space 41, no. 9 (January 1, 2009): 2105–24. http://dx.doi.org/10.1068/a41250.

Full text
Abstract:
In this paper I develop a nonrepresentational spatiality of screened images, in which space does not refer to the way space is represented in images or the spaces in which images exist. Instead it focuses on the spaces that images themselves produce. Drawing upon the technology of the screen as a contemporary site at which images are experienced, I argue for a dual conception of the ‘space’ of screened images: an existential space constructed through the background context of a user's relation with an image; and an ecological space constructed through the expressive relationship between body and screen. I use video games as an exemplar of these spaces to show how screened images reconfigure the relationship between touch and vision and how this alters users' spatial awareness of the world.
APA, Harvard, Vancouver, ISO, and other styles
20

Valadas, Ricardo Claudino, and Elizabeth Simão Carvalho. "Recommendation System for Sightseeing Tours." International Journal of Tourism and Hospitality Management in the Digital Age 4, no. 2 (July 2020): 34–54. http://dx.doi.org/10.4018/ijthmda.2020070104.

Full text
Abstract:
This research proposes a model of a recommendation system (RS) for tourist itineraries. The RS suggests tips of what to visit in a city, based on the available time, personal preferences, current geo-location, and the user's context awareness. These suggestions are calculated based on the treatment of collected data in real time by external application programming interfaces, through a list of points of interest located within a radius that can be reached by the user. Preliminary tests validated the model's goals and its potential in the tourism sector. The RS for tourist itineraries proposed is based on four essential points, in order to make the experience different and well as possible: end-user's personal tastes, the time available, end-user's current location, and context awareness. The performance tests that were carried out brought very positive results and showed that the RS presented a number of requisitions proportional to the server response times and algorithm. The functionality tests were quite positive, with percentages of experience of using the RS between 62.5% and 100%.
APA, Harvard, Vancouver, ISO, and other styles
21

Ping, Jin Zhen, Li Li Yu, Qian Wang, and Xue Fang Wu. "Effective Analysis Method of Mobile Cloud Computing." Applied Mechanics and Materials 644-650 (September 2014): 1980–83. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.1980.

Full text
Abstract:
Mobile cloud computing has become a new paradigm, because of rapid growth of mobile devices such as smart mobile phone performance and cloud computing. This mobile cloud environment, with various kinds of service and IT resources according to the user's requirements, effectively provides services and IT resources are necessary. Therefore, in this paper we propose the use of frequency mobile cloud based analysis and filtering method of computing resources to distribute resources and services to users based on context-awareness information. Introduction
APA, Harvard, Vancouver, ISO, and other styles
22

Endsley, Mica R., Cheryl A. Bolstad, Debra G. Jones, and Jennifer M. Riley. "Situation Awareness Oriented Design: From User's Cognitive Requirements to Creating Effective Supporting Technologies." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 47, no. 3 (October 2003): 268–72. http://dx.doi.org/10.1177/154193120304700304.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Alkhurayyif, Yazeed. "Users' Information Security Awareness of Home Closed-Circuit Television Surveillance." Journal of Information Security and Cybercrimes Research 6, no. 1 (June 15, 2023): 12–23. http://dx.doi.org/10.26735/vfko2846.

Full text
Abstract:
Closed-circuit television (CCTV) surveillance cameras are widely used in public and private areas around the world. It is primarily used for tracking individuals and preventing criminal activities. It is necessary to balance the benefits of video surveillance and the risks it poses to individuals' right to privacy. The existing studies raised privacy issues of installing CCTV in public places. However, there is a lack of studies investigating users’ awareness of information security and privacy limitations in installing CCTV in private places. Thus, in this study, the author evaluated users' information security awareness of the value of CCTV and other forms of video surveillance. In-person interviews were conducted in Riyadh province, Kingdom of Saudi Arabia. A total of 77 individuals responded to the interview. A qualitative analysis was conducted to evaluate the participants’ perception of CCTV usage. The outcome of the analysis revealed four themes: Privacy invasion, privacy awareness, dilemmas in implementing security, and preventive measures. The findings revealed that the participants required strict privacy policies for installing CCTV video monitoring systems in private areas. In addition, they understood that CCTV is effectively reducing the fear of crime. The research contributes to understanding users' general awareness of information security and offers the necessary steps to protect the user's privacy in a CCTV surveillance environment. In addition, a data-sharing framework is recommended to share the data in a secure environment. Furthermore, researchers can utilize the study findings in conducting further similar investigative studies.
APA, Harvard, Vancouver, ISO, and other styles
24

Marino, David, Max Henry, Pascal E. Fortin, Rachit Bhayana, and Jeremy Cooperstock. "I See What You're Hearing: Facilitating The Effect of Environment on Perceived Emotion While Teleconferencing." Proceedings of the ACM on Human-Computer Interaction 7, CSCW1 (April 14, 2023): 1–15. http://dx.doi.org/10.1145/3579495.

Full text
Abstract:
Our perception of emotion is highly contextual. Changes in the environment can affect our narrative framing, and thus augment our emotional perception of interlocutors. User environments are typically heavily suppressed due to the technical limitations of commercial videoconferencing platforms. As a result, there is often a lack of contextual awareness while participating in a video call, and this affects how we perceive the emotions of conversants. We present a videoconferencing module that visualizes the user's aural environment to enhance awareness between interlocutors. The system visualizes environmental sound based on its semantic and acoustic properties. We found that our visualization system was about 50% effective at eliciting emotional perceptions in users that was similar to the response elicited by environmental sound it replaced.The contributed system provides a unique approach to facilitate ambient awareness on an implicit emotional level in situations where multimodal environmental context is suppressed.
APA, Harvard, Vancouver, ISO, and other styles
25

Roseway, Asta, Yuliya Lutchyn, Paul Johns, Elizabeth Mynatt, and Mary Czerwinski. "BioCrystal." International Journal of Mobile Human Computer Interaction 7, no. 3 (July 2015): 20–41. http://dx.doi.org/10.4018/ijmhci.2015070102.

Full text
Abstract:
In this paper the authors present the BioCrystal – a biofeedback device that uses physiological data to evaluate user's affective states in real-time and signals the states via an ambient display. The authors evaluated the BioCrystal during a 2-week, in situ multi-method study during which ten users collected over 115 hours of usable data. Users' comments suggested high utility of such a biofeedback device for self-awareness, stress-management and interpersonal communication. Quantitative data confirmed that the BioCrystal met the criteria of an ambient display, and significantly improved users' ability to control their stress. The authors discuss practical applications and suggest directions for future development.
APA, Harvard, Vancouver, ISO, and other styles
26

More, Vivek, Viren Koli, Vignesh Vijaykumar, and Vimla Jethani. "Chatbot for Mental Well-being." ITM Web of Conferences 40 (2021): 03019. http://dx.doi.org/10.1051/itmconf/20214003019.

Full text
Abstract:
With the world becoming more and more competitive every passing day, the number of people suffering from stress and other mental health issues is exponentially increasing. Even school children and senior citizens are becoming victims of stress and pressure in today's world. The mental health of an individual is as important as physical health is. But unfortunately, there is a lack of awareness and proper mental health facilities in today's society, which demands the individuals to fight against their odds without any support. Therefore, we propose a solution in the form of a chatbot that will act as a medium for the users to communicate with, let out their feelings and thus get relieved of the stress that is clogged up. A chatbot application will be available at all times at the user's expense and will also keep track of the user's mood over a span of time.
APA, Harvard, Vancouver, ISO, and other styles
27

Jasti, Katyayani, and Chadalavada Varalakshmi. "MEASUREMENT OF USERS ACCEPTANCE OF SELECTED FINANCIAL TECHNOLOGY PRODUCTS AND SERVICES." International Journal of Professional Business Review 8, no. 2 (February 27, 2023): e01530. http://dx.doi.org/10.26668/businessreview/2023.v8i2.1530.

Full text
Abstract:
Purpose: The goal of this study is to determine the degree to which users accept particular financial technology products and services by taking into account a variety of variables, including frequency of use, level of awareness, satisfaction, motivation for using fintech, satisfaction with that motivation, and behavioural intention to use fintech. Theoretical Framework: There is relatively little literature now accessible to examine the degree of consumer acceptance of Financial Technology products and services. The field of financial technology still requires a lot of research and education, though. Design/Methodology/Approach: A comprehensive evaluation of the literature served as the basis for the research design. Data gathering techniques include non-probability sampling (quota sampling). Users of particular Financial Technology products and services are queried using a standardised questionnaire to gather data. The 13 districts of Andhra Pradesh state were used as the source of the samples. Findings: The data is analysed using techniques such as regression and Anova. The frequency of use, level of satisfaction, level of awareness, the intended use of the Fintech, the satisfaction with the intended use and the user's behavioural intention to use the Fintech all statistically significantly correlate with the user's level of acceptance in using the chosen Financial Technology products and services. Research, Practical & Social implications: This study determined the degree to which users accepted particular Financial Technology goods and services from diverse angles. Originality/Value: This study aims to identify and quantify the effects of numerous variables on users' degree of acceptability of Fintech, including frequency of use, awareness and satisfaction levels, as well as the use of Fintech for specific purposes and behavioural intentions. Internet banking, NEFT, RTGS, IMPS, mobile banking, electronic wallets, stock trading applications, peer-to-peer lending applications, crowd funding, cash deposit machines, ATMs, and credit rating applications are the 12 Financial Technology products used in the study.
APA, Harvard, Vancouver, ISO, and other styles
28

Purski, Michał. "DESIGNING SPACE IN MARTYROLOGY FACILITIES, CEMETERY AND CREMATORY IN EUROPE." Space&FORM 2020, no. 50 (June 30, 2022): 195–210. http://dx.doi.org/10.21005/pif.2022.50.b-07.

