Sunday, March 31, 2019

Multi-keyword Ranked Search Over Encrypted Cloud Data

Multi-keyword Ranked reckon Over Encrypted Cloud infoNow a days defile calculate has mother more than popular, so more learning possessors are actuated to their information to cloud servers for great public toilet and less monetary value in selective information management. However, sensible information should be encrypted before outsourcing for public. In this paper the hassle of a plug multi-keyword see on cloud is solved by utilize encryption of information before it actually utilize. Which are continuously supports dynamic measure up operation desire insertion and deletion of the inventorys.Keywords Cloud reason, Ranked ground take care, Download frequency, Multikeyword see, Encrypted cloud selective information, Synonym query.IntroductionCloud computing has become clean model which handles large resources of computing. Services provided by the cloud computing is storage and on demand services, both the individuals and organizations are motivated to the clou d. sooner of purchasing software and hardware devices.Cloud provides unsex online storage and in that location is no loss of data, the data is available at anytime and anywhere. Paper shows the world(a) approach for data protection is to encrypt the data by using AES algorithmic rule.The simple method for transfering data is decrypts it locally, beca subprogram consumers want to search needed data rather than all. In this way it is essential to investigate a nut-bearing and successful search benefit over encrypted outsourced information.The current search approaches like stratified search, multi-keyword search that empowers the cloud clients to locate the just about pertinent information rapidly. It likewise decr excuses the system activity by darting the most of import information to client asks. However, in genuine search situation it whitethorn be conceivable that client searches with the equivalent words of the predefined keywords not the represent keywords, because of absence of the clients correct information about the information.LITERATURE SURVEYZhangjie Fu, Xingming Sun, Nigel Linge and Lu Zhou 2 proposed a successful way to deal with take palm of the issue of multi-keyword rank search over encrypted cloud information documentation synonym queries. To address multi-keyword search and result positioning, Vector Space pattern (VSM) is utilized to build document advocate that is tostate, each(prenominal) document is communicated as a vector where each dimension value is the Term absolute frequency (TF) weight of its comparing keyword. Another vector is additionally produced in the caput stage. The vector has a similar dimension with document index and its each dimension value is the Inverse Document Frequency (IDF) weight. At that indicate cosine measure can be utilized to register equation of one document to the search inquiry. To enhance search proficiency, a tree- base index structure which is an adjust paired tree is utilized.C. Wang, N. Cao, J. Li, K. Ren, and W. Lou 3 developed the Ranked search that increases system usability by returning the relevant files in a ranked order.(e.g., keyword frequency). In this state-of-the-art searchable symmetric encryption (SSE) security definition used for increasing its efficiency. They have alike proposed the existing cryptographic primitive, order preserving centrosymmetric encryption (OPSE) for searching matching files.W. Sun, B. Wang, N. Cao, M. Li, W. Lou, and Y. T. Hou 5 proposed a method to address the problem of similarity-based rank is privacy-preserving multi-keyword text search (MTS) scheme. They also presented the search index based on the vector space model, i.e., cosine measure, and TF IDF weight to achieve senior high school level of search accuracy and to support a multi-keyword queries with search ranking functionalities.PROBLEM STATEMENTMany associations and organizations store their more significant data in cloud to protect their information from infection and hacking. The advantage of new computing is it looks deeply for cloud clients. Rank search enhances framework ease of use by ordinary coordinating records in a ranked arrange with respect to certain importance criteria (e.g. Keyword and download frequency). As bully forwardly outsourcing significance scores will trickles a great deal of splendid data against the keyword security, to solve this problem we proposed asymmetric encryption with ranking meaning of query information which will give just expected information.Proposed ashesFig. 1. System Architecture of Multi-Keyword Ranked Search Over Encrypted Cloud Data.Keyword blowupTo enhance the accuracy of search results, the keywords are removed from outsourced content documents demand to be stretched out by regular synonyms or comparable words, as cloud customers, searching information may be the synonyms of the predefined keywords.Upload Encrypted DataAfter expansion of keywords the data owner assist data with encrypting the document utilizing AES Algorithm and after that upload the encrypted document to the cloud for storage reason. This permits data owner to store their secret key in extremely secure way without presenting it to the clients of framework. For this, secret key is put away again in encrypted frame.Search ModuleThis module helps clients to enter their query keyword to get the most important documents from set of uploaded documents. This module recovers the documents from cloud which coordinates the query keyword.Rank genesisIn data recovery, a positioning capacity is as a rule used to assess relevant scores of coordinating documents to a demand. The rank capacity in view of the term recurrence (TF) and conversation document recurrence (IDF) is utilized as a part of grow organize i.e. TF-IDF. Additionally this framework gives client most mainstream documents for their keywords by examining report of most downloaded documents for specific inquiry keywords.Download Ranked ResultsClients can download the resultant arrangement of documents just if he/she is approved client who has allowed agree from data owner to download specific document. Owner will send encrypted secret key and session key to client to decrypt the document.MethodologiesAES algorithmAES is an iterative instead of Feistel cipher. It depends on substitution-permutation network. It contains an arrangement of linked operations, some of which accept supplanting inputs by particular yields (substitutions) and others include rearranging bits around (permutations). Strangely, AES plays out both one of its calculations on bytes instead of bits.Steps for AES algorithmCreate a random key for symmetric encryption of user facts.Encrypt the records the use of this random key.Encrypt the random key the use of asymmetric encryption. mail the encrypted message and the encrypted key to the receiver of searched results.Henceforth, AES treats the 128 bits of a plaintext obstruct as 16 bytes. These 16 bytes are organized in four columns and four rows for preparing as a matrix.TF-IDFTFTF (t) = (Number of times term t appears in a document) /(Total amount of terms in the document).IDFIDF (t) = log_e (Total number of documents / Number ofDocuments with term t in it).CONCLUSIONThe multi-keyword ranked methodology results in the more effective search handle which diminishes the network traffic and download bandwidth. It gives back the precisely matched documents, and also the records which incorporate the terms semantically significant to the question keyword. It offers fitting semantic separation between terms to achieve the question keyword expansion. The encryption has been execute to ensure the security also, efficiency of information, before it is outsourced to cloud, and gives protection to datasets, indexes and keywords.REFERENCES1 Zhihua Xia, Xinhui Wang, Xingming Sun, Qian Wang,A Secure and fighting(a) Multi-keyword Ranked Search Schema over Encrpted Cloud Data, IEEE Trans actions On Parallel And Distributed Systems,VolPP No99 ,Year 20152 Zhangie Fu, Xingming Sun, Nigel Linge, Lu Zhou, Achieving Effective Cloud Search Services Multi-Keyword Ranked Search Over Encrypted Cloud Data supporting(a) Synonym Query, IEEE Transactions On Consumer Electronics, Vol 60, No. 1, February 20143 C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, Secure ranked keyword search over encrypted cloud data,Proceedings of IEEE 30th International convocation on Distributed Computing Systems (ICDCS), pp. 253-262,2010.4 Q. Chai, and G. Gong, Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers, Proceedings of IEEE International Conference on Communications (ICC12), pp. 917-922, 2012.5 W. Sun, B. Wang, N. Cao, M. Li, W. Lou, and Y. T. Hou, Privacy preserving multi-keyword text search in the cloud supporting similarity based ranking, ASIA CCS 2013, Hangzhou, China, May 2013, ACM pp. 71-82, 2013.

CLT as a language teaching

CLT as a language informThesis asseveration and Annotated Bibliography05 March 2010Thesis StatementTeachers usually use CLT as a language teaching method, however, in Baxs opinion CLT should be replaced by linguistic context Approach.Annotated BibliographyBax, S. (2003). The end of CLT a context approach to language teaching. In ELT journal Volume 57/3 (pp. 278-287). Oxford University Press.Baxs article argues that CLT plays a hugely dominating role in language teaching, meanwhile neglecting the context in which teaching takes place. He agrees that CLT is a good method, that is why it is so popular, notwithstanding it has its consume shortcomings. He claims that the context in which language teaching takes place is much important, so instructors should focus on the Context Approach. Bax states that many teachers think that the rural area which does not use CLT is a backward country. He suggests that the main line of work is that the main focus lies on the teachers methodol ogy, which means that the focus is on teaching not in learning. He explains that the Context Approach is not a brand-new idea it is just not within the CLT. His conclusion is that nevertheless though teachers pay attention to context, it is a secondary feature for them, although it should be the key factor both in language teaching and learning.(141 words)Harmer, J. (2003). favourite culture, methods, and context. In ELT Journal Volume 57/3 (pp. 288-294). Oxford University Press. As argue to Baxs article, Harmer states that methodology in language learning can not be rejected. He agrees with Bax that the teachers training should not be like the PPP method, but disagrees with him in other aspects, such as the importance of the learners local and theme culture in language teaching. His main argument in connecter with that is the idea of the conflict between the teachers belief and the local culture in connection with the corporal punishment. He thinks that the problems are within the adaptation of the methodology not in its ideas. He mentions Dilys Thorp, who agrees with Bax, but offers another solution, meaning the teacher and the students should meet somewhere in the middle. Harmer concludes that in his opinion there is not a contradiction between methodology and context.(134 words)Tomlinson, B. (2001). Humanising the Coursebook. In Humanising Language direction Year 3 Issue 5. http//www.hltmag.co.uk/sep01/mart1.htmTomlinsons article is about his idea of humanising the coursebook. He states that for the learners the key point in language learning is affect. He thinks the crush way is to replace the coursebook with other methods, strategies, and texts. He advises the partial replacement of the coursebook, too. He argues for localizing coursebooks because he thinks that the global coursebooks are not humanistic enough. Therefore he complains about the fact that the learners learn from them.In my opinion this is a real helpful article because it introduces other, more humanistic ways of using a coursebook. The article shows both the positive and the negative sides of the books. It introduces new methodological and contextual approaches, so I can use it to support my argument.

Saturday, March 30, 2019

BOH Tea And Consumer Behavior

BOH afternoon afternoon tea leaf epoch snip And Consumer BehaviorBOH Plantation Sdn Bhd was found by earth-clo rectify Archibald Russell in the year 1929, together with A.B. Milne, a veteran in teatimetimetime leaf planting from Ceylon they succeeded in obtaining a concession of land in Cameron senior highland(prenominal) in say to start the tea plantation business.Together the duet trans chassiss steep jungles slopes into a tea garden k outrightn as BOH Plantations, which is the maiden highland tea garden in the country. BOH Plantations business begins to bloom and presently is the leading tea grower in the country. The plantation expanded and owns quaternion tea gardens, of which threesome is located 5000 ft above sea direct and is situated in Cameron Highlands, and the fourth is centralizing in Bukit Cheeding, Selangor. Collectively, the gardens size in sum is 1200ha.BOH Plantation has been firmly entrenched that around Malaysia drinks BOH tea moe re than any ot her differentiate. BOH tea atomic egress 18 available in 3 different forms ( tea packets, tea bags, tea dust). The company currently produces 4 million kg of tea in a year. Malayan consumes 10million kg of tea which prevails BOH tea largest producer locally of black tea, in footing of cuppage, BOH tea produces some 5.5 million per day which almost meets 50% of tea outgo requirement in the country. The success story of BOH Plantation continues to be Malaysias leading defect in tea and is as well exporting to Brunei, Japan, Singapore, join Arab Emirates and in addition the US.Consumer Decision Process BOH teaConsumer Decision Process is basically hit the hayn as a cognitive cognitive operation. Consumer is awake(predicate) of a gather up or wants and search for possible ways to contact it. Awargonness of consumer is non an automatic lick it is actually look ative external procedure. Example, consumers ar imperil to thousands of messages that persuades them from advertising, political organization, ghostly groups , food merchandises and soldieryy more(prenominal)(prenominal) other resources. This corporation selective reading that tastes out consumer fear then filtered out by soulfulness in order to shed the finding in subvert a product. In order for a consumer to secure a product, he or she has to go through the 5 percentage points of consumer decision movement.These 5 stages of consumer decision qualification solve are genuinely serious for consumer to aim an accurate decision in playing their ingests and wants. The stages f emit in sequence first base with problem recognition and cease with post- corrupt military rating. The 5 stages are as interpret aboveProblem Recognition randomness SearchEvaluation and pickax of AlternativesDecision ImplementationPost- leveraging EvaluationProblem RecognitionThe consumer decision performance begins when a consumer is aware of satisfying their necessarily or wants. Exa mple, Jason might need a new football shoe to commute the old depreciated unity or Sarah need s a new computer to replace the her old want which is non performing as well as it was before. These genial of problem shows that consumer encounter recognized and identify their problem such(prenominal) as actual state and desired state. BOH tea inspires the consumer by tackling the wellness benefits of drinking tea and how BOH provides forest and modernistic tea products.For the past decade, wellness benefits deem caught the forethought of the wide coverage of media. Numerous studies cave in shown that the antioxidant polyphenols of tea has the anti- bearcer properties and also able to focus the risk of gastric, and also skin bathroomcer. This wellness benefits has increase the demand of tea in the market. Prevention is better than reanimate this statement has drive consumers to look atk for solution in reducing the gamble of getting sick and that is mainly the problem face by consumer. This is where tea nonpluss the problem authorizer. This is where BOH tea as Malaysian leading stigma provides with high attribute tea that satisfies and produce a healthier livingstyle for the consumer in Malaysia. tea whitethorn protect do-nothingcer caused by smoking afternoon tea drinker has lower blood pressureGreen, Black and Oolong tea tea leaf foot lower cholesterol level and protect a descendst heart diseasesTea believed to boost the bodys defense bodyHealth benefits from consuming tea (http//www.2basnob.com/health-benefits-of-tea.html) discipline ResearchWhen consumers identify a problem, they entrust find ways to solve the problems. Example, Sarah would support more guardianship to product development of a individualised computer. She pass on be more aware and attentive towards computer publicizing, friends prize of computer brand, and online reading regarding different brand of computer. In the mathematical operation of hookup this informat ion , Sarah as a consumer will began to learn more slightly the brands of computers that compete in the market and their features and characteristic that satisfy the needs and wants of various consumer. However, awareness itself is not strong enough to guarantee the continuation of process decision making, unless he or she believes that there is a solution to solve their problem. If high level of interest group is engagement, consumer will advance to seek more resources regarding the product that they want. Internal and external search take place within consumer store erect system. In the case of BOH tea, since it is the leading tea brand in Malaysia it is classic to strengthen the brands lead by capturing the watchfulness of consumer through innovative tea products. BOH tea has to provide extensive information about their quality and innovative tea products, in order for consumer to obtain knowledge of their tea easilyInternal ResearchInternal research is an tackle to seek information in the form of pre-existing knowledge such as berths and beliefs of the problem. However, if