Happiness and organizational commitment in the workers of the fishing sector of the city of Chimbote - 2023 DOI Open Access

et. al. Miguel Angel Cancharí Preciado

Periodicals of Engineering and Natural Sciences (PEN), Journal Year: 2023, Volume and Issue: 11(4), P. 116 - 116

Published: Aug. 30, 2023

In this study, the relationship between happiness and organizational commitment in workers fishing sector of City Chimbote was investigated. A correlational quantitative approach a non-experimental cross-sectional research design were used to determine association these two constructs verify if there is significant them. To collect data, survey applied sample 342 sector. Two measurement instruments assess commitment. The participants provided information about their level subjective degree organization which they worked. results revealed positive correlation These findings support idea that workplace can have impact on employee engagement with organization. are consistent previous has also found This suggests promoting at work be beneficial fostering However, it important note study its limitations. It focused specific industry particular geographic location, so may not generalizable other industries or locations. addition, self-report measure used, subject bias future research, would useful explore relationships different contexts consider using more objective measures various sources happiness. help obtain complete understanding how related

Language: Английский

Exploring the ethical considerations of using Chat GPT in university education DOI Open Access

et. al. Jorge Jinchuña Huallpa

Periodicals of Engineering and Natural Sciences (PEN), Journal Year: 2023, Volume and Issue: 11(4), P. 105 - 105

Published: Aug. 30, 2023

This study investigates the moral dilemmas that arise with incorporating Chat GPT into higher education, a focus on situation in Latinoamerican institutions of learning. The surveyed 220 people via online questionnaire to learn more about their experiences and motivations for using AI-powered conversational agents. An overview demographics participants was provided through descriptive statistics. investigation subject at hand lays groundwork further research. It also reveals hidden meanings observed phenomena, it suggests possible solutions problems have been uncovered. research looks how AI systems chatbots can supplement human knowledge judgment, as well potential drawbacks. results showed thought integration moderately accessible had positive social attitudes. They understood value responsibility creating individualized educational opportunities. Participants stressed necessity explicit institutional standards regarding privacy data security. Gender, age, sense accessibility, attitude, opinions, personal experience, security, guidelines, learning were found affect participants' reliance regression analysis. findings shed light education is complicated by factors such individual beliefs, cultural norms, ethical problems. busy schedules students may be accommodated resources they need succeed made available thanks this adaptability. In addition, natural language processing models offer instantaneous help text chat, voice, or video. To fully grasp consequences lead creation responsible implementation techniques, proposes additional qualitative investigations, longitudinal studies, comparative across diverse contexts required. Closing these gaps will move field forward ways are beneficial classroom.

Language: Английский

Citations

65

Exploring Software Infrastructures for Enhanced Learning Environments to Empowering Education DOI Open Access
Ronald M. Hernández, Walter Antonio Campos-Ugaz, Segundo Juan Sánchez Tarrillo

et al.

Journal of Wireless Mobile Networks Ubiquitous Computing and Dependable Applications, Journal Year: 2024, Volume and Issue: 15(1), P. 231 - 243

Published: March 29, 2024

Recently, the education sector has undergone a notable change due to incorporation of technology, resulting in emergence Educational Technology (EdTech). This new trend completely transformed learning process for students, teaching methods educators, and operations educational institutions. Due EdTech, become simpler access, engaging, efficient, providing customized diverse experiences. article explores into significant influence EdTech on field promising opportunities it offers future. enabler, allowing institutions meet evolving student needs cultivate skillsets without being limited by geographical barriers. integrates digital technological media with conventional instruction enable various forms learning, offering adaptability, enhancing engagement, high-quality solutions. tools empower educators track encourage interactive creative experiences, stand human-centred focusing critical thinking, innovation, entrepreneurial activity. Exploring deeper relationships between data as well predicting how students do school been made possible through mining. Presented is novel model utilizing machine computational forecast using their midterm exam results. Various algorithms were assessed improving performance final exam. study comprehensively examines different technologies recommend unified that could serve solid framework classroom teaching.

