The Measurement of Rare Plants Learning Media using Backward Chaining Integrated with Context-Input-Process-Product Evaluation Model based on Mobile Technology
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 8
Abstract
This research was aimed to know the effectiveness level of learning media utilization to the introduction of rare plants in Alas Kedaton tourism forest in Tabanan-Bali based on backward chaining for students and the general public. The type of this research includes explorative and evaluative research types. The population in this study was the plants species that exist in the Alas Kedaton tourism forest. The human population was the entire society in the area of Alas Kedaton tourism forest. The sampling method of plants species used the quadratic method, while for the human samples used purposive sampling method. The data has been collected then analyzed descriptively. The results of this study indicate that through the utilization of learning media obtained related information about the number of rare plants species in Alas Kedaton tourism forest as many as 48 species of plants with 26 families, and also the factors causing the scarcity of those plants species. Through the use of CIPP (Context-Input-Process-Product) evaluation model assisted by mobile technology, the overall average effectiveness of learning media utilization to the introduction of rare plant in Alas Kedaton tourism forest in Tabanan-Bali based on backward chaining amount of 88.20%, so that was included into the good categorization.
Authors and Affiliations
Nyoman Wijana, Ni Nyoman Parmithi, I Gede Astra Wesnawa, I Made Ardana, I Wayan Eka Mahendra, Dewa Gede Hendra Divayana
Mobile Malware Classification via System Calls and Permission for GPS Exploitation
Now-a-days smartphones have been used worldwide for an effective communication which makes our life easier. Unfortunately, currently most of the cyber threats such as identity theft and mobile malwares are targeting smar...
The Effect of Feature Selection on Phish Website Detection
Recently, limited anti-phishing campaigns have given phishers more possibilities to bypass through their advanced deceptions. Moreover, failure to devise appropriate classification techniques to effectively identify thes...
An Analysis of Security Challenges in Cloud Computing
Vendors offer a pool of shared resources to their users through the cloud network. Nowadays, shifting to cloud is a very optimal decision as it provides pay-as-you-go services to users. Cloud has boomed high in business...
Performance Evaluation WPAN of RN-42 Bluetooth based (802.15.1) for Sending the Multi-Sensor LM35 Data Temperature and RaspBerry Pi 3 Model B for the Database and Internet Gateway
This research will be a test of a multi-sensor data transmission using the Wireless Sensor Network based on Bluetooth RN-42. Accordingly this research, LM35 is a type of Temperature Sensor, furthermore, this research wil...
Improvement of Persian Spam Filtering by Game Theory
There are different methods for dealing with spams; however, since spammers continuously use tricks to defeat the proposed methods, hence, filters should be constantly updated. In this study, Stackelberg game was used to...