Search results for "cc"

showing 10 items of 30638 documents

Consumer Acceptance and Use of Instagram

2016

This study extends the Unified Theory of Acceptance and Use of Technology 2 (UTAUT2) model to investigate factors affecting the acceptance and use of a social networking service (SNS) called Instagram. The UTAUT2 model is modified to better suit the context of SNSs by replacing the price value construct with self-congruence. Furthermore, we explore the effects of behavioral intention and use behavior on "user indegree" defined as the number of people who follow an SNS user. The results of the survey study largely support the hypothesized model in the context of Instagram. The findings contribute to previous knowledge by demonstrating the important roles of hedonic motivation and habit in co…

ta113Service (business)Value (ethics)Context modelHedonic motivationsocial media05 social sciencesSurvey researchContext (language use)AdvertisingUnified theory of acceptance and use of technology0502 economics and businessInstagram050211 marketingConstruct (philosophy)Psychologyta512consumer acceptance050203 business & management2016 49th Hawaii International Conference on System Sciences (HICSS)
researchProduct

Internet Adoption at the User Level: Empirical Evidence from The Gambia

2014

The unified theory of acceptance and use of technology (UTAUT) are used to investigate technology adoption. However, its application in Sub-Saharan Africa is rare and barely extended to the validation phase. In this paper, we introduce six new moderating factors for UTAUT core determinants and two other direct determinants of Internet adoption. The objective of this approach is to identify relevant elements of Internet adoption at the user level in The Gambia. Moderating factors are interacting terms used when the relationship between independent and dependent variable is weak, inconsistent or non-existent. A case study research design was employed and the data were gathered in Autumn of 20…

ta113VariablesPublic Administrationbusiness.industrymedia_common.quotation_subjectDevelopmentUnified theory of acceptance and use of technologyComputer Science ApplicationsPyramidCase study researchThe InternetMarketingPsychologyEmpirical evidencebusinessmedia_commonInformation Technology for Development
researchProduct

Fall Detection Using Location Sensors and Accelerometers

2015

The rapid aging of the world's population is driving the development of pervasive solutions for elder care. These solutions, which often involve fall detection with accelerometers, are accurate in laboratory conditions but can fail in some real-life situations. To overcome this, the authors present the Confidence system, which detects falls mainly with location sensors. A user wears one to four tags. By detecting tag locations with sensors, the system can recognize the user's activity, such as falling and then lying down afterward, as well as the context in terms of the location in the home. The authors used a scenario consisting of events difficult to recognize as falls or nonfalls to comp…

ta113education.field_of_studyContext modelUbiquitous computingaccelerometersaccuracyComputer sciencePopulationReal-time computingagingWearable computerContext (language use)ta3141accelerationAccelerometersensorsComputer Science ApplicationscontextComputational Theory and MathematicsFalling (sensation)educationLyingSoftwareSimulationsenior citizensIEEE Pervasive Computing
researchProduct

Critical Analysis on the NHTSA Acceptance Criteria for In-Vehicle Electronic Devices

2014

We tested a commercial in-car navigation system prototype against the NHTSA criteria for acceptance testing of in-vehicle electronic devices, in order to see what types of in-car tasks fail the acceptance test and why. In addition, we studied the visual demands of the driving scenario recommended by NHTSA for task acceptance testing. In the light of the results, NHTSA guidelines and acceptance criteria need to be further developed. In particular visual demands of the driving scenario and for different simulators need to be standardized in order to enable fair testing and comparable test results. We suggest the visual occlusion method for finding a driving scenario that corresponds better wi…

ta113kosketusnäyttödriver distractionComputer scienceNavigation systemvisual demandReliability engineeringTest (assessment)Task (project management)Variety (cybernetics)Acceptance testingnavigation systemElectronicsDuration (project management)test performanceVisual occlusionSimulationacceptance criteriavisual occlusion
researchProduct

Identity Use and Misuse of Public Persona on Twitter

2016

Social media sites have appeared during the last 10 years and their use has exploded all over the world. Twitter is a microblogging service that has currently 320 million user profiles and over 100 million daily active users. Many celebrities and leading politicians have a verified profile on Twitter, including Justin Bieber, president Obama, and the Pope. In this paper we investigate the '‘hundreds of Putins and Obamas phenomenon’ on Twitter. We collected two data sets in 2015 containing 582 and 6477 profiles that are related to the G20 leaders’ profiles on Twitter. The number of namesakes varied from 5 to 1000 per leader. We analysed in detail various aspects of the Putin and Erdogan rela…

ta113online identity: G20 leaders: Putinbusiness.industryComputer sciencesocial media05 social sciencesInternet privacyTwitterIdentity (social science)sosiaalinen media050801 communication & media studiesPersonafaked accountsG20 leaders: Putin [online identity]ObamaimpersonationErdogan0508 media and communications0502 economics and business050211 marketingta518business
researchProduct

