ea

Study on operational risks and preventive measures of supply chain finance

The operation of supply chain finance faces various risks, therefore, studying the operational risks of supply chain finance and corresponding preventive measures is of great significance. Firstly, classify the types of operational risks in supply chain finance. Secondly, based on the risk classification results, the decision tree method is used to evaluate the operational risks of supply chain finance. Finally, based on the risk assessment results, targeted risk prevention measures for supply chain finance operations are proposed, such as strengthening supplier management, optimising logistics and warehouse management, risk analysis and monitoring, and strengthening information security and data protection. The case analysis results show that the accuracy of the evaluation results of this method is higher, and the risk coefficient has been significantly reduced after applying this method, indicating that it can effectively reduce supply chain risk.




ea

Research on Weibo marketing advertising push method based on social network data mining

The current advertising push methods have low accuracy and poor advertising conversion effects. Therefore, a Weibo marketing advertising push method based on social network data mining is studied. Firstly, establish a social network graph and use graph clustering algorithm to mine the association relationships of users in the network. Secondly, through sparsisation processing, the association between nodes in the social network graph is excavated. Then, evaluate the tightness between user preferences and other nodes in the social network, and use the TF-IDF algorithm to extract user interest features. Finally, an attention mechanism is introduced to improve the deep learning model, which matches user interests with advertising domain features and outputs push results. The experimental results show that the push accuracy of this method is higher than 95%, with a maximum advertising click through rate of 82.7% and a maximum advertising conversion rate of 60.7%.




ea

Students’ Perceptions of Using Massive Open Online Courses (MOOCs) in Higher Learning Institutions




ea

Exploring the impact of TPACK on Education 5.0 during the times of COVID-19: a case of Zimbabwean universities




ea

The Impact of Physics Open Educational Resources (OER) on the Professional Development of Bhutanese Secondary School Physics Teachers




ea

A vin nouveau, outres neuves ?

(Chronique d'avant-plage) Emmanuel Macron a écrit aux Français pour louer le parlementarisme et la stabilité institutionnelle. Il a pourtant contourné le Parlement pendant 7 ans et méprisé les Présidents des deux chambres en se contentant de les informer de la dissolution. Alors, avec un tel garant, que fait-on ?




ea

Feature-aware task offloading and scheduling mechanism in vehicle edge computing environment

With the rapid development and application of driverless technology, the number and location of vehicles, the channel and bandwidth of wireless network are time-varying, which leads to the increase of offloading delay and energy consumption of existing algorithms. To solve this problem, the vehicle terminal task offloading decision problem is modelled as a Markov decision process, and a task offloading algorithm based on DDQN is proposed. In order to guide agents to quickly select optimal strategies, this paper proposes an offloading mechanism based on task feature. In order to solve the problem that the processing delay of some edge server tasks exceeds the upper limit of their delay, a task scheduling mechanism based on buffer delay is proposed. Simulation results show that the proposed method has greater performance advantages in reducing delay and energy consumption compared with existing algorithms.




ea

Research on multi-objective optimisation for shared bicycle dispatching

The problem of dispatching is key to management of shared bicycles. Considering the number of borrowing and returning events during the dispatching period, optimisation plans of shared bicycles dispatching are studied in this paper. Firstly, the dispatching model of shared bicycles is built, which regards the dispatching cost and lost demand as optimised objectives. Secondly, the solution algorithm is designed based on non-dominated Genetic Algorithm. Finally, a case is given to illustrate the application of the method. The research results show that the method proposed in the paper can get optimised dispatching plans, and the model considering borrowing and returning during dispatching period has better effects with a 39.3% decrease in lost demand.




ea

An intelligent approach to classify and detection of image forgery attack (scaling and cropping) using transfer learning

