{"title":"Co-Diffusion of Technologies in Social Networks","authors":"Natalia Lazzati","doi":"10.2139/ssrn.3204664","DOIUrl":"https://doi.org/10.2139/ssrn.3204664","url":null,"abstract":"This paper studies the diffusion process of two complementary technologies among people who are connected through a social network. It characterizes adoption rates over time for different initial allocations and network structures. We are particularly interested in the following question: Suppose we want to maximize technology diffusion and have a limited number of units of each of the two technologies to initially distribute. How should we allocate these units among people in the social network?","PeriodicalId":139603,"journal":{"name":"Libraries & Information Technology eJournal","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114490317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Heterogeneous Demand Effects of Recommendation Strategies in a Mobile Application: Evidence from Econometric Models and Machine-Learning Instruments","authors":"Panagiotis Adamopoulos, A. Ghose, A. Tuzhilin","doi":"10.25300/misq/2021/15611","DOIUrl":"https://doi.org/10.25300/misq/2021/15611","url":null,"abstract":"In this paper, we examine the effectiveness of various recommendation strategies in the mobile channel and their impact on consumers’ utility and demand levels for individual products. We find significant differences in effectiveness among various recommendation strategies. Interestingly, recommendation strategies that directly embed social proofs for the recommended alternatives outperform other recommendations. In addition, recommendation strategies combining social proofs with higher levels of induced awareness due to the prescribed temporal diversity have an even stronger effect on the mobile channel. We also examine the heterogeneity of the demand effect across items, users, and contextual settings, further verifying empirically the aforementioned information and persuasion mechanisms and generating rich insights. We also facilitate the estimation of causal effects in the presence of endogeneity using machine-learning methods. Specifically, we develop novel econometric instruments that capture product differentiation (isolation) based on deeplearning models of user-generated reviews. Our empirical findings extend the current knowledge regarding the heterogeneous impact of recommender systems, reconcile contradictory prior results in the related literature, and have significant business implications.","PeriodicalId":139603,"journal":{"name":"Libraries & Information Technology eJournal","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130320884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mapping Ecosystem Services’ Values: Current Practice and Future Prospects","authors":"J. Schägner, J. Maes, L. Brander, V. Hartje","doi":"10.2139/ssrn.2160714","DOIUrl":"https://doi.org/10.2139/ssrn.2160714","url":null,"abstract":"Mapping of ecosystem services’ (ESS) values means valuing ESS in monetary terms across a relatively large geographical area and assessing how values vary across space. Thereby, mapping of ESS values reveals additional information as compared to traditional site-specific ESS valuation, which is beneficial for designing land use policies for maintaining ESS supply. Since the well-known article by Costanza et al. (1997), who mapped global ESS values, the number of publications mapping ESS values has grown exponentially, with almost 60% being published after 2007. Within this paper, we analyse and review articles that map ESS values. Our findings show that methodologies, in particular how spatial variations of ESS values are estimated, their spatial scope, rational and ESS focus differ widely. Still, most case studies rely on relatively simplistic approaches using land use/cover data as a proxy for ESS supply and its values. However, a tendency exists towards more sophisticated methodologies using ESS models and value functions, which integrate a variety of spatial variables and which are validated against primary data. Based on our findings, we identify current practices and developments in the mapping of ESS values and provide guidelines and recommendations for future applications and research.","PeriodicalId":139603,"journal":{"name":"Libraries & Information Technology eJournal","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131879276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Early Performance Prediction of Web Services","authors":"Ch Ram Mohan Reddy","doi":"10.5121/ijwsc.2011.2303","DOIUrl":"https://doi.org/10.5121/ijwsc.2011.2303","url":null,"abstract":"Web Service is an interface which implements business logic. Performance is an important quality aspect of Web services because of their distributed nature. Predicting the performance of web services during early stages of software development is significant. In this paper we model web service using Unified Modeling Language, Use Case Diagram, Sequence Diagram, Deployment Diagram. We obtain the Performance metrics by simulating the web services model using a simulation tool Simulation of Multi-Tier Queuing Architecture. We have identified the bottle neck resources.","PeriodicalId":139603,"journal":{"name":"Libraries & Information Technology eJournal","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126177293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Human Intuition Towards Artificial Intuition Synthesis for Robotics","authors":"Octavio Diaz-Hernández","doi":"10.2139/ssrn.3427647","DOIUrl":"https://doi.org/10.2139/ssrn.3427647","url":null,"abstract":"Human intuition is an unconscious mental process aimed to solve problems without using a rational decision-making process. Meanwhile, the artificial intuition is a limited representation of human intuition, and it models intuitive ability of solving problems in order to be implemented in machines. In this work, we performed an analysis about analogies between human and artificial intuition using INPUTS, PROCESSING, and OUTPUTS. Mainly, we have focused on synthetize algorithms that improve robot performance in pick and place tasks, simplifying the processing stage (decision-making process), by reducing the complexity the set of instructions needed to solve the task. The experiments show that we reduced the execution time of the task aided by the algorithm and also augmented its accuracy. This new approach of artificial intuition can be exploited to solve current unsolved problems of artificial intelligence.","PeriodicalId":139603,"journal":{"name":"Libraries & Information Technology eJournal","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127689808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Prof Chethan Raj C, Shivani M S S, S. R, Sowmya M T, Tejaswini D R
