This document summarizes a study that aimed to identify value co-creation attributes that influence the UTM Institutional Repository (UTM IR), an e-service application. The study used interviews with UTM IR providers and users to collect data on the e-service based on the DART model of value co-creation. The DART model examines dialogue, access, risk, and transparency between customers and providers. Interview responses were coded according to the DART building blocks. A gap analysis of the coded provider and user responses identified attributes influencing the UTM IR from a value co-creation perspective. The findings aimed to help evaluate the UTM IR e-service based on customer and provider value co-creation.
Agent based P ersonalized e - Catalog S ervice S ystemEditor IJCATR
With the emergence of the e
-
Catalog, there has been an increasingly wide application of commodities query in distribut
ed
environment in the field of e
-
commerce. But e
-
Catalog is often autonomous and heterogeneous, effectively integrating and querying
them is a delicate and time
-
consuming task. Electronic catalog contains rich semantics associated with products, and serves
as a
challenging domain for ontology application. Ontology is concerned with the nature and relations of being. It can play a cruc
ial role
in e
-
commerce as a formalization of e
-
Catalog. User personalized catalog ontology aims at capturing the users' inter
ests in a working
domain, which forms the basis of providing personalized e
-
Catalog services.
This paper describes a prototype of an ontology
-
based
Information retrieval agent.
User personalized catalog ontology aims at capturing the users' interests in a
working domain, which
forms the basis of providing personalized e
-
Catalog services.
In this paper, we present an ontological model of e
-
Catalogs, and design
an Agent based personalized e
-
Catalog service system (ABPECSS), which achieves match user personal
ized catalog ontology and
domain e
-
Catalog ontology based on ontology integrated
SOA-A GENERIC APPROACH FOR INTEGRATING LOOSELY COUPLED SYSTEMS WITH OTHER SYS...ijwscjournal
Various organizations generate data in various domains which is queried and analyzed by users. This limits the possibility of database integration with other systems. We describes a generalized approach comprising a loosely couples system and integrate with other system. It deals with the setting up the environment for implementing the system. User Interface screen shows how the user will interact with the system and the data
entry forms required to gather data for the system.
SOA-A GENERIC APPROACH FOR INTEGRATING LOOSELY COUPLED SYSTEMS WITH OTHER SYS...ijwscjournal
Various organizations generate data in various domains which is queried and analyzed by users. This limits
the possibility of database integration with other systems. We describes a generalized approach comprising a
loosely couples system and integrate with other system. It deals with the setting up the environment for
implementing the system. User Interface screen shows how the user will interact with the system and the data
entry forms required to gather data for the system.
Review and analysis of machine learning and soft computing approaches for use...IJwest
The adequacy of user models depends mainly on the accuracy and precision of information that is retrieved to the user. The real challenge in user modelling studies is due to the inadequacy of data, improper use of techniques, noise within the data and imprecise nature of human behavior. For the best results of user modelling, one should choose an appropriate way to do it i.e. by selecting the best suitable approach for the desired domain. Machine learning and Soft computing Techniques have the ability to handle the uncertainty and are extensively being used for user modeling purpose. This paper reviews various approaches of user modeling and critically analyzes the machine learning and soft computing techniques that have successfully captured and formally modelled the human behavior.
Projection pursuit Random Forest using discriminant feature analysis model fo...IJECEIAES
A major and demand issue in the telecommunications industry is the prediction of churn customers. Churn describes the customer who attrites from the current provider to competitors searching for better service offers. Companies from the Telco sector frequently have customer relationship management offices it is the main objective in how to win back defecting clients because preserve long-term customers can be much more beneficial than gain newly recruited customers. Researchers and practitioners are paying great attention to developing a robust customer churn prediction model, especially in the telecommunication business by proposed numerous machine learning approaches. Many approaches of Classification are established, but the most effective in recent times is a tree-based method. The main contribution of this research is to predict churners/non-churners in the Telecom sector based on project pursuit Random Forest (PPForest) that uses discriminant feature analysis as a novelty extension of the conventional Random Forest for learning oblique Project Pursuit tree (PPtree). The proposed methodology leverages the advantage of two discriminant analysis methods to calculate the project index used in the construction of PPtree. The first method used Support Vector Machines (SVM) while, the second method used Linear Discriminant Analysis (LDA) to achieve linear splitting of variables during oblique PPtree construction to produce individual classifiers that are robust and more diverse than classical Random Forest. It is found that the proposed methods enjoy the best performance measurements e.g. Accuracy, hit rate, ROC curve, Lift, H-measure, AUC. Moreover, PPForest based on LDA delivers effective evaluators in the prediction model.
Agent based P ersonalized e - Catalog S ervice S ystemEditor IJCATR
With the emergence of the e
-
Catalog, there has been an increasingly wide application of commodities query in distribut
ed
environment in the field of e
-
commerce. But e
-
Catalog is often autonomous and heterogeneous, effectively integrating and querying
them is a delicate and time
-
consuming task. Electronic catalog contains rich semantics associated with products, and serves
as a
challenging domain for ontology application. Ontology is concerned with the nature and relations of being. It can play a cruc
ial role
in e
-
commerce as a formalization of e
-
Catalog. User personalized catalog ontology aims at capturing the users' inter
ests in a working
domain, which forms the basis of providing personalized e
-
Catalog services.
This paper describes a prototype of an ontology
-
based
Information retrieval agent.
User personalized catalog ontology aims at capturing the users' interests in a
working domain, which
forms the basis of providing personalized e
-
Catalog services.
In this paper, we present an ontological model of e
-
Catalogs, and design
an Agent based personalized e
-
Catalog service system (ABPECSS), which achieves match user personal
ized catalog ontology and
domain e
-
Catalog ontology based on ontology integrated
SOA-A GENERIC APPROACH FOR INTEGRATING LOOSELY COUPLED SYSTEMS WITH OTHER SYS...ijwscjournal
Various organizations generate data in various domains which is queried and analyzed by users. This limits the possibility of database integration with other systems. We describes a generalized approach comprising a loosely couples system and integrate with other system. It deals with the setting up the environment for implementing the system. User Interface screen shows how the user will interact with the system and the data
entry forms required to gather data for the system.
SOA-A GENERIC APPROACH FOR INTEGRATING LOOSELY COUPLED SYSTEMS WITH OTHER SYS...ijwscjournal
Various organizations generate data in various domains which is queried and analyzed by users. This limits
the possibility of database integration with other systems. We describes a generalized approach comprising a
loosely couples system and integrate with other system. It deals with the setting up the environment for
implementing the system. User Interface screen shows how the user will interact with the system and the data
entry forms required to gather data for the system.
Review and analysis of machine learning and soft computing approaches for use...IJwest
The adequacy of user models depends mainly on the accuracy and precision of information that is retrieved to the user. The real challenge in user modelling studies is due to the inadequacy of data, improper use of techniques, noise within the data and imprecise nature of human behavior. For the best results of user modelling, one should choose an appropriate way to do it i.e. by selecting the best suitable approach for the desired domain. Machine learning and Soft computing Techniques have the ability to handle the uncertainty and are extensively being used for user modeling purpose. This paper reviews various approaches of user modeling and critically analyzes the machine learning and soft computing techniques that have successfully captured and formally modelled the human behavior.
