nc Emotional intelligence and managerial leadership in the fast moving consumer durable goods industry in India's perspective By www.inderscience.com Published On :: 2024-10-30T23:20:50-05:00 Dynamic nature of the FMCG sector perpetually provides a tricky challenge for organisational leaders to nurture their employees. High demand for products, less shelf life and tough competitors always challenge the leaders to uphold their products in the market. Due to technology and e-commerce, many new competitors have joined the market, vying with the industry's veterans. Due to their unique business models that match client needs, these firms are expected to boost FMCG industry income in the future. Managers' leadership styles depend primarily on emotional intelligence. This quantitative study examines how emotional intelligence influences West Bengal FMCG senior managers' leadership styles. 500 FMCG managers were selected. PLS-SEM is used to study. Emotionally competent leaders choose transactional and transformational leadership styles depending on the occasion. Managers' transactional leadership style is strongly influenced by their sympathetic awareness, as shown by a path coefficient of 0.755. Transformational leadership style has a path coefficient of 0.693, indicating that managers' empathy affects their organisational management. Thus, sympathetic awareness and emotion regulation predict good management leadership. Full Article
nc An evaluation of English distance information teaching quality based on decision tree classification algorithm By www.inderscience.com Published On :: 2024-07-04T23:20:50-05:00 In order to overcome the problems of low evaluation accuracy and long evaluation time in traditional teaching quality evaluation methods, a method of English distance information teaching quality evaluation based on decision tree classification algorithm is proposed. Firstly, construct teaching quality evaluation indicators under different roles. Secondly, the information gain theory in decision tree classification algorithm is used to divide the attributes of teaching resources. Finally, the rough set theory is used to calculate the index weight and establish the risk evaluation index factor set. The result of teaching quality evaluation is obtained through fuzzy comprehensive evaluation method. The experimental results show that the accuracy rate of the teaching quality evaluation of this method can reach 99.2%, the recall rate of the English information teaching quality evaluation is 99%, and the time used for the English distance information teaching quality evaluation of this method is only 8.9 seconds. Full Article
nc The performance evaluation of teaching reform based on hierarchical multi-task deep learning By www.inderscience.com Published On :: 2024-07-04T23:20:50-05:00 The research goal is to solve the problems of low accuracy and long time existing in traditional teaching reform performance evaluation methods, a performance evaluation method of teaching reform based on hierarchical multi-task deep learning is proposed. Under the principle of constructing the evaluation index system, the evaluation indicator system should be constructed. The weight of the evaluation index is calculated through the analytic hierarchy process, and the calculation result of the evaluation weight is taken as the model input sample. A hierarchical multi-task deep learning model for teaching reform performance evaluation is built, and the final teaching reform performance score is obtained. Through relevant experiments, it is proved that compared with the experimental comparison method, this method has the advantages of high evaluation accuracy and short time, and can be further applied in relevant fields. Full Article
nc Can artificial intelligence replace whistle-blowers in the business sector? By www.inderscience.com Published On :: 2020-02-07T23:20:50-05:00 The major technological developments have changed the traditional way of doing business. These developments have facilitated whistle-blowing. Access to data is easier and faster and communicating with the public can be done in seconds. Another development is the artificial intelligence (AI) which enters the business workplace in different forms challenging the traditional working relations. The combination of these concepts gives the idea of artificial whistle-blowing or robot whistle-blowing. The concept is that a machine should conceive and report relevant wrongdoing avoiding the traditional model of whistle-blowing where the employee is the person who should report. This concept, yet unexplored, presents interesting positive and negative aspects. The purpose of this contribution is to present the idea of artificial whistle-blowing and its advantages and disadvantages for the business sector. As a conclusion, this paper suggests that the concept of artificial whistle-blowing needs still to be researched and an optimal solution, for the time being, is to permit artificial whistle-blowing as a helping tool for the employees to detect wrongdoings but report them themselves. Full Article
nc Transformative advances in volatility prediction: unveiling an innovative model selection method using exponentially weighted information criteria By www.inderscience.com Published On :: 2024-10-07T23:20:50-05:00 Using information criteria is a common method for making a decision about which model to use for forecasting. There are many different methods for evaluating forecasting models, such as MAE, RMSE, MAPE, and Theil-U, among others. After the creation of AIC, AICc, HQ, BIC, and BICc, the two criteria that have become the most popular and commonly utilised are Bayesian IC and Akaike's IC. In this investigation, we are innovative in our use of exponential weighting to get the log-likelihood of the information criteria for model selection, which means that we propose assigning greater weight to more recent data in order to reflect their increased precision. All research data is from the major stock markets' daily observations, which include the USA (GSPC, DJI), Europe (FTSE 100, AEX, and FCHI), and Asia (Nikkei). Full Article
