• Title/Summary/Keyword: use of computer

Search Result 10,224, Processing Time 0.05 seconds

Validating a Structural Model of Using Mobile Technology for Learning among High School Students

  • YUN, Heoncheol;PARK, Sanghoon
    • Educational Technology International
    • /
    • v.21 no.1
    • /
    • pp.1-29
    • /
    • 2020
  • Despite the existing body of literature focusing on the effects of one-to-one mobile technology integration in teaching and learning, research discussed that the determinants of mobile technology acceptance and use in secondary school settings are still unclear. Hence, this study examined the extent to which determinants influence high school students' behavioral intention to use one-to-one mobile technology for learning. The newly proposed model incorporated three additional constructs beyond those in the unified theory of acceptance and use of technology (UTAUT) model, including computer self-efficacy, attitude toward using technology and computer anxiety, as suggested by recent literature. Data were collected from 247 U.S. Midwestern high school students who participated in an online survey. Using a structural equation modeling approach, this study established construct validity for the nine-construct extended UTAUT model to assess high school students' intention to use mobile technology. The results of structural relations in the proposed model showed that their behavioral intention to use mobile technology was significantly predicted by social influence and attitude toward using technology. Also, their strong behavioral intention and facilitating conditions were associated with frequent use of mobile technology in learning. Discussion, implications, and conclusion were addressed in this study.

A Study on the Acceptance of Wearable Computers based on the Extended Technology Acceptance Model (확장된 혁신기술수용모델을 이용한 웨어러블 컴퓨터의 수용에 관한 연구)

  • Lee, Hyun-Mee
    • The Research Journal of the Costume Culture
    • /
    • v.17 no.6
    • /
    • pp.1155-1172
    • /
    • 2009
  • Wearable computers can be defined as next generation clothing integrated with various digital functions and devices. Unlike existing computers, they are viewed as human-centric computers customized for information utilization and other specific human needs. This study is intended to discover how consumers are accepting wearable computers, which are different from existing computers, based on Technology Acceptance Model(TAM) and to extend the model by adding variable regarding acceptance of wearable computers. A total of 683 copies of questionnaires, distributed to those aged 19 and older, both male and female, were collected online. The data was statistically analyzed for this study using the extended TAM. In order to test hypotheses, the structural equation model using the Lisrel 8.30 version was performed. For analyzing constructs(or traits) of research model, exploratory factor was conducted and the measurement model was assessed from the result. Reliability was assessed through confirmatory factor analysis and the calculation of Cronbach's alpha coefficients. Overall, model fit was assessed by statistical indexes: Chi-square value, GFI, AGFI, and RMR. This study analyzed the process of acceptance of wearable computers with the extended TAM that includes a variable, perceived value, on the basis of previous studies. The results of the analysis revealed that attitude toward wearable computer was directly influenced by perceived usefulness and perceived value but indirectly influenced by perceived ease of use. Acceptance intention of the wearable computer was directly influenced by perceived value and attitude toward wearable computer. To be more specific, perceived usefulness was significantly correlated with both attitude toward wearable computer and acceptance intention of the wearable computer. Perceived value was also significantly correlated with both attitude toward wearable computer and acceptance intention of the wearable computer. The results of this study also suggested that perceived ease of use was actually a causal antecedent to perceived usefulness and perceived value. This research revealed that extended TAM to investigate the acceptance of wearable computer was appropriate. This study is intended to provide a theoretical framework for adoption of wearable computer and suggest empirical analysis that can serve as a guide for wearable computer.

  • PDF

Actual Condition of Teenagers' Computer Game Addiction and It's Influence on their Personality (청소년의 컴퓨터 게임 중독 실태와 인성에 미치는 영향)

  • Ahn, Seong-Hun;Jang, IL-Young
    • Journal of The Korean Association of Information Education
    • /
    • v.11 no.4
    • /
    • pp.447-459
    • /
    • 2007
  • Recently, the use of computer game by Korean teenagers is rapidly growing due to the expansion of the computer popularization and the development of game industry. Of all the teenagers, 82.4% have experience of playing computer game and statistics shows that 22.4% of them play everyday. There is an opinion that the computer game not only improves self confidence and concentration but also enhances internet use, foreign language usage and cognitive ability so that it accelerates learning efficacy and releases stress. On the other hand, there also exists a negative opinion on the symptoms of its addiction. Young(1996) warns that like other addictions, computer game addiction can provoke social problems such as loss of control, desire, marriage problem, schoolwork failure, financial deficiency and loss of employment. Therefore, this study has investigated how computer game addiction affects teenagers' personality. For this purpose, I have conducted the research on the reality of teenagers'computer game use, computer game addiction assessment, analysis on the difference between male and female, and on the relation between the level of computer game addiction and teenagers' personality. As a result, it is confirmed that the computer game addiction affects negatively to teenagers' personality such as stability, self-controlling, perceiving emotion, expressing emotion and controlling emotion.

  • PDF

Applying Parallel Processing Technique in Parallel Circuit Testing Application for improve Circuit Test Ability in Circuit manufacturing

  • Prabhavat, Sittiporn;Nilagupta, Pradondet
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.792-793
    • /
    • 2005
  • Circuit testing process is very important in IC Manufacturing there are two ways in research for circuit testing improvement. These are ATPG Tool Design and Test simulation application. We are interested in how to use parallel technique such as one-side communication, parallel IO and dynamic Process with data partition for circuit testing improvement and we use one-side communication technique in this paper. The parallel ATPG Tool can reduce the test pattern sets of the circuit that is designed in laboratory for make sure that the fault is not occur. After that, we use result for parallel circuit test simulation to find fault between designed circuit and tested circuit. From the experiment, We use less execution time than non-parallel Process. And we can set more parameter for less test size. Previous experiment we can't do it because some parameter will affect much waste time. But in the research, if we use the best ATPG Tool can optimize to least test sets and parallel circuit testing application will not work. Because there are too little test set for circuit testing application. In this paper we use a standard sequential circuit of ISCAS89.

