International Journal of Information technology and Computer Engineering最新文献

筛选
英文 中文
Sending Notification to Someone Missing you Through Smart Watch 通过智能手表向想念你的人发送通知
International Journal of Information technology and Computer Engineering Pub Date : 2022-09-29 DOI: 10.55529/ijitc.25.19.24
Divya Vishwanath Swami, Sakshi Sachin Thamake, Nandini Sham Ubale, P. Lokhande, Dr. Kazi Kutubuddin Sayyad Liyakat
{"title":"Sending Notification to Someone Missing you Through Smart Watch","authors":"Divya Vishwanath Swami, Sakshi Sachin Thamake, Nandini Sham Ubale, P. Lokhande, Dr. Kazi Kutubuddin Sayyad Liyakat","doi":"10.55529/ijitc.25.19.24","DOIUrl":"https://doi.org/10.55529/ijitc.25.19.24","url":null,"abstract":"From our smartwatch we get the result will be the person can send the notification and the particular person will be receive the notification. With the information we obtain from our smartwatch, we can determine who will receive and who will send notifications. The major goal of adding that function or application to our smartwatch is to notify someone that we are missing them. We use the smartwatch since we can always take it with us. We have added a new function or application to our smartwatch so that if someone is missing, another person will be notified that they are missing them. In our project, a Bluetooth/Wi-Fi connection is made between a smartphone and a smartwatch. We can use Bluetooth or Wi-Fi to send someone a notification that we are looking for them by using their smartwatch's IP address. The smartwatch will first check our smartphone contact information before we can choose a contact's name from the contact list.","PeriodicalId":180021,"journal":{"name":"International Journal of Information technology and Computer Engineering","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129493918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The Impact of Using Computer Techniques and Its Applications in Medicine Fields 使用计算机技术的影响及其在医学领域的应用
International Journal of Information technology and Computer Engineering Pub Date : 2022-09-27 DOI: 10.55529/ijitc.25.35.40
Ola Basil
{"title":"The Impact of Using Computer Techniques and Its Applications in Medicine Fields","authors":"Ola Basil","doi":"10.55529/ijitc.25.35.40","DOIUrl":"https://doi.org/10.55529/ijitc.25.35.40","url":null,"abstract":"Due to the development in information and computer technology, these technologies have been applied in various medical fields, which is reflected in the future medical development in the areas of treatment and management of confidential information for patients. Personal health is one of the most crucial parts of everyone's life, practically all computer techniques and applications that have showed technological and scientific potential are quickly used in medicine. For this reason, it is necessary to take care of computer technologies and develop it. Moreover, studying its effect on the speed and accuracy of work in various medical field","PeriodicalId":180021,"journal":{"name":"International Journal of Information technology and Computer Engineering","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130749483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Comparison of MAUT Method with WASPAS Method in IBN Lecturer Performance Assessment MAUT法与WASPAS法在IBN讲师绩效评估中的比较
International Journal of Information technology and Computer Engineering Pub Date : 2022-09-26 DOI: 10.55529/ijitc.25.1.18
Aditeya Nanda, Elisabet Yunaeti Anggraeni
{"title":"Comparison of MAUT Method with WASPAS Method in IBN Lecturer Performance Assessment","authors":"Aditeya Nanda, Elisabet Yunaeti Anggraeni","doi":"10.55529/ijitc.25.1.18","DOIUrl":"https://doi.org/10.55529/ijitc.25.1.18","url":null,"abstract":"Lecturers are educators in higher education institutions. The role of a lecturer is very influential on the quality of education in a university, both State Universities (bahasa: Perguruan Tinggi Negeri (PTN)) or Private Universities (bahasa: Perguruan Tinggi Swasta (PTS)). With the assessment of lecturer performance, certain assessments are created to be used as a benchmark for the ability/quality/value of a lecturer at a university. In this study, researchers compare the MAUT method and the WASPAS method which will provide an alternative answer that is more accurate while at the same time knowing which method is the best between the two methods, as well as to be used by universities in determining the most influential factors in determining the quality of a person's performance lecturer. Comparing the two methods will get an appropriate method in determining the performance of lecturers in a university.","PeriodicalId":180021,"journal":{"name":"International Journal of Information technology and Computer Engineering","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117117041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Building Teachers’ Capacity for Effective Technology Integration into Teaching and Learning in Tertiary Institutions in Nigeria 尼日利亚高等院校教师有效地将技术融入教与学的能力建设
International Journal of Information technology and Computer Engineering Pub Date : 2022-09-24 DOI: 10.55529/ijitc.25.25.34
Umar Haliru, Nura Bawa
