End-user computing empowers non-developers to manage data and applications, enhancing collaboration and efficiency. Spreadsheets, a prime example of end-user programming environments widely used in business for data a...End-user computing empowers non-developers to manage data and applications, enhancing collaboration and efficiency. Spreadsheets, a prime example of end-user programming environments widely used in business for data analysis. However, Excel functionalities have limits compared to dedicated programming languages. This paper addresses this gap by proposing a prototype for integrating Python’s capabilities into Excel through on-premises desktop to build custom spreadsheet functions with Python. This approach overcomes potential latency issues associated with cloud-based solutions. This prototype utilizes Excel-DNA and IronPython. Excel-DNA allows creating custom Python functions that seamlessly integrate with Excel’s calculation engine. IronPython enables the execution of these Python (CSFs) directly within Excel. C# and VSTO add-ins form the core components, facilitating communication between Python and Excel. This approach empowers users with a potentially open-ended set of Python (CSFs) for tasks like mathematical calculations, statistical analysis, and even predictive modeling, all within the familiar Excel interface. This prototype demonstrates smooth integration, allowing users to call Python (CSFs) just like standard Excel functions. This research contributes to enhancing spreadsheet capabilities for end-user programmers by leveraging Python’s power within Excel. Future research could explore expanding data analysis capabilities by expanding the (CSFs) functions for complex calculations, statistical analysis, data manipulation, and even external library integration. The possibility of integrating machine learning models through the (CSFs) functions within the familiar Excel environment.展开更多
The paper presents a design method that ensures the ingenuity of the product form as well as the whole and exact expression of user’s needs. The key idea is to establish an automatic design system which can transform...The paper presents a design method that ensures the ingenuity of the product form as well as the whole and exact expression of user’s needs. The key idea is to establish an automatic design system which can transform the user’s language needs into the product features in real-time. A rifle was taken as a research instance and soldiers were chosen as evaluation customers. The theory of fuzzy set and semantic difference are adopted to evaluate the relationship between user’s needs and product features as well as their alternatives. FAHP (fuzzy analytic hierarchy process) is utilized to judge the user’s satisfactory forms. This method can also be applied to other product form designs.展开更多
As organizations increasingly embrace digital transformation, the integration of modern web technologies like React.js with Business Process Management (BPM) applications has become essential. React components offer f...As organizations increasingly embrace digital transformation, the integration of modern web technologies like React.js with Business Process Management (BPM) applications has become essential. React components offer flexibility, reusability, and scalability, making them ideal for enhancing user interfaces and driving user engagement within BPM environments. This article explores the benefits, challenges, and best practices of leveraging React components in BPM applications, along with real-world examples of successful implementations.展开更多
Methotrexate has been used an immunomodulator in many autoimmune diseases,including inflammatory bowel disease. However,many physicians are unfamiliar or uncomfortable with its use in the management of inflammatory bo...Methotrexate has been used an immunomodulator in many autoimmune diseases,including inflammatory bowel disease. However,many physicians are unfamiliar or uncomfortable with its use in the management of inflammatory bowel disease. We summarize the data for use of methotrexate in common clinical scenarios:(1) steroid dependant Crohn's disease(CD);(2) maintenance of remission in steroid free CD;(3) azathioprine failures in CD;(4) in combination therapy with Anti-TNF agents in CD;(5) decreasing antibody formation to Anti-TNF therapy in CD;(6) management of fistulizing disease in CD; and(7) as well as induction and maintenance of remission in ulcerative colitis. An easy to use algorithm is provided for the busy clinician to access and safely prescribe methotrexate for their inflammatory bowel disease patients.展开更多
Frequent itemset mining is an essential problem in data mining and plays a key role in many data mining applications.However,users’personal privacy will be leaked in the mining process.In recent years,application of ...Frequent itemset mining is an essential problem in data mining and plays a key role in many data mining applications.However,users’personal privacy will be leaked in the mining process.In recent years,application of local differential privacy protection models to mine frequent itemsets is a relatively reliable and secure protection method.Local differential privacy means that users first perturb the original data and then send these data to the aggregator,preventing the aggregator from revealing the user’s private information.We propose a novel framework that implements frequent itemset mining under local differential privacy and is applicable to user’s multi-attribute.The main technique has bitmap encoding for converting the user’s original data into a binary string.It also includes how to choose the best perturbation algorithm for varying user attributes,and uses the frequent pattern tree(FP-tree)algorithm to mine frequent itemsets.Finally,we incorporate the threshold random response(TRR)algorithm in the framework and compare it with the existing algorithms,and demonstrate that the TRR algorithm has higher accuracy for mining frequent itemsets.展开更多
