Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Discipline
Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 10145

Full-Text Articles in Entire DC Network

Internationalization In Egyptian Higher Education: Two Case Studies From Public Universities, Esraa Mostafa Jun 2024

Internationalization In Egyptian Higher Education: Two Case Studies From Public Universities, Esraa Mostafa

Theses and Dissertations

In an increasingly globalized world, internationalization has emerged as a promising global trend to contribute to a more interconnected and diverse academic environment. By examining the stakeholders’ perceptions of two joint programs, this study presents a balanced assessment of the quality of education in internationalized programs based on the dual nature of opportunities and barriers associated with internationalization. This study highlights a research gap in the internationalization process of the learning landscape in Egypt. Filling this research gap would offer insightful information to academics, institutions, and policymakers in the field of higher education within the Egyptian context. The study’s findings …


Policy Frameworks And Citizens’ Use Of Fintech Solutions: The Pros And Cons In Egypt, Salma Al-Mohamady Jun 2024

Policy Frameworks And Citizens’ Use Of Fintech Solutions: The Pros And Cons In Egypt, Salma Al-Mohamady

Theses and Dissertations

This thesis provides a comprehensive analysis of the significant influence of financial technology (FinTech) on the banking industry, consumer finance, and economic growth. It specifically concentrates on the swiftly changing FinTech environment in Egypt. The study investigates the impact of incorporating advanced technologies on worldwide financial practices, which has significantly transformed traditional banking models and facilitated the emergence of inventive financial services. The transition is clearly apparent in Egypt, where the expansion of FinTech has been driven by advances in regulations, adaptation to technology, and a population that is becoming more comfortable with digital solutions.

Using a combination of quantitative …


Analyzing The Cognitive Complexity Of The Questions On The Advanced Placement Computer Science Principles Exam, Lauren Zirpoli May 2024

Analyzing The Cognitive Complexity Of The Questions On The Advanced Placement Computer Science Principles Exam, Lauren Zirpoli

Seton Hall University Dissertations and Theses (ETDs)

This convergent parallel mixed methods study with qualitative and quantitative content analysis was conducted to analyze and describe the cognitive complexity of the publicly released Advanced Placement Computer Science Principles Exam questions compared to the language of higher-order thinking found in research literature. Hess’ Cognitive Rigor Matrix was used to determine the frequency and percentage of questions categorized as higher-order thinking within each cell of the matrix. The qualitative method consisted of content analysis of the language of each question analyzed, followed by deductive coding, and culminated with categorizing the depth and type of thinking required on Hess’ Cognitive Rigor …


What Is The Effect Of Telehealth And The Internet Of Medical Things (Iomt) On Outcomes When Used In At-Risk Pregnancies: A Scoping Review Of The Components Of Remote Maternal Monitoring For Hypertensive Disorders That Can Successfully Be Done Via Digital Technology?, Leighton Pitter May 2024

What Is The Effect Of Telehealth And The Internet Of Medical Things (Iomt) On Outcomes When Used In At-Risk Pregnancies: A Scoping Review Of The Components Of Remote Maternal Monitoring For Hypertensive Disorders That Can Successfully Be Done Via Digital Technology?, Leighton Pitter

MUSC Theses and Dissertations

IoMT (Internet of Medical Things) is an emerging technology that facilitates individualized remote e-health services to improve patient's quality of life and satisfaction while decreasing healthcare expenditures. The objective of this scoping review is to explore the usage of IoMT and remote patient monitoring (RPM) in at-risk pregnancies for hypertensive disorders to mitigate pregnancy-related complications. IoMT and other devices in an intelligent health system can meaningfully ameliorate maternal care management in the United States (U.S.). Wearables and nearables, subcategories of IoMT, can be utilized to facilitate patient-centered care and promote excellence in health maintenance/management through a holistic continuum of care …


Effect Of User Satisfaction Between Cloud Learning Applications & University Education Agility, Nader Mohammad Aljawarneh May 2024

Effect Of User Satisfaction Between Cloud Learning Applications & University Education Agility, Nader Mohammad Aljawarneh

Journal of Statistics Applications & Probability

University agility has been a critical issue for higher education institutions, little research has focused on university agility and user satisfaction. Drawing on technology acceptance, process, and expectation theories, this paper investigates the mediating role of user satisfaction between cloud learning applications and university education agility. Variance-based structure in the northern region, results show that user satisfaction mediates the link between cloud learning applications and university agility. Implications for practice are discussed.


