Pub Date : 2023-05-22DOI: 10.3991/ijim.v17i10.38787
Farah Tawfiq Abd El Hussien, T. Khairi
I n these days of technology, the usage of images has become increasingly high especially now that almost everyone has access to internet. Also, image helps us to learn, grabs our attention, explains complicated concepts as well as inspires us. Sharing these images is essential and therefore image encryption algorithms are proposed to secure the transmission of these image from many types of attacks such as Man-in-the-middle attack (MITM). In this paper, we proposed a hybrid security system that consist of Elliptic Curve Cryptography (ECC) and Advanced Encryption System (AES). Where ECC is used to generate private/public keys and AES is for encryption and decryption of the image using the ECC generated keys. The system works as follows; it begins by inserting the image to be encrypted which is “lena.png” of size 256*256 and passing it to AES Algorithm along with the generated public key. Then, in AES algorithm, the public key is hashed then used to encrypt the image with AES encryption algorithm. On the other hand, the decryption algorithm works as follows; inserting the encrypted image then calculating the decryption key to use it to decrypt the image using AES decryption algorithm. Finally, our experimental results shows that the National Institute of Standards and Technology (NIST) test shows that the ECC generated keys have better randomness than using only AES generated keys. Also, the encrypted image histogram show that the image pixels values are well distributed across all three channels R, G and B. This shows that the hybrid system is a step further to get a more secure image encryption system against attacks with the generated ECC keys. To get further, Logistic chaotic map has been used to encrypt images for comparison purposes with AES and ECC generated images in terms of randomness, security and histogram
{"title":"Performance Evaluation of AES, ECC and Logistic Chaotic Map Algorithms in Image Encryption","authors":"Farah Tawfiq Abd El Hussien, T. Khairi","doi":"10.3991/ijim.v17i10.38787","DOIUrl":"https://doi.org/10.3991/ijim.v17i10.38787","url":null,"abstract":"I \u0000n these days of technology, the usage of images has become increasingly high especially now that almost everyone has access to internet. Also, image helps us to learn, grabs our attention, explains complicated concepts as well as inspires us. Sharing these images is essential and therefore image encryption algorithms are proposed to secure the transmission of these image from many types of attacks such as Man-in-the-middle attack (MITM). In this paper, we proposed a hybrid security system that consist of Elliptic Curve Cryptography (ECC) and Advanced Encryption System (AES). Where ECC is used to generate private/public keys and AES is for encryption and decryption of the image using the ECC generated keys. The system works as follows; it begins by inserting the image to be encrypted which is “lena.png” of size 256*256 and passing it to AES Algorithm along with the generated public key. Then, in AES algorithm, the public key is hashed then used to encrypt the image with AES encryption algorithm. On the other hand, the decryption algorithm works as follows; inserting the encrypted image then calculating the decryption key to use it to decrypt the image using AES decryption algorithm. Finally, our experimental results shows that the National Institute of Standards and Technology (NIST) test shows that the ECC generated keys have better randomness than using only AES generated keys. Also, the encrypted image histogram show that the image pixels values are well distributed across all three channels R, G and B. This shows that the hybrid system is a step further to get a more secure image encryption system against attacks with the generated ECC keys. To get further, Logistic chaotic map has been used to encrypt images for comparison purposes with AES and ECC generated images in terms of randomness, security and histogram","PeriodicalId":13648,"journal":{"name":"Int. J. Interact. Mob. Technol.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87206961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-05-22DOI: 10.3991/ijim.v17i10.38417
J. Byrne
Learner analytic driven research concerned with mobile app learner survivability. An app was developed to indicate productiveness of quiz app usage for global mobile assisted language learning (MALL). The research focused on inhibiting and optimizing effects of level length on total questions answered. How many questions per level leads to the highest total unique questions being answered? The research focused on nine-day cohort timeframes and included three phases: a small-scale pilot study to establish parameters, an exploratory stage undertaken within the parameters and finally the use of a quadratic regression predictive model. The null hypothesis (H0) was rejected. A one-way analysis of variance found a statistically significant difference in the mean productivity of the lengths. Results of a Tukey post hoc test (p < .05) suggests question sets with less than eight questions, or more than 15 questions, appear to inhibit MALL autonomous learning. Optimal level question sets appear to be between lengths 8-14. The results visually encapsulated by a quadratic regression model broadly support H1 and H2. Set 12 is the statistically most significant optimal load. Gains of up to 107% are reported for switching from suboptimal to optimal approaches.
