ntr Banques, assurances et entreprises du CAC 40 : leurs bᅵnᅵfices explosent By www.politique.net Published On :: Fri, 26 Aug 2022 18:26:00 GMT La crise ? Quelle crise ? Alors que le gouvernement prᅵpare l'opinion ᅵ une longue pᅵriode d'inflation et de hausse des prix de l'ᅵnergie en raison de la guerre en Ukraine, tout ne va pas si mal sur le plan... Full Article
ntr An effectiveness analysis of enterprise financial risk management for cost control By www.inderscience.com Published On :: 2024-10-02T23:20:50-05:00 This paper aims to analyse the effectiveness of cost control oriented enterprise financial risk management. Firstly, it analyses the importance of enterprise financial risk management. Secondly, the position of cost control in enterprise financial risk management was analysed. Cost control can be used to reduce the operating costs of enterprises, improve their profitability, and thus reduce the financial risks they face. Finally, a corporate financial risk management strategy is constructed from several aspects: establishing a sound risk management system, predicting and responding to various risks, optimising fund operation management, strengthening internal control, and enhancing employee risk awareness. The results show that after applying the proposed management strategy, the enterprise performs well in cost control oriented enterprise financial risk management, with a cost accounting accuracy of 95% and an audit system completeness of 90%. It can also help the enterprise develop emergency plans and provide comprehensive risk management strategy coverage. Full Article
ntr Adaptive terminal sliding mode control of a non-holonomic wheeled mobile robot By www.inderscience.com Published On :: 2024-10-07T23:20:50-05:00 In this paper, a second-order sliding mode adaptive controller with finite time stability is proposed for trajectory tracking of robotic systems. In order to reduce the chattering phenomenon in the response of the variable structure resistant controller, two dependent sliding surfaces are used. In the outer loop, a kinematic controller is used to compensate the geometric uncertainty of the robot, and in the inner loop, the proposed resistive control is used as the main loop. On the other hand, considering the dynamic uncertainty and disturbance of the robot, an adaptive strategy has been used to estimate the uncertainty limit during the control process in order to eliminate the need for basic knowledge to determine the uncertainty limit in the resistant structure. The proposed control method demonstrates significant enhancements in performance, with the linear velocity error improving by approximately 80%, leading to a more accurate and responsive system. Full Article
ntr The discussion of information security risk control in mobile banking By www.inderscience.com Published On :: 2024-10-02T23:20:50-05:00 The emergence of digital technology and the increasing prevalence of smartphones have promoted innovations in payment options available in finance and consumption markets. Banks providing mobile payment must ensure the information security. Inadequate security control leads to information leakage, which severely affects user rights and service providers' reputations. This study uses control objectives for Information and Related Technologies 4.1 as the mobile payment security control framework to examine the emergent field of mobile payment. A literature review is performed to compile studies on the safety risk, regulations, and operations of mobile payments. In addition, the Delphi questionnaire is distributed among experts to determine the practical perspectives, supplement research gaps in the literature, and revise the prototype framework. According to the experts' opinions, 59 control objectives from the four domains of COBIT 4.1 are selected. The plan and organise, acquire and implement, deliver and support, and monitor and evaluate four domains comprised 2, 5, 10, and 2 control objectives that had mean importance scores of > 4.50. Thus, these are considered the most important objectives by the experts, respectively. The results of this study can serve as a reference for banks to construct secure frameworks in mobile payment services. Full Article
ntr A constant temperature control system for indoor environments in buildings using internet of things By www.inderscience.com Published On :: 2024-07-01T23:20:50-05:00 The performance of a building's internal environment, which includes the air temperature, lighting and acoustics, is what determines the quality of the environment inside the building. We present a thermal model for achieving thermal comfort in buildings that makes use of a multimodal analytic framework as a solution to this challenge. In this study, a multimodal combination is used to evaluate several temperature and humidity sensors as well as an area image. Additionally, a CNN and LSTM combination is used to process the image and sensor data. The results show that heating setback and interior set point temperatures, as well as mechanical ventilation based on real people's presence and CO<SUB align=right>2 levels, are all consistently reduced when ICT-driven intelligent solutions are used. The CNN-LSTM model has a goodness of fit that is 0.7258 on average, which is much higher than both the CNN (0.5291) and LSTM (0.5949) models. Full Article