An Accessible Web-Based Peer-To-Peer Remote Desktop Control And Access Tool Utilizing Webrtc, Heston Friedland May 2024

An Accessible Web-Based Peer-To-Peer Remote Desktop Control And Access Tool Utilizing Webrtc, Heston Friedland

Masters Theses and Doctoral Dissertations

In the modern tech environment, remote desktop sharing is very popular and often much needed for daily work. Yet, many existing solutions hinge on the conventional client-server model, necessitating additional tools and software for effective desktop access. There exists a notable research gap concerning Desktop-as-a-Service (DaaS) delivery via a peer-to-peer architecture. This study introduces a browser-centric web application leveraging peer-to-peer communication for seamless remote desktop access. By integrating state-of-the-art technologies including Google’s WebRTC framework, STUN servers, and signaling servers, we offer an in-browser remote desktop experience, evaluating its performance in terms of responsiveness and user-friendliness. Our findings indicate promising prospects …


Gmr-45 Cloud Based Bus Tracking And Ticketing System, Vyghni Sudha Kommineni, Damacharla Sravani Apr 2024

Gmr-45 Cloud Based Bus Tracking And Ticketing System, Vyghni Sudha Kommineni, Damacharla Sravani

C-Day Computing Showcase

In many urban areas, public transportation systems frequently fail to fulfill passenger demand, causing aggravation owing to a lack of real-time information about bus locations, timetables and delays. Outdated ticketing processes, which are labor-intensive and prone to mistakes, compound the annoyance by failing to match current travelers' expectations. Furthermore, transportation operators encounter difficulties with fleet management, route optimisation, and issue response due to a lack of comprehensive data analytics. Reliable monitoring systems are required to prioritize passenger and bus safety, and achieving sustainability targets necessitates efficient operations to reduce fuel consumption and emissions. A scalable and customizable cloud-based bus tracking …


Gmr-107 An Integrated Architecture For Maintaining Security In Cloud Computing Using Blockchain, Namratha Tavva, Ashrith Kumar Devara, Gar H Lock Apr 2024

Gmr-107 An Integrated Architecture For Maintaining Security In Cloud Computing Using Blockchain, Namratha Tavva, Ashrith Kumar Devara, Gar H Lock

C-Day Computing Showcase

Cloud services are vulnerable to assaults because of their widespread availability. Since cloud computing is still a relatively new service, there is a real risk that sensitive information might be altered while in transit. Because of this, bad actors may gain an edge by manipulating data. Clients using the cloud for a wide range of use cases want to know that their data is reliable and secure. Blockchain, on the other hand, is an immutable digital ledger that may be used with cloud computing to provide an immutable cloudbased data storage and processing system. In this work, we present a …


User-Driven Data Privacy Protection In An Iot Environment, Nivetha B, Frank Michaud, Rahul Kata, Pranetha Priya R, Ganesh Paramasivan Apr 2024

User-Driven Data Privacy Protection In An Iot Environment, Nivetha B, Frank Michaud, Rahul Kata, Pranetha Priya R, Ganesh Paramasivan

Defensive Publications Series

Techniques are presented herein that enhance user data privacy in an Internet of things (IoT) environment. Aspects of the techniques introduce a third actor into such an environment – apart from a user and an IoT device – whose sole purpose is to empower a user to protect their own data. Such a data Custodian or Sanitizer may collect inputs from a user through a software as a service (SaaS) solution and then leverage the capabilities of the extended Berkeley Packet Filter (eBPF) to apply those inputs to an IoT device.


