Complementing consumer input through text mining social media tools- An exploratory case study
The paper studies in tandem, the application of Text-Mining to Social Media platforms such as Social Networking Sites and Blogs. The research design incorporates triangulated use of a single case study approach to figure out through cluster analysis whether consumer insights can be captured for an organization through the use of Text-Mining software. The research argues favorably in theory and reveals numerically that through Text-Mining Software we can acquire novel consumer insights for the new Product Development (NPD) Process. The research tries to open a new avenue for market researchers to collect consumer insights for forming and revising their social media campaigns. The research leaves issues such as complete applicability and appropriate choice of software for further studies.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
End User Software Engineering Importance and Related Techniques
Today there are more end user programmers than professional programmers. since there is ample evidence that programs which end users create have led to huge expenses, software quality is necessary. In this paper End User Software Engineering (EUSE) and related terminology will be defined, then compared with professional software engineering. Finally to aid end user programmers for improving their software quality, some tools will be introduced.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
103. Pakistan Energy Crisis |
Fauzia Khurshid, Alishba Rasheed, Isbah Iqbal, Mahnoor Ausaf and Maryam Arshad Mirza |
Abstract |
Pdf
|
Category : Computing and Informatics | Sub Category : Information Technology |
Pakistan Energy Crisis
The research report is theoretical in nature and underlines how the present energy crisis in Pakistan stems mainly from a failure in governance and the lack of a strongly implemented policy. Pakistan has been undergoing an energy crisis for decades now and it is generally accepted that the present crisis is a problem brought upon the country by the government itself, resulting from prolonged poor management, the lack of proper long-term vision, and inefficient policies. The primary objective of this report is to examine and analyze the problems faced by the power sector in Pakistan. The report will attempt to critically analyze the main reasons behind the current energy crisis despite the seemingly strong commitment of the government and the initiatives already taken to resolve this problem. The most important causes such as circular debt, pricing policy and distribution losses, among others are individually scrutinized to ascertain where the government went wrong. The main questions to be answered are whether the primary reason behind the current energy crisis is the government’s failure to respond effectively to the energy crises or if there are any other significant reasons behind this steadily worsening crisis.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Application of hopfield network in improvement of fingerprint recognition process
Hopfield Network is able to convert noisy data provided to the network because it can act as content addressable memory. Hopfield Network can convert images of noisy fingerprint to the noiseless images or the images with the minimum noise by training through receivable models set. In this research, fingerprint recognition process has been performed through Hamming Distance and effect of use of Hopfield network on fingerprint recognition process has been mentioned. In case those Hamming Distance operations are performed after Hopfield Networks processing, error of fingerprint recognition will be reduced.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Sentiment Analysis Tool using Machine Learning Algorithms
As the increase of social networking, people started to share information through different kinds of social media. Among all varieties of social media, Twitter is a valuable resource for data mining because of its prevalence and recognition by famous persons. In this paper we present a system which collects Tweets from social networking sites, we’ll be able to do analysis on those Tweets and thus provide some prediction of business intelligence. Results of trend analysis will be display as tweets with different sections presenting positive, Negative and neutral.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Survey on Dynamic migration of data in cloud
Cloud computing is used to distribute services over the shared pooled on internet. It has gained importance to the obscure part of the sole proprietor to get adjusted with the demanding amount data availability to the other business market. Thus, resource or data made available is the only vital point for any cloud computing system, and with “Pay as use” i.e. on demand is to appreciate. Not only this, the cloud also allows user to scale the data according to their demand whenever necessary for the growth. SOA in cloud plays a major role of facilitating the user for better service. But with the turbulent network bandwidth the system may face a congestion problem while delivering various services, thus it may impact on the service migration performance. This paper provides the overall survey of cloud services, data migration and dynamic service migrations in cloud
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Predicting tourist’s behavior for acceptance and intention toward using e-Touris
Tourism is one of the major sources of income for most countries and using the internet as a new channel for providing different services of tourism is growing rapidly. But it is clear that focusing on technology alone can’t lead the business to success. The key point of successful business in e-tourism is to concentrate on the customers and their behavior. The aim of this study was to evaluate and validate influential factors for predicting intention of tourists and travellers in e-tourism in Iran, based on a modified model designed according to the principle of Theory of Planned Behavior (TPB) and Technology Acceptance Model (TAM). For this purpose, the specific features from modified model were investigated through a survey involving 259 respondents. In our study, the results reviled that “attitude”, “subjective norm” as well as “perceived behavior of control” significantly affects Iranian tourists’ intention to use e-tourism. In this research we not only worked on evaluating a model and the relationship between constructs, but also tried to find specific factors that drive people to use e-tourism. This study investigated the relationships among beliefs about Internet privacy and trustworthiness; in short its shown respondents who believed in the trustworthiness of the tourism websites were more likely to use e-tourism. In addition to using descriptive method, Structural Equation Modelling (SEM) has also been utilized to fathom out to what extent the specific factors defined by modified model are influential for motivating people to use e-tourism websites.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
8051 Microcontroller based as light sequencer
Light sequencer is a phenomenon which has been with us since the end of Second World War. Even though it has undergone very robust modification from the mirror balls into pure electronics. The 8051 microcontroller based light sequencer incorporates the programmable capability of the 8051 microcontroller in light sequencing light. This therefore has the advantage of changing the display of lights required as opposed to changing the whole electronics of the system of non-8051 microcontroller based light sequencer for the same effects lighting.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Literature review and classification of recommendation systems on social network researches
Social network based-recommendation has some benefits that it approach used for improve of recommendation systems. Recommendation systems are appropriate tools for provide useful and suitable recommendations in social networks. However, in recent years researches has been done on recommender systems on social network, but there is the lack of a comprehensive study on the literature review and classification of these models. We reviewed the related articles and then classified those by the year of publication and their main techniques. The articles are categorized into four techniques, includes tag-based, context-based, social influence-based and trust-based recommendation system on social network. Our research provides information about trends in recommender systems on social network research by examining the publication years of the articles and used techniques, and show future direction on recommender systems on social network.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Traditional medicines - Korea, china, India
It is necessary to considered as the specialties of the sidha system. As the name suggests, this system endeavors to make its user, a siddha by making body fully resistant. Plants play a major role in curing disorders. Another specialty is examining the pulse or nadi sastram. This systems uses pulse as an aid to identify the disorders. The variation in pulses contains the types of pulses, corresponds to diseases and symptoms to be provided is been done by the practioners. As like that of our Indian traditional medicine. Same like our Indian traditional medicine, we have Korean Traditional Medicine and Traditional Chinese Medicine. This paper gives the information regarding the methods and techniques used in those medicines.Siddha is a natural treatment and the oldest medical system of healing in the world. Nadi which is a pulse-based diagnosis method which is the skill of feeling the pulse, and is known to dictate all the salient features of a human body. In this paper, we provide a complete spectrum of details of our procedure for obtaining three different pulses based on time series. This system contains contains a strain gauge equipped with a diaphragm element, a transmitter and also an amplifier, a digitizer which quantifies the analog signals. The system is designed with 16-bit accuracy in such a way that it provides no interference noise and no external electronics. Compared with the prior systems like ECG, the system provides a detailed classification of the nadi pulses which produces the waveforms with respect to abnormalities.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]