multimedia technology
Recently Published Documents


TOTAL DOCUMENTS

890
(FIVE YEARS 254)

H-INDEX

12
(FIVE YEARS 3)

2021 ◽  
Vol 13 (3) ◽  
pp. 2335-2342
Author(s):  
Supardi Supardi ◽  
Mohammad Viktor Farid Hakim

The purpose of this research was to investigate the digital competence of madrasah teachers during the covid-19 pandemic. The research used the qualitative method. It explored the phenomenon of madrasah teachers’ digital competence. The data were collected through observation and interviews. The study participants involved 1 principal and 9 teachers from grades 1 to 6. Data analysis consisted of data reduction, data presentation, conclusion drawing and triangulation. The study results conclude that the digital competence of madrasa teachers is still low, so that teaching and learning have not used multimedia technology. Therefore, the results of this study recommend the concept of training related to increasing the digital competence of madrasa teachers regularly because it had an important role in supporting the school's educational process.


Author(s):  
Dewi Yana ◽  
Aulia Putri

People's lives are affected by several aspects of Information, Communication, and Technology, and multimedia technology is one of them. Then, Junior-senior-higher students today are identified as generation Z; they are characterized by the first digital generation who love to access the internet. This paper presents the correlation between students' intensity of accessing multimedia technology products via the internet toward their listening skills.  This study applies a quantitative method with a correlational design. The population is the first year's students of the English Education Study Program of UNRIKA which applies the total sampling technique. The research data were gathered from an online questionnaire and listening test. The data were analyzed with descriptive statistics- Pearson correlation employing SPSS to determine the correlation between; students' intensity of accessing multimedia technology (MT) products through the internet and listening skill. The result found that there is a moderate and negative correlation between the two variables (the Pearson correlation value is -0.252 > 0.05). There are some possible factors considered to the finding; it implies seeking further truth of the factors considered.


2021 ◽  
Vol 2021 ◽  
pp. 1-9
Author(s):  
Yanhong Shang ◽  
Jing Zhang

In response to the continuous development of computer science and multimedia technology, many problems related to computer multimedia security are gradually exposed in the development. Through the existence of hidden dangers of computer multimedia security, a computer is constructed based on the network security active defense model. For a multimedia security protection system, select four modules in the system for design and description. Finally, the experimental results show that the system designed in this study can realize the security protection of computer multimedia, and the system is simple to operate and has strong practicability and meets the expected design effect.


2021 ◽  
Vol 6 (3) ◽  
pp. 621-631
Author(s):  
Budi Sulistiyo Nugroho ◽  
Abdul Wahab Syakhrani ◽  
Alim Hardiansyah ◽  
Petrus Jacob Pattiasina ◽  
Emy Yunita Rahma Pratiwi

The extraordinary development of technology followed by changes in human life in all fields also impacts the behavior of technology users and consumer behavior than multimedia, all of which have accelerated changes both in terms of multimedia transformation and in the form of business models that use multimedia. This study will discuss how multimedia strategies and their sustainable governance will impact distance learning that has been practiced so far as part of the effort to respond, namely learning from home. Because the impact of this media is quite significant, the parties, including parents who have to guide their children's learning, must also get a good understanding of how their strategy is to manage multimedia management for their children's learning considering that today multimedia technology has become like food that must be adequately served, really not contaminated with viruses or other toxins. This study utilizes data from the latest findings from previous publications from the book, journals, and other websites that contribute to the voice of technology and its impact on its users. Based on the results of the study of these data sources and a very detailed discussion, we finally got a new entry where parents must gain an understanding of multimedia applications and also how to use them and their uses so that parents and students can take advantage of multimedia for their learning success and life.


2021 ◽  
Vol 2021 ◽  
pp. 1-6
Author(s):  
Rongrong Wang

At present, the combination of multimedia technology and physical education has been extensively applied, and the reform of sports event management has also attracted the attention of researchers. Reform and innovation have been carried out on the effective utilization of physical education resources and the image display of sports actions with great difficulties in the process of teaching and cross school and class synchronous learning, which has not only enriched the approaches and methods of sports management and teaching but also achieved certain effects.


Author(s):  
Noor Kadhim Ayoob ◽  
Asraa Abdullah Hussein ◽  
Rusul Mohammed Neamah

One of the important issues in the era of computer networks and multimedia technology development is to find ways to maintain the reliability, credibility, copyright and non-duplication of digital content transmitted over the internet. For the purpose of protecting images from illegal usage, a watermark is used. A hidden digital watermark is the process of concealing information on a host to prove that this image is owned by a specific person or organization. In this paper, a new method has been proposed to use an RGB logo to protect color images from unlicensed trading. The method depends on retrieving logo data from specific locations in the host to form a logo when the owner claims the rights to those images. These positions are chosen because their pixels match the logo data. The locations of matching pixels are stored in a table that goes through two stages of treatment to ensure confidentiality: First, table compression, second, encoding positions in the compressed table through El-Gamal algorithm. Because the method depends on the idea of keeping host pixels without change, PSNR will always be infinity. After subjecting the host to five types of attack, the results demonstrate that the method can effectively protect the image and hidden logo is retrieved clearly even after the attacks.


Author(s):  
Xiangyu Feng ◽  
Jiren Xu ◽  
Changbao Wang ◽  
Yuepei Jiang ◽  
Dongsheng Wu ◽  
...  

2021 ◽  
pp. 147-169
Author(s):  
S. Usharani ◽  
P. Manju Bala ◽  
R. Rajmohan ◽  
T. Ananth Kumar ◽  
S. Arunmozhi Selvi

Sign in / Sign up

Export Citation Format

Share Document