A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Asafe, Yekini Nureni
- Learning Experiences and Performance Evaluation of Engineering Students' in Mathematics Using Hybrid Blended Learning System (HBLS) via Social Media Networks
Authors
1 Dept of Computer Engineering, Lagos State Polytechnic, Ikorodu, NG
2 Dept of Computer Science, Yaba College of Technology, NG
3 Dept of Computer Engineering, Yaba College of Technology, NG
4 Dept of Mathematics, Yaba College of Technology, NG
Source
International Journal of Advanced Networking and Applications, Vol 8, No 5 (2017), Pagination: 3169-3174Abstract
This paper gives the report of the experimental set-up to evaluate the effectiveness of Hybrid blended learning system (HBLS) in teaching mathematics among engineering students in Nigeria. A total of 1197 students was sampled. We first conducted and investigative research with questionnaire to assess the student's readiness to use of social medias networks. We discovered that 93% (1113) of the sampled population has internet enable mobile phone and they make use of facebook or WhatsApp account at least 5hrs in a week. We use both face-to-face method in the physical classroom while virtual classroom was created in facebook and WhatsApp where course content is delivered before physical class, also for after physical classroom interactions among the students and lecturers. Another questionnaire was given to the sample population to assess their learning experiences after which the exams was given to evaluate the students' performance. Exam result was compared with previous result where teaching was done through face to face method. It was discovered that about 89% (1065) of sample population had 50 and above in the collated result which is sharply defer when compared with the previous semester where only face-to-face method was adopted.Keywords
Blended Learning System, Hybrid Blended Learning System, Engineering Students, Facebook, Faceto-Face, Physical Classroom, Whatsapp, Virtual Classroom.References
- ] Horn, Michael B and Staker, Heather; INNOSIGHT INSTITUTE; The Rise of K-12 Blended Learning; January 2011; available at http://www. innosightinstitute.org/mediaroom/ publications/education-publications/theriseof-k-12-blended-learning/ retrieved July 2016.
- ] Watson, John; Evergreen Consulting Associates; Blended Learning: The Convergence of Online and Face-to-Face Education for iNACOL; available at http://www.inacol.org/research/promisingpracti ces/NACOL_PP-BlendedLearning-lr.pdf.retrieved august, 2015.
- ] Mary Bart (n.d) The Benefits of Blended Learning. Trends in Higher Education. Available
- ] Vander Ark, Tom; Getting Smart; Blended Learning Can Improve Working Conditions, Teaching & Learning; June 29, 2012; available at http://gettingsmart.com/blog/2012/06/blendedlearningcan-improve-working-conditionsteachinglearning/ retrieved November 2016
- ] Boyd, D. & Ellison, M. (2007). “Social networking sites: definition, history and scholarship” retrieved December 16, 2016 from http://jcmcindiana;edu/vol13/issue//boyd.ellison .html.
- ] Joanna Poon, 2013. Blended Learning: An Institutional Approach for Enhancing Students' Learning Experiences. MERLOT Journal of Online Learning and Teaching, Vol. 9, No. 2, June 2013 at:https://hilo.hawaii.edu/academics/dl/documents/ BenefitsofBlended.pdf retrieved January 8, 2017
- ] BalrajKistow (2011). Blended learning in higher education: A study of a graduate school of business, Trinidad and Tobago. Caribbean Teaching Scholar Vol. 1, No. 2, November 2011, 115–128, available
- http://citeseerx.ist.psu.edu/viewdoc/download?d oi=10.1.1.837.7765&rep=rep1&type=pdf.Retrieved January 6, 2016.
- ] Next Generation Learning: The Intelligent Use of Technology to Develop Innovative Learning Models and Personalized Education Pathways. Copyright 2010 Bill & Melinda Gates Foundation gatesfoundation.org available at gatesfoundation.org retrieved October, 2016
- ] Christopher Pappas (2015). Advantages and Disadvantages of Blended Learning In Corporate Training. AVAILBLE AT HTTP:/ Https://Elearningindustry.Com/BlendedLearning-Advantages-And-Disadvantages-InCorporate-Training. Retrieved January 5, 2017.