Language: Английский

Citations

8

Enhancing Data Protection and Covert Communication in Cloud Environments with Isogeny Based Cryptography and Spread Spectrum Steganography DOI

D. Shivaramakrishna,

M. Nagaratna

Journal of Machine and Computing, Journal Year: 2025, Volume and Issue: unknown, P. 307 - 320

Published: Jan. 3, 2025

The rise of cloud computing has changed how individuals and organizations store communicate data, but it additionally caused significant concerns about information security confidentiality. In order to improve data protection allow covert communication in environments, this research suggests a unique approach that combines spread spectrum steganography with isogeny-based cryptography as solution these problems. main goal is make less difficult for two users, User 1 2, private kept infrastructure through safe transfer. This technology depends on cryptography, which creates channels between users by taking use the mathematical features isogenies elliptic curves. Additionally, technique provides from quantum assaults, consequently boosting security. Spread Spectrum Steganography (SSIS), second element, used secretly include shared secrets inside digital images. To protect secrets, SSIS encrypts, duplicates, interleaves, employs pseudorandom noise sequences carriers. stegoimage then removed filter approximate original image. By performing this, made integrate original, thereby hiding secrets. Users 2 can safely share combining reducing potential risks associated parties are unreliable. transmitted images, while secure channels. These methods combined build an effective structure sharing settings. novel method solves important security, secrecy, communication, thus makes addition developing field

Language: Английский

Citations

0

Data Fortress- File Sharing System Enhancing the Features of Blockchain DOI
Puneet Goswami, Victor Hugo C. de Albuquerque,

Lakshita Aggarwal

et al.

Lecture notes in computer science, Journal Year: 2025, Volume and Issue: unknown, P. 297 - 312

Published: Jan. 1, 2025

Language: Английский

Citations

0

E-learning in the Cloud Computing Environment: Features, Architecture, Challenges and Solutions DOI Open Access

Mohammed Jawad Al-Dujaili,

Haider TH. Salim ALRikabi, Mohammad K. Abdul-Hussein

et al.

International Journal of Engineering Pedagogy (iJEP), Journal Year: 2024, Volume and Issue: 14(1), P. 112 - 128

Published: Jan. 30, 2024

The need to constantly and consistently improve the quality quantity of educational system is essential. E-learning has emerged from rapid cycle change expansion new technologies. Advances in information technology have increased network bandwidth, data access speed, reduced storage costs. In recent years, implementation cloud computing settings garnered interest major companies, leading substantial investments this area. Cloud improves engineering education by providing an environment that can be accessed anywhere allowing resources on demand. a term used describe provision hosting services Internet. It predicted next generation architecture offers great potential enhance productivity reduce service providers offer their processing memory users. By paying for use these resources, users them calculations anytime anywhere. provides ability increase productivity, save power, converting power into tool with constant capabilities. supports remote its own set characteristics requires unique strategy. Students wide variety instructional materials at any time location, thanks computing. Additionally, they share other community members. e-learning several advantages, such as unlimited high scalability, costs associated e-learning. An improvement teaching learning achieved through flexible computing, which educators students. light this, current research presents suitable superior option systems.

Language: Английский

Citations

4

Digital citizenship for faculty of Iraqi universities DOI Open Access

Maha Saleem Kahlaf Wahib,

Zainab Aziz Ahmed Alamiry,

Ban Hassan Majeed

et al.

Periodicals of Engineering and Natural Sciences (PEN), Journal Year: 2023, Volume and Issue: 11(2), P. 262 - 262

Published: April 11, 2023

Digital Citizenship (DC) is a set of rules, controls, standards, norms, ideas, and principles followed in the optimal proper use technology, which citizens, young old, need to contribute progress nation. In short, it guidance protection, benefits modern technologies, protection from their dangers. Or more precisely, smart approach technology. The concept digital citizenship has strong relationship with education system, so academics higher scientific research institutions must be most experienced, effective among students this field. Especially after Corona pandemic trend that universe gone through towards using internet all areas life, including education, especially integrated become very important for citizen digital. This study dealt sample university professors (200) questionnaires. All who belong colleges human specialization possess citizenship. There are no differences between gender except axis, was favor teaching staff male. addition specialization, science.

Language: Английский

Citations

10

Information and Communication Technology and its Impact on Improving the Quality of Engineering Education Systems DOI Open Access
Haider TH. Salim ALRikabi,

Mohammed Jawad Al-Dujaili,

Ban Hassan Majeed

et al.

