CINXE.COM
Search results for: computers
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: computers</title> <meta name="description" content="Search results for: computers"> <meta name="keywords" content="computers"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="computers" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="computers"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 326</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: computers</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">326</span> The Attitude of High School Teachers in Saudi Arabia towards Computers: Qualitative Study</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Manal%20O.%20Alothman">Manal O. Alothman</a>, <a href="https://publications.waset.org/abstracts/search?q=Judy%20Robertson"> Judy Robertson</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Teachers can play a huge role in encouraging students to use computers and can affect students’ attitudes towards computers. So understanding teachers’ beliefs and their use of computers is an important way to create effective motivational systems for teachers to use computers in the classroom in an effective way.A qualitative study (6 focus group) was carried out among Saudi High school teachers, both male and female, to examine their attitudes towards computers and to find out their computer skills and usage. The study showed a gender difference in that females were less likely to attend computer workshops, females also had less computer skills, and they have more negative attitudes towards computers than males. Also, the study found that low computer skills in the classroom made students unlikely to have the lessons presented using computers. Furthermore, the study found some factors that affected teachers’ attitudes towards computers. These factors were computer experience and confidence as much having skills and good experience in computer use, the role and importance of computers had become in their life and in teaching as well. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=attitude" title="attitude">attitude</a>, <a href="https://publications.waset.org/abstracts/search?q=education" title=" education"> education</a>, <a href="https://publications.waset.org/abstracts/search?q=student" title=" student"> student</a>, <a href="https://publications.waset.org/abstracts/search?q=teacher" title=" teacher"> teacher</a>, <a href="https://publications.waset.org/abstracts/search?q=technology" title=" technology"> technology</a> </p> <a href="https://publications.waset.org/abstracts/20160/the-attitude-of-high-school-teachers-in-saudi-arabia-towards-computers-qualitative-study" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/20160.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">293</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">325</span> Assessment of the Administration and Services of Public Access Computers in Academic Libraries in Kaduna State, Nigeria</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Usman%20Ahmed%20Adam">Usman Ahmed Adam</a>, <a href="https://publications.waset.org/abstracts/search?q=Umar%20Ibrahim"> Umar Ibrahim</a>, <a href="https://publications.waset.org/abstracts/search?q=Ezra%20S.%20Gbaje"> Ezra S. Gbaje</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study is posed to explore the practice of Public Access Computers (PACs) in academic libraries in Kaduna State, Nigeria. The study aimed to determine the computers and other tools available, their services and challenges of the practices. Three questions were framed to identify number of public computers and tools available, their services and problems faced during the practice. The study used qualitative research design along with semi-constructed interview and observation as tools for data collection. Descriptive analysis was employed to analyze the data. The sample size of the study comprises 52 librarian and IT staff from the seven academic institutions in Kaduna State. The findings revealed that, PACs were provided for access to the Internet, digital resources, library catalogue and training services. The study further explored that, despite the limit number of the computers, users were not allowed to enjoy many services. The study recommends that libraries in Kaduna state should provide more public computers to be able to cover the population of their users; libraries should allow users to use the computers without limitations and restrictions. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=academic%20libraries" title="academic libraries">academic libraries</a>, <a href="https://publications.waset.org/abstracts/search?q=computers%20in%20library" title=" computers in library"> computers in library</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20libraries" title=" digital libraries"> digital libraries</a>, <a href="https://publications.waset.org/abstracts/search?q=public%20computers" title=" public computers"> public computers</a> </p> <a href="https://publications.waset.org/abstracts/43705/assessment-of-the-administration-and-services-of-public-access-computers-in-academic-libraries-in-kaduna-state-nigeria" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/43705.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">352</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">324</span> Efficient Utilization of Commodity Computers in Academic Institutes: A Cloud Computing Approach</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jasraj%20Meena">Jasraj Meena</a>, <a href="https://publications.waset.org/abstracts/search?q=Malay%20Kumar"> Malay Kumar</a>, <a href="https://publications.waset.org/abstracts/search?q=Manu%20Vardhan"> Manu Vardhan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cloud computing is a new technology in industry and academia. The technology has grown and matured in last half decade and proven their significant role in changing environment of IT infrastructure where cloud services and resources are offered over the network. Cloud technology enables users to use services and resources without being concerned about the technical implications of technology. There are substantial research work has been performed for the usage of cloud computing in educational institutes and majority of them provides cloud services over high-end blade servers or other high-end CPUs. However, this paper proposes a new stack called “CiCKAStack” which provide cloud services over unutilized computing resources, named as commodity computers. “CiCKAStack” provides IaaS and PaaS using underlying commodity computers. This will not only increasing the utilization of existing computing resources but also provide organize file system, on demand computing resource and design and development environment. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=commodity%20computers" title="commodity computers">commodity computers</a>, <a href="https://publications.waset.org/abstracts/search?q=cloud-computing" title=" cloud-computing"> cloud-computing</a>, <a href="https://publications.waset.org/abstracts/search?q=KVM" title=" KVM"> KVM</a>, <a href="https://publications.waset.org/abstracts/search?q=CloudStack" title=" CloudStack"> CloudStack</a>, <a href="https://publications.waset.org/abstracts/search?q=AppScale" title=" AppScale"> AppScale</a> </p> <a href="https://publications.waset.org/abstracts/18221/efficient-utilization-of-commodity-computers-in-academic-institutes-a-cloud-computing-approach" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/18221.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">273</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">323</span> Towards the Management of Cybersecurity Threats in Organisations</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=O.%20A.%20Ajigini">O. A. Ajigini</a>, <a href="https://publications.waset.org/abstracts/search?q=E.%20N.%20Mwim"> E. N. Mwim</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cybersecurity is the protection of computers, programs, networks, and data from attack, damage, unauthorised, unintended access, change, or destruction. Organisations collect, process and store their confidential and sensitive information on computers and transmit this data across networks to other computers. Moreover, the advent of internet technologies has led to various cyberattacks resulting in dangerous consequences for organisations. Therefore, with the increase in the volume and sophistication of cyberattacks, there is a need to develop models and make recommendations for the management of cybersecurity threats in organisations. This paper reports on various threats that cause malicious damage to organisations in cyberspace and provides measures on how these threats can be eliminated or reduced. The paper explores various aspects of protection measures against cybersecurity threats such as handling of sensitive data, network security, protection of information assets and cybersecurity awareness. The paper posits a model and recommendations on how to manage cybersecurity threats in organisations effectively. The model and the recommendations can then be utilised by organisations to manage the threats affecting their cyberspace. The paper provides valuable information to assist organisations in managing their cybersecurity threats and hence protect their computers, programs, networks and data in cyberspace. The paper aims to assist organisations to protect their information assets and data from cyberthreats as part of the contributions toward community engagement. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=confidential%20information" title="confidential information">confidential information</a>, <a href="https://publications.waset.org/abstracts/search?q=cyberattacks" title=" cyberattacks"> cyberattacks</a>, <a href="https://publications.waset.org/abstracts/search?q=cybersecurity" title=" cybersecurity"> cybersecurity</a>, <a href="https://publications.waset.org/abstracts/search?q=cyberspace" title=" cyberspace"> cyberspace</a>, <a href="https://publications.waset.org/abstracts/search?q=sensitive%20information" title=" sensitive information"> sensitive information</a> </p> <a href="https://publications.waset.org/abstracts/62869/towards-the-management-of-cybersecurity-threats-in-organisations" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/62869.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">259</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">322</span> On the Framework of Contemporary Intelligent Mathematics Underpinning Intelligent Science, Autonomous AI, and Cognitive Computers</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yingxu%20Wang">Yingxu Wang</a>, <a href="https://publications.waset.org/abstracts/search?q=Jianhua%20Lu"> Jianhua Lu</a>, <a href="https://publications.waset.org/abstracts/search?q=Jun%20Peng"> Jun Peng</a>, <a href="https://publications.waset.org/abstracts/search?q=Jiawei%20Zhang"> Jiawei Zhang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The fundamental demand in contemporary intelligent science towards Autonomous AI (AI*) is the creation of unprecedented formal means of Intelligent Mathematics (IM). It is discovered that natural intelligence is inductively created rather than exhaustively trained. Therefore, IM is a family of algebraic and denotational mathematics encompassing Inference Algebra, Real-Time Process Algebra, Concept Algebra, Semantic Algebra, Visual Frame Algebra, etc., developed in our labs. IM plays indispensable roles in training-free AI* theories and systems beyond traditional empirical data-driven technologies. A set of applications of IM-driven AI* systems will be demonstrated in contemporary intelligence science, AI*, and cognitive computers. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=intelligence%20mathematics" title="intelligence mathematics">intelligence mathematics</a>, <a href="https://publications.waset.org/abstracts/search?q=foundations%20of%20intelligent%20science" title=" foundations of intelligent science"> foundations of intelligent science</a>, <a href="https://publications.waset.org/abstracts/search?q=autonomous%20AI" title=" autonomous AI"> autonomous AI</a>, <a href="https://publications.waset.org/abstracts/search?q=cognitive%20computers" title=" cognitive computers"> cognitive computers</a>, <a href="https://publications.waset.org/abstracts/search?q=inference%20algebra" title=" inference algebra"> inference algebra</a>, <a href="https://publications.waset.org/abstracts/search?q=real-time%20process%20algebra" title=" real-time process algebra"> real-time process algebra</a>, <a href="https://publications.waset.org/abstracts/search?q=concept%20algebra" title=" concept algebra"> concept algebra</a>, <a href="https://publications.waset.org/abstracts/search?q=semantic%20algebra" title=" semantic algebra"> semantic algebra</a>, <a href="https://publications.waset.org/abstracts/search?q=applications" title=" applications"> applications</a> </p> <a href="https://publications.waset.org/abstracts/182399/on-the-framework-of-contemporary-intelligent-mathematics-underpinning-intelligent-science-autonomous-ai-and-cognitive-computers" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/182399.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">61</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">321</span> Human-Computer Interaction: Strategies for Ensuring the Design of User-Centered Web Interfaces for Smartphones</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Byron%20Joseph%20A.%20Hallar">Byron Joseph A. Hallar</a>, <a href="https://publications.waset.org/abstracts/search?q=Annjeannette%20Alain%20D.%20Galang"> Annjeannette Alain D. Galang</a>, <a href="https://publications.waset.org/abstracts/search?q=Maria%20Visitacion%20N.%20Gumabay"> Maria Visitacion N. Gumabay</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The widespread adoption and increasing proliferation of smartphones that started during the first decade of the twenty-first century have enabled their users to communicate and access information in ways that were merely thought of as possibilities in the few years before the smartphone revolution. A product of the convergence of the cellular phone and portable computer, the smartphone provides an additional important function that used to be the exclusive domain of desktop-bound computers and portable computers: Web Browsing. For increasing numbers of users, the smartphone and allied devices such as tablet computers have become their first and often their only means of accessing the World Wide Web. This has led to the development of websites that cater to the needs of the new breed of smartphone-carrying web users. The smaller size of smartphones as compared with conventional computers has provided unique challenges to web interface designers. The smaller screen size and touchscreen interface have made it much more difficult to read and navigate through web pages that were in most part designed for traditional desktop and portable computers. Although increasing numbers of websites now provide an alternate website formatted for smartphones, problems with ease of use, reliability and usability still remain. This study focuses on the identification of the problems associated with smartphone web interfaces, the compliance with accepted standards of user-oriented web interface design, the strategies that could be utilized to ensure the design of user-centric web interfaces for smartphones, and the identification of the current trends and developments related to user-centric web interface design intended for the consumption of smartphone users. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=human-computer%20interaction" title="human-computer interaction">human-computer interaction</a>, <a href="https://publications.waset.org/abstracts/search?q=user-centered%20design" title=" user-centered design"> user-centered design</a>, <a href="https://publications.waset.org/abstracts/search?q=web%20interface" title=" web interface"> web interface</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile" title=" mobile"> mobile</a>, <a href="https://publications.waset.org/abstracts/search?q=smartphone" title=" smartphone "> smartphone </a> </p> <a href="https://publications.waset.org/abstracts/46032/human-computer-interaction-strategies-for-ensuring-the-design-of-user-centered-web-interfaces-for-smartphones" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/46032.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">356</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">320</span> Digital Homeostasis: Tangible Computing as a Multi-Sensory Installation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Andrea%20Macruz">Andrea Macruz</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper explores computation as a process for design by examining how computers can become more than an operative strategy in a designer's toolkit. It documents this, building upon concepts of neuroscience and Antonio Damasio's Homeostasis Theory, which is the control of bodily states through feedback intended to keep conditions favorable for life. To do this, it follows a methodology through algorithmic drawing and discusses the outcomes of three multi-sensory design installations, which culminated from a course in an academic setting. It explains both the studio process that took place to create the installations and the computational process that was developed, related to the fields of algorithmic design and tangible computing. It discusses how designers can use computational range to achieve homeostasis related to sensory data in a multi-sensory installation. The outcomes show clearly how people and computers interact with different sensory modalities and affordances. They propose using computers as meta-physical stabilizers rather than tools. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=algorithmic%20drawing" title="algorithmic drawing">algorithmic drawing</a>, <a href="https://publications.waset.org/abstracts/search?q=Antonio%20Damasio" title=" Antonio Damasio"> Antonio Damasio</a>, <a href="https://publications.waset.org/abstracts/search?q=emotion" title=" emotion"> emotion</a>, <a href="https://publications.waset.org/abstracts/search?q=homeostasis" title=" homeostasis"> homeostasis</a>, <a href="https://publications.waset.org/abstracts/search?q=multi-sensory%20installation" title=" multi-sensory installation"> multi-sensory installation</a>, <a href="https://publications.waset.org/abstracts/search?q=neuroscience" title=" neuroscience"> neuroscience</a> </p> <a href="https://publications.waset.org/abstracts/150835/digital-homeostasis-tangible-computing-as-a-multi-sensory-installation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/150835.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">108</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">319</span> Pedagogical Variation with Computers in Mathematics Classrooms: A Cultural Historical Activity Theory Analysis</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Joanne%20Hardman">Joanne Hardman</a> </p> <p class="card-text"><strong>Abstract:</strong></p> South Africa’s crisis in mathematics attainment is well documented. To meet the need to develop students’ mathematical performance in schools the government has launched various initiatives using computers to impact on mathematical attainment. While it is clear that computers can change pedagogical practices, there is a dearth of qualitative studies indicating exactly how pedagogy is transformed with Information Communication Technologies (ICTs) in a teaching activity. Consequently, this paper addresses the following question: how, along which dimensions in an activity, does pedagogy alter with the use of computer drill and practice software in four disadvantaged grade 6 mathematics classrooms in the Western Cape province of South Africa? The paper draws on Cultural Historical Activity Theory (CHAT) to develop a view of pedagogy as socially situated. Four ideal pedagogical types are identified: Reinforcement pedagogy, which has the reinforcement of specialised knowledge as its object; Collaborative pedagogy, which has the development of metacognitive engagement with specialised knowledge as its object; Directive pedagogy, which has the development of technical task skills as its object, and finally, Defensive pedagogy, which has student regulation as its object. Face-to-face lessons were characterised as predominantly Reinforcement and Collaborative pedagogy and most computer lessons were characterised as mainly either Defensive or Directive. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=computers" title="computers">computers</a>, <a href="https://publications.waset.org/abstracts/search?q=cultural%20historical%20activity%20theory" title=" cultural historical activity theory"> cultural historical activity theory</a>, <a href="https://publications.waset.org/abstracts/search?q=mathematics" title=" mathematics"> mathematics</a>, <a href="https://publications.waset.org/abstracts/search?q=pedagogy" title=" pedagogy"> pedagogy</a> </p> <a href="https://publications.waset.org/abstracts/53153/pedagogical-variation-with-computers-in-mathematics-classrooms-a-cultural-historical-activity-theory-analysis" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/53153.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">282</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">318</span> Computer Anxiety and the Use of Computerized System by University Librarians in Delta State University Library, Nigeria</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=L.%20Arumuru">L. Arumuru</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The paper investigates computer anxiety and the use of computerized library system by university librarians in Delta State University library, Abraka, Nigeria. Some of the root causes of computer anxiety among university librarians such as lack of exposure to computers at early age, inadequate computer skills, inadequate computer training, fear at the sight of a computer, lack of understanding of how computers work, etc. were pin-pointed in the study. Also, the different services rendered in the university libraries with the aid of computers such as reference services, circulation services, acquisition services, cataloguing and classification services, etc. were identified. The study employed the descriptive survey research design through the expo-facto method, with a population of 56 librarians, while the simple percentage and frequency counts were used to analyze the data generated from the administered copies of the questionnaire. Based on the aforementioned root causes of computer anxiety and the resultant effect on computerized library system, recommendations were proffered in the study. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=computer%20anxiety" title="computer anxiety">computer anxiety</a>, <a href="https://publications.waset.org/abstracts/search?q=computerized%20library%20system" title=" computerized library system"> computerized library system</a>, <a href="https://publications.waset.org/abstracts/search?q=library%20services" title=" library services"> library services</a>, <a href="https://publications.waset.org/abstracts/search?q=university%20librarians" title=" university librarians"> university librarians</a> </p> <a href="https://publications.waset.org/abstracts/63816/computer-anxiety-and-the-use-of-computerized-system-by-university-librarians-in-delta-state-university-library-nigeria" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/63816.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">387</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">317</span> Algorithm Optimization to Sort in Parallel by Decreasing the Number of the Processors in SIMD (Single Instruction Multiple Data) Systems </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ali%20Hosseini">Ali Hosseini</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Paralleling is a mechanism to decrease the time necessary to execute the programs. Sorting is one of the important operations to be used in different systems in a way that the proper function of many algorithms and operations depend on sorted data. CRCW_SORT algorithm executes ‘N’ elements sorting in O(1) time on SIMD (Single Instruction Multiple Data) computers with n^2/2-n/2 number of processors. In this article having presented a mechanism by dividing the input string by the hinge element into two less strings the number of the processors to be used in sorting ‘N’ elements in O(1) time has decreased to n^2/8-n/4 in the best state; by this mechanism the best state is when the hinge element is the middle one and the worst state is when it is minimum. The findings from assessing the proposed algorithm by other methods on data collection and number of the processors indicate that the proposed algorithm uses less processors to sort during execution than other methods. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=CRCW" title="CRCW">CRCW</a>, <a href="https://publications.waset.org/abstracts/search?q=SIMD%20%28Single%20Instruction%20Multiple%20Data%29%0D%0Acomputers" title=" SIMD (Single Instruction Multiple Data) computers"> SIMD (Single Instruction Multiple Data) computers</a>, <a href="https://publications.waset.org/abstracts/search?q=parallel%20computers" title=" parallel computers"> parallel computers</a>, <a href="https://publications.waset.org/abstracts/search?q=number%20of%20the%0D%0Aprocessors" title=" number of the processors"> number of the processors</a> </p> <a href="https://publications.waset.org/abstracts/29094/algorithm-optimization-to-sort-in-parallel-by-decreasing-the-number-of-the-processors-in-simd-single-instruction-multiple-data-systems" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/29094.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">310</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">316</span> Quantum Entanglement and Thermalization in Superconducting Two-Qubit Systems</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=E.%20Karami">E. Karami</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20Bohloul"> M. Bohloul</a>, <a href="https://publications.waset.org/abstracts/search?q=P.%20Najmadi"> P. Najmadi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The superconducting system is a suitable system for quantum computers. Quantum entanglement is a fundamental phenomenon that is key to the power of quantum computers. Quantum entanglement has been studied in different superconducting systems. In this paper, we are investigating a superconducting two-qubit system as a macroscopic system. These systems include two coupled Quantronium circuits. We calculate quantum entanglement and thermalization for system evolution and compare them. We observe, thermalization and entanglement have different behavior, and equilibrium thermal state has maximum entanglement. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=macroscopic%20system" title="macroscopic system">macroscopic system</a>, <a href="https://publications.waset.org/abstracts/search?q=quantum%20entanglement" title=" quantum entanglement"> quantum entanglement</a>, <a href="https://publications.waset.org/abstracts/search?q=thermalization" title=" thermalization"> thermalization</a>, <a href="https://publications.waset.org/abstracts/search?q=superconducting%20system" title=" superconducting system"> superconducting system</a> </p> <a href="https://publications.waset.org/abstracts/148726/quantum-entanglement-and-thermalization-in-superconducting-two-qubit-systems" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/148726.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">155</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">315</span> Linux Security Management: Research and Discussion on Problems Caused by Different Aspects</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ma%20Yuzhe">Ma Yuzhe</a>, <a href="https://publications.waset.org/abstracts/search?q=Burra%20Venkata%20Durga%20Kumar"> Burra Venkata Durga Kumar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The computer is a great invention. As people use computers more and more frequently, the demand for PCs is growing, and the performance of computer hardware is also rising to face more complex processing and operation. However, the operating system, which provides the soul for computers, has stopped developing at a stage. In the face of the high price of UNIX (Uniplexed Information and Computering System), batch after batch of personal computer owners can only give up. Disk Operating System is too simple and difficult to bring innovation into play, which is not a good choice. And MacOS is a special operating system for Apple computers, and it can not be widely used on personal computers. In this environment, Linux, based on the UNIX system, was born. Linux combines the advantages of the operating system and is composed of many microkernels, which is relatively powerful in the core architecture. Linux system supports all Internet protocols, so it has very good network functions. Linux supports multiple users. Each user has no influence on their own files. Linux can also multitask and run different programs independently at the same time. Linux is a completely open source operating system. Users can obtain and modify the source code for free. Because of these advantages of Linux, it has also attracted a large number of users and programmers. The Linux system is also constantly upgraded and improved. It has also issued many different versions, which are suitable for community use and commercial use. Linux system has good security because it relies on a file partition system. However, due to the constant updating of vulnerabilities and hazards, the using security of the operating system also needs to be paid more attention to. This article will focus on the analysis and discussion of Linux security issues. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Linux" title="Linux">Linux</a>, <a href="https://publications.waset.org/abstracts/search?q=operating%20system" title=" operating system"> operating system</a>, <a href="https://publications.waset.org/abstracts/search?q=system%20management" title=" system management"> system management</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a> </p> <a href="https://publications.waset.org/abstracts/152889/linux-security-management-research-and-discussion-on-problems-caused-by-different-aspects" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/152889.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">108</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">314</span> Attempt to Reuse Used-PCs as Distributed Storage</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Toshiya%20Kawato">Toshiya Kawato</a>, <a href="https://publications.waset.org/abstracts/search?q=Shin-ichi%20Motomura"> Shin-ichi Motomura</a>, <a href="https://publications.waset.org/abstracts/search?q=Masayuki%20Higashino"> Masayuki Higashino</a>, <a href="https://publications.waset.org/abstracts/search?q=Takao%20Kawamura"> Takao Kawamura</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Storage for storing data is indispensable. If a storage capacity becomes insufficient, we can increase its capacity by adding new disks. It is, however, difficult to add a new disk when a budget is not enough. On the other hand, there are many unused idle resources such as used personal computers despite those use value. In order to solve those problems, used personal computers can be reused as storage. In this paper, we attempt to reuse used-PCs as a distributed storage. First, we list up the characteristics of used-PCs and design a storage system that utilizes its characteristics. Next, we experimentally implement an auto-construction system that automatically constructs a distributed storage environment in used-PCs. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=distributed%20storage" title="distributed storage">distributed storage</a>, <a href="https://publications.waset.org/abstracts/search?q=used%20personal%20computer" title=" used personal computer"> used personal computer</a>, <a href="https://publications.waset.org/abstracts/search?q=idle%20resource" title=" idle resource"> idle resource</a>, <a href="https://publications.waset.org/abstracts/search?q=auto%20construction" title=" auto construction"> auto construction</a> </p> <a href="https://publications.waset.org/abstracts/87359/attempt-to-reuse-used-pcs-as-distributed-storage" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/87359.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">252</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">313</span> UNIX Source Code Leak: Evaluation and Feasible Solutions</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Gu%20Dongxing">Gu Dongxing</a>, <a href="https://publications.waset.org/abstracts/search?q=Li%20Yuxuan"> Li Yuxuan</a>, <a href="https://publications.waset.org/abstracts/search?q=Nong%20Tengxiao"> Nong Tengxiao</a>, <a href="https://publications.waset.org/abstracts/search?q=Burra%20Venkata%20Durga%20Kumar"> Burra Venkata Durga Kumar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Since computers are widely used in business models, more and more companies choose to store important information in computers to improve productivity. However, this information can be compromised in many cases, such as when it is stored locally on the company's computers or when it is transferred between servers and clients. Of these important information leaks, source code leaks are probably the most costly. Because the source code often represents the core technology of the company, especially for the Internet companies, source code leakage may even lead to the company's core products lose market competitiveness, and then lead to the bankruptcy of the company. In recent years, such as Microsoft, AMD and other large companies have occurred source code leakage events, suffered a huge loss. This reveals to us the importance and necessity of preventing source code leakage. This paper aims to find ways to prevent source code leakage based on the direction of operating system, and based on the fact that most companies use Linux or Linux-like system to realize the interconnection between server and client, to discuss how to reduce the possibility of source code leakage during data transmission. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=data%20transmission" title="data transmission">data transmission</a>, <a href="https://publications.waset.org/abstracts/search?q=Linux" title=" Linux"> Linux</a>, <a href="https://publications.waset.org/abstracts/search?q=source%20code" title=" source code"> source code</a>, <a href="https://publications.waset.org/abstracts/search?q=operating%20system" title=" operating system"> operating system</a> </p> <a href="https://publications.waset.org/abstracts/153161/unix-source-code-leak-evaluation-and-feasible-solutions" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/153161.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">270</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">312</span> Influence of Computer and Internet on Student’s Attitude and Academic Achievements in Chemistry at Undergraduate Level in Federal College of Education (FCE) Kano, Nigeria</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Abubakar%20Yusha%E2%80%99U%20Zubairu">Abubakar Yusha’U Zubairu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The study aimed to investigate the influence of computers and the internet on attitudes and academic achievements among undergraduate chemistry students. It also focused on examining gender differences. 