research literature
Recently Published Documents


TOTAL DOCUMENTS

4307
(FIVE YEARS 1726)

H-INDEX

83
(FIVE YEARS 12)

2022 ◽  
Vol 22 (1) ◽  
pp. 1-46
Author(s):  
Sarah Heckman ◽  
Jeffrey C. Carver ◽  
Mark Sherriff ◽  
Ahmed Al-zubidy

Context. Computing Education Research (CER) is critical to help the computing education community and policy makers support the increasing population of students who need to learn computing skills for future careers. For a community to systematically advance knowledge about a topic, the members must be able to understand published work thoroughly enough to perform replications, conduct meta-analyses, and build theories. There is a need to understand whether published research allows the CER community to systematically advance knowledge and build theories. Objectives. The goal of this study is to characterize the reporting of empiricism in Computing Education Research literature by identifying whether publications include content necessary for researchers to perform replications, meta-analyses, and theory building. We answer three research questions related to this goal: (RQ1) What percentage of papers in CER venues have some form of empirical evaluation? (RQ2) Of the papers that have empirical evaluation, what are the characteristics of the empirical evaluation? (RQ3) Of the papers that have empirical evaluation, do they follow norms (both for inclusion and for labeling of information needed for replication, meta-analysis, and, eventually, theory-building) for reporting empirical work? Methods. We conducted a systematic literature review of the 2014 and 2015 proceedings or issues of five CER venues: Technical Symposium on Computer Science Education (SIGCSE TS), International Symposium on Computing Education Research (ICER), Conference on Innovation and Technology in Computer Science Education (ITiCSE), ACM Transactions on Computing Education (TOCE), and Computer Science Education (CSE). We developed and applied the CER Empiricism Assessment Rubric to the 427 papers accepted and published at these venues over 2014 and 2015. Two people evaluated each paper using the Base Rubric for characterizing the paper. An individual person applied the other rubrics to characterize the norms of reporting, as appropriate for the paper type. Any discrepancies or questions were discussed between multiple reviewers to resolve. Results. We found that over 80% of papers accepted across all five venues had some form of empirical evaluation. Quantitative evaluation methods were the most frequently reported. Papers most frequently reported results on interventions around pedagogical techniques, curriculum, community, or tools. There was a split in papers that had some type of comparison between an intervention and some other dataset or baseline. Most papers reported related work, following the expectations for doing so in the SIGCSE and CER community. However, many papers were lacking properly reported research objectives, goals, research questions, or hypotheses; description of participants; study design; data collection; and threats to validity. These results align with prior surveys of the CER literature. Conclusions. CER authors are contributing empirical results to the literature; however, not all norms for reporting are met. We encourage authors to provide clear, labeled details about their work so readers can use the study methodologies and results for replications and meta-analyses. As our community grows, our reporting of CER should mature to help establish computing education theory to support the next generation of computing learners.


Author(s):  
Thanh Cong Truong ◽  
Jan Plucar ◽  
Bao Quoc Diep ◽  
Ivan Zelinka

<p>Recent years have witnessed a dramatic growth in utilizing computational intelligence techniques for various domains. Coherently, malicious actors are expected to utilize these techniques against current security solutions. Despite the importance of these new potential threats, there remains a paucity of evidence on leveraging these research literature techniques. This article investigates the possibility of combining artificial neural networks and swarm intelligence to generate a new type of malware. We successfully created a proof of concept malware named X-ware, which we tested against the Windows-based systems. Developing this proof of concept may allow us to identify this potential threat’s characteristics for developing mitigation methods in the future. Furthermore, a method for recording the virus’s behavior and propagation throughout a file system is presented. The proposed virus prototype acts as a swarm system with a neural network-integrated for operations. The virus’s behavioral data is recorded and shown under a complex network format to describe the behavior and communication of the swarm. This paper has demonstrated that malware strengthened with computational intelligence is a credible threat. We envisage that our study can be utilized to assist current and future security researchers to help in implementing more effective countermeasures</p>


2022 ◽  
Vol 54 (9) ◽  
pp. 1-38
Author(s):  
Gábor E. Gévay ◽  
Juan Soto ◽  
Volker Markl

Over the past decade, distributed dataflow systems (DDS) have become a standard technology. In these systems, users write programs in restricted dataflow programming models, such as MapReduce, which enable them to scale out program execution to a shared-nothing cluster of machines. Yet, there is no established consensus that prescribes how to extend these programming models to support iterative algorithms. In this survey, we review the research literature and identify how DDS handle control flow, such as iteration, from both the programming model and execution level perspectives. This survey will be of interest for both users and designers of DDS.


