ir Combination of Lv-3DCNN algorithm in random noise environment and its application in aerobic gymnastics action recognition By www.inderscience.com Published On :: 2024-10-14T23:20:50-05:00 Action recognition plays a vital role in analysing human body behaviour and has significant implications for research and education. However, traditional recognition methods often suffer from issues such as inaccurate time and spatial feature vectors. Therefore, this study addresses the problem of inaccurate recognition of aerobic gymnastics action image data and proposes a visualised three-dimensional convolutional neural network algorithm-based action recognition model. This model incorporates unsupervised visualisation methods into the traditional network and enhances data recognition capabilities through the introduction of a random noise perturbation enhancement algorithm. The research results indicate that the data augmented with noise perturbation achieves the lowest mean square error, reducing the error value from 0.3352 to 0.3095. The use of unsupervised visualisation analysis enables clearer recognition of human actions, and the algorithm model is capable of accurately recognising aerobic movements. Compared to traditional algorithms, the new algorithm exhibits higher recognition accuracy and superior performance. Full Article
ir Finding a balance between business and ethics: an empirical study of ERP-based DSS attributes By www.inderscience.com Published On :: 2023-10-23T23:20:50-05:00 Numerous scandals due to unethical decisions occur despite the growing use of decision support systems (DSS). Several scholars recommend incorporating ethical attributes along with business requirements in DSS design. However, little guidance exists to indicate which ethical attributes to include and the importance ethical attributes should be given in comparison to business requirements. This study addresses this deficiency by identifying ethical requirements to integrate in DSS design drawn from the business ethics literature. This study conducted a large-scale empirical survey with information technology decision-makers to examine the relative importance of DSS fit with ethical and business requirements as well as the appropriate balance of those requirements on perceived DSS performance. The results show that decision makers perceive better DSS performance when the ethical and business requirements align with its organisation's beliefs than from ethical or business requirements alone. Full Article
ir Intelligent traffic congestion discrimination method based on wireless sensor network front-end data acquisition By www.inderscience.com Published On :: 2024-10-03T23:20:50-05:00 Conventional intelligent traffic congestion discrimination methods mainly use GPS terminals to collect traffic congestion data, which is vulnerable to the influence of vehicle time distribution, resulting in poor final discrimination effect. Necessary to design a new intelligent traffic congestion discrimination method based on wireless sensor network front-end data collection. That is to use the front-end data acquisition technology of wireless sensor network to generate a front-end data acquisition platform to obtain intelligent traffic congestion data, and then design an intelligent traffic congestion discrimination algorithm based on traffic congestion rules so as to achieve intelligent traffic congestion discrimination. The experimental results show that the intelligent traffic congestion discrimination method designed based on the front-end data collection of wireless sensor network has good discrimination effect, the obtained discrimination data is more accurate, effective and has certain application value, which has made certain contributions to reducing the frequency of urban traffic accidents. Full Article
ir Multiplication complexity in education activities with fair use principle of copyright in Indonesia By www.inderscience.com Published On :: 2024-10-30T23:20:50-05:00 Copying and duplicating papers for educational purposes is a violation form of copyright in Indonesia. The principle of fair use in education is a form of structured violation. Copying and duplicating the papers of the authors for educational purposes has provided commercial (business) benefits for libraries and universities. The research method is conducted using the observation method in libraries and universities that duplicate papers. The method also uses the normative juridical method that connects duplication of the papers in libraries and universities with the fair use principle. The results explain the authors' loss from copying and duplicating of papers in libraries and universities. Therefore, copying and duplicating the papers can only be done by implementing the responsibility system. Copying and duplicating the papers of the authors' in libraries and universities can be allowed if they fulfil the elements of copyright protection in the new concept. Full Article