The aim of the article is to determine the extent to which customer satisfaction's in the e-banking in Semnan area had organizational and customer readiness for developing their services. One of the most important se...The aim of the article is to determine the extent to which customer satisfaction's in the e-banking in Semnan area had organizational and customer readiness for developing their services. One of the most important sectors that plays key role for grasping developed condition is banking sector. Banks like other institutions also look for augmenting their profits and increasing their strength by expansion. The designing of bank must involve selection of those that have sufficient success potential. Hence, from several factors of success, the following three criteria factors have been: selected-customer satisfied, one dimensional, and product fully functional. These factors offers three question multi criteria group extracted from a 16 norms. Also, three criteria factors have been studied over a period of five years and important criteria for evaluating the norms. The Analytical Hierarchy Process (AHP) has been employed to calculate the success potential of each norm. The empirical data comprises the longitudinal survey of the agricultural banking of the Semnan province. The paper, also, finds that product fully functional is placed as the first priority.展开更多
A new method to evaluate fuzzily user's relevance on the basis of cloud models has been proposed. All factors of personalized information retrieval system are taken into account in this method. So using this method f...A new method to evaluate fuzzily user's relevance on the basis of cloud models has been proposed. All factors of personalized information retrieval system are taken into account in this method. So using this method for personalized information retrieval (PIR) system can efficiently judge multi-value relevance, such as quite relevant, comparatively relevant, commonly relevant, basically relevant and completely non-relevant, and realize a kind of transform of qualitative concepts and quantity and improve accuracy of relevance judgements in PIR system. Experimental data showed that the method is practical and valid. Evaluation results are more accurate and approach to the fact better.展开更多
There are numerous information technology solutions including hardware and software. A company that provides the solution should have knowledge of the customer needs in the purpose of sailing strategy or upgrade polic...There are numerous information technology solutions including hardware and software. A company that provides the solution should have knowledge of the customer needs in the purpose of sailing strategy or upgrade policy. The needs are also directly connected to the user satisfaction. However, the users have respective points of view in the needs as well as they may not identify the requirements to improve the solution. SERVQUAL can be an appropriate method to define and measure the customer satisfaction for the information technology solutions. As a case study of the customer satisfaction, the modified SERVQUAL items and scoring method are applied to a cyber-infrastructure system named CyberL ab in Korea. The measurement results of user satisfaction for CyberL ab are provided to confirm that our proposed method performs as we intended. From the results, we can score the satisfaction level of users and identify their needs in the various aspects. The total user satisfaction level for CyberL ab is scored by 88.3.展开更多
In accordance with the regulations as stipulated in the Pro-visions of the Customs of the People’s Republic of China on Ex-ternal Audit, the Customs officers engaged in external audit shalluse the Certificate of Exte...In accordance with the regulations as stipulated in the Pro-visions of the Customs of the People’s Republic of China on Ex-ternal Audit, the Customs officers engaged in external audit shalluse the Certificate of External Audit of the Customs (hereinafterreferred to as Certificate) as of June 5, 1997. The Certificate has ablack leather outer covering and is inlaid inside with a pierced andguilded customs emblem, which consists of the red national em-blem in its upper part, and a key and a truncheon encircled by earsof wheat in its lower part. Put in a leather covering, the Certificateis a card sealed up with plastics, on which there is a bareheadedcolour photo of the holder in the Customs uniform and with a展开更多
The advent of information communication technology in the information environment has brought dramatic changes in the way information is being handled and managed today. This wind of change engineered by ICT has also ...The advent of information communication technology in the information environment has brought dramatic changes in the way information is being handled and managed today. This wind of change engineered by ICT has also changed the information seeking behavior of users making them to place more demands on libraries. There is a need for libraries to strive to be effective in their services to customers in order to remain relevant in the information age. The paper considered the deployment of soft skills expressed in terms of staff appearance, approachability, effective communication, positive attitude, ability to cope in difficult situation, and so on, for more effective customer services in the 21st century library. The paper concluded that, effective customer service in libraries is imperative in the 21st century library as it will make library users feel important, improves learning, increases patronage, and promotes library and university image. The outcome of this paper will help the management of libraries irrespective of the type to be more effective in the services they render to their clients. This will ultimately increase patronage and clients retention.展开更多