Image forgery detection techniques refer to the process of detecting manipulated or altered images, which can be used for various purposes, including malicious intent or misinformation. Image forgery detection is a crucial task in digital image forensics, where researchers have developed various techniques to detect image forgery. These techniques can be broadly categorised into active, passive, machine learning-based and hybrid. Active approaches involve embedding digital watermarks or signatures into the image during the creation process, which can later be used to detect any tampering. On the other hand, passive approaches rely on analysing the statistical properties of the image to detect any inconsistencies or irregularities that may indicate forgery. In this paper for the detection of scaling and cropping attack a deep learning method has been proposed using ResNet. The proposed method (Res-Net-Adam-Adam) is able to achieve highest amount of accuracy of 99.14% (0.9914) while detecting fake and real images.




ea

Machine learning and deep learning techniques for detecting and mitigating cyber threats in IoT-enabled smart grids: a comprehensive review

The confluence of the internet of things (IoT) with smart grids has ushered in a paradigm shift in energy management, promising unparalleled efficiency, economic robustness and unwavering reliability. However, this integrative evolution has concurrently amplified the grid's susceptibility to cyber intrusions, casting shadows on its foundational security and structural integrity. Machine learning (ML) and deep learning (DL) emerge as beacons in this landscape, offering robust methodologies to navigate the intricate cybersecurity labyrinth of IoT-infused smart grids. While ML excels at sifting through voluminous data to identify and classify looming threats, DL delves deeper, crafting sophisticated models equipped to counteract avant-garde cyber offensives. Both of these techniques are united in their objective of leveraging intricate data patterns to provide real-time, actionable security intelligence. Yet, despite the revolutionary potential of ML and DL, the battle against the ceaselessly morphing cyber threat landscape is relentless. The pursuit of an impervious smart grid continues to be a collective odyssey. In this review, we embark on a scholarly exploration of ML and DL's indispensable contributions to enhancing cybersecurity in IoT-centric smart grids. We meticulously dissect predominant cyber threats, critically assess extant security paradigms, and spotlight research frontiers yearning for deeper inquiry and innovation.




ea

Robust and secure file transmission through video streaming using steganography and blockchain

File transfer is always handled by a separate service, sometimes it is a third-party service in videoconferencing. When sending files during a video session, file data flow and video stream are independent of each other. Encryption is a mature method to ensure file security. However, it still has the chance to leave footprints on the intermediate forwarding machines. These footprints can indicate that a file once passed through, some protocol-related logs give clues to the hackers' later investigation. This work proposes a file-sending scheme through the video stream using blockchain and steganography. Blockchain is used as a file slicing and linkage mechanism. Steganography is applied to embed file pieces into video frames that are continuously generated during the session. The scheme merges files into the video stream with no file transfer protocol use and no extra bandwidth consumed by the file to provide trackless file transmission during the video communication.




ea

A robust feature points-based screen-shooting resilient watermarking scheme

Screen-shooting will lead to information leakage. Anti-screen-shooting watermark, which can track the leaking sources and protect the copyrights of images, plays an important role in image information security. Due to the randomness of shooting distance and angle, more robust watermark algorithms are needed to resist the mixed attack generated by screen-shooting. A robust digital watermarking algorithm that is resistant to screen-shooting is proposed in this paper. We use improved Harris-Laplace algorithm to detect the image feature points and embed the watermark into the feature domain. In this paper, all test images are selected on the dataset USC-SIPI and six related common algorithms are used for performance comparison. The experimental results show that within a certain range of shooting distance and angle, this algorithm presented can not only extract the watermark effectively but also ensure the most basic invisibility of watermark. Therefore, the algorithm has good robustness for anti-screen-shooting.




ea

Modern health solution: acceptance and adoption of telemedicine among Indian women

