Pub Date : 2023-11-01DOI: 10.53106/160792642023112406011
Cheng-Wen Yao Cheng-Wen Yao, Dah-Kwei Liou Cheng-Wen Yao
EWOM initiates more consumers’ empathy and is also reliable information for a consumer. Consumers are increasingly relying on finding and reading eWOM to make purchasing decisions. Knowing why the consumers read these eWOM helps marketers provide proper information and marketing contents. This study uses the phenomenographic approach to explore consumers’ motivations for reading eWOM. After interviews with thirty participants, this study constructed a 4-IS typology of eWOM motivation based on two dimensions: consumer’s product familiarity and purchase intention. The study also adopts the concept of MOAB model to illustrate four categories. This study provides some useful insights for marketers to systematically analyze why consumers read eWOM. It not only helps us understand why a consumer reads eWOM also helps us figure out how the eWOM affects a consumer.
{"title":"Consumers' Motivations for Reading Electronic Word of Mouth (eWOM): A 4-IS Typology","authors":"Cheng-Wen Yao Cheng-Wen Yao, Dah-Kwei Liou Cheng-Wen Yao","doi":"10.53106/160792642023112406011","DOIUrl":"https://doi.org/10.53106/160792642023112406011","url":null,"abstract":"EWOM initiates more consumers’ empathy and is also reliable information for a consumer. Consumers are increasingly relying on finding and reading eWOM to make purchasing decisions. Knowing why the consumers read these eWOM helps marketers provide proper information and marketing contents. This study uses the phenomenographic approach to explore consumers’ motivations for reading eWOM. After interviews with thirty participants, this study constructed a 4-IS typology of eWOM motivation based on two dimensions: consumer’s product familiarity and purchase intention. The study also adopts the concept of MOAB model to illustrate four categories. This study provides some useful insights for marketers to systematically analyze why consumers read eWOM. It not only helps us understand why a consumer reads eWOM also helps us figure out how the eWOM affects a consumer.","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"71 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139295770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-01DOI: 10.53106/160792642023112406020
Yujie Zhang Yujie Zhang, Yuyang Hou Yujie Zhang, Luning Cao Yuyang Hou, You Xiong Luning Cao, Qian Huang You Xiong
In light of China’s burgeoning sports competition and performance sector, the evident shift towards diverse sports consumption preferences underscores an urgent need to refine the current consumption structure. Notably, the underdeveloped ornamental sports consumption sphere impedes the evolution of this structure. This study, focusing on the pivotal demographic in the sports event consumption market—college students, deploys a questionnaire-based approach to explore patterns in ornamental sports consumption, internet usage behavior, perceived value associated with ornamental sports, and trust towards this mode of consumption. Leveraging the Stimulus-Organism-Response (SOR) model and integrating various theories, we constructed hypothetical models. Utilizing structural equation modeling, we probed the intricate relationships among these variables through path analysis. This empirical investigation specifically scrutinized the impact of college students’ internet behavior on their spectator sports consumption, extending to the intermediary roles played by the perceived value and trust related to ornamental sports. Key findings indicate: (1) A direct positive correlation exists between college students’ internet behaviors and their affinity for spectator sports. (2) The perceived value of ornamental sports acts as a mediator between students’ internet activities and their consumption behaviors. (3) Trust in ornamental sports consumption mediates the relationship between internet usage and consumption patterns.
