id Risk-based operation of plug-in electric vehicles in a microgrid using downside risk constraints method By www.inderscience.com Published On :: 2024-10-07T23:20:50-05:00 To achieve the benefits as much as possible, it is required to identify the available PEV capacity and prepare scheduling plans based on that. The analysis revealed that the risk-based scheduling of the microgrid could reduce the financial risk completely from $9.89 to $0.00 and increases the expected operation cost by 24% from $91.38 to $112.94, in turn. This implies that the risk-averse decision-maker tends to spend more money to reduce the expected risk-in-cost by using the proposed downside risk management technique. At the end, by the help of fuzzy satisfying method, the suitable risk-averse strategy is determined for the studied case. Full Article
id Adaptive terminal sliding mode control of a non-holonomic wheeled mobile robot By www.inderscience.com Published On :: 2024-10-07T23:20:50-05:00 In this paper, a second-order sliding mode adaptive controller with finite time stability is proposed for trajectory tracking of robotic systems. In order to reduce the chattering phenomenon in the response of the variable structure resistant controller, two dependent sliding surfaces are used. In the outer loop, a kinematic controller is used to compensate the geometric uncertainty of the robot, and in the inner loop, the proposed resistive control is used as the main loop. On the other hand, considering the dynamic uncertainty and disturbance of the robot, an adaptive strategy has been used to estimate the uncertainty limit during the control process in order to eliminate the need for basic knowledge to determine the uncertainty limit in the resistant structure. The proposed control method demonstrates significant enhancements in performance, with the linear velocity error improving by approximately 80%, leading to a more accurate and responsive system. Full Article
id Machine learning and deep learning techniques for detecting and mitigating cyber threats in IoT-enabled smart grids: a comprehensive review By www.inderscience.com Published On :: 2024-09-26T23:20:50-05:00 The confluence of the internet of things (IoT) with smart grids has ushered in a paradigm shift in energy management, promising unparalleled efficiency, economic robustness and unwavering reliability. However, this integrative evolution has concurrently amplified the grid's susceptibility to cyber intrusions, casting shadows on its foundational security and structural integrity. Machine learning (ML) and deep learning (DL) emerge as beacons in this landscape, offering robust methodologies to navigate the intricate cybersecurity labyrinth of IoT-infused smart grids. While ML excels at sifting through voluminous data to identify and classify looming threats, DL delves deeper, crafting sophisticated models equipped to counteract avant-garde cyber offensives. Both of these techniques are united in their objective of leveraging intricate data patterns to provide real-time, actionable security intelligence. Yet, despite the revolutionary potential of ML and DL, the battle against the ceaselessly morphing cyber threat landscape is relentless. The pursuit of an impervious smart grid continues to be a collective odyssey. In this review, we embark on a scholarly exploration of ML and DL's indispensable contributions to enhancing cybersecurity in IoT-centric smart grids. We meticulously dissect predominant cyber threats, critically assess extant security paradigms, and spotlight research frontiers yearning for deeper inquiry and innovation. Full Article
id Robust and secure file transmission through video streaming using steganography and blockchain By www.inderscience.com Published On :: 2024-09-26T23:20:50-05:00 File transfer is always handled by a separate service, sometimes it is a third-party service in videoconferencing. When sending files during a video session, file data flow and video stream are independent of each other. Encryption is a mature method to ensure file security. However, it still has the chance to leave footprints on the intermediate forwarding machines. These footprints can indicate that a file once passed through, some protocol-related logs give clues to the hackers' later investigation. This work proposes a file-sending scheme through the video stream using blockchain and steganography. Blockchain is used as a file slicing and linkage mechanism. Steganography is applied to embed file pieces into video frames that are continuously generated during the session. The scheme merges files into the video stream with no file transfer protocol use and no extra bandwidth consumed by the file to provide trackless file transmission during the video communication. Full Article
id Robust watermarking of medical images using SVM and hybrid DWT-SVD By www.inderscience.com Published On :: 2024-09-26T23:20:50-05:00 In the present scenario, the security of medical images is an important aspect in the field of image processing. Support vector machines (SVMs) are a supervised machine learning technique used in image classification. The roots of SVM are from statistical learning theory. It has gained excellent significance because of its robust, accurate, and very effective algorithm, even though it was applied to a small set of training samples. SVM can classify data into binary classification or multiple classifications according to the application's needs. Discrete wavelet transform (DWT) and singular value decomposition (SVD) transform techniques are utilised to enhance the image's security. In this paper, the image is first classified using SVM into ROI and RONI, and thereafter, to enhance the images diagnostic capabilities, the DWT-SVD-based hybrid watermarking technique is utilised to embed the watermark in the RONI region. Overall, our work makes a significant contribution to the field of medical image security by presenting a novel and effective solution. The results are evaluated using both perceptual and imperceptibility testing using PSNR and SSIM parameters. Different attacks were introduced to the watermarked image, which shows the efficacy and robustness of the proposed algorithm. Full Article
id An image encryption using hybrid grey wolf optimisation and chaotic map By www.inderscience.com Published On :: 2024-09-26T23:20:50-05:00 Image encryption is a critical and attractive issue in digital image processing that has gained approval and interest of many researchers in the world. A proposed hybrid encryption method was implemented by using the combination of the Nahrain chaotic map with a well-known optimised algorithm namely the grey wolf optimisation (GWO). It was noted from analysing the results of the experiments conducted on the new hybrid algorithm, that it gave strong resistance against expected statistical invasion as well as brute force. Several statistical analyses were carried out and showed that the average entropy of the encrypted images is near to its ideal information entropy. Full Article
id Form 10-K filing lags during COVID-19 pandemic By www.inderscience.com Published On :: 2024-09-05T23:20:50-05:00 This study examines Form 10-K filing lags of US firms during the COVID-19 pandemic in 2020-2021. The findings suggest that filing lags relate negatively to firm size, profitability, hiring Big4 auditors, and filing status, but positively to ineffective internal control, ineffective disclosure control, and going concern opinion. Large accelerated and accelerated filers had shorter filing lags, and non-accelerated filers had longer filing lags in 2020-2021 than 2018-2019. Further analysis provides mild evidence that Big4 auditors contributed to the filing lag reduction in 2020-2021, echoing the view that adopting advanced audit technologies allows Big4 auditors to respond better to the external shocks brought by the pandemic. Full Article
