期刊文献+
共找到4,622篇文章
< 1 2 232 >
每页显示 20 50 100
Factors Affecting the Adoption of E-Learning Systems in Public Higher Learning Institutions in Tanzania: A Case of Institute of Accountancy Arusha (IAA)
1
作者 Adam A. Semlambo Frank Sengati Bakiri Angalia 《Journal of Computer and Communications》 2022年第9期113-126,共14页
In most developing countries, governments attempt to enforce the movement from analogue to digital for all their sectors, from public to private. These technological advancements have been noted to bring necessary and... In most developing countries, governments attempt to enforce the movement from analogue to digital for all their sectors, from public to private. These technological advancements have been noted to bring necessary and unavoidable changes to businesses and learning environments. Higher learning institutions have adopted various e-learning systems to support learning, research, and publication activities to stay competitive in global academic systems. However, most public higher learning institutions in Tanzania lag behind in the adoption of these systems. Thus, research shows a failure of these institutions in utilising the full benefit that today’s Information and Communication Technology (ICT) can offer in learning environments. Thus, this study examines factors affecting the adoption of such a system in developing countries like Tanzania, taking the Institute of Accountancy Arusha (IAA) as a case study. The study used a mixed methodology where thematic and descriptive analysis was used to analyse both qualitative and quantitative research data. The study population was 187 teaching staff, a sample size of 126 was obtained, and 157 study participants were involved in the study. The study found that factors affecting the adoption of e-learning systems in public higher learning institutions in Tanzania include lack of ICT infrastructure, lack of technical and managerial support and lack of computers and e-learning knowledge among facilitators. Thus, the study recommended investments in adequate and reliable ICT facilities, high intermate speed and bandwidth, and policies that support e-learning and training programs about e-learning knowledge and use. Also, this study recommends the use of the Multi-Factors Adoption Model (MFAM11) for the successful adoption of an e-learning system in public higher learning institutions in Tanzania. 展开更多
关键词 E-learning ICT Public higher learning institutions learning Environment IAA
下载PDF
Discussion on Patent Protection Management of Agricultural Institutions of Higher Learning
2
作者 Xiang Xin 《International Journal of Technology Management》 2014年第1期10-13,共4页
关键词 专利管理 保护管理 农业院校 四川农业大学 高校 知识产权战略 高等院校 专利授权
下载PDF
An Exploration of a New Running Mode of Equipment Management for Institutions of Higher Learning
3
作者 Qi Liangxin Zhou Jugui Shan GuoxinThe First Military Medical University Guangzhou 510515, P.R. China 《International Journal of Plant Engineering and Management》 1997年第2期59-65,共7页
With the great changes in China's economic mechanism, the present running modes of equipment management at most institutions of higher learning are becoming less and less effective and efficient. Being fully aware... With the great changes in China's economic mechanism, the present running modes of equipment management at most institutions of higher learning are becoming less and less effective and efficient. Being fully aware of the common problems and their characteristics, this paper proposes a new running mode which aims at these problems' permanent resolution. It involves (1) Systems such as renting, competition and paid services are to be introduced to the campus, in order to effectively associate duty with interest. (2) The present managerial pattern is to be replaced by a new running network, in which all the links cooperate with as well as restrain each other. Such a mode focuses on the “two mechanisms and four patterns,”that is, to rely on the stimulative mechanism and restraint mechanism, and to enforce such patterns as centralized management and application centralized management and common application, opening to public use, and renting and borrowing. Through persistent exploration of the inner potential of the institutions, the ratio of investment and economic efficiency will accordingly be elevated. 展开更多
关键词 institutions of higher learning equipment management MODE
下载PDF
Research on the Financial Management of China's Private Higher Learning Institutions
4
作者 Jie Song 《International English Education Research》 2014年第11期66-70,共5页
关键词 财务管理 民办高校 中国 改革开放 高等教育 教育理念 融资管理 投资管理
下载PDF
Study on the Ideological Education and Management Model for the Art Majors in Institutions of Higher Learning in the New Period
5
作者 Xu Zengliu 《International English Education Research》 2015年第8期40-42,共3页
关键词 思想教育 管理模式 艺术专业 高校 学生 艺术类
下载PDF