Access to quality healthcare is a fundamental right but unfortunately, India suffers from gender disparities in healthcare access. Telemedicine has the potential to improve access to healthcare services for women by eliminating traditional barriers. Therefore, our research aims to investigate the factors influencing the adoption of telemedicine among Indian women. This study has collected 442 responses and analysed them through structural equation modelling. The result indicates a strong and positive connection between the willingness to adopt telemedicine services and factors like performance expectancy, perceived benefits, e-health literacy, and perceived reliability. Notably, perceived reliability emerges as the most impactful predictor, closely followed by perceived benefits, while factors like effort expectancy and user resistance show no significant influence. This underscores the pivotal role of reliability and perceived benefits in shaping women's inclination toward adopting telemedicine. The study provides practical insights for telemedicine providers and policymakers to customise strategies and policies for effective promotion.




ea

Learning the usage intention of robo-advisors in fin-tech services: implications for customer education

Drawing on the MOA framework, this study establishes a research model that explains the usage intention of robo-advisors. In the model, three predictors that consist of technology relative advantage, technology herding, and technology familiarity influence usage intention of robo-advisors directly and indirectly via the partial mediation of trust. At the same time, the effects of the three predictors on trust are hypothetically moderated by learning goal orientation and perceived performance risk respectively. Statistical analyses are provided using the data of working professionals from the insurance industry in Taiwan. Based on its empirical findings, this study discusses important theoretical and practical implications.




ea

Emotion recognition method for multimedia teaching classroom based on convolutional neural network

In order to further improve the teaching quality of multimedia teaching in school daily teaching, a classroom facial expression emotion recognition model is proposed based on convolutional neural network. VGGNet and CliqueNet are used as the basic expression emotion recognition methods, and the two recognition models are fused while the attention module CBAM is added. Simulation results show that the designed classroom face expression emotion recognition model based on V-CNet has high recognition accuracy, and the recognition accuracy on the test set reaches 93.11%, which can be applied to actual teaching scenarios and improve the quality of classroom teaching.




ea

Design of traffic signal automatic control system based on deep reinforcement learning

Aiming at the problem of aggravation of traffic congestion caused by unstable signal control of traffic signal control system, the Multi-Agent Deep Deterministic Policy Gradient-based Traffic Cyclic Signal (MADDPG-TCS) control algorithm is used to control the time and data dimensions of the signal control scheme. The results show that the maximum vehicle delay time and vehicle queue length of the proposed algorithm are 11.33 s and 27.18 m, which are lower than those of the traditional control methods. Therefore, this method can effectively reduce the delay of traffic signal control and improve the stability of signal control.




ea

Multi-agent Q-learning algorithm-based relay and jammer selection for physical layer security improvement

Physical Layer Security (PLS) and relay technology have emerged as viable methods for enhancing the security of wireless networks. Relay technology adoption enhances the extent of coverage and enhances dependability. Moreover, it can improve the PLS. Choosing relay and jammer nodes from the group of intermediate nodes effectively mitigates the presence of powerful eavesdroppers. Current methods for Joint Relay and Jammer Selection (JRJS) address the optimisation problem of achieving near-optimal secrecy. However, most of these techniques are not scalable for large networks due to their computational cost. Secrecy will decrease if eavesdroppers are aware of the relay and jammer intermediary nodes because beamforming can be used to counter the jammer. Consequently, this study introduces a multi-agent Q-learning-based PLS-enhanced secured joint relay and jammer in dual-hop wireless cooperative networks, considering the existence of several eavesdroppers. The performance of the suggested algorithm is evaluated in comparison to the current algorithms for secure node selection. The simulation results verified the superiority of the proposed algorithm.




ea

BEFA: bald eagle firefly algorithm enabled deep recurrent neural network-based food quality prediction using dairy products

Food quality is defined as a collection of properties that differentiate each unit and influences acceptability degree of food by users or consumers. Owing to the nature of food, food quality prediction is highly significant after specific periods of storage or before use by consumers. However, the accuracy is the major problem in the existing methods. Hence, this paper presents a BEFA_DRNN approach for accurate food quality prediction using dairy products. Firstly, input data is fed to data normalisation phase, which is performed by min-max normalisation. Thereafter, normalised data is given to feature fusion phase that is conducted employing DNN with Canberra distance. Then, fused data is subjected to data augmentation stage, which is carried out utilising oversampling technique. Finally, food quality prediction is done wherein milk is graded employing DRNN. The training of DRNN is executed by proposed BEFA that is a combination of BES and FA. Additionally, BEFA_DRNN obtained maximum accuracy, TPR and TNR values of 93.6%, 92.5% and 90.7%.