Projection pursuit Random Forest using discriminant feature analysis model fo...IJECEIAES
A major and demand issue in the telecommunications industry is the prediction of churn customers. Churn describes the customer who attrites from the current provider to competitors searching for better service offers. Companies from the Telco sector frequently have customer relationship management offices it is the main objective in how to win back defecting clients because preserve long-term customers can be much more beneficial than gain newly recruited customers. Researchers and practitioners are paying great attention to developing a robust customer churn prediction model, especially in the telecommunication business by proposed numerous machine learning approaches. Many approaches of Classification are established, but the most effective in recent times is a tree-based method. The main contribution of this research is to predict churners/non-churners in the Telecom sector based on project pursuit Random Forest (PPForest) that uses discriminant feature analysis as a novelty extension of the conventional Random Forest for learning oblique Project Pursuit tree (PPtree). The proposed methodology leverages the advantage of two discriminant analysis methods to calculate the project index used in the construction of PPtree. The first method used Support Vector Machines (SVM) while, the second method used Linear Discriminant Analysis (LDA) to achieve linear splitting of variables during oblique PPtree construction to produce individual classifiers that are robust and more diverse than classical Random Forest. It is found that the proposed methods enjoy the best performance measurements e.g. Accuracy, hit rate, ROC curve, Lift, H-measure, AUC. Moreover, PPForest based on LDA delivers effective evaluators in the prediction model.
On the benefit of logic-based machine learning to learn pairwise comparisonsjournalBEEI
In recent years, many daily processes such as internet web searching, e-mail filter-ing, social media services, e-commerce have benefited from machine learning tech-niques (ML). The implementation of ML techniques has been largely focused on blackbox methods where the general conclusions are not easily interpretable. Hence, theelaboration with other declarative software models to identify the correctness and com-pleteness of the models is not easy to perform. On the other hand, the emerge of somelogic-based machine learning techniques with their advantage of white box approachhave been proven to be well-suited for many software engineering tasks. In this paper,we propose the use of a logic-based approach to learn user preference in the form ofpairwise comparisons. APARELL as a novel approach of inductive learning is able tomodel the user’s preferences in description logic representation. This offers a rich, re-lational representation which is then can be used to produce a set of recommendations.A user study has been performed in our experiment to evaluate the implementation ofpairwise preference recommender system when compared to a standard list interface.The result of the experiment shows that the pairwise interface was significantly betterthan the other interface in many ways.
Framework for Product Recommandation for Review Datasetrahulmonikasharma
In the social networking era, product reviews have a significant influence on the purchase decisions of customers so the market has recognized this problem The problem with this is that the customers do not know how these systems work which results in trust issues. Therefore a different system is needed that helps customers with their need to process the information in product reviews. There are different approaches and algorithms of data filtering and recommendation .Most existing recommender systems were developed for commercial domains with millions of users. In this paper we have discussed the recommendation system and its related research and implemented different techniques of the recommender system .
Determining Online Brand Reputation with Machine Learning from Social Media M...Joni Salminen
CITE: "Rantanen, A., Salminen, J., & Jansen, B. J. (2018). Determining Online Brand Reputation with Machine Learning from Social Media Mentions: A Study in the Banking Context. Presented at the 13th Global Brand Conference, Northumbria University, UK, 2–4 May."
Development of Personal Assistant System with Human Computer InteractionWaqas Tariq
In recent years, some personal assistant systems have appeared in our daily life. They provided some services such as account management, curriculum management, diary management, financing management and so on. This study presents a design and implementation of a personal assistant system platform especially for students and employee to help to manage their learning, life and work better. One of the highlights of this system has an instant chatting system except for the above functions. This paper indicates not only some beneficial interactive functions but also presented detailed ideas of information system analysis, design, and test. It has a friendly interactive interface and a good manageable system, and experimental studies of these functions are proved to be reliable, efficient, and acceptable for users when applied to learning and working environments.
LINKING SOFTWARE DEVELOPMENT PHASE AND PRODUCT ATTRIBUTES WITH USER EVALUATIO...csandit
This paper presents an evaluation methodology to reveal the relationships between the
attributes of software products, practices applied during the development phase and the user
evaluation of the products. For the case study, the games sector has been chosen due to easy
access to the user evaluation of this type of software products. Product attributes and practices
applied during the development phase have been collected from the developers via
questionnaires. User evaluation results were collected from a group of independent evaluators.
Two bipartite networks were created using the gathered data. The first network maps software
products to the practices applied during the development phase and the second network maps
the products to the product attributes. According to the links, similarities were determined and
subgroups of products were obtained according to selected development phase practices. By
this way, the effect of development phase on the user evaluation has been investigated.
The semantic MDM system is an innovation in the area of consolidation of reference data, unification of services for their processing, consolidation of knowledge in semantic models and standardization of data exchange processes.
Hybrid Personalized Recommender System Using Modified Fuzzy C-Means Clusterin...Waqas Tariq
Recommender Systems apply machine learning and data mining techniques for filtering unseen information and can predict whether a user would like a given resource. This paper proposes a novel Modified Fuzzy C-means (MFCM) clustering algorithm which is used for Hybrid Personalized Recommender System (MFCMHPRS). The proposed system works in two phases. In the first phase, opinions from the users are collected in the form of user-item rating matrix. They are clustered offline using MFCM into predetermined number clusters and stored in a database for future recommendation. In the second phase, the recommendations are generated online for active users using similarity measures by choosing the clusters with good quality rating. We propose coefficient parameter for similarity computation when weighting of the users’ similarity. This helps to get further effectiveness and quality of recommendations for the active users. The experimental results using Iris dataset show that the proposed MFCM performs better than Fuzzy C-means (FCM) algorithm. The performance of MFCMHPRS is evaluated using Jester database available on website of California University, Berkeley and compared with fuzzy recommender system (FRS). The results obtained empirically demonstrate that the proposed MFCMHPRS performs superiorly.
-Developed Enterprise software architecture model for startup company as consultants
-Identified and developed all part of enterprise software middleware such as business motivation model, business capability model, Information architecture model, application architecture and much more.
- Developed the project planning, roadmap and governance for the enterprise.
Power System Damping Oscillations in Smib with Pss-Fuzzy Upfc ControllerIJERD Editor
International Journal of Engineering Research and Development is an international premier peer reviewed open access engineering and technology journal promoting the discovery, innovation, advancement and dissemination of basic and transitional knowledge in engineering, technology and related disciplines.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
We would send hard copy of Journal by speed post to the address of correspondence author after online publication of paper.
We will dispatched hard copy to the author within 7 days of date of publication
On the benefit of logic-based machine learning to learn pairwise comparisonsjournalBEEI
In recent years, many daily processes such as internet web searching, e-mail filter-ing, social media services, e-commerce have benefited from machine learning tech-niques (ML). The implementation of ML techniques has been largely focused on blackbox methods where the general conclusions are not easily interpretable. Hence, theelaboration with other declarative software models to identify the correctness and com-pleteness of the models is not easy to perform. On the other hand, the emerge of somelogic-based machine learning techniques with their advantage of white box approachhave been proven to be well-suited for many software engineering tasks. In this paper,we propose the use of a logic-based approach to learn user preference in the form ofpairwise comparisons. APARELL as a novel approach of inductive learning is able tomodel the user’s preferences in description logic representation. This offers a rich, re-lational representation which is then can be used to produce a set of recommendations.A user study has been performed in our experiment to evaluate the implementation ofpairwise preference recommender system when compared to a standard list interface.The result of the experiment shows that the pairwise interface was significantly betterthan the other interface in many ways.
Framework for Product Recommandation for Review Datasetrahulmonikasharma
In the social networking era, product reviews have a significant influence on the purchase decisions of customers so the market has recognized this problem The problem with this is that the customers do not know how these systems work which results in trust issues. Therefore a different system is needed that helps customers with their need to process the information in product reviews. There are different approaches and algorithms of data filtering and recommendation .Most existing recommender systems were developed for commercial domains with millions of users. In this paper we have discussed the recommendation system and its related research and implemented different techniques of the recommender system .
Determining Online Brand Reputation with Machine Learning from Social Media M...Joni Salminen
CITE: "Rantanen, A., Salminen, J., & Jansen, B. J. (2018). Determining Online Brand Reputation with Machine Learning from Social Media Mentions: A Study in the Banking Context. Presented at the 13th Global Brand Conference, Northumbria University, UK, 2–4 May."
