11 research outputs found
A conceptual framework for measuring the acceptance of pervasive learning
The technological innovation and advancements in smart phones and wireless communication have reformed learning techniques such as Pervasive Learning (P-learning), Mobile Learning (m learning) and Electronic Learning (e-learning). P learning is the new form of innovative technologies for learning that occurs at the user’s will at anywhere, anytime and with any mobile or handheld devices.Students using P-learning can overcome the obstacles such as poor facilities in the classroom, gender, cultural
and religious barriers, hectic personal and professional lives by providing flexibility and more than one medium for learning.This research is intended to study the specific factors influencing students as to whether accept and use these new technologies (P-learning).This study extends the existing research on Technology Acceptance Model (TAM) and will develop an integrated model of P-learning acceptance.It is also expected that this research study will help provide strategies for educators in the development and implementation
of courses designed to integrate technology. This study employs mixed research methods for triangulation to get the desired research
results.The data for this research is collected through focus group and a cross sectional questionnaire survey
A conceptual framework for the analysis of determinants of m-commerce acceptance
With the emergence of internet and World Wide Web, traditional businesses got a
new opportunity to compete globally. Traditional bricks-and-mortar businesses became
electronic business (e-business) with the help of Information and Communication
Technology (ICT) tools. Smart phone technology brought a new revolution in e-business
market. A new term of Mobile Commerce (M-Commerce) emerged and set a new trend
in commerce and business. M-commerce usage trend in developing economies still seems
to take very slow steps as compared to developed countries like USA, UK, Australia and
others. The purpose of this study is to extend research on the acceptance of M-Commerce
in context of developing economies. A conceptual framework of some widely used
technology adoption and social psychology theories including, Technology Acceptance
Model (TAM), Innovation Diffusion Theory (IDT), Unified Theory of Acceptance and
Use of Technology (UTAUT), is proposed to diagnose the significant factors of MCommerce
acceptance in developing economies
Acceptance of IoT learning among university students at Pakistan
The Internet of Things abbreviated as an IoT is considered the most
recent innovative and fastest-developing field that is to be applied in
all aspects of life, in particular higher education. It has sparked
interest as well as challenges among academics; the current research
will concentrate on acceptance and adoption of IoT in the higher
educational institutions of Pakistan. IoT supports educators in
environment of learning and can have an impact on how we
interact, connect, and work. In this study, we will look at two
different aspects. The first one is how to teach students, and
secondly how IoT can be used in educational institutions to enhance
learning. This study looks at the factors that affect acceptance of
IoT and use in an academic setting in Pakistan's higher education
institutions. The current research establishes foundation for a
comprehensive framework based on trusted technology and social
psychology models, such as the Use of Technology 2 and Unified
Theory of Acceptance (UTAUT2). The method proposed in this
study is network analysis method to observe users' actions in
relation to several IoT applications in higher education. An in-depth
analysis and consideration of key deliverables which have a major
impact on the Internet of Things (IoT) adoption in Pakistani
educational institutions of higher level, revealed that only a few
applications are heavily used in comparison to all other
applications. This research lays the groundwork for developed
countries to grow adoption and IoT technologies use in higher
education, which will support both students and faculty
Security Based SCURM Process (SUBSCRUM) For Secure Agile Development
This study presents an integrated approach for the consideration of security during agile development. A security-based SCRUM process (SBSCRUM) is introduced by taking advantage of the security patterns presented by security experts which contains the solution for a security threat. In the proposed security based SCRUM process the SCRUM team will be responsible for identifying the expected security threats to the system, in which all the expected threats to the system are modelled using mis-use case diagrams and then these modelled threats are mitigated using the security patterns which provide detailed solution to mitigate the threats and at final stage the security testing is performed to ensure that all the security threats identified are mitigated using security patterns. SBSCRUM is evaluated through the case studies in this paper. SBSCRUM will enable the software developers to develop secure software using agile development methods which lacks in the past
Fine-Tuning Mistral 7b Large Language Model For Python Query Response And Code Generation: A Parameter Efficient Approach
The research delves into the concept of fine-tuning and its unique application to Python queries and code generation. This process involves adjusting the model's parameters to make it more proficient in responding to Python-only queries and generating corresponding code. It underscores the untapped potential of fine-tuning large language models and the significance of combining Parameter-Efficient fine-tuning with quantization to reduce memory usage. This was achieved by the pre-trained language model’s fine-tuning and meticulously evaluating and contrasting it with its base model. Notably, the model was fine-tuned to proficiently respond to Python-only queries and generate corresponding code, a novel and intriguing application of fine-tuning. We utilized Mistral7B-Instruct version 0.2 as our base large language model for fine-tuning. The dataset, sourced from Kaggle, was a collection of Python Question-Answer pairs. Before fine-tuning, we meticulously cleaned and organized the dataset, ensuring its quality by arranging it in descending order based on their rankings. This rigorous and thorough approach instills confidence in the reliability of our results. Our research shows that the fine-tuned model outperformed the base Mistral7B Instruct version 0.2 model in BERTScore and demonstrated a significant performance boost when compared with the HumanEval metric. This clear and substantial improvement further affirms the effectiveness of our approach. Our research is a step forward in the realm of large language models, specifically in the coding sphere. It showcases a substantial improvement in understanding Python queries and generating code snippets. This has profound implications for the current trajectory of Natural Language Generation and Generative AI fields. Our findings act as a pivotal catalyst for further progress
An assessment of proximity technology adoption from a user's perspective
The rapid growth and convenience in mobile technologies has attracted every individual in today’s era. Consumer convenience and comfort has remained key focus in almost every industry and such services are also existing and progressing in the domain of other service. Whereas, stakeholders of digital service providers are trying to change the exchange system from one to other society. Whilst, MPs has advanced in some countries, but few are still facing the resistance by people due to dominancy of old system and lack of MP solutions. Whereas, in Pakistan existing MP services are generally offered by FIs and telecom sector. Despite a major share in the market these stakeholders have not played the important role for driving the country towards digital society and bringing the uncovered population of the country into inclusion network. Therefore, this study aims to assess the obstacles in acceptance and use of MPs by using UTAUT model with external variables
A methodology for incorporating quality assurance practices during software development life cycle
The aim of quality assurance in software development is to
ensure that a software product meets its practical business
specifications and quality requirements. A comprehensive
overview of different software quality requirement and
quality assurance practices have been performed to find out
the most appropriate software quality assurance practices at
different stages of the software development life cycle
(SDLC). A methodology along with its implementation
during SDLC has been proposed in this research paper. The
proposed methodology will help software development
teams to achieve quality assurance goals during software
development
Measuring secure software development awareness and usage among software developers
Abstract: Secure software development practices adoption could be the most influential factor for the future of software
industry. Awareness and knowledge about security mechanisms and secure coding techniques plays a vital role in decision to consider security during software development by the software developers. This study aims to explore the
security and secure software development awareness among software developers. The results of the study related to the use of secure software development methodologies showed a very low level of adoption level by the developers. It was revealed by the respondents that 82.72% respondents have never used any secure development methodology, about 13.67% respondents were using secure software development methodology in their software development from 1 to 4 years, 2.09% respondents using secure software development methodology in their software development from more than five years and only 1.57% respondents were using secure software development methodologies in their software development from less than a year. All the respondents were well aware of the software security but only 22.51% of the respondents were aware of the latest secure software development methodologies