{"title":"Analyzing the Influence of Internet Usage Behavior on Spectator Sports Consumption Among College Students: An Empirical SEM Study Based on the SOR Model","authors":"Yujie Zhang Yujie Zhang, Yuyang Hou Yujie Zhang, Luning Cao Yuyang Hou, You Xiong Luning Cao, Qian Huang You Xiong","doi":"10.53106/160792642023112406020","DOIUrl":"https://doi.org/10.53106/160792642023112406020","url":null,"abstract":"In light of China’s burgeoning sports competition and performance sector, the evident shift towards diverse sports consumption preferences underscores an urgent need to refine the current consumption structure. Notably, the underdeveloped ornamental sports consumption sphere impedes the evolution of this structure. This study, focusing on the pivotal demographic in the sports event consumption market—college students, deploys a questionnaire-based approach to explore patterns in ornamental sports consumption, internet usage behavior, perceived value associated with ornamental sports, and trust towards this mode of consumption. Leveraging the Stimulus-Organism-Response (SOR) model and integrating various theories, we constructed hypothetical models. Utilizing structural equation modeling, we probed the intricate relationships among these variables through path analysis. This empirical investigation specifically scrutinized the impact of college students’ internet behavior on their spectator sports consumption, extending to the intermediary roles played by the perceived value and trust related to ornamental sports. Key findings indicate: (1) A direct positive correlation exists between college students’ internet behaviors and their affinity for spectator sports. (2) The perceived value of ornamental sports acts as a mediator between students’ internet activities and their consumption behaviors. (3) Trust in ornamental sports consumption mediates the relationship between internet usage and consumption patterns.","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"42 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139292085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-01DOI: 10.53106/160792642023112406016
Du Chen Du Chen, Deyun Gao Du Chen, Wei Quan Deyun Gao, Chuan Heng Foh Wei Quan, Hongke Zhang Chuan Heng Foh
In-band Network Telemetry (INT) has profoundly promoted the network visibility. However, the existing solutions either face Maximum Transmission Unit (MTU) limitation or latency issue due to continuous insertion of INT metadata along long forwarding paths. In addition, conducting telemetry using user packets is prone to result in duplicate telemetry and fall short to achieve network-wide telemetry. In this work, we propose NetworkSight to comprehensively resolve these problems through cluster based path planning and source routing based on-demand forwarding. Specifically, a cluster based path planning algorithm is designed to generate several balanced short forwarding paths that cover the entire network. As a consequence, the MTU limitation is overcome and the telemetry latency can be reduced. Instead of operating on user packets, NetworkSight sends crafted probes built on source routing to travel synchronously over the generated forwarding paths. With these improvements, network-wide telemetry is achieved. Besides, we define a suite of telemetry primitives and develop corresponding APIs for users to flexibly express their telemetry requirements. Extensive experimental results show that NetworkSight can generate more balanced forwarding paths. The results show that it outperforms state-of-the-art mechanisms, where it reduces the telemetry latency by tens of milliseconds.
带内网络遥测(INT)大大提高了网络的可视性。然而,现有的解决方案要么面临最大传输单元(MTU)限制,要么由于在较长的转发路径上持续插入 INT 元数据而面临延迟问题。此外,使用用户数据包进行遥测容易造成重复遥测,无法实现全网遥测。在这项工作中,我们提出了 NetworkSight,通过基于集群的路径规划和基于源路由的按需转发来全面解决这些问题。具体来说,我们设计了一种基于集群的路径规划算法,以生成多条覆盖整个网络的平衡短转发路径。因此,可以克服 MTU 限制,减少遥测延迟。NetworkSight 不对用户数据包进行操作,而是发送基于源路由的精心制作的探测器,在生成的转发路径上同步移动。通过这些改进,可以实现全网范围的遥测。此外,我们还定义了一套遥测原语,并开发了相应的应用程序接口,供用户灵活表达其遥测要求。广泛的实验结果表明,NetworkSight 可以生成更平衡的转发路径。结果表明,它的性能优于最先进的机制,可将遥测延迟降低数十毫秒。
{"title":"Fast and On-demand Network-wide Telemetry via Cluster Based Path Planning","authors":"Du Chen Du Chen, Deyun Gao Du Chen, Wei Quan Deyun Gao, Chuan Heng Foh Wei Quan, Hongke Zhang Chuan Heng Foh","doi":"10.53106/160792642023112406016","DOIUrl":"https://doi.org/10.53106/160792642023112406016","url":null,"abstract":"In-band Network Telemetry (INT) has profoundly promoted the network visibility. However, the existing solutions either face Maximum Transmission Unit (MTU) limitation or latency issue due to continuous insertion of INT metadata along long forwarding paths. In addition, conducting telemetry using user packets is prone to result in duplicate telemetry and fall short to achieve network-wide telemetry. In this work, we propose NetworkSight to comprehensively resolve these problems through cluster based path planning and source routing based on-demand forwarding. Specifically, a cluster based path planning algorithm is designed to generate several balanced short forwarding paths that cover the entire network. As a consequence, the MTU limitation is overcome and the telemetry latency can be reduced. Instead of operating on user packets, NetworkSight sends crafted probes built on source routing to travel synchronously over the generated forwarding paths. With these improvements, network-wide telemetry is achieved. Besides, we define a suite of telemetry primitives and develop corresponding APIs for users to flexibly express their telemetry requirements. Extensive experimental results show that NetworkSight can generate more balanced forwarding paths. The results show that it outperforms state-of-the-art mechanisms, where it reduces the telemetry latency by tens of milliseconds.","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139296972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-01DOI: 10.53106/160792642023112406002
Fanghui Zha Fanghui Zha, Yong Wang Fanghui Zha, Liqiang Mao Yong Wang, Jin Liu Liqiang Mao, Xue Wang Jin Liu
Programming skills are the key ability of programmers. For novice programmers who are new and have little experience in programming, it is important to measure and improve their programming skills. In practice, novice programmers learn programming knowledge and coding ability at university, and course learning is the main way for novice programmers to improve programming skills. However, can university marks be used to measure the programming skills of programming novices? To answer this question, in a controlled experiment, we compare university marks of novice programmers with their performance in programming tasks. The results showed that there were 7 courses with significant correlation among the 13 courses, among which the software engineering course had the most significant correlation.