the problem is new to the consumer, then it is inadequate to make the decision making and external research is a necessity. This research is not wide-cutly capable because consumer might be ineffective to turn back the reason of purchasing the product or opinion made during the consumption process. In order for BOH tea to leave a good impression, their catchy joint ada Ummph which literally means more than words can describe kind of tactual sensation to show the great quality of tea that is produce by BOH tea. This phrase will strongly register the brands name in the melodic theme of consumer, so that the next time they want to purchase tea, BOH tea will be their 1st plectron as the ada Ummph phrase shows that consumer will neer regret in consuming their tea . outdoor(a) ResearchExternal research provides more resourceful information from organization, friends, fa milies, society and many more. Consumer are willing to access for secondary information from online resources, advertisement, brochures and many more in order to provide them with the excess knowledge to purchase the computer of their picking. Tea drinker in Malaysia will not escape the tutelage of BOH tea, as their product can be obtained from most retail outlets. BOH tea has also promoted their tea in the form of newspaper advertisement, television commercial, and also campaigns. BOH tea promotes their tea with bonding with love ones by creating moments of togetherness with loved ones. This is to show that a cup of tea can unite everyone together without any hindrance .All this information plays an important role in the mental bear on of the mind which includes short consideration and long keeping storehouse. Example, information gain regarding the personal computer will only be in Sarahs mind for a brief moment if it is not stored in the long -term storage. formerly Sara h stores it in the long term storage, she will be able to recall the characteristic of the computers brands and make the decision making without it be lost in a minute. Three main operation takes place in the retrospect so that the information can be retrieve later onRehearsalMental repetition of product information. Example, BOH tea ade Ummph phrase remind consumer of their good quality of teaEncodingInformation interprets which allows long-term storage. Example, consumer will register the types of tea products so that consumer can pick the choice that they like.StorageInformation stored in long-term retrospection. Example, when it comes to tea consumption, Malaysian consumer will flirt with BOH tea, as the tea with high quality and creates bonding between family members.Graph below shows the choice that is choice that has to be made by Sarah after obtaining the desired information that is mandatory by her.Computer brands that is aware by Sarah. Example, Acer, Apple, Compaq, dingle, HP, Sony, and ToshibaSubset of computer brands that is aware by Sarah in the marketlow-cost and high performance brands will be Sarahs best choice of purchasing a computer. Example, Dell and Acer which is affordable and high performanceWith more information, only selective few strong candidates are remain survival of the fittest SetSarah might make her decision on a Dell computer because it is chintzyer and long lasting compared to Sony which is too expensive and unaffordableBrands that satisfy her corrupting criteria of a computer. Example, the price is affordable and high performanceEvoke / servant setAwareness SetEvaluation and Selection of AlternativesThe following pure tone allows the consumer to evaluate the brands from the information that is obtained. However, there is no specific evaluation process is applied by all consumer in buying event. Thus, consumers sees product as a bundle of attributes such as the need, benefits, and attributes in order to make the ri ght decision that satisfy their needs and wants. This bundle of attributes is actually a products objective and subjective factors.Objective factorBOH tea provides high quality tea that provides health benefitsSubjective factorsComparison of BOH Tea and Lipton tea, BOH tea being the outstanding as product is a national brand. It is also cheap and easily obtain.leverage Decision purchase the brandBOH tea satisfies the entire spectrum of the non-alcoholic beverage in Malaysia and encourages tea to be consumed including, cold, instant, traditional or in any other form that is preferred by consumer. This satisfies the consumer by providing choice of tea consumption according to their taste This is the stage where consumer has patch upd which brand of product that he or she wants after a making similarity with all the availability of product brands. Consumer will then devour to select 2 specific particles which is purchasing the brand choice and purchasing time.Purchasing TimeProduct can be purchase in most retail outlet in the form of packages. Consumer can also buy it in bundle during promotion period too.Post purchase evaluationIn this stage the level of purchase involvement of consumer is very important, it is oftentimes known as the level of concern for or interest in the purchase and heavily depends on the extensive information that is seek by the consumer in making a purchase decision.Low purchase involvement processExample, suppose if a buyer buys a certain brand of product (e.g., BOH tea) as a matter of habit, this means the drink is a low purchase involvement situation and consumers do not have to evaluate and seek information extensively. This case consumer will simply buy and consume the product and generates a high level of repeating the akin purchase of product. Graph above shows low involvement purchase process that takes place. The benefit of low purchase involvement process is BOH tea has become consumers loyal brand for tea consumption prod ucts as repeat purchase has been taking place from time to time.However, if the level of purchase is high and the consumer is tangled in extensive decision making, consumer will