Full text
Abstract:
The article presents research on the conscious shaping of the space of martyrology objects, cemeteries and crematoriums in Europe. In his research, the author focused on the elements of architectural and urban composition, as well as spatial treatments experienced by users on three levels: pre-narrative, proton-narrative and procedural narratives of the unconscious (Dimaggio, Semerari, 2001, 14: 1-23), as based solely on the user's sensual experience. Selected elements influencing the user were divided into three categories: inducing action, focusing attention or inducing a reaction, and building awareness of space.
APA, Harvard, Vancouver, ISO, and other styles
29

Purski, Michał. "DESIGNING SPACE COMPOSITION IN MARTYROLOGY FACILITIES, CREMATORY AND CEMENTERY IN EUROPE." Space&FORM 2022, no. 49 (January 30, 2022): 95–112. http://dx.doi.org/10.21005/pif.2022.49.c-02.

Full text
Abstract:
The article presents research on the conscious shaping of the space of martyrology objects, cemeteries and crematoriums in Europe. In his research, the author focused on the elements of architectural and urban composition, as well as spatial treatments experienced by users on three levels: pre-narrative, proton-narrative and procedural narratives of the unconscious (Dimaggio, Semerari, 2001, 14: 1-23), as based solely on the user's sensual experience. Selected elements influencing the user were divided into three categories: inducing action, focusing attention or inducing a reaction, and building awareness of space.
APA, Harvard, Vancouver, ISO, and other styles
30

Almubarak, Hameed, Mohamed Khairallah Khouja, and Ahmed Jedidi. "Security and privacy recommendation of mobile app for Arabic speaking." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 5 (October 1, 2022): 5191. http://dx.doi.org/10.11591/ijece.v12i5.pp5191-5203.

Full text
Abstract:
<p>There is an enormous number of mobile apps, leading users to be concerned about the security and privacy of their data. But few users are aware of what is meant by app permissions, which sometimes do not illustrate what kind of data is gathered. Therefore, users are still concerned about security risks and privacy, with little knowledge and experience of what security and privacy awareness. Users depend on ratings, which may be fake, or keep track of their sense to install an app, and an enormous number of users do not like to read reviews. To solve this issue, we propose a recommender system that reads users' reviews, and which exposes flaws, violations and third-party policies or the quality of a user's experience. In order to design and implement our recommender, we conduct a survey which supports two significant points: to detect the level of security and privacy awareness between users, and to gather new words into a dictionary of a recommender system, which assists to classify each review on the correct level, which can indeed reveal the scale of security and privacy in an app.</p>
APA, Harvard, Vancouver, ISO, and other styles
31

Yonezawa, Tomoko, Hirotake Yamazoe, Akira Utsumi, and Shinji Abe. "Anthropomorphic awareness of partner robot to user's situation based on gaze and speech detection." International Journal of Autonomous and Adaptive Communications Systems 5, no. 1 (2012): 18. http://dx.doi.org/10.1504/ijaacs.2012.044782.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Xin, Mingjun, Yanhui Zhang, Shunxiang Li, Liyuan Zhou, and Weimin Li. "A Location-Context Awareness Mobile Services Collaborative Recommendation Algorithm Based on User Behavior Prediction." International Journal of Web Services Research 14, no. 2 (April 2017): 45–66. http://dx.doi.org/10.4018/ijwsr.2017040103.

Full text
Abstract:
Nowadays, location based services (LBS) has become one of the most popular applications with the rapid development of mobile Internet technology. More and more research is focused on discovering the required services among massive information according to the personalized behavior. In this paper, a collaborative filtering (CF) recommendation algorithm is presented based on the Location-aware Hidden Markov Model (LHMM). This approach includes three main stages. First, it clusters users by making a pattern similarity calculation of their historical check-in data. Then, it establishes the location-aware transfer matrix so as to get the next most similar service. Furthermore, it integrates the generated LHMM, user's score and interest migration into the traditional CF algorithm so as to generate a final recommendation list. The LHMM-based CF algorithm mixes the geographic factors and personalized behavior and experimental results show that it outperforms the state-of-the-art algorithms on both precision and recall.
APA, Harvard, Vancouver, ISO, and other styles
33

Jiang, J. W., J. W. Li, J. S. Wei, and Z. P. Su. "INTELLIGENT SERVICE PUSH METHOD BASED ON ACTIVE GEOGRAPHIC PERCEPTION." ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLII-3/W10 (February 7, 2020): 245–48. http://dx.doi.org/10.5194/isprs-archives-xlii-3-w10-245-2020.