ea

Insights from bibliometric analysis: exploring digital payments future research agendas

Along with amazing advancements in the field of digital payments, this article seeks to provide a summary of research undertaken over the last four decades and to suggest areas in need of additional study. This study employs a two-pronged technique for analysing its data. The first is concerned with performance analysis, and the second with science mapping. The study uses the apps VOS viewer and R-studio to do bibliometric data analysis. From 1982 until May 2022, the most trustworthy database, Scopus, is used to compile a database of 923 publications The findings of this study identify the scope of current research interest, which is explored with critical contributions from a variety of authors, journals, countries, affiliations, keyword analysis, citation analysis, co-citation analysis, and bibliometric coupling, as well as a potential research direction for further investigation in this emerging field.




ea

Enhancing clean technology's dynamic cross technique using value chain

Numerous Indian economic sectors have been impacted by the COVID-19 epidemic, with many being forced to the verge of extinction. As a result, this essay analyses the importance of supply chains for grapes and the manufactured goods made from them, including beverages and currants, in a specific state that happens to be India's top grape-producing region. In order to identify the sites of rupture brought on by the pandemic and to recommend policy changes to create a resilient system, a value chain analysis is performed. Value chain management has emerged as one of the key strategies businesses use today to boost productivity and costs when they are up against greater rivalry in the marketplace, however, with several new challenges, such as concerns over security, environmental protection, compensation, and business accountability. According to the value chain study, the level of value addition for intermediary agents, such as pre-harvest contractors, has increased after COVID-19 at the expense of farmers. Various policy approaches are explained to enhance the grape value chain using the knowledge gained from Porter's value chain results and supply and demand shocks.




ea

Integrating big data collaboration models: advancements in health security and infectious disease early warning systems

In order to further improve the public health assurance system and the infectious diseases early warning system to give play to their positive roles and enhance their collaborative capacity, this paper, based on the big and thick data analytics technology, designs a 'rolling-type' data synergy model. This model covers districts and counties, municipalities, provinces, and the country. It forms a data blockchain for the public health assurance system and enables high sharing of data from existing system platforms such as the infectious diseases early warning system, the hospital medical record management system, the public health data management system, and the health big and thick data management system. Additionally, it realises prevention, control and early warning by utilising data mining and synergy technologies, and ideally solves problems of traditional public health assurance system platforms such as excessive pressure on the 'central node', poor data tamper-proofing capacity, low transmission efficiency of big and thick data, bad timeliness of emergency response, and so on. The realisation of this technology can greatly improve the application and analytics of big and thick data and further enhance the public health assurance capacity.




ea

Natural language processing-based machine learning psychological emotion analysis method

To achieve psychological and emotional analysis of massive internet chats, researchers have used statistical methods, machine learning, and neural networks to analyse the dynamic tendencies of texts dynamically. For long readers, the author first compares and explores the differences between the two psychoanalysis algorithms based on the emotion dictionary and machine learning for simple sentences, then studies the expansion algorithm of the emotion dictionary, and finally proposes an extended text psychoanalysis algorithm based on conditional random field. According to the experimental results, the mental dictionary's accuracy, recall, and F-score based on the cognitive understanding of each additional ten words were calculated. The optimisation decreased, and the memory and F-score improved. An <i>F</i>-value greater than 1, which is the most effective indicator for evaluating the effectiveness of a mental analysis problem, can better demonstrate that the algorithm is adaptive in the literature dictionary. It has been proven that this scheme can achieve good results in analysing emotional tendencies and has higher efficiency than ordinary weight-based psychological sentiment analysis algorithms.




ea

Educational countermeasures of different learners in virtual learning community based on artificial intelligence