Concept and Feasibility of Offering Human Rights Courses in China's Institutions of Higher Learning
6
作者 XU SHUANG 《The Journal of Human Rights》 2010年第1期16-19,共4页
Doubtlessly, the term "human rights" has become a world language in the 21st century. China has written "The state respects and protects human rights" into its constitution, thus opening up a new period of constit... Doubtlessly, the term "human rights" has become a world language in the 21st century. China has written "The state respects and protects human rights" into its constitution, thus opening up a new period of constitutional construction and human rights cause. This great term "human rights" does not only contain specific rights that can be put into practice but also carry dignity, equality, freedom and other value systems and moral requirements. 展开更多
关键词 HRE Concept and Feasibility of offering Human Rights Courses in China’s institutions of higher learning
下载PDF
Analysis of Current Situation of Fancy Rope Skipping Curriculum in Regular Institutions of Higher Learning in Sichuan Province
7
作者 Zhang Yongmao 《International Journal of Technology Management》 2016年第2期36-38,共3页
下载PDF
TheFocaIPointsoftheInstitutesofInternaIFinanciaIControIinHigherLearning
8
作者 朱波强 柳秋红 付绍臣 《攀枝花学院学报》 2008年第4期45-50,共6页
高校内部财务控制在实施过程中存在许多值得关注的问题,如何在现行复杂多变的经济环境中设计出一套科学合理有效的内部财务控制体系,事关高校改革与发展。本文从货币资金、筹资与对外投资、采购与付款、工程项目、预算外收入、经费支出... 高校内部财务控制在实施过程中存在许多值得关注的问题,如何在现行复杂多变的经济环境中设计出一套科学合理有效的内部财务控制体系,事关高校改革与发展。本文从货币资金、筹资与对外投资、采购与付款、工程项目、预算外收入、经费支出以及科研经费管理等方面作了比较深入的探讨,以期对我国高校内部财务控制设计有所帮助。 展开更多
关键词 高等学校 内部财务控制 控制系统 设计要点
下载PDF
Functions and Responsibilities of the Institutions of Higher Leaming in Accounting Integrity Construction 被引量:1
9
作者 Song Jie 《International English Education Research》 2015年第2期9-12,共4页
关键词 高等教育机构 责任会计 诚信建设 学习 主义 社会发展 文化传承 高等院校
下载PDF
A Study on Application of Translation and Communicative Methods in German Language Education in Higher Learning Institutes
10
作者 Chunhua Fu 《Journal of Contemporary Educational Research》 2020年第2期40-44,共5页
With the continuous development of national‘reforms and opening-up’policy and development of economic globalization,learning and application of foreign languages are becoming increasingly important.Society needs a l... With the continuous development of national‘reforms and opening-up’policy and development of economic globalization,learning and application of foreign languages are becoming increasingly important.Society needs a large number of professional linguistic workers.Therefore,there are higher requirements for new era higher learning institutes which serve as training base for cultivating linguistic talents.Linguistic talents must possess very strong overall quality and skill to meet these requirements.In this context,this study carried out an in-depth analysis and research on translation method commonly used in German language teaching,and communicative method which is increasingly popular in recent years,to contribute to cultivation of German linguistic talents in higher learning institutes of China. 展开更多
关键词 higher learning institutes German TEACHING TRANSLATION METHOD COMMUNICATIVE METHOD
下载PDF
ON EVALUATION FOR GRADUATE QUALITY OF HIGHER PEDAGOGICAL INSTITUTION OF LEARNING
11
《西藏大学学报(社会科学版)》 1994年第4期82-85,共4页
关键词 ON EVALUATION FOR GRADUATE QUALITY of higher PEDAGOGICAL INSTITUTION of learning
下载PDF
The Situation Analysis on Cognitive Level and Participation of Tai Chi in the Institutes of Higher Learning
12
作者 You-feng Wang Li-dao Li 《International Journal of Technology Management》 2016年第12期71-74,共4页
下载PDF
Optimized Artificial Neural Network Techniques to Improve Cybersecurity of Higher Education Institution
13
作者 Abdullah Saad AL-Malaise AL-Ghamdi Mahmoud Ragab +2 位作者 Maha Farouk S.Sabir Ahmed Elhassanein Ashraf A.Gouda 《Computers, Materials & Continua》 SCIE EI 2022年第8期3385-3399,共15页
Education acts as an important part of economic growth and improvement in human welfare.The educational sectors have transformed a lot in recent days,and Information and Communication Technology(ICT)is an effective pa... Education acts as an important part of economic growth and improvement in human welfare.The educational sectors have transformed a lot in recent days,and Information and Communication Technology(ICT)is an effective part of the education field.Almost every action in university and college,right from the process fromcounselling to admissions and fee deposits has been automated.Attendance records,quiz,evaluation,mark,and grade submissions involved the utilization of the ICT.Therefore,security is essential to accomplish cybersecurity in higher security institutions(HEIs).In this view,this study develops an Automated Outlier Detection for CyberSecurity in Higher Education Institutions(AOD-CSHEI)technique.The AOD-CSHEI technique intends to determine the presence of intrusions or attacks in the HEIs.The AOD-CSHEI technique initially performs data pre-processing in two stages namely data conversion and class labelling.In addition,the Adaptive Synthetic(ADASYN)technique is exploited for the removal of outliers in the data.Besides,the sparrow search algorithm(SSA)with deep neural network(DNN)model is used for the classification of data into the existence or absence of intrusions in the HEIs network.Finally,the SSA is utilized to effectually adjust the hyper parameters of the DNN approach.In order to showcase the enhanced performance of the AOD-CSHEI technique,a set of simulations take place on three benchmark datasets and the results reported the enhanced efficiency of the AOD-CSHEI technique over its compared methods with higher accuracy of 0.9997. 展开更多
关键词 higher security institutions intrusion detection system artificial intelligence deep neural network hyperparameter tuning deep learning
下载PDF
Exploring the Potentialities of Automatic Extraction of University Webometric Information 被引量:2
14
作者 Gianpiero Bianchi Renato Bruni +3 位作者 Cinzia Daraio Antonio Laureti Palma Giulio Perani Francesco Scalfati 《Journal of Data and Information Science》 CSCD 2020年第4期43-55,共13页
Purpose:The main objective of this work is to show the potentialities of recently developed approaches for automatic knowledge extraction directly from the universities’websites.The information automatically extracte... Purpose:The main objective of this work is to show the potentialities of recently developed approaches for automatic knowledge extraction directly from the universities’websites.The information automatically extracted can be potentially updated with a frequency higher than once per year,and be safe from manipulations or misinterpretations.Moreover,this approach allows us flexibility in collecting indicators about the efficiency of universities’websites and their effectiveness in disseminating key contents.These new indicators can complement traditional indicators of scientific research(e.g.number of articles and number of citations)and teaching(e.g.number of students and graduates)by introducing further dimensions to allow new insights for“profiling”the analyzed universities.Design/methodology/approach:Webometrics relies on web mining methods and techniques to perform quantitative analyses of the web.This study implements an advanced application of the webometric approach,exploiting all the three categories of web mining:web content mining;web structure mining;web usage mining.The information to compute our indicators has been extracted from the universities’websites by using web scraping and text mining techniques.The scraped information has been stored in a NoSQL DB according to a semistructured form to allow for retrieving information efficiently by text mining techniques.This provides increased flexibility in the design of new indicators,opening the door to new types of analyses.Some data have also been collected by means of batch interrogations of search engines(Bing,www.bing.com)or from a leading provider of Web analytics(SimilarWeb,http://www.similarweb.com).The information extracted from the Web has been combined with the University structural information taken from the European Tertiary Education Register(https://eter.joanneum.at/#/home),a database collecting information on Higher Education Institutions(HEIs)at European level.All the above was used to perform a clusterization of 79 Italian universities based on structural and digital indicators.Findings:The main findings of this study concern the evaluation of the potential in digitalization of universities,in particular by presenting techniques for the automatic extraction of information from the web to build indicators of quality and impact of universities’websites.These indicators can complement traditional indicators and can be used to identify groups of universities with common features using clustering techniques working with the above indicators.Research limitations:The results reported in this study refers to Italian universities only,but the approach could be extended to other university systems abroad.Practical implications:The approach proposed in this study and its illustration on Italian universities show the usefulness of recently introduced automatic data extraction and web scraping approaches and its practical relevance for characterizing and profiling the activities of universities on the basis of their websites.The approach could be applied to other university systems.Originality/value:This work applies for the first time to university websites some recently introduced techniques for automatic knowledge extraction based on web scraping,optical character recognition and nontrivial text mining operations(Bruni&Bianchi,2020). 展开更多
