Статьи журнала - International Journal of Modern Education and Computer Science

Все статьи: 968

Examining Chen and Starosta's Model of Intercultural Sensitivity in the Taiwanese Cultural Context

Examining Chen and Starosta's Model of Intercultural Sensitivity in the Taiwanese Cultural Context

Jia-Fen Wu

Статья научная

The main purpose of this study was to empirically examine Chen and Starosta's Model of Intercultural Sensitivity and reproduce a valid scale in the Taiwanese cultural context, using both exploratory and confirmatory factor analyses. Results indicated that Chen and Starosta's five-factor model of intercultural sensitivity (IS) did not fit the Taiwanese cultural context. Instead, a four-factor model of IS was created using an exploratory factor analysis. The four factors were based on the 13 items of 24-item Intercultural Sensitivity Scale (ISS) formulated by Chen and Starosta. The reliability coefficient was .801, demonstrating high internal consistency. A confirmatory factor analysis was performed again to determine the construct validity of the alternative model of IS. Since cultural differences may influence the factor structure of a test, using both EFA and CFA can methodologically provide a meaningful explanation for replication studies. This study proposes an alternative model of the Intercultural Sensitivity Scale that is a better fit with Taiwanese culture by reinterpreting Chen and Starosta's ISS.

Бесплатно

Examining Mindfulness in Education

Examining Mindfulness in Education

Asoka S Karunananda, Philippe R Goldin, P D Talagala

Статья научная

Despite the availability of numerous learning opportunities ranging from face-to-face to computer-based learning, there is need for better understanding of how to support the development of cognitive skills in students. Research has shown that cultivation of mindfulness skills help to develop cognitive skills such as retention, thinking, problem solving, and emotional balance. However, there is only limited research on the effect of mindfulness training in educational settings. We examined cognitive abilities of university students as identified in Bloom's taxonomy and mindfulness skills during a single traditional face-to-face class room session. We hypothesized that mindfulness is a specific cognitive ability that supports the development of other cognitive skills. This pilot study included 148 students from undergraduate and postgraduate programs at two universities in Sri Lanka. The study assessed cognitive abilities, including retention, thinking, out-of-the-box thinking, note-taking and mindfulness at the end of a one-hour lecture. The results showed that students' self-reported mindfulness following a lecture was significantly lower than other cognitive abilities. These results suggest conducting a more formal controlled experiment to investigate the effect of mindfulness training in education.

Бесплатно

Examining the use of information systems to preserve indigenous knowledge in Uganda: a case from muni university

Examining the use of information systems to preserve indigenous knowledge in Uganda: a case from muni university

Josephat O. Oroma, Guma Ali

Статья научная

Indigenous Knowledge (IK), can be preserved using Information Systems in order to protect cultural heritage and disseminate local knowledge for development. This knowledge often passed on orally for generations has become significant in searching for answers to several world's critical problems, are at risk of becoming extinct. This "traditional wisdom" is highly useful in solving complex problems of health, agriculture, education, use of natural resources and the environment. The main challenges of IK are inadequate documentation and diminishing transmission channels. Both descriptive and quantitative methods are used in this study that focuses on highlighting the importance of indigenous knowledge in the sustainable development process and illustrating ways in which technology can be used to preserve it, thereby enriching the development process from a holistic perspective. This research strengthens the preservation of local IK, enhances its adoption in the formal educational settings, leads to improvement in scientific knowledge development and inspire sustainable community development using a holistic approach.

Бесплатно

Experiences from Video Lectures in Software Engineering Education

Experiences from Video Lectures in Software Engineering Education

Antti Herala, Antti Knutas, Erno Vanhala, Jussi Kasurinen

Статья научная

Millennials have learned to seek information from the Internet whenever they need to know something and want to learn things. In this study, we present observations from several university courses with freely available online resources for the modern students. Ten different courses with video lectures were observed, often with positive outcomes and improved results compared to the previous course arrangements. Additionally, unlike in some previous literature, we observed that some issues such as the video length did not have a meaningful impact on the learning outcomes. Overall, the results indicate that videos offer excellent benefit-effort-ratio, and are an efficient way to reach the target audience: the students.

Бесплатно

Experimental Analysis of SPF Based Secure Web Application

Experimental Analysis of SPF Based Secure Web Application

Nitish Pathak, Girish Sharma, B. M. Singh

Статья научная

In this paper we will propose model driven software development and Security Performance Framework (SPF) Model to maintain the balance between security and performance for web applications. We propose that all security in a Trusted Operating System is not necessary. Some non-essential security checks can be skipped to increase system performance. These non essential security checks can be identified in any web application. For implementation of this Security Performance framework based trusted operating system, we propose object oriented based Code generation through forward engineering. This involves generating source code of web application from one or more Object oriented Rational Rose model. The novel integration of security engineering with model-driven software expansion approach has varied advantages. To maintain security in various applications like Ecommerce, Banking, Marketplace services, Advertising, Auctions, Comparison shopping, Mobile commerce Payment, Ticketing, Online insurance policy management, we have to use high secured operating systems. In this regard a number of trusted operating systems like Argus, Trusted Solaris, and Virtual Vault have been developed by various companies to handle the increasing need of security. Due to high security reason these operating systems are being used in defense. But still these secure operating systems have limited scope in commercial sector due to lower performance; actually this security will come at a cost. This paper analyzes UML-based software development solutions for SPF to manage the security, performance and modeling for web applications.

