46 resultados para Popularity.


Relevância:

10.00% 10.00%

Publicador:

Resumo:

The machinery of governance to address climate change at the sub-national level in England continues to evolve. Drawing on documentary evidence and the views of civil servants and local authority officials from the English West Midlands, this article explores the process through an examination of the inclusion of climate change indicators in the recent round of Local Area Agreements (LAAs), negotiated between central government and local authorities and Local Strategic Partnerships. Considerable popularity has been accorded these indicators nationally, but there are important variations in the pattern of take up. Moreover, significant uncertainties surround the contribution of local measures to reduce CO2 emissions and the targets attached to measures to adapt to climate change are seen as undemanding. Conversely, the impending Carbon Reduction Commitment will act as a powerful incentive for public bodies to cut CO2 emissions from their estates. Although potentially contributing to greater coherence in tackling climate change, achieving collective action through LAAs will prove problematic.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Purpose: The aim of this paper is to shed light on the determinants of consumers' evaluations and purchase intentions of gift promotions. Factors analysed relate to the promoted product, the gift, the relationship between the product and the gift, and consumer traits and perceptions. Design/methodology/approach: A 2 (product type: utilitarian vs hedonic) × 2 (gift type: utilitarian vs hedonic) × 2 (brand type: high equity vs medium equity) between-subjects factorial design was undertaken. Structural equation modelling was used to test the hypotheses on a sample of 247 respondents in the UK. Findings: Gift attractiveness is the most important driver of consumers' overall evaluation of gift promotions, followed by the attitude toward the promoted brand, the perceived fit between the promoted product and the gift, the hedonic nature of the gift, plus value expression and entertainment benefits perceived by consumers. Results also reveal that deal proneness is positively associated with the hedonic benefits of value expression benefit and entertainment benefit. Finally, the overall evaluation of gift promotions with both brand attitudes and deal proneness positively influences consumers' purchase intentions. Research limitations/implications: To generalise these findings, future research should use a wider sample. Practical implications: The findings of this study provide guidelines for marketers designing their gift promotional strategies. Originality/value: The increased popularity of gift promotions necessitates a better understanding of the factors influencing consumers' evaluations. This study addresses the lack of research in this area by simultaneously investigating the effect of different key factors. © Emerald Group Publishing Limited.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Over the last few years Data Envelopment Analysis (DEA) has been gaining increasing popularity as a tool for measuring efficiency and productivity of Decision Making Units (DMUs). Conventional DEA models assume non-negative inputs and outputs. However, in many real applications, some inputs and/or outputs can take negative values. Recently, Emrouznejad et al. [6] introduced a Semi-Oriented Radial Measure (SORM) for modelling DEA with negative data. This paper points out some issues in target setting with SORM models and introduces a modified SORM approach. An empirical study in bank sector demonstrates the applicability of the proposed model. © 2014 Elsevier Ltd. All rights reserved.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Synchronous reluctance motors (SynRMs) are gaining in popularity in industrial drives due to their permanent magnet-free, competitive performance, and robust features. This paper studies the power losses in a 90-kW converter-fed SynRM drive by a calorimetric method in comparison of the traditional input-output method. After the converter and the motor were measured simultaneously in separate chambers, the converter was installed inside the large-size chamber next to the motor and the total drive system losses were obtained using one chamber. The uncertainty of both measurement methods is analyzed and discussed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Lexicon-based approaches to Twitter sentiment analysis are gaining much popularity due to their simplicity, domain independence, and relatively good performance. These approaches rely on sentiment lexicons, where a collection of words are marked with fixed sentiment polarities. However, words' sentiment orientation (positive, neural, negative) and/or sentiment strengths could change depending on context and targeted entities. In this paper we present SentiCircle; a novel lexicon-based approach that takes into account the contextual and conceptual semantics of words when calculating their sentiment orientation and strength in Twitter. We evaluate our approach on three Twitter datasets using three different sentiment lexicons. Results show that our approach significantly outperforms two lexicon baselines. Results are competitive but inconclusive when comparing to state-of-art SentiStrength, and vary from one dataset to another. SentiCircle outperforms SentiStrength in accuracy on average, but falls marginally behind in F-measure. © 2014 Springer International Publishing.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The popularity of online social media platforms provides an unprecedented opportunity to study real-world complex networks of interactions. However, releasing this data to researchers and the public comes at the cost of potentially exposing private and sensitive user information. It has been shown that a naive anonymization of a network by removing the identity of the nodes is not sufficient to preserve users’ privacy. In order to deal with malicious attacks, k -anonymity solutions have been proposed to partially obfuscate topological information that can be used to infer nodes’ identity. In this paper, we study the problem of ensuring k anonymity in time-varying graphs, i.e., graphs with a structure that changes over time, and multi-layer graphs, i.e., graphs with multiple types of links. More specifically, we examine the case in which the attacker has access to the degree of the nodes. The goal is to generate a new graph where, given the degree of a node in each (temporal) layer of the graph, such a node remains indistinguishable from other k-1 nodes in the graph. In order to achieve this, we find the optimal partitioning of the graph nodes such that the cost of anonymizing the degree information within each group is minimum. We show that this reduces to a special case of a Generalized Assignment Problem, and we propose a simple yet effective algorithm to solve it. Finally, we introduce an iterated linear programming approach to enforce the realizability of the anonymized degree sequences. The efficacy of the method is assessed through an extensive set of experiments on synthetic and real-world graphs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