120 students were selected, comprising 80 males and 40 females, and divided into three groups, experimental groups E1 and E2 and a control C group comprising 40 students each. The Chemistry Attitude Scale (CAS) and the Chemistry Achievement Test (CAT) were used to collect data. Two different CAT methods – ChemDraw and ChemSketch learning software were used and applied to E1 and E2, respectively, whereas C was taught by the traditional method. For the gender difference, two groups were formed: group 1 (G1) and Group 2 (G2), comprising 40 males and 40 females. Significant differences between C and both E1 and E2 were found. Furthermore, CAT in E1&E2 was significantly higher than C. The findings showed that Undergraduate chemistry students in FCE have a positive attitude toward the use of computers and the internet, and gender varies in opposite directions. It is recommended that schools should provide computers and internet facilities with a regular supply of electricity. This will enhance attitudes towards the use of computer and internet resources and improve academic achievement. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=chemdraw" title="chemdraw">chemdraw</a>, <a href="https://publications.waset.org/abstracts/search?q=chemsketch" title=" chemsketch"> chemsketch</a>, <a href="https://publications.waset.org/abstracts/search?q=attitude" title=" attitude"> attitude</a>, <a href="https://publications.waset.org/abstracts/search?q=academic%20achievement." title=" academic achievement."> academic achievement.</a> </p> <a href="https://publications.waset.org/abstracts/186000/influence-of-computer-and-internet-on-students-attitude-and-academic-achievements-in-chemistry-at-undergraduate-level-in-federal-college-of-education-fce-kano-nigeria" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/186000.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">42</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">311</span> Teaching the Binary System via Beautiful Facts from the Real Life</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Salem%20Ben%20Said">Salem Ben Said</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In recent times the decimal number system to which we are accustomed has received serious competition from the binary number system. In this note, an approach is suggested to teaching and learning the binary number system using examples from the real world. More precisely, we will demonstrate the utility of the binary system in describing the optimal strategy to win the Chinese Nim game, and in telegraphy by decoding the hidden message on Perseverance’s Mars parachute written in the language of binary system. Finally, we will answer the question, “why do modern computers prefer the ternary number system instead of the binary system?”. All materials are provided in a format that is conductive to classroom presentation and discussion. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=binary%20number%20system" title="binary number system">binary number system</a>, <a href="https://publications.waset.org/abstracts/search?q=Nim%20game" title=" Nim game"> Nim game</a>, <a href="https://publications.waset.org/abstracts/search?q=telegraphy" title=" telegraphy"> telegraphy</a>, <a href="https://publications.waset.org/abstracts/search?q=computers%20prefer%20the%20ternary%20system" title=" computers prefer the ternary system"> computers prefer the ternary system</a> </p> <a href="https://publications.waset.org/abstracts/143278/teaching-the-binary-system-via-beautiful-facts-from-the-real-life" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/143278.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">187</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">310</span> A Real-World Roadmap and Exploration of Quantum Computers Capacity to Trivialise Internet Security</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=James%20Andrew%20Fitzjohn">James Andrew Fitzjohn</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper intends to discuss and explore the practical aspects of cracking encrypted messages with quantum computers. The theory of this process has been shown and well described both in academic papers and headline-grabbing news articles, but with all theory and hyperbole, we must be careful to assess the practicalities of these claims. Therefore, we will use real-world devices and proof of concept code to prove or disprove the notion that quantum computers will render the encryption technologies used by many websites unfit for purpose. It is time to discuss and implement the practical aspects of the process as many advances in quantum computing hardware/software have recently been made. This paper will set expectations regarding the useful lifespan of RSA and cipher lengths and propose alternative encryption technologies. We will set out comprehensive roadmaps describing when and how encryption schemes can be used, including when they can no longer be trusted. The cost will also be factored into our investigation; for example, it would make little financial sense to spend millions of dollars on a quantum computer to factor a private key in seconds when a commodity GPU could perform the same task in hours. It is hoped that the real-world results depicted in this paper will help influence the owners of websites who can take appropriate actions to improve the security of their provisions. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=quantum%20computing" title="quantum computing">quantum computing</a>, <a href="https://publications.waset.org/abstracts/search?q=encryption" title=" encryption"> encryption</a>, <a href="https://publications.waset.org/abstracts/search?q=RSA" title=" RSA"> RSA</a>, <a href="https://publications.waset.org/abstracts/search?q=roadmap" title=" roadmap"> roadmap</a>, <a href="https://publications.waset.org/abstracts/search?q=real%20world" title=" real world"> real world</a> </p> <a href="https://publications.waset.org/abstracts/157117/a-real-world-roadmap-and-exploration-of-quantum-computers-capacity-to-trivialise-internet-security" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/157117.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">131</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">309</span> A Survey of Crowdsourcing Technology</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Qianjia%20Cheng">Qianjia Cheng</a>, <a href="https://publications.waset.org/abstracts/search?q=Hongquan%20Jiang"> Hongquan Jiang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Crowdsourcing solves the problems that computers can't handle by integrating computers and the Internet. Its extensive knowledge sources, high efficiency and high quality, make crowdsourcing attract wide attention in industry and academia in recent years. The development of online crowdsourcing platforms such as Clickworker and Amazon Mechanical Turk(Mturk) tend to mature gradually. This paper sorts out the concept of crowdsourcing, sorts out the workflow of competitive crowdsourcing, summarizes the related technologies of crowdsourcing based on the workflow, quality control, cost control and delay control, introduces the typical crowdsourcing platform. Finally, we highlight some open problems of the current crowdsourcing and present some future research direction in this area. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=application" title="application">application</a>, <a href="https://publications.waset.org/abstracts/search?q=crowdsourcing" title=" crowdsourcing"> crowdsourcing</a>, <a href="https://publications.waset.org/abstracts/search?q=crowdsourcing%20platform" title=" crowdsourcing platform"> crowdsourcing platform</a>, <a href="https://publications.waset.org/abstracts/search?q=system%20architecture" title=" system architecture"> system architecture</a> </p> <a href="https://publications.waset.org/abstracts/166744/a-survey-of-crowdsourcing-technology" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/166744.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">70</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">308</span> Solving 94-Bit ECDLP with 70 Computers in Parallel</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shunsuke%20Miyoshi">Shunsuke Miyoshi</a>, <a href="https://publications.waset.org/abstracts/search?q=Yasuyuki%20Nogami"> Yasuyuki Nogami</a>, <a href="https://publications.waset.org/abstracts/search?q=Takuya%20Kusaka"> Takuya Kusaka</a>, <a href="https://publications.waset.org/abstracts/search?q=Nariyoshi%20Yamai"> Nariyoshi Yamai</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Elliptic curve discrete logarithm problem (ECDLP) is one of problems on which the security of pairing-based cryptography is based. This paper considers Pollard's rho method to evaluate the security of ECDLP on Barreto-Naehrig (BN) curve that is an efficient pairing-friendly curve. Some techniques are proposed to make the rho method efficient. Especially, the group structure on BN curve, distinguished point method, and Montgomery trick are well-known techniques. This paper applies these techniques and shows its optimization. According to the experimental results for which a large-scale parallel system with MySQL is applied, 94-bit ECDLP was solved about 28 hours by parallelizing 71 computers. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Pollard%27s%20rho%20method" title="Pollard's rho method">Pollard's rho method</a>, <a href="https://publications.waset.org/abstracts/search?q=BN%20curve" title=" BN curve"> BN curve</a>, <a href="https://publications.waset.org/abstracts/search?q=Montgomery%20multiplication" title=" Montgomery multiplication"> Montgomery multiplication</a> </p> <a href="https://publications.waset.org/abstracts/28038/solving-94-bit-ecdlp-with-70-computers-in-parallel" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/28038.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">272</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">307</span> A Survey of Crowdsourcing Technology and Application</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Qianjia%20Cheng">Qianjia Cheng</a>, <a href="https://publications.waset.org/abstracts/search?q=Hongquan%20Jiang"> Hongquan Jiang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Crowdsourcing solves the problems that computers can't handle by integrating computers and the Internet. Its extensive knowledge sources, high efficiency, and high quality have made crowdsourcing attract wide attention in industry and academia in recent years. The development of online crowdsourcing platforms such as Clickworker, Amazon Mechanical Turk(Mturk) tends to mature gradually. This paper sorts out the concept of crowdsourcing, sorts out the workflow of competitive crowdsourcing, summarizes the related technologies of crowdsourcing based on workflow, quality control, cost control, and delay control, and introduces the typical crowdsourcing platform. Finally, we highlight some open problems of the current crowdsourcing and present some future research directions in this area. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=application" title="application">application</a>, <a href="https://publications.waset.org/abstracts/search?q=crowdsourcing" title=" crowdsourcing"> crowdsourcing</a>, <a href="https://publications.waset.org/abstracts/search?q=crowdsourcing%20platform" title=" crowdsourcing platform"> crowdsourcing platform</a>, <a href="https://publications.waset.org/abstracts/search?q=system%20architecture" title=" system architecture"> system architecture</a> </p> <a href="https://publications.waset.org/abstracts/166661/a-survey-of-crowdsourcing-technology-and-application" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/166661.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">89</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">306</span> Stack Overflow Detection and Prevention on Operating Systems Using Machine Learning and Control-Flow Enforcement Technology</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Cao%20Jiayu">Cao Jiayu</a>, <a href="https://publications.waset.org/abstracts/search?q=Lan%20Ximing"> Lan Ximing</a>, <a href="https://publications.waset.org/abstracts/search?q=Huang%20Jingjia"> Huang Jingjia</a>, <a href="https://publications.waset.org/abstracts/search?q=Burra%20Venkata%20Durga%20Kumar"> Burra Venkata Durga Kumar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The first virus to attack personal computers was born in early 1986, called C-Brain, written by a pair of Pakistani brothers. In those days, people still used dos systems, manipulating computers with the most basic command lines. In the 21st century today, computer performance has grown geometrically. But computer viruses are also evolving and escalating. We never stop fighting against security problems. Stack overflow is one of the most common security vulnerabilities in operating systems. It may result in serious security issues for an operating system if a program in it has a vulnerability with administrator privileges. Certain viruses change the value of specific memory through a stack overflow, allowing computers to run harmful programs. This study developed a mechanism to detect and respond to time whenever a stack overflow occurs. We demonstrate the effectiveness of standard machine learning algorithms and control flow enforcement techniques in predicting computer OS security using generating suspicious vulnerability functions (SVFS) and associated suspect areas (SAS). The method can minimize the possibility of stack overflow attacks occurring. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=operating%20system" title="operating system">operating system</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=stack%20overflow" title=" stack overflow"> stack overflow</a>, <a href="https://publications.waset.org/abstracts/search?q=buffer%20overflow" title=" buffer overflow"> buffer overflow</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20learning" title=" machine learning"> machine learning</a>, <a href="https://publications.waset.org/abstracts/search?q=control-flow%20enforcement%20technology" title=" control-flow enforcement technology"> control-flow enforcement technology</a> </p> <a href="https://publications.waset.org/abstracts/153142/stack-overflow-detection-and-prevention-on-operating-systems-using-machine-learning-and-control-flow-enforcement-technology" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/153142.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">115</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">305</span> Simulation-Based Unmanned Surface Vehicle Design Using PX4 and Robot Operating System With Kubernetes and Cloud-Native Tooling</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Norbert%20Szulc">Norbert Szulc</a>, <a href="https://publications.waset.org/abstracts/search?q=Jakub%20Wilk"> Jakub Wilk</a>, <a href="https://publications.waset.org/abstracts/search?q=Franciszek%20G%C3%B3rski"> Franciszek Górski</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper presents an approach for simulating and testing robotic systems based on PX4, using a local Kubernetes cluster. The approach leverages modern cloud-native tools and runs on single-board computers. Additionally, this solution enables the creation of datasets for computer vision and the evaluation of control system algorithms in an end-to-end manner. This paper compares this approach to method commonly used Docker based approach. This approach was used to develop simulation environment for an unmanned surface vehicle (USV) for RoboBoat 2023 by running a containerized configuration of the PX4 Open-source Autopilot connected to ROS and the Gazebo simulation environment. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cloud%20computing" title="cloud computing">cloud computing</a>, <a href="https://publications.waset.org/abstracts/search?q=Kubernetes" title=" Kubernetes"> Kubernetes</a>, <a href="https://publications.waset.org/abstracts/search?q=single%20board%20computers" title=" single board computers"> single board computers</a>, <a href="https://publications.waset.org/abstracts/search?q=simulation" title=" simulation"> simulation</a>, <a href="https://publications.waset.org/abstracts/search?q=ROS" title=" ROS"> ROS</a> </p> <a href="https://publications.waset.org/abstracts/163529/simulation-based-unmanned-surface-vehicle-design-using-px4-and-robot-operating-system-with-kubernetes-and-cloud-native-tooling" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/163529.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">76</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">304</span> The Use of Computers in Improving the Academic Performance of Students in Mathematics</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Uwaruile%20Austin%20Obuh">Uwaruile Austin Obuh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This research work focuses on the use of computers in improving the academic performance of students in mathematics in Benin City, Edo State. To guide this study, two research questions were raised, and two corresponding hypotheses were formulated. A total of one hundred and twenty (120) respondents were randomly selected from four schools in the city (60 boys and 60 girls). The instrument employed for the collation of data for the study was the multiple-choice test items on geometry (MCTIOG), drawn from past senior school certificate examinations (SSCE) questions. The instrument was validated by an expert in mathematics and measurement and evaluation. The data obtained from the pre and post-test were analysed using the mean, standard deviation, and T-test. The study revealed a non-significant difference between the experimental and control group in the pre-test, and the two groups were found to be the same before treatment began. The study also revealed that the experimental group performed better than the control group. One can, therefore, conclude that the use of computers for mathematics instruction has improved the performance of students in Geometry. Therefore, the hypothesis was rejected. The study finally revealed that there was no significant difference between the boys and girls taught mathematics using a computer. Therefore, the hypothesis which states there will be no significant difference in the performance of boys and girls taught mathematics using the computer was not rejected. Consequent upon the findings of this study, a number of recommendations were postulated that would enhance the performance of teachers in the use of computer-aided instruction. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=computer" title="computer">computer</a>, <a href="https://publications.waset.org/abstracts/search?q=teaching" title=" teaching"> teaching</a>, <a href="https://publications.waset.org/abstracts/search?q=learning" title=" learning"> learning</a>, <a href="https://publications.waset.org/abstracts/search?q=mathematics" title=" mathematics"> mathematics</a> </p> <a href="https://publications.waset.org/abstracts/113712/the-use-of-computers-in-improving-the-academic-performance-of-students-in-mathematics" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/113712.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">124</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">303</span> Polymer in Electronic Waste: An Analysis</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Anis%20A.%20Ansari">Anis A. Ansari</a>, <a href="https://publications.waset.org/abstracts/search?q=Aftab%20A.%20Ansari"> Aftab A. Ansari</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Electronic waste is inundating the traditional solid-waste-disposal facilities, which are inadequately designed to handle and manage such type of new wastes. Since electronic waste contains mostly hazardous and even toxic materials, the seriousness of its effects on human health and the environment cannot be ignored in present scenario. Waste from the electronic industry is increasing exponentially day by day. From the last 20 years, we are continuously generating huge quantities of e-waste such as obsolete computers and other discarded electronic components, mainly due to evolution of newer technologies as a result of constant efforts in research and development in this sector. Polymers, one of the major constituents in almost every electronic waste, such as computers, printers, electronic equipment, entertainment devices, mobile phones, television sets etc., are if properly recycled can create a new business opportunity. This would not only create potential market for polymers to improve economy but also the priceless land used as dumping sites of electronic waste, can be utilized for other productive purposes. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=polymer%20recycling" title="polymer recycling">polymer recycling</a>, <a href="https://publications.waset.org/abstracts/search?q=electronic%20waste" title=" electronic waste"> electronic waste</a>, <a href="https://publications.waset.org/abstracts/search?q=hazardous%20materials" title=" hazardous materials"> hazardous materials</a>, <a href="https://publications.waset.org/abstracts/search?q=electronic%20components" title=" electronic components"> electronic components</a> </p> <a href="https://publications.waset.org/abstracts/19469/polymer-in-electronic-waste-an-analysis" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/19469.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">475</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">302</span> Justyna Skrzyńska, Zdzisław Kobos, Zbigniew Wochyński</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Vahid%20Bairami%20Rad">Vahid Bairami Rad</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Due to the tremendous progress in computer technology in the last decades, the capabilities of computers increased enormously and working with a computer became a normal activity for nearly everybody. With all the possibilities a computer can offer, humans and their interaction with computers are now a limiting factor. This gave rise to a lot of research in the field of HCI (human computer interaction) aiming to make interaction easier, more intuitive, and more efficient. To research eye gaze based interfaces it is necessary to understand both sides of the interaction–the human eye and the eye tracker. The first section gives an overview on the anatomy of the eye. The second section accuracy and calibration issue. The subsequent section presents data from a user study where eye movements have been recorded while watching a video and while surfing the Internet. Statistics on the eye movement during these tasks for several individuals provide typical values and ranges for fixation times and saccade lengths and are the foundation for discussions in later chapters. The data also reveal typical limitations of eye trackers. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=human%20computer%20interaction" title="human computer interaction">human computer interaction</a>, <a href="https://publications.waset.org/abstracts/search?q=gaze%20tracking" title=" gaze tracking"> gaze tracking</a>, <a href="https://publications.waset.org/abstracts/search?q=calibration" title=" calibration"> calibration</a>, <a href="https://publications.waset.org/abstracts/search?q=eye%20movement" title=" eye movement"> eye movement</a> </p> <a href="https://publications.waset.org/abstracts/29656/justyna-skrzynska-zdzislaw-kobos-zbigniew-wochynski" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/29656.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">537</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">301</span> The Analysis of Computer Crimes Act 1997 in the Circumvention and Prevention of Computer Crimes in Malaysia</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nooraneda%20Mutalip%20Laidey">Nooraneda Mutalip Laidey</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Computer Crimes Act 1997 (CCA 1997) was conceded by Malaysia’s legislative body in 1997 and the Act was enforced in June 2000. The purpose of CCA 1997 is to provide for offences related to misuse of computers such as hacking, cracking and phishing. CCA 1997 was modelled after United Kingdom’s Computer Misuses Act 1990 as a response to the emerging computer crimes. This legislation is divided into three parts and 12 Sections. The first part outlines preliminary matters that include short title and relevant definitions, second part provides for the offenses related to misuse of computers and specifies penalties for each offences, and the last part deals with ancillary provisions such as jurisdictional and investigational issues of cybercrime. The main objective of this paper is to discuss the development of computer crimes and its deterrence in Malaysia. Specific sections of CCA 1997 will be analysed in details and detail assessment on the prevention and prosecution of computer crimes in Malaysia will be accessed to determine whether CCA 1997 is so far adequate in preventing computer crimes in Malaysia. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=computer" title="computer">computer</a>, <a href="https://publications.waset.org/abstracts/search?q=computer%20crimes" title=" computer crimes"> computer crimes</a>, <a href="https://publications.waset.org/abstracts/search?q=CCA%201997" title=" CCA 1997"> CCA 1997</a>, <a href="https://publications.waset.org/abstracts/search?q=circumvention" title=" circumvention"> circumvention</a>, <a href="https://publications.waset.org/abstracts/search?q=deterrence" title=" deterrence"> deterrence</a> </p> <a href="https://publications.waset.org/abstracts/43608/the-analysis-of-computer-crimes-act-1997-in-the-circumvention-and-prevention-of-computer-crimes-in-malaysia" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/43608.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">344</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">300</span> Social Affiliation Effects of Technology in 2022</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Johanna%20Goe%C3%9F">Johanna Goeß</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this field study, it is hypothesised that affiliation motivation is relevant to dark terminal technology readiness. The theoretical basis for this work was the TAM 2, focusing on the social process variables and the short-scale technology readiness. Two hypotheses to be tested are the focus of consideration: H1: The TAM constructs are independently positively related to dark device use. H2: Sense of social belonging is positively related to dark device use. In this quantitative study, 30 male subjects participated with their dark devices. Using a post-basket exercise, affiliation is manipulated by content items on the website to investigate whether affiliation between computers and people and smartphones and people leads to similar effects as an affiliation between people. The entire scientific study, including the questionnaire, took about 30 minutes. This study contributes to the current literature and draws attention to the fact that male users' terminal devices have an influence in the form of affiliation effects. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=human-computer-interaction" title="human-computer-interaction">human-computer-interaction</a>, <a href="https://publications.waset.org/abstracts/search?q=computers" title=" computers"> computers</a>, <a href="https://publications.waset.org/abstracts/search?q=smartphones" title=" smartphones"> smartphones</a>, <a href="https://publications.waset.org/abstracts/search?q=addiction" title=" addiction"> addiction</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20affiliation%20effects" title=" social affiliation effects"> social affiliation effects</a>, <a href="https://publications.waset.org/abstracts/search?q=TAM%202" title=" TAM 2"> TAM 2</a>, <a href="https://publications.waset.org/abstracts/search?q=pyramid%20of%20needs" title=" pyramid of needs"> pyramid of needs</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20actors" title=" social actors"> social actors</a> </p> <a href="https://publications.waset.org/abstracts/152110/social-affiliation-effects-of-technology-in-2022" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/152110.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">117</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">299</span> Network Connectivity Knowledge Graph Using Dwave Quantum Hybrid Solvers</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nivedha%20Rajaram">Nivedha Rajaram</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Hybrid Quantum solvers have been given prime focus in recent days by computation problem-solving domain industrial applications. D’Wave Quantum Computers are one such paragon of systems built using quantum annealing mechanism. Discrete Quadratic Models is a hybrid quantum computing model class supplied by D’Wave Ocean SDK - a real-time software platform for hybrid quantum solvers. These hybrid quantum computing modellers can be employed to solve classic problems. One such problem that we consider in this paper is finding a network connectivity knowledge hub in a huge network of systems. Using this quantum solver, we try to find out the prime system hub, which acts as a supreme connection point for the set of connected computers in a large network. This paper establishes an innovative problem approach to generate a connectivity system hub plot for a set of systems using DWave ocean SDK hybrid quantum solvers. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=quantum%20computing" title="quantum computing">quantum computing</a>, <a href="https://publications.waset.org/abstracts/search?q=hybrid%20quantum%20solver" title=" hybrid quantum solver"> hybrid quantum solver</a>, <a href="https://publications.waset.org/abstracts/search?q=DWave%20annealing" title=" DWave annealing"> DWave annealing</a>, <a href="https://publications.waset.org/abstracts/search?q=network%20knowledge%20graph" title=" network knowledge graph"> network knowledge graph</a> </p> <a href="https://publications.waset.org/abstracts/150932/network-connectivity-knowledge-graph-using-dwave-quantum-hybrid-solvers" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/150932.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">127</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">298</span> A Design-Based Approach to Developing a Mobile Learning System</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Martina%20Holenko%20Dlab">Martina Holenko Dlab</a>, <a href="https://publications.waset.org/abstracts/search?q=Natasa%20Hoic-Bozic"> Natasa Hoic-Bozic</a>, <a href="https://publications.waset.org/abstracts/search?q=Ivica%20Boticki"> Ivica Boticki</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper presents technologically innovative and scalable mobile learning solution within the SCOLLAm project (“Opening up education through Seamless and COLLAborative mobile learning on tablet computers”). The main research method applied during the development of the SCOLLAm mobile learning system is design-based research. It assumes iterative refinement of the system guided by collaboration between researches and practitioners. Following the identification of requirements, a multiplatform mobile learning system <em>SCOLLAm [in]Form </em>was developed. Several experiments were designed and conducted in the first and second grade of elementary school. <em>SCOLLAm [in]Form system </em>was used to design learning activities for math classes during which students practice calculation. System refinements were based on experience and interaction data gathered during class observations. In addition to implemented improvements, the data were used to outline possible improvements and deficiencies of the system that should be addressed in the next phase of the <em>SCOLLAm [in]Form</em> development. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=adaptation" title="adaptation">adaptation</a>, <a href="https://publications.waset.org/abstracts/search?q=collaborative%20learning" title=" collaborative learning"> collaborative learning</a>, <a href="https://publications.waset.org/abstracts/search?q=educational%20technology" title=" educational technology"> educational technology</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20learning" title=" mobile learning"> mobile learning</a>, <a href="https://publications.waset.org/abstracts/search?q=tablet%20computers" title=" tablet computers"> tablet computers</a> </p> <a href="https://publications.waset.org/abstracts/64887/a-design-based-approach-to-developing-a-mobile-learning-system" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/64887.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">272</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">297</span> Excel-VBA as Modelling Platform for Thermodynamic Optimisation of an R290/R600a Cascade Refrigeration System</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=M.%20M.%20El-Awad">M. M. El-Awad</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The availability of computers and educational software nowadays helps engineering students acquire better understanding of engineering principles and their applications. With these facilities, students can perform sensitivity and optimisation analyses which were not possible in the past by using slide-rules and hand calculators. Standard textbooks in engineering thermodynamics also use software such as Engineering Equation Solver (EES) and Interactive Thermodynamics (IT) for solving calculation-intensive and design problems. Unfortunately, engineering students in most developing countries do not have access to such applications which are protected by intellectual-property rights. This paper shows how Microsoft ExcelTM and VBA (Visual Basic for Applications), which are normally distributed with personal computers and laptops, can be used as an alternative modelling platform for thermodynamic analyses and optimisation. The paper describes the VBA user-defined-functions developed for determining the refrigerants properties with Excel. For illustration, the combination is used to model and optimise the intermediate temperature for a propane/iso-butane cascade refrigeration system. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=thermodynamic%20optimisation" title="thermodynamic optimisation">thermodynamic optimisation</a>, <a href="https://publications.waset.org/abstracts/search?q=engineering%20education" title=" engineering education"> engineering education</a>, <a href="https://publications.waset.org/abstracts/search?q=excel" title=" excel"> excel</a>, <a href="https://publications.waset.org/abstracts/search?q=VBA" title=" VBA"> VBA</a>, <a href="https://publications.waset.org/abstracts/search?q=cascade%20refrigeration%20system" title=" cascade refrigeration system"> cascade refrigeration system</a> </p> <a href="https://publications.waset.org/abstracts/4046/excel-vba-as-modelling-platform-for-thermodynamic-optimisation-of-an-r290r600a-cascade-refrigeration-system" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/4046.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">435</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">‹</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=computers&page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=computers&page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=computers&page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=computers&page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=computers&page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=computers&page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=computers&page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=computers&page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=computers&page=10">10</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=computers&page=11">11</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=computers&page=2" rel="next">›</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>