- ] Jeff Seaman, & Hester Tinti-Kane (2013). SOCIAL MEDIA FOR TEACHING AND LEARNING; Pearson Learning Solutions and the Babson Survey Research Group.
- Networking CCTV Cameras and Passive Infra-Red Sensors for E-classroom Monitoring System:Proactive Approach to Quality Assurance in Education System
Authors
1 Computer Engineering’ Dept., Yaba College of Technology, Yaba, Lagos, NG
2 Computer Science’ Dept., Yaba College of Technology, Yaba, Lagos, NG
3 Computer Engineering Dept., Lagos State Polytechnic, Ikorodu, NG
Source
International Journal of Advanced Networking and Applications, Vol 8, No 5 (2017), Pagination: 3213-3219Abstract
Quality assurance in education system is paramount to the global sustainable development, therefore conventional surveillance systems that use cameras and process large amounts of data to extract features from a classroom environment may be essential. This work presents the design and implementation of automated classroom monitoring and security system with CCTV cameras and PIR sensors to monitor student's behavior and observe teacher performance during classroom activities. An active central control system and PIR sensors was designed. CCTV cameral, DVD system, and PIR sensors were networked to implementing the e-monitoring system. The control system supply power to both cameras and PIR sensor. The PIR sensors senses the movement within the monitoring area, and then activate the cameras, then the DVD system start recording the activities for online or offline view by human agent.
Keywords
CCTV, PIR Sensors, Student’s Behavior, Teacher’s Performance, Quality Assurance.References
- ] Yekini, 2014: Effective policing of students against cultism in Nigeria higher institutions of learning: A case of Yaba College of Technology: Available at http: engryekini.org; retrieved Sept. 30, 2015.
- ] Franck L., "Encryption and Cryptosystems in Electronic Surveillance: A Survey of the Technology Assessment Issues", 2001
- ] Jadhav Gauri J. & Raisoni G. H. “International Journal of Engineering Research and General Science” Volume 2, Issue 6, ISSN 2091-2730 October-November, 2014
- ] Wolf P. R. and Dewitt B. A., “Elements of Photogrammetry with Applications in GIS”, 3rd ed. New York: McGraw Hill, 2000.
- ] Keifer E. L., cctv surveillance available at http://ipvideomarket.info/report/cctvsurveillance retrieved July 18, 2016.
- ] Walker M., "Electronic Security Systems", University Press, Cambridge UK, 2008, pp 66-75.
- ] Tony A. M., (2011) “IP camera: advantages”, available at http://en.wikipedia.org/wiki/IPcamera.htm retrieved August 21, 2016.
- ] Mukesh Kumar Thakur, Ravi Shankar Kumar, Mohit Kumar, Raju Kumar, “Wireless Fingerprint Based Security System Using ZigBee Technology”.
- Design and Implementation of Mobile Map Application for Finding Shortest Direction between Two Pair Locations Using Shortest Path Algorithm: A Case Study
Authors
1 Department of Computer Technology, Yaba College of Technology, Yaba, NG
2 Department of Computer Engineering, Yaba College of Technology, Yaba, NG
Source
International Journal of Advanced Networking and Applications, Vol 9, No 1 (2017), Pagination: 3300-3305Abstract
The shortest path problem is an approach towards finding the shortest and quickest path or route from a starting point to a final destination, four major algorithms are peculiar to solving the shortest path problem. The algorithms include Dijkstra's Algorithm, Floyd-Warshall Algorithm, Bellman-Ford Algorithm and Alternative Path Algorithm. This research work is focused on the design of mobile map application for finding the shortest route from one location to another within Yaba College of Technology and its environ. The design was focused on Dijkstra's algorithm that source node as a first permanent node, and assign it 0 cost and check all neighbor nodes from the previous permanent node and calculate the cumulative cost of each neighbor nodes and make them temporary, then chooses the node with the smallest cumulative cost, and make it as a permanent node. The different nodes that lead to a particular destination were identified, the distance and time from a source to a destination is calculated using the Google map. The application then recommends the shortest and quickest route to the destination.Keywords
Map, Mobile Map, Dijkstra’s Algorithm, Floyd-Warshall Algorithm, Bellman-Ford Algorithm, Alternative Path Algorithm, Shortest Path Problem.References
- ] Mojo H., (2016). Graph theory. Available at www.en.m.wikipedia.org/wiki/Graph_Theoy. Retrieved 9th August 2016.