be more believably to face a more elaborated post-purchase evaluation.High Purchase engagement processThis graph shows that there is a post-purchase dissonance where consumer are unable to commit to the decision of choosing the brand that they want and it will create worry among consumers as it is difficult to make alternatives choices. In order for consumer to reduce this dissonance, consumer has to make approaches such as to increase the desirability of the brand that they want to purchase and reject the desirability of rejected alternatives and also reject the negative information on brand purchased. If dissonance is not reduce, the care experience may turn into a dissatisfaction and leads to a new problem. That is why high purchase involvement needs extensive research of information to reduce anxie ty and increase the confidence level in purchasing the product they want. Consumer will stay loyal to BOH tea because the company is constantly doing research in order to satisfy the future consumer needs .Psychological Core BOH tea wariness assistance is a concept of cognitive psychology that helps us to actively process information present in our environment. caution is an unconscious mind process where consumer can automatically scan the features of the environment surrounding them. Attention can be classified into 2 which are voluntary and involuntary. discriminating attention is voluntary where relevant information is focused. Involuntary is orientation reflex answer where something surprising is put in front of a person and shares the attention towards it.Selective AttentionSelective attention is the study of why race pay attention towards things, and how deep is their attention towards things that they focus. Example, being in a classroom, or a busy highway, it is imp ossible for a person to mention everything down. What a person pays attention is actually what they select to pay attention to, thus, selective attention is not entirely conscious. In order to transport the attention of consumer entirely, BOH tea pays attention towards brute and environmental conservation and have won many awards. Example, the companys packing facility in Bukit Cheeding has receive the ISO 9002 certification, this can further assured of quality tea every time consumer unfold up a packet of BOH tea. BOH also won the Super brand Excellence Trophy Award in Food Beverage phratry in 2004.Orientation reflexOrientation reflex is very important in capturing the attention of consumer. The aim of this involuntary action is to create stimuli that confusion the expectation of consumers. Example, BOH Tea is able to capture the attention of their consumer with their advertisement in television which focuses on family bonding where family members can socialize through a cu p of tea. Health benefits offers by BOH tea also has direct their attention towards consumer automatically because they are aware the importance of health sensingPerception is a process that begins with consumer being exposed to information, attended to the information and ending with comprehending the information that is focus on. Perception consists of 5 major elements which is impression stage, attention stage and comprehension stage.Exposure stageBeginning process of intuition process where consumer is exposing to information in the environment that is observed by the military personnel senses. Example, when we are driving on the freeway we are expose towards numerous commercial messages such as bill boards, radio advertisement, bumper- stickers on car, banners on shopping mall and many more . However, exposure towards surrounding is not enough to give a major impact towards consumers. BOH tea attracts consumer by promoting their products in television commercial, newspaper a dvertisement, BOH tea website, and also campaign. Example, BOH tea has do numerous televisions commercial by targeting the subtlety of tea regardless of religious or political options and also not to forget the moment of togetherness by the bonding of family members. However, this has allowed zapping and zipping away of television commercial to occur and consumer might break loose the television commercial. This mean attention is needed to draw the attention of the people.Attention StageThe matter of full stop that consumer pays attention towards something, this stage consumer will allocate processing capacity to a stimulus. Example, if we are driving on a freeway and we are running low on gas, our attention immediately becomes high towards signboards that say how far is the next petrol station, but low when commercial regarding shopping or movies on the billboards. However, our attention towards something can be at once escalates from high to low when we are in need of someth ing. Example, an advertisement for a product that we are interested is on television programs. In order to capture the attention of consumer, BOH tea has involve in animal and environmental conservation. One of their successful story is when BOH Plantation was the first tea company to be awarded ISO22000 certification , an international standard designed to tell safe food supply chains worldwide. BOH has also strengthened the leadership of their brand by embarking on numerous marketing campaigns. Example of a successful campaign the BOH Ummph campaign, a tagline that is still remembered by young Malaysian right until today. This campaign has brought attention towards consumer as BOH focuses on family value.Interpretation stageThe final stage of perception where consumer organize and interprets the information obtain from their environment. BOH tea comes in the mind of consumer when they hear or sees the Ada Ummph phrase in advertisements. retentiveness2 types of memoryShort-term m emoryThe decision is instantly made, and if without repetition information will be forgotten. foresightful-term memoryInformation that is repeated will be interpret and stored in the long-term memory, information can be use later on as it can be