ntr Design of traffic signal automatic control system based on deep reinforcement learning By www.inderscience.com Published On :: 2024-10-07T23:20:50-05:00 Aiming at the problem of aggravation of traffic congestion caused by unstable signal control of traffic signal control system, the Multi-Agent Deep Deterministic Policy Gradient-based Traffic Cyclic Signal (MADDPG-TCS) control algorithm is used to control the time and data dimensions of the signal control scheme. The results show that the maximum vehicle delay time and vehicle queue length of the proposed algorithm are 11.33 s and 27.18 m, which are lower than those of the traditional control methods. Therefore, this method can effectively reduce the delay of traffic signal control and improve the stability of signal control. Full Article
ntr Access controllable multi-blockchain platform for enterprise R&D data management By www.inderscience.com Published On :: 2024-07-02T23:20:50-05:00 In the era of big data, enterprises have accumulated a large amount of research and development data. Effective management of their precipitated data and safe sharing of data can improve the collaboration efficiency of research and development personnel, which has become the top priority of enterprise development. This paper proposes to use blockchain technology to assist the collaboration efficiency of enterprise R&D personnel. Firstly, the multi-chain blockchain platform is used to realise the data sharing of internal data of enterprise R&D data department, project internal data and enterprise data centre, and then the process of construction of multi-chain structure and data sharing is analysed. Finally, searchable encryption was introduced to achieve data retrieval and secure sharing, improving the collaboration efficiency of enterprise research and development personnel and maximising the value of data assets. Through the experimental verification, the multi-chain structure improves the collaboration efficiency of researchers and data security sharing. Full Article
ntr Dual network control system for bottom hole throttling pressure control based on RBF with big data computing By www.inderscience.com Published On :: 2024-07-02T23:20:50-05:00 In the context of smart city development, the managed pressure drilling (MPD) drilling process faces many uncertainties, but the characteristics of the process are complex and require accurate wellbore pressure control. However, this process runs the risk of introducing un-modelled dynamics into the system. To this problem, this paper employs neural network control techniques to construct a dual-network system for throttle pressure control, the design encompasses both the controller and identifier components. The radial basis function (RBF) network and proportional features are connected in parallel in the controller structure, and the RBF network learning algorithm is used to train the identifier structure. The simulation results show that the actual wellbore pressure can quickly track the reference pressure value when the pressure setpoint changes. In addition, the controller based on neural network realises effective control, which enables the system to track the input target quickly and achieve stable convergence. Full Article
ntr Urban public space environment design based on intelligent algorithm and fuzzy control By www.inderscience.com Published On :: 2024-07-02T23:20:50-05:00 With the development of urban construction, its spatial evolution is also influenced by behavioural actors such as enterprises, residents, and environmental factors, leading to some decision-making behaviours that are not conducive to urban public space and environmental design. At the same time, some cities are vulnerable to various factors such as distance factors, transportation factors, and human psychological factors during the construction of public areas, resulting in a decline in the quality of urban human settlements. Urban public space is the guarantee of urban life. For this, in order to standardise urban public space and improve the quality of urban living environment, the standardisation of the environment of urban public space is required. The rapid development of intelligent algorithms and fuzzy control provides technical support for the environmental design of urban public spaces. Through the modelling of intelligent algorithms and the construction of fuzzy space, it can meet the diverse. Full Article
ntr A Critical Analysis of Active Learning and an Alternative Pedagogical Framework for Introductory Information Systems Courses By Published On :: Full Article
ntr Teaching an Introductory Programming Language in a General Education Course By Published On :: Full Article
ntr Introducing E-portfolio Use to Primary School Pupils: Response, Benefits and Challenges By Published On :: 2015-03-23 Electronic portfolios (e-portfolios) have a positive impact on the learning process in a broad range of educational sectors and on learners of all ages. Yet because most e-portfolio-related studies are about their implementation in higher education, this type of research is less usual in the early childhood context, and there is no available research for Greek schools. This study aims to investigate the impact of e-portfolios on learning in a Greek primary school and to provide a resource regarding the educational benefits of e-portfolio in primary education. To do that, it employs the qualitative naturalistic method to collect data, along with mixed methods which were used to achieve triangulation and strengthen confidence in the outcomes. Participants in the research were fourteen 8-year-old pupils, and one of the researchers was their regular teacher. Data evaluation revealed that the e-portfolio added value in pupils’ learning, acted as a medium to involve parents, promoted pupils’ self-esteem, and was acknowledged as a valuable assessment tool and a challenge for the school community. Based on the experience of the e-portfolio implementation, the authors provide some suggestions that would possibly help researchers and primary school teachers adopt and develop e-portfolio systems in their particular settings. Full Article
