CINXE.COM

Search results for: exploitation learning

<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: exploitation learning</title> <meta name="description" content="Search results for: exploitation learning"> <meta name="keywords" content="exploitation learning"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="exploitation learning" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="exploitation learning"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 7719</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: exploitation learning</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7719</span> A Novel Exploration/Exploitation Policy Accelerating Learning In Both Stationary And Non Stationary Environment Navigation Tasks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Wiem%20Zemzem">Wiem Zemzem</a>, <a href="https://publications.waset.org/abstracts/search?q=Moncef%20Tagina"> Moncef Tagina</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this work, we are addressing the problem of an autonomous mobile robot navigating in a large, unknown and dynamic environment using reinforcement learning abilities. This problem is principally related to the exploration/exploitation dilemma, especially the need to find a solution letting the robot detect the environmental change and also learn in order to adapt to the new environmental form without ignoring knowledge already acquired. Firstly, a new action selection strategy, called ε-greedy-MPA (the ε-greedy policy favoring the most promising actions) is proposed. Unlike existing exploration/exploitation policies (EEPs) such as ε-greedy and Boltzmann, the new EEP doesn’t only rely on the information of the actual state but also uses those of the eventual next states. Secondly, as the environment is large, an exploration favoring least recently visited states is added to the proposed EEP in order to accelerate learning. Finally, various simulations with ball-catching problem have been conducted to evaluate the ε-greedy-MPA policy. The results of simulated experiments show that combining this policy with the Qlearning method is more effective and efficient compared with the ε-greedy policy in stationary environments and the utility-based reinforcement learning approach in non stationary environments. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=autonomous%20mobile%20robot" title="autonomous mobile robot">autonomous mobile robot</a>, <a href="https://publications.waset.org/abstracts/search?q=exploration%2F%20exploitation%20policy" title=" exploration/ exploitation policy"> exploration/ exploitation policy</a>, <a href="https://publications.waset.org/abstracts/search?q=large" title=" large"> large</a>, <a href="https://publications.waset.org/abstracts/search?q=dynamic%20environment" title=" dynamic environment"> dynamic environment</a>, <a href="https://publications.waset.org/abstracts/search?q=reinforcement%20learning" title=" reinforcement learning"> reinforcement learning</a> </p> <a href="https://publications.waset.org/abstracts/23926/a-novel-explorationexploitation-policy-accelerating-learning-in-both-stationary-and-non-stationary-environment-navigation-tasks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/23926.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">417</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7718</span> A Literature Review and a Proposed Conceptual Framework for Learning Activities in Business Process Management</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Carin%20Lindskog">Carin Lindskog</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Introduction: Long-term success requires an organizational balance between continuity (exploitation) and change (exploration). The problem of balancing exploitation and exploration is a common issue in studies of organizational learning. In order to better face the tough competition in the face of changes, organizations need to exploit their current business and explore new business fields by developing new capabilities. The purpose of this work in progress is to develop a conceptual framework to shed light on the relevance of 'learning activities', i.e., exploitation and exploration, on different levels. The research questions that will be addressed are as follows: What sort of learning activities are found in the Business Process Management (BPM) field? How can these activities be linked to the individual level, group, level, and organizational level? In the work, a literature review will first be conducted. This review will explore the status of learning activities in the BPM field. An outcome from the literature review will be a conceptual framework of learning activities based on the included publications. The learning activities will be categorized to focus on the categories exploitation, exploration or both and into the levels of individual, group, and organization. The proposed conceptual framework will be a valuable tool for analyzing the research field as well as identification of future research directions. Related Work: BPM has increased in popularity as a way of working to strengthen the quality of the work and meet the demands of efficiency. Due to the increase in BPM popularity, more and more organizations reporting on BPM failure. One reason for this is the lack of knowledge about the extended scope of BPM to other business contexts that include, for example, more creative business fields. Yet another reason for the failures are the fact of the employees’ are resistant to changes. The learning process in an organization is an ongoing cycle of reflection and action and is a process that can be initiated, developed and practiced. Furthermore, organizational learning is multilevel; therefore the theory of organizational learning needs to consider the individual, the group, and the organization level. Learning happens over time and across levels, but it also creates a tension between incorporating new learning (feed-forward) and exploiting or using what has already been learned (feedback). Through feed-forward processes, new ideas and actions move from the individual to the group to the organization level. At the same time, what has already been learned feeds back from the organization to a group to an individual and has an impact on how people act and think. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=business%20process%20management" title="business process management">business process management</a>, <a href="https://publications.waset.org/abstracts/search?q=exploitation" title=" exploitation"> exploitation</a>, <a href="https://publications.waset.org/abstracts/search?q=exploration" title=" exploration"> exploration</a>, <a href="https://publications.waset.org/abstracts/search?q=learning%20activities" title=" learning activities"> learning activities</a> </p> <a href="https://publications.waset.org/abstracts/100814/a-literature-review-and-a-proposed-conceptual-framework-for-learning-activities-in-business-process-management" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/100814.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">124</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7717</span> Exploration and Exploitation within Operations</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=D.%20G%C3%A5svaer">D. Gåsvaer</a>, <a href="https://publications.waset.org/abstracts/search?q=L.%20St%C3%A5lberg"> L. Stålberg</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20Fundin"> A. Fundin</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20Jackson"> M. Jackson</a>, <a href="https://publications.waset.org/abstracts/search?q=P.%20Johansson"> P. Johansson</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Exploration and exploitation capabilities are both important within Operations as means for improvement when managed separately, and for establishing dynamic improvement capabilities when combined in balance. However, it is unclear what exploration and exploitation capabilities imply in improvement and development work within an operations context. So in order to better understand how to develop exploration and exploitation capabilities within operations, the main characteristics of these constructs needs to be identified and further understood. Thus, the objective of this research is to increase the understanding about exploitation and exploration characteristics, to concretize what they translates to within the context of improvement and development work in an operations unit, and to identify practical challenges. A literature review and a case study are presented. In the literature review, different interpretations of exploration and exploitation are portrayed, key characteristics have been identified, and a deepened understanding of exploration and exploitation characteristics is described. The case in the study is an operations unit, and the aim is to explore to what extent and in what ways exploration and exploitation activities are part of the improvement structures and processes. The contribution includes an identification of key characteristics of exploitation and exploration, as well as an interpretation of the constructs. Further, some practical challenges are identified. For instance, exploration activities tend to be given low priority, both in daily work as in the manufacturing strategy. Also, the overall understanding about the concepts of exploitation and exploration (or any similar aspect of dynamic improvement capabilities) is very low. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=exploitation" title="exploitation">exploitation</a>, <a href="https://publications.waset.org/abstracts/search?q=exploration" title=" exploration"> exploration</a>, <a href="https://publications.waset.org/abstracts/search?q=improvement" title=" improvement"> improvement</a>, <a href="https://publications.waset.org/abstracts/search?q=lean%20production" title=" lean production"> lean production</a>, <a href="https://publications.waset.org/abstracts/search?q=manufacturing" title=" manufacturing"> manufacturing</a> </p> <a href="https://publications.waset.org/abstracts/32306/exploration-and-exploitation-within-operations" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/32306.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">487</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7716</span> Sustainable Use of Fresh Groundwater Lens of Pleistocene Aquifer in Nam Dinh, Vietnam</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Tran%20Thanh%20Le">Tran Thanh Le</a>, <a href="https://publications.waset.org/abstracts/search?q=Pham%20Trong%20Duc"> Pham Trong Duc</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The fresh groundwater lens of the Pleistocene aquifer in Nam Dinh was formed since 12,900 years ago. Currently, the Pleistocene aquifer has been continuously exploited on average of 154,163m3/day, distributed mainly in the districts of Nghia Hung, Hai Hau, a part of Truc Ninh, Y Yen, Nam Truc and Giao Thuy. The groundwater level is still on a declining trend, saltwater intrusion in this freshwater lens can occur if the growth rate in exploitation is maintained. This study focused on groundwater sustainable use by means of 4 groups of criteria including: Groundwater quality and pollution; Aquifers’ productivity and capacity; Environment impacts due to exploitation (groundwater level decline, land subsidence due to water exploitation); Social and economic impacts. Using a combination of methods including field surveys, geophysics, hydrogeochemistry, isotope and numerical models to determine safe groundwater exploitation thresholds for the whole study area has been determined to be 544,314m3/day and the actual exploitation amount is currently about 30% compared to the safe exploitation threshold. However, it should also be noted that the current groundwater exploitation threshold and level of its exploitation compared to the safe exploitation threshold of each locality are not the same. From this result, the groundwater exploitation threshold map of the study area was established to serve the management, licensing and orientation of groundwater exploitation. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=criteria" title="criteria">criteria</a>, <a href="https://publications.waset.org/abstracts/search?q=groundwater" title=" groundwater"> groundwater</a>, <a href="https://publications.waset.org/abstracts/search?q=fresh%20groundwater%20lens" title=" fresh groundwater lens"> fresh groundwater lens</a>, <a href="https://publications.waset.org/abstracts/search?q=pleistocene" title=" pleistocene"> pleistocene</a>, <a href="https://publications.waset.org/abstracts/search?q=Nam%20Dinh" title=" Nam Dinh"> Nam Dinh</a> </p> <a href="https://publications.waset.org/abstracts/145972/sustainable-use-of-fresh-groundwater-lens-of-pleistocene-aquifer-in-nam-dinh-vietnam" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/145972.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">158</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7715</span> Linking Market Performance to Exploration and Exploitation in The Pharmaceutical Industry </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Johann%20Valentowitsch">Johann Valentowitsch</a>, <a href="https://publications.waset.org/abstracts/search?q=Wolfgang%20Burr"> Wolfgang Burr</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In organizational research, strategies of exploration and exploitation are often considered to be contradictory. Building on the tradeoff argument, many authors have assumed that a company's market performance should be positively dependent on its strategic balance between exploration and exploitation over time. In this study, we apply this reasoning to the pharmaceutical industry. Using exploratory regression analysis we show that the long-term market performance of a pharmaceutical company is linked to both its ability to carry out exploratory projects and its ability to develop exploitative competencies. In particular, our findings demonstrate that, on average, the company's annual sales performance is higher the better the strategic alignment between exploration and exploitation is balanced. The contribution of our research is twofold. On the one hand, we provide empirical evidence for the initial tradeoff hypothesis and thus support the theoretical position of those who understand exploration and exploitation as strategic substitutes. On the other hand, our findings show that a balanced relationship between exploration and exploitation is also important in research-intensive industries, which naturally tend to place more emphasis on exploration. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=exploitation" title="exploitation">exploitation</a>, <a href="https://publications.waset.org/abstracts/search?q=exploration" title=" exploration"> exploration</a>, <a href="https://publications.waset.org/abstracts/search?q=market%20performance" title=" market performance"> market performance</a>, <a href="https://publications.waset.org/abstracts/search?q=pharmaceutical%20industry" title=" pharmaceutical industry"> pharmaceutical industry</a>, <a href="https://publications.waset.org/abstracts/search?q=strategy" title=" strategy "> strategy </a> </p> <a href="https://publications.waset.org/abstracts/128901/linking-market-performance-to-exploration-and-exploitation-in-the-pharmaceutical-industry" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/128901.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">218</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7714</span> The Link Between Knowledge Management, Organizational Learning and Collective Competence</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Amira%20Khelil">Amira Khelil</a>, <a href="https://publications.waset.org/abstracts/search?q=Habib%20Affes"> Habib Affes</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The XXIst century is characterized by promoting teamwork as one of the main drivers of firms` performance. Collective competence is becoming crucial in developing and maintaining a firm’s competitive advantage, as well as its contributions to organizational innovation. In other words, the improvement of collective competence for a firm is no longer a choice, but rather an obligation. Learning capabilities of a firm in the context of knowledge management are assumed to be the main drivers of collective competence. Although there are some efforts to consider these concepts together; they are mostly discussed separately in the management theory. Thus, this paper aims to offer a holistic approach for development collective competence on the basis of Knowledge Management and Organizational Learning Capabilities. A theoretical model that defines a relationship between knowledge management, organizational learning and collective competence is presented at the end of this paper. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=collective%20competence" title="collective competence">collective competence</a>, <a href="https://publications.waset.org/abstracts/search?q=exploitation%20learning" title=" exploitation learning"> exploitation learning</a>, <a href="https://publications.waset.org/abstracts/search?q=exploration%20learning" title=" exploration learning"> exploration learning</a>, <a href="https://publications.waset.org/abstracts/search?q=knowledge%20management" title=" knowledge management"> knowledge management</a>, <a href="https://publications.waset.org/abstracts/search?q=organizational%20learning%20capabilities" title=" organizational learning capabilities"> organizational learning capabilities</a> </p> <a href="https://publications.waset.org/abstracts/19352/the-link-between-knowledge-management-organizational-learning-and-collective-competence" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/19352.