• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.031 seconds

Developing EFL Students' Vocabulary and Reading Comprehension Skills within an Interactive Learning Environment

  • Alsamadani, Hashem A.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.145-152
    • /
    • 2022
  • The current study investigates the effects of an interactive learning environment on EFL students' vocabulary acquisition and reading comprehension skills. The study utilized a quasi-experimental design. The sample consisted of 41 students enrolled in the English program at Umm Al-Qura University studying Reading in EFL course in Summer 2018/2019. The sample was randomly divided into two groups: A control group consisting of 21 students and an experimental group of 20 students. The results revealed statistically significant differences at (α≤ 0.01) between the mean scores of the experimental group and the control group in the posttest of the vocabulary test and the reading comprehension test favoring the experimental group. Finally, the study concluded with a call for more studies on modern technologies in teaching EFL skills in the Saudi context.

Human Right Requirements in the Metaverse Era

  • Alkhiri, Talal Agil Attas
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.67-74
    • /
    • 2022
  • This study is a theoretical account of HRs requirements in educational institutions in light of the growing influence of digital technology on human rights. It intends to reveal prominent human and civilizational values encapsulated in modern human rights regulations. It dwells on educational and societal requirements for educational inclusion in the school and university curricula in light of changes that have taken place in HRs in the digital age. Relying on the descriptive documentary research design, the study concluded that HRs are inherently moral duties and fixed values. They include the importance of tolerance, freedom, peace, justice, science, work, and equality. Because education is arguably based on human and civilized values, educational foundations require intake of awareness, systematic integration and responsibility from all academic and community institutions, including family and media institutions. The article closes on a note of how technology has impacted human rights in the digital age. It provides implications and recommendations to pedagogies accordingly.

Psychological And Pedagogical Aspects Of Innovation Processes In Educational Activities

  • Yurchenko, Liubov;Lazorenko, Serhii;Mnozhynska, Ruslana;Tymoshenko, Yelyzaveta;Hatsenko, Halyna;Narozhna, Nadiia
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.131-134
    • /
    • 2021
  • The article conducted an interdisciplinary study of the concepts of innovation, innovation, innovative educational process, pedagogical innovation, management of an educational institution. Based on the study of psychological, methodological, philosophical literature, scientific approaches to the management of an innovative educational institution have been analyzed, and a strategy for its improvement has been determined. Purpose of the work: to study and characterize innovations in education, as well as in the education system.

Modeling of Regional Management of Innovation Activity: Personnel Policy, Financial and Credit and Foreign Economic Activity

  • Prylipko, Sergii;Vasylieva, Nataliia;Kovalova, Olena;Kulayets, Mariia;Bilous, Yana;Hnatenko, Iryna
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.43-48
    • /
    • 2021
  • The article proposes a method of modeling a comprehensive indicator for evaluating the effectiveness of regional management of innovation activity. This will make it possible to assess the effectiveness of personnel, financial and credit and foreign economic activity of the regions from the standpoint of an integrated approach. The modeling technique is proposed to be carried out using the tools of taxonomic analysis and the calculation of a complex indicator of the effectiveness of the innovation activity management.

Effects of Gamification-Based Learning on Learners' Achievement Motivation at First-Grade Intermediate Level

  • Al-Sulami, Sami Ben Shamlan Bakhit
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.266-276
    • /
    • 2022
  • The study aimed to pinpoint the effects of an educational environment based on gamification on developing achievement motivation among first-grade intermediate students. Using an achievement motivation scale, the study adopted a quasi-experimental design with experimental and control groups. The sample consisted of 52 students selected randomly from the first-grade intermediate students. They were studying in public intermediate schools in Jeddah at the time of this study. They were divided into two groups. The control group (n=24 respondent), and the experimental group (n=28 respondent). The results showed statistically significant differences at the level α ≥ 0.05 between the mean scores of the experimental group and the control group in the posttest of the achievement motivation measurement in favor of the experimental group. The study recommended using gamification in designing computer curricula and courses across educational stages in Saudi Arabia. It also recommends training the computer and information technology teachers on using gamification in their teaching.

