tc

Is Nintendo Switch 2 about to be announced? Instagram lowers quality of less popular videos

The internet is still convinced a Nintendo Switch 2 announcement is going to happen this month, as a part of a major third-party open world game is also rumoured. It’ll […]

The post Is Nintendo Switch 2 about to be announced? Instagram lowers quality of less popular videos appeared first on ShinyShiny.




tc

Did the change of start time affect your ability to watch the Brazilian GP? | Debates and Polls

F1 did something it has never done before last weekend and moved a race start time earlier. But did that affect your ability to watch?



  • Debates and Polls

tc

Alpine confirm switch to Mercedes power when Renault ends F1 engine project | Formula 1

Alpine have officially announced they will use Mercedes power units when Formula 1 introduces its new engine regulations in 2026.




tc

A one-line spoiler-free review of everything I watched in the cinema in October 2024

I’ve ditched the usual blurb about “not being a movies person, but anyway…” because since I started going to the cinema regularly in 2022 I’ve turned into the kind of guy who downloads the London Film Festival brochure and meticulously...




tc

The PerfectMatch…

In the world of translation, Trados Studio’s PerfectMatch feature is like the overachieving student who always gets straight A’s, and its academic partner is the brilliant but slightly disorganised professor.  PerfectMatch, with its meticulous and precise matching capabilities, often finds itself patiently sorting through the professor’s vast but somewhat chaotic repository of knowledge.  Picture PerfectMatch … Continue reading The PerfectMatch…




tc

GNU Terry Pratchett on WSO2 ESB / Apache Synapse

If any of you are following the GNU Terry Pratchett discussion on Reddit, BBC or the Telegraph, then you might be wondering how to do this in the WSO2 ESB or Apache Synapse. Its very very simple. Here you go. Enjoy.
Loading ....






tc

Big Brother is Watching But He Doesn’t Understand: Why Forced Filtering Technology on the Internet Isn’t the Solution to the Modern Copyright Dilemma

by Mitchell Longan[1] Introduction The European Parliament is currently considering a proposal to address problems of piracy and other forms of copyright infringement associated with the digital world.[2] Article 13 of the proposed Directive on Copyright in the Digital Single




tc

Research on multi-objective optimisation for shared bicycle dispatching

The problem of dispatching is key to management of shared bicycles. Considering the number of borrowing and returning events during the dispatching period, optimisation plans of shared bicycles dispatching are studied in this paper. Firstly, the dispatching model of shared bicycles is built, which regards the dispatching cost and lost demand as optimised objectives. Secondly, the solution algorithm is designed based on non-dominated Genetic Algorithm. Finally, a case is given to illustrate the application of the method. The research results show that the method proposed in the paper can get optimised dispatching plans, and the model considering borrowing and returning during dispatching period has better effects with a 39.3% decrease in lost demand.




tc

Enhanced TCP BBR performance in wireless mesh networks (WMNs) and next-generation high-speed 5G networks

TCP BBR is one of the most powerful congestion control algorithms. In this article, we provide a comprehensive review of BBR analysis, expanding on existing knowledge across various fronts. Utilising ns3 simulations, we evaluate BBR's performance under diverse conditions, generating graphical representations. Our findings reveal flaws in the probe's RTT phase duration estimation and unequal bandwidth sharing between BBR and CUBIC protocols. Specifically, we demonstrated that the probe's RTT phase duration estimation algorithm is flawed and that BBR and CUBIC generally do not share bandwidth equally. Towards the end of the article, we propose a new improved version of TCP BBR which minimises these problems of inequity in bandwidth sharing and corrects the inaccuracies of the two key parameters RTprop and cwnd. Consequently, the BBR' protocol maintains very good fairness with the Cubic protocol, with an index that is almost equal to 0.98, and an equity index over 0.95.




tc

E-portfolio Assessment System for an Outcome-Based Information Technology Curriculum




tc

Improving Outcome Assessment in Information Technology Program Accreditation




tc

Student Engagement with Online Resources and Its Impact on Learning Outcomes




tc

Using Student e-Portfolios to Facilitate Learning Objective Achievements in an Outcome-Based University




tc

Computer Science Education in Early Childhood: The Case of ScratchJr

Aim/Purpose: This paper aims to explore whether having state Computer Science standards in place will increase young children’s exposure to coding and powerful ideas from computer science in the early years. Background: Computer science education in the K-2 educational segment is receiving a growing amount of attention as national and state educational frameworks are emerging. By focusing on the app ScratchJr, the most popular free introductory block-based programming language for early childhood, this paper explores if there is a relationship between the presence of state frameworks and ScratchJr’s frequency of use. Methodology: This paper analyzes quantitative non-identifying data from Google Analytics on users of the ScratchJr programming app. Google Analytics is a free tool that allows access to user activity as it happens in real time on the app, as well as audience demographics and behavior. An analysis of trends by state, time of year, type of in-app activities completed, and more are analyzed with a specific focus on comparing states with K-12 Computer Science in place versus those without. Contribution: Results demonstrate the importance of having state standards in place to increase young children’s exposure to coding and powerful ideas from computer science in the early years. Moreover, we see preliminary evidence that states with Computer Science standards in place support skills like perseverance and debugging through ScratchJr. Findings: Findings show that in the case of ScratchJr, app usage decreases during the summer months and on weekends, which may indicate that coding with ScratchJr is more often happening in school than at home. Results also show that states with Computer Science standards have more ScratchJr users on average and have more total sessions with the app on average. Results also show preliminary evidence that states with Computer Science standards in place have longer average session duration as well as a higher average number of users returning to edit an existing project. Recommendations for Practitioners: Successful early childhood computer science education programs must teach powerful ideas from the discipline of computer science in a developmentally appropriate way, provide means for self-expression, prompt debugging and problem solving, and offer a low-floor/high-ceiling interface for both novices and experts. Practitioners should be aware in drops in computer science learning during the summer months when school is not in session. Recommendation for Researchers: Researchers should consider the impact of state and national frameworks on computer science learning and skills mastered during the early childhood years. Researchers should look for ways to continue engaging students in computer science education during times when school is not in session. Impact on Society: Results demonstrate the importance of having state CS standards in place to increase young children’s exposure to coding and powerful ideas from computer science in the early years. Moreover, we see preliminary evidence that states with Computer Science standards in place support skills like perseverance and debugging through ScratchJr. Future Research: Future research should continue collecting Google Analytics from the ScratchJr app and track changes in usage. Future research should also collect analytics from a wide range of programming applications for young children to see if the trends identified here are consistent across different apps.




tc

Matching Authors and Reviewers in Peer Assessment Based on Authors’ Profiles

Aim/Purpose: To encourage students’ engagement in peer assessments and provide students with better-quality feedback, this paper describes a technique for author-reviewer matching in peer assessment systems – a Balanced Allocation algorithm. Background: Peer assessment concerns evaluating the work of colleagues and providing feedback on their work. This process is widely applied as a learning method to involve students in the progress of their learning. However, as students have different ability levels, the efficacy of the peer feedback differs from case to case. Thus, peer assessment may not provide satisfactory results for students. In order to mitigate this issue, this paper explains and evaluates an algorithm that matches the author to a set of reviewers. The technique matches authors and reviewers based on how difficult the authors perceived the assignment to be, and the algorithm then matches the selected author to a group of reviewers who may meet the author’s needs in regard to the selected assignment. Methodology: This study used the Multiple Criteria Decision-Making methodology (MCDM) to determine a set of reviewers from among the many available options. The weighted sum method was used because the data that have been collected in user profiles are expressed in the same unit. This study produced an experimental result, examining the algorithm with a real collected dataset and mock-up dataset. In total, there were 240 students in the real dataset, and it contained self-assessment scores, peer scores, and instructor scores for the same assignment. The mock-up dataset created 1000 records for self-assessment scores. The algorithm was evaluated using focus group discussions with 29 programming students and interviews with seven programming instructors. Contribution: This paper contributes to the field in the following two ways. First, an algorithm using a MCDM methodology was proposed to match authors and reviewers in order to facilitate the peer assessment process. In addition, the algorithm used self-assessment as an initial data source to match users, rather than randomly creating reviewer – author pairs. Findings: The findings show the accurate results of the algorithm in matching three reviewers for each author. Furthermore, the algorithm was evaluated based on students’ and instructors’ perspectives. The results are very promising, as they depict a high level of satisfaction for the Balanced Allocation algorithm. Recommendations for Practitioners: We recommend instructors to consider using the Balanced Allocation algorithm to match students in peer assessments, and consequently to benefit from personalizing peer assessment based on students' needs. Recommendation for Researchers: Several MCDM methods could be expanded upon, such as the analytic hierarchy process (AHP) if different attributes are collected, or the artificial neural network (ANN) if fuzzy data is available in the user profile. Each method is suitable for special cases depending on the data available for decision-making. Impact on Society: Suitable pairing in peer assessment would increase the credibility of the peer assessment process and encourage students’ engagement in peer assessments. Future Research: The Balanced Allocation algorithm could be applied using a single group, and a peer assessment with random matching with another group may also be conducted, followed by performing a t-test to determine the impact of matching on students’ performances in the peer assessment activity.




tc

Categorizing Well-Written Course Learning Outcomes Using Machine Learning

Aim/Purpose: This paper presents a machine learning approach for analyzing Course Learning Outcomes (CLOs). The aim of this study is to find a model that can check whether a CLO is well written or not. Background: The use of machine learning algorithms has been, since many years, a prominent solution to predict learner performance in Outcome Based Education. However, the CLOs definition is still presenting a big handicap for faculties. There is a lack of supported tools and models that permit to predict whether a CLO is well written or not. Consequently, educators need an expert in quality and education to validate the outcomes of their courses. Methodology: A novel method named CLOCML (Course Learning Outcome Classification using Machine Learning) is proposed in this paper to develop predictive models for CLOs paraphrasing. A new dataset entitled CLOC (Course Learning Outcomes Classes) for that purpose has been collected and then undergone a pre-processing phase. We compared the performance of 4 models for predicting a CLO classification. Those models are Support Vector Machine (SVM), Random Forest, Naive Bayes and XGBoost. Contribution: The application of CLOCML may help faculties to make well-defined CLOs and then correct CLOs' measures in order to improve the quality of education addressed to their students. Findings: The best classification model was SVM. It was able to detect the CLO class with an accuracy of 83%. Recommendations for Practitioners: We would recommend both faculties’ members and quality reviewers to make an informed decision about the nature of a given course outcome. Recommendation for Researchers: We would highly endorse that the researchers apply more machine learning models for CLOs of various disciplines and compare between them. We would also recommend that future studies investigate on the importance of the definition of CLOs and its impact on the credibility of Key Performance Indicators (KPIs) values during accreditation process. Impact on Society: The findings of this study confirm the results of several other researchers who use machine learning in outcome-based education. The definition of right CLOs will help the student to get an idea about the performances that will be measured at the end of a course. Moreover, each faculty can take appropriate actions and suggest suitable recommendations after right performance measures in order to improve the quality of his course. Future Research: Future research can be improved by using a larger dataset. It could also be improved with deep learning models to reach more accurate results. Indeed, a strategy for checking CLOs overlaps could be integrated.




tc

Matching:  Discrimination, Misinformation, and Sudden Death




tc

A Beginning Specification of a Model for Evaluating Learning Outcomes Grounded in Java Programming Courses




tc

End-to-End Performance Evaluation of Selected TCP Variants across a Hybrid Wireless Network 




tc

Will It Work? An Initial Examination of the Processes and Outcomes of Converting Course Materials to CD-ROMs




tc

Using an Outcome-Based Information Technology Curriculum and an E-Learning Platform to Facilitate Student Learning




tc

Novel Phonetic Name Matching Algorithm with a Statistical Ontology for Analysing Names Given in Accordance with Thai Astrology




tc

Using a Learning Management System to Foster Independent Learning in an Outcome-Based University: A Gulf Perspective




tc

Defining and Classifying Learning Outcomes: A Case Study




tc

CAPTCHA – Security affecting User Experience

CAPTCHA - Completely Automated Public Turing test to tell Computers and Humans Apart - is a test with the aim to distinguish between malicious automatic software and real users in the era of Cyber security threats. Various types of CAPTCHA tests were developed, in order to address accessibility while implementing security. This research focuses on the users’ attitudes and experiences related to use of the different kinds of tests. A questionnaire accompanied by experiencing five different CAPTCHA tests was performed among 212 users. Response times for each test and rate of success were collected automatically. The findings demonstrate that none of the existing tests are ideal. Although the participants were familiar with the Text-based test, they found it the most frustrating and non-enjoyable. Half of the participants failed in the Arithmetic-based test. While most of the participants found the picture and game based test enjoyable, their response time for those tests was the largest. The age factor was encountered as influencing both the attitude of the user and the performance, while younger users are more tolerant, have a better success rate, and are faster, the elder users found the tests annoying and time-consuming.




tc

The Flipped Classroom: Two Learning Modes that Foster Two Learning Outcomes

The study involved student teachers enrolled in early childhood teaching at a teacher training institute in Hong Kong Special Administrative Region. Seventy-four students participated in flipped classroom activities during their first semester of study. Students were told to learn from online videos related to using image editing software in their own time and pace prior to the next class. When they met in class, they were asked to apply their recently acquired editing knowledge to edit an image of their own choice related to the theme of their group project. At the end of the activity, students were asked to complete an online questionnaire. It was found that students had rated all five questions relating to generic skills highly, with self-study skills rated the highest. They particularly enjoyed the flexibility of learning on their own time and pace as a benefit of the flipped classroom. Data collected from students’ project pages show they had used average of 3.22 editing features for the theme images for their project. Most groups had inserted text followed by using the filter function. It is possible that these two functions are more noticeable than other editing functions. In conclusion, students were able to apply their self-learnt knowledge in a real-life situation and they had also developed their generic skills via the flipped classroom pedagogy.




tc

Do Project Management Tools and Outcomes Differ in Organizations of Varying Size and Sector?




tc

Exploring Perceptions of Bitcoin Adoption: The South African Virtual Community Perspective

Aim/Purpose: This paper explored the factors (enablers and barriers) that affect Bitcoin adoption in South Africa, a Sub-Saharan country with the high potential for Bitcoin adoption. Background: In recent years, Bitcoin has seen a rapid growth as a virtual cryptocurrency throughout the world. Bitcoin is a protocol which allows value to be exchanged over the internet without a central bank or intermediary. Cryptocurrencies such as Bitcoin are technological tools that arguably can contribute to reducing transactions costs. This paper explored the factors that affect Bitcoin adoption in South Africa, a Sub-Saharan country with the high potential for Bitcoin adoption, as little is known about the factors that affect Bitcoin adoption and the barriers to adoption. Methodology: A quantitative questionnaire was distributed to South African virtual communities where Bitcoin is a topic of interest, and 237 quantitative responses were received, along with 212 open-ended comments. Contribution: This research contributes to the body of knowledge in information systems by providing insights into factors that affect Bitcoin adoption in South Africa. It raises awareness of incentives and barriers to Bitcoin adoption at a time when financial literacy is a crucial issue both in South Africa and worldwide. Findings: The results indicate that perceived benefit, attitude towards Bitcoin, subjective norm, and perceived behavioral control directly affected the participants’ intentions to use Bitcoin. Perceived benefit, usefulness, ease of use, and trust-related risk were found to indirectly affect intention to use Bitcoin. Further, it emerges that the barriers to Bitcoin adoption in South Africa consist of the complex nature of Bitcoin and its high degree of volatility. Recommendations for Practitioners: Bitcoin can contribute to reducing transactions costs, but factors that affect adoption and the barriers to adoption should be taken into consideration. These findings can inform systems and software developers to develop applications that make managing Bitcoin keys and transacting using Bitcoin less complex and more intuitive for end users. Recommendation for Researchers: Bitcoin adoption in South Africa is a topic that has not been previously researched. Researchers could research similarities or differences in the various constructs that were used in this research model. Impact on Society: South African Bitcoin users consider it as a universal currency that makes cross-border payments cheaper. A large number of refugees and workers in South Africa make regular payments across borders. Bitcoin could reduce the costs of these transfers. Future Research: Future research could explore Bitcoin (and other cryptocurrencies) adoption in other developing countries. Researchers could look at factors that influence cryptocurrency adoption in general. The factors affecting adoption of other cryptocurrencies can be compared to the results of this study, and similarities and differences can thus be identified.




tc

Implementing Security in IoT Ecosystem Using 5G Network Slicing and Pattern Matched Intrusion Detection System: A Simulation Study

Aim/Purpose: 5G and IoT are two path-breaking technologies, and they are like wall and climbers, where IoT as a climber is growing tremendously, taking the support of 5G as a wall. The main challenge that emerges here is to secure the ecosystem created by the collaboration of 5G and IoT, which consists of a network, users, endpoints, devices, and data. Other than underlying and hereditary security issues, they bring many Zero-day vulnerabilities, which always pose a risk. This paper proposes a security solution using network slicing, where each slice serves customers with different problems. Background: 5G and IoT are a combination of technology that will enhance the user experience and add many security issues to existing ones like DDoS, DoS. This paper aims to solve some of these problems by using network slicing and implementing an Intrusion Detection System to identify and isolate the compromised resources. Methodology: This paper proposes a 5G-IoT architecture using network slicing. Research here is an advancement to our previous implementation, a Python-based software divided into five different modules. This paper’s amplification includes induction of security using pattern matching intrusion detection methods and conducting tests in five different scenarios, with 1000 up to 5000 devices in different security modes. This enhancement in security helps differentiate and isolate attacks on IoT endpoints, base stations, and slices. Contribution: Network slicing is a known security technique; we have used it as a platform and developed a solution to host IoT devices with peculiar requirements and enhance their security by identifying intruders. This paper gives a different solution for implementing security while using slicing technology. Findings: The study entails and simulates how the IoT ecosystem can be variedly deployed on 5G networks using network slicing for different types of IoT devices and users. Simulation done in this research proves that the suggested architecture can be successfully implemented on IoT users with peculiar requirements in a network slicing environment. Recommendations for Practitioners: Practitioners can implement this solution in any live or production IoT environment to enhance security. This solution helps them get a cost-effective method for deploying IoT devices on a 5G network, which would otherwise have been an expensive technology to implement. Recommendation for Researchers: Researchers can enhance the simulations by amplifying the different types of IoT devices on varied hardware. They can even perform the simulation on a real network to unearth the actual impact. Impact on Society: This research provides an affordable and modest solution for securing the IoT ecosystem on a 5G network using network slicing technology, which will eventually benefit society as an end-user. This research can be of great assistance to all those working towards implementing security in IoT ecosystems. Future Research: All the configuration and slicing resources allocation done in this research was performed manually; it can be automated to improve accuracy and results. Our future direction will include machine learning techniques to make this application and intrusion detection more intelligent and advanced. This simulation can be combined and performed with smart network devices to obtain more varied results. A proof-of-concept system can be implemented on a real 5G network to amplify the concept further.




tc

BITCOIN: An Exploratory Study Investigating Adoption in South Africa

Aim/Purpose: This paper identified and explored the factors influencing Bitcoin adoption and use in South Africa. Background: Since its introduction in 2008, the value and popularity of Bitcoin has risen exponentially. Captivating the eyes of the world, from regulators to economists, Bitcoin promises to revolutionize the digital currency space. Despite being over 10 years old, the concept of cryptocurrency is fairly new in South Africa, a developing country. South African’s interest in Bitcoin continues to grow with the country constantly ranking within the top 10 in online searches for “Bitcoin” and “cryptocurrency” on Google. The primary objective of this research was to identify adoption factors amongst South African citizens, an area that has not received much research focus in the past. In addition to this, the study aimed to identify how Bitcoin is primarily used in South Africa. Methodology: A survey-based questionnaire was utilized to obtain responses from adopters of Bitcoin in South Africa. The quantitative survey was completed by 204 respondents. Contribution: This research contributes to the body of knowledge relating to Bitcoin adoption, specifically from a developing country. Adoption factors are identified that can be utilized by businesses that intend to adopt cryptocurrency, to strategically prepare for the potential risks or opportunities brought about by Bitcoin and cryptocurrency in general. Findings: The findings of this study indicate that while perceived usefulness, perceived ease of use, subjective norms, and facilitating conditions positively influence intention to adopt Bitcoin, trust was the only construct that is statistically significant and hence is the greatest driver of adoption in South Africa. In terms of its primary use in South Africa, the study revealed that Bitcoin is used as a speculative instrument for short-term trading in South Africa followed by being used as a long-term investment in the crypto-asset class. No respondent indicated that they utilize Bitcoin as a payment method in South Africa. Recommendations for Practitioners: When developing crypto-based investment products, custodians of assets must ensure that a minimum-security protocol is followed to safeguard these assets. This will enhance the trust that potential investors and customers have in their systems and products. Recommendation for Researchers: This study focused on adoption factors for South African citizens. Future studies should be conducted to identify adoption factors by businesses in South Africa. Impact on Society: Bitcoin offers an alternate trading instrument and investment option, with the possibility of large gains over a relatively short period. Bitcoin also presents the possibility of cross-border transactions at a significantly lower cost compared to traditional cross-border transfers of funds. Future Research: Studies should be conducted to explore the factors influencing the adoption of altcoins to determine if the technological differences influence the adoption of one currency over the other. Research should also be conducted comparing the taxation of cryptocurrency in various countries around the world.




tc

An integrated framework for the alignment of stakeholder expectations with student learning outcomes

In this paper, two hypothetical frameworks are proposed through the application of quality function deployment (QFD) to integrate the current institutional level and program level student learning focus areas with the relevant institutional and program specific stakeholder expectations. A generic skillset proficiency expected of all the graduating students at the institutional level by the stakeholders is considered in the first QFD application example and a program specific knowledge proficiency expected at the program level by the stakeholders is considered in the second QFD application example. Operations management major/option is considered for illustration purposes at the program level. In addition, an assurance of learning based approach rooted in continuous improvement philosophy is proposed to align the stakeholder expectations with the relevant student learning outcomes at different learning tiers.




tc

A New Learning Object Repository for Language Learning: Methods and Possible Outcomes




tc

Validation of a Learning Object Review Instrument: Relationship between Ratings of Learning Objects and Actual Learning Outcomes




tc

CAPTCHA: Impact on User Experience of Users with Learning Disabilities

CAPTCHA is one of the most common solutions to check if the user trying to enter a Website is a real person or an automated piece of software. This challenge-response test, implemented in many Internet Websites, emphasizes the gaps between accessibility and security on the Internet, as it poses an obstacle for the learning-impaired in the reading and comprehension of what is presented in the test. Various types of CAPTCHA tests have been developed in order to address accessibility and security issues. The objective of this study is to investigate how the differences between various CAPTCHA tests affect user experience among populations with and without learning disabilities. A questionnaire accompanied by experiencing five different tests was administered to 212 users, 60 of them with learning disabilities. Response rates for each test and levels of success were collected automatically. Findings suggest that users with learning disabilities have more difficulties in solving the tests, especially those with distorted texts, have more negative attitudes towards the CAPTCHA tests, but the response time has no statistical difference from users without learning disabilities. These insights can help to develop and implement solutions suitable for many users and especially for population with learning disabilities.




tc

Matching Office Information Systems (OIS) Curriculum To Relevant Standards: Students, School Mission, Regional Business Needs, and National Curriculum




tc

Colored-sketch of Text Information




tc

Improving Information Technology Curriculum Learning Outcomes

Aim/Purpose Information Technology students’ learning outcomes improve when teaching methodology moves away from didactic behaviorist-based pedagogy toward a more heuristic constructivist-based version of andragogy. Background There is a distinctive difference, a notable gap, between the academic community and the business community in their views of the level of preparedness of recent information technology program graduates. Understanding how Information Technology curriculum is developed and taught along with the underpinning learning theory is needed to address the deficient attainment of learning outcomes at the heart of this matter. Methodology The case study research methodology has been selected to conduct the inquiry into this phenomenon. This empirical inquiry facilitates exploration of a contemporary phenomenon in depth within its real-life context using a variety of data sources. The subject of analysis will be two Information Technology classes composed of a combination of second year and third year students; both classes have six students, the same six students. Contribution It is the purpose of this research to show that the use of improved approaches to learning will produce more desirable learning outcomes. Findings The results of this inquiry clearly show that the use of the traditional behaviorist based pedagogic model to achieve college and university IT program learning outcomes is not as effective as a more constructivist based andragogic model. Recommendations Instruction based purely on either of these does a disservice to the typical college and university level learner. The correct approach lies somewhere in between them; the most successful outcome attainment would be the product of incorporating the best of both. Impact on Society Instructional strategies produce learning outcomes; learning outcomes demonstrate what knowledge has been acquired. Acquired knowledge is used by students as they pursue professional careers and other ventures in life. Future Research Learning and teaching approaches are not “one-size-fits-all” propositions; different strategies are appropriate for different circumstances and situations. Additional research should seek to introduce vehicles that will move learners away from one the traditional methodology that has been used throughout much of their educational careers to an approach that is better suited to equip them with the skills necessary to meet the challenges awaiting them in the professional world.




tc

Ontology Matching and Repair Based on Semantic Association and Probabilistic Logic

Nan WU,Xiaocong LAI,Mei CHEN,Ying PAN, Vol.E107-D, No.11, pp.1433-1443
With the development of the Semantic Web, an increasing number of researchers are utilizing ontology technology to construct domain ontology. Since there is no unified construction standard, ontology heterogeneity occurs. The ontology matching method can fuse heterogeneous ontologies, which realizes the interoperability between knowledge and associates to more relevant semantic information. In the case of differences between ontologies, how to reduce false matching and unsuccessful matching is a critical problem to be solved. Moreover, as the number of ontologies increases, the semantic relationship between ontologies becomes increasingly complex. Nevertheless, the current methods that solely find the similarity of names between concepts are no longer sufficient. Consequently, this paper proposes an ontology matching method based on semantic association. Accurate matching pairs are discovered by existing semantic knowledge, and then the potential semantic associations between concepts are mined according to the characteristics of the contextual structure. The matching method can better carry out matching work based on reliable knowledge. In addition, this paper introduces a probabilistic logic repair method, which can detect and repair the conflict of matching results, to enhance the availability and reliability of matching results. The experimental results show that the proposed method effectively improves the quality of matching between ontologies and saves time on repairing incorrect matching pairs. Besides, compared with the existing ontology matching systems, the proposed method has better stability.
Publication Date: 2024/11/01




tc

ISOLATING TRUST OUTCOMES FROM EXCHANGE RELATIONSHIPS: SOCIAL EXCHANGE AND LEARNING BENEFITS OF PRIOR TIES IN ALLIANCES

Social exchange theory is a broad theory that has been used to explain trust as an outcome of various exchange relationships, and research commonly presumes trust exists between exchange partners that have prior relationships. In this paper, we contribute to social exchange theory by isolating the trust outcomes of interorganizational exchanges from other outcomes emphasized by learning and knowledge-based perspectives, and by specifying important boundary conditions for the emergence of trust in interorganizational exchanges. We make such a theoretical contribution within the domain of strategic alliances by investigating the effects of previous alliance agreements, or prior ties, between the partnering firms. We find that prior ties generally lead to learning about a partner's anticipated behavioral patterns, which helps a firm predict when self-interested behavior may occur and know how to interact with the partner during the coordination and execution of the alliance tasks. By contrast, it is evident that the kind of trust emphasized in social exchange theory is not generally rooted in prior ties and only emerges from prior relationships under certain conditions. We discuss the implications of these findings for research on social exchange theory and for delineating the theory's domain of applicability.




tc

KPDN increases PriceCatcher functionality through collaboration with Mydin, Redtick

KUALA LUMPUR: The PriceCatcher app will continue to be improved with data-sharing on prices through the collaboration between the Domestic Trade and Cost of Living Ministry (KPDN) and two supermarket chains, Mydin and Redtick, said Minister, Datuk Armizan Mohd Ali.

He said that this commitment is an initiative that reflects transparency in transactions and business ethics to avoid price manipulation or profiteering at the expense of consumers.

“Previously, the price data displayed in the PriceCatcher app was entirely sourced from field price monitoring officers, which limited the coverage area and the number of premises uploaded to the app.

“...the signing of this MoU (Memorandum of Understanding) marks a pioneering effort to improve the app by enabling automated data sharing from the involved supermarkets to be displayed in the ‘Supermarket Price Sharing’ section,“ he told reporters after the MoU signing ceremony on price data sharing in Subang Jaya today.

Mydin Mohamed Holdings Bhd, managing director Datuk Dr Ameer Ali Mydin, and KPDN secretary-general Datuk Seri Mohd Sayuthi Bakar were also present.

Armizan said that this collaboration will serve as a benchmark for expanding the data-sharing initiative to other supermarkets and premises.

According to Armizan, the PriceCatcher app previously displayed price information for 480 consumer goods, with daily updates for 186 items, weekly updates for 220 items, and monthly updates for 74 items.

“Up until Nov 7, 459,998 users nationwide uploaded the app, however, the active usage rate is 10,00 per week.

“We are taking an additional approach to add more information in the app without adding more price monitoring officers by adopting a self-reporting system or data sharing from retail sector players,“ he said, adding that the app serves as a reference for users and fosters the habit of checking prices of items before buying.




tc

TCS Group investigates cracks at J Satine mixed development project

KUALA LUMPUR: Building and infrastructure construction services provider TCS Group Holdings Bhd (TGB), as the main contractor via its wholly-owned subsidiary, TCS Construction Sdn Bhd (TCSB), for the J Satine mixed development project, has clarified the recent incident involving cracks in the building.

TGB managing director Datuk Ir Tee Chai Seng expressed concern about the incident and said the company is working closely with the developer and consultants to determine the root cause.

“Thankfully, there were no casualties as a result of the incident. We want to reiterate that health and safety have always been paramount in our projects.

“We want to assure all stakeholders that we have adhered strictly to all health and safety standards and protocols throughout the construction process,“ he said in a statement.

Tee said the group is cooperating fully with the relevant authorities to investigate the cause of the incident.

“Initial findings suggest that we do not cause the building cracks.

“For all our projects, we are committed to ensuring the safety and well-being of all involved and to deliver projects that meet the highest standards of quality and integrity,” Tee added.

He urged the cooperation from the public to stop sharing any unauthorised videos or images and speculating any unverified information related to this project development.




tc

LG says subscription-based home appliance services catching on in Malaysia

KUALA LUMPUR: The shift towards subscription-based services is gaining traction in Malaysia, aligning with a broader global trend that redefines how consumers access products.

This model provides an appealing option for many Malaysians, particularly young families and newlyweds, who face rising living costs.

Offering high-quality appliances on a subscription basis eases the financial burden of ownership, allowing consumers to enjoy premium products without the pressure of a large upfront investment.

One notable brand offering subscription-based home appliance services is the South Korean brand, LG.

LG Malaysia product director of subscription business Hojin Jung said the introduction of the LG Rent Up Subscription in Malaysia is a natural progression of the company’s commitment to providing innovative and accessible solutions tailored to the evolving needs of modern consumers.

“LG Rent Up Subscription is inspired by our success with subscription models in South Korea, where we saw significant growth, driven by increasing demand for convenience and affordability.

“Recognising similar trends here, we noticed a growing interest in flexible ownership models in Malaysia, spurred by the need for more cost-effective solutions amidst rising living expenses and fuelled by shifting consumer preferences.

“Since its launch in March 2024, the market response has been encouraging. We have seen growing inquiries from customers who have signed up for our water purifier subscription model and are now exploring subscriptions for other high-demand appliances such as refrigerators, washing machines and TVs.

“This shift highlights a changing mindset in how Malaysians approach home appliance ownership – especially among younger, urban consumers who prioritise access over ownership, seeking premium products without the upfront financial commitment,” Hojin told SunBiz.

He said urbanisation and the desire for more sustainable, convenience-focused living have made subscription services an attractive option.

“By offering top-tier technology on a subscription basis, we make high-end living more accessible while emphasising affordability and environmental responsibility. LG’s Rent Up Subscription model meets Malaysians’ evolving needs, allowing them to enjoy premium technology without the burden of ownership,” he said.

Hojin said the subscription model is gaining popularity among young Malaysians, especially urban professionals and families facing high living costs and limited space.

This trend, he said, reflects a growing shift toward a ‘sharing economy,‘ where access to energy-efficient appliances without the financial strain of ownership is valued.

LG Rent Up Subscription’s launch saw a strong uptake in Kuala Lumpur and major cities, where 40% of tech-savvy millennials prefer renting to stay updated with technology affordably.

Elaborating on the model further, Hojin said that although subscription services share similarities across markets, the Malaysian context has distinct differences.

“In South Korea, for example, the rental model for water purifiers is well-established, with over 70% market penetration. Malaysia, meanwhile, is still in its early phase, but consumer awareness is rising quickly. Moreover, this trend is not isolated to Malaysia. LG is actively preparing to introduce the subscription model in other markets, including Taiwan and Thailand, by year-end.”

Touching on the vision for LG Rent Up in Malaysia, Hojin said the LG Rent Up Subscription is just the beginning of a transformative journey in how it engages with consumers in Malaysia.

“As we look ahead, we plan to expand our subscription offerings to include a wider array of smart home appliances and electronics, reflecting the growing demand for connected living solutions.

“Our vision for LG Rent Up Subscription is to enhance the customer experience by offering seamless integration with our LG ThinQ technology, which already empowers our appliances to be more intuitive and user-friendly. This will allow our customers to enjoy a smart, responsive lifestyle, further elevating the convenience and efficiency of their homes,” he explained.

Hojin said that as the subscription economy continues to evolve, particularly among tech-savvy and environmentally conscious consumers, LG Rent Up Subscription aims to play a pivotal role in making premium technology more accessible.

“Our ultimate goal is to foster a circular economy model in which subscribing to high-quality appliances reduces the financial burden on consumers and contributes to sustainability by extending product lifecycles and minimising waste.

“The more we enhance our subscription model, the more committed we are to making innovative technology more attainable. We ultimately aim to enrich the lives of our customers while promoting responsible consumption and environmental stewardship,” Hojin said.




tc

BSP finalizing framework for clearing switch operations

The Bangko Sentral ng Pilipinas is finalizing a regulatory framework to ensure the efficiency of clearing switch operations within the national payment system, particularly the automated clearing houses under the National Retail Payment System.




tc

Skip the Ads: A Clever Trick to Watch Youtube Ad Free

...




tc

Warning: Watch Out for the Latest Facebook Scam

Hey Geeks! We've all seen those sketchy emails and messages that scream ''SCAM.'' However, the latest phishing attack reported my https://www.kaspersky.com/blog/facebook-scam-24-hours-are-left-ro-request-review-see-why/51447/Kaspersky, targeting Facebook business account owners takes things to a new level. Here's the lowdown on what's happening and how to protect yourself. ...




tc

Immediate Availability of VomBatch





tc

Outcry as India books Kashmiri father seeking son’s body under anti-terror laws

Mushtaq Ahmed and six others, including his two brothers, were charged under India's harsh laws last week