{"title":"Determinant of Optimal and Inhibited Mobile Language Learning Activity: Quiz Level Length","authors":"J. Byrne","doi":"10.3991/ijim.v17i10.38417","DOIUrl":"https://doi.org/10.3991/ijim.v17i10.38417","url":null,"abstract":"Learner analytic driven research concerned with mobile app learner survivability. An app was developed to indicate productiveness of quiz app usage for global mobile assisted language learning (MALL). The research focused on inhibiting and optimizing effects of level length on total questions answered. How many questions per level leads to the highest total unique questions being answered? The research focused on nine-day cohort timeframes and included three phases: a small-scale pilot study to establish parameters, an exploratory stage undertaken within the parameters and finally the use of a quadratic regression predictive model. The null hypothesis (H0) was rejected. A one-way analysis of variance found a statistically significant difference in the mean productivity of the lengths. Results of a Tukey post hoc test (p < .05) suggests question sets with less than eight questions, or more than 15 questions, appear to inhibit MALL autonomous learning. Optimal level question sets appear to be between lengths 8-14. The results visually encapsulated by a quadratic regression model broadly support H1 and H2. Set 12 is the statistically most significant optimal load. Gains of up to 107% are reported for switching from suboptimal to optimal approaches.","PeriodicalId":13648,"journal":{"name":"Int. J. Interact. Mob. Technol.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78731576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-05-22DOI: 10.3991/ijim.v17i10.38253
R. Amelia, Zamzani, A. Mustadi, A. Ghufron, Ahmad Suriansyah, Aslamiah
After the implementation of the school closure policy, parents are acclimating to studying with their children due to the effects of COVID-19 pandemic. Therefore, this study thoroughly discusses the involvement of parents in a child’s digital education, especially the experience of the mothers with elementary school students. The survey approach and qualitative methods are used to obtain 277 respondents from the population of parents in Berau, Indonesia. Structural Equation Modeling (SEM) and Partial Least Square (PLS) are the data analysis technique used with the help of SmartPLS software version 3. The results shows that the direction of the relationship between the use of gadgets and maternal involvement is positive, hence the hypothesis decision is accepted. The digital learning of children includes letter and number recognition, reading, learning to count, coloring, drawing, playing educational games, and studying. Some of the mothers’ involvement includes explaining websites accessible by children to communicate politely on social media. These results are valuable insights for parents in providing involvement in digital learning for elementary school students.
{"title":"Parental Involvement in Digital Learning: Mother's Experiences of Elementary School Students","authors":"R. Amelia, Zamzani, A. Mustadi, A. Ghufron, Ahmad Suriansyah, Aslamiah","doi":"10.3991/ijim.v17i10.38253","DOIUrl":"https://doi.org/10.3991/ijim.v17i10.38253","url":null,"abstract":"\u0000After the implementation of the school closure policy, parents are acclimating to studying with their children due to the effects of COVID-19 pandemic. Therefore, this study thoroughly discusses the involvement of parents in a child’s digital education, especially the experience of the mothers with elementary school students. The survey approach and qualitative methods are used to obtain 277 respondents from the population of parents in Berau, Indonesia. Structural Equation Modeling (SEM) and Partial Least Square (PLS) are the data analysis technique used with the help of SmartPLS software version 3. The results shows that the direction of the relationship between the use of gadgets and maternal involvement is positive, hence the hypothesis decision is accepted. The digital learning of children includes letter and number recognition, reading, learning to count, coloring, drawing, playing educational games, and studying. Some of the mothers’ involvement includes explaining websites accessible by children to communicate politely on social media. These results are valuable insights for parents in providing involvement in digital learning for elementary school students. \u0000","PeriodicalId":13648,"journal":{"name":"Int. J. Interact. Mob. Technol.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84910152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-05-22DOI: 10.3991/ijim.v17i10.38891
Chaimaa Bouaine, F. Benabbou, Imane Sadgali
Academic plagiarism has become a serious concern as it leads to the retardation of scientific progress and violation of intellectual property. In this context, we make a study aiming at the detection of cross-linguistic plagiarism based on Natural language Preprocessing (NLP), Embedding Techniques, and Deep Learning. Many systems have been developed to tackle this problem, and many rely on machine learning and deep learning methods. In this paper, we propose Cross-language Plagiarism Detection (CL-PD) method based on Doc2Vec embedding techniques and a Siamese Long Short-Term Memory (SLSTM) model. Embedding techniques help capture the text's contextual meaning and improve the CL-PD system's performance. To show the effectiveness of our method, we conducted a comparative study with other techniques such as GloVe, FastText, BERT, and Sen2Vec on a dataset combining PAN11, JRC-Acquis, Europarl, and Wikipedia. The experiments for the Spanish-English language pair show that Doc2Vec+SLSTM achieve the best results compared to other relevant models, with an accuracy of 99.81%, a precision of 99.75%, a recall of 99.88%, an f-score of 99.70%, and a very small loss in the test phase.
{"title":"Word Embedding for High Performance Cross-Language Plagiarism Detection Techniques","authors":"Chaimaa Bouaine, F. Benabbou, Imane Sadgali","doi":"10.3991/ijim.v17i10.38891","DOIUrl":"https://doi.org/10.3991/ijim.v17i10.38891","url":null,"abstract":"Academic plagiarism has become a serious concern as it leads to the retardation of scientific progress and violation of intellectual property. In this context, we make a study aiming at the detection of cross-linguistic plagiarism based on Natural language Preprocessing (NLP), Embedding Techniques, and Deep Learning. Many systems have been developed to tackle this problem, and many rely on machine learning and deep learning methods. In this paper, we propose Cross-language Plagiarism Detection (CL-PD) method based on Doc2Vec embedding techniques and a Siamese Long Short-Term Memory (SLSTM) model. Embedding techniques help capture the text's contextual meaning and improve the CL-PD system's performance. To show the effectiveness of our method, we conducted a comparative study with other techniques such as GloVe, FastText, BERT, and Sen2Vec on a dataset combining PAN11, JRC-Acquis, Europarl, and Wikipedia. The experiments for the Spanish-English language pair show that Doc2Vec+SLSTM achieve the best results compared to other relevant models, with an accuracy of 99.81%, a precision of 99.75%, a recall of 99.88%, an f-score of 99.70%, and a very small loss in the test phase.","PeriodicalId":13648,"journal":{"name":"Int. J. Interact. Mob. Technol.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86014568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-05-10DOI: 10.3991/ijim.v17i09.38313
M. Shulga
Digital learning does not determine its strategic benchmarks independently since it always represents only a training system component. Consequently, its goals and objectives cannot be understood without a preliminary understanding of the purposes and objectives put forward by the training system a part of which it forms. The issue of identifying this purpose as a person being a cognitive activity subject or a person being a bearer of a certain number of skills requires clarification. The digital learning concept will always contain a positive ("correct") or negative ("incorrect") answer to this question in the "default" status, as prescribed by the training system. And it will serve as an auxiliary tool only in promoting (and approving) different concepts of human capacity as a "correct" one.