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">507</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7713</span> Religious Coercion as Means of Trafficking in Women and Faith Communities’ Role in Ending Such Religious Exploitation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Xiaoyu%20Stephanie%20Ren">Xiaoyu Stephanie Ren</a> </p> <p class="card-text"><strong>Abstract:</strong></p> With the increase of massive migration, economic polarization, as well as increasing awareness and respects for religious freedom in the world, women have become unprecedentedly vulnerable to trafficking involving religious coercion. Such cases can also bring enormous challenges for prosecution in which the prosecutor bears the burden of proving that the victim acted, or not acted in a certain way due to the exploitation of her belief system: (1) Jurors who are nonbelievers tend not to be convinced that something of intangible nature can act as the force to get victim into women trafficking situation; (2) Court more often than not rules in favor of victims in women trafficking cases involving religious exploitation only when there is physical coercion in addition to religious coercion; (3) Female victims are often reluctant to testify at court due to their godly fear and loyalty to trafficker. Using case study methodology, this paper examines the unique characteristics of religious coercion as means of trafficking in women from a legal perspective and proposes multiple ways based on communal beliefs that faith communities, as victims for such crime themselves, can act in order to help to end religious exploitation. The purpose of this paper is threefold: to improve acknowledgment for the role of religious coercion as a sole force for women trafficking situation; to discuss legal hurdles in prosecuting women trafficking cases involving religious coercion; and to propose collaboration across borders among faith communities to end such exploitation. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=women%20trafficking" title="women trafficking">women trafficking</a>, <a href="https://publications.waset.org/abstracts/search?q=sex%20violence" title=" sex violence"> sex violence</a>, <a href="https://publications.waset.org/abstracts/search?q=religious%20exploitation" title=" religious exploitation"> religious exploitation</a>, <a href="https://publications.waset.org/abstracts/search?q=faith%20community" title=" faith community"> faith community</a>, <a href="https://publications.waset.org/abstracts/search?q=prosecution" title=" prosecution"> prosecution</a>, <a href="https://publications.waset.org/abstracts/search?q=law" title=" law"> law</a> </p> <a href="https://publications.waset.org/abstracts/108292/religious-coercion-as-means-of-trafficking-in-women-and-faith-communities-role-in-ending-such-religious-exploitation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/108292.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">166</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7712</span> Democracy Bytes: Interrogating the Exploitation of Data Democracy by Radical Terrorist Organizations </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nirmala%20Gopal">Nirmala Gopal</a>, <a href="https://publications.waset.org/abstracts/search?q=Sheetal%20Bhoola"> Sheetal Bhoola</a>, <a href="https://publications.waset.org/abstracts/search?q=Audecious%20Mugwagwa"> Audecious Mugwagwa</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper discusses the continued infringement and exploitation of data by non-state actors for destructive purposes, emphasizing radical terrorist organizations. It will discuss how terrorist organizations access and use data to foster their nefarious agendas. It further examines how cybersecurity, designed as a tool to curb data exploitation, is ineffective in raising global citizens' concerns about how their data can be kept safe and used for its acquired purpose. The study interrogates several policies and data protection instruments, such as the Data Protection Act, Cyber Security Policies, Protection of Personal Information(PPI) and General Data Protection Regulations (GDPR), to understand data use and storage in democratic states. The study outcomes point to the fact that international cybersecurity and cybercrime legislation, policies, and conventions have not curbed violations of data access and use by radical terrorist groups. The study recommends ways to enhance cybersecurity and reduce cyber risks using democratic principles. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cybersecurity" title="cybersecurity">cybersecurity</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20exploitation" title=" data exploitation"> data exploitation</a>, <a href="https://publications.waset.org/abstracts/search?q=terrorist%20organizations" title=" terrorist organizations"> terrorist organizations</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20democracy" title=" data democracy"> data democracy</a> </p> <a href="https://publications.waset.org/abstracts/135640/democracy-bytes-interrogating-the-exploitation-of-data-democracy-by-radical-terrorist-organizations" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/135640.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">204</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7711</span> Globalisation and the Resulting Labour Exploitation in Business Operations and Supply Chains</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Akilah%20A.%20Jardine">Akilah A. Jardine</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The integration and expansion of the global economy have indeed brought about a number of positive changes such as access to new goods and services and the opportunity for individuals and businesses to migrate, communicate, and work globally. Nevertheless, the interconnectedness of world economies is not without its negative and shameful side effects. The subsequent overabundance of goods and services has resulted in heightened competition among firms and their supply chains, fuelling the exploitation of impoverished and vulnerable individuals who are unable to equally salvage from the benefits of the integrated economy. To maintain their position in a highly competitive arena, the operations of many businesses have adopted unethical and unscrupulous practices to maximise profit, often targeting the most marginalised members of society. Simultaneously, in a consumerist obsessed society preoccupied with the consumption and accumulation of material wealth, the demand for goods and services greatly contributes to the pressure on firms, thus bolstering the exploitation of labour. This paper aims to examine the impact of business operations on the practice of labour exploitation. It explores corrupt business practices that firms adopt and key labour exploitative conditions outlined by the International Labour Organization, particularly, paying workers low wages, forcing individuals to work in abusive and unsafe conditions, and considers the issue regarding individuals’ consent to exploitative environments. Further, it considers the role of consumers in creating the high demand for goods and services, which in turn fosters the exploitation of labour. This paper illustrates that the practice of labour exploitation in the economy is a by-product of both global competitive business operations and heightened consumer consumption. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=globalisation" title="globalisation">globalisation</a>, <a href="https://publications.waset.org/abstracts/search?q=labour%20exploitation" title=" labour exploitation"> labour exploitation</a>, <a href="https://publications.waset.org/abstracts/search?q=modern%20slavery" title=" modern slavery"> modern slavery</a>, <a href="https://publications.waset.org/abstracts/search?q=sweatshops" title=" sweatshops"> sweatshops</a>, <a href="https://publications.waset.org/abstracts/search?q=unethical%20business%20practices" title=" unethical business practices"> unethical business practices</a> </p> <a href="https://publications.waset.org/abstracts/91936/globalisation-and-the-resulting-labour-exploitation-in-business-operations-and-supply-chains" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/91936.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">143</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7710</span> A Review of Machine Learning for Big Data</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Devatha%20Kalyan%20Kumar">Devatha Kalyan Kumar</a>, <a href="https://publications.waset.org/abstracts/search?q=Aravindraj%20D."> Aravindraj D.</a>, <a href="https://publications.waset.org/abstracts/search?q=Sadathulla%20A."> Sadathulla A.