• Title/Summary/Keyword: Computer Usage

Search Result 1,245, Processing Time 0.027 seconds

Fuzzy Web Usage Mining for User Modeling

  • Jang, Jae-Sung;Jun, Sung-Hae;Oh, Kyung-Whan
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.2 no.3
    • /
    • pp.204-209
    • /
    • 2002
  • The interest of data mining in artificial intelligence with fuzzy logic has been increased. Data mining is a process of extracting desirable knowledge and interesting pattern ken large data set. Because of expansion of WWW, web data is more and more huge. Besides mining web contents and web structures, another important task for web mining is web usage mining which mines web log data to discover user access pattern. The goal of web usage mining in this paper is to find interesting user pattern in the web with user feedback. It is very important to find user's characteristic fer e-business environment. In Customer Relationship Management, recommending product and sending e-mail to user by extracted users characteristics are needed. Using our method, we extract user profile from the result of web usage mining. In this research, we concentrate on finding association rules and verify validity of them. The proposed procedure can integrate fuzzy set concept and association rule. Fuzzy association rule uses given server log file and performs several preprocessing tasks. Extracted transaction files are used to find rules by fuzzy web usage mining. To verify the validity of user's feedback, the web log data from our laboratory web server.

Understanding the Risks on Saudi Arabian's Youth Being Online Without Having Strong Cyber-Security Awareness

  • Alharbi, Nawaf;Soh, Ben;AlZain, Mohammed A;Alharbi, Mawaddah
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.131-146
    • /
    • 2022
  • The Internet is becoming a basic need for many individuals globally in this digital age. The youths became more active online than before, with the majority relying on different platforms to communicate and interact with peers. Saudi Arabia is one of the nations where internet usage is high, with an increasing number of active internet users. The youth in Saudi Arabia are engaged in various online platforms. However, they lack adequate knowledge about cybersecurity and the dangers of internet usage, which exposes them to the risk of falling victims to cybercriminals. The most common dangers of internet usage include viruses, malware, phishing, and hacking, compromising users' sensitive information. Increased awareness of these potential threats helps protect Internet users and secure their data. The understanding of the dangers of Internet usage among youths varies across countries. In this regard, our study explores the risks of internet usage among youth in Saudi Arabia compared to the United States, South Africa, and New Zealand.

What makes University Students to continuously use Cloud Services? - Enjoyment and Social Influence

  • Lee, Jong Man;Lee, Sang Jong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.1
    • /
    • pp.123-129
    • /
    • 2018
  • The purpose of this paper is to investigate the influence of utilitarian, hedonic and social motivations on continuance intention to use cloud services. To do this, this study built a research model and examined how ease of use, usefulness, enjoyment, social influence affect the continuance usage intention of cloud services. The survey method was used for this paper, and data from a total of 82 university students were used for the analysis. And structural equation model was used to analyze the data. The results of this empirical study is summarized as followings. First, enjoyment has a direct effect on the continuance usage intention of cloud services. Second, social influence has a direct effect on the continuance usage intention. Further, it will provide meaning suggestion point of the importance of not only utilitarian motivation but also hedonic and social motivations in establishing the use policy of cloud services.

Access, Skills and Constraints of Barangay Officials towards the Use of Information and Communications Technology (ICT)

  • Santiago, Cereneo S. Jr.;Ulanday, Ma. Leah P.;Centeno, Zarah Jane R.;Bayla, Ma. Cristina D.
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.11 no.2
    • /
    • pp.37-54
    • /
    • 2021
  • The study determined the access, skills and constraints towards the usage of ICT among barangay officials. A complete enumeration technique was used due to the small size of the population. A total of 121 barangay secretaries and barangay treasurers comprised the study respondents. The findings revealed that most of barangay officials have access to personal computer at home and in the office using their own mobile data and office internet connectivity. With the support from the Local Government Unit (LGU), it was found that most of the respondents are advance and proficient in computer usage. As constraints to ICT usage, the study respondents still experienced slow internet bandwidth that makes connection and communication weak along with the low income status. Consequently, it was found that there were no significant differences in terms of skills and constraints among barangay secretaries and barangay treasurers towards using ICT. It can be concluded that study respondents prefer to use office computer to access the information they need due to the convenience and availability of resources. The study respondents were competent enough to handle their job well but listed slow internet and low financial resources may hamper their ICT usage. Research implications were also offered.

The Social Media Factor: How Platforms Impact Usability of Blackboard at Umm Al Qura University

  • Ahmed R Albashiri
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.7
    • /
    • pp.207-213
    • /
    • 2024
  • This study investigated the perceived usability of the Blackboard learning management system (LMS) amongst students at Umm Al-Qura University. A quantitative approach was employed to explore the potential relationship between Blackboard usability and social media platform usage. Additionally, the study aimed to identify other factors influencing perceived usability. Data were collected through a three-section questionnaire distributed electronically to a sample of students (n=544). The findings, based on System Usability Scale (SUS) scores, revealed that the overall perceived usability of Blackboard resided near the midpoint of the scale, indicating an "acceptable" level. A potential negative correlation emerged between social media usage time and perceived Blackboard usability. Students who reported lower social media usage exhibited higher SUS scores. Training on Blackboard usage demonstrably exerted a positive influence on perceived usability. Gender was not identified as a statistically significant factor. An analysis of student support methods revealed that seeking help from a friend was the most prevalent approach, followed by search engines, university technical support, and social media platforms. The findings suggest that implementing strategies to improve Blackboard usability at Umm Al-Qura University could be achieved through readily accessible training materials and the exploration of alternative support channels.

