Search results

1 – 10 of over 1000
Open Access
Article
Publication date: 30 June 2008

Mohammad Ismail Hossain and Wim Verbeke

Rice is staple food for Bangladeshi people. Although rice markets were liberalized in 1992, the government continued to intervene in this sector. This study examines the farmers’…

Abstract

Rice is staple food for Bangladeshi people. Although rice markets were liberalized in 1992, the government continued to intervene in this sector. This study examines the farmers’ and private traders’ response in liberalized rice marketing system in two regions. 40 farmers and 20 traders were interviewed by using a structural questionnaire for collecting the necessary information. The liberalization of the rice market, in particular, has been embraced more by the private traders then by the farmers. Although there has been a rapid emergence of private traders, the emergence of a vibrant trading sector that would fill the gap left by the state has been slow. The rice market is segmented with the private traders supplying different market circuits. Farmers on the other have not responded positively due to the lack of capital, lack of storage facilities, lack of market information, dominance of intermediaries and low price during the harvest period. Most of the farmers are unwilling to expand their acreage due to the family requirements of other crops. In rural remote areas where the road infrastructure is poor, private sector marketing activities have not yet emerged. Thus government can foster private participation and market integration by improving the road and storage infrastructure. Furthermore, government needs to take measures that strengthen the agricultural price and marketing information system targeted at both farmers and traders.

Details

Journal of International Logistics and Trade, vol. 6 no. 1
Type: Research Article
ISSN: 1738-2122

Keywords

Open Access
Article
Publication date: 3 October 2022

Williams Ezinwa Nwagwu and Antonia Bernadette Donkor

The study examined the personal information management (PIM) challenges encountered by faculty in six universities in Ghana, their information refinding experiences and the…

1024

Abstract

Purpose

The study examined the personal information management (PIM) challenges encountered by faculty in six universities in Ghana, their information refinding experiences and the perceived role of memory. The study tested the hypothesis that faculty PIM performance will significantly differ when the differences in the influence of personal factors (age, gender and rank) on their memory are considered.

Design/methodology/approach

The study was guided by a sample survey design. A questionnaire designed based on themes extracted from earlier interviews was used to collect quantitative data from 235 faculty members from six universities in Ghana. Data analysis was undertaken with a discrete multivariate Generalized Linear Model to investigate how memory intermediates in the relationship between age, gender and rank, and, refinding of stored information.

Findings

The paper identified two subfunctions of refinding (Refinding 1 and Refinding 2) associated with self-confidence in information re-finding, and, memory (Memory 1 and Memory 2), associated with the use of complimentary frames to locate previously found and stored information. There were no significant multivariate effects for gender as a stand-alone variable. Males who were aged less than 39 could refind stored information irrespective of the memory class. Older faculty aged 40–49 who possess Memory 1 and senior lecturers who possess Memory 2 performed well in refinding information. There was a statistically significant effect of age and memory; and rank and memory.

Research limitations/implications

This study was limited to faculty in Ghana, whereas the study itself has implications for demographic differences in PIM.

Practical implications

Identifying how memory mediates the role of personal factors in faculty refinding of stored information will be necessary for the efforts to understand and design systems and technologies for enhancing faculty capacity to find/refind stored information.

Social implications

Understanding how human memory can be augmented by technology is a great PIM strategy, but understanding how human memory and personal factors interplay to affect PIM is more important.

Originality/value

PIM of faculty has been extensively examined in the literature, and limitations of memory has always been identified as a constraint. Human memory has been augmented with technology, although the outcome has been very minimal. This study shows that in addition to technology augmentation, personal factors interplay with human memory to affect PIM. Discrete multivariate Generalized Linear Model applied in this study is an innovative way of addressing the challenges of assimilating statistical methodologies in psychosocial disciplines.

