Skip to main content
This research investigated the relationship between the object-oriented programming approach and software productivity at business organizations. Information systems executives at business organizations rated the quality of software... more
    • by  and +1
This study assessed the impact of object-oriented programming on the quality and reusability of software development. The degree to which object-oriented programming is prevalent over structured and other traditional programming in the... more
    • by  and +1
    • Computer Science
This paper presents a model for guiding undergraduates to success in computational science. A set of integrated, interdisciplinary training and research activities is outlined for use as a vehicle to increase and produce graduates with... more
    • by 
    •   11  
      PhysicsChemistryMathematics EducationComputational Biology
Student academic motivation and student evaluation of overall faculty effectiveriess and instructional techniques at Barber-Scotia College were studied to identify the academically underprepared and unmotivated students. Students provided... more
    • by 
    •   4  
      Higher EducationModelsTeaching MethodsEvaluation methods
The need to continue or renew the Teacher Certificate Program at Barber-Scotia College was examined. Data are presented on student enrollments in the education programs during 1977-1980 by subject area and sophomore, junior, and senior... more
    • by 
    •   3  
      Program EvaluationHigher EducationNeeds Assessment
A seven-year master plan for Barber-Scotia College, which was needed to substantiate requests for federal grants for Strengthening Developing Institutions (SDIP) under the Title III program, is described. An outline for developing a... more
    • by 
    •   4  
      Management Information SystemsHigher EducationInformation NeedsData Collection
Incorrect access to Web site addresses and spam e-mails are continuing to make pornography rampant on the Internet at schools, homes and libraries. Collectively, parents, teachers and members of communities must become more aware of the... more
    • by 
    •   7  
      Information TechnologyCensorshipComputer Mediated CommunicationComputer Security
A student attrition research methodology and results of attrition research at Barber-Scotia College are examined. Questionnaire responses from 137 students indicated the degree of student satisfaction with academic and social service's... more
    • by 
    •   2  
      Research MethodologyHigher Education
Powerful aggregations functions are indispensable in the design and implementation of tree-based algorithms for use in making complex decisions. Boolean operators only support the complete presence or absence types of decisions and are... more
    • by 
    •   6  
      Number TheoryArtificial IntelligenceStatisticsNetwork Security
Algebraic problems are full of boring routine algorithms. This paper discusses elegant methods for exploring symmetrical patterns as alternative. The tactics this paper illustrates to solve algebraic problems are factoring, the creation... more
    • by 
A student attrition research methodology and results of attrition research at Barber-Scotia College are examined. Questionnaire responses from 137 students indicated the degree of student satisfaction with academic and social service's... more
    • by 
    •   3  
      Research MethodologyHigher EducationPolitical Science
Ask the graduates and the employers of graduates of computing information sciences and engineering (CISE) one area in which more formal training would have been beneficial while still in college. It is not surprising that both the... more
    • by 
This research investigated the problems and solutions to cyberspace identity theft. Collections of literature were reviewed to identify the issues and solutions to cyberspace identity theft. A survey was administered to a focus group of... more
    • by 
This paper presents research results on the relevance and need for information technology certification, with a particular focus on CompTIA A+ certification. The study focused on the opinions of employers on certification, a critical... more
    • by 
    • Computer Science
Several encryption algorithms exist today for securing data in storage and transmission over network systems. The choice of encryption algorithms must weigh performance requirements against the call for protection of sensitive data. This... more
    • by 
This study investigated the potential effectiveness of the Electronic Performance Support System (EPSS) in supporting the clinical activities of physicians. A research questionnaire was used to tap information about the perceptions of... more
    • by 
Several encryption algorithms exist today for securing data in storage and transmission over network systems. The choice of encryption algorithms must weigh performance requirements against the call for protection of sensitive data. This... more
    • by 
Recommendations for the quantification of serum monoclonal components (MC). The quantification of MC provides a surrogate for monitoring the size of the population of malignant cells in patients affected by plasma cell disease (PCD).... more
    • by 
    • Clas
Abstract: This paper focuses on the concepts of reliability, construct and content validation of mathematics achievement test items. Methods for constructing domain specifications for a pool of mathematics items are discussed. Mathematics... more
    • by 
Effective teaching and learning online pose several institutional challenges worldwide. This paper examines current theory and practices of online teaching, in efforts to promote the best practices of effective online teaching and... more
    • by 
    •   6  
      AssessmentLearning and TeachingVirtual TeamsOnline Learning