Extraction of ObjectProperty-UsageMethod Relation from Web Documents

  • Pechsiri, Chaveevan;Phainoun, Sumran;Piriyakul, Rapeepun
    • Journal of Information Processing Systems
    • /
    • v.13 no.5
    • /
    • pp.1103-1125
    • /
    • 2017
  • This paper aims to extract an ObjectProperty-UsageMethod relation, in particular the HerbalMedicinalProperty-UsageMethod relation of the herb-plant object, as a semantic relation between two related sets, a herbal-medicinal-property concept set and a usage-method concept set from several web documents. This HerbalMedicinalProperty-UsageMethod relation benefits people by providing an alternative treatment/solution knowledge to health problems. The research includes three main problems: how to determine EDU (where EDU is an elementary discourse unit or a simple sentence/clause) with a medicinal-property/usage-method concept; how to determine the usage-method boundary; and how to determine the HerbalMedicinalProperty-UsageMethod relation between the two related sets. We propose using N-Word-Co on the verb phrase with the medicinal-property/usage-method concept to solve the first and second problems where the N-Word-Co size is determined by the learning of maximum entropy, support vector machine, and naïve Bayes. We also apply naïve Bayes to solve the third problem of determining the HerbalMedicinalProperty-UsageMethod relation with N-Word-Co elements as features. The research results can provide high precision in the HerbalMedicinalProperty-UsageMethod relation extraction.

A Study on the Factors Promoting the Usage of WiBro Service (와이브로 서비스 활성화 방안)

  • Yoon, Jong-Soo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.7
    • /
    • pp.165-172
    • /
    • 2011
  • This study was to investigate which factors promote the usage of WiBro service, and to propose a few of research propositions on the relationships between these factor and characteristics of mobile Internet usage. To accomplish these research purposes, the study defined research variables such as factors promoting the usage of WiBro service, characteristic of mobile Internet usage, and types of user based on the review of mobile Internet service related studies. The study performed various statistical analyses using survey questionnaires on mobile Internet users, and finally proposed some research propositions, based on the analysis results, that could be used in the future studies.

Factors influencing usage intention and actual use of mobile learning (모바일러닝의 사용의도 및 실제사용에 영향을 미치는 요인 분석)

  • Lee, Jeongmin;Noh, Jiyae
    • The Journal of Korean Association of Computer Education
    • /
    • v.18 no.4
    • /
    • pp.19-30
    • /
    • 2015
  • This study investigated the structural relationships among performance expectancy, effort expectancy, social influence, facilitating condition, attitude, usage intention and actual use. In order to examine structural relationships among variables, we surveyed 285 high school students in spring semester of 2014. After collecting data, we examined causal relationships among variables using structural equation modeling. The results of this study were as follows: First, performance expectancy and effort expectancy significantly affected attitude; however, social influence did not. Second, attitude affected usage intention and usage intention significantly affected actual use. Third, the indirect effect of attitude between performance expectancy, effort expectancy and usage intention were significant and the indirect effect of usage intention between attitude and actual was also significant. Finally, the moderating effect of gender and experience were not significant. Based on this study, the practical strategies to facilitate usage intention and actual use of mobile learning of high school students were suggested.

Analysis of Delay-Bandwidth Normalization Characteristic in Decay Usage Algorithm of UNIX (UNIX의 Decay Usage 알고리즘에서의 지연시간-사용량 정규화 특성 분석)

  • Park, Kyeong-Ho;Hwang, Ho-Young;Lee, Chang-Gun;Min, Sang-Lyul
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.34 no.10
    • /
    • pp.511-520
    • /
    • 2007
  • Decay usage scheduling algorithm gives preference to processes that have consumed little CPU in the recent past. It has been widely-used in time-sharing systems such as UNIX, where CPU-intensive processes and interactive processes are mixed. However, there has been no sound understanding about the mixed effects of decay usage parameters on the service performance. This paper empirically analyzes their effects in terms of the resulting service bandwidth and delay Based on such empirical analysis, we derive the clear meaning of each parameter. Such analysis and understanding provides a basis of controlling decay usage parameters for desirable service provision as required by applications.

A Study on Copyright Usage Permission Platform Based on Blockchain for Distribution of Theme, Background and Signal Music (주제/배경/시그널 음원의 유통을 위한 블록체인 기반의 이용허락 플랫폼에 관한 연구)

  • Kim, Youngmo;Park, Byeongchan;Jang, Seyoung;Kim, Seok-Yoon
    • Journal of the Semiconductor & Display Technology
    • /
    • v.20 no.1
    • /
    • pp.18-24
    • /
    • 2021
  • The current settlement and distribution used in theme, background and signal music market other than conventional music is being carried out with either the comprehensive settlement method or the measured meter-rate settlement method in the payment process of collected user fees and compensation depending on the use-permission types. In this settlement and distribution process, however, the reliability issues are often being raised because of the difficulty of tracking rights due to changes in music source rights management information, etc, and the opaque settlement and distribution method itself. This paper proposes a new settlement and distribution platform using a blockchain for the reliable collection and distribution of copyright fees among music user group, monitoring organization group, trust organization group and copyright holders, based on the monitoring information of the theme, background and signal music usage. This platform also provides the transparency in settlement and distribution process among stakeholders through smart contract system.