Enhancing R2l Intrusion Detection Using Decision Trees, Stephen Sommer Apr 2024

Enhancing R2l Intrusion Detection Using Decision Trees, Stephen Sommer

Research & Creative Achievement Day

In the age of advancing technology, artificial intelligence, and big data, Remote to Local (R2L) attacks are increasingly threatening cloud computing environments, heightening concerns about security and privacy. Intrusion detection systems (IDS) using Artificial Intelligence play a role in safeguarding data integrity within databases by swiftly identifying and isolating suspicious records. Furthermore, machine learning techniques enhance the effectiveness of these IDS by continuously adapting to new attack patterns and improving accuracy. This research investigates the use of Decision Tree, a Machine Learning Algorithm for enhancing Remote to Local (R2L) intrusion detection capabilities, utilizing the KDD Cup 1999 dataset and the …


The Effect Of Consumer Socialization, Perceived Employee Identification, And Flexibility On Store Loyalty For Beauty Products, Harash Sachdev Apr 2024

The Effect Of Consumer Socialization, Perceived Employee Identification, And Flexibility On Store Loyalty For Beauty Products, Harash Sachdev

Atlantic Marketing Journal

The survey data from a Chinese university suggests that consumer socialization and digital engagement profoundly influence employees' identification with their retailers. This identification, in turn, empowers retailers to become more flexible and adaptive to consumers' ever-changing needs, resulting in higher levels of store loyalty. Furthermore, an in-depth analysis revealed that retailers’ flexibility was vital in mediating employee identification and store loyalty.


Remote Work Admist The Covid-19 Outbreak: Insights From An Ensemble Community-Based Keyword Network Analysis, Carlo Drago, Luisa Errichiello Apr 2024

Remote Work Admist The Covid-19 Outbreak: Insights From An Ensemble Community-Based Keyword Network Analysis, Carlo Drago, Luisa Errichiello

Fondazione Eni Enrico Mattei Working Papers

COVID-19’s rapid shift to remote working has sparked interest in synthetizing the growing body of research in order to gain a comprehensive understanding into the scholarship structure of the field. This study explores the issue of pandemic-induced remote working from a multidisciplinary perspective, paving the way for further investigation and effective decision-making. A co-occurrence network analysis of keywords in scientific articles is employed to comprehensively analyze the international literature on pandemic-induced remote working. We use bibliometric analysis, network centrality measures, and community detection algorithms to identify key concepts, trends, and interconnections within the pandemic-induced research landscape. As a result of …


Enhancing Cyber Resilience: Development, Challenges, And Strategic Insights In Cyber Security Report Websites Using Artificial Inteligence, Pooja Sharma Apr 2024

Enhancing Cyber Resilience: Development, Challenges, And Strategic Insights In Cyber Security Report Websites Using Artificial Inteligence, Pooja Sharma

Harrisburg University Dissertations and Theses

In an era marked by relentless cyber threats, the imperative of robust cyber security measures cannot be overstated. This thesis embarks on an in-depth exploration of the historical trajectory and contemporary relevance of penetration testing methodologies, elucidating their evolution from nascent origins to indispensable tools in the cyber security arsenal. Moreover, it undertakes the ambitious task of conceptualizing and implementing a cyber security report website, meticulously designed to fortify cyber resilience in the face of ever-evolving threats in the digital realm.

The research journey commences with an insightful examination of the historical antecedents of penetration testing, tracing its genesis in …


Decoding The Future: Integration Of Artificial Intelligence In Web Development, Dhiraj Choithramani Apr 2024

Decoding The Future: Integration Of Artificial Intelligence In Web Development, Dhiraj Choithramani

Harrisburg University Dissertations and Theses

The thesis explores AI's profound impact on web development, particularly in front-end and back-end processes. AI revolutionizes UI prototyping by automating design creation, enhancing both efficiency and aesthetics. It also aids in code review, content generation, and process flow experimentation, streamlining development workflows. Through AI-driven tools like GitHub's Copilot and Wix ADI, developers benefit from coding assistance and innovative design capabilities. Despite some challenges, AI's evolving role promises to reshape web development, offering unprecedented efficiency and user-centric solutions.