id What we know and do not know about video games as marketers: a review and synthesis of the literature By www.inderscience.com Published On :: 2024-10-02T23:20:50-05:00 The video game industry (VGI) has evolved considerably, transitioning from a niche market to a substantial sector. The VGI's magnitude and the societal implications tied to video game consumption have naturally piqued the interest of scholars in marketing and consumer behaviour. This research serves a dual purpose: firstly, it consolidates existing VG literature by evaluating articles, concepts, and methodologies, systematically tracing their evolution; secondly, it outlines potential directions and implications for forthcoming research. Within this literature, a predominant focus lies on articles investigating purchase decisions concerning VGs, followed by those exploring the integration of video game consumption into broader social contexts. Notably, a limited number of articles delve into player-game interactions and experiences within gaming worlds. This imbalance can be attributed to the fact that such inquiries are often suited to psychology and multidisciplinary journals, while the marketing discipline has predominantly addressed the VGI from a marketing management standpoint. Full Article
id Does brand association, brand attachment, and brand identification mediate the relationship between consumers' willingness to pay premium prices and social media marketing efforts? By www.inderscience.com Published On :: 2024-10-02T23:20:50-05:00 This study investigates the effects of social media marketing efforts (SMME) on smartphone brand identification, attachment, association, and willingness to pay premium prices. A survey of 320 smartphone users who followed official social media handles managed by smartphone companies was conducted for this purpose. PLS-SEM was used to analyse the collected data. The findings demonstrated importance of SMME dimensions. According to the study's findings, the smartphone brand's SMMEs had significant impact on brand identification, brand association, and brand attachment. The results revealed that SMMEs had significant impact on willingness to pay the premium price. The findings also show that brand identification, attachment, and association mediated the relationship between SMMEs and willingness to pay a premium price. The findings of this study will be useful in developing social media marketing strategies for smartphones. This study demonstrates the use of social media marketing to promote mobile phones, particularly in emerging markets. Full Article
id Business intelligence in human management strategies during COVID-19 By www.inderscience.com Published On :: 2024-10-01T23:20:50-05:00 The spread of COVID-19 results in disruption, uncertainty, complexity, and ambiguity in all businesses. Employees help companies achieve their aims. To manage human resources sustainably, analyse organisational strategy. This thorough research study attempts to find previously unidentified challenges, cutting-edge techniques, and surprising decisions in human resource management outside of healthcare organisations during the COVID-19 pandemic. The narrative review examined corporate human resource management measures to mitigate COVID-19. Fifteen publications were selected for the study after removing duplicates and applying the inclusion and exclusion criteria. This article examines HR's COVID-19 response. Human resource management's response to economic and financial crises has been extensively studied, but the COVID-19 pandemic has not. This paper reviewed the literature to reach its goal. The results followed the AMO framework for human resource policies and procedures and the HR management system. This document suggests COVID-19 pandemic-related changes to human resource management system architecture, policies, and practises. The study created a COVID-19 pandemic human resource management framework based on the literature. The COVID-19 pandemic had several negative effects, including social and behavioural changes, economic shock, and organisational disruption. Full Article
id E-bidding adoption among SMEs: evidence from an African emerging market By www.inderscience.com Published On :: 2024-10-01T23:20:50-05:00 While digitalisation reforms aiming to enhance the quality of public services were put in place, most stakeholders in developing countries still use paper-based-tendering processes, which are associated with increased costs. To overcome these problems, calls to adopt e-bidding have recently emerged. This study aims to explore the readiness of Moroccan SMEs to adopt e-bidding. To achieve this goal, we proposed an integrated framework combining the TAM and UTAUT models to examine the predictors of SMEs' intention to adopt e-bidding. We empirically tested the conceptual model using a partial least squares (PLS) estimation based on data from 210 SMEs. Our results suggest that effort expectancy, facilitating conditions, and social influence as the key factors influencing SMEs intention to adopt e-bidding. We also suggest firm size as a significant moderator. This will help in improving SMEs' user experience and will also allow a better implementation of e-bidding in Morocco and similar contexts. Full Article
id Computer aided translation technology based on edge computing intelligent algorithm By www.inderscience.com Published On :: 2024-07-02T23:20:50-05:00 To explore the computer-aided translation technology based on the intelligent algorithm of edge computing. This paper presents the research on computer-aided translation technology based on edge computing intelligent algorithm. In the K-means computer edge algorithm, it analyses the traditional way of average resource allocation and the way of virtual machine allocation. In the process of online solution, we have a more detailed understanding of the data information at the edge, and also avoid the connection relationship between network users and the platform, which has a certain impact on the internal operation efficiency of the system. The network user group is divided into several different types of existence through K-means computer algorithm, and various information resources are counted according to their own characteristics. Computer-aided translation technology can significantly improve the quality of translation, improve the translation efficiency, and reduce the translation cost. Full Article
id Uncovering the keys to well-being: calling, mindfulness, and compassion among healthcare professionals in India amidst the post-COVID crisis By www.inderscience.com Published On :: 2024-10-07T23:20:50-05:00 This study investigates the well-being of healthcare professionals in India, with a specific focus on the detrimental effects of the pandemic on their mental and physical health, including stress, burnout, and fatigue. This research examines the roles played by calling, mindfulness, and compassionate love as essential resources in promoting the well-being of healthcare professionals. Utilising structural equation modelling (SEM), the results reveal a significant cause and effect relationship between calling, mindfulness, and compassionate love and their influence on overall well-being. Furthermore, the study identifies a noteworthy parallel mediation effect, demonstrating that mindfulness and compassionate love serve as mediators in the relationship between calling and well-being. This research offers practitioners invaluable insights into the effective utilisation of mindfulness and compassionate love practices to enhance the overall well-being of healthcare professionals. Full Article
