• Title/Summary/Keyword: Users' Utility

Search Result 263, Processing Time 0.034 seconds

The Mediating Role of Social Media in Tourism: An eWOM Approach

  • KAKIRALA, Anish Kumar;SINGH, Devinder Pal
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.11
    • /
    • pp.381-391
    • /
    • 2020
  • This research article investigates the way eWOM in social media influences the formation of destination image through development of trust and satisfaction for the potential tourist. The research involved administering an 18-point questionnaire taking online reviews, tourist involvement, and eWOM, destination image components of trust and satisfaction as variables. Data was collected from 554 individuals forming a cross-section of social media users and analyzed using multi-variate techniques (Reliability, CFA, and SEM). Results indicate a positive and significant relationship between all except online review and destination trust and satisfaction. Indirect and direct effects indicate that eWOM fully mediates the relationship between destination satisfaction and involvement and partially mediates the relationship between destination trust and involvement. In the case of online reviews, eWOM acts as a full mediator between destination trust and destination satisfaction for the future traveler using social media. The study proposes that components of image vary depending upon the degree of involvement, volume online reviews and eWOM generated also termed as 'virality' and these in turn influence the intention to revisit or recommend a destination. The study highlights its utility for National Tourist Organizations (NTOs) and online travel intermediaries to enhance destination marketing efforts.

Influencing factors on purchase intention for smart healthcare clothing by gender and age - Focused on TAM, clothing attributes, health-lifestyle, and fashion innovativeness - (스마트 헬스케어 의류 구매의도에 대한 성별과 연령대별 영향 요인 - 기술수용모델(TAM), 의복속성, 건강라이프스타일, 패션혁신성을 중심으로 -)

  • Han, Heejung
    • The Research Journal of the Costume Culture
    • /
    • v.27 no.6
    • /
    • pp.615-631
    • /
    • 2019
  • Smart healthcare clothing combines IoT, new technology, and clothing construction to perform specific care functions, and its utility has been expanding rapidly within aging and diversified societies. However, the related market remains at an early stage of development due to limited regulation, lack of consumer awareness, and the need for not only technical development but promotion plans for potential users. This paper aims to analyze factors influencing purchase intention for smart healthcare clothing with biosignal monitoring, including variables in the Technology Acceptance Model (TAM), clothing attributes, health-related lifestyle factors, and fashion innovativeness. A survey was conducted on a sample of 300 males and 300 females ranging in age from 20 to 50 years, and data were analyzed using SPSS 21.0. The results show that perceived usefulness, perceived aesthetic attributes, health responsibility, and fashion innovativeness were overall significant predictors of using smart healthcare clothing. Additionally, perceived ease of use and physical activity in the male subsample, and perceived compatibility within the female group, also had significant effects. Furthermore, age was a determining factor; for subjects in the 30s age group, perceived usefulness, compatibility, and health responsibility had significant positive associations. The results of this study can provide basic guidelines for designing merchandising plans to expand user acceptance of smart healthcare clothing.

Semi-distributed dynamic inter-cell interference coordination scheme for interference avoidance in heterogeneous networks

  • Padmaloshani, Palanisamy;Nirmala, Sivaraj
    • ETRI Journal
    • /
    • v.42 no.2
    • /
    • pp.175-185
    • /
    • 2020
  • Inter-cell interference (ICI) is a major problem in heterogeneous networks, such as two-tier femtocell (FC) networks, because it leads to poor cell-edge throughput and system capacity. Dynamic ICI coordination (ICIC) schemes, which do not require prior frequency planning, must be employed for interference avoidance in such networks. In contrast to existing dynamic ICIC schemes that focus on homogeneous network scenarios, we propose a novel semi-distributed dynamic ICIC scheme to mitigate interference in heterogeneous network scenarios. With the goal of maximizing the utility of individual users, two separate algorithms, namely the FC base station (FBS)-level algorithm and FC management system (FMS)-level algorithm, are employed to restrict resource usage by dominant interference-creating cells. The distributed functionality of the FBS-level algorithm and low computational complexity of the FMS-level algorithm are the main advantages of the proposed scheme. Simulation results demonstrate improvement in cell-edge performance with no impact on system capacity or user fairness, which confirms the effectiveness of the proposed scheme compared to static and semi-static ICIC schemes.