To extract structured data from a web page with customized requirements,a user labels some DOM elements on the page with attribute names.The common features of the labeled elements are utilized to guide the user throu...To extract structured data from a web page with customized requirements,a user labels some DOM elements on the page with attribute names.The common features of the labeled elements are utilized to guide the user through the labeling process to minimize user efforts,and are also utilized to retrieve attribute values.To turn the attribute values into a structured result,the attribute pattern needs to be induced.For this purpose,a space-optimized suffix tree called attribute tree is built to transform the document object model(DOM) tree into a simpler form while preserving its useful properties such as attribute sequence order.The pattern is induced bottom-up on the attribute tree,and is further used to build the structured result.Experiments are conducted and show high performance of our approach in terms of precision,recall and structural correctness.展开更多
For telecommunication operators, how to improve the utilization of bandwidth resources is always a problem which worthy of study, nowadays, this issue has become more and more important, since the traffic load burstin...For telecommunication operators, how to improve the utilization of bandwidth resources is always a problem which worthy of study, nowadays, this issue has become more and more important, since the traffic load bursting in the mobile Internet. So the key to solving this problem is that we need to find a kind of traffic model to predict the traffic load that users need. According to the predicted traffic load to allocate bandwidth to each base station dynamically.But the traffic consumption behavior of a single base station is random, it is difficult to predict[ 1 ]. For this reason, we based on reality that, when the user moves, it may get traffic load from different base stations, therefore, there will have some kind of relationship between those base stations.We use this relationship to establish a kind of Spatial Collaborative Network.consequently, we make use of stability algorithm to divided those base station cluster into different communities, According to the traffic load usage rules which these communities indicated to us, we get a traffic model.At the same time, we studied bow to use this traffic model in the future networks to dynamically allocate bandwidth resources, then we propose a new kind of EPS architecture based on SDN, on this platform, we can deploy our strategy through it's programmable interface.Finally, we designed an experiment to test the performance of our dynamic strategy, and the result shows that our method enables bandwidth utilization has been greatly improved.展开更多
Click-streams of online shopping are the tracks/trails of interactions between a customer and a vendor.We observe that it is of great importance both in theory and practice to explore a deep analysis method for analyz...Click-streams of online shopping are the tracks/trails of interactions between a customer and a vendor.We observe that it is of great importance both in theory and practice to explore a deep analysis method for analyzing click-stream information of an individual customer in a specific transaction for understanding the bidirectional value transfer within the machine-human interaction of an online store and for its personalization.We analyze the significance,the hierarchical structure and the characteristics of click-stream information and propose that Ricoeur's hermeneutic theory be the foundation of forming such a deep analysis method.Then we use the empirical context information of the click-stream to improve the naive interpretation put forward by Ricoeur.Moreover,we apply the Grounded Theory to extend the deep analysis of Ricoeur's theory of textual interpretation.The improved theory fits well with the needs of interpretation and the analysis of click-stream information.We exemplify and show the feasibility of this analysis method by using data collected(a single case)from a large study of human-computer interaction.展开更多
Through a questionnaire survey of students’ response from 6 universities in Nanjing, this paper aims to determine their varying degrees of satisfaction about the customized information service based on Library2.0 tec...Through a questionnaire survey of students’ response from 6 universities in Nanjing, this paper aims to determine their varying degrees of satisfaction about the customized information service based on Library2.0 technologies. In so doing, the authors carefully examined the data collected from the returned questionnaires about such key issues as the students’ perceptions about the customized information service via a Library2.0platform, self-initiated use experience of such a mechanism, their achieved information searching results vis-à-vis their expectations, etc. In addition, the authors also made a comparative study between information providers(i.e. librarians) and information consumers(i.e. students) at Chinese and American academic libraries.展开更多