id Do authentic leaders influence innovative work behaviour? An empirical evidence By www.inderscience.com Published On :: 2024-10-07T23:20:50-05:00 The purpose of this research is to investigate how genuine leaders impact the creativity and innovative behaviour (IWB) of information technology (IT) employees. It also examines the impact of perceived organisational support as a mediator in the correlations between authentic leadership as well as innovative behaviours. This study explores the influence of authentic leadership via the employee's IWB using aspects from social exchange theory as well as social cognitive theory. The data was collected from a sample of 487 employees of the IT sector in India. The partial least square method is applied to test the structural relationship of the research framework. Findings reveal that authentic leadership positively impact innovative work behaviour and perceived organisation support mediates authentic leadership and IWB. Additionally, when organisations and leaders support the employees and value their creative thinking then the employee replicates IWB in the organisation. The practical and theoretical implications are discussed. Full Article
id E-recruitment adoption among job-seekers: role of vividness and perceived internet stress in shaping their intentions By www.inderscience.com Published On :: 2024-11-11T23:20:50-05:00 Drawn from technology acceptance model, this study establishes a theoretical framework for the analytical interpretation of factors affecting job-seekers intention to use e-recruitment websites. Using the data obtained from 379 respondents in India, ten hypotheses derived from the experimental model are evaluated using a structural equation modelling technique. Vividness, perceived usefulness (PU), and attitude have been shown to have a significant positive impact on the behavioural intentions (BIs) of job-seekers, although perceived ease of use (PEOU) did not. Furthermore, perceived internet stress (PIS) is observed to be a significant antecedent PEOU; and PEOU is of PU. Such findings broaden our knowledge of e-recruiting in various ways and offer qualitative insights into the potential impact of website functionality on the attractiveness of job-seekers. Full Article
id Towards a set of guidelines for software development in start-ups By www.inderscience.com Published On :: 2024-11-11T23:20:50-05:00 Software start-ups generally use development practices that are adapted to their agile and innovative environment. However, these practices, although consolidated, may not be the best ones for a specific context. This paper aims to present a set of guidelines for software development in start-ups. It also aims to show the results of three studies to validate and refine the proposed guidelines: a confirmatory survey, a focus group, and an expert panel. The participants were actors from both the industry and the academia. The results revealed that the guidelines obtained a positive perception from the participants of both contexts. Based on their approval, we can infer that those guidelines can increase the quality of products generated by start-ups and the chances of success for these organisations. Besides, the need for some improvements has been identified, and they will be implemented in the next version of the guidelines. Full Article
id Does smartphone usage affect academic performance during COVID outbreak? By www.inderscience.com Published On :: 2024-10-02T23:20:50-05:00 Pandemic has compelled the entire world to change their way of life and work. To control the infection rate, academic institutes deliver education online similarly. At least one smartphone is available in every home, and students use their smartphones to attend class. The study investigates the link between smartphone usage (SU) and academic performance (AP) during the pandemic. 490 data were obtained from various institutions and undergraduate students using stratified random sampling. These components were identified using factor analysis and descriptive methods, while the relationship of SU and AP based on gender classification was tested using Smart-PLS-SEM. The findings show that SU has a substantial relationship with academic success, whether done in class or outside of it. Even yet, the study found that SU and AP significantly impact both male and female students. Furthermore, the research focuses on SU outside and within the classroom to improve students' AP. Full Article
id Encouraging Girls to Consider a Career in ICT: A Review of Strategies By Published On :: Full Article
id Straddling the Divide: Towards an Associate Degree in Information Technology By Published On :: Full Article
id Didactics of Information Technology (IT) in a Science Degree: Conceptual Issues and Practical Application By Published On :: Full Article
id Digital Bridge or Digital Divide? A Case Study Review of the Implementation of the ‘Computers for Pupils Programme’ in a Birmingham Secondary School By Published On :: Full Article
id A Hybrid Approach for Selecting a Course Management System: A Case Study By Published On :: Full Article
id Enhancing Classroom Learning Experience by Providing Structures to Microblogging-based Activities By Published On :: Full Article
id A Template-Based Short Course Concept on Android Application Development By Published On :: Full Article
id Web Annotation and Threaded Forum: How Did Learners Use the Two Environments in an Online Discussion? By Published On :: Full Article
id Evaluating the Acceptability and Usability of EASEL: A Mobile Application that Supports Guided Reflection for Experiential Learning Activities By Published On :: 2017-07-28 Aim/Purpose: To examine the early perceptions (acceptability) and usability of EASEL (Education through Application-Supported Experiential Learning), a mobile platform that delivers reflection prompts and content before, during, and after an experiential learning activity. Background: Experiential learning is an active learning approach in which students learn by doing and by reflecting on the experience. This approach to teaching is often used in disciplines such as humanities, business, and medicine. Reflection before, during, and after an experience allows the student to analyze what they learn and why it is important, which is vital in helping them to understand the relevance of the experience. A just-in-time tool (EASEL) was needed to facilitate this. Methodology: To inform the development of a mobile application that facilitates real-time guided reflection and to determine the relevant feature set, we conducted a needs analysis with both students and faculty members. Data collected during this stage of the evaluation helped guide the creation of a prototype. The user experience of the prototype and interface interactions were evaluated during the usability phase of the evaluation study. Contribution: Both the needs analysis and usability assessment provided justification for continued development of EASEL as well as insight that guides current development. Findings: The interaction design of EASEL is understandable and usable. Both students and teachers value an application that facilitates real-time guided reflection. Recommendations for Practitioners: The use of a system such as EASEL can leverage time and location-based services to support students in field experiences. This technology aligns with evidence that guided reflection provides opportunities for metacognition. Recommendation for Researchers: Iterative prototyping, testing, and refinement can lead to a deliberate and effective app development process. Impact on Society: The EASEL platform leverages inherent functionality of mobile devices, such as GPS and persistent network connectivity, to adapt reflection tasks based on lo-cation or time. Students using EASEL will engage in guided reflection, which leads to metacognition and can help instructors scaffold learning Future Research: We will continue to advance the application through iterative testing and development. When ready, the application will be vetted in larger studies across varied disciplines and contexts. Full Article
id Enhancing Children's Interest and Knowledge in Bioengineering through an Interactive Videogame By Published On :: 2018-03-09 Aim/Purpose: Bioengineering is a burgeoning interdisciplinary learning domain that could inspire the imaginations of elementary aged children but is not traditionally taught to this age group for reasons unrelated to student ability. This pilot study presents the BacToMars videogame and accompanying curricular intervention, designed to introduce children (aged 7-11) to foundational concepts of bioengineering and to the interdisciplinary nature of scientific endeavors. Background: This pilot study explores the bioengineering-related learning outcomes and attitudes of children after engaging with the BacToMars game and curriculum intervention. Methodology: This study drew on prior findings in game-based learning and applied them to a videogame designed to connect microbiology with Constructionist microworlds. An experimental comparison showed the learning and engagement affordances of integrating this videogame into a mixed-media bioengineering curriculum. Elementary-aged children (N = 17) participated in a 9-hour learning intervention, with one group of n = 8 children receiving the BacToMars videogame and the other group (n = 9) receiving traditional learning activities on the same content. Pre- and post-surveys and interview data were collected from both groups. Contribution: This paper contributes to education research on children’s ability to meaningfully engage with abstract concepts at the intersection of science and engineering through bioengineering education, and to design research on developing educational technology for introducing bioengineering content to elementary school children. Findings: Children in both groups showed improved knowledge and attitudes related to bioengineering. Children who used BacToMars showed slightly stronger performance on game-specific concepts, while children in the control condition showed slightly higher generalized knowledge of bioengineering concepts. Recommendations for Practitioners: Practitioners should consider bioengineering as a domain for meaningful, interdisciplinary learning in elementary education.. Recommendation for Researchers: Design researchers should develop playful ways to introduce bioengineering concepts accurately and to engage children’s imaginations and problem-solving skills. Education researchers should further investigate developmentally appropriate ways to introduce bioengineering in elementary education. Impact on Society: BacToMars introduces a meaningful scenario to contextualize complex con-cepts at the intersection of science and engineering, and to engage children in real-world, interdisciplinary problem solving. Future Research: Future research should explore BacToMars and bioengineering curricula for elementary-aged children in larger samples, with longer intervention times. Full Article
id Delving into the Specificity of Instructional Guidance in Social Media-supported Learning Environments By Published On :: 2018-03-02 Aim/Purpose: This study investigates the variations in student participation patterns across different types of instructional activities, learning modes, and with different instructional guidance approaches. In the current study, different variables, modes of learning (guided versus unguided), and types of guidance (social versus cognitive) were manipulated in a series of microblogging-supported collaborative learning tasks to examine to what extent and in which aspects instructional guidance affects the effectiveness and student perception of microblogging-supported learning. Background: Despite the overwhelming agreement on the importance of instructional guidance in microblogging-supported learning environments, very few studies have been done to examine the specificity of guidance, such as how to structure and support microblogging activities, as well as what types of guidance are appropriate in what learning contexts. Methodology: This semester-long study utilized a case-study research design via a multi-dimensional approach in a hybrid classroom with both face-to-face and online environments. Tweets were collected from four types of activities and coded based on content within their contextual setting. Twenty-four college students participated in the study. Contribution: In response to the call to improve social media learning environments under-scored in contemporary education, the current case study took an initial step aiming at deepening the understanding of the role of instructional guidance in microblogging-supported learning environments. Findings: This study showcases that with instructor facilitation, students succeeded in being engaged in a highly participatory and interactive learning experience across a variety of tasks and activities. This study indicates that students’ perspectives of social media tools rely heavily on what instructors do with the tool and how the instructional activities are structured and supported. Instructors’ scaffolding and support is instrumental in keeping students on task and engaging students with meaningful events, thus ensuring the success of microblogging-based learning activities. Meanwhile, students’ perception of usefulness of instructional guidance is closely related to their own pre-perception and experience. Recommendations for Practitioners: When incorporating social media tools, it is important to examine learner’s prior knowledge and comfort level with these tools and tailor the design of instructional activities to their attributes. It is also vital to monitor student progress, adjust the type and amount of guidance and scaffolding provided as they progress, and eventually remove the scaffolding until students can demonstrate that they can perform the task successfully without assistance. Recommendation for Researchers: Due to many other potential factors in place that could potentially influence student learning, no conclusive remarks can be made regarding the superiority of either one type of guidance approach. Future researchers should continue to develop robust research methodologies to seek ways to better operationalize this variable and strive to understand its effect. Future Research: Future replication studies in other settings, with a larger sample size, and different populations will certainly provide further insights on the effects of instructional guidance in microblogging-based learning. Alternative coding methods may also shed light on differences in student interaction in terms of content diversity and depth of learning when analyzing the tweets. Advanced data collection techniques may be explored to ascertain the completeness of data collection. Full Article