Full text
Abstract:
Abstract. In view of the lack of consideration of user behavior motives in traditional personalized precision service systems, the accuracy of service content is not high.In order to solve this problem, research on personalized accurate service push method based on active geographic perception. By constructing a geographic feature information model, get the characteristics of the user's destination in real time, and then infer the user's behavioral motivation. Focusing on active geographic awareness technology and personalized precision service methods, the concept, principle, process and key technologies of active geographic sensing are studied, determined the main research content of active geographic perception and the relationship. Then analyze and discuss the construction method of active geographic awareness architecture, developed a geographic feature content system and studied its extraction and weight calculation methods. By the way, according to the characteristics of active geo-sensing, an active awareness API conforming to high efficiency and real-time is designed. Then explored the personalized accurate service push method based on active geographic perception,designed three processes of geographic awareness, service retrieval and service push, a service retrieval and delivery method is proposed. Finally, a personalized precise service system based on active geographical perception is designed. By adding geographic features to the personalized precision service, it can make up for the lack of service personalization and lack of precision caused by ignoring user motivation, which provides a new idea for more accurate and personalized service push.
APA, Harvard, Vancouver, ISO, and other styles
34

Habinata, Habinata, Rachmat Agusli, and Detin Sofia. "Expert System Prediction of Covid-19 Transmission Vulnerability using Forward Chaining." JURNAL SISFOTEK GLOBAL 13, no. 1 (March 31, 2023): 46. http://dx.doi.org/10.38101/sisfotek.v13i1.3504.

Full text
Abstract:
Covid-19 is a pandemic that is currently sweeping the world, where the number of infected victims has reached millions. The sudden outbreak of the Covid-19 pandemic has caused unprepared communities to panic and worry, although there are also those who are indifferent or unconcerned about this contagious disease, which is a major factor in the rapid spread of the virus. This study aims to build a system to predict the vulnerability of users to contracting Covid-19 through an expert system application. The expert system method uses forward chaining to determine the user's vulnerability level based on factors used and inputted by the user. The large number of patients who still do not believe in the existence of Covid-19 and the spread of hoax news complicates the handling of Covid-19. With an expert system that predicts vulnerability to contracting the Covid-19 virus as a tool, it can increase awareness among low-awareness communities and reduce the spread of the Covid-19 virus.
APA, Harvard, Vancouver, ISO, and other styles
35

Awad Saad Al-Qahtani, Mohammad Ayoub Khan, Awad Saad Al-Qahtani, Mohammad Ayoub Khan. "Predicting Internet of Things (IOT) Security and Privacy Risks – A Proposal Model: توقع مخاطر أمن وخصوصية إنترنت الأشياء (IOT) – نموذج مقترح بحثي." Journal of engineering sciences and information technology 5, no. 3 (September 30, 2021): 133–12. http://dx.doi.org/10.26389/ajsrp.q070621.

Full text
Abstract:
The Internet of things (IOT) users lack awareness of IOT security infrastructure to handle the risks including Threats, attack and penetration associated with its use. IOT devices are main targets for cyber-attacks due to variable personally identifiable information (PII) stored and transmit in the cyber centers. The security risks of the Internet of Things aimed to damage user's security and privacy. All information about users can be collected from their related objects which are stored in the system or transferred through mediums among diverse smart objects and may exposed to exposed dangerous of attacks and threats if it lack authentication so there are essential need to make IOT security requirements as important part of its efficient implementation. These requirements include; availability, accountability, authentication, authorization, privacy and confidentiality, Integrity and Non-repudiation. The study design is a survey research to investigate the visibility of the proposed model of security management for IOT uses, the security risks of IOT devices, and the changes IOT technology on the IT infrastructure of IOT users through answering of the research questionnaires. This work proposes a model of security management for IOT to predict IOT security and privacy threats, protect IOT users from any unforeseen dangers, and determine the right security mechanisms and protocols for IOT security layers, as well as give the most convenient security mechanisms. Moreover, for enhancing the performance of IOT networks by selecting suitable security mechanisms for IOT layers to increase IOT user's security satisfaction.
APA, Harvard, Vancouver, ISO, and other styles
36

Shi, Quan. "Guardians of Privacy: Understanding the European Union's Framework for Biometric Data Protection." International Journal of Biology and Life Sciences 3, no. 1 (May 30, 2023): 59–61. http://dx.doi.org/10.54097/ijbls.v3i1.9669.