</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Big data are now rapidly expanding in all engineering and science and many other domains. The potential of large or massive data is undoubtedly significant, make sense to require new ways of thinking and learning techniques to address the various big data challenges. Machine learning is continuously unleashing its power in a wide range of applications. In this paper, the latest advances and advancements in the researches on machine learning for big data processing. First, the machine learning techniques methods in recent studies, such as deep learning, representation learning, transfer learning, active learning and distributed and parallel learning. Then focus on the challenges and possible solutions of machine learning for big data. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=active%20learning" title="active learning">active learning</a>, <a href="https://publications.waset.org/abstracts/search?q=big%20data" title=" big data"> big data</a>, <a href="https://publications.waset.org/abstracts/search?q=deep%20learning" title=" deep learning"> deep learning</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20learning" title=" machine learning"> machine learning</a> </p> <a href="https://publications.waset.org/abstracts/72161/a-review-of-machine-learning-for-big-data" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/72161.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">445</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7709</span> The Implementation of Sovereignty over Natural Resources Principle: Case Study Indonesian Forest</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sri%20Wartini">Sri Wartini</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Based on the sovereignty over natural resources principle, the Indonesian government has an authority to exploit the natural resources within a national jurisdiction of Indonesia. The forest is one of the natural resources which is very valuable for Indonesia. It becomes the source of raw material for many industrial activities, such as pharmaceutical industry, pulp industry, and household furniture industry. Hence, it contributes to the economic development of Indonesia. However, the exploitation of the forest may cause negative impacts, such as environmental pollution and environmental degradation. The implementation of the sovereignty over natural resources principle in Indonesia may jeopardize the forest and affect the sustainability of the forest if there is no appropriate policy of the government to exploit the forest in a sustainable manner. The exploitation of the forest in Indonesia, in some extent, has caused serious impact to environment and biodiversity. Hence, in order to sustain and to maintain the forest as the valuable resources to the future generation, the government of Indonesia has already adopted many programmes and action plans. The aim of the research is to undertake a critical examination of the issues relating to the the implementation of sovereignty over natural resources to the exploitation of the forest in Indonesia. It is a normative research and the methodology employed in this research is library research. While the approaches employed in the research are conceptual approach., statutory approach, and comparative approach. The research finds that the implementation of sovereignty over natural resources principle in the exploitation of the forest in Indonesia is limited by other principles of international environmental law, such as sustainable development principle, intergenerational principle and common concern principle which have been adopted in the government policy and various regulations regarding the exploitation of the forest in Indonesia. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Environmental%20damage" title="Environmental damage">Environmental damage</a>, <a href="https://publications.waset.org/abstracts/search?q=negative%20impacts" title=" negative impacts"> negative impacts</a>, <a href="https://publications.waset.org/abstracts/search?q=pollution" title=" pollution"> pollution</a>, <a href="https://publications.waset.org/abstracts/search?q=the%20sovereignty%20over%20natural%20resources" title=" the sovereignty over natural resources"> the sovereignty over natural resources</a> </p> <a href="https://publications.waset.org/abstracts/61341/the-implementation-of-sovereignty-over-natural-resources-principle-case-study-indonesian-forest" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/61341.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">386</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7708</span> Umbrella Reinforcement Learning – A Tool for Hard Problems</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Egor%20E.%20Nuzhin">Egor E. Nuzhin</a>, <a href="https://publications.waset.org/abstracts/search?q=Nikolay%20V.%20Brilliantov">Nikolay V. Brilliantov</a> </p> <p class="card-text"><strong>Abstract:</strong></p> We propose an approach for addressing Reinforcement Learning (RL) problems. It combines the ideas of umbrella sampling, borrowed from Monte Carlo technique of computational physics and chemistry, with optimal control methods, and is realized on the base of neural networks. This results in a powerful algorithm, designed to solve hard RL problems – the problems, with long-time delayed reward, state-traps sticking and a lack of terminal states. It outperforms the prominent algorithms, such as PPO, RND, iLQR and VI, which are among the most efficient for the hard problems. The new algorithm deals with a continuous ensemble of agents and expected return, that includes the ensemble entropy. This results in a quick and efficient search of the optimal policy in terms of ”exploration-exploitation trade-off” in the state-action space. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=umbrella%20sampling" title="umbrella sampling">umbrella sampling</a>, <a href="https://publications.waset.org/abstracts/search?q=reinforcement%20learning" title=" reinforcement learning"> reinforcement learning</a>, <a href="https://publications.waset.org/abstracts/search?q=policy%20gradient" title=" policy gradient"> policy gradient</a>, <a href="https://publications.waset.org/abstracts/search?q=dynamic%20programming" title=" dynamic programming"> dynamic programming</a> </p> <a href="https://publications.waset.org/abstracts/192151/umbrella-reinforcement-learning-a-tool-for-hard-problems" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/192151.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">21</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7707</span> Off-Policy Q-learning Technique for Intrusion Response in Network Security</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Zheni%20S.%20Stefanova">Zheni S. Stefanova</a>, <a href="https://publications.waset.org/abstracts/search?q=Kandethody%20M.%20Ramachandran"> Kandethody M. Ramachandran</a> </p> <p class="card-text"><strong>Abstract:</strong></p> With the increasing dependency on our computer devices, we face the necessity of adequate, efficient and effective mechanisms, for protecting our network. There are two main problems that Intrusion Detection Systems (IDS) attempt to solve. 1) To detect the attack, by analyzing the incoming traffic and inspect the network (intrusion detection). 2) To produce a prompt response when the attack occurs (intrusion prevention). It is critical creating an Intrusion detection model that will detect a breach in the system on time and also challenging making it provide an automatic and with an acceptable delay response at every single stage of the monitoring process. We cannot afford to adopt security measures with a high exploiting computational power, and we are not able to accept a mechanism that will react with a delay. In this paper, we will propose an intrusion response mechanism that is based on artificial intelligence, and more precisely, reinforcement learning techniques (RLT). The RLT will help us to create a decision agent, who will control the process of interacting with the undetermined environment. The goal is to find an optimal policy, which will represent the intrusion response, therefore, to solve the Reinforcement learning problem, using a Q-learning approach. Our agent will produce an optimal immediate response, in the process of evaluating the network traffic.This Q-learning approach will establish the balance between exploration and exploitation and provide a unique, self-learning and strategic artificial intelligence response mechanism for IDS. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cyber%20security" title="cyber security">cyber security</a>, <a href="https://publications.waset.org/abstracts/search?q=intrusion%20prevention" title=" intrusion prevention"> intrusion prevention</a>, <a href="https://publications.waset.org/abstracts/search?q=optimal%20policy" title=" optimal policy"> optimal policy</a>, <a href="https://publications.waset.org/abstracts/search?q=Q-learning" title=" Q-learning"> Q-learning</a> </p> <a href="https://publications.waset.org/abstracts/88356/off-policy-q-learning-technique-for-intrusion-response-in-network-security" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/88356.