id Creatıng Infographics Based on the Bridge21 Model for Team-based and Technology-mediated Learning By Published On :: 2019-08-21 Aim/Purpose: The main aim of this study was modeling a collaborative process for knowledge visualization, via the creation of infographics. Background: As an effective method for visualizing complex information, creating infographics requires learners to generate and cultivate a deep knowledge of content and enables them to concisely visualize and share this knowledge. This study investigates creating infographics as a knowledge visualization process for collaborative learning situations by integrating the infographic design model into the team-based and technology-mediated Bridge21 learning model. Methodology: This study was carried out using an educational design perspective by conducting three main cycles comprised of three micro cycles: analysis and exploration; design and construction; evaluation and reflection. The process and the scaffolding were developed and enhanced from cycle to cycle based on both qualitative and quantitative methods by using the infographic design rubric and researcher observations acquired during implementation. Respectively, twenty-three, twenty-four, and twenty-four secondary school students participated in the infographic creation process cycles. Contribution: This research proposes an extensive step-by-step process model for creating infographics as a method of visualization for learning. It is particularly relevant for working with complex information, in that it enables collaborative knowledge construction and sharing of condensed knowledge. Findings: Creating infographics can be an effective method for collaborative learning situations by enabling knowledge construction, visualization and sharing. The Bridge21 activity model constituted the spine of the infographic creation process. The content generation, draft generation, and visual and digital design generation components of the infographic design model matched with the investigate, plan and create phases of the Bridge21 activity model respectively. Improvements on infographic design results from cycle to cycle suggest that the revisions on the process model succeeded in their aims. The rise in each category was found to be significant, but the advance in visual design generation was particularly large. Recommendations for Practitioners: The effectiveness of the creation process and the quality of the results can be boosted by using relevant activities based on learner prior knowledge and skills. While infographic creation can lead to a focus on visual elements, the importance of wording must be emphasized. Being a multidimensional process, groups need guidance to ensure effective collaboration. Recommendation for Researchers: The proposed collaborative infographic creation process could be structured and evaluated for online learning environments, which will improve interaction and achievement by enhancing collaborative knowledge creation. Impact on Society: In order to be knowledge constructors, innovative designers, creative communicators and global collaborators, learners need to be surrounded by adequate learning environments. The infographic creation process offers them a multidimensional learning situation. They must understand the problem, find an effective way to collect information, investigate their data, develop creative and innovative perspectives for visual design and be comfortable for using digital creation tools. Future Research: The infographic creation process could be investigated in terms of required learner prior knowledge and skills, and could be enhanced by developing pre-practices and scaffolding. Full Article
id Innovative Pedagogical Strategies of Streaming, Just-in-Time Teaching, and Scaffolding: A Case Study of Using Videos to Add Business Analytics Instruction Across a Curriculum By Published On :: 2021-01-29 Aim/Purpose: Business analytics is a cross-functional field that is important to implement for a college and has emerged as a critically important core component of the business curriculum. It is a difficult task due to scheduling concerns and limits to faculty and student resources. This paper describes the process of creating a central video repository to serve as a platform for just in time teaching and the impact on student learning outcomes. Background: Industry demand for employees with analytical knowledge, skills, and abilities requires additional analytical content throughout the college of business curriculum. This demand needs other content to be added to ensure that students have the prerequisite skills to complete assignments. Two pedagogical approaches to address this issue are Just-in-Time Teaching (JiTT) and scaffolding, grounded in the Vygoskian concept of “Zone of Proximal Development. Methodology: This paper presents a case study that applies scaffolding and JiTT teaching to create a video repository to add business analytics instruction to a curriculum. The California Critical Thinking Skills Test (CCTST) and Major Field Test (MFT) scores were analyzed to assess learning outcomes. Student and faculty comments were considered to inform the results of the review. Contribution: This paper demonstrates a practical application of scaffolding and JiTT theory by outlining the process of using a video library to provide valuable instructional resources that support meaningful learning, promote student academic achievement, and improve program flexibility. Findings: A centrally created library is a simple and inexpensive way to provide business analytics course content, augmenting standard content delivery. Assessment of learning scores showed an improvement, and a summary of lessons learned is provided to guide implications. Recommendations for Practitioners: Pedagogical implications of this research include the observation that producing a central library of instructor created videos and assignments can help address knowledge and skills gaps, augment the learning of business analytics content, and provide a valuable educational resource throughout the college of business curriculum. Recommendation for Researchers: This paper examines the use of scaffolding and JiTT theories. Additional examination of these theories may improve the understanding and limits of these concepts as higher education evolves due to the combination of market forces changing the execution of course delivery. Impact on Society: Universities are tasked with providing new and increasing skills to students while controlling the costs. A centrally created library of instructional videos provides a means of delivering meaningful content while controlling costs. Future Research: Future research may examine student success, including the immediate impact of videos and longitudinally using video repositories throughout the curriculum. Studies examining the approach across multiple institutions may help to evaluate the success of video repositories. Faculty acceptance of centrally created video libraries and assignments should be considered for the value of faculty recruiting and use in the classroom. The economic impact on both the university and students should be evaluated. Full Article
id Knowledge Management Applied to Learning English as a Second Language Through Asynchronous Online Instructional Videos By Published On :: 2022-09-14 Aim/Purpose: The purpose of this research is to determine whether ESL teaching videos as a form of asynchronous online knowledge sharing can act as an aid to ESL learners internalizing knowledge in language acquisition. In this context, internalizing knowledge carries the meaning of being able to remember language, and purposefully and accurately use it context, including appropriacy of language, and aspects of correct pronunciation, intonation, stress patterns and connected speech, these being the elements of teaching and practice that are very often lacking in asynchronous, online, instructional video. Background: Knowledge Management is the field of study, and the practice, of discovering, capturing, sharing, and applying knowledge, typically with a view to translating individuals’ knowledge into organizational knowledge. In the field of education, it is the sharing of instructors’ knowledge for students to be able to learn and usefully apply that knowledge. In recent pandemic times, however, the mode of instruction has, of necessity, transitioned from face-to-face learning to an online environment, transforming the face of education as we know it. While this mode of instruction and knowledge sharing has many