  • PDF

Computer Technologies as A Method to Create A Contemporary Ex-Libris

  • Romanenkova, Julia;Bratus, Ivan;Varyvonchyk, Anastasia;Sharikov, Denis;Karpenko, Olga;Tkachuk, Olena
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.332-338
    • /
    • 2022
  • The article is dedicated to the phenomenon of modern ex-libris created with the help of computer graphics. The process of evolution in the use of various techniques of book plate creating is analyzed, the role of computer technologies in the popularization of the modern book plate is emphasized. The debatable nature of the issue of the danger of displacement, replacement of traditional techniques of printed graphics with computer technologies is emphasized. Computer graphics are positioned as an effective way to popularize the Ukrainian ex-libris in the foreign art space. The characteristic features of the Ukrainian computer ex-libris are highlighted, a parallel with the book plate created with the help of computer graphics by masters of other countries (Belgium, China, the Netherlands, Poland, Turkey) is drawn

Analysis of the Current Situation about the Computer Education of Commercial High School placing empasis on Gwang-Ju city area (상업계 고등학교 컴퓨터 교육에 관한 현황분석(광주광역시 중심))

  • Ahn, Ju-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.906-909
    • /
    • 2007
  • The method of distributing some questionnaires to the total 4 schools in the area of Gwang-ju city and then collect them later has been used in this study. By using the coefficient of Cronbach's alpha for the collected data, the trust rate of the method of questionnaires have been verified. In conclusion it's been analized that there are disparities in 'computer education course, professor lesson, possibility of computer use, teaching obstacles, self development of teachers, choice and organization of the computer education contents' according to the general situation of the teachers who charge computer education sand there are also disparities in 'goal of computer education, computer curriculum related learning activity, computer curriculum related learning satisfaction, practical use of computer facility, interested contents of students, other lessons besides regular education course' according to the general situation of the students who receive computer education in commercial high school.

  • PDF

Self-Recognition Algorithm of Artificial Immune System (인공면역계의 자기-인식 알고리즘)

  • 심귀보;선상준
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.11 no.9
    • /
    • pp.801-806
    • /
    • 2001
  • According as many people use a computer newly, damage of computer virus and hacking is rapidly increasing by the crucial users A computer virus is one of program in computer and has abilities of self reproduction ad destruction like a virus of biology. And hacking is to rob a person's data in a intruded computer and to delete data in a person s computer from the outside. To block hacking that is intrusion of a person s computer and the computer virus that destroys data, a study for intrusion-detection of system and virus detection using a biological immune system is in progress. In this paper, we make a model of positive selection and negative selection of self-recognition process that is ability of T-cytotoxic cell that plays an important part in biological immune system. So we embody a self-nonself distinction algorithm in computer, which is an important part when we detect an infected data by computer virus and a modified data by intrusion from the outside. The composed self-recognition process distinguishes self-file from the changed files. To prove the efficacy of self-recognition algorithm, we use simulation by a cell change and a string change of self file.

  • PDF

Multimedia Technologies for Teaching Musical Art under Present-day Conditions

  • Svitlana Huralna;Nataliia Demianko;Nataliia Sulaieva;Viktoriia Irkliienko;Tetiana Horokhivska
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.5
    • /
    • pp.165-171
    • /
    • 2024
  • The processes of society's informatization and digitalization necessitate the widespread use of new pedagogical technologies. Through these technologies, comprehensive disclosure of didactic functions of new methods of educational activity and the realization of the potential and creative potential. The use of information and computer multimedia technologies in teaching music art is especially relevant in the intensification of the development of interactive technologies, the transition to mixed forms of learning, and a period of socio-economic and sociopolitical upheavals. The study aims to substantiate the theoretical and applied principles of the analysis of multimedia technology learning musical art in modern conditions and assess the status and trends in their use in conducting educational activities. The study uses general scientific and unique methods of economic analysis, in particular, analysis and synthesis, analogy and comparison, generalization and systematization, and graphic ways. Regarding the results of the study of multimedia technologies for teaching musical art in current conditions, it was found that they contribute to the development of the seeker's creative, creative, and cognitive activity, have a positive impact on learning material, and diversify the educational process. Multimedia technologies such as presentations, programs for watching a video, listening to audio, music and singing karaoke, electronic encyclopedias, and Internet resources are proven to be the most used in music education. They have several qualitative and quantitative advantages, manifested in the possibilities of audio-visual presentation of educational material and significantly higher information density. It is suggested to strengthen the use of such computer programs as Microsoft Word, Ahead Nero, Finale, Adobe Audition, Sound Forge, and Microsoft PowerPoint for musical art classes.

Design of an USB Security Framework for Double Use Detection (이중사용 방지를 위한 USB 보안 프레임워크의 설계)

  • Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.4
    • /
    • pp.93-99
    • /
    • 2011
  • Recently, the development of internet technology makes user's personal data used by being saved in USB. But there is a critical issue that personal data can be exposed with malicious purpose because that personal data doesn't need to be certificate to use. This paper proposes USB security framework to prevent a duplicate use of personal data for protecting the data which in USB. The proposed USB security framework performs certification process of user with additional 4bite of user's identification data and usage choice of USB security token before certification data when the framework uses USB security product in different network. It makes communication overhead and service delay increased. As a result of the experiment, packet certification delay time is more increased by average 7.6% in the proposed USB security framework than simple USB driver and USB Token, and procedure rate of certification server on the number of USB is also increased by average 9.8%.