In order to reduce the challenges encountered by learners and educators in engaging in educational activities, this paper classifies learners' roles in virtual learning communities, and explores the role of behaviour characteristics and their positions in collaborative knowledge construction networks in promoting the process of knowledge construction. This study begins with an analysis of the relationship structure among learners in the virtual learning community and then applies the FCM algorithm to arrange learners into various dimensional combinations and create distinct learning communities. The test results demonstrate that the FCM method performs consistently during the clustering process, with less performance oscillations, and good node aggregation, the ARI value of the model is up to 0.90. It is found that they play an important role in the social interaction of learners' virtual learning community, which plays a certain role in promoting the development of artificial intelligence.




ea

Research on low voltage current transformer power measurement technology in the context of cloud computing

As IOT develops drastically these years, the application of cloud computing in many fields has become possible. In this paper, we take low-voltage current transformers in power systems as the research object and propose a TCN-BI-GRU power measurement method that incorporates the signal characteristics based on the transformer input and output. Firstly, the basic signal enhancement extraction of input and output is completed by using EMD and correlation coefficients. Secondly, multi-dimensional feature extraction is completed to improve the data performance according to the established TCN network. Finally, the power prediction is completed by using BI-GRU, and the results show that the RMSE of this framework is 5.69 significantly lower than other methods. In the laboratory test, the device after being subjected to strong disturbance, its correlation coefficient feature has a large impact, leading to a large deviation in the prediction, which provides a new idea for future intelligent prediction.




ea

Evaluation on stock market forecasting framework for AI and embedded real-time system

Since its birth, the stock market has received widespread attention from many scholars and investors. However, there are many factors that affect stock prices, including the company's own internal factors and the impact of external policies. The extent and manner of fundamental impacts also vary, making stock price predictions very difficult. Based on this, this article first introduces the research significance of the stock market prediction framework, and then conducts academic research and analysis on two key sentences of stock market prediction and artificial intelligence in stock market prediction. Then this article proposes a constructive algorithm theory, and finally conducts a simulation comparison experiment and summarises and discusses the experiment. Research results show that the neural network prediction method is more effective in stock market prediction; the minimum training rate is generally 0.9; the agency's expected dilution rate and the published stock market dilution rate are both around 6%.




ea

Uncovering the keys to well-being: calling, mindfulness, and compassion among healthcare professionals in India amidst the post-COVID crisis

This study investigates the well-being of healthcare professionals in India, with a specific focus on the detrimental effects of the pandemic on their mental and physical health, including stress, burnout, and fatigue. This research examines the roles played by calling, mindfulness, and compassionate love as essential resources in promoting the well-being of healthcare professionals. Utilising structural equation modelling (SEM), the results reveal a significant cause and effect relationship between calling, mindfulness, and compassionate love and their influence on overall well-being. Furthermore, the study identifies a noteworthy parallel mediation effect, demonstrating that mindfulness and compassionate love serve as mediators in the relationship between calling and well-being. This research offers practitioners invaluable insights into the effective utilisation of mindfulness and compassionate love practices to enhance the overall well-being of healthcare professionals.




ea

Fostering innovative work behaviour in Indian IT firms: the mediating influence of employee psychological capital in the context of transformational leadership

This empirical study investigates the mediating role of two components of psychological capital (PsyCap), namely self-efficacy and optimism, in the context of the relationship between transformational leadership (TL), work engagement (WE), and innovative work behaviour (IWB). The study was conducted among IT professionals with a minimum of three years of experience employed in Chennai, India. Data collection was executed using a Google Form, and both measurement and structural models were examined using SPSS 25.0 and AMOS 23.0. The findings of this study reveal several significant relationships. Firstly, transformational leadership (TL) demonstrates a robust positive association with work engagement (WE). Furthermore, work engagement (WE) positively correlates substantially with innovative work behaviour (IWB). Notably, the study underscores that two crucial components of psychological capital, specifically self-efficacy and optimism, mediate the relationship between transformational leadership (TL) and work engagement (WE). These findings carry valuable implications for IT company managers. Recognising that transformational leadership positively influences both work engagement and employees' innovative work behaviour highlights the pivotal role of leaders in fostering a productive and innovative work environment within IT organisations.