Dynamic Credit Limit Adjustemnt System, Palakh Shangle Visa Apr 2024

Dynamic Credit Limit Adjustemnt System, Palakh Shangle Visa

Defensive Publications Series

The present disclosure relates to a Dynamic Credit Limit Adjustment System which is an innovative financial technology solution designed to transform the way credit limits are managed by financial institutions. Utilizing advanced artificial intelligence (AI) and machine learning algorithms, this system dynamically adjusts an individual's credit limit in real-time based on a comprehensive analysis of their financial data. This system integrates various financial indicators such as income changes, spending patterns, payment history, and current economic trends to provide a more accurate and responsive credit limit. By doing so, it addresses the limitations of traditional credit limit assignment methods, which are …


St. Cloud State University Employee Scholarship Bibliography [2023], Thomas D. Steman Apr 2024

St. Cloud State University Employee Scholarship Bibliography [2023], Thomas D. Steman

Employee Scholarship Bibliographies

No abstract provided.


Multi-Node Temperature Monitoring Method For Digital Agricultural Planting Based On Wireless Sensor Network, Pei Wang Apr 2024

Multi-Node Temperature Monitoring Method For Digital Agricultural Planting Based On Wireless Sensor Network, Pei Wang

Turkish Journal of Agriculture and Forestry

Abstract: In order to monitor the temperature of agricultural planting in time and avoid reducing the yield and quality of crops due to excessive temperature fluctuation, a multi-node temperature monitoring method of digital agricultural planting based on wireless sensor network is proposed. Firstly, the wireless sensor network structure in agricultural digital temperature monitoring is designed, and the overall structure of digital agricultural planting multi-node temperature monitoring is designed by combining it with the upper computer to collect agricultural planting temperature data. Secondly, the characteristics of agricultural planting temperature data are extracted, and the data are transmitted to the upper computer …


Intelligent Food Packaging Design Based On Visual Communication And Multimedia Technology, Yumian Liu, Zekun Wang Apr 2024

Intelligent Food Packaging Design Based On Visual Communication And Multimedia Technology, Yumian Liu, Zekun Wang

Turkish Journal of Agriculture and Forestry

Intelligent food packaging has labels that cover a vast amount of information, but some labels may pop up a lot of information after scanning, which can easily cause interface confusion, and there may be a lack of single display channels, resulting in long search times for consumers. The aim of smart food packaging design research based on visual communication and multimedia technologies is to explore and develop innovative methods to improve the attractiveness, functionality and interaction with consumers of food packaging. These all can directly affect consumers’ purchasing intention. This article was based on visual communication and multimedia technology for …


The Impact Of Fiscal Science And Technology Expenditure On Digital Economy: A New Path To Economic Recovery In The Post-Pandemic Era, Yang Xu, Xiaodong Yang, Qiying Ran Mar 2024

The Impact Of Fiscal Science And Technology Expenditure On Digital Economy: A New Path To Economic Recovery In The Post-Pandemic Era, Yang Xu, Xiaodong Yang, Qiying Ran

Bulletin of Monetary Economics and Banking

In this study, a multi-dimensional digital economy evaluation index system is constructed to explore the impact of fiscal Science and Technology (S&T) expenditure on digital economy development in China. We reveal the following findings. First, we note that the China’s digital economy level as a whole is rising each year, which is less affected by the COVID-19 pandemic. Second, we document that S&T expenditures positively stimulate digital economy development. Finally, we find that the promotion effect of S&T expenditure on the digital economy is statistically significant, and this promotion effect decreases from the southwest to the northeast due to the …


Cybersecurity Fiscal Statecraft Conundrums In South Africa, Sabelo Lyndon Mbokazi Mar 2024

Cybersecurity Fiscal Statecraft Conundrums In South Africa, Sabelo Lyndon Mbokazi

Walden Dissertations and Doctoral Studies

No abstract provided.