advantages for the online learner, in both synchronous and asynchronous learning environments, it presents certain challenges for language learners due to the absence of interaction and corrective feedback that needs to take place for learners of English as a Second Language (ESL) to master language acquisition. Unlike other subjects where the learner has recourse to online resources to reinforce learning through referencing external information, such as facts, figures, or theories, to be successful in learning a second language, the ESL learner needs to be able to learn to process thought and speech in that language; essentially, they need to learn to think in another language, which takes time and practice. Methodology: The research employs a systematic literature review (SLR) to determine the scope and extent to which the subject is covered by existing research in this field, and the findings thereof. Contribution: Whilst inconclusive in relation to internalizing language through online, asynchronous instructional video, through its exploratory nature, the research contributes towards the body of knowledge in online learning through the drawing together of various studies in the field of learning through asynchronous video through improving video and instructional quality. Findings: The findings of the systematic literature review revealed that there is negligible research in this area, and while information exists on blended and flipped modes of online learning, and ways to improve the quality and delivery of instructional video generally, no prior research on the exclusive use of asynchronous videos as an aid to internalizing English as a second language were found. Recommendations for Practitioners: From this research, it is apparent that there is considerably more that practitioners can do to improve the quality of instructional videos that can help students engage with the learning, from which students stand a much better chance of internalizing the learning. Recommendation for Researchers: For researchers, the absence of existing research is an exciting opportunity to further explore this field. Impact on Society: Online learning is now globally endemic, but it poses specific challenges in the field of second language learning, so the development of instructional videos that can facilitate this represents a clear benefit to all ESL learners in society as a whole. Future Research: Clearly the absence of existing research into whether online asynchronous instructional videos can act as an aid to internalizing the acquisition of English as a second language would indicate that this very specific field is one that merits future research. Indeed, it is one that the author intends to exploit through primary data collection from the production of a series of asynchronous, online, instructional videos. Full Article
id COVID-19 Pandemic and the Use of Emergency Remote Teaching (ERT) Platforms: Lessons From a Nigerian University By Published On :: 2023-07-27 Aim/Purpose: This study examines the use of the Emergency Remote Teaching (ERT) platform by undergraduates of the University of Ibadan, Nigeria, during the COVID-19 pandemic using the constructs of the UTAUT2 model. Five constructs of the UTAUT2 model were adopted to investigate the use of the ERT platform by undergraduates of the university. Background: The Coronavirus (COVID-19) outbreak disrupted academic activities in educational institutions, leading to an unprecedented school closure globally. In response to the pandemic, higher educational institutions adopted different initiatives aimed at ensuring the uninterrupted flow of their teaching and learning activities. However, there is little research on the use of ERT platforms by undergraduates in Nigerian universities. Methodology: The descriptive survey research design was adopted for the study. The multi-stage random sampling technique was used to select 334 undergraduates at the University of Ibadan, Nigeria, while a questionnaire was used to collect data from 271 students. Quantitative data were collected and analyzed using frequency counts, percentages, mean and standard deviation, Pearson Product Moment Correlation, and regression analysis. Contribution: The study contributes to understanding ERT use in the educational institutions of Nigeria – Africa’s most populous country. Furthermore, the study adds to the existing body of knowledge on how the UTAUT2 Model could explain the use of information technologies in different settings. Findings: Findings revealed that there was a positive significant relationship between habit, hedonic motivation, price value, and social influence on the use of ERT platforms by undergraduates. Hedonic motivation strongly predicted the use of ERT platforms by most undergraduates. Recommendations for Practitioners: As a provisional intervention in times of emergencies, the user interface, navigation, customization, and other aesthetic features of ERT platforms should be more appealing and enjoyable to ensure their optimum utilization by students. Recommendation for Researchers: More qualitative research is required on users’ satisfaction, concerns, and support systems for ERT platforms in educational institutions. Future studies could consider the use of ERT by students in different countries and contexts such as students participating in English as a Foreign Language (EFL) and the English for Speakers of other languages (ESOL) programs. Impact on Society: As society faces increased uncertainties of the next global pandemic, this article reiterates the crucial roles of information technology in enriching teaching and learning activities in educational institutions. Future Research: Future research should focus on how different technology theories and models could explain the use of ERT platforms at different educational institutions in other geographical settings and contexts. Full Article
id A forensic approach: identification of source printer through deep learning By www.inderscience.com Published On :: 2024-10-07T23:20:50-05:00 Forensic document forgery investigations have elevated the need for source identification for printed documents during the past few years. It is necessary to create a reliable and acceptable safety testing instrument to determine the credibility of printed materials. The proposed system in this study uses a neural network to detect the original printer used in forensic document forgery investigations. The study uses a deep neural network method, which relies on the quality, texture, and accuracy of images printed by various models of Canon and HP printers. The datasets were trained and tested to predict the accuracy using logical function, with the goal of creating a reliable and acceptable safety testing instrument for determining the credibility of printed materials. The technique classified the model with 95.1% accuracy. The proposed method for identifying the source of the printer is a non-destructive technique. Full Article
id Android malware analysis using multiple machine learning algorithms By www.inderscience.com Published On :: 2024-10-07T23:20:50-05:00 Currently, Android is a booming technology that has occupied the major parts of the market share. However, as Android is an open-source operating system there are possibilities of attacks on the users, there are various types of attacks but one of the most common attacks found was malware. Malware with machine learning (ML) techniques has proven as an impressive result and a useful method for malware detection. Here in this paper, we have focused on the analysis of malware attacks by collecting the dataset for the various types of malware and we trained the model with multiple ML and deep learning (DL) algorithms. We have gathered all the previous knowledge related to malware with its limitations. The machine learning algorithms were having various accuracy levels and the maximum accuracy observed is 99.68%. It also shows which type of algorithm is preferred depending on the dataset. The knowledge from this paper may also guide and act as a reference for future research related to malware detection. We intend to make use of Static Android Activity to analyse malware to mitigate security risks. Full Article