Full text
Abstract:
With the growing prevalence of biometric technology, individual traits are being stored in an increasing number of databases. Users must maintain a high degree of awareness regarding biometric data security. It's important not to provide biometric details without thorough consideration of its necessity, scrutinizing the existing security measures, and understanding the track record of any entity requesting such information. The laws and regulations concerning this matter vary widely depending on the user's location. The European Union is renowned for its stringent personal data protection laws and robust security standards, imposing reporting responsibilities on any entity that collects and requests user data. This article will delve into the regulations and policies surrounding biometric data protection within the European Union.
APA, Harvard, Vancouver, ISO, and other styles
37

Mamun, Mostofa, Roslina Othman, and Zahidah Zulkifli. "Knowledge Management: Determine the Influencing Factors for Practicing at the Libraries in Bangladesh." Journal of Education Culture and Society 14, no. 1 (June 20, 2023): 672–96. http://dx.doi.org/10.15503/jecs2023.1.672.696.

Full text
Abstract:
Aim. The main objective of this research is to know the influencing factors for KM practices in the library field of Bangladesh from the user's point of view. Therefore, the study examines the elements influencing Knowledge Management (KM) practice in Bangladeshi university libraries. Methods. Present research used a quantitative approach, by adopting printed survey questionnaire for data collection from the users of the University of Dhaka (DU) and the University of Rajshahi (RU) in Bangladesh. Statistical software IBM®-SPSS® was used for data analysis, and the "partial least squares" (PLS) method was used to test the proposed hypothesis. Results. The findings revealed that KM familiarity and perceptions in gender and current study level varied across users. This study found that all the proposed hypotheses are supported, i.e., the service quality and critical success factors are the most influencing factors for practicing KM in the DU and RU library. Conclusions. The findings provide valuable insights regarding awareness about KM practices and assist university authorities in formulating relevant policies and taking necessary actions for KM practices in libraries. Originality. The present research is one of the first research in Bangladesh that identified the influencing factors of KM from the user’s point of view.
APA, Harvard, Vancouver, ISO, and other styles
38

Siolas, Giorgos, George Caridakis, Phivos Mylonas, Giorgos Stratogiannis, Stefanos Kollias, and Andreas Stafylopatis. "Context-Aware User Modeling and Semantic Interoperability in Smart Home Environments." International Journal of Virtual Communities and Social Networking 7, no. 3 (July 2015): 17–50. http://dx.doi.org/10.4018/ijvcsn.2015070102.

Full text
Abstract:
The current paper provides an overview on how user modeling, context awareness and content adaptation in Smart Home environments may be handled formally in order to capture the semantics that emerge from a newly introduced user experience: SandS is in fact a complete ecosystem of users within a social network, creating and exchanging content in the form of so-called recipes and developing a collective intelligence which adapts its operation through appropriate feedback provided by the user. The authors will approach SandS from the user's perspective and illustrate how users and their relationships can be modeled through a number of fuzzy stereotypical profiles. Additionally, context modeling in pervasive computing systems and especially in the Smart Home paradigm will be examined through appropriate representation of context cues in the overall interaction. Finally, the authors will investigate how users and system services although using languages of different semantic expressiveness can inter-operate successfully thanks to appropriate knowledge-based expert mappings.
APA, Harvard, Vancouver, ISO, and other styles
39

Huang, Ruixin, Jiatian Li, and Qi Luo. "Bias in Search Engine: the Case of Google and a Workshop Solution." Theoretical and Natural Science 5, no. 1 (May 25, 2023): 156–62. http://dx.doi.org/10.54254/2753-8818/5/20230347.

Full text
Abstract:
The search engine (SE) is a senseless artificial program. SE matches the user's information demands with the input information and then provides an ordered list of answers. However, the outputs are frequently subjected to bias, which can affect the depiction of issues like gender inequality. Studies have shown that search engines may unconsciously inherit biases from their creators and users throughout their life cycle. In this paper, focused on Google as our research case, we evaluate and summarize different factors that can lead to the bias issue. The factors are depicted in computer science social domains. And in response to these causes, we propose a workshop idea to raise awareness of the problem of search engine discrimination, especially regarding gender issues. Based on our current workshop solution, we also list some potential improvements.
APA, Harvard, Vancouver, ISO, and other styles
40

Arendt, Florian. "Suicide on Instagram – Content Analysis of a German Suicide-Related Hashtag." Crisis 40, no. 1 (January 2019): 36–41. http://dx.doi.org/10.1027/0227-5910/a000529.

