The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The purpose of this study was to explore the important factors that influence users’ continuance usage behavior toward mobile online group-buying. Based on the characteristics of the mobile Internet, an extension of the UTAUT model is introduced to verify the proposed hypotheses. The structural equation modeling method is used to analyze the empirical data which come from universities in China. The...
Website quality evaluation is an important research task. Evolution and a growing set of available methods are observed. The article presents the authors' evaluation methodology of the quality of websites named PEQUAL. The formal foundation of the proposed methodology is the broadening of the classical EQUAL method with aspects of preference modelling and evaluation aggregation used in Multi-Criteria...
The growth of data at an unprecedented rate poses challenge on its storage and analysis. To cope up with this, new machines are procured on a regular basis. On the other hand, a lot of computing resources in Institute labs, government offices etc. remain underutilized, since they are used for Internet and basic utilities. The aggregation of these underutilized resources can be more than handful to...
China and US both have developed online payment services, which have their own features due to the two countries' different culture, policies, and technical features etc. Therefore, it contributes to the great difference in the online payment users' perceptions of their domestic online payment in the two countries. According to previous studies of the technology acceptance model and the diffusion...
With the development of economic and information technology, more and more people use mobile phone to surf the internet. The purpose of this paper is to examine the factors of mobile phone data flow service adoption. The Unified Theory of Acceptance and Use of Technology (UTAUT) is used as a theoretical framework, and survey data are collected from 537 Chinese nationals. The results from structural...
High-performance networking technologies and services are being rapidly developed and deployed across the nation and around the globe to support the transfer of large data sets generated by next-generation scientific applications for collaborative data processing, analysis, and storage. However, these networking technologies and services have not been fully utilized mainly because their use often...
This paper takes a survey to the college students, and analyzes the impact imposed by variables of purchase intention and the inter-relationship among variables such as perceived value, perceived risk and perceived usefulness. The empirical results show that perceived value is the main factor affecting purchase intention, perceived risk has no direct impact on purchase intention, and perceived usefulness...
Really Simple Syndication(RSS) has been widely used in our daily lives, but RSS doesn't always collect interesting articles, user has to sift through every subscription for articles they like. The ranking of unread RSS articles has the potential power to release user from this heavy burden. Although user preferences can be learned from explicit feedbacks such as rating or tagging, implicit feedback...
The main objective of this paper is to present an XML-based data representation model for the exchange of power system reliability information among the power system community. Legacy power system applications represent power system data as IEEE common data format, industry standard Common Information Model (CIM) and the huge number of proprietary formats that makes it difficult to exchange the system...
Since the explosion and popularity of Internet, virtual brand community has been serving as a new and important brand experience centre for consumers to acquire necessary brand and product knowledge. Based on the empirical literature and the nature of online shopping, this study proposed a series of research hypotheses and a theoretical model. Internet shoppers' brand experience (sensory, affective,...
When users are presented with a new technology or service, a number of factors influence their decision about how and when they will use it. To measure how students and teachers are going to accept and use a specific e-learning technology or service, an appropriate instrument is needed. In this paper common theories that can be used for measuring students' acceptance of e-learning technologies and...
A revolution in utilities domain is underway, namely the Internet of Energy. Networked Embedded Devices (NEDs) are making the electricity grid itself, the homes and the factories smarter, increasing the possibilities of collaboration among them. It is expected that NEDs will offer their functionality as one or more services, one of which will be a real-time measurement of the energy they consume or...
This paper empirically studies factors determining the use of E-recruitment systems. The technology acceptance model(TAM)is used as the main framework and combines with other three factors. Firstly, a hypothetical model was given, which was derived from the integration of TAM, subjective norm, perceived risk, perceived expenses, job pressure. Secondly, the structural equation modeling(SEM) technique...
Recently, a new temporal dataset has been made public: it is made of a series of twelve 100 M pages snapshots of the .uk domain. The Web graphs of the twelve snapshots have been merged into a single time-aware graph that provide constant-time access to temporal information. In this paper we present the first statistical analysis performed on this graph, with the goal of checking whether the information...
This paper empirically studies individual acceptance of recruitment on Internet and the factors was investigated according to technology acceptance model (TAM). Firstly, a hypothetical model was given, which was derived from the integration of TAM, subjective norm, perceived risk and perceived expenses. Secondly, the structural equation modeling (SEM) technique was used to evaluate the causal model...
This work proposes a new method to variable bit rate video traffic model used to capture the multi-level characteristics that are significant in determining buffering requirements. While lots of the previous work in video traffic modeling has paid attention on real-time multimedia systems that of necessity engage queuing models with small buffers, there are increasing interests in awareness that high...
Item-response theory is applied to peer assessment by a new method for estimating assessment-criterion parameters. The proposed model is a modified graded item response model with an assessorpsilas evaluation-criterion parameters. The advantages of this method are as follows: (i) the capability of evaluating learnerspsila abilities on the same scale even if the assessors have different assessment...
Several vulnerability analysis techniques in web-based applications detect and report on different types of vulnerabilities. However, no single technique provides a generic technology-independent handling of Web-based vulnerabilities. In this paper we present our experience with and experimental exemplification of using the application vulnerability description language (AVDL) to realize a unified...
As digital resources increasingly growing and the economic benefit of digital intellectual property rights being increasingly important, people has been increasingly emphasis on information security issues brought by the data remnants in storage devices. They try their best to prevent the potential risks. In this paper, we survey comprehensively related technologies, standards and trends of erasure,...
This paper establishes a speaker-independent pronunciation recognition and assessment system with 673 words for mandarin Chinese under the background of a Chinese learning system framework. The recognition part is based on HTK using HMM (Hidden Markov Models) and improved in the aspect of acoustic model. Making use of the recognition results and the log-likelihood obtained from the Viterbi coding,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.