Academic literature on the topic 'Peer technology usage'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Peer technology usage.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Peer technology usage"

1

Upadhyay, Ashwani Kumar, Komal Khandelwal, Tanuj Nandan, and Prashant Mishra. "Sales technology usage." Asia Pacific Journal of Marketing and Logistics 30, no. 1 (January 8, 2018): 257–71. http://dx.doi.org/10.1108/apjml-01-2017-0001.

Full text
Abstract:
Purpose The purpose of this paper is to model the key influencers or predictors for usage of technology by sales professionals in India. Design/methodology/approach This study examines the effect of individual, organizational and social factors on the use of technology. The method used for primary research is survey, and data have been collected from 556 sales professionals from across four industries in India. The empirical analysis consists of confirmatory factor analysis using structural equation modeling. Findings Confirmatory factor analysis has been used to validate the constructs, namely, peer usage, support service, perceived usefulness, attitude, usage and performance. Based on the results, it has been concluded that attitude and peer usage have a direct effect on the use of technology. Support service affects peer usage and perceived usefulness affects attitude. This model helps us understand the direct and indirect predictors of use of sales technology (ST), and its effect on sales performance. Research limitations/implications The limitation of this study is that data pertain to India only. Practical implications The findings of this paper will help sales managers and organizations develop strategies to increase the acceptance and use of new technologies, and also strengthen their arguments for convincing the various stakeholders about the benefits and relevance of the ST. Originality/value The paper attempts to build and validate a parsimonious model taking into account peer usage (social factor) and support service (organizational factor) in addition to perceived usefulness and attitude.
APA, Harvard, Vancouver, ISO, and other styles
2

Punamäki, Raija-Leena, Marjut Wallenius, Hanna Hölttö, Clas-Håkan Nygård, and Arja Rimpelä. "The associations between information and communication technology (ICT) and peer and parent relations in early adolescence." International Journal of Behavioral Development 33, no. 6 (September 10, 2009): 556–64. http://dx.doi.org/10.1177/0165025409343828.

Full text
Abstract:
The study aims were, first, to examine the associations between the type and intensity of ICT (Information and Communication Technology) and peer and parent relationships. Second, the study explored gender- and age-specific ICT usage and their associations with peer and parent relationships. The participants were 478 Finnish 10- and 13-year-old girls and boys. They reported the frequencies of digital game playing, using a computer for information seeking, communication, and Internet surfing, and evaluated the qualities of peer relationships (popularity, loneliness, and friendship) and communication with mother and father (open and conflicting). As hypothesized, intensive usage of ICT for entertainment (digital playing and Internet surfing) was associated with poor relations with both peers and parents, while intensive usage of ICT for communication (email and chat rooms) was associated with good peer relations, and poor parent relations. The associations were, however, gender-specific. Among girls intensive digital game playing was associated with poor mother—daughter and among boys with poor father—son communication. ICT is discussed as provider of new tools for playing, exploring, and communicating in childhood and adolescence.
APA, Harvard, Vancouver, ISO, and other styles
3

Putra, Okta Eka, Agung Pramayuda, Tanti Rohaeni, Vera Yessica Tarigan, and Ariezan Zainal Ariffin. "Key Determinants of Fintech Peer-to-Peer Lending Usage Intentions: Insights from Bandung City." Involvement International Journal of Business 2, no. 1 (January 19, 2025): 26–37. https://doi.org/10.62569/iijb.v2i1.107.

Full text
Abstract:
This study aims to identify and analyze the key factors influencing the intention to use fintech peer-to-peer (P2P) lending services in Bandung City, addressing a significant area of financial technology adoption in emerging markets. This research uses a quantitative accidental sampling method, namely a non-probability sampling technique to survey 428 residents of Bandung City who use P2P lending services. Data were collected through questionnaires and analyzed using multiple linear regression to evaluate the impact of various independent variables on usage intention. The analysis revealed that Personalization, Accessibility, and Enhanced Effectiveness have a positive and statistically significant influence on the intention to use P2P lending. Conversely, Loan Approval Speed demonstrated a negative and statistically significant effect. Social Factors, however, were found to have no significant impact on usage intention. These findings contribute to the literature on fintech adoption, highlighting the importance of service personalization and accessibility while identifying areas for improvement, such as streamlining loan approval processes. The insights provided can inform strategies for both service providers and policymakers in fostering responsible P2P lending adoption in Bandung City. This research underscores critical determinants of P2P lending usage intentions and provides actionable insights for enhancing the effectiveness and appeal of financial technology services in Bandung City.
APA, Harvard, Vancouver, ISO, and other styles
4

Ekler, Péter, and Kristóf Csorba. "The Usage and Behavior Patterns of Mobile BitTorrent Clients." Journal of Advanced Computational Intelligence and Intelligent Informatics 18, no. 3 (May 20, 2014): 320–23. http://dx.doi.org/10.20965/jaciii.2014.p0320.

Full text
Abstract:
With the many changes in mobile phone use, it is now common for users to connect to the Internet and share social and multimedia data, and peer-to-peer technology remains one of the most efficient solutions to content sharing. We analysed the lifecycle of content shared using the BitTorrent network, focusing on torrents retrieved by mobile phone clients using our MobTorrent application. MobTorrent, a complete Bit-Torrent client for feature phones, enables anonymous usage statistics to be collected. Based on statistics collected over the last three years, we analyze how mobile BitTorrent clients are being used. We discuss the success of individual sessions by additionally measuring peer connection download and success ratio statistics. This research can be considered as a pioneer work in the field of mobile content sharing solutions.
APA, Harvard, Vancouver, ISO, and other styles
5

Shalom, G. Richa, and Ganesh Rohit Nirogi. "Decentralized Cloud Storage Using Blockchain." International Journal for Research in Applied Science and Engineering Technology 10, no. 9 (September 30, 2022): 1294–300. http://dx.doi.org/10.22214/ijraset.2022.46810.