Design of Smartphone Secure Keypad Using Indirect Pattern (간접 패턴을 이용하는 스마트폰 보안 키패드 설계)

  • Choi, Dongmin
    • Journal of Korea Multimedia Society
    • /
    • v.25 no.7
    • /
    • pp.932-944
    • /
    • 2022
  • Smartphones, are currently equipped with high-performance hardware to process large amounts of data and provide most of the functions provided by desktop PCs. In addition, the smartphones enable quick user authentication through biometric information collected from embedded sensors. However, the biometric authentication method is sometimes rejected due to social and cultural environment, security vulnerabilities, and misrecognition rate. Thus, conventional authentication methods such as PIN and pattern authentication are still mainly used. Consider the latest foldable and bendable smartphones. These devices may be vulnerable to social engineering attacks as they use conventional authentication methods without considering their form factors. In this study, therefore, we propose an authentication method using partial elements of PIN and pattern authentication as a way to increase the security of the conventional authentication methods and consider the recent form factors. According to the performance evaluation results, our method provides improved safety compared to the conventional methods.

Viewpoint Model Manipulating Inconsistencies Management

  • Ahmad Dalalah;Jalawi AlShudukhi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.96-100
    • /
    • 2023
  • In this paper, each inconsistency management process activities was addressed. In addition, a guideline to deal with inconsistency by viewpoints method are introduced. At the end of the paper you should have clear idea to support inconsistency management in future research and having good knowledge of inconsistency management process activities and research issues. Moreover, it gives the researcher ability to design new framework by using powerful concept in inconsistency management and viewpoint techniques. The paper is organized as follows: an introduction is presented in section one, section two contains process viewpoint, while section three includes the proposed model and conclusions are in section four.

The Effectiveness of a Program in Activities for Early Students to Develop Some of the Basic Skills Needed for the Age of Artificial Intelligence

  • Adelah Abdulhamid Abdulwahab, Rajab
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.12
    • /
    • pp.239-244
    • /
    • 2022
  • The study aimed to build a program in activities for early childhood students to develop some of the basic skills necessary for the age of artificial intelligence, to achieve the objectives of the study , the researcher used the experimental design, and the research sample consisted of 37 early childhood students. The study used the following tools: Experimental treatment subject: the proposed program in the activities, Measurement and evaluation tool: testing the basic skills needed for the age of artificial intelligence. The study concluded several results: There is a statistically significant difference (α≤0.05) between the average grades of the early childhood students in the research group in the tribal and remote measurements to test the basic skills necessary for the age of artificial intelligence in favor of the students grades in the dimensional measurements. Practical application of the study through benefiting from the proposed program of activities prepared in the current study in planning and implementing activities to develop the basic skills necessary for the age of artificial intelligence among early childhood students.

Effectiveness of A Proposed Program for Training Social Studies Teachers in the Light of Electronic Functional Competencies

  • Atef Mohamed Saied, Abdallah
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.12
    • /
    • pp.139-145
    • /
    • 2022
  • The study aimed to build a proposed program for training Social Studies teachers in the light of electronic functional competencies, the researcher used the experimental method with a quasi-experimental design, the study sample consisted of (37) Social studies teachers in Ismailia. A proposed program in the light of electronic functional competencies. A measure of awareness of the dimensions and components of electronic feasibility. The study concluded several results: There is a statistically significant difference at the level of (a ≤0.01) between the average scores of the teachers of the research group in the pre and post measurements of the measure of awareness of the dimensions and components of electronic functional competencies in favor of the teachers scores in the post-measurement. Training Social studies teachers on the functional electronic competencies necessary for them to keep up with educational developments.

Design of Trigger Protocol for Location Based Services (위치기반서비스를 위한 트리거 프로토콜 설계)

  • Shim, Jae-Min;Kim, Kyu Ik;Lee, Chang Eun;Lee, Eung-Jae;Nam, Kwang-Woo;Ryu, Keun-Ho
    • Annual Conference of KIPS
    • /
    • 2010.04a
    • /
    • pp.905-907
    • /
    • 2010
  • 최근 스마트폰의 급속한 보급 확대로 무선 인터넷 기반의 위치기반광고 등 위치기반서비스에 대한 관심이 커지고 있다. 이 논문은 위치기반서비스를 제공하기 위하여 필수적으로 요구되는 트리거 유형을 살펴보고 각각의 트리거 유형을 처리하기 위한 트리거 프로토콜을 제시한다. 제안된 프로토콜은 위치기반서비스를 효과적으로 제공하기 위하여 필요한 시간 트리거와 공간트리거의 설정 및 처리 방법을 기술한다.