Details

Library Hi Tech, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0737-8831

Keywords

Open Access
Article
Publication date: 16 December 2019

Florian Fahrenbach, Kate Revoredo and Flavia Maria Santoro

This paper aims to introduce an information and communication technology (ICT) artifact that uses text mining to support the innovative and standardized assessment of professional…

1253

Abstract

Purpose

This paper aims to introduce an information and communication technology (ICT) artifact that uses text mining to support the innovative and standardized assessment of professional competences within the validation of prior learning (VPL). Assessment means comparing identified and documented professional competences against a standard or reference point. The designed artifact is evaluated by matching a set of curriculum vitae (CV) scraped from LinkedIn against a comprehensive model of professional competence.

Design/methodology/approach

A design science approach informed the development and evaluation of the ICT artifact presented in this paper.

Findings

A proof of concept shows that the ICT artifact can support assessors within the validation of prior learning procedure. Rather the output of such an ICT artifact can be used to structure documentation in the validation process.

Research limitations/implications

Evaluating the artifact shows that ICT support to assess documented learning outcomes is a promising endeavor but remains a challenge. Further research should work on standardized ways to document professional competences, ICT artifacts capture the semantic content of documents, and refine ontologies of theoretical models of professional competences.

Practical implications

Text mining methods to assess professional competences rely on large bodies of textual data, and thus a thoroughly built and large portfolio is necessary as input for this ICT artifact.

Originality/value

Following the recent call of European policymakers to develop standardized and ICT-based approaches for the assessment of professional competences, an ICT artifact that supports the automatized assessment of professional competences within the validation of prior learning is designed and evaluated.

Details

European Journal of Training and Development, vol. 44 no. 2/3
Type: Research Article
ISSN: 2046-9012

Keywords

Open Access
Article
Publication date: 31 October 2023

Neema Florence Mosha and Patrick Ngulube

The study aims to investigate the utilisation of open research data repositories (RDRs) for storing and sharing research data in higher learning institutions (HLIs) in Tanzania.

Abstract

Purpose

The study aims to investigate the utilisation of open research data repositories (RDRs) for storing and sharing research data in higher learning institutions (HLIs) in Tanzania.

Design/methodology/approach

A survey research design was employed to collect data from postgraduate students at the Nelson Mandela African Institution of Science and Technology (NM-AIST) in Arusha, Tanzania. The data were collected and analysed quantitatively and qualitatively. A census sampling technique was employed to select the sample size for this study. The quantitative data were analysed using the Statistical Package for the Social Sciences (SPSS), whilst the qualitative data were analysed thematically.

Findings

Less than half of the respondents were aware of and were using open RDRs, including Zenodo, DataVerse, Dryad, OMERO, GitHub and Mendeley data repositories. More than half of the respondents were not willing to share research data and cited a lack of ownership after storing their research data in most of the open RDRs and data security. HILs need to conduct training on using trusted repositories and motivate postgraduate students to utilise open repositories (ORs). The challenges for underutilisation of open RDRs were a lack of policies governing the storage and sharing of research data and grant constraints.

Originality/value

Research data storage and sharing are of great interest to researchers in HILs to inform them to implement open RDRs to support these researchers. Open RDRs increase visibility within HILs and reduce research data loss, and research works will be cited and used publicly. This paper identifies the potential for additional studies focussed on this area.

Open Access
Article
Publication date: 9 October 2019

Erik Framner, Simone Fischer-Hübner, Thomas Lorünser, Ala Sarah Alaqra and John Sören Pettersson

The purpose of this paper is to develop a usable configuration management for Archistar, which utilizes secret sharing for redundantly storing data over multiple independent…

4011

Abstract

Purpose

The purpose of this paper is to develop a usable configuration management for Archistar, which utilizes secret sharing for redundantly storing data over multiple independent storage clouds in a secure and privacy-friendly manner. Selecting the optimal secret sharing parameters, cloud storage servers and other settings for securely storing the secret data shares, while meeting all of end user’s requirements and other restrictions, is a complex task. In particular, complex trade-offs between different protection goals and legal privacy requirements need to be made.

Design/methodology/approach

A human-centered design approach with structured interviews and cognitive walkthroughs of user interface mockups with system administrators and other technically skilled users was used.

Findings

Even technically skilled users have difficulties to adequately select secret sharing parameters and other configuration settings for adequately securing the data to be outsourced.

Practical implications

Through these automatic settings, not only system administrators but also non-technical users will be able to easily derive suitable configurations.

Originality/value

The authors present novel human computer interaction (HCI) guidelines for a usable configuration management, which propose to automatically set configuration parameters and to solve trade-offs based on the type of data to be stored in the cloud. Through these automatic settings, not only system administrators but also non-technical users will be able to easily derive suitable configurations.

Details

Information & Computer Security, vol. 27 no. 5
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 11 August 2022

Li Ji, Yiwei Zhang, Ruifeng Shi, Limin Jia and Xin Zhang

Green energy as a transportation supply trend is irreversible. In this paper, a highway energy supply system (HESS) evolution model is proposed to provide highway transportation…

Abstract

Purpose

Green energy as a transportation supply trend is irreversible. In this paper, a highway energy supply system (HESS) evolution model is proposed to provide highway transportation vehicles and service facilities with a clean electricity supply and form a new model of a source-grid-load-storage-charge synergistic highway-PV-WT integrated system (HPWIS). This paper aims to improve the flexibility index of highways and increase CO2 emission reduction of highways.

Design/methodology/approach

To maximize the integration potential, a new energy-generation, storage and information-integration station is established with a dynamic master–slave game model. The flexibility index is defined to evaluate the system ability to manage random fluctuations in power generation and load levels. Moreover, CO2 emission reduction is also quantified. Finally, the Lianhuo Expressway is taken as an example to calculate emission reduction and flexibility.

Findings

The results show that through the application of the scheduling strategy to the HPWIS, the flexibility index of the Lianhuo Expressway increased by 29.17%, promoting a corresponding decrease in CO2 emissions.

Originality/value

This paper proposed a new model to capture the evolution of the HESS, which provides highway transportation vehicles and service facilities with a clean electricity supply and achieves energy transfer aided by an energy storage system, thus forming a new model of a transportation energy system with source-grid-load-storage-charge synergy. An evaluation method is proposed to improve the air quality index through the coordination of new energy generation and environmental conditions, and dynamic configuration and dispatch are achieved with the master–slave game model.

Open Access
Article
Publication date: 20 March 2017

Tristan Gerrish, Kirti Ruikar, Malcolm Cook, Mark Johnson and Mark Phillip

The purpose of this paper is to present a review of the implications building information modelling (BIM) is having on the building energy modelling (BEM) and design of buildings…

9722

Abstract

Purpose

The purpose of this paper is to present a review of the implications building information modelling (BIM) is having on the building energy modelling (BEM) and design of buildings. It addresses the issues surrounding exchange of information throughout the design process, and where BIM may be useful in contributing to effective design progression and information availability.

Design/methodology/approach

Through review of current design procedures and examination of the concurrency between architectural and thermophysical design modelling, a procedure for information generation relevant to design stakeholders is created, and applied to a high-performance building project currently under development.

Findings

The extents of information key to the successful design of a buildings energy performance in relation to its architectural objectives are given, with indication of the level of development required at each stage of the design process.

Practical implications

BIM offers an extensible medium for parametric information storage, and its implementation in design development offers the capability to include BEM parameter-integrated construction information. The extent of information required for accurate BEM at stages of a building’s design is key to understanding how best to record performance information in a BIM environment.

Originality/value

This paper contributes to the discussion around the integration of concurrent design procedures and a common data environment. It presents a framework for the creation and dissemination of information during design, exemplifies this on a real building project and evaluates the barriers experienced in successful implementation.