2022 ◽  
Vol 69 (1) ◽  
Author(s):  
Nima Amani ◽  
Keyvan Safarzadeh

AbstractThe objective of this study is to evaluate RM in small projects in Iran using identification of status, barriers, and the impact of RM on project performance. In this study, theoretical foundations and research literature were first developed through library, and then a questionnaire about these variables was designed and distributed among a number of experts in the active construction companies. Data were collected from 40 projects submitted by 25 experts from 5 executive companies. According to the studies, 10 barriers are identified as major obstacles to RM implementation in such projects, prioritized as follows: (1) lack of potential benefits, (2) not economical, (3) lack of time, (4) lack of budget, (5) lack of knowledge, (6) lack of government legislation, (7) lack of manpower, (8) low profit margin, (9) complexity of analytical tools, and (10) competition among SMCs. The findings of this research can provide an in-depth understanding of RM in small projects in Iran and make benefits of RM convincing to the participants of small projects.


2022 ◽  
pp. 026921632110508
Author(s):  
Claire A Collins

Background: Speech and language therapy in palliative care is a developing discipline of clinical practice. Research literature has highlighted that undergraduate palliative care education in speech and language therapy is inconsistent and inadequate. However, limited research has been carried out to date in relation to student speech and language therapists and palliative care. Aim: To explore the role of speech and language therapists in palliative care from the perspective of speech and language therapy students in Ireland. Design: A qualitative descriptive research study was conducted, involving focus group interviews. Setting/participants: Purposive sampling was used to recruit 12 student speech and language therapists from one university site for this study. Undergraduate second, third and fourth year students were eligible for inclusion. Results: This study revealed that undergraduate student speech and language therapists collectively agree that there is a role for speech and language therapy in palliative care. Although students acknowledged that speech and language therapists can make a positive difference to patients’ lives, and academic lectures were positively received, insufficient exposure to palliative care has resulted in fear, uncertainty and a lack of confidence amongst student speech and language therapists. Conclusions: A greater emphasis on palliative care is needed in undergraduate speech and language therapy education to ensure confidence and competency development. An exploration of student speech and language therapists’ experiences in a specialist palliative care unit would be advantageous to determine the appropriateness of this setting for clinical placements.


2022 ◽  
Vol 6 ◽  
Author(s):  
W. Jake Thompson ◽  
Brooke Nash

Learning progressions and learning map structures are increasingly being used as the basis for the design of large-scale assessments. Of critical importance to these designs is the validity of the map structure used to build the assessments. Most commonly, evidence for the validity of a map structure comes from procedural evidence gathered during the learning map creation process (e.g., research literature, external reviews). However, it is also important to provide support for the validity of the map structure with empirical evidence by using data gathered from the assessment. In this paper, we propose a framework for the empirical validation of learning maps and progressions using diagnostic classification models. Three methods are proposed within this framework that provide different levels of model assumptions and types of inferences. The framework is then applied to the Dynamic Learning Maps® alternate assessment system to illustrate the utility and limitations of each method. Results show that each of the proposed methods have some limitations, but they are able to provide complementary information for the evaluation of the proposed structure of content standards (Essential Elements) in the Dynamic Learning Maps assessment.


2022 ◽  
Author(s):  
Rebecca Bolante ◽  
Cass Dykeman

Threat assessment and management in higher education is still in the early stages of development. Little is noted in the research literature about the practices of threat assessment teams in this environment, particularly in community colleges. To fill this knowledge gap, a random national sample of 15% (n = 148) of public community colleges were surveyed as to: (a) threat assessment practices, (b) continuing education needs, and (c) training delivery preferences. Lead threat assessment practitioners were surveyed from those institutions. A total of 113 participants returned a completed survey. This number represented a return rate of 76%. A post hoc power analysis reported an actual power (i.e., 1-β error probability) of 0.84. The professional breakdown of respondents was law enforcement/security (n = 52), college administration (n = 55) and other (n = 6). The vast majority (73%) of the community colleges operated with a formalized threat assessment team, yet 67% of respondents reported fewer than 40 hours of threat assessment training. The leading types of team composition were: (a) employees only (57%), and (b) mix of employees and outside personnel (32%). Most college threat assessment teams addressed more than just students as threat sources (69%). The top continuing education needs reported ranged from legal implications to advanced training of threat assessment and management. Inferential statistical analyses revealed that, in reference to their professional background, threat assessment practitioners similarly rank their: (a) continuing education needs, and (b) training delivery preferences (i.e., in person vs. online). Implications for both research and practice were discussed.


