Search results
1 – 10 of 45Rania M. Ghoniem, H.A. Abas and H.A. Bdair
Despite the fact that there being a large literature on simulation, there is as yet no generic paradigm or architecture to develop a three-dimensional (3-D) simulator which…
Abstract
Despite the fact that there being a large literature on simulation, there is as yet no generic paradigm or architecture to develop a three-dimensional (3-D) simulator which depends on autonomous intelligent objects. This has motivated us to introduce a 3-D simulation system based on intelligent objects for Physics Experimentation. We formulated the system’s components as an object-orientation model. So, the entities in every experiment’s work cell are modeled by characterizing their properties and functions into classes and objects of the system hierarchy. Intelligent objects are realized by developing a knowledge base (KB) that captures a set of rules/algorithms that operate on 3-D objects. Rules fall into two categories: action and property rules. In the simulation layer, the student is allowed, by using the virtual system, to stroll throughout the Physics laboratory in light of a walking model. Student gets to a simulation region to do an experiment through the detection of mathematical collision. From software engineering perspective, the proposed system facilitates the Physics experiment through making the specification of its applicable parts more modular and reusable. Moreover, a major pedagogical objective is achieved by permitting the student tuning parameters, fixing component of a device then visualizing outputs. This provides student well interpretation by viewing how distinct parameters affect the outcomes of the experiment. With the objective of student performance measuring, we utilized an exploratory group relying upon pre- and post-testing. The application results demonstrate that the simulator contributes positively to student performance in regard to practical Physics.
Details
Keywords
Ilia Maslov, Shahrokh Nikou and Preben Hansen
This paper aims to explore the perspectives of university students on the learning management system (LMS) and determine factors that influence user experience and the outcomes of…
Abstract
Purpose
This paper aims to explore the perspectives of university students on the learning management system (LMS) and determine factors that influence user experience and the outcomes of e-learning.
Design/methodology/approach
This paper employs a mixed-method approach. For qualitative data, 20 semi-structure interviews were conducted. Moreover, for quantitative data, a short survey was developed and distributed among the potential respondents.
Findings
The results showed that students, particularly in programs where courses are mainly offered online, are dependent on such learning platforms. Moreover, the use of modular object-oriented dynamic learning environment (Moodle) as an application of LMS was rated positively, and e-learning was considered as an effective sustainable learning solution in current conditions.
Originality/value
The authors have illustrated empirically how the notion of UX of the LMS provides a means of exploring both students' participation in e-learning and their intention towards using such learning platforms.
Details
Keywords
Fatima M. Isiaka, Salihu Abdullahi Audu and Mustafa Ahmed Umar
The dependence on the use of information systems for nearly every activity and functions in the internet is increasingly high. This form of interconnectedness has bolstered…
Abstract
Purpose
The dependence on the use of information systems for nearly every activity and functions in the internet is increasingly high. This form of interconnectedness has bolstered national economies, enhanced how governments interact with their citizens and how ordinary people connect with friends and family. However, this dependence has equally resulted to a high rise in vulnerability, threat and risk associated with more use of information and communication technology. Cyber-attacks that have the potential to disrupt or damage information system infrastructure are getting more complex with some level of sophistication. Traditional protection of information system infrastructure is no longer sufficient; systems have proven to be immune to failure or incidents. This paper aims to ensure that there is a continuous availability of services through a fail-safe proof.
Design/methodology/approach
MYSQL replication technique was used to develop a model based on three-tier layers using the principle of network interdependency and the replication techniques. Tier 1 depicts a Telecom organization serving as service provider that provides internet service to Tier 2 organization – a Bank; Tier 3 is the financial App that can be used by bank staff and customers. The fail-safe mode integrated mechanism enables Tier 3 to continue to render its services in the event of an attack on Tier 1 such as DDoS without disruption.
Findings
This technique succeeded in mitigating the loss of data if cyber incident occurred or reception of uninterrupted services is countered, which give rise to future master-to-master architecture.
Research limitations/implications
The study conducted is limited to the design and development of a fail-safe system for interdependent networks or systems using MYSQL replication technique.
Originality/value
In an interdependent environment such as the cyberspace, the sectors are interdependent for optimal results. The originality of the work ensures that there is availability of services which is sustained and that data integrity is assured using the fail-safe technique based on MySQL replication method.
Details
Keywords
Mohammed B. Lahkim, Gregory J. Skulmoski and Russel E. Bruhn
This paper investigates the integration of leadership training into IT curricula to develop current and future skills needed by the IT job market. The technical and non-technical…
Abstract
This paper investigates the integration of leadership training into IT curricula to develop current and future skills needed by the IT job market. The technical and non-technical skills required for IT professionals are presented and a conceptual model for including leadership training in technical courses is outlined. To implement this model, we adopted the Problem-Based Learning approach to teach an IT course. Qualitative and quantitative data were gathered, through a survey, from 52 undergraduate students in the College of Information Technology at Zayed University. Our results show that our adopted approach was successful in teaching IT skills as well as developing leadership skills. Given these findings, we highlight the importance and feasibility of integrating leadership development on a daily basis within technical courses to develop both the technical and non technical skills required by the job market.
Ashikul Kabir, Saiyara Shabbir Ikra, Paolo Saona and Md. Abul Kalam Azad
This study extends the current literature in the context of European countries by showing that women's participation on the board can enhance the financial performance of a…
Abstract
Purpose
This study extends the current literature in the context of European countries by showing that women's participation on the board can enhance the financial performance of a company while moderated by many cultural factors.
Design/methodology/approach
This study examines 19 European countries throughout the period 2010–2020. The time-invariant or individual fixed-effect models are used.
Findings
The authors found that high power distance and masculinity undermine the impact of board gender diversity on firm performance. The gender-diverse board reports a statistically significant negative impact on return on asset (ROA) and return on equity (ROE) while moderated by the power distance index.
Originality/value
This research will be of significant value to the board directors, practitioners and the concerned authority who desire to polish up the firm performance of European countries that are governed by cultural norms.
Details
Keywords
Qingfeng Xu, Hèrm Hofmeyer and Johan Maljaars
Simulations exist for the prediction of the behaviour of building structural systems under fire, including two-way coupled fire-structure interaction. However, these simulations…
Abstract
Purpose
Simulations exist for the prediction of the behaviour of building structural systems under fire, including two-way coupled fire-structure interaction. However, these simulations do not include detailed models of the connections, whereas these connections may impact the overall behaviour of the structure. Therefore, this paper proposes a two-scale method to include screw connections.
Design/methodology/approach
The two-scale method consists of (a) a global-scale model that models the overall structural system and (b) a small-scale model to describe a screw connection. Components in the global-scale model are connected by a spring element instead of a modelled screw, and the stiffness of this spring element is predicted by the small-scale model, updated at each load step. For computational efficiency, the small-scale model uses a proprietary technique to model the behaviour of the threads, verified by simulations that model the complete thread geometry, and validated by existing pull-out experiments. For four screw failure modes, load-deformation behaviour and failure predictions of the two-scale method are verified by a detailed system model. Additionally, the two-scale method is validated for a combined load case by existing experiments, and demonstrated for different temperatures. Finally, the two-scale method is illustrated as part of a two-way coupled fire-structure simulation.
Findings
It was shown that proprietary ”threaded connection interaction” can predict thread relevant failure modes, i.e. thread failure, shank tension failure, and pull-out. For bearing, shear, tension, and pull-out failure, load-deformation behaviour and failure predictions of the two-scale method correspond with the detailed system model and Eurocode predictions. Related to combined load cases, for a variety of experiments a good correlation has been found between experimental and simulation results, however, pull-out simulations were shown to be inconsistent.
Research limitations/implications
More research is needed before the two-scale method can be used under all conditions. This relates to the failure criteria for pull-out, combined load cases, and temperature loads.
Originality/value
The two-scale method bridges the existing very detailed small-scale screw models with present global-scale structural models, that in the best case only use springs. It shows to be insightful, for it contains a functional separation of scales, revealing their relationships, and it is computationally efficient as it allows for distributed computing. Furthermore, local small-scale non-convergence (e.g. a screw failing) can be handled without convergence problems in the global-scale structural model.
Details
Keywords
Yanan Wang, Jianqiang Li, Sun Hongbo, Yuan Li, Faheem Akhtar and Azhar Imran
Simulation is a well-known technique for using computers to imitate or simulate the operations of various kinds of real-world facilities or processes. The facility or process of…
Abstract
Purpose
Simulation is a well-known technique for using computers to imitate or simulate the operations of various kinds of real-world facilities or processes. The facility or process of interest is usually called a system, and to study it scientifically, we often have to make a set of assumptions about how it works. These assumptions, which usually take the form of mathematical or logical relationships, constitute a model that is used to gain some understanding of how the corresponding system behaves, and the quality of these understandings essentially depends on the credibility of given assumptions or models, known as VV&A (verification, validation and accreditation). The main purpose of this paper is to present an in-depth theoretical review and analysis for the application of VV&A in large-scale simulations.
Design/methodology/approach
After summarizing the VV&A of related research studies, the standards, frameworks, techniques, methods and tools have been discussed according to the characteristics of large-scale simulations (such as crowd network simulations).
Findings
The contributions of this paper will be useful for both academics and practitioners for formulating VV&A in large-scale simulations (such as crowd network simulations).
Originality/value
This paper will help researchers to provide support of a recommendation for formulating VV&A in large-scale simulations (such as crowd network simulations).
Details
Keywords
Aya Khaled Youssef Sayed Mohamed, Dagmar Auer, Daniel Hofer and Josef Küng
Authorization and access control have been a topic of research for several decades. However, existing definitions are inconsistent and even contradicting each other. Furthermore…
Abstract
Purpose
Authorization and access control have been a topic of research for several decades. However, existing definitions are inconsistent and even contradicting each other. Furthermore, there are numerous access control models and even more have recently evolved to conform with the challenging requirements of resource protection. That makes it hard to classify the models and decide for an appropriate one satisfying security needs. Therefore, this study aims to guide through the plenty of access control models in the current state of the art besides this opaque accumulation of terms meaning and how they are related.
Design/methodology/approach
This study follows the systematic literature review approach to investigate current research regarding access control models and illustrate the findings of the conducted review. To provide a detailed understanding of the topic, this study identified the need for an additional study on the terms related to the domain of authorization and access control.
Findings
The authors’ research results in this paper are the distinction between authorization and access control with respect to definition, strategies, and models in addition to the classification schema. This study provides a comprehensive overview of existing models and an analysis according to the proposed five classes of access control models.
Originality/value
Based on the authors’ definitions of authorization and access control along with their related terms, i.e. authorization strategy, model and policy as well as access control model and mechanism, this study gives an overview of authorization strategies and propose a classification of access control models providing examples for each category. In contrast to other comparative studies, this study discusses more access control models, including the conventional state-of-the-art models and novel ones. This study also summarizes each of the literature works after selecting the relevant ones focusing on the database system domain or providing a survey, a classification or evaluation criteria of access control models. Additionally, the introduced categories of models are analyzed with respect to various criteria that are partly selected from the standard access control system evaluation metrics by the National Institute of Standards and Technology.
Details
Keywords
Tatiana da Costa Reis Moreira, Daniel Luiz de Mattos Nascimento, Yelena Smirnova and Ana Carla de Souza Gomes dos Santos
This paper explores Lean Six Sigma principles and the DMAIC (define, measure, analyze, improve, control) methodology to propose a new Lean Six Sigma 4.0 (LSS 4.0) framework for…
Abstract
Purpose
This paper explores Lean Six Sigma principles and the DMAIC (define, measure, analyze, improve, control) methodology to propose a new Lean Six Sigma 4.0 (LSS 4.0) framework for employee occupational exams and address the real-world issue of high-variability exams that may arise.
Design/methodology/approach
This study uses mixed methods, combining qualitative and quantitative data collection. A detailed case study assesses the impact of LSS interventions on the exam management process and tests the applicability of the proposed LSS 4.0 framework for employee occupational exams.
Findings
The results reveal that changing the health service supplier in the explored organization caused a substantial raise in occupational exams, leading to increased costs. By using syntactic interoperability, lean, six sigma and DMAIC approaches, improvements were identified, addressing process deviations and information requirements. Implementing corrective actions improved the exam process, reducing the number of exams and associated expenses.
Research limitations/implications
It is important to acknowledge certain limitations, such as the specific context of the case study and the exclusion of certain exam categories.
Practical implications
The practical implications of this research are substantial, providing organizations with valuable managerial insights into improving efficiency, reducing costs and ensuring regulatory compliance while managing occupational exams.
Originality/value
This study fills a research gap by applying LSS 4.0 to occupational exam management, offering a practical framework for organizations. It contributes to the existing knowledge base by addressing a relatively novel context and providing a detailed roadmap for process optimization.
Details
Keywords
Pengze Li, Ran Zhang, Lei Liu, Lizhen Cui, Qingzhong Li and Guangpeng Zhou
Science of the Crowd is a new paradigm. The research on the relationship between provision and requirement arising from the behavior of the crowd under the interconnected…
Abstract
Purpose
Science of the Crowd is a new paradigm. The research on the relationship between provision and requirement arising from the behavior of the crowd under the interconnected environment is a promising topic. This paper aims at studying a new type of interconnected architecture.
Design/methodology/approach
This study is a pioneer work on the establishment of a new type of interconnected architecture – rim chain. The rim chain aims at supporting prompt matching between provision and requirements.
Findings
The analytical results suggest that requirements can be fulfilled in accordance with six degrees of separation. In other words, the matching between the requirements and provision takes place with six hops in the rim chain framework.
Originality/value
Knowledge graph is used to implement the rim chain.
Details