Full text
Abstract:
Abstract: Because of its accessibility and ease of use, cloud storage has become the most widely used type of storage on the market in recent years. However, the privacy and data security of cloud storage are at risk. The protection of data security and privacy is the main topic of this essay. We suggest a blockchain-based decentralised storage system. Since blockchain is a distributed peer-to-peer system, any processing node connected to the internet can join and build peers' networks, maximising resource usage. Blockchain protects data security. The user's file is encrypted and shared among a number of network peers in the proposed system utilising the IPFS (Interplanetary File System) protocol. Hashes are generated by IPFS. The path of the file is indicated by the hash value, which is kept on the blockchain. This project is focused on decentralised secure data storage, high data availability, and effective storage resource usage.
APA, Harvard, Vancouver, ISO, and other styles
6

Sabron, Mohd Zdikri Md, Rugayah Hashim, Aida Abdullah, and Nurshamshida Shamsudin. "Humanizing Technology: Smartphone usage in the learning environment." Environment-Behaviour Proceedings Journal 5, no. 13 (March 23, 2020): 107. http://dx.doi.org/10.21834/e-bpj.v5i13.1958.

Full text
Abstract:
The objective of this paper is to determine the influence of smartphone usage among secondary school students. The sample size of the study was 150 students. The findings showed that smartphone usage increases compassionate teaching with significant student engagement through the enhancement of the learner's cognitive capacity, motivation to study in both formal and informal settings, autonomy and confidence, as well as the promotion of personalized learning in helping low-achieving students to reach their academic performance goals. The implications verified that implementing smartphone usage in the classroom will result in an effective and proper process in the learning environment.Keywords: Humanizing technology; Smartphone Usage; Learning Environment; Student EngagementeISSN: 2398-4287 © 2020. The Authors. Published for AMER ABRA cE-Bs by e-International Publishing House, Ltd., UK. This is an open access article under the CC BYNC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/). Peer–review under responsibility of AMER (Association of Malaysian Environment-Behaviour Researchers), ABRA (Association of Behavioural Researchers on Asians) and cE-Bs (Centre for Environment-Behaviour Studies), Faculty of Architecture, Planning & Surveying, Universiti Teknologi MARA, Malaysia.DOI: https://doi.org/10.21834/e-bpj.v5i13.1958
APA, Harvard, Vancouver, ISO, and other styles
7

Singh, Swathi, Suguna R, Divya Satish, and Ranjith Kumar MV. "Survey on Surging Technology: Cryptocurrency." International Journal of Engineering & Technology 7, no. 3.12 (July 20, 2018): 296. http://dx.doi.org/10.14419/ijet.v7i3.12.16045.

Full text
Abstract:
The paper gives an insight on cryptography within digital money used in electronic commerce. The combination of digital currencies with cryptography is named as cryptocurrencies or cryptocoins. Though this technique came into existence years ago, it is bound to have a great future due to its flexibility and very less or nil transaction costs. The concept of cryptocurrency is not new in digital world and is already gaining subtle importance in electronic commerce market. This technology can bring down various risks that may have occurred in usage of physical currencies. The transaction of cryptocurrencies are protected with strong cryptographic hash functions that ensure the safe sending and receiving of assets within the transaction chain or blockchain in a Peer-to-Peer network. The paper discusses the merits and demerits of this technology with a wide range of applications that use cryptocurrency.
APA, Harvard, Vancouver, ISO, and other styles
8

Mohd Daud, Norzaidi, and Halimi Zakaria. "Impact of antecedent factors on collaborative technologies usage among academic researchers in Malaysian research universities." International Journal of Information and Learning Technology 34, no. 3 (May 6, 2017): 189–209. http://dx.doi.org/10.1108/ijilt-09-2016-0046.

Full text
Abstract:
Purpose The purpose of this paper is to investigate the impact of antecedent factors on collaborative technologies usage among academic researchers in Malaysian research universities. Design/methodology/approach Data analysis was conducted on data collected from 156 academic researchers from five Malaysian research universities. This study employed an extensive quantitative approach of a structural equation modeling method to evaluate the research model and to test the hypotheses. Findings The main findings of this study are that personal innovativeness, task-technology fit, and perceived peer usage are significant predictors of individual usage of collaborative technologies; perceived managerial support and subjective norm were found not to be significant predictors to perceived usefulness and individual usage; and perceived usefulness is a significant mediator to individual usage in that it had fully mediated personal innovativeness whereas partially mediated peer usage. Practical implications The results provide practical insights into how the Malaysian higher education sector and other research organizations of not-for-profit structure could enhance their collaborative technologies usage. Originality/value This research is perhaps the first that concentrates on collaborative technologies usage in Malaysian research universities.
APA, Harvard, Vancouver, ISO, and other styles
9

Radhakrishnan, Satish, and Lavanya Rajendran. "Peers, Gratification and Threat: Social Media Usage Among Adolescents." Journal of Communication and Management 4, no. 01 (March 22, 2025): 8–15. https://doi.org/10.58966/jcm2025412.