Full text
Abstract:
Abstract. Background: Suicide is the second leading cause of death among 15–29-year-olds globally. Unfortunately, the suicide-related content on Instagram, a popular social media platform for youth, has not received the scholarly attention it deserves. Method: The present study provides a content analysis of posts tagged as #selbstmord, a German suicide-related hashtag. These posts were created between July 5 and July 11, 2017. Results: Approximately half of all posts included words or visuals related to suicide. Cutting was by far the most prominent method. Although sadness was the dominant emotion, self-hate and loneliness also appeared regularly. Importantly, inconsistency – a gap between one's inner mental state (e.g., sadness) and one's overtly expressed behavior (e.g., smiling) – was also a recurring theme. Conversely, help-seeking, death wishes, and professional awareness–intervention material were very rare. An explorative analysis revealed that some videos relied on very fast cutting techniques. We provide tentative evidence that users may be exposed to purposefully inserted suicide-related subliminal messages (i.e., exposure to content without the user's conscious awareness). Limitations: We only investigated the content of posts on one German hashtag, and the sample size was rather small. Conclusion: Suicide prevention organizations may consider posting more awareness–intervention materials. Future research should investigate suicide-related subliminal messages in social media video posts. Although tentative, this finding should raise a warning flag for suicide prevention scholars.
APA, Harvard, Vancouver, ISO, and other styles
41

Rajabu, Neema. "Interactive Health Information Chatbot for Non-Communicable Diseases in Swahili Language." Journal of Applied Science, Information and Computing 1, no. 2 (December 31, 2020): 32–38. http://dx.doi.org/10.59568/jasic-2020-1-2-05.

Full text
Abstract:
Current health awareness campaign strategies, efforts, and methods on NCDs have not produced improved outcomes in reducing the burden, spread, and deaths linked to NCDs in Tanzania. To support, compliment, and improve health literacy on NCDs and promote good healthcare, we designed and developed an interactive health Chatbot ‘afyaBot’ in Swahili language that can respond to user's requests concerning NCDs symptoms, prevention, management, and cure. The Chatbot was designed using Botsociety; a special tool for designing Chatbot prototypes; BotMan framework for coding the Chatbot logic and Google Dialogflow platform that offers high-level Natural Language Processing capabilities. The Chatbot was integrated into the Facebook Messenger platform which offers free public API access that eliminates the cost of the internet from the consumers. The Chatbot was tested for accuracy, usability, user experience, responsiveness, reliability, maintainability, and portability. The results of implementation were satisfactory and provide insights useful to stakeholders in the health sector. The interactive Chatbot was designed to provide real-time information on NCDs, create awareness, and educate users on preventive, control, and treatment measures of NCDs. It will likewise assist healthcare providers to collect accurate timely health data for monitoring, planning, and research purpose.
APA, Harvard, Vancouver, ISO, and other styles
42

Bouras, Christos, Vasileios Triglianos, and Thrasyvoulos Tsiatsos. "Implementing Advanced Characteristics of X3D Collaborative Virtual Environments for Supporting e-Learning." International Journal of Distance Education Technologies 12, no. 1 (January 2014): 13–37. http://dx.doi.org/10.4018/ijdet.2014010102.

Full text
Abstract:
Three dimensional Collaborative Virtual Environments are a powerful form of collaborative telecommunication applications, enabling the users to share a common three-dimensional space and interact with each other as well as with the environment surrounding them, in order to collaboratively solve problems or aid learning processes. Such an environment is “EVE Training Area tool” which is supported by “EVE platform”. This tool is a three-dimensional space where participants, represented by three-dimensional humanoid avatars, can use a variety of e-collaboration tools. This paper presents advanced functionality that has been integrated on “EVE Training Area tool” in order to support: (a) multiple collaborative learning techniques (b) Spatial audio conferencing, which is targeted to support principle 3 (augmenting user's representation and awareness). Furthermore the paper presents technological and implementation issues concerning the evolution of “EVE platform” in order to support this functionality.
APA, Harvard, Vancouver, ISO, and other styles
43

Kim, Bon-Young, Seog-Jun Lee, and Yu-Kun Hahm. "The Study on the Difference between the Organization's Performance and User's Awareness by the Improvement of Information Quality." Journal of Information Systems 21, no. 2 (June 30, 2012): 1–25. http://dx.doi.org/10.5859/kais.2012.21.2.1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Filby, Alex, Wendy Robertson, and Eugenia Afonso. "A service evaluation of a specialist migrant maternity service from the user's perspective." British Journal of Midwifery 28, no. 9 (September 2, 2020): 652–59. http://dx.doi.org/10.12968/bjom.2020.28.9.652.

