{"title":"A model for predicting dropout of higher education students","authors":"Anaíle Mendes Rabelo, Luis Enrique Zárate","doi":"10.1016/j.dsm.2024.07.001","DOIUrl":"10.1016/j.dsm.2024.07.001","url":null,"abstract":"<div><div>Higher education institutions are becoming increasingly concerned with the retention of their students. This work is motivated by the interest in predicting and reducing student dropout, and consequently in reducing the financial losses of said institutions. Based on the characterization of the dropout problem and the application of a knowledge discovery process, an ensemble model is proposed to improve dropout prediction. The ensemble model combines the results of three models: Logistic Regression, Neural Networks, and Decision Tree. As a result, the model can correctly classify 89% of the students as enrolled or dropped and accurately identify 98.1% of dropouts. When compared with the Random Forest ensemble method, the proposed model demonstrates desirable characteristics to assist management in proposing actions to retain students.</div></div>","PeriodicalId":100353,"journal":{"name":"Data Science and Management","volume":"8 1","pages":"Pages 72-85"},"PeriodicalIF":0.0,"publicationDate":"2024-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141853113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wasiur Rhmann , Jalaluddin Khan , Ghufran Ahmad Khan , Zubair Ashraf , Babita Pandey , Mohammad Ahmar Khan , Ashraf Ali , Amaan Ishrat , Abdulrahman Abdullah Alghamdi , Bilal Ahamad , Mohammad Khaja Shaik
{"title":"Comparative study of IoT- and AI-based computing disease detection approaches","authors":"Wasiur Rhmann , Jalaluddin Khan , Ghufran Ahmad Khan , Zubair Ashraf , Babita Pandey , Mohammad Ahmar Khan , Ashraf Ali , Amaan Ishrat , Abdulrahman Abdullah Alghamdi , Bilal Ahamad , Mohammad Khaja Shaik","doi":"10.1016/j.dsm.2024.07.004","DOIUrl":"10.1016/j.dsm.2024.07.004","url":null,"abstract":"<div><div>The emergence of different computing methods such as cloud-, fog-, and edge-based Internet of Things (IoT) systems has provided the opportunity to develop intelligent systems for disease detection. Compared to other machine learning models, deep learning models have gained more attention from the research community, as they have shown better results with a large volume of data compared to shallow learning. However, no comprehensive survey has been conducted on integrated IoT- and computing-based systems that deploy deep learning for disease detection. This study evaluated different machine learning and deep learning algorithms and their hybrid and optimized algorithms for IoT-based disease detection, using the most recent papers on IoT-based disease detection systems that include computing approaches, such as cloud, edge, and fog. Their analysis focused on an IoT deep learning architecture suitable for disease detection. It also recognizes the different factors that require the attention of researchers to develop better IoT disease detection systems. This study can be helpful to researchers interested in developing better IoT-based disease detection and prediction systems based on deep learning using hybrid algorithms.</div></div>","PeriodicalId":100353,"journal":{"name":"Data Science and Management","volume":"8 1","pages":"Pages 94-106"},"PeriodicalIF":0.0,"publicationDate":"2024-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141841404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Creating non-fungible token (NFT)-backed emoji art from user conversations on blockchain","authors":"Maedeh Mosharraf, Mohammad Hossein Khorrami","doi":"10.1016/j.dsm.2024.06.002","DOIUrl":"10.1016/j.dsm.2024.06.002","url":null,"abstract":"<div><div>In the metaverse, digital assets are essential to define identity, shape the virtual environment, and facilitate economic transactions. This study introduces a novel feature to the metaverse by capturing a fundamental aspect of individuals–their conversations–and transforming them into digital assets. It utilizes natural language processing and machine learning methods to extract key sentences from user conversations and match them with emojis that reflect their sentiments. The selected sentence, which encapsulates the essence of the user’s statements, is then transformed into digital art through a generative visual model. This digital artwork is transformed into a non-fungible token, becoming a valuable digital asset within the blockchain ecosystem that is ideal for integration into metaverse applications. Our aim is to manage personality traits as digital assets to foster individual uniqueness, enrich user experiences, and facilitate more personalized services and interactions with both like-minded users and non-player characters, thereby enhancing the overall user journey.</div></div>","PeriodicalId":100353,"journal":{"name":"Data Science and Management","volume":"8 1","pages":"Pages 40-47"},"PeriodicalIF":0.0,"publicationDate":"2024-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143164911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Value realization of intelligent emergency management: research framework from technology enabling to value creation","authors":"Yan Guo , Yan Song , Mingyue Zhang","doi":"10.1016/j.dsm.2024.06.001","DOIUrl":"10.1016/j.dsm.2024.06.001","url":null,"abstract":"<div><div>This study investigated the application and the application value of intelligent emergency in emergency management in the big data environment. It addresses the neglect of the application value (performance) measurement of intelligent emergency, further improving the effectiveness of intelligent emergency management. First, approximately 3900 documents from the intelligent emergency field are analyzed to determine the future research trend in intelligent emergency management. The socio-technical theory concerning technical and social systems is introduced. The emergency management system concepts of “technology enabling” and “enabling value creation” are defined according to bibliometric analysis and socio-technical theory. Second, a research framework that includes technology enabling and enabling value creation for the decision-making paradigm in emergency management according to the big data environment is constructed. A detailed analysis approach from intelligent emergency technology enabling to enabling value creation in emergency management is proposed. Finally, earthquake disasters are taken as examples, and specific analyses of the intelligent emergency enabling and enabling value creation are explored; enabling value creation is discussed based on measurable indicators. The clear concept of emergency management system technology enabling and enabling value creation, as well as the detailed analysis approach from intelligent emergency technology enabling to enabling value creation, provide a theoretical bases for scholars and practitioners to evaluate the value (performance) of intelligent emergency for the first time.</div></div>","PeriodicalId":100353,"journal":{"name":"Data Science and Management","volume":"8 1","pages":"Pages 11-22"},"PeriodicalIF":0.0,"publicationDate":"2024-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141409093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancing cyber threat detection with an improved artificial neural network model","authors":"Toluwase Sunday Oyinloye , Micheal Olaolu Arowolo , Rajesh Prasad","doi":"10.1016/j.dsm.2024.05.002","DOIUrl":"10.1016/j.dsm.2024.05.002","url":null,"abstract":"<div><div>Identifying cyberattacks that attempt to compromise digital systems is a critical function of intrusion detection systems (IDS). Data labeling difficulties, incorrect conclusions, and vulnerability to malicious data injections are only a few drawbacks of using machine learning algorithms for cybersecurity. To overcome these obstacles, researchers have created several network IDS models, such as the Hidden Naive Bayes Multiclass Classifier and supervised/unsupervised machine learning techniques. This study provides an updated learning strategy for artificial neural network (ANN) to address data categorization problems caused by unbalanced data. Compared to traditional approaches, the augmented ANN’s 92% accuracy is a significant improvement owing to the network’s increased resilience to disturbances and computational complexity, brought about by the addition of a random weight and standard scaler. Considering the ever-evolving nature of cybersecurity threats, this study introduces a revolutionary intrusion detection method.</div></div>","PeriodicalId":100353,"journal":{"name":"Data Science and Management","volume":"8 1","pages":"Pages 107-115"},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141276095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"User-centric avatar design: A cognitive walkthrough approach for metaverse in virtual education","authors":"","doi":"10.1016/j.dsm.2024.05.001","DOIUrl":"10.1016/j.dsm.2024.05.001","url":null,"abstract":"<div><div>Metaverse, once a concept confined to science fiction, has emerged as a transformative reality during the digital era. As this immersive virtual world gains prominence, the role of avatars and the digital representations of users in shaping educational experiences within a metaverse becomes increasingly crucial. This study examined the design of avatars and their effectiveness in virtual education. Using the cognitive walkthrough (CW) method, a well-established user-centric assessment approach, this study examined how users engage in avatar design in virtual educational settings, highlighting their cognitive processes. Through the CW approach, this study identified usability issues and learning challenges, providing valuable insights into the user experience. The investigation focuses on the VRoid platform for avatar design, selected for its user-friendly interface and robust customization features. Participants (n = 12; six men and six women) from diverse educational backgrounds were carefully selected to offer a comprehensive range of perspectives. They performed avatar design tasks that closely mirrored the learning environment of the metaverse, followed by in-depth post-exercise interviews. The findings of this study highlight the essential role of avatar design in enhancing user engagement and improving the learning outcomes of virtual education. Furthermore, we provide practical recommendations for educators and designers to effectively leverage avatar innovation. In a continuously evolving era of metaverse, this research contributes significantly to the ongoing discourse on user-centered design in educational settings, thereby influencing the future trajectory of virtual education.