Virtual University is the environment that with utilizes the appropriate multimedia tools and having good communication infrastructure is a provider of e-learning services, so that usually does not have require to physical location as a traditional university and students are able in any place and at any time be willing to use a lot of services provided, such as e-courses or electronic tests. There are many solutions in order to identify and detect fraud in the online environment that use of these methods can be identified took place fraud, but still is great importance of avoid discussion and fraud detection in virtual university. In this research, we aimed are to investigate a new approach to detect and track fraud in virtual learning
environments by using decision tree. (Chayd model). The results showed that the accuracy of the model is 84.54% which is indicative of high performance and high precision in predicting fraud from the teachers, students and hackers.
A Multimedia Data Mining Framework for Monitoring E-Examination Environmentijma
Academic dishonesty has been a growing concern in e-learning environment due to the fact that eexamination takes place under supervised and unsupervised learning environment despite its huge advantages. The e-examination environment has faced various security breaches such as academic dishonesty (impersonation), identity theft, unauthorised access and illegal assistance as a result of inefficient measures employed. Hence, an efficient framework which will aid the monitoring of the eexamination is needed. This paper reviews the process of mining multimedia data and propose a framework for monitoring the e-examination environment in order to extract images and audio features. The framework has four major phases: data pre-processing, mining, association and post processing. The
pre-processing phases carries out the extraction and transformation of multimedia data features, the mining phase does the classification and clustering of these features, the association does pattern matching while the post processing carries out the knowledge interpretation and reporting. The approach presented in this study will allow for efficient and accurate monitoring of e-examination environment which will help provide adequate security and reduce unethical behaviour in e-examination environment.
Understanding User’s Acceptance of Personal Cloud Computing: Using the Techno...Maurice Dawson
Personal Cloud Computing (PCC) is a rapidly growing technology, addressing the market demand of individual users for access to available and reliable resources. But like other new technologies, concerns and issues have surfaced with the adoption of PCC. Users deciding whether to adopt PCC may be concerned about the ease of use, usefulness, or security risks in the cloud. Negative attitudes toward using a technology have been found to negatively impact the success of that technology. The purpose of this study was to understand users’ acceptance of PCC. The population sample consisted of individual users within the United States between 18 and 80 years of age. The theoretical framework utilized in this study was based on the technology acceptance model (TAM). A web survey was conducted to assess the measurement and understanding of patterns demonstrated by participants. Our results shows that in spite of the potential benefits of PCC, security and privacy risks are deterring many users from moving towards PCC.
Technological Factors Affecting Computer Aided Learning Among Students Attend...AJHSSR Journal
Computer Assisted Learning (CAL) is a method of acquiring knowledge using electronic media which is gained using electronic media which is gaining recognition among students. This requires access to computers and considerable awareness on information technology. Previous empirical studies have underscored the important roles of instructional materials in the classroom studies. The objective of this study was to determine technological factors affecting computer aided learning programs among students attending Kenya Medical Training College, Nairobi campus. This study was an analytical study, the target population was 4,490 KMTC Nairobi Campus students. The study utilized structured questionnaires for 263 respondents, analysis was done through SPSS, Ms Excel and Ms Word software’s with univariate
Graduate students' attitude towards e learning a study case at imam universityDr. Ahmed Farag
In the past few years, a new wave of many technologies, particularly the Internet has emerged with the potential to further enhance the teaching and learning environment in higher education. Many studies in the recent years have shown that E-learning use in the classrooms has increased over the past years. However, the process of E-learning and its applications is limited in the Kingdom of Saudi Arabia. Through this empirical study, a limited research was initiated to track the perceptions of the students toward the E-learning. The results indicate an overall positive attitude towards the E-learning
A Multimedia Data Mining Framework for Monitoring E-Examination Environmentijma
Academic dishonesty has been a growing concern in e-learning environment due to the fact that eexamination takes place under supervised and unsupervised learning environment despite its huge advantages. The e-examination environment has faced various security breaches such as academic dishonesty (impersonation), identity theft, unauthorised access and illegal assistance as a result of inefficient measures employed. Hence, an efficient framework which will aid the monitoring of the eexamination is needed. This paper reviews the process of mining multimedia data and propose a framework for monitoring the e-examination environment in order to extract images and audio features. The framework has four major phases: data pre-processing, mining, association and post processing. The
pre-processing phases carries out the extraction and transformation of multimedia data features, the mining phase does the classification and clustering of these features, the association does pattern matching while the post processing carries out the knowledge interpretation and reporting. The approach presented in this study will allow for efficient and accurate monitoring of e-examination environment which will help provide adequate security and reduce unethical behaviour in e-examination environment.
Understanding User’s Acceptance of Personal Cloud Computing: Using the Techno...Maurice Dawson
Personal Cloud Computing (PCC) is a rapidly growing technology, addressing the market demand of individual users for access to available and reliable resources. But like other new technologies, concerns and issues have surfaced with the adoption of PCC. Users deciding whether to adopt PCC may be concerned about the ease of use, usefulness, or security risks in the cloud. Negative attitudes toward using a technology have been found to negatively impact the success of that technology. The purpose of this study was to understand users’ acceptance of PCC. The population sample consisted of individual users within the United States between 18 and 80 years of age. The theoretical framework utilized in this study was based on the technology acceptance model (TAM). A web survey was conducted to assess the measurement and understanding of patterns demonstrated by participants. Our results shows that in spite of the potential benefits of PCC, security and privacy risks are deterring many users from moving towards PCC.
Technological Factors Affecting Computer Aided Learning Among Students Attend...AJHSSR Journal
Computer Assisted Learning (CAL) is a method of acquiring knowledge using electronic media which is gained using electronic media which is gaining recognition among students. This requires access to computers and considerable awareness on information technology. Previous empirical studies have underscored the important roles of instructional materials in the classroom studies. The objective of this study was to determine technological factors affecting computer aided learning programs among students attending Kenya Medical Training College, Nairobi campus. This study was an analytical study, the target population was 4,490 KMTC Nairobi Campus students. The study utilized structured questionnaires for 263 respondents, analysis was done through SPSS, Ms Excel and Ms Word software’s with univariate
Graduate students' attitude towards e learning a study case at imam universityDr. Ahmed Farag
In the past few years, a new wave of many technologies, particularly the Internet has emerged with the potential to further enhance the teaching and learning environment in higher education. Many studies in the recent years have shown that E-learning use in the classrooms has increased over the past years. However, the process of E-learning and its applications is limited in the Kingdom of Saudi Arabia. Through this empirical study, a limited research was initiated to track the perceptions of the students toward the E-learning. The results indicate an overall positive attitude towards the E-learning
A pragmatic study on e learning system for higher education in developing cou...Najeem Olawale Adelakun
The Internet has become one of the greatest inventions of mankind for learning and sharing of useful information through electronic means. For some years now, the developed nations have adopted the use of the e-learning system. Presently, the COVID-19 outbreak has given rise to the adoption of the e-learning system by many countries of the world being the most viable alternative for teaching and learning. This paper uses a pragmatic approach to evaluates the benefits and challenges associated with the e-learning system. A survey was conducted among students in a higher institution and a total of one hundred and twenty-five responses was gathered from the online questionnaire to know the likely challenges faced by students with the e-learning system and also at an online researchers’ forum. The result shows that 30.40% of students complained about weak internet connectivity from the questionnaire administered which is also the major problem in most developing nations, and for optimal performance of the e-learning system, there should be adequate provision for strong internet connectivity, standard IT infrastructure, and user-friendly e-learning platform.
This presentation is about UTAUT and UTAUT 2. In this slide also discuss briefly about UTAUT and changes made in UTAUT 2. It also discuss about how it can be applied in the classroom and the strength and weakness of using it.
Validating Measurements of Perceived Ease Comprehension and Ease of Navigatio...drboon
Many universities are realizing that the implementation and use of online learning tool become a competitive advantage to address the actual learning needs. The purpose of this study is to determine the factors that influence users’ perceived ease of use of Webct an online learning tool. We administrated a questionnaire to undergraduate students from an university in Quebec, Canada. The results tend to corroborate that ease of comprehension and ease of navigation are the key factors which influence the perceived ease of use of WebCT. More specifically, the terms used in educational web applications must be as simple and relevant as possible. Jargon and technical terms in the wording of text used for links should be carefully avoided. This research is extending the finding of IT adoption studies by specifying what make an online tool easy to use.
TAMEx framework as an alternative for e-exam implementation in wireless networkTELKOMNIKA JOURNAL
One of significant change in learning process is exam implementation applying a computer-based test (e-exam) rather than paper-based test. Many institutions currently use wireless network with bring your own device (BYOD) policy for their e-exam implementation, due to limitation of space and user terminals. Moreover it is hard to maintain the availability of reliable signal quality in wireless network for all users during e-exam process. Therefore, this research proposes a development of time adaptive for mobile exam (TAMEx) framework to provide all users with good quality of service of e-exam in wireless network environment when dealing with signal quality variations. The received signal strength indication (RSSI) is the main indicator of the signal quality. The framework supports e-exam implementation in wirelesslocal area network and the use of BYOD mechanism. The research shows that the framework successfully has provided time compensation for the users who experienced temporary connection loss due to bad signal quality. The result exhibits that tiny processing time has been needed for signal loss detection, user’s request of compensation time, and server’s execution. In conclusion, the TAMEx could guarantee good services for all users who doing e-exam in wireless network environment.
Wnl 119 gender analysis of social impact by dr. ayesha pptKishor Satpathy
Paper Presented during International Conference on What’s next in libraries? Trends, Space, and partnerships held during January 21-23, 2015 at NIT Silchar, Assam. It is being jointly organized by NIT Silchar, in association with its USA partner the Mortenson Center for International Library Programs, University of Illinois at Urbana-Champaign.
The effect of information and communication technology (ICT) in Jordanian lea...IJERA Editor
Information and communication Technology are used of electronic means which involve access storage, processing of electronic technology to handling of information, the various forms of uses it’s in order to improve Jordanian learning. The study aimed to investigate the uses and effect of ICTs for Jordanian learning from their perspective of student of higher school at the north of Jordan. The study method was a descriptive survey which uses questionnaire to collect data, questionnaire was justified and developed by the researcher to measure the effect of ICTs based on previous studies its applied to (548) student of higher school. The study was using SPSS to analyses data. The results indicate that ICTs for higher school at the north of Jordan there were a statistically significant relationship between the higher school at the north of Jordan and Jordanian learning, and seven of hypotheses reported statistically significant in the hypotheses and accepted but three hypotheses reported no a statistically significant and rejected. The study have Conclusion should gives more attention to focus on and beneficial of using ICTs applications.
Bridging the gap of the educational system across different countries through...PhD Assistance
The gap in the educational system has been a major drawback globally. The idea and concept of E-Learning have been evolved as a result of many kinds of Research. E-learning has assisted in closing this gap. The main goal of the study is to offer quality education through e-learning by assessing the effectiveness of e-learning mode. The focus has been to assess the e-learning potential to provide a quality education through electronic means and also to evaluate the scope of e-learning. E-learning provides a better standard of living for students across the world. This paper deals with improving the student’s quality of education and their standard of living
Visite : https://www.phdassistance.com/blog/
Contact Us:
UK NO: +44-1143520021
India No: +91-8754446690
Email: info@phdassistance.com
The study aimed at developing a model for transforming African education systems through the application of internet of things. The internet of things model for Africa developed would allow African countriesparticularly Namibia to share education materials and resources with other countries across Africa. The idea behindthe internet of things model in the education sectors in Africa is to encourage open access to knowledge and information. The study discovered that in African education systems there are no known platforms that are used by African countries to collaborate, communicate and share educational information directly with universities in Africa. Therefore, the present study developed a model for transforming African education systems through the application of internet of things in the Namibian context which will act as a centralized online platform for self-study, new skillsacquisition and self-improvement using materials provided by African institutions of education and higher learning.The platform is open to everyone such as students, educators and members of the public.
A pragmatic study on e learning system for higher education in developing cou...Najeem Olawale Adelakun
The Internet has become one of the greatest inventions of mankind for learning and sharing of useful information through electronic means. For some years now, the developed nations have adopted the use of the e-learning system. Presently, the COVID-19 outbreak has given rise to the adoption of the e-learning system by many countries of the world being the most viable alternative for teaching and learning. This paper uses a pragmatic approach to evaluates the benefits and challenges associated with the e-learning system. A survey was conducted among students in a higher institution and a total of one hundred and twenty-five responses was gathered from the online questionnaire to know the likely challenges faced by students with the e-learning system and also at an online researchers’ forum. The result shows that 30.40% of students complained about weak internet connectivity from the questionnaire administered which is also the major problem in most developing nations, and for optimal performance of the e-learning system, there should be adequate provision for strong internet connectivity, standard IT infrastructure, and user-friendly e-learning platform.
This presentation is about UTAUT and UTAUT 2. In this slide also discuss briefly about UTAUT and changes made in UTAUT 2. It also discuss about how it can be applied in the classroom and the strength and weakness of using it.
Validating Measurements of Perceived Ease Comprehension and Ease of Navigatio...drboon
Many universities are realizing that the implementation and use of online learning tool become a competitive advantage to address the actual learning needs. The purpose of this study is to determine the factors that influence users’ perceived ease of use of Webct an online learning tool. We administrated a questionnaire to undergraduate students from an university in Quebec, Canada. The results tend to corroborate that ease of comprehension and ease of navigation are the key factors which influence the perceived ease of use of WebCT. More specifically, the terms used in educational web applications must be as simple and relevant as possible. Jargon and technical terms in the wording of text used for links should be carefully avoided. This research is extending the finding of IT adoption studies by specifying what make an online tool easy to use.
TAMEx framework as an alternative for e-exam implementation in wireless networkTELKOMNIKA JOURNAL
One of significant change in learning process is exam implementation applying a computer-based test (e-exam) rather than paper-based test. Many institutions currently use wireless network with bring your own device (BYOD) policy for their e-exam implementation, due to limitation of space and user terminals. Moreover it is hard to maintain the availability of reliable signal quality in wireless network for all users during e-exam process. Therefore, this research proposes a development of time adaptive for mobile exam (TAMEx) framework to provide all users with good quality of service of e-exam in wireless network environment when dealing with signal quality variations. The received signal strength indication (RSSI) is the main indicator of the signal quality. The framework supports e-exam implementation in wirelesslocal area network and the use of BYOD mechanism. The research shows that the framework successfully has provided time compensation for the users who experienced temporary connection loss due to bad signal quality. The result exhibits that tiny processing time has been needed for signal loss detection, user’s request of compensation time, and server’s execution. In conclusion, the TAMEx could guarantee good services for all users who doing e-exam in wireless network environment.
Wnl 119 gender analysis of social impact by dr. ayesha pptKishor Satpathy
Paper Presented during International Conference on What’s next in libraries? Trends, Space, and partnerships held during January 21-23, 2015 at NIT Silchar, Assam. It is being jointly organized by NIT Silchar, in association with its USA partner the Mortenson Center for International Library Programs, University of Illinois at Urbana-Champaign.
The effect of information and communication technology (ICT) in Jordanian lea...IJERA Editor
Information and communication Technology are used of electronic means which involve access storage, processing of electronic technology to handling of information, the various forms of uses it’s in order to improve Jordanian learning. The study aimed to investigate the uses and effect of ICTs for Jordanian learning from their perspective of student of higher school at the north of Jordan. The study method was a descriptive survey which uses questionnaire to collect data, questionnaire was justified and developed by the researcher to measure the effect of ICTs based on previous studies its applied to (548) student of higher school. The study was using SPSS to analyses data. The results indicate that ICTs for higher school at the north of Jordan there were a statistically significant relationship between the higher school at the north of Jordan and Jordanian learning, and seven of hypotheses reported statistically significant in the hypotheses and accepted but three hypotheses reported no a statistically significant and rejected. The study have Conclusion should gives more attention to focus on and beneficial of using ICTs applications.