关键词 Development of data and information services Webometrics indicators higher education institutions Automatic extraction Machine learning Optimization
下载PDF
Enhanced Artificial Intelligence-based Cybersecurity Intrusion Detection for Higher Education Institutions
15
作者 Abdullah S.AL-Malaise AL-Ghamdi Mahmoud Ragab Maha Farouk S.Sabir 《Computers, Materials & Continua》 SCIE EI 2022年第8期2895-2907,共13页
As higher education institutions(HEIs)go online,several benefits are attained,and also it is vulnerable to several kinds of attacks.To accomplish security,this paper presents artificial intelligence based cybersecurit... As higher education institutions(HEIs)go online,several benefits are attained,and also it is vulnerable to several kinds of attacks.To accomplish security,this paper presents artificial intelligence based cybersecurity intrusion detection models to accomplish security.The incorporation of the strategies into business is a tendency among several distinct industries,comprising education,have recognized as game changer.Consequently,the HEIs are highly related to the requirement and knowledge of the learner,making the education procedure highly effective.Thus,artificial intelligence(AI)and machine learning(ML)models have shown significant interest in HEIs.This study designs a novel Artificial Intelligence based Cybersecurity Intrusion Detection Model for Higher Education Institutions named AICIDHEI technique.The goal of the AICID-HEI technique is to determine the occurrence of distinct kinds of intrusions in higher education institutes.The AICID-HEI technique encompassesmin-max normalization approach to preprocess the data.Besides,the AICID-HEI technique involves the design of improved differential evolution algorithm based feature selection(IDEA-FS)technique is applied to choose the feature subsets.Moreover,the bidirectional long short-term memory(BiLSTM)model is utilized for the detection and classification of intrusions in the network.Furthermore,the Adam optimizer is applied for hyperparameter tuning to properly adjust the hyperparameters in higher educational institutions.In order to validate the experimental results of the proposed AICID-HEI technique,the simulation results of the AICIDHEI technique take place by the use of benchmark dataset.The experimental results reported the betterment of the AICID-HEI technique over the other methods interms of different measures. 展开更多
关键词 higher education institutions deep learning machine learning CYBERSECURITY intrusion detection
下载PDF
Artificial Intelligence Techniques Based Learner Authentication in Cybersecurity Higher Education Institutions
16
作者 Abdullah Saad AL-Malaise AL-Ghamdi Mahmoud Ragab 《Computers, Materials & Continua》 SCIE EI 2022年第8期3131-3144,共14页
Education 4.0 is being authorized more and more by the design of artificial intelligence(AI)techniques.Higher education institutions(HEI)have started to utilize Internet technologies to improve the quality of the serv... Education 4.0 is being authorized more and more by the design of artificial intelligence(AI)techniques.Higher education institutions(HEI)have started to utilize Internet technologies to improve the quality of the service and boost knowledge.Due to the unavailability of information technology(IT)infrastructures,HEI is vulnerable to cyberattacks.Biometric authentication can be used to authenticate a person based on biological features such as face,fingerprint,iris,and so on.This study designs a novel search and rescue optimization with deep learning based learning authentication technique for cybersecurity in higher education institutions,named SRODLLAC technique.The proposed SRODL-LAC technique aims to authenticate the learner/student in HEI using fingerprint biometrics.Besides,the SRODLLACtechnique designs a median filtering(MF)based preprocessing approach to improving the quality of the image.In addition,the Densely Connected Networks(DenseNet-77)model is applied for the extraction of features.Moreover,search and rescue optimization(SRO)algorithm with deep neural network(DNN)model is utilized for the classification process.Lastly,template matching process is done for fingerprint identification.A wide range of simulation analyses is carried out and the results are inspected under several aspects.The experimental results reported the effective performance of the SRODL-LAC technique over the other methodologies. 展开更多
关键词 CYBERSECURITY AUTHENTICATION BIOMETRICS SECURITY higher education institution deep learning
下载PDF
Information Systems Security Threats and Vulnerabilities: A Case of the Institute of Accountancy Arusha (IAA)
17
作者 Adam Aloyce Semlambo Didas Malekia Mfoi Yona Sangula 《Journal of Computer and Communications》 2022年第11期29-43,共15页
