V. Packard
Hasil untuk "Information technology"
Menampilkan 20 dari ~25931116 hasil · dari CrossRef, arXiv, DOAJ, Semantic Scholar
A. Lee, Soomin Son, Kyung-Kyu Kim
Gail Salaway, J. Caruso
R. Zammuto, Terri L. Griffith, A. Majchrzak et al.
Meng Ma, Ritu Agarwal
Wahyu Kusuma, Prince Brave Guhyapati
A. Bharadwaj, Sundar G. Bharadwaj, B. Konsynski
Richard Platt
D. Leidner, S. Jarvenpaa
R. Santhanam, Edward Hartono
Erik Brynjolfsson, L. Hitt
Eric Overby, A. Bharadwaj, V. Sambamurthy
Paul P. Tallon, K. Kraemer, V. Gurbaxani
N. Meghanathan, D. Nagamalai
This paper presents a Genetic Algorithm approach to solve a specific examination timetabling problem which is common in Japanese Universities. The model is programmed in Excel VBA programming language, which can be run on the Microsoft Office Excel worksheets directly. The model uses direct chromosome representation. To satisfy hard and soft constraints, constraint-based initialization operation, constraint-based crossover operation and penalty points system are implemented. To further improve the result quality of the algorithm, this paper designed an improvement called initial population pre-training. The proposed model was tested by the real data from Sophia University, Tokyo, Japan. The model shows acceptable results, and the comparison of results proves that the initial population pre-training approach can improve the result quality.
Ho-Chang Chae, C. Koh, V. Prybutok
Morteza Ghobakhloo
This study aims to identify and analyse factors that determine the implementation of Information and Digital Technologies (IDT) of smart manufacturing. By performing a state-of-the-art and content-driven review of literature, consulting a group of experts from academia and industry, and implementing interpretive structural modelling methodology, the study identified eleven enabling factors and mapped the contextual interrelationships among them. The study further explained the complex precedence relationships that exist among determinants of smart manufacturing IDT adoption. Results showed that perceived benefits and management support are the two driver determinants that act as stepping-stones in the implementation of smart manufacturing IDT. Operations technology maturity and cybersecurity maturity were found to be the dependent determinants of smart manufacturing IDT implementation and highly driven by the linkage and driver determinates. The findings are expected to assist academicians, industrialists, and the policymakers with achieving a detailed understanding of smart manufacturing transformation processes, and conditions that facilitate the manufacturing digitalisation in the Industry 4.0 era.
Sonia Katyal
Twenty-five years ago, Joel Reidenberg argued that technology itself, not just law and regulation, imposes rules on communities in the Information Society. System design choices like network architecture and configurations create regulatory norms he termed "Lex Informatica"-referencing the merchant-driven medieval "Lex Mercatoria" that emerged independent of sovereign control. Today we face different challenges requiring us to revisit Reidenberg's insights and examine the consequences of that earlier era. While Lex Informatica provided a framework for analyzing the internet's birth, we now confront the aftereffects of decades of minimal or absent regulation. Critical questions emerge: When technological social norms develop outside clear legal restraints, who benefits and who suffers? This new era demands infrastructural reform focused on the interplay between public and private regulation and self-regulation, weighing both costs and benefits. Rather than showcasing the promise of yesterday's internet age, today's events reveal the pitfalls of information libertarianism and underscore the urgent need for new approaches to information regulation. This Issue presents articles from two symposiums-one on Lex Informatica and another on race and technology law. Their conversation is now essential. Together, these papers demonstrate what I call the "Lex Reformatica" of today's digital age. This collection shows why scholars, lawyers, and legislators must return to Reidenberg's foundational work and update its trajectory toward a reform-focused approach designed for our current era.
Sumesh Kharnotia, Bhavna Arora, Ravdeep Kour
The extensive embrace of Android has amplified malware risks, resulting in a need for better detection methods. This article investigates the area of static analysis, which analyses applications without execution by examining code and manifest files. We focus on studies from 2022 to 2025, regarding the feature extraction, datasets, feature selection, and approaches based on Machine Learning (ML) and Deep Learning (DL). We conclude by defining the major limitations and research gaps presented in studies regarding static analysis, and many insights for potential development of detection models that are efficient, accurate, and lightweight to improve detection patterns of Android malware.
Isabel Pedersen, Ann Hill Duin
This short paper provides a means to classify augmentation technologies to reconceptualize them as sociotechnical, discursive and rhetorical phenomena, rather than only through technological classifications. It identifies a set of value systems that constitute augmentation technologies within discourses, namely, the intent to enhance, automate, and build efficiency. This short paper makes a contribution to digital literacy surrounding augmentation technology emergence, as well as the more specific area of AI literacy, which can help identify unintended consequences implied at the design stages of these technologies.
Junchao Yang, Ziyang Peng
Countries worldwide are increasingly focused on addressing the imbalance between the supply and demand for EV charging infrastructure, with the community-shared charging post (CSCP) co-construction project emerging as a promising solution. The broad participation and investment support of the residents are the keys to the success of the CSCP co-construction project. This study, grounded in the theory of planned behavior (TPB) from social psychology, incorporated factors such as community identity, perceived green value, economic benefit, uncivil behaviors, and perceived risk to construct a structural model explaining community residents’ intention to invest in the CSCP co-construction project. This research confirmed that (1) 85.73% of respondents expressed strong recognition of the CSCP co-construction project, with a mean recognition score of 5.56 out of a possible 7; (2) an individual’s social-related perceptions, including the subjective norms and community identity are the strongest determinant of the intention to invest in the CSCP co-construction project; (3) the willingness to invest in CSCP co-construction project differs significantly between the EV group and the non-EV group. Economic benefit was significant only for the non-EV group, while uncivil behaviors were significant only for the EV group. These results provide valuable guidelines for governments and corporations that are promoting or pursuing sharing community for the residents.
Halaman 6 dari 1296556