Regulating The Internet Of Things: Discrimination, Privacy, And Cybersecurity In The Artificial Intelligence Age, Charlotte A. Tschider Mar 2024

Regulating The Internet Of Things: Discrimination, Privacy, And Cybersecurity In The Artificial Intelligence Age, Charlotte A. Tschider

Denver Law Review

No abstract provided.


An Efficient Privacy-Preserving Framework For Video Analytics, Tian Zhou Mar 2024

An Efficient Privacy-Preserving Framework For Video Analytics, Tian Zhou

Doctoral Dissertations

With the proliferation of video content from surveillance cameras, social media, and live streaming services, the need for efficient video analytics has grown immensely. In recent years, machine learning based computer vision algorithms have shown great success in various video analytic tasks. Specifically, neural network models have dominated in visual tasks such as image and video classification, object recognition, object detection, and object tracking. However, compared with classic computer vision algorithms, machine learning based methods are usually much more compute-intensive. Powerful servers are required by many state-of-the-art machine learning models. With the development of cloud computing infrastructures, people are able …


Insights Into Privacy Protection Research In Ai, Shasha Yu Mar 2024

Insights Into Privacy Protection Research In Ai, Shasha Yu

School of Professional Studies

This paper presents a systematic bibliometric analysis of the artificial intelligence (AI) domain to explore privacy protection research as AI technologies integrate and data privacy concerns rise. Understanding evolutionary patterns and current trends in this research is crucial. Leveraging bibliometric techniques, the authors analyze 8,322 papers from the Web of Science (WoS) database, spanning 1990 to 2023. The analysis highlights IEEE Transactions on Knowledge and Data Engineering and IEEE Access journals as highly influential, the former being an early contributor and the latter emerging as a pivotal source. The study demonstrates substantial disparities in scientific productivity across countries. Specifically, the …


Optimizing Data Access Using Symbolic Links And Machine Learning, Puneet Mahajan Mar 2024

Optimizing Data Access Using Symbolic Links And Machine Learning, Puneet Mahajan

Defensive Publications Series

Traditional data management practices replicate data across data centers and regions to ensure availability and performance. Such data replication can result in high operational costs, complex data management, inefficient resource utilization, etc. This disclosure describes techniques that address the inefficiencies and complexities of existing cloud storage and data access mechanisms by leveraging the simplicity and efficiency of symbolic links for data tables and by dynamically optimizing data access based on usage patterns discovered using machine learning. Unnecessary data replication is reduced, leading to simplified data management, efficient resource utilization, and lower operational costs. Data access in distributed environments is made …


Research On The Impact Of Smart Service Integration On Green Transformation In Manufacturing Industry, Xusheng Chen, Jinshuo Zhang, Yunhui Yang Mar 2024

Research On The Impact Of Smart Service Integration On Green Transformation In Manufacturing Industry, Xusheng Chen, Jinshuo Zhang, Yunhui Yang

Journal of Science and Technology Management

Against the backdrop of the “double carbon” strategy and the new era of high-quality development, green transformation is an inevitable requirement for high-quality development of the manufacturing industry. The devel-opment and application of new-generation digital technologies such as 5G, cloud computing, virtual reality, and artificial intelligence have fostered the emergence of smart services. It can promote service innovation and business model innovation through the synergy of physical products and digital services, providing a new path for the green transformation of the manufacturing. From the perspective of industry integration, this paper constructs an index system for the integration of smart services …


Research On Value Co-Creation Strategy Of The Innovation Network Of Emerging Technology Enterprises In The Digital Context, Caixia Yang, Yan Li Mar 2024

Research On Value Co-Creation Strategy Of The Innovation Network Of Emerging Technology Enterprises In The Digital Context, Caixia Yang, Yan Li

