106,974 research outputs found

    An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection

    Get PDF
    The biological immune system (BIS) is characterized by networks of cells, tissues, and organs communicating and working in synchronization. It also has the ability to learn, recognize, and remember, thus providing the solid foundation for the development of Artificial Immune System (AIS). Since the emergence of AIS, it has proved itself as an area of computational intelligence. Real-Valued Negative Selection Algorithm with Variable-Sized Detectors (V-Detectors) is an offspring of AIS and demonstrated its potentials in the field of anomaly detection. The V-Detectors algorithm depends greatly on the random detectors generated in monitoring the status of a system. These randomly generated detectors suffer from not been able to adequately cover the non-self space, which diminishes the detection performance of the V-Detectors algorithm. This research therefore proposed CSDE-V-Detectors which entail the use of the hybridization of Cuckoo Search (CS) and Differential Evolution (DE) in optimizing the random detectors of the V-Detectors. The DE is integrated with CS at the population initialization by distributing the population linearly. This linear distribution gives the population a unique, stable, and progressive distribution process. Thus, each individual detector is characteristically different from the other detectors. CSDE capabilities of global search, and use of L´evy flight facilitates the effectiveness of the detector set in the search space. In comparison with V-Detectors, cuckoo search, differential evolution, support vector machine, artificial neural network, na¨ıve bayes, and k-NN, experimental results demonstrates that CSDE-V-Detectors outperforms other algorithms with an average detection rate of 95:30% on all the datasets. This signifies that CSDE-V-Detectors can efficiently attain highest detection rates and lowest false alarm rates for anomaly detection. Thus, the optimization of the randomly detectors of V-Detectors algorithm with CSDE is proficient and suitable for anomaly detection tasks

    Keys to effective transit strategies for commuting

    Get PDF
    Commuting poses relevant challenges to cities\u2019 transport systems. Various studies have identified transit as a tool to enhance sustainability, efficiency and quality of the commute. The scope of this paper is to present strategies that increase public transport attractiveness and positively impact its modal share, looking at some case studies and underlining key success factors and possible elements of replica to be ultimately planned in some of the contexts of the Interreg project SMART-COMMUTING. The strategies analyzed in this paper concern prices and fares, service expansion, service improvements, usage of vehicle locators and other technology, changes to the built environment. Relevant gains in transit modal share are more easily achievable when considering integrations between various strategies, thus adapting and tailoring the planning process to the specific context

    The Unseen Face of E-Business Project Development

    Get PDF
    The purpose of this paper is intent on identify and analyze the unseen factors of successful or failure of e-business project development. The IT managers must take into account both all costs involved in e-business development and all phases (analysis, design, testing, implementation, maintenance and operation) according to principle of project management for software/systems life cycle development. There are many solutions to exceed these factors of failure among could be counted outsourcing, a good project management, involvement of senior management, a real cost estimation etc.Zadanie pt. „Digitalizacja i udostępnienie w Cyfrowym Repozytorium Uniwersytetu Łódzkiego kolekcji czasopism naukowych wydawanych przez Uniwersytet Łódzki” nr 885/P-DUN/2014 zostało dofinansowane ze środków MNiSW w ramach działalności upowszechniającej nauk

    Semantic discovery and reuse of business process patterns

    Get PDF
    Patterns currently play an important role in modern information systems (IS) development and their use has mainly been restricted to the design and implementation phases of the development lifecycle. Given the increasing significance of business modelling in IS development, patterns have the potential of providing a viable solution for promoting reusability of recurrent generalized models in the very early stages of development. As a statement of research-in-progress this paper focuses on business process patterns and proposes an initial methodological framework for the discovery and reuse of business process patterns within the IS development lifecycle. The framework borrows ideas from the domain engineering literature and proposes the use of semantics to drive both the discovery of patterns as well as their reuse

    Critical review of the e-loyalty literature: a purchase-centred framework

    Get PDF
    Over the last few years, the concept of online loyalty has been examined extensively in the literature, and it remains a topic of constant inquiry for both academics and marketing managers. The tremendous development of the Internet for both marketing and e-commerce settings, in conjunction with the growing desire of consumers to purchase online, has promoted two main outcomes: (a) increasing numbers of Business-to-Customer companies running businesses online and (b) the development of a variety of different e-loyalty research models. However, current research lacks a systematic review of the literature that provides a general conceptual framework on e-loyalty, which would help managers to understand their customers better, to take advantage of industry-related factors, and to improve their service quality. The present study is an attempt to critically synthesize results from multiple empirical studies on e-loyalty. Our findings illustrate that 62 instruments for measuring e-loyalty are currently in use, influenced predominantly by Zeithaml et al. (J Marketing. 1996;60(2):31-46) and Oliver (1997; Satisfaction: a behavioral perspective on the consumer. New York: McGraw Hill). Additionally, we propose a new general conceptual framework, which leads to antecedents dividing e-loyalty on the basis of the action of purchase into pre-purchase, during-purchase and after-purchase factors. To conclude, a number of managerial implementations are suggested in order to help marketing managers increase their customers’ e-loyalty by making crucial changes in each purchase stage