Bridging the gap of the educational system across different countries through...PhD Assistance
The gap in the educational system has been a major drawback globally. The idea and concept of E-Learning have been evolved as a result of many kinds of Research. E-learning has assisted in closing this gap. The main goal of the study is to offer quality education through e-learning by assessing the effectiveness of e-learning mode. The focus has been to assess the e-learning potential to provide a quality education through electronic means and also to evaluate the scope of e-learning. E-learning provides a better standard of living for students across the world. This paper deals with improving the student’s quality of education and their standard of living
Visite : https://www.phdassistance.com/blog/
Contact Us:
UK NO: +44-1143520021
India No: +91-8754446690
Email: info@phdassistance.com
The study aimed at developing a model for transforming African education systems through the application of internet of things. The internet of things model for Africa developed would allow African countriesparticularly Namibia to share education materials and resources with other countries across Africa. The idea behindthe internet of things model in the education sectors in Africa is to encourage open access to knowledge and information. The study discovered that in African education systems there are no known platforms that are used by African countries to collaborate, communicate and share educational information directly with universities in Africa. Therefore, the present study developed a model for transforming African education systems through the application of internet of things in the Namibian context which will act as a centralized online platform for self-study, new skillsacquisition and self-improvement using materials provided by African institutions of education and higher learning.The platform is open to everyone such as students, educators and members of the public.
Assessment 3: Essay
Length: 1500 words
Weighting: 45%
This last assessment builds on the annotated bibliography completed as Assessment 1 and your Assessment 2 essay plan. Use the feedback from your Assessment 2 to write an essay developing an argument for or against your chosen topic. The essay choices are as already presented:
1. Educational institutions should incorporate mobile technology for the benefit of students.
1. Using social media enhances adolescent well-being.
1. Mobile technology will continue to transform health care in positive ways.
You need to:
· Take a position and argue your case with supporting evidence. You may support or argue against the topic. Include a counterargument either in a separate paragraph or within your supporting point(s).
· Remember to include at least six sources of evidence to support your argument.
· Be sure to include a reference list on a separate page, using APA referencing.
· Go through the marking criteria carefully to ensure you have addressed all the marking criteria for your essay.
Marking criteria – see over the page
Davison, C. B. Lazaros, E. J. (2015). Adopting mobile technology in the higher education classroom. Journal of Technology Studies, 41:1, 30-39. Retrieved from https://www.ebsco.com
This 2015 article looks at the discoveries from a study of an Indiana research and teaching university, focusing on the student’s practices with mobile technologies. The findings were based on, and cross examined with a previous similar study of British students that was undertaken 9 years prior. Key ideas demonstrated are the technological influence of mLearning in the tertiary education environment, carried out with intentions of providing infrastructure integration techniques and insight to educators, by identifying characteristics and patterns within the mobile technology utilization of the student body. The study touches on student perceptions of mobile learning, the most popular method of communicating and the benefits. A limitation to this study include lack of personal interviews with students to provide concurrent opinions of findings presented, and an uncertain means of accumulating data by use of an anonymous online poll. A further limitation includes lack of an in-depth explanation to the conclusion that laptops are the most preferred tool amongst the participants. The piece itself has been published in the peer-reviewed Journal of Technology Studies, which is owned by an international honor society of technology professions. In particular this article will be helpful in providing a comparison between the study a decade previously, to monitor what the sequences of mLearning in the classroom has demonstrated, and to collate with new evidence between this article and now.
Henderson, M. Selwyn, N. Aston, R. (2015). What works and why? Student perceptions of ‘useful’ digital technology in university teaching and learning. Studies in Higher Education, 42:8, 1567-1579, DOI: 10.1080/030 ...
Establishing Requirements for a Mobile Learning System HBetseyCalderon89
Establishing Requirements for a Mobile Learning System
Helen Sharp, Josie Taylor, Diane Evans and Debra Haley
The Open University
Walton Hall
Milton Keynes MK7 6AA, UK
1. Background
MOBIlearn was a large, multinational European-funded research and development
project that explored new ways to use mobile environments to meet the needs of
learners, working by themselves and with others. The aim of the project was to
develop a new m-learning architecture for a pedagogically-sound mobile learning
environment, and to evaluate an instantiation of that architecture using existing
technologies. A user-centred approach was taken to the project, based on socio-
cognitive engineering (Sharples et al, 2002) and embedded in ISO 13407. The project
team consisted of representatives from more than 15 organisations from seven
European countries plus one Middle Eastern country. Establishing the requirements
for such a project was a complex task, involving many methods and notations. The
project produced several documents and results; some of these are available at
http://www.mobilearn.org. Publications specifically related to mobile learning are
available at http://iet.open.ac.uk/pp/j.taylor/.
This case study draws only on work from the user requirements and evaluation
workpackage to explore the use of scenarios throughout the project and the use of the
Volere shell and template (Robertson and Robertson, 2006) to document the
requirements.
The next section introduces the three strands used as learning domains throughout the
project. Section 3 describes the use of scenarios throughout the project and Section 4
discusses the use of Volere shells and the technology to support them. In Section 5 we
conclude by making some observations about our experiences.
2. The three strands
The project chose three learning domains to drive the research, each of which
represents a distinct learning situation. These are: the Museum strand, the MBA
strand and the Health strand. Data gathering for establishing requirements was
conducted by a different project partner, each strand used different data gathering
techniques, and each produced its own set of requirements which needed to be
rationalised. The three strands and their respective data gathering techniques are
outlined below.
http://www.mobilearn.org/
https://oufe.open.ac.uk/exchweb/bin/redir.asp?URL=http://iet.open.ac.uk/pp/j.taylor/
Museum strand
This strand typifies informal learning and concerns visitors to a museum. Museums
are the mechanism through which we research, interpret and present our insights into
the natural and cultural worlds. They represent our belief systems concerning cultural
inter-relationships, our relationship with the environment and of our place in the
Universe.