Details

Engineering, Construction and Architectural Management, vol. 24 no. 2
Type: Research Article
ISSN: 0969-9988

Keywords

Open Access
Article
Publication date: 13 March 2018

Ulla Gain

Cognitive computing is part of AI and cognitive applications consists of cognitive services, which are building blocks of the cognitive systems. These applications mimic the human…

1670

Abstract

Cognitive computing is part of AI and cognitive applications consists of cognitive services, which are building blocks of the cognitive systems. These applications mimic the human brain functions, for example, recognize the speaker, sense the tone of the text. On this paper, we present the similarities of these with human cognitive functions. We establish a framework which gathers cognitive functions into nine intentional processes from the substructures of the human brain. The framework, underpins human cognitive functions, and categorizes cognitive computing functions into the functional hierarchy, through which we present the functional similarities between cognitive service and human cognitive functions to illustrate what kind of functions are cognitive in the computing. The results from the comparison of the functional hierarchy of cognitive functions are consistent with cognitive computing literature. Thus, the functional hierarchy allows us to find the type of cognition and reach the comparability between the applications.

Details

Applied Computing and Informatics, vol. 16 no. 1/2
Type: Research Article
ISSN: 2634-1964

Keywords

Open Access
Article
Publication date: 30 June 2020

Asefeh Asemi, Andrea Ko and Mohsen Nowkarizi

This paper reviews literature on the application of intelligent systems in the libraries with a special issue on the ES/AI and Robot. Also, it introduces the potential of…

22925

Abstract

Purpose

This paper reviews literature on the application of intelligent systems in the libraries with a special issue on the ES/AI and Robot. Also, it introduces the potential of libraries to use intelligent systems, especially ES/AI and robots.

Design/methodology/approach

Descriptive and content review methods are applied, and the researchers critically reviewed the articles related to library ESs and robots from Web of Science as a general database and Emerald as a specific database in library and information science from 2007–2017. Four scopes considered to classify the articles as technology, service, user and resource. It is found that published researches on the intelligent systems have contributed to many librarian purposes like library technical services like the organization of information resources, storage and retrieval of information resources, library public services as reference services, information desk and other purposes.

Findings

A review of the previous studies shows that ESs are a useable intelligent system in library and information science that mimic librarian expert’s behaviors to support decision making and management. Also, it is shown that the current information systems have a high potential to be improved by integration with AI technologies. In this researches, librarian robots mostly designed for detection and replacing books on the shelf. Improving the technology of gripping, localizing and human-robot interaction are the main concern in recent librarian robot research. Our conclusion is that we need to develop research in the area of smart resources.

Originality/value

This study has a new approach to the literature review in this area. We compared the published papers in the field of ES/AI and robot and library from two databases, general and specific.

Open Access
Article
Publication date: 15 July 2021

Kalervo Järvelin and Pertti Vakkari

This paper analyses the research in Library and Information Science (LIS) and reports on (1) the status of LIS research in 2015 and (2) on the evolution of LIS research…

5878

Abstract

Purpose

This paper analyses the research in Library and Information Science (LIS) and reports on (1) the status of LIS research in 2015 and (2) on the evolution of LIS research longitudinally from 1965 to 2015.

Design/methodology/approach

The study employs a quantitative intellectual content analysis of articles published in 30+ scholarly LIS journals, following the design by Tuomaala et al. (2014). In the content analysis, we classify articles along eight dimensions covering topical content and methodology.

Findings

The topical findings indicate that the earlier strong LIS emphasis on L&I services has declined notably, while scientific and professional communication has become the most popular topic. Information storage and retrieval has given up its earlier strong position towards the end of the years analyzed. Individuals are increasingly the units of observation. End-user's and developer's viewpoints have strengthened at the cost of intermediaries' viewpoint. LIS research is methodologically increasingly scattered since survey, scientometric methods, experiment, case studies and qualitative studies have all gained in popularity. Consequently, LIS may have become more versatile in the analysis of its research objects during the years analyzed.

Originality/value

Among quantitative intellectual content analyses of LIS research, the study is unique in its scope: length of analysis period (50 years), width (8 dimensions covering topical content and methodology) and depth (the annual batch of 30+ scholarly journals).

Access

Only Open Access

Year

All dates (1521)

Content type

1 – 10 of over 1000