Browse Items (11855 total)
Sort by:
-
Gamification in teacher education: Teacher educators and trainee teachers' perspectives in India
Gamification emerged as a teaching-learning pedagogy in recent years. Its usage increased during the Covid-19 lockdown and continued post-pandemic time. Its usage ranges from online to offline tools; teachers lack its awareness as a pedagogy. The present study aimed to understand perspectives of teacher educators and teacher trainees on inclusion of gamification pedagogical training in teacher preparation programmes. The study employed a mixed-method approach and included qual-quant sequential explanatory research design. Researchers conducted semi-structured interviews with six teacher educators and six trainee teachers and collected the opinion of 200 teacher educators and trainee teachers. The study employed inductive thematic analysis and Chi-square analysis for qualitative and quantitative data respectively. Findings revealed six main themes and twelve sub-themes. Chi-square revealed a gender science-stereotype amid association between teacher educators and teacher trainees' opinion. Senior teacher educators did not believe in the importance of gamification inclusion in teacher preparation. 2024, IGI Global. All rights reserved. -
Examining University Students Attitude towards e-Learning and Their Academic Achievement during COVID-19
Higher education around the world has moved to online teaching due to COVID-19 pandemic. Students in higher education are compelled to attend online classes and adopt e-learning mode. There is not much evidence on training the students to adopt e-learning and remote learning. However, do they have a positive attitude towards e-learning and has it affected their academic performance? Present study administered an e-learning attitude scale to 840 students of a reputed University to examine whether they have positive or avoidance attitude to e-learning and also analysed e-learning attitude across students demographic characteristics. Study revealed a slight positive correlation between e-learning attitude and academic achievement of postgraduate students and not for undergraduate students. Girls excelled in their achievement and have a more positive e-learning attitude than boys have. Boys showed avoidance e-learning attitude. However, Socio Economic Status (SES) did not affect students e-learning attitude but influenced their academic achievement. Study concludes that stakeholders must create more opportunities to develop a positive attitude towards e-learning as future education is likely to be technology integrated. 2022 by the authors. -
USER EXPERIENCES OF CHATGPT AMONG ENGINEERING STUDENTS, TEACHERS, AND WORKING PROFESSIONALS IN INDIA
The introduction of Chat Generative Pre-Trained Transformer (ChatGPT) in November 2022 brought about rapid changes in the workplace and academia. Its usage ranged from student assignments to workplace targets in the engineering field. Although it has brought novel ideas to its application in various fields and task efficiency in the workplace, its perceived application varies among students, teachers, and professionals. This study employed the snowball sampling technique and interviews with eight students, eight faculty members, and eight working professionals from computer science engineering who used ChatGPT regularly. The study adopted a qualitative research design and employed the narrative data analysis technique. Researchers conducted in-depth, semi-structured interviews to elicit user experiences from the recruited samples. The findings brought out six main and twelve subordinate themes regarding ChatGPT user experiences: adapt, adopt, embrace, ease, speed, engage, and automate. The inclusion criteria involved ChatGPT users from the computer science engineering domain only. Future research may focus on developing ChatGPT user policies for various fields of their applications. 2024, Grand Canyon University. All rights reserved. -
Effect of social influence on the saving behaviour of freelancing undergraduate students, mediated by financial literacy and self-control; [Vliv socino aspektu na spo?icchovstudent? na volnnoze ve vztahu k finan?ngramotnosti a sebekontrole]
Currently, India is among the countries with the largest youth population with 65% of the people aged below 35 years. These youths engage themselves in a multitude of things which generation-x was not aware. Their daily routine, study habits, entertainment, computer knowledge, and financial affairs are different from that of earlier generations. There is a need to study their financial situation and saving habit as their approach towards enjoyment, recreation, and lifestyle are influenced by factors like social media and popular culture. This study aims to find the mediation effect of financial literacy and self-control on the relationship between social influence and saving behaviour of undergraduate (UG) students, who are freelancing while pursuing their studies. The study obtained 357 responses to questionnaires through purposive sampling method. The study adopted causal mediation research design and employed mediation analysis to find the direct, indirect, and total effects of the relationship between social influence and saving behaviour among freelancing UG students. The results of the study revealed a partial mediation effect, indicating that the social influence not only had a direct impact on the saving behaviour of UG students in India, but also mediated it through financial literacy and self-control. Further research could focus on understanding students knowledge of digital-financial management, as digitisation of the financial sector is rapidly expanding. 2023 The Authors. -