International Journal of Engineering Pedagogy (iJEP), Journal Year: 2024, Volume and Issue: 14(1), P. 4 - 19

Published: Jan. 30, 2024

The emergence of the remarkable phenomenon information and communication technology (ICT) in last two decades twentieth century, its integration into formal education systems leading countries, has expanded learning opportunities facilitated easy access to educational resources. Due vast amount available, there is a growing emphasis on management. This approach allows students enhance their by utilizing various tools visual aids. These help teaching training engaging students’ different senses, making more realistic, practical, enjoyable. quality effectiveness are among most important concerns for developers, decision-makers any country. areas one fields that undergone fundamental changes with technology. Information been recognized as an effective tool process. In this research, we will discuss role ICT impact enhancing systems. results demonstrate plays design, planning, implementation, learning, evaluation, structure education. includes aspects such timing, suitability, accuracy, adequacy, realism, speed transmission, accuracy cost reduction, effectiveness. Based aforementioned points, institutions must offer suitable framework integrating through thorough planning.

Language: Английский

Citations

3

Confimizer: A Novel Algorithm to Optimize Cloud Resource by Confidentiality-Cost Trade-Off Using BiLSTM Network DOI Creative Commons
Sandesh Achar, Nuruzzaman Faruqui, Anusha Bodepudi

et al.

IEEE Access, Journal Year: 2023, Volume and Issue: 11, P. 89205 - 89217

Published: Jan. 1, 2023

The world is expiring a 23% annual data growth rate and projected to have total surplus volume of 175 Zettabytes by 2025. It imposes significant challenges for small medium-sized businesses allocate funds large-size storage. initial large upfront maintenance costs made cloud storage services popular. comes with confidentiality concerns. Encrypting before storing it in the most effective solution this challenge. decrypting volumes massive amounts expensive resources. Storing plain text reduces system load expenditure but introduces This paper proposed Confimizer, novel algorithm, optimize resources reduce balancing trade-off between cost. overload 13.75%, saving 9.20% expenditure. saves 12.33% API calls 52.99%. Confimizer uses an optimized BiLSTM network that classifies according level 84.00% accuracy, 76.92% precision, 74.47% recall, 75.01 F1 score. innovative approach, architecture, outstanding performance make unique resource optimization algorithm.

Language: Английский

Citations

7

A Case Study of Princess Sumaya University for Technology (PSUT) Engineering Students’ Perceptions of Utilizing Simulation Software via Online Learning DOI Open Access
Najeh Rajeh Alsalhi, Ayman Faza, Abdallah Qusef

et al.

International Journal of Engineering Pedagogy (iJEP), Journal Year: 2024, Volume and Issue: 14(1), P. 96 - 111

Published: Jan. 30, 2024

The primary goal of this research has been to examine the perceptions related use simulation software in context e-learning at Engineering PSUT Jordan, which is acknowledged as one leading private universities country. present study and a descriptive utilized 25-item survey given 270 students. findings indicate that, according students’ subjective viewpoint, effectiveness online learning was observed be significantly high. This observation supported by an average score 3.89 standard deviation 0.959, indicating relatively consistent perception among participants. study’s results that there were no significant variations terms academic year, computer skills, student GPA or gender parameters. underscore importance incorporating higher educational institutions improve teaching experience.

Language: Английский

Citations

2

Using a Chaotic Digital System to Generate Random Numbers for Secure Communication on 5G Networks DOI Creative Commons
Haider TH. Salim ALRikabi,

Ibtisam A. Aljazaery,

Abdul Hadi M. Alaidi

et al.

Engineering Technology & Applied Science Research, Journal Year: 2024, Volume and Issue: 14(2), P. 13598 - 13603

Published: April 2, 2024

There are several encryption system applications in 5G networks where rapid response is needed, particularly the military, health sector, traffic, and vehicular movement. This article presents a proposed data security for that fortifies of network through use synchronized chaotic systems to produce pseudo-random numbers. The technique by which random numbers generated during procedures closely associated with security. Many used models as bases wide variety data. In this study, was carried out using data, including two three-dimensional color images audio signals varying lengths, addition Fast Fourier Transform (FFT) ingredient energy wave. results revealed algorithm deployed process performed well. Simulations were MATLAB.

Language: Английский

Citations

2