{"title":"What Does Digital Learning Teach?","authors":"M. Shulga","doi":"10.3991/ijim.v17i09.38313","DOIUrl":"https://doi.org/10.3991/ijim.v17i09.38313","url":null,"abstract":"Digital learning does not determine its strategic benchmarks independently since it always represents only a training system component. Consequently, its goals and objectives cannot be understood without a preliminary understanding of the purposes and objectives put forward by the training system a part of which it forms. The issue of identifying this purpose as a person being a cognitive activity subject or a person being a bearer of a certain number of skills requires clarification. The digital learning concept will always contain a positive (\"correct\") or negative (\"incorrect\") answer to this question in the \"default\" status, as prescribed by the training system. And it will serve as an auxiliary tool only in promoting (and approving) different concepts of human capacity as a \"correct\" one.","PeriodicalId":13648,"journal":{"name":"Int. J. Interact. Mob. Technol.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82365247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-05-10DOI: 10.3991/ijim.v17i09.38395
Yara Ahmed Mohebeldin Zaky
This article examines the effectiveness of a positive-design chatbot in a mobile learning environment on students’ referencing skills and digital well-being in a research context. The sample consisted of 150 postgraduate students at King Faisal University Education College who were writing their master’s dissertations and facing challenges regarding the preparation of American Psychological Association 7th (APA7) edition-style scientific references. this search used a quasi-experimental study involving an achievement pretest and posttest together with a digital well-being scale to gather data and adopted a positive-design for a chatbot to be used in a mobile learning environment. We developed a chatbot mobile app called Smart Assistant for Research Referencing according to the proposed model and assessed its effect on skill development and digital well-being. The results showed that posttest knowledge increased significantly, and levels of digital well-being also improved. This study provides a model to help postgraduate students and researchers who use the APA7 style to prepare references faster, more easily, and with high accuracy. Where the researches results indicated that there is a problem in students' lack of APA reference skills and their frequent feelings of failure, frustration, anxiety and lack of motivation, the results of this research may help bridge the gap. Instructional designers may benefit from the proposed positive design model when designing positive learning environments based on artificial intelligence (AI). artificial intelligence to improve digital well-being.
{"title":"Chatbot Positive Design to Facilitate Referencing Skills and Improve Digital Well-Being","authors":"Yara Ahmed Mohebeldin Zaky","doi":"10.3991/ijim.v17i09.38395","DOIUrl":"https://doi.org/10.3991/ijim.v17i09.38395","url":null,"abstract":"This article examines the effectiveness of a positive-design chatbot in a mobile learning environment on students’ referencing skills and digital well-being in a research context. The sample consisted of 150 postgraduate students at King Faisal University Education College who were writing their master’s dissertations and facing challenges regarding the preparation of American Psychological Association 7th (APA7) edition-style scientific references. this search used a quasi-experimental study involving an achievement pretest and posttest together with a digital well-being scale to gather data and adopted a positive-design for a chatbot to be used in a mobile learning environment. We developed a chatbot mobile app called Smart Assistant for Research Referencing according to the proposed model and assessed its effect on skill development and digital well-being. The results showed that posttest knowledge increased significantly, and levels of digital well-being also improved. This study provides a model to help postgraduate students and researchers who use the APA7 style to prepare references faster, more easily, and with high accuracy. Where the researches results indicated that there is a problem in students' lack of APA reference skills and their frequent feelings of failure, frustration, anxiety and lack of motivation, the results of this research may help bridge the gap. Instructional designers may benefit from the proposed positive design model when designing positive learning environments based on artificial intelligence (AI). artificial intelligence to improve digital well-being.","PeriodicalId":13648,"journal":{"name":"Int. J. Interact. Mob. Technol.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85310739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the digital age, people are increasingly connected and frequently use technology in their daily lives. Elementary school students are no exception. They show a great interest in the digital world and especially in games. Scratch gives these students the opportunity to create their own games instead of being passive consumers of these programs. Also, it is a software that allows the development of computational thinking. Thus, to learn programming using Scratch allows students to be actors in their learning which increases their capacity to solve problems. The objective of this work is to propose a pedagogical scenario to teach Scratch to primary school students based on active pedagogical approaches that put the learner at the centre of the teaching-learning process. Once challenged by a problem, students propose solutions. Scratch gives the opportunity to verify the accuracy of the proposed solutions. Accordingly, students try to detect the source of the error and rectify the instructions of their programs. The class, grouped in trios, evaluates the proposed solutions by adopting the "trial and error" method until the desired result is obtained. Therefore, the scenario proposed in this work combines active pedagogical approaches while taking into consideration the nature of the subject taught. Indeed, it aims to make the students fully involved in their learning with the "trial and error" method and to develop their capacities of investigation and problem-solving in a motivating and collaborative environment.
{"title":"A Proposal of a Scenario to Integrate Active Pedagogical Approaches to Teach Scratch in Primary School","authors":"Mohamed Chekour, Yassine Zaoui Seghroucheni, Amina Aboulkacem, Moulay Mustapha Hafid","doi":"10.3991/ijim.v17i09.36797","DOIUrl":"https://doi.org/10.3991/ijim.v17i09.36797","url":null,"abstract":"In the digital age, people are increasingly connected and frequently use technology in their daily lives. Elementary school students are no exception. They show a great interest in the digital world and especially in games. Scratch gives these students the opportunity to create their own games instead of being passive consumers of these programs. Also, it is a software that allows the development of computational thinking. Thus, to learn programming using Scratch allows students to be actors in their learning which increases their capacity to solve problems. The objective of this work is to propose a pedagogical scenario to teach Scratch to primary school students based on active pedagogical approaches that put the learner at the centre of the teaching-learning process. Once challenged by a problem, students propose solutions. Scratch gives the opportunity to verify the accuracy of the proposed solutions. Accordingly, students try to detect the source of the error and rectify the instructions of their programs. The class, grouped in trios, evaluates the proposed solutions by adopting the \"trial and error\" method until the desired result is obtained. Therefore, the scenario proposed in this work combines active pedagogical approaches while taking into consideration the nature of the subject taught. Indeed, it aims to make the students fully involved in their learning with the \"trial and error\" method and to develop their capacities of investigation and problem-solving in a motivating and collaborative environment.","PeriodicalId":13648,"journal":{"name":"Int. J. Interact. Mob. Technol.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74690809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-05-10DOI: 10.3991/ijim.v17i09.39465
Ishamuddin Mustapha, Masroor Ali, Nohman Khan, Huma Sikandar
The fast growth of technologies during the Industry 4.0 era resulted in new or evolved organisations forming. Throughout the Fourth Industrial Revolution, the interaction between technology and humans evolved. Furthermore, the skills and capacities of individuals and organisations are changing due to the abundance of technology. This study investigated the impact of industry 4.0 on innovative organisations and used thematic analysis to identify the major themes. VOS viewer content analysis and critical terms of occurrences analysis were used to identify the major themes. In addition, the PRISMA statement 2020 is applied for the methodological part. The results indicate three significant themes business models, innovative organisations, and digital transformation. The findings show that changes in the global economy and market needs are forcing businesses to adopt technical breakthroughs made possible by digital transformation. it is considered that adequate resources, experienced and capable workers, and well-organized, adequately adaptable, and creative procedures are required for innovative organisations. In addition, HRM practises in the digital era must incorporate teleworking, promote employee engagement in achieving the aim of digital transformation, and incentivise a proper leadership style. Also, technological advancement drives businesses to innovate in their everyday production, supply, value chains, and numerous operations, allowing them to adapt quickly to client requests.