- ] Map of India (n.d) what is map? available at http://www.mapsofindia.com/what-is-map.html. Retrieved on December 25th, 2016.
- ] Merriam W., (2016). Definition of Graph. Available at www.merriam-webster.com/Dictionary/graph. retrieved 13th July, 2016.
- ] Jaehyun, P. (2015), Basic Graph Algorithms. CS 97SI. Stanford University.
- ] Amanda B., (2016). Types of maps. Available at www.thoughtco.com/types of maps. retrieved 19th august 2016.
- ] Al-Tameemi, H.L.H., (2014). Using Dijkstra Algorithm in Calculating AlternativeShortest Paths for Public Transportation with Transfersand Walking. Ankara.
- ] Kairanbay, M., &Hajar, M.J., (2013). A Review and Evaluations of Shortest Path Algorithms. International Journal of Scientific and Technology Research, Vol 2, 99-101.
- ] Holger, B., Stefan, F., Peter, S., Dominik, S., &Domagoj, M., (2010). Transit Ultrafast Shortest-Path Queries with Linear-time Preprocessing. Germany.
- ] Avdhesh, K.S., & Sourabh, K., (2013). Finding of Shortest Path from Source to Destination by traversing every Node in wired Network International Journal of Engineering and Technology, Vol 5, 2655-2656.
- ] Hyun J.L., & Soo D.K., (2010). A service-based approach to developing Android Mobile Internet Device (MID) applications. Service-Oriented Computing and Applications.
- Deterring Sybil Attack in Online Communication System via Peer-To-Peer Audio Visual Communication System
Authors
1 Dept of Computer Engineering, Yaba College of Technology, NG
2 Dept of Computer Technology, Yaba College of Technology, NG
Source
International Journal of Advanced Networking and Applications, Vol 9, No 1 (2017), Pagination: 3335-3337Abstract
In recent time the use of communication gadgets (mobile phones, laptop, desktop etc.) and service for online communication between two parties over a long distance has become sine-qua-non. Some criminal minded people are using this online communication method to deceive their prey via proxy communication where individual claiming to be discussing is not really the one. In this paper, we focus on prevention of identity impersonation attacks in an Online Communication System. Peer-peer Audio Visual Communication System is design to enhance security through online communication system by revealing the identity of the communicators and records the communication if necessary. Embedded application system was design for mobile and desktop devices for audio visual charting using modern IT devices.Keywords
Audio Visual Communication System, Online Communication, Sybil Attacks.References
- ] Wang, Liang; Kangasharju, Jussi (2012). "Real-world sybil attacks in BitTorrent mainline DHT". IEEE GLOBECOM. Retrieved 30 September 2013.
- ] Wang, Liang; Kangasharju, Jussi (2013). "Measuring Large-Scale Distributed Systems: Case of BitTorrent Mainline DHT" (PDF). IEEE Peer-to-Peer. Retrieved 30 September 2013.
- ] Yekini N. Nureni, Aigbokhan E. Edwin, Akinwole A. Kikelomo, Alakiri O. Harrison 2016: E‐Infrastructure and E‐Services Security Platform Using Multifactor Cybercrime Deterrent System: A Conceptual Model iSTEAMS Multidisciplinary Cross-Border Conference Accra Ghana 2016
- ] Graf, F. (2002), Providing security for eLearning. Computer & Graphics, 26(2), 355-365.
