CINXE.COM

Search results for: computer aid

<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: computer aid</title> <meta name="description" content="Search results for: computer aid"> <meta name="keywords" content="computer aid"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="computer aid" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="computer aid"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 2361</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: computer aid</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2361</span> Computer Fraud from the Perspective of Iran&#039;s Law and International Documents</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Babak%20Pourghahramani">Babak Pourghahramani</a> </p> <p class="card-text"><strong>Abstract:</strong></p> One of the modern crimes against property and ownership in the cyber-space is the computer fraud. Despite being modern, the aforementioned crime has its roots in the principles of religious jurisprudence. In some cases, this crime is compatible with the traditional regulations and that is when the computer is considered as a crime commitment device and also some computer frauds that take place in the context of electronic exchanges are considered as crime based on the E-commerce Law (approved in 2003) but the aforementioned regulations are flawed and until recent years there was no comprehensive law in this regard; yet after some years the Computer Crime Act was approved in 2009/26/5 and partly solved the problem of legal vacuum. The present study intends to investigate the computer fraud according to Iran's Computer Crime Act and by taking into consideration the international documents. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=fraud" title="fraud">fraud</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20fraud" title=" cyber fraud"> cyber fraud</a>, <a href="https://publications.waset.org/abstracts/search?q=computer%20fraud" title=" computer fraud"> computer fraud</a>, <a href="https://publications.waset.org/abstracts/search?q=classic%20fraud" title=" classic fraud"> classic fraud</a>, <a href="https://publications.waset.org/abstracts/search?q=computer%20crime" title=" computer crime"> computer crime</a> </p> <a href="https://publications.waset.org/abstracts/72041/computer-fraud-from-the-perspective-of-irans-law-and-international-documents" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/72041.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">332</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2360</span> Metaphorical Perceptions of Middle School Students regarding Computer Games</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ismail%20Celik">Ismail Celik</a>, <a href="https://publications.waset.org/abstracts/search?q=Ismail%20Sahin"> Ismail Sahin</a>, <a href="https://publications.waset.org/abstracts/search?q=Fetah%20Eren"> Fetah Eren</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The computer, among the most important inventions of the twentieth century, has become an increasingly important component in our everyday lives. Computer games also have become increasingly popular among people day-by-day, owing to their features based on realistic virtual environments, audio and visual features, and the roles they offer players. In the present study, the metaphors students have for computer games are investigated, as well as an effort to fill the gap in the literature. Students were asked to complete the sentence—‘Computer game is like/similar to….because….’— to determine the middle school students’ metaphorical images of the concept for ‘computer game’. The metaphors created by the students were grouped in six categories, based on the source of the metaphor. These categories were ordered as ‘computer game as a means of entertainment’, ‘computer game as a beneficial means’, ‘computer game as a basic need’, ‘computer game as a source of evil’, ‘computer game as a means of withdrawal’, and ‘computer game as a source of addiction’, according to the number of metaphors they included. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=computer%20game" title="computer game">computer game</a>, <a href="https://publications.waset.org/abstracts/search?q=metaphor" title=" metaphor"> metaphor</a>, <a href="https://publications.waset.org/abstracts/search?q=middle%20school%20students" title=" middle school students"> middle school students</a>, <a href="https://publications.waset.org/abstracts/search?q=virtual%20environments" title=" virtual environments"> virtual environments</a> </p> <a href="https://publications.waset.org/abstracts/11784/metaphorical-perceptions-of-middle-school-students-regarding-computer-games" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/11784.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">535</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2359</span> Risk Based on Computer Auditing and Measures of ‎Prevention</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mohammad%20Hadi%20Khorashadi%20Zadeh">Mohammad Hadi Khorashadi Zadeh</a>, <a href="https://publications.waset.org/abstracts/search?q=Amin%20Karkon"> Amin Karkon</a>, <a href="https://publications.waset.org/abstracts/search?q=Seyd%20Mohammad%20Reza%20Mashhoori"> Seyd Mohammad Reza Mashhoori</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The technology of computer audit played a major role in the progress and prospects of a proper application to improve the quality and efficiency of audit work. But due to the technical complexity and the specific risks of computer audit, it should be shown effective in audit and preventive action. Mainly through research in this paper, we propose the causes of audit risk in a computer environment and the risk of further proposals for measures to control, to some extent reduce the risk of computer audit and improve the audit quality. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=computer%20auditing" title="computer auditing">computer auditing</a>, <a href="https://publications.waset.org/abstracts/search?q=risk" title=" risk"> risk</a>, <a href="https://publications.waset.org/abstracts/search?q=measures%20to%20prevent" title=" measures to prevent"> measures to prevent</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20management" title=" information management"> information management</a> </p> <a href="https://publications.waset.org/abstracts/46033/risk-based-on-computer-auditing-and-measures-of-prevention" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/46033.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">525</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2358</span> Evaluation of Computer Usage and Related Health Hazards</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=B.%20O.%20Adegoke">B. O. Adegoke</a>, <a href="https://publications.waset.org/abstracts/search?q=B.%20O.%20Ola"> B. O. Ola</a>, <a href="https://publications.waset.org/abstracts/search?q=D.%20T.%20Ademiluyi"> D. T. Ademiluyi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper examines the use of computer and its related health hazard among computer users in South-Western zone of Nigeria. Two hundred and eighteen (218) computer users constituted the population used to evaluate association between posture, extensive computer use and related health hazard. The instruments for the study are a questionnaire on demographics, lifestyle, body features and work ability index while mean rating, standard deviation and t test were used for data analysis. Identified health related hazard include damages to the eyesight, bad posture, arthritis, musculoskeletal disorders, headache, stress and so on. The results showed that factors such as work demand, posture, closeness to computer screen and excessive working hours on computers constitute health hazards in both old and young computer users of various gender. It is therefore recommended that total number of hours spent with computer should be monitored and controlled. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=computer-related%20health%20hazard" title="computer-related health hazard">computer-related health hazard</a>, <a href="https://publications.waset.org/abstracts/search?q=musculoskeletal%20disorders" title=" musculoskeletal disorders"> musculoskeletal disorders</a>, <a href="https://publications.waset.org/abstracts/search?q=computer%20usage" title=" computer usage"> computer usage</a>, <a href="https://publications.waset.org/abstracts/search?q=work%20ability%20index" title=" work ability index"> work ability index</a> </p> <a href="https://publications.waset.org/abstracts/18772/evaluation-of-computer-usage-and-related-health-hazards" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/18772.