Spelling suggestions: "subject:"conmuser"" "subject:"couser""
281 |
Effect of Recommendation Interface and Cognitive Styles on User SatisfactionLai, Yu-Tsang 26 July 2004 (has links)
In terms of performance measurement on Recommendation Systems, previous research focuses on system viewpoints. For Example, Leng¡¦s NewsWeeder(1995) measure recommendation performance by precision¡FSyskill&Webert measure recommendation performance by classification accuracy¡FGroupLen measure recommendation performance by system response time¡CWe bring up a user-oriented viewpoint which means that whether the recommendation interface satisfies user¡¦s needs, whether it is easy to use, and whether it provides sufficient information to user. In the meantime, prvious research didn¡¦t think over the difference of everyone¡¦s information processing style¡CTherefore, our research objective focuses on effect of cognitive styles and recommendation style on user satisfaction¡C
In the construct of recommendation interface, we adopt average rating and text comment¡CAnd in the construct of cognitive style, we classify it with
intuitive and analytical users¡CThe measurement of user satisfaction adopts Doll and Torkzadea (1988) questionnaire and refines it¡C
The research result finds that different recommendation interfaces and cognitive styles have a significant impact on user satisfaction¡CIf we don¡¦t think over effect of cognitive styles, there is higher user satisfaction on text comment¡CIf we think over effect of cognitive styles, intuitive user has higher user satisfaction on average rating¡Fanalytical user has higher user satisfaction on text comment¡COur research contribution is as follow¡CIn academic aspect, our research finding can provide researcher in cognitive psychology¡Binformation recommendation and information management field for further research¡FIn practical aspect, our research finding can assist webstore company in implementing recommendation service¡C
|
282 |
Development of User Satisfaction as a Measure of ERP SuccessChangchien, Mien-chih 01 February 2001 (has links)
Enterprise resource planning systems (ERP) are expensive. The decision to install an ERP system necessitates a choice of mechanisms to determine whether an ERP system is needed, and once implemented, whether it is success. User satisfaction is one such evaluation mechanism. This research investigates the measurement of ERP user satisfaction in the specific context of the outsourcing environment. Starting with an analysis of the characteristics of ERP systems and the outsourcing environment and using the critical incident interview technique, a previously validated instrument was selected and adapted. A modified version was then developed and tested to prove its reliability and validity. The results of this effort and suggested uses of the questionnaire are reported here.
|
283 |
The analysis of characteristics of the portal sites in users' perspectiveWu, Rong-Jann 02 July 2001 (has links)
none
|
284 |
The Study of Medical Purchase Through Electronic Commerce ServiceChen, Chun-Lin 07 January 2003 (has links)
The Study of Medical Purchase Through Electronic Commerce Service
Abstract
The purpose of this thesis is to recognize the medical purchaser¡¦s degree of accepting medical electronic commerce service (e-commerce) in the medical purchasing process and the ideal websites regarding the service. By user¡¦s involvement in service designs, functions of the websites, and the format of purchase processing, the ideal website on medical commerce can be discussed as aforementioned three factors.
The thesis includes literary analysis and surveys based on the medical electronic commerce service. The 224 participants include purchasers from medical centers, local hospitals, regional hospitals, or those that have consumed products within two years. After the surveys are recycled, the SPSS program for Windows 10.0 is used to organize and analyze data with descriptive statistics, chi-square testing, and ANOVA testing. The discoveries based on purchasers are listed below:
1. E-commerce websites need to have organization in products, rate of sending the data, and specific details.
2. While using the Internet, the safety of the World Wide Web might be too low, and business confidential documents will be disclosed, which causes harm to the hospital.
3. The reason for using e-commerce is because the web is convenient with timesaving issues where data is easily collected and the rate of reacting in sending and receiving is rapid.
4. In traditional format of business, there are rooms for improvements in creating a new company, price research, and product information.
5. The desire to participate in e-commerce is very strong; numerous people are willing to fill out the survey and provide personal experience as an appreciation.
6. In the future, websites are expected to have strong search engines and devices providing security of purchasing.
At last, this paper includes conclusion and suggestion according to the result of the experiment as a reference to the building of e-commerce websites in the future and those interested in this field.
