11 research outputs found

    A conceptual framework for measuring the acceptance of pervasive learning

    Get PDF
    The technological innovation and advancements in smart phones and wireless communication have reformed learning techniques such as Pervasive Learning (P-learning), Mobile Learning (m learning) and Electronic Learning (e-learning). P learning is the new form of innovative technologies for learning that occurs at the user’s will at anywhere, anytime and with any mobile or handheld devices.Students using P-learning can overcome the obstacles such as poor facilities in the classroom, gender, cultural and religious barriers, hectic personal and professional lives by providing flexibility and more than one medium for learning.This research is intended to study the specific factors influencing students as to whether accept and use these new technologies (P-learning).This study extends the existing research on Technology Acceptance Model (TAM) and will develop an integrated model of P-learning acceptance.It is also expected that this research study will help provide strategies for educators in the development and implementation of courses designed to integrate technology. This study employs mixed research methods for triangulation to get the desired research results.The data for this research is collected through focus group and a cross sectional questionnaire survey

    A conceptual framework for the analysis of determinants of m-commerce acceptance

    No full text
    With the emergence of internet and World Wide Web, traditional businesses got a new opportunity to compete globally. Traditional bricks-and-mortar businesses became electronic business (e-business) with the help of Information and Communication Technology (ICT) tools. Smart phone technology brought a new revolution in e-business market. A new term of Mobile Commerce (M-Commerce) emerged and set a new trend in commerce and business. M-commerce usage trend in developing economies still seems to take very slow steps as compared to developed countries like USA, UK, Australia and others. The purpose of this study is to extend research on the acceptance of M-Commerce in context of developing economies. A conceptual framework of some widely used technology adoption and social psychology theories including, Technology Acceptance Model (TAM), Innovation Diffusion Theory (IDT), Unified Theory of Acceptance and Use of Technology (UTAUT), is proposed to diagnose the significant factors of MCommerce acceptance in developing economies

    Acceptance of IoT learning among university students at Pakistan

    No full text
    The Internet of Things abbreviated as an IoT is considered the most recent innovative and fastest-developing field that is to be applied in all aspects of life, in particular higher education. It has sparked interest as well as challenges among academics; the current research will concentrate on acceptance and adoption of IoT in the higher educational institutions of Pakistan. IoT supports educators in environment of learning and can have an impact on how we interact, connect, and work. In this study, we will look at two different aspects. The first one is how to teach students, and secondly how IoT can be used in educational institutions to enhance learning. This study looks at the factors that affect acceptance of IoT and use in an academic setting in Pakistan's higher education institutions. The current research establishes foundation for a comprehensive framework based on trusted technology and social psychology models, such as the Use of Technology 2 and Unified Theory of Acceptance (UTAUT2). The method proposed in this study is network analysis method to observe users' actions in relation to several IoT applications in higher education. An in-depth analysis and consideration of key deliverables which have a major impact on the Internet of Things (IoT) adoption in Pakistani educational institutions of higher level, revealed that only a few applications are heavily used in comparison to all other applications. This research lays the groundwork for developed countries to grow adoption and IoT technologies use in higher education, which will support both students and faculty

    Security Based SCURM Process (SUBSCRUM) For Secure Agile Development

    No full text
    This study presents an integrated approach for the consideration of security during agile development. A security-based SCRUM process (SBSCRUM) is introduced by taking advantage of the security patterns presented by security experts which contains the solution for a security threat. In the proposed security based SCRUM process the SCRUM team will be responsible for identifying the expected security threats to the system, in which all the expected threats to the system are modelled using mis-use case diagrams and then these modelled threats are mitigated using the security patterns which provide detailed solution to mitigate the threats and at final stage the security testing is performed to ensure that all the security threats identified are mitigated using security patterns. SBSCRUM is evaluated through the case studies in this paper. SBSCRUM will enable the software developers to develop secure software using agile development methods which lacks in the past

    Fine-Tuning Mistral 7b Large Language Model For Python Query Response And Code Generation: A Parameter Efficient Approach

    No full text
    The research delves into the concept of fine-tuning and its unique application to Python queries and code generation. This process involves adjusting the model's parameters to make it more proficient in responding to Python-only queries and generating corresponding code. It underscores the untapped potential of fine-tuning large language models and the significance of combining Parameter-Efficient fine-tuning with quantization to reduce memory usage. This was achieved by the pre-trained language model’s fine-tuning and meticulously evaluating and contrasting it with its base model. Notably, the model was fine-tuned to proficiently respond to Python-only queries and generate corresponding code, a novel and intriguing application of fine-tuning. We utilized Mistral7B-Instruct version 0.2 as our base large language model for fine-tuning. The dataset, sourced from Kaggle, was a collection of Python Question-Answer pairs. Before fine-tuning, we meticulously cleaned and organized the dataset, ensuring its quality by arranging it in descending order based on their rankings. This rigorous and thorough approach instills confidence in the reliability of our results. Our research shows that the fine-tuned model outperformed the base Mistral7B Instruct version 0.2 model in BERTScore and demonstrated a significant performance boost when compared with the HumanEval metric. This clear and substantial improvement further affirms the effectiveness of our approach. Our research is a step forward in the realm of large language models, specifically in the coding sphere. It showcases a substantial improvement in understanding Python queries and generating code snippets. This has profound implications for the current trajectory of Natural Language Generation and Generative AI fields. Our findings act as a pivotal catalyst for further progress

    An assessment of proximity technology adoption from a user's perspective

    No full text
    The rapid growth and convenience in mobile technologies has attracted every individual in today’s era. Consumer convenience and comfort has remained key focus in almost every industry and such services are also existing and progressing in the domain of other service. Whereas, stakeholders of digital service providers are trying to change the exchange system from one to other society. Whilst, MPs has advanced in some countries, but few are still facing the resistance by people due to dominancy of old system and lack of MP solutions. Whereas, in Pakistan existing MP services are generally offered by FIs and telecom sector. Despite a major share in the market these stakeholders have not played the important role for driving the country towards digital society and bringing the uncovered population of the country into inclusion network. Therefore, this study aims to assess the obstacles in acceptance and use of MPs by using UTAUT model with external variables

    A methodology for incorporating quality assurance practices during software development life cycle

    No full text
    The aim of quality assurance in software development is to ensure that a software product meets its practical business specifications and quality requirements. A comprehensive overview of different software quality requirement and quality assurance practices have been performed to find out the most appropriate software quality assurance practices at different stages of the software development life cycle (SDLC). A methodology along with its implementation during SDLC has been proposed in this research paper. The proposed methodology will help software development teams to achieve quality assurance goals during software development

    Measuring secure software development awareness and usage among software developers

    No full text
    Abstract: Secure software development practices adoption could be the most influential factor for the future of software industry. Awareness and knowledge about security mechanisms and secure coding techniques plays a vital role in decision to consider security during software development by the software developers. This study aims to explore the security and secure software development awareness among software developers. The results of the study related to the use of secure software development methodologies showed a very low level of adoption level by the developers. It was revealed by the respondents that 82.72% respondents have never used any secure development methodology, about 13.67% respondents were using secure software development methodology in their software development from 1 to 4 years, 2.09% respondents using secure software development methodology in their software development from more than five years and only 1.57% respondents were using secure software development methodologies in their software development from less than a year. All the respondents were well aware of the software security but only 22.51% of the respondents were aware of the latest secure software development methodologies
    corecore