Search results

1 – 10 of 397
Article
Publication date: 11 April 2022

Francisco Buitrago-Florez, Mario Sanchez, Vanessa Pérez Romanello, Carola Hernandez and Marcela Hernández Hoyos

Numerous challenges in education emerge as our technology-driven society rapidly evolves and manifests more exigent requirements from engineering professionals. Higher education…

Abstract

Purpose

Numerous challenges in education emerge as our technology-driven society rapidly evolves and manifests more exigent requirements from engineering professionals. Higher education, nonetheless, seems to adapt to such requirements at an unequal speed, generating some tensions between industry and higher education institutions. The purpose of this paper is to share the experiences obtained through a process of assessment and redesign of a large enrollment course of programming from which the authors developed a systematic approach for course design/redesign.

Design/methodology/approach

A mixed method approach was deployed for data gathering and evaluation, consisting of close-ended surveys, open-ended questionnaires, information matrices and state of the art compilation. Triangulation of the information offered clear data about the necessity of curriculum redesign; therefore, a new programming course curriculum encompassed with relevant necessities in engineering and science was developed.

Findings

The authors produced a coherent and dynamic systematic path for assessment and design/redesign of course curriculum, which the authors find extremely helpful to improve negotiation processes inside higher education institutions, as it can be implemented to improve any large enrollment course curricula in engineering and science.

Research limitations/implications

By following the systematic path for assessment and design/redesign of curricula the authors developed, higher education systems could embark more efficiently in the ever-challenging process of adapt their courses and programs to tackle the upcoming demands of our society.

Originality/value

So far, a systematic path for assessment and design/redesign of course curriculum was not published, and it supports the improvement of pedagogical approaches in academic institutions.

Article
Publication date: 24 April 2024

Bahman Arasteh and Ali Ghaffari

Reducing the number of generated mutants by clustering redundant mutants, reducing the execution time by decreasing the number of generated mutants and reducing the cost of…

Abstract

Purpose

Reducing the number of generated mutants by clustering redundant mutants, reducing the execution time by decreasing the number of generated mutants and reducing the cost of mutation testing are the main goals of this study.

Design/methodology/approach

In this study, a method is suggested to identify and prone the redundant mutants. In the method, first, the program source code is analyzed by the developed parser to filter out the effectless instructions; then the remaining instructions are mutated by the standard mutation operators. The single-line mutants are partially executed by the developed instruction evaluator. Next, a clustering method is used to group the single-line mutants with the same results. There is only one complete run per cluster.

Findings

The results of experiments on the Java benchmarks indicate that the proposed method causes a 53.51 per cent reduction in the number of mutants and a 57.64 per cent time reduction compared to similar experiments in the MuJava and MuClipse tools.

Originality/value

Developing a classifier that takes the source code of the program and classifies the programs' instructions into effective and effectless classes using a dependency graph; filtering out the effectless instructions reduces the total number of mutants generated; Developing and implementing an instruction parser and instruction-level mutant generator for Java programs; the mutant generator takes instruction in the original program as a string and generates its single-line mutants based on the standard mutation operators in MuJava; Developing a stack-based evaluator that takes an instruction (original or mutant) and the test data and evaluates its result without executing the whole program.

Details

Data Technologies and Applications, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2514-9288

Keywords

Article
Publication date: 21 December 2022

Mageda A. Sharafeddin and Ahmad Samarji

In a technological era driven by coding, programming and artificial intelligence (AI), there is more need than ever to develop computing skills and knowledge for non-specialist…

Abstract

Purpose

In a technological era driven by coding, programming and artificial intelligence (AI), there is more need than ever to develop computing skills and knowledge for non-specialist students. Nonetheless, the literature on computer science teaching methods of non-scientific majors is not as comprehensive as that of scientific ones.

Design/methodology/approach

Pedagogically, the authors designed and implemented prototyping from John Dewey's pragmatic epistemological lens. Using a mixed methods approach, the authors tested the effectiveness and efficiency of this approach within the same course over four semesters across four academic years.

Findings

As an epistemological pedagogic device, prototyping facilitated learning by doing and experimenting and stimulated graduate students' self-directed learning, engagement and their overall ownership of the learning and teaching process, changing their role from being merely passive recipients of “strange, awkward and unfamiliar” knowledge to active constructors of “relevant and exciting” content knowledge. Such a change was reflected in the significant progress students made, driven by their commitment, motivation and enthusiasm, irrespective of their prior knowledge and age (Generations X, Y and Z). Prototyping also served as an avenue for a “Deweyian Reflection”, where graduate students, after internalizing the acquired computing skills and knowledge, started transferring such skills and knowledge to their professions (journalism and public relations (PR)) and daily practices.

Research limitations/implications

Findings from this study will add to the literature review on this subject matter and will inform future case studies in computer science education for graduate students from non-scientific backgrounds.

Practical implications

This paper reveals that learning by doing/experimenting needs to be accompanied by in-depth reflection to enable students to transfer the acquired knowledge and skills to other settings and contexts beyond that of the lesson, task, or project in hand.

Originality/value

There is little research published on introductory programming courses offered to non-specialized students (i.e. students from non-scientific backgrounds). This study contributes to the body of research on how to effectively engage these students in programming courses informed by John Dewey's pragmatic lens/epistemological lens.

Details

Journal of Applied Research in Higher Education, vol. 15 no. 5
Type: Research Article
ISSN: 2050-7003

Keywords

Article
Publication date: 1 February 2022

Ariel Rosenfeld and Nitzan Haimovich

In this work, the authors propose to harness the advantages of behavioral programming as a new technique for designing rule-based conversational agents.

Abstract

Purpose

In this work, the authors propose to harness the advantages of behavioral programming as a new technique for designing rule-based conversational agents.

Design/methodology/approach

To examine the study’s hypotheses, the authors perform a first-of-its-kind user study through which the authors examine how potential designers, both expert designers, computationally-oriented designers, and otherwise, leverage behavioral programming (BP) and dialog graphs for designing conversational agents (CAs). The authors also use two standard CA settings common in the literature: designing a CA representative for a user in an online dating service and a non-character player in a role-playing game (RPG).

Findings

The study’s results indicate that BP can be successfully utilized by computationally-oriented designers, with or without prior knowledge in CA design, and can facilitate the design of better CAs (i.e. more accurate and more robust). However, to capitalize on these potential advantages, designers may be required to devote more time to the design process and are likely to encounter higher temporal demand levels. These results suggest that BP, which was initially proposed and evaluated in the general context of software design, can constitute a valuable alternative to the classic rule-based CA design technique commonly practiced today.

Research limitations/implications

An important limitation of this study is the relatively small participant pool. While the authors do plan to extend this study in the future, the current coronavirus disease 2019 (COVID-19) situation makes it ever more complex to conduct formal user studies of this kind. It is, however, important to note that despite the low number of participants, many of the results are found to be statistically significant.

Practical implications

The authors plan to continue this line of work and conduct human studies for additional design techniques in other popular agent-based settings. Specifically, the authors seek to explore how people of different backgrounds should design agents for various tasks such as automated negotiation (e.g. how should a person design a representative agent to negotiate on her behalf?) and social choice (e.g. how should a person design a voting bot to represent her in online voting systems?).

Originality/value

People are increasingly interacting with conversational agents in various settings and for a variety of reasons, as the market size of those agents keeps on growing every year. Through a first-of-its-kind human study (N = 41), consisting of both expert designers, computationally-oriented designers, and otherwise, the authors demonstrate a few key advantages and limitations of BP in the realm of conversational agents and propose its consideration as an alternative to the classic dialog graph technique.

Details

EuroMed Journal of Business, vol. 18 no. 3
Type: Research Article
ISSN: 1450-2194

Keywords

Article
Publication date: 10 July 2023

Md. Mehrab Hossain, Shakil Ahmed, S.M. Asif Anam, Irmatova Aziza Baxramovna, Tamanna Islam Meem, Md. Habibur Rahman Sobuz and Iffat Haq

Construction safety is a crucial aspect that has far-reaching impacts on economic development. But safety monitoring is often reliant on labor-based observations, which can be…

Abstract

Purpose

Construction safety is a crucial aspect that has far-reaching impacts on economic development. But safety monitoring is often reliant on labor-based observations, which can be prone to errors and result in numerous fatalities annually. This study aims to address this issue by proposing a cloud-building information modeling (BIM)-based framework to provide real-time safety monitoring on construction sites to enhance safety practices and reduce fatalities.

Design/methodology/approach

This system integrates an automated safety tracking mobile app to detect hazardous locations on construction sites, a cloud-based BIM system for visualization of worker tracking on a virtual construction site and a Web interface to visualize and monitor site safety.

Findings

The study’s results indicate that implementing a comprehensive automated safety monitoring approach is feasible and suitable for general indoor construction site environments. Furthermore, the assessment of an advanced safety monitoring system has been successfully implemented, indicating its potential effectiveness in enhancing safety practices in construction sites.

Practical implications

By using this system, the construction industry can prevent accidents and fatalities, promote the adoption of new technologies and methods with minimal effort and cost and improve safety outcomes and productivity. This system can reduce workers’ compensation claims, insurance costs and legal penalties, benefiting all stakeholders involved.

Originality/value

To the best of the authors’ knowledge, this study represents the first attempt in Bangladesh to develop a mobile app-based technological solution aimed at reforming construction safety culture by using BIM technology. This has the potential to change the construction sector’s attitude toward accepting new technologies and cultures through its convenient choice of equipment.

Details

Construction Innovation , vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1471-4175

Keywords

Article
Publication date: 29 March 2024

Sihao Li, Jiali Wang and Zhao Xu

The compliance checking of Building Information Modeling (BIM) models is crucial throughout the lifecycle of construction. The increasing amount and complexity of information…

Abstract

Purpose

The compliance checking of Building Information Modeling (BIM) models is crucial throughout the lifecycle of construction. The increasing amount and complexity of information carried by BIM models have made compliance checking more challenging, and manual methods are prone to errors. Therefore, this study aims to propose an integrative conceptual framework for automated compliance checking of BIM models, allowing for the identification of errors within BIM models.

Design/methodology/approach

This study first analyzed the typical building standards in the field of architecture and fire protection, and then the ontology of these elements is developed. Based on this, a building standard corpus is built, and deep learning models are trained to automatically label the building standard texts. The Neo4j is utilized for knowledge graph construction and storage, and a data extraction method based on the Dynamo is designed to obtain checking data files. After that, a matching algorithm is devised to express the logical rules of knowledge graph triples, resulting in automated compliance checking for BIM models.

Findings

Case validation results showed that this theoretical framework can achieve the automatic construction of domain knowledge graphs and automatic checking of BIM model compliance. Compared with traditional methods, this method has a higher degree of automation and portability.

Originality/value

This study introduces knowledge graphs and natural language processing technology into the field of BIM model checking and completes the automated process of constructing domain knowledge graphs and checking BIM model data. The validation of its functionality and usability through two case studies on a self-developed BIM checking platform.

Details

Engineering, Construction and Architectural Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0969-9988

Keywords

Book part
Publication date: 11 October 2023

Javier Peña Capobianco

The objective of this chapter is to identify the key characteristics of Global Services businesses that will thrive and achieve success in the future. These factors are integrated…

Abstract

The objective of this chapter is to identify the key characteristics of Global Services businesses that will thrive and achieve success in the future. These factors are integrated into three main pillars, which we refer to as the Triple-Win. The first and most obvious pillar is technology as a tool. The second pillar is the design and sustainability of the business model, without which the previous factor would be merely a cost and not an investment. And last but not the least, there is the purpose which gives meaning to the proposal, focusing on the human being and their environment. The DIDPAGA business model sits at the intersection of these three elements.

Details

The New Era of Global Services: A Framework for Successful Enterprises in Business Services and IT
Type: Book
ISBN: 978-1-83753-627-6

Keywords

Book part
Publication date: 16 January 2024

Ayodeji E. Oke and Seyi S. Stephen

The interaction of systems through a designated control channel has improved communication, efficiency, management, storage, processing, etc. across several industries. The…

Abstract

The interaction of systems through a designated control channel has improved communication, efficiency, management, storage, processing, etc. across several industries. The construction industry is an industry that thrives on a well-planned workflow rhythm; a change in the environmental dynamism will either have a positive or negative impact on the output of the project planned for execution. More so, raising the need for effective collaboration through workflow and project planning, grid application in construction facilitates the relationship between the project reality and the end users, all with the aim of improving resources and value management. However, decentralisation of close-domain control can cause uncertainty and incompleteness of data. And this can be a big factor, especially when a complex project is being executed.

Details

A Digital Path to Sustainable Infrastructure Management
Type: Book
ISBN: 978-1-83797-703-1

Keywords

Article
Publication date: 26 January 2022

Deden Sumirat Hidayat, Winaring Suryo Satuti, Dana Indra Sensuse, Damayanti Elisabeth and Lintang Matahari Hasani

Fish quarantine is a measure to prevent the entry and spread of quarantine fish pests and diseases abroad and from one area to another within Indonesia's territory. Based on these…

255

Abstract

Purpose

Fish quarantine is a measure to prevent the entry and spread of quarantine fish pests and diseases abroad and from one area to another within Indonesia's territory. Based on these backgrounds, this study aims to identify the knowledge, knowledge management (KM) processes and knowledge management system (KMS) priority needs for quarantine fish and other fishery products measures (QMFFP) and then develop a classification model and web-based decision support system (DSS) for QMFFP decisions.

Design/methodology/approach

This research methodology uses combination approaches, namely, contingency factor analysis (CFA), the cross-industry standard process for data mining (CRISP-DM) and knowledge management system development life cycle (KMSDLC). The CFA for KM solution design is performed by identifying KM processes and KMS priorities. The CRISP-DM for decision classification model is done by using a decision tree algorithm. The KMSDLC is used to develop a web-based DSS.

Findings

The highest priority requirements of KM technology for QMFFP are data mining and DSS with predictive features. The main finding of this study is to show that web-based DSS (functions and outputs) can support and accelerate QMFFP decisions by regulations and field practice needs. The DSS was developed using the CTree algorithm model, which has six main attributes and eight rules.

Originality/value

This study proposes a novel comprehensive framework for developing DSS (combination of CFA, CRISP-DM and KMSDLC), a novel classification model resulting from comparing two decision tree algorithms and a novel web-based DSS for QMFFP.

Details

VINE Journal of Information and Knowledge Management Systems, vol. 54 no. 2
Type: Research Article
ISSN: 2059-5891

Keywords

Article
Publication date: 25 April 2024

Tulsi Pawan Fowdur and Ashven Sanghan

The purpose of this paper is to develop a blockchain-based data capture and transmission system that will collect real-time power consumption data from a household electrical…

Abstract

Purpose

The purpose of this paper is to develop a blockchain-based data capture and transmission system that will collect real-time power consumption data from a household electrical appliance and transfer it securely to a local server for energy analytics such as forecasting.

Design/methodology/approach

The data capture system is composed of two current transformer (CT) sensors connected to two different electrical appliances. The CT sensors send the power readings to two Arduino microcontrollers which in turn connect to a Raspberry-Pi for aggregating the data. Blockchain is then enabled onto the Raspberry-Pi through a Java API so that the data are transmitted securely to a server. The server provides real-time visualization of the data as well as prediction using the multi-layer perceptron (MLP) and long short term memory (LSTM) algorithms.

Findings

The results for the blockchain analysis demonstrate that when the data readings are transmitted in smaller blocks, the security is much greater as compared with blocks of larger size. To assess the accuracy of the prediction algorithms data were collected for a 20 min interval to train the model and the algorithms were evaluated using the sliding window approach. The mean average percentage error (MAPE) was used to assess the accuracy of the algorithms and a MAPE of 1.62% and 1.99% was obtained for the LSTM and MLP algorithms, respectively.

Originality/value

A detailed performance analysis of the blockchain-based transmission model using time complexity, throughput and latency as well as energy forecasting has been performed.

Details

Sensor Review, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0260-2288

Keywords

1 – 10 of 397