- ] Weippl, E., & Ebner, M. (2008). Security privacy challenges in e-learning 2.0. In World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education (Vol. 2008, No. 1, pp. 4001-4007).
- ] Dietinger, T. (2003). Aspects of e-learning environments (Unpublished doctoral thesis). Institute for Information Processing and Computer Supported New Media (IICM), Graz University of Technology, Austria.
- Spreading Trade Union Activities through Cyberspace:A Case Study
Authors
1 Department of Computer Engineering, Yaba College of Technology, NG
2 Department of Computer Technology, Yaba College of Technology, NG
3 Department of Printing Technology, Yaba College of Technology, NG
Source
International Journal of Advanced Networking and Applications, Vol 10, No 1 (2018), Pagination: 3692-3697Abstract
This report present the outcome of an investigative research conducted to examine the modu-operandi of academic staff union of polytechnics (ASUP) YabaTech. The investigation covered the logistics and cost implication for spreading union activities among members. It was discovered that cost of management and dissemination of information to members was at high side, also logistics problem constitutes to loss of information in transit hence cut away some members from union activities. To curtail the problem identified, we proposed the design of secure and dynamic website for spreading union activities among members and public. The proposed system was implemented using HTML5 technology, interface frameworks like Bootstrap and jquery which enables the responsive feature of the application interface. The backend was designed using PHP MYSQL. It was discovered from the evaluation of the new system that cost of managing information has reduced considerably, and logistic problems identified in the old system has become a forgotten issue.Keywords
ASUP, Cyberspace, Dynamic Website, MySQL, Unionism, PHP, Macromedia-Flash, Trade Union.References
- ASUP, 2015. Article 2. Objectives of the Union. Constitution and Code of Conduct of Academic Staff Union of Polytechnics.
- Ayba P. Waba (2018). Nigeria Labor Congress (NLC) History. Available at http://www.nlcng.org/# retrieved 20th April, 2018.
- Economy of Nigeria (2013). Labor U.S. Library of Congress available http://countrystudies.us/nigeria/56.htm. Retrieved on March, 25th 2018.
- Enwikipedia (n.d) Trade union available at https://en.wikipedia.org/wiki/Trade_union.
- Introduction to trade unions indirect. Available at https://www.nidirect.gov.uk/articles/introduction-trade-unions.
- Nibussinessinfo 2014. The role of trade unions and their representatives available at https://www.nibusinessinfo.co.uk/content/role-tradeunionsand-their-representatives. Retrieved February 18th, 2018.
- Cybernetic Communication Roles in Managing Corona Virus Pandemic Risk:Nigeria Case
Authors
1 Department of Computer Engineering, Yaba College of Technology, NG
2 Department of Computer Science, Yaba College of Technology, NG
Source
International Journal of Advanced Networking and Applications, Vol 11, No 6 (2020), Pagination: 4468-4474Abstract
Computer and Internet-Based Communication Technologies aka Cybernetic Communication play important role in communication over a distance. This work gauged uses of cybernetic communication as major means of communication during COVID-19 outbreak based on measured (Social Distance, Self-Quarantine, Isolation, Lockdown) put in place by the government to curtail spreading of the disease in Nigeria. Data were randomly collected through online publication, newsprints, and telephone calls from 290 sampled population. Data Collected were discussed and analyses using Pie chart, Percentile, and Histogram as statistical tools. Findings shows that Cybernetic communication play major role to bridge the communication gaps between the Nigerian people during the outbreak of the Covid-19 outbreak as majority of Nigerians spent more hours using cybernetic tools to communicate and more money was spent on airtime and data to keep their mobile phone running during the trying period of COVID-19 rash. Majority of the sampled population spent their useful time on social medial as in Facebook, whattsapp, Instagram, YouTube and for social interactions and meetings. The implications of our findings are: majority of Nigeria may have computer linked diseases or syndrome such Sleeping Problems and others due to prolong uses of computers; the cybernetic tools (mobile phones, computer, laptop etc.) used by the infected people may be a carrier of the symptoms in the nearest future; Nigerians spent more on data and airtime credit in this trying period and it may affect their financial economy later. This work ends with proposal for roles to be played by Nigeria government and other stakeholders in cybernetic sustained communication processes for pandemic response and to prevent future outbreak of covid-19 after overcoming recent happenings, and also recommended organization strategy for workforce continuity and recovery.Keywords
COVID-19, Cybernetic Communication, Digital Communication, Nigeria, E-readiness, Social Distancing, Self-Quarantine, and Isolation, Virtual Office Work.References
- ] Lam, Tommy Tsan-Yuk; Shum, Marcus Ho-Hin; Zhu, Hua-Chen; Tong, Yi-Gang; Ni, Xue-Bing; Liao, Yun-Shi; Wei, Wei; Cheung, William YiuMan; Li, Wen-Juan; Li, Lian-Feng; Leung, Gabriel M.; Holmes, Edward C.; Hu, Yan-Ling; Guan, Yi (26 March 2020). "Identifying SARSCoV2 related coronaviruses in Malayan pangolins". Nature. doi:10.1038/s41586-0202169-0. PMID 32218527. Retrieved 5th April 2020.
- ] WHO–China Joint Mission (16–24 February 2020). "Report of the WHO-China Joint Mission on Coronavirus Disease 2019 (COVID19)" (PDF). World Health Organization. Retrieved 8 March 2020.
- ] Shao, Peng (17 March 2020). "Impact of city and residential unit lockdowns on prevention and control of COVID-19". MedRxiv: 2020.03.13.20035253. doi:10.1101/2020.03.13.2 0035253.
- ] Scmp News (2020). Shanghai neighbor Zhejiang imposes draconian quarantine". South China Morning Post. 6 February 2020. Archivedfrom the original on 6 February 2020. Retrieved 10 April 2020.
- ] Marsh, Sarah (23 February 2020). "Four cruise ship passengers test positive in UK—as it happened". The Guardian. ISSN 0261-3077. Retrieved 22 April 2020.
- ] NCDC (2020) available at https://ncdc.gov.ng/news/227/ first-case-ofcoronavirus-disease-confirmed-in-Nigeria retrieved April 1, 2020.
- ] NCDC (4th May 2020), Nigeria’s COVID-19 Situation Report. Report 65. Available at. Covid19.ncdc.gov.ng/. Retrieved 4th May 2020.
- ] Divine Paredes (February 202). ICT deepens role in pandemic response planning available at retrieved April 1st 2020. https://www.cio.com/article/3526590/ictdeepensrole-in-pandemic-responseplanning.html
- ] Ben S Cooper, Richard J Pitman, W. John Edmunds, Nigel J Gay Delaying the International Spread of Pandemic Influenza Published: May 2, 2006 available at https://doi.org/10.1371/journal.pmed.0030212
- ] Muhammad. Adnan, Shereenab, Suliman, Khana. AbeerKazmic, Nadia. Bashira, Rabeea. Siddiquea, (2020). COVID-19 infection: Origin, transmission, and characteristics of human coronaviruses. Journal of Advanced ResearchVolume 24, Pages 91-98
- ] Jacinta, Bowler. 30 March 2020. The COVID-19 Virus May Have Been in Humans For Years, Study Suggests. Available at https://www.sciencealert.com/the-newcoronaviruscould-have-been-percolatinginnocentlyin-humans-for-years
- ] Shigui, Ruan. (March 2020). Likelihood of survival of coronavirus disease 2019 available at https://www.thelancet.com/journals/laninf/article/ PIIS1473-3099 (20)3025.