Full text
Abstract:
The advancement of information and communication technology, with the advent of social media, has attracted users across all age groups. However, adolescents were among the first to adapt to and experience the digital world for educational and recreational purposes. This research investigated adolescents’ social media experiences, including peer influence in their usage and the perceived threat. In light of the uses and gratifications theory, the study employed survey methodology via a questionnaire to investigate. Adolescents between the ages of 15 and 19 participated through stratified random sampling based on electoral constituency. With a 99% confidence level and a 5% margin of error, a total of 665 respondents were examined, and the response rate was 84%. Adolescents were extensively networked due to the satisfaction they gained from social media. Similarly, the role of peers was moderate, as the gratification outweighed other factors, including security threats.
APA, Harvard, Vancouver, ISO, and other styles
10

Piyoungkorn, Kajornsak, Siriboon Chaisawat, and Chalee Vorakulpipat. "Trusted Electronic Contract for Enabling Peer-to-Peer HPC Resource Sharing." Applied Sciences 12, no. 10 (May 20, 2022): 5153. http://dx.doi.org/10.3390/app12105153.

Full text
Abstract:
With the growing need for HPC resource usage in Thailand, this study aims to foster the creation of an HPC resource sharing ecosystem based on available in-house computing infrastructure. The model of computing resource sharing based on blockchain technology is presented for bridging communication between multiple clusters of HPC systems. The use of blockchain technology allows states among HPC systems to be synchronized and extends capabilities in enforcing governing rules. A smart contract was deployed on the blockchain network to enable users to request computing resources. Upon a request being made, a matching scheme performs the automatic selection of a suitable cluster based on current cluster utilization data and distance from users. Since users and clusters are anonymized from each other, a trusted payment scheme and permission access control are presented to assure both parties. As the system leverages off-chined and on-chained data exchange to carry out the operation, the secure gateway is proposed to mitigate technical difficulty from the client’s perspective and ensure information is securely flowing to and from legitimate actors. The result of this work ensures HPC service providers can maximize the utilization of their resources and monetize idle computing time, while users can access demanded resources conveniently and pay at a reasonable price.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Peer technology usage"

1

Malebanye, Potsane. "To investigate how Mobile Cellular Network Operators can increase the average revenue per user by stimulating the usage of broadband services." Thesis, University of South Africa, 2007. http://hdl.handle.net/10500/56.

Full text
Abstract:
The objective of this research is to investigate how mobile cellular network operators can increase the average revenue per user by stimulating the usage of mobile broadband services. There is a general consensus that the revenue from voice calls is slowly reaching saturation; hence, mobile cellular operators, service providers and content providers are looking for other sources of revenue from their new and existing customers. They are therefore beginning to focus more intensively on customer retention and on developing new strategies that will stimulate the usage of high speed mobile data services. The research shows that most people are aware of many of the mobile data services offered by operators, but that they thought that they were unreliable, slow, difficult to use and expensive. By and large, people signed up for mobile data services because they wanted a mobile always-on connection anytime, anywhere, with faster speed when accessing e-mail and other services or when downloading data from the Internet. The majority of people would use mobile broadband internet service if it cost less to use; if the speed were faster and the service were easy to use; if the cellular phone had a larger screen and used less battery power; and if the keyboard were larger. The relationship between Network operators, WASPs and content providers was found to be good, even though at times it is strained by the increased competition between them; this forces them not to cooperate on some issues for fear of compromising their competitive advantage.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Peer technology usage"

1

Sapkota, Brahmananda, Laurentiu Vasiliu, Ioan Toma, Dumitru Roman, and Chris Bussler. "Peer-to-Peer Technology Usage in Web Service Discovery and Matchmaking." In Lecture Notes in Computer Science, 418–25. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11581062_31.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Alshaer, Mayid, and Khalid Almarri. "The Impact of Facilitating Conditions on Innovation Readiness in the Dubai Public Sector." In BUiD Doctoral Research Conference 2023, 492–501. Cham: Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-56121-4_47.

Full text
Abstract:
AbstractPurpose- The purpose of this paper is to analyze the level of innovation readiness in Dubai’s public sector by taking a critical look at the current facilitating conditions, analyzing the gaps that arise with the lack of various innovations in place, and offering recommendations to remedy the problem.Methodology- This study uses a cross-sectional study design by using information from peer-reviewed journal articles. The search process for the articles involved the use of relevant terms such as “innovation readiness,” “facilitating conditions,” as well as “Dubai Public Sector.” The search narrowed down 15 peer-reviewed journal articles that were now used for the study.Findings- This study identified research gaps from the literature review and highlighted how the literature could be broadened and possible research questions that can be identified from the literature.Implications- The intention to use innovation readiness is positively impacted by facilitating situations, but the effect is marginal after the initial usage. As a result, the Model suggests that conducive environments have an immediate, considerable impact on user behavior.Originality/ value- The Unified Theory of Acceptance and Use of Technology discussed in this essay gives insights into the various forms of technology by comparing prominent technology acceptance theories.
APA, Harvard, Vancouver, ISO, and other styles
3

Sattler, Julia-Christina, Marcel Todtermuschke, Alexander Voigt, and Steffen Ihlenfeldt. "Analysis of Model Specific Features for the Development of a Non-Contact Reference Point System on a Flexible Gripper." In Zukunftstechnologien für den multifunktionalen Leichtbau, 120–35. Wiesbaden: Springer Fachmedien Wiesbaden, 2024. https://doi.org/10.1007/978-3-658-45889-8_10.

