Text mining can be used to classify opinions about complaints or not complaints experienced by XL customers. This study aims to find and compare classifications in the sentiments of analysis from the view of XL custom...
详细信息
Monitoring learning outcomes is an activity that must be carried out by the study program and requires time. Implementation of a system that can monitor learning outcomes needs to be done to eliminate the gap between ...
Monitoring learning outcomes is an activity that must be carried out by the study program and requires time. Implementation of a system that can monitor learning outcomes needs to be done to eliminate the gap between information needs and the monitoring process. We propose an architectural model to monitor and evaluate student learning outcomes. The architectural model proposed will be able to assist study programs in building the tools used for monitoring learning outcomes. The research method was carried out qualitatively by collecting primary data and secondary data. Primary data was obtained through interviews with heads of study programs of Tarumanagara University, while secondary data was obtained from literature studies, government policies, best practices, and other related documents. The results of the research are in the form of a conceptual model architecture which consists of the components needed to monitor student learning outcomes, which can help study programs, lecturers, and students monitor learning outcomes.
Input manipulation attacks are becoming one of the most common attacks against Web applications and Web services security. As the use of firewalls and other security mechanisms are not effective against application-le...
详细信息
Input manipulation attacks are becoming one of the most common attacks against Web applications and Web services security. As the use of firewalls and other security mechanisms are not effective against application-level attacks, new means of defense are needed. This paper presents a framework proposal to solve this problem, securing applications against input manipulation attacks. The proposed mechanism offers a reusable approach by the use of XML files and a XML Schema for security parameters specification. Furthermore, a case of study and experiment results are presented. The experiment demonstrates how common input manipulation flaws could be observed.
Nowadays, computer networks are widely used to exchange valuable and confidential data information between servers to computers or cellular devices. Access to user control and use of software or hardware as a firewall...
详细信息
Organizational learning is an area that helps companies to improve their processes significantly through the reuse of experiences. An area that may help in this way is social learning. Collaborative tools, such as soc...
详细信息
Organizational learning is an area that helps companies to improve their processes significantly through the reuse of experiences. An area that may help in this way is social learning. Collaborative tools, such as social network and wiki, enable collaborative work and are important facilitators of social learning process. However, collaboration is one of the several necessary components for learning. Therefore, it is important that all acquired knowledge be organized to be reused faster, easily and efficiently. Therefore, we propose using learning objects to organize the content inserted in collaborative tools. There are some learning object metadata to describe relevant learning objects characteristics and to catalog them. As these metadata are proposed to describe educational learning objects, they do not contemplate organizational characteristics, important for knowledge-intensive organizations. Moreover, the metadata are formally modeled through the XML-Schema language, which has a lack of expressiveness. Thus, trying to solve these limitations, the paper presents an ontology for organizational learning object based on IEEE LOM standard. The paper describes the ontology building process, following all the activities proposed in Methontology. Some experiments to evaluate the ontology are also presented.
Engaging end-users in creative and experiential e-learning activities by giving them the 'right tools' can be viewed as a way to empower end-users in developing their own artifacts. The aim of this paper is to...
详细信息
An ubiquitous learning environment provides students with a teaching method that would be not possible to be performed in a conventional web-based course. The use of learning objects in a standard way consists of an e...
详细信息
The increasing demand for Software Engineering professionals, in particular Project Managers, and the popularization of the Web platform as a catalyst of human relations nowadays has made this platform interesting to ...
详细信息
Complexity and dynamism of day-to-day activities in organizations are inextricably linked, one impacting the other, increasing the challenges for constant adaptation on the way to organize work to address emerging dem...
详细信息
Dynamism of day-to-day activities in organizations is inextricably linked and there is a variety of information, insight and reasoning being processed between people and systems, in carrying out a business process. We...
详细信息
暂无评论