ir Intellectual property protection for virtual assets and brands in the Metaverse: issues and challenges By www.inderscience.com Published On :: 2024-10-30T23:20:50-05:00 Intellectual property rights face new obstacles and possibilities as a result of the emergence of the Metaverse, a simulation of the actual world. This paper explores the current status of intellectual property rights in the Metaverse and examines the challenges and opportunities for enforcement. The article describes virtual assets and investigates their copyright and trademark protection. It also examines the protection of user-generated content in the Metaverse and the potential liability for copyright infringement. The article concludes with a consideration of the technological and jurisdictional obstacles to enforcing intellectual property rights in the Metaverse, as well as possible solutions for stakeholders. This paper will appeal to lawyers, policymakers, developers of virtual assets, platform owners, and anyone interested in the convergence of technology and intellectual property rights. Full Article
ir Study on marketing strategy innovation of mobile payment service under internet environment By www.inderscience.com Published On :: 2024-07-04T23:20:50-05:00 In order to overcome the problems of low efficiency, low user satisfaction and poor customer growth rate under the traditional marketing strategy, this paper studies the innovative strategy of mobile payment business marketing strategy under the internet environment. First of all, study the status quo of mobile payment business marketing in the internet environment, obtain mobile payment business data through questionnaire survey, and analyse the problems in mobile payment business marketing. Secondly, build a user profile of mobile payment business marketing, and classify user attributes, consumption characteristics and user activity through K-means clustering method; Finally, the marketing strategy is innovated from three aspects: product marketing, pricing marketing and channel marketing. The results show that the marketing benefit after the application of this strategy is 19.52 million yuan, the user satisfaction can reach 98.9%, and the customer growth rate can reach 21.3%, improving the marketing benefit of mobile payment business. Full Article
ir Visualizing Research Data Records for their Better Management By jodi-ojs-tdl.tdl.org Published On :: Thu, 08 Mar 2012 00:00:00 -0600 As academia in general, and research funders in particular, place ever greater importance on data as an output of research, so the value of good research data management practices becomes ever more apparent. In response to this, the Innovative Design and Manufacturing Research Centre (IdMRC) at the University of Bath, UK, with funding from the JISC, ran a project to draw up a data management planning regime. In carrying out this task, the ERIM (Engineering Research Information Management) Project devised a visual method of mapping out the data records produced in the course of research, along with the associations between them. This method, called Research Activity Information Development (RAID) Modelling, is based on the Unified Modelling Language (UML) for portability. It is offered to the wider research community as an intuitive way for researchers both to keep track of their own data and to communicate this understanding to others who may wish to validate the findings or re-use the data. Full Article Articles digital information research data management visual forms of communication information presentation Information Management Information Visualization
ir Chempound - a Web 2.0-inspired repository for physical science data By jodi-ojs-tdl.tdl.org Published On :: Thu, 08 Mar 2012 00:00:00 -0600 Chempound is a new generation repository architecture based on RDF, semantic dictionaries and linked data. It has been developed to hold any type of chemical object expressible in CML and is exemplified by crystallographic experiments and computational chemistry calculations. In both examples, the repository can hold >50k entries which can be searched by SPARQL endpoints and pre-indexing of key fields. The Chempound architecture is general and adaptable to other fields of data-rich science. Full Article Articles
ir An empirical study on the nexus among the prices of commodities: an ARDL and bound test approach By www.inderscience.com Published On :: 2024-10-29T23:20:50-05:00 This study investigates the nexus among the commodities: bitcoin, copper, gold, silver, crude oil, and iron ore. Previous studies on establishing the plausibility and the dynamic nexus among commodities are rare. This research attempts to fill this gap. This study investigates whether there are long-term and short-term links between commodities for the period 2010-2022 by applying the bounds testing method to co-integration and ECM, built using an ARDL model and establishing both short-term and long-term relationships among the economic variables analysed. The ECM confirmed the presence of some co-integration relationship for all the variables, both in the short and long term. A strong correlation was discovered among the commodities, which were greatly influenced by their lagged values. The results of this study provides an opportunity for policymakers and researchers to understand the nature of the relationship between the analysed variables and further support the development of new policies for economic sustainability. Full Article