ntr Secure E-Examination Systems Compared: Case Studies from Two Countries By Published On :: 2017-04-12 Aim/Purpose: Electronic examinations have some inherent problems. Students have expressed negative opinions about electronic examinations (e-examinations) due to a fear of, or unfamiliarity with, the technology of assessment, and a lack of knowledge about the methods of e-examinations. Background: Electronic examinations are now a viable alternative method of assessing student learning. They provide freedom of choice, in terms of the location of the examination, and can provide immediate feedback; students and institutions can be assured of the integrity of knowledge testing. This in turn motivates students to strive for deeper learning and better results, in a higher quality and more rigorous educational process. Methodology : This paper compares an e-examination system at FUT Minna Nigeria with one in Australia, at the University of Tasmania, using case study analysis. The functions supported, or inhibited, by each of the two e-examination systems, with different approaches to question types, cohort size, technology used, and security features, are compared. Contribution: The researchers’ aim is to assist stakeholders (including lecturers, invigilators, candidates, computer instructors, and server operators) to identify ways of improving the process. The relative convenience for students, administrators, and lecturer/assessors and the reliability and security of the two systems are considered. Challenges in conducting e-examinations in both countries are revealed by juxtaposing the systems. The authors propose ways of developing more effective e-examination systems. Findings: The comparison of the two institutions in Nigeria and Australia shows e-examinations have been implemented for the purpose of selecting students for university courses, and for their assessment once enrolled. In Nigeria, there is widespread systemic adoption for university entrance merit selection. In Australia this has been limited to one subject in one state, rather than being adopted nationally. Within undergraduate courses, the Nigerian scenario is quite extensive; in Australia this adoption has been slower, but has penetrated a wide variety of disciplines. Recommendations for Practitioners: Assessment integrity and equipment reliability were common issues across the two case studies, although the delivery of e-examinations is different in each country. As with any procedural process, a particular solution is only as good as its weakest attribute. Technical differences highlight the link between e-examination system approaches and pedagogical implications. It is clear that social, cultural, and environmental factors affect the success of e-examinations. For example, an interrupted electrical power supply and limited technical know-how are two of the challenges affecting the conduct of e-examinations in Nigeria. In Tasmania, the challenge with the “bring your own device” (BYOD) is to make the system operate on an increasing variety of user equipment, including tablets. Recommendation for Researchers: The comparisons between the two universities indicate there will be a productive convergence of the approaches in future. One key proposal, which arose from the analysis of the existing e-examination systems in Nigeria and Australia, is to design a form of “live” operating system that is deployable over the Internet. This method would use public key cryptography for lecturers to encrypt their questions online. Impact on Society : If institutions are to transition to e-examinations, one way of facilitating this move is by using computers to imitate other assessment techniques. However, higher order thinking is usually demonstrated through open-ended or creative tasks. In this respect the Australian system shows promise by providing the same full operating system and software application suite to all candidates, thereby supporting assessment of such creative higher order thinking. The two cases illustrate the potential tension between “online” or networked reticulation of questions and answers, as opposed to “offline” methods. Future Research: A future design proposition is a web-based strategy for a virtual machine, which is launched into candidates’ computers at the start of each e-examination. The new system is a form of BYOD externally booted e-examination (as in Australia) that is deployable over the Internet with encryption and decryption features using public key cryptography (Nigeria). This will allow lecturers to encrypt their questions and post them online while the questions are decrypted by the administrator or students are given the key. The system will support both objective and open-ended questions (possibly essays and creative design tasks). The authors believe this can re-define e-examinations as the “gold standard” of assessment. Full Article
ntr Introductory Information Systems Course Redesign: Better Preparing Business Students By Published On :: 2018-05-29 Aim/Purpose: The dynamic nature of the information systems (IS) field presents educators with the perpetual challenge of keeping course offerings current and relevant. This paper describes the process at a College of Business (COB) to redesign the introductory IS course to better prepare students for advanced business classes and equip them with interdisciplinary knowledge and skills demanded in today’s workplace. Background: The course was previously in the Computer Science (CSC) Department, itself within the COB. However, an administrative restructuring resulted in the CSC department’s removal from the COB and left the core course in limbo. Methodology: This paper presents a case study using focus groups with students, faculty, and advisory council members to assess the value of the traditional introductory course. A survey was distributed to students after implementation of the newly developed course to assess the reception of the course. Contribution: This paper provides an outline of the decision-making process leading to the course redesign of the introductory IS course, including the context and the process of a new course development. Practical suggestions for implementing and teaching an introductory IS course in a business school are given. Findings: Focus group assessment revealed that stakeholders rated the existing introductory IS course of minimal value as students progressed through the COB program, and even less upon entering the workforce. The findings indicated a complete overhaul of the course was required. Recommendations for Practitioners: The subject of technology sometimes requires more than a simple update to the curriculum. When signs point to the need for a complete overhaul, this paper gives practical guidance supplemented with relevant literature for other academicians to follow. Recommendation for Researchers: Students are faced with increasing pressure to be proficient with the latest technology, in both the classroom where educators are trying to prepare them for the modern workplace, as well as the organization which faces an even greater pressure to leverage the latest technology. The newly designed introductory IS course provides students, and eventually organizations, a better measure of this proficiency. Future Research: Future research on the efficacy of this new course design should include longitudinal data to determine the impact on graduates, and eventually the assessment of those graduates’ performance in the workplace. Full Article
ntr Redesigning an Introductory Programming Course to Facilitate Effective Student Learning: A Case Study By Published On :: 2020-08-28 Aim/Purpose: This study reports the outcome of how a first pilot semester introductory programming course was designed to provide tangible evidence in support of the concept of Student Ownership of Learning (SOL) and how the outcomes of this programming course facilitate effective student learning. Background: Many instructors want to create or redesign their courses to strengthen the relationship between teaching and learning; however, the researchers of this study believe that the concept of Student Ownership of Learning (SOL) connects to student engagement and achievement in the classroom setting. The researchers redesigned the introductory programming course to include valuable teaching methods to increase Student Ownership of Learning and constructive approaches such as making students design an authentic mobile app project as individuals, partners, or within teams. The high quality of students’ projects positioned them as consultants to the university IT department. Methodology: This paper employs a case study design to construct a qualitative research method as it relates to the phenomenon of the study’s goals and lived experiences of students in the redesigned introductory programming course. The redesigned course was marketed to students as a new course with detailed description and elements that were different from the traditional computer science introductory programming course requirement. The redesigned introductory programming course was offered in two sections: one section with 14 registered students and the other section with 15 registered students. One faculty member instructed both sections of the course. A total of 29 students signed up for the newly redesigned introductory programming course, more than in previous semesters, but two students dropped out within the first two weeks of the redesigned course making a total of 27 students. The redesigned coursework was divided into two parts of the semester. The first part of the semester detailed description and elements of the coursework including a redesigned approach with preparation for class, a quiz, and doing homework in class, which gives students control of decisions whenever possible; and working with each other, either with a partner or in a team. The second part of the semester focuses on students designing a non-trivial working mobile app and presenting their developing mobile app at a significant public competition at the end of the semester. Students developed significantly complex mobile apps and incorporated more complex functionality in their apps. Both Management Information System (MIS) major students and Computer Science major students were in the same course despite the fact that MIS students had never taken a programming course before; however, the Computer Science students had taken at least one course of programming. Contribution: This study provides a practical guide for faculty members in Information Technology programs and other faculty members in non-Computer Science programs to create or redesign an introductory course that increases student engagement and achievement in the classroom based on the concept of Student Ownership of Learning (SOL). This study also deepens the discussion in curriculum and instruction on the value to explore issues that departments or programs should consider when establishing coursework or academic programs. Findings: This study found two goals evidently in support to increase Student Ownership of Learning (SOL). The first goal (Increase their ownership of learning SOL) showed that students found value in the course contents and took control of their learning; therefore, the faculty no longer had to point out how important different programming concepts were. The students recognized