Full text
Abstract:
Background Meeting the complex needs of pregnant migrants requires an innovative approach. Migrant women's experiences and opinions should directly guide service development if these needs are to be met effectively. Aims To evaluate the specialist migrant maternity service provided by Kings College Hospital London based upon users' experience and satisfaction. Methods A qualitative service evaluation via semi-structured, multi-lingual, in-depth interviews with 10 service users. Data was analysed using a general inductive approach for thematic analysis. Findings Positive aspects: access to midwife and referrals, provision of essentials and transport, respect and kindness of caregivers. Negative aspects: poor maternal nutrition, lack of access to hygienic infant-feeding equipment, lack of social support building and lack of service signposting. Conclusion Women conveyed a high level of satisfaction with the service. The negative aspects that persist are, arguably, not within the immediate remit of the maternity team, yet they negatively affect the health of these women, and therefore merit awareness raising if holistic care is to be achieved. Seven service recommendations have been made.
APA, Harvard, Vancouver, ISO, and other styles
45

Ullah, Sehat, Paul Richard, Samir Otmane, Mickael Naud, and Malik Mallem. "Human Performance in Cooperative Virtual Environments: the Effect of Visual Aids and Oral Communication." International Journal of Virtual Reality 8, no. 4 (January 1, 2009): 79–86. http://dx.doi.org/10.20870/ijvr.2009.8.4.2752.

Full text
Abstract:
The Cooperative virtual environments, where users simultaneously manipulate objects, are one of the subfields of Collaborative virtual environments (CVEs). In this paper we simulate the use of two string based parallel robots in cooperative teleoperation task. Two users setting on separate machines connected through local network operate each robot. In this context, we investigate the effects of visual aids and oral communication on cooperation, co-presence and users performance. Ten volunteers had to cooperatively perform a peg-in-hole task. A second group of ten subjects perform the same task in a single user setup. The objective of the two experiments is twofold, firstly to compare the task's complexity of single user setup with that of the cooperative environment. Secondly we examine the influence of visual aids and oral communication on user's performance in the two different setups. Results revealed that shadow has a significant effect on task execution while arrows and oral communication not only increase users' performance but also enhance the sense of co-presence and awareness. We also observed that cooperative manipulation was more difficult as compared to single user manipulation.
APA, Harvard, Vancouver, ISO, and other styles
46

Miyashita, Tsutomu. "A New System to Appreciate the Visual Characteristics of a Painting." Leonardo 42, no. 4 (August 2009): 342–49. http://dx.doi.org/10.1162/leon.2009.42.4.342.

Full text
Abstract:
A painting-viewing system is proposed as a tool to help painting appreciation and to improve the museum experience. This system simultaneously highlights certain visual characteristics of multiple paintings, thus informing users of the links between paintings and the semantic elements that may appear superficially different, and also conveying the art-historical explanation of those characteristics. Through this system's evaluation, the approach based on “the awareness of the visual characteristics” may be effective as a method of developing the user's interest in the paintings. When this system is placed in museums and galleries as a mediation tool, it will be useful to a viewer's preparation for the art-viewing experience. This paper presents the concepts behind the system's development and the results of the first survey as a piece of a larger project to explore the improvement of painting appreciation as a museum experience.
APA, Harvard, Vancouver, ISO, and other styles
47

Dotche, K. A., and K. Diawuo. "Adaptive Integrated Unit to User's Equipment for the Spectral and Energy Efficiency in Cognitive Networks." International Journal of Interdisciplinary Telecommunications and Networking 10, no. 1 (January 2018): 1–19. http://dx.doi.org/10.4018/ijitn.2018010101.

Full text
Abstract:
The work proposes an adaptive integrated unit to user's equipment for the spectral and energy efficiency, under severe channel fading condition like in 5Generation cellular network. The spectral and energy efficiency are formulated through an optimization problem under a coverage sensitivity criterion. This criterion is the ratio of the mobile user transmit power over its received power. The criterion is a typical awareness parameter that could help in effective counting of the number of active users within a cell coverage or in multi-transmitters coverage system. The criterion is meant to be embedded into the user equipment in such a way to provide much information about the device status (e.g. Idle, or active or off). The unit block diagram includes a downtilt switching tool that aims at decreasing the channel fading and inter-cell interference. The system transfer function is then evaluated. The obtained results show an enhanced spectral efficiency, and the energy consumption is also considerably reduced when the coverage area seems to be idle. Hence, the unit could be applied to a transmitter for power minimization as the objective in the absence of no-cell load.
APA, Harvard, Vancouver, ISO, and other styles
48

Cao, Qimeng, Qing Yin, Yunya Song, Zhihua Wang, Yujun Chen, Richard Yi Da Xu, and Xian Yang. "RTANet: Recommendation Target-Aware Network Embedding." Proceedings of the International AAAI Conference on Web and Social Media 17 (June 2, 2023): 84–94. http://dx.doi.org/10.1609/icwsm.v17i1.22128.