{"title":"Efficient Data Integrity and Auditing in Cloud by using Block Chain","authors":"Prof Chethan Raj C, Shivani M S S, S. R, Sowmya M T, Tejaswini D R","doi":"10.2139/ssrn.3673154","DOIUrl":"https://doi.org/10.2139/ssrn.3673154","url":null,"abstract":"The main aim of this paper is to discuss the usage of cloud storage services, enabling individuals to store their information in the cloud and keep away from the local data storage and maintenance expense. Numerous data integrity auditing systems have been implemented to guarantee the quality of the data stored in the cloud. An individual would like to enroll his private key to create the authenticators for understanding the auditing of data integrity in certain, but not all of the current system. The user must then have a hardware token (e.g. USB token, smart card) for storing the private key and memorizing a password to trigger the private key. Most of the new data integrity auditing system will be unable to operate if the user misplaced this hardware token or forgot this password. We are proposing a new module called data integrity auditing without private key storage to solve this issue, and developing such a scheme using block chain technology. In this project we are proposing a computerized signature along with face reorganization with block chain operation, so that there will be no unique design to obtain unauthorized and furthermore to prevent hacking operation and all the respective user data or information will be stored in cloud with maximum security.","PeriodicalId":139603,"journal":{"name":"Libraries & Information Technology eJournal","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130871123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fog Computing Complementary Approach to Cloud Computing","authors":"Aiyami Mohammed","doi":"10.2139/ssrn.3660962","DOIUrl":"https://doi.org/10.2139/ssrn.3660962","url":null,"abstract":"The advent of digitization and its modern day Information and Communication Technologies (ICT) triggered a paradigm shift in product and product-service-system design across many sectors. Many related developments in the context of Industry 4.0 rely on the use of vast amounts of data. When it comes to managing and handling this data, one of the prime technology approaches is that of Cloud Computing. However, Cloud Computing has a number of shortcomings, such as data security and latency challenges. Recently, Fog Computing has emerged as a new approach to complement Cloud Computing. It operates on cloud layers connected to data sources and minimizes issues related to data transmission latency, reduced bandwidth, and cyber security aspects. In this paper, the authors discuss Fog Computing and the way in which it complements Cloud Computing. They also elaborate on the benefits of utilizing Cloud and Fog Computing in concert.","PeriodicalId":139603,"journal":{"name":"Libraries & Information Technology eJournal","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132112513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Deepa D, R. Vignesh, S. A., Suja Cherukullapurath Mana, B. Samhitha, Jithina Jose
{"title":"Visualizing Road Damage by Monitoring System in Cloud","authors":"Deepa D, R. Vignesh, S. A., Suja Cherukullapurath Mana, B. Samhitha, Jithina Jose","doi":"10.34218/ijeet.11.4.2020.022","DOIUrl":"https://doi.org/10.34218/ijeet.11.4.2020.022","url":null,"abstract":"Cloud computing gives many beneficial services to share large scale of information, storage resources, computing resources, and provide knowledge for research. In this paper, I have proposed the methodology for visualizing the road damage condition by monitoring and detecting the road damage and specifying the location of the damage by which others can prevent from accident response. In the proposed system is about the visualizing road damages using cloud database. That is we need some prevention by monitoring ‘road damage’ using mobiles. To find the road damage, the roads are monitored and the snapshots are taken. The snapshot images are then processed in the application developed without internet. The information details about the road damage will be sent to the cloud. Then the cloud stores that information in the database. This information is very helpful in visualizin groad damage locations to the users. Different maps are developed for different kinds of users based on the above gathered information. There are three types of users involved. They are Vehicle Users, Corporation Users and Administration Users. The Vehicle user gets the visualized map of the specified road damage on the path between the source and destination. The Corporation user visualizes the road map for damaged locations in a specified area. The Administration user visualizes the map of the Client broker locations in a specified area.","PeriodicalId":139603,"journal":{"name":"Libraries & Information Technology eJournal","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133950034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}