their own learning gap and were excited when shown a programming concept that addressed the gap. For example, student comments were met with “boy, we can really use this in our app” instead of comments about how complex they were. The coursework produced a desired outcome for students as they would get the knowledge needed to make the best app that they could. The second goal (Develop a positive attitude toward the course) showed positive results as students developed a more positive attitude towards the course. Student actions in the classroom strongly reflected a positive attitude. Attendance was almost 100% during the semester even though no points for attendance were given. Further evidence of Student Ownership of Learning and self-identity was students’ extensive use of the terminology and concept of the course when talking to others, especially during the public competition. Students were also incorporating their learning into their identities. For example, teams became known by their app such as the Game team, the Recipe team, and the Parking team. One team even made team t-shirts. Another exciting reflection of the Student Ownership of Learning which occurred was the learning students did by themselves. Recommendations for Practitioners: Practitioners can share best practices with faculty in different departments, programs, universities, and educational consultants to cultivate the best solution for Student Ownership of Learning based on student engagement and achievement in the classroom setting. Recommendation for Researchers: Researchers can explore different perspectives with scholars and practitioners in various disciplinary fields of study to create or redesign courses and programs to reflect Student Ownership of Learning (SOL). Impact on Society: Student Ownership of Learning is relevant for faculty and universities to incorporate in the creation or redesigning of coursework in academic programs. Readers can gain an understanding that student engagement and achievement are two important drivers of Student Ownership of Learning (SOL) in the classroom setting. Future Research: Practitioners and researchers could follow-up in the future with a study to provide more understanding and updated research information from different research samples and hypotheses on Student Ownership of Learning (SOL). Full Article
ntr The Effect of E-Learning Experience on Readiness, Attitude, and Self-Control/Self-Management By Published On :: 2021-07-20 Aim/Purpose: This study aimed to reveal the effect of the previous Internet-based education (IBE) experiences of the students’ readiness, attitude, and self-control / self-management variables towards the e-learning process, and also to determine their opinions. Background: The institutions have made efforts to ensure the continuity of education through their learning management systems and the necessity of addressing the e-learning process from the perspective of students once again showed itself as an undeniable fact. Accordingly, the necessity to consider holistically the variables of readiness, attitude, and self-control/self-management, which affect students’ adaptation to e-learning process, has once again emerged based on the relevant literature. Methodology: This research based on the simultaneous mixed method considering the previous IBE experiences of 75 Computer Education and Instructional Technology (CEIT) students taking part in the study in Turkey. The quantitative results of the study were analyzed based on the single-group pretest-posttest weak experimental design. Qualitative results were obtained through the structured interview form and set an example for the case study. Contribution: The results showed that regardless of students’ previous Internet-based education (IBE) experience, it is seen that increasing and continuous experience has a significant effect on the readiness, attitude and self-control / self-management variables towards the e-learning process. The main contribution of experimental results showed that IBE experience is effective on individuals’ perceptions of internet self-efficacy, and has an impact on the self-learning skills of individuals. In addition to this, the e-learning experience has an impact on individuals’ self-evaluation. It is also seen that the certificate presented to learners in the e-learning environment has a positive effect on students’ attitudes towards e-learning processes. Finally, the experiences of e-learning processes, the methods used to transfer the content in the learning environment, the motivation and feedback provided to the learner also support the significant difference obtained in terms of readiness, attitude and self-control / self-management. Findings: After the findings were analyzed holistically in depth, it has been observed that; if the contents offered to students in e-learning environments support their professional development, in this case, their attitudes, readiness (excluding the sub-dimension of learner control), and self-control/self-management skills for these environments differ significantly in the posttest. It is also among the results that students having previous IBE experience have not higher awareness levels on online communication self-efficacy, technology use self-efficacy, readiness for e-learning, e-learning predisposition, self-reinforcement, self-control management, although significantly found. The findings regarding the effectiveness of the experimental process are as follows: Although it is possible for the students having previous IBE experience to use these experiences within the course for their personal development, it has been seen that the observed differences regarding students’ readiness, attitude, and