Бесплатно

Extending the SOLO Model for Software-Based Projects

Extending the SOLO Model for Software-Based Projects

Ilana Lavy, Aharon Yadin

Статья научная

In the process of assessing learning outcomes, educators use constructive tools for evaluating students' understanding and performance. In the present study MIS students were engaged in a full life cycle project as part of a Software Analysis and Design workshop. For evaluating their performance, we used the SOLO (Structure of the Observed Learning Outcomes) taxonomy. However during the various stages of the workshop we encountered some inherent limitations of the taxonomy that led us to the understanding that the SOLO taxonomy should be enhanced. This paper elaborates on these missing but required enhancements.

Бесплатно

Extractive Text Summarization Using Modified Weighing and Sentence Symmetric Feature Methods

Extractive Text Summarization Using Modified Weighing and Sentence Symmetric Feature Methods

Selvani Deepthi Kavila, Radhika Y

Статья научная

Text Summarization is a process that converts the original text into summarized form without changing the meaning of its contents. It finds its usefulness in many areas when the time to go through a large content is limited. This paper presents a comparative evaluation of statistical methods in extractive text summarization. Top score method is taken to be the bench mark for evaluation. Modified weighing method and modified sentence symmetric feature method are implemented with additional characteristic features to achieve a better performance than the benchmark method. Thematic weight and emphasize weights are added to conventional weighing method and the process of weight updation in sentence symmetric method is also modified in this paper. After evaluating these three methods using the standard measures, modified weighing method is identified as the best method with 80% efficiency.

Бесплатно

FPGA Based Pipelined Parallel Architecture for Fuzzy Logic Controller

FPGA Based Pipelined Parallel Architecture for Fuzzy Logic Controller

Vinod Kapse, Bhavana Jharia, S. S. Thakur

Статья научная

This paper presents a high-speed VLSI fuzzy inference processor for the real-time applications using trapezoid-shaped membership functions. Analysis shows that the matching degree between two trapezoid-shaped membership functions can be obtained without traversing all the elements in the universal disclosure set of all possible conditions. A FPGA based pipelined parallel VLSI architecture has been proposed to take advantage of this basic idea, implemented on CycloneII-EP2C70F896C8. The controller is capable of processing fuzzified input. The proposed controller is designed for 2-input 1-output with maximum clock rate is 12.96 MHz and 275.33 MHz for 16 and 8 rules respectively. Thus, the inference speed is 0.81 and 34.41 MFLIPS for 16 and 8 rules, respectively.

Бесплатно

Face Recognition in Multi Camera Network with Sh Feature

Face Recognition in Multi Camera Network with Sh Feature

R.Sumathy

Статья научная

Multi view face recognition using multiple camera networks is an active research area. The main aim of this paper is to handle different pose variations in multi camera network and recognizing face from those videos. The traditional approaches handle the pose estimation explicitly ,the proposed work will handle the multiple views of the poses .For a given set of multi view video sequences we use particle filter to track the 3D location of the head. The texture map is generated by back projecting the multi view video. The proposed work is developed using the Spherical Harmonic (SH) representation of the face from the texture mapped on to the sphere. A robust feature is constructed based on the properties of SH projection.

Бесплатно

Facebook Applications to Promote Academic Engagement: Student's Attitudes towards the Use of Facebook as a Learning Tool

Facebook Applications to Promote Academic Engagement: Student's Attitudes towards the Use of Facebook as a Learning Tool

Ibtesam Fares. Al-Mashaqbeh

Статья научная

The aim of this study is to investigate higher-education student's attitude toward the use of Facebook, as one of the social media tool, to enhance their education. This study was conducted on college students at one of the Jordanian higher educational institution. The number of participants of this study was forty five students who were enrolled in Computer Educational course. This course is either a graduation requirement for all elementary education major students or as an elective course for other student's non-computer majors. We noticed that each student has created a Facebook Page to use for the class purposes and other page(s) for their own personal needs. The result of the study showed that the Facebook site is a useful tool to deliver course materials and support learning. Students have showed their acceptance of this media to communicate with others and to find course materials and references. Most participants felt motivated and enjoyed going through the course when using the Facebook site.

