validity check
Recently Published Documents


TOTAL DOCUMENTS

80
(FIVE YEARS 20)

H-INDEX

8
(FIVE YEARS 1)

2021 ◽  
Vol 10 (2) ◽  
pp. 80-88
Author(s):  
Anang Ramadlon ◽  
Hasan Busri ◽  
Zaim Elmubarok

Mubtada 'isim marfu' which is free from amil lafadz. While khabar (comment) is an isim marfu' to complete the meaning of mubtada' (topic). This research is a qualitative research with library research research design. The instruments used in this study were data cards and recapitulation sheets. Data collection techniques using documentation techniques. The data analysis technique uses the distributional method for the direct element, and the data validity check technique uses the credibility test technique to increase persistence. Based on the research conducted by the researcher, the researcher found 279 data in the form of mubtada (topic) and khabar (comment), because the amount of data was almost the same, the researcher took 89 data for in-depth analysis. Of the 89 mubtada'(topic), 89 are mubtada'(topic) sharih and none of the mubtada'(topic) muawwal. Based on the terms of use, there are no mubtada '(topics) that are obligatory mahdzuf and 3 may be mahdzuf, 82 are obligatory muqaddam and 2 may be muqaddam, and 1 is obligatory muakhkhar and 1 may be muakhkhar. Based on the grammatical markers, it consists of 75 mubtada' (topic) with the grammatical marker dlammah, none with the grammatical marker alif, waw, and nun, and 14 mubtada' (topic) which occupies the function of mubtada' (topic) (machal rafa'). And of the 89 khabar (comments), 64 are mufrad khabar (comments) and 25 are ghairu mufad khabar (comments). Based on the terms of use, there is no khabar (comment) that is obligatory and can be mahdzuf, 1 is mandatory and can be muqaddam, and 85 is obligatory muakhkhar and 2 may be muakhkhar.


Author(s):  
Lalu Kamarudin ◽  
Agil Al Idrus ◽  
Joni Rokhmat

This research aims to find out the management of public services and how to improve public services in the Regional Library and Archival Office of West Nusa Tenggara Province. This study uses descriptive qualitative methods. In this research, data collection techniques using interviews, observations, and documentation of public services in the Regional Library and Archival Office of West Nusa Tenggara (NTB) Province. Data analysis techniques are performed with data reduction measures, data presentation, and conclusion drawing. In this research, data validity check techniques using credibility, transferability, dependability, and confirmability. The results show that: (1) public service management ranging from planning, organizing, implementation, and evaluation is still fully not running smoothly. Public services provided have been very maximal, although, in its implementation, there are still perceived shortcomings ranging from lack of reading collection materials, inadequate infrastructure, minimal funds, and the need for building procurement to support the implementation of existing services so that services to the community are still felt less; (2) Efforts of NTB Provincial Library and Archival Office to improve and improve public services conducted by always improving human resources and improving infrastructure facilities to support the implementation of public services.


Author(s):  
Mark R. Stöhr ◽  
Andreas Günther ◽  
Raphael W. Majeed

Metadata repositories are an indispensable component of data integration infrastructures and support semantic interoperability between knowledge organization systems. Standards for metadata representation like the ISO/IEC 11179 as well as the Resource Description Framework (RDF) and the Simple Knowledge Organization System (SKOS) by the World Wide Web Consortium were published to ensure metadata interoperability, maintainability and sustainability. The FAIR guidelines were composed to explicate those aspects in four principles divided in fifteen sub-principles. The ISO/IEC 21526 standard extends the 11179 standard for the domain of health care and mandates that SKOS be used for certain scenarios. In medical informatics, the composition of health care SKOS classification schemes is often managed by documentalists and data scientists. They use editors, which support them in producing comprehensive and valid metadata. Current metadata editors either do not properly support the SKOS resource annotations, require server applications or make use of additional databases for metadata storage. These characteristics are contrary to the application independency and versatility of raw Unicode SKOS files, e.g. the custom text arrangement, extensibility or copy & paste editing. We provide an application that adds navigation, auto completion and validity check capabilities on top of a regular Unicode text editor.


2020 ◽  
Vol 13 (1) ◽  
pp. 115
Author(s):  
Sunyang Park ◽  
Yuri Lee

Researchers and companies are paying attention to consumers’ sustainable consumption of clothing products. Clothing industry and fashion consumers have been criticized for a long time due to endless mass production and overconsumption. Despite the efforