Cluster analysis is the prominent data mining technique in knowledge discovery and it discovers the hidden patterns from the data. The K-Means, K-Modes and K-Prototypes are partition based clustering algorithms and these...
In this paper, an (s, S) policy is determined by using a simulation-optimization approach for a periodic review inventory system at a pharmacy department of a major hospital in Thailand. The simulation, which imitates the...
Online learning is part of the future of K-12 education. However, few online K-12 instructors have been formally trained in online pedagogy. This chapter describes best practices in creating online courses for K-12 students....
In the growing world of technology, where everything is available in just one click, the user expectations has increased with time. In the era of Search Engines, where Google, Yahoo are providing the facility to search through...
This chapter considers the impact the COVID-19 pandemic has had on the reality of educational administrators in U.S.-based institutions of education. Looking closely at 17 educational administrators from both K-12 systems and...
While the growth of blended learning environments in higher education and non-educational settings has continued to increase in recent years, this has not been the case in K-12 settings. Recently, in an effort to explore the...
For a security system built on symmetric-key cryptography algorithms, the substitution box (S-box) plays a crucial role to resist cryptanalysis. In this article, we incorporate quantum chaos and PWLCM chaotic map into a new...
While the growth of blended learning environments in higher education and non-educational settings has continued to increase in recent years, this has not been the case in K-12 settings. Recently, in an effort to explore the...
The recent techniques built on cloud computing for data processing is scalable and secure, which increasingly attracts the infrastructure to support big data applications. This paper proposes an effective anonymization based...
The weather has a serious impact on the environment as it affects to change day to day life. In recent days, many algorithms were proposed to predict the weather. Although various machine learning algorithms predict the weather...
Very few academic programs in pre-service teacher education include opportunities for current and future K-12 educators to develop the necessary skills to teach in an online setting. While limited research has been done related...
Although K–12 online education is becoming more common in the United States, there is still much we do not know about how K–12 online teachers are being prepared. Given that few teacher education programs include online pedagogy...
With the development of internet of things (IoT) technology, servitization of IoT device functions has become a trend. The cooperation between IoT devices can be equivalent to web service composition. However, current service...
Air pollution is increasing day by day, decreasing the world economy, degrading the quality of life, and resulting in a major productivity loss. At present, this is one of the most critical problems. It has a significant impact...
In recent years, research on the QoS-aware service composition problem often assumes that each component service in the process to be solved is equally essential. They do not consider the impact of core component services and...
Web bots are destructive programs that automatically fill the web form and steal the data from web sites. According to numerous web bot traffic reports, web bots traffic comprises of more than fifty percent of the total web...
The primary requirements of a heterogeneous wireless network topology, adaptive and smart resource allocation to users, protocols for routing and lifetime enhancement, access to the network with security and appropriate network...
The present study performs the bibliometric analysis of the social commerce (s-commerce) literature, highlights the major research themes, and suggests future research directions. The HistCite software has been used for...
Secured transmission of electrophysiological signals is one of the crucial requirements in telemedicine, telemonitoring, cardiovascular disease diagnosis (CVD) and telecardiology applications. The chaotic systems have good...
This article analyzes the relationship between Bitcoin and the stock market by using a vector autoregressive model. To enhance the impulse response signal, the Sliding Window technique is applied. Study results show the...
Glaucoma is a progressive and constant eye disease that leads to a deficiency of peripheral vision and, at last, leads to irrevocable loss of vision. Detection and identification of glaucoma are essential for earlier treatment...
An American K-12 cooperative educational services provider (“The Agency”) has an issue: partner school districts are saving money by building internal capacity for professional development, rather than fully utilizing expertise...
This quantitative study examined the frequency of usage and teacher perception of educational technology by K - 12 public school teachers in three geographic settings: urban, rural, and suburban. The objective aimed to uncover...
In Self-Organizing Maps (SOM) are unsupervised neural networks that cluster high dimensional data and transform complex inputs into easily understandable inputs. To find the closest distance and weight factor, it maps high...