The purpose of this study is to develop conceptual models and validation instruments for the success of e-learning systems in Indonesian universities from factors that influence instructor activity and user motivation...
详细信息
ISBN:
(数字)9781728158624
ISBN:
(纸本)9781728158631
The purpose of this study is to develop conceptual models and validation instruments for the success of e-learning systems in Indonesian universities from factors that influence instructor activity and user motivation. Model development is based on the IS success model of DeLone and Mclean by adding instructor activity and motivational variables based on related literature studies. Evaluation is done by testing the reliability and validity of the instrument. Data collection by distributing instruments online with the snowball method, respondents obtained were 234 used as data analysis with SmartPLS 2.0 software. The results of this study produced a conceptual model consisting of 9 variables and 83 instruments which were validated according to the provisions. From these results, it can be implemented in future research by increasing larger respondents to get results that represent the success of e-learning systems at universities in Indonesia.
Geographically, Indonesia is a meeting point of three continental plates. Scilicet, the Eurasian Plate, the Indo-Australian Plate, and the Pacific Plate. Therefore, Indonesia is part of the infamous volcanic zone call...
详细信息
Geographically, Indonesia is a meeting point of three continental plates. Scilicet, the Eurasian Plate, the Indo-Australian Plate, and the Pacific Plate. Therefore, Indonesia is part of the infamous volcanic zone called the ”Ring of Fire” and one of the areas prone to natural disasters such as volcanic eruptions, earthquakes, tsunamis, floods, and landslides. This study aims to capture the spatial pattern and identify the causes of social vulnerability in the districts/cities in Indonesia using the biclustering method. The data is extracted from the Indonesian National Socio-Economic Survey (SUSENAS) by BPS-Statistics in 2014. The biclustering result indicates that each district/city has its own social vulnerability characteristics and shows that the vulnerable aspects of each district/city are different. The adjacent observations tend to have social vulenrability characteristics. The results of this study can be used as a reference for national disaster mitigation policy in Indonesia.
Autonomous cars have become an interesting discussion in recent years. Several major automotive industries such as Tesla, GM and Nissan are trying to become pioneers in autonomous car technology. Giant technology comp...
Autonomous cars have become an interesting discussion in recent years. Several major automotive industries such as Tesla, GM and Nissan are trying to become pioneers in autonomous car technology. Giant technology companies such as Google Waymo, Baidu and Aptiv also developing autonomous car technology. Several technological approaches are carried out in implementing autonomous cars for recognizing surrounding situations, such as radar, lidar, sonar, GPS, and odometry. An automatic control system is used to control navigation based on the data obtained from these sensors. This paper will discuss the use of CNN deep learning algorithm for recognizing the surrounding environment in creating the automatic navigation required by autonomous cars. The system designed will create and learn the data set that will be taken in advance and the learning outcomes will be implemented in an open simulation system. This simulation shows high accuracy in learning to navigate the autonomous car by observing the surrounding environment.
Globally, internet users and mobile phone are increasing significantly all the time. One of the impacts from the growth of it, there is the revolution in a traditional market. Nowadays, people tend to buy something th...
详细信息
We as a human can not avoid the disease, and when we are sick, we need to see a practical doctor. However, in term of location and patient's right for changing the practical doctor, then the patient when moving fr...
We as a human can not avoid the disease, and when we are sick, we need to see a practical doctor. However, in term of location and patient's right for changing the practical doctor, then the patient when moving from one practical doctor to others will have similar and repeated questions such as medicine allergy, history of diseases and so on. Moreover, become a problem for a vulnerable patient such as unconscious patient, disabled or elderly when seeing a new practical doctor and at the end of the day, it will become malpractice. Few of the causes of the problem above are the lack of health education, delay in diagnosing/misdiagnosis, and inaccessible healthcare facilities and with the increasing popularity of telemedicine and IoT across the world, then we need to apply IoT in order to help the patient. In this paper, a framework is created and designed for an IoT-integrated mobile application for the patient where this mobile application is expected to be implemented.
Providing easy access for university executives that refers to key success factors is a must for universities. The information system integrates with all departments to obtain fast and accurate information for decisio...
详细信息
Web applications continue to grow however web attacks are also increasing, this shows an increase in web application vulnerabilities. Several methods have been used to detect vulnerabilities in web applications such a...
Web applications continue to grow however web attacks are also increasing, this shows an increase in web application vulnerabilities. Several methods have been used to detect vulnerabilities in web applications such as black-box testing, dynamic analysis, and static analysis. In this article, we propose a framework for detecting web application vulnerabilities by combining all three methods. The strengths of one method are used to overcome the weaknesses of another method. This framework is believed to provide better results than if each method was used separately.
Adaptive e-learning system is widely used to customize the content of teaching materials to student learning styles. This study aims to propose an adaptive e-learning model that is able to determine the MBTI learning ...
详细信息
Foreground segmentation is one of moving object detection techniques of computer vision applications. To date, modern moving object detection methods require complex background modeling and thresholds tuning to confro...
详细信息
For damage detection, this research article discusses an easy-to-compute damage index derived from the governing dynamic of the structure that has potential practical application in Structural Health Monitoring (SHM)....
For damage detection, this research article discusses an easy-to-compute damage index derived from the governing dynamic of the structure that has potential practical application in Structural Health Monitoring (SHM). The research uses simplified structural models to explore the sensitivity of the index to damages, to compare the index performance with a traditional but popular damage detection method, and to understand the local/global predictive capability of the index. The research uses two simple models, namely, single- and two-degree-of-freedom systems. The results suggest that the damage index is local, that can only monitor damages occurring near the points of measurements, but it is sensitive to damages, unlike the natural frequency, which is global but less sensitive.
暂无评论