Pre-Service and In-Service Teachers Perceptions of Using Virtual Reality Tools in Teaching
This paper explores pre-service and in-service teachers perceptions of virtual reality (VR) technology as a teaching and learning tool in the classroom in India. The study aimed to answer four research questions, including the adoption rate of VR technology among teachers, their confidence levels in teaching using VR technologies compared to digital technologies, attitudes towards using VR technology, and the usefulness of different uses of VR technology. The survey conducted among 102 teachers found limited adoption of VR technology, lower confidence levels in using it, but willingness to use it in the future. The paper recommends providing adequate training and support to increase teachers confidence in using VR technology in their teaching practices. The study also suggests that strategies to promote VR technology should consider gender differences in attitudes towards it. Overall, the research concludes that teachers view VR technology as having potential benefits for learning and teaching across various uses. The Author(s), under exclusive license to Springer Nature Switzerland AG 2025. -
Philanthropic and Functional Motivation of DREAMS Afterschool Intervention Programme Volunteers: A Correlational Study
Rapid increase in access to information and communication technology among youths have changed their approach towards life. Present study aims to find the relationship between philanthropy and functional motivation among fresh DREAMS volunteers. Study adopted two standardized tool to measure philanthropy and functional motivation. Study selected all the fresh 255 volunteers who just joined DREAMS afterschool intervention programme (AIP), which included 25 boys and 230 girls. Study employed descriptive correlational design and administered the survey questionnaire to participants of the study. Statistical analysis of the data revealed a significant positive moderate correlation between philanthropy and functional motivation. Philanthropy could explain 11.8% variation in functional motivation of fresh volunteers. Quartile points explains almost 74% of the participants fared high on functional motivation than philanthropy. Thus, present day youths have high functional motivation to volunteer than philanthropy. Future researchers may delve into the root cause for lack of philanthropic mindset among gen Zs. 2024 Asian Journal of Human Services, All rights reserved. -
Mentors perceived interest, motivation, and volunteering intention at DREAMS after school intervention programme
DREAMS stands for Desire, Readiness, Empowerment, Action, and Mastery for Success. Dreams afterschool intervention programme (ASIP) is to empower children who are weak in psychosocial skills to realize their full potential and to plan for a successful life with the help of college student mentors and senior community mentors. The present study explored the college student mentors interest and motivation to serve at DREAMS and the volunteering intention to stay or discontinue as mentors. The study bases its investigation purely on the mentors revelation of their experiences of DREAMS ASIP. Study followed phenomenological inquiry method and conducted semi-structured interview with 10 college-student mentors, which included 6 active mentors and 4 dropouts. A face-to-face interview conducted by the researchers recorded all the unique points diligently and conducted the data analysis using thematic analysis. Study found 3 main themes and 12 subordinate themes out of thematic analysis. The master themes are mentors interest, mentors motivation, and mentors volunteering experiences. The results section of the article presents the details of themes and sub-themes along with few excerpts of interviewees. Implications of the study might help other ASPs to understand the nature of their volunteers interest and motivation. Future researchers may study factors affecting the mentors strengths and weaknesses within the organisation. 2023 RESTORATIVE JUSTICE FOR ALL. -
A Comprehensive Review on Fault Data Injection in Smart Grid
Nowadays, power generation at the utility side and transfer to the demand side have been controlled by the smart grid. Day-by-day entire power distribution process has moved in multiple directions and connects more residential and industrial sectors. Due to these phenomena, more monitoring, and security processes have been adopted in smart grid to control fault data injection, cyber-attack, and physical side attackers in smart grids. This research study analyzes the fault data injection in smart grid with respect to the malicious data, signal, and connectivity process. As a part of this research study, a survey has been done on various techniques to control the faults in smart grid. The analysis carried out in this study is very helpful to identify and determine the suitable method to control the fault in smart grid. Along with these, a countermeasure against the FDI is also summarized on the cyber-attack and physical attack. 2023, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
Synthesis, Green Photoluminescence and Studies of Nonlinear Optical Spatial Self Phase Modulation Effect in 2D Ga2Te3 Nanosheets
The liquid-phase exfoliation (LPE) technique has been employed to prepare two-dimensional (2D) gallium telluride (Ga2Te3) nanosheets with an average thickness of ?2.4 nm and linear optical properties, including UV-visible absorption and photoluminescence (PL) emission characteristics of the sample in the green wavelength region are reported. The third-order nonlinear optical (NLO) responses of the colloidal suspension of 2D Ga2Te3 are determined at 532 and 632 nm wavelengths by a spatial self-phase modulation (SSPM) experiment. The value of the third-order NLO refraction coefficient (n2e) and effective susceptibility for monolayer (?(3)Mono) 2D Ga2Te3 under 532 (632) nm continuous wave (CW) excitation is extracted to be 2.60 10-7 (0.32 10-7) cm2/W and 1.12 10-9 (1.37 10-10) e.s.u., respectively. The origin of the observed SSPM patterns under 532 nm excitation was elucidated theoretically. Finally, the correlation of ?(3)Mono with the mobility of charge carriers for a vast number of 2D materials is utilized to establish the origin of the observed NLO effect under 532 nm pump laser radiation in the 2D Ga2Te3. Additionally, NLO absorption coefficients of 2D Ga2Te3 have been extracted using the femtosecond Z-scan technique at 800 nm. We observed a switching behavior (saturable to threephoton absorption) in the nonlinear absorption mechanism with different input peak intensities. The highest three-photon absorption coefficient of ?1.68 cm3/GW2 was observed for a 350 GW/cm2 peak intensity. We believe that such reports of interesting linear and NLO properties of this newly synthesized 2D material can be utilized in the future for a wide number of optoelectronic applications. 2023 American Chemical Society. -
Data Mining Approaches forHealthcare Decision Support Systems
Data mining is a user-friendly approach to locating previously unknown or hidden information in data. The employment of data mining technologies in the healthcare system may result in the finding of relevant data. Data mining is used in healthcare medicine to construct learning models that predict a patients condition. Data mining technologies have the potential to benefit all stakeholders in the healthcare industry. For example, data mining may aid health providers in detecting theft and fraud, medical organizations in making customer service management decisions, physicians in discovering effective therapies and best practices, and customers in obtaining suitable and less expensive healthcare. Contemporary systems, due to their complexity and size, are unable to control and analyze the huge amounts of data generated by healthcare operations. Data mining is a technique and mechanism for converting a large amount of data into useful information. The fundamental purpose of this research is to look at what makes clinical data mining unique, to give an overview of existing clinical decision support systems, to identify and select the most common data mining algorithms used in modern Health and Demographic Surveillance System (HDSS), and to compare different data mining algorithms. 2023, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
A novel approach using steganography and cryptography in business intelligence
In the information technology community, communication is a vital issue. And image transfer creates a major role in the communication of data through various insecure channels. Security concerns may forestall the direct sharing of information and how these different gatherings cooperatively direct data mining without penetrating information security presents a challenge. Cryptography includes changing over a message text into an unintelligible figure and steganography inserts message into a spread media and shroud its reality. Both these plans are successfully actualized in images. To facilitate a safer transfer of image, many cryptosystems have been proposed for the image encryption scheme. This chapter proposes an innovative image encryption method that is quicker than the current researches. The secret key is encrypted using an asymmetric cryptographic algorithm and it is embedded in the ciphered image using the LSB technique. Statistical analysis of the proposed approach shows that the researcher's approach is faster and has optimal accuracy. 2021, IGI Global. -
A new combinational technique in image steganography
Internet is used for exchanging information. Sometimes it is needed to transmit confidential data via internet. Here the authors use image steganography to pass confidential data within a cover image. To construct the algorithm, they take the combinational help of particle swarm optimization (PSO), bi-orthogonal wavelet transform (BWT), and genetic algorithm (GA). They use PSO to take the enhanced version of cover image. They use BWT to choose the selective sub bands of cover image and we utilize GA to select a particular stego image among a set of stego images. Thus, an innovative technique of image steganography has been made to transmit confidential data via cover image generating stego image. This combinational approach of image steganography is quite safe for confidential data transmission and makes it hard for the attackers to retrieve the confidential data. 2021 IGI Global. All rights reserved. -
Steganography using Improved LSB Approach and Asymmetric Cryptography
Steganography deals with the craft of obscuring private data inside a spread media. In confidential data communication security is a vital issue. In this paper, we use a two-layer security. At first, data encryption is achieved by the method of RSA algorithm of asymmetric cryptography, and later the ciphered data is hidden into host image by an innovative embedding technique. To hide our ciphered data into host image, we modify the existing LSB technique and use a mapping function that ensures a secure and confidential image steganography resulting in a stego image. Here cryptography is blended with steganography and provides two level security in the confidential data transmission over the internet. 2020 IEEE. -
A Survey on Adaptive Authentication Using Machine Learning Techniques
Adaptive authentication is a reliable technique to dynamically select the best mechanisms among multiple modalities to authenticate a user based on the users risk profile generated using behavior and context-based information. Websites or enterprise applications enabled with adaptive authentication will have a more robust security system as analyzing the large volume of the user, device, and browser data in real time generates a risk score that decides the appropriate level of security. Though a significant amount of research is being carried out on adaptive authentication, no single model is suitable for a global attack. This paper provides a structured (extensive) survey of current adaptive authentication techniques available in the literature to identify the challenges which demand future research. 2022, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
An Architecture for Risk-Based Authentication System in a Multi-Server Environment
Identity authentication, a vital part of any application access, is also one way for imposters to gain access to an application using various fingerprint authentication technologies. Therefore, because of the lack of security in the authentication architecture, this paper proposes an architecture for a risk-based authentication system using a machine learning model in a multi-server environment. Since the recent study mainly focuses on the multi-server environment and adaptive authentication independently, very little work has been proposed using a multi-server environment for adaptive authentication. The study aims to estimate risk for the user during the initial login process and when the user's data is extracted enough for prediction in a multi-server environment. 2023 IEEE. -
Urban coastal resilience - An assessment
Increase in the urban area leads to the increase of impervious surfaces which is stressing urban watershed balance resulting in issues like urban flooding in cities around the world. Coastal urban areas experience the pressures of a higher water table which contributes to the rising urban flooding issues of the area. Urban resilience as a concept was developed in cities across the world which includes multiple strategies to cope with the impacts of climate change in cities by integrating engineering and ecological measures. Urban resilience for urban flooding aims to achieve the water balance of an area by balancing the increase of impervious surfaces using ample green and grey infrastructure. This paper aims to understand and evaluate the effectiveness of urban resilience measures implemented in coastal cities worldwide. 2023 Author(s). -
Synthesis and characterization of cyclopentadithiophene and thienothiophene-based polymers for organic thin-film transistors and solar cells /
Macromolecular Research, Vol.26, Issue 10, pp. 1-8, ISSN: 1598-5032 -
Effects of suction-injection-combination (SIC) on the onset of Rayleigh-Benard magnetoconvection in a micropolar fluid
The effects of suction-injection-combination (SIC) and magnetic field on the linear stability analysis of Rayleigh-Benard convection in a horizontal layer of an Boussinesq micropolar fluid is studied using a Rayleigh-Ritz techinque. The eigenvalues are obtained for free-free, rigid-free and rigid-rigid velocity boundary combinations with isothermal and adiabatic temperature conditions on the spin-vanishing boundaries. The eigenvalues are also obtained for lower rigid isothermal and upper free adiabatic boundaries with vanishing spin. The influence of various micropolar fluid parameters on the onset of convection has been analysed. It is found that the effect of Prandtl number on the stability of the system is dependent on the SIC being pro-gravity or anti-gravity. A similar Pe-sensitivity is found in respect of the critical wave number. It is observed that the micropolar fluid layer heated from below is more stable compared to the classical fluid layer. 2003 Elsevier Science Ltd. All rights reserved. -
Effect of Imposed Time-Periodic Gravity Modulation and Electric Field on the Onset of Rayleigh-Benard Convection in a Couple Stress Fluid
International Journal of Mathematical Sciences and Engineering Applications, Vol-6 (6), pp. 421-435. ISSN-0973-9424 -
Three-Component Convection in a Vertically Oscillating Oldroyd-B Fluid With Cross Effects
This paper sheds light on the impact of vertical oscillations (or gravity modulation) on triple-diffusive convection in a viscoelastic fluid using the Oldroyd-B model, in the presence of cross effects. Cross effects can significantly impact three-component convective systems, despite having small magnitudes. When the cross terms, indicating coupled molecular cross-diffusion of the mixture components, are included in the equations governing heat and species transport, then a deviation from the usual three-component convection process is observed. An analytical solution has been found using linear and nonlinear analysis. The conditions for the onset of convection have been obtained using the linear analysis, which is based on the perturbation technique and the Venezian method. In nonlinear analysis, the expressions for Nusselt and Sherwood numbers, which quantify the rate of heat and mass transport respectively, are obtained by deriving the Lorenz model. It has been found that the onset of convection and heat and mass transport can be controlled by choosing the appropriate values of the parameters. 2022, The Author(s), under exclusive licence to Springer Nature B.V.