Cart

default logo

IJASE - Volume 10 - Issue 2

[<<< GO BACK ][ VOLUME 10 - ISSUE 2 ]

Title: Contents
Abstract :

Contents

Title: Blockchain in Educational Development: Potentialities and Issues— Towards sophisticated Digital Education Systems
Abstract :
Blockchainhas become an important digital technology component in the Information Technology field and applicable in diverse areas of society and community. Blockchain and its gradual development lead it to become an emerging technology and called as ‘Blockchain Technology. Blockchain simply offers a system of recording information and which are not possible to change due to robust and secure systems. Blockchain is a kind of digital ledger transaction that spreads over the entire communications or networks. Due to the adopted mechanism in Blockchain it is difficult to change or hack or check within the systems and therefore this technology is rising gradually as it is using encrypted and distributed databases connected with transactions. Blockchain is a digital ledger system and that further depends on different independent record, and keep recoded data in a particular place. Blockchain is dedicated in tangible and intangible asset management and further concerned pieces of data stored in the same place. Normally, it is being started its uses in the financial segment regarding proper digital currency transactions but gradually it has
become an important tool in diverse areas such as in tangible and intangible asset management. As far as the Education sector is concerned it is useful in both onsite and online education systems. However online and e-learning are more suited with Blockchain. Today in educational institutions many third parties are being used in proper educational delivery and Blockchainis being used in proper safeguarding in newer educational and training models. This Paper is about Blockchain with its concepts, features and applications in educational systems, management and the teaching-learning process. Work also suggested the issues and concerns of Blockchain in educational development and management.
Title: Engagement with Facebook Advertisements among Senior Citizens as a Vehicle to Choose Assisted Living Facilities in the Local Area: An Observational Study
Abstract :
The widespread usage of social media as a vehicle to communicate and exchange information has been massively growing, especially in the times of the current COVID-19 pandemic. Billions of people around the world now can connect to the internet and transmit uninterrupted data via social media platforms. There are numerous papers available targeting teenagers and adults utilizing social media as a platform to make vital decisions. However, the adoption of modern communication technologies among senior citizens has
been rarely investigated. In this paper, we propose to investigate a sample of 80 senior adults who were looking for assisted living facility services through a Facebook social media platform. We aim to understand what guided their decision to contact an assisted living facility for the service, and what options they prefer for their stay. This paper will be among pioneering papers since the investigation of senior citizens and social media utilization for assisted living is scarcely found on scientific search engines such as PubMed.
Title: Interlingual Morpho-Syntactic L1-Interference and L2-Syntax Errors: Experiences, Observations and Deductions
Abstract :
In order to determine interlingual morpho-syntactic L1-interference among 9 adult German native speaking subjects who attempted to learn the English language, long-term classes of an average timespan of 18 months were observed and tracked in regard of their most common errors in L2- syntax. During that period, it became obvious, that a majority of syntax errors occured due to interference with familiar structures of the subjects’ L1, which they had falsely mapped onto L2-structures. This paper describes the methodology of assessments of the most error-prone syntax structures in the featured pair of languages, the quality of subjectively-felt difficulties in syntactic switching as well as the specific associated fields of morpho- syntactic interference. Furthermore, it opens a follow-up discussion about whether root-similarities between L1 and L2 in general, in spite of their numerous advantages for learners, can also have negative impact on L2- acquisition in terms of syntax-errors due to the likelihood of ill-fitting mapping-attempts which might be brought forth by the faulty preassumption of identicalness, built upon the various similarities among L1 and L2.
Title: Design and Analysis of Security Protocol in Mobile Ad-hoc Networks
Abstract :
These days’ security protocols are a crucial element to provide security services for mobile ad-hoc networks. These services contain data confidentiality, message integrity, subscriber authentication, automated payment system, etc. In this research paper I proposed, design of effective security protocols. Some security protocols are presented and some collective attacks against security protocols are conferred. The susceptibilities that lead to the attacks are analyzed and guidelines for effective security protocol design are proposed.
Title: Program Components of Efforts for Children’s with special needs Education and Inclusion: Evidence from Proyash
Abstract :
This research is an endeavor to evaluate the academic and support service structure of Proyash, as an effective educational institution for children with disabilities through the lenses of parents, educators, therapist and patrons. This research will evaluate the programs and program components of Proyash through literature review in context of national and international policies, guidelines, declarations and frameworks as well as the comparative analysis with the national and international special education institutes. More related literature will be studied for the comparison with contemporary special education institutes of Bangladesh and recent trend in international arena. Finally, the strength and limitations will be projected using the questionnaire survey. This evaluation will help to identify the concrete structure of Proyash and also the loopholes, with which the further amendment can be done.