Full text
Abstract:
AbstractThe increasing diversity of models and variants in the automotive industry is leading to new challenges in the flexibilization of the body shop production process, especially the gripper systems. One way of making the component handling process more flexible by using type-variable grippers is to replace the mechanical reference point pins with virtual sensor technology, which ensures positionally and repeatedly accurate handling per component.One major challenge in using sensory technology for type-variable components is determining the necessary measuring range, which depends on the varying position and size of the reference points per model. In order to design a sustainable solution, the definition of a measurement range for both current and future model types is essential as well.According to the current state of the art, no optimal sensor parameters are known for the use case described. Additionally there are no existing studies that provide a guideline for the recommended position of reference points depending on the sensor technology used.This paper presents the approach of investigating characteristics of various reference points with regard to their position and geometry in order to define a measurement range for the usage of sensor technology. To optimize the determined measuring ranges, various scenarios of component alignment are examined and their influence on the sensor parameters identified. Here the example of interior door parts of different vehicle segments is applied as a use case.In the result, a system framework for positioning reference points is defined based on the investigated use case and a recommendation is made for the parameters of the sensor technology to be used. Furthermore the systematic alignment of components leads to a reduction of sensor parameters. These results can be used for positioning reference points in future models.
APA, Harvard, Vancouver, ISO, and other styles
4

Masseglia, Florent, Pascal Poncelet, and Maguelonne Teisseire. "Peer-to-Peer Usage Analysis." In Encyclopedia of Multimedia Technology and Networking, Second Edition, 1136–41. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-014-1.ch154.

Full text
Abstract:
With the huge number of information sources available on the Internet and the high dynamics of their data, peer-to-peer (P2P) systems propose a communication model in which each party has the same capabilities and can initiate a communication session. These networks allow a group of computer users with the same networking program to connect with each other and directly access resources from one another. P2P architectures also provide a good infrastructure for data and computer intensive operations such as data mining. In this article we consider a new data mining approach for improving resource searching in a dynamic and distributed database such as an unstructured P2P system, that is, in Masseglia, Poncelet, and Teisseire (2006) we call this problem P2P usage analysis. More precisely we aim at discovering frequent behaviors among users of such a system. We will focus on the sequential order between actions performed on each node (requests or downloads) and show how this order has to be taken into account for extracting useful knowledge. For instance, it may be discovered, in a P2P file sharing network that for 77% of nodes from which a request is sent for “Mandriva Linux,” the file “Mandriva Linux 2005 CD1 i585-Limited- Edition-Mini.iso” is chosen and downloaded; then a new request is performed with the possible name of the remaining iso images (i.e., “Mandriva Linux 2005 Limited Edition”), and in the large number of returned results the image corresponding to “Mandriva Linux 2005 CD2 i585-Limited-Edition-Mini.iso” is chosen and downloaded. Such knowledge is very useful for proposing the user with often downloaded or requested files according to a majority of behaviors. It could also be useful in order to avoid extra bandwidth consumption, which is the main cost of P2P queries (Ng, Chu, Rao, Sripanidkulchai, & Zhang, 2003).
APA, Harvard, Vancouver, ISO, and other styles
5

Yu, Liguo, and Ting Wang. "Emerging E-Business Models and Their Impact." In Encyclopedia of Organizational Knowledge, Administration, and Technology, 1286–96. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-3473-1.ch088.

Full text
Abstract:
With the wide usage of the internet and mobile apps, various e-business models are created and realized. Although most of them have a short history, their economic and social impact are significant. This paper describes the background and status quo of several representative emerging e-business models, including marketplace lending, mobile-enabled transportation, peer-to-peer rental, and personalized marketing. In addition, this paper discusses how these e-business models are transforming the landscape of our society and our social relations.
APA, Harvard, Vancouver, ISO, and other styles
6

Ghonge, Mangesh Manikrao, Sulakshana Mane, and Devasis Pradhan. "Demystifying the Role of Blockchain Technology in Healthcare and Transaction." In Advances in Electronic Government, Digital Divide, and Regional Development, 60–84. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-7998-8493-4.ch003.

Full text
Abstract:
In this chapter, blockchain technology and its applications in healthcare and transaction are studied, along with how certain features of this cutting-edge technology might disrupt established business practices. The authors have discovered several studies and open exploratory areas that will be valuable to both academics and practitioners. Recent developments in cryptocurrency systems like bitcoin have increased interest in building robust distributed networks. Various DLTs are presently involved in a furious battle to display their superior skills and how they can overcome the flaws of their rivals. There are two main approaches to the distributed ledger problem: one uses cryptographic hashes and the other uses an open, distributed peer-to-peer network. However, the usage of the system of data structure, error tolerance, and consensus mechanisms differs significantly. This distinction has an impact on the cost, security, latency, and efficiency of any DLT situation. This chapter is a detailed review of blockchain usage in healthcare and transaction.
APA, Harvard, Vancouver, ISO, and other styles
7

Setoyama Yoko, Nakayama Kazuhiro, and Yamazaki Yoshihiko. "Peer Support from Online Community on the Internet among Patients with Breast Cancer in Japan." In Studies in Health Technology and Informatics. IOS Press, 2009. https://doi.org/10.3233/978-1-60750-024-7-886.

Full text
Abstract:
This study describes the current status of peer support through an online community among patients with breast cancer, and examines how the support differs through the patients' usage of the community. Self-reported questionnaires distributed to 465 patients through Internet were analyzed. Analysis indicated the peer support among patients was categorized according to the following 5 factors: “emotional support, helper-therapy,” “emotional expression,” “conflict,” “advice,” and “insight, universality.” Even the patients who only read the postings of other patients received benefits from the community.
APA, Harvard, Vancouver, ISO, and other styles
8

Tsai, Chin-Chung. "Internet-Based Peer Assessment in High School Settings." In Handbook of Research on New Media Literacy at the K-12 Level, 743–54. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-120-9.ch046.