Development of Personal Assistant System with Human Computer InteractionWaqas Tariq
In recent years, some personal assistant systems have appeared in our daily life. They provided some services such as account management, curriculum management, diary management, financing management and so on. This study presents a design and implementation of a personal assistant system platform especially for students and employee to help to manage their learning, life and work better. One of the highlights of this system has an instant chatting system except for the above functions. This paper indicates not only some beneficial interactive functions but also presented detailed ideas of information system analysis, design, and test. It has a friendly interactive interface and a good manageable system, and experimental studies of these functions are proved to be reliable, efficient, and acceptable for users when applied to learning and working environments.
LINKING SOFTWARE DEVELOPMENT PHASE AND PRODUCT ATTRIBUTES WITH USER EVALUATIO...csandit
This paper presents an evaluation methodology to reveal the relationships between the
attributes of software products, practices applied during the development phase and the user
evaluation of the products. For the case study, the games sector has been chosen due to easy
access to the user evaluation of this type of software products. Product attributes and practices
applied during the development phase have been collected from the developers via
questionnaires. User evaluation results were collected from a group of independent evaluators.
Two bipartite networks were created using the gathered data. The first network maps software
products to the practices applied during the development phase and the second network maps
the products to the product attributes. According to the links, similarities were determined and
subgroups of products were obtained according to selected development phase practices. By
this way, the effect of development phase on the user evaluation has been investigated.
The semantic MDM system is an innovation in the area of consolidation of reference data, unification of services for their processing, consolidation of knowledge in semantic models and standardization of data exchange processes.
Hybrid Personalized Recommender System Using Modified Fuzzy C-Means Clusterin...Waqas Tariq
Recommender Systems apply machine learning and data mining techniques for filtering unseen information and can predict whether a user would like a given resource. This paper proposes a novel Modified Fuzzy C-means (MFCM) clustering algorithm which is used for Hybrid Personalized Recommender System (MFCMHPRS). The proposed system works in two phases. In the first phase, opinions from the users are collected in the form of user-item rating matrix. They are clustered offline using MFCM into predetermined number clusters and stored in a database for future recommendation. In the second phase, the recommendations are generated online for active users using similarity measures by choosing the clusters with good quality rating. We propose coefficient parameter for similarity computation when weighting of the users’ similarity. This helps to get further effectiveness and quality of recommendations for the active users. The experimental results using Iris dataset show that the proposed MFCM performs better than Fuzzy C-means (FCM) algorithm. The performance of MFCMHPRS is evaluated using Jester database available on website of California University, Berkeley and compared with fuzzy recommender system (FRS). The results obtained empirically demonstrate that the proposed MFCMHPRS performs superiorly.
-Developed Enterprise software architecture model for startup company as consultants
-Identified and developed all part of enterprise software middleware such as business motivation model, business capability model, Information architecture model, application architecture and much more.
- Developed the project planning, roadmap and governance for the enterprise.
Power System Damping Oscillations in Smib with Pss-Fuzzy Upfc ControllerIJERD Editor
International Journal of Engineering Research and Development is an international premier peer reviewed open access engineering and technology journal promoting the discovery, innovation, advancement and dissemination of basic and transitional knowledge in engineering, technology and related disciplines.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
We would send hard copy of Journal by speed post to the address of correspondence author after online publication of paper.
We will dispatched hard copy to the author within 7 days of date of publication
Reduced Order Observer (DGO) based State Variable Design of Two Loop Lateral ...IJERD Editor
International Journal of Engineering Research and Development is an international premier peer reviewed open access engineering and technology journal promoting the discovery, innovation, advancement and dissemination of basic and transitional knowledge in engineering, technology and related disciplines.
Reduced Order Observer (DGO) based State Variable Design of Two Loop Lateral ...IJERD Editor
International Journal of Engineering Research and Development is an international premier peer reviewed open access engineering and technology journal promoting the discovery, innovation, advancement and dissemination of basic and transitional knowledge in engineering, technology and related disciplines.
Machine learning based recommender system for e-commerceIAESIJAI
Nowadays, e-commerce is becoming an essential part of business for many reasons, including the simplicity, availability, richness and diversity of products and services, flexibility of payment methods and the convenience of shopping remotely without losing time. These benefits have greatly optimized the lives of users, especially with the technological development of mobile devices and the availability of the Internet anytime and anywhere. Because of their direct impact on the revenue of e-commerce companies, recommender systems are considered a must in this field. Recommender systems detect items that match the customer's needs based on the customer's previous actions and make them appear in an interesting way. Such a customized experience helps to increase customer engagement and purchase rates as the suggested items are tailored to the customer's interests. Therefore, perfecting recommendation systems that allow for more personalized and accurate item recommendations is a major challenge in the e-marketing world. In our study, we succeeded in developing an algorithm to suggest personal recommendations to customers using association rules via the Frequent-Pattern-Growth algorithm. Our technique generated good results with a high average probability of purchasing the next product suggested by the recommendation system.
A Literature Survey on Recommendation System Based on Sentimental Analysisaciijournal
Recommender systems have grown to be a critical research subject after the emergence of the first paper
on collaborative filtering in the Nineties. Despite the fact that educational studies on recommender systems,
has extended extensively over the last 10 years, there are deficiencies in the complete literature evaluation
and classification of that research. Because of this, we reviewed articles on recommender structures, and
then classified those based on sentiment analysis. The articles are categorized into three techniques of
recommender system, i.e.; collaborative filtering (CF), content based and context based. We have tried to
find out the research papers related to sentimental analysis based recommender system. To classify
research done by authors in this field, we have shown different approaches of recommender system based
on sentimental analysis with the help of tables. Our studies give statistics, approximately trends in
recommender structures research, and gives practitioners and researchers with perception and destiny
route on the recommender system using sentimental analysis. We hope that this paper enables all and
sundry who is interested in recommender systems research with insight for destiny.
Recommender systems have grown to be a critical research subject after the emergence of the first paper on collaborative filtering in the Nineties. Despite the fact that educational studies on recommender systems, has extended extensively over the last 10 years, there are deficiencies in the complete literature evaluation and classification of that research. Because of this, we reviewed articles on recommender structures, and then classified those based on sentiment analysis. The articles are categorized into three techniques of recommender system, i.e.; collaborative filtering (CF), content based and context based. We have tried to find out the research papers related to sentimental analysis based recommender system. To classify research done by authors in this field, we have shown different approaches of recommender system based on sentimental analysis with the help of tables. Our studies give statistics, approximately trends in recommender structures research, and gives practitioners and researchers with perception and destiny route on the recommender system using sentimental analysis. We hope that this paper enables all and sundry who is interested in recommender systems research with insight for destiny.
An Improvised Fuzzy Preference Tree Of CRS For E-Services Using Incremental A...IJTET Journal
Abstract—Web mining is the amalgamation of information accumulated by traditional data mining methodologies and techniques with information collected over the World Wide Web. A Recommendation system is a profound application that comforts the user in a decision-making process, where they lack of personal experience to choose an item from the confound set of alternative products or services. The key challenge in the development of recommender system is to overcome the problems like single level recommendation and static recommendation, which are exists in the real world e-services. The goal is to achieve and enhance predicting algorithm to discover the frequent items, which are feasible to be purchasable. At this point, we examine the prior buying patterns of the customers and use the knowledge thus procured, to achieve an item set, which co-ordinates with the purchasing mentality of a particular set of customers. Potential recommendation is concerned as a link structure among the items within E-commerce website, which supports the new customers to find related products in a hurry. In Existing system, a fuzzy set consists of user preference and item features alone, so the recommendations to the customers are irrelevant and anonymous. In this paper, we suggest a recommendation technique, which practices the wild spreading and data sharing competency of a huge customer linkage and also this method follows a fuzzy tree- structured model, in which fuzzy set techniques are utilized to express user preferences and purchased items are in a clustered form to develop a user convenient recommendations. Here, an incremental association rule mining is employed to find interesting relation between variables in a large database.