Keywords: e-commerce, medical purchasing, user¡¦s involvement
|
285 |
Image enhancement for improving visibility and feature recognitionZubair, Juwairia 10 October 2008 (has links)
Researchers analyze images in areas such as geology, bat cardiovascular systems
and art studies to verify their observations. Some images are hard to study as their details
are not vivid; hence there is a need to enhance these images to facilitate their study while
preserving their contents. This study is aimed at assisting the researchers in the
Cardiovascular Systems Dynamic Laboratory at Texas A&M University by evaluating
the importance of Image Enhancement (IE) for improving visibility of features.
For this study the images were collected and manipulated using various IE
techniques and were shown to the novice researchers who were asked to perform three
different tasks. These tasks were representative of the research work conducted in the
lab. The techniques that were selected aimed at reducing the problems that are usually
associated with data obtained from microscopic feeds. A customized application was
developed to expedite and automate the study. The results indicated that the researchers
did not immmensely benefit from the improved visualization for easy tasks. However,
their performance improved for tasks that required more practice and skill. Our approach
contributes towards designing an effective training program for novice researchers in
the lab. Moreover, it is promising for similar research in different fields of study.
|
286 |
Design and Implementation of User Authentication Based on Keystroke DynamicHsin, Tsung-Chin 28 January 2008 (has links)
In the traditional login systems, we use the username and the password to identify the legalities of users. It is a simple and convenient way to identify, but passwords could be stolen or copied by someone who tries to invade the system illegally. Adding one protective mechanism to identify users, the way of biometrics are brought out, such as keystroke dynamics, fingerprints, DNA, retinas and so on that are unique characteristics of each individuals, it could be more effective in preventing trespassing. This thesis uses keystroke biometrics as research aspects of user authentication. The advantages of this system are low-cost and high security to identify users using keyboard to calculate the time of keystrokes. In this thesis, we use statistical way to examine the researches and experiments. Chosen length of the username and password are greater than or equal to 9 characters, and learning sample sizes are 20 and adapting the sample adaptation mechanism, the results show that we achieved by False Acceptance Rate of 0.85%, False Rejection Rate of 1.51% and Average False Rate of 1.18%; all reach the high levels of safeties.
|
287 |
A Comparison of Three Verification Methods for Keystroke DynamicChen, Hsiao-ying 11 February 2009 (has links)
In login systems, a user is asked to enter his correct account and password
in order to be allowed to enter to the system. The safety of systems is at the
risk of leaking out the information, hence, the single mechanism of identity
verification has not filled the bill at present. We study the personal typing
behavior to get one¡¦s own specific features.
In our thesis , we compare three methods and anlysis the advantages and
shortcomings of those three. First one is to sort the twenty study data, and
distribute the weights into the proper region. If the total weights is less than
the threshold then this test data will be accepted, otherwise, it will be rejected.
The second and third method are similar. Both of them are trying to rescale
the data. The spirit of them is that the typing rate of a person will be faster
when they type frequently and will be sloer when they are out of practice.
However the relative positions of those keys, the lengths of ons¡¦s fingers, and
the time that people making pauses in reading unpunctuated are unique.
Those factors can be one¡¦s typing rhythm.
There are twenty two individuals involved in this experiment. Each one
choose his own proficient account and password to type and set up his typing
model. The imposters are randomly choose legal user to imitate.
|
288 |
The systematic use of sound in multimedia instruction to enhance learning /Bishop, Mary Jean, January 2000 (has links)
Thesis (Ed. D.)--Lehigh University, 2000. / Includes vita. Includes bibliographical references (leaves 120-152).
|
289 |
Visual design versus development a case study presenting how XML and XSLT can separate presentation from data /Nair, Deepa R., January 2001 (has links) (PDF)
Thesis (M.S.)--University of Florida, 2001. / Title from first page of PDF file. Document formatted into pages; contains xi, 86 p.; also contains graphics. Vita. Includes bibliographical references (p. 85).
|
290 |
Performance analysis of advanced front ends on the Aurora Large Vocabulary EvaluationParihar, Naveen. January 2003 (has links)
Thesis (M.S.)--Mississippi State University. Department of Electrical and Computer Engineering. / Title from title screen. Includes bibliographical references.
|
Page generated in 0.0575 seconds