Generic E-Assessment Process Development based on Reverse Engineering

Author(s):  
Fahima Hajjej ◽  
Yousra Bendaly Hlaoui ◽  
Leila Jemni Ben Ayed

The e-assessment, as an important part of any e-learning system, faces the same challenges and problems such as problems related to portability, reusability, adaptability, integration and interoperability. Therefore, we need an approach aiming to generate a general process of the e-assessment. The present study consists of the development of a generic e-assessment process which should be adapted to any learner profile. This e-assessment process is implemented as a composite cloud service which could be invoked by any existing LMS regardless of its environment. The authors are brought the abstraction defined by a workflow about proposing a development approach based on the Reverse Engineering and the cloud environment. To attempt these goals, they have studied the e-assessment politics of different existing LMSs to generate their e-assessment activities. These activities composing the generic e-assessment process using the Reverse Engineering and based on a set of mapping rules. Then, the authors have proposed a pedagogical scenario linking the generated, e-activities in an abstract manner using the concept of workflow. To specify this e-assessment workflow process, they use UML activity diagram language. Finally, to implement their approach, the authors have used the technology of cloud computing services

Author(s):  
Fahima Hajjej ◽  
Yousra Bendaly Hlaoui ◽  
Leila Jemni Ben Ayed

The e-assessment, as an important part of any e-learning system, faces the same challenges and problems such as problems related to portability, reusability, adaptability, integration and interoperability. Therefore, we need an approach aiming to generate a general process of the e-assessment. The present study consists of the development of a generic e-assessment process which should be adapted to any learner profile. This e-assessment process is implemented as a composite cloud service which could be invoked by any existing LMS regardless of its environment. The authors are brought the abstraction defined by a workflow about proposing a development approach based on the Reverse Engineering and the cloud environment. To attempt these goals, they have studied the e-assessment politics of different existing LMSs to generate their e-assessment activities. These activities composing the generic e-assessment process using the Reverse Engineering and based on a set of mapping rules. Then, the authors have proposed a pedagogical scenario linking the generated, e-activities in an abstract manner using the concept of workflow. To specify this e-assessment workflow process, they use UML activity diagram language. Finally, to implement their approach, the authors have used the technology of cloud computing services


2018 ◽  
Vol 7 (1.9) ◽  
pp. 200
Author(s):  
T A.Mohanaprakash ◽  
J Andrews

Cloud computing is associate inclusive new approach on however computing services square measure made and utilized. Cloud computing is associate accomplishment of assorted styles of services that has attracted several users in today’s state of affairs. The foremost enticing service of cloud computing is information outsourcing, because of this the information homeowners will host any size of information on the cloud server and users will access the information from cloud server once needed. A dynamic outsourced auditing theme that cannot solely defend against any dishonest entity and collision, however conjointly support verifiable dynamic updates to outsourced information. The new epitome of information outsourcing conjointly faces the new security challenges. However, users might not totally trust the cloud service suppliers (CSPs) as a result of typically they may be dishonest. It's tough to work out whether or not the CSPs meet the customer’s expectations for information security. Therefore, to with success maintain the integrity of cloud information, several auditing schemes are projected. Some existing integrity ways will solely serve for statically archived information and a few auditing techniques is used for the dynamically updated information. The analyzed numerous existing information integrity auditing schemes together with their consequences.


2014 ◽  
Vol 2014 ◽  
pp. 1-16 ◽  
Author(s):  
Md Whaiduzzaman ◽  
Mohammad Nazmul Haque ◽  
Md Rejaul Karim Chowdhury ◽  
Abdullah Gani

Cloud computing is currently emerging as an ever-changing, growing paradigm that models “everything-as-a-service.” Virtualised physical resources, infrastructure, and applications are supplied by service provisioning in the cloud. The evolution in the adoption of cloud computing is driven by clear and distinct promising features for both cloud users and cloud providers. However, the increasing number of cloud providers and the variety of service offerings have made it difficult for the customers to choose the best services. By employing successful service provisioning, the essential services required by customers, such as agility and availability, pricing, security and trust, and user metrics can be guaranteed by service provisioning. Hence, continuous service provisioning that satisfies the user requirements is a mandatory feature for the cloud user and vitally important in cloud computing service offerings. Therefore, we aim to review the state-of-the-art service provisioning objectives, essential services, topologies, user requirements, necessary metrics, and pricing mechanisms. We synthesize and summarize different provision techniques, approaches, and models through a comprehensive literature review. A thematic taxonomy of cloud service provisioning is presented after the systematic review. Finally, future research directions and open research issues are identified.