Data mining framework for random access failure detection in LTE networks

2014

Sleeping cell problem is a particular type of cell degradation. There are various software and hardware reasons that might cause such kind of cell outage. In this study a cell becomes sleeping because of Random Access Channel (RACH) failure. This kind of network problem can appear due to misconfiguration, excessive load or software/firmware problem at the Base Station (BS). In practice such failure might cause network performance degradation, which is hardly traceable by an operator. In this paper we present a data mining based framework for the detection of problematic cells. In its core is the analysis of event sequences reported by a User Equipment (UE) to a serving BS. The choice of N i…

ta113sleeping cell problembusiness.industryComputer scienceFirmwareHeuristic (computer science)Event (computing)Reliability (computer networking)data miningLTE networkscomputer.software_genreBase stationRandom-access channelUser equipmentData miningbusinessrandom access channelcomputerRandom accessComputer network2014 IEEE 25th Annual International Symposium on Personal, Indoor, and Mobile Radio Communication (PIMRC)
researchProduct

The influence of dataset size on the performance of cell outage detection approach in LTE-A networks

2015

The configuration and maintenance of constantly evolving mobile cellular networks are getting more and more complex and hence expensive. Self-Organizing Networks (SON) concept is an umbrella term for the set of automated solutions for network operations proposed by 3rd Generation Partnership Project (3GPP) group. Automated cell outage detection is one of the components of SON functionality. In early studies our research group developed data-driven approach for the detection of malfunctioning cells. In this paper we investigate the performance of the proposed solution as a function of the density of active users and the size of observation interval. The evaluation is conducted in Long Term E…

ta113ta213Computer sciencebusiness.industrydatasetsReal-time computingLTE-A networkssizeMaintenance engineeringNetwork operations centerTerm (time)LTE AdvancedHandoverCellular networkMobile telephonybusinessRandom accessComputer network
researchProduct

Visual Distraction Effects of In-Car Text Entry Methods

2017

Three text entry methods were compared in a driving simulator study with 17 participants. Ninety-seven drivers’ occlusion distance (OD) data mapped on the test routes was used as a baseline to evaluate the methods’ visual distraction potential. Only the voice recognition-based text entry tasks passed the set verification criteria. Handwriting tasks were experienced as the most demanding and the voice recognition tasks as the least demanding. An individual in-car glance length preference was found, but against expectations, drivers’ ODs did not correlate with incar glance lengths or visual short-term memory capacity. The handwriting method was further studied with 24 participants with instru…

ta113visual short-term memorydriver distraction050210 logistics & transportationocclusion distanceVisual Patterns TestComputer scienceSpeech recognition05 social sciencesDriving simulatorvisual demandAffect (psychology)Test (assessment)HandwritingDistraction0502 economics and businesstext entry methods0501 psychology and cognitive sciencesVisual short-term memorySet (psychology)050107 human factorsReliability (statistics)visual occlusionProceedings of the 9th International Conference on Automotive User Interfaces and Interactive Vehicular Applications
researchProduct

Force Distribution Analysis of Mechanochemically Reactive Dimethylcyclobutene

2013

Internal molecular forces can guide chemical reactions, yet are not straightforwardly accessible within a quantum mechanical description of the reacting molecules. Here, we present a force-matching force distribution analysis (FM-FDA) to analyze internal forces in molecules. We simulated the ring opening of trans-3,4-dimethylcyclobutene (tDCB) with on-the-fly semiempirical molecular dynamics. The self-consistent density functional tight binding (SCC-DFTB) method accurately described the force-dependent ring-opening kinetics of tDCB, showing quantitative agreement with both experimental and computational data at higher levels. Mechanical force was applied in two different ways, namely, exter…

ta114CyclobuteneChemistryMolecular ConformationMolecular Dynamics SimulationRing (chemistry)Atomic and Molecular Physics and Optics:Science::Biological sciences::Biophysics [DRNTU]chemistry.chemical_compoundMolecular dynamicsAccelerationTight bindingIsomerismComputational chemistryChemical physicsMechanochemistryQuantum TheoryMoleculeReactivity (chemistry)Physical and Theoretical Chemistryta116CyclobutanesChemPhysChem
researchProduct

Multicriteria evaluation of alternatives for remote monitoring systems of municipal buildings

2014

Abstract Conservation of natural resources drives municipalities to monitor their heat, power and water consumption more accurately. The objective of this study was to evaluate different implementation possibilities for remote monitoring systems for the municipal buildings of two medium-sized municipalities, Hollola and Nastola in Southern Finland. Four different alternatives were considered: (1) a system by an external service provider, (2) a system provided by the local energy distribution company, (3) a system built by the municipalities themselves, and (4) using the current manual system but with more frequent data collection. The alternatives were evaluated in terms of multiple functio…

ta212EngineeringStochastic multicriteria acceptability analysista214Energy distributionData collectionOperations researchbusiness.industryMechanical Engineeringta1172Environmental resource managementMonitoring systemBuilding and ConstructionService providerNatural resourceWater consumptionta519Electrical and Electronic Engineeringbusinessta116ta218Civil and Structural EngineeringEnergy and Buildings
researchProduct