self-control/self-management towards e-learning processes arise from the experimental operation. Recommendations for Practitioners: It is recommended for the policy-makers and practitioners that while e-learning platforms were designing, using different methods for delivering the content is as important as making the interaction meaningful and sustainable. In addition to this, to develop a positive attitude it is recommended that individuals’ participation of an e-learning platform should be supported with a certificate. Recommendation for Researchers: Researchers should test the obtained results by a well-structured e-learning platform with their recorded activities on the platform (e.g. in which section was used mostly by a learner etc.). Hence, the impact of IBE experiences might be discussed in an up level framework. Impact on Society: Actually, this study is based on a mix design and the results were also meaningful especially considering the implacable global pandemic. It is clearly understood by this process that e-learning is very important. In line with this, to support the e-learning process (e.g. with the method while delivering the content, well-structured feedback, motivation strategies etc.) and make it sustainable, the increasing of individual’s readiness, attitude, and self-control through the IBE would be indispensable. Future Research: Future studies might focus on the longitudinal methods. It is worth to find out how the students experiences affect the sustainability of the course content, and what should the program developer make to improve their course content in line with the findings of longitudinal studies. Full Article
ntr Towards Understanding Information Systems Students’ Experience of Learning Introductory Programming: A Phenomenographic Approach By Published On :: 2021-07-12 Aim/Purpose: This study seeks to understand the various ways information systems (IS) students experience introductory programming to inform IS educators on effective pedagogical approaches to teaching programming. Background: Many students who choose to major in information systems (IS), enter university with little or no experience of learning programming. Few studies have dealt with students’ learning to program in the business faculty, who do not necessarily have the computer science goal of programming. It has been shown that undergraduate IS students struggle with programming. Methodology: The qualitative approach was used in this study to determine students’ notions of learning to program and to determine their cognitive processes while learning to program in higher education. A cohort of 47 students, who were majoring in Information Systems within the Bachelor of Commerce degree programme were part of the study. Reflective journals were used to allow students to record their experiences and to study in-depth their insights and experiences of learning to program during the course. Using phenomenographic methods, categories of description that uniquely characterises the various ways IS students experience learning to program were determined. Contribution: This paper provides educators with empirical evidence on IS students’ experiences of learning to program, which play a crucial role in informing IS educators on how they can lend support and modify their pedagogical approach to teach programming to students who do not necessarily need to have the computer science goal of programming. This study contributes additional evidence that suggests more categories of description for IS students within a business degree. It provides valuable pedagogical insights for IS educators, thus contributing to the body of knowledge Findings: The findings of this study reveal six ways in which IS students’ experience the phenomenon, learning to program. These ways, referred to categories of description, formed an outcome space. Recommendations for Practitioners: Use the experiences of students identified in this study to determine approach to teaching and tasks or assessments assigned Recommendation for Researchers: Using phenomenographic methods researchers in IS or IT may determine pedagogical content knowledge in teaching specific aspects of IT or IS. Impact on Society: More business students would be able to program and improve their logical thinking and coding skills. Future Research: Implement the recommendations for practice and evaluate the students’ performance. Full Article
ntr Investigating Factors Contributing to Student Disengagement and Ownership in Learning: A Case Study of Undergraduate Engineering Students By Published On :: 2024-07-22 Aim/Purpose: Despite playing a critical role in shaping the future, 70% of undergraduate engineers report low levels of motivation. Student disengagement and a lack of ownership of their learning are significant challenges in higher education, specifically engineering students in the computer science department. This study investigates the various causes of these problems among first-year undergraduate engineers. Background: Student disengagement has become a significant problem, especially in higher education, leading to reduced academic performance, lower graduation rates, and less satisfaction with learning. The study intends to develop approaches that encourage a more interesting and learner-motivated educational environment. Methodology: This research uses a mixed methods approach by combining quantitative data from a survey-based questionnaire with qualitative insights from focus groups to explore intrinsic and extrinsic motivators, instructional practices, and student perceptions of relevance and application of course content. The aim of this method is to make an all-inclusive exploration into undergraduate engineering