Author(s):  
Steven Foltz ◽  
Fang Wu ◽  
Nasab Ghazal ◽  
Jennifer Kwong ◽  
H. Criss Hartzell ◽  
...  

Limb-girdle muscular dystrophy R12 (LGMD-R12) is caused by recessive mutations in the Anoctamin-5 gene (ANO5, TMEM16E). Although ANO5 myopathy is not X-chromosome linked, we performed a meta-analysis of the research literature and found that three-quarters of LGMD-R12 patients are males. Females are less likely to present with moderate to severe skeletal muscle and/or cardiac pathology. Because these sex differences could be explained in several ways, we compared males and females in a mouse model of LGMD-R12. This model recapitulates the sex differences in human LGMD-R12. Only male Ano5-/- mice had elevated serum creatine kinase after exercise and exhibited defective membrane repair after laser injury. In contrast, by these measures, female Ano5-/- mice were indistinguishable from wild type. Despite these differences, both male and female Ano5-/- mice exhibited exercise intolerance. While exercise intolerance of male mice can be explained by skeletal muscle dysfunction, echocardiography revealed that Ano5-/- female mice had features of cardiomyopathy that may be responsible for their exercise intolerance. These findings heighten concerns that mutations of ANO5 in humans may be linked to cardiac disease.


2022 ◽  
Vol 9 (1) ◽  
pp. 12-13
Author(s):  
Karla Jacobsen ◽  
Laurence Roy ◽  
Sally Richmond ◽  
Isabelle Boutemeur ◽  
Eve De Macar ◽  
...  

In Canada, recent conservative estimates report upwards of 235,000 individuals are homeless on a given night. Of those experiencing precarious housing situations, women make up approximately 30% and are among the most vulnerable. Their residential insecurity has been further exacerbated with the community and social restrictions of the COVID-19 pandemic. Existing resources that assist women experiencing homelessness or housing insecurity are often stretched to the limit dealing with emergency and crisis housing situations, with less focus on post-shelter supports. To address this issue, a community-based participatory research initiative ‘Project Lotus - Hope Together’ was established in Montreal. Grounded in the World Health Organization’s Commission on Social Determinants of Health Framework, the overarching goal of this research is to co-design a housing supports program for women leaving a shelter stay. We created a cross-sectorial Advisory Committee consisting of women with lived experiences of homelessness, service providers, community leaders, and researchers. To date, we have conducted preliminary research (literature review, interviews with women with lived experience of homelessness, stakeholder meetings) to identity what has assisted women through this transition, and what barriers exist. We have also held virtual community consultation meetings to discuss preliminary findings of recommendations of key components that should be in a post-shelter support program for women. This presentation outlines the current findings and highlights the importance of participatory research. Implementing whole person care in the area of women’s homelessness requires both a comprehensive and individualized approach to help women and children secure home, health, and a sustainable future.


2022 ◽  
Vol 2022 ◽  
pp. 1-14
Author(s):  
Jianhua Dai ◽  
Jingxin Xu

Mobile Internet-based intelligent media has become a popular academic topic. This study uses the CiteSpace visualisation tool and Scientific Citation Index Expanded database to comb the existing research in the field of intelligent media from a quantitative perspective. A total of 7248 English papers were published on the topic of “intelligent media” from 2012 to 2021, and 145 highly cited papers refined were analysed. Scientific knowledge graphs were analysed from six dimensions: annual publication quantity, country of publication, institution of publication, author, keywords, and cited references. In the last 10 years, the research literature on intelligent media has been found to increase annually. Presently, the People’s Republic of China and the United States of America have a high proportion of documents in this field. Chinese universities and institutions have achieved significantly in terms of the quantity and quality of documents. From the perspective of the whole intelligent media discipline, the high-yield author group has not been formed, and there is minimal cooperation amongst authors. Popular intelligent media topics include film, social media, machine learning, swarming motility, data mining, and artificial intelligence. Subject words of the main research directions are event recognition, fake news, Cable News Network model, reconfigurable intelligent surface, comprehensive survey, microblog message, strain sensor, and traffic event. Combined with popular topics and time zone maps, the future research frontier in the field of smart media is identified.


Sign in / Sign up

Export Citation Format

Share Document