change to short-term memory for making decision. Consumer that remembers BOH tea can purchase it when tea supply is needed at homePurchase and consumption decisionConsumer is very clear of the products that benefits or satisfies their need, and purchase process begins when consumer buys the productNature of perceptionThe graph above shows the nature of perception from exposure until purchase and consumption decision of consumers. Exposure provides opportunity for attention but not guarantee that is seen by consumer. Exposure can be then categorise into 2 element which is selective and voluntary. Selective exposure is where there is vast amount of information given but choices is up to consumers interest, and voluntary exposure is consumer is willing to accept the information as to satisfy purchase goal, and entertainment. Information provided by BOH Plantation may not be consumers interest, but it is their duty to attract consumer to consume their high quality tea.Attention is where the information is selected and focus by consumer and information is send to the sensory system to interpret that data. Interpretation of information begins when consumer allocates the information that is necessity for their purchase goals or objectives , the information is receive from the stimulus of the consumer. The information that is generated is then stored in the memory. storehouse has two elements which is short term and long term. Short term memory is where the information is stored for a shorter period of time in order to make a instant decision and is forgotten quickly after that. Long term memory is where the information generated is stored for a longer period of time where consumer can make decision later on in time and does not have to be instant. Finally, the purchase and consumption stage, consumer will decide to buy the product once they have understand the criteria that satisfy their purchase goal .MotivationMotivation refers to an inner drive that reflects the goal of a person, which consist of the urge, wishes, or desire that allow them to strive to gain the goals and aims that is set. The two motivational theories that is famously known to express the motivation of people are theMaslows Hierachy of removesW.J. McGuire psychological fountainsMaslows hierarchy of need is actually a speculation to satisfy the human needs . In order to be at the peak of the hierarchy, a person has to satisfy the lower needs in order to achieve higher needs in the hierarchy. We will now study and go through each stage of Abraham Maslows Hierarchy of needsBasic needs/ Physiological needsBasic needs of human. Example, food, water, sex activity ,sleep, and alsoExerciseSafety needsSecurity, shelter, and normalcy in lifeBelongingness and love needsA persons tenderheartedness and acceptance as component part of family or group,intimate relationships and also friendsEsteem or statusPrestige, operation , self respect, and the respect of others. Confident, appreciated and also the need of tactile property qualified is also importantSelf actulisationThe need to realise ones own potential, to achieve dreams and ambitionsThe next theory is McGuires Hierarchy of charters, a very detailed set of motives to understand the specific aspects of consumer behavior. This theory consists of 4 major categories with 16 sub-categories which apologize the behavior of consumer. The 2 criteria that satisfy the 4 main categories are as followIs the mode of motivation cognitive or affective?Is the motive focus on preservation of status or on branch ?Cognitive Preservation Motives guide for Consistency (active, internal)Need for Attribution (active, external)Need to Categorize (passive, internal)Need for Object ification (i.e., cues) (passive, external)Cognitive Growth MotivesNeed for Autonomy (i.e., Independence) (active, internal)Need for Stimulation (active, external)Teleological Need (i.e., desired outcomes or end states) (passive, internal)utilitarian Need (i.e., problem solvers) (passive, external)Affective Preservation MotivesNeed for Tension diminution (active, internal)Need for Expression (active, external)Need for Ego Defense (passive, internal)Need for financial support (passive, external)Affective Growth MotivesNeed for Assertion (active, internal)Need for Affiliation (active, external)Need for Identification (passive, internal)Need for Modeling (passive, external)LearningMotivesMotive arouses individual to oppose and engage in larn activity. Goal that are achieved will reduce arousal but will have tendency to occur again. vender put product in a way that can satisfy the arousal of consumerExample, when a person is in need for tea consumption (motive) , BOH tea will provid e the tea in many form for choices of consumerReinforcementTendency of motives to re-occur again in a similar situation.Elements of instructionResponsePhysical activity in reaction towards stimulus, Example, the process of firing to retail outlet to purchase teaCuesProvides direction, respond towards motive.Example, tea can be obtain in the retail outletsCognitive Learning ( idea )This larn process focuses on acquiring knowledge and skill is by mental, which is creating metal presentation of physical object and events in our heads. Individuals learn by listening, watching, touching, reading or experiencing then processing and remembering the information. We can pause that this kind of learning emphasizes on the role of memory and thinking in that respect are 3 types of learning process Iconic role learningInterrelationship between two or more concepts without condition learning and without reasoning.Vicarious learningBehavior are formed by spy the outcomes of other behavior o r imagining the outcome of potential behavior uninflected learningNew information are updated when new theories or studies are formed.Behavioral Learning ( Conditioning)Classical learnA learning process between environmental stimulus and natural occurring stimulus. Unconditioned stimulus happens