All modern computer users need to be concerned about information system security (individuals and organisations). Many businesses established various security structures to protect information system security from har... All modern computer users need to be concerned about information system security (individuals and organisations). Many businesses established various security structures to protect information system security from harmful occurrences by implementing security procedures, processes, policies, and information system security organisational structures to ensure data security. Despite all the precautions, information security remains a disaster in Tanzania’s learning institutions. The fundamental issue appears to be a lack of awareness of crucial information security factors. Various companies have different security issues due to differences in ICT infrastructure, implementations, and usage. The study focuses on identifying information system security threats and vulnerabilities in public higher learning institutions in Tanzania, particularly the Institute of Accountancy Arusha (IAA). The study involved all employees of IAA, academics, and other supporting staff, which totalled 302, and the sample size was 170. The study utilised a descriptive research design, where the quantitative methodology was used through a five-point Likert scale questionnaire, and found that key factors that affect the security of information systems at IAA include human factors, policy-related issues, work environment and demographic factors. The study proposed regular awareness and training programs;an increase in women’s awareness of information system security;proper policy creation and reviews every 4 years;promote actions that lessen information system security threats and vulnerabilities, and the creation of information system security policy documents independently from ICT policy. 展开更多
关键词 Information Systems Information Security Public higher learning institutions IAA
下载PDF
Study on JiangXi Province Part of Civilian Run Colleges and Universities Public Sports Teaching Present Situation and Countermeasure
18
作者 Zhou Bingbing 《International Journal of Technology Management》 2014年第3期122-124,共3页
关键词 民办高校 体育教学 教学现状 江西省 民用 高等教育 地方经济发展 组成部分
下载PDF
Early Prevention of Exercise-induced Tibia Periostitis for Long-Distance Runners in China' s Regular Universities
19
作者 Yajie Mao 《International English Education Research》 2014年第2期21-24,共4页
关键词 胫骨前肌 早期预防 运动员 运动性 骨膜 普通高校 中国 运动训练
下载PDF
Closing the Cybersecurity Skill Gap in Kenya: Curriculum Interventions in Higher Education
20
作者 Raphael M. Kaibiru Simon M. Karume +1 位作者 Faith Kibas Martin Luther Bwangah Onga’nyo 《Journal of Information Security》 2023年第2期136-151,共16页
In the wake of increased cybercrime against insufficient cybersecurity professionals, there is an urgent need to bridge the skill-gap. The demand for skilled and experienced (approximately 40,000 to 50,000) cybersecur... In the wake of increased cybercrime against insufficient cybersecurity professionals, there is an urgent need to bridge the skill-gap. The demand for skilled and experienced (approximately 40,000 to 50,000) cybersecurity professionals in Kenya is soaring all-time high. This demand is against the available 1700 certified professionals. Therefore, this paper seeks to bring to fore interventions put in place to address the skill gap through curriculum interventions. In order to get a clear understanding, the paper sought to determine the status of cybersecurity skill gap in Kenya and what universities are doing to address the gap. The paper also sought to propose the way forward to close the skill gap. This is a seminal review paper in the field of cybersecurity in Kenya focusing on institutions of higher learning and the interventions to address the cybersecurity skill gap. This research is significant to the general institutions of higher learning in both private and public universities. Results show that the cybersecurity skill gap is very high in Kenya. Interventions being offered by universities include partnerships with private cybersecurity organizations, offering cybersecurity certification training hackathons, and degree programs. However, it was established that only 13.2% of registered universities that offer cybersecurity degree programs in Kenya. The paper therefore strongly recommends launch of cybersecurity programs at the levels of undergraduate and graduate in many universities. This can therefore be augmented with other interventions such as certifications, hackathons and partnerships. Further research can be conducted to establish factors affecting the launch of cybersecurity programs in institutions of higher learning in Kenya. A further research can also be conducted to determine the effect of supplementary cybersecurity trainings such as hackathons and certifications. 展开更多
关键词 CYBERSECURITY Cybersecurity Skill Gap Cybersecurity Curriculum institutions of higher learning
下载PDF
上一页 1 2 232 下一页 到第
使用帮助 返回顶部