To stay competitive, the mobile telecommunication companies spend millions of Ghana cedi each year on building long-term relationships with their customers. Marketing managers are constantly challenged with the proble...To stay competitive, the mobile telecommunication companies spend millions of Ghana cedi each year on building long-term relationships with their customers. Marketing managers are constantly challenged with the problem of where to channel the limited resources in order to retain existing customers. This study approaches the customer retention problem in the mobile phone sector from a behavioural perspective, applying the Behavioural Perspective Model as the main analytical framework and further exploits some other factors that influence customer retention. The model includes a set of pre-behaviour and post-behaviour factors to study consumer choice, and explains its relevant drivers in a viable and comprehensive way, grounded in radical behaviourism. Data for the analysis were collected from tertiary students from Accra and Takoradi. Data collected were analysed using the multinomial regression technique. Analysis of the data revealed that the Behaviour setting factor is the only significant element in Behaviour Perspective Model. Further exploitation of behaviour situation revealed that the number of networks a customer uses, previous experience of a customer and customer’s intention are significant factors in determining customer retention in Ghana’s mobile telecommunication industry.展开更多
“Raise your bridal veil and let me have a close look at your face. Your brows are so thin and long, like the crescent in the sky. Your brows are so thin and long, like the bow-shape moon.”By singing this melodious U...“Raise your bridal veil and let me have a close look at your face. Your brows are so thin and long, like the crescent in the sky. Your brows are so thin and long, like the bow-shape moon.”By singing this melodious Uygur love song, I cannot help imagining the unique ethnic weddings of Uygur lovers and recalling the fascinating panorama of "the Second China Cultural Festival on Ethnic Wedding Traditions" recently hosted in Butterfly Lovers Park in Ningbo, a port city in the southeast coast of China.展开更多
With the popularity of mobile intelligent terminal, user comments of App software is viewed as one of the research interests of social computing. Faced with the massive App software, most users usually view the other ...With the popularity of mobile intelligent terminal, user comments of App software is viewed as one of the research interests of social computing. Faced with the massive App software, most users usually view the other users’ comments and marks to selecting the desired App software. Due to the freedom and randomness of the network comments, the inconsistence between the user’s comment and mark makes it difficult to choose App software. This paper presents a method by analyzing the relationships among user’s comment information, the user’s mark and App software information. Firstly, the consistency between user’s comment information and App software information is judged. Then, through analyzing the grammar relationships among the feature-words, adverbs and the feature-sentiment-words in App software’s feature-sentimentword- pairs, the user’s emotional tendency about App software is quantified quantified combining with the dictionary and the network sentiment words. After calculating the user’s comprehensive score of App software, the consistency of App software’s user comment is judged by comparing this score and the user’s mark. Finally, the experimental results show that the method is effective.展开更多
文摘End-user computing empowers non-developers to manage data and applications, enhancing collaboration and efficiency. Spreadsheets, a prime example of end-user programming environments widely used in business for data analysis. However, Excel functionalities have limits compared to dedicated programming languages. This paper addresses this gap by proposing a prototype for integrating Python’s capabilities into Excel through on-premises desktop to build custom spreadsheet functions with Python. This approach overcomes potential latency issues associated with cloud-based solutions. This prototype utilizes Excel-DNA and IronPython. Excel-DNA allows creating custom Python functions that seamlessly integrate with Excel’s calculation engine. IronPython enables the execution of these Python (CSFs) directly within Excel. C# and VSTO add-ins form the core components, facilitating communication between Python and Excel. This approach empowers users with a potentially open-ended set of Python (CSFs) for tasks like mathematical calculations, statistical analysis, and even predictive modeling, all within the familiar Excel interface. This prototype demonstrates smooth integration, allowing users to call Python (CSFs) just like standard Excel functions. This research contributes to enhancing spreadsheet capabilities for end-user programmers by leveraging Python’s power within Excel. Future research could explore expanding data analysis capabilities by expanding the (CSFs) functions for complex calculations, statistical analysis, data manipulation, and even external library integration. The possibility of integrating machine learning models through the (CSFs) functions within the familiar Excel environment.