ea

Do authentic leaders influence innovative work behaviour? An empirical evidence

The purpose of this research is to investigate how genuine leaders impact the creativity and innovative behaviour (IWB) of information technology (IT) employees. It also examines the impact of perceived organisational support as a mediator in the correlations between authentic leadership as well as innovative behaviours. This study explores the influence of authentic leadership via the employee's IWB using aspects from social exchange theory as well as social cognitive theory. The data was collected from a sample of 487 employees of the IT sector in India. The partial least square method is applied to test the structural relationship of the research framework. Findings reveal that authentic leadership positively impact innovative work behaviour and perceived organisation support mediates authentic leadership and IWB. Additionally, when organisations and leaders support the employees and value their creative thinking then the employee replicates IWB in the organisation. The practical and theoretical implications are discussed.




ea

Ebullient supervision, employee engagement and employee commitment in a higher education institution: the partial least square approach

The study investigated the influence of ebullient supervision on employee commitment in a Ghanaian public university through the mediating role of employee engagement. The simple random sampling technique was used to draw 302 administrative staff of the university to respond to the self-administered questionnaire on the constructs. Furthermore, the partial least square structural equation technique was deployed to test the research hypotheses in the study. The results showed that ebullient supervision had a significant positive relationship with employee commitment and employee engagement. The findings further revealed that employee engagement positively correlated with employee commitment. Finally, the study's findings established that employee engagement partially mediated the link between ebullient supervision and employee commitment. The study emphasised that various supervisors in a university's administration should create an environment that favours fun where subordinates can form ties with one another.




ea

Developing digital health policy recommendations for pandemic preparedness and responsiveness

Disease pandemics, once thought to be historical relics, are now again challenging healthcare systems globally. Of essential importance is sufficiently investing in preparedness and responsiveness, but approaches to such investments vary significantly by country. These variations provide excellent opportunities to learn and prepare for future pandemics. Therefore, we examine digital health infrastructure and the state of healthcare and public health services in relation to pandemic preparedness and responsiveness. The research focuses on two countries: South Africa and the USA. We apply case analysis at the country level toward understanding digital health policy preparedness and responsiveness to a pandemic. We also provide a teaching note at the end for use in guiding students in this area to formulate digital health policy recommendations for pandemic preparedness and responsiveness.




ea

Knowing thy neighbour: creating and capturing value from a firm's alliance experiences

Intellectual assets, especially its relational forms, have become increasingly important to explain a firm's innovation. To examine relational forms of intellectual assets (IA), this study theoretically and empirically advances a concept of alliance management capability (AMC) to explain the value creation and capture aspects of a firm's innovation process. The concepts of value-creating alliance experiences (VCAE) and value capturing alliance experiences (VCPAE) were introduced in which a firm's ability to learn from these alliance experiences increases the firm's ability to discover and govern partnerships that bring the firm's innovations to market. Hypotheses were developed and empirically examined in the biotechnology industry. A contribution of this study is that a firm's VCAE and VCPAE introduce a greater 'openness' to a firm's innovation process. This openness enables a firm to better adapt and respond to the opportunities of the market and thus impact a firm's competitive advantage to innovate.




ea

The relationship between 'creative slack' as an intangible asset and the innovative capabilities of the firm

The notion of creative slack purposefully refers to the notion of organisational slack proposed by Penrose (1959), who suggested that managers in organisations always have some stock of unused resources that inevitably accumulate when developing projects and are the primary factors determining the growth and innovation of the firm. In this contribution, we aim at adding a new dimension to the notion of organisational slack. Our view is that in many innovative organisations the slack of unused ideas is essentially a creative one, which is accumulated in diverse communities through multiple projects. This creative slack is a key intangible asset and a source of knowledge creation and innovation. To explain how organisations may benefit from exploiting the creative slack accumulated by communities, we rely on the analysis of two case studies, that of the Hydro-Québec Research Institute (IREQ), and of Ubisoft Montreal.