A rigorous user needs experience evaluation method based on software quality ...TELKOMNIKA JOURNAL
Our lives, nowadays, are digital. We, as humans, are using software applications in all our life aspects to meet our daily objectives and fulfill our needs. Software solutions that comprise mobile apps are widely spread, users can select from hundreds of available software solutions that fit their needs. Accordingly, user needs are becoming intricate and the software organizations are competing high to satisfy user requirements and the desires for better quality. This competition is not about satisfying the functional requirements but also satisfy user experience as well. Accordingly, studying, measuring, and improving user experience is crucial for the success of any software product. This research focuses on evaluating user experience needs by developing user experience needs evaluation method based on three main disciplines the user experience framework, the evaluation theory concept, and the ISOsoftware quality standards ISO/IEC 25022 and ISO/IEC 25023. Although these disciplines are available in the literature, they are not linked together to complete the mosaic picture of developing a UX evaluation method. Linking there three disciplines led to systematically identify the necessary evaluation criteria to evaluate user needs experience.
International Journal on Web Service Computing (IJWSC)ijwscjournal
A Knowledge Management (KM) System plays a crucial role in every industry as well as in Higher Learning Institutions. A RESTful resource is anything that is addressable over the Web. The resources can be accessed and transferred between clients and server. The resources can be accessed and transferred
between clients and servers. Based on our earlier research works, we have developed a comprehensive KM System framework, evaluation method, mult-dimensional metric model and useful metrics which are helpful to assess any given knowledge management system. In this proposed work, we first describe the actual implementation steps for building the KM System metric database using the multi-dimensional metric model. Secondly we describe the approaches for designing a multi-dimensional Restful Resources and Web Services using the mutli-dimensional metric model and demonstrate how the KM system can be ranked and rated for its effectiveness using WAM and RESTful Resources.
KM System Evaluation using Four dimensional Metric Model, Database and RESTfu...ijwscjournal
A Knowledge Management (KM) System plays a crucial role in every industry as well as in Higher Learning Institutions. A RESTful resource is anything that is addressable over the Web. The resources can be accessed and transferred between clients and server. The resources can be accessed and transferred between clients and servers. Based on our earlier research works, we have developed a comprehensive KM System framework, evaluation method, mult-dimensional metric model and useful metrics which are helpful to assess any given knowledge management system. In this proposed work, we first describe the actual implementation steps for building the KM System metric database using the multi-dimensional metric model. Secondly we describe the approaches for designing a multi-dimensional Restful Resources and Web Services using the mutli-dimensional metric model and demonstrate how the KM system can be ranked and rated for its effectiveness using WAM and RESTful Resources.
Improving Service Recommendation Method on Map reduce by User Preferences and...paperpublications3
Abstract: Service recommender systems have been shown as valuable tools for providing appropriate recommendations to users. In the last decade, the amount of customers, services and online information has grown rapidly, yielding the big data analysis problem for service recommender systems. Consequently, traditional service recommender systems often suffer from scalability and inefficiency problems most of existing service recommender systems present the same ratings and rankings of services to different users without considering diverse users' preferences, and therefore fails to meet users' personalized requirements. In this paper, to address the above challenges and presenting a personalized service recommendation list and recommending the most appropriate services to the users effectively. Specifically, keywords are used to indicate users' preferences, and a user-based Collaborative filtering algorithm is adopted to generate appropriate recommendations.Keywords: recommender system, user preference, keyword, Big Data, mapreduce, Hadoop.
Title: Improving Service Recommendation Method on Map reduce by User Preferences and Reviews
Author: Dayanand Bhovi, Mr. Ashwin Kumar
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Paper Publications
Recommender System (RS) has emerged as a significant research interest that aims to assist users to seek out items online by providing suggestions that closely match their interests. Recommender system, an information filtering technology employed in many items is presented in internet sites as per the interest of users, and is implemented in applications like movies, music, venue, books, research articles, tourism and social media normally. Recommender systems research is usually supported comparisons of predictive accuracy: the higher the evaluation scores, the higher the recommender. One amongst the leading approaches was the utilization of advice systems to proactively recommend scholarly papers to individual researchers. In today's world, time has more value and therefore the researchers haven't any much time to spend on trying to find the proper articles in line with their research domain. Recommender Systems are designed to suggest users the things that best fit the user needs and preferences. Recommender systems typically produce an inventory of recommendations in one among two ways -through collaborative or content-based filtering. Additionally, both the general public and also the non-public used descriptive metadata are used. The scope of the advice is therefore limited to variety of documents which are either publicly available or which are granted copyright permits. Recommendation systems (RS) support users and developers of varied computer and software systems to beat information overload, perform information discovery tasks and approximate computation, among others.
Personalized E-commerce based recommendation systems using deep-learning tech...IAESIJAI
As technology is surpassing each day, with the variation of personalized drifts
relevant to the explicit behavior of users using the internet. Recommendation
systems use predictive mechanisms like predicting a rating that a customer
could give on a specific item. This establishes a ranked list of items according
to the preferences each user makes concerning exhibiting personalized
recommendations. The existing recommendation techniques are efficient in
systematically creating recommendation techniques. This approach
encounters many challenges such as determining the accuracy, scalability, and
data sparsity. Recently deep learning attains significant research to enhance
the performance to improvise feature specification in learning the efficiency
of retrieving the necessary information as well as a recommendation system
approach. Here, we provide a thorough review of the deep-learning
mechanism focused on the learning-rates-based prediction approach modeled
to articulate the widespread summary for the state-of-art techniques. The
novel techniques ensure the incorporation of innovative perspectives to
pertain to the unique and exciting growth in this field.
Selecting User Influence on Twitter Data Using Skyline Query under MapReduce ...TELKOMNIKA JOURNAL
The aim of this research was to select and identify user influence on Twitter data. In identification stage, the method proposed in this study was matrix Twitter approach, sentiment analysis, and characterization of the opinion leader. The importan characteristics included external communication, accessibility, and innovation. Based on these characteristics and information from Twitter data through matrix Twitter and sentiment analysis, a algorithm of skyline query was constructed for the selection stage. Algorithm of skyline query selected user influence by comparing with other users according to values of each characteristic. Thus, user influence was indicated as user that was not influenced by other users in any combination of skyline objects. The use of MapReduce framework model in identification and selection stage, support whole operation where Twitter had big size data and rapid changes. The results in identification and selection of user influence exhibited that MapReduce framework minimized the execution time, whereas in parallel skyline query could reveal user influence on the data.
Recommender systems: a novel approach based on singular value decompositionIJECEIAES
Due to modern information and communication technologies (ICT), it is increasingly easier to exchange data and have new services available through the internet. However, the amount of data and services available increases the difficulty of finding what one needs. In this context, recommender systems represent the most promising solutions to overcome the problem of the so-called information overload, analyzing users' needs and preferences. Recommender systems (RS) are applied in different sectors with the same goal: to help people make choices based on an analysis of their behavior or users' similar characteristics or interests. This work presents a different approach for predicting ratings within the model-based collaborative filtering, which exploits singular value factorization. In particular, rating forecasts were generated through the characteristics related to users and items without the support of available ratings. The proposed method is evaluated through the MovieLens100K dataset performing an accuracy of 0.766 and 0.951 in terms of mean absolute error and root-mean-square error.
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
Distributed Denial of Service (DDoS) Attacks became a massive threat to the Internet. Traditional
Architecture of internet is vulnerable to the attacks like DDoS. Attacker primarily acquire his army of Zombies,
then that army will be instructed by the Attacker that when to start an attack and on whom the attack should be
done. In this paper, different techniques which are used to perform DDoS Attacks, Tools that were used to
perform Attacks and Countermeasures in order to detect the attackers and eliminate the Bandwidth Distributed
Denial of Service attacks (B-DDoS) are reviewed. DDoS Attacks were done by using various Flooding
techniques which are used in DDoS attack.