id The authenticity of digital evidence in criminal courts: a comparative study By www.inderscience.com Published On :: 2024-10-07T23:20:50-05:00 Scientific progress has a significant impact on both reality and the law that applies to it. As the ICT system has positive points that are considered an added value to it, it made it easier for people to perform their tasks and facilitate interpersonal communication for individuals, saved effort and money, and reduced the time needed to accomplish part of the duties. However, at the same time, it has become a means of committing offences and a fertile space for the existence of offence, to the extent that offence in our current era has become the result of intermarriage between human intelligence and artificial intelligence. Thus, the issue of proving cybercrimes requires a deep exploration in the notion of the authenticity of audio evidence obtained from electronic searches, as well as the process of eavesdropping and recording phone calls, and the use of expert and inspection procedures in criminal lawsuits and its impact on proof before the criminal courts. Full Article
id Honeybrid method for network security in a software defined network system By www.inderscience.com Published On :: 2024-10-07T23:20:50-05:00 This research introduces a hybrid honeypot architecture to bolster security within software-defined networks (SDNs). By combining low-interaction and high-interaction honeypots, the proposed solution effectively identifies and mitigates cyber threats, including port scanning and man-in-the-middle attacks. The architecture is structured into multiple modules that focus on detecting open ports using Vilhala honeypots and simulating targeted and random attack scenarios. This hybrid approach enables comprehensive monitoring and detailed packet-level analysis, providing enhanced protection against advanced online threats. The study also conducts a comparative analysis of different attack detection methods using tools like KFSensor and networking shell commands. The results highlight the hybrid honeypot system's efficacy in filtering malicious traffic and detecting security breaches, making it a robust solution for safeguarding SDNs. Full Article
id Identification of badminton players' swinging movements based on improved dense trajectory algorithm By www.inderscience.com Published On :: 2024-10-14T23:20:50-05:00 Badminton, as a fast and highly technical sport, requires high accuracy in identifying athletes' swing movements. Accurately identifying different swing movements is of great significance for technical analysis, coach guidance, and game evaluation. To improve the recognition accuracy of badminton players' swing movements, this text is based on an improved dense trajectory algorithm to improve the accuracy of recognising badminton players' swing movements. The features are efficiently extracted and encoded. The results on the KTH, UCF Sports, and Hollywood2 datasets demonstrated that the improved algorithm achieved recognition accuracy of 94.2%, 88.2%, and 58.3%, respectively. Compared to traditional methods, the innovation of research lies in optimised feature extraction methods, efficient algorithm design, and accurate action recognition. These results provide new ideas for the research and application of badminton swing motion recognition. Full Article
id Development and validation of scale to measure minimalism - a study analysing psychometric assessment of minimalistic behaviour! Consumer perspective By www.inderscience.com Published On :: 2024-11-11T23:20:50-05:00 This research aims to establish a valid and accurate measurement scale and identify consumer-driven characteristics for minimalism. The study has employed a hybrid approach to produce items for minimalism. Expert interviews were conducted to identify the items for minimalism in the first phase followed by consumer survey to obtain their response in second phase. A five-point Likert scale was used to collect the data. Further, data was subjected to reliability and validity check. Structural equation modelling was used to test the model. The findings demonstrated that there are five dimensions by which consumers perceive minimalism: decluttering, mindful consumption, aesthetic choices, financial freedom, and sustainable lifestyle. The outcome also revealed a high correlation between simplicity and well-being. This study is the first to provide a reliable and valid instrument for minimalism. The results will have several theoretical and practical ramifications for society and policymakers. It will support policymakers in gauging and encouraging minimalistic practices, which enhance environmental performance and lower carbon footprint. Full Article
id Unsupervised VAD method based on short-time energy and spectral centroid in Arabic speech case By www.inderscience.com Published On :: 2024-10-03T23:20:50-05:00 Voice Activity Detection (VAD) distinguishes speech segments from noise or silence areas. An efficient and noise-robust VAD system can be widely used for emerging speech technologies such as wireless communication and speech recognition. In this paper, we propose two versions of an unsupervised Arabic VAD method based on the combination of the Short-Time Energy (STE) and the Spectral Centroid (SC) features for formulating a typical threshold to detect speech areas. The first version compares only the STE feature to the threshold (STE-VAD). In contrast, the second compares the SC vector and the threshold (SC-VAD). The two versions of our VAD method were tested on 770 sentences of the Arabphone corpus, which were recorded in clean and noisy environments and evaluated under different values of Signal-to-Noise-Ratio. The experiments demonstrated the robustness of the STE-VAD in terms of accuracy and Mean Square Error. Full Article
id Case study: when a bright idea creates a business dilemma By www.inderscience.com Published On :: 2024-06-24T23:20:50-05:00 Bright Lights has a history of success, but is at a pivotal point, facing the pains of strategic change. One salesperson has found a way to maintain sales and increase profit margin, but it requires operating between the lines of ethical boundaries. Ethics provides a choice between right and right as opposed to moral temptation of right and wrong (Kidder, 1996). As the case unfolds, Jim receives a mandate of which customers he can call on, reducing sales, profit margin, and customer satisfaction. A top performer, Jim finds a solution within company policy and the law, but although not hidden, is not entirely transparent. This creates two ethical decisions: 1) Should he be reprimanded or praised? 2) Should the company update policies to ban his actions, or promote his actions among other salespeople? This case clearly strikes the dilemma found in navigating the boundaries of a questionable business strategy. Full Article