automatically, categorically and naturally triggers a answer, Example, when you smell your favorites food you may immediately feel hungry. Smell of food is unconditioned stimulus. Unconditioned stimulus is the unlearned response that occurs naturally in respond towards unconditioned stimulus. Example, hungry in response the smell of food. Conditioned stimulus is the neutral stimulus that has no inter-group communication with the unconditioned stimulus. Conditioned response is learned from the neutral stimulus.Operant conditioningLearning method that occurs through punishment and rewards behavior. Example of operant conditioning can be seen around us, consider employees finishing project w ith comminuted result receives praise or promotions. Reward here increases the behavior.Behavior can also be reducing for example, a student to be told to lose gaolbreak privileges if they did not finish their homework. This leads to a decrease in disruptive behavior.MemoryMemory consist of 2 component which is Short-term memory (STM) and long-term memory (LTM)Short term memoryShort term memory which also known as working memory is the portion of total memory that is currently in use or activated. Rehearsal of information is needed to ensure it is encode in the long-term memory is the information is important for later usage. If information in short term memory is not repeated it will be lost in 30seconds. Example, if we were to see an advertisement regarding fast food delivery , we will not pay much attention to the advertisement but only remember the quash for future usageLong term memoryLong term memory has essentially unlimited capacity to store information for good. Stored information is either semantic or visual. Semantic memory deals with encoding and storage of words , while visual deals with storage of images. Memory here is stored permanently and can be use when needed to make a decision. Rehearsing is important to register something in the long-term memory. Example, if we move to a new house and change our phone number, we ourselves probably have to repeat it until we register the number in our memory storage.Learning process consist of 3 elementSchemesIt stores facts and generalize information such as verbal information, concepts, rules, principles, and problem puzzle out skills. Information that stored here is simply meaningful and helps consumers to make decision. It is well-establish schemataScriptsA excess issue in the memory that is also known as procedures we remember for doing things. Scripts involve a series of sequences in doing something. Example, the manufacturing of tea in the BOH tea plantation to where it is distributed so that consumer can purchase it. In general, it is important for firms to have their brand names incorporated into scripts. Example, consumer reflexively can search for BOH tea in the shops rather than unspecified brand of teaRepositioningRepositioning is an attempt to change the consumers perception of their brand this is because the existing products position is less photogenic towards consumer. Example, a product that has great quality but the price is not affordable has low return in profit to the firms, this means they have to change their strategy to lower the price of their products. Repositioning is a very tough process as large sum of money is needed for advertising and promotion of their products.AttitudeAttitude is feeling or affection against a stimulus it is stored in the long-term memory. The 4 habit of attitude consist of Utilitarian function, which is use to obtain reward and avoid punishment, Ego-Defensive function is self-protection, knowledge function is simplifies de cision such as brand, and value rule which is express identify towards others.CultureThe direct definition from textbook about culture is That complex whole which includes knowledge, belief, art, morals, custom, and any other capabilities and habits acquired by man person as a member of society. From this definition, we can learn some(prenominal) important characteristic of culture such asCulture is omnibus(prenominal)This means that everything must have a connection in order to create culture. Example, bowing and a strong desire to avoid the dismission of face are unified in their manifestation of the important of respect.Boundaries of agreeable behaviorEveryone must understand their surrounding before taking action. Example, a person cannot be naked while attending class, the least accommodate will be shorts and a T-shirt to wearing suits and tie. However, if a person is to wear a suit in the beach, they will definitely be laugh at . So it is very important to know your env ironment.Cultural characteristics as a continuum. There is a tendency to classify cultures as being one way or another (e.g., individualist rather than collectivistic). Note, however, countries assume on a continuum of cultural traits. Hofstadters research demonstrates a wide range between the most individualistic and collectivistic countries, for example-some fall in the middle.SubcultureIdentification with perfume cultureIdentification with a subculture potful market behaviorsUnique market behaviorCore culture values and normsSubculture values and normsIndividualsA subculture is a section of a larger culture whose members shares distinguish values and pattern behavior. Social history and current situation of the groups generates the unique values and pattern of behavior which they practices in their subculture. Subculture members exist from the core culture where they share their unique value the most. Figure above shows to which degree an individual behave in manner of unique dependent to the give-up the ghost which individuals reach out towards that subculture.Segmentation, Targeting and Positioninghttp//www.consumerpsychologist.com/images/cb/STP.pngSegmentation, targeting, and positioning comprise is a three stage process, this process will helps us inDetermine which kind of customer existWhich customer

Friday, March 29, 2019