Energy and Economic Analysis of Heat Recovery Cogeneration Loop Integrated with Heat Pump System by Detailed Building Energy Simulation (건물 에너지 상세 해석을 통한 소형 열병합 발전 및 히트펌프 복합 시스템의 경제성 분석)

  • Seo, Dong-Hyun;Koh, Jae-Yoon;Park, Yool
    • Korean Journal of Air-Conditioning and Refrigeration Engineering
    • /
    • v.21 no.2
    • /
    • pp.71-78
    • /
    • 2009
  • Up until recently, the energy and the economic analysis of a cogeneration system have been implemented by a manual calculation that is based on monthly thermal loads of buildings. In this study, a cogeneration system modeling validation with a detail building energy simulation, eQUEST, for a building energy and cost prediction has been implemented. By analyzing the hourly building electricity and thermal loads, it enables users to decide proper cogeneration system capacity and to estimate more accurate building energy consumption. eQUEST also verified the energy analysis when the heat pump system is integrated with the cogeneration system. The mechanical system configuration benefits from the high efficiency heat pump system while avoiding the building electricity demand increase. Economic analysis such as LCC (Life Cycle Cost) method is carried out to verify economical benefits of the system by applying actual utility rates of KEPCO(Korea Electricity Power COmpany) and KOGAS(KOrea GAS company).

Stochastic MAC-layer Interference Model for Opportunistic Spectrum Access: A Weighted Graphical Game Approach

  • Zhao, Qian;Shen, Liang;Ding, Cheng
    • Journal of Communications and Networks
    • /
    • v.18 no.3
    • /
    • pp.411-419
    • /
    • 2016
  • This article investigates the problem of distributed channel selection in opportunistic spectrum access networks from a perspective of interference minimization. The traditional physical (PHY)-layer interference model is for information theoretic analysis. When practical multiple access mechanisms are considered, the recently developed binary medium access control (MAC)-layer interference model in the previous work is more useful, in which the experienced interference of a user is defined as the number of competing users. However, the binary model is not accurate in mathematics analysis with poor achievable performance. Therefore, we propose a real-valued one called stochastic MAC-layer interference model, where the utility of a player is defined as a function of the aggregate weight of the stochastic interference of competing neighbors. Then, the distributed channel selection problem in the stochastic MAC-layer interference model is formulated as a weighted stochastic MAC-layer interference minimization game and we proved that the game is an exact potential game which exists one pure strategy Nash equilibrium point at least. By using the proposed stochastic learning-automata based uncoupled algorithm with heterogeneous learning parameter (SLA-H), we can achieve suboptimal convergence averagely and this result can be verified in the simulation. Moreover, the simulated results also prove that the proposed stochastic model can achieve higher throughput performance and faster convergence behavior than the binary one.

GDSS for the Mobile Internet

  • Cho, Yoon-Ho;Choi, Sang-Hyun;Kim, Jae-Kyeong
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2005.05a
    • /
    • pp.283-291
    • /
    • 2005
  • The development of mobile applications is fast in recent years. However, nearly all applications are for messaging, financial, locating services based on simple interactions with mobile users because of the limited screen size, narrow network bandwidth, and low computing power. Processing an algorithm for supporting a group decision process on mobile devices becomes impossible. In this paper, we introduce the mobile-oriented simple interactive procedure for support a group decision making process. The interactive procedure is developed for multiple objective linear programming problems to help the group select a compromising solution in the mobile Internet environment. Our procedure lessens the burden of group decision makers, which is one of necessary conditions of the mobile environment. Only the partial weak order preferences of variables and objectives from group decision makers are enough for searching the best compromising solution. The methodology is designed to avoid any assumption about the shape or existence of the decision makers's utility function. For the purpose of the experimental study of the procedure, we developed a group decision support system in the mobile Internet environment, MOBIGSS and applied to an allocation problem of investor assets.

