Online learning is part of the future of K-12 education. However, few online K-12 instructors have been formally trained in online pedagogy. This chapter describes best practices in creating online courses for K-12 students....
While the growth of blended learning environments in higher education and non-educational settings has continued to increase in recent years, this has not been the case in K-12 settings. Recently, in an effort to explore the...
Cluster analysis is the prominent data mining technique in knowledge discovery and it discovers the hidden patterns from the data. The K-Means, K-Modes and K-Prototypes are partition based clustering algorithms and these...
While the growth of blended learning environments in higher education and non-educational settings has continued to increase in recent years, this has not been the case in K-12 settings. Recently, in an effort to explore the...
The recent techniques built on cloud computing for data processing is scalable and secure, which increasingly attracts the infrastructure to support big data applications. This paper proposes an effective anonymization based...
The weather has a serious impact on the environment as it affects to change day to day life. In recent days, many algorithms were proposed to predict the weather. Although various machine learning algorithms predict the weather...
Very few academic programs in pre-service teacher education include opportunities for current and future K-12 educators to develop the necessary skills to teach in an online setting. While limited research has been done related...
Although K–12 online education is becoming more common in the United States, there is still much we do not know about how K–12 online teachers are being prepared. Given that few teacher education programs include online pedagogy...
With the development of internet of things (IoT) technology, servitization of IoT device functions has become a trend. The cooperation between IoT devices can be equivalent to web service composition. However, current service...
Bus transportation is the essential mode of public transportation available for intra-district movements in India. The planning of different stages of bus transportation planning is usually done in an ad-hoc manner on the basis...
Air pollution is increasing day by day, decreasing the world economy, degrading the quality of life, and resulting in a major productivity loss. At present, this is one of the most critical problems. It has a significant impact...
Web bots are destructive programs that automatically fill the web form and steal the data from web sites. According to numerous web bot traffic reports, web bots traffic comprises of more than fifty percent of the total web...
An American K-12 cooperative educational services provider (“The Agency”) has an issue: partner school districts are saving money by building internal capacity for professional development, rather than fully utilizing expertise...
This quantitative study examined the frequency of usage and teacher perception of educational technology by K - 12 public school teachers in three geographic settings: urban, rural, and suburban. The objective aimed to uncover...
This chapter considers the impact the COVID-19 pandemic has had on the reality of educational administrators in U.S.-based institutions of education. Looking closely at 17 educational administrators from both K-12 systems and...
Machine learning (ML) has been instrumental in optimal decision making through relevant historical data, including the domain of bioinformatics. In bioinformatics classification of natural genes and the genes that are infected...
The purpose of this paper is to identify the factors for both HR practices and organizational effectiveness along with what extent HR practices impact organizational effectiveness. The data were randomly collected from faculty...
Shopper buying behaviour is essential for the retailers to segment the shoppers in accordance to their disruptive attitude and perception for better innovative strategies which may lead to higher profits. The major purpose of...
(k, n) threshold is a special case of the general access structure (GAS) in secret image sharing (SIS), therefore GAS is more extensive than (k, n) threshold. Most of conventional SIS, including visual secret sharing (VSS)...
From the perspective of counter-terrorism strategies, terrorist risk assessment has become an important approach for counter-terrorism early warning research. Combining with the characteristics of known terrorists, a...
Software development through teams at different geographical locations is a trend of modern era, which is not only producing good results without costing lot of money but also productive in relation to its cost, low risk and...
The internet makes it easier for people to connect to each other and has become a platform to express ideas and share information with the world. The growth of the internet has indirectly led to the development of social...
Copy-move forgery (CMF) is an established process to copy an image segment and pastes it within the same image to hide or duplicate a portion of the image. Several CMF detection techniques are available; however, better...
This article compares the performance of different Partial Distance Search-based (PDS) kNN classifiers on a benchmark Kyoto 2006+ dataset for Network Intrusion Detection Systems (NIDS). These PDS classifiers are named based on...