The main purpose of this paper is to design an architecture which can reduce the Bandwidth
Distributed Denial of service Attack and make the victim site or server available for the normal users by
eliminating the zombie machines. Our Primary focus of this paper is to dispute how normal machines are
turning into zombies (Bots), how attack is been initiated, DDoS attack procedure and how an organization can
save their server from being a DDoS victim. In order to present this we implemented a simulated environment
with Cisco switches, Routers, Firewall, some virtual machines and some Attack tools to display a real DDoS
attack. By using Time scheduling, Resource Limiting, System log, Access Control List and some Modular
policy Framework we stopped the attack and identified the Attacker (Bot) machines
Hearing loss is one of the most common human impairments. It is estimated that by year 2015 more
than 700 million people will suffer mild deafness. Most can be helped by hearing aid devices depending on the
severity of their hearing loss. This paper describes the implementation and characterization details of a dual
channel transmitter front end (TFE) for digital hearing aid (DHA) applications that use novel micro
electromechanical- systems (MEMS) audio transducers and ultra-low power-scalable analog-to-digital
converters (ADCs), which enable a very-low form factor, energy-efficient implementation for next-generation
DHA. The contribution of the design is the implementation of the dual channel MEMS microphones and powerscalable
ADC system.
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
-A composite beam is composed of a steel beam and a slab connected by means of shear connectors
like studs installed on the top flange of the steel beam to form a structure behaving monolithically. This study
analyzes the effects of the tensile behavior of the slab on the structural behavior of the shear connection like slip
stiffness and maximum shear force in composite beams subjected to hogging moment. The results show that the
shear studs located in the crack-concentration zones due to large hogging moments sustain significantly smaller
shear force and slip stiffness than the other zones. Moreover, the reduction of the slip stiffness in the shear
connection appears also to be closely related to the change in the tensile strain of rebar according to the increase
of the load. Further experimental and analytical studies shall be conducted considering variables such as the
reinforcement ratio and the arrangement of shear connectors to achieve efficient design of the shear connection
in composite beams subjected to hogging moment.
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
Gold has been extracted from northeast Africa for more than 5000 years, and this may be the first
place where the metal was extracted. The Arabian-Nubian Shield (ANS) is an exposure of Precambrian
crystalline rocks on the flanks of the Red Sea. The crystalline rocks are mostly Neoproterozoic in age. ANS
includes the nations of Israel, Jordan. Egypt, Saudi Arabia, Sudan, Eritrea, Ethiopia, Yemen, and Somalia.
Arabian Nubian Shield Consists of juvenile continental crest that formed between 900 550 Ma, when intra
oceanic arc welded together along ophiolite decorated arc. Primary Au mineralization probably developed in
association with the growth of intra oceanic arc and evolution of back arc. Multiple episodes of deformation
have obscured the primary metallogenic setting, but at least some of the deposits preserve evidence that they
originate as sea floor massive sulphide deposits.
The Red Sea Hills Region is a vast span of rugged, harsh and inhospitable sector of the Earth with
inimical moon-like terrain, nevertheless since ancient times it is famed to be an abode of gold and was a major
source of wealth for the Pharaohs of ancient Egypt. The Pharaohs old workings have been periodically
rediscovered through time. Recent endeavours by the Geological Research Authority of Sudan led to the
discovery of a score of occurrences with gold and massive sulphide mineralizations. In the nineties of the
previous century the Geological Research Authority of Sudan (GRAS) in cooperation with BRGM utilized
satellite data of Landsat TM using spectral ratio technique to map possible mineralized zones in the Red Sea
Hills of Sudan. The outcome of the study mapped a gossan type gold mineralization. Band ratio technique was
applied to Arbaat area and a signature of alteration zone was detected. The alteration zones are commonly
associated with mineralization. The alteration zones are commonly associated with mineralization. A filed check
confirmed the existence of stock work of gold bearing quartz in the alteration zone. Another type of gold
mineralization that was discovered using remote sensing is the gold associated with metachert in the Atmur
Desert.
Reducing Corrosion Rate by Welding DesignIJERD Editor
The paper addresses the importance of welding design to prevent corrosion at steel. Welding is
used to join pipe, profiles at bridges, spindle, and a lot more part of engineering construction. The
problems happened associated with welding are common issues in these fields, especially corrosion.
Corrosion can be reduced with many methods, they are painting, controlling humidity, and also good
welding design. In the research, it can be found that reducing residual stress on the welding can be
solved in corrosion rate reduction problem.
Preheating on 500oC and 600oC give better condition to reduce corosion rate than condition after
preheating 400oC. For all welding groove type, material with 500oC and 600oC preheating after 14 days
corrosion test is 0,5%-0,69% lost. Material with 400oC preheating after 14 days corrosion test is 0,57%-0,76%
lost.
Welding groove also influence corrosion rate. X and V type welding groove give better condition to reduce
corrosion rate than use 1/2V and 1/2 X welding groove. After 14 days corrosion test, the samples with
X welding groove type is 0,5%-0,57% lost. The samples with V welding groove after 14 days corrosion test is
0,51%-0,59% lost. The samples with 1/2V and 1/2X welding groove after 14 days corrosion test is 0,58%-
0,71% lost.
Router 1X3 – RTL Design and VerificationIJERD Editor
Routing is the process of moving a packet of data from source to destination and enables messages
to pass from one computer to another and eventually reach the target machine. A router is a networking device
that forwards data packets between computer networks. It is connected to two or more data lines from different
networks (as opposed to a network switch, which connects data lines from one single network). This paper,
mainly emphasizes upon the study of router device, it‟s top level architecture, and how various sub-modules of
router i.e. Register, FIFO, FSM and Synchronizer are synthesized, and simulated and finally connected to its top
module.
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
This paper presents a component within the flexible ac-transmission system (FACTS) family, called
distributed power-flow controller (DPFC). The DPFC is derived from the unified power-flow controller (UPFC)
with an eliminated common dc link. The DPFC has the same control capabilities as the UPFC, which comprise
the adjustment of the line impedance, the transmission angle, and the bus voltage. The active power exchange
between the shunt and series converters, which is through the common dc link in the UPFC, is now through the
transmission lines at the third-harmonic frequency. DPFC multiple small-size single-phase converters which
reduces the cost of equipment, no voltage isolation between phases, increases redundancy and there by
reliability increases. The principle and analysis of the DPFC are presented in this paper and the corresponding
simulation results that are carried out on a scaled prototype are also shown.
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
Power quality has been an issue that is becoming increasingly pivotal in industrial electricity
consumers point of view in recent times. Modern industries employ Sensitive power electronic equipments,
control devices and non-linear loads as part of automated processes to increase energy efficiency and
productivity. Voltage disturbances are the most common power quality problem due to this the use of a large
numbers of sophisticated and sensitive electronic equipment in industrial systems is increased. This paper
discusses the design and simulation of dynamic voltage restorer for improvement of power quality and
reduce the harmonics distortion of sensitive loads. Power quality problem is occurring at non-standard
voltage, current and frequency. Electronic devices are very sensitive loads. In power system voltage sag,
swell, flicker and harmonics are some of the problem to the sensitive load. The compensation capability
of a DVR depends primarily on the maximum voltage injection ability and the amount of stored
energy available within the restorer. This device is connected in series with the distribution feeder at
medium voltage. A fuzzy logic control is used to produce the gate pulses for control circuit of DVR and the
circuit is simulated by using MATLAB/SIMULINK software.
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
Additive manufacturing process, also popularly known as 3-D printing, is a process where a product
is created in a succession of layers. It is based on a novel materials incremental manufacturing philosophy.
Unlike conventional manufacturing processes where material is removed from a given work price to derive the
final shape of a product, 3-D printing develops the product from scratch thus obviating the necessity to cut away
materials. This prevents wastage of raw materials. Commonly used raw materials for the process are ABS
plastic, PLA and nylon. Recently the use of gold, bronze and wood has also been implemented. The complexity
factor of this process is 0% as in any object of any shape and size can be manufactured.
