hi Former B.C. premier John Horgan dies aged 65, after third bout of cancer - National Post By news.google.com Published On :: Tue, 12 Nov 2024 21:00:00 GMT Former B.C. premier John Horgan dies aged 65, after third bout of cancer National PostAdam Pankratz: John Horgan wasn't your typical NDP premier National PostJohn Horgan: Reluctant leader became B.C.'s most-loved premier Vancouver SunPremier’s statement on the passing of John Horgan BC Gov NewsUBC political scientist remembers former B.C. premier John Horgan’s legacy CBC.ca Full Article
hi Online Journal of Nursing Informatics Archive By ojni.org Published On :: Online journal dedicated to nursing informatics Full Article
hi Cela "a détruit ma vie": Ghislaine Maxwell aurait aimé "ne jamais rencontrer Epstein" By www.rtl.be Published On :: Mon, 23 Jan 2023 21:32:07 +0100 Ghislaine Maxwell, condamnée en juin à vingt ans de prison pour trafic sexuel de mineures, a affirmé dans une interview diffusée lundi qu'elle aurait aimé "ne jamais avoir rencontré" Jeffrey Epstein, dont elle se dit convaincue "qu'il a été assassiné".L'ex-mondaine britannique a été condamnée en juin à New York pour trafic sexuel de mineures pour le compte du financier américain décédé, accusé d'exploitation sexuelle de dizaines de mineures. "J'aimerais honnêtement ne l'avoir jamais rencontré", a-t-elle affirmé à propos de son ancien compagnon, dans l'entretien accordé depuis sa prison aux Etats-Unis à la chaîne britannique TalkTV. "Clairement (...) le fait que je travaille avec lui et que je passe du temps avec lui et que je le connaisse a détruit ma vie et blessé énormément de gens qui me sont chers et que j'aime", a-t-elle affirmé. Elle a souligné qu'elle ne "savait pas" qu'Epstein était "aussi horrible" même si "évidemment maintenant, quand on regarde en arrière, bien sûr que oui".Le financier américain, accusé d'avoir, entre 2002 et 2005 au moins, fait venir des mineures dans ses résidences "pour se livrer à des actes sexuels avec lui", a été retrouvé pendu dans sa cellule le 10 août 2019. Si l'autopsie confirme un suicide par pendaison, Mme Maxwell se dit elle convaincue "qu'il a été assassiné".Déjà dimanche, des extraits de l'interview avaient été publiés et Mme Maxwell y prenait la défense du prince Andrew, affirmant qu'une photo montrant le frère du roi Charles III avec une jeune fille qui l'a ensuite accusé d'agressions sexuelles était "un faux". L'Américaine Virginia Giuffre, aujourd'hui âgée de 39 ans, accuse le prince de l'avoir agressée sexuellement à trois reprises en 2001, quand elle avait 17 ans. Elle a affirmé l'avoir rencontré par l'entremise d'Epstein.Andrew, ami de Ghislaine Maxwell et Jeffrey Epstein, a scellé avec elle en février 2022 un accord à l'amiable, en payant des millions de dollars, ce qui lui a permis d'éviter un procès au civil à New York, qui aurait été extrêmement embarrassant pour la famille royale britannique.Le prince de 62 ans, tombé en disgrâce après ces accusations, a toutefois toujours contesté les accusations. Selon des journaux britanniques, il étudie désormais les options légales pour tenter d'annuler l'accord avec Virginia Giuffre. Full Article
hi Insurrection à Washington - Assaut du Capitole: culpabilité pour l'homme photographié dans le bureau de Nancy Pelosi By www.rtl.be Published On :: Mon, 23 Jan 2023 22:15:02 +0100 (Belga) Un Américain, qui avait été immortalisé les pieds sur une table dans le bureau de la cheffe démocrate Nancy Pelosi lors de l'assaut sur le Capitole, a été reconnu coupable lundi de plusieurs délits.Après une courte délibération, les jurés ont déclaré Richard Barnett, 62 ans, coupable, entre autres, d'entrave à une procédure officielle, vol et intrusion dans un bâtiment officiel avec une arme dangereuse (un bâton de marche capable d'envoyer des décharges électriques). Le 6 janvier 2021, il avait envahi, comme des centaines de partisans de l'ex-président républicain Donald Trump, le siège du Congrès au moment où les élus certifiaient la victoire du démocrate Joe Biden à la présidentielle. Il avait été photographié par l'AFP dans le bureau de la cheffe de la chambre des représentants, Nancy Pelosi, les pieds sur un meuble. Le cliché avait fait le tour du monde et permis à la police de l'interpeller rapidement. Selon le dossier d'accusation, ce partisan de la mouvance complotiste Qanon avait laissé un message insultant à la démocrate et volé une enveloppe qu'elle avait signée. Pendant son procès, il s'était montré défiant, assurant avoir été "poussé à l'intérieur" du Capitole par la foule. Sa peine sera prononcée en mai. En attendant, il reste assigné à résidence avec un bracelet électronique. En deux ans d'enquête, plus de 950 participants à cette attaque ont été arrêtés, et près de 200 condamnés à des peines de prison. (Belga) Full Article
hi La reine Mathilde et la princesse Élisabeth en voyage en Égypte du 14 au 16 mars By www.rtl.be Published On :: Mon, 23 Jan 2023 23:58:40 +0100 (Belga) La reine Mathilde et la princesse Élisabeth effectueront une visite de travail en Égypte du 14 au 16 mars, a indiqué le Palais royal dans un communiqué lundi soir."Cette visite marquera l'intérêt historique de la famille royale pour l'Égypte antique et rendra hommage à la reine Élisabeth, dont l'intérêt et la passion sont à l'origine de l'épanouissement de l'égyptologie en Belgique. La Reine et la Princesse visiteront plusieurs sites que la reine Élisabeth a elle-même visités lors de ses voyages en Égypte, notamment le tombeau de Toutankhamon. Au Caire, elles assisteront également au vernissage d'une exposition consacrée à la reine Élisabeth et à l'égyptologie belge", peut-on lire dans le communiqué. La Reine et la Princesse visiteront aussi différents sites archéologiques à Louxor et ses environs, où des institutions et des universités belges effectuent des fouilles. Cette visite de travail commémore par ailleurs plusieurs anniversaires célébrés en 2022 et 2023: le 200e anniversaire du déchiffrement des hiéroglyphes par Jean-François Champollion, les centenaires de la découverte du tombeau de Toutankhamon et de sa visite par la reine Élisabeth, le 125e anniversaire de l'émergence de l'égyptologie belge et le 75e anniversaire de la mort de l'égyptologue belge Jean Capart. (Belga) Full Article
hi Insurrection à Washington - Assaut du Capitole: des membres de la milice Oath Keepers reconnus coupables de "sédition" By www.rtl.be Published On :: Tue, 24 Jan 2023 01:10:46 +0100 (Belga) Quatre membres de la milice d'extrême droite "Oath Keepers" ont été reconnus coupables lundi de sédition pour leur rôle dans l'assaut du Capitole, à l'issue du second procès organisé sur ce chef d'accusation extrêmement rare.Depuis l'attaque du 6 janvier 2021, plus de 950 partisans de l'ex-président républicain Donald Trump ont été arrêtés et inculpés pour avoir semé le chaos dans le siège de la démocratie américaine. Parmi eux, seuls 14 militants de groupuscules d'extrême droite - neuf membres des "Oath Keepers" et cinq "Proud Boys" - ont été accusés de "sédition", un chef passible de 20 ans de prison qui implique d'avoir planifié l'usage de la force pour s'opposer au gouvernement. Faute de place suffisante dans le tribunal fédéral de Washington, la justice a organisé le procès des Oath Keepers, accusés de s'être entraînés et armés pour l'occasion, en deux temps. Un premier procès s'est conclu fin novembre par un verdict mitigé: le fondateur de cette milice, Stewart Rhodes, et un responsable local ont été déclarés coupables de sédition, mais leurs trois co-accusés ont été acquittés sur ce chef. Lundi, à l'issue du second procès, les jurés ont jugé coupables les quatre derniers Oath Keepers, des hommes âgés de 38 à 64 ans décrits comme de dangereux "traîtres" par l'accusation, mais comme des "fanfarons" par leurs avocats. Le procès des Proud Boys, dont leur leader Enrique Tarrio, s'est ouvert en décembre et était toujours en cours lundi, dans le même tribunal. (Belga) Full Article
hi Big Brother is Watching But He Doesn’t Understand: Why Forced Filtering Technology on the Internet Isn’t the Solution to the Modern Copyright Dilemma By script-ed.org Published On :: Fri, 17 Aug 2018 13:48:38 +0000 by Mitchell Longan[1] Introduction The European Parliament is currently considering a proposal to address problems of piracy and other forms of copyright infringement associated with the digital world.[2] Article 13 of the proposed Directive on Copyright in the Digital Single Full Article Blog
hi Selon Le Canard enchaᅵnᅵ, le gouvernement Castex est le plus coᅵteux de l'histoire de la Ve Rᅵpublique (185 millions d'euros par an) By www.politique.net Published On :: Tue, 06 Apr 2021 19:45:04 GMT L'information est passᅵe inaperᅵue mais elle ne manque pas de sel. Alors que la gestion de la crise du covid-19 par le gouvernement est trᅵs contestᅵe (au retard dans la livraison de masques s'ajoute... Full Article
hi Studentsâ Perceptions of Using Massive Open Online Courses (MOOCs) in Higher Learning Institutions By ijedict.dec.uwi.edu Published On :: Sat, 31 Aug 2024 09:44:41 -0400 Full Article Refereed Articles
hi Feature-aware task offloading and scheduling mechanism in vehicle edge computing environment By www.inderscience.com Published On :: 2024-10-07T23:20:50-05:00 With the rapid development and application of driverless technology, the number and location of vehicles, the channel and bandwidth of wireless network are time-varying, which leads to the increase of offloading delay and energy consumption of existing algorithms. To solve this problem, the vehicle terminal task offloading decision problem is modelled as a Markov decision process, and a task offloading algorithm based on DDQN is proposed. In order to guide agents to quickly select optimal strategies, this paper proposes an offloading mechanism based on task feature. In order to solve the problem that the processing delay of some edge server tasks exceeds the upper limit of their delay, a task scheduling mechanism based on buffer delay is proposed. Simulation results show that the proposed method has greater performance advantages in reducing delay and energy consumption compared with existing algorithms. Full Article
hi Risk-based operation of plug-in electric vehicles in a microgrid using downside risk constraints method By www.inderscience.com Published On :: 2024-10-07T23:20:50-05:00 To achieve the benefits as much as possible, it is required to identify the available PEV capacity and prepare scheduling plans based on that. The analysis revealed that the risk-based scheduling of the microgrid could reduce the financial risk completely from $9.89 to $0.00 and increases the expected operation cost by 24% from $91.38 to $112.94, in turn. This implies that the risk-averse decision-maker tends to spend more money to reduce the expected risk-in-cost by using the proposed downside risk management technique. At the end, by the help of fuzzy satisfying method, the suitable risk-averse strategy is determined for the studied case. Full Article
hi Research on multi-objective optimisation for shared bicycle dispatching By www.inderscience.com Published On :: 2024-10-07T23:20:50-05:00 The problem of dispatching is key to management of shared bicycles. Considering the number of borrowing and returning events during the dispatching period, optimisation plans of shared bicycles dispatching are studied in this paper. Firstly, the dispatching model of shared bicycles is built, which regards the dispatching cost and lost demand as optimised objectives. Secondly, the solution algorithm is designed based on non-dominated Genetic Algorithm. Finally, a case is given to illustrate the application of the method. The research results show that the method proposed in the paper can get optimised dispatching plans, and the model considering borrowing and returning during dispatching period has better effects with a 39.3% decrease in lost demand. Full Article
hi International Journal of Vehicle Information and Communication Systems By www.inderscience.com Published On :: Full Article
hi Machine learning and deep learning techniques for detecting and mitigating cyber threats in IoT-enabled smart grids: a comprehensive review By www.inderscience.com Published On :: 2024-09-26T23:20:50-05:00 The confluence of the internet of things (IoT) with smart grids has ushered in a paradigm shift in energy management, promising unparalleled efficiency, economic robustness and unwavering reliability. However, this integrative evolution has concurrently amplified the grid's susceptibility to cyber intrusions, casting shadows on its foundational security and structural integrity. Machine learning (ML) and deep learning (DL) emerge as beacons in this landscape, offering robust methodologies to navigate the intricate cybersecurity labyrinth of IoT-infused smart grids. While ML excels at sifting through voluminous data to identify and classify looming threats, DL delves deeper, crafting sophisticated models equipped to counteract avant-garde cyber offensives. Both of these techniques are united in their objective of leveraging intricate data patterns to provide real-time, actionable security intelligence. Yet, despite the revolutionary potential of ML and DL, the battle against the ceaselessly morphing cyber threat landscape is relentless. The pursuit of an impervious smart grid continues to be a collective odyssey. In this review, we embark on a scholarly exploration of ML and DL's indispensable contributions to enhancing cybersecurity in IoT-centric smart grids. We meticulously dissect predominant cyber threats, critically assess extant security paradigms, and spotlight research frontiers yearning for deeper inquiry and innovation. Full Article
hi Undertaking a bibliometric analysis to investigate the framework and dynamics of slow fashion in the context of sustainability By www.inderscience.com Published On :: 2024-09-05T23:20:50-05:00 The current study has outlined slow fashion (SF) research trends and created a future research agenda for this field. It is a thorough analysis of the literature on slow fashion. Numerous bibliometric features of slow fashion have been discussed in the paper. This study comprises 182 research articles from the Scopus database. The database was utilised for bibliometric analysis. To identify certain trends in the area of slow fashion, a bibliometric study is done. For bibliometric analysis, the study employed R-software (the Biblioshiny package). Here, VOSviewer software is used to determine the co-occurrence of authors, countries, sources, etc. The study has outlined the gap that still exists in the field of slow fashion. Here, the research outcome strengthens the domain of slow fashion for sustainable consumption. The study findings will be useful for policymakers, industry professionals, and researchers. Full Article
hi Does brand association, brand attachment, and brand identification mediate the relationship between consumers' willingness to pay premium prices and social media marketing efforts? By www.inderscience.com Published On :: 2024-10-02T23:20:50-05:00 This study investigates the effects of social media marketing efforts (SMME) on smartphone brand identification, attachment, association, and willingness to pay premium prices. A survey of 320 smartphone users who followed official social media handles managed by smartphone companies was conducted for this purpose. PLS-SEM was used to analyse the collected data. The findings demonstrated importance of SMME dimensions. According to the study's findings, the smartphone brand's SMMEs had significant impact on brand identification, brand association, and brand attachment. The results revealed that SMMEs had significant impact on willingness to pay the premium price. The findings also show that brand identification, attachment, and association mediated the relationship between SMMEs and willingness to pay a premium price. The findings of this study will be useful in developing social media marketing strategies for smartphones. This study demonstrates the use of social media marketing to promote mobile phones, particularly in emerging markets. Full Article
hi Enhanced TCP BBR performance in wireless mesh networks (WMNs) and next-generation high-speed 5G networks By www.inderscience.com Published On :: 2024-07-01T23:20:50-05:00 TCP BBR is one of the most powerful congestion control algorithms. In this article, we provide a comprehensive review of BBR analysis, expanding on existing knowledge across various fronts. Utilising ns3 simulations, we evaluate BBR's performance under diverse conditions, generating graphical representations. Our findings reveal flaws in the probe's RTT phase duration estimation and unequal bandwidth sharing between BBR and CUBIC protocols. Specifically, we demonstrated that the probe's RTT phase duration estimation algorithm is flawed and that BBR and CUBIC generally do not share bandwidth equally. Towards the end of the article, we propose a new improved version of TCP BBR which minimises these problems of inequity in bandwidth sharing and corrects the inaccuracies of the two key parameters RTprop and cwnd. Consequently, the BBR' protocol maintains very good fairness with the Cubic protocol, with an index that is almost equal to 0.98, and an equity index over 0.95. Full Article
hi A constant temperature control system for indoor environments in buildings using internet of things By www.inderscience.com Published On :: 2024-07-01T23:20:50-05:00 The performance of a building's internal environment, which includes the air temperature, lighting and acoustics, is what determines the quality of the environment inside the building. We present a thermal model for achieving thermal comfort in buildings that makes use of a multimodal analytic framework as a solution to this challenge. In this study, a multimodal combination is used to evaluate several temperature and humidity sensors as well as an area image. Additionally, a CNN and LSTM combination is used to process the image and sensor data. The results show that heating setback and interior set point temperatures, as well as mechanical ventilation based on real people's presence and CO<SUB align=right>2 levels, are all consistently reduced when ICT-driven intelligent solutions are used. The CNN-LSTM model has a goodness of fit that is 0.7258 on average, which is much higher than both the CNN (0.5291) and LSTM (0.5949) models. Full Article
hi Emotion recognition method for multimedia teaching classroom based on convolutional neural network By www.inderscience.com Published On :: 2024-10-07T23:20:50-05:00 In order to further improve the teaching quality of multimedia teaching in school daily teaching, a classroom facial expression emotion recognition model is proposed based on convolutional neural network. VGGNet and CliqueNet are used as the basic expression emotion recognition methods, and the two recognition models are fused while the attention module CBAM is added. Simulation results show that the designed classroom face expression emotion recognition model based on V-CNet has high recognition accuracy, and the recognition accuracy on the test set reaches 93.11%, which can be applied to actual teaching scenarios and improve the quality of classroom teaching. Full Article
hi An empirical study on construction emergency disaster management and risk assessment in shield tunnel construction project with big data analysis By www.inderscience.com Published On :: 2024-07-02T23:20:50-05:00 Emergency disaster management presents substantial risks and obstacles to shield tunnel building projects, particularly in the event of water leakage accidents. Contemporary water leak detection is critical for guaranteeing safety by reducing the likelihood of disasters and the severity of any resulting damages. However, it can be difficult. Deep learning models can analyse images taken inside the tunnel to look for signs of water damage. This study introduces a unique strategy that employs deep learning techniques, generative adversarial networks (GAN) with long short-term memory (LSTM) for water leakage detection i shield tunnel construction (WLD-STC) to conduct classification and prediction tasks on the massive image dataset. The results demonstrate that for identifying and analysing water leakage episodes during shield tunnel construction, the WLD-STC strategy using LSTM-based GAN networks outperformed other methods, particularly on huge data. Full Article
hi Natural language processing-based machine learning psychological emotion analysis method By www.inderscience.com Published On :: 2024-07-02T23:20:50-05:00 To achieve psychological and emotional analysis of massive internet chats, researchers have used statistical methods, machine learning, and neural networks to analyse the dynamic tendencies of texts dynamically. For long readers, the author first compares and explores the differences between the two psychoanalysis algorithms based on the emotion dictionary and machine learning for simple sentences, then studies the expansion algorithm of the emotion dictionary, and finally proposes an extended text psychoanalysis algorithm based on conditional random field. According to the experimental results, the mental dictionary's accuracy, recall, and F-score based on the cognitive understanding of each additional ten words were calculated. The optimisation decreased, and the memory and F-score improved. An <i>F</i>-value greater than 1, which is the most effective indicator for evaluating the effectiveness of a mental analysis problem, can better demonstrate that the algorithm is adaptive in the literature dictionary. It has been proven that this scheme can achieve good results in analysing emotional tendencies and has higher efficiency than ordinary weight-based psychological sentiment analysis algorithms. Full Article
hi Digital architectural decoration design and production based on computer image By www.inderscience.com Published On :: 2024-07-02T23:20:50-05:00 The application of computer image digitisation has realised the transformation of people's production and lifestyle, and also promoted the development of the construction industry. This article aims to realise the research on architectural decoration design and production under computer network environment and promote the ecological development of indoor and outdoor design in the construction industry. This article proposes to use virtual reality technology in image digitisation to guide architectural decoration design research. In the comparative analysis of the weight of architectural decoration elements, among the calculated weights of secondary elements, the spatial function has the largest weight, which is 0.2155, and the landscape has the smallest weight, which is 0.0113. Among the three-level unit weights, the service area has the largest weight, which is 0.0976, and the fence frame has the smallest weight, which is 0.0119. Full Article
hi Fostering innovative work behaviour in Indian IT firms: the mediating influence of employee psychological capital in the context of transformational leadership By www.inderscience.com Published On :: 2024-10-07T23:20:50-05:00 This empirical study investigates the mediating role of two components of psychological capital (PsyCap), namely self-efficacy and optimism, in the context of the relationship between transformational leadership (TL), work engagement (WE), and innovative work behaviour (IWB). The study was conducted among IT professionals with a minimum of three years of experience employed in Chennai, India. Data collection was executed using a Google Form, and both measurement and structural models were examined using SPSS 25.0 and AMOS 23.0. The findings of this study reveal several significant relationships. Firstly, transformational leadership (TL) demonstrates a robust positive association with work engagement (WE). Furthermore, work engagement (WE) positively correlates substantially with innovative work behaviour (IWB). Notably, the study underscores that two crucial components of psychological capital, specifically self-efficacy and optimism, mediate the relationship between transformational leadership (TL) and work engagement (WE). These findings carry valuable implications for IT company managers. Recognising that transformational leadership positively influences both work engagement and employees' innovative work behaviour highlights the pivotal role of leaders in fostering a productive and innovative work environment within IT organisations. Full Article
hi Ebullient supervision, employee engagement and employee commitment in a higher education institution: the partial least square approach By www.inderscience.com Published On :: 2024-10-07T23:20:50-05:00 The study investigated the influence of ebullient supervision on employee commitment in a Ghanaian public university through the mediating role of employee engagement. The simple random sampling technique was used to draw 302 administrative staff of the university to respond to the self-administered questionnaire on the constructs. Furthermore, the partial least square structural equation technique was deployed to test the research hypotheses in the study. The results showed that ebullient supervision had a significant positive relationship with employee commitment and employee engagement. The findings further revealed that employee engagement positively correlated with employee commitment. Finally, the study's findings established that employee engagement partially mediated the link between ebullient supervision and employee commitment. The study emphasised that various supervisors in a university's administration should create an environment that favours fun where subordinates can form ties with one another. Full Article
hi The relationship between 'creative slack' as an intangible asset and the innovative capabilities of the firm By www.inderscience.com Published On :: 2024-09-02T23:20:50-05:00 The notion of creative slack purposefully refers to the notion of organisational slack proposed by Penrose (1959), who suggested that managers in organisations always have some stock of unused resources that inevitably accumulate when developing projects and are the primary factors determining the growth and innovation of the firm. In this contribution, we aim at adding a new dimension to the notion of organisational slack. Our view is that in many innovative organisations the slack of unused ideas is essentially a creative one, which is accumulated in diverse communities through multiple projects. This creative slack is a key intangible asset and a source of knowledge creation and innovation. To explain how organisations may benefit from exploiting the creative slack accumulated by communities, we rely on the analysis of two case studies, that of the Hydro-Québec Research Institute (IREQ), and of Ubisoft Montreal. Full Article
hi Researching together in academic engagement in engineering: a study of dual affiliated graduate students in Sweden By www.inderscience.com Published On :: 2024-09-02T23:20:50-05:00 This article explores dual affiliated graduate students that conduct research involving both universities and firms, which we conceptualise as a form of academic engagement, e.g., knowledge networks. We explore what they do during their studies, and their perceptions about their contributions to the firm's capacities for technology and innovation. So far, university-industry interactions in engineering are less researched than other fields, and this qualitative study focuses upon one department of Electrical Engineering in Sweden. First, we define and describe how the partner firms and universities organise this research collaboration as a form of academic engagement. Secondly, we propose a conceptual framework specifying how graduate students act as boundary-spanners between universities and firms. This framework is used for the empirical analysis, when exploring their perceptions of impact. Our results reveal that they primarily engage in problem-solving activities in technology, which augment particularly the early stages of absorptive capacities in firms. Full Article
hi Female academics in higher education institutes and their work-life balance strategies: a voiceless saga By www.inderscience.com Published On :: 2024-10-02T23:20:50-05:00 Work-life balance (WLB) is a widely explored topic in the academic discourse. The researchers are trying to find strategies to effectively balance their work and home responsibilities for women in management. This study aims to analyse how gender roles and inequalities shape the strategies of female academics in higher education institutions. Eighteen faculty members participated in the semi-structured interviews. The trustworthiness of qualitative inquiry was ascertained by using triangulation, thick descriptions, and peer reviews. Three major themes emerged from the analysis: emotional, religious and social strategies. Despite available support, faculty noted challenges in managing work and family roles and fighting with gender stereotypes. This research adds to the emerging concept of WLB literature from the developed countries' viewpoint. It also shows how WLB discourse varies from Western sensibilities and collaborates with the previously established strategies that female academics formulate in WLB. Full Article
hi Algorithm Visualization System for Teaching Spatial Data Algorithms By Published On :: Full Article
hi Studios, Mini-lectures, Project Presentations, Class Blog and Wiki: A New Approach to Teaching Web Technologies By Published On :: Full Article
hi Real World Project: Integrating the Classroom, External Business Partnerships and Professional Organizations By Published On :: Full Article
hi Making Information Systems less Scrugged: Reflecting on the Processes of Change in Teaching and Learning By Published On :: Full Article
hi Open-Source ERP: Is It Ripe for Use in Teaching Supply Chain Management? By Published On :: Full Article
hi A Meta-ethnographic Synthesis of Support Services in Distance Learning Programs By Published On :: Full Article
hi Establishing an Institutional Framework for an E-learning Implementation – Experiences from the University of Rijeka, Croatia By Published On :: Full Article
hi Utilizing BlueJ to Teach Polymorphism in an Advanced Object-Oriented Programming Course By Published On :: Full Article
hi Technology-based Participatory Learning for Indigenous Children in Chiapas Schools, Mexico By Published On :: Full Article
hi Re-purposing Google Maps Visualisation for Teaching Logistics Systems By Published On :: Full Article
hi Incorporating Knowledge of Legal and Ethical Aspects into Computing Curricula of South African Universities By Published On :: Full Article
hi Business Intelligence in College: A Teaching Case with Real Life Puzzles By Published On :: Full Article
hi A Hands-on Approach for Teaching Denial of Service Attacks: A Case Study By Published On :: Full Article
hi A Cross-Case Analysis of the Use of Web-Based ePortfolios in Higher Education By Published On :: Full Article
hi ICT Teachers’ Professional Growth Viewed in terms of Perceptions about Teaching and Competencies By Published On :: Full Article
hi A Database Practicum for Teaching Database Administration and Software Development at Regis University By Published On :: Full Article
hi Using Student e-Portfolios to Facilitate Learning Objective Achievements in an Outcome-Based University By Published On :: Full Article
hi Developing Cross-Cultural Awareness in IT: Reflections of Australian and Chinese Students By Published On :: Full Article
hi Advancing Creative Visual Thinking with Constructive Function-based Modelling By Published On :: Full Article