Wireless technology is becoming a part of the museum experience. In an effort to
bring art and science to life for a new generation of technically sophisticated patrons,
an increas ...
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
An Examination of the Prior Use of E-Learning Within an Extended Technology A...Maurice Dawson
The purpose of this empirical study was to test specific factors of behavioral intention to use m-learning in a community college setting using a modified technology acceptance model and antecedent factors suggested by the researcher’s review of the literature. In addition, the study’s purpose was to expand understanding of behavioral intention to use m-learning and to contribute to the growing body of research. This research model was based on relevant technology acceptance literature. The study examines the significance of “prior use of e-learning” and correlation with the behavioral intention to use m-learning. Existing models have looked at prior use of e-learning in other domains, but not specifically m-learning. Other models and studies have primarily looked at the prior use of e-learning variable as a moderating variable and not one that is directly related to attitude and behavioral intention. The study found that there is a relationship between prior use of e-learning and behavioral intention to use m-learning. This research direction was proposed by Lu and Viehland.
Mobile learning: Hype or evidenced impact for higher education applications? alanwylie
Keynote presentation by Dr Mohamed Ally, Director and Professor, Centre for Distance Education, Athabasca University, Canada, for the DEHub/ODLAA Education 2011 to 2021- Global challenges and perspectives of blended and distance learning the (14 to 18 February 2011).
Blockchain and machine learning in education: a literature reviewIAESIJAI
There is a growing influence around the use of technology in education, with many solutions already being implemented and many others being explored. Using various forms of technology to assist the educational process has increased dramatically in the previous decade in education systems in many respects. Both machine learning and the blockchain have had a significant impact on education. The purpose of this study is to conduct a literature review on the application of machine learning and blockchain technology in educational institutions. Additionally, this study examines the potential applications, benefits, and challenges those educational institutions may face as a result of using machine learning and blockchain technologies. Using machine learning and blockchain in educational systems will have a positive impact on the entire educational process and student achievement. Researchers, academics, and practitioners will benefit from this study to focus on a wider range of educational applications and solve the related issues of machine learning and blockchain technology in the education sector.
Learner Ontological Model for Intelligent Virtual Collaborative Learning Envi...ijceronline
An enacting approach to intelligent virtual collaborative learning model is explored through the lens of critical ontology. This ontological model enables to reuse of the domain knowledge and to make the knowledge explicitly available to the agent working as an Expert System, which uses the operational knowledge in collaborative learning environment. This ontological model used by the agent to identify the preliminary competency level of the user. This environment offers personalized education to each learner in accordance with his/her learning preferences, and learning capabilities. Here the factors considered to identify the learning capability taken are demographic profile, age, family profile, basic educational qualification and basic competency scale. The conception of heuristics is then used by the agent to determine the effectiveness of the learner by referring the different parameters of the learner available in the ontological model.To help getting over this, the paper describes the experience on using an ontological model for collaborative learning to relate and integrate the history of the learner by maintaining the history of learner in collaborative learning environment that will be used by the Multi-Objective Grey Situation Decision Making Theory to infer the understanding level of user and produces the conditional content to the user
A Survey on E-Learning System with Data MiningIIRindia
E-learning process has been widely used in university campus and educational institutions are playing vital role to enhance the skill set of students. Modern E-learning done by many electronic devices, such as smartphones, Tabs, and so on, on existing E-learning tools is insufficient to achieve the purpose of online training of education. This paper presents a survey of online e-Learning authoring tools for creating and integrating reusable e-learning tool for generation and enhancing existing learning resources with them. The work concentrates on evaluation of the existing e-learning tools a, and authoring tools that have shown good performance in the past for online learners. This survey work takes more than 20 online tools that deal with the educational sector mechanism, for the purpose of observations, and the outcome were analyzed. The findings of this paper are the main reason for developing a new tool, and it shows that educators can enhance existing learning resources by adding assessment resources, if suitable authoring tools are provided. Finally, the different factors that assure the reusability of the created new e-learning tool has been analysed in this paper.E-learning environment is a guide for both students and tutorial management system. The useful on the e-learning system for apart from students and distance learning students. The purpose of using e-learning environment for online education system, developed in data mining for more number of clustering servers and resource chain has been good.
Running Head ANNOTATED BIBLIOGRAPHY1ANNOTATED BIBLIOGRAPHY .docxSUBHI7
Running Head: ANNOTATED BIBLIOGRAPHY 1
ANNOTATED BIBLIOGRAPHY 6
Annotated Bibliography
Student’s Name
Institutional Affiliation
Button, D., Harrington, A., & Belan, I. (2014). E-learning & information communication technology (ICT) in nursing education: A review of the literature. Nurse Education Today, 34(10), 1311-1323.
There is need for constant updating of informatics in fields such as nursing so as to help those in the fields to be able to learn and utilize the skills they learn in positive development of children and personal development. This resource is aimed at performing a study spread out across a ten year period identifying the issues which arise and affect both tutors and students in the context of e-learning systems. This study has been significantly the largest change in the field of medicine and nursing education where hospital training was moved to the tertiary sector. Also, the existing differences between computers and systems dealing with informatics depending on their use can prove successful to the users. Technology has also enabled for the creation and use of online data sources and libraries for purposes of referencing and gaining knowledge.
From this reference I will be able to review how technology has been used in developing an online database which can be used by learners and tutors in the field of nursing to gain information.
FernáNdez-LóPez, Á. RodríGuez-FóRtiz, M. J., RodríGuez-Almendros, M. L., & MartíNez-Segura, M. J. (2013). Mobile learning technology based on iOS devices to support students with special education needs. Computers & Education, 61, 77-90.
Recent advancements in technology have assisted in creation of avenues for students with special needs to be able to access equal education opportunities. Mobile applications can be developed for children especially with cognitive disabilities and other difficulties which may arise in the process of learning to help them gain knowledge and education better. These applications can be used as a tool for improvement and betterment of behaviors, helping them interact with the environment and other aspects of holistic growth such as helping in communication. These applications can be designed for Apple iOS devices due to their increased use in the American market however developments can be made to incorporate other platforms. However, there exists a number of applications which have already been implemented and have proven to be successful in helping in positive growth n children.
I intend to use this source to sow how technology can be used to teach children with disabilities and difficulties in learning. Technology can be harnessed and channeled to be used as a tool for education outside the school to help for better growth and development of a child.
Lai, K. W., Khaddage, F., & Knezek, G. (2013). Blending student technology experiences in formal and informal learning. Journal of Computer Assisted Learning, 29(5), 414-425.
There is need for im ...
Similar to INVESTIGATION A NEW APPROACH TO DETECT AND TRACK FRAUD IN VIRTUAL LEARNING ENVIRONMENTS BY USING CHAYD MODEL (20)
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Communications Mining Series - Zero to Hero - Session 1
INVESTIGATION A NEW APPROACH TO DETECT AND TRACK FRAUD IN VIRTUAL LEARNING ENVIRONMENTS BY USING CHAYD MODEL
1. International Journal of Mobile Network Communications & Telematics (IJMNCT) Vol. 7, No.1/2, April 2017
DOI : 10.5121/ijmnct.2017.7203 27
INVESTIGATION A NEW APPROACH TO DETECT
AND TRACK FRAUD IN VIRTUAL LEARNING
ENVIRONMENTS BY USING CHAYD MODEL
Sayyed Jalalaldin Gharibi Karyak1
and Sayyed Hedayat Tarighinejad2
1
Technical and Vocational University Yasooj, Iran
2
Student of Computer Sciences in Islamic Azad University of Yasuj, Iran
ABSTRACT
Virtual University is the environment that with utilizes the appropriate multimedia tools and having good
communication infrastructure is a provider of e-learning services, so that usually does not have require to
physical location as a traditional university and students are able in any place and at any time be willing to
use a lot of services provided, such as e-courses or electronic tests. There are many solutions in order to
identify and detect fraud in the online environment that use of these methods can be identified took place
fraud, but still is great importance of avoid discussion and fraud detection in virtual university. In this
research, we aimed are to investigate a new approach to detect and track fraud in virtual learning
environments by using decision tree. (Chayd model). The results showed that the accuracy of the model is
84.54% which is indicative of high performance and high precision in predicting fraud from the teachers,
students and hackers.
KEYWORDS
E-learning, fraud, Chayd, data mining, decision tree
1. INTRODUCTION
Internet and virtual space are a wonderful source of awareness and knowledge. With the major
changes that have occurred as a result of development of new technologies in various fields of
human life, as well as education is not exempt from this rule change. virtual space with resources
and great facilities that puts its users in the field of science and knowledge and with features such
as lack of time and space, interactivity and puts a lot of capabilities in the field of education
training and education to provide its users and in addition to these capabilities, also there are
challenges such as fraud. Virtual University is the environment that with utilizes the appropriate
multimedia tools and having good communication infrastructure is a provider of e-learning
services, so that usually does not have require to physical location as a traditional university and
students are able in any place and at any time be willing to use a lot of services provided, such as
e-courses or electronic tests. Sometimes this system, in addition to traditional universities and
sometimes separately, it pays to provide educational services. This system with utilizes of
capabilities and facilities offered by Internet network and multimedia tools and technologies with
the aim of raising the level of culture to prevent the removal of material resources, as well as the
scientific capital of the country creating to a large extent, enhance the scientific level of society
and possibility of the widespread distribution of knowledge, expertise and abilities in the
university. Fraud, as any illicit behavior which may be by those who have regulate, manage and
scoring and the evaluation is conducted by a fraudulently. Fraud in the evaluation of university
education is a very serious crime which may ultimately lead to the deportation of the University.
Because of the relatively new of e- learning and educational technology on web based, especially
2. International Journal of Mobile Network Communications & Telematics (IJMNCT) Vol. 7, No.1/2, April 2017
28
in Iran, which is also the subject of a new study of this issue is very vital. Also main reason is that
the use of e-learning shows a relatively high growth in recent years and this is caused that, before
the creation of large problems deal to issue of fraud virtual education and thus can be, it can be
controlled or at least have a plan to control it.
2. THEORETICAL FOUNDATIONS VIRTUAL EDUCATION
It refers to any type of learning that is done in a way other than traditional face to face. The
contents of the courses may be transferred via the internet or the use of video, active images and
interactive two-way. (Bedford et al., 2009). It also to providing educational content and teaching
experiences to learners that they can in anywhere the world have take advantage of this kind of
training, namely be done personal training by using computer technology, information and
communication. A virtual training system provides a virtual environment to surround can learn
the content without the presence of the instructor. Naturally, in this system should be considered
in all aspects of environmental and effective spiritual components in teaching.
3 . CHALLENGES IN A VIRTUAL CLASSROOM
1. How to presence and absence.
2. Method of entry of students into the network.
3. Rules Compilation for registration.
4. Paying any tuition.
5. Does the evaluation of learning should be a stage, or final?
6. Method of conducting such evaluations.
7. How to prevent fraud and identify cheaters. (Trenholm, 2005).
4. DATA MINING
Data mining is a concept that has been developed and defined to analyze large amounts of data.
Researchers such Hand, Manila and Esmet have provided a good definition of data mining:
"Often, the analysis of massive amounts of collection of observed data to find a collection of
transparent communication and summarizing data in different ways, as that concept and applied
for people. (Hand et al., 2001). . By definition, it is clear that used data mining to analyze massive
amounts of data to find the necessary information which is not understandable directly. Data
mining is a very interesting scientific application, for example is used in diagnosing diseases,
financial and non-financial fraud detection and analysis of weather data (Li et al., 2004). The
main motivation for the use of data mining comes from the value that can be achieved by
implementing successful in business and in most processes to reduces costs and we're saving
money. (Lukawiecki, 2008).
5. RESEARCH HISTORY
Etter, Cramer and Finn (2007) were compared the two distinguishes groups to assess their
perceptions about the discovery of the fraud and information technology. A group of students
from the university were affiliated with a particular religion or another group of students from
other region research institute. Sample for university students related to a particular religion are
237 students and are considered 202 students for a regional research institute. The results show
that students affiliated to a particular religion compared to students from regional research
institutes are less inclined to fraud.
3. International Journal of Mobile Network Communications & Telematics (IJMNCT) Vol. 7, No.1/2, April 2017
29
Mirza and Staples (2010) conducted research on the use of webcams, as an innovative way to
reduce or eliminate fraud. They were in an online course for nursing students. Students need to
buy a webcam to participate in the exam training, rather, gained skills before the actual exam.
After completing the test, was done a survey of 44 students, while they were under to consistently
surveillance. Students reported that the possibility of less fraud is sad and disappointment feeling
but only 19 people thinks this webcam can help prevent cheating.Sottile and Watson (2010)
conducted a survey of 635 students to find that, more students are fraud online or face-to-face in
classrooms. Over 30% of students admitted that they had been fraud in both environments.
However the difference between traditional and online fraud in terms of statistical, is not less than
0.05 percent. The students admitted that they had more than 4 times as likely to fraud in an online
class compared to when the test was face to face classes. (Watson and Sottile, 2010), (Kidwell
and Kent 2008).
Mac Cabe and Trevino (1993) in order to determine whether students in Australia, most of done
the fraud in the online classroom or when their education in face to face classes. Surveys sent
randomly to 1500 students. Just returned 459 usable survey which was 210 surveys consisting of
face-to-face students and 248 online students. The results of this study suggest that online
students had less fraud than face to face students.
6. RESEARCH METHODOLOGY CLUSTERING IN DATA MINING
Clustering is a data mining technique which makes significant clusters and widely used that they
have similar characteristics and uses of automated techniques which are different classification
techniques. (Zhou and Kapoor, 2011). Using clustering techniques, we can do the same cluster in
a cluster and identify them with meaningful labels, so after that we detected fraud, we determined
that this type of fraud is related to which of those students, faculty and hacker. (Etter, Cramer and
Finn, 2007).
7. MODELING
At this stage, they were selected and used different modeling techniques and set their parameters
with the optimal value, so as an example, there are methods, models and different techniques to
build models, therefore, is often required rollback methods to the data production stage. The most
important issue in the construction of the model is that, this is an iterative process, so we have to
identify fraud; we need to build the best model to detect fraud. We learn in search of a suitable
model can guide us to go back and dosome Changes in the data used and even improve speech
issue. (Zhou and Kapoor, 2011).
8. DECISION TREE ALGORITHMS
Decision tree based on a series of decision rules are used for prediction. In this study, we want to
observed the result of these projections, so to do this act, it is very efficient to use of decision
trees. In the decision tree the more important traits are transferred to the high decision tree nodes
as well as decision trees puts aside minor characters. This allows, before entering other data
mining techniques such as neural networks, we have a good view of the importance of features
and can select the input algorithm consciously. (Etter, Cramer and Finn, 2007).
9.THE INTRODUCTION OF DATA AND VARIABLES
To evaluate the proposed idea, there is a need to use a set of training data sample that this set can
include several important fields. For example, exam date, exam raw score, the date of appeal,
4. International Journal of Mobile Network Communications & Telematics (IJMNCT) Vol. 7, No.1/2, April 2017
30
score of appeals, the scores of students during the semester including the research, projects,
midterms, also a former student information such as average scores of previous terms, the
difference between the scores, the high volume of Internet usage during the test, a significant
increase in the student scores and the things of this kind. These items can be received by a data
set is ready via the web or to be taken from an educational institution or online University. Data
used in this study is related to the data of 325 students which is extracted from the data
warehouse, University of California Irvine, that variable "fraud" as the response variable (can be
predicted) which has four parameters for detection fraud as follows:
1. By hacker
2. By students
3. By master
4. Absence of fraud and other variables which can be used as an explanatory variable
(predictor).
Table 1: Variable names and their abbreviated titles
According to the results the Cheat variable giving a value of 1 to 4 and among them, a value of 1
is lowest frequency with 76 records and the value 2 which has the highest rate with 87 records.
5. International Journal of Mobile Network Communications & Telematics (IJMNCT) Vol. 7, No.1/2, April 2017
31
Also, this variable does not have any missing values. This variable has a nominal and plays a role
in the response variable (can be predicted) in the model. Likewise, other variables can be carried
out statistical description.
10. RESULTS OF CHAYD MODEL
The Chayd model implementation process shows in Rapid Miner software in Figure 1.
Figure 1: The process of implementing the Chayd model
After implementation Chayd model is created decision tree as shown in Figure 2.
Figure 2: Decision Tree of resulting from Chayd model.
Showing created decision tree in Figure 2, shown as a rule in Figure 3.
6. International Journal of Mobile Network Communications & Telematics (IJMNCT) Vol. 7, No.1/2, April 2017
32
Figure 3: Showing decision tree as a rule by resulting from implementation Chayd model
Finally, Chayd model by using the created tree doing a prediction operation for each of the
records related to the test data set. The results of this prediction as shown in Table 2.
Table 2: Results of fraud variables predicted based on Chayd model
According to the results of Table 2, we observe that Chayd model with 84.54 percent accuracy is
done classification procedure for test data set. In other words, this model for 84.54% of the
records contained in the test data set is correctly diagnosed the type of fraud. For the records that
the type of its fraud is a type of hacker fraud (value 1) the model has done the procedure to
predict with 100% accuracy, to records that the type of its fraud is a type of students fraud
(value 2) the model has done the procedure to predict with 56% accuracy, to records that the type
of its fraud is a type of Master fraud (value 3) the model has done the procedure to predict with
100% accuracy and for records that do not fraud (value 4) the model the model has done the
procedure to predict with 81.82% accuracy.
Finally, can the results obtained from the Chayd model shown in Table 3.
7. International Journal of Mobile Network Communications & Telematics (IJMNCT) Vol. 7, No.1/2, April 2017
33
Table 3: Results of the Chayd model
Absence of
fraud
Master
fraud
Students
fraud
Hacker fraud Model
accuracy
Model
82.82% 100% 56% 100% 84.54% Chayd
11. CONCLUSIONS AND RECOMMENDATIONS
Our goal in this research is to find out and choose the features between the all features which be
reduced dimension of gene database, so that from losing important data. There are many and
varied ways to reduce property, according to the research field and the characteristics of each
method have chosen one of them or a combination of them in different cases. Data mining is a
technique that can help to reduce these characteristics. The data used in this study included 325
samples which are discussed in the first place to describe the data and obtain an overview of the
data. In this section presented a report from number of contained records in each class. Through
this report, we found that class 1, devotes to its more records than any other class. Also we found
that are not lost none of our data. But we have some outlier’s data. In the third phase, we enter to
data prepare or in other words, data preprocessing which was very time consuming. At first,
outlier data with this strategy, we replaced with the closest data to it. Then, through the Chayd
model, we calculate the accuracy of the model. The results showed that the Chayd model has a
very high accuracy (84.54%) to detect fraud. Were excluded non-critical features and due to the
variable our goal was to have four values 1, 2, 3, and 4 as follows:
1 - Detection of fraud made by the hackers.
2 - Detection of fraud made by the students.
3 - Detection of fraud made by the teachers.
4 - Detection of the Absence of the fraud.
From the available data considered 70% to build models and the remaining of 30%, as data to
test the model that in the end, discussed to data modeling, after reduction feature by Chayd
model. Based assessments and analysis, we have done our resarch, we managed that to
recognize fraud taken by hackers, students and teachers by using existing Chayd model and data
mining.
REFERENCES
[1] Bedford, W., Gregg, J., & Clinton, S. (2009). Implementing technology to prevent online cheating:
A case study at a small southern university (SSRU). Merlot Journal of Online Learning and
Teaching, 5(2).
[2] Etter, S Cramer, J. J. & Finn, S. (2007) “Origins of Academic Dishonesty: Ethical Orientations and
Personality Factors Associated with Attitudes about Cheating with Information Technology”, Journal
of Research on Technology in Education, Vol 39, No. 2, pp 133-155.
[3] Lorenzetti, J. P. (2006) “Proctoring Assessments: Benefits & Challenges”, Distance Education
Report pp 5-6.
[4] Mirza, N. & Staples, E. (2010) “Webcam as a New Invigilation Method: Students’ Comfort and
Potential for Cheating”, Journal of Nursing Education, Vol 49, No. 2, pp 116-119.
[5] Trenholm, Sven. "A review of cheating in fully asynchronous online courses: A math or fact-based
course perspective.” Journal of educational technology systems 35. 3 (2007): 281-300.
[6] Trenholm, S. (2005). Current issues in teaching mathematics online. Presentation given at CIT
(Conference on Instructional Technologies), Binghamton, New York, May 26, 2005.
[7] Watson G. Sottile, J. (2010) “Cheating in the Digital age: Do Students Cheat More in Online
Courses?” Online Journal of Distance Learning Administration, Vol 13, No 1
[8] Zhou W. , G. Kapoor, Detecting Evolutionary Financial Statement Fraud, Decision Support
Systems,Vol.50(3),2011,pp.250-576.Changes in the data used and even improve speech issue. (Zhou
and Kapoor, 2011).