Spyware triggering system by particular string valueIJERD Editor
This computer programme can be used for good and bad purpose in hacking or in any general
purpose. We can say it is next step for hacking techniques such as keylogger and spyware. Once in this system if
user or hacker store particular string as a input after that software continually compare typing activity of user
with that stored string and if it is match then launch spyware programme.
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
This paper presents a blind steganalysis technique to effectively attack the JPEG steganographic
schemes i.e. Jsteg, F5, Outguess and DWT Based. The proposed method exploits the correlations between
block-DCTcoefficients from intra-block and inter-block relation and the statistical moments of characteristic
functions of the test image is selected as features. The features are extracted from the BDCT JPEG 2-array.
Support Vector Machine with cross-validation is implemented for the classification.The proposed scheme gives
improved outcome in attacking.
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
- Data over the cloud is transferred or transmitted between servers and users. Privacy of that
data is very important as it belongs to personal information. If data get hacked by the hacker, can be
used to defame a person’s social data. Sometimes delay are held during data transmission. i.e. Mobile
communication, bandwidth is low. Hence compression algorithms are proposed for fast and efficient
transmission, encryption is used for security purposes and blurring is used by providing additional
layers of security. These algorithms are hybridized for having a robust and efficient security and
transmission over cloud storage system.
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
A thorough review of existing literature indicates that the Buckley-Leverett equation only analyzes
waterflood practices directly without any adjustments on real reservoir scenarios. By doing so, quite a number
of errors are introduced into these analyses. Also, for most waterflood scenarios, a radial investigation is more
appropriate than a simplified linear system. This study investigates the adoption of the Buckley-Leverett
equation to estimate the radius invasion of the displacing fluid during waterflooding. The model is also adopted
for a Microbial flood and a comparative analysis is conducted for both waterflooding and microbial flooding.
Results shown from the analysis doesn’t only records a success in determining the radial distance of the leading
edge of water during the flooding process, but also gives a clearer understanding of the applicability of
microbes to enhance oil production through in-situ production of bio-products like bio surfactans, biogenic
gases, bio acids etc.
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
- Gesture gaming is a method by which users having a laptop/pc/x-box play games using natural or
bodily gestures. This paper presents a way of playing free flash games on the internet using an ordinary webcam
with the help of open source technologies. Emphasis in human activity recognition is given on the pose
estimation and the consistency in the pose of the player. These are estimated with the help of an ordinary web
camera having different resolutions from VGA to 20mps. Our work involved giving a 10 second documentary to
the user on how to play a particular game using gestures and what are the various kinds of gestures that can be
performed in front of the system. The initial inputs of the RGB values for the gesture component is obtained by
instructing the user to place his component in a red box in about 10 seconds after the short documentary before
the game is finished. Later the system opens the concerned game on the internet on popular flash game sites like
miniclip, games arcade, GameStop etc and loads the game clicking at various places and brings the state to a
place where the user is to perform only gestures to start playing the game. At any point of time the user can call
off the game by hitting the esc key and the program will release all of the controls and return to the desktop. It
was noted that the results obtained using an ordinary webcam matched that of the Kinect and the users could
relive the gaming experience of the free flash games on the net. Therefore effective in game advertising could
also be achieved thus resulting in a disruptive growth to the advertising firms.
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
-LLC resonant frequency converter is basically a combo of series as well as parallel resonant ckt. For
LCC resonant converter it is associated with a disadvantage that, though it has two resonant frequencies, the
lower resonant frequency is in ZCS region[5]. For this application, we are not able to design the converter
working at this resonant frequency. LLC resonant converter existed for a very long time but because of
unknown characteristic of this converter it was used as a series resonant converter with basically a passive
(resistive) load. . Here, it was designed to operate in switching frequency higher than resonant frequency of the
series resonant tank of Lr and Cr converter acts very similar to Series Resonant Converter. The benefit of LLC
resonant converter is narrow switching frequency range with light load[6] . Basically, the control ckt plays a
very imp. role and hence 555 Timer used here provides a perfect square wave as the control ckt provides no
slew rate which makes the square wave really strong and impenetrable. The dead band circuit provides the
exclusive dead band in micro seconds so as to avoid the simultaneous firing of two pairs of IGBT’s where one
pair switches off and the other on for a slightest period of time. Hence, the isolator ckt here is associated with
each and every ckt used because it acts as a driver and an isolation to each of the IGBT is provided with one
exclusive transformer supply[3]. The IGBT’s are fired using the appropriate signal using the previous boards
and hence at last a high frequency rectifier ckt with a filtering capacitor is used to get an exact dc
waveform .The basic goal of this particular analysis is to observe the wave forms and characteristics of
converters with differently positioned passive elements in the form of tank circuits.
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
LLC resonant frequency converter is basically a combo of series as well as parallel resonant ckt. For
LCC resonant converter it is associated with a disadvantage that, though it has two resonant frequencies, the
lower resonant frequency is in ZCS region [5]. For this application, we are not able to design the converter
working at this resonant frequency. LLC resonant converter existed for a very long time but because of
unknown characteristic of this converter it was used as a series resonant converter with basically a passive
(resistive) load. . Here, it was designed to operate in switching frequency higher than resonant frequency of the
series resonant tank of Lr and Cr converter acts very similar to Series Resonant Converter. The benefit of LLC
resonant converter is narrow switching frequency range with light load[6] . Basically, the control ckt plays a
very imp. role and hence 555 Timer used here provides a perfect square wave as the control ckt provides no
slew rate which makes the square wave really strong and impenetrable. The dead band circuit provides the
exclusive dead band in micro seconds so as to avoid the simultaneous firing of two pairs of IGBT’s where one
pair switches off and the other on for a slightest period of time. Hence, the isolator ckt here is associated with
each and every ckt used because it acts as a driver and an isolation to each of the IGBT is provided with one
exclusive transformer supply[3]. The IGBT’s are fired using the appropriate signal using the previous boards
and hence at last a high frequency rectifier ckt with a filtering capacitor is used to get an exact dc
waveform .The basic goal of this particular analysis is to observe the wave forms and characteristics of
converters with differently positioned passive elements in the form of tank circuits. The supported simulation
is done through PSIM 6.0 software tool
Amateurs Radio operator, also known as HAM communicates with other HAMs through Radio
waves. Wireless communication in which Moon is used as natural satellite is called Moon-bounce or EME
(Earth -Moon-Earth) technique. Long distance communication (DXing) using Very High Frequency (VHF)
operated amateur HAM radio was difficult. Even with the modest setup having good transceiver, power
amplifier and high gain antenna with high directivity, VHF DXing is possible. Generally 2X11 YAGI antenna
along with rotor to set horizontal and vertical angle is used. Moon tracking software gives exact location,
visibility of Moon at both the stations and other vital data to acquire real time position of moon.
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
Simple Sequence Repeats (SSR), also known as Microsatellites, have been extensively used as
molecular markers due to their abundance and high degree of polymorphism. The nucleotide sequences of
polymorphic forms of the same gene should be 99.9% identical. So, Microsatellites extraction from the Gene is
crucial. However, Microsatellites repeat count is compared, if they differ largely, he has some disorder. The Y
chromosome likely contains 50 to 60 genes that provide instructions for making proteins. Because only males
have the Y chromosome, the genes on this chromosome tend to be involved in male sex determination and
development. Several Microsatellite Extractors exist and they fail to extract microsatellites on large data sets of
giga bytes and tera bytes in size. The proposed tool “MS-Extractor: An Innovative Approach to extract
Microsatellites on „Y‟ Chromosome” can extract both Perfect as well as Imperfect Microsatellites from large
data sets of human genome „Y‟. The proposed system uses string matching with sliding window approach to
locate Microsatellites and extracts them.
