Volume 5, Issue 1

Impact Assessment of Information and Communication Technologies on Lesson Delivery and Students’ Performance in Selected Tertiary Institutions in Ghana
Original Research
Information and Communication Technology has been part of Ghana’s education system since 1995. However, despite the huge economic investments in providing computer infrastructure, rigorous assessment of the impacts of its integration in lesson delivery and academic performance of students has not been carried out to be able to judge its effectiveness and challenges in its usage that requires improvement(s). This assessment is even more crucial in higher institutions of learning where students are instructed in Information and Communication Technology to utilize them for the world of work. A concurrent triangulation design of the mixed method research design was used to examine the impacts of the integration of Information and Communication Technology on lesson delivery and student performance. A descriptive study method with interviews, questionnaire and observations as instruments were used in generating data from a random and a stratified random sample of 496 respondents from four tertiary institutions in Ghana. The quantitative data were analyzed using the Statistical Package for Social Scientists software while the qualitative data was analyzed via thematic analysis. The findings from the study revealed that Information and Communication Technology has impacted favourably on the lesson delivery of lecturers and students’ learning outcomes in the areas of research, easy dissemination of information and assessment procedures. The study contends that to enhance the integration of Information and Communication Technology in the lesson delivery of lecturers and the academic performances of students, educational policies must be changed to factor in modern technological advancement to groom students with requisite skills to fit into the job market while professional technological training must be periodically organized for instructors to hone their skills to deliver effectively.
antepsin til hest egeneriskopskrift.site antepsin endikasyon
Journal of Computer Sciences and Applications. 2017, 5(1), 29-41. DOI: 10.12691/jcsa-5-1-5
Pub. Date: May 20, 2017
14822 Views2660 Downloads4 Likes
Data Offloading Security Framework in MCLOUD
Original Research
With the popularity of smartphones and upsurge of mobile applications, mobile devices have become prevalent computing platform. Although MCLOUD paradigm solves the problem of limited resources constraint of mobile system and unavailability of internet, through several offloading technique. Nevertheless, mobile users are still reluctant to adopt this paradigm, due to security concerns of their data. This research provided security on the users task and still minimize the total computational time of the MCLOUD. Tasks were programmatically broken down into smaller tasks and encrypted using homomorphic encryption system and assigned to slave devices which were admitted into the MCLOUD during the resort point process through the WIFI Direct wireless network. Using a test bed of three (3) smartphone devices, several task sizes ranging from 2KB, 4KB up to 20KB were used to test the implemented security framework and the time taken to complete computation of each task size is recorded for both MCLOUD and standalone architecture, the total execution time was compared and findings shows that computation involving security on MCLOUD takes less time compared to computation on standalone devices, the following readings were recorded. For the 4KB task size, MCLOUD spent 48500microseconds while standalone spent 241000microseconds; for the 6KB task size, MCLOUD spent 99500microseconds while standalone spent 453000microseconds; whereas in the 8KB task size, MCLOUD spent 109500microseconds while standalone spent 553000microseconds,which is approximately five (5) times faster than standalone execution. MCLOUD framework was observed to have a lower computation time, decreasing computational time ratio, higher throughput per seconds, It was discovered that computation on distributed encrypted data (MCLOUD) using homomorphic encryption is safer and faster than standalone single device computation.
Journal of Computer Sciences and Applications. 2017, 5(1), 25-28. DOI: 10.12691/jcsa-5-1-4
Pub. Date: April 18, 2017
13715 Views3140 Downloads
Data Warehouse Signature: A Framework for Implementing Security Issues in Data Warehouses
Original Research
Today, with the increase in the number of business web application users, the data size is obviously getting quiet huge. This data is composed together from integrated heterogeneous data sources to form Data Warehouse (DW). DW consists of critical and sensitive data used in many intelligent business models for decision support processes. Therefore, retaining data security for DW systems is a very important issue for researchers; also, it is the first priority for organizations. The current paper presents a new framework for implementing security issues in DWs named Data Warehouse Signature (DWS). The DWS framework ensures the security issues, which are Confidentiality, Integrity and Availability (CIA). In fact, this approach solves the security problems such as network overhead and data changing that occurs during transmission on Client-Server basis. The DWS approach achieves high performance by using parallel computing through a middleware named View Manager Layer (VML). Finally, this paper also presents the elastic architecture of the DWS framework with a vast applicability in multiple DW organizations depending on its network infrastructure.
Journal of Computer Sciences and Applications. 2017, 5(1), 17-24. DOI: 10.12691/jcsa-5-1-3
Pub. Date: April 17, 2017
11938 Views3799 Downloads1 Likes
Proposing New Intelligence Algorithm for Suggesting Better Services to Cloud Users Based on Kalman Filtering
Original Research
Because of intrinsic characteristic of cloud computing, which made organizations and companies free from buying hardware and software infrastructures, lots of companies and industries decided to migrate to this network to be able to save more monies. For persuading organizations and institutes, about this facts of cloud computing, that in such network, cloud providers can address all of the user’s needs, authors of this paper wants to propose and demonstrate new intelligence algorithm which is capable for smart servicing of the needs of users and also suggesting them more related software’s and applications. The proposed algorithm is based on Kalman filtering and will use the log file of users and interests of them in different software’s. Our proposed algorithm will use backgrounds information and present needs of users to estimate and predict the best software and applications to suggest them.
Journal of Computer Sciences and Applications. 2017, 5(1), 11-16. DOI: 10.12691/jcsa-5-1-2
Pub. Date: March 18, 2017
8662 Views1718 Downloads1 Likes
An Introduction to Various Algorithms for Video Completion and Their Features: A Survey
Original Research
Completion or inpainting is applied in order to reconstruct the hurted images and video frames. This study proposes a survey on algorithms which complete corrupted objects (mainly humans) in video frames. Firstly, image inpainting is proposed as a mathematical problem and then it is extended into video completion problem. In the following, different types of video completion methods that are based on different types of video contents and the status of the background, foreground and camera movement is introduced. According to the method of the completion or the idea of considering the frame as one distinct object or considering it as a set of some fundamentals, there are several approaches to inpaint the video. Each video completion type is surveyed with the help of several studies about that.
Journal of Computer Sciences and Applications. 2017, 5(1), 1-10. DOI: 10.12691/jcsa-5-1-1
Pub. Date: January 22, 2017
14743 Views2792 Downloads