Claim Missing Document
Check
Articles

Found 4 Documents
Search

PyLe: An Interactive Tool for Improving Python Syntax Mastery in Non-Computing Students Mbiada, Alain Kabo; Isong, Bassey; Lugayizi, Francis
Journal of Information System and Informatics Vol 6 No 2 (2024): June
Publisher : Asosiasi Doktor Sistem Informasi Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51519/journalisi.v6i2.751

Abstract

The learning and mastering of programming language syntax pose a significant challenge for non-computing students. Most teaching approaches and existing educational tools often fail to address this issue. Therefore, this paper introduces an interactive learning environment called PyLe, specifically designed for introductory programming in Python programming courses. We evaluated the effectiveness of PyLe on first-year students at North-West University in South Africa and the University of Yaoundé 1, Cameroon. Firstly, the study conducts an experiment to assess the effect of PyLe on the time taken to solve a problem and the response quality. Secondly, PyLe’s usability and its instructional value were evaluated by the students and the instructors, respectively. The results from post-test method and a quantitative survey indicate that PyLe improves students’ ability to learn and master program syntax and has a high usability rate. Moreover, feedback from students and teachers affirms PyLe’s potential to address programming syntax challenges for non-computing students. However, the analyses revealed no real relationship between the time taken to complete a task in PyLe and the quality of the solution. This study contributes to improving the teaching and learning of computer programming, which has been considered difficult for both computing and non-computing students.
Machine Learning Algorithms to Defend Against Routing Attacks on the Internet of Things: A Systematic Literature Review Sejaphala, Lanka Chris; Malele, Vusimuzi; Lugayizi, Francis
Journal of Information System and Informatics Vol 6 No 3 (2024): September
Publisher : Universitas Bina Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51519/journalisi.v6i3.828

Abstract

The Internet of Things (IoT) has become increasingly popular, opening vast application possibilities in different fields including smart cities, healthcare, manufacturing, agriculture, etc. IoT comprises resource-constrained devices deployed in Low Power and Lossy Networks (LLNs). To satisfy the routing requirements of these networks, the Internet Engineering Task Force (IETF) created a standardised Routing Protocol for low-power and Lossy Networks (RPL). However, this routing protocol is vulnerable to routing attacks, prompting researchers to propose several techniques to defend the network against such attacks. Machine learning approaches demonstrate effective ways to detect such attacks in large quantities. Therefore, this paper systematically synthesised 17 publications to compare the performance of traditional and advanced machine learning algorithms to identify the best algorithm for detecting RPL-based IoT routing attacks. The findings of this paper show that machine learning algorithms are capable of effective detection of many routing attacks with high accuracy and a low False Positive Rate. Furthermore, the results demonstrate that on average, advanced machine learning algorithms can achieve an accuracy of 96.03% compared to traditional machine learning algorithms which achieved 91.67%. Traditional machine learning algorithms demonstrated the best performance on average False Positive Rate by achieving 2.75% compared to their counterparts which gained 4.79%. However, Random Forest showed the best performance and outperformed all the algorithms in the selected publications by achieving over 99% accuracy, precision and recall.
A Comparative Study of Computer Programming Challenges of Computing and Non-Computing First-Year Students Mbiada, Alain; Isong, Bassey; Lugayizi, Francis
The Indonesian Journal of Computer Science Vol. 12 No. 4 (2023): The Indonesian Journal of Computer Science (IJCS)
Publisher : AI Society & STMIK Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33022/ijcs.v12i4.3330

Abstract

The learning of computer programming comes with unique difficulties that vary among students depending on their backgrounds, learning methods, and objectives. This paper investigates the programming challenges first-year students from non-computing at the North-West University, South Africa, and computing backgrounds at the University of Dschang, Cameroon face. A questionnaire-based data collection method is utilized and categorizes participants based on their gender, age, fields of study, prior experiences in mathematics, statistics, English, and programming languages, lab use/access, learning strategies, and material preferences. The aim is to identify and analyze the student's understanding of the basic programming concepts and the specific challenges met during introductory programming modules. Analysis of the collected data shows that while a considerable percentage of non-computing students have prior experience in mathematics and English, they lack familiarity with programming. Equally, while most computing students are proficient in spoken English, they face significant challenges in programming, mathematics, and written English. Notable difficulties are experienced in grasping concepts like recursion, arrays, error handling, and function/procedure methods. Moreover, a comparative study reveals that both groups of students encounter similar challenges, however, non-computing students’ difficulties are more than their computing counterparts. This paper, therefore, suggests designing teaching methods and learning materials to specifically meet the needs of non-computer science students, and enhance their understanding and proficiency in computer programming.
High-Level Defence Model against Routing Attacks on the Internet-of-Things Sejaphala, Lanka Chris; Malele, Vusi; Lugayizi, Francis
The Indonesian Journal of Computer Science Vol. 13 No. 1 (2024): The Indonesian Journal of Computer Science (IJCS)
Publisher : AI Society & STMIK Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33022/ijcs.v13i1.3744

Abstract

This paper is part of the doctoral work that aims to answer the following research question: “To what extent can an intelligent security model effectively defend against routing attacks in RPL-based Internet of Things (IoT) with a demonstration of less network resource consumption, high detection rate, and minimal false negatives?” To answer this question, this paper proposes a high-level conceptual framework to defend the IoT against routing attacks. In recent works, mitigation techniques have been proposed to act against routing attacks, however conceptual defence or mitigation framework is not presented as a set of steps to follow to develop an effective and robust intelligent security model. This paper aims to present a high-level conceptual defence framework against routing attacks; specifically, sinkhole, rank, DIS-Flooding, and worst parent. The four mentioned routing attacks are capable of disturbing IoT network functions and operations, and consuming network resources such as memory and power.