Бесплатно

Factors Affecting Entrepreneurial Motivation and Intention of University Students in Hanoi, Vietnam

Factors Affecting Entrepreneurial Motivation and Intention of University Students in Hanoi, Vietnam

Do Thi Minh Hue, Tran Phuong Thao, Pham Canh Toan, Hoang Dinh Luong, Phan Thi Hao, Do Thi Huyen, Nguyen Thi Hoa

Статья научная

Entrepreneurship is the key driver of economic progress in many countries; thus, many countries have introduced policies to promote a more entrepreneurial environment. This study assesses the impact of factors affecting entrepreneurial intention of university students. The data was collected through a survey of 341 students at 09 leading universities in Hanoi, Vietnam and analyzed using structural equation modeling (SEM) with SPSS and Amos software. The research results show that entrepreneurial skills, entrepreneurial environment and subjective norms either directly or indirectly affect business motivation and entrepreneurial intention of university students. Thus, it is suggested that university and other educational institutions should provide more activities and taught courses that help students acquire the knowledge and skills necessary for entrepreneurship.

Бесплатно

Factors Affecting Failing the Programming Skill Examination of Computing Students

Factors Affecting Failing the Programming Skill Examination of Computing Students

Rex P. Bringula, Ariel D.V. Aviles, Ma. Ymelda C. Batalla, Ma. Teresa F. Borebor, Mark Anthony D. Uy, Bernadette E. San Diego

Статья научная

This descriptive study utilized a validated instrument to determine the factors that affect failing a programming skill examination. Through this finding, the study attempted to provide solutions to address the concerns of the students. The top three reasons why students failed the programming skill examination were the insufficient time dedicated to programming courses, self-inefficacy in programming, and unmatched question-time allotment. Overall, respondents attributed their failed mark in programming skill examination to question-related factors. This was confirmed through the use of regression analysis. Hence, it was concluded that students failed the programming skill examination because the perceived ability of the students in the programming skill examination did not correspond with the degree of difficulty of the programming skill examination questions. Further, the null hypothesis stating that student-related concerns do not predict the number of times the programming skill examination would be taken was partially rejected. Hence, it was recommended that the programming skill examination questions be calibrated based on the ability of the students. Future research directions were also presented.

Бесплатно

Factors Militating against Successful Implementation of Computer Studies in 9-Year Universal Basic Education (UBE) Programme

Factors Militating against Successful Implementation of Computer Studies in 9-Year Universal Basic Education (UBE) Programme

Garba Suleiman, Solomon A. Adepoju, John K. Alhassan

Статья научная

The application of Information and Communication Technology which is shaping and changing the world socially, educationally and economically cannot be over emphasized. In view of that, this paper looks at the factors militating against successful implementation of computer studies in 9-year Universal Basic Education (UBE) programmes. Five UBE schools were randomly selected for the research. Two research questions were postulated to guide the conduct of the research and t-test analysis was used for testing the hypotheses. The findings showed that there is positive perception by the students on factors militating against successful implementation of 9-year UBE programme. Based on the findings, some recommendations were made: provision of qualified teachers, instructional materials, provision of laboratories and so on in order to improve and ensure effective and efficient implementation of the 9-year Universal Basic (UBE) programme.

Бесплатно

Factors that Impact on Rural and Remote Students’ Participation in Higher Education

Factors that Impact on Rural and Remote Students’ Participation in Higher Education

Delwar Hossain, Don Gorman, Jill Lawrence, Lorelle Burton

Статья

This paper aims to explore the factors that impact on rural and remote students’ participation in higher education at university. The findings indicated that the students were familiar only with university scholarships, tertiary preparation program, and head start. Before admission, most students required information on pathways to university, admission requirements, scholarships, and range of courses and after admission they required information on academic support, tutorial assistance, library and IT services. This paper also suggests that universities need to evaluate the effectiveness of the services they offer to both attract and support rural and remote students to University if participation rates are to be raised.

Бесплатно

Fault Repairing Strategy Selector for Service-Oriented Architecture

Fault Repairing Strategy Selector for Service-Oriented Architecture

Guru Prasad Bhandari, Ratneshwer

Статья научная

The success of a service oriented computing significantly depends on its reliability and availability. To achieve better reliability and availability, any fault of the service oriented computing has to be properly handled. Low performance on handling the service fault becomes the most proliferated challenge on fault handling approaches. In this paper, a priority based fault handling strategy selection approach for fault recovery of SOA (Service Oriented Architecture) is proposed using priority selector and fault handler. This approach starts from fault detection method and select the first priority level strategies promptly and if fault could not be handled by first highest level then fault handler selects the second level or intermediate priority level for average performance. As a final in the worst case, least level strategies are applied to resolve the faulty situation. Through experiment, the correctness of the proposed algorithm and the efficiency of the approach are proved. This approach results better performance and high rate of fault repairing.