{"title":"The Impact of Industry 4.0 on Innovative Organisations, A Thematic Review using the PRISMA Statement 2020","authors":"Ishamuddin Mustapha, Masroor Ali, Nohman Khan, Huma Sikandar","doi":"10.3991/ijim.v17i09.39465","DOIUrl":"https://doi.org/10.3991/ijim.v17i09.39465","url":null,"abstract":"The fast growth of technologies during the Industry 4.0 era resulted in new or evolved organisations forming. Throughout the Fourth Industrial Revolution, the interaction between technology and humans evolved. Furthermore, the skills and capacities of individuals and organisations are changing due to the abundance of technology. This study investigated the impact of industry 4.0 on innovative organisations and used thematic analysis to identify the major themes. VOS viewer content analysis and critical terms of occurrences analysis were used to identify the major themes. In addition, the PRISMA statement 2020 is applied for the methodological part. The results indicate three significant themes business models, innovative organisations, and digital transformation. The findings show that changes in the global economy and market needs are forcing businesses to adopt technical breakthroughs made possible by digital transformation. it is considered that adequate resources, experienced and capable workers, and well-organized, adequately adaptable, and creative procedures are required for innovative organisations. In addition, HRM practises in the digital era must incorporate teleworking, promote employee engagement in achieving the aim of digital transformation, and incentivise a proper leadership style. Also, technological advancement drives businesses to innovate in their everyday production, supply, value chains, and numerous operations, allowing them to adapt quickly to client requests. \u0000 \u0000 ","PeriodicalId":13648,"journal":{"name":"Int. J. Interact. Mob. Technol.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82757519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-05-10DOI: 10.3991/ijim.v17i09.38777
Haroon Rashid Hammood Al Dallal, Wijdan Noaman Marzoog Al Mukhtar
Protecting and concealing sensitive data in the modern world is challenging. Due to insufficient protection and privacy, it is feasible for critical information to be fabricated. This led to a significant financial loss for someone. The intended recipient must be trusted with sensitive information and be able to independently authenticate the accuracy of the information by independently checking the specifics. There are several driving the rise in QR codes used for information transmission. Due to their enormous capacity for storing information, QR codes are vital for dissemination. However, most currently deployed QR code solutions employ insecure data formats and never employ encryption. Secure QR Code is data protection and data concealing available technology. The Quick Response (QR) code is widely used and accessible without extensive technical training. Now, the user data stored in a QR code is effectively public knowledge and occasionally even illegally used. To address the abovementioned issues, this study's authors propose a novel QR code encryption system. Using the image's mathematical processing method, we may apply the equivalence class principle to the ordered equations of the two-dimensional code, producing the desired cryptographic result. This method exploits the unique visual properties of the QR code. Only a QR code reader can decode the code's useful information, which is too complex for standard reading methods. It will be utilised to address issues in speedy business client data protection Security, commodity anticounterfeiting, and bicycle sharing QR codes.
{"title":"A QR Code Used for Personal Information Based On Multi-Layer Encryption System","authors":"Haroon Rashid Hammood Al Dallal, Wijdan Noaman Marzoog Al Mukhtar","doi":"10.3991/ijim.v17i09.38777","DOIUrl":"https://doi.org/10.3991/ijim.v17i09.38777","url":null,"abstract":"Protecting and concealing sensitive data in the modern world is challenging. Due to insufficient protection and privacy, it is feasible for critical information to be fabricated. This led to a significant financial loss for someone. The intended recipient must be trusted with sensitive information and be able to independently authenticate the accuracy of the information by independently checking the specifics. There are several driving the rise in QR codes used for information transmission. Due to their enormous capacity for storing information, QR codes are vital for dissemination. However, most currently deployed QR code solutions employ insecure data formats and never employ encryption. Secure QR Code is data protection and data concealing available technology. The Quick Response (QR) code is widely used and accessible without