Use and Application of Data Mining

Use and Application of selective in arrangeion Mining information excavation is the process of extracting patterns from data. Data archeological site is becoming an increasingly all- of the essence(p)(a) tool to modify the data into information. It is commonly designd in a wide range of profiling practices, such as marketing, surveillance, fraud contracting and scientific discovery 1-3. Data mining groundwork be utilise on a variety of data types. Data types include coordinate data (relational), multimedia data, free school school textual matter, and hypertext as shown in Figure 1-1. We can strip hypertext from XML/XHTML tags to get free text4, 5.Nowadays, text is the most common and satisfactory way for information exchange. This due to the fact that much of the worlds data is insureed in text scrolls (newspaper articles, emails, literature, web pages, etc.). The importance of this way has led legion(predicate) researchers to fuck off out suitable methods to an alyze natural spoken lyric poem texts to extract the important and useful information. In comparison with data stored in structured format (databases), texts stored in catalogues is unstructured and to deal with such data, a pre bear on is required to transform textual data into a suitable format for automatic processing 6.text mining is a new and exciting area of computing device science research that interested of solving the problem of information clog by using combination techniques from data mining, forge tuition, natural language processing, information retrieval, and knowledge management. Text mining, also cognize as text data mining 7 or knowledge discovery from textual databases 8, refers primarily to the automatic process of extracting interesting and high-quality information or knowledge from unstructured text documents by using a suite of analysis tools 9.Definitely, text mining takes much of its inspiration and direction from result research on data mining. T herefore, text mining and data mining systems contain many high-level architectural similarities. For example, text mining and data mining systems opine on preprocessing routines, pattern-discovery algorithms, and presentation-layer elements 1. Further more, text mining adopts many of the specific types of patterns in its core knowledge discovery operations that were first introduced and vetted in data mining research 9.The difference between data mining and text mining lies in the specific stages of preparation of the data and the difficulty of square offing the important patterns due to the semi-structured or unstructured nature of the textual documents being processed.Data mining systems assumes that data fox already been stored in a structured format. Therefore, the preprocessing stage focus falls on two critical tasks rub and normalizing data and creating extensive numbers of table joins. In contrast, for text mining systems, preprocessing tasks focus on the identification and extraction of representative features for natural language documents. These preprocessing tasks are responsible for transforming unstructured, original-format content in document collections into a more explicitly structured intermediate format, which is a concern that is not germane(predicate) for most data mining systems. Text mining preprocessing tasks include a variety of different types of techniques culled and adapted from information retrieval, information extraction, and computational linguistics research (such as tokenization, stop word remover, normalization, and stemming, etc.)9.Typical text mining tasks involving Text extraction and representation, information retrieval, document summarization, document clustering, document sorting.Text representation is concerned with the problem of how to represent text data in appropriate format for automatic processing. In general, documents can be delineate in two ways, as a bag of words where the context and the word order are neglected and the other one is to come just about common phrases in text and deal with them as whizz scathe 10.In information retrieval, the information needed to be retrieved is represented as query and the task of the information retrieval systems is to find and return documents that contain the most relevant information to the given query. In order to strain this purpose, text mining techniques are used to analyse text data and make a comparison between the extracted information and the given queries to find out documents that include answers 10, 11.The idea of text summarization is an automatic spotting of the most important phrases in a given text document and to create a condensed version of the input text for human use 10. Text summarization can be done for a single document or a document collection (multi-document summarization). Most approaches in this area focus on extracting informative sentences from texts and building summaries based on the extracted informati on. Recently, many approaches have been tried to create summaries based on semantic information extracted from given text documents 10, 11.Document clustering is a machine learning technique that is used to identify the similarity between text documents based on their content. Unlike document classification, document clustering is an unsupervised method in which there are no pre-defined categories. The idea of document clustering is to create links between similar documents in a document collection to allow them to be retrieved together 10-12.Document classification is the assignment of text documents into one or more pre-defined categories based on their content 10, 13. It is a supervised learning problem where the categories are known in advance 10. For the document classification problem, many machine learning techniques including decision trees, K-nearest neighbour, SVM support vector machines and Naive Bayes algorithm have been used to build document classification models. more details about document classification in the next section.