With the advent of GPS enabled smartphones, an increasing number of users is actively sharing their location through a variety of applications and services. Along with the continuing growth of Location-Based Social Networks (LBSNs), security experts have increasingly warned the public of the dangers of exposing sensitive information such as personal location data. Most importantly, in addition to the geographical coordinates of the user’s location, LBSNs allow easy access to an additional set of characteristics of that location, such as the venue type or popularity. In this paper, we investigate the role of location semantics in the identification of LBSN users. We simulate a scenario in which the attacker’s goal is to reveal the identity of a set of LBSN users by observing their check-in activity. We then propose to answer the following question: what are the types of venues that a malicious user has to monitor to maximize the probability of success? Conversely, when should a user decide whether to make his/her check-in to a location public or not? We perform our study on more than 1 million check-ins distributed over 17 urban regions of the United States. Our analysis shows that different types of venues display different discriminative power in terms of user identity, with most of the venues in the “Residence” category providing the highest re-identification success across the urban regions. Interestingly, we also find that users with a high entropy of their check-ins distribution are not necessarily the hardest to identify, suggesting that it is the collective behaviour of the users’ population that determines the complexity of the identification task, rather than the individual behaviour.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

One of the greatest concerns related to the popularity of GPS-enabled devices and applications is the increasing availability of the personal location information generated by them and shared with application and service providers. Moreover, people tend to have regular routines and be characterized by a set of “significant places”, thus making it possible to identify a user from his/her mobility data. In this paper we present a series of techniques for identifying individuals from their GPS movements. More specifically, we study the uniqueness of GPS information for three popular datasets, and we provide a detailed analysis of the discriminatory power of speed, direction and distance of travel. Most importantly, we present a simple yet effective technique for the identification of users from location information that are not included in the original dataset used for training, thus raising important privacy concerns for the management of location datasets.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In recent years, the rapid spread of smartphones has led to the increasing popularity of Location-Based Social Networks (LBSNs). Although a number of research studies and articles in the press have shown the dangers of exposing personal location data, the inherent nature of LBSNs encourages users to publish information about their current location (i.e., their check-ins). The same is true for the majority of the most popular social networking websites, which offer the possibility of associating the current location of users to their posts and photos. Moreover, some LBSNs, such as Foursquare, let users tag their friends in their check-ins, thus potentially releasing location information of individuals that have no control over the published data. This raises additional privacy concerns for the management of location information in LBSNs. In this paper we propose and evaluate a series of techniques for the identification of users from their check-in data. More specifically, we first present two strategies according to which users are characterized by the spatio-temporal trajectory emerging from their check-ins over time and the frequency of visit to specific locations, respectively. In addition to these approaches, we also propose a hybrid strategy that is able to exploit both types of information. It is worth noting that these techniques can be applied to a more general class of problems where locations and social links of individuals are available in a given dataset. We evaluate our techniques by means of three real-world LBSNs datasets, demonstrating that a very limited amount of data points is sufficient to identify a user with a high degree of accuracy. For instance, we show that in some datasets we are able to classify more than 80% of the users correctly.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article presents a case study of the recent reform of the United Kingdom Equalities and Human Rights Commission, to address a critical gap in the literature on national human rights institutions (NHRIs) concerning the power of governments to exert control over these institutions through reform processes. Through this analysis, the article demonstrates, first, that NHRIs are affected by contextual factors not only related to the popularity of the human rights agenda but also to wider policy agendas which impact on their status and functions; and second, that attempts by government to exert more administrative control can be significantly problematic for the operational independence of NHRIs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Online enquiry communities such as Question Answering (Q&A) websites allow people to seek answers to all kind of questions. With the growing popularity of such platforms, it is important for community managers to constantly monitor the performance of their communities. Although different metrics have been proposed for tracking the evolution of such communities, maturity, the process in which communities become more topic proficient over time, has been largely ignored despite its potential to help in identifying robust communities. In this paper, we interpret community maturity as the proportion of complex questions in a community at a given time. We use the Server Fault (SF) community, a Question Answering (Q&A) community of system administrators, as our case study and perform analysis on question complexity, the level of expertise required to answer a question. We show that question complexity depends on both the length of involvement and the level of contributions of the users who post questions within their community. We extract features relating to askers, answerers, questions and answers, and analyse which features are strongly correlated with question complexity. Although our findings highlight the difficulty of automatically identifying question complexity, we found that complexity is more influenced by both the topical focus and the length of community involvement of askers. Following the identification of question complexity, we define a measure of maturity and analyse the evolution of different topical communities. Our results show that different topical communities show different maturity patterns. Some communities show a high maturity at the beginning while others exhibit slow maturity rate. Copyright 2013 ACM.