extensive technical training. Now, the user data stored in a QR code is effectively public knowledge and occasionally even illegally used. To address the abovementioned issues, this study's authors propose a novel QR code encryption system. Using the image's mathematical processing method, we may apply the equivalence class principle to the ordered equations of the two-dimensional code, producing the desired cryptographic result. This method exploits the unique visual properties of the QR code. Only a QR code reader can decode the code's useful information, which is too complex for standard reading methods. It will be utilised to address issues in speedy business client data protection Security, commodity anticounterfeiting, and bicycle sharing QR codes.","PeriodicalId":13648,"journal":{"name":"Int. J. Interact. Mob. Technol.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89302281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-05-10DOI: 10.3991/ijim.v17i09.39337
D. Novaliendry, A. Huda, LatifahAnnisa, Resti Rahmi Khairati Costa, Yudhistira, Fivia Eliza
This research and development are motivated by the problem of limited learning resources on Computers and Basic Networks in SMK Negeri 2. This happens because no learning media attracts students' interest in learning. Therefore, the writer tries to design interesting learning media for students. This study aims to determine the validity, practicality and effectiveness of the design and manufacture of mobile learning media based on mobile web subjects for computer and basic networking subjects for class X TKJ SMK Negeri 2 Padang. This research uses the research & development method. The research subjects were 35 people. The research model used is the development research model (ADDIE model), with the development steps as follows. (1) Analyze, (2) design, (3) development, (4) Implementation, and (5) Evaluate. The results of the overall effectiveness test assessment of the effectiveness of Mobile Web-Based Mobile Learning on Computers and Basic Networks (KJD) Class X SMK Negeri 2 Padang Odd Semesters of 93.57% so that the level of effectiveness can be interpreted very effectively used. In conclusion, based on the assessment and expert input and the results of the field trial of Mobile Web-Based Mobile Learning Media as a learning medium, it has been tested for feasibility and excellence. It can be used in the learning process on KJD subjects for class X TKJ SMK N 2 Padang.
SMK Negeri 2中计算机和基础网络学习资源有限的问题激发了本研究和开发的动机。这是因为没有学习媒体能吸引学生的学习兴趣。因此,笔者试图为学生设计有趣的学习媒体。本研究旨在确定基于计算机移动web科目和X班TKJ SMK Negeri 2 Padang基础网络科目的移动学习媒体设计与制作的有效性、实用性和有效性。本研究采用研究开发的方法。研究对象是35人。本文采用的研究模型为发展研究模型(ADDIE模型),其发展步骤如下:(1)分析,(2)设计,(3)开发,(4)实施,(5)评估。整体有效性测试的结果评估了基于网络的移动学习在计算机和基础网络(KJD)类X SMK Negeri 2巴东Odd学期的有效性为93.57%,使有效性水平可以很有效地解释使用。综上所述,基于评估和专家意见以及基于web的移动学习媒体作为学习媒介的现场试验结果,对其可行性和卓越性进行了测试。它可以用于KJD科目的学习过程中,为X班TKJ SMK n2巴东。
{"title":"The Effectiveness of Web-Based Mobile Learning for Mobile Subjects on Computers and Basic Networks in Vocational High Schools","authors":"D. Novaliendry, A. Huda, LatifahAnnisa, Resti Rahmi Khairati Costa, Yudhistira, Fivia Eliza","doi":"10.3991/ijim.v17i09.39337","DOIUrl":"https://doi.org/10.3991/ijim.v17i09.39337","url":null,"abstract":"This research and development are motivated by the problem of limited learning resources on Computers and Basic Networks in SMK Negeri 2. This happens because no learning media attracts students' interest in learning. Therefore, the writer tries to design interesting learning media for students. This study aims to determine the validity, practicality and effectiveness of the design and manufacture of mobile learning media based on mobile web subjects for computer and basic networking subjects for class X TKJ SMK Negeri 2 Padang. This research uses the research & development method. The research subjects were 35 people. The research model used is the development research model (ADDIE model), with the development steps as follows. (1) Analyze, (2) design, (3) development, (4) Implementation, and (5) Evaluate. The results of the overall effectiveness test assessment of the effectiveness of Mobile Web-Based Mobile Learning on Computers and Basic Networks (KJD) Class X SMK Negeri 2 Padang Odd Semesters of 93.57% so that the level of effectiveness can be interpreted very effectively used. In conclusion, based on the assessment and expert input and the results of the field trial of Mobile Web-Based Mobile Learning Media as a learning medium, it has been tested for feasibility and excellence. It can be used in the learning process on KJD subjects for class X TKJ SMK N 2 Padang. \u0000 ","PeriodicalId":13648,"journal":{"name":"Int. J. Interact. Mob. Technol.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79242416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}