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">489</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2357</span> The Impact of Technology on Computer Systems and Technology</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Bishoy%20Abouelsoud%20Saad%20Amin">Bishoy Abouelsoud Saad Amin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper examines the use of computer and its related health hazard among computer users in South-Western zone of Nigeria. Two hundred and eighteen (218) computer users constituted the population used to evaluate association between posture, extensive computer use and related health hazard. The instruments for the study are a questionnaire on demographics, lifestyle, body features and work ability index while mean rating, standard deviation and t test were used for data analysis. Identified health related hazard include damages to the eyesight, bad posture, arthritis, musculoskeletal disorders, headache, stress and so on. The results showed that factors such as work demand, posture, closeness to computer screen and excessive working hours on computers constitute health hazards in both old and young computer users of various gender. It is therefore recommended that total number of hours spent with computer should be monitored and controlled. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=computer%20game" title="computer game">computer game</a>, <a href="https://publications.waset.org/abstracts/search?q=metaphor" title=" metaphor"> metaphor</a>, <a href="https://publications.waset.org/abstracts/search?q=middle%20school%20students" title=" middle school students"> middle school students</a>, <a href="https://publications.waset.org/abstracts/search?q=virtual%20environments%20computer%20auditing" title=" virtual environments computer auditing"> virtual environments computer auditing</a>, <a href="https://publications.waset.org/abstracts/search?q=risk" title=" risk"> risk</a>, <a href="https://publications.waset.org/abstracts/search?q=measures%20to%20prevent" title=" measures to prevent"> measures to prevent</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20management%20computer-related%20health%20hazard" title=" information management computer-related health hazard"> information management computer-related health hazard</a>, <a href="https://publications.waset.org/abstracts/search?q=musculoskeletal%20disorders" title=" musculoskeletal disorders"> musculoskeletal disorders</a>, <a href="https://publications.waset.org/abstracts/search?q=computer%20usage" title=" computer usage"> computer usage</a>, <a href="https://publications.waset.org/abstracts/search?q=work%20ability%20index" title=" work ability index"> work ability index</a> </p> <a href="https://publications.waset.org/abstracts/183103/the-impact-of-technology-on-computer-systems-and-technology" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/183103.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">67</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2356</span> The Analysis of Computer Crimes Act 1997 in the Circumvention and Prevention of Computer Crimes in Malaysia</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nooraneda%20Mutalip%20Laidey">Nooraneda Mutalip Laidey</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Computer Crimes Act 1997 (CCA 1997) was conceded by Malaysia’s legislative body in 1997 and the Act was enforced in June 2000. The purpose of CCA 1997 is to provide for offences related to misuse of computers such as hacking, cracking and phishing. CCA 1997 was modelled after United Kingdom’s Computer Misuses Act 1990 as a response to the emerging computer crimes. This legislation is divided into three parts and 12 Sections. The first part outlines preliminary matters that include short title and relevant definitions, second part provides for the offenses related to misuse of computers and specifies penalties for each offences, and the last part deals with ancillary provisions such as jurisdictional and investigational issues of cybercrime. The main objective of this paper is to discuss the development of computer crimes and its deterrence in Malaysia. Specific sections of CCA 1997 will be analysed in details and detail assessment on the prevention and prosecution of computer crimes in Malaysia will be accessed to determine whether CCA 1997 is so far adequate in preventing computer crimes in Malaysia. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=computer" title="computer">computer</a>, <a href="https://publications.waset.org/abstracts/search?q=computer%20crimes" title=" computer crimes"> computer crimes</a>, <a href="https://publications.waset.org/abstracts/search?q=CCA%201997" title=" CCA 1997"> CCA 1997</a>, <a href="https://publications.waset.org/abstracts/search?q=circumvention" title=" circumvention"> circumvention</a>, <a href="https://publications.waset.org/abstracts/search?q=deterrence" title=" deterrence"> deterrence</a> </p> <a href="https://publications.waset.org/abstracts/43608/the-analysis-of-computer-crimes-act-1997-in-the-circumvention-and-prevention-of-computer-crimes-in-malaysia" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/43608.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">344</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2355</span> Risk-Based Computer Auditing and Measures of Prevention</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mohammad%20Hadi%20Khorashadi%20Zadeh">Mohammad Hadi Khorashadi Zadeh</a>, <a href="https://publications.waset.org/abstracts/search?q=Amin%20Karkon"> Amin Karkon</a>, <a href="https://publications.waset.org/abstracts/search?q=Seyd%20Mohammad%20Reza%20Mashhoori%20%E2%80%8E"> Seyd Mohammad Reza Mashhoori ‎</a> </p> <p class="card-text"><strong>Abstract:</strong></p> the technology of Computer audit played a major role in the progress and ‎prospects of a proper application to improve the quality and efficiency of audit ‎work. But due to the technical complexity and the specific risks of computer ‎audit, it should be shown effective in audit and preventive action. Mainly through ‎research in this paper, we proposes the causes of audit risk in a computer ‎environment and the risk of further proposals for measures to control, to some ‎extent reduce the risk of computer audit and improve the audit quality.‎ <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=computer%20auditing" title="computer auditing">computer auditing</a>, <a href="https://publications.waset.org/abstracts/search?q=risk" title=" risk"> risk</a>, <a href="https://publications.waset.org/abstracts/search?q=measures%20to%20prevent" title=" measures to prevent"> measures to prevent</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20technology" title="information technology">information technology</a> </p> <a href="https://publications.waset.org/abstracts/46967/risk-based-computer-auditing-and-measures-of-prevention" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/46967.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">489</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2354</span> Evaluation of Introductory Programming Course for Non-Computer Science Majored Students</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=H.%20Varol">H. Varol</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Although students&rsquo; interest level in pursuing Computer Science and related degrees are lower than previous decade, fundamentals of computers, specifically introductory level programming courses are either listed as core or elective courses for a number of non-computer science majors. Universities accommodate these non-computer science majored students either via creating separate sections of a class for them or simply offering mixed-body classroom solutions, in which both computer science and non-computer science students take the courses together. In this work, we demonstrated how we handle introductory level programming course at Sam Houston State University and also provide facts about our observations on students&rsquo; success during the coursework. Moreover, we provide suggestions and methodologies that are based on students&rsquo; major and skills to overcome the deficiencies of mix-body type of classes. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=computer%20science" title="computer science">computer science</a>, <a href="https://publications.waset.org/abstracts/search?q=non-computer%20science%20major" title=" non-computer science major"> non-computer science major</a>, <a href="https://publications.waset.org/abstracts/search?q=programming" title=" programming"> programming</a>, <a href="https://publications.waset.org/abstracts/search?q=programming%20education" title=" programming education"> programming education</a> </p> <a href="https://publications.waset.org/abstracts/46371/evaluation-of-introductory-programming-course-for-non-computer-science-majored-students" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/46371.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">333</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2353</span> Increasing a Computer Performance by Overclocking Central Processing Unit (CPU)</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Witthaya%20Mekhum">Witthaya Mekhum</a>, <a href="https://publications.waset.org/abstracts/search?q=Wutthikorn%20Malikong"> Wutthikorn Malikong </a> </p> <p class="card-text"><strong>Abstract:</strong></p> The objective of this study is to investigate the increasing desktop computer performance after overclocking central processing unit or CPU by running a computer component at a higher clock rate (more clock cycles per second) than it was designed at the rate of 0.1 GHz for each level or 100 MHz starting at 4000 GHz-4500 GHz. The computer performance is tested for each level with 4 programs, i.e. Hyper PI ver. 0.99b, Cinebench R15, LinX ver.0.6.4 and WinRAR . After the CPU overclock, the computer performance increased. When overclocking CPU at 29% the computer performance tested by Hyper PI ver. 0.99b increased by 10.03% and when tested by Cinebench R15 the performance increased by 20.05% and when tested by LinX Program the performance increased by 16.61%. However, the performance increased only 8.14% when tested with Winrar program. The computer performance did not increase according to the overclock rate because the computer consists of many components such as Random Access Memory or RAM, Hard disk Drive, Motherboard and Display Card, etc. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=overclock" title="overclock">overclock</a>, <a href="https://publications.waset.org/abstracts/search?q=performance" title=" performance"> performance</a>, <a href="https://publications.waset.org/abstracts/search?q=central%20processing%20unit" title=" central processing unit"> central processing unit</a>, <a href="https://publications.waset.org/abstracts/search?q=computer" title=" computer"> computer</a> </p> <a href="https://publications.waset.org/abstracts/11975/increasing-a-computer-performance-by-overclocking-central-processing-unit-cpu" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/11975.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">283</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2352</span> Using Computer Simulations to Prepare Teachers</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Roberta%20Gentry">Roberta Gentry</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The presentation will begin with a brief literature review of the use of computer simulation in teacher education programs. This information will be summarized. Additionally, based on the literature review, advantages and disadvantages of using computer simulation in higher education will be shared. Finally, a study in which computer simulations software was used with 50 initial licensure teacher candidates in both an introductory course and a behavior management course will be shared. Candidates reflected on their experiences with using computer simulation. The instructor of the course will also share lessons learned. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=simulations" title="simulations">simulations</a>, <a href="https://publications.waset.org/abstracts/search?q=teacher%20education" title=" teacher education"> teacher education</a>, <a href="https://publications.waset.org/abstracts/search?q=teacher%20preparation" title=" teacher preparation"> teacher preparation</a>, <a href="https://publications.waset.org/abstracts/search?q=educational%20research" title=" educational research"> educational research</a> </p> <a href="https://publications.waset.org/abstracts/22934/using-computer-simulations-to-prepare-teachers" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/22934.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">650</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2351</span> Preliminary Proposal to Use Adaptive Computer Games in the Virtual Rehabilitation Therapy</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mamoun%20S.%20Ideis">Mamoun S. Ideis</a>, <a href="https://publications.waset.org/abstracts/search?q=Zein%20Salah"> Zein Salah</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Virtual Rehabilitation (VR) refers to using Virtual Reality’s hardware and simulations as means of exercising tools to rehabilitate patients in need. These patients will undergo their treatment exercises while playing different computer games, which helps achieve greater motivation for patients undergoing their therapeutic exercises. Virtual Rehabilitation systems adopt computer games as part of the treatment therapy. In this paper, we present a preliminary proposal to using adaptive computer games in Virtual Rehabilitation therapy. We also present some tips in designing those adaptive computer games by using different machine learning algorithms in order to create a personalized experience for each patient, which in turn, increases the potential benefits of the treatment that each patient receives. Furthermore, we propose a method of comparing the results of treatment using the adaptive computer games with the results of using static and classical computer games. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=virtual%20rehabilitation" title="virtual rehabilitation">virtual rehabilitation</a>, <a href="https://publications.waset.org/abstracts/search?q=physiotherapy" title=" physiotherapy"> physiotherapy</a>, <a href="https://publications.waset.org/abstracts/search?q=adaptive%20computer%20games" title=" adaptive computer games"> adaptive computer games</a>, <a href="https://publications.waset.org/abstracts/search?q=post-stroke" title=" post-stroke"> post-stroke</a>, <a href="https://publications.waset.org/abstracts/search?q=game%20design" title=" game design"> game design</a> </p> <a href="https://publications.waset.org/abstracts/94427/preliminary-proposal-to-use-adaptive-computer-games-in-the-virtual-rehabilitation-therapy" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/94427.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">297</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2350</span> Perception of Secondary Schools’ Students on Computer Education in Federal Capital Territory (FCT-Abuja), Nigeria</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Salako%20Emmanuel%20Adekunle">Salako Emmanuel Adekunle</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Computer education is referred to as the knowledge and ability to use computers and related technology efficiently, with a range of skills covering levels from basic use to advance. Computer continues to make an ever-increasing impact on all aspect of human endeavours such as education. With numerous benefits of computer education, what are the insights of students on computer education? This study investigated the perception of senior secondary school students on computer education in Federal Capital Territory (FCT), Abuja, Nigeria. A sample of 7500 senior secondary schools students was involved in the study, one hundred (100) private and fifty (50) public schools within FCT. They were selected by using simple random sampling technique. A questionnaire [PSSSCEQ] was developed and validated through expert judgement and reliability co-efficient of 0.84 was obtained. It was used to gather relevant data on computer education. Findings confirmed that the students in the FCT had positive perception on computer education. Some factors were identified that affect students’ perception on computer education. The null hypotheses were tested using t-test and ANOVA statistical analyses at 0.05 level of significance. Based on these findings, some recommendations were made which include competent teachers should be employed into all secondary schools; this will help students to acquire relevant knowledge in computer education, technological supports should be provided to all secondary schools; this will help the users (students) to solve specific problems in computer education and financial supports should be provided to procure computer facilities that will enhance the teaching and the learning of computer education. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=computer%20education" title="computer education">computer education</a>, <a href="https://publications.waset.org/abstracts/search?q=perception" title=" perception"> perception</a>, <a href="https://publications.waset.org/abstracts/search?q=secondary%20school" title=" secondary school"> secondary school</a>, <a href="https://publications.waset.org/abstracts/search?q=students" title=" students"> students</a> </p> <a href="https://publications.waset.org/abstracts/32844/perception-of-secondary-schools-students-on-computer-education-in-federal-capital-territory-fct-abuja-nigeria" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/32844.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">464</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2349</span> Human Kinetics Education and the Computer Operations, Effects and Merits</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kehinde%20Adeyeye%20Adelabu">Kehinde Adeyeye Adelabu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Computer applications has completely revolutionized the way of life of people which does not exclude the field of sport education. There are computer technologies which help to enhance teaching in every field of education. Invention of computers has done great to the field of education. This study was therefore carried out to examine the effects and merits of computer operations in Human Kinetics Education and Sports. The study was able to identify the component of computer, uses of computer in Human Kinetics education (sports), computer applications in some branches of human kinetics education. A qualitative research method was employed by the author in gathering experts’ views and used to analyze the effects and merits of computer applications in the field of human kinetics education. No experiment was performed in the cause of carrying out the study. The source of information for the study was text-books, journal, articles, past project reports, internet i.e. Google search engine. Computer has significantly helped to improve Education (Human Kinetic), it has complemented the basic physical fitness testing and gave a more scientific basis to the testing. The use of the software and packages has made cost projections, database applications, inventory control, management of events, word processing, electronic mailing and record keeping easier than the pasts. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=application" title="application">application</a>, <a href="https://publications.waset.org/abstracts/search?q=computer%20operation" title=" computer operation"> computer operation</a>, <a href="https://publications.waset.org/abstracts/search?q=education" title=" education"> education</a>, <a href="https://publications.waset.org/abstracts/search?q=human%20kinetics" title=" human kinetics"> human kinetics</a> </p> <a href="https://publications.waset.org/abstracts/92823/human-kinetics-education-and-the-computer-operations-effects-and-merits" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/92823.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">186</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2348</span> Analytical Study of CPU Scheduling Algorithms</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Keshav%20Rathi">Keshav Rathi</a>, <a href="https://publications.waset.org/abstracts/search?q=Aakriti%20Sharma"> Aakriti Sharma</a>, <a href="https://publications.waset.org/abstracts/search?q=Vinayak%20R.%20Dinesh"> Vinayak R. Dinesh</a>, <a href="https://publications.waset.org/abstracts/search?q=Irfan%20Ramzan%20Parray"> Irfan Ramzan Parray</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Scheduling is a basic operating system function since practically all computer resources are scheduled before use. The CPU is one of the most important computer resources. Central Processing Unit (CPU) scheduling is vital because it allows the CPU to transition between processes. A processor is the most significant resource in a computer; the operating system can increase the computer's productivity. The objective of the operating system is to allow as many processes as possible to operate at the same time in order to maximize CPU utilization. The highly efficient CPU scheduler is based on the invention of high-quality scheduling algorithms that meet the scheduling objectives. In this paper, we reviewed various fundamental CPU scheduling algorithms for a single CPU and showed which algorithm is best for the particular situation. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=computer%20science" title="computer science">computer science</a>, <a href="https://publications.waset.org/abstracts/search?q=Operating%20system" title=" Operating system"> Operating system</a>, <a href="https://publications.waset.org/abstracts/search?q=CPU%20scheduling" title=" CPU scheduling"> CPU scheduling</a>, <a href="https://publications.waset.org/abstracts/search?q=cpu%20algorithms" title=" cpu algorithms"> cpu algorithms</a> </p> <a href="https://publications.waset.org/abstracts/194885/analytical-study-of-cpu-scheduling-algorithms" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/194885.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">6</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2347</span> Computer Anxiety and the Use of Computerized System by University Librarians in Delta State University Library, Nigeria</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=L.%20Arumuru">L. Arumuru</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The paper investigates computer anxiety and the use of computerized library system by university librarians in Delta State University library, Abraka, Nigeria. Some of the root causes of computer anxiety among university librarians such as lack of exposure to computers at early age, inadequate computer skills, inadequate computer training, fear at the sight of a computer, lack of understanding of how computers work, etc. were pin-pointed in the study. Also, the different services rendered in the university libraries with the aid of computers such as reference services, circulation services, acquisition services, cataloguing and classification services, etc. were identified. The study employed the descriptive survey research design through the expo-facto method, with a population of 56 librarians, while the simple percentage and frequency counts were used to analyze the data generated from the administered copies of the questionnaire. Based on the aforementioned root causes of computer anxiety and the resultant effect on computerized library system, recommendations were proffered in the study. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=computer%20anxiety" title="computer anxiety">computer anxiety</a>, <a href="https://publications.waset.org/abstracts/search?q=computerized%20library%20system" title=" computerized library system"> computerized library system</a>, <a href="https://publications.waset.org/abstracts/search?q=library%20services" title=" library services"> library services</a>, <a href="https://publications.waset.org/abstracts/search?q=university%20librarians" title=" university librarians"> university librarians</a> </p> <a href="https://publications.waset.org/abstracts/63816/computer-anxiety-and-the-use-of-computerized-system-by-university-librarians-in-delta-state-university-library-nigeria" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/63816.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">387</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2346</span> The Interdisciplinary Synergy Between Computer Engineering and Mathematics</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mitat%20Uysal">Mitat Uysal</a>, <a href="https://publications.waset.org/abstracts/search?q=Aynur%20Uysal"> Aynur Uysal</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Computer engineering and mathematics share a deep and symbiotic relationship, with mathematics providing the foundational theories and models for computer engineering advancements. From algorithm development to optimization techniques, mathematics plays a pivotal role in solving complex computational problems. This paper explores key mathematical principles that underpin computer engineering, illustrating their significance through a case study that demonstrates the application of optimization techniques using Python code. The case study addresses the well-known vehicle routing problem (VRP), an extension of the traveling salesman problem (TSP), and solves it using a genetic algorithm. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=VRP" title="VRP">VRP</a>, <a href="https://publications.waset.org/abstracts/search?q=TSP" title=" TSP"> TSP</a>, <a href="https://publications.waset.org/abstracts/search?q=genetic%20algorithm" title=" genetic algorithm"> genetic algorithm</a>, <a href="https://publications.waset.org/abstracts/search?q=computer%20engineering" title=" computer engineering"> computer engineering</a>, <a href="https://publications.waset.org/abstracts/search?q=optimization" title=" optimization"> optimization</a> </p> <a href="https://publications.waset.org/abstracts/193090/the-interdisciplinary-synergy-between-computer-engineering-and-mathematics" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/193090.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">13</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2345</span> Modern Era Applications of Mathematics and Computer Science</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ogunrinde%20Roseline%20Bosede">Ogunrinde Roseline Bosede</a>, <a href="https://publications.waset.org/abstracts/search?q=Ogunrinde%20Rowland%20Rotimi"> Ogunrinde Rowland Rotimi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Just as the development of ideas of early mathematics was essentially motivated by social needs, the invention of the computer was equally inspired by social needs. The early years of the twenty-first century have been remarkable in advances in mathematical and computer sciences. Mathematical and computer sciences work are fast becoming an increasingly integral and essential components of a growing catalogues of areas of interests in biology, business, military, medicine, social sciences, advanced design, advanced materials, climate, banking and finance, and many other fields of disciplines. This paper seeks to highlight the trend and impacts of the duo in the technological advancements being witnessed in our today's world. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=computer" title="computer">computer</a>, <a href="https://publications.waset.org/abstracts/search?q=impacts" title=" impacts"> impacts</a>, <a href="https://publications.waset.org/abstracts/search?q=mathematics" title=" mathematics"> mathematics</a>, <a href="https://publications.waset.org/abstracts/search?q=modern%20society" title=" modern society"> modern society</a> </p> <a href="https://publications.waset.org/abstracts/28517/modern-era-applications-of-mathematics-and-computer-science" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/28517.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">400</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2344</span> Ergonomics Aspects of Work with Computers</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Leena%20Korpinen">Leena Korpinen</a>, <a href="https://publications.waset.org/abstracts/search?q=Rauno%20P%C3%A4%C3%A4kk%C3%B6nen"> Rauno Pääkkönen</a>, <a href="https://publications.waset.org/abstracts/search?q=Fabriziomaria%20Gobba"> Fabriziomaria Gobba</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper is based on a large questionnaire study. The paper presents how all participants and subgroups (upper- and lower-level white-collar workers) answered the question, “Have you had an ache, pain, or numbness, which you associate with desktop computer use, in the different body parts during the last 12 months?’ 14.6% of participants (19.4% of women and 8.2% of men) reported that they had often or very often physical symptoms in the neck. Even if our results cannot prove a causal relation of symptoms with computer use, show that workers believe that computer use can influence their wellbeing: This is important when devising treatment modalities to decrease these physical symptoms. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=ergonomics" title="ergonomics">ergonomics</a>, <a href="https://publications.waset.org/abstracts/search?q=work" title=" work"> work</a>, <a href="https://publications.waset.org/abstracts/search?q=computer" title=" computer"> computer</a>, <a href="https://publications.waset.org/abstracts/search?q=symptoms" title=" symptoms "> symptoms </a> </p> <a href="https://publications.waset.org/abstracts/35572/ergonomics-aspects-of-work-with-computers" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/35572.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">402</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2343</span> An intelligent Troubleshooting System and Performance Evaluator for Computer Network</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Iliya%20Musa%20Adamu">Iliya Musa Adamu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper seeks to develop an expert system that would troubleshoot computer network and evaluate the network system performance so as to reduce the workload on technicians and increase the efficiency and effectiveness of solutions proffered to computer network problems. The platform of the system was developed using ASP.NET, whereas the codes are implemented in Visual Basic and integrated with SQL Server 2005. The knowledge base was represented using production rule, whereas the searching method that was used in developing the network troubleshooting expert system is the forward-chaining-rule-based-system. This software tool offers the advantage of providing an immediate solution to most computer network problems encountered by computer users. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=expert%20system" title="expert system">expert system</a>, <a href="https://publications.waset.org/abstracts/search?q=forward%20chaining%20rule%20based%20system" title=" forward chaining rule based system"> forward chaining rule based system</a>, <a href="https://publications.waset.org/abstracts/search?q=network" title=" network"> network</a>, <a href="https://publications.waset.org/abstracts/search?q=troubleshooting" title=" troubleshooting"> troubleshooting</a> </p> <a href="https://publications.waset.org/abstracts/36206/an-intelligent-troubleshooting-system-and-performance-evaluator-for-computer-network" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/36206.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">647</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2342</span> The Interrelationship between Aggression and Frustration Brought about by Computer Games with Incentives among LPU Male Students</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Dior%20Grita%20F.%20De%20Torres">Dior Grita F. De Torres</a>, <a href="https://publications.waset.org/abstracts/search?q=Edielyn%20Gonzalvo"> Edielyn Gonzalvo</a>, <a href="https://publications.waset.org/abstracts/search?q=Jovielyn%20Manibo"> Jovielyn Manibo</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The experimental study aims to measure the level of aggression and frustration brought about by computer games with incentives and the interrelationship of the said variables. With 50 participants for each four groups, a total of 200 males who are avid of playing computer games participated in the study. The results and analyses presented in the study concluded that incentives differentially affect the level of aggression and frustration of the players with tobt = 7.18 and 6.521 > tcrit = 2.021 using t-test for dependent groups and Fobt = 4.527 and 8.340 > Fcrit = 3.89 using ANOVA with alpha level of 0.05, two tailed. At the same time, computer game’s level of difficulty also affects the level of aggression and frustration of the players with tobt = 7.53 and 4.783 > tcrit = 2.021 respectively and Fobt = 6.524 and 10.167 > Fcrit = 3.89. Moreover, there is also an interaction between incentive and the level of difficulty of computer game with tobt = 9.68 for aggression and tobt = 7.356 > 2.021 for frustration. Computer games and /with incentives has a large effect on the among male students of LPU. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=aggression" title="aggression">aggression</a>, <a href="https://publications.waset.org/abstracts/search?q=frustration" title=" frustration"> frustration</a>, <a href="https://publications.waset.org/abstracts/search?q=computer%20game" title=" computer game"> computer game</a>, <a href="https://publications.waset.org/abstracts/search?q=incentive" title=" incentive"> incentive</a> </p> <a href="https://publications.waset.org/abstracts/21603/the-interrelationship-between-aggression-and-frustration-brought-about-by-computer-games-with-incentives-among-lpu-male-students" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/21603.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">535</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2341</span> Advancement of Computer Science Research in Nigeria: A Bibliometric Analysis of the Past Three Decades</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Temidayo%20O.%20Omotehinwa">Temidayo O. Omotehinwa</a>, <a href="https://publications.waset.org/abstracts/search?q=David%20O.%20Oyewola"> David O. Oyewola</a>, <a href="https://publications.waset.org/abstracts/search?q=Friday%20J.%20Agbo"> Friday J. Agbo</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study aims to gather a proper perspective of the development landscape of Computer Science research in Nigeria. Therefore, a bibliometric analysis of 4,333 bibliographic records of Computer Science research in Nigeria in the last 31 years (1991-2021) was carried out. The bibliographic data were extracted from the Scopus database and analyzed using VOSviewer and the bibliometrix R package through the biblioshiny web interface. The findings of this study revealed that Computer Science research in Nigeria has a growth rate of 24.19%. The most developed and well-studied research areas in the Computer Science field in Nigeria are machine learning, data mining, and deep learning. The social structure analysis result revealed that there is a need for improved international collaborations. Sparsely established collaborations are largely influenced by geographic proximity. The funding analysis result showed that Computer Science research in Nigeria is under-funded. The findings of this study will be useful for researchers conducting Computer Science related research. Experts can gain insights into how to develop a strategic framework that will advance the field in a more impactful manner. Government agencies and policymakers can also utilize the outcome of this research to develop strategies for improved funding for Computer Science research. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=bibliometric%20analysis" title="bibliometric analysis">bibliometric analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=biblioshiny" title=" biblioshiny"> biblioshiny</a>, <a href="https://publications.waset.org/abstracts/search?q=computer%20science" title=" computer science"> computer science</a>, <a href="https://publications.waset.org/abstracts/search?q=Nigeria" title=" Nigeria"> Nigeria</a>, <a href="https://publications.waset.org/abstracts/search?q=science%20mapping" title=" science mapping"> science mapping</a> </p> <a href="https://publications.waset.org/abstracts/153781/advancement-of-computer-science-research-in-nigeria-a-bibliometric-analysis-of-the-past-three-decades" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/153781.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">112</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2340</span> A Pattern Practise for Awareness Educations on Information Security: Information Security Project</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Fati%CC%87h%20Apaydin">Fati̇h Apaydin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Education technology is an area which constantly changes and creates innovations. As an inevitable part of the changing circumstances, the societies who have a tendency to the improvements keep up with these innovations by using the methods and strategies which have been designed for education technology. At this point, education technology has taken the responsibility to help the individuals improve themselves and teach the effective teaching methods by filling the airs in theoretical information, information security and the practice. The technology which comes to the core of our lives by raising the importance of it day by day and it enforced its position in computer- based environments. As a result, ‘being ready for technological innovations, improvement on computer-based talent, information, ability and attitude’ doctrines have to be given. However, it is today quite hard to deal with the security and reinforcement of this information. The information which is got illegally gives harm to society from every aspect, especially education. This study includes how and to what extent to use these innovative appliances such as computers and the factor of information security of these appliances in computer-based education. As the use of computer is constantly becoming prevalent in our country, both education and computer will never become out of date, so how computer-based education affects our lives and the study of information security for this type of education are important topics. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=computer" title="computer">computer</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20security" title=" information security"> information security</a>, <a href="https://publications.waset.org/abstracts/search?q=education" title=" education"> education</a>, <a href="https://publications.waset.org/abstracts/search?q=technology" title=" technology"> technology</a>, <a href="https://publications.waset.org/abstracts/search?q=development" title=" development"> development</a> </p> <a href="https://publications.waset.org/abstracts/35678/a-pattern-practise-for-awareness-educations-on-information-security-information-security-project" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/35678.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">594</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2339</span> Learning Based on Computer Science Unplugged in Computer Science Education: Design, Development, and Assessment</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Eiko%20Takaoka">Eiko Takaoka</a>, <a href="https://publications.waset.org/abstracts/search?q=Yoshiyuki%20Fukushima"> Yoshiyuki Fukushima</a>, <a href="https://publications.waset.org/abstracts/search?q=Koichiro%20Hirose"> Koichiro Hirose</a>, <a href="https://publications.waset.org/abstracts/search?q=Tadashi%20Hasegawa"> Tadashi Hasegawa</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Although all high school students in Japan are required to learn informatics, many of them do not learn this topic sufficiently. In response to this situation, we propose a support package for high school informatics classes. To examine what students learned and if they sufficiently understood the context of the lessons, a questionnaire survey was distributed to 186 students. We analyzed the results of the questionnaire and determined the weakest units, which were “basic computer configuration” and “memory and secondary storage”. We then developed a package for teaching these units. We propose that our package be applied in high school classrooms. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=computer%20science%20unplugged" title="computer science unplugged">computer science unplugged</a>, <a href="https://publications.waset.org/abstracts/search?q=computer%20science%20outreach" title=" computer science outreach"> computer science outreach</a>, <a href="https://publications.waset.org/abstracts/search?q=high%20school%20curriculum" title=" high school curriculum"> high school curriculum</a>, <a href="https://publications.waset.org/abstracts/search?q=experimental%20evaluation" title=" experimental evaluation"> experimental evaluation</a> </p> <a href="https://publications.waset.org/abstracts/6381/learning-based-on-computer-science-unplugged-in-computer-science-education-design-development-and-assessment" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/6381.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">387</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2338</span> A Tutorial on Network Security: Attacks and Controls</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Belbahi%20Ahlam">Belbahi Ahlam</a> </p> <p class="card-text"><strong>Abstract:</strong></p> With the phenomenal growth in the Internet, network security has become an integral part of computer and information security. In order to come up with measures that make networks more secure, it is important to learn about the vulnerabilities that could exist in a computer network and then have an understanding of the typical attacks that have been carried out in such networks. The first half of this paper will expose the readers to the classical network attacks that have exploited the typical vulnerabilities of computer networks in the past and solutions that have been adopted since then to prevent or reduce the chances of some of these attacks. The second half of the paper will expose the readers to the different network security controls including the network architecture, protocols, standards and software/ hardware tools that have been adopted in modern day computer networks. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=network%20security" title="network security">network security</a>, <a href="https://publications.waset.org/abstracts/search?q=attacks%20and%20controls" title=" attacks and controls"> attacks and controls</a>, <a href="https://publications.waset.org/abstracts/search?q=computer%20and%20information" title=" computer and information"> computer and information</a>, <a href="https://publications.waset.org/abstracts/search?q=solutions" title=" solutions"> solutions</a> </p> <a href="https://publications.waset.org/abstracts/47725/a-tutorial-on-network-security-attacks-and-controls" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/47725.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">455</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2337</span> The Current Use of Computer Technology in Arabic Language</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Saad%20Alkahtani">Saad Alkahtani</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study aims to identify the extent to which the faculty members who teach Arabic to speakers of other languages in Arabic language institutes at Saudi universities use computer technologies such as language laboratories, websites, software programs, and learning management system (LMS). It also seeks to identify critical difficulties that hinder the use of these technologies by faculty members. The population of the study consisted of 103 faculty members in four Arabic language institutes at Saudi universities. The results of the study showed a disparity in the use of computer technologies in teaching Arabic to non-native speakers. The means of degree of use ranged from 1.20 through 2.83. The study also identified difficulties limiting the use of computer technology in teaching Arabic. And the means of averages of difficulty of use ranged from 1.50 to 2.89. The differences were not statistically significant among the institutes (at 0.05). <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Arabic%20language%20programs" title="Arabic language programs">Arabic language programs</a>, <a href="https://publications.waset.org/abstracts/search?q=computer%20technology" title=" computer technology"> computer technology</a>, <a href="https://publications.waset.org/abstracts/search?q=using%20technology%20in%20teaching%20Arabic%20language" title=" using technology in teaching Arabic language"> using technology in teaching Arabic language</a>, <a href="https://publications.waset.org/abstracts/search?q=Arabic%20as%20a%20second%20language" title=" Arabic as a second language"> Arabic as a second language</a>, <a href="https://publications.waset.org/abstracts/search?q=computer%20skills" title=" computer skills"> computer skills</a> </p> <a href="https://publications.waset.org/abstracts/11607/the-current-use-of-computer-technology-in-arabic-language" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/11607.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">462</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2336</span> Integrated Teaching of Hardware Courses for the Undergraduates of Computer Science and Engineering to Attain Focused Outcomes</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Namrata%20D.%20Hiremath">Namrata D. Hiremath</a>, <a href="https://publications.waset.org/abstracts/search?q=Mahalaxmi%20Bhille"> Mahalaxmi Bhille</a>, <a href="https://publications.waset.org/abstracts/search?q=P.%20G.%20Sunitha%20Hiremath"> P. G. Sunitha Hiremath</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Computer systems play an integral role in all facets of the engineering profession. This calls for an understanding of the processor-level components of computer systems, their design and operation, and their impact on the overall performance of the systems. Systems users are always in need of faster, more powerful, yet cheaper computer systems. The focus of Computer Science engineering graduates is inclined towards software oriented base. To be an efficient programmer there is a need to understand the role of hardware architecture towards the same. It is essential for the students of Computer Science and Engineering to know the basic building blocks of any computing device and how the digital principles can be used to build them. Hence two courses Digital Electronics of 3 credits, which is associated with lab of 1.5 credits and Computer Organization of 5 credits, were introduced at the sophomore level. Activity was introduced with the objective to teach the hardware concepts to the students of Computer science engineering through structured lab. The students were asked to design and implement a component of a computing device using MultiSim simulation tool and build the same using hardware components. The experience of the activity helped the students to understand the real time applications of the SSI and MSI components. The impact of the activity was evaluated and the performance was measured. The paper explains the achievement of the ABET outcomes a, c and k. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=digital" title="digital">digital</a>, <a href="https://publications.waset.org/abstracts/search?q=computer%20organization" title=" computer organization"> computer organization</a>, <a href="https://publications.waset.org/abstracts/search?q=ABET" title=" ABET"> ABET</a>, <a href="https://publications.waset.org/abstracts/search?q=structured%20enquiry" title=" structured enquiry"> structured enquiry</a>, <a href="https://publications.waset.org/abstracts/search?q=course%20activity" title=" course activity"> course activity</a> </p> <a href="https://publications.waset.org/abstracts/21632/integrated-teaching-of-hardware-courses-for-the-undergraduates-of-computer-science-and-engineering-to-attain-focused-outcomes" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/21632.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">500</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2335</span> Analyzing the Perceptions of Emotions in Aesthetic Music</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Abigail%20Wiafe">Abigail Wiafe</a>, <a href="https://publications.waset.org/abstracts/search?q=Charles%20Nutrokpor"> Charles Nutrokpor</a>, <a href="https://publications.waset.org/abstracts/search?q=Adelaide%20Oduro-Asante"> Adelaide Oduro-Asante</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The advancement of technology is rapidly making people more receptive to music as computer-generated music requires minimal human interventions. Though algorithms are applied to generate music, the human experience of emotions is still explored. Thus, this study investigates the emotions humans experience listening to computer-generated music that possesses aesthetic qualities. Forty-two subjects participated in the survey. The selection process was purely arbitrary since it was based on convenience. Subjects listened and evaluated the emotions experienced from the computer-generated music through an online questionnaire. The Likert scale was used to rate the emotional levels after the music listening experience. The findings suggest that computer-generated music possesses aesthetic qualities that do not affect subjects' emotions as long as they are pleased with the music. Furthermore, computer-generated music has unique creativity, and expressioneven though the music produced is meaningless, the computational models developed are unable to present emotional contents in music as humans do. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=aesthetic" title="aesthetic">aesthetic</a>, <a href="https://publications.waset.org/abstracts/search?q=algorithms" title=" algorithms"> algorithms</a>, <a href="https://publications.waset.org/abstracts/search?q=emotions" title=" emotions"> emotions</a>, <a href="https://publications.waset.org/abstracts/search?q=computer-generated%20music" title=" computer-generated music"> computer-generated music</a> </p> <a href="https://publications.waset.org/abstracts/148498/analyzing-the-perceptions-of-emotions-in-aesthetic-music" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/148498.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">135</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2334</span> The Effect of a Computer-Assisted Glycemic Surveillance Protocol on Nursing Workload</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=%C3%96zlem%20Canbolat">Özlem Canbolat</a>, <a href="https://publications.waset.org/abstracts/search?q=Sevgisun%20Kapucu"> Sevgisun Kapucu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The aim of this study was to determine the effect of a computer-assisted glycemic surveillance protocol on nursing workload in intensive care unit. The study is completed in an Education and Research Hospital in Ankara with the attendance of volunteered 19 nurse who had been worked in reanimation unit. Nurses used the written protocol and computer-assisted glycemic surveillance protocol for glycemic follow-up approach of the intensive care patients. Nurses used the written protocol first in the glycemic follow-up of the patient, then used the computer-assisted protocol. (Nurses used the written protocol first, then the computer-assisted protocol in the glycemic follow-up of the patient). Less time was spent in glycemic control with computerized protocol than written protocol and this difference is statistically significant (p < 0.001). It was determined that the computerized protocol application was completed in about 10 seconds (25% shorter) than the written protocol implementation. The computer-assisted glycemic surveillance protocol was found to be more easy and appropriate by nurses and the satisfaction level of the users was higher than with written protocol. While 79% of the nurses find it confusing to implement the written protocol, 79% were satisfied with the use of computerized protocol. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=computer-assisted%20protocol" title="computer-assisted protocol">computer-assisted protocol</a>, <a href="https://publications.waset.org/abstracts/search?q=glycemic%20control" title=" glycemic control"> glycemic control</a>, <a href="https://publications.waset.org/abstracts/search?q=insulin%20infusion%20protocol" title=" insulin infusion protocol"> insulin infusion protocol</a>, <a href="https://publications.waset.org/abstracts/search?q=intensive%20care" title=" intensive care"> intensive care</a>, <a href="https://publications.waset.org/abstracts/search?q=nursing%20workload" title=" nursing workload"> nursing workload</a> </p> <a href="https://publications.waset.org/abstracts/81279/the-effect-of-a-computer-assisted-glycemic-surveillance-protocol-on-nursing-workload" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/81279.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">221</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2333</span> The Attitude of High School Teachers in Saudi Arabia towards Computers: Qualitative Study</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Manal%20O.%20Alothman">Manal O. Alothman</a>, <a href="https://publications.waset.org/abstracts/search?q=Judy%20Robertson"> Judy Robertson</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Teachers can play a huge role in encouraging students to use computers and can affect students’ attitudes towards computers. So understanding teachers’ beliefs and their use of computers is an important way to create effective motivational systems for teachers to use computers in the classroom in an effective way.A qualitative study (6 focus group) was carried out among Saudi High school teachers, both male and female, to examine their attitudes towards computers and to find out their computer skills and usage. The study showed a gender difference in that females were less likely to attend computer workshops, females also had less computer skills, and they have more negative attitudes towards computers than males. Also, the study found that low computer skills in the classroom made students unlikely to have the lessons presented using computers. Furthermore, the study found some factors that affected teachers’ attitudes towards computers. These factors were computer experience and confidence as much having skills and good experience in computer use, the role and importance of computers had become in their life and in teaching as well. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=attitude" title="attitude">attitude</a>, <a href="https://publications.waset.org/abstracts/search?q=education" title=" education"> education</a>, <a href="https://publications.waset.org/abstracts/search?q=student" title=" student"> student</a>, <a href="https://publications.waset.org/abstracts/search?q=teacher" title=" teacher"> teacher</a>, <a href="https://publications.waset.org/abstracts/search?q=technology" title=" technology"> technology</a> </p> <a href="https://publications.waset.org/abstracts/20160/the-attitude-of-high-school-teachers-in-saudi-arabia-towards-computers-qualitative-study" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/20160.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">293</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2332</span> The Investigation of Counselors Attitudes toward Online Counseling upon Taking Clients Perspective</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Omer%20Ozer">Omer Ozer</a>, <a href="https://publications.waset.org/abstracts/search?q=Murat%20Yikilmaz"> Murat Yikilmaz</a>, <a href="https://publications.waset.org/abstracts/search?q=Ahmet%20Altinok"> Ahmet Altinok</a>, <a href="https://publications.waset.org/abstracts/search?q=Ferhat%20Bayolu"> Ferhat Bayolu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> There is an increasing number of online counseling services, studies exploring clients’ and counselors’ attitudes toward online counseling services are needed to provide effective and efficient mental health counseling services. The purpose of this study is to investigate counselors’ attitudes toward online counseling in relation to counselors’ genders, their daily usage of computer, their total usage of computer, and their self-efficacy in computer usage. In this study, Personal Information Form, specific items from the Online Counseling Attitudes Scale, and the Face-to-Face Counseling Attitudes Scale were given to 193 counselors to measure attitudes toward online counseling. Data were analyzed by using independent samples t-test and one-way ANOVA. There were no statistically significant differences counselors’ attitudes toward online counseling and counselors’ gender, their daily usage of computer, their total usage of computer, and their self-efficacy in computer usage. The implications of these findings have been discussed in the literature review to provide some suggestions to researchers in the counseling profession. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=online%20counseling" title="online counseling">online counseling</a>, <a href="https://publications.waset.org/abstracts/search?q=counselor" title=" counselor"> counselor</a>, <a href="https://publications.waset.org/abstracts/search?q=attitude" title=" attitude"> attitude</a>, <a href="https://publications.waset.org/abstracts/search?q=counseling%20service" title=" counseling service"> counseling service</a> </p> <a href="https://publications.waset.org/abstracts/51884/the-investigation-of-counselors-attitudes-toward-online-counseling-upon-taking-clients-perspective" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/51884.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">356</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">&lsaquo;</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=computer%20aid&amp;page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=computer%20aid&amp;page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=computer%20aid&amp;page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=computer%20aid&amp;page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=computer%20aid&amp;page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=computer%20aid&amp;page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=computer%20aid&amp;page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=computer%20aid&amp;page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=computer%20aid&amp;page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=computer%20aid&amp;page=78">78</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=computer%20aid&amp;page=79">79</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=computer%20aid&amp;page=2" rel="next">&rsaquo;</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">&copy; 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">&times;</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10