Argument Assistant systems are software tools used for negotiation and problem solving that have been gaining importance in several areas of Artificial Intelligence, mainly as a vehicle for facilitating rational justi...
详细信息
Social media has not only reshaped the way people make decisions, but also changed the norms of how people interact with others. Due to the popularity of social media, social commerce is becoming a new form of e-comme...
详细信息
Social media has not only reshaped the way people make decisions, but also changed the norms of how people interact with others. Due to the popularity of social media, social commerce is becoming a new form of e-commerce approaches. This study attempts to investigate what motivates individuals use of social commerce in the context of grocery retailing service based on the theoretical framework of the Uses and Gratifications theory. The empirical data was collected from a Finnish social commerce website offering a social media environment for social commerce in grocery services. Based on both survey data and clickstream data, we found that i) individuals are motivated to use social commerce in grocery retailing service mainly due to their utilitarian gratification in using it as social commerce platform can meet their functional needs;ii) social gratification plays weak role in determining social commerce in grocery retailing service as individuals has less social needs compared to their functional needs in social commerce;and iii) hedonic gratification might be a potential reason as the hedonic needs seems to be very weak. The functions (searching for products and recipes, compiling shopping lists and online shopping, etc.) offered by the social commerce services meet individuals functional needs, and motivate them to use social commerce. Finally the limitations of the current research are discussed, and the directions for further research are also suggested.
Embedding of integrated systems via Additive Manufacturing (AM) offers the potential to save weight, space, and time in the production of electronics and vehicles. Of specific interest are embedded electrical systems ...
详细信息
In the last three years, a new partner has emerged for teachers and educators in the field of education. The mushrooming of applications based on large language models has greatly shaped the educational development fi...
详细信息
Cyberbullying(CB)is a challenging issue in social media and it becomes important to effectively identify the occurrence of *** recently developed deep learning(DL)models pave the way to design CB classifier models wit...
详细信息
Cyberbullying(CB)is a challenging issue in social media and it becomes important to effectively identify the occurrence of *** recently developed deep learning(DL)models pave the way to design CB classifier models with maximum *** the same time,optimal hyperparameter tuning process plays a vital role to enhance overall *** study introduces a Teacher Learning Genetic Optimization with Deep Learning Enabled Cyberbullying Classification(TLGODL-CBC)model in Social *** proposed TLGODL-CBC model intends to identify the existence and non-existence of CB in social media ***,the input data is cleaned and pre-processed to make it compatible for further *** by,independent recurrent autoencoder(IRAE)model is utilized for the recognition and classification of ***,the TLGO algorithm is used to optimally adjust the parameters related to the IRAE model and shows the novelty of the *** assuring the improved outcomes of the TLGODLCBC approach,a wide range of simulations are executed and the outcomes are investigated under several *** simulation outcomes make sure the improvements of the TLGODL-CBC model over recent approaches.
Disaster Tolerance is the characteristic attributed to a system that can withstand a catastrophic failure and still function with some degree of normality. Disaster tolerance of computer and communication systems is d...
详细信息
ISBN:
(纸本)9806560426
Disaster Tolerance is the characteristic attributed to a system that can withstand a catastrophic failure and still function with some degree of normality. Disaster tolerance of computer and communication systems is described and methods for modeling this form of system robustness are described. Definitions and descriptions of disaster tolerant computing and communications systems are provided and related to more familiar forms of system robustness such as fault tolerance. This paper concludes with a description of future areas of investigation for this new area of systemsengineering.
A data warehouse is a data repository which collects and maintains a large amount of data from multiple distributed, autonomous and possibly heterogeneous data sources. Often the data is stored in the form of material...
详细信息
This paper, presents a survey on current state of the art in Wireless Sensor Networks (WSNs) Operating systems (OSs). WSN is composed of miniature senor and resource constraint devices. WSN is highly dynamic network b...
详细信息
Emerging technologies such as edge computing,Internet of Things(IoT),5G networks,big data,Artificial Intelligence(AI),and Unmanned Aerial Vehicles(UAVs)empower,Industry 4.0,with a progressive production methodology th...
详细信息
Emerging technologies such as edge computing,Internet of Things(IoT),5G networks,big data,Artificial Intelligence(AI),and Unmanned Aerial Vehicles(UAVs)empower,Industry 4.0,with a progressive production methodology that shows attention to the interaction between machine and human *** the literature,various authors have focused on resolving security problems in UAV communication to provide safety for vital *** current research article presents a Circle Search Optimization with Deep Learning Enabled Secure UAV Classification(CSODL-SUAVC)model for Industry 4.0 *** suggested CSODL-SUAVC methodology is aimed at accomplishing two core objectives such as secure communication via image steganography and image ***,the proposed CSODL-SUAVC method involves the following methods such as Multi-Level Discrete Wavelet Transformation(ML-DWT),CSO-related Optimal Pixel Selection(CSO-OPS),and signcryption-based *** proposed model deploys the CSO-OPS technique to select the optimal pixel points in cover *** secret images,encrypted by signcryption technique,are embedded into cover ***,the image classification process includes three components namely,Super-Resolution using Convolution Neural Network(SRCNN),Adam optimizer,and softmax *** integration of the CSO-OPS algorithm and Adam optimizer helps in achieving the maximum performance upon UAV *** proposed CSODLSUAVC model was experimentally validated using benchmark datasets and the outcomes were evaluated under distinct *** simulation outcomes established the supreme better performance of the CSODL-SUAVC model over recent approaches.
In current days,the domain of Internet of Things(IoT)and Wireless Sensor Networks(WSN)are combined for enhancing the sensor related data transmission in the forthcoming networking *** and routing techniques are treate...
详细信息
In current days,the domain of Internet of Things(IoT)and Wireless Sensor Networks(WSN)are combined for enhancing the sensor related data transmission in the forthcoming networking *** and routing techniques are treated as the effective methods highly used to attain reduced energy consumption and lengthen the lifetime of the WSN assisted IoT *** this view,this paper presents an Ensemble of Metaheuristic Optimization based QoS aware Clustering with Multihop Routing(EMOQoSCMR)Protocol for IoT assisted *** proposed EMO-QoSCMR protocol aims to achieve QoS parameters such as energy,throughput,delay,and *** proposed model involves two stage processes namely clustering and ***,the EMO-QoSCMR protocol involves crossentropy rain optimization algorithm based clustering(CEROAC)technique to select an optimal set of cluster heads(CHs)and construct ***,oppositional chaos game optimization based routing(OCGOR)technique is employed for the optimal set of routes in the IoT assisted *** proposed model derives a fitness function based on the parameters involved in the IoT nodes such as residual energy,distance to sink node,*** proposed EMOQoSCMR technique has resulted to an enhanced NAN of 64 nodes whereas the LEACH,PSO-ECHS,E-OEERP,and iCSHS methods have resulted in a lesser NAN of 2,10,42,and 51 *** performance of the presented protocol has been evaluated interms of energy efficiency and network lifetime.
暂无评论