Full text
Abstract:
Many educators have suggested the usage of peer assessment for the improvement of learning outcomes. Peer assessment facilitated by Internet technology can enhance anonymity and lead to better interactions between students and peer reviewers. In addition, online peer assessment can effectively store students’ peer interactions and learning progression portfolios for further analyses or evaluations. However, most peer assessment studies have been conducted with higher education students, such as college or graduate students. This chapter reports an initial meta-analysis of a series of research utilizing online peer assessment involving Taiwanese high school students. This study also summarizes some practical principles for conducting online peer assessment in high school settings. Finally, this chapter proposes the required literacy of using Internet-based peer assessment, both for the learners and teachers.
APA, Harvard, Vancouver, ISO, and other styles
9

Diong, Ivan H. W., and Evelyn B. H. Toh. "The Influences of Reference Groups Towards the Usage of E-Wallet Payment Systems." In Handbook of Research on Social Impacts of E-Payment and Blockchain Technology, 428–55. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-7998-9035-5.ch023.

Full text
Abstract:
This chapter investigates how the three referent groups (peers, parent, media) of subjective norms (SN) influence the intention of millennials to adopt e-wallets. This study is supported by the theory of planned behavior (TPB) and stimulus-organism-response (SOR) framework. A total of 215 usable responses were obtained and analyzed using SPSS 25 and SmartPLS 3.2.6. The data is collected using a self-administered survey (Lancaster Qualtrics) and distributed randomly using the snowball sampling technique. The results indicate that the decomposition of SN has a significant relationship towards the intention of millennials to adopt e-wallets. This chapter also provides useful insights on what are the other factors that would build the intention of millennials towards the usage of e-wallets. Moreover, TPB along with the SOR framework supports the findings and provides better credibility to this study. This chapter concludes that brands should leverage more capital on media advertisements rather than peer referrals if they want to capture a larger market.
APA, Harvard, Vancouver, ISO, and other styles
10

Gayathri, V., and Tanusri Gururaj. "The Carbon Footprint of Blockchain." In Advanced Systems for Monitoring Carbon Sequestration, 61–86. IGI Global, 2025. https://doi.org/10.4018/979-8-3373-2091-5.ch003.

Full text
Abstract:
Blockchain technology is a sequence of interconnected blocks comprising secure and transparent peer-to-peer transaction records. It is a combination of blocks with shared memory, resistant to falsification and builds trust; resilience in technology. This chapter provides an overview of blockchain technology, architecture, and applications. It explores the carbon footprint of blockchain system and examines its environmental impacts through case studies on Bitcoin mining, Ethereum, Chia network, food supply chain, Tezos blockchain, and geothermal energy. It also endeavors to analyze energy consumption and Carbon dioxide (CO2) emissions and eventually understand high-power usage, which has led to environmental impacts. The carbon footprint, which is the total greenhouse gas (GHG) emitted, is released at high levels and significantly affects habitats because to its ability to trap atmospheric heat. This chapter also focuses on the mitigation process, namely, renewable energy. The chapter in the conclusion underscores the importance to make blockchains more environmentally sustainable.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Peer technology usage"

1

Craven, Allen. "Usage Spectrum Contribution to Rotorcraft Dynamic Component Reliability." In Vertical Flight Society 80th Annual Forum & Technology Display, 1–9. The Vertical Flight Society, 2024. http://dx.doi.org/10.4050/f-0080-2024-0042.

Full text
Abstract:
Rotorcraft dynamic component fatigue lives and corresponding reliability have long been derived from three major contributors: material strength, loads, and usage. This paper provides a historical perspective of the contribution of aircraft usage to overall U.S. Army rotorcraft dynamic component reliability. A quick background of how we got to a six-nines reliability requirement is first provided. Different types of usage spectra and the nuances and trade-offs of two specific usage gathering methods, pilot surveys and usage monitoring, are discussed. Finally, I describe where usage spectrum fits into fatigue life calculations and the existing reliability policy and requirements. Each OEM (e.g., Bell Helicopter, Boeing, Sikorsky) has been free to develop their own fatigue methods over the years. These differences in method can lead to vastly different results, even with the same input parameters as evidenced by a now well-known round robin problem. There is notable variability between OEM methodologies, each with viable solutions to this trivariate problem. In the interest of normalizing independent U.S. Government (USG) assessments across multiple OEM paradigms, the Army is investigating a USG method to assess the reliability contribution from usage. No new methods are presented herein, only findings of previous work. Uncited opinions herein are those of the author based on literature review, peer discussions, and experience with U.S. Army and U.S. Air Force (USAF) airworthiness processes. Reliability values in this paper are approximate, as there are elements of statistical distribution and non-statistical estimation that contribute.
APA, Harvard, Vancouver, ISO, and other styles
2

Kelly, Stacey. "V-22 Dynamic Components Fatigue Design Usage Spectrum vs. Fleet History." In Vertical Flight Society 70th Annual Forum & Technology Display, 1–8. The Vertical Flight Society, 2014. http://dx.doi.org/10.4050/f-0070-2014-9544.

