electronic Journal of Computer Science and Information Technology最新文献

筛选
英文 中文
High value information for managers in organisations 对组织管理人员有高价值的信息
electronic Journal of Computer Science and Information Technology Pub Date : 2021-10-22 DOI: 10.52650/ejcsit.v7i1.110
Ammuthavali Ramasamy, N. Ali
{"title":"High value information for managers in organisations","authors":"Ammuthavali Ramasamy, N. Ali","doi":"10.52650/ejcsit.v7i1.110","DOIUrl":"https://doi.org/10.52650/ejcsit.v7i1.110","url":null,"abstract":"Due to information overload, information management for managers in organisations is a big task. To avoid information overload and to retain the right information for reuse, an effective mechanism for evaluating information is required. Various tools and strategies are presented in an attempt to obtain information's \"value.\" This study examines the topic of information overload, the definition of information value, and associated research on the value of information in many fields to resolve this issue. The Bayesian Theorem and information characteristics are used to offer a framework for evaluating information.","PeriodicalId":210813,"journal":{"name":"electronic Journal of Computer Science and Information Technology","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123007891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A CTF-Based Approach in Cyber Security Education for Secondary School Students 基于ctf的中学生网络安全教育方法
electronic Journal of Computer Science and Information Technology Pub Date : 2021-10-22 DOI: 10.52650/ejcsit.v7i1.107
Ahmad Haziq Ashrofie Hanafi, Haikal Rokman, Ahmad Dahaqin Ibrahim, Z. Ibrahim, Md Nabil Ahmad Zawawi, Fiza Abdul Rahim
{"title":"A CTF-Based Approach in Cyber Security Education for Secondary School Students","authors":"Ahmad Haziq Ashrofie Hanafi, Haikal Rokman, Ahmad Dahaqin Ibrahim, Z. Ibrahim, Md Nabil Ahmad Zawawi, Fiza Abdul Rahim","doi":"10.52650/ejcsit.v7i1.107","DOIUrl":"https://doi.org/10.52650/ejcsit.v7i1.107","url":null,"abstract":"Cybersecurity education topics require technical understanding. However, it is a challenging task for any teacher to introduce topics to students who have no technical background. Recently, the concept of gamification has been implemented as a tool to inculcate student’s interest using a variety of popular in-games techniques and applying them to educational modules. Extending from this notion, it was found that Capture the Flag (CTF) competition style is a successful way of introducing students to various technical concepts in the standard computer science curriculum. During the 2019 school holiday, a CTF for secondary school students was run at Universiti Tenaga Nasional (UNITEN) with the primary goal of introducing secondary school students to various cybersecurity topics and also to inculcate their interest in cybersecurity. The method that we used is different from other CTF or similar events, in which we use a scenario-based approach. We found that this method attracts participants in solving each challenge in a competitive environment.","PeriodicalId":210813,"journal":{"name":"electronic Journal of Computer Science and Information Technology","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115457241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Blended Learning to Enhanced Engineering Education using Flipped Classroom Approach: An Overview 运用翻转课堂的混合式学习强化工程教育:综述
electronic Journal of Computer Science and Information Technology Pub Date : 2021-10-22 DOI: 10.52650/ejcsit.v7i1.111
Min Chi Low, Chen Kang Lee, M. Sidhu, Seng Poh Lim, Zaimah Hasan, Seng Chee Lim
{"title":"Blended Learning to Enhanced Engineering Education using Flipped Classroom Approach: An Overview","authors":"Min Chi Low, Chen Kang Lee, M. Sidhu, Seng Poh Lim, Zaimah Hasan, Seng Chee Lim","doi":"10.52650/ejcsit.v7i1.111","DOIUrl":"https://doi.org/10.52650/ejcsit.v7i1.111","url":null,"abstract":"The learning approach is always being the concern of educators to increase the quality of engineering education. Engineering education is essential in order to nurture quality engineers and prepare the workforce for country development. Coming to Industrial 4.0, modern engineering education has combined ICT technology to meet the demand of Education 4.0. This paper aims to review blended learning to enhanced engineering education using flipped classroom approach. The paper starts with an overview of the current trend of engineering education, which encourages using blended learning approach. Blended learning was developed to overcome the advantages and disadvantages of traditional learning and online learning, which brings a better learning experience to students. From the review, the blended learning using flipped classroom approach have positively assisted students in their learning. Future ongoing research is recommended to explore the potential of flipped classroom approach use in supporting engineering education specifically in the context of Malaysia.","PeriodicalId":210813,"journal":{"name":"electronic Journal of Computer Science and Information Technology","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114778649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A REVIEW ON A COMPUTATIONAL MODEL OF SHYNESS FOR ARTIFICIAL AGENTS IN THE MALAYSIAN LEARNING DOMAIN 马来西亚学习领域人工智能的羞怯计算模型综述
electronic Journal of Computer Science and Information Technology Pub Date : 2021-10-22 DOI: 10.52650/ejcsit.v7i1.112
S. Shamini
{"title":"A REVIEW ON A COMPUTATIONAL MODEL OF SHYNESS FOR ARTIFICIAL AGENTS IN THE MALAYSIAN LEARNING DOMAIN","authors":"S. Shamini","doi":"10.52650/ejcsit.v7i1.112","DOIUrl":"https://doi.org/10.52650/ejcsit.v7i1.112","url":null,"abstract":"Shyness is a difficulty experienced by many children in our country. Although it is a norm that Asians exhibit more colourings of shyness (e.g. timidity, passiveness, non-confrontational); studies conducted within the learning domain verifies that this personality trait is being acknowledged as a negative trait, especially among young learners (children) which is likely to affect their potential and performance in the academic platform. Teachers and peers may falsely belief that these students are less capable and less intelligent which may develop a poor perception towards them. However, these shy students find computer-mediated communication to be easier means of interaction than face-to-face contact with teachers. In-line with the Malaysian Education Blueprint (2015-2025) by the Malaysian Ministry of Education (MOE), development and use of Information and Communications Technology (ICT) (e.g. e-learning, educational games and other interactive learning platforms through computer interfaces) are very much encouraged. Hence, implementing an interactive artificial tutor (fit with a shyness model) to automatically adapt and interact to the user’s emotional state could help in overcoming shyness, at the same time encourage these shy learners to confidently communicate and exhibit their capabilities. This research intends to review the background study on the usefulness of a shyness computational model which will be integrated with an interactive synthetic tutor. The aim of this study is to identify and capture the display features of colourings of shyness (e.g. timidity, passiveness, non-confrontational) through facial features (e.g. smiles, pouting) and vocal behaviours (silences, frequent pauses,filler words and turn-taking patterns) projected by shy young Malaysian learners (children aged between 9-11 years). These markers will be collected and constructed into a shyness model suitable for interactive synthetic agents used in the learning domain for teaching and training young learners in a typical Malaysian academic setting.","PeriodicalId":210813,"journal":{"name":"electronic Journal of Computer Science and Information Technology","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123578783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Methodology for Simulation of IoT-Based Flood Data Collection Infrastructure 基于物联网的洪水数据采集基础设施仿真方法
electronic Journal of Computer Science and Information Technology Pub Date : 2021-10-22 DOI: 10.52650/ejcsit.v7i1.113
Azimah Abdul Ghapar, S. Yussof
{"title":"Methodology for Simulation of IoT-Based Flood Data Collection Infrastructure","authors":"Azimah Abdul Ghapar, S. Yussof","doi":"10.52650/ejcsit.v7i1.113","DOIUrl":"https://doi.org/10.52650/ejcsit.v7i1.113","url":null,"abstract":"Internet of Things (IoT) is a potential technology to be used for data collection tasks in real-world environments. However, due to the difficulty of deploying and testing a real IoT implementation, many researchers end up having to use software simulation to evaluate their proposed techniques. This paper focuses on the use of IoT for collecting flood-related data, which would then use by flood-related applications such as flood prediction applications and flood early warning systems. This paper proposed a methodology for simulating the IoT system used for flood data collection. The proposed methodology consists of four main steps which are identifying the flood environment, defining the architecture for flood data collection, simulating the IoT-based flood data collection infrastructure and analyzing the results. The activities for each step are described in detail as to guide other researchers in the same area to adapt the methodology to their research work.","PeriodicalId":210813,"journal":{"name":"electronic Journal of Computer Science and Information Technology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129715580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信