文摘The paper presents a design method that ensures the ingenuity of the product form as well as the whole and exact expression of user’s needs. The key idea is to establish an automatic design system which can transform the user’s language needs into the product features in real-time. A rifle was taken as a research instance and soldiers were chosen as evaluation customers. The theory of fuzzy set and semantic difference are adopted to evaluate the relationship between user’s needs and product features as well as their alternatives. FAHP (fuzzy analytic hierarchy process) is utilized to judge the user’s satisfactory forms. This method can also be applied to other product form designs.
文摘As organizations increasingly embrace digital transformation, the integration of modern web technologies like React.js with Business Process Management (BPM) applications has become essential. React components offer flexibility, reusability, and scalability, making them ideal for enhancing user interfaces and driving user engagement within BPM environments. This article explores the benefits, challenges, and best practices of leveraging React components in BPM applications, along with real-world examples of successful implementations.
文摘Methotrexate has been used an immunomodulator in many autoimmune diseases,including inflammatory bowel disease. However,many physicians are unfamiliar or uncomfortable with its use in the management of inflammatory bowel disease. We summarize the data for use of methotrexate in common clinical scenarios:(1) steroid dependant Crohn's disease(CD);(2) maintenance of remission in steroid free CD;(3) azathioprine failures in CD;(4) in combination therapy with Anti-TNF agents in CD;(5) decreasing antibody formation to Anti-TNF therapy in CD;(6) management of fistulizing disease in CD; and(7) as well as induction and maintenance of remission in ulcerative colitis. An easy to use algorithm is provided for the busy clinician to access and safely prescribe methotrexate for their inflammatory bowel disease patients.
基金This paper is supported by the Inner Mongolia Natural Science Foundation(Grant Number:2018MS06026,Sponsored Authors:Liu,H.and Ma,X.,Sponsors’Websites:http://kjt.nmg.gov.cn/)the Science and Technology Program of Inner Mongolia Autonomous Region(Grant Number:2019GG116,Sponsored Authors:Liu,H.and Ma,X.,Sponsors’Websites:http://kjt.nmg.gov.cn/).
文摘Frequent itemset mining is an essential problem in data mining and plays a key role in many data mining applications.However,users’personal privacy will be leaked in the mining process.In recent years,application of local differential privacy protection models to mine frequent itemsets is a relatively reliable and secure protection method.Local differential privacy means that users first perturb the original data and then send these data to the aggregator,preventing the aggregator from revealing the user’s private information.We propose a novel framework that implements frequent itemset mining under local differential privacy and is applicable to user’s multi-attribute.The main technique has bitmap encoding for converting the user’s original data into a binary string.It also includes how to choose the best perturbation algorithm for varying user attributes,and uses the frequent pattern tree(FP-tree)algorithm to mine frequent itemsets.Finally,we incorporate the threshold random response(TRR)algorithm in the framework and compare it with the existing algorithms,and demonstrate that the TRR algorithm has higher accuracy for mining frequent itemsets.
文摘The aim of the article is to determine the extent to which customer satisfaction's in the e-banking in Semnan area had organizational and customer readiness for developing their services. One of the most important sectors that plays key role for grasping developed condition is banking sector. Banks like other institutions also look for augmenting their profits and increasing their strength by expansion. The designing of bank must involve selection of those that have sufficient success potential. Hence, from several factors of success, the following three criteria factors have been: selected-customer satisfied, one dimensional, and product fully functional. These factors offers three question multi criteria group extracted from a 16 norms. Also, three criteria factors have been studied over a period of five years and important criteria for evaluating the norms. The Analytical Hierarchy Process (AHP) has been employed to calculate the success potential of each norm. The empirical data comprises the longitudinal survey of the agricultural banking of the Semnan province. The paper, also, finds that product fully functional is placed as the first priority.
文摘A new method to evaluate fuzzily user's relevance on the basis of cloud models has been proposed. All factors of personalized information retrieval system are taken into account in this method. So using this method for personalized information retrieval (PIR) system can efficiently judge multi-value relevance, such as quite relevant, comparatively relevant, commonly relevant, basically relevant and completely non-relevant, and realize a kind of transform of qualitative concepts and quantity and improve accuracy of relevance judgements in PIR system. Experimental data showed that the method is practical and valid. Evaluation results are more accurate and approach to the fact better.