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">236</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7706</span> Leveraging Learning Analytics to Inform Learning Design in Higher Education</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mingming%20Jiang">Mingming Jiang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This literature review aims to offer an overview of existing research on learning analytics and learning design, the alignment between the two, and how learning analytics has been leveraged to inform learning design in higher education. Current research suggests a need to create more alignment and integration between learning analytics and learning design in order to not only ground learning analytics on learning sciences but also enable data-driven decisions in learning design to improve learning outcomes. In addition, multiple conceptual frameworks have been proposed to enhance the synergy and alignment between learning analytics and learning design. Future research should explore this synergy further in the unique context of higher education, identifying learning analytics metrics in higher education that can offer insight into learning processes, evaluating the effect of learning analytics outcomes on learning design decision-making in higher education, and designing learning environments in higher education that make the capturing and deployment of learning analytics outcomes more efficient. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=learning%20analytics" title="learning analytics">learning analytics</a>, <a href="https://publications.waset.org/abstracts/search?q=learning%20design" title=" learning design"> learning design</a>, <a href="https://publications.waset.org/abstracts/search?q=big%20data%20in%20higher%20education" title=" big data in higher education"> big data in higher education</a>, <a href="https://publications.waset.org/abstracts/search?q=online%20learning%20environments" title=" online learning environments"> online learning environments</a> </p> <a href="https://publications.waset.org/abstracts/149822/leveraging-learning-analytics-to-inform-learning-design-in-higher-education" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/149822.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">170</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7705</span> Labor Migration: An Anthropological Study of Migrants Socio-Economic Development and Exploitation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Usman%20Khan">Usman Khan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The article discusses mass migration, which has been a problem throughout history. People moved for a variety of reasons, including better job opportunities, prosperous, healthy lifestyles, and other basic needs. This research focuses on the issues and challenges that immigrants face when they arrive at their destination countries especially Saudi Arab. Among these issues are the Kapala system, irregular salaries, living conditions, document seizure, and so on. The primary data sources for this qualitative anthropological study include in-depth interviews and focus group discussions (FGDs). The research was carried out in the villages of Zulam and Shagokas in Khyber Pakhtunkhwa's Dir Lower District. The article concludes by stating that the agents and employers treated labor migrants/workers inhumanely. Throughout the process, they have been subjected to severe exploitation and suffering. Finally, the migrants sent back remittances that aided the region's economic and infrastructure development. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Migration" title="Migration">Migration</a>, <a href="https://publications.waset.org/abstracts/search?q=Exploitation" title=" Exploitation"> Exploitation</a>, <a href="https://publications.waset.org/abstracts/search?q=labour" title=" labour"> labour</a>, <a href="https://publications.waset.org/abstracts/search?q=Middle%20East" title=" Middle East"> Middle East</a>, <a href="https://publications.waset.org/abstracts/search?q=Kafala%20and%20Tanazol%20System." title=" Kafala and Tanazol System."> Kafala and Tanazol System.</a> </p> <a href="https://publications.waset.org/abstracts/161781/labor-migration-an-anthropological-study-of-migrants-socio-economic-development-and-exploitation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/161781.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">75</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7704</span> OSEME: A Smart Learning Environment for Music Education</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Konstantinos%20Sofianos">Konstantinos Sofianos</a>, <a href="https://publications.waset.org/abstracts/search?q=Michael%20Stefanidakis"> Michael Stefanidakis</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Nowadays, advances in information and communication technologies offer a range of opportunities for new approaches, methods, and tools in the field of education and training. Teacher-centered learning has changed to student-centered learning. E-learning has now matured and enables the design and construction of intelligent learning systems. A smart learning system fully adapts to a student's needs and provides them with an education based on their preferences, learning styles, and learning backgrounds. It is a wise friend and available at any time, in any place, and with any digital device. In this paper, we propose an intelligent learning system, which includes an ontology with all elements of the learning process (learning objects, learning activities) and a massive open online course (MOOC) system. This intelligent learning system can be used in music education. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=intelligent%20learning%20systems" title="intelligent learning systems">intelligent learning systems</a>, <a href="https://publications.waset.org/abstracts/search?q=e-learning" title=" e-learning"> e-learning</a>, <a href="https://publications.waset.org/abstracts/search?q=music%20education" title=" music education"> music education</a>, <a href="https://publications.waset.org/abstracts/search?q=ontology" title=" ontology"> ontology</a>, <a href="https://publications.waset.org/abstracts/search?q=semantic%20web" title=" semantic web"> semantic web</a> </p> <a href="https://publications.waset.org/abstracts/168933/oseme-a-smart-learning-environment-for-music-education" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/168933.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">311</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7703</span> How to Guide Students from Surface to Deep Learning: Applied Philosophy in Management Education</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Lihong%20Wu">Lihong Wu</a>, <a href="https://publications.waset.org/abstracts/search?q=Raymond%20Young"> Raymond Young</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The ability to learn is one of the most critical skills in the information age. However, many students do not have a clear understanding of what learning is, what they are learning, and why they are learning. Many students study simply to pass rather than to learn something useful for their career and their life. They have a misconception about learning and a wrong attitude towards learning. This research explores student attitudes to study in management education and explores how to intercede to lead students from shallow to deeper modes of learning. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=knowledge" title="knowledge">knowledge</a>, <a href="https://publications.waset.org/abstracts/search?q=surface%20learning" title=" surface learning"> surface learning</a>, <a href="https://publications.waset.org/abstracts/search?q=deep%20learning" title=" deep learning"> deep learning</a>, <a href="https://publications.waset.org/abstracts/search?q=education" title=" education"> education</a> </p> <a href="https://publications.waset.org/abstracts/143479/how-to-guide-students-from-surface-to-deep-learning-applied-philosophy-in-management-education" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/143479.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">501</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7702</span> Blended Learning through Google Classroom</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Lee%20Bih%20Ni">Lee Bih Ni</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper discusses that good learning involves all academic groups in the school. Blended learning is learning outside the classroom. Google Classroom is a free service learning app for schools, non-profit organizations and anyone with a personal Google account. Facilities accessed through computers and mobile phones are very useful for school teachers and students. Blended learning classrooms using both traditional and technology-based methods for teaching have become the norm for many educators. Using Google Classroom gives students access to online learning. Even if the teacher is not in the classroom, the teacher can provide learning. This is the supervision of the form of the teacher when the student is outside the school. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=blended%20learning" title="blended learning">blended learning</a>, <a href="https://publications.waset.org/abstracts/search?q=learning%20app" title=" learning app"> learning app</a>, <a href="https://publications.waset.org/abstracts/search?q=google%20classroom" title=" google classroom"> google classroom</a>, <a href="https://publications.waset.org/abstracts/search?q=schools" title=" schools"> schools</a> </p> <a href="https://publications.waset.org/abstracts/108493/blended-learning-through-google-classroom" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/108493.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">146</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7701</span> The Design of the Blended Learning System via E-Media and Online Learning for the Asynchronous Learning: Case Study of Process Management Subject </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Pimploi%20Tirastittam">Pimploi Tirastittam</a>, <a href="https://publications.waset.org/abstracts/search?q=Suppara%20Charoenpoom"> Suppara Charoenpoom</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Nowadays the asynchronous learning has granted the permission to the anywhere and anything learning via the technology and E-media which give the learner more convenient. This research is about the design of the blended and online learning for the asynchronous learning of the process management subject in order to create the prototype of this subject asynchronous learning which will create the easiness and increase capability in the learning. The pattern of learning is the integration between the in-class learning and online learning via the internet. This research is mainly focused on the online learning and the online learning can be divided into 5 parts which are virtual classroom, online content, collaboration, assessment and reference material. After the system design was finished, it was evaluated and tested by 5 experts in blended learning design and 10 students which the user’s satisfaction level is good. The result is as good as the assumption so the system can be used in the process management subject for a real usage. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=blended%20learning" title="blended learning">blended learning</a>, <a href="https://publications.waset.org/abstracts/search?q=asynchronous%20learning" title=" asynchronous learning"> asynchronous learning</a>, <a href="https://publications.waset.org/abstracts/search?q=design" title=" design"> design</a>, <a href="https://publications.waset.org/abstracts/search?q=process%20management" title=" process management"> process management</a> </p> <a href="https://publications.waset.org/abstracts/12177/the-design-of-the-blended-learning-system-via-e-media-and-online-learning-for-the-asynchronous-learning-case-study-of-process-management-subject" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/12177.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">407</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7700</span> Assessment of Forest Resource Exploitation in the Rural Communities of District Jhelum</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Rubab%20Zafar%20Kahlon">Rubab Zafar Kahlon</a>, <a href="https://publications.waset.org/abstracts/search?q=Ibtisam%20Butt"> Ibtisam Butt</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Forest resources are deteriorating and experiencing decline around the globe due to unsustainable use and over exploitation. The present study was an attempt to determine the relationship between human activities, forest resource utilization, extraction methods and practices of forest resource exploitation in the district Jhelum of Pakistan. For this purpose, primary sources of data were used which were collected from 8 villages through structured questionnaire and tabulated in Microsoft Excel 365 and SPSS 22 was used for multiple linear regression analysis. The results revealed that farming, wood cutting, animal husbandry and agro-forestry were the major occupations in the study area. Most commonly used resources included timber 26%, fuelwood 25% and fodder 19%. Methods used for resource extraction included gathering 49%, plucking 34% trapping 11% and cutting 6%. Population growth, increased demand of fuelwood and land conversion were the main reasons behind forest degradation. Results for multiple linear regression revealed that Forest based activities, sources of energy production, methods used for wood harvesting and resource extraction and use of fuelwood for energy production contributed significantly towards extensive forest resource exploitation with p value <0.5 within the study area. The study suggests that effective measures should be taken by forest department to control the unsustainable use of forest resources by stringent management interventions and awareness campaigns in Jhelum district. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=forest%20resource" title="forest resource">forest resource</a>, <a href="https://publications.waset.org/abstracts/search?q=biodiversity" title=" biodiversity"> biodiversity</a>, <a href="https://publications.waset.org/abstracts/search?q=expliotation" title=" expliotation"> expliotation</a>, <a href="https://publications.waset.org/abstracts/search?q=human%20activities" title=" human activities"> human activities</a> </p> <a href="https://publications.waset.org/abstracts/151790/assessment-of-forest-resource-exploitation-in-the-rural-communities-of-district-jhelum" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/151790.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">92</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7699</span> A Study on the HTML5 Based Multi Media Contents Authority Tool</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Heesuk%20Seo">Heesuk Seo</a>, <a href="https://publications.waset.org/abstracts/search?q=Yongtae%20Kim"> Yongtae Kim</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Online learning started in the 1990s, the spread of the Internet has been through the era of e-learning paradigm of online education in the era of smart learning change. Reflecting the different nature of the mobile to anywhere anytime, anywhere was also allows the form of learning, it was also available through the learning content and interaction. We are developing a cloud system, 'TLINKS CLOUD' that allows you to configure the environment of the smart learning without the need for additional infrastructure. Using the big-data analysis for e-learning contents, we provide an integrated solution for e-learning tailored to individual study. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=authority%20tool" title="authority tool">authority tool</a>, <a href="https://publications.waset.org/abstracts/search?q=big%20data%20analysis" title=" big data analysis"> big data analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=e-learning" title=" e-learning"> e-learning</a>, <a href="https://publications.waset.org/abstracts/search?q=HTML5" title=" HTML5"> HTML5</a> </p> <a href="https://publications.waset.org/abstracts/56924/a-study-on-the-html5-based-multi-media-contents-authority-tool" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/56924.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">406</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7698</span> The Different Learning Path Analysis of Students with Different Learning Attitudes and Styles in Arts Creation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Tracy%20Ho">Tracy Ho</a>, <a href="https://publications.waset.org/abstracts/search?q=Huann-Shyang%20Lin"> Huann-Shyang Lin</a>, <a href="https://publications.waset.org/abstracts/search?q=Mina%20Lin"> Mina Lin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study investigated the different learning path of students with different learning attitude and learning styles in Arts Creation. Based on direct instruction, guided-discovery learning, and discovery learning theories, a tablet app including the following three learning areas were developed for students: (1) replication and remix practice area, (2) guided creation area, and (3) free creation area. Thirty. students with different learning attitude and learning styles were invited to use this app. Students’ learning behaviors were categorized and defined. The results will provide both educators and researchers with insights that can form a useful foundation for designing different content and strategy with the application of new technologies in school teaching. It also sheds light on how an educational App can be designed to enhance Arts Creation. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=App" title="App">App</a>, <a href="https://publications.waset.org/abstracts/search?q=arts%20creation" title=" arts creation"> arts creation</a>, <a href="https://publications.waset.org/abstracts/search?q=learning%20attitude" title=" learning attitude"> learning attitude</a>, <a href="https://publications.waset.org/abstracts/search?q=learning%20style" title=" learning style"> learning style</a>, <a href="https://publications.waset.org/abstracts/search?q=tablet" title=" tablet"> tablet</a> </p> <a href="https://publications.waset.org/abstracts/72549/the-different-learning-path-analysis-of-students-with-different-learning-attitudes-and-styles-in-arts-creation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/72549.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">277</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7697</span> Modern Machine Learning Conniptions for Automatic Speech Recognition</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=S.%20Jagadeesh%20Kumar">S. Jagadeesh Kumar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This expose presents a luculent of recent machine learning practices as employed in the modern and as pertinent to prospective automatic speech recognition schemes. The aspiration is to promote additional traverse ablution among the machine learning and automatic speech recognition factions that have transpired in the precedent. The manuscript is structured according to the chief machine learning archetypes that are furthermore trendy by now or have latency for building momentous hand-outs to automatic speech recognition expertise. The standards offered and convoluted in this article embraces adaptive and multi-task learning, active learning, Bayesian learning, discriminative learning, generative learning, supervised and unsupervised learning. These learning archetypes are aggravated and conferred in the perspective of automatic speech recognition tools and functions. This manuscript bequeaths and surveys topical advances of deep learning and learning with sparse depictions; further limelight is on their incessant significance in the evolution of automatic speech recognition. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=automatic%20speech%20recognition" title="automatic speech recognition">automatic speech recognition</a>, <a href="https://publications.waset.org/abstracts/search?q=deep%20learning%20methods" title=" deep learning methods"> deep learning methods</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20learning%20archetypes" title=" machine learning archetypes"> machine learning archetypes</a>, <a href="https://publications.waset.org/abstracts/search?q=Bayesian%20learning" title=" Bayesian learning"> Bayesian learning</a>, <a href="https://publications.waset.org/abstracts/search?q=supervised%20and%20unsupervised%20learning" title=" supervised and unsupervised learning"> supervised and unsupervised learning</a> </p> <a href="https://publications.waset.org/abstracts/71467/modern-machine-learning-conniptions-for-automatic-speech-recognition" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/71467.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">447</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7696</span> The Effect of Online Learning During the COVID-19 Pandemic on Student Mental</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Adelia%20Desi%20Agnesita">Adelia Desi Agnesita</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The advent of a new disease called covid-19 made many major changes in the world, one of which is the process of learning and teaching. Learning formerly offline but now is done online, which makes students need adaptation to the learning process. The covid-19 pandemic that occurs almost worldwide causes activities that involve many people to be avoided, one of which is learning to teach. In Indonesia, since March 2020, the process of college learning is turning into online/ long-distance learning. It's to prevent the spread of the covid-19. Student online learning presents some of the obstacles to poor signals, many of the tasks, lack of focus, difficulty sleeping, and resulting stress. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=learning" title="learning">learning</a>, <a href="https://publications.waset.org/abstracts/search?q=online" title=" online"> online</a>, <a href="https://publications.waset.org/abstracts/search?q=covid-19" title=" covid-19"> covid-19</a>, <a href="https://publications.waset.org/abstracts/search?q=pandemic" title=" pandemic"> pandemic</a> </p> <a href="https://publications.waset.org/abstracts/145390/the-effect-of-online-learning-during-the-covid-19-pandemic-on-student-mental" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/145390.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">213</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7695</span> A Robust Implementation of a Building Resources Access Rights Management System</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Eugen%20Neagoe">Eugen Neagoe</a>, <a href="https://publications.waset.org/abstracts/search?q=Victor%20Balanica"> Victor Balanica</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A Smart Building Controller (SBC) is a server software that offers secured access to a pool of building specific resources, executes monitoring tasks and performs automatic administration of a building, thus optimizing the exploitation cost and maximizing comfort. This paper brings to discussion the issues that arise with the secure exploitation of the SBC administered resources and proposes a technical solution to implement a robust secure access system based on roles, individual rights and privileges (special rights). <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=smart%20building%20controller" title="smart building controller">smart building controller</a>, <a href="https://publications.waset.org/abstracts/search?q=software%20security" title=" software security"> software security</a>, <a href="https://publications.waset.org/abstracts/search?q=access%20rights" title=" access rights"> access rights</a>, <a href="https://publications.waset.org/abstracts/search?q=access%20authorization" title=" access authorization"> access authorization</a> </p> <a href="https://publications.waset.org/abstracts/25907/a-robust-implementation-of-a-building-resources-access-rights-management-system" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/25907.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">440</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7694</span> Children Protection in the Digital Space</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Beverly%20Komen">Beverly Komen</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Online crimes have been on the rise in the recent days, especially with the hit of the covid-19 pandemic. The coronavirus pandemic has led to an unprecedented rise in screen time, this means more families are relying on technology and digital solutions to keep children learning, spending more time on the virtual platforms can leave children vulnerable to online abuse and exploitation. With ease access of affordable phones, internet, and increased online activities, all children are at risk of being abused online hence making the digital space unsafe for children. With these increased use of technology and its accessibility, children are at risk of facing challenges such as access to inappropriate content, online grooming, identity theft, cyber bullying, among other risks. The big question is; as we enjoy the benefits brought in by technology, how do we ensure that our children are save in this digital space? With the analysis of the current trends, there is a gap in knowledge on people’s understanding on child online protection and safety measures when using the digital space. A survey conducted among 50 parents in Nairobi in Kenya indicated that there is a gap in knowledge on online protection of children and over 50 % of the participants shared that for sure they have no idea on how to protect children online. This paper seeks to address the concept of child protection in the digital space and come up with viable solutions in protecting children from online vices. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=child%20protection" title="child protection">child protection</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20space" title=" digital space"> digital space</a>, <a href="https://publications.waset.org/abstracts/search?q=online%20risks" title=" online risks"> online risks</a>, <a href="https://publications.waset.org/abstracts/search?q=online%20grooming" title=" online grooming"> online grooming</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20bulying" title=" cyber bulying"> cyber bulying</a>, <a href="https://publications.waset.org/abstracts/search?q=online%20child%20sexual%20exploitation" title=" online child sexual exploitation"> online child sexual exploitation</a>, <a href="https://publications.waset.org/abstracts/search?q=and%20abuse" title=" and abuse"> and abuse</a> </p> <a href="https://publications.waset.org/abstracts/143939/children-protection-in-the-digital-space" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/143939.