{"title":"Can University Marks Measure Programming Skills for Novice Programmers? An Exploratory Study","authors":"Fanghui Zha Fanghui Zha, Yong Wang Fanghui Zha, Liqiang Mao Yong Wang, Jin Liu Liqiang Mao, Xue Wang Jin Liu","doi":"10.53106/160792642023112406002","DOIUrl":"https://doi.org/10.53106/160792642023112406002","url":null,"abstract":"Programming skills are the key ability of programmers. For novice programmers who are new and have little experience in programming, it is important to measure and improve their programming skills. In practice, novice programmers learn programming knowledge and coding ability at university, and course learning is the main way for novice programmers to improve programming skills. However, can university marks be used to measure the programming skills of programming novices? To answer this question, in a controlled experiment, we compare university marks of novice programmers with their performance in programming tasks. The results showed that there were 7 courses with significant correlation among the 13 courses, among which the software engineering course had the most significant correlation.","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"32 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139302050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-01DOI: 10.53106/160792642023112406012
Hongting Tang Hongting Tang, Yanlin Zhang Hongting Tang, Xianyun Lin Yanlin Zhang, Lanteng Wu Xianyun Lin
Researchers and practitioners have recognized that user-generated content in the innovation community plays an important role. However, it is challenging to automatically identify valuable knowledge from these unstructured texts. Thus, in this study, we propose an efficient model for extracting innovation-oriented topics and, simultaneously, for assigning discovered topics to each post in the online innovation community. Specifically, we introduce a variant of the latent Dirichlet allocation (LDA) topic model, called the Innovation-LDA model, which comprehensively considers users’ interests (reflected by pageviews and replies) and the structure of threads (e.g., header or body) to generate the valuable topics. We access the quality of discovered information through statistical fit as well as substantive fit. Based on our experimental results, we can conclude that our proposed method exhibits better performance than that of the contrasted method and can locate more meaningful innovation topics; that is, our innovation-LDA model is capable of not only identifying more rigorous topics for each thread by utilizing the text structure but is also capable of learning more semantic and coherent themes from user interests. This investigation expands topic identification research by providing both a new theoretical perspective and useful guidance for enterprises in product innovation.
{"title":"Identifying Valuable Knowledge Topics in Innovation Communities Using Innovation-LDA","authors":"Hongting Tang Hongting Tang, Yanlin Zhang Hongting Tang, Xianyun Lin Yanlin Zhang, Lanteng Wu Xianyun Lin","doi":"10.53106/160792642023112406012","DOIUrl":"https://doi.org/10.53106/160792642023112406012","url":null,"abstract":"Researchers and practitioners have recognized that user-generated content in the innovation community plays an important role. However, it is challenging to automatically identify valuable knowledge from these unstructured texts. Thus, in this study, we propose an efficient model for extracting innovation-oriented topics and, simultaneously, for assigning discovered topics to each post in the online innovation community. Specifically, we introduce a variant of the latent Dirichlet allocation (LDA) topic model, called the Innovation-LDA model, which comprehensively considers users’ interests (reflected by pageviews and replies) and the structure of threads (e.g., header or body) to generate the valuable topics. We access the quality of discovered information through statistical fit as well as substantive fit. Based on our experimental results, we can conclude that our proposed method exhibits better performance than that of the contrasted method and can locate more meaningful innovation topics; that is, our innovation-LDA model is capable of not only identifying more rigorous topics for each thread by utilizing the text structure but is also capable of learning more semantic and coherent themes from user interests. This investigation expands topic identification research by providing both a new theoretical perspective and useful guidance for enterprises in product innovation.","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"16 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139291145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-01DOI: 10.53106/160792642023112406019
Hong Shi Hong Shi, Leiyi Gao Hong Shi, Ruixin Zhang Leiyi Gao, Junzhu Wang Ruixin Zhang, Hongxia Deng Junzhu Wang
Macaque brains are very close to human brains, so it’s an effective way to deepen the understanding of human brain functions by studying macaque brain structures. In order to segment subcortical nuclei of macaque brains more accurately, a multi-atlas segmentation algorithm based on an improved sparse representation has been designed in this paper. Firstly, a type of labeling information for atlas brain images is introduced when sparse patch-based representation is constructed, and then mutual information is improved by changing the calculation method of the information entropy, and it is used to measure the similarity between the target image and the atlas images. These two make the weights of the atlas more reasonable during fusion. Secondly, in order to fuse the segmentation results from two methods, nonlocal-patch-weighted method and the sparse representation method, a new similarity index based on a combination of dice coefficient and cosine distance is proposed. Finally, the experimental results show that this algorithm proposed in this paper has improved the accuracy of segmentation of hippocampus, striatum, claustrum and other nuclei, and it has better robustness.
