17,180 research outputs found

    OSN Model For Business Growth Using Ecommerce Product Recommendation

    Get PDF
    Now A Days Online Shopping Has Achieved A Tremendous Popularity Within Very Less Amount Of Time. Recently Few Ecommerce Websites Has Been Developed Their Functionalities To A Extent Such That They Recommend The Product For Their Users Referring To The Connectivity Of The Users To The Social Media And Provide Direct Login From Such Social Media Such As Facebook, Twitter, Whatsapp. Recommend The Users That Are Totally New To The Website Client Novel Solution For Cross-Site Cold-Start Product Recommendation That Aims For Recommending Products From E-Commerce Websites. In Specific Propose Learning Both Users And Products Feature Representations From Data Collected From E-Commerce Websites Using Recurrent Top-K To Transform Userā€™s Social Networking Features Into User Embeddings. The Survey Paper Develops A Top-K Approach Which Can Manipulate The Learnt User Implanting For Cold-Start Product Recommendation

    The state-of-the-art in personalized recommender systems for social networking

    Get PDF
    With the explosion of Web 2.0 application such as blogs, social and professional networks, and various other types of social media, the rich online information and various new sources of knowledge flood users and hence pose a great challenge in terms of information overload. It is critical to use intelligent agent software systems to assist users in finding the right information from an abundance of Web data. Recommender systems can help users deal with information overload problem efficiently by suggesting items (e.g., information and products) that match usersā€™ personal interests. The recommender technology has been successfully employed in many applications such as recommending films, music, books, etc. The purpose of this report is to give an overview of existing technologies for building personalized recommender systems in social networking environment, to propose a research direction for addressing user profiling and cold start problems by exploiting user-generated content newly available in Web 2.0

    Open innovation adoption: the role of technology exploration, technology exploitation and trust among SMEs and helices in triple helix model

    Get PDF
    Nowadays, it is almost impossible for businesses to craft competitive edges by pulling all in-house resources and capabilities alone. Innovation now demands a critical uplifting of a new dimension widely known as ā€œopen innovationā€. Open innovation has been a main research focus and has mainly been targeted to large organizations where it have been proven to increase the organizations performance. As knowledge no longer resides within one particular industry alone, previous scholars have underlined the importance of embracing open innovation to SMEs to transform innovation processes. This study was constructed with the intention to look at the placement of open innovation among SMEs, specifically in the Malaysian triple-helix context. This study is developed to a threfold perspectives. Perspective I investigates the relationships of technology exploration, exploitation towards open innovation adoption and to investigate the mediating influence of trust on technology exploration and exploitation towards open innovation adoption. Perspective II investigates the success factors and challenges for the organizations to achieve the difficulty levels of the constructs in the light of open innovation; while Perspective III profiles the organizations based on the constructs involved. A total of 72 Malaysian SMEs involved in a triple helix project were involved in this study. The data collection was gathered through a likert-scale instrument. Two major analyses were used. The Structural Equation Modeling (SEM) and the Rasch Measurement were used to achieve the targeted perspectives. Result from Perspective I shows that technology exploration is significantly related to open innovation adoption and trust has also been proven to have a significant mediating relationship between technology exploration and open innovation adoption. Conversely, technology exploitation has proven insignificant relationship with open innovation adoption and has therefore resulted to trust having a non-significant mediating effect to the relationship of technology exploitation and open innovation adoption. Perspective II resulted to the division between success factors and challenges items while Perspective III indicated six distinct organizations profiles. Discussions of the study are based on latent characteristics shared by respective group. The findings of this study will assist SMEs; government; research bodies; industry players; and policy makers to understand what motivates SMEs to adopt open innovation in the light of their ability level in dealing with various difficulties in technology exploration, exploitation and trust towards triple helices

    Divertimi: A Tourist Guide to a Unique and Enriching Experience

    Get PDF
    This project lays a foundation for the development of an e-tourism website by Azienda di Promozione Turistica della Provincia di Venezia, the provincial tourism authority in the Veneto region of Italy. Our design employs individual and group profiling to recommend destinations and attractions. Social networking and various forms of user-generated narratives support travel recommendations. Finally, we propose a system for offering a personalized trip package based on user interests

    Ubiquitous systems and the family: Thoughts about the networked home

    Get PDF
    Developments in ubiquitous and pervasive computing herald a future in which computation is embedded into our daily lives. Such a vision raises important questions about how people, especially families, will be able to engage with and trust such systems whilst maintaining privacy and individual boundaries. To begin to address such issues, we have recently conducted a wide reaching study eliciting trust, privacy and identity concerns about pervasive computing. Over three hundred UK citizens participated in 38 focus groups. The groups were shown Videotaped Activity Scenarios [11] depicting pervasive or ubiquitous computing applications in a number of contexts including shopping. The data raises a number of important issues from a family perspective in terms of access, control, responsibility, benefit and complexity. Also findings highlight the conflict between increased functionality and the subtle social interactions that sustain family bonds. We present a Pre-Concept Evaluation Tool (PRECET) for use in design and implementation of ubicomp systems

    Mobile Value Added Services: A Business Growth Opportunity for Women Entrepreneurs

    Get PDF
    Examines the potential for mobile value-added services adoption by women entrepreneurs in Egypt, Nigeria, and Indonesia in expanding their micro businesses; challenges, such as access to digital channels; and the need for services tailored to women
    • ā€¦
    corecore