ir The role of shopping apps and their impact on the online purchasing behaviour patterns of working women in Bangalore By www.inderscience.com Published On :: 2024-10-15T23:20:50-05:00 The study aims to analyse the impact of shopping applications on the shopping behaviour of the working women community in Bangalore, a city known as the IT hub. The research uses a quantitative analysis with SPSS version 23 software and a structured questionnaire survey technique to gather data from the working women community. The study uses descriptive statistics, ANOVA, regression, and Pearson correlation analysis to evaluate the perception of working women regarding the significance of online shopping applications. The results show that digital shopping applications are more prevalent among the working women community in Bangalore. The study also evaluates the socio-economic and psychological factors that influence their purchasing behaviour. The findings suggest that online marketers should enhance their strategies to improve their business on digital platforms. The research provides valuable insights into the shopping habits of the working women community in Bangalore. Full Article
ir Cognitively-inspired intelligent decision-making framework in cognitive IoT network By www.inderscience.com Published On :: 2024-10-15T23:20:50-05:00 Numerous Internet of Things (IoT) applications require brain-empowered intelligence. This necessity has caused the emergence of a new area called cognitive IoT (CIoT). Reasoning, planning, and selection are typically involved in decision-making within the network bandwidth limit. Consequently, data minimisation is needed. Therefore, this research proposes a novel technique to extract conscious data from a massive dataset. First, it groups the data using k-means clustering, and the entropy is computed for each cluster. The most prominent cluster is then determined by selecting the cluster with the highest entropy. Subsequently, it transforms each cluster element into an informative element. The most informative data is chosen from the most prominent cluster that represents the whole massive data, which is further used for intelligent decision-making. The experimental evaluation is conducted on the 21.25 years of environmental dataset, revealing that the proposed method is efficient over competing approaches. Full Article
ir International Journal of Networking and Virtual Organisations By www.inderscience.com Published On :: Full Article
ir Location-Oriented Knowledge Management in a Tourism Context: Connecting Virtual Communities to Physical Locations By Published On :: Full Article
ir Creation of Anticipatory Information Support for Virtual Organizations between System(S) Theory and System Thinking By Published On :: Full Article
ir Guiding Students Learning Project Team Management from Their Own Practice By Published On :: Full Article
ir Web Based vs. Web Supported Learning Environment – A Distinction of Course Organizing or Learning Style? By Published On :: Full Article
ir Performance Analysis of Double Buffer Technique (DBT) Model for Mobility Support in Wireless IP Networks By Published On :: Full Article
ir The Effects of Reading Goals on Learning in a Computer Mediated Environment By Published On :: Full Article
ir Using Technology-Mediated Learning Environment to Overcome Social and Cultural Limitations in Higher Education By Published On :: Full Article
ir End-to-End Performance Evaluation of Selected TCP Variants across a Hybrid Wireless Network By Published On :: Full Article
ir A Second Opinion on the Current State of Affairs in Computer Science Education: An Australian Perspective By Published On :: Full Article
ir Virtual Medical Campus (VMC) Graz: Innovative Curriculum meets Innovative Learning Objects Technology By Published On :: Full Article
ir Navigating the Virtual Forest: How Networked Digital Technologies Can Foster Transgeographic Learning By Published On :: Full Article
ir Performance Modeling of UDP Over IP-Based Wireline and Wireless Networks By Published On :: Full Article
ir The Interface between Technological Protection Measures and the Exemptions to Copyright under Article 6 Paragraph 4 of the Infosoc Directive and Section 1201 of the Digital Millennium Copyright Act By Published On :: Full Article
ir An Architecture of a Computer Learning Environment for Mapping the Student’s Knowledge Level By Published On :: Full Article
ir In Search of New Identity for LIS Discipline, with Some References to Iran By Published On :: Full Article
ir The Development of Students Geometrical Thinking through Transformational Processes and Interaction Techniques in a Dynamic Geometry Environment By Published On :: Full Article
ir Engaging Student Teachers in Peer Learning via a Blended Learning Environment By Published On :: Full Article
ir Open Online Assignment Submission: First Year Students’ Behavior and Views By Published On :: Full Article
ir Proposal of an Instructional Design for Teaching the Requirement Process for Designing Information Systems By Published On :: Full Article
ir SMS Based Wireless Home Appliance Control System (HACS) for Automating Appliances and Security By Published On :: Full Article