Full text
Abstract:
Network embedding is a process of encoding nodes into latent vectors by preserving network structure and content information. It is used in various applications, especially in recommender systems. In a social network setting, when recommending new friends to a user, the similarity between the user's embedding and the target friend will be examined. Traditional methods generate user node embedding without considering the recommendation target. No matter which target is to be recommended, the same embedding vector is generated for that particular user. This approach has its limitations. For example, a user can be both a computer scientist and a musician. When recommending music friends with potentially the same taste to him, we are interested in getting his representation that is useful in recommending music friends rather than computer scientists. His corresponding embedding should consider the user's musical features rather than those associated with computer science with the awareness that the recommendation targets are music friends. In order to address this issue, we propose a new framework which we name it as Recommendation Target-Aware Network embedding method (RTANet). Herein, the embedding of each user is no longer fixed to a constant vector, but it can vary according to their specific recommendation target. Concretely, RTANet assigns different attention weights to each neighbour node, allowing us to obtain the user's context information aggregated from its neighbours before transforming this context into its embedding. Different from other graph attention approaches, the attention weights in our work measure the similarity between each user's neighbour node and the target node, which in return generates the target-aware embedding. To demonstrate the effectiveness of our method, we compared RTANet with several state-of-the-art network embedding methods on four real-world datasets and showed that RTANet outperforms other comparative methods in the recommendation tasks.
APA, Harvard, Vancouver, ISO, and other styles
49

Devkota, Niranjan, Bikesh Shakya, Seeprata Parajuli, and Udaya Poudel. "Using Plastic Money (Cards) in Kathmandu Valley: Users’ Knowledge, Current Use, Challenges and Way-forward." International Journal of Business, Management and Economics 2, no. 2 (August 10, 2021): 102–17. http://dx.doi.org/10.47747/ijbme.v2i2.303.

Full text
Abstract:
This study aims to understand the users’ knowledge about plastic money, its current use, challenges they faced and way-forward. Based on descriptive research design, primary data is used for the purpose as per its suitability. A structured questionnaire has been arranged with the help of KOBO and devised for the information assortments from 404 plastic money users. Results found that people who use plastic money usually work in banks and financial institutions (33.87%) and are from the nuclear family (62.62%), with income between 25001 – 50000 (56%). 95.79 % of the respondents know about plastic money, and 86.3 % have plastic money. 88 % of respondents said they feel safe while using plastic money. 40.72% of respondents have faced challenges and problems while using plastic money. The majority (79.28%) of respondents believed that using the bank's services could be solved. It can be solved by giving training (34.85%), quick response to the problem raised by users (44.32%), update technology (34.47%) and keep a good network in the ATMs (71.79%) and quick solutions to the user's problems (75.76%). This study concludes that hassle-free transactions, a low-interest rate of credit cards, attractive advertisement, and awareness of how plastic money can use help and attract users of plastic money. .
APA, Harvard, Vancouver, ISO, and other styles
50

Wald, David, Kuo-Wan Lin, Keith Porter, and Loren Turner. "ShakeCast: Automating and Improving the Use of ShakeMap for Post-Earthquake Decision-Making and Response." Earthquake Spectra 24, no. 2 (May 2008): 533–53. http://dx.doi.org/10.1193/1.2923924.

Full text
Abstract:
When a potentially damaging earthquake occurs, utility and other lifeline managers, emergency responders, and other critical users have an urgent need for information about the impact on their particular facilities so they can make appropriate decisions and take quick actions to ensure safety and restore system functionality. ShakeMap, a tool used to portray the extent of potentially damaging shaking following an earthquake, on its own can be useful for emergency response, loss estimation, and public information. However, to take full advantage of the potential of ShakeMap, we introduce ShakeCast. ShakeCast facilitates the complicated assessment of potential damage to a user's widely distributed facilities by comparing the complex shaking distribution with the potentially highly variable damageability of their inventory to provide a simple, hierarchical list and maps of structures or facilities most likely impacted. ShakeCast is a freely available, post-earthquake situational awareness application that automatically retrieves earthquake shaking data from ShakeMap, compares intensity measures against users’ facilities, sends notifications of potential damage to responsible parties, and generates facility damage maps and other Web-based products for both public and private emergency managers and responders.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography