Information and communication Technology is a gateway through which large population of students has been addressed. Mobile learning technology the latest arrival highly changing the way the students learn, interact, access up to data information. It mainly satisfies the current and future generation which needs information at the earliest rather than later few touches. The World Wide Web acts as an interface in E- learning as well as in mobile learning (M-learning) environments. It supports and facilitates the delivery of teaching and learning materials. M-learning provides quality educational content with the help of semantic web technologies like Ontology. This study presents Mobile Learning framework for making efficient learning with a case study on cyber security.
Information security approach in open distributed multi agent virtual learnin...ijcsit
This paper presented the main information, security problems and threats in open multi-agent distributed
e-learning information systems and Proposed various approaches to solve information security attacks in
virtual learning environment using service oriented architecture which based on multi-agent information
systems architecture, the solution on the multi-agent learning information system implementation based on
the implementation of two types of systems the first system with the centralized mobile agent information
security management and the second system with decentralized mobile agents security management, and
proposed the migration behavior simulation for their active software components (software agents) .
ATTITUDES OF SAUDI UNIVERSITIES FACULTY MEMBERS TOWARDS USING LEARNING MANAGE...Hisham Hussein
The research aims to identify the Attitudes of faculty members at Saudi Universities towards using E-learning Management System JUSUR, which follows the National Center for E-learning. A descriptive analysis was used as a research methodology. (90) participants in this research were asked to complete a 5-point Likert scale questionnaire, which consists of (34) items, classified in three main categories, and (2) items as probe statements. Validity and reliability of the questionnaire were ensured. Statistical treatments such as percentages, means, frequencies, and analysis of variance ANOVA were conducted. The results showed a positive Attitudes of the members of the faculty at Saudi University towards E-learning management system JUSUR, although it has not activated in a sufficient way yet, the results showed how their needs for training in using the system and in particular learning content management and file sharing, forums, and Questions Bank. Moreover, results showed no difference in attitudes towards using the system among the faculty members regarding gender or the types of colleges humanitarian, scientific and health. The paper has 9 tables, 9 shapes, and 20 references.
http://www.tojet.net/articles/v10i2/1025.pdf
Information and communication Technology is a gateway through which large population of students has been addressed. Mobile learning technology the latest arrival highly changing the way the students learn, interact, access up to data information. It mainly satisfies the current and future generation which needs information at the earliest rather than later few touches. The World Wide Web acts as an interface in E- learning as well as in mobile learning (M-learning) environments. It supports and facilitates the delivery of teaching and learning materials. M-learning provides quality educational content with the help of semantic web technologies like Ontology. This study presents Mobile Learning framework for making efficient learning with a case study on cyber security.
Information security approach in open distributed multi agent virtual learnin...ijcsit
This paper presented the main information, security problems and threats in open multi-agent distributed
e-learning information systems and Proposed various approaches to solve information security attacks in
virtual learning environment using service oriented architecture which based on multi-agent information
systems architecture, the solution on the multi-agent learning information system implementation based on
the implementation of two types of systems the first system with the centralized mobile agent information
security management and the second system with decentralized mobile agents security management, and
proposed the migration behavior simulation for their active software components (software agents) .
ATTITUDES OF SAUDI UNIVERSITIES FACULTY MEMBERS TOWARDS USING LEARNING MANAGE...Hisham Hussein
The research aims to identify the Attitudes of faculty members at Saudi Universities towards using E-learning Management System JUSUR, which follows the National Center for E-learning. A descriptive analysis was used as a research methodology. (90) participants in this research were asked to complete a 5-point Likert scale questionnaire, which consists of (34) items, classified in three main categories, and (2) items as probe statements. Validity and reliability of the questionnaire were ensured. Statistical treatments such as percentages, means, frequencies, and analysis of variance ANOVA were conducted. The results showed a positive Attitudes of the members of the faculty at Saudi University towards E-learning management system JUSUR, although it has not activated in a sufficient way yet, the results showed how their needs for training in using the system and in particular learning content management and file sharing, forums, and Questions Bank. Moreover, results showed no difference in attitudes towards using the system among the faculty members regarding gender or the types of colleges humanitarian, scientific and health. The paper has 9 tables, 9 shapes, and 20 references.
http://www.tojet.net/articles/v10i2/1025.pdf
Review and analysis of machine learning and soft computing approaches for use...IJwest
The adequacy of user models depends mainly on the accuracy and precision of information that is retrieved to the user. The real challenge in user modelling studies is due to the inadequacy of data, improper use of techniques, noise within the data and imprecise nature of human behavior. For the best results of user modelling, one should choose an appropriate way to do it i.e. by selecting the best suitable approach for the desired domain. Machine learning and Soft computing Techniques have the ability to handle the uncertainty and are extensively being used for user modeling purpose. This paper reviews various approaches of user modeling and critically analyzes the machine learning and soft computing techniques that have successfully captured and formally modelled the human behavior.
Towards a new ontology of the Moroccan Post-baccalaureate learner profile for...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Supervised learning techniques for virtual military trainingElena Susnea
Susnea E. (2010). Supervised learning techniques for virtual military training, In Proceedings of "The 5th International Conference on Virtual Learning - ICVL 2010", (pp. 513-517).
Learner Model's Utilization in the e-Learning Environments
Vija VAGALE and Laila NIEDRITE
Faculty of Computing, University of Latvia, Raina boulv. 19, Riga, Latvia
Abstract. In the field of personalized systems big role is granted to the adaptive elearning environments. The task of these systems is very important and complicated. With their participation the learner gains exactly the knowledge he
needs most, and the system adapts to user needs, expectations and his individual features. In this kind of systems information about learner is saved in the learner model also known as the user model and student model. For the system to be able to perceive and analyze user activities correctly, is necessary to define what kind of information about the learner has to be saved. The article gives an overview about already existing learner models, their utilization methods and also it offers their comparison according to various criteria.
RISKS AND REMEDIES IN E-LEARNING SYSTEMIJNSA Journal
One of the most effective applications of Information and Communication Technology (ICT) is the emergence of E-Learning. Considering the importance and need of E-Learning, recent years have seen a drastic change of learning methodologies in Higher Education. Undoubtedly ,the three main entities of E-Learning system can be considered as Student, Teacher & Controlling Authority and there will be different level, but a good E-Learning system needs total integrity among all entities in every level. Apart from integrity enforcement, security enforcement in the whole system is the other crucial way to organize the it. As internet is the backbone of the entire system which is inherently insecure , during transaction of message in E-Learning system, hackers attack by utilising different loopholes of technology. So different security measures are required to be imposed on the system. In this paper, emphasis is given on different risks called e-risks and their remedies called e-remedies to build trust in the minds of all participants of E-Learning system.
Learner Ontological Model for Intelligent Virtual Collaborative Learning Envi...ijceronline
An enacting approach to intelligent virtual collaborative learning model is explored through the lens of critical ontology. This ontological model enables to reuse of the domain knowledge and to make the knowledge explicitly available to the agent working as an Expert System, which uses the operational knowledge in collaborative learning environment. This ontological model used by the agent to identify the preliminary competency level of the user. This environment offers personalized education to each learner in accordance with his/her learning preferences, and learning capabilities. Here the factors considered to identify the learning capability taken are demographic profile, age, family profile, basic educational qualification and basic competency scale. The conception of heuristics is then used by the agent to determine the effectiveness of the learner by referring the different parameters of the learner available in the ontological model.To help getting over this, the paper describes the experience on using an ontological model for collaborative learning to relate and integrate the history of the learner by maintaining the history of learner in collaborative learning environment that will be used by the Multi-Objective Grey Situation Decision Making Theory to infer the understanding level of user and produces the conditional content to the user
A REGISTRY BASED DISCOVERY MECHANISM FOR E-LEARNING WEB SERVICEScscpconf
E-learning is currently taking the shape of a Web Service in various applications i.e. learners
can search for suitable content, book it, pay for it and consume it. This paper shows how the
search aspects for e-learning content can technically be combined with the recent
standardization efforts that aim at content exchangeability and efficient reuse. A repository for
learning object publication and search is proposed that essentially adapts the UDDI framework
used in commercial Web Services to the e-learning context. To adopt Web Services technology
towards the reusability and aggregation of e-learning services, the conceptual Web Services
architecture and its building blocks need to be augmented. The objective of this research is to
design broker based registry architecture for e- Web services which facilitates effective elearning
content/service discovery for the consumption or composition. The implementation
followed by experimentation showed that, the proposed e-learning discovery architecture
facilitates effective discovery with moderate performance in terms of overall response.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Investigating a theoretical framework for e-learning technology acceptance IJECEIAES
E-learning has gained recognition and fame in delivering and distributing educational resources, and the same has become possible with the occurrence of Internet and Web technologies. The research seeks to determine the factors that influence students' acceptance of E-learning and to find out the way these factors determine the students' intention to employ E-learning. A theoretical framework was developed based on the technology acceptance model (TAM). To obtain information from the 270 university students who utilized the E-learning system, a questionnaire was formulated. The results revealed that “social influence, perceived enjoyment, self-efficacy, perceived usefulness, and perceived ease of use” are the strongest and most important predictors in the intention of and students towards E-learning systems. The outcomes offer practical implications for practitioners, lawmakers, and developers in effective E-learning systems implementation to improve ongoing interests and activities of university students in a virtual E-learning atmosphere, valuable recommendations for E-learning practices are given by the research findings, and these may turn out to be as guidelines for the efficient design of E-learning systems.
AN ENHANCED ELECTRONIC TRANSCRIPT SYSTEM (E-ETS)ijcsit
Transcript is an inventory system holding student academic record. This system has been implemented
conventional, electronically or implemented using web services approaches which have been devoid of
mobile computing approach and system classification rules. The proposed architecture provides an
assiduous pathway for the implementation of the aforementioned issues. This architecture has the
propensity for cutting down operational cost and hardcopy documentation while handling organizational
procedures and processes
IoT-based students interaction framework using attention-scoring assessment i...eraser Juan José Calderón
IoT-based students interaction framework using attention-scoring assessment in eLearning. Muhammad Farhan a,b, Sohail Jabbar a,c,d, Muhammad Aslam b, Mohammad Hammoudeh e, Mudassar Ahmad c, Shehzad Khalid f, Murad Khan g,Kijun Han d,
ADAPTIVE LEARNING MANAGEMENT SYSTEM USING SEMANTIC WEB TECHNOLOGIESijsc
Ontologies and semantic web services are the basics of next generation semantic web. This upcoming
technologies are useful in many fields such as bioinformatics, business collaboration, Data integration and
etc. E-learning is also the field in which semantic web technologies can be used to provide dynamism in
learning methodologies. E-learning includes set of tasks which may be instructional design, content
development, authoring, delivery, assessment, feedback and etc. that can be sequenced and composed as
workflow. Web based Learning Management Systems should concentrate on how to satisfy the e-learners
requirements. In this paper we have suggested the theoretical framework ALMS-Adaptive Learning
management System which focuses on three aspects 1) Extracting the knowledge from the use's interaction,
behaviour and actions and translate them into semantics which are represented as Ontologies 2) Find the
Learner style from the knowledge base and 3)deriving and composing the workflow depending upon the
learner style. The intelligent agents are used in each module of the framework to perform reasoning and
finally the personalized workflow for the e-learner has been recommended.
Although of the semantic web technologies utilization in the learning development field is a new research area, some authors have already proposed their idea of how an effective that operate. Specifically, from analysis of the literature in the field, we have identified three different types of existing applications that actually employ these technologies to support learning. These applications aim at: Enhancing the learning objects reusability by linking them to an ontological description of the domain, or, more generally, describe relevant dimension of the learning process in an ontology, then; providing a comprehensive authoring system to retrieve and organize web material into a learning course, and constructing advanced strategies to present annotated resources to the user, in the form of browsing facilities, narrative generation and final rendering of a course. On difference with the approaches cited above, here we propose an approach that is modeled on narrative studies and on their transposition in the digital world. In the rest of the paper, we present the theoretical basis that inspires this approach, and show some examples that are guiding our implementation and testing of these ideas within e-learning. By emerging the idea of the ontologies are recognized as the most important component in achieving semantic interoperability of e-learning resources. The benefits of their use have already been recognized in the learning technology community. In order to better define different aspects of ontology applications in e-learning, researchers have given several classifications of ontologies. We refer to a general one given in that differentiates between three dimensions ontologies can describe: content, context, and structure. Most of the present research has been dedicated to the first group of ontologies. A well-known example of such an ontology is based on the ACM Computer Classification System (ACM CCS) and defined by Resource Description Framework Schema (RDFS). It’s used in the MOODLE to classify learning objects with a goal to improve searching. The chapter will cover the terms of the semantic web and e-learning systems design and management in e-learning (MOODLE) and some of studies depend on e-learning and semantic web, thus the tools will be used in this paper, and lastly we shall discuss the expected contribution. The special attention will be putted on the above topics.
An educational bluetooth quizzing application in androidijwmn
Bluetooth is one of the most prevalent technologies available on mobile phones. One of the key questions
how to harness this technology in an educational manner in universities and schools. This paper is about a
Bluetooth quizzing system which will be used to administer quizzes to students of a university. The
Bluetooth quizzing application consists of a server and client mobile Android application. It will utilize a
queuing system to allow many clients to connect simultaneously to the server. When clients connect, they
can register or choose the option to complete a quiz that the lecturer selected. Results are automatically
sent when quiz is done from the client application. Data analysis can then be done to review the progress of
students.
Review and analysis of machine learning and soft computing approaches for use...IJwest
The adequacy of user models depends mainly on the accuracy and precision of information that is retrieved to the user. The real challenge in user modelling studies is due to the inadequacy of data, improper use of techniques, noise within the data and imprecise nature of human behavior. For the best results of user modelling, one should choose an appropriate way to do it i.e. by selecting the best suitable approach for the desired domain. Machine learning and Soft computing Techniques have the ability to handle the uncertainty and are extensively being used for user modeling purpose. This paper reviews various approaches of user modeling and critically analyzes the machine learning and soft computing techniques that have successfully captured and formally modelled the human behavior.
Towards a new ontology of the Moroccan Post-baccalaureate learner profile for...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Supervised learning techniques for virtual military trainingElena Susnea
Susnea E. (2010). Supervised learning techniques for virtual military training, In Proceedings of "The 5th International Conference on Virtual Learning - ICVL 2010", (pp. 513-517).
Learner Model's Utilization in the e-Learning Environments
Vija VAGALE and Laila NIEDRITE
Faculty of Computing, University of Latvia, Raina boulv. 19, Riga, Latvia
Abstract. In the field of personalized systems big role is granted to the adaptive elearning environments. The task of these systems is very important and complicated. With their participation the learner gains exactly the knowledge he
needs most, and the system adapts to user needs, expectations and his individual features. In this kind of systems information about learner is saved in the learner model also known as the user model and student model. For the system to be able to perceive and analyze user activities correctly, is necessary to define what kind of information about the learner has to be saved. The article gives an overview about already existing learner models, their utilization methods and also it offers their comparison according to various criteria.
RISKS AND REMEDIES IN E-LEARNING SYSTEMIJNSA Journal
One of the most effective applications of Information and Communication Technology (ICT) is the emergence of E-Learning. Considering the importance and need of E-Learning, recent years have seen a drastic change of learning methodologies in Higher Education. Undoubtedly ,the three main entities of E-Learning system can be considered as Student, Teacher & Controlling Authority and there will be different level, but a good E-Learning system needs total integrity among all entities in every level. Apart from integrity enforcement, security enforcement in the whole system is the other crucial way to organize the it. As internet is the backbone of the entire system which is inherently insecure , during transaction of message in E-Learning system, hackers attack by utilising different loopholes of technology. So different security measures are required to be imposed on the system. In this paper, emphasis is given on different risks called e-risks and their remedies called e-remedies to build trust in the minds of all participants of E-Learning system.
Learner Ontological Model for Intelligent Virtual Collaborative Learning Envi...ijceronline
An enacting approach to intelligent virtual collaborative learning model is explored through the lens of critical ontology. This ontological model enables to reuse of the domain knowledge and to make the knowledge explicitly available to the agent working as an Expert System, which uses the operational knowledge in collaborative learning environment. This ontological model used by the agent to identify the preliminary competency level of the user. This environment offers personalized education to each learner in accordance with his/her learning preferences, and learning capabilities. Here the factors considered to identify the learning capability taken are demographic profile, age, family profile, basic educational qualification and basic competency scale. The conception of heuristics is then used by the agent to determine the effectiveness of the learner by referring the different parameters of the learner available in the ontological model.To help getting over this, the paper describes the experience on using an ontological model for collaborative learning to relate and integrate the history of the learner by maintaining the history of learner in collaborative learning environment that will be used by the Multi-Objective Grey Situation Decision Making Theory to infer the understanding level of user and produces the conditional content to the user
A REGISTRY BASED DISCOVERY MECHANISM FOR E-LEARNING WEB SERVICEScscpconf
E-learning is currently taking the shape of a Web Service in various applications i.e. learners
can search for suitable content, book it, pay for it and consume it. This paper shows how the
search aspects for e-learning content can technically be combined with the recent
standardization efforts that aim at content exchangeability and efficient reuse. A repository for
learning object publication and search is proposed that essentially adapts the UDDI framework
used in commercial Web Services to the e-learning context. To adopt Web Services technology
towards the reusability and aggregation of e-learning services, the conceptual Web Services
architecture and its building blocks need to be augmented. The objective of this research is to
design broker based registry architecture for e- Web services which facilitates effective elearning
content/service discovery for the consumption or composition. The implementation
followed by experimentation showed that, the proposed e-learning discovery architecture
facilitates effective discovery with moderate performance in terms of overall response.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Investigating a theoretical framework for e-learning technology acceptance IJECEIAES
E-learning has gained recognition and fame in delivering and distributing educational resources, and the same has become possible with the occurrence of Internet and Web technologies. The research seeks to determine the factors that influence students' acceptance of E-learning and to find out the way these factors determine the students' intention to employ E-learning. A theoretical framework was developed based on the technology acceptance model (TAM). To obtain information from the 270 university students who utilized the E-learning system, a questionnaire was formulated. The results revealed that “social influence, perceived enjoyment, self-efficacy, perceived usefulness, and perceived ease of use” are the strongest and most important predictors in the intention of and students towards E-learning systems. The outcomes offer practical implications for practitioners, lawmakers, and developers in effective E-learning systems implementation to improve ongoing interests and activities of university students in a virtual E-learning atmosphere, valuable recommendations for E-learning practices are given by the research findings, and these may turn out to be as guidelines for the efficient design of E-learning systems.
AN ENHANCED ELECTRONIC TRANSCRIPT SYSTEM (E-ETS)ijcsit
Transcript is an inventory system holding student academic record. This system has been implemented
conventional, electronically or implemented using web services approaches which have been devoid of
mobile computing approach and system classification rules. The proposed architecture provides an
assiduous pathway for the implementation of the aforementioned issues. This architecture has the
propensity for cutting down operational cost and hardcopy documentation while handling organizational
procedures and processes
IoT-based students interaction framework using attention-scoring assessment i...eraser Juan José Calderón
IoT-based students interaction framework using attention-scoring assessment in eLearning. Muhammad Farhan a,b, Sohail Jabbar a,c,d, Muhammad Aslam b, Mohammad Hammoudeh e, Mudassar Ahmad c, Shehzad Khalid f, Murad Khan g,Kijun Han d,
ADAPTIVE LEARNING MANAGEMENT SYSTEM USING SEMANTIC WEB TECHNOLOGIESijsc
Ontologies and semantic web services are the basics of next generation semantic web. This upcoming
technologies are useful in many fields such as bioinformatics, business collaboration, Data integration and
etc. E-learning is also the field in which semantic web technologies can be used to provide dynamism in
learning methodologies. E-learning includes set of tasks which may be instructional design, content
development, authoring, delivery, assessment, feedback and etc. that can be sequenced and composed as
workflow. Web based Learning Management Systems should concentrate on how to satisfy the e-learners
requirements. In this paper we have suggested the theoretical framework ALMS-Adaptive Learning
management System which focuses on three aspects 1) Extracting the knowledge from the use's interaction,
behaviour and actions and translate them into semantics which are represented as Ontologies 2) Find the
Learner style from the knowledge base and 3)deriving and composing the workflow depending upon the
learner style. The intelligent agents are used in each module of the framework to perform reasoning and
finally the personalized workflow for the e-learner has been recommended.
Although of the semantic web technologies utilization in the learning development field is a new research area, some authors have already proposed their idea of how an effective that operate. Specifically, from analysis of the literature in the field, we have identified three different types of existing applications that actually employ these technologies to support learning. These applications aim at: Enhancing the learning objects reusability by linking them to an ontological description of the domain, or, more generally, describe relevant dimension of the learning process in an ontology, then; providing a comprehensive authoring system to retrieve and organize web material into a learning course, and constructing advanced strategies to present annotated resources to the user, in the form of browsing facilities, narrative generation and final rendering of a course. On difference with the approaches cited above, here we propose an approach that is modeled on narrative studies and on their transposition in the digital world. In the rest of the paper, we present the theoretical basis that inspires this approach, and show some examples that are guiding our implementation and testing of these ideas within e-learning. By emerging the idea of the ontologies are recognized as the most important component in achieving semantic interoperability of e-learning resources. The benefits of their use have already been recognized in the learning technology community. In order to better define different aspects of ontology applications in e-learning, researchers have given several classifications of ontologies. We refer to a general one given in that differentiates between three dimensions ontologies can describe: content, context, and structure. Most of the present research has been dedicated to the first group of ontologies. A well-known example of such an ontology is based on the ACM Computer Classification System (ACM CCS) and defined by Resource Description Framework Schema (RDFS). It’s used in the MOODLE to classify learning objects with a goal to improve searching. The chapter will cover the terms of the semantic web and e-learning systems design and management in e-learning (MOODLE) and some of studies depend on e-learning and semantic web, thus the tools will be used in this paper, and lastly we shall discuss the expected contribution. The special attention will be putted on the above topics.
An educational bluetooth quizzing application in androidijwmn
Bluetooth is one of the most prevalent technologies available on mobile phones. One of the key questions
how to harness this technology in an educational manner in universities and schools. This paper is about a
Bluetooth quizzing system which will be used to administer quizzes to students of a university. The
Bluetooth quizzing application consists of a server and client mobile Android application. It will utilize a
queuing system to allow many clients to connect simultaneously to the server. When clients connect, they
can register or choose the option to complete a quiz that the lecturer selected. Results are automatically
sent when quiz is done from the client application. Data analysis can then be done to review the progress of
students.
This worksheet was designed for my students, the purpose of this worksheet is to guide them on how to accurately answer the DW question in SPM English paper.
AN ADAPTIVE AND INTELLIGENT TUTOR BY EXPERT SYSTEMS FOR MOBILE DEVICESijmpict
Mobile Learning (M-Learning) is an emerging discipline in the area of education and educational technology. So researchers are trying to optimize and expanding its application in the field of education. The aim of this paper is to investigate the role of mobile devices and expert systems in disseminating and supporting the knowledge gained by intelligent tutors and to propose a system based on integration of intelligent M-Learning with expert systems. It acts as an intelligent tutor which can perform three processes - pre-test, learning concept and post-test - according to characteristic of the learner. The proposed system can improves the education efficiency highly as well as decreases costs. As a result, every time and everywhere (ETEW) simple and cheap learning would be provided via SMS, MMS and so on in this system. The global intention of M-Learning is to make learning “a way of being”.
Collaborative Learning of Organisational KnolwedgeWaqas Tariq
This paper presents recent research into methods used in Australian Indigenous Knowledge sharing and looks at how these can support the creation of suitable collaborative envi- ronments for timely organisational learning. The protocols and practices as used today and in the past by Indigenous communities are presented and discussed in relation to their relevance to a personalised system of knowledge sharing in modern organisational cultures. This research focuses on user models, knowledge acquisition and integration of data for constructivist learning in a networked repository of or- ganisational knowledge. The data collected in the repository is searched to provide collections of up-to-date and relevant material for training in a work environment. The aim is to improve knowledge collection and sharing in a team envi- ronment. This knowledge can then be collated into a story or workflow that represents the present knowledge in the organisation.
Solving The Problem of Adaptive E-Learning By Using Social NetworksEswar Publications
This paper propose an enhanced E-Learning Social Network Exploiting Approach focused around chart model and clustering algorithm, which can consequently gathering dispersed e-learners with comparative premiums and make fitting suggestions, which can at last upgrade the collective learning among comparable e-learners. Through closeness
revelation, trust weights overhaul and potential companions change, the algorithm actualized a programmed adjusted trust association with progressively upgraded fulfillments.
AN ADAPTIVE REUSABLE LEARNING OBJECT FOR E-LEARNING USING COGNITIVE ARCHITECTUREacijjournal
Nowadays, a huge amount of ambiguous e-learning materials are available in World Wide Web
irrespective of various objectives. These digital educational resources can be reused and shared from
centralized online repository and it will avoid the redundant learning material. The main goal is to design
consistent adaptable e-learning course material for web-based education system with emphasis on the
quality of learning. This can be done by organizing learning object in a prescribed manner and it can be
reused in feature. Such reusable learning objects are enhanced further to become adaptive reusable
learning objects that are virtually cognitive and responsive towards the specific needs of the user/customer.
This paper proposes the cognitive architecture to offer an adaptive reusable objects (RLO) based on
individual profile of e-learner besides their cognitive behaviour while learning.
OLAP based Scaffolding to support Personalized Synchronous e-Learning IJMIT JOURNAL
The advent of asynchronous web based learning systems has helped the learner in a self paced,
personalized and flexible learning style. It can be even more useful with a supportive synchronous tutorial
(question-answer) session. The challenge is to provide sufficient information to the instructor about the
learner’s experience in that particular course at run time. Online analytical processing (OLAP) is a very
useful technique in producing such run time information in the form of reports. In this paper we have
designed an automated scaffolding technique to hold this vital information about the learner which we have
obtained by OLAP techniques on the log data of the LMS users. We have also proposed an overall
architecture of the scaffolding where this information can be easily accessed and used by the instructor in
the synchronous tutorial session to make the system more adaptive.
Following the user’s interests in mobile context aware recommender systemsBouneffouf Djallel
The wide development of mobile applications provides a considerable amount of data of all types (images, texts, sounds, videos, etc.). In this sense, Mobile Context-aware Recommender Systems (MCRS) suggest the user suitable information depending on her/his situation and interests. Two key questions have to be considered 1) how to recommend the user information that follows his/her interests evolution? 2) how to model the user’s situation and its related interests? To the best of our knowledge, no existing work proposing a MCRS tries to answer both questions as we do. This paper describes an ongoing work on the implementation of a MCRS based on the hybrid-ε-greedy algorithm we propose, which combines the standard ε-greedy algorithm and both content-based filtering and case-based reasoning techniques.
Designing and modeling of a multi-agent adaptive learning system (MAALS) usin...IJECEIAES
Several researches in the field of adaptive learning systems has developed systems and techniques to guide the learner and reduce cognitive overload, making learning adaptation essential to better understand preferences, the constraints and learning habits of the learner. Thus, it is particularly advisable to propose online learning systems that are able to collect and detect information describing the learning process in an automatic and deductive way, and to rely on this information to follow the learner in real time and offer him training according to his dynamic learning pace. This article proposes a multi-agent adaptive learning system to make a real decision based on a current learning situation. This decision will be made by performing a hypride cycle of the Case-Based Reasonning approach in order to follow the learner and provide him with an individualized learning path according to Felder Silverman learning style model and his learning traces to predict his future learning status.To ensure this decision, we assign at each stage of the Incremental Hybrid Case-Based Reasoning at least one active agent performing a particular task and a broker agent that collaborates between the different agents in the system.
A Method of Designing Student Model in Ubiquitous Environment ijujournal
Context-aware ubiquitous learning combines context-awareness with wireless and mobile technologies to
observe the situation of students in the real world and provides personalized guidance accordingly.
Student Model creates student's history logs automatically and maintains history of subject content
requested. It also offers information on student's hardware capabilities, students preferences, knowledge
level and student status. This information can be utilized to respond to new student's request from previous
similar request. A Ubiquitous student model aims to identify student’s needs, characteristics and situations.
In this paper, we have proposed a method of designing student model, that provides personalized subject
content adaptation.
A METHOD OF DESIGNING STUDENT MODEL IN UBIQUITOUS ENVIRONMENTijujournal
Context-aware ubiquitous learning combines context-awareness with wireless and mobile technologies to
observe the situation of students in the real world and provides personalized guidance accordingly.
Student Model creates student's history logs automatically and maintains history of subject content
requested. It also offers information on student's hardware capabilities, students preferences, knowledge
level and student status. This information can be utilized to respond to new student's request from previous
similar request. A Ubiquitous student model aims to identify student’s needs, characteristics and situations.
In this paper, we have proposed a method of designing student model, that provides personalized subject
content adaptation.
A Method of Designing Student Model in Ubiquitous Environment ijujournal
Context-aware ubiquitous learning combines context-awareness with wireless and mobile technologies to
observe the situation of students in the real world and provides personalized guidance accordingly.
Student Model creates student's history logs automatically and maintains history of subject content
requested. It also offers information on student's hardware capabilities, students preferences, knowledge
level and student status. This information can be utilized to respond to new student's request from previous
similar request. A Ubiquitous student model aims to identify student’s needs, characteristics and situations.
In this paper, we have proposed a method of designing student model, that provides personalized subject
content adaptation.
Big data integration for transition from e-learning to smart learning framework eraser Juan José Calderón
Big data integration for transition from e-learning to smart learning framework . Dr. Prakash Kumar Udupi Mr. Puttaswamy Malali Mr. Herald Noronha Department of Computing Department of Computing Department of Computing Middle East College Middle East College Middle East College .
A design of a multi-agent recommendation system using ontologies and rule-bas...IJECEIAES
Learners attend their courses in remote or hybrid systems find it difficult to follow one size fits all courses. These difficulties have increased with the pandemic, lockdown, and the stress they cause. Hence, the role of adaptive systems to recommend personalized learning resources according to the learner's profile. The purpose of this paper is to design a system for recommending learning objects according learner's condition, including his mental state, his COVID-19 history, as well as his social situation and ability to connect to the e-learning system on a regular basis. In this article, we present an architecture of a recommendation system for personalized learning objects based on ontologies and on rule-based reasoning, and we will also describe the inference rules required for the adaptation of the educational content to the needs of the learners, taking into account the learner’s health and mental state, as well as his social situation. The system designed, and validated using the unified modeling language (UML). It additionally allows teachers to have a holistic view of learners’ progress and situations.
Cracking the Workplace Discipline Code Main.pptxWorkforce Group
Cultivating and maintaining discipline within teams is a critical differentiator for successful organisations.
Forward-thinking leaders and business managers understand the impact that discipline has on organisational success. A disciplined workforce operates with clarity, focus, and a shared understanding of expectations, ultimately driving better results, optimising productivity, and facilitating seamless collaboration.
Although discipline is not a one-size-fits-all approach, it can help create a work environment that encourages personal growth and accountability rather than solely relying on punitive measures.
In this deck, you will learn the significance of workplace discipline for organisational success. You’ll also learn
• Four (4) workplace discipline methods you should consider
• The best and most practical approach to implementing workplace discipline.
• Three (3) key tips to maintain a disciplined workplace.
Kseniya Leshchenko: Shared development support service model as the way to ma...Lviv Startup Club
Kseniya Leshchenko: Shared development support service model as the way to make small projects with small budgets profitable for the company (UA)
Kyiv PMDay 2024 Summer
Website – www.pmday.org
Youtube – https://www.youtube.com/startuplviv
FB – https://www.facebook.com/pmdayconference
Skye Residences | Extended Stay Residences Near Toronto Airportmarketingjdass
Experience unparalleled EXTENDED STAY and comfort at Skye Residences located just minutes from Toronto Airport. Discover sophisticated accommodations tailored for discerning travelers.
Website Link :
https://skyeresidences.com/
https://skyeresidences.com/about-us/
https://skyeresidences.com/gallery/
https://skyeresidences.com/rooms/
https://skyeresidences.com/near-by-attractions/
https://skyeresidences.com/commute/
https://skyeresidences.com/contact/
https://skyeresidences.com/queen-suite-with-sofa-bed/
https://skyeresidences.com/queen-suite-with-sofa-bed-and-balcony/
https://skyeresidences.com/queen-suite-with-sofa-bed-accessible/
https://skyeresidences.com/2-bedroom-deluxe-queen-suite-with-sofa-bed/
https://skyeresidences.com/2-bedroom-deluxe-king-queen-suite-with-sofa-bed/
https://skyeresidences.com/2-bedroom-deluxe-queen-suite-with-sofa-bed-accessible/
#Skye Residences Etobicoke, #Skye Residences Near Toronto Airport, #Skye Residences Toronto, #Skye Hotel Toronto, #Skye Hotel Near Toronto Airport, #Hotel Near Toronto Airport, #Near Toronto Airport Accommodation, #Suites Near Toronto Airport, #Etobicoke Suites Near Airport, #Hotel Near Toronto Pearson International Airport, #Toronto Airport Suite Rentals, #Pearson Airport Hotel Suites
Memorandum Of Association Constitution of Company.pptseri bangash
www.seribangash.com
A Memorandum of Association (MOA) is a legal document that outlines the fundamental principles and objectives upon which a company operates. It serves as the company's charter or constitution and defines the scope of its activities. Here's a detailed note on the MOA:
Contents of Memorandum of Association:
Name Clause: This clause states the name of the company, which should end with words like "Limited" or "Ltd." for a public limited company and "Private Limited" or "Pvt. Ltd." for a private limited company.
https://seribangash.com/article-of-association-is-legal-doc-of-company/
Registered Office Clause: It specifies the location where the company's registered office is situated. This office is where all official communications and notices are sent.
Objective Clause: This clause delineates the main objectives for which the company is formed. It's important to define these objectives clearly, as the company cannot undertake activities beyond those mentioned in this clause.
www.seribangash.com
Liability Clause: It outlines the extent of liability of the company's members. In the case of companies limited by shares, the liability of members is limited to the amount unpaid on their shares. For companies limited by guarantee, members' liability is limited to the amount they undertake to contribute if the company is wound up.
https://seribangash.com/promotors-is-person-conceived-formation-company/
Capital Clause: This clause specifies the authorized capital of the company, i.e., the maximum amount of share capital the company is authorized to issue. It also mentions the division of this capital into shares and their respective nominal value.
Association Clause: It simply states that the subscribers wish to form a company and agree to become members of it, in accordance with the terms of the MOA.
Importance of Memorandum of Association:
Legal Requirement: The MOA is a legal requirement for the formation of a company. It must be filed with the Registrar of Companies during the incorporation process.
Constitutional Document: It serves as the company's constitutional document, defining its scope, powers, and limitations.
Protection of Members: It protects the interests of the company's members by clearly defining the objectives and limiting their liability.
External Communication: It provides clarity to external parties, such as investors, creditors, and regulatory authorities, regarding the company's objectives and powers.
https://seribangash.com/difference-public-and-private-company-law/
Binding Authority: The company and its members are bound by the provisions of the MOA. Any action taken beyond its scope may be considered ultra vires (beyond the powers) of the company and therefore void.
Amendment of MOA:
While the MOA lays down the company's fundamental principles, it is not entirely immutable. It can be amended, but only under specific circumstances and in compliance with legal procedures. Amendments typically require shareholder
Putting the SPARK into Virtual Training.pptxCynthia Clay
This 60-minute webinar, sponsored by Adobe, was delivered for the Training Mag Network. It explored the five elements of SPARK: Storytelling, Purpose, Action, Relationships, and Kudos. Knowing how to tell a well-structured story is key to building long-term memory. Stating a clear purpose that doesn't take away from the discovery learning process is critical. Ensuring that people move from theory to practical application is imperative. Creating strong social learning is the key to commitment and engagement. Validating and affirming participants' comments is the way to create a positive learning environment.
Enterprise Excellence is Inclusive Excellence.pdfKaiNexus
Enterprise excellence and inclusive excellence are closely linked, and real-world challenges have shown that both are essential to the success of any organization. To achieve enterprise excellence, organizations must focus on improving their operations and processes while creating an inclusive environment that engages everyone. In this interactive session, the facilitator will highlight commonly established business practices and how they limit our ability to engage everyone every day. More importantly, though, participants will likely gain increased awareness of what we can do differently to maximize enterprise excellence through deliberate inclusion.
What is Enterprise Excellence?
Enterprise Excellence is a holistic approach that's aimed at achieving world-class performance across all aspects of the organization.
What might I learn?
A way to engage all in creating Inclusive Excellence. Lessons from the US military and their parallels to the story of Harry Potter. How belt systems and CI teams can destroy inclusive practices. How leadership language invites people to the party. There are three things leaders can do to engage everyone every day: maximizing psychological safety to create environments where folks learn, contribute, and challenge the status quo.
Who might benefit? Anyone and everyone leading folks from the shop floor to top floor.
Dr. William Harvey is a seasoned Operations Leader with extensive experience in chemical processing, manufacturing, and operations management. At Michelman, he currently oversees multiple sites, leading teams in strategic planning and coaching/practicing continuous improvement. William is set to start his eighth year of teaching at the University of Cincinnati where he teaches marketing, finance, and management. William holds various certifications in change management, quality, leadership, operational excellence, team building, and DiSC, among others.
Falcon stands out as a top-tier P2P Invoice Discounting platform in India, bridging esteemed blue-chip companies and eager investors. Our goal is to transform the investment landscape in India by establishing a comprehensive destination for borrowers and investors with diverse profiles and needs, all while minimizing risk. What sets Falcon apart is the elimination of intermediaries such as commercial banks and depository institutions, allowing investors to enjoy higher yields.
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s DholeraAvirahi City Dholera
The Tata Group, a titan of Indian industry, is making waves with its advanced talks with Taiwanese chipmakers Powerchip Semiconductor Manufacturing Corporation (PSMC) and UMC Group. The goal? Establishing a cutting-edge semiconductor fabrication unit (fab) in Dholera, Gujarat. This isn’t just any project; it’s a potential game changer for India’s chipmaking aspirations and a boon for investors seeking promising residential projects in dholera sir.
Visit : https://www.avirahi.com/blog/tata-group-dials-taiwan-for-its-chipmaking-ambition-in-gujarats-dholera/
Premium MEAN Stack Development Solutions for Modern BusinessesSynapseIndia
Stay ahead of the curve with our premium MEAN Stack Development Solutions. Our expert developers utilize MongoDB, Express.js, AngularJS, and Node.js to create modern and responsive web applications. Trust us for cutting-edge solutions that drive your business growth and success.
Know more: https://www.synapseindia.com/technology/mean-stack-development-company.html
Affordable Stationery Printing Services in Jaipur | Navpack n PrintNavpack & Print
Looking for professional printing services in Jaipur? Navpack n Print offers high-quality and affordable stationery printing for all your business needs. Stand out with custom stationery designs and fast turnaround times. Contact us today for a quote!
Attending a job Interview for B1 and B2 Englsih learnersErika906060
It is a sample of an interview for a business english class for pre-intermediate and intermediate english students with emphasis on the speking ability.
Unveiling the Secrets How Does Generative AI Work.pdfSam H
At its core, generative artificial intelligence relies on the concept of generative models, which serve as engines that churn out entirely new data resembling their training data. It is like a sculptor who has studied so many forms found in nature and then uses this knowledge to create sculptures from his imagination that have never been seen before anywhere else. If taken to cyberspace, gans work almost the same way.