nat Application of AI intelligent technology in natural resource planning and management By www.inderscience.com Published On :: 2024-07-02T23:20:50-05:00 This article studies the application of artificial intelligence technology in natural resource planning and management. This article first introduces the background of NR and AI intelligent technology, then conducts academic research and summary on NR planning management and AI intelligent technology. Then, an algorithm model based on multi-objective intelligent planning algorithm is established. Finally, simulation experiments are conducted, and experiments summary and discussion are provided. The experimental results show that the average efficiency value of the four stages of NR planning and management before use is 5.25, and the average efficiency value of the four stages of NR planning and management after use is 7. The difference in the average efficiency value before and after use is 1.75. It can be seen that the use of AI intelligent technology can effectively improve the efficiency of natural resource planning and management. Full Article
nat International Journal of Data Mining and Bioinformatics By www.inderscience.com Published On :: Full Article
nat International Journal of Electronic Governance By www.inderscience.com Published On :: Full Article
nat International Journal of Business Information Systems By www.inderscience.com Published On :: Full Article
nat International Journal of Technology Management By www.inderscience.com Published On :: Full Article
nat Why students need to learn biomimicry rather than select a correct answer? A neurological explanation By www.inderscience.com Published On :: 2024-10-02T23:20:50-05:00 For a long time, high school students have been forced to practice selecting correct answers on college scholastic ability tests. Recently, it has been suggested that schools introduce biomimicry activities for STEM education to develop students' 21st century competency. However, there have been arguments about which system is more appropriate in terms of enhancing a student's competency development. Therefore, we evaluated neurological evidence of students' competency using fMRI scans taken during the selecting a correct answer for a biology question and during a biomimicry activity. Results showed that the repetitive practice of selecting correct responses limited a student's neurological activities to the brain network of the visual cortex and the front-parietal working memory cortex. However, the biomimicry activity simultaneously involved diverse prefrontal, parietal and temporal cortexes, and the putamen, limbic and cerebellum lobes. Therefore, this study proposes that the biomimicry activities could stimulate their coordinated brain development. Full Article
nat International Journal of Knowledge and Learning By www.inderscience.com Published On :: Full Article
nat Academic Library Services in Virtual Worlds: An Examination of the Potential for Library Services in Immersive Environments By Published On :: Full Article
nat A Critical Analysis of Active Learning and an Alternative Pedagogical Framework for Introductory Information Systems Courses By Published On :: Full Article
nat Presenting an Alternative Source Code Plagiarism Detection Framework for Improving the Teaching and Learning of Programming By Published On :: Full Article
nat Secure E-Examination Systems Compared: Case Studies from Two Countries By Published On :: 2017-04-12 Aim/Purpose: Electronic examinations have some inherent problems. Students have expressed negative opinions about electronic examinations (e-examinations) due to a fear of, or unfamiliarity with, the technology of assessment, and a lack of knowledge about the methods of e-examinations. Background: Electronic examinations are now a viable alternative method of assessing student learning. They provide freedom of choice, in terms of the location of the examination, and can provide immediate feedback; students and institutions can be assured of the integrity of knowledge testing. This in turn motivates students to strive for deeper learning and better results, in a higher quality and more rigorous educational process. Methodology : This paper compares an e-examination system at FUT Minna Nigeria with one in Australia, at the University of Tasmania, using case study analysis. The functions supported, or inhibited, by each of the two e-examination systems, with different approaches to question types, cohort size, technology used, and security features, are compared. Contribution: The researchers’ aim is to assist stakeholders (including lecturers, invigilators, candidates, computer instructors, and server operators) to identify ways of improving the process. The relative convenience for students, administrators, and lecturer/assessors and the reliability and security of the two systems are considered. Challenges in conducting e-examinations in both countries are revealed by juxtaposing the systems. The authors propose ways of developing more effective e-examination systems. Findings: The comparison of the two institutions in Nigeria and Australia shows e-examinations have been implemented for the purpose of selecting students for university courses, and for their assessment once enrolled. In Nigeria, there is widespread systemic adoption for university entrance merit selection. In Australia this has been limited to one subject in one state, rather than being adopted nationally. Within undergraduate courses, the Nigerian scenario is quite extensive; in Australia this adoption has been slower, but has penetrated a wide variety of disciplines. Recommendations for Practitioners: Assessment integrity and equipment reliability were common issues across the two case studies, although the delivery of e-examinations is different in each country. As with any procedural process, a particular solution is only as good as its weakest attribute. Technical differences highlight the link between e-examination system approaches and pedagogical implications. It is clear that social, cultural, and environmental factors affect the success of e-examinations. For example, an interrupted electrical power supply and limited technical know-how are two of the challenges affecting the conduct of e-examinations in Nigeria. In Tasmania, the challenge with the “bring your own device” (BYOD) is to make the system operate on an increasing variety of user equipment, including tablets. Recommendation for Researchers: The comparisons between the two universities indicate there will be a productive convergence of the approaches in future. One key proposal, which arose from the analysis of the existing e-examination systems in Nigeria and Australia, is to design a form of “live” operating system that is deployable over the Internet. This method would use public key cryptography for lecturers to encrypt their questions online. Impact on Society : If institutions are to transition to e-examinations, one way of facilitating this move is by using computers to imitate other assessment techniques. However, higher order thinking is usually demonstrated through open-ended or creative tasks. In this respect the Australian system shows promise by providing the same full operating system and software application suite to all candidates, thereby supporting assessment of such creative higher order thinking. The two cases illustrate the potential tension between “online” or networked reticulation of questions and answers, as opposed to “offline” methods. Future Research: A future design proposition is a web-based strategy for a virtual machine, which is launched into candidates’ computers at the start of each e-examination. The new system is a form of BYOD externally booted e-examination (as in Australia) that is deployable over the Internet with encryption and decryption features using public key cryptography (Nigeria). This will allow lecturers to encrypt their questions and post them online while the questions are decrypted by the administrator or students are given the key. The system will support both objective and open-ended questions (possibly essays and creative design tasks). The authors believe this can re-define e-examinations as the “gold standard” of assessment. Full Article
nat International Journal of Electronic Security and Digital Forensics By www.inderscience.com Published On :: Full Article
nat International Journal of Business Innovation and Research By www.inderscience.com Published On :: Full Article
nat Combination of Lv-3DCNN algorithm in random noise environment and its application in aerobic gymnastics action recognition By www.inderscience.com Published On :: 2024-10-14T23:20:50-05:00 Action recognition plays a vital role in analysing human body behaviour and has significant implications for research and education. However, traditional recognition methods often suffer from issues such as inaccurate time and spatial feature vectors. Therefore, this study addresses the problem of inaccurate recognition of aerobic gymnastics action image data and proposes a visualised three-dimensional convolutional neural network algorithm-based action recognition model. This model incorporates unsupervised visualisation methods into the traditional network and enhances data recognition capabilities through the introduction of a random noise perturbation enhancement algorithm. The research results indicate that the data augmented with noise perturbation achieves the lowest mean square error, reducing the error value from 0.3352 to 0.3095. The use of unsupervised visualisation analysis enables clearer recognition of human actions, and the algorithm model is capable of accurately recognising aerobic movements. Compared to traditional algorithms, the new algorithm exhibits higher recognition accuracy and superior performance. Full Article
nat International Journal of Web Engineering and Technology By www.inderscience.com Published On :: Full Article
nat International Journal of Applied Systemic Studies By www.inderscience.com Published On :: Full Article
nat International Journal of Internet and Enterprise Management By www.inderscience.com Published On :: Full Article
nat International Journal of Information Systems and Change Management By www.inderscience.com Published On :: Full Article
nat International Journal of Information Quality By www.inderscience.com Published On :: Full Article
nat Intelligent traffic congestion discrimination method based on wireless sensor network front-end data acquisition By www.inderscience.com Published On :: 2024-10-03T23:20:50-05:00 Conventional intelligent traffic congestion discrimination methods mainly use GPS terminals to collect traffic congestion data, which is vulnerable to the influence of vehicle time distribution, resulting in poor final discrimination effect. Necessary to design a new intelligent traffic congestion discrimination method based on wireless sensor network front-end data collection. That is to use the front-end data acquisition technology of wireless sensor network to generate a front-end data acquisition platform to obtain intelligent traffic congestion data, and then design an intelligent traffic congestion discrimination algorithm based on traffic congestion rules so as to achieve intelligent traffic congestion discrimination. The experimental results show that the intelligent traffic congestion discrimination method designed based on the front-end data collection of wireless sensor network has good discrimination effect, the obtained discrimination data is more accurate, effective and has certain application value, which has made certain contributions to reducing the frequency of urban traffic accidents. Full Article
nat International Journal of Computer Applications in Technology By www.inderscience.com Published On :: Full Article
nat International Journal of Teaching and Case Studies By www.inderscience.com Published On :: Full Article
nat International Journal of Business Intelligence and Data Mining By www.inderscience.com Published On :: Full Article
nat Constitutional and international legal framework for the protection of genetic resources and associated traditional knowledge: a South African perspective By www.inderscience.com Published On :: 2024-10-30T23:20:50-05:00 The value and utility of traditional knowledge in conserving and commercialising genetic resources are increasingly becoming apparent due to advances in biotechnology and bioprospecting. However, the absence of an international legally binding instrument within the WIPO system means that traditional knowledge associated with genetic resources is not sufficiently protected like other forms of intellectual property. This means that indigenous peoples and local communities (IPLCs) do not benefit from the commercial exploitation of these resources. The efficacy of domestic tools to protect traditional knowledge and in balancing the rights of IPLCs and intellectual property rights (IPRs) is still debated. This paper employs a doctrinal research methodology based on desktop research of international and regional law instruments and the Constitution of the Republic of South Africa, 1996, to determine the basis for balancing the protection of genetic resources and associated traditional knowledge with competing interests of IPLCs and IPRs in South Africa. Full Article