</div></div>","PeriodicalId":100353,"journal":{"name":"Data Science and Management","volume":"7 4","pages":"Pages 267-282"},"PeriodicalIF":0.0,"publicationDate":"2024-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141140192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Trust and involvement of Cameroonian software developers in open-source projects","authors":"","doi":"10.1016/j.dsm.2024.04.005","DOIUrl":"10.1016/j.dsm.2024.04.005","url":null,"abstract":"<div><div>Although recent studies have examined collaboration within open-source software projects, the focus has primarily been on their motivations and governance. This study explores the complex dynamics of trust and involvement among Cameroonian software developers in open-source projects. In the context of a rapidly evolving software development landscape, these projects have emerged as a transformative force, redefining global collaboration standards. The qualitative methodological approach involved a survey of 22 participants in open-source software projects, including Cameroonian software developers, project governance actors, and open-source community members. Analyses revealed that the trust given to African software developers, including their effective integration into projects and consideration of their specificities and contributions, has a positive impact on their involvement in and ability to appropriate information technologies. By exploring the interaction between cultural, social, and technological factors, this study enhances our understanding of trust mechanisms within open-source communities, especially those involving remote developers.</div></div>","PeriodicalId":100353,"journal":{"name":"Data Science and Management","volume":"7 4","pages":"Pages 332-339"},"PeriodicalIF":0.0,"publicationDate":"2024-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141035693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Will China’s carbon-trading policy foster coordinated innovation in green technologies?","authors":"","doi":"10.1016/j.dsm.2024.04.004","DOIUrl":"10.1016/j.dsm.2024.04.004","url":null,"abstract":"<div><div>Accelerating green innovation is crucial for achieving high-quality development in China. Despite this importance, empirical evidence on the harmonization techniques in the context of carbon-trading policies has been remarkably thin. To address this gap, we employed the difference-in-difference (DID) and spatial difference-in-difference (S-DID) models using panel data from 2007 to 2017 for 30 Chinese provinces. Our findings reveal that the carbon-trading policy contributes significantly to the coordinated advancement of green technologies across Chinese provinces and exhibits a local siphoning effect. Specifically, the pilot areas of the policy have attracted talent from neighboring regions, which has fostered local cooperation and promoted coordinated innovation in green technologies within the region.</div></div>","PeriodicalId":100353,"journal":{"name":"Data Science and Management","volume":"7 4","pages":"Pages 293-303"},"PeriodicalIF":0.0,"publicationDate":"2024-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141054066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Trust framework for self-sovereign identity in metaverse healthcare applications","authors":"Alan Ling , Sergey Butakov","doi":"10.1016/j.dsm.2024.04.003","DOIUrl":"10.1016/j.dsm.2024.04.003","url":null,"abstract":"<div><div>The research community and digital sector are currently engaged in the development of diverse services within the metaverse ecosystems. Conversely, as concerns about safeguarding personal privacy mount, individuals anticipate exercising greater authority over the way third parties make use of sensitive information, such as medical data. This study aims to develop tools that can facilitate the provision of healthcare services within the metaverse ecosystem in a safe and trustworthy way. This project proposes a trust framework for digital healthcare applications to run in a metaverse environment. The framework is based on the use of self-sovereign identity (SSI) and has been tested on the design principles outlined for the SSI-based architecture. This study outlines two use-case scenarios that can serve as foundations for implementing a trust framework.</div></div>","PeriodicalId":100353,"journal":{"name":"Data Science and Management","volume":"7 4","pages":"Pages 304-313"},"PeriodicalIF":0.0,"publicationDate":"2024-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142552879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bibliometric analysis of the art market: From art price to market efficiency","authors":"Mingjun Guo , Xuerong Li , Yunjie Wei","doi":"10.1016/j.dsm.2024.03.006","DOIUrl":"10.1016/j.dsm.2024.03.006","url":null,"abstract":"<div><div>This study addresses a significant gap in the existing literature by conducting a comprehensive systematic review of the art market over the past 50 years, utilizing big data analysis and bibliometric methods. Through descriptive statistical analysis, we gained insights into research trends, influential literature, authors, academic disciplines, journals, institutions, and countries. By utilizing various bibliometric analyses, including co-citation, co-word, burstiness, time-zone, and co-cited author analyses, we unraveled the inherent logic within the literature. One significant discovery was the consistent annual increase in research interest in the art market. Notably, the focus of art market research has shifted from hedonic art prices to areas such as artist brand management, electronic art platforms, anti-money-laundering supervision, and art market efficiency. Moreover, this study highlights the impact of the COVID-19 pandemic, expediting an electronic revolution in the art market in recent years. Notably, our study is the first to comprehensively employ bibliometric methods to analyze the art market, thereby laying the groundwork for researchers interested in this field.</div></div>","PeriodicalId":100353,"journal":{"name":"Data Science and Management","volume":"7 4","pages":"Pages 349-360"},"PeriodicalIF":0.0,"publicationDate":"2024-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140780736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}