442 research outputs found
What drives consumers' e-loyalty to airlines web site? Conceptual framework and managerial implications
This study proposes a revised technology acceptance model that integrates expectation confirmation theory to measure continuance intentions of online shopping for airlines web sites. The sample respondent 465online users in Saudi Arabia. A structural equation model confirms model fit. Perceived usefulness, enjoyment, social pressure, and loyalty incentives are determinants of online flight booking continuance in Saudi Arabia. This research moves beyond online booking intentions and includes factors affecting online booking continuance. The research model explains 53% of the intention to continue booking using airlines web sites
Social Media and Citizen Social Movement Process for Political Change: The Case of 2011 Egyptian Revolution
The power and role played by social media in developing social and political movements for political changes in North Africa and the Middle East have transformed how social media viewed and used. To date, few IS studies have investigated the role of Information Systems in the context of politics. The goal of this paper is to understand the role of social media including micro-blogs and social networking sites in activism, social movement, and revolutionary political change using the 2011 Cairo Revolts as part of narrative research. Particularly, we are interested in answering the research question: What is the process by which social media influence online activism and shape social movement for revolutionary political change? We develop a process-oriented view of the case of the Egyptian revolution and fall of Mubarak and present the story of the event that occurred in 2011 as an emergent and less than predictable event
Generalized ψ
The aim of this work is to introduce ψ-operations on fuzzy topological spaces and to use them to study fuzzy generalized ψρ-closed sets and fuzzy generalized ψρ-open sets. Also, we introduce some characterizations and properties for these concepts. Finally we show that certain results of several publications
on the concepts of weakness and strength of fuzzy generalized closed sets are considered as corollaries of the results of this research
Recommended from our members
ModFOLD6: an accurate web server for the global and local quality estimation of 3D protein models
Methods that reliably estimate the likely similarity between the predicted and native structures of proteins have become essential for driving the acceptance and adoption of three-dimensional protein models by life scientists. ModFOLD6 is the latest version of our leading resource for Estimates of Model Accuracy (EMA), which uses a pioneering hybrid quasi-single model approach. The ModFOLD6 server integrates scores from three pure-single model methods and three quasi-single model methods using a neural network to estimate local quality scores. Additionally, the server provides three options for producing global score estimates, depending on the requirements of the user: (i) ModFOLD6_rank, which is optimized for ranking/selection, (ii) ModFOLD6_cor, which is optimized for correlations of predicted and observed scores and (iii) ModFOLD6 global for balanced performance. The ModFOLD6 methods rank among the top few for EMA, according to independent blind testing by the CASP12 assessors. The ModFOLD6 server is also continuously automatically evaluated as part of the CAMEO project, where significant performance gains have been observed compared to our previous server and other publicly available servers. The ModFOLD6 server is freely available at: http://www.reading.ac.uk/bioinf/ModFOLD/
Data-driven approaches for techno-economic assessment of waste heat recovery and utilisation in the industrial sector
The industrial sector is a critical element in the sustainability transition as it is currently the largest consumer of fossil fuels, and the consumption is forecasted to continue to increase. Approximately one-fifth of the total industrial primary energy consumption is wasted due to the lack of proven attractive schemes for effective recovery. When addressing the opportunities of industrial waste heat recovery (WHR), it is found that the feasibility depends on multiple factors, including the forms and capacities of the heat sources, the potential heat sinks, and the effectiveness, technological maturity, and economic impact of available technologies. Developing systematic approaches to identify optimal WHR options for different applications is key to effectively reduce plant-scale energy consumption. In particular, power consumption accounts for more than half of the industrial energy use, and its share is expected to grow with the expansion of electrification aspirations. In this paper, industrial WHR technologies are investigated, and tools are developed to understand the sustainability and techno-economic impact of integrating these technologies within industrial processes. We specifically propose a data-driven technology-agnostic approach to evaluate the use of heat engines, which can in practice be organic Rankine cycle (ORC) systems, and of thermally- driven (i.e., absorption) heat pumps in the context of industrial WHR for plant-scale power demand reduction. The scope of this work explores three pathways to achieving efficiency improvements in bulk chemicals plants, represented by olefins production facilities, which are: (i) direct onsite power generation; (ii) enhancement of existing power generation processes; and (iii) reduction in power consumption by compressor efficiency improvements through waste-heat-driven cooling. The techno-economic performance of these technologies is assessed, with particular attention to industrial facilities that reside in hot climates, using fine-tuned technology-agnostic thermodynamic and market-based costing models. Finally, decision-aiding performance maps are derived by varying the quantity and the quality of waste-heat sources and heat sinks, offering application- specific guidelines for selecting appropriate waste-heat recovery schemes. These findings reveal valuable factors for selecting such integration schemes for various industries and scenarios
Effectiveness of tissue culture media components on the growth and development of cauliflower (Brassica oleracea var. Botrytis) seedling explants in vitro