nat International Journal of Intellectual Property Management By www.inderscience.com Published On :: Full Article
nat International Journal of Information Technology and Management By www.inderscience.com Published On :: Full Article
nat National ICT policy challenges for developing countries: a grounded theory informed literature review By www.inderscience.com Published On :: 2020-02-07T23:20:50-05:00 This paper presents a review of the literature on the challenges of national information and communication technology (ICT) policies in the context of African countries. National ICT policies have been aligned with socio-development agendas of African countries. However, the policies have not delivered the expected outcomes due to many challenges. Studies have been conducted in isolation to highlight the challenges in the policy process. The study used grounded theory informed literature review to holistically analyse the problems in the context of African countries. The results were categorised in the typology of the policy process to understand the challenges from a broad perspective. The problems were categorised into agenda setting, policy formulation, legal frameworks, implementation and evaluation. In addition, there were constraints related to policy monitoring in the policy phases and imbalance of power among the policy stakeholders. The review suggests areas of further research. Full Article
nat International Journal of Technology Policy and Law By www.inderscience.com Published On :: Full Article
nat International Journal of Innovation and Learning By www.inderscience.com Published On :: Full Article
nat International Journal of Business and Systems Research By www.inderscience.com Published On :: Full Article
nat International Journal of Enterprise Network Management By www.inderscience.com Published On :: Full Article
nat International Journal of Networking and Virtual Organisations By www.inderscience.com Published On :: Full Article
nat Working in a Group before Meeting Face-to-Face – A Case of International Student Online Project By Published On :: Full Article
nat Design, Development and Deployment Considerations when Applying Native XML Database Technology to the Programme Management Function of an SME By Published On :: Full Article
nat Will It Work? An Initial Examination of the Processes and Outcomes of Converting Course Materials to CD-ROMs By Published On :: Full Article
nat Highs and Lows of Implementing a Management Strategy Eliminating ‘Free Passengers’ in Group Projects By Published On :: Full Article
nat The Work Readiness of Master of Information Systems International Students at an Australian University: A Pilot Study By Published On :: Full Article
nat Design Alternatives for a MediaWiki to Support Collaborative Writing in Higher Education Classes By Published On :: Full Article
nat ICTs and Network Relations: Exploring Knowledge Sharing and Coordination in Distributed Organizations By Published On :: Full Article
nat The Coordination between Faculty and Technical Support Staff in Updating Computer Technology Courses – A Case Example By Published On :: Full Article
nat International Collaboration for Women in IT: How to Avoid Reinventing the Wheel By Published On :: Full Article
nat An Examination of Students’ Self-Efficacy Beliefs and Demonstrated Computer Skills By Published On :: Full Article
nat Building Computer Games as Effective Learning Tools for Digital Natives – and Similars By Published On :: Full Article
nat Tracking Viral Contamination through User Habits and IT Practices By Published On :: Full Article
nat Dealing with Student Disruptive Behavior in the Classroom – A Case Example of the Coordination between Faculty and Assistant Dean for Academics By Published On :: Full Article
nat An Internship Program at a Computer Science Department –Theoretical Foundation and Overall Coordination By Published On :: 2015-06-03 Internship courses, unlike others, are multi-pronged because they require coordination at different levels. Typically, a faculty member coordinates the communication and implementation at each level to achieve the desired outcomes. We call the position that this faculty holds the “internship coordinator”. For the work of the internship coordinator to be successful, he/she may need to synchronize the work of the internship with all parties involved. Failure to coordinate at one level or another may affect the work of other parties involved in completing the internship for the students. This paper explains the experience of an internship program at the computer science department (COSC) at Indiana University Indiana University of Pennsylvania (IUP). We focus on the work of the internship coordinator for this program and his work to communicate and coordinate to successfully implement the internship experience for the students. We first discuss the theoretical foundation that led to the development of internship programs in academia and then elaborate on the multiple levels of the role of the internship coordinator in completing the internship experience for the students. Full Article
nat Hybrid App Approach: Could It Mark the End of Native App Domination? By Published On :: 2017-04-23 Aim/Purpose: Despite millions of apps on the market, it is still challenging to develop a mobile app that can run across platforms using the same code. Background: This paper explores a potential solution for developing cross platform apps by presenting the hybrid app approach. Methodology: The paper first describes a brief evolution of the different mobile app development approaches and then compares them with the hybrid app approach. Next, it focuses on one specific hybrid app development framework called Ionic. Contribution: The paper presents the hybrid app approach as an emerging trend in mobile app development and concludes with the highlight of its advantages and teaching implications. Findings: The hybrid app approach reduces the learning curve and offers tools to allow the reuse of code to create apps for different mobile devices. Recommendations for Practitioners: The experience that the paper describes in using Ionic framework to create a hybrid app can be adopted in a web design or mobile app development course. Impact on Society : The advance in hybrid framework in general and the growing acceptance of open source framework, such as Ionic in particular, may provide an alternative to the native app domination and may trigger the rapid rise of hybrid apps in the years to come. Full Article