Search results for "cc"
showing 10 items of 30638 documents
Consumer Acceptance and Use of Instagram
2016
This study extends the Unified Theory of Acceptance and Use of Technology 2 (UTAUT2) model to investigate factors affecting the acceptance and use of a social networking service (SNS) called Instagram. The UTAUT2 model is modified to better suit the context of SNSs by replacing the price value construct with self-congruence. Furthermore, we explore the effects of behavioral intention and use behavior on "user indegree" defined as the number of people who follow an SNS user. The results of the survey study largely support the hypothesized model in the context of Instagram. The findings contribute to previous knowledge by demonstrating the important roles of hedonic motivation and habit in co…
Internet Adoption at the User Level: Empirical Evidence from The Gambia
2014
The unified theory of acceptance and use of technology (UTAUT) are used to investigate technology adoption. However, its application in Sub-Saharan Africa is rare and barely extended to the validation phase. In this paper, we introduce six new moderating factors for UTAUT core determinants and two other direct determinants of Internet adoption. The objective of this approach is to identify relevant elements of Internet adoption at the user level in The Gambia. Moderating factors are interacting terms used when the relationship between independent and dependent variable is weak, inconsistent or non-existent. A case study research design was employed and the data were gathered in Autumn of 20…
Fall Detection Using Location Sensors and Accelerometers
2015
The rapid aging of the world's population is driving the development of pervasive solutions for elder care. These solutions, which often involve fall detection with accelerometers, are accurate in laboratory conditions but can fail in some real-life situations. To overcome this, the authors present the Confidence system, which detects falls mainly with location sensors. A user wears one to four tags. By detecting tag locations with sensors, the system can recognize the user's activity, such as falling and then lying down afterward, as well as the context in terms of the location in the home. The authors used a scenario consisting of events difficult to recognize as falls or nonfalls to comp…
Critical Analysis on the NHTSA Acceptance Criteria for In-Vehicle Electronic Devices
2014
We tested a commercial in-car navigation system prototype against the NHTSA criteria for acceptance testing of in-vehicle electronic devices, in order to see what types of in-car tasks fail the acceptance test and why. In addition, we studied the visual demands of the driving scenario recommended by NHTSA for task acceptance testing. In the light of the results, NHTSA guidelines and acceptance criteria need to be further developed. In particular visual demands of the driving scenario and for different simulators need to be standardized in order to enable fair testing and comparable test results. We suggest the visual occlusion method for finding a driving scenario that corresponds better wi…
Identity Use and Misuse of Public Persona on Twitter
2016
Social media sites have appeared during the last 10 years and their use has exploded all over the world. Twitter is a microblogging service that has currently 320 million user profiles and over 100 million daily active users. Many celebrities and leading politicians have a verified profile on Twitter, including Justin Bieber, president Obama, and the Pope. In this paper we investigate the '‘hundreds of Putins and Obamas phenomenon’ on Twitter. We collected two data sets in 2015 containing 582 and 6477 profiles that are related to the G20 leaders’ profiles on Twitter. The number of namesakes varied from 5 to 1000 per leader. We analysed in detail various aspects of the Putin and Erdogan rela…
Data mining framework for random access failure detection in LTE networks
2014
Sleeping cell problem is a particular type of cell degradation. There are various software and hardware reasons that might cause such kind of cell outage. In this study a cell becomes sleeping because of Random Access Channel (RACH) failure. This kind of network problem can appear due to misconfiguration, excessive load or software/firmware problem at the Base Station (BS). In practice such failure might cause network performance degradation, which is hardly traceable by an operator. In this paper we present a data mining based framework for the detection of problematic cells. In its core is the analysis of event sequences reported by a User Equipment (UE) to a serving BS. The choice of N i…
The influence of dataset size on the performance of cell outage detection approach in LTE-A networks
2015
The configuration and maintenance of constantly evolving mobile cellular networks are getting more and more complex and hence expensive. Self-Organizing Networks (SON) concept is an umbrella term for the set of automated solutions for network operations proposed by 3rd Generation Partnership Project (3GPP) group. Automated cell outage detection is one of the components of SON functionality. In early studies our research group developed data-driven approach for the detection of malfunctioning cells. In this paper we investigate the performance of the proposed solution as a function of the density of active users and the size of observation interval. The evaluation is conducted in Long Term E…
Visual Distraction Effects of In-Car Text Entry Methods
2017
Three text entry methods were compared in a driving simulator study with 17 participants. Ninety-seven drivers’ occlusion distance (OD) data mapped on the test routes was used as a baseline to evaluate the methods’ visual distraction potential. Only the voice recognition-based text entry tasks passed the set verification criteria. Handwriting tasks were experienced as the most demanding and the voice recognition tasks as the least demanding. An individual in-car glance length preference was found, but against expectations, drivers’ ODs did not correlate with incar glance lengths or visual short-term memory capacity. The handwriting method was further studied with 24 participants with instru…
Force Distribution Analysis of Mechanochemically Reactive Dimethylcyclobutene
2013
Internal molecular forces can guide chemical reactions, yet are not straightforwardly accessible within a quantum mechanical description of the reacting molecules. Here, we present a force-matching force distribution analysis (FM-FDA) to analyze internal forces in molecules. We simulated the ring opening of trans-3,4-dimethylcyclobutene (tDCB) with on-the-fly semiempirical molecular dynamics. The self-consistent density functional tight binding (SCC-DFTB) method accurately described the force-dependent ring-opening kinetics of tDCB, showing quantitative agreement with both experimental and computational data at higher levels. Mechanical force was applied in two different ways, namely, exter…
Multicriteria evaluation of alternatives for remote monitoring systems of municipal buildings
2014
Abstract Conservation of natural resources drives municipalities to monitor their heat, power and water consumption more accurately. The objective of this study was to evaluate different implementation possibilities for remote monitoring systems for the municipal buildings of two medium-sized municipalities, Hollola and Nastola in Southern Finland. Four different alternatives were considered: (1) a system by an external service provider, (2) a system provided by the local energy distribution company, (3) a system built by the municipalities themselves, and (4) using the current manual system but with more frequent data collection. The alternatives were evaluated in terms of multiple functio…