Journal of Science and Technology Management

At present, digital economy has become an important support and development force of the current social economy. With the deepening integration and application of digital technologies such as big data, cloud computing, block chain and artificial intelligence in various fields, it drives the development of cutting-edge emerging technologies such as intelligent vehicles, brain-like intelligence and neural chips, and promotes the communication and interaction between emerging technology enterprises and cooperative enterprises, gradually forming an innovation network of emerging technology enterprises with technological innovation as the core. Each subject realizes value cocreation through the synergistic effect of cooperation and innovation. Therefore, in …


Automating Task Scheduling And Resource Allocation For Shared Computing Resources, Amy Shen, John Schuett, Christine Kingsley Mar 2024

Automating Task Scheduling And Resource Allocation For Shared Computing Resources, Amy Shen, John Schuett, Christine Kingsley

Defensive Publications Series

Optimally scheduling shared computing resources for a variety of tasks with different task-specific resource requests is a difficult problem. Scheduling computational resources is labor intensive, time consuming, error prone, and manual allocation can result in suboptimal use of computing resources. This disclosure describes techniques that train and utilize a machine learning model to automate the task scheduling and resource allocation for the use of shared computing resources. The model is trained on historical records of task requests and corresponding scheduling, allocations, runtime outcomes. From the training data, a score can be computed for each request, indicating the extent to which …


Performance Analysis Of Mobile Edge Computing Deployment Models In 5g Networks, Safaa Alali, Abdulkaim Assalem Mar 2024

Performance Analysis Of Mobile Edge Computing Deployment Models In 5g Networks, Safaa Alali, Abdulkaim Assalem

Jerash for Research and Studies Journal مجلة جرش للبحوث والدراسات

5G networks and Mobile Edge Computing (MEC) are two main pillars of the next technological revolution. The first pillar provides ultra-reliable, high-bandwidth connectivity with ultra-low latency, while the second pillar gives mobile networks cloud computing capabilities at the edge of the network, enabling compute-dense, context-aware services for mobile users. So the next generation of mobile networks will see close integration between computing and communication. Therefore, it was necessary to study the different deployment options for edge hosts in 5G network, to know the effect of those options on the overall performance of the network. In this research, (Omnetpp 6.0) network …


The Impact Of E-Learning On Faculty Members’ Performance: The Mediating Role Of Sustainable Development At Police Science Academy In Sharjah, Ghassan Alomari, Fakhri Bani Doumi, Mohammed Al-Kasasbeh, Imad Rabee, Haitham Alzoubi Mar 2024

The Impact Of E-Learning On Faculty Members’ Performance: The Mediating Role Of Sustainable Development At Police Science Academy In Sharjah, Ghassan Alomari, Fakhri Bani Doumi, Mohammed Al-Kasasbeh, Imad Rabee, Haitham Alzoubi

Jerash for Research and Studies Journal مجلة جرش للبحوث والدراسات

The objective of the research was to assess the influence of electronic education (e-learning) on faculty members’ performance through sustainable development at the Police Science Academy (PSA) in Sharjah.

The analysis unit of the study consisted of all full and part-time faculty members at PSA in Sharjah. Thirty-three questionnaires were distributed by Google Forms, and 30 questionnaires were retrieved. The study is explanatory, and it is quantitative in nature.

The study revealed that e-learning and its dimensions (human resources, technological infrastructure, electronic curriculum, electronic exam, electronic legislation, privacy and security, and organizational culture) are significantly associated with faculty member performance. …


Supervisory Technology As A New Tool For Banking Sector Supervision, Tomasz Dziawgo Mar 2024

Supervisory Technology As A New Tool For Banking Sector Supervision, Tomasz Dziawgo

Journal of Banking and Financial Economics

After last global financial crisis from a decade ago, financial market have been experiencing significant increase in number of regulations. This was especially visible in the banking sector, in which number of post-crisis new regulations amounted to thousands per year. It was not only challenging for banks, that have been spending increasingly more financial resources on compliance, but also for supervisory entities that have to keep track of compliance for every entity on financial market. Due to the fact that supervisory process relies mostly on manual process, it can be both time consuming and inefficient. This is why, not only …