ea

Researching together in academic engagement in engineering: a study of dual affiliated graduate students in Sweden

This article explores dual affiliated graduate students that conduct research involving both universities and firms, which we conceptualise as a form of academic engagement, e.g., knowledge networks. We explore what they do during their studies, and their perceptions about their contributions to the firm's capacities for technology and innovation. So far, university-industry interactions in engineering are less researched than other fields, and this qualitative study focuses upon one department of Electrical Engineering in Sweden. First, we define and describe how the partner firms and universities organise this research collaboration as a form of academic engagement. Secondly, we propose a conceptual framework specifying how graduate students act as boundary-spanners between universities and firms. This framework is used for the empirical analysis, when exploring their perceptions of impact. Our results reveal that they primarily engage in problem-solving activities in technology, which augment particularly the early stages of absorptive capacities in firms.




ea

Does smartphone usage affect academic performance during COVID outbreak?

Pandemic has compelled the entire world to change their way of life and work. To control the infection rate, academic institutes deliver education online similarly. At least one smartphone is available in every home, and students use their smartphones to attend class. The study investigates the link between smartphone usage (SU) and academic performance (AP) during the pandemic. 490 data were obtained from various institutions and undergraduate students using stratified random sampling. These components were identified using factor analysis and descriptive methods, while the relationship of SU and AP based on gender classification was tested using Smart-PLS-SEM. The findings show that SU has a substantial relationship with academic success, whether done in class or outside of it. Even yet, the study found that SU and AP significantly impact both male and female students. Furthermore, the research focuses on SU outside and within the classroom to improve students' AP.




ea

Why students need to learn biomimicry rather than select a correct answer? A neurological explanation

For a long time, high school students have been forced to practice selecting correct answers on college scholastic ability tests. Recently, it has been suggested that schools introduce biomimicry activities for STEM education to develop students' 21st century competency. However, there have been arguments about which system is more appropriate in terms of enhancing a student's competency development. Therefore, we evaluated neurological evidence of students' competency using fMRI scans taken during the selecting a correct answer for a biology question and during a biomimicry activity. Results showed that the repetitive practice of selecting correct responses limited a student's neurological activities to the brain network of the visual cortex and the front-parietal working memory cortex. However, the biomimicry activity simultaneously involved diverse prefrontal, parietal and temporal cortexes, and the putamen, limbic and cerebellum lobes. Therefore, this study proposes that the biomimicry activities could stimulate their coordinated brain development.




ea

International Journal of Knowledge and Learning




ea

Enabling a Comprehensive Teaching Strategy: Video Lectures




ea

From Requirements to Code: Issues and Learning in IS Students’ Systems Development Projects




ea

A Realistic Data Warehouse Project: An Integration of Microsoft Access® and Microsoft Excel® Advanced Features and Skills




ea

Realizing Learning in the Workplace in an Undergraduate IT Program




ea

Teaching High School Students Applied Logical Reasoning




ea

Learning & Personality Types: A Case Study of a Software Design Course




ea

Algorithm Visualization System for Teaching Spatial Data Algorithms




ea

Studios, Mini-lectures, Project Presentations, Class Blog and Wiki: A New Approach to Teaching Web Technologies




ea

Real World Project: Integrating the Classroom, External Business Partnerships and Professional Organizations




ea

Study of the Impact of Collaboration among Teachers in a Collaborative Authoring System




ea

Making Information Systems less Scrugged: Reflecting on the Processes of Change in Teaching and Learning




ea

Wearing the Assessment ‘BRACElet’




ea

A Tools-Based Approach to Teaching Data Mining Methods




ea

Using Digital Logs to Reduce Academic Misdemeanour by Students in Digital Forensic Assessments