sing Online Journal of Nursing Informatics Archive By ojni.org Published On :: Online journal dedicated to nursing informatics Full Article
sing Research on Weibo marketing advertising push method based on social network data mining By www.inderscience.com Published On :: 2024-10-02T23:20:50-05:00 The current advertising push methods have low accuracy and poor advertising conversion effects. Therefore, a Weibo marketing advertising push method based on social network data mining is studied. Firstly, establish a social network graph and use graph clustering algorithm to mine the association relationships of users in the network. Secondly, through sparsisation processing, the association between nodes in the social network graph is excavated. Then, evaluate the tightness between user preferences and other nodes in the social network, and use the TF-IDF algorithm to extract user interest features. Finally, an attention mechanism is introduced to improve the deep learning model, which matches user interests with advertising domain features and outputs push results. The experimental results show that the push accuracy of this method is higher than 95%, with a maximum advertising click through rate of 82.7% and a maximum advertising conversion rate of 60.7%. Full Article
sing Studentsâ Perceptions of Using Massive Open Online Courses (MOOCs) in Higher Learning Institutions By ijedict.dec.uwi.edu Published On :: Sat, 31 Aug 2024 09:44:41 -0400 Full Article Refereed Articles
sing Risk-based operation of plug-in electric vehicles in a microgrid using downside risk constraints method By www.inderscience.com Published On :: 2024-10-07T23:20:50-05:00 To achieve the benefits as much as possible, it is required to identify the available PEV capacity and prepare scheduling plans based on that. The analysis revealed that the risk-based scheduling of the microgrid could reduce the financial risk completely from $9.89 to $0.00 and increases the expected operation cost by 24% from $91.38 to $112.94, in turn. This implies that the risk-averse decision-maker tends to spend more money to reduce the expected risk-in-cost by using the proposed downside risk management technique. At the end, by the help of fuzzy satisfying method, the suitable risk-averse strategy is determined for the studied case. Full Article
sing Enabling smart city technologies: impact of smart city-ICTs on e-Govt. services and society welfare using UTAUT model By www.inderscience.com Published On :: 2024-10-07T23:20:50-05:00 Smart cities research is growing all over the world seeking to understand the effect of smart cities from different angles, domains and countries. The aim of this study is to analyse how the smart city ICTs (e.g., big data analytics, AI, IoT, cloud computing, smart grids, wireless communication, intelligent transportation system, smart building, e-governance, smart health, smart education and cyber security) are related to government. services and society welfare from the perspective of China. This research confirmed a positive correlation of smart city ICTs to e-Govt. Services (e-GS). On the other hand, the research showed a positive influence of smart city ICTs on society's welfare. These findings about smart cities and ICTs inform us how the thought paradigm to smart technologies can cause the improvement of e-GS through economic development, job creation and social welfare. The study offers different applications of the theoretical perspectives and the management perspective which are significant to building a society during recent technologised era. Full Article
sing An intelligent approach to classify and detection of image forgery attack (scaling and cropping) using transfer learning By www.inderscience.com Published On :: 2024-09-26T23:20:50-05:00 Image forgery detection techniques refer to the process of detecting manipulated or altered images, which can be used for various purposes, including malicious intent or misinformation. Image forgery detection is a crucial task in digital image forensics, where researchers have developed various techniques to detect image forgery. These techniques can be broadly categorised into active, passive, machine learning-based and hybrid. Active approaches involve embedding digital watermarks or signatures into the image during the creation process, which can later be used to detect any tampering. On the other hand, passive approaches rely on analysing the statistical properties of the image to detect any inconsistencies or irregularities that may indicate forgery. In this paper for the detection of scaling and cropping attack a deep learning method has been proposed using ResNet. The proposed method (Res-Net-Adam-Adam) is able to achieve highest amount of accuracy of 99.14% (0.9914) while detecting fake and real images. Full Article
sing Robust and secure file transmission through video streaming using steganography and blockchain By www.inderscience.com Published On :: 2024-09-26T23:20:50-05:00 File transfer is always handled by a separate service, sometimes it is a third-party service in videoconferencing. When sending files during a video session, file data flow and video stream are independent of each other. Encryption is a mature method to ensure file security. However, it still has the chance to leave footprints on the intermediate forwarding machines. These footprints can indicate that a file once passed through, some protocol-related logs give clues to the hackers' later investigation. This work proposes a file-sending scheme through the video stream using blockchain and steganography. Blockchain is used as a file slicing and linkage mechanism. Steganography is applied to embed file pieces into video frames that are continuously generated during the session. The scheme merges files into the video stream with no file transfer protocol use and no extra bandwidth consumed by the file to provide trackless file transmission during the video communication. Full Article
sing Secure digital academic certificate verification system using blockchain By www.inderscience.com Published On :: 2024-09-26T23:20:50-05:00 At present, there is a need for an authentic and fast approach to certificate verification. Which verifies and authenticates the certificates to reduce the extent of duplicity and time. An academic certificate is significant for students, the government, universities, and employers. Academic credentials play a vital role in the career of students. A few people manipulate academic documents for their benefit. There are cases identified where people produced fake academic certificates for jobs or higher education admission. Various research works are developing a secure model to verify genuine academic credentials. This research article proposed a new security model which contains several security algorithms such as timestamps, hash function, digital signature, steganography, and blockchain. The proposed model issues secure digital academic certificates. It enhanced security measures and automated educational certificate verification using blockchain technology. The advantages of the proposed model are automated, cost-effective, secured, traceable, accurate, and time-saving. Full Article
sing Robust watermarking of medical images using SVM and hybrid DWT-SVD By www.inderscience.com Published On :: 2024-09-26T23:20:50-05:00 In the present scenario, the security of medical images is an important aspect in the field of image processing. Support vector machines (SVMs) are a supervised machine learning technique used in image classification. The roots of SVM are from statistical learning theory. It has gained excellent significance because of its robust, accurate, and very effective algorithm, even though it was applied to a small set of training samples. SVM can classify data into binary classification or multiple classifications according to the application's needs. Discrete wavelet transform (DWT) and singular value decomposition (SVD) transform techniques are utilised to enhance the image's security. In this paper, the image is first classified using SVM into ROI and RONI, and thereafter, to enhance the images diagnostic capabilities, the DWT-SVD-based hybrid watermarking technique is utilised to embed the watermark in the RONI region. Overall, our work makes a significant contribution to the field of medical image security by presenting a novel and effective solution. The results are evaluated using both perceptual and imperceptibility testing using PSNR and SSIM parameters. Different attacks were introduced to the watermarked image, which shows the efficacy and robustness of the proposed algorithm. Full Article
sing An image encryption using hybrid grey wolf optimisation and chaotic map By www.inderscience.com Published On :: 2024-09-26T23:20:50-05:00 Image encryption is a critical and attractive issue in digital image processing that has gained approval and interest of many researchers in the world. A proposed hybrid encryption method was implemented by using the combination of the Nahrain chaotic map with a well-known optimised algorithm namely the grey wolf optimisation (GWO). It was noted from analysing the results of the experiments conducted on the new hybrid algorithm, that it gave strong resistance against expected statistical invasion as well as brute force. Several statistical analyses were carried out and showed that the average entropy of the encrypted images is near to its ideal information entropy. Full Article
sing Analysing the role of WOM and eWOM in exploring tourist destinations By www.inderscience.com Published On :: 2024-10-02T23:20:50-05:00 Word of mouth (WOM) and electronic word of mouth (eWOM) are very effective and important communication tools to persuade consumers for purchasing the products/services. These become more significant with products that are difficult to assess before consumption, e.g., hospitality. The tourism industry is reviving, and the consumer is conscious when booking a particular destination. Thus, it is important to understand how WOM and eWOM are impacting the various factors in distinct ways while choosing the tourist destination. The seven factors identified, for the present study, are channel engagement, expertise, homophily, resource helpfulness, source credibility, tie-strength, and trustworthiness. The PLS-SEM was used to test the theoretical model of this study. The study shows that both WOM and eWOM impact an individual in different ways. The expertise of the reviewer is the most important factor in the case of WOM and channel engagement is the most significant factor for eWOM. Resource helpfulness is common for both WOM and eWOM. Full Article
sing A constant temperature control system for indoor environments in buildings using internet of things By www.inderscience.com Published On :: 2024-07-01T23:20:50-05:00 The performance of a building's internal environment, which includes the air temperature, lighting and acoustics, is what determines the quality of the environment inside the building. We present a thermal model for achieving thermal comfort in buildings that makes use of a multimodal analytic framework as a solution to this challenge. In this study, a multimodal combination is used to evaluate several temperature and humidity sensors as well as an area image. Additionally, a CNN and LSTM combination is used to process the image and sensor data. The results show that heating setback and interior set point temperatures, as well as mechanical ventilation based on real people's presence and CO<SUB align=right>2 levels, are all consistently reduced when ICT-driven intelligent solutions are used. The CNN-LSTM model has a goodness of fit that is 0.7258 on average, which is much higher than both the CNN (0.5291) and LSTM (0.5949) models. Full Article
sing Smart approach to constraint programming: intelligent backtracking using artificial intelligence By www.inderscience.com Published On :: 2024-07-01T23:20:50-05:00 Constrained programming is the concept used to select possible alternatives from an incredibly diverse range of candidates. This paper proposes an AI-assisted Backtracking Scheme (AI-BS) by integrating the generic backtracking algorithm with Artificial Intelligence (AI). The detailed study observes that the extreme dual ray associated with the infeasible linear program can be automatically extracted from minimum unfeasible sets. Constraints are used in artificial intelligence to list all possible values for a group of variables in a given universe. To put it another way, a solution is a way of assigning a value to each variable that these values satisfy all constraints. Furthermore, this helps the study reach a decreased search area for smart backtracking without paying high costs. The evaluation results exhibit that the IB-BC algorithm-based smart electricity schedule controller performs better electricity bill during the scheduled periods than comparison approaches such as binary backtracking and binary particle swarm optimiser. Full Article
sing Application of integrated image processing technology based on PCNN in online music symbol recognition training By www.inderscience.com Published On :: 2024-10-07T23:20:50-05:00 To improve the effectiveness of online training for music education, it was investigated how to improve the pulse-coupled neural network in image processing for spectral image segmentation. The study proposes a two-scale descent method to achieve oblique spectral correction. Subsequently, a convolutional neural network was optimised using a two-channel feature fusion recognition network for music theory notation recognition. The results showed that this image segmentation method had the highest accuracy, close to 98%, and the accuracy of spectral tilt correction was also as high as 98.4%, which provided good image pre-processing results. When combined with the improved convolutional neural network, the average accuracy of music theory symbol recognition was about 97% and the highest score of music majors was improved by 16 points. This shows that the method can effectively improve the teaching effect of online training in music education and has certain practical value. Full Article
sing BEFA: bald eagle firefly algorithm enabled deep recurrent neural network-based food quality prediction using dairy products By www.inderscience.com Published On :: 2024-10-07T23:20:50-05:00 Food quality is defined as a collection of properties that differentiate each unit and influences acceptability degree of food by users or consumers. Owing to the nature of food, food quality prediction is highly significant after specific periods of storage or before use by consumers. However, the accuracy is the major problem in the existing methods. Hence, this paper presents a BEFA_DRNN approach for accurate food quality prediction using dairy products. Firstly, input data is fed to data normalisation phase, which is performed by min-max normalisation. Thereafter, normalised data is given to feature fusion phase that is conducted employing DNN with Canberra distance. Then, fused data is subjected to data augmentation stage, which is carried out utilising oversampling technique. Finally, food quality prediction is done wherein milk is graded employing DRNN. The training of DRNN is executed by proposed BEFA that is a combination of BES and FA. Additionally, BEFA_DRNN obtained maximum accuracy, TPR and TNR values of 93.6%, 92.5% and 90.7%. Full Article
sing Enhancing clean technology's dynamic cross technique using value chain By www.inderscience.com Published On :: 2024-10-01T23:20:50-05:00 Numerous Indian economic sectors have been impacted by the COVID-19 epidemic, with many being forced to the verge of extinction. As a result, this essay analyses the importance of supply chains for grapes and the manufactured goods made from them, including beverages and currants, in a specific state that happens to be India's top grape-producing region. In order to identify the sites of rupture brought on by the pandemic and to recommend policy changes to create a resilient system, a value chain analysis is performed. Value chain management has emerged as one of the key strategies businesses use today to boost productivity and costs when they are up against greater rivalry in the marketplace, however, with several new challenges, such as concerns over security, environmental protection, compensation, and business accountability. According to the value chain study, the level of value addition for intermediary agents, such as pre-harvest contractors, has increased after COVID-19 at the expense of farmers. Various policy approaches are explained to enhance the grape value chain using the knowledge gained from Porter's value chain results and supply and demand shocks. Full Article
sing Natural language processing-based machine learning psychological emotion analysis method By www.inderscience.com Published On :: 2024-07-02T23:20:50-05:00 To achieve psychological and emotional analysis of massive internet chats, researchers have used statistical methods, machine learning, and neural networks to analyse the dynamic tendencies of texts dynamically. For long readers, the author first compares and explores the differences between the two psychoanalysis algorithms based on the emotion dictionary and machine learning for simple sentences, then studies the expansion algorithm of the emotion dictionary, and finally proposes an extended text psychoanalysis algorithm based on conditional random field. According to the experimental results, the mental dictionary's accuracy, recall, and F-score based on the cognitive understanding of each additional ten words were calculated. The optimisation decreased, and the memory and F-score improved. An <i>F</i>-value greater than 1, which is the most effective indicator for evaluating the effectiveness of a mental analysis problem, can better demonstrate that the algorithm is adaptive in the literature dictionary. It has been proven that this scheme can achieve good results in analysing emotional tendencies and has higher efficiency than ordinary weight-based psychological sentiment analysis algorithms. Full Article
sing Design of an intelligent financial sharing platform driven by digital economy and its role in optimising accounting transformation production By www.inderscience.com Published On :: 2024-07-02T23:20:50-05:00 With the expansion of business scope, the environment faced by enterprises has also changed, and competition is becoming increasingly fierce. Traditional financial systems are increasingly difficult to handle complex tasks and predict potential financial risks. In the context of the digital economy era, the booming financial sharing services have reduced labour costs and improved operational efficiency. This paper designs and implements an intelligent financial sharing platform, establishes a fund payment risk early warning model based on an improved support vector machine algorithm, and tests it on the Financial Distress Prediction dataset. The experimental results show that the effectiveness of using F2 score and AUC evaluation methods can reach 0.9484 and 0.9023, respectively. After using this system, the average financial processing time per order decreases by 43%, and the overall financial processing time decreases by 27%. Finally, this paper discusses the role of intelligent financial sharing platform in accounting transformation and optimisation of production. Full Article
sing Application of digital twin virtual design and BIM technology in intelligent building image processing By www.inderscience.com Published On :: 2024-07-02T23:20:50-05:00 Intelligent digital virtual technology has become an indispensable part of modern construction, but there are also some problems in its practical application. Therefore, it is necessary to strengthen the design of intelligent building image processing systems from many aspects. Starting from image digital processing methods, this paper studies the digital twin virtual design scene construction method and related algorithms, converts the original image into a colour digital image through a greyscale algorithm, and then combines morphological knowledge and feature point extraction methods to complete the construction of a three-dimensional virtual environment. Finally, through the comparison of traditional image processing effects with smart building images based on digital twins and BIM technology, the results show that the optimised image processing results have higher clarity, sharper contrast, and a sensitivity increased by 5.84%, presenting better visual effects and solving the risk of misjudgement caused by inaccurate image recognition. Full Article
sing Loan delinquency analysis using predictive model By www.inderscience.com Published On :: 2024-10-02T23:20:50-05:00 The research uses a machine learning approach to appraising the validity of customer aptness for a loan. Banks and non-banking financial companies (NBFC) face significant non-performing assets (NPAs) threats because of the non-payment of loans. In this study, the data is collected from Kaggle and tested using various machine learning models to determine if the borrower can repay its loan. In addition, we analysed the performance of the models [K-nearest neighbours (K-NN), logistic regression, support vector machines (SVM), decision tree, naive Bayes and neural networks]. The purpose is to support decisions that are based not on subjective aspects but objective data analysis. This work aims to analyse how objective factors influence borrowers to default loans, identify the leading causes contributing to a borrower's default loan. The results show that the decision tree classifier gives the best result, with a recall rate of 0.0885 and a false- negative rate of 5.4%. Full Article
sing Assessing Students’ Structured Programming Skills with Java: The “Blue, Berry, and Blueberry” Assignment By Published On :: Full Article
sing Using Digital Logs to Reduce Academic Misdemeanour by Students in Digital Forensic Assessments By Published On :: Full Article
sing Using Wikis to Enhance Website Peer Evaluation in an Online Website Development Course: An Exploratory Study By Published On :: Full Article
sing Re-purposing Google Maps Visualisation for Teaching Logistics Systems By Published On :: Full Article
sing An Exploratory Study on Using Wiki to Foster Student Teachers’ Learner-centered Learning and Self and Peer Assessment By Published On :: Full Article
sing Using the Work System Method with Freshman Information Systems Students By Published On :: Full Article
sing Using Student e-Portfolios to Facilitate Learning Objective Achievements in an Outcome-Based University By Published On :: Full Article
sing Using Adult Learning Principles as a Framework for Learning ICT Skills Needed for Research Projects By Published On :: Full Article
sing Augmenting a Child’s Reality: Using Educational Tablet Technology By Published On :: Full Article
sing Experiences of Using Automated Assessment in Computer Science Courses By Published On :: 2015-10-08 In this paper we discuss the use of automated assessment in a variety of computer science courses that have been taught at Israel Academic College by the authors. The course assignments were assessed entirely automatically using Checkpoint, a web-based automated assessment framework. The assignments all used free-text questions (where the students type in their own answers). Students were allowed to correct errors based on feedback provided by the system and resubmit their answers. A total of 141 students were surveyed to assess their opinions of this approach, and we analysed their responses. Analysis of the questionnaire showed a low correlation between questions, indicating the statistical independence of the individual questions. As a whole, student feedback on using Checkpoint was very positive, emphasizing the benefits of multiple attempts, impartial marking, and a quick turnaround time for submissions. Many students said that Checkpoint gave them confidence in learning and motivation to practise. Students also said that the detailed feedback that Checkpoint generated when their programs failed helped them understand their mistakes and how to correct them. Full Article
sing Recognizing and Managing Complexity: Teaching Advanced Programming Concepts and Techniques Using the Zebra Puzzle By Published On :: 2015-06-13 Teaching advanced programming can be a challenge, especially when the students are pursuing different majors with diverse analytical and problem-solving capabilities. The purpose of this paper is to explore the efficacy of using a particular problem as a vehicle for imparting a broad set of programming concepts and problem-solving techniques. We present a classic brain teaser that is used to communicate and demonstrate advanced software development concepts and techniques. Our results show that students with varied academic experiences and goals, assuming at least one procedural/structured programming pre-requisite, can benefit from and also be challenged by such an exercise. Although this problem has been used by others in the classroom, we believe that our use of this problem in imparting such a broad range of topics to a diverse student population is unique. Full Article
sing Using Technology in Gifted and Talented Education Classrooms: The Teachers’ Perspective By Published On :: 2015-04-28 Technology skills are assumed to be a necessity for college and career success, but technology is constantly evolving. Thus, development of students’ technology skills is an on-going and persistent issue. Standards from the Partnership for 21st Century Skills and the International Society for Technology in Education encourage educators to teach skills that help students adapt to changing working environments. These skills resemble the National Association for Gifted Children’s program and teacher preparation standards. Descriptive research about what is already occurring in classrooms has been done, but the information is frequently limited to a list of activities. A qualitative multi-case phenomenological study of six Alabama teachers of the gifted examined how they use and shape technology experiences with students, and promote student learning of 21st century skills. The teachers were chosen for the case study due to their reputation as teachers skilled in using technology with students. Lesson plans, interviews, and observations were used to discover themes between the teachers. Findings from the research indicate that educational technology use with students is shaped by factors such as teacher attitudes and expertise, available equipment and support, pedagogical decisions related to working with technology, and the particular student group participating in the technology use. Full Article
sing Effectiveness of Peer Assessment in a Professionalism Course Using an Online Workshop By Published On :: 2015-01-22 An online Moodle Workshop was evaluated for peer assessment effectiveness. A quasi-experiment was designed using a Seminar in Professionalism course taught in face-to-face mode to undergraduate students across two campuses. The first goal was to determine if Moodle Workshop awarded a fair peer grader grade. The second objective was to estimate if students were consistent and reliable in performing their peer assessments. Statistical techniques were used to answer the research hypotheses. Although Workshop Moodle did not have a built-in measure for peer assessment validity, t-tests and reliability estimates were calculated to demonstrate that the grades were consistent with what faculty expected. Implications were asserted to improve teaching and recommendations were provided to enhance Moodle. Full Article
sing A Detailed Rubric for Assessing the Quality of Teacher Resource Apps By Published On :: 2016-06-25 Since the advent of the iPhone and rise of mobile technologies, educational apps represent one of the fastest growing markets, and both the mobile technology and educational app markets are predicted to continue experiencing growth into the foreseeable future. The irony, however, is that even with a booming market for educational apps, very little research regarding the quality of them has been conducted. Though some instruments have been developed to evaluate apps geared towards student learning, no such instrument has been created for teacher resource apps, which are designed to assist teachers in completing common tasks (e.g., taking attendance, communicating with parents, monitoring student learning and behavior, etc.). Moreover, when teachers visit the App Store or Google Play to learn about apps, the only ratings provided to them are generic, five-point evaluations, which do not provide qualifiers that explain why an app earned three, two, or five points. To address that gap, previously conducted research related to designing instructional technologies coupled with best practices for supporting teachers were first identified. That information was then used to construct a comprehensive rubric for assessing teacher re-source apps. In this article, a discussion that explains the need for such a rubric is offered before describing the process used to create it. The article then presents the rubric and discusses its different components and potential limitations and concludes with suggestions for future research based on the rubric. Full Article
sing Using Autobiographical Digital Storytelling for the Integration of a Foreign Student in the School Environment. A Case Study By Published On :: 2016-06-25 Immigrant students face a multitude of problems, among which are poor social adaptation and school integration. On the other hand, although digital narrations are widely used in education, they are rarely used for aiding students or for the resolution of complex problems. This study exploits the potential of digital narrations towards this end, by examining how the development and presentation of an autobiographical digital narration can assist immigrant students in overcoming their adaptation difficulties. For that matter, a female student presenting substantial problems was selected as the study’s subject. Data was collected from all the participating parties (subject, teacher, classmates) using a variety of tools, before, during, and after the intervention. It was found that through the digital narration she was able to externalize her thoughts and feelings and this, in turn, helped her in achieving a smoother integration in the school environment. In addition, the attitudes and perceptions of the other students for their foreign classmate were positively influenced. The intervention was short in duration and it did not require special settings. Hence, it can be easily applied and educators can consider using similar interventions. On the other hand, further research is recommended to establish the generalizability of the study’s findings. Full Article
sing Using Interactive Software to Teach Foundational Mathematical Skills By Published On :: 2016-01-26 The pilot research presented here explores the classroom use of Emerging Literacy in Mathematics (ELM) software, a research-based bilingual interactive multimedia instructional tool, and its potential to develop emerging numeracy skills. At the time of the study, a central theme of early mathematics curricula, Number Concept, was fully developed. It was broken down into five mathematical concepts including counting, comparing, adding, subtracting and decomposing. Each of these was further subdivided yielding 22 online activities, each building in a level of complexity and abstraction. In total, 234 grade one students from 12 classes participated in the two-group post-test study that lasted about seven weeks and for which students in the experimental group used ELM for about 30 minutes weekly. The results for the final sample of 186 students showed that ELM students scored higher on the standardized math test (Canadian Achievement Test, 2008) and reported less boredom and lower anxiety as measured on the Academic Emotions Questionnaire than their peers in the control group. This short duration pilot study of one ELM theme holds great promise for ELM’s continued development. Full Article
sing Students’ Attention when Using Touchscreens and Pen Tablets in a Mathematics Classroom By Published On :: 2017-03-29 Aim/Purpose: The present study investigated and compared students’ attention in terms of time-on-task and number of distractors between using a touchscreen and a pen tablet in mathematical problem-solving activities with virtual manipulatives. Background: Although there is an increasing use of these input devices in educational practice, little research has focused on assessing student attention while using touchscreens or pen tablets in a mathematics classroom. Methodology: A qualitative exploration was conducted in a public elementary school in New Taipei, Taiwan. Six fifth-grade students participated in the activities. Video recordings of the activities and the students’ actions were analyzed. Findings: The results showed that students in the activity using touchscreens maintained greater attention and, thus, had more time-on-task and fewer distractors than those in the activity using pen tablets. Recommendations for Practitioners: School teachers could employ touchscreens in mathematics classrooms to support activities that focus on students’ manipulations in relation to the attention paid to the learning content. Recommendation for Researchers: The findings enhance our understanding of the input devices used in educational practice and provide a basis for further research. Impact on Society: The findings may also shed light on the human-technology interaction process involved in using pen and touch technology conditions. Future Research: Activities similar to those reported here should be conducted using more participants. In addition, it is important to understand how students with different levels of mathematics achievement use the devices in the activities. Full Article
sing Promising Instructional Practices for English Language Learners By Published On :: 2018-02-05 Aim/Purpose: The purpose of this exploratory case study was to understand how teachers, working with English Language Learners (ELLs), expanded their knowledge and instructional practices as they implemented a one-to-one iPad® program. Background: English Language Learners experience linguistic, cultural, and cognitive shifts that can be challenging, and at times lead to isolation for ELLs. While technology can be engaging, devices alone do not shift instructional practices, nor lead to student learning. Technology must be leveraged through shifts to pedagogical practice and linked thoughtfully to content goals. Methodology: This research was conducted through a qualitative case study of educators at an international school. Contribution: This study describes promising pedagogical practices for leveraging 1:1 mobile devices for ELLs. Findings: iPads can be a support for ELL students. One-to-one iPads allowed teachers to experiment with new pedagogical approaches, but this development varies greatly between teachers. During the 1:1 implementation there were challenges reported. Recommendations for Practitioners: In order to mitigate some of these challenges, and build on the success of this study, the researcher suggests developing a common vision for technology integration, using collaborative models of ELL teaching, and investing in professional development. Recommendation for Researchers: Researchers should continue to document and observe the learning outcomes of ELL students in 1:1 environments, including an experimental study. Impact on Society: ELLs can benefit from 1:1 technology, and new pedagogical practices. For teachers to implement these new practices conversations on philosophy, engagement with families, and consistent professional development. Future Research: Future research can continue to expand the population of ELL students in 1:1 mobile learning environments; and the most powerful pedagogical practices. Full Article
sing Constructed Response or Multiple-Choice Questions for Assessing Declarative Programming Knowledge? That is the Question! By Published On :: 2019-12-26 Aim/Purpose: This paper presents a data mining approach for analyzing responses to advanced declarative programming questions. The goal of this research is to find a model that can explain the results obtained by students when they perform exams with Constructed Response questions and with equivalent Multiple-Choice Questions. Background: The assessment of acquired knowledge is a fundamental role in the teaching-learning process. It helps to identify the factors that can contribute to the teacher in the developing of pedagogical methods and evaluation tools and it also contributes to the self-regulation process of learning. However, better format of questions to assess declarative programming knowledge is still a subject of ongoing debate. While some research advocates the use of constructed responses, others emphasize the potential of multiple-choice questions. Methodology: A sensitivity analysis was applied to extract useful knowledge from the relevance of the characteristics (i.e., the input variables) used for the data mining process to compute the score. Contribution: Such knowledge helps the teachers to decide which format they must consider with respect to the objectives and expected students results. Findings: The results shown a set of factors that influence the discrepancy between answers in both formats. Recommendations for Practitioners: Teachers can make an informed decision about whether to choose multiple-choice questions or constructed-response taking into account the results of this study. Recommendation for Researchers: In this study a block of exams with CR questions is verified to complement the area of learning, returning greater performance in the evaluation of students and improving the teaching-learning process. Impact on Society: The results of this research confirm the findings of several other researchers that the use of ICT and the application of MCQ is an added value in the evaluation process. In most cases the student is more likely to succeed with MCQ, however if the teacher prefers to evaluate with CR other research approaches are needed. Future Research: Future research must include other question formats. Full Article
sing Enhancing Student Learning in Cybersecurity Education using an Out-of-class Learning Approach By Published On :: 2019-02-12 Aim/Purpose: In this study, the researchers investigated whether the out-of-class learning approach could help the students to attain any valuable learning outcomes for cybersecurity learning and could enhance the perceived value of cybersecurity education among the students. Background: Cybersecurity learning poses challenges for its students to learn a complicated subject matter and the students may be intimidated by the challenging courses in cybersecurity programs. Therefore, it is essential for the faculty members to devise some mechanisms to promote cybersecurity learning to increase its student retention. The mechanism suggested by this study was the out-of-class learning approach. Methodology: The researchers in this study employed a content analysis and adopted a semiotic method to analyze qualitative data. The researchers also conducted crosstabulation analyses using chi-square tests to detect the significant differences in the emerging learning outcomes from the two different out-of-class learning activities investigated in this study. Contribution: This study addressed the difficulty of cybersecurity education and proposed a viable mechanism to promote the student learning in such a complicated subject matter. Findings: For cybersecurity education, the out-of-class learning approach is a viable pedagogical mechanism that could lead the students to several learning outcomes, including connecting them to the real-life scenarios related to the cybersecurity profession, guiding them to their career choices and development, stimulating their intellectual growth, creating their justification of learning, and raising their cybersecurity awareness. Recommendations for Practitioners: The instructors of any cybersecurity programs should incorporate some out-of-class learning activities into the courses in their programs, especially the introductory-level courses. Additionally, it is important to coordinate the out-of-class learning activities with the in-class lessons to enable the students to justify what they have learned in their classrooms and motivate them to learn more. Recommendation for Researchers: Researchers could look beyond in-class learning and laboratory learning to investigate the impacts of out-of-class learning activities on cybersecurity education to help the students to attain better learning outcomes. Impact on Society: By promoting cybersecurity education, universities and colleges could attain a higher retention rate of the students in their cybersecurity programs. The higher retention rate of the students in cybersecurity programs would help to ease the critical shortage of cybersecurity talent. Future Research: Future research could explore the impacts of other out-of-class learning activities on cybersecurity learning; for example: job shadowing, attending cybersecurity conferences, internship, developing cybersecurity systems or tools for actual customers, working on cybersecurity research with faculty members. Additionally, future studies could investigate the effects of the out-of-class learning approach on promoting other academic programs that are characterized by intensely complex and technical nature, similar to cybersecurity programs. Full Article
sing Digital Literacy in Higher Education: A Case Study of Student Engagement with E-Tutorials Using Blended Learning By Published On :: 2019-01-28 Aim/Purpose: This paper reports on a case study project which had three goals; to develop a suite of original interactive digital skills e-tutorials to be embedded in undergraduate and postgraduate courses; to evaluate the students’ experience and engagement with the e-tutorials over one semester; and to explore their general attitudes towards online and blended learning. Background: Online and blended learning modes continue to grow in popularity in higher education, with the aim of streamlining and enhancing student learning, supporting collaboration and creativity, and equipping students with the skills they will require to work and live in an increasingly digitized world. This practice-based case study highlights factors which positively and negatively affect user engagement with digital learning objects and explores students’ perceptions of the role of online learning within their academic programs. Methodology: A suite of nine interactive e-tutorials, addressing essential digital literacy skills for university students, was developed through instructor and student peer collaboration using Articulate software, informed by best practice. The e-tutorials were embedded in the institutional Learning Management System for three undergraduate and postgraduate courses, in which digital literacy formed the core learning content, to complement classroom-based learning. Students in these courses were surveyed via SurveyMonkey about their specific experience of using the e-tutorials, as well as their general perceptions of digital literacy and online learning. Eighty-six students in total completed the questionnaire, which consisted of twenty-three closed- and open-ended questions. Contribution: Through highlighting both the positive and the challenging aspects of the students’ reported experience of online learning, this case study contributes useful insights to the body of literature on user engagement with digital learning objects in higher education, as well as students’ perceptions and experience of blended learning. Findings: The e-tutorials were perceived as valuable in reinforcing classroom learning, allowing respondents to revise concepts and materials covered in face-to-face classes, at their own pace and in their own time. Survey responses showed that the accessibility, ease-of-use, design and duration of the e-tutorials were deemed effective in terms of user engagement; however, several technological challenges were identified, such as browser incompatibility, uneven sound quality and general Internet connection issues, which disrupted their learning. Overall, students expressed enjoyment of the learning facilitated by the e-tutorials; however, rather than favoring online learning alone, they expressed a preference for a blended learning environment, with a combination of complementary learning approaches; survey respondents did not generally wish to forego face-to-face classes entirely. Recommendations for Practitioners: Instructors should seek to strategically embed interactive digital learning objects in their courses at defined points of need in a logical structure, e.g., to reinforce classroom-based learning, or to support specific skill development. Potential disruption to learning should be minimized by following best practice guidelines to ensure ease of access, a seamless user experience, and timely feedback, as well as providing adequate support for rapid resolution of technical glitches. Recommendation for Researchers: E-tutorials offer a useful means of exploring ways in which students acquire learning in the digital environment. A wider, collaborative exploration is needed to provide comparative studies which move beyond case studies. Impact on Society: Online learning mechanisms, such as e-tutorials, offer students different means of acquiring essential literacy skills and different ways to interact with content. E-tutorials constitute reusable learning objects, which can be accessed as just-in-time delivery modes, when students perceive they need to review particular skills or reinforce learning material. Future Research: This research is now expanding into different types of reusable learning objects. E-tutorials may be developed in multiple ways, and comparative research around e-tutorial models will deepen our understanding of how students interact with content in formal learning contexts. As the digital educational landscape continues to expand alongside traditional face-to-face and analogue learning modes, a key research focus will be student and instructor perceptions and experience of blended learning in different contexts. Full Article
sing Using Educational Data Mining to Predict Students’ Academic Performance for Applying Early Interventions By Published On :: 2021-07-23 Aim/Purpose: One of the main objectives of higher education institutions is to provide a high-quality education to their students and reduce dropout rates. This can be achieved by predicting students’ academic achievement early using Educational Data Mining (EDM). This study aims to predict students’ final grades and identify honorary students at an early stage. Background: EDM research has emerged as an exciting research area, which can unfold valuable knowledge from educational databases for many purposes, such as identifying the dropouts and students who need special attention and discovering honorary students for allocating scholarships. Methodology: In this work, we have collected 300 undergraduate students’ records from three departments of a Computer and Information Science College at a university located in Saudi Arabia. We compared the performance of six data mining methods in predicting academic achievement. Those methods are C4.5, Simple CART, LADTree, Naïve Bayes, Bayes Net with ADTree, and Random Forest. Contribution: We tested the significance of correlation attribute predictors using four different methods. We found 9 out of 18 proposed features with a significant correlation for predicting students’ academic achievement after their 4th semester. Those features are student GPA during the first four semesters, the number of failed courses during the first four semesters, and the grades of three core courses, i.e., database fundamentals, programming language (1), and computer network fundamentals. Findings: The empirical results show the following: (i) the main features that can predict students’ academic achievement are the student GPA during the first four semesters, the number of failed courses during the first four semesters, and the grades of three core courses; (ii) Naïve Bayes classifier performed better than Tree-based Models in predicting students’ academic achievement in general, however, Random Forest outperformed Naïve Bayes in predicting honorary students; (iii) English language skills do not play an essential role in students’ success at the college of Computer and Information Sciences; and (iv) studying an orientation year does not contribute to students’ success. Recommendations for Practitioners: We would recommend instructors to consider using EDM in predicting students’ academic achievement and benefit from that in customizing students’ learning experience based on their different needs. Recommendation for Researchers: We would highly endorse that researchers apply more EDM studies across various universities and compare between them. For example, future research could investigate the effects of offering tutoring sessions for students who fail core courses in their first semesters, examine the role of language skills in social science programs, and examine the role of the orientation year in other programs. Impact on Society: The prediction of academic performance can help both teachers and students in many ways. It also enables the early discovery of honorary students. Thus, well-deserved opportunities can be offered; for example, scholarships, internships, and workshops. It can also help identify students who require special attention to take an appropriate intervention at the earliest stage possible. Moreover, instructors can be aware of each student’s capability and customize the teaching tasks based on students’ needs. Future Research: For future work, the experiment can be repeated with a larger dataset. It could also be extended with more distinctive attributes to reach more accurate results that are useful for improving the students’ learning outcomes. Moreover, experiments could be done using other data mining algorithms to get a broader approach and more valuable and accurate outputs. Full Article
sing A Cognitive Approach to Assessing the Materials in Problem-Based Learning Environments By Published On :: 2021-07-12 Aim/Purpose: The purpose of this paper is to develop and evaluate a debiasing-based approach to assessing the learning materials in problem-based learning (PBL) environments. Background: Research in cognitive debiasing suggests nine debiasing strategies improve decision-making. Given the large number of decisions made in semester-long, problem-based learning projects, multiple tools and techniques help students make decisions. However, instructors may struggle to identify the specific tools or techniques that could be modified to best improve students’ decision-making in the project. Furthermore, a structured approach for identifying these modifications is lacking. Such an approach would match the debiasing strategies with the tools and techniques. Methodology: This debiasing framework for the PBL environment is developed through a study of debiasing literature and applied within an e-commerce course using the Model for Improvement, continuous improvement process, as an illustrative case to show its potential. In addition, a survey of the students, archival information, and participant observation provided feedback on the debiasing framework and its ability to assess the tools and techniques within the PBL environment. Contribution: This paper demonstrates how debiasing theory can be used within a continuous improvement process for PBL courses. By focusing on a cognitive debiasing-based approach, this debiasing framework helps instructors 1) identify what tools and techniques to change in an PBL environment, and 2) assess which tools and techniques failed to debias the students adequately, providing potential changes for future cycles. Findings: Using the debiasing framework in an e-commerce course with significant PBL elements provides evidence that this framework can be used within IS courses and more broadly. In this particular case, the change identified in a prior cycle proved effective and additional issues were identified for improvement. Recommendations for Practitioners: With the growing usage of semester-long PBL projects in business schools, instructors need to ensure that their design of the projects incorporates techniques that improve student learning and decision making. This approach provides a means for assessing the quality of that design. Recommendation for Researchers: This study uses debiasing theory to improve course techniques. Researchers interested in assessment, course improvement, and program improvement should incorporate debiasing theory within PBL environments or other types of decision-making scenarios. Impact on Society: Increased awareness of cognitive biases can help instructors, students, and professionals make better decisions and recommendations. By developing a framework for evaluating cognitive debiasing strategies, we help instructors improve projects that prepare students for complex and multifaceted real-world projects. Future Research: The approach could be applied to multiple contexts, within other courses, and more widely within information systems to extend this research. The framework might also be refined to make it more concise, integrated with assessment, or usable in more contexts. Full Article
sing Innovative Pedagogical Strategies of Streaming, Just-in-Time Teaching, and Scaffolding: A Case Study of Using Videos to Add Business Analytics Instruction Across a Curriculum By Published On :: 2021-01-29 Aim/Purpose: Business analytics is a cross-functional field that is important to implement for a college and has emerged as a critically important core component of the business curriculum. It is a difficult task due to scheduling concerns and limits to faculty and student resources. This paper describes the process of creating a central video repository to serve as a platform for just in time teaching and the impact on student learning outcomes. Background: Industry demand for employees with analytical knowledge, skills, and abilities requires additional analytical content throughout the college of business curriculum. This demand needs other content to be added to ensure that students have the prerequisite skills to complete assignments. Two pedagogical approaches to address this issue are Just-in-Time Teaching (JiTT) and scaffolding, grounded in the Vygoskian concept of “Zone of Proximal Development. Methodology: This paper presents a case study that applies scaffolding and JiTT teaching to create a video repository to add business analytics instruction to a curriculum. The California Critical Thinking Skills Test (CCTST) and Major Field Test (MFT) scores were analyzed to assess learning outcomes. Student and faculty comments were considered to inform the results of the review. Contribution: This paper demonstrates a practical application of scaffolding and JiTT theory by outlining the process of using a video library to provide valuable instructional resources that support meaningful learning, promote student academic achievement, and improve program flexibility. Findings: A centrally created library is a simple and inexpensive way to provide business analytics course content, augmenting standard content delivery. Assessment of learning scores showed an improvement, and a summary of lessons learned is provided to guide implications. Recommendations for Practitioners: Pedagogical implications of this research include the observation that producing a central library of instructor created videos and assignments can help address knowledge and skills gaps, augment the learning of business analytics content, and provide a valuable educational resource throughout the college of business curriculum. Recommendation for Researchers: This paper examines the use of scaffolding and JiTT theories. Additional examination of these theories may improve the understanding and limits of these concepts as higher education evolves due to the combination of market forces changing the execution of course delivery. Impact on Society: Universities are tasked with providing new and increasing skills to students while controlling the costs. A centrally created library of instructional videos provides a means of delivering meaningful content while controlling costs. Future Research: Future research may examine student success, including the immediate impact of videos and longitudinally using video repositories throughout the curriculum. Studies examining the approach across multiple institutions may help to evaluate the success of video repositories. Faculty acceptance of centrally created video libraries and assignments should be considered for the value of faculty recruiting and use in the classroom. The economic impact on both the university and students should be evaluated. Full Article
sing Objective Assessment in Java Programming Language Using Rubrics By Published On :: 2022-12-12 Aim/Purpose: This paper focuses on designing and implementing the rubric for objective JAVA programming assessments. An unsupervised learning approach was used to group learners based on their performance in the results obtained from the rubric, reflecting their learning ability. Background: Students' learning outcomes have been evaluated subjectively using a rubric for years. Subjective assessments are simple to construct yet inconsistent and biased to evaluate. Objective assessments are stable, reliable, and easy to conduct. However, they usually lack rubrics. Methodology: In this study, a Top-Down assessment approach is followed, i.e., a rubric focused on the learning outcome of the subject is designed, and the proficiency of learners is judged by their performance in conducting the task given. A JAVA rubric is proposed based on the learning outcomes like syntactical, logical, conceptual, and advanced JAVA skills. A JAVA objective quiz (with multiple correct options) is prepared based on the rubric criteria, comprising five questions per criterion. The examination was conducted for 209 students (100 from the MCA course and 109 from B.Tech. course). The suggested rubric was used to compute the results. K-means clustering was applied to the results to classify the students according to their learning preferences and abilities. Contribution: This work contributes to the field of rubric designing by creating an objective programming assessment and analyzing the learners’ performance using machine learning techniques. It also facilitates a reliable feedback approach offering various possibilities in student learning analytics. Findings: The designed rubric, partial scoring, and cluster analysis of the results help us to provide individual feedback and also, group the students based on their learning skills. Like on average, learners are good at remembering the syntax and concepts, mediocre in logical and critical thinking, and need more practice in code optimization and designing applications. Recommendations for Practitioners: The practical implications of this work include rubric designing for objective assessments and building an informative feedback process. Faculty can use this approach as an alternative assessment measure. They are the strong pillars of e-assessments and virtual learning platforms. Recommendation for Researchers: This research presents a novel approach to rubric-based objective assessments. Thus, it provides a fresh perspective to the researchers promising enough opportunities in the current era of digital education. Impact on Society: In order to accomplish the shared objective of reflective learning, the grading rubric and its accompanying analysis can be utilized by both instructors and students. As an instructional assessment tool, the rubric helps instructors to align their pedagogies with the students’ learning levels and assists students in updating their learning paths based on the informative topic-wise scores generated with the help of the rubric. Future Research: The designed rubric in this study can be extended to other programming languages and subjects. Further, an adaptable weighted rubric can be created to execute a flexible and reflective learning process. In addition, outcome-based learning can be achieved by measuring and analyzing student improvements after rubric evaluation. Full Article
sing Categorizing Well-Written Course Learning Outcomes Using Machine Learning By Published On :: 2022-07-07 Aim/Purpose: This paper presents a machine learning approach for analyzing Course Learning Outcomes (CLOs). The aim of this study is to find a model that can check whether a CLO is well written or not. Background: The use of machine learning algorithms has been, since many years, a prominent solution to predict learner performance in Outcome Based Education. However, the CLOs definition is still presenting a big handicap for faculties. There is a lack of supported tools and models that permit to predict whether a CLO is well written or not. Consequently, educators need an expert in quality and education to validate the outcomes of their courses. Methodology: A novel method named CLOCML (Course Learning Outcome Classification using Machine Learning) is proposed in this paper to develop predictive models for CLOs paraphrasing. A new dataset entitled CLOC (Course Learning Outcomes Classes) for that purpose has been collected and then undergone a pre-processing phase. We compared the performance of 4 models for predicting a CLO classification. Those models are Support Vector Machine (SVM), Random Forest, Naive Bayes and XGBoost. Contribution: The application of CLOCML may help faculties to make well-defined CLOs and then correct CLOs' measures in order to improve the quality of education addressed to their students. Findings: The best classification model was SVM. It was able to detect the CLO class with an accuracy of 83%. Recommendations for Practitioners: We would recommend both faculties’ members and quality reviewers to make an informed decision about the nature of a given course outcome. Recommendation for Researchers: We would highly endorse that the researchers apply more machine learning models for CLOs of various disciplines and compare between them. We would also recommend that future studies investigate on the importance of the definition of CLOs and its impact on the credibility of Key Performance Indicators (KPIs) values during accreditation process. Impact on Society: The findings of this study confirm the results of several other researchers who use machine learning in outcome-based education. The definition of right CLOs will help the student to get an idea about the performances that will be measured at the end of a course. Moreover, each faculty can take appropriate actions and suggest suitable recommendations after right performance measures in order to improve the quality of his course. Future Research: Future research can be improved by using a larger dataset. It could also be improved with deep learning models to reach more accurate results. Indeed, a strategy for checking CLOs overlaps could be integrated. Full Article
sing Using Design-Based Research to Layer Career-Like Experiences onto Software Development Courses By Published On :: 2022-06-20 Aim/Purpose: This research aims to describe layering of career-like experiences over existing curriculum to improve perceived educational value. Background: Feedback from students and regional businesses showed a clear need to increase student’s exposure to career-like software development projects. The initial goal was to develop an instructor-optional project that could be used in a single mid-level programming course; however, the pilot quickly morphed into a multi-year study examining the feasibility of agile projects in a variety of settings. Methodology: Over the course of four years, an agile project was honed through repeated Design Based Research (DBR) cycles of design, implementation, testing, communication, and reflective analysis. As is common with DBR, this study did not follow single methodology design; instead, analysis of data coupled with review of literature led to exploration and testing of a variety of methodologies. The review phase of each cycle included examination of best practices and methodologies as determined by analysis of oral and written comments, weekly journals, instructor feedback, and surveys. As a result of participant feedback, the original project was expanded to a second project, which was tested in another Software Engineering (SE) course. The project included review and testing of many academic and professional methodologies, such as Student Ownership of Learning, Flipped Classroom, active learning, waterfall, agile, Scrum, and Kanban. The study was homogenous and quasi-experimental as the population consisted solely of software engineering majors taking required courses; as based on validity of homogenous studies, class sizes were small, ranging from 8 to 20 students. Close interactions between respondents and the instructor provided interview-like settings and immersive data capture in a natural environment. Further, the iterative development practices of DBR cycles, along with the inclusion of participants as active and valued stakeholders, was seen to align well with software development practitioner practices broadly known as agile. Contribution: This study is among the first to examine layering a career-like software development project on top of a course through alteration of traditional delivery, agile development, and without supplanting existing material. Findings: In response to industry recommendations for additional career-like experiences, a standalone agile capstone-like project was designed that could be layered over an existing course. Pilot data reflected positive perceptions of the project, although students did not have enough time to develop a working prototype in addition to completing existing course materials. Participant feedback led to simultaneous development of a second, similar project. DBR examination of both projects resulted in a simplified design and the ability to develop a working prototype, if and only if the instructor was willing to make adjustments to delivery. After four years, a solution was developed that is both stable and flexible. The solution met the original charge in that it required course delivery, not course material, to be adjusted. It is critical to note that when a working prototype is desired, a portion of the lecture should be flipped allowing more time for guided instruction through project-focused active learning and study group requirements. The results support agile for standalone software development projects, as long as passive delivery methods are correspondingly reduced. Recommendations for Practitioners: Based on the findings, implementation of a career-like software development project can be well received as long as active learning components are also developed. Multiple cycles of DBR are recommended if future researchers wish to customize instructional delivery and develop complex software development projects. Programming instructors are recommended to explore hybrid delivery to support development of agile career-like experiences. Small class sizes allowed the researchers to maintain an interview-like setting throughout the study and future studies with larger classes are recommended to include additional subject matter experts such as graduate students as interaction with a subject matter expert was highly valued by students. Recommendation for Researchers: Researchers are recommended to further examine career-like software development experiences that combine active learning with agile methods; more studies following agile and active learning are needed to address the challenges faced when complex software development is taught in academic settings. Further testing of standalone agile project development has now occurred in medium sized in person classes, online classes, independent studies, and creative works research settings; however, further research is needed. Future research should also examine the implementation of agile projects in larger class sizes. Increasing class size should be coupled with additional subject matter experts such as graduate students. Impact on Society: This study addresses professional recommendations for development of agile career-like experiences at the undergraduate level. This study provides empirical evidence of programming projects that can be layered over existing curriculum, with no additional cost to the students. Initial feedback from local businesses and graduates, regarding agile projects with active learning, has been positive. The area business that refused to hire our underprepared SE graduates has now hired several. Future Research: Future research should explore layering agile projects over a broader range of software development courses. Feedback from hiring professionals and former students has been positive. It is also recommended that DBR be used to develop career-like experiences for online programming courses. Full Article
sing Measurement of Doctoral Students’ Intention to Use Online Learning: A SEM Approach Using the TRAM Model By Published On :: 2023-08-22 Aim/Purpose: The study aims to supplement existing knowledge of information systems by presenting empirical data on the factors influencing the intentions of doctoral students to learn through online platforms. Background: E-learning platforms have become popular among students and professionals over the past decade. However, the intentions of the doctoral students are not yet known. They are an important source of knowledge production in academics by way of teaching and research. Methodology: The researchers collected data from universities in the Delhi National Capital Region (NCR) using a survey method from doctoral students using a convenience sampling method. The model studied was the Technology Readiness and Acceptance Model (TRAM), an integration of the Technology Readiness Index (TRI) and Technology Acceptance Model (TAM). Contribution: TRAM provides empirical evidence that it positively predicts behavioral intentions to learn from online platforms. Hence, the study validated the model among doctoral students from the perspective of a developing nation. Findings: The model variables predicted 49% of the variance in doctoral students’ intent. The TRAM model identified motivating constructs such as optimism and innovativeness as influencing TAM predictors. Finally, doctoral students have positive opinions about the usefulness and ease of use of online learning platforms. Recommendations for Practitioners: Academic leaders motivate scholars to use online platforms, and application developers to incorporate features that facilitate ease of use. Recommendation for Researchers: Researchers can explore the applicability of TRAM in other developing countries and examine the role of cultural and social factors in the intent to adopt online learning. Future Research: The influence of demographic variables on intentions can lead to additional insights. Full Article
sing Unveiling Learner Emotions: Sentiment Analysis of Moodle-Based Online Assessments Using Machine Learning By Published On :: 2023-07-24 Aim/Purpose: The study focused on learner sentiments and experiences after using the Moodle assessment module and trained a machine learning classifier for future sentiment predictions. Background: Learner assessment is one of the standard methods instructors use to measure students’ performance and ascertain successful teaching objectives. In pedagogical design, assessment planning is vital in lesson content planning to the extent that curriculum designers and instructors primarily think like assessors. Assessment aids students in redefining their understanding of a subject and serves as the basis for more profound research in that particular subject. Positive results from an evaluation also motivate learners and provide employment directions to the students. Assessment results guide not just the students but also the instructor. Methodology: A modified methodology was used for carrying out the study. The revised methodology is divided into two major parts: the text-processing phase and the classification model phase. The text-processing phase consists of stages including cleaning, tokenization, and stop words removal, while the classification model phase consists of dataset training using a sentiment analyser, a polarity classification model and a prediction validation model. The text-processing phase of the referenced methodology did not utilise tokenization and stop words. In addition, the classification model did not include a sentiment analyser. Contribution: The reviewed literature reveals two major omissions: sentiment responses on using the Moodle for online assessment, particularly in developing countries with unstable internet connectivity, have not been investigated, and variations of the k-fold cross-validation technique in detecting overfitting and developing a reliable classifier have been largely neglected. In this study we built a Sentiment Analyser for Learner Emotion Management using the Moodle for assessment with data collected from a Ghanaian tertiary institution and developed a classification model for future sentiment predictions by evaluating the 10-fold and the 5-fold techniques on prediction accuracy. Findings: After training and testing, the RF algorithm emerged as the best classifier using the 5-fold cross-validation technique with an accuracy of 64.9%. Recommendations for Practitioners: Instead of a closed-ended questionnaire for learner feedback assessment, the open-ended mechanism should be utilised since learners can freely express their emotions devoid of restrictions. Recommendation for Researchers: Feature selection for sentiment analysis does not always improve the overall accuracy for the classification model. The traditional machine learning algorithms should always be compared to either the ensemble or the deep learning algorithms Impact on Society: Understanding learners’ emotions without restriction is important in the educational process. The pedagogical implementation of lessons and assessment should focus on machine learning integration Future Research: To compare ensemble and deep learning algorithms Full Article