Full text
Abstract:
A critical task for initiating an aircraft design is to determine how the fielded product will be used. For the V-22 Osprey, a usage spectrum was developed. The spectrum considered time spent in level flight, number of maneuvers per flight hour, type of maneuvers that would be flown, etc. With the V-22 fleet now exceeding 200,000 flight hours the actual usage spectrum can be compared to the design spectrum to gain key insights. The V-22 onboard recording system includes maneuver recognition software that permits this analysis. Results from fleet usage data are compared to the design usage spectrum to show areas where the original design spectrum is conservative and where it was not. The differences show how a usage-based appraisal of fatigue effects can be used for determining replacement intervals of life limited components.
APA, Harvard, Vancouver, ISO, and other styles
3

Sturrock, Charles P., and W. B. A. Sharp. "An Integrated Information System Concerning Materials for Handling Hazardous Chemicals." In CORROSION 1989, 1–11. NACE International, 1989. https://doi.org/10.5006/c1989-89272.

Full text
Abstract:
Abstract The cost of chemical process equipment per ton of product depends strongly on the original choice of materials of construction, and on the proper application of these materials. Inappropriate material selection or improper fabrication methods raises the process cost because of the downtime and maintenance costs required to repair corrosion damage. Where processes involve hazardous chemicals, incorrect materials usage can also jeopardize the safety of plant workers. Computer-based intelligent information systems can provide relevant material selection and fabrication advice in a readily accessible format. If made available to plant personnel who are not materials specialists, such advice can contribute to reduced equipment costs and minimized safety hazards. The Materials Technology Institute of the Chemical Process Industries (MTI) with the support of the Nickel Development Institute is sponsoring a project at the NACE-NIST Corrosion Data Center in the National Institute of Standards and Technology (NIST), formerly the National Bureau of Standards (NBS), to develop expert systems concerning materials for handling hazardous chemicals. Expert systems are computer programs that provide expert advice within a specific domain. Useful not only by themselves, expert systems can also be incorporated within intelligent information systems which may include other expert systems, databases, full-text search and retrieval from technical articles, subroutines for calculations, and other types of computer programs. This paper will summarize expert system technology, describe an MTI-NACE-NIST system which provides advice on the use of materials for shipping, handling and storing concentrated sulfuric acid and oleum, and suggest other areas in which this technology may develop.
APA, Harvard, Vancouver, ISO, and other styles
4

Wood, Gregory, Sam Kunselman, Steven Lamb, and Eric Winslette. "Extension of HUMS Data for Estimating Flight Severity for Helicopter Airframe Structures." In Vertical Flight Society 70th Annual Forum & Technology Display, 1–8. The Vertical Flight Society, 2014. http://dx.doi.org/10.4050/f-0070-2014-9547.

Full text
Abstract:
This paper details the development of a flight severity factor (FSF) calculation algorithm for airframe components by leveraging flight parameter data from a Health and Usage Monitoring System (HUMS). The United States Air Force (USAF) has added to the value of its HH-60G Pave Hawk HUMS data by using it to estimate theoretical fatigue crack growth, which is leveraged to update inspection intervals per MIL-STD-1530C. The results yield increased safety, improved component inspection and replacement scheduling, reduced unscheduled maintenance, decision support for service life extension programs (SLEP), and increased aircraft availability. In addition, the FSF is being used in the implementation of an individual aircraft tracking program (IATP) for the HH-60G, using HUMS data to predict theoretical crack growth on a flight-by-flight basis for two structural tracking locations, with an additional six planned for the near future. The paper describes background for the program, including a flight strain survey, a global finite element model, and a durability and damage tolerance analysis used for the damage model.
APA, Harvard, Vancouver, ISO, and other styles
5

Heroux-Theriault, Alexandre. "Achieving HUMS Program Financial Benefits - 12 years of day to day HUMS operations on the CH-146 Griffon fleet." In Vertical Flight Society 70th Annual Forum & Technology Display, 1–6. The Vertical Flight Society, 2014. http://dx.doi.org/10.4050/f-0070-2014-9536.

Full text
Abstract:
Over the years, the cost/benefit balance of Health & Usage Monitoring Systems (HUMS) available for rotorcraft have generated much debate, especially at the procurement phase of new aircraft. Currently, there is consensus within and outside the HUMS community regarding the safety benefits of having a HUMS system installed. The Royal Canadian Air Force worked in conjunction with the HUMS support team from Bell Helicopter Canada to establish the direct quantitative cost savings of running the HUMS program on their fleet of 85 CH-146 (Bell 412CF) Griffon helicopters. Accepting the safety benefits, the objective was to determine whether the cost savings generated by the program would offset the annual investment required. Using the HUMS database and the various military tracking systems, the number of events for which HUMS provided sufficient data to deviate from either a maintenance action or from a conditional inspection was compiled for a 5 year period from the beginning of 2008 to the end 2012. The total saving was conservatively estimated at $2.1M per year which definitively surpasses the annual investment required to keep the program running.
APA, Harvard, Vancouver, ISO, and other styles
6

Hoffmann, Falk, Sophie Hasbroucq, and Georg Wurzel. "HUMS and CBM in the Civil Helicopter Market." In Vertical Flight Society 70th Annual Forum & Technology Display, 1–14. The Vertical Flight Society, 2014. http://dx.doi.org/10.4050/f-0070-2014-9540.