A key factor in the application of in vitro techniques to cauliflower improvement is the development of efficient protocols for regeneration of plants from tissue for use in breeding programs for the selection of the desirable genotypes under biotic and abiotic stress. Experiments were conducted to study the effect of different media components (agar or agar + sucrose or agar + Murashige and Skoog (MS) salts or agar + sucrose + MS) on callus induction and regeneration from five explants types (cotyledon, hypocotyls, shoot apex, primary root and root tip) and also the effects of auxin and cytokinin were carried out using one F1 hybrid cauliflower cv. Medallion. The results show that cotyledons, mid roots and root apices grown on agar + MS + sugar were the most developed compared with explants on the other media. This medium was the most productive in terms of lateral root number and root length. The presence of 2,4-dichlorophenoxyacetic acid increased callus production compared to 6-benzylamino purine. Within the selected explants, a significant difference was indicated between different explants under different treatments. Liquid culture was more successful at producing viable plantlets than solid culture.Key words: Cauliflower, explants, in vitro, growth regulator, growth characters, solid and liquid culture
On Z- generalized closed sets in topology
In this paper, we introduce and study the notion of generalized Z-closed sets. Also, the notion of generalized Z-open sets and some of its basic properties are introduced discussed. Further, we introduce the notion of generalized Z-closed functions. Moreover, some characterizations and properties of it are investigated. Keywords: gZ-closed sets, Z-T1/2-spaces, gZ-continuous and ZgZ-continuous functions
Cryptovirology Ransomware: A Review of Dissemination and Mitigation Techniques
Digital assets are generally regarded as one of the most valuable assets for an organization. When they are captured for ransom purposes, a serious problem arises, and ransomware is responsible for this. When ransomware gets onto a computer or other electronic device, the data on it is encrypted, made inaccessible, or taken away until a ransom is paid. The culprits behind these activities release and disseminate new and sophisticated variants of illicit wealth and notorious practices. Hardware and antivirus software that detect intrusions are not a permanent solution, as hackers can bypass them easily. After ransomware has been executed on an electronic device, it is extremely difficult or nearly impossible to recover the data, and now is the time to draw attention to this threat. In this study, various aspects of ransomware’s propagation, encryption, and mitigation techniques are discussed. We have also used the RanSim simulator to detect malware in a system, and details of the experiment are presented in the later sections. The methodology used for this study can be classified as exploratory research to explore the recent literature on the topic. This study contributes by highlighting recent trends in ransomware, their consequences, and prevention and mitigation techniques. Keywords: RanSim, Ransomware, Ransomware Threats and Mitigation, System Implications of Ransomware, Trusted Computing. Digital assets are generally regarded as one of the most valuable assets for an organization. When they are captured for ransom purposes, a serious problem arises, and ransomware is responsible for this. When ransomware gets onto a computer or other electronic device, the data on it is encrypted, made inaccessible, or taken away until a ransom is paid. The culprits behind these activities release and disseminate new and sophisticated variants of illicit wealth and notorious practices. Hardware and antivirus software that detect intrusions are not a permanent solution, as hackers can bypass them easily. After ransomware has been executed on an electronic device, it is extremely difficult or nearly impossible to recover the data, and now is the time to draw attention to this threat. In this study, various aspects of ransomware’s propagation, encryption, and mitigation techniques are discussed. We have also used the RanSim simulator to detect malware in a system, and details of the experiment are presented in the later sections. The methodology used for this study can be classified as exploratory research to explore the recent literature on the topic. This study contributes by highlighting recent trends in ransomware, their consequences, and prevention and mitigation techniques
SOME APPLICATIONS OF SEPARATION AXIOMS ON ROUGH SETS
Rough set theory is one of the new methods that connect information systems and data processing to mathematics in general and especially to the theory of topological structures and spaces.This paper is aimed to improve some new types of separation axioms by using the concept of sets. So, we define new separation axioms called Also, some of its properties are investigated. Further, we defined space and studied the relation between this space and some types of mappings. Furthermore, we introduce spaces and several properties of this space are presente
Generalized ψρ-Operations on Fuzzy Topological Spaces
The aim of this work is to introduce ψ-operations on fuzzy topological spaces and to use them to study fuzzy generalized ψρ-closed sets and fuzzy generalized ψρ-open sets. Also, we introduce some characterizations and properties for these concepts. Finally we show that certain results of several publications on the concepts of weakness and strength of fuzzy generalized closed sets are considered as corollaries of the results of this research. Preliminaries The concept of fuzzy topology was first defined in 1968 by Chang 1 based on the concept of a fuzzy set introduced by Zadeh in 2 . Since then, various important notions in the classical topology such as generalized closed, generalized open set, and weaker and stronger forms of generalized closed and generalized open sets have been extended to fuzzy topological spaces. The purpose of this paper is to introduce and study the concept of ψ-operations, and by using these operations, we will study fuzzy generalized ψρ-closed sets and fuzzy generalized ψρ-open sets in fuzzy topological spaces. Also, we show that some results in several papers 3-15 considered as corollaries from the results of this paper. Let X, τ be a fuzzy topological space fts, for short , and let μ be any fuzzy set in X. We define the closure of μ to be Cl μ ∧{λ | μ ≤ λ, λ is fuzzy closed} and the interior of μ to be Int μ ∨{λ | λ ≤ μ, λ is fuzzy open}. A fuzzy point x r 16 is a fuzzy set with support x and value r ∈ 0, 1 . For a fuzzy set μ in X, we write x r ∈ μ if and only if r ≤ μ x . Evidently, every fuzzy set μ can be expressed as the union of all fuzzy points which belongs to μ. A fuzzy point x r is said to be quasicoincident 17 with μ denoted by x r qμ if and only if r μ x > 1. A 2 Abstract and Applied Analysi
- …