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Radio frequency identification (RFID) technology has gained increasing popularity in businesses to improve operational efficiency and maximise costs saving. However, there is a gap in the literature exploring the enhanced use of RFID to substantially add values to the supply chain operations, especially beyond what the RFID vendors could offer. This paper presents a multi-agent system, incorporating RFID technology, aimed at fulfilling the gap. The system is developed to model supply chain activities (in particular, logistics operations) and is comprised of autonomous and intelligent agents representing the key entities in the supply chain. With the advanced characteristics of RFID incorporated, the agent system examines ways logistics operations (i.e. distribution network) particular) can be efficiently reconfigured and optimised in response to dynamic changes in the market, production and at any stage in the supply chain. © 2012 IEEE.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In recent decades, a number of sustainable strategies and polices have been created to protect and preserve our water environments from the impacts of growing communities. The Australian approach, Water Sensitive Urban Design (WSUD), defined as the integration of urban planning and design with the urban water cycle management, has made considerable advances on design guidelines since 2000. WSUD stormwater management systems (e.g. wetlands, bioretentions, porous pavement etc), also known as Best Management Practices (BMPs) or Low Impact Development (LID), are slowly gaining popularity across Australia, the USA and Europe. There have also been significant improvements in how to model the performance of the WSUD technologies (e.g. MUSIC software). However, the implementation issues of these WSUD practices are mainly related to ongoing institutional capacity. Some of the key problems are associated with a limited awareness of urban planners and designers; in general, they have very little knowledge of these systems and their benefits to the urban environments. At the same time, hydrological engineers should have a better understanding of building codes and master plans. The land use regulations are equally as important as the physical site conditions for determining opportunities and constraints for implementing WSUD techniques. There is a need for procedures that can make a better linkage between urban planners and WSUD engineering practices. Thus, this paper aims to present the development of a general framework for incorporating WSUD technologies into the site planning process. The study was applied to lot-scale in the Melbourne region, Australia. Results show the potential space available for fitting WSUD elements, according to building requirements and different types of housing densities. © 2011 WIT Press.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

It is already a truism that emerging communication technologies have changed the landscape of communication in every aspect of our lives, but this is specifically true for how we communicate at work. Advances in communication technologies have enabled a wide range of digital communication modes to be utilized for both internal and external business communication; including audio and visual communication and voice-over protocols, as well as text-based channels, such as email, forums, instant messaging and social media. In spite of the wide range of available audio-visual channels, and despite the ever-increasing popularity of email, real-time text-based communication technologies (instant messaging or IM) are also on the rise (see Mak, 2014; Pazos et al., 2013; Radicati & Levenstein, 2013; and Markman in this volume). The prominence of IM is evident in the rise of this mode of communication, not only as a tool for internal business communication, but as a front-stage channel, particularly for customer service encounters or professional-client conversations (Makarem et al., 2009; Pearce et al., 2013; L. Zhang et al., 2011).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Switched reluctance motors (SRMs) are gaining in popularity because of their robustness, low cost, and excellent high-speed characteristics. However, they are known to cause vibration and noise primarily due to the radial pulsating force resulting from their double-saliency structure. This paper investigates the effect of skewing the stator and/or rotor on the vibration reduction of the three-phase SRMs by developing four 12/8-pole SRMs, including a conventional SRM, a skewed rotor-SRM (SR-SRM), a skewed stator-SRM (SS-SRM), and a skewed stator and rotor-SRM (SSR-SRM). The radial force distributed on the stator yoke under different skewing angles is extensively studied by the finite-element method and experimental tests on the four prototypes. The inductance and torque characteristics of the four motors are also compared, and a control strategy by modulating the turn-ON and turn-OFF angles for the SR-SRM and the SS-SRM are also presented. Furthermore, experimental results validate the numerical models and the effectiveness of the skewing in reducing the motor vibration. Test results also suggest that skewing the stator is more effective than skewing the rotor in the SRMs.