基金supported by the National Research Foundation in Korea (NRF) through contract N-12-NM-IR19
文摘There are numerous information technology solutions including hardware and software. A company that provides the solution should have knowledge of the customer needs in the purpose of sailing strategy or upgrade policy. The needs are also directly connected to the user satisfaction. However, the users have respective points of view in the needs as well as they may not identify the requirements to improve the solution. SERVQUAL can be an appropriate method to define and measure the customer satisfaction for the information technology solutions. As a case study of the customer satisfaction, the modified SERVQUAL items and scoring method are applied to a cyber-infrastructure system named CyberL ab in Korea. The measurement results of user satisfaction for CyberL ab are provided to confirm that our proposed method performs as we intended. From the results, we can score the satisfaction level of users and identify their needs in the various aspects. The total user satisfaction level for CyberL ab is scored by 88.3.
文摘In accordance with the regulations as stipulated in the Pro-visions of the Customs of the People’s Republic of China on Ex-ternal Audit, the Customs officers engaged in external audit shalluse the Certificate of External Audit of the Customs (hereinafterreferred to as Certificate) as of June 5, 1997. The Certificate has ablack leather outer covering and is inlaid inside with a pierced andguilded customs emblem, which consists of the red national em-blem in its upper part, and a key and a truncheon encircled by earsof wheat in its lower part. Put in a leather covering, the Certificateis a card sealed up with plastics, on which there is a bareheadedcolour photo of the holder in the Customs uniform and with a
文摘The advent of information communication technology in the information environment has brought dramatic changes in the way information is being handled and managed today. This wind of change engineered by ICT has also changed the information seeking behavior of users making them to place more demands on libraries. There is a need for libraries to strive to be effective in their services to customers in order to remain relevant in the information age. The paper considered the deployment of soft skills expressed in terms of staff appearance, approachability, effective communication, positive attitude, ability to cope in difficult situation, and so on, for more effective customer services in the 21st century library. The paper concluded that, effective customer service in libraries is imperative in the 21st century library as it will make library users feel important, improves learning, increases patronage, and promotes library and university image. The outcome of this paper will help the management of libraries irrespective of the type to be more effective in the services they render to their clients. This will ultimately increase patronage and clients retention.
基金Supported by the National High Technology Research and Development Programme of China(No.2009AA01 Z141)the National Natural Science Foundation of China(No.60573117)Beijing Natural Science Foundation(No.4131001)
文摘To extract structured data from a web page with customized requirements,a user labels some DOM elements on the page with attribute names.The common features of the labeled elements are utilized to guide the user through the labeling process to minimize user efforts,and are also utilized to retrieve attribute values.To turn the attribute values into a structured result,the attribute pattern needs to be induced.For this purpose,a space-optimized suffix tree called attribute tree is built to transform the document object model(DOM) tree into a simpler form while preserving its useful properties such as attribute sequence order.The pattern is induced bottom-up on the attribute tree,and is further used to build the structured result.Experiments are conducted and show high performance of our approach in terms of precision,recall and structural correctness.
基金part of the National Natural Science Foundation of China(NSFC)under Grant No.61371126the Independent Research Program of Central Universities under Grant No.2042014kf0256+2 种基金the National High Technology Research and Development Program of China(863 Program)under Grant No.2014AA01A707the National Key Basic Research Program of China(973 Program)under Grant No.2011CB707106Applied Basic Research Programs of Wuhan under Grant No.2014010101010026
文摘For telecommunication operators, how to improve the utilization of bandwidth resources is always a problem which worthy of study, nowadays, this issue has become more and more important, since the traffic load bursting in the mobile Internet. So the key to solving this problem is that we need to find a kind of traffic model to predict the traffic load that users need. According to the predicted traffic load to allocate bandwidth to each base station dynamically.But the traffic consumption behavior of a single base station is random, it is difficult to predict[ 1 ]. For this reason, we based on reality that, when the user moves, it may get traffic load from different base stations, therefore, there will have some kind of relationship between those base stations.We use this relationship to establish a kind of Spatial Collaborative Network.consequently, we make use of stability algorithm to divided those base station cluster into different communities, According to the traffic load usage rules which these communities indicated to us, we get a traffic model.At the same time, we studied bow to use this traffic model in the future networks to dynamically allocate bandwidth resources, then we propose a new kind of EPS architecture based on SDN, on this platform, we can deploy our strategy through it's programmable interface.Finally, we designed an experiment to test the performance of our dynamic strategy, and the result shows that our method enables bandwidth utilization has been greatly improved.
