Search results

1 – 10 of 43
Open Access
Article
Publication date: 1 November 2018

Rania M. Ghoniem, H.A. Abas and H.A. Bdair

Despite the fact that there being a large literature on simulation, there is as yet no generic paradigm or architecture to develop a three-dimensional (3-D) simulator which…

Abstract

Despite the fact that there being a large literature on simulation, there is as yet no generic paradigm or architecture to develop a three-dimensional (3-D) simulator which depends on autonomous intelligent objects. This has motivated us to introduce a 3-D simulation system based on intelligent objects for Physics Experimentation. We formulated the system’s components as an object-orientation model. So, the entities in every experiment’s work cell are modeled by characterizing their properties and functions into classes and objects of the system hierarchy. Intelligent objects are realized by developing a knowledge base (KB) that captures a set of rules/algorithms that operate on 3-D objects. Rules fall into two categories: action and property rules. In the simulation layer, the student is allowed, by using the virtual system, to stroll throughout the Physics laboratory in light of a walking model. Student gets to a simulation region to do an experiment through the detection of mathematical collision. From software engineering perspective, the proposed system facilitates the Physics experiment through making the specification of its applicable parts more modular and reusable. Moreover, a major pedagogical objective is achieved by permitting the student tuning parameters, fixing component of a device then visualizing outputs. This provides student well interpretation by viewing how distinct parameters affect the outcomes of the experiment. With the objective of student performance measuring, we utilized an exploratory group relying upon pre- and post-testing. The application results demonstrate that the simulator contributes positively to student performance in regard to practical Physics.

Details

Applied Computing and Informatics, vol. 16 no. 1/2
Type: Research Article
ISSN: 2634-1964

Keywords

Open Access
Article
Publication date: 15 July 2021

Ilia Maslov, Shahrokh Nikou and Preben Hansen

This paper aims to explore the perspectives of university students on the learning management system (LMS) and determine factors that influence user experience and the outcomes of…

11971

Abstract

Purpose

This paper aims to explore the perspectives of university students on the learning management system (LMS) and determine factors that influence user experience and the outcomes of e-learning.

Design/methodology/approach

This paper employs a mixed-method approach. For qualitative data, 20 semi-structure interviews were conducted. Moreover, for quantitative data, a short survey was developed and distributed among the potential respondents.

Findings

The results showed that students, particularly in programs where courses are mainly offered online, are dependent on such learning platforms. Moreover, the use of modular object-oriented dynamic learning environment (Moodle) as an application of LMS was rated positively, and e-learning was considered as an effective sustainable learning solution in current conditions.

Originality/value

The authors have illustrated empirically how the notion of UX of the LMS provides a means of exploring both students' participation in e-learning and their intention towards using such learning platforms.

Details

The International Journal of Information and Learning Technology, vol. 38 no. 4
Type: Research Article
ISSN: 2056-4880

Keywords

Open Access
Article
Publication date: 7 April 2020

Fatima M. Isiaka, Salihu Abdullahi Audu and Mustafa Ahmed Umar

The dependence on the use of information systems for nearly every activity and functions in the internet is increasingly high. This form of interconnectedness has bolstered…

2266

Abstract

Purpose

The dependence on the use of information systems for nearly every activity and functions in the internet is increasingly high. This form of interconnectedness has bolstered national economies, enhanced how governments interact with their citizens and how ordinary people connect with friends and family. However, this dependence has equally resulted to a high rise in vulnerability, threat and risk associated with more use of information and communication technology. Cyber-attacks that have the potential to disrupt or damage information system infrastructure are getting more complex with some level of sophistication. Traditional protection of information system infrastructure is no longer sufficient; systems have proven to be immune to failure or incidents. This paper aims to ensure that there is a continuous availability of services through a fail-safe proof.

Design/methodology/approach

MYSQL replication technique was used to develop a model based on three-tier layers using the principle of network interdependency and the replication techniques. Tier 1 depicts a Telecom organization serving as service provider that provides internet service to Tier 2 organization – a Bank; Tier 3 is the financial App that can be used by bank staff and customers. The fail-safe mode integrated mechanism enables Tier 3 to continue to render its services in the event of an attack on Tier 1 such as DDoS without disruption.

Findings

This technique succeeded in mitigating the loss of data if cyber incident occurred or reception of uninterrupted services is countered, which give rise to future master-to-master architecture.

Research limitations/implications

The study conducted is limited to the design and development of a fail-safe system for interdependent networks or systems using MYSQL replication technique.

Originality/value

In an interdependent environment such as the cyberspace, the sectors are interdependent for optimal results. The originality of the work ensures that there is availability of services which is sustained and that data integrity is assured using the fail-safe technique based on MySQL replication method.

Details

International Journal of Crowd Science, vol. 4 no. 2
Type: Research Article
ISSN: 2398-7294

Keywords

Open Access
Article
Publication date: 1 June 2009

Mohammed B. Lahkim, Gregory J. Skulmoski and Russel E. Bruhn

This paper investigates the integration of leadership training into IT curricula to develop current and future skills needed by the IT job market. The technical and non-technical…

Abstract

This paper investigates the integration of leadership training into IT curricula to develop current and future skills needed by the IT job market. The technical and non-technical skills required for IT professionals are presented and a conceptual model for including leadership training in technical courses is outlined. To implement this model, we adopted the Problem-Based Learning approach to teach an IT course. Qualitative and quantitative data were gathered, through a survey, from 52 undergraduate students in the College of Information Technology at Zayed University. Our results show that our adopted approach was successful in teaching IT skills as well as developing leadership skills. Given these findings, we highlight the importance and feasibility of integrating leadership development on a daily basis within technical courses to develop both the technical and non technical skills required by the job market.

Details

Learning and Teaching in Higher Education: Gulf Perspectives, vol. 6 no. 1
Type: Research Article
ISSN: 2077-5504

Open Access
Article
Publication date: 4 January 2023

Ashikul Kabir, Saiyara Shabbir Ikra, Paolo Saona and Md. Abul Kalam Azad

This study extends the current literature in the context of European countries by showing that women's participation on the board can enhance the financial performance of a…

8192

Abstract

Purpose

This study extends the current literature in the context of European countries by showing that women's participation on the board can enhance the financial performance of a company while moderated by many cultural factors.

Design/methodology/approach

This study examines 19 European countries throughout the period 2010–2020. The time-invariant or individual fixed-effect models are used.

Findings

The authors found that high power distance and masculinity undermine the impact of board gender diversity on firm performance. The gender-diverse board reports a statistically significant negative impact on return on asset (ROA) and return on equity (ROE) while moderated by the power distance index.

Originality/value

This research will be of significant value to the board directors, practitioners and the concerned authority who desire to polish up the firm performance of European countries that are governed by cultural norms.

Details

LBS Journal of Management & Research, vol. 21 no. 1
Type: Research Article
ISSN: 0972-8031

Keywords

Open Access
Article
Publication date: 29 August 2023

Qingfeng Xu, Hèrm Hofmeyer and Johan Maljaars

Simulations exist for the prediction of the behaviour of building structural systems under fire, including two-way coupled fire-structure interaction. However, these simulations…

Abstract

Purpose

Simulations exist for the prediction of the behaviour of building structural systems under fire, including two-way coupled fire-structure interaction. However, these simulations do not include detailed models of the connections, whereas these connections may impact the overall behaviour of the structure. Therefore, this paper proposes a two-scale method to include screw connections.

Design/methodology/approach

The two-scale method consists of (a) a global-scale model that models the overall structural system and (b) a small-scale model to describe a screw connection. Components in the global-scale model are connected by a spring element instead of a modelled screw, and the stiffness of this spring element is predicted by the small-scale model, updated at each load step. For computational efficiency, the small-scale model uses a proprietary technique to model the behaviour of the threads, verified by simulations that model the complete thread geometry, and validated by existing pull-out experiments. For four screw failure modes, load-deformation behaviour and failure predictions of the two-scale method are verified by a detailed system model. Additionally, the two-scale method is validated for a combined load case by existing experiments, and demonstrated for different temperatures. Finally, the two-scale method is illustrated as part of a two-way coupled fire-structure simulation.

Findings

It was shown that proprietary ”threaded connection interaction” can predict thread relevant failure modes, i.e. thread failure, shank tension failure, and pull-out. For bearing, shear, tension, and pull-out failure, load-deformation behaviour and failure predictions of the two-scale method correspond with the detailed system model and Eurocode predictions. Related to combined load cases, for a variety of experiments a good correlation has been found between experimental and simulation results, however, pull-out simulations were shown to be inconsistent.

Research limitations/implications

More research is needed before the two-scale method can be used under all conditions. This relates to the failure criteria for pull-out, combined load cases, and temperature loads.

Originality/value

The two-scale method bridges the existing very detailed small-scale screw models with present global-scale structural models, that in the best case only use springs. It shows to be insightful, for it contains a functional separation of scales, revealing their relationships, and it is computationally efficient as it allows for distributed computing. Furthermore, local small-scale non-convergence (e.g. a screw failing) can be handled without convergence problems in the global-scale structural model.

Details

Journal of Structural Fire Engineering, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2040-2317

Keywords

Open Access
Article
Publication date: 7 May 2019

Yanan Wang, Jianqiang Li, Sun Hongbo, Yuan Li, Faheem Akhtar and Azhar Imran

Simulation is a well-known technique for using computers to imitate or simulate the operations of various kinds of real-world facilities or processes. The facility or process of…

1582

Abstract

Purpose

Simulation is a well-known technique for using computers to imitate or simulate the operations of various kinds of real-world facilities or processes. The facility or process of interest is usually called a system, and to study it scientifically, we often have to make a set of assumptions about how it works. These assumptions, which usually take the form of mathematical or logical relationships, constitute a model that is used to gain some understanding of how the corresponding system behaves, and the quality of these understandings essentially depends on the credibility of given assumptions or models, known as VV&A (verification, validation and accreditation). The main purpose of this paper is to present an in-depth theoretical review and analysis for the application of VV&A in large-scale simulations.

Design/methodology/approach

After summarizing the VV&A of related research studies, the standards, frameworks, techniques, methods and tools have been discussed according to the characteristics of large-scale simulations (such as crowd network simulations).

Findings

The contributions of this paper will be useful for both academics and practitioners for formulating VV&A in large-scale simulations (such as crowd network simulations).

Originality/value

This paper will help researchers to provide support of a recommendation for formulating VV&A in large-scale simulations (such as crowd network simulations).

Details

International Journal of Crowd Science, vol. 3 no. 1
Type: Research Article
ISSN: 2398-7294

Keywords

Open Access
Article
Publication date: 15 August 2022

Aya Khaled Youssef Sayed Mohamed, Dagmar Auer, Daniel Hofer and Josef Küng

Authorization and access control have been a topic of research for several decades. However, existing definitions are inconsistent and even contradicting each other. Furthermore…

6822

Abstract

Purpose

Authorization and access control have been a topic of research for several decades. However, existing definitions are inconsistent and even contradicting each other. Furthermore, there are numerous access control models and even more have recently evolved to conform with the challenging requirements of resource protection. That makes it hard to classify the models and decide for an appropriate one satisfying security needs. Therefore, this study aims to guide through the plenty of access control models in the current state of the art besides this opaque accumulation of terms meaning and how they are related.

Design/methodology/approach

This study follows the systematic literature review approach to investigate current research regarding access control models and illustrate the findings of the conducted review. To provide a detailed understanding of the topic, this study identified the need for an additional study on the terms related to the domain of authorization and access control.

Findings

The authors’ research results in this paper are the distinction between authorization and access control with respect to definition, strategies, and models in addition to the classification schema. This study provides a comprehensive overview of existing models and an analysis according to the proposed five classes of access control models.

Originality/value

Based on the authors’ definitions of authorization and access control along with their related terms, i.e. authorization strategy, model and policy as well as access control model and mechanism, this study gives an overview of authorization strategies and propose a classification of access control models providing examples for each category. In contrast to other comparative studies, this study discusses more access control models, including the conventional state-of-the-art models and novel ones. This study also summarizes each of the literature works after selecting the relevant ones focusing on the database system domain or providing a survey, a classification or evaluation criteria of access control models. Additionally, the introduced categories of models are analyzed with respect to various criteria that are partly selected from the standard access control system evaluation metrics by the National Institute of Standards and Technology.

Details

International Journal of Web Information Systems, vol. 18 no. 2/3
Type: Research Article
ISSN: 1744-0084

Keywords

Open Access
Article
Publication date: 3 April 2024

Tatiana da Costa Reis Moreira, Daniel Luiz de Mattos Nascimento, Yelena Smirnova and Ana Carla de Souza Gomes dos Santos

This paper explores Lean Six Sigma principles and the DMAIC (define, measure, analyze, improve, control) methodology to propose a new Lean Six Sigma 4.0 (LSS 4.0) framework for…

Abstract

Purpose

This paper explores Lean Six Sigma principles and the DMAIC (define, measure, analyze, improve, control) methodology to propose a new Lean Six Sigma 4.0 (LSS 4.0) framework for employee occupational exams and address the real-world issue of high-variability exams that may arise.

Design/methodology/approach

This study uses mixed methods, combining qualitative and quantitative data collection. A detailed case study assesses the impact of LSS interventions on the exam management process and tests the applicability of the proposed LSS 4.0 framework for employee occupational exams.

Findings

The results reveal that changing the health service supplier in the explored organization caused a substantial raise in occupational exams, leading to increased costs. By using syntactic interoperability, lean, six sigma and DMAIC approaches, improvements were identified, addressing process deviations and information requirements. Implementing corrective actions improved the exam process, reducing the number of exams and associated expenses.

Research limitations/implications

It is important to acknowledge certain limitations, such as the specific context of the case study and the exclusion of certain exam categories.

Practical implications

The practical implications of this research are substantial, providing organizations with valuable managerial insights into improving efficiency, reducing costs and ensuring regulatory compliance while managing occupational exams.

Originality/value

This study fills a research gap by applying LSS 4.0 to occupational exam management, offering a practical framework for organizations. It contributes to the existing knowledge base by addressing a relatively novel context and providing a detailed roadmap for process optimization.

Details

International Journal of Lean Six Sigma, vol. 15 no. 8
Type: Research Article
ISSN: 2040-4166

Keywords

Open Access
Article
Publication date: 21 June 2019

Pengze Li, Ran Zhang, Lei Liu, Lizhen Cui, Qingzhong Li and Guangpeng Zhou

Science of the Crowd is a new paradigm. The research on the relationship between provision and requirement arising from the behavior of the crowd under the interconnected…

Abstract

Purpose

Science of the Crowd is a new paradigm. The research on the relationship between provision and requirement arising from the behavior of the crowd under the interconnected environment is a promising topic. This paper aims at studying a new type of interconnected architecture.

Design/methodology/approach

This study is a pioneer work on the establishment of a new type of interconnected architecture – rim chain. The rim chain aims at supporting prompt matching between provision and requirements.

Findings

The analytical results suggest that requirements can be fulfilled in accordance with six degrees of separation. In other words, the matching between the requirements and provision takes place with six hops in the rim chain framework.

Originality/value

Knowledge graph is used to implement the rim chain.

Details

International Journal of Crowd Science, vol. 3 no. 2
Type: Research Article
ISSN: 2398-7294

Keywords

1 – 10 of 43