  • PDF

Web Service Connection Management Scheme for Seamless Migration of User Workspace in Cloud Computing (클라우드 컴퓨팅에서 사용자 작업환경의 끊김 없는 연계를 위한 웹 서비스 연결 관리 기법)

  • Choi, Min
    • Journal of Information Technology Services
    • /
    • v.8 no.1
    • /
    • pp.193-202
    • /
    • 2009
  • Cloud computing emerges as a new computing paradigm which targets reliable and customizable services. The term builds on decades of research in virtual machine, distributed and parallel computing, utility computing, and more recently networking, web service, and software as a service. In this paper, we provide a seamless connection migration of web services. This is useful for cloud computing environment in which many client terminals have mobility. With the wireless internet facility, those mobile users can move place to place during internet communication. Therefore, we provide solutions to the two major problems in current virtualization based migration: communication failure problems and connection re-establishment. Communication channel flushing by zero window notification helps to resolve the communication failure problems and TCP port inheritance prevents connection re-establishment errors during socket reconstruction. Thus, our web service migration facility is now able to preserve open network connections, and even for server sockets. This is a highly transparent approach, in that we did not Introduce additional messages for channel flushing and did not make any modification to the TCP protocol stack. Experimental results show that the overhead due to connection migration of web services is almost negligible when compared with time to take the conventional web service migration.

Context-Aware Security System for the Smart Phone-based M2M Service Environment

  • Lee, Hyun-Dong;Chung, Mok-Dong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.1
    • /
    • pp.64-83
    • /
    • 2012
  • The number of smart phone users is rapidly growing due to recent increase in wireless Internet usage, development of a wide variety of applications, and activation of M2M (Machine to machine) services. Although the smart phone offers benefits of mobility and convenience, it also has serious security problems. To utilize M2M services in the smart phone, a flexible integrated authentication and access control facility is an essential requirement. To solve these problems, we propose a context-aware single sign-on and access control system that uses context-awareness, integrated authentication, access control, and an OSGi service platform in the smart phone environment. In addition, we recommend Fuzzy Logic and MAUT (Multi-Attribute Utility Theory) in handling diverse contexts properly as well as in determining the appropriate security level. We also propose a security system whose properties are flexible and convenient through a typical scenario in the smart phone environment. The proposed context-aware security system can provide a flexible, secure and seamless security service by adopting diverse contexts in the smart phone environment.

Efficiently Processing Skyline Query on Multi-Instance Data

  • Chiu, Shu-I;Hsu, Kuo-Wei
    • Journal of Information Processing Systems
    • /
    • v.13 no.5
    • /
    • pp.1277-1298
    • /
    • 2017
  • Related to the maximum vector problem, a skyline query is to discover dominating tuples from a set of tuples, where each defines an object (such as a hotel) in several dimensions (such as the price and the distance to the beach). A tuple, an instance of an object, dominates another tuple if it is equally good or better in all dimensions and better in at least one dimension. Traditionally, skyline queries are defined upon single-instance data or upon objects each of which is associated with an instance. However, in some cases, an object is not associated with a single instance but rather by multiple instances. For example, on a review website, many users assign scores to a product or a service, and a user's score is an instance of the object representing the product or the service. Such data is an example of multi-instance data. Unlike most (if not all) others considering the traditional setting, we consider skyline queries defined upon multi-instance data. We define the dominance calculation and propose an algorithm to reduce its computational cost. We use synthetic and real data to evaluate the proposed methods, and the results demonstrate their utility.

A Memory Configuration Method for Virtual Machine Based on User Preference in Distributed Cloud

  • Liu, Shukun;Jia, Weijia;Pan, Xianmin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.11
    • /
    • pp.5234-5251
    • /
    • 2018
  • It is well-known that virtualization technology can bring many benefits not only to users but also to service providers. From the view of system security and resource utility, higher resource sharing degree and higher system reliability can be obtained by the introduction of virtualization technology in distributed cloud. The small size time-sharing multiplexing technology which is based on virtual machine in distributed cloud platform can enhance the resource utilization effectively by server consolidation. In this paper, the concept of memory block and user satisfaction is redefined combined with user requirements. According to the unbalanced memory resource states and user preference requirements in multi-virtual machine environments, a model of proper memory resource allocation is proposed combined with memory block and user satisfaction, and at the same time a memory optimization allocation algorithm is proposed which is based on virtual memory block, makespan and user satisfaction under the premise of an orderly physical nodes states also. In the algorithm, a memory optimal problem can be transformed into a resource workload balance problem. All the virtual machine tasks are simulated in Cloudsim platform. And the experimental results show that the problem of virtual machine memory resource allocation can be solved flexibly and efficiently.