Full text
Abstract:
Health and Usage Monitoring Systems (HUMS) for rotorcraft have been available since the early 1990s. While HUMS installation and utilization has recently surged in the military environment, driven in large part by the US Department of Defense's CBM+ initiative, commercial applications have progressed at a much slower rate. This paper reviews the challenges that are faced in the application of HUMS and services built around HUMS in the civil helicopter market. Some of the key characteristics of this market that set it apart from the military market are the often small fleet size per operator, starting with individual aircraft, the decentralized maintenance by diverse maintenance service partners, and the constant strong industry competition concerning cost and performance. One of the main challenges in promoting HUMS in the civil helicopter market lies in providing a cost-benefit justification. An approach for monitoring capability analysis and benefit assessment is presented. The approach is based on the analysis of various types of information from sources both within the design organization and from the field.
APA, Harvard, Vancouver, ISO, and other styles
7

Reilly, Thomas, and Dominic Przano. "Utilizing Additive Manufacturing / 3-D Printing to Optimize Design and Support Solutions for One-Off Spares and Support Product Requirements." In Vertical Flight Society 71st Annual Forum & Technology Display, 1–6. The Vertical Flight Society, 2015. http://dx.doi.org/10.4050/f-0071-2015-10201.

Full text
Abstract:
Out-of-production aircraft continue to have demand for spare parts that are designed and fabricated with the tooling, processes and materials that were optimized during the high-rate production periods. Similarly, component repair and overhaul support equipment can require broaching, machining, electrical discharge machining (EDM), grinding and polishing and other techniques necessary to achieve reliable functionality of the system. In both cases the low production volume for these parts requires significant non-recurring set-up, tooling, and quality controls costs that affect the per-unit costs and lead times. The maturing technology of additive manufacturing and 3-D printing is now allowing companies to strategize around "growing parts" from a digital database and bypass the design paradigms and production costs inherited from historical manufacturing limitations. Engineers who understand the design freedom of additive manufacturing could leverage the capability and optimize support equipment functionality even further to increase maintainability and safety of usage. As additive materials continue to develop, more and more low-volume spare parts could be converted from traditional, production-driven designs to parts grown-when-needed.
APA, Harvard, Vancouver, ISO, and other styles
8

Holder, Albert. "Advantages of Powder Coatings." In CORROSION 1990, 1–6. NACE International, 1990. https://doi.org/10.5006/c1990-90475.

Full text
Abstract:
Abstract Powder coating, a curiosity only a short while ago, has turned into a 17% per annum growth item in the United States. How did this happen? The equipment manufacturers improved the efficiency and equipment was custom made on request, the powder manufacturers themselves invested in significant research and development, but it would be fair to say that the EPA (Environmental Protection Agency) inadvertently did the most to advance this technology by reducing allowable volatile organic compound (VOC). The Federal Government, while slow to change, has invested substantial time and money, and is using the products. For example, the Navy coating maintenance facilities on the east and west coasts are increasing their usage. Why this sudden interest? One hundred percent solids, no waste on over spray, dry film thickness from 0.8 mil to 300+ mils, pencil hardness of 6H, are good enough reasons. But most of all, when we recognize that near zero VOC is definitely coming. A survey of the options indicates that for those components where fusion of the coating is feasible, powder coating is a good way to go.
APA, Harvard, Vancouver, ISO, and other styles
9

Scates, Erica, John Bullock, and Brian Fuller. "Study on the Impact of Post-Flight CBM Reporting on Readiness and Maintenance Metrics." In Vertical Flight Society 73rd Annual Forum & Technology Display, 1–13. The Vertical Flight Society, 2017. http://dx.doi.org/10.4050/f-0073-2017-12084.

Full text
Abstract:
The Department of the Navy has been developing and deploying Health and Usage Monitoring Systems (HUMS) for more than 20 years. One of the many uses of HUMS is as an enabling technology for implementing Condition Based Maintenance (CBM), the goal of which is to improve aircraft safety, affordability, and availability through an as-needed (rather than scheduled) approach to maintenance. To drive the fleet toward a more realized implementation of CBM, a CBM event detection and reporting system was developed for the Navy's fleet of H-60 aircraft, accompanied by updated policy requiring the fleet to adhere to the guidance within these CBM reports. For this investigation, five years of maintenance and readiness data from two naval H-60 aircraft types were studied to identify trends related to this platform's implementation of CBM. This five year period includes two years of data from before the CBM reports and policy were introduced, one year of data during which the technology and policy were being implemented, and two years of data from after the reports and policy were in effect. The metrics chosen to evaluate changes in fleet behavior were Mission Capable Rate (MC Rate), Non-Mission Capable Rate due to Unscheduled Maintenance (NMCMU Rate), Unscheduled Maintenance Man-Hours per Flight Hour (UMMF), Scheduled Maintenance Man-Hours per Flight Hour (SMMF), and Functional Check Flight Hours per Flight Hour (FCF Rate). Overall, the fleet mean MC Rate decreased, NMCMU Rate, UMMF, and SMMF increased, and FCF Rate was unchanged in the period after the reports and policy were introduced. However, for most of these metrics, a squadron-level analysis showed that the individual squadrons did not trend uniformly in the direction of these fleet averages. In a continued effort to characterize the fleet response to the implementation of CBM, it is recommended that further investigation into additional metrics and analysis techniques be pursued.
APA, Harvard, Vancouver, ISO, and other styles
10

Blemel, Ken G. "Reactive Prognostic Management of Corrosion with Autonomous Sensors." In CORROSION 2000, 1–8. NACE International, 2000. https://doi.org/10.5006/c2000-00294.

