Browse Items (1422 total)
Sort by:
-
Crowdsourcing in Higher Education: Theory and Best Practices
The widespread use of crowdsourcing strategies in higher education institutions improves the performance of students by using collective initiatives to enhance the skills of each student, efficiently optimizes the lecturing process by exchanging and pooling research materials, and also improves the financial situation of alumni by encouraging crowdfunding of tuition. We identify four main areas in this study where the use of crowdsourcing strategies plays an important role in the success of alumni in institutions of higher education. The proposed crowd teaching approach optimizes lecturing, allowing lecture notes to be shared and exchanged according to the various curricula of Higher Education Studies. With crowd learning, students learn by execution on collaborative projects in which different students share (effectively) teaching each other under the guidance of the lecturer, learn the necessary skills to achieve the projects goals and solve the proposed issue. In relation to accessing funding, the tuition fees of students can be financed by crowdsourcing approaches through crowd tuition and even crowdfunding can be used to procure laboratory and classroom content or the learning stays of students abroad. Using this crowdsourcing tool, students can find assistance in paying university taxes and also have an interest in further learning with other students. The application of crowdsourcing to education allows for optimization of the institutions budget and a more effective use of learning time, leading eventually to better outcomes for students. 2021, The Author(s), under exclusive license to Springer Nature Switzerland AG. -
Crux role of neurocomputing in teaching learning pedagogy
The advent of brain-based learning in the early 1990s has limelighted the syndication between the educational learning process and neurosciences. Through educational learning ability, an individual can gather and assimilate anecdotes or come up with new notions with logical conclusions to form an organizational memory. Supreme level of knowledge assimilation ability results in developing new crucial knowledge for strategic renewal for the betterment of the learning process. Earlier efforts to link neuroscience and learning mode were controversial. However, continuous researches imply the significant role of neurosciences in the field of education and its deep-rooted involvement in building reformed educational pedagogy related to curriculum and general teaching-learning practices. Educational neurosciences help in interpreting brain-behaviour intricacy to provide latest teaching-learning strategies. Education is the most robust cognitive skill developer, and it must be provided to all irrespective of age and gender as it makes the person flexible and provides strength to cope with the adversities. Through this report, we would like to covey the deep association between the teaching-learning process with neurological sciences along with providing measures to be taken for holistic development in the educational setups. Learning is a by-product of human behaviour towards the external environment. Recent advanced tools of neuroimaging aid in more in-depth insight linked to adaptive neural mechanics, knowledge attainment, new skill acquisition and building neuroscience network for human learning. The neuroscience research shows intricacy between emotions and cognition as mediators between mind and body that are then followed by the social behaviour and learning, by indulging in subjective interpretations of person's goals, feelings, actions and experiences, ultimately resulting in learning new theories through neurobiological shreds of evidence. The Author(s), under exclusive license to Springer Nature Switzerland AG 2021. All rights reserved. -
CSR initiatives: A way of enhancing employees' wellbeing
Employees are seen as a valuable resource for assessing a business's competitiveness. Providing for their wellness, health, and running employee support programmes may increase their drive and commitment to the organization. This chapter will explain the role of CSR activities on employees' well-being, examine the impact of CSR activities on well-being of employees, and provide CSR strategies to maximize employees' well-being. A qualitative research technique was applied in this study. A systematic literature review was based on articles in national and international journals, magazines, working papers, etc. gathered and analyzed to achieve the research objective. The implementation of employees CSR activities has been significant, since employee health and wellness have a direct impact on the competitiveness of the business and have been a driving force behind employee's performance. 2024 by IGI Global. All rights reserved. -
Cultivating efficiency-harnessing artificial intelligence (AI) for sustainable agriculture supply chains
This chapter intends to investigate and present the possibility of utilizing artificial intelligence to transform the agricultural supply chain. The primary objective is to enhance efficiency, sustainability, and adaptability in response to a shifting climate and expanding global population. The results of this investigation provide significant and valuable knowledge for both new businesses and well-established corporations who have a vested interest in embarking on an intelligent and sustainable digital revolution within the agricultural sector and food supply chains. These findings present insights that can guide these enterprises in their pursuit of transforming their operations using technology to enhance efficiency, productivity, and sustainability. By harnessing the benefits offered by digitization, organizations operating within the agriculture industry will be able to streamline processes, optimize resource allocation, reduce waste, and improve traceability throughout the supply chain network while ultimately securing long-term success. 2024, IGI Global. All rights reserved. -
Cultivating holistic learning environments in higher education: Mindfulness, compassion, and ubuntu philosophies
Within the context of higher education, namely in microlearning and micro-credentials, the core principles of mindfulness, compassion, and Ubuntu play a pivotal role in instigating a significant and transformative shift in the educational landscape. Mindfulness practices enable the cultivation of engaged awareness in the current moment, while the cultivation of compassion enhances an individual's ability to empathize. Moreover, Ubuntu fosters a sense of connectivity among individuals. Integrating these elements within the educational curriculum, pedagogical strategies, and cultural customs fosters comprehensive growth, moral progress, and interconnectivity. It facilitates the development of individuals who exhibit social responsibility and empathy and provides a comprehensive foundation for leadership. The successful application of educational practises requires the integration of many strategies, which in turn facilitates substantial and compelling growth. 2024, IGI Global. -
Cultivating self-esteem: Exploring the intersection of culture, neurocognition, and behavior among female media professionals
This study employed a comprehensive research strategy utilizing both online and offline methodologies to gather insights from 278 female media professionals in Karnataka. The survey, conducted from May 2023 to October 2023, encompassed a substantial timeframe, allowing for a thorough data collection process and the observation of potential variations over the months. The self-esteem scale and workplace communication behaviour inventory scale were employed for the data collection. All correlations were statistically significant affirming the reliability of these associations. Linear regression analyses further elucidated the relationships between self-esteem and specific workplace behaviours. 2024 by IGI Global. All rights reserved. -
Cultural quotient: Evolving culturally intelligent business scholar-practitioners
Analytical competency is an essential skill when it comes to the present-day business scenario of the world. However, these days we see a shift in the business needs when it comes to working in a globalized environment. Not only is the intelligence quotient (IQ) looked at but organizations these days are in pursuit of individuals who have another side to their profile - the culturally intelligent side (assessed using the cultural quotient). The need of such a skill can be attributed to the fact that organizations are now churning out their human side of addressing the employees when it comes to ensuring that they blend in the organization with ease. Acquiring a workforce which possesses high cultural intelligence can be a tough task; however, training employees to become culturally competent can be a doable task. Like any other personality trait which can be imbibed over time through constant analysis and observation, cultural competency is one such area which may be cultivated through various methodologies and practices. 2018, IGI Global. -
Current status and future trends on the use of innovative technologies for recovering bioactive from insects
Edible insects hold great potential as human food owing to their nutritional, economic and environmental value. Though, the negative perceptions of insects limit their intake by majority of the insects, their efficient processing and utilization in food products have steadily increased their demand in recent years. This chapter deals with the emerging and advanced extraction techniques for recovering functional and bioactive compounds from insects, considering the various factors which might influence the optimum yields. Apart from their production yields, it is of utmost significance to preserve their nutritional and sensory qualities for their effective utilization in functional food products. In this regard, various emerging technologies such as enzymatic hydrolysis, cold atmospheric pressure plasma, ultrasound-assisted extraction, high hydrostatic pressure have been explored. Mechanisms of action along with their benefits and drawbacks have been thoroughly described in the later part of the chapter which will provide insight to the readers for the selection of optimum technology for insect processing. Overall, this chapter provides the readers a comprehensive view about alternatives to conventional techniques for postprocessing of insects and optimization for case-specific technology. 2024 Elsevier Inc. All rights reserved. -
Current Trends in Career Decision in Youth: Opportunities and Challenges
In todays times, career is a crucial life decision. Due to its paramount importance in our lives, the youth experience diverse kinds of stresses and pressures while choosing their career in life. Contrary to earlier handful career options, current trends offer an unlimited mix of traditional as well as unconventional career roles which further create confusion and anxiety while making the final decision. Newer factors, challenges and opportunities have forced a change of frameworks and perspectives to career decision-making. In career counselling, current trends are shifting away from the traditional practice of matching skill-sets to the job. Todays career decision-making takes an inclusive approach by discussing the various internal influences, emotional management, cognitive thinking styles, coping strategies, adaptability, etc. as well as external influences of uncertainty, evolving lifestyle demands, changing economic tapestry, etc. In addition, the influences of gender, family and culture affect the nature of the goals and their acceptability. The current chapter throws light on the evolving scenario in the field of career decision-making among the youth and attempts to offer solutions to the challenges being faced by the youth. The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2023. -
Customary complications and screening techniques of early pregnancy
Complications arising during pregnancy are one of the significant public health issues around the world. Being the critical aspect for the growth and development in every human's life, it is necessary to assess any pathological disturbance mainly concerning the well-being of the fetus and mother throughout pregnancy. Few women face health downline while pregnancy, whereas few faces before getting pregnant; both the conditions can lead to complications in maternal and fetal health. Usually, pregnancy-related complications disappear as soon as the baby is delivered or shortly after that. Few complications include premature delivery, abruption of the placenta, preeclampsia, and diabetes. At the same time, gestation and these complications reoccur in successive pregnancies at a higher rate. They can also make the women prone to lifelong medical complications such as metabolic diseases or cardiovascular disease later in life. Most of the complications are mild without progression, but it harms both the mother and baby when they progress. Hence, it is important to diagnose early the danger signs and provide antenatal care to elevate the chances of proper health in both the mother and infant throughout the pregnancy and afterwards. This chapter focuses on the complications faced in the early phase of pregnancies and the screening methods utilized to diagnose them early, along with long-term effects in mothers due to some complications. The Author(s), under exclusive license to Springer Nature Switzerland AG 2023. -
Customer perspective on a curated gift-box service: A study in Sikkim, India
Due to the proliferation of choices and brands, accessibility to information, and new communication mediums, consumer behavior, particularly decision-making processes, has been altered by the spending power of various segments. In the Indian environment, although product appearance has been identified as a significant factor in influencing customer behavior, its effect on decision making when combined with other factors such as cost, features, and intrinsic psychological factors has not been studied thoroughly. This study aims to highlight consumers' perspective on a curated gift-box service in Sikkim. Focusing on gifting during special occasions, impulse buying, and self-gift opportunities, this study stands on the possibility that there is a need for such service in the market. 2023, IGI Global. -
Customer Perspective through Artificial Intelligence: Forecasting Green Products Sustainable Development
The idea of planned behavior was developed in 1980 as a philosophy of deliberate action to interpret human behavior. The primary element of this theory is an individuals purpose, which is impacted by the attitude of expecting that the behavior will result in the desired result. This theory has helped in determining certain characteristics of an individual that includes smoking, drinking, services, and so on. The theory states that the behaviors are achieved through motivation and control. These characteristics developed are completely voluntary which can sometimes help in the betterment and improvement in any field. The name of the theory itself gives us a clarity that it is a well-planned formation of behaviors different from his or her normative and preconceived beliefs and norms. 2024 Sachi Nandan Mohanty, Preethi Nanjundan and Tejaswini Kar. -
Cyber secure man-in-the- middle attack intrusion detection using machine learning algorithms
The main objective of this chapter is to enhance security system in network communication by using machine learning algorithm. Cyber security network attack issues and possible machine learning solutions are also elaborated. The basic network communication component and working principle are also addressed. Cyber security and data analytics are two major pillars in modern technology. Data attackers try to attack network data in the name of man-in-the-middle attack. Machine learning algorithm is providing numerous solutions for this cyber-attack. Application of machine learning algorithm is also discussed in this chapter. The proposed method is to solve man-in-the-middle attack problem by using reinforcement machine learning algorithm. The reinforcement learning is to create virtual agent that should predict cyber-attack based on previous history. This proposed solution is to avoid future cyber middle man attack in network transmission. 2020, IGI Global. -
Cyber secure man-in-the-middle attack intrusion detection using machine learning algorithms
The main objective of this chapter is to enhance security system in network communication by using machine learning algorithm. Cyber security network attack issues and possible machine learning solutions are also elaborated. The basic network communication component and working principle are also addressed. Cyber security and data analytics are two major pillars in modern technology. Data attackers try to attack network data in the name of man-in-the-middle attack. Machine learning algorithm is providing numerous solutions for this cyber-attack. Application of machine learning algorithm is also discussed in this chapter. The proposed method is to solve man-in-the-middle attack problem by using reinforcement machine learning algorithm. The reinforcement learning is to create virtual agent that should predict cyber-attack based on previous history. This proposed solution is to avoid future cyber middle man attack in network transmission. 2022 by IGI Global. All rights reserved. -
Cybercrimes in the Associated World
Phrases that scarcely existed a decade ago are now a part of our day-to-day lifestyle, as criminals use malicious new technologies to commit cyber attacks against businesses, individuals, and governments. These crimes cause serious harm and impose real threats to victims worldwide either physically or virtually. There are no borders in cyberspace. Attacks can come from any place and at any time. Cybercrime can take many forms, but they all have a digital platform/environment in common. It can be done with both good and bad intentions. But, nowadays, the most common types of cybercrime activities such as phishing scams, identity theft, Internet frauds, online intellectual property or patent infringements, online harassment, and cyber stalking are sadly very widespread in todays associated world. Cyber bullying and online harassment activities spread casually in social media posts and comments or through direct messages and also via emails. The main motive of these messages is to threaten either an individual or a group. Such kinds of cybercrime activities are extremely damaging to the victims mental health. Government agencies working to investigate cybercrimes have reported multiple records of victims developing mental illnesses and even ending up committing suicide. On the other hand we have phishing scams, one of the widespread crime activities. Organizations have detected an increase in the ratio of phishing emails to professional emails from unknown or anonymous service providers appending fake attachments and invoices. These files and attachments may contain malicious payloads to scam people and to create a backdoor in that system, so the attacker can gain access to the system anytime and from anywhere without the victims knowledge. This has been considered as one of the major advantages for the attacker. Cybercrimes have not restricted to only these forms of criminal activities. A wide variety of new attacks have been created and have spread all over the world through commonly used platforms such as social media sites, blogs, and news portals. We are living in a digital world where all our activities are being monitored by someone, somewhere - even keystrokes are being monitored using keyloggers. Nothing seems to be secret and protected unless you are tech savvy. National agencies are keeping a close watch on all individual online activities to prevent illegal activities from happening. No longer the delete option is possible in this digital world; rather, only migration of data from one location to another or from a local server to a cloud server is possible. In our day-to-day lives, several new viruses and attack mechanisms are triggered by attackers by following very new tactics with the help of more complex algorithms. So, its time to advance our knowledge on protecting our valuable assets by spending time in learning and following proper online practices. 2024 selection and editorial matter, S. Vijayalakshmi, P. Durgadevi, Lija Jacob, Balamurugan Balusamy, and Parma Nand; individual chapters, the contributors. -
Cybersecurity Disclosure and Corporate Reputation: Rising Popularity of Cybersecurity in the Business World
This chapter emphasizes the importance of cybersecurity for a corporation as todays organizations are more vulnerable than ever and their enemies are in the form of viruses and malware. The work provides evidence that cybersecurity can have an impact on brand value, market value, and overall corporate reputation. It focuses on depicting the global scenario with reference to cybersecurity disclosures by corporations and how it is important in todays digitized era where data is the most valuable and vulnerable asset. With rapid digitalization, cybersecurity has become a major concern for all businesses, especially when there is financial and reputational damage to cybersecurity breaches and incidents. Even in the absence of clear cybersecurity laws and regulations, corporations are opting for voluntary disclosure. Existing literature explains this as an attempt to mitigate any potential risk or occurred risk through increased transparency which will build the trust of all stakeholders. 2023 by IGI Global. All rights reserved. -
Dandelion Algorithm for Optimal Location and Sizing of Battery Energy Storage Systemsin Electrical Distribution Networks
This paper describes a new way to improve the performance of an EDN by integrating distributed battery energy storage systems (BESs) in the best way possible. This method is based on the Dandelion Algorithm (DA). The search space for BES locations is first predetermined using loss sensitivity factors (LSFs), and then DA is used to determine the optimal locations and sizes. The reduction of real power distribution loss is regarded as the primary objective function, and the impact of BESs is extended to examine the network voltage profile, voltage stability, and GHG emissions. IEEE 33-busEDN is used to calculate the computational efficiency of LSF-DA. Results show that DA is more efficient than Archimedes optimization (AOA), future search algorithm(FSA), pathfinder algorithm(PFA), and butterfly optimization algorithm(BOA) algorithms. Furthermore, the results show that the proposed DA enhances all technological and environmental factors and RDN performance. The Author(s), under exclusive license to Springer Nature Switzerland AG 2024. -
Data acquisition using NI LabVIEW for test automation
In a fighter aircraft, the pilot's safety is of utmost importance, and the pressure sensing in the pilot's mask is essential for ensuring the pilot's safety. This innovative solution ensures the swift and accurate measurement of pressure, minimizing the risk of potential hazards and enhancing military aviation safety. Additionally, it provides a robust and reliable solution that can withstand the harsh and challenging conditions often encountered in the field. This chapter explores the advanced capabilities and benefits of utilizing the National Instrument USB-6363, programmed with LabVIEW, in military aviation, highlighting its potential for revolutionizing pressure measurement processes in this critical field. It describes a research study on developing a pressure-sensing system for pilot masks using NI USB 6363 and LabVIEW. 2023, IGI Global. -
Data Analytics and ML for Optimized Performance in Industry 4.0
Industry 4.0, the fourth industrial revolution, has revolutionized manufacturing and production systems by integrating Data Analytics (DA) and Machine Learning (ML) techniques. Predictive maintenance, which predicts equipment malfunctions and schedules maintenance in advance, is a crucial application of DA and ML within Industry 4.0. It reduces downtime, improves productivity, and lowers costs. Demand forecasting, which uses historical data and ML algorithms to predict future product demand, and anomaly detection, which identifies abnormal patterns or events within large datasets, are also critical applications of DA and ML in Industry 4.0. They enhance operational efficiency and reduce costs. However, the adoption of DA and ML presents several challenges for organizations, including infrastructure, personnel, ethical, and privacy concerns. To realize the benefits of DA and ML, companies must invest in appropriate hardware and software and develop the necessary expertise. They must also handle data responsibly and transparently to ensure privacy and ethical standards. Despite these challenges, the integration of DA and ML in Industry 4.0 is critical for optimized performance, improved productivity, and cost savings. 2024 selection and editorial matter, Nidhi Sindhwani, Rohit Anand, A. Shaji George and Digvijay Pandey; individual chapters, the contributors. -
Data and Its Dimensions
In current times Data is the biggest economic opportunity. As per the studies, it is observed that the world is becoming 2.5 quintillions data-rich every day, with an average of every human contributing 1.7MB of data per second. Every individual has a good appetite for data, as it gives immense insight to explore and expand the business. With the invention of smart devices and innovation in the field of connectivity such as 4G-5G Mobile Networks and Wi-Fi, the generation and consumption of the data are steadily increasing. These smart devices continuously generate data, leading to a bigger pool for better decision-making. This chapter presents data, the various forms and sources, and the concept of Data Science; it discusses how the ownership and value of data are decided; and also highlights the use, abuse, and overuse of the data along with data theft, and a case study to represent data breach. 2022, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.