students’ perspectives on factors contributing to this disengagement and the need for more ownership. Contribution: Inculcating passion for engineering among learners seems demanding, with numerous educational programs struggling with issues such as a lack of interest by students and no personal investment in learning. Understanding the causes is of paramount importance. The study gives suggestions to help teachers or institutions create a more engaged and ownership-based learning environment for engineering students. Findings: The findings revealed a tangled web influencing monotonous teaching styles, limited opportunities and applications, and a perceived gap between theoretical knowledge and real-world engineering problems. It emphasized the need to implement more active learning strategies that could increase autonomy and a stronger sense of purpose in their learning journey. It also highlights the potential use of technology in promoting student engagement and ownership. Further research is needed to explore optimal implementation strategies for online simulations, interactive learning platforms, and gamification elements in the engineering curriculum. Recommendations for Practitioners: It highlights the complex interplay of intrinsic and extrinsic motivation factors and the need to re-look at instructional practice and emphasize faculty training to develop a more student-centered approach. It also stresses the need to look into the relevance and application of the course content. Recommendation for Researchers: More work needs to be done with a larger, more diverse sample population across multiple institutions and varied sociocultural and economic backgrounds. Impact on Society: Enhancing learners’ educational experience can result in creating a passionate and competent team of engineers who can face future obstacles fearlessly and reduce the production of half-baked graduates unprepared for the profession’s challenges. Future Research: Conduct long-term studies to assess the impact of active learning and technology use on student outcomes and career readiness. Investigate scaling up successful strategies across diverse engineering programs. See if promising practices work well everywhere. Full Article
ntr Predicting green entrepreneurial intention among farmers using the theory of entrepreneurial events and institutional theory By www.inderscience.com Published On :: 2024-10-10T23:20:50-05:00 Green entrepreneurial intention (GEI) in the agriculture sector signifies agricultural businesses' strong determination to embrace environmentally sustainable practices and innovative eco-friendly approaches. To understand farmers' GEI, the research applied theories of entrepreneurial events and institutional theory. A model was developed and empirically validated through structural equation modelling (SEM). A questionnaire survey was used to collect data from 211 farmers from the southern region of India. Findings revealed that perceived desirability, perceived feasibility, mimetic pressure, and entrepreneurial mindset positively influenced GEI. Entrepreneurial mindset played a mediating role in strengthening the farmers GEI. This study contributes to understanding GEI in agriculture and informs strategies for promoting sustainable farming practices. Full Article
ntr Entrepreneurship vs. mentorship: an analysis of leadership modes on sustainable development with moderation of innovation management By www.inderscience.com Published On :: 2024-10-10T23:20:50-05:00 This study explores the connection between mentorship and sustainable development (SD) within three major perspectives of sustainable development, such as social, environmental, and economic perspectives from China. Second, the study revealed the relationship between entrepreneurship and SD. Third, a moderation influence of innovation management (IM) was observed among the proposed nexuses of mentorship, entrepreneurship, and SD. To this end, a total of 535 questionnaires were eventually utilised with the support of SmartPLS and the structure equation modelling (SEM) approach. A positive connection was confirmed between mentorship and SD. The outcome uncovered a positive correlation between entrepreneurship and SD. In addition, a moderation of IM was found between mentorship, entrepreneurship, and SD. The study enlists several interesting lines about mentorship, entrepreneurship, and IM that might help to improve SD in terms of social, environmental, and economic perspectives. Besides, the study provides various implications for management and states the weaknesses along with the future directions for worldly researchers. Full Article
ntr Unsupervised VAD method based on short-time energy and spectral centroid in Arabic speech case By www.inderscience.com Published On :: 2024-10-03T23:20:50-05:00 Voice Activity Detection (VAD) distinguishes speech segments from noise or silence areas. An efficient and noise-robust VAD system can be widely used for emerging speech technologies such as wireless communication and speech recognition. In this paper, we propose two versions of an unsupervised Arabic VAD method based on the combination of the Short-Time Energy (STE) and the Spectral Centroid (SC) features for formulating a typical threshold to detect speech areas. The first version compares only the STE feature to the threshold (STE-VAD). In contrast, the second compares the SC vector and the threshold (SC-VAD). The two versions of our VAD method were tested on 770 sentences of the Arabphone corpus, which were recorded in clean and noisy environments and evaluated under different values of Signal-to-Noise-Ratio. The experiments demonstrated the robustness of the STE-VAD in terms of accuracy and Mean Square Error. Full Article