文摘Click-streams of online shopping are the tracks/trails of interactions between a customer and a vendor.We observe that it is of great importance both in theory and practice to explore a deep analysis method for analyzing click-stream information of an individual customer in a specific transaction for understanding the bidirectional value transfer within the machine-human interaction of an online store and for its personalization.We analyze the significance,the hierarchical structure and the characteristics of click-stream information and propose that Ricoeur's hermeneutic theory be the foundation of forming such a deep analysis method.Then we use the empirical context information of the click-stream to improve the naive interpretation put forward by Ricoeur.Moreover,we apply the Grounded Theory to extend the deep analysis of Ricoeur's theory of textual interpretation.The improved theory fits well with the needs of interpretation and the analysis of click-stream information.We exemplify and show the feasibility of this analysis method by using data collected(a single case)from a large study of human-computer interaction.
文摘Through a questionnaire survey of students’ response from 6 universities in Nanjing, this paper aims to determine their varying degrees of satisfaction about the customized information service based on Library2.0 technologies. In so doing, the authors carefully examined the data collected from the returned questionnaires about such key issues as the students’ perceptions about the customized information service via a Library2.0platform, self-initiated use experience of such a mechanism, their achieved information searching results vis-à-vis their expectations, etc. In addition, the authors also made a comparative study between information providers(i.e. librarians) and information consumers(i.e. students) at Chinese and American academic libraries.
文摘To stay competitive, the mobile telecommunication companies spend millions of Ghana cedi each year on building long-term relationships with their customers. Marketing managers are constantly challenged with the problem of where to channel the limited resources in order to retain existing customers. This study approaches the customer retention problem in the mobile phone sector from a behavioural perspective, applying the Behavioural Perspective Model as the main analytical framework and further exploits some other factors that influence customer retention. The model includes a set of pre-behaviour and post-behaviour factors to study consumer choice, and explains its relevant drivers in a viable and comprehensive way, grounded in radical behaviourism. Data for the analysis were collected from tertiary students from Accra and Takoradi. Data collected were analysed using the multinomial regression technique. Analysis of the data revealed that the Behaviour setting factor is the only significant element in Behaviour Perspective Model. Further exploitation of behaviour situation revealed that the number of networks a customer uses, previous experience of a customer and customer’s intention are significant factors in determining customer retention in Ghana’s mobile telecommunication industry.
文摘“Raise your bridal veil and let me have a close look at your face. Your brows are so thin and long, like the crescent in the sky. Your brows are so thin and long, like the bow-shape moon.”By singing this melodious Uygur love song, I cannot help imagining the unique ethnic weddings of Uygur lovers and recalling the fascinating panorama of "the Second China Cultural Festival on Ethnic Wedding Traditions" recently hosted in Butterfly Lovers Park in Ningbo, a port city in the southeast coast of China.
基金This research is sponsored by the National Science Foundation of China No. 60703116, 61063006 and 61462049, and the Application Basic Research Plan in Yunnan Province of China No. 2013FZ020.
文摘With the popularity of mobile intelligent terminal, user comments of App software is viewed as one of the research interests of social computing. Faced with the massive App software, most users usually view the other users’ comments and marks to selecting the desired App software. Due to the freedom and randomness of the network comments, the inconsistence between the user’s comment and mark makes it difficult to choose App software. This paper presents a method by analyzing the relationships among user’s comment information, the user’s mark and App software information. Firstly, the consistency between user’s comment information and App software information is judged. Then, through analyzing the grammar relationships among the feature-words, adverbs and the feature-sentiment-words in App software’s feature-sentimentword- pairs, the user’s emotional tendency about App software is quantified quantified combining with the dictionary and the network sentiment words. After calculating the user’s comprehensive score of App software, the consistency of App software’s user comment is judged by comparing this score and the user’s mark. Finally, the experimental results show that the method is effective.