id COVID-19 disruptions driving sustainable tourism: a case of the Hawaiian tourism industry By www.inderscience.com Published On :: 2024-06-24T23:20:50-05:00 This study inquires about the COVID-19-generated momentum and how it resulted in transformative opportunities for the hard-hit tourism industry in Hawai'i. It also investigates the type of sustainability-based management strategies that were favoured by actors from the industry to help navigate uncertain times and capture transformative opportunities. Findings indicate that actors from the tourism industry in Hawai'i perceived the COVID-19 pandemic as a huliau, or a point of transformation, to reflect and re-evaluate the tourism industry's responsibility and shift toward a recovery focused on sustainability. This research confirms that the pandemic-driven momentum accelerated opportunities for changing and transforming traditional business models and indicators of progress within the tourism industry in Hawai'i. Further research may explore additional Pacific Island countries to gain a deeper understanding of the problem within the region's context. Full Article
id Quantitative evaluation method of ideological and political teaching achievements based on collaborative filtering algorithm By www.inderscience.com Published On :: 2024-07-04T23:20:50-05:00 In order to overcome the problems of large error, low evaluation accuracy and long evaluation time in traditional evaluation methods of ideological and political education, this paper designs a quantitative evaluation method of ideological and political education achievements based on collaborative filtering algorithm. First, the evaluation index system is constructed to divide the teaching achievement evaluation index data in a small scale; then, the quantised dataset is determined and the quantised index weight is calculated; finally, the collaborative filtering algorithm is used to generate a set with high similarity, construct a target index recommendation list, construct a quantitative evaluation function and solve the function value to complete the quantitative evaluation of teaching achievements. The results show that the evaluation error of this method is only 1.75%, the accuracy can reach 98%, and the time consumption is only 2.0 s, which shows that this method can improve the quantitative evaluation effect. Full Article
id A risk identification method for abnormal accounting data based on weighted random forest By www.inderscience.com Published On :: 2024-07-04T23:20:50-05:00 In order to improve the identification accuracy, accuracy and time-consuming of traditional financial risk identification methods, this paper proposes a risk identification method for financial abnormal data based on weighted random forest. Firstly, SMOTE algorithm is used to collect abnormal financial data; secondly, the original accounting data is decomposed into features, and the features of abnormal data are extracted through random forests; then, the index weight is calculated according to the entropy weight method; finally, the negative gradient fitting is used to determine the loss function, and the weighted random forest method is used to solve the loss function value, and the recognition result is obtained. The results show that the identification accuracy of this method can reach 99.9%, the accuracy rate can reach 96.06%, and the time consumption is only 6.8 seconds, indicating that the risk identification effect of this method is good. Full Article
id Online allocation of teaching resources for ideological and political courses in colleges and universities based on differential search algorithm By www.inderscience.com Published On :: 2024-07-04T23:20:50-05:00 In order to improve the classification accuracy and online allocation accuracy of teaching resources and shorten the allocation time, this paper proposes a new online allocation method of college ideological and political curriculum teaching resources based on differential search algorithm. Firstly, the feedback parameter model of teaching resources cleaning is constructed to complete the cleaning of teaching resources. Secondly, according to the results of anti-interference consideration, the linear feature extraction of ideological and political curriculum teaching resources is carried out. Finally, the online allocation objective function of teaching resources for ideological and political courses is constructed, and the differential search algorithm is used to optimise the objective function to complete the online allocation of resources. The experimental results show that this method can accurately classify the teaching resources of ideological and political courses, and can shorten the allocation time, with the highest allocation accuracy of 97%. Full Article
id Risk assessment method of power grid construction project investment based on grey relational analysis By www.inderscience.com Published On :: 2024-07-04T23:20:50-05:00 In view of the problems of low accuracy, long time consuming and low efficiency of the existing engineering investment risk assessment method; this paper puts forward the investment risk assessment method of power grid construction project based on grey correlation analysis. Firstly, classify the risks of power grid construction project; secondly, determine the primary index and secondary index of investment risk assessment of power grid construction project; then construct the correlation coefficient matrix of power grid project investment risk to calculate the correlation degree and weight of investment risk index; finally, adopt the grey correlation analysis method to construct investment risk assessment function to realise investment risk assessment. The experimental results show that the average accuracy of evaluating the investment risk of power grid construction projects using the method is 95.08%, and the maximum time consuming is 49 s, which proves that the method has high accuracy, short time consuming and high evaluation efficiency. Full Article
id Student's classroom behaviour recognition method based on abstract hidden Markov model By www.inderscience.com Published On :: 2024-07-04T23:20:50-05:00 In order to improve the standardisation of mutual information index, accuracy rate and recall rate of student classroom behaviour recognition method, this paper proposes a student's classroom behaviour recognition method based on abstract hidden Markov model (HMM). After cleaning the students' classroom behaviour data, improve the data quality through interpolation and standardisation, and then divide the types of students' classroom behaviour. Then, in support vector machine, abstract HMM is used to calculate the output probability density of support vector machine. Finally, according to the characteristic interval of classroom behaviour, we can judge the category of behaviour characteristics. The experiment shows that normalised mutual information (NMI) index of this method is closer to one, and the maximum AUC-PR index can reach 0.82, which shows that this method can identify students' classroom behaviour more effectively and reliably. Full Article
id A prototype for intelligent diet recommendations by considering disease and medical condition of the patient By www.inderscience.com Published On :: 2024-10-07T23:20:50-05:00 The patient must follow a good diet to lessen the risk of health conditions. The body needs vitamins, minerals, and nutrients for illness prevention. When the human body does not receive the right amount of nutrients, nutritional disorders can develop, which can cause a number of different health issues. Chronic diseases like diabetes and hypertension can be brought on by dietary deficiencies. The human body receives the nutrients from a balanced diet to function properly. This research has a prototype that enables patients to find nutritious food according to their health preferences. It suggests meals based on their preferences for nutrients such as protein, fibre, high-fibre, low-fat, etc., and diseases such as pregnancy and diabetes. The process implements the recommendation based on the patient's profile (content-relied, K-NN), recommendation relied on patients with similar profiles, and recommendation based on the patient's past or recent activity. Full Article