nc FISHNet: encouraging data sharing and reuse in the freshwater science community By jodi-ojs-tdl.tdl.org Published On :: Thu, 08 Mar 2012 00:00:00 -0600 This paper describes the FISHNet project, which developed a repository environment for the curation and sharing of data relating to freshwater science, a discipline whose research community is distributed thinly across a variety of institutions, and usually works in relative isolation as individual researchers or within small groups. As in other “small sciences”, these datasets tend to be small and “hand-crafted”, created to address particular research questions rather than with a view to reuse, so they are rarely curated effectively, and the potential for sharing and reusing them is limited. The paper addresses a variety of issues and concerns raised by freshwater researchers as regards data sharing, describes our approach to developing a repository environment that addresses these concerns, and identifies the potential impact within the research community of the system. Full Article Articles freshwater biology data sharing data publication data reuse data repositories DOI Fedora Digital Libraries Social Consequences Usability of Digital Information Digital Repositories Scholarly Communication
nc Sheer Curation of Experiments: Data, Process, Provenance By jodi-ojs-tdl.tdl.org Published On :: Thu, 08 Mar 2012 00:00:00 -0600 This paper describes an environment for the “sheer curation” of the experimental data of a group of researchers in the fields of biophysics and structural biology. The approach involves embedding data capture and interpretation within researchers' working practices, so that it is automatic and invisible to the researcher. The environment does not capture just the individual datasets generated by an experiment, but the entire workflow that represent the “story” of the experiment, including intermediate files and provenance metadata, so as to support the verification and reproduction of published results. As the curation environment is decoupled from the researchers’ processing environment, the provenance is inferred from a variety of domain-specific contextual information, using software that implements the knowledge and expertise of the researchers. We also present an approach to publishing the data files and their provenance according to linked data principles by using OAI-ORE (Open Archives Initiative Object Reuse and Exchange) and OPMV. Full Article Articles sheer curation provenance data repositories experimental data OAI-ORE linked data Fedora OPM OPMV Digital Libraries Digital Repositories Scholarly Communication
nc Building the Hydra Together: Enhancing Repository Provision through Multi-Institution Collaboration By jodi-ojs-tdl.tdl.org Published On :: Thu, 08 Mar 2012 00:00:00 -0600 In 2008 the University of Hull, Stanford University and University of Virginia decided to collaborate with Fedora Commons (now DuraSpace) on the Hydra project. This project has sought to define and develop repository-enabled solutions for the management of multiple digital content management needs that are multi-purpose and multi-functional in such a way as to allow their use across multiple institutions. This article describes the evolution of Hydra as a project, but most importantly as a community that can sustain the outcomes from Hydra and develop them further. The data modelling and technical implementation are touched on in this context, and examples of the Hydra heads in development or production are highlighted. Finally, the benefits of working together, and having worked together, are explored as a key element in establishing a sustainable open source solution. Full Article Articles Hydra collaboration community partners roles responsibilities Digital Libraries Digital Repositories Scholarly Communication Information Management
nc Chempound - a Web 2.0-inspired repository for physical science data By jodi-ojs-tdl.tdl.org Published On :: Thu, 08 Mar 2012 00:00:00 -0600 Chempound is a new generation repository architecture based on RDF, semantic dictionaries and linked data. It has been developed to hold any type of chemical object expressible in CML and is exemplified by crystallographic experiments and computational chemistry calculations. In both examples, the repository can hold >50k entries which can be searched by SPARQL endpoints and pre-indexing of key fields. The Chempound architecture is general and adaptable to other fields of data-rich science. Full Article Articles
nc Performance improvement in inventory classification using the expectation-maximisation algorithm By www.inderscience.com Published On :: 2024-10-29T23:20:50-05:00 Multi-criteria inventory classification (MCIC) is popularly used to aid managers in categorising the inventory. Researchers have used numerous mathematical models and approaches, but few resorted to unsupervised machine-learning techniques to address MCIC. This study uses the expectation-maximisation (EM) algorithm to estimate the parameters of the Gaussian mixture model (GMM), a popular unsupervised machine learning algorithm, for ABC inventory classification. The EM-GMM algorithm is sensitive to initialisation, which in turn affects the results. To address this issue, two different initialisation procedures have been proposed for the EM-GMM algorithm. Inventory classification outcomes from 14 existing MCIC models have been given as inputs to study the significance of the two proposed initialisation procedures of the EM-GMM algorithm. The effectiveness of these initialisation procedures corresponding to various inputs has been analysed toward inventory management performance measures, i.e., fill rate, total relevant cost, and inventory turnover ratio. Full Article