Бесплатно

Fault Tolerant ALU using Parity Preserving Reversible Logic Gates

Fault Tolerant ALU using Parity Preserving Reversible Logic Gates

Shaveta Thakral, Dipali Bansal

Статья научная

Demand of reliable computing has been a major concern since the dawn of the electronic digital computer age. Reliable computing has various applications not only in the field of military, aerospace and communication but even contemporary commercial applications to fulfill today's automated life style. The tremendous growth in fabrication from small scale integration (SSI) to giant scale integration (GSI) is facing power dissipation as one of the main barriers. To overcome this barrier, researchers need to enter into the reversible logic domain. Making a reversible circuit robust or fault tolerant is much more difficult than a conventional logic circuit. Fault tolerance can be achieved in a system by using parity bits. The main aim of this paper is to come up with a new fault tolerant ALU design based on parity preserving reversible logic gates with improved quantum cost and power overhead as compare to existing fault tolerance based ALU designs. The most stringent requirement for fault tolerant ALU is in real time control system where faulty computation jeopardizes human life or other catastrophic effects.Implentation of proposed design is done using Xilinx ISE design suit 14.2 tool and its performance over existing ALU designs is qualitatively analyzed.

Бесплатно

Favorable Trail Detection using ACO-Bellman Algorithm in VANETs

Favorable Trail Detection using ACO-Bellman Algorithm in VANETs

Yogesh, Parminder Singh

Статья научная

Vehicular ad hoc networks (VANETs) are the networks, which configured themselves, where the nodes are moving vehicles. These provide the communications required to deploy Intelligent Transportation Systems (ITS). A major dispute in VANETs is distribution of efficient and computable information because during communication nodes may leave or join the network dynamically. There is no guarantee about node availability at any given time, which leads to traffic problem, congestion problem. Therefore trailing the favorable path is a challengeable issue. Multiple routing algorithms have been developed for routing solution. In this paper the swarm-based algorithm has been presented, which helps to find out the optimal route using Bellman Ford algorithm. Ant colonization searches out the path using pheromones level. Higher the pheromone count of a route gives the optimal choice of path that can be used for packet delivery. Bellman Ford Algorithm optimizes the paths found by Ant Colony Optimization (ACO) by comparing the distance of source to all the nodes of network or cost given to the networks.

Бесплатно

Finding Vulnerabilities in Rich Internet Applications (Flex/AS3) Using Static Techniques

Finding Vulnerabilities in Rich Internet Applications (Flex/AS3) Using Static Techniques

Sreenivasa Rao Basavala, Narendra Kumar, Alok Agarrwal

Статья научная

The number and the importance of Rich Internet Applications (RIA) have increased rapidly over the last years. At the same time, the quantity and impact of security vulnerabilities in such RIA applications have grown as well. Since manual code reviews are time-consuming, error prone and costly,the need for automated solutions has become evident.In this paper, we address the problem of vulnerable detection on Adobe Flex RIA web 2.0 applications by means of static source code analysis. To this end, we present a novel; precise alias analysis targeted at the unique reference semantics commonly found in RIA based web applications or widgets developed in Adobe Flex Framework or Action Script 3.0. Moreover, we enhance the quality and quantity of the generated vulnerability reports.

Бесплатно

Fixed Point Theorems for Occasionally Weakly Compatible Maps in G-Metric Space

Fixed Point Theorems for Occasionally Weakly Compatible Maps in G-Metric Space

Saurabh Manro

Статья научная

The purpose of this paper is to prove new common fixed point theorem in Symmetric G-metric space. While proving our result, we utilize the idea of occasionally weakly compatible maps due to Al-Thagafi and N. Shahzad. Our result substantially generalize and improve a multitude of relevant common fixed point theorems of the existing literature in G- metric space.

Бесплатно

Focus Question based Inquiry Guided Learning for the Attainment of Course Learning Outcomes

Focus Question based Inquiry Guided Learning for the Attainment of Course Learning Outcomes

R.S Vaddi, B.S Yalamanchili, K.R Anne

Статья научная

Teaching and learning Methodologies in technical and engineering education has high impact on attainment of Graduate attributes. Studies have proved that class room teaching with mere usage of Black board (BB) and audio visual presentations doesn't effectively involve the student completely in learning. Also evaluation and assessment with midterm exams and end term exams may not give the complete picture of student learning progress. In fact in today's outcome based education the attainment of course learning outcomes require student centered teaching learning procedures and a continuous evaluation procedure. In this paper Focus question based Inquiry based learning an active teaching learning procedure also student centered is discussed. Also how this method is used for continuous assessment is also explained. It is successfully implemented to under graduate and post graduate students of Computer science and Information technology of engineering college, and the results are presented.

Бесплатно

Журнал