    An empirical study on behavioural intention to reuse e-learning systems in rural China

    Get PDF
    The learner’s acceptance of e-learning systems has received extensive attention in prior studies, but how their experience of using e-learning systems impacts on their behavioural intention to reuse those systems has attracted limited research. As the applications of e-learning are still gaining momentum in developing countries, such as China, it is necessary to examine the relationships between e-learners’ experience and perceptions and their behavioural intention to reuse, because it is argued that system reuse is an important indicator of the system’s success. Therefore, a better understanding of the multiple factors affecting the e-learner’s intention to reuse could help e-learning system researchers and providers to develop more effective and acceptable e-learning systems. Underpinned by the information system success model, technology acceptance model and self-efficacy theory, a theoretical framework was developed to investigate the learner’s behavioural intention to reuse e-learning systems. A total of 280 e-learners were surveyed to validate the measurements and proposed research model. The results demonstrated that e-learning service quality, course quality, perceived usefulness, perceived ease of use and self-efficacy had direct effects on users’ behavioural intention to reuse. System functionality and system response have an indirect effect, but system interactivity had no significant effect. Furthermore, self-efficacy affected perceived ease of use that positively influenced perceived usefulness

    The moderator role of Gender in the Unified Theory of Acceptance and Use of Technology (UTAUT): A study on users of Electronic Document Management Systems

    Get PDF
    Venkatesh et al. [1] tried to integrate predictability capabilities from the different existing models of technology acceptance. This produced the Unified Theory of Acceptance and Use of Technology (UTAUT). This comprehensive model resulted in the identification of common aspects. It proposed several constructs with a greater explanatory power and analyzed moderating drivers, such as age, Gender, experience and voluntariness of use. By doing so, UTAUT identifies three major drivers of behavioral intention: performance expectancy, effort expectancy and social influence. On the other hand, facilitating conditions and behavioral intention were identified as determinant factors of actual use [1]. In addition to previous considerations about UTAUT, empirical research has scarcely analyzed the moderating role of Gender [2]. This is why this paper particularly aims to fill this gap. Hofstede [3] describes strength, competitiveness and guidance for material success as social roles linked to male values, whilst modesty, tenderness, sensitivity and concern for the quality of life are values associated with women. With respect to UTAUT, existing studies have shown that performance expectancy positively influences behavioral intention more strongly for men (cf. [4], [5], [6] and [7]). Moreover, it has been observed that effort expectancy positively influences behavioral intention more strongly for women (cf. [4], [5] and [6]), while social influence positively affects behavioral intention more strongly for women (cf. [5], [7] and [8]). In our research, with the aim of testing the moderating effects of Gender, a sample of 2,175 users of Electronic Document Management Systems (EDMS) in Portuguese municipalities was used. Taking into account that Gender is a categorical variable, we have adopted a multi-group or multi-sample analysis [9] -dividing the sample into two groups (male = 748; female = 1,427) and estimating each group of observations separately. Before comparing the groups, an analysis of the measurement invariance was carried out to make sure that the construct measures were invariant between both groups [10]. Once the metric invariance had been assessed, we carried out a set of multi-group analyses –interpreting statistically-significant differences in path coefficients as moderating effects. On the one hand, the parametric approach considering both equal variances and different variances has been used [11, 12]. On the other hand, we have applied non-parametric approaches exemplified by the permutation test [13], and Henseler’s PLS multi-group analysis [10, 12, 14]. This study notes slight differences in the results of the aforementioned methods. As a result, the moderating effect of Gender on the relation between performance expectancy and behavioral intention showed that this relationship is stronger among men than women. Finally, a discussion on the implications of Gender as a moderator for the UTAUT model is included

    Factors influencing students' acceptance of m-learning: An investigation in higher education

    Get PDF
    M-learning will play an increasingly significant role in the development of teaching and learning methods for higher education. However, the successful implementation of m-learning in higher education will be based on users' acceptance of this technology. Thus, the purpose of this paper is to study the factors that affect university students' intentions to accept m-learning. Based on the unified theory of acceptance and use of technology (UTAUT) (Venkatesh et al., 2003), this study proposes a model to identify the factors that influence the acceptance of m-learning in higher education and to investigate if prior experience of mobile devices affects the acceptance of m-learning. A structural equation model was used to analyse the data collected from 174 participants. The results indicate that performance expectancy, effort expectancy, influence of lecturers, quality of service, and personal innovativeness were all significant factors that affect behavioural intention to use m-learning. Prior experience of mobile devices was also found to moderate the effect of these constructs on behavioural intention. The results of this research extend the UTAUT in the context of m-learning acceptance by adding quality of service and personal innovativeness to the structure of UTAUT and provide practitioners and educators with useful guidelines for designing a successful m-learning system
    corecore