Full text
Abstract:
Abstract This paper presents a new technology that holds promise for use in idealized "futuristic" systems for in-situ corrosion detection and remediation. New technologies are needed as recent studies show the U.S. Government spends up to $125B per year to detect, protect, and repair damage caused by corrosion. This article is a report on how the US Naval Air Systems Command (NAVAIR) has initiated several Health Usage Monitoring (HUM) and Sentient Health Management (SHM) programs to study and combat chemical corrosion. Because of the corrosive nature of the naval environment, NAVAIR is pursuing new ways to pro-actively detect, prevent, eliminate, and deal with corrosion. In mid-1999, PMA 299, the NAVAIR H60 helicopter program office, funded a feasibility experiment for the development and testing of smart prognostic (Sentient) sensors for HUM and PHM. The Sentients are members of new generation of networked and autonomous reactive sensory computers enabled by microcomputer technologies. The US Navy is investigating the use of Sentients as a new approach to a variety of issues. Sentient devices operate throughout the time between maintenance. Sentients incorporate features for reasoning information gained by combining data from multiple sensors with fuzzy logic and rule based algorithms. Sentients are a first step to having the system be a first line of defense against corrosion.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Peer technology usage"

1

Kakulla, Brittne. Tech Usage Among Women of All Ages: Women 50+ Engage with Technology and Differently Than Their Younger Peers: Fact Sheet. Washington, DC: AARP Research, July 2022. http://dx.doi.org/10.26419/res.00493.017.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

García Zaballos, Antonio, and Rubén López-Rivas. Socioeconomic Impact of Broadband in Latin American and Caribbean Countries. Inter-American Development Bank, November 2012. http://dx.doi.org/10.18235/0009082.

Full text
Abstract:
Broadband plays a key role in society, impacting GDP, productivity, and employment. In the Latin American and Caribbean region, which is characterized by low broadband penetration costly Internet connection, low usage, and sporadic adoption of mobile technology, a major goal for governments is to universalize access to and usage of broadband. This paper presents an econometric model which shows that, in Latin America and the Caribbean, on average, a 10 percent higher broadband penetration is associated with 3.19 percent higher GDP, 2.61 percent higher productivity, and 67,016 new jobs. It also defines the variables that a government can control to help increase the number of broadband subscriptions per capita in order to effectively improve socioeconomic conditions in the country.
APA, Harvard, Vancouver, ISO, and other styles
3

Akua Anyidoho, Nana, Max Gallien, Mike Rogan, and Vanessa van den Boogaard. Mobile Money Taxation and Informal Workers: Evidence from Ghana’s E-Levy. Institute of Development Studies, September 2022. http://dx.doi.org/10.19088/ictd.2022.012.

Full text
Abstract:
The use of digital financial services, including money transfers and mobile money, have expanded widely in lower-income countries in the past decade; 47 per cent of the population of sub-Saharan Africa (548 million) had a registered mobile money account in 2020, with 29 per cent of those accounts representing active users (Andersson-Manjang and Naghavi 2021: 8). Among lower-income countries for which data is available, the average number of mobile money accounts is more than double the number of commercial bank accounts. In many lower-middle-income countries, mobile money usage is the same or more than commercial bank usage (Bazarbash et al. 2020). Alongside this growth, governments have increasingly sought to tax DFS, rooted in deeper discussions about the role that technology can play in increasing tax revenue and strengthening overall state capacity (Fan et al. 2020; Okunogbe and Santoro 2021). While capturing revenue from DFS can come from many sources, mobile money taxes in particular have often been introduced due to the untapped revenue potential and the relatively convenient and easy nature of the tax handle (Lees and Akol 2021a) – particularly in relation to, say, corporate income taxes on financial service providers. As noted above, the search for revenue is often closely linked to a desire to capture revenue from workers in the informal economy, who are often framed as tax evaders.
APA, Harvard, Vancouver, ISO, and other styles
4

Ali, S. M. Zulfiqar, Siban Shahana, and Rizwana Islam. Learning at a Distance: Assessing the Effectiveness of Remote Learning in Bangladesh. Bangladesh Institute of Development Studies, July 2024. http://dx.doi.org/10.57138/zevi5743.

Full text
Abstract:
COVID-19 has significantly disrupted education globally, including in Bangladesh, where schools were closed for nearly two years. The Bangladeshi government initiated a distance learning program via SANGSAD TV starting April 30, 2020, initially for primary and then secondary students. This shift from traditional classroom teaching to remote learning posed challenges, particularly for young students and those from low-income households, impacting them differently based on various factors like household income, gender, electricity, and internet access. To assess the effectiveness of the Remote Learning System (RLS), a comprehensive survey was conducted involving 1,050 Government Primary Schools (GPS) and 554 Junior and Secondary Schools (JSS) across 70 Upazilas in 63 districts. The survey included 50,871 students from grades 3-10, 4,481 teachers, and 1,598 headteachers. Key findings revealed that remote learning was minimally accessed, with only 9-11 per cent of primary students and 16.2 per cent of secondary students engaging with televised educational programs during school closures. Access to necessary devices varied, with 87 per cent of families owning basic mobile phones, 69 per cent having smartphones, and 58 per cent possessing televisions. Despite the availability of remote learning resources, a significant portion of students did not utilise them, with non-usage rates increasing after schools reopened. Headteachers and teachers largely agreed that remote learning was less effective than in-person education, with most preferring a blended approach for future learning. The study underscored the need for improved communication, better content delivery tailored to diverse contexts, and a dedicated budget for remote learning initiatives. Enhanced access to technology and consistent monitoring are crucial for the success of remote learning systems, which, while beneficial, are not a complete substitute for classroom learning.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography