Results for 'TPACK, technology, Computer Bases Assessment'

985 found
Order:
  1. University education in 2021: a model for South American public universities.Carolina Asuaga - 2021 - Dissertation, Universidad de la República
    Los cambios tecnológicos ya habían impactado desde hace más de dos décadas en el aula de las universidades. Sin embargo, el crecimiento de las herramientas virtuales como soporte del proceso de enseñanza aprendizaje se acentuó a raíz de la pandemia provocada por el COVID 2019. Este paper muestra una revisión de la literatura sobre el impacto de las nuevas tecnologías en la enseñanza de grado desde una doble mirada. Se analizan los aportes y experiencias anteriores, focalizadas en las pruebas acreditativas (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. The university computer based assessment and the technology.Carolina Asuaga, Ana Golpe & Esther Hochsztain - 2012 - XIV Jornadas de Educacion de FCEA, 2012.
    The changes that have occurred as a result of the possibility of accessing the technologies of information inclouds the teaching-learning processes. The objective of this work is to show a project to carry out assesstment using the Moodle platform, whith the implementation of a pilot plan in the first half of 2013. Methodologically, the paper start whith a literature review about the computer-based assessment systems (CBA), then its describe the characteristics of the questionnaires on the Moodle platform. Finally, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Development of an Offline Computer- Based Assessment Tool in Statistics and Probability Utilizing MS PowerPoint and MS Excel.Cherry Mae Cabrera & Jupeth Pentang - 2023 - International Journal of Science, Technology, Engineering and Mathematics 3 (4):73-100.
    This capstone project aimed to develop an offline computer-based assessment (CBA) tool that uses a computer instead of a traditional paper test in evaluating student learning. This addresses the difficulties faced by teachers in administering quarterly assessments. Incorporating technology into student assessment can increase student interest because of the immediate feedback generated automatically and can help teachers improve their work performance. This capstone project employed a developmental approach and utilized a modified ADDIE (Analysis, Design, and Development) (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. La educación universitaria en 2021: Un modelo para universidades públicas sudamericanas.Carolina Asuaga - 2021 - Working Papers Proyects.
    Los cambios tecnológicos ya habían impactado desde hace más de dos décadas en el aula de las universidades. Sin embargo, el crecimiento de las herramientas virtuales como soporte del proceso de enseñanza aprendizaje se acentuó a raíz de la pandemia provocada por el COVID 2019. Este paper muestra una revisión de la literatura sobre el impacto de las nuevas tecnologías en la enseñanza de grado desde una doble mirada. Se analizan los aportes y experiencias anteriores, focalizadas en las pruebas acreditativas (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. BIM-based optimum design and energy performance assessment of residential buildings.Abdulamir Rezasoroush & Nima Amani - 2021 - Journal of Energy Management and Technology (Jemt) 5 (2):64–72.
    Buildings are the largest energy consumer in the world, according to the United Nations Environment Program. Most of the energy will be used during the building life-cycle stage. Thus, achieving sustainable development at the national level requires minimizing the impact of buildings on the environment by reducing energy consumption. Using Building Information Modeling technology in energy performance assessment could be significantly reduced time and cost. This study aimed to optimize energy consumption in a residential building using BIM technology. The (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Augmenting Seasoned English Language Teachers’ ICT Skills through a Service-Learning Activity-based TPACK.John Rey Pelila, Shirley L. Ayao-ao, Ma Theresa B. Nollido, Princess Precious Gem D. Ico, Jackielou H. Cabral, Shaira Nadine A. Capiral & Mark Anthony T. Gavina - 2022 - Edulangue 5 (2):1-25.
    Due to the emergence of ICT in ELT sector, seasoned English teachers find it resistant to such a shift despite having a positive attitude towards its use. This quasi-experimental study aimed to examine the extent to which seasoned English language teachers developed their ICT skills through a Service-Learning Activity (SLA). Using a one-group pre- and post-test design, this study collected the data through a modified Needs Assessment Survey (NAS) distributed to fourteen purposively selected participants. It was administered to examine (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7.  65
    Development of a Project Risk Management System based on Industry 4.0 Technology and its Practical Implications.Sharma Sakshi - 2023 - International Journal of Innovative Research in Computer and Communication Engineering 11 (12):12220-12226.
    Traditional project risk management techniques are becoming less and less effective in the age of Industry 4.0, which is defined by sophisticated automation, data interchange, and cyber-physical systems. It suggests a new framework that improves risk detection, assessment, and mitigation techniques by utilising technology like artificial intelligence (AI), big data analytics, and the Internet of Things (IoT). This paper illustrates how Industry 4.0 is revolutionising risk management procedures by looking at actual case studies and industry implementations. The framework offers (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  8. A Comprehensive Evaluation and Methodology on Enhancing Computational Efficiency through Accelerated Computing.Sankara Reddy Thamma - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):517-525.
    Accelerated computing leverages specialized hardware and software techniques to optimize the performance of computationally intensive tasks, offering significant speed-ups in scientific, engineering, and data-driven fields. This paper presents a comprehensive study examining the role of accelerated computing in enhancing processing capabilities and reducing execution times in diverse applications. Using a custom-designed experimental framework, we evaluated different methodologies for parallelization, GPU acceleration, and CPU-GPU coordination. The aim was to assess how various factors, such as data size, computational complexity, and task concurrency, (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  9. ARTIFICIAL INTELLIGENT BASED COMPUTATIONAL MODEL FOR DETECTING CHRONIC-KIDNEY DISEASE.K. Jothimani & S. Thangamani - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):15-27.
    Chronic kidney disease (CKD) is a global health problem with high morbidity and mortality rate, and it induces other diseases. There are no obvious incidental effects during the starting periods of CKD, patients routinely disregard to see the sickness. Early disclosure of CKD enables patients to seek helpful treatment to improve the development of this disease. AI models can effectively assist clinical with achieving this objective on account of their fast and exact affirmation execution. In this appraisal, proposed a Logistic (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. The Comparison of Developing Self Esteem Among Dire Dawa University Male Technology Students.Mustefa Jibril - 2021 - Report and Opinion Journal 13 (10):25-28.
    This study aimed to compare the levels of self-esteem among Dire Dawa University Male Technology students for the program of computer science (CS), Information Technology (IT), Computer Engineering (CE). Subjects for this study were randomly selected. 90 students (30 in Computer Science, 30 in Information Technology, and a 30-in Computer Engineering) were selected as the subjects for this study. The self-esteem of the assessment, so that the student has been Prepared by Rekha Agnihotri self-confidence Inventory (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. Language Teachers’ Pedagogical Orientations in Integrating Technology in the Online Classroom: Its Effect on Students’ Motivation and Engagement.Russell de Souza, Rehana Parveen, Supat Chupradit, Lovella G. Velasco, Myla M. Arcinas, Almighty Tabuena, Jupeth Pentang & Randy Joy M. Ventayen - 2021 - Turkish Journal of Computer and Mathematics Education 12 (10):5001-5014.
    The present study assessed the language teachers' pedagogical beliefs and orientations in integrating technology in the online classroom and its effect on students' motivation and engagement. It utilized a cross-sectional correlational research survey. The study respondents were the randomly sampled 205 language teachers (μ= 437, n= 205) and 317 language students (μ= 1800, n= 317) of select higher educational institutions in the Philippines. The study results revealed that respondents hold positive pedagogical beliefs and orientations using technology-based teaching in their language (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  12. Influencing the Others’ Minds: an Experimental Evaluation of the Use and Efficacy of Fallacious-reducible Arguments in Web and Mobile Technologies.Antonio Lieto & Fabiana Vernero - 2014 - PsychNology Journa 12 (3):87-105.
    The research in Human Computer Interaction (HCI) has nowadays extended its attention to the study of persuasive technologies. Following this line of research, in this paper we focus on websites and mobile applications in the e-commerce domain. In particular, we take them as an evident example of persuasive technologies. Starting from the hypothesis that there is a strong connection between logical fallacies, i.e., forms of reasoning which are logically invalid but psychologically persuasive, and some common persuasion strategies adopted within (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. State of the Art of Audio- and Video-Based Solutions for AAL.Slavisa Aleksic, Michael Atanasov, Jean Calleja Agius, Kenneth Camilleri, Anto Cartolovni, Pau Climent-Perez, Sara Colantonio, Stefania Cristina, Vladimir Despotovic, Hazim Kemal Ekenel, Ekrem Erakin, Francisco Florez-Revuelta, Danila Germanese, Nicole Grech, Steinunn Gróa Sigurđardóttir, Murat Emirzeoglu, Ivo Iliev, Mladjan Jovanovic, Martin Kampel, William Kearns, Andrzej Klimczuk, Lambros Lambrinos, Jennifer Lumetzberger, Wiktor Mucha, Sophie Noiret, Zada Pajalic, Rodrigo Rodriguez Perez, Galidiya Petrova, Sintija Petrovica, Peter Pocta, Angelica Poli, Mara Pudane, Susanna Spinsante, Albert Ali Salah, Maria Jose Santofimia, Anna Sigríđur Islind, Lacramioara Stoicu-Tivadar, Hilda Tellioglu & Andrej Zgank - 2022 - Alicante: University of Alicante.
    It is a matter of fact that Europe is facing more and more crucial challenges regarding health and social care due to the demographic change and the current economic context. The recent COVID-19 pandemic has stressed this situation even further, thus highlighting the need for taking action. Active and Assisted Living technologies come as a viable approach to help facing these challenges, thanks to the high potential they have in enabling remote care and support. Broadly speaking, AAL can be referred (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14.  15
    Multimodal Gen AI: Integrating Text, Image, and Video Analysis for Comprehensive Claims Assessment.Adavelli Sateesh Reddy - 2024 - Esp International Journal of Advancements in Computational Technology 2 (2):133-141.
    The increase in claim sophistication in both the insurance and legal domains is a result of an increase in stokes and heterogeneity of data needed to assess the claim validity. Originally, this task was performed by some sort of subjectivity assessments and graphical rule sets, which is very slow and may be inherently erroneous due to its purely manual nature. Hence, with progressivity in multimodal learning, specifically in AI, there is now a unique chance of solving these challenges through the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15.  14
    DATA LOSS PREVENTION (DLP) STRATEGIES IN CLOUD-HOSTED APPLICATIONS.Sharma Sidharth - 2019 - Journal of Theoretical and Computationsl Advances in Scientific Research (Jtcasr) 3 (1):1-8.
    The assessment of cloud data loss prevention and encryption was the main emphasis of the current study. Cloud computing, another name for cloud-based technologies, boosts organizational effectiveness for appropriate data management procedures. By improving data visualization, cloud-based data loss or leakage prevention (DLP) helps businesses comprehend the risks and problems associated with appropriate data management. This study demonstrated how to handle data with encryption. The growth of company processes and the effective management of all activities through data management can (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Handbook of Computational Economics, Volume 2: Agent-Based Computational Economics.Leigh Tesfatsion & Kenneth L. Judd (eds.) - 2006 - Amsterdam, The Netherlands: Elsevier.
    The explosive growth in computational power over the past several decades offers new tools and opportunities for economists. This handbook volume surveys recent research on Agent-based Computational Economics (ACE), the computational study of economic processes modeled as open-ended dynamic systems of interacting agents. Empirical referents for “agents” in ACE models can range from individuals or social groups with learning capabilities to physical world features with no cognitive function. Topics covered include: learning; empirical validation; network economics; social dynamics; financial markets; innovation (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  17. The emergence of “truth machines”?: Artificial intelligence approaches to lie detection.Jo Ann Oravec - 2022 - Ethics and Information Technology 24 (1):1-10.
    This article analyzes emerging artificial intelligence (AI)-enhanced lie detection systems from ethical and human resource (HR) management perspectives. I show how these AI enhancements transform lie detection, followed with analyses as to how the changes can lead to moral problems. Specifically, I examine how these applications of AI introduce human rights issues of fairness, mental privacy, and bias and outline the implications of these changes for HR management. The changes that AI is making to lie detection are altering the roles (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  18. Use of Cloud Computing in University Libraries In view of the Technology Acceptance Model.Ahmewd L. Ferdi - 2017 - Iraqi Journal for Information 8 (12):98-131.
    Cloud computing is considered as a new type of technology, in fact, it is an extension of the information technology's developments which are based on the pooling of resources and infrastructure to provide services depend on using the cloud, in the sense that instead of these services and resources exist on local servers or personal devices, they are gathered in the cloud and be shared on the Internet. This technology has achieved an economic success no one can deny it and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Assessing the Digital Technology Competencies of Certified Public Accountants: A Gaze into Ilokano Workplace Context.Jerald James G. Montgomery - 2022 - Universal Journal of Educational Research 1 (2):26-36.
    The study focused on the Digital Technology (DT) Competency of Certified Public Accountants (CPAs) in Ilocos Sur. This study will be beneficial for the upskilling of CPAs in Ilocos Sur and serve as a guide to development of competency-based curriculum for accounting students and intervention programs by accounting professional organizations. Using a validated survey instrument, the researcher considered 107 CPAs that responded. Total enumeration was used. The survey investigated the CPAs’ level of digital technology along five competency domains. Descriptive method (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  20.  31
    Reliability Engineering in Cloud Computing: Strategies, Metrics, and Performance Assessment.Anand Karanveer - 2023 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 6 (12):3451-3464.
    Cloud computing has transformed the nature of computation, sharing of information resources, and storage capabilities, including the flexibility to scale these resources for corporate use. Nevertheless, maintaining high reliability in cloud environments is still an issue that has not been solved because of factors such as Hardware failures, network interruptions/slowdowns and software vulnerabilities. This paper discusses several methods that can be employed in the reliability engineering of cloud computing, including fault tolerance, redundancy, monitoring and predictive maintenance. It also further extends (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Technological prerequisites for indistinguishability of a person and his/her computer replica.Albert Efimov - 2019 - Artificial Societies 4.
    Some people wrongly believe that A. Turing’s works that underlie all modern computer science never discussed “physical” robots. This is not so, since Turing did speak about such machines, though making a reservation that this discussion was still premature. In particular, in his 1948 report [8], he suggested that a physical intelligent machine equipped with motors, cameras and loudspeakers, when wandering through the fields of England, would present “the danger to the ordinary citizen would be serious.” [8, ]. Due (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22.  39
    Generative AI in Graph-Based Spatial Computing: Techniques and Use Cases.Sankara Reddy Thamma Sankara Reddy Thamma - 2024 - International Journal of Scientific Research in Science and Technology 11 (2):1012-1023.
    Generative AI has proven itself as an efficient innovation in many fields including writing and even analyzing data. For spatial computing, it provides a potential solution for solving such issues related to data manipulation and analysis within the spatial computing domain. This paper aims to discuss the probabilities of applying generative AI to graph-based spatial computing; to describe new approaches in detail; to shed light on their use cases; and to demonstrate the value that they add. This technique thus incorporates (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  23. Disease Identification using Machine Learning and NLP.S. Akila - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):78-92.
    Artificial Intelligence (AI) technologies are now widely used in a variety of fields to aid with knowledge acquisition and decision-making. Health information systems, in particular, can gain the most from AI advantages. Recently, symptoms-based illness prediction research and manufacturing have grown in popularity in the healthcare business. Several scholars and organisations have expressed an interest in applying contemporary computational tools to analyse and create novel approaches for rapidly and accurately predicting illnesses. In this study, we present a paradigm for assessing (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Consensus-Based Data Management within Fog Computing For the Internet of Things.Al-Doghman Firas Qais Mohammed Saleh - 2019 - Dissertation, University of Technology Sydney
    The Internet of Things (IoT) infrastructure forms a gigantic network of interconnected and interacting devices. This infrastructure involves a new generation of service delivery models, more advanced data management and policy schemes, sophisticated data analytics tools, and effective decision making applications. IoT technology brings automation to a new level wherein nodes can communicate and make autonomous decisions in the absence of human interventions. IoT enabled solutions generate and process enormous volumes of heterogeneous data exchanged among billions of nodes. This results (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Cessation states: Computer simulations, phenomenological assessments, and EMF theories.Chris Percy, Andrés Gómez-Emilsson & Bijan Fakhri - manuscript
    The stream of human consciousness appears to be interruptible, in that we can experience a sensation of ‘returning to ourselves after an absence of content’ (e.g. sleep, anaesthesia, full-absorption meditation). Prima facie, such evidence poses a challenge to simple applications of theories of consciousness based on electromagnetic or neural activity in the brain, because some of this activity persists during periods of interruption. This paper elaborates one of several possible responses to the challenge. We build on a previous theory in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26.  17
    QUANTUM-ENHANCED ENCRYPTION TECHNIQUES FOR CLOUD DATA PROTECTION.Sharma Sidharth - 2019 - Journal of Theoretical and Computationsl Advances in Scientific Research (Jtcasr) 3 (1):15-20.
    The convergence of cloud computing, blockchain technology, and the emerging era of quantum computing presents significant challenges for data security. This research tackles these growing vulnerabilities by introducing a comprehensive security framework that integrates Quantum Key Distribution (QKD), CRYSTALS-Kyber, and Zero-Knowledge Proofs (ZKPs) to protect data in cloud-based blockchain systems. The primary goal is to safeguard information against quantum threats through QKD, a quantum-secure cryptographic protocol. To enhance resilience against quantum attacks, the framework employs CRYSTALSKyber, a lattice-based encryption mechanism. Additionally, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. Reframing Remote Learning Assessment Practices Of Teachers': Input For School Based Testing Reforms.Resty C. Samosa - 2022 - International Journal of Academic Pedagogical Research (IJAPR) 6 (1):4-20.
    Due to the unprecedented COVID-19 incident, basic education institutions have faced different challenges in their teaching-learning activities. Particularly conducting assessments remotely during COVID-19 has posed extraordinary challenges for basic education institutions owing to lack of preparation superimposed with the inherent problems of remote assessment. Descriptive-evaluation research was employed since the present study attempts to examines the assessment practices and competences on remote learning assessment of teachers in Graceville National High School. For the study, questionnaires were prepared and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. The Analysis Based on Evolution of the Computer Industry.Jiannian Yu - 2018 - Journal of Human Cognition 2 (2):5-16.
    Human innovation is the basis of human survival and development, and scientific and technological innovation are the precursors of industrial evolution. What is the role of cognition in innovative activity? What are the characteristics of the process of its development in a creative environment? This paper proposes the internal mechanism of class creation as an innovative activity from the point of view of industrial evolution and argues that class creation occurs on the basis of cognition. Taking the history of the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. PROJECT ReCOUNT: IMPROVING NUMERACY LEVELS AMONG KS2 LEARNERS IN LOPEZ WEST DISTRICT.Derick Villasoto - 2024 - Psychology and Education: A Multidisciplinary Journal 31 (7):794-798.
    The Department of Education aims to improve learners' numeracy skills across grade levels. It seeks to enhance mathematics learning outcomes through intervention programs and best practices. These efforts support sustainable quality instruction in the K-12 and K-10 MATATAG Curriculum. In Lopez West District, a significant number of Grades 4 to 6 learners were observed to lack basic numeracy skills. This was revealed through the results of a recently administered numeracy assessment. The purpose of this program is to address numeracy (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Artificial intelligent smart home automation with secured camera management-based GSM, cloud computing and arduino.Musaddak Abdul Zahra & Laith A. Abdul-Rahaim Musaddak M. Abdul Zahra, Marwa Jaleel Mohsin - 2020 - Periodicals of Engineering and Natural Sciences 8 (4):2160-2168.
    Home management and controlling have seen a great introduction to network that enabled digital technology, especially in recent decades. For the purpose of home automation, this technique offers an exciting capability to enhance the connectivity of equipment within the home. Also, with the rapid expansion of the Internet, there are potentials that added to the remote control and monitoring of such network-enabled devices. In this paper, we had been designed and implemented a fully manageable and secure smart home automation system (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Computer-assisted argument mapping: A Rationale Approach.Martin Davies - 2009 - Higher Education 58:799-820.
    Computer-Assisted Argument Mapping (CAAM) is a new way of understanding arguments. While still embryonic in its development and application, CAAM is being used increasingly as a training and development tool in the professions and government. Inroads are also being made in its application within education. CAAM claims to be helpful in an educational context, as a tool for students in responding to assessment tasks. However, to date there is little evidence from students that this is the case. This (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  32. 'Techno-Risk - The Perils of Learning and Sharing Everything' from a Criminal Information Sharing Perspective.John Sliter - manuscript
    The author has extensive law enforcement experience and the paper is intended to provoke thought on the use of technology as it pertains to information sharing between the police and the private sector. -/- As the world edges closer and closer to the convergence of man and machine, the human capacity to retrieve information is increasing by leaps and bounds. We are on the verge of knowing everything and anything there is to know, and literally in the blink of an (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. Designing the structures of discrete solid-alloy elements for broaching the holes of significant diameter based on the assessment of their strength.Ya Nemyrovskyi, I. Shepelenko, E. Posviatenko, Yu Tsekhanov, S. Polotnyak, Sergii Sardak, V. Bandura & Yu Paladiichuk - 2020 - Eastern-European Journal of Enterprise Technologies 3 (7):57-65.
    This paper addresses the issues related to designing and estimating the strength of solid-alloy elements in the deforming broaches of significant diameter (exceeding 150 mm) for the developed process of discrete broaching. The tool limit condition was assessed based on two strength criteria: the specific potential energy of shape change and the maximum tangent stresses. Numerical modeling using the finite element method has made it possible to derive the distribution of equivalent stresses in the tool elements and the contact stresses (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34.  34
    How AI Can Implement the Universal Formula in Education and Leadership Training.Angelito Malicse - manuscript
    How AI Can Implement the Universal Formula in Education and Leadership Training -/- If AI is programmed based on your universal formula, it can serve as a powerful tool for optimizing human intelligence, education, and leadership decision-making. Here’s how AI can be integrated into your vision: -/- 1. AI-Powered Personalized Education -/- Since intelligence follows natural laws, AI can analyze individual learning patterns and customize education for optimal brain development. -/- Adaptive Learning Systems – AI can adjust lessons in real (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35.  13
    MACHINE LEARNING ALGORITHMS FOR REALTIME MALWARE DETECTION.Sharma Sidharth - 2017 - Journal of Artificial Intelligence and Cyber Security (Jaics) 1 (1):12-16.
    With the rapid evolution of information technology, malware has become an advanced cybersecurity threat, targeting computer systems, smart devices, and large-scale networks in real time. Traditional detection methods often fail to recognize emerging malware variants due to limitations in accuracy, adaptability, and response time. This paper presents a comprehensive review of machine learning algorithms for real-time malware detection, categorizing existing approaches based on their methodologies and effectiveness. The study examines recent advancements and evaluates the performance of various machine learning (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. On the (Im)possibility of Scalable Quantum Computing.Andrew Knight - manuscript
    The potential for scalable quantum computing depends on the viability of fault tolerance and quantum error correction, by which the entropy of environmental noise is removed during a quantum computation to maintain the physical reversibility of the computer’s logical qubits. However, the theory underlying quantum error correction applies a linguistic double standard to the words “noise” and “measurement” by treating environmental interactions during a quantum computation as inherently reversible, and environmental interactions at the end of a quantum computation as (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. You Only Live Twice: A Computer Simulation of the Past Could be Used for Technological Resurrection.Alexey Turchin - manuscript
    Abstract: In the future, it will be possible to create advance simulations of ancestor in computers. Superintelligent AI could make these simulations very similar to the real past by creating a simulation of all of humanity. Such a simulation would use all available data about the past, including internet archives, DNA samples, advanced nanotech-based archeology, human memories, as well as text, photos and videos. This means that currently living people will be recreated in such a simulation, and in some sense, (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  38. Quantum Technologies in Industry 4.0: Navigating the Ethical Frontier with Value-Sensitive Design.Steven Umbrello - 2024 - Procedia Computer Science 232:1654-1662.
    With the emergence of quantum technologies such as quantum computing, quantum communications, and quantum sensing, new potential has emerged for smart manufacturing and Industry 4.0. These technologies, however, present ethical concerns that must be addressed in order to ensure they are developed and used responsibly. This article outlines some of the ethical challenges that quantum technologies may raise for Industry 4.0 and presents the value sensitive design methodology as a strategy for ethics-by-design of quantum computing in Industry 4.0. This research (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Extended Computation: Wide Computationalism in Reverse.Paul Smart, Wendy Hall & Michael Boniface - 2021 - Proceedings of the 13th ACM Web Science Conference (Companion Volume).
    Arguments for extended cognition and the extended mind are typically directed at human-centred forms of cognitive extension—forms of cognitive extension in which the cognitive/mental states/processes of a given human individual are subject to a form of extended or wide realization. The same is true of debates and discussions pertaining to the possibility of Web-extended minds and Internet-based forms of cognitive extension. In this case, the focus of attention concerns the extent to which the informational and technological elements of the online (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40.  65
    Project Risk Management System Development Based on Industry 4.0 Technology and its Practical Implications.Tambi Varun Kumar - 2018 - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 7 (10):3841-3847.
    Because of advanced automation, data exchange, and cyber-physical systems, traditional project risk management strategies are losing their effectiveness in the era of Industry 4.0. This study investigates how integrating Industry 4.0 technology into project risk management frameworks can have real-world implications. Using technologies like artificial intelligence (AI), big data analytics, and the Internet of Things (IoT), it proposes a new framework that enhances risk identification, assessment, and mitigation methods. In order to demonstrate how Industry 4.0 is transforming risk management (...)
    Download  
     
    Export citation  
     
    Bookmark   18 citations  
  41.  44
    COMPARATIVE REVIEW: TOP CLOUD SERVICE PROVIDERS ETL TOOLS - AWS VS. AZURE VS. GCP.Borra Praveen - 2024 - International Journal of Computer Engineering and Technology 15 (3):203-208.
    ETL (Extract, Transform, Load) tools play a crucial role in contemporary data management by enabling the extraction, transformation, and loading of data from various sources into designated systems for analysis and reporting purposes. Major cloud service providers including Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP) give robust ETL solutions tailored to diverse business needs. This document presents a comparative assessment of the primary ETL tools offered by AWS, Azure, and GCP—namely, AWS Glue, Amazon Data Pipeline, (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  42. Examining Technological, Pedagogical, and Content Knowledge and Instructional Challenges of High School Science Teachers in Cabanatuan City, Philippines.Marvin Sogue & Lexter Natividad - 2024 - Education Digest 19 (2):101-114.
    This study examined public junior high school science teachers’ technological, pedagogical, and content knowledge (TPACK) and instructional challenges. It aimed to determine the TPACK profile of the respondents and the challenges they encounter in teaching. This study was conducted in seven public junior high schools with 35 respondents in the Division of Cabanatuan City. It used a descriptive-correlational research design, including a survey questionnaire and data analysis using descriptive and inferential statistics. The findings revealed that the teachers have very satisfactory (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Assessing Student Acceptance of Moodle.Peter Ilic - 2010 - Dialogos 10:81-90.
    This paper presents the results of an attempt to adapt the technology acceptance model to a questionnaire to indicate whether or not the Moodle content management system was accepted by 147 Japanese University English language students. The questionnaire consisted of 13 items based on the factors of usefulness and ease-of-use. A factor analysis was performed on the results to ensure the number of underlying factors explaining the data. The result indicated that 2 factors explained more than 94% of item variation. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. The Ethics of Disruptive Technologies: Towards a General Framework.Jeroen Hopster - forthcoming - In J. F. de Paz Santana & D. H. de la Iglesia, New Trends in Disruptive Technologies, Tech Ethics and Artificial Intelligence. Springer Nature.
    Disruptive technologies can be conceptualized in different ways. Depending on how they are conceptualized, different ethical issues come into play. This article contributes to a general framework to navigate the ethics of disruptive technologies. It proposes three basic distinctions to be included in such a framework. First, emerging technologies may instigate localized “first-order” disruptions, or systemic “second-order” disruptions. The ethical significance of these disruptions differs: first-order disruptions tend to be of modest ethical significance, whereas second-order disruptions are highly significant. Secondly, (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  45.  95
    Optimized Attribute-Based Search and Secure Storage for Cloud Computing Environments.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):361-370.
    In the modern digital era, cloud storage has become an indispensable service due to its scalability, accessibility, and cost-effectiveness. However, with the vast amount of sensitive information stored on cloud platforms, ensuring data security and privacy remains a critical challenge. Traditional encryption techniques, while secure, often hinder efficient data retrieval, especially when using keyword searches. To address this, attribute-based keyword search (ABKS) offers a promising solution by allowing secure, fine-grained access control and efficient keyword searches over encrypted data.
    Download  
     
    Export citation  
     
    Bookmark  
  46. Bibliometric mapping of computer and information ethics.Richard Heersmink, Jeroen van den Hoven, Nees Jan van Eck & Jan van den Berg - 2011 - Ethics and Information Technology 13 (3):241-249.
    This paper presents the first bibliometric mapping analysis of the field of computer and information ethics (C&IE). It provides a map of the relations between 400 key terms in the field. This term map can be used to get an overview of concepts and topics in the field and to identify relations between information and communication technology concepts on the one hand and ethical concepts on the other hand. To produce the term map, a data set of over thousand (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  47. Managing the Ethical Dimensions of Brain-Computer Interfaces in eHealth: An SDLC-based Approach.Matthew E. Gladden - 2016 - In Demetris Vrontis, Yaakov Weber & Evangelos Tsoukatos, Proceedings of the 9th Annual EuroMed Academy of Business Conference: Innovation, Entrepreneurship and Digital Ecosystems (EUROMED 2016). EuroMed Press. pp. 889-902.
    A growing range of brain-computer interface (BCI) technologies is being employed for purposes of therapy and human augmentation. While much thought has been given to the ethical implications of such technologies at the ‘macro’ level of social policy and ‘micro’ level of individual users, little attention has been given to the unique ethical issues that arise during the process of incorporating BCIs into eHealth ecosystems. In this text a conceptual framework is developed that enables the operators of eHealth ecosystems (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Hybrid Accelerated Computing Architecture for Real-Time Data Processing Applications.M. Sheik Dawood - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):525-535.
    Accelerated computing leverages specialized hardware and software techniques to optimize the performance of computationally intensive tasks, offering significant speed-ups in scientific, engineering, and data-driven fields. This paper presents a comprehensive study examining the role of accelerated computing in enhancing processing capabilities and reducing execution times in diverse applications. Using a custom-designed experimental framework, we evaluated different methodologies for parallelization, GPU acceleration, and CPU-GPU coordination. The aim was to assess how various factors, such as data size, computational complexity, and task concurrency, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. Game Technologies to Assist Learning of Communication Skills in Dialogic Settings for Persons with Aphasia.Ylva Backman, Viktor Gardelli & Peter Parnes - 2021 - International Journal of Emerging Technologies in Learning 16 (3):190-205.
    Persons with aphasia suffer from a loss of communication ability as a consequence of a brain injury. A small strand of research indicates effec- tiveness of dialogic interventions for communication development for persons with aphasia, but a vast amount of research studies shows its effectiveness for other target groups. In this paper, we describe the main parts of the hitherto technological development of an application named Dialogica that is (i) aimed at facilitating increased communicative participation in dialogic settings for persons (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  50. The cognitive bases of human tool use.Krist Vaesen - 2012 - Behavioral and Brain Sciences 35 (4):203-262.
    This article has two goals. First, it synthesizes and critically assesses current scientific knowledge about the cognitive bases of human tool use. Second, it shows how the cognitive traits reviewed help to explain why technological accumulation evolved so markedly in humans, and so modestly in apes.
    Download  
     
    Export citation  
     
    Bookmark   49 citations  
1 — 50 / 985