{"title":"A Multi-Atlas Segmentation Algorithm with An Improved Sparse Representation on Brain MR Images","authors":"Hong Shi Hong Shi, Leiyi Gao Hong Shi, Ruixin Zhang Leiyi Gao, Junzhu Wang Ruixin Zhang, Hongxia Deng Junzhu Wang","doi":"10.53106/160792642023112406019","DOIUrl":"https://doi.org/10.53106/160792642023112406019","url":null,"abstract":"Macaque brains are very close to human brains, so it’s an effective way to deepen the understanding of human brain functions by studying macaque brain structures. In order to segment subcortical nuclei of macaque brains more accurately, a multi-atlas segmentation algorithm based on an improved sparse representation has been designed in this paper. Firstly, a type of labeling information for atlas brain images is introduced when sparse patch-based representation is constructed, and then mutual information is improved by changing the calculation method of the information entropy, and it is used to measure the similarity between the target image and the atlas images. These two make the weights of the atlas more reasonable during fusion. Secondly, in order to fuse the segmentation results from two methods, nonlocal-patch-weighted method and the sparse representation method, a new similarity index based on a combination of dice coefficient and cosine distance is proposed. Finally, the experimental results show that this algorithm proposed in this paper has improved the accuracy of segmentation of hippocampus, striatum, claustrum and other nuclei, and it has better robustness.","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"19 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139292985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-01DOI: 10.53106/160792642023112406015
Huibin Wang Huibin Wang, Ming Chen Huibin Wang, Xianglin Wei Ming Chen
Harsh or hostile environments may lead to node failure and connectivity degradation of a UAV swarm system. In order to maintain or restore the connectivity of a network in case of node failure, this paper proposes a mechanism to adjust the network topology to resist the impact caused by node failure. Firstly, a network model of a UAV swarm network based on k-hop constrained reachability is proposed. Secondly, a k-hop constrained reachability based proactive connectivity maintaining mechanism of UAV swarm network is presented. In this mechanism, each node identifies the network abnormality distributed according to k-hop reachability, and reports the observed abnormality to the master node; then, a virtual edge-based topology reconstruction algorithm is put forward for the master node to derive a topology reconstruction solution in a centralized way; afterwards, the solution is delivered to the slave nodes to reconfigure the network topology in parallel. Thirdly, a quantitative method is introduced to optimize the total travel distance of nodes, and a spanning tree-based method is designed to maintain the connectivity during the topology transformation process. Both theoretical analysis and simulation results have shown that: on the one hand, the proposed mechanism are effective in maintaining a UAV swarm’s connectivity in case of node failure; on the other hand, the proposed mechanism outperforms existing mechanisms in terms of fault tolerance, connectivity, and total travel distance, and it’s less affected by the failure rate.