nc Unveiling learner experience in MOOC reviews By www.inderscience.com Published On :: 2024-10-15T23:20:50-05:00 The surge of learner enrolment in massive open online courses (MOOCs) has led to a wealth of learner-generated data, such as online course reviews that document learner experience. To unveil learner experience with MOOCs, this research uses machine learning methods to extract prominent topics from MOOC reviews and assess the sentiments expressed by learners within them. Furthermore, this research investigates the cooccurrence of the topics using association rule mining. The findings reveal six central topics discussed in MOOC reviews, such as "instructor", "design", "material", "assignment", "platform", and "experience". Notably, most learners express positive sentiments in their reviews. The sentiment indicated in reviews of skill-seeking MOOCs is higher than that in reviews of knowledge-seeking MOOCs. Furthermore, the association rule mining identifies four meaningful association rules. The findings offer valuable insights for MOOC instructors to enhance course design and for platform operators to ensure the long-term viability and success of MOOC platforms. Full Article
nc LDSAE: LeNet deep stacked autoencoder for secure systems to mitigate the errors of jamming attacks in cognitive radio networks By www.inderscience.com Published On :: 2024-10-15T23:20:50-05:00 A hybrid network system for mitigating errors due to jamming attacks in cognitive radio networks (CRNs) is named LeNet deep stacked autoencoder (LDSAE) and is developed. In this exploration, the sensing stage and decision-making are considered. The sensing unit is composed of four steps. First, the detected signal is forwarded to filtering progression. Here, BPF is utilised to filter the detected signal. The filtered signal is squared in the second phase. Third, signal samples are combined and jamming attacks occur by including false energy levels. Last, the attack is maliciously affecting the FC decision in the fourth step. On the other hand, FC initiated the decision-making and also recognised jamming attacks that affect the link amidst PU and SN in decision-making stage and it is accomplished by employing LDSAE-based trust model where the proposed module differentiates the malicious and selfish users. The analytic measures of LDSAE gained 79.40%, 79.90%, and 78.40%. Full Article
nc Towards Egocentric Way-Finding Appliances Supporting Navigation in Unfamiliar Terrain By Published On :: Full Article
nc Connecting with the Y Generation: an Analysis of Factors Associated with the Academic Performance of Foundation IS Students By Published On :: Full Article
nc Are All Learners Created Equal? A Quantitative Analysis of Academic Performance in a Distance Tertiary Institution By Published On :: Full Article
nc ICT Education and Training in Sub-Saharan Africa: Multimode versus Traditional Distance Learning By Published On :: Full Article
nc Action-Guidance: An Action Research Project for the Application of Informing Science in Educational and Vocational Guidance By Published On :: Full Article
nc Public Perceptions of Biometric Devices: The Effect of Misinformation on Acceptance and Use By Published On :: Full Article
nc Factors Influencing the Decision to Choose Information Technology Preparatory Studies in Secondary Schools: An Exploratory Study in Regional/Rural Australia By Published On :: Full Article
nc The SWIMS CD-ROM Pilot: Using Community Development Principles and Technologies of the Information Society to Address Identified Informational Needs By Published On :: Full Article
nc The Human Dimension on Distance Learning: A Case Study of a Telecommunications Company By Published On :: Full Article
nc Students’ Pedagogical Preferences in the Delivery of IT Capstone Courses By Published On :: Full Article
nc The Roles of Challenge and Skill in the Flow Experiences of Web Users By Published On :: Full Article
nc Communication Management and Control in Distance Learning Scenarios By Published On :: Full Article
nc Web Based vs. Web Supported Learning Environment – A Distinction of Course Organizing or Learning Style? By Published On :: Full Article
nc Customer Service Factors Influencing Internet Shopping in New Zealand By Published On :: Full Article
nc Modeling and Performance Analysis of Dynamic Random Early Detection (DRED) Gateway for Congestion Avoidance By Published On :: Full Article
nc Performance Analysis of Double Buffer Technique (DBT) Model for Mobility Support in Wireless IP Networks By Published On :: Full Article
nc Design, Development and Deployment Considerations when Applying Native XML Database Technology to the Programme Management Function of an SME By Published On :: Full Article
nc Resistance to Electronic Medical Records (EMRs): A Barrier to Improved Quality of Care By Published On :: Full Article
nc Exploring the Key Informational, Ethical and Legal Concerns to the Development of Population Genomic Databases for Pharmacogenomic Research By Published On :: Full Article
nc Towards an Information System Making Transparent Teaching Processes and Applying Informing Science to Education By Published On :: Full Article
nc A Profile of Digital Information Literacy Competencies of High School Students By Published On :: Full Article
nc New Pathways to Learning: The Team Teaching Approach. A Library and Information Science Case Study By Published On :: Full Article
nc Effectiveness of Self-selected Teams: A Systems Development Project Experience By Published On :: Full Article