The Effectiveness of Smart Learning Based on Expert Systems in Cryptography Courses

Mochammad Iswan, M. Syaifuddin, Rian Farta Wijaya
{"title":"The Effectiveness of Smart Learning Based on Expert Systems in Cryptography Courses","authors":"Mochammad Iswan, M. Syaifuddin, Rian Farta Wijaya","doi":"10.36378/jtos.v4i2.1795","DOIUrl":null,"url":null,"abstract":"The development of science and technology requires universities not only to matter but also to have abilities in their respective fields including Security System. The unavailability of network design laboratory and its minimum, network design, cryptography design and flexibility of face-to-face time in the discussion of material compiled not in accordance with the competencies in this course. To overcome these deficiencies in learning activities, development of a project-based blended learning model is carried out. The development carried out in this study uses the Puslitjaknov development model which reduces the Borg and Gall stages to five stages namely product analysis, initial product design, expert validation and revision, field trials and implementation. Data were collected by interview, observation, questionnaire and test. Data were analyzed using quantitative and qualitative methods to produce research products in the form of books, modules, learning plans and manuals for the use of learning applications. Product validation by experts, practicality tests carried out by users and effectiveness tests with student learning outcomes. Based on the results of data analysis, the results of this study are: 1) Research has successfully developed a project-based blended learning model in Cryptography courses. 2) The developed learning model syntax consists of 9 stages / syntax. 3) In supporting learning activities, modules, RPS and manuals are used for learning applications. All products and models developed have been developed and are categorized as valid, practical and effective.","PeriodicalId":114474,"journal":{"name":"JURNAL TEKNOLOGI DAN OPEN SOURCE","volume":"50 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"JURNAL TEKNOLOGI DAN OPEN SOURCE","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.36378/jtos.v4i2.1795","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

The development of science and technology requires universities not only to matter but also to have abilities in their respective fields including Security System. The unavailability of network design laboratory and its minimum, network design, cryptography design and flexibility of face-to-face time in the discussion of material compiled not in accordance with the competencies in this course. To overcome these deficiencies in learning activities, development of a project-based blended learning model is carried out. The development carried out in this study uses the Puslitjaknov development model which reduces the Borg and Gall stages to five stages namely product analysis, initial product design, expert validation and revision, field trials and implementation. Data were collected by interview, observation, questionnaire and test. Data were analyzed using quantitative and qualitative methods to produce research products in the form of books, modules, learning plans and manuals for the use of learning applications. Product validation by experts, practicality tests carried out by users and effectiveness tests with student learning outcomes. Based on the results of data analysis, the results of this study are: 1) Research has successfully developed a project-based blended learning model in Cryptography courses. 2) The developed learning model syntax consists of 9 stages / syntax. 3) In supporting learning activities, modules, RPS and manuals are used for learning applications. All products and models developed have been developed and are categorized as valid, practical and effective.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于专家系统的智能学习在密码学课程中的有效性
科学技术的发展要求大学不仅要有影响力,而且要在包括安全系统在内的各自领域拥有能力。网络设计实验室的不可用性及其最小值、网络设计、密码学设计和面对面讨论材料的灵活性不符合本课程的能力。为了克服学习活动中的这些不足,本文开发了一种基于项目的混合学习模式。在本研究中进行的开发使用Puslitjaknov开发模型,该模型将Borg和Gall阶段减少到五个阶段,即产品分析,初始产品设计,专家验证和修订,现场试验和实施。采用访谈、观察、问卷调查、测试等方法收集资料。使用定量和定性方法分析数据,以书籍、模块、学习计划和手册的形式产生研究产品,以供学习应用程序使用。由专家对产品进行验证,由用户进行实用性测试,并对学生的学习成果进行有效性测试。根据数据分析的结果,本研究的结果是:1)研究成功开发了一种基于项目的密码学课程混合学习模式。2)开发的学习模型语法由9个阶段/语法组成。3)在支持学习活动方面,使用模块、RPS和手册进行学习应用。所有开发的产品和模型都已开发,并被归类为有效,实用和有效。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
The Relationship Between Age, Parity, Ideal Weight, and Blood Pressure in Diagnosing Hypertension in Pregnant Women Using The K-Means Algorithm Management Information System Web Based Visitor Data Center on PT. Media Nusantara Citra. Tbk (MNC Media) Implementation of The Information Service Application Portal for Registration of Prospective Santri and Recording of School Activities Using The Extreme Programming Method Application of the Scrum Method in the Android-based TPQ Learning Application Student Identification Based on Patterns of Association For Student Misbehaviour Using Frequent Pattern Growth Algorithms
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1