恶劣或敌对的环境可能会导致节点故障和无人机蜂群系统的连接性下降。为了在节点失效时保持或恢复网络的连通性,本文提出了一种调整网络拓扑结构的机制,以抵御节点失效造成的影响。首先,本文提出了基于 k 跳约束可达性的无人机蜂群网络模型。其次,提出了一种基于 k 跳约束可达性的无人机蜂群网络主动连接维护机制。在该机制中,各节点根据k-hop可达性识别网络异常分布,并将观察到的异常情况报告给主节点;然后,主节点提出一种基于虚拟边的拓扑重构算法,以集中方式得出拓扑重构方案;之后,将该方案传递给从节点,并行重构网络拓扑。第三,引入一种定量方法来优化节点的总行程距离,并设计一种基于生成树的方法来保持拓扑改造过程中的连通性。理论分析和仿真结果表明:一方面,所提出的机制能在节点失效时有效保持无人机群的连通性;另一方面,所提出的机制在容错性、连通性和总行程距离方面优于现有机制,且受故障率的影响较小。
{"title":"A k-hop Constrained Reachability Based Proactive Connectivity Maintaining Mechanism of UAV Swarm Networks","authors":"Huibin Wang Huibin Wang, Ming Chen Huibin Wang, Xianglin Wei Ming Chen","doi":"10.53106/160792642023112406015","DOIUrl":"https://doi.org/10.53106/160792642023112406015","url":null,"abstract":"Harsh or hostile environments may lead to node failure and connectivity degradation of a UAV swarm system. In order to maintain or restore the connectivity of a network in case of node failure, this paper proposes a mechanism to adjust the network topology to resist the impact caused by node failure. Firstly, a network model of a UAV swarm network based on k-hop constrained reachability is proposed. Secondly, a k-hop constrained reachability based proactive connectivity maintaining mechanism of UAV swarm network is presented. In this mechanism, each node identifies the network abnormality distributed according to k-hop reachability, and reports the observed abnormality to the master node; then, a virtual edge-based topology reconstruction algorithm is put forward for the master node to derive a topology reconstruction solution in a centralized way; afterwards, the solution is delivered to the slave nodes to reconfigure the network topology in parallel. Thirdly, a quantitative method is introduced to optimize the total travel distance of nodes, and a spanning tree-based method is designed to maintain the connectivity during the topology transformation process. Both theoretical analysis and simulation results have shown that: on the one hand, the proposed mechanism are effective in maintaining a UAV swarm’s connectivity in case of node failure; on the other hand, the proposed mechanism outperforms existing mechanisms in terms of fault tolerance, connectivity, and total travel distance, and it’s less affected by the failure rate.","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"2 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139293230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-01DOI: 10.53106/160792642023112406018
Han-Ying Kao Han-Ying Kao, Chien-Hao Lan Han-Ying Kao, Chia-Hsien Hsu Chien-Hao Lan
Recently Internet of things (IoT) and its applications are emerging as a momentous trend in industry. Numerous hardware and software providers have been entering the intense market competition in IoT related industries. Correspondingly, the attention on evaluation of IoT industry is growing. However, it is a main theme as how to consider the multiple dimensions and dependencies among the criteria in IoT supply chains simultaneously. By considering internal processes in DMUs as well as their interactions, this study designs the evaluation methods with network data envelopment analysis (NDEA) and multi-objective programming (MOP) techniques. This work intends to estimate the efficiency of IoT businesses from the perspectives of R&D, manufacturing, sales and finance, and the overall performance. The proposed models are implemented with empirical case studies in IoT supply chains in Taiwan. The results show the usefulness and validity of the proposed methods in evaluating IoT related business.
{"title":"Efficiency Evaluation of Business in IoT Supply Chains by Network DEA","authors":"Han-Ying Kao Han-Ying Kao, Chien-Hao Lan Han-Ying Kao, Chia-Hsien Hsu Chien-Hao Lan","doi":"10.53106/160792642023112406018","DOIUrl":"https://doi.org/10.53106/160792642023112406018","url":null,"abstract":"Recently Internet of things (IoT) and its applications are emerging as a momentous trend in industry. Numerous hardware and software providers have been entering the intense market competition in IoT related industries. Correspondingly, the attention on evaluation of IoT industry is growing. However, it is a main theme as how to consider the multiple dimensions and dependencies among the criteria in IoT supply chains simultaneously. By considering internal processes in DMUs as well as their interactions, this study designs the evaluation methods with network data envelopment analysis (NDEA) and multi-objective programming (MOP) techniques. This work intends to estimate the efficiency of IoT businesses from the perspectives of R&D, manufacturing, sales and finance, and the overall performance. The proposed models are implemented with empirical case studies in IoT supply chains in Taiwan. The results show the usefulness and validity of the proposed methods in evaluating IoT related business.","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139297103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
An access/entry control system usually consists of many subsystems. These subsystems have different Application Programming Interfaces (APIs), but they need to be integrated and interacted well. Without a good integrated platform, the communications between subsystems will be very complicated. In addition, except user name and password, Radio Frequency Identification (RFID), and the human’s biometrics (e.g., fingerprint and face) are used to identify users. Wireless Local Area Network (WLAN), mobile communications (e.g. 4G/5G) and Bluetooth are adopted as the remote access technologies. In addition, with the COVID-19 pandemic, public health and personal safety are getting more concerns. People are required to wear personal protective equipment (PPE) in some special areas (e.g., barns and factories) to ensure the personal healthy and food’s safety. To identify the user and detect whether the PPE is correctly worn, this paper proposes an access/entry control system by using an Internet of Things (IoT) platform. Through the proposed IoT system architecture, different identification mechanisms and communication technologies can be adopted, and the messages can be exchanged between two mechanisms. This paper elaborates the architecture design of the IoT platform and discusses the implementation/deployment issues of the PPE detection by using machine learning mechanisms.
