Search results

1 – 10 of 10
Article
Publication date: 28 December 2023

Somayeh Ghorbani and Seyed Ebrahim Jafari

The present study aimed to develop the competencies of 21st-century learners by considering the characteristics of the education element in the curricula.

Abstract

Purpose

The present study aimed to develop the competencies of 21st-century learners by considering the characteristics of the education element in the curricula.

Design/methodology/approach

The study employed a qualitative research design and a content analysis technique. The research population consisted of 20 curriculum design professors selected via a snowball sampling method until data saturation was reached. The research instrument was semistructured interviewing. The content validity of the interview questions was determined according to 5 curriculum design experts' opinions. Four credibility, transferability, dependability and confirmability criteria were used to increase the accuracy of qualitative data. The findings were analyzed using thematic analysis (structural-interpretive) through open, axial and selective coding.

Findings

Education characteristics in competency-based curricula were categorized into knowledge, skills, attitude and educational values. Knowledge includes pedagogical knowledge, content knowledge, pedagogical content knowledge and pedagogical technological knowledge; teaching skills include organization, facilitation, care and flexibility; educational attitudes consist of educational and pedagogical attitudes; and educational values include individual and group-social values.

Originality/value

The present research put three critical dimensions together: the competencies of the new-age learners from the perspective of the curriculum, which is the heart of the education process and is aimed at sustainable development, which is the priority of the countries today.

Details

Journal of Applied Research in Higher Education, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2050-7003

Keywords

Article
Publication date: 7 May 2024

Swathi Pennapareddy, Ramprasad Srinivasan and Natarajan K.

Automatic dependent surveillance-broadcast (ADS-B) is the foundational technology of the next generation air transportation system defined by Federal Aviation Authority and is one…

Abstract

Purpose

Automatic dependent surveillance-broadcast (ADS-B) is the foundational technology of the next generation air transportation system defined by Federal Aviation Authority and is one of the most precise ways for tracking aircraft position. ADS-B is intended to provide greater situational awareness to the pilots by displaying the traffic information like aircraft ID, altitude, speed and other critical parameters on the Cockpit Display of Traffic Information displays in the cockpit. Unfortunately, due to the initial proposed nature of ADS-B protocol, it is neither encrypted nor has any other innate security mechanisms, which makes it an easy target for malicious attacks. The system is vulnerable to various active and passive attacks like message ingestion, message deletion, eavesdropping, jamming, etc., which has become an area of concern for the aviation industry. The purpose of this study is to propose a method based on modified advanced encryption standard (AES) algorithm to secure the ADS=B messages and increase the integrity of ADS-B data transmissions.

Design/methodology/approach

Though there are various cryptographic and non-cryptographic methods proposed to secure ADS-B data transmissions, it is evident that most of these systems have limitations in terms of cost, implementation or feasibility. The new proposed method implements AES encryption techniques on the ADS-B data on the sender side and correlated decryption mechanism at the receiver end. The system is designed based on the flight schedule data available from any flight planning systems and implementing the AES algorithm on the ADS-B data from each aircraft in the flight schedule.

Findings

The suitable hardware was developed using Raspberry pi, ESP32 and Ra-02. Several runs were done to verify the original message, transmitted data and received data. During transmission, encryption algorithm was being developed, which has got very high secured transmission, and during the reception, the data was secured. Field test was conducted to validate the transmission and quality. Several trials were done to validate the transmission process. The authors have successfully shown that the ADS-B data can be encrypted using AES algorithm. The authors are successful in transmitting and receiving the ADS-B data packet using the discussed hardware and software methodology. One major advantage of using the proposed solution is that the information received is encrypted, and the receiver ADS-B system can decrypt the messages on the receiving end. This clearly proves that when the data is received by an unknown receiver, the messages cannot be decrypted, as the receiver is not capable of decrypting the AES-authenticated messages transmitted by the authenticated source. Also, AES encryption is highly unlikely to be decrypted if the encryption key and the associated decryption key are not known.

Research limitations/implications

Implementation of the developed solution in actual onboard avionics systems is not within the scope of this research. Hence, assessing in the real-time distances is not covered.

Social implications

The authors propose to extend this as a software solution to the onboard avionics systems by considering the required architectural changes. This solution can also bring in positive results for unmanned air vehicles in addition to the commercial aircrafts. Enhancement of security to the key operational and navigation data elements is going to be invaluable for future air traffic management and saving lives of people.

Originality/value

The proposed solution has been practically implemented by developing the hardware and software as part of this research. This has been clearly brought out in the paper. The implementation has been tested using the actual ADS-B data/messages received from using the ADS-B receiver. The solution works perfectly, and this brings immense value to the aircraft-to-aircraft and aircraft-to-ground communications, specifically while using ADS-B data for communicating the position information. With the proposed architecture and minor software updates to the onboard avionics, this solution can enhance safety of flights.

Details

Aircraft Engineering and Aerospace Technology, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1748-8842

Keywords

Article
Publication date: 16 May 2024

Chiung-Hui Tseng and Nguyen Thi Kim Lien

Indirect knowledge leakage to rivals located near alliance partners represents a significant risk that has received limited scholarly attention. Hence, the question of how to…

Abstract

Purpose

Indirect knowledge leakage to rivals located near alliance partners represents a significant risk that has received limited scholarly attention. Hence, the question of how to manage this risk – which the authors term “partner-rival co-location risk” – in nonequity alliances remains unanswered, and this study aims to suggest establishing a steering committee to oversee the partnership.

Design/methodology/approach

Drawing on the agglomeration economies and alliance governance literatures, the authors develop a set of hypotheses and perform a series of empirical tests on 470 nonequity alliances in the US biopharmaceutical industry.

Findings

The authors propose that there is a positive linkage between partner-rival co-location risk and the formation of a steering committee in a nonequity alliance, which receives strong empirical support. Further, this relationship is significantly moderated by the breadth (alliance scope) but not the depth (reciprocal interdependence) of interaction between the partnering firms.

Originality/value

This paper is a pioneer to shed light on “partner-rival co-location risk” and how partner-rival co-location risk affects the governance decision of whether to establish a steering committee in a nonequity alliance, thus offering important theoretical and practical insights into competition and cooperation in alliance management.

Details

Journal of Business & Industrial Marketing, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0885-8624

Keywords

Article
Publication date: 13 May 2024

Rıdvan Ata and Muhammet Mustafa Alpaslan

The aim of this study was to shed some light on the extent to which digital literacy, epistemological belief and reading motivation and engagement predict pre-service teachers’…

Abstract

Purpose

The aim of this study was to shed some light on the extent to which digital literacy, epistemological belief and reading motivation and engagement predict pre-service teachers’ capabilities in teaching 21st century skills.

Design/methodology/approach

21st Century Skills Teaching Scale, Internet based Epistemological Beliefs Scale, Internet based Reading Motivation and Engagement Scale as well as Digital Literacy Scale were used to collect the data. A total of 512 pre-service teachers from four universities in Türkiye participated in the study. Descriptive statistics, correlation and structural equation model fitness tests were performed by using SPSS 24.0 and AMOS 22.0.

Findings

First, the results of the correlations analysis indicated that there were statistically significant positive correlations among measured variables. Second, the results of the path and SEM model fit tests demonstrated that all the model fit indices of X2/df, TLI, CFI, RMSEA met the acceptable criteria and were shown to be an adequate model structure. Finally, the results demonstrated strong evidence for predicting effects of digital literacy, epistemological belief as well as reading motivation and engagement on teaching 21st century skills.

Research limitations/implications

This study is limited by the fact that the evidence relies solely on pre-service teachers' self-reporting. Secondly, although the hypothesised model explained 45.2% variance of pre-service teachers’ competence in the 21st century skills, 54.8% of it remains unexplained.

Originality/value

The results of this study suggest important implications for teaching programs as they underscore the importance of digital literacy on epistemological beliefs, reading motivation and competence in teaching 21st century skills.

Details

The International Journal of Information and Learning Technology, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4880

Keywords

Article
Publication date: 3 April 2024

Deraniyagalage Chanaka Karunarathna, H.A.H.P. Perera, B.A.K.S. Perera and P.A.P.V.D.S. Disaratna

Delays in utility shifting during road construction have broad ramifications. These delays not only lengthen the project's timeline but also raise expenses and cause problems with…

17

Abstract

Purpose

Delays in utility shifting during road construction have broad ramifications. These delays not only lengthen the project's timeline but also raise expenses and cause problems with resource allocation. Thus, this study investigates the influence of delay in utility shifting for extension of time claims in road construction projects (RCPs) in Sri Lanka.

Design/methodology/approach

The study used a quantitative approach with three rounds of Delphi surveys to gather empirical data. Further, the probability impact assessment was used to carefully analyse the data and appraise the information gathered.

Findings

The findings initially revealed 33 causes of delays in utility shifting for extension of time claims in RCPs in Sri Lanka. Ultimately, 11 severe causes were identified based on their high probability and impact, concluding with 45 strategies that were assigned to overcoming those most severe causes of delay.

Originality/value

This study will contribute to the industry and theory by providing solutions to handle utility-shifting delays with the linkage of preventing time extension claims for RCPs in Sri Lanka. Further, there is a dearth of literature in the research area, both locally and globally. Thus, the findings of this research will provide a benchmark for further detailed studies in other countries as well.

Details

Smart and Sustainable Built Environment, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2046-6099

Keywords

Article
Publication date: 31 March 2023

Zul-Atfi Ismail

Green building (GB) maintenance is increasingly accepted in the construction industry, so it can now be interpreted as an industry best practice for maintenance planning. However…

Abstract

Purpose

Green building (GB) maintenance is increasingly accepted in the construction industry, so it can now be interpreted as an industry best practice for maintenance planning. However, the performance competency and design knowledge of the practice's building control instrument process can be affected by its evaluation and the information management of building information modelling (BIM)–based model checking (BMC). These maintenance-planning problems have not yet been investigated in instances such as the Grenfell Tower fire (14 June 2017, approximately 80 fatalities) in North Kensington, West London.

Design/methodology/approach

This study proposes a theoretical framework for analysing the existing conceptualisation of BIM tools and techniques based on a critical review of GB maintenance environments. These are currently employed on GB maintenance ecosystems embedded in project teams that can affect BMC practices in the automation system process. In order to better understand how BMC is implemented in GB ecosystem projects, a quantitative case study is conducted in the Malaysian public works department (Jabatan Kerja Raya (JKR)).

Findings

GB ecosystem projects were not as effective as planned due to safety awareness, design planning, inadequate track insulation, environmental (in) compatibility and inadequate building access management. Descriptive statistics and an ANOVA were applied to analyse the data. The study is reinforced by a process flow, which is transformed into a theoretical framework.

Originality/value

Industry practitioners can use the developed framework to diagnose BMC application issues and leverage the staff competency inherent in an ecosystem to plan GB maintenance environments successfully.

Details

Journal of Enterprise Information Management, vol. 37 no. 3
Type: Research Article
ISSN: 1741-0398

Keywords

Article
Publication date: 17 April 2024

Zul-Atfi Ismail

This paper aims to identify the different system approach using Building Information Modelling (BIM) technology that is equipped with decision making processes. Maintenance…

Abstract

Purpose

This paper aims to identify the different system approach using Building Information Modelling (BIM) technology that is equipped with decision making processes. Maintenance planning and management are integral components of the construction sector, serving the broader purpose of post-construction activities and processes. However, as Precast Concrete (PC) construction projects increase in scale and complexity, the interconnections among these activities and processes become apparent, leading to planning and performance management challenges. These challenges specifically affect the monitoring of façade components for corrective and preventive maintenance actions.

Design/methodology/approach

The concept of maintenance planning for façades, along with the main features of information and communication technology tools and techniques using building information modeling technology, is grounded in the analysis of numerous literature reviews in PC building scenarios.

Findings

This research focuses on an integrated system designed to analyze information and support decision-making in maintenance planning for PC buildings. It is based on robust data collection regarding concrete façades' failures and causes. The system aims to provide appropriate planning decisions and minimize the risk of façade failures throughout the building's lifetime.

Originality/value

The study concludes that implementing a research framework to develop such a system can significantly enhance the effectiveness of maintenance planning for façade design, construction and maintenance operations.

Details

Facilities , vol. 42 no. 7/8
Type: Research Article
ISSN: 0263-2772

Keywords

Article
Publication date: 26 April 2022

Elham Kariri and Kusum Yadav

In the final step, the trust model is applied to the on-demand federated multipath distance vector routing protocol (AOMDV) to introduce path trust as a foundation for routing…

Abstract

Purpose

In the final step, the trust model is applied to the on-demand federated multipath distance vector routing protocol (AOMDV) to introduce path trust as a foundation for routing selection in the route discovery phase, construct a trusted path, and implement a path warning mechanism to detect malicious nodes in the route maintenance phase, respectively.

Design/methodology/approach

A trust-based on-demand multipath distance vector routing protocol is being developed to address the problem of flying ad-hoc network being subjected to internal attacks and experiencing frequent connection interruptions. Following the construction of the node trust assessment model and the presentation of trust evaluation criteria, the data packet forwarding rate, trusted interaction degree and detection packet receipt rate are discussed. In the next step, the direct trust degree of the adaptive fuzzy trust aggregation network compute node is constructed. After then, rely on the indirect trust degree of neighbouring nodes to calculate the trust degree of the node in the network. Design a trust fluctuation penalty mechanism, as a second step, to defend against the switch attack in the trust model.

Findings

When compared to the lightweight trust-enhanced routing protocol (TEAOMDV), it significantly improves the data packet delivery rate and throughput of the network significantly.

Originality/value

Additionally, it reduces the amount of routing overhead and the average end-to-end delay.

Details

International Journal of Pervasive Computing and Communications, vol. 20 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 28 March 2022

Nidhi Raghav and Anoop Kumar Bhola

To make more smart health-care system, the health-care data should be shared in the secure manner, and it improves health-care service quality. This paper aims to implement a…

Abstract

Purpose

To make more smart health-care system, the health-care data should be shared in the secure manner, and it improves health-care service quality. This paper aims to implement a modern decentralized blockchain, safe and easy-to-use health-care technology application in the cloud.

Findings

On observing the graph, the convergence analysis of proposed Levy Flight-integrated moth flame optimization method at 80th iteration was 4.59%, 2.80%, 3.316%, 8.92% and 2.55% higher than the traditional models MFO, artificial bee colony (ABC), particle swarm optimization (PSO), moth search algorithm (MSA) and glow worm swarm optimization (GWSO), respectively, for Hungarian data set. Particularly, in best case scenario, the adopted method attains low cost value (5.672671) when compared to all other traditional models such as MFO (5.727314), ABC (5.711577), PSO (5.706499), MSA (5.764517) and GWSO (5.723353).

Originality/value

The proposed method achieved effective performance in terms of key sensitivity, sanitization effectiveness, restoration effectiveness, etc.

Details

Journal of Engineering, Design and Technology, vol. 22 no. 2
Type: Research Article
ISSN: 1726-0531

Keywords

Article
Publication date: 15 December 2023

Umar Nawaz Kayani

This study aims to give a glimpse of the existing blockchain applications across industries and add to a complete knowledge of the blockchain’s properties.

Abstract

Purpose

This study aims to give a glimpse of the existing blockchain applications across industries and add to a complete knowledge of the blockchain’s properties.

Design/methodology/approach

Systematic literature review is used as the research strategy for this investigation and other aspects of the preferred reporting items for systematic reviews and meta-analyses framework have been incorporated to create a scholarly publications evaluation of the blockchain-based application in the financial arena and its future. The research looks at 86 studies published between 2018 and 2022.

Findings

There has been a steady but noticeable increase in the study of blockchain’s potential in many application domains over the past few of years. This rising tendency illustrates the newness and potential of blockchain technology, as well as the increasing attention from academics. According to the findings, blockchain is an appropriate solution for processing transactions using cryptocurrencies; nevertheless, it still has significant technical issues and limits that require to be exploring and solving before it can be considered a viable option. It is therefore, necessary to have a high level of reliability for payments and confidentiality, in addition to maintaining the anonymity of nodes, to stop assaults and efforts to disrupt transactions in the blockchain.

Practical implications

This study has several important theoretical and practical implications. First, it adds to the body of knowledge on blockchain and Fintech, focusing on the transaction side. While much blockchain research has focused on how the technology may affect strategic choices, this study has shed light on its potential from the perspective of financial reporting. Second, by highlighting the importance of the demand for the prompt identification of losses, this work adds to the body of knowledge on the factors that influence transaction frauds involving paper money. Additionally, by establishing the link between transparency and virtual transactions, the author backs up the asymmetric responses of investors to different investment possibilities. It looks at the evolution of financial technology (Fintech) and shows how it can be used to take the advantage of unique opportunities.

Originality/value

The study is different and novel from the previously published literature on this topic mainly because of its comprehensiveness, as it revolves around all industrial and commercial areas. The three main lines of research have been outlined, namely, classifying the many blockchain-based innovations that will alter the financial landscape in many industries; identifying whether these industries are a good fit for blockchain’s wealth creation potential; and directing researchers by outlining prospective study pathways.

Details

Journal of Science and Technology Policy Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2053-4620

Keywords

1 – 10 of 10