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">185</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7693</span> Development of Multimedia Learning Application for Mastery Learning Style: A Graduated Difficulty Strategy</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nur%20Azlina%20Mohamed%20Mokmin">Nur Azlina Mohamed Mokmin</a>, <a href="https://publications.waset.org/abstracts/search?q=Mona%20Masood"> Mona Masood</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Guided by the theory of learning style, this study is based on the development of a multimedia learning application for students with mastery learning style. The learning material was developed by applying a graduated difficulty learning strategy. Algebraic fraction was chosen as the learning topic for this application. The effectiveness of this application in helping students learn is measured by giving a pre- and post-test. The result shows that students who learn using the learning material that matches their preferred learning style performs better than the students with a non-personalized learning material. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=algebraic%20fractions" title="algebraic fractions">algebraic fractions</a>, <a href="https://publications.waset.org/abstracts/search?q=graduated%20difficulty" title=" graduated difficulty"> graduated difficulty</a>, <a href="https://publications.waset.org/abstracts/search?q=mastery%20learning%20style" title=" mastery learning style"> mastery learning style</a>, <a href="https://publications.waset.org/abstracts/search?q=multimedia" title=" multimedia"> multimedia</a> </p> <a href="https://publications.waset.org/abstracts/17217/development-of-multimedia-learning-application-for-mastery-learning-style-a-graduated-difficulty-strategy" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/17217.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">513</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7692</span> Implementation of the Collaborative Learning Approach in Learning of Second Language English</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ashwini%20Mahesh%20Jagatap">Ashwini Mahesh Jagatap</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper presents the language learning strategy with respect to speaking skill with collaborative learning approach. Collaborative learning has been proven to be efficient learning methodology for all kinds of students. Students are working in groups of two or more, reciprocally searching for understanding, Solutions, or meanings, or creating a product. The presentation highlights the different stages which can be implemented during actual implementation of the methodology in the class room teaching learning process. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=collaborative%20classroom" title="collaborative classroom">collaborative classroom</a>, <a href="https://publications.waset.org/abstracts/search?q=collaborative%20learning%20approach" title=" collaborative learning approach"> collaborative learning approach</a>, <a href="https://publications.waset.org/abstracts/search?q=language%20skills" title=" language skills"> language skills</a>, <a href="https://publications.waset.org/abstracts/search?q=traditional%20teaching" title=" traditional teaching"> traditional teaching</a> </p> <a href="https://publications.waset.org/abstracts/23125/implementation-of-the-collaborative-learning-approach-in-learning-of-second-language-english" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/23125.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">573</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7691</span> Rural Tourism in Essaouira in Morocco: From the Appropriation of Space to the Sustainability of Exploitation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hadach%20Mohamed">Hadach Mohamed</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In Essaouira, tourism is the main economic activity, and the destination has a place in the segment of rural and sustainable tourism. The hinterland of the destination has natural and tourist potential of great attractiveness, but the natives still appropriate the territory and are faced with the dilemma of appropriation and tourist exploitation. This article analyzes the determinants of the appropriation of a rural tourist space in light of the massive touristification and the need to set up income-generating activities for the inhabitants. After a review of the literature, a survey was carried out among the main actors of tourism in the destination to evaluate the question of the appropriation of the tourist space and the sustainability of a destination. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=rural%20tourism" title="rural tourism">rural tourism</a>, <a href="https://publications.waset.org/abstracts/search?q=sustainability" title=" sustainability"> sustainability</a>, <a href="https://publications.waset.org/abstracts/search?q=appropriation" title=" appropriation"> appropriation</a>, <a href="https://publications.waset.org/abstracts/search?q=tourism%20destination" title=" tourism destination"> tourism destination</a> </p> <a href="https://publications.waset.org/abstracts/166194/rural-tourism-in-essaouira-in-morocco-from-the-appropriation-of-space-to-the-sustainability-of-exploitation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/166194.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">106</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7690</span> Implications of Learning Resource Centre in a Web Environment</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Darshana%20Lal">Darshana Lal</a>, <a href="https://publications.waset.org/abstracts/search?q=Sonu%20Rana"> Sonu Rana </a> </p> <p class="card-text"><strong>Abstract:</strong></p> Learning Resource Centers (LRC) are acquiring different kinds of documents like books, journals, thesis, dissertations, standard, databases etc. in print and e-form. This article deals with the different types of sources available in LRC. It also discusses the concept of the web, as a tool, as a multimedia system and the different interfaces available on the web. The reasons for establishing LRC are highlighted along with the assignments of LRC. Different features of LRC‘S like self-learning and group learning are described. It also implements a group of activities like reading, learning, educational etc. The use of LRC by students and faculties are given and concluded with the benefits. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=internet" title="internet">internet</a>, <a href="https://publications.waset.org/abstracts/search?q=search%20engine" title=" search engine"> search engine</a>, <a href="https://publications.waset.org/abstracts/search?q=resource%20centre" title=" resource centre"> resource centre</a>, <a href="https://publications.waset.org/abstracts/search?q=opac" title=" opac"> opac</a>, <a href="https://publications.waset.org/abstracts/search?q=self-learning" title=" self-learning"> self-learning</a>, <a href="https://publications.waset.org/abstracts/search?q=group%20learning" title=" group learning"> group learning</a> </p> <a href="https://publications.waset.org/abstracts/30874/implications-of-learning-resource-centre-in-a-web-environment" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/30874.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">377</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">&lsaquo;</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=exploitation%20learning&amp;page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=exploitation%20learning&amp;page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=exploitation%20learning&amp;page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=exploitation%20learning&amp;page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=exploitation%20learning&amp;page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=exploitation%20learning&amp;page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=exploitation%20learning&amp;page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=exploitation%20learning&amp;page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=exploitation%20learning&amp;page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=exploitation%20learning&amp;page=257">257</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=exploitation%20learning&amp;page=258">258</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=exploitation%20learning&amp;page=2" rel="next">&rsaquo;</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">&copy; 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">&times;</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10