{"title":"Building Teachers’ Capacity for Effective Technology Integration into Teaching and Learning in Tertiary Institutions in Nigeria","authors":"Umar Haliru, Nura Bawa","doi":"10.55529/ijitc.25.25.34","DOIUrl":"https://doi.org/10.55529/ijitc.25.25.34","url":null,"abstract":"The paper focused on building teachers’ capacity for effective technology integration into teaching and learning in tertiary institutions. The concept of capacity building has been discussed and justification for it elucidated. Also, identified and deliberated was technological, pedagogical and content knowledge (TPACK) framework as viable model for enhancing teachers’ capacity to integrate technology into teaching and learning effectively. The paper also identified and discussed guidelines for effective technology integration into teaching and learning in tertiary institutions and finally it was suggested among others that there should be adequate funding as fundamental requirement to meet the training needs of staff and provide technological tools and other basic infrastructures.","PeriodicalId":180021,"journal":{"name":"International Journal of Information technology and Computer Engineering","volume":"158 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123266737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Effect of Information Technology on Education 信息技术对教育的影响
International Journal of Information technology and Computer Engineering Pub Date : 2022-07-30 DOI: 10.55529/ijitc24.1.5
Muzamil Hussain Al Hussaini
{"title":"Effect of Information Technology on Education","authors":"Muzamil Hussain Al Hussaini","doi":"10.55529/ijitc24.1.5","DOIUrl":"https://doi.org/10.55529/ijitc24.1.5","url":null,"abstract":"In some places of the world, access to education used to be limited. There were still many difficulties in distributing education to the general populace, even in countries where it existed. Education is now more widely accessible than it ever was because to numerous information technology advancements. Education has been significantly improved by inventions like the online classroom, and it is expanding daily all around the world. You can see how important information technology has grown in the realm of education by understanding how it has aided in education and the actual impact this created.","PeriodicalId":180021,"journal":{"name":"International Journal of Information technology and Computer Engineering","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116898767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Influencing Factors Determine Students’Behavioural Intentions to Adopt an E-Learning System in Tertiary Institution 影响高等院校学生采用电子学习系统行为意向的因素
International Journal of Information technology and Computer Engineering Pub Date : 2022-07-29 DOI: 10.55529/ijitc.24.35.63
Aminu Adamu Ahmed, A. Y. Dutse, Mangai Josiah Mallo
{"title":"Influencing Factors Determine Students’Behavioural Intentions to Adopt an E-Learning System in Tertiary Institution","authors":"Aminu Adamu Ahmed, A. Y. Dutse, Mangai Josiah Mallo","doi":"10.55529/ijitc.24.35.63","DOIUrl":"https://doi.org/10.55529/ijitc.24.35.63","url":null,"abstract":"This study aims to investigate into the factor influencing tertiary institution adoption of e-learning systems. As a case study, the study included 3,77 undergraduate students from seven faculties at Abubakar Tafawa Balewa University in Bauchi, Nigeria, which made up the study's target population of 17,654 individuals. Consequently, the unified theory of acceptance and use of technology (UTAUT) model was developed using the multistage random sampling approach. The gathered data were examined utilising SmartPLSv3 SEM based on SPSSv23 for analysis. The study's results also showed that PE, EE, and FC significantly influenced students' BI to embrace e-learning systems. However, the effects of SI alone on students' behavioural intentions were not significant.","PeriodicalId":180021,"journal":{"name":"International Journal of Information technology and Computer Engineering","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127128709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Framework and Challenges of Cyber Security in India: An Analytical Study 印度网络安全的框架与挑战:分析研究
International Journal of Information technology and Computer Engineering Pub Date : 2022-07-29 DOI: 10.55529/ijitc.24.27.34
A. Panneerselvam
{"title":"Framework and Challenges of Cyber Security in India: An Analytical Study","authors":"A. Panneerselvam","doi":"10.55529/ijitc.24.27.34","DOIUrl":"https://doi.org/10.55529/ijitc.24.27.34","url":null,"abstract":"Cyber security threats come in a wide variety of forms, including ransomware, phishing, malware attacks, and many others. India is currently ranked 11th in the world in terms of the number of local cyberattacks and it has already experienced 2,399,692 of these incidents in the first three months of 2020. Because cyber security is a topic that is growing more and more essential, businesses are undoubtedly well aware of the hazards and threats that hackers offer to their corporation. However cybersecurity would continue to be a difficult issue for three reasons: It goes beyond a simple technological issue. Cyberspace operates under a distinct set of regulations than the real world. Law, policy, and practise in the area of cybersecurity are still in their infancy. Every firm requires a security analyst to ensure that their system is secure given the rise in cyber-attacks. These security analysts must secure private company servers; protect the confidential data of governmental organisations, and other cybersecurity-related difficulties. Research indicates that there is a significant need in India for qualified cybersecurity specialists and that this demand will continue to rise in the near future. Employers anticipate a scarcity of qualified cybersecurity specialists. The goal of the study is to analyse and explain India's cyber security framework and difficulties. The study used a combination of descriptive and analytical method to draw a result. The Thematic software tool QADMAX also used in the study to analyse the qualitative data for secondary sources","PeriodicalId":180021,"journal":{"name":"International Journal of Information technology and Computer Engineering","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134388136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Design and Development of Lampung Script Educational Game 楠榜文字教育游戏的设计与开发
International Journal of Information technology and Computer Engineering Pub Date : 2022-05-30 DOI: 10.55529/ijitc.23.36.48
Agus Irawan, Siti Mukodimah, Afrizal Martin, Yunaida Ervika
{"title":"Design and Development of Lampung Script Educational Game","authors":"Agus Irawan, Siti Mukodimah, Afrizal Martin, Yunaida Ervika","doi":"10.55529/ijitc.23.36.48","DOIUrl":"https://doi.org/10.55529/ijitc.23.36.48","url":null,"abstract":"Some students think that Lampung script learning is boring because the method of delivery is still using book media so that children have difficulty understanding and memorizing it, current technological developments are increasingly interesting to be further developed, because all of them switch to using information technology, one of which is information technology. namely Gadgets, children prefer to spend time using Gadgets every day just to play games and not to study. Because according to what they know, learning is only based on book media, so a Design and Build system for learning Android -based Educational Game learning applications in the application has many options for recognizing the Lampung script, writing , and playing the Lampung script. This makes it easier for teachers and students to learn at school and at home. So that it attracts children's learning interest using Gadget.","PeriodicalId":180021,"journal":{"name":"International Journal of Information technology and Computer Engineering","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134000332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Delivery Order Information System in Raya Family Restaurant Based On Android Application 基于Android应用的Raya家庭餐厅外卖订单信息系统
International Journal of Information technology and Computer Engineering Pub Date : 2022-05-30 DOI: 10.55529/ijitc.23.25.35
Rina Wati, N. Andriyani, T. Susilowati
{"title":"Delivery Order Information System in Raya Family Restaurant Based On Android Application","authors":"Rina Wati, N. Andriyani, T. Susilowati","doi":"10.55529/ijitc.23.25.35","DOIUrl":"https://doi.org/10.55529/ijitc.23.25.35","url":null,"abstract":"The development of information technology and communication facilitates and accelerates access to information we need as well as facilitates corporate or individual transactions for business purposes. The development of the culinary world resulted in entrepreneurs competing to open restaurants or restaurants. Family Raya restaurant is a field of business or company that is still developing so it needs to be designed an information system. The information system is useful for providing management information in making decisions and also for carrying out company operations. The purpose of this research is to make it easier for customers who want to order a food menu simply by accessing the application with an Android-based cellphone. It is hoped that more customers will later buy Family Raya cuisine and of course the benefits will be even greater. Therefore, an Android-based Application information system is needed. The method used in this study is the waterfall model which has several stages, namely design, analysis, design, coding, test and maintenance. The supporting software used is MIT App Inventor, Java, CSS3, HTML5. Based on the results of the implementation it was concluded that this application can facilitate customers to order food and increase profits at Rumah Raya Family Restaurant.","PeriodicalId":180021,"journal":{"name":"International Journal of Information technology and Computer Engineering","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131496279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Efficient Data Access Control Scheme Using Splitting Technique In Clouds 基于云的高效数据访问控制方案
International Journal of Information technology and Computer Engineering Pub Date : 2022-04-20 DOI: 10.55529/ijitc23.13.18
R. Patrick, R. Gowrishanka, K. Cinetha, T. Raja
{"title":"Efficient Data Access Control Scheme Using Splitting Technique In Clouds","authors":"R. Patrick, R. Gowrishanka, K. Cinetha, T. Raja","doi":"10.55529/ijitc23.13.18","DOIUrl":"https://doi.org/10.55529/ijitc23.13.18","url":null,"abstract":"Data access control is one of the main problem in data transferring over the network. Cloud storage is a model of data storage in which the digital data is stored in logical pools. These cloud storage providers are responsible for keeping the data available and accessible. There are various existing methods are used in cloud storage and they are providing security. Proxy encryption method, Cryptographic methods, third party auditor methods are the some of the existing methods. In these methods uploaded files are not stored in virtualized format. Hence the other users can also view the data. Some hackers may hack the data through back end. This may leak privacy and confidentiality of the files. In this project proposes Splitting Technique will split the uploaded files intosub parts and they are stored in the cloud. Proxy server will create a onetime virtual data storage. Cloud will send a copy of the original data to this virtual storage. One time only data viewer can view the data. Data viewer can not able to edit, update or delete the original data. So, the original data are safe. The files are in randomly occurring in the cloud storage, that arealso in encrypted format. Hence the data hackers cannot able to hack the files. The proposed system shows that it provides more confidentiality and privacy than the existing methods.","PeriodicalId":180021,"journal":{"name":"International Journal of Information technology and Computer Engineering","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117118155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信