{"title":"ACStalk: Design and Implementation of An Access/Entry Control System using an Internet of Things (IoT) Platform","authors":"Syuan-You Chen Syuan-You Chen, Shih-Wen Jiang Syuan-You Chen, Whai-En Chen Shih-Wen Jiang","doi":"10.53106/160792642023112406017","DOIUrl":"https://doi.org/10.53106/160792642023112406017","url":null,"abstract":"An access/entry control system usually consists of many subsystems. These subsystems have different Application Programming Interfaces (APIs), but they need to be integrated and interacted well. Without a good integrated platform, the communications between subsystems will be very complicated. In addition, except user name and password, Radio Frequency Identification (RFID), and the human’s biometrics (e.g., fingerprint and face) are used to identify users. Wireless Local Area Network (WLAN), mobile communications (e.g. 4G/5G) and Bluetooth are adopted as the remote access technologies. In addition, with the COVID-19 pandemic, public health and personal safety are getting more concerns. People are required to wear personal protective equipment (PPE) in some special areas (e.g., barns and factories) to ensure the personal healthy and food’s safety. To identify the user and detect whether the PPE is correctly worn, this paper proposes an access/entry control system by using an Internet of Things (IoT) platform. Through the proposed IoT system architecture, different identification mechanisms and communication technologies can be adopted, and the messages can be exchanged between two mechanisms. This paper elaborates the architecture design of the IoT platform and discusses the implementation/deployment issues of the PPE detection by using machine learning mechanisms.","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"44 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139300113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-01DOI: 10.53106/160792642023072404012
Fang Xie Fang Xie, Jing-Liang Chen Fang Xie, Yi Zhu Jing-Liang Chen, Hong-Yan Zheng Yi Zhu
In order to overcome the data sparsity problem in service description text and to improve the web service clustering quality, we propose a web service clustering method with semantic enhancement based on RGPS (Role-Goal-Process-Service) Framework and Bi-term Topic Model (BTM). First, we extend service description text’s feature according to RGPS meta-model framework. Also, we generate the service latent feature by BTM. Then, we employ K-means on the generated features. The results of experiments on service registry PWeb show that this method can get better clustering performance in purity and entropy. It is proved that this method has great efficiency compared with the baseline methods K-means, Agglomerative and LDA (Latent Dirichlet Allocation). This paper enhances the service clustering performance and creates foundation work for service organization and recommendation.
{"title":"A Web Service Clustering Method with Semantic Enhancement Based on RGPS and BTM","authors":"Fang Xie Fang Xie, Jing-Liang Chen Fang Xie, Yi Zhu Jing-Liang Chen, Hong-Yan Zheng Yi Zhu","doi":"10.53106/160792642023072404012","DOIUrl":"https://doi.org/10.53106/160792642023072404012","url":null,"abstract":"\u0000 In order to overcome the data sparsity problem in service description text and to improve the web service clustering quality, we propose a web service clustering method with semantic enhancement based on RGPS (Role-Goal-Process-Service) Framework and Bi-term Topic Model (BTM). First, we extend service description text’s feature according to RGPS meta-model framework. Also, we generate the service latent feature by BTM. Then, we employ K-means on the generated features. The results of experiments on service registry PWeb show that this method can get better clustering performance in purity and entropy. It is proved that this method has great efficiency compared with the baseline methods K-means, Agglomerative and LDA (Latent Dirichlet Allocation). This paper enhances the service clustering performance and creates foundation work for service organization and recommendation. \u0000 \u0000","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127288168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}