Search results

1 – 10 of 657
Article
Publication date: 26 April 2024

Rajender Kumar and Dinesh K. Gupta

The purpose of this paper is to examine the restructuring of human resources development processes in Indian Institutes of Technology (IIT) libraries in North India, emphasizing…

Abstract

Purpose

The purpose of this paper is to examine the restructuring of human resources development processes in Indian Institutes of Technology (IIT) libraries in North India, emphasizing the essential information and communications technology (ICT) skills for both recruits and existing staff.

Design/methodology/approach

The study used a survey research design, with two different sets of structured questionnaires used to collect data. The first set, which was distributed to all heads of seven IIT libraries in North India, received a 100% response rate. Simultaneously, the second set was distributed to library users, yielding a 92% response rate (680 responses out of 700 distributed). The collected data were analyzed and tabulated, with suitable interpretations.

Findings

The findings of the study reveal that all examined libraries have implemented skill development programs. Moreover, advanced ICT skills are considered essential for staff appointments, and specific institutes (IIT Kanpur, IIT Delhi, IIT Jodhpur and IIT Ropar) took the initiative to provide ICT training to their employees. Trained employees exhibited enhanced performance, attributed to advanced ICT knowledge. The study suggests restructuring selection criteria and introducing structured ICT training programs for library staff, ensuring a more adept workforce for current demands.

Research limitations/implications

The study can increase the impact globally on human resource development by incorporating soft skills, job satisfaction and leadership development while exploring research opportunities through cross-institutional comparisons and the integration of emerging technologies such as artificial intelligence and virtual reality.

Originality/value

This study collected primary data from IIT libraries in North India using self-designed questionnaires. The findings provide useful insights into how libraries might restructure human resource development in the digital age.

Details

Global Knowledge, Memory and Communication, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2514-9342

Keywords

Article
Publication date: 9 April 2024

Long Liu, Lifeng Wang and Ziwang Xiao

The combination of an Engineered Cementitious Composite (ECC) layer and steel plate to reinforce RC beams (ESRB) is a new strengthening method. The ESRB was proposed based on the…

Abstract

Purpose

The combination of an Engineered Cementitious Composite (ECC) layer and steel plate to reinforce RC beams (ESRB) is a new strengthening method. The ESRB was proposed based on the steel plate at the bottom of RC beams, aiming to solve the problem of over-reinforced RC beams and improve the bearing capacity of RC beams without affecting their ductility.

Design/methodology/approach

In this paper, the finite element model of ESRB was established by ABAQUS. The results were compared with the experimental results of ESRB in previous studies and the reliability of the finite element model was verified. On this basis, parameters such as the width of the steel plate, thickness of the ECC layer, damage degree of the original beam and cross-sectional area of longitudinal tensile rebar were analyzed by the verified finite element model. Based on the load–deflection curve of ESRB, ESRB was discussed in terms of ultimate bearing capacity and ductility.

Findings

The results demonstrate that when the width of the steel plate increases, the ultimate load of ESRB increases to 133.22 kN by 11.58% as well as the ductility index increases to 2.39. With the increase of the damage degree of the original beam, the ultimate load of ESRB decreases by 23.7%–91.09 kN and the ductility index decreases to 1.90. With the enhancement of the cross-sectional area of longitudinal tensile rebar, the ultimate bearing capacity of ESRB increases to 126.75 kN by 6.2% and the ductility index elevates to 2.30. Finally, a calculation model for predicting the flexural capacity of ESRB is proposed. The calculated results of the model are in line with the experimental results.

Originality/value

Based on the comparative analysis of the test results and numerical simulation results of 11 test beams, this investigation verified the accuracy and reliability of the finite element simulation from the aspects of load–deflection curve, characteristic load and failure mode. Furthermore, based on load–deflection curve, the effects of steel plate width, ECC layer thickness, damage degree of the original beam and cross-sectional area of longitudinal tensile rebar on the ultimate bearing capacity and ductility of ESRB were discussed. Finally, a simplified method was put forward to further verify the effectiveness of ESRB through analytical calculation.

Details

International Journal of Structural Integrity, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1757-9864

Keywords

Article
Publication date: 17 June 2021

Ambica Ghai, Pradeep Kumar and Samrat Gupta

Web users rely heavily on online content make decisions without assessing the veracity of the content. The online content comprising text, image, video or audio may be tampered…

1165

Abstract

Purpose

Web users rely heavily on online content make decisions without assessing the veracity of the content. The online content comprising text, image, video or audio may be tampered with to influence public opinion. Since the consumers of online information (misinformation) tend to trust the content when the image(s) supplement the text, image manipulation software is increasingly being used to forge the images. To address the crucial problem of image manipulation, this study focusses on developing a deep-learning-based image forgery detection framework.

Design/methodology/approach

The proposed deep-learning-based framework aims to detect images forged using copy-move and splicing techniques. The image transformation technique aids the identification of relevant features for the network to train effectively. After that, the pre-trained customized convolutional neural network is used to train on the public benchmark datasets, and the performance is evaluated on the test dataset using various parameters.

Findings

The comparative analysis of image transformation techniques and experiments conducted on benchmark datasets from a variety of socio-cultural domains establishes the effectiveness and viability of the proposed framework. These findings affirm the potential applicability of proposed framework in real-time image forgery detection.

Research limitations/implications

This study bears implications for several important aspects of research on image forgery detection. First this research adds to recent discussion on feature extraction and learning for image forgery detection. While prior research on image forgery detection, hand-crafted the features, the proposed solution contributes to stream of literature that automatically learns the features and classify the images. Second, this research contributes to ongoing effort in curtailing the spread of misinformation using images. The extant literature on spread of misinformation has prominently focussed on textual data shared over social media platforms. The study addresses the call for greater emphasis on the development of robust image transformation techniques.

Practical implications

This study carries important practical implications for various domains such as forensic sciences, media and journalism where image data is increasingly being used to make inferences. The integration of image forgery detection tools can be helpful in determining the credibility of the article or post before it is shared over the Internet. The content shared over the Internet by the users has become an important component of news reporting. The framework proposed in this paper can be further extended and trained on more annotated real-world data so as to function as a tool for fact-checkers.

Social implications

In the current scenario wherein most of the image forgery detection studies attempt to assess whether the image is real or forged in an offline mode, it is crucial to identify any trending or potential forged image as early as possible. By learning from historical data, the proposed framework can aid in early prediction of forged images to detect the newly emerging forged images even before they occur. In summary, the proposed framework has a potential to mitigate physical spreading and psychological impact of forged images on social media.

Originality/value

This study focusses on copy-move and splicing techniques while integrating transfer learning concepts to classify forged images with high accuracy. The synergistic use of hitherto little explored image transformation techniques and customized convolutional neural network helps design a robust image forgery detection framework. Experiments and findings establish that the proposed framework accurately classifies forged images, thus mitigating the negative socio-cultural spread of misinformation.

Details

Information Technology & People, vol. 37 no. 2
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 6 July 2023

Fayaz Ahmad Loan, Aasif Mohammad Khan, Syed Aasif Ahmad Andrabi, Sozia Rashid Sozia and Umer Yousuf Parray

The purpose of the present study is to identify the active and dead links of uniform resource locators (URLs) associated with web references and to compare the effectiveness of…

Abstract

Purpose

The purpose of the present study is to identify the active and dead links of uniform resource locators (URLs) associated with web references and to compare the effectiveness of Chrome, Google and WayBack Machine in retrieving the dead URLs.

Design/methodology/approach

The web references of the Library Hi Tech from 2004 to 2008 were selected for analysis to fulfill the set objectives. The URLs were extracted from the articles to verify their accessibility in terms of persistence and decay. The URLs were then executed directly in the internet browser (Chrome), search engine (Google) and Internet Archive (WayBack Machine). The collected data were recorded in an excel file and presented in tables/diagrams for further analysis.

Findings

From the total of 1,083 web references, a maximum number was retrieved by the WayBack Machine (786; 72.6 per cent) followed by Google (501; 46.3 per cent) and the lowest by Chrome (402; 37.1 per cent). The study concludes that the WayBack Machine is more efficient, retrieves a maximum number of missing web citations and fulfills the mission of preservation of web sources to a larger extent.

Originality/value

A good number of studies have been conducted to analyze the persistence and decay of web-references; however, the present study is unique as it compared the dead URL retrieval effectiveness of internet explorer (Chrome), search engine giant (Google) and WayBack Machine of the Internet Archive.

Research limitations/implications

The web references of a single journal, namely, Library Hi Tech, were analyzed for 5 years only. A major study across disciplines and sources may yield better results.

Practical implications

URL decay is becoming a major problem in the preservation and citation of web resources. The study has some healthy recommendations for authors, editors, publishers, librarians and web designers to improve the persistence of web references.

Details

Data Technologies and Applications, vol. 58 no. 2
Type: Research Article
ISSN: 2514-9288

Keywords

Article
Publication date: 11 January 2023

Nor Salwani Hashim and Fatimah De’nan

It is generally known that the perforated section such as the castellated section is good to sustain distributed loads but inadequate to sustain highly concentrated loads…

Abstract

Purpose

It is generally known that the perforated section such as the castellated section is good to sustain distributed loads but inadequate to sustain highly concentrated loads. Therefore, it is possible to design the opening in a different arrangement of web opening to achieve section efficiency, thus improving the strength and torsional behaviour of the section with web opening. This study aims to focus on the finite element analysis of I-beam with and without openings in steel section dominated to lateral-torsional buckling behaviour.

Design/methodology/approach

In this work, the analysis of different sizes, shapes and arrangements of web opening is performed by using LUSAS application to conduct numerical analysis on lateral-torsional buckling behaviour. This involves three diameter sizes of web opening, five types of opening shapes and two criteria of the model.

Findings

The section with c-hexagon web opening was placed about 200-mm centre to centre and 100-mm edge distance, contribute to 7.26% increase of buckling capacity. For the section with 150-mm centre to centre and 50-mm edge distance, the occurrence of local buckling contributes to decrease of lateral buckling section capacity to 19.943 kNm, where pure lateral-torsional buckling mostly occurred because of prevented section. Besides that, the web opening diameter was also analysed. The web crippling was observed because of the increase of opening diameter from 0.67 to 0.80 D.

Originality/value

This contributes to a decrease in buckling capacity as figured in the contour of the deformed shape. For Model 1, an increase of buckling capacity (31.46%) is observed when the opening diameter are changed from 0.67 to 0.80 D.

Details

World Journal of Engineering, vol. 21 no. 2
Type: Research Article
ISSN: 1708-5284

Keywords

Book part
Publication date: 23 April 2024

Emerson Norabuena-Figueroa, Roger Rurush-Asencio, K. P. Jaheer Mukthar, Jose Sifuentes-Stratti and Elia Ramírez-Asís

The development of information technologies has led to a considerable transformation in human resource management from conventional or commonly known as personnel management to…

Abstract

The development of information technologies has led to a considerable transformation in human resource management from conventional or commonly known as personnel management to modern one. Data mining technology, which has been widely used in several applications, including those that function on the web, includes clustering algorithms as a key component. Web intelligence is a recent academic field that calls for sophisticated analytics and machine learning techniques to facilitate information discovery, particularly on the web. Human resource data gathered from the web are typically enormous, highly complex, dynamic, and unstructured. Traditional clustering methods need to be upgraded because they are ineffective. Standard clustering algorithms are enhanced and expanded with optimization capabilities to address this difficulty by swarm intelligence, a subset of nature-inspired computing. We collect the initial raw human resource data and preprocess the data wherein data cleaning, data normalization, and data integration takes place. The proposed K-C-means-data driven cuckoo bat optimization algorithm (KCM-DCBOA) is used for clustering of the human resource data. The feature extraction is done using principal component analysis (PCA) and the classification of human resource data is done using support vector machine (SVM). Other approaches from the literature were contrasted with the suggested approach. According to the experimental findings, the suggested technique has extremely promising features in terms of the quality of clustering and execution time.

Details

Technological Innovations for Business, Education and Sustainability
Type: Book
ISBN: 978-1-83753-106-6

Keywords

Article
Publication date: 23 January 2024

Tiare Gonzalez-Vidal and Paul Moore

The professional experiences of teachers of languages and cultures, along with the learning experiences of their students, are embedded in educational contexts, which themselves…

Abstract

Purpose

The professional experiences of teachers of languages and cultures, along with the learning experiences of their students, are embedded in educational contexts, which themselves are informed, and constrained, by national language policies. This study aims to explore 51 English-as-a-foreign-language (EFL) secondary teachers’ perceptions of Web-based technology use to enhance students’ cultural awareness in Chile. Specifically, the study investigated teachers’ use of Web-based resources for cultural awareness, culture content and technology-based tasks, as well as perceived challenges in implementing technology-enhanced language and culture learning.

Design/methodology/approach

The study adopted a mixed-method research design combining online questionnaires and interviews as data collection tools. Results were analyzed through the use of descriptive statistics and content analysis.

Findings

The teachers in this study emphasized reflection in their classrooms but did not take a critical approach. Their approach to culture was limited to a “country-specific” view, and technology-enhanced activities accentuated differences rather than promoting meaningful intercultural exchange. Challenges to the successful implementation of technology-enhanced language and culture learning included a somewhat out-of-date theoretical approach to intercultural learning in the national curriculum, a nationwide approach to professional development that lacks a focus on critical reflection and inadequate support for effective use of technologies in schools.

Practical implications

The study highlights the importance of periodically revising a country’s EFL language policies, communication methods, support mechanisms and implementation factors to ensure classroom integration of language, culture and technology education.

Originality/value

This paper explores the tension between macro-level national policy and teachers’ perspectives on their classroom practice, including the contextualized limitations of implementing national policy at the micro level.

Details

Journal for Multicultural Education, vol. 18 no. 1/2
Type: Research Article
ISSN: 2053-535X

Keywords

Article
Publication date: 23 April 2024

Lu Zhang, Pu Dong, Long Zhang, Bojiao Mu and Ahui Yang

This study aims to explore the dissemination and evolutionary path of online public opinion from a crisis management perspective. By clarifying the influencing factors and dynamic…

Abstract

Purpose

This study aims to explore the dissemination and evolutionary path of online public opinion from a crisis management perspective. By clarifying the influencing factors and dynamic mechanisms of online public opinion dissemination, this study provides insights into attenuating the negative impact of online public opinion and creating a favorable ecological space for online public opinion.

Design/methodology/approach

This research employs bibliometric analysis and CiteSpace software to analyze 302 Chinese articles published from 2006 to 2023 in the China National Knowledge Infrastructure (CNKI) database and 276 English articles published from 1994 to 2023 in the Web of Science core set database. Through literature keyword clustering, co-citation analysis and burst terms analysis, this paper summarizes the core scientific research institutions, scholars, hot topics and evolutionary paths of online public opinion crisis management research from both Chinese and international academic communities.

Findings

The results show that the study of online public opinion crisis management in China and internationally is centered on the life cycle theory, which integrates knowledge from information, computer and system sciences. Although there are differences in political interaction and stage evolution, the overall evolutionary path is similar, and it develops dynamically in the “benign conflict” between the expansion of the research perspective and the gradual refinement of research granularity.

Originality/value

This study summarizes the research results of online public opinion crisis management from China and the international academic community and identifies current research hotspots and theoretical evolution paths. Future research can focus on deepening the basic theories of public opinion crisis management under the influence of frontier technologies, exploring the subjectivity and emotionality of web users using fine algorithms and promoting the international development of network public opinion crisis management theory through transnational comparison and international cooperation.

Details

Kybernetes, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 1 April 2024

Tao Pang, Wenwen Xiao, Yilin Liu, Tao Wang, Jie Liu and Mingke Gao

This paper aims to study the agent learning from expert demonstration data while incorporating reinforcement learning (RL), which enables the agent to break through the…

Abstract

Purpose

This paper aims to study the agent learning from expert demonstration data while incorporating reinforcement learning (RL), which enables the agent to break through the limitations of expert demonstration data and reduces the dimensionality of the agent’s exploration space to speed up the training convergence rate.

Design/methodology/approach

Firstly, the decay weight function is set in the objective function of the agent’s training to combine both types of methods, and both RL and imitation learning (IL) are considered to guide the agent's behavior when updating the policy. Second, this study designs a coupling utilization method between the demonstration trajectory and the training experience, so that samples from both aspects can be combined during the agent’s learning process, and the utilization rate of the data and the agent’s learning speed can be improved.

Findings

The method is superior to other algorithms in terms of convergence speed and decision stability, avoiding training from scratch for reward values, and breaking through the restrictions brought by demonstration data.

Originality/value

The agent can adapt to dynamic scenes through exploration and trial-and-error mechanisms based on the experience of demonstrating trajectories. The demonstration data set used in IL and the experience samples obtained in the process of RL are coupled and used to improve the data utilization efficiency and the generalization ability of the agent.

Details

International Journal of Web Information Systems, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1744-0084

Keywords

Article
Publication date: 4 April 2024

Artur Strzelecki

This paper aims to give an overview of the history and evolution of commercial search engines. It traces the development of search engines from their early days to their current…

Abstract

Purpose

This paper aims to give an overview of the history and evolution of commercial search engines. It traces the development of search engines from their early days to their current form as complex technology-powered systems that offer a wide range of features and services.

Design/methodology/approach

In recent years, advancements in artificial intelligence (AI) technology have led to the development of AI-powered chat services. This study explores official announcements and releases of three major search engines, Google, Bing and Baidu, of AI-powered chat services.

Findings

Three major players in the search engine market, Google, Microsoft and Baidu started to integrate AI chat into their search results. Google has released Bard, later upgraded to Gemini, a LaMDA-powered conversational AI service. Microsoft has launched Bing Chat, renamed later to Copilot, a GPT-powered by OpenAI search engine. The largest search engine in China, Baidu, released a similar service called Ernie. There are also new AI-based search engines, which are briefly described.

Originality/value

This paper discusses the strengths and weaknesses of the traditional – algorithmic powered search engines and modern search with generative AI support, and the possibilities of merging them into one service. This study stresses the types of inquiries provided to search engines, users’ habits of using search engines and the technological advantage of search engine infrastructure.

Details

Library Hi Tech News, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0741-9058

Keywords

1 – 10 of 657