Importance of Measurements in Smart GridIJERD Editor
- The need to get reliable supply, independence from fossil fuels, and capability to provide clean
energy at a fixed and lower cost, the existing power grid structure is transforming into Smart Grid. The
development of a smart energy distribution grid is a current goal of many nations. A Smart Grid should have
new capabilities such as self-healing, high reliability, energy management, and real-time pricing. This new era
of smart future grid will lead to major changes in existing technologies at generation, transmission and
distribution levels. The incorporation of renewable energy resources and distribution generators in the existing
grid will increase the complexity, optimization problems and instability of the system. This will lead to a
paradigm shift in the instrumentation and control requirements for Smart Grids for high quality, stable and
reliable electricity supply of power. The monitoring of the grid system state and stability relies on the
availability of reliable measurement of data. In this paper the measurement areas that highlight new
measurement challenges, development of the Smart Meters and the critical parameters of electric energy to be
monitored for improving the reliability of power systems has been discussed.
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
One of the major environmental concerns is the disposal of the waste materials and utilization of
industrial by products. Lime stone quarries will produce millions of tons waste dust powder every year. Having
considerable high degree of fineness in comparision to cement this material may be utilized as a partial
replacement to cement. For this purpose an experiment is conducted to investigate the possibility of using lime
stone powder in the production of SCC with combined use GGBS and how it affects the fresh and mechanical
properties of SCC. First SCC is made by replacing cement with GGBS in percentages like 10, 20, 30, 40, 50 and
by taking the optimum mix with GGBS lime stone powder is blended to mix in percentages like 5, 10, 15, 20 as
a partial replacement to cement. Test results shows that the SCC mix with combination of 30% GGBS and 15%
limestone powder gives maximum compressive strength and fresh properties are also in the limits prescribed by
the EFNARC.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
How to Get CNIC Information System with Paksim Ga.pptx
IJERD (www.ijerd.com) International Journal of Engineering Research and Development
1. International Journal of Engineering Research and Development
e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com
Volume 2, Issue 9 (August 2012), PP. 46-50
Value co-creation attributes which influence on e-services: The
case of UTM Institutional Repository
Neda Ahrar1, Azizah Abdul Rahman2
1,2
Department of Information System, Faculty of Computer Science and Information System, Universiti Teknologi Malaysia,
Malaysia
Abstract––Co-creation model is a method of market strategy or business strategy which focuses on the production and
progressive realization. This model looks at market or business as a forum for active customers as they must be value in
use customers and firm in order to incorporate, repair and fixed up resources of each other and also capabilities to create
value through new forms of interaction, service and learning mechanisms. It varies from the traditional active firm -
impressionable consumer market construct of the past. Now a days in businesses, services available via the internet, this
called e-services which the quality of them is critical issue in this technological decades. Assessing e-services is an
important issue in order to gain success for long term which one way is assessing e-services based on their attributes from
value co-creation perspective. The aim of this study is to find value co-creation attributes that influence on UTM
Institutional Repository (UTM IR). DART model was used to assess the value co-creation. Interview method applied to
collect data from the main stakeholders. In conclusion considering the features of value co-creation and using its
concepts in e-services has the potential to find its attributes in order to evaluate UTM IR.
Keywords––Value co-creation, e-services quality, e-services, attributes, Institutional Repository
I. INTRODUCTION
Co-creation of value is a value creation by both customer and provider which used in marketing, as without any
focuses and attentions to the customer perceptions marketing will be failed in a short period of time. Also e-services are an
electronic way of representing services over electronic networks such as internet. So for each e-service the value co-creation
concept must be evaluated and the best way for that is using DART model, which helps to built initial blocks between
customer and provider. [1] this model will help to understand the important aspect of connectivity between customer and
provider.
The locus for value creation is the interactions between the firm and the customers. Such interactions can
happen through four main building blocks of co-creation; dialogue, access, risk, and transparency (DART). It is an
important( a significant) notion that these are interrelated, and should not be seen as separate blocks, and by embracing these
companies enhances the opportunities for value co-creation. [2] Based on this model related questions to the blocks must
design to ask from stakeholders during interview. It helps to elaborate attributes which collected from providers and
customers that are value co-creators.
The history of e-services back to the age of services which discussion about that done by many authors like
Sampson and Froehle in 2006. Services can viewed as every action with the purpose of making benefit for someone else
which is independent of its result whether it is successful based on its objectives or not. [3] Value to the customer is the
primary issue; whether that value is delivered through goods or services where goods mean as distribution mechanisms for
service provision. [4] An e-service has been defined as a service available via the internet that completes tasks or conducts
transactions. [5] E-service is deeds, efforts or performance whose delivery is mediated by information technology (including
the Web, information kiosks and mobile devices). Such e-service includes the service element of e-tailing, customer support
and service, and service delivery. [6] following this definition e-services encompass numerous sectors of social and public
life, including information retrieval, e-commerce, e-learning, financial services, and e-government. [7]
On science and research, attribute is a characteristic of an object. In services, quality measured by a model which
called service quality framework or SERVQUAL that developed in the mid of eighties by Zeithaml, Parasuraman and Berry
and it is really important in a competitive organization environment. [8] As a measure of e-service quality, the E-A-S-QUAL
model contains an extensive list of service attributes available on apparel retail web sites. SERVQUAL was originally
measured on ten aspects of service quality: reliability, responsiveness, competence, access, courtesy, communication,
credibility, security, understanding the customer and tangibles. It measures the gap between customer expectations and
experience. In this framework five major attributes used for measuring the quality of services. These attributes are reliability,
responsiveness, assurance, tangibles, and empathy. [9] This model will help study to understand which processes don
correctly or not.
E-Prints is a free and open source software package for building open access repositories that are compliant with
the Open Archives Initiative Protocol for Metadata Harvesting (OAI-PMH). [10] UTM used E-Print to built its own
Institutional Repository which called UTM IR.
In this paper UTM IR chose as an e-service to find value co-creation attribute which influence on it.
46
2. Value co-creation attributes which influence on e-services: The case of UTM Institutional Repository
II. RESEARCH OBJECTIVES
Based on the research background, the work conducted aims to find value co-creation attributes that influence on
UTM Institutional Repository (UTM IR) as an e-service application. The objective of the done work will cover the following
aspect:
To find value co-creation attributes that influence UTM IR
III. RESEARCH FRAMEWORK
Currently, the work is conducted in three main phases. In Phase 1, Interview, the problem will be reviewed
through potential literature such as reviews and case collections. The case study of this research will be studied in-depth in
order to design structured questions during interview and also elaborate the limitation and potential that can lead to research.
Content analysis is the method used to gather the information and DART model used as an instrument.
As in co-creation concept value made by provider and consumer or user, the respondents of this research divided
in to two groups which were UTM IR providers and the users which were UTM students and lecturers.
In part of providers, six UTM experts used to collect data. The experts were including the top management and
operational part in UTM Library (PSZ) and also technical part in CICT “UTM Centre for Information and Communication
Technology” which just five of them were from PSZ and 1 of them was from CICT. In part of users just thirty UTM students
those attended in research Methodology class in UTM and lecturers used for completing the data collection.
In Phase 2, Coding, After come up with the written of interviews’ answers, important points based on definition of
DART highlighted and after that the related ones to each block grouped to come up with codes. Then for analyze the
findings according to the objective of this study we need to categorize the codes. To achieve this goal we referred to the
literature review. To find attributes from co-creation perspective we need to build the co-creation blocks that Dialog, Access,
Transparency and Risk/ Benefit are related blocks.
Finally in Phase 3, List Attributes, based on the gape in each building block, related attribute will represented. The
research framework derived is as in Figure 1.
Fig. 1 Research Framework
IV. EXPECTED FINDING
As mentioned earlier the interview was designed according to the literature review of this study. The main
instrument which helped the study is DART model. Accordingly the structured questions asked based on this model. So a
table designed to make relations between findings that coded with building blocks. This part represent in to two categories
which one of them use for provider perception and the other for user perception.