2020 ◽  
Vol 2 (11) ◽  
pp. 15-21
Author(s):  
Ria Dwi I’zzaty

Current technological developments greatly impact the assessment verification system. To find out the student benchmarks in the results of teaching and learning activities during the learning system assessment process is very important in the scope of higher education. With the existence of blockchain technology widely applied in the world of Education, having the advantage of a decentralized system and strong cryptography can help universities in building infrastructure. Universitas Raharja is one of the educational institutions that has implemented an online assessment system (PEN +), which will use blockchain technology to verify the assessment of independent studies. which provides services to Raharja University lecturers in verifying student grades that can be accessed anywhere and at any time. However, currently the verification process for the independent study assessment that has been carried out is still done manually which results in verification not with very strong security. The existence of an independent study assessment verification uses blockchain technology to produce strong data security that did not occur before. In the PEN + lecturer assessment system for the independent study assessment verification process, it cannot yet enter the value of Independent study (IS) in real time. Therefore, there is a need for development in this blockchain technology for the verification process of independent study assessment. In this study there were 10 (ten) literary studies on verification of valuation. Thus there are several benefits that lecturers need not hesitate to verify the assessment, the process by using blockchain technology produces very strong security.


2012 ◽  
Vol 9 (1) ◽  
pp. 249-283 ◽  
Author(s):  
Drazen Brdjanin ◽  
Slavko Maric

This paper presents an approach to the automated design of the initial conceptual database model. The UML activity diagram, as a frequently used business process modeling notation, is used as the starting point for the automated generation of the UML class diagram representing the conceptual database model. Formal rules for automated generation cover the automatic extraction of business objects and business process participants, as well as the automatic generation of corresponding classes and their associations. Based on these rules we have implemented an automatic generator and evaluated it on a real business model.


2012 ◽  
Vol 13 (1) ◽  
pp. 68-73
Author(s):  
Erika Asnina

Abstract - The paper discusses application of the topological functioning model (TFM) of the system for its automated transformation to behavioural specifications such as UML Activity Diagram, BPMN diagrams, scenarios, etc. The paper addresses a lack of formal specification of causal relations between functional features of the TFM by using inference means suggested by classical logic. The result is reduced human participation in the transformation as well as additional check of analysis and specification of the system.


Tech-E ◽  
2019 ◽  
Vol 2 (2) ◽  
pp. 16
Author(s):  
Amelia Andi ◽  
Yakub Yakub

PT.Murni Alam Sehat is one of company sell medical device and medicine by prescription or without doctor’s prescription. The problem in marketing department in this company do not have promotion media for offer the products to consumer, no online sell, and order only by phone. To solve the problem in marketing department is build up e-commerce system. E-commerce system use Unifed Modelling Languange (UML); Activity Diagram, Use Case Diagram, Sequence Diagram, and Class Diagram. User Centered Design (UCD) as design method. Program language for e-commerce system is PHP and MySQL for database. The result of research is a e-commerce system website base to help search information product, company could get report easier, consumer can do purchase by online everywhere and everytime.


Author(s):  
Saravanakumar S

The connected vehicular ad-hoc network (VANET) and cloud computing technology allows entities in VANET to enjoy the advantageous storage and computing services offered by some cloud service provider. However, the advantages do not come free since their combination brings many new security and privacy requirements for VANET applications. In this article, we investigate the cloud-based road condition monitoring (RCoM) scenario, where the authority needs to monitor real-time road conditions with the help of a cloud server so that it could make sound responses to emergency cases timely. When some bad road condition is detected, e.g., some geologic hazard or accident happens, vehicles on site are able to report such information to a cloud server engaged by the authority. We focus on addressing three key issues in RCoM. First, the vehicles have to be authorized by some roadside unit before generating a road condition report in the domain and uploading it to the cloud server. Second, to guarantee the privacy against the cloud server, the road condition information should be reported in ciphertext format, which requires that the cloud server should be able to distinguish the reported data from different vehicles in ciphertext format for the same place without compromising their confidentiality. Third, the cloud server and authority should be able to validate the report source, i.e., to check whether the road conditions are reported by legitimate vehicles. To address these issues, we present an efficient RCoM scheme, analyze its efficiency theoretically, and demonstrate the practicality through experiments


Sign in / Sign up

Export Citation Format

Share Document