ntr A data classification method for innovation and entrepreneurship in applied universities based on nearest neighbour criterion By www.inderscience.com Published On :: 2024-09-03T23:20:50-05:00 Aiming to improve the accuracy, recall, and F1 value of data classification, this paper proposes an applied university innovation and entrepreneurship data classification method based on the nearest neighbour criterion. Firstly, the decision tree algorithm is used to mine innovation and entrepreneurship data from applied universities. Then, dynamic weight is introduced to improve the similarity calculation method based on edit distance, and the improved method is used to realise data de-duplication to avoid data over fitting. Finally, the nearest neighbour criterion method is used to classify applied university innovation and entrepreneurship data, and cosine similarity is used to calculate the similarity between the samples to be classified and each sample in the training data, achieving data classification. The experimental results demonstrate that the proposed method achieves a maximum accuracy of 96.5% and an average F1 score of 0.91. These findings indicate a high level of accuracy, recall, and F1 value for data classification using the proposed method. Full Article
ntr An evaluation of customer trust in e-commerce market based on entropy weight analytic hierarchy process By www.inderscience.com Published On :: 2024-07-04T23:20:50-05:00 In order to solve the problems of large generalisation error, low recall rate and low retrieval accuracy of customer evaluation information in traditional trust evaluation methods, an evaluation method of customer trust in e-commerce market based on entropy weight analytic hierarchy process was designed. Firstly, build an evaluation index system of customer trust in e-commerce market. Secondly, the customer trust matrix is established, and the index weight is calculated by using the analytic hierarchy process and entropy weight method. Finally, five-scale Likert method is used to analyse the indicator factors and establish a comment set, and the trust evaluation value is obtained by combining the indicator membership. The experiment shows that the maximum generalisation error of this method is only 0.029, the recall rate is 97.5%, and the retrieval accuracy of customer evaluation information is closer to 1. Full Article
ntr National ICT policy challenges for developing countries: a grounded theory informed literature review By www.inderscience.com Published On :: 2020-02-07T23:20:50-05:00 This paper presents a review of the literature on the challenges of national information and communication technology (ICT) policies in the context of African countries. National ICT policies have been aligned with socio-development agendas of African countries. However, the policies have not delivered the expected outcomes due to many challenges. Studies have been conducted in isolation to highlight the challenges in the policy process. The study used grounded theory informed literature review to holistically analyse the problems in the context of African countries. The results were categorised in the typology of the policy process to understand the challenges from a broad perspective. The problems were categorised into agenda setting, policy formulation, legal frameworks, implementation and evaluation. In addition, there were constraints related to policy monitoring in the policy phases and imbalance of power among the policy stakeholders. The review suggests areas of further research. Full Article
ntr Towards Egocentric Way-Finding Appliances Supporting Navigation in Unfamiliar Terrain By Published On :: Full Article
ntr Technology and Marginalization: A Case Study of the Limited Adoption of the Intranet at a State-owned Organization in Rural Australia By Published On :: Full Article
ntr Communication Management and Control in Distance Learning Scenarios By Published On :: Full Article
ntr Use of a Class Exercise to Maximize Student Interest in an Introductory MIS Course By Published On :: Full Article
ntr Information Access for Development: A Case Study at a Rural Community Centre in South Africa By Published On :: Full Article
ntr Befriending Computer Programming: A Proposed Approach to Teaching Introductory Programming By Published On :: Full Article
ntr A Model of Introducing e-Learning System at Vocational College for Business Secretaries By Published On :: Full Article
ntr Introducing Students to Business Intelligence: Acceptance and Perceptions of OLAP Software By Published On :: Full Article
ntr Sustaining Negotiated QoS in Connection Admission Control for ATM Networks Using Fuzzy Logic Techniques By Published On :: Full Article
ntr An Evolving Road Map: Student Perceptions and Contributions to Graphic Organizers within an Academic Wiki By Published On :: Full Article
ntr IT Control Objectives for Implementing the Public Finance Management Act in South Africa By Published On :: Full Article
ntr SMS Based Wireless Home Appliance Control System (HACS) for Automating Appliances and Security By Published On :: Full Article
ntr A Strategic Review of Existing Mobile Agent-Based Intrusion Detection Systems By Published On :: Full Article
ntr Securing Control Signaling in Mobile IPv6 with Identity-Based Encryption By Published On :: Full Article
ntr A Multi-Layered Approach to the Design of Intelligent Intrusion Detection and Prevention System (IIDPS) By Published On :: Full Article
ntr A Conceptual Model for Learning to Program in Introductory Programming Courses By Published On :: Full Article
ntr Development of Electronic Money and Its Impact on the Central Bank Role and Monetary Policy By Published On :: Full Article