4.1. Coding providers’ responses
In this part, codes represented for provider’s group based on the objective of this study shown in Table 1. This
table also has shown the devotion providers’ code into DART blocks.
Table 1: Coding providers’ responses
47
3. Value co-creation attributes which influence on e-services: The case of UTM Institutional Repository
4.2. Coding users’ responses
Also in Table 2 the significant points of interview whit the active users of UTM IR which represent by code
according to the objective shown.
Table 2: Coding users’ responses
4.3. Gap Analysis based Providers and Users
In order to find this attributes data coded and analyses don based on providers and users. From there the study can
easily categorize attributes that influencing UTM IR from value co-creation perspective. In summary the attributes represent
on table 3 based on analyzing the providers and users perception.
4.3.1. Dialog
Dialog Gap
Dialogue is the most important element for co-creating process, since market consider as a focus of conversation
between customers and firms. [11] In this case Dialog will be a locus of conversation that implement on UTM IR. Based on
this definition found that providers did not implement such a place for conversation as they said if users need more details to
achieve complete data, they must fill up request form or direct connect to the author. Also they mentioned, in order to
communicate whit depositor for incomplete metadata staffs can choose form of Phone or online form. This mater emphasize
by users as they said there is no place on this service to put our comments there. So it shows the attribute of this system
based on Dialog block which is unavailability of platform for interaction. So it shows a gap about conversation through this
system.
Suggested Attribute
This gab leads us to such an attributes like availability of platform for interaction which comes up based on the
providers and users perception through co-creation of value perspective. As mentioned before providers believed that this
platform is available but according to the users it is not.
4.3.2. Access
Access Gap
Access block refers to the level of access to data provided to one or more of the value co-creating sides and it
begins with tools and information [11] and in this case providers made the searching part by different division on the menu
from the interface of this service. They believed that the information for search the materials in orders to access to the data
make value for user that able them to access freely at anytime and anywhere. While the users believed that the search part is
not good enough and the information is not enough to access through materials because all of them complain about the
location and the name of this system and also they could not able to find all latest area of UTM research output.
Suggested Attribute
As mentioned above the gap between users and providers in access block was related to the usage of this system
and also guidance for that usage. By this two significant we can come up with Usability and Trainable attributes through this
block.
4.3.3. Transparency
Transparency Gap
Transparency is related to the level of clarity in objectives and actions between one or more value creators, and it
is very closely related to accessibility as well as facilitates collaborative dialogue with consumers. [11] Based on providers,
objective of having this system is advertising in the world to make rank based on usage of users and users thought this
system implement to share all knowledge data but some of them mentioned it is not easy to find the goal of this system. Also
the action that happened between both sides, take value for user because they can access at any time freely based on
providers. Users believed that this system is easy to access trough materials but the location and the name for this system is
really bad to understand.
Suggested Attribute
The above significant related to transparency lead us to the level of Clarity, Visibility and Accessibility of this
system which are attributes based on definition of transparency.
48
4. Value co-creation attributes which influence on e-services: The case of UTM Institutional Repository
4.3.4. Risk and Benefit
Risk and Benefit Gap
Risk and Benefit means, “Customers need to get information about the advantages and disadvantages of the system
that is value in use” [11] with the respondents perception the gap based on co-creation of value arise as follow. Providers
believe that the advantage for users of UTM IR which works as a medium is knowledge sharing and facility the knowledge.
Users also had the same idea; they believed that they could find the latest area worked but not all, which shows the little gap
in the part of advantage or benefit. For disadvantages of this service, providers said lack of self archiving is the most
important disadvantages for our user based on objective of UTM IR. Users believed that trust to the policy of system is
really hard to put materials inside the system while they may come up whit unpublished materials.
Suggested Attribute
As mentioned above there is a gap in part of advantage or benefit of using this system base on respondents. Those
definitions can come up with the attribute for Benefit block. This attribute is informative. Also based on definitions of Risk
or disadvantage of using this system we can come up with the Transparent or on the other words Reliable attribute.
Table 3: UTM IR Attributes from value co-creation perspective
As can be seen from the table the codes which represent for each building blocks shown in order to come up with
the attribute of each blocks.
4.4. Definitions of attributes
As in table 3 shown the UTM IR attributes that arise from the co-creation of value perspective, table 4 show the
definitions of each attributes.
Table 4: Definitions of UTM IR Attributes from value co-creation perspective
Attributes Definitions
Availability Able to be used or obtained a platform for interaction
of platform for interaction
Usability Able or fit to be used a tool for access through data
Trainable Able to train by providing information to access through data
Clarity The quality of transparency or purity
Visibility The state of being able to see the objective of the system
The degree to which IR has attracted general attention; prominence
Accessibility Able to be reached data
Informative Providing useful or interesting information
Transparent Easy to perceive or detect the objective and actions between provider and user;
Open to public scrutiny
Reliable Consistently good in quality or performance; able to be trusted
This definition can be use in order to elaborate e-services based on value co-creation perspective.
49
5. Value co-creation attributes which influence on e-services: The case of UTM Institutional Repository
V. CONCLUSION
Now a days in businesses, services available via the internet, this called e-services which the quality of them is
critical issue in this technological decades. Assessing e-services is an important issue in order to gain success for long term
which one way is assessing e-services based on their attributes from value co-creation perspective which is a model for
market strategy or business strategy that stress on the production and progressive realization. In co-creation value concept
made by provider and consumer or user, the respondents of research will be divided in to two groups. After collecting data
coding must be done and categorized based on DART model. Finally from there the gaps between users and providers must
found in order to achieve the related attributes. The definitions of attributes that mentioned in this study will help to
elaborate e-services based on value co-creation perspective. Doing the same process for an especial e-service by elaborate
that with value co-creation and using DART model is the most important contribution of this paper. As value co-creation is a
new concept in marketing, finding related research in this area was difficult and it can be mention as the limitation of this
study.
REFERENCES
[1]. Neda Ahrar, Azizah Abdul Rahman, Role of value Co-Creation Concept in e-services, international Journal of Modern
Engineering Research(IJMER), 2(3), 2012, 593-595.
[2]. Prahalad C. K, V. R. (2004). Co-Creation Experiences: The Next Practice in Value Creation. Journal of Interactive Marketing,
18(3), 5-14.
[3]. Craig M. Froehle, Service Personnel, Technology and Their Interaction in Influencing Customer Satisfaction, A Journal of the
Decision Sciences Institute, 37(1), 2006, 5-38.
[4]. Vargo, S. L. and Lusch, R. F. (2004). Evolving to a New Dominant Logic for Marketing. Journal of Marketing, 68(1), January.
1-17.
[5]. Sahai A, Machiraju V, Wurster K. Monitoring and Controlling Internet based Services. The Second IEEE Workshop on Internet
Applications (WIAPP'01), San Jose, CA July, 2001 (also HPL-2000-120)
[6]. Rowley, J. (2006). An analysis of the e-service literature: towards a research agenda. Internet Research, 16(3), 339-360.
[7]. Dinev, T. and Hart, P. (2006). An Extended Privacy Calculus Model for E-Commerce Transactions, Information Systems
Research, 17 (1), 26.
[8]. Earl R. Babbie, (2009). The Practice of Social Research, (12th ed.) Wadsworth Publishing, (pp. 14-18).
[9]. Kim, M., Kim, J-H., and Lennon, J. (2006), "Online service attributes available on apparel web sites: an E-S-QUAL approach",
Managing Service Quality, 16 (1), 51-77.
[10]. Tansley R. & Harnad, S, Eprints.org Software for Creating Institutional and Individual Open Archives D-Lib Magazine, 6(10),
2000.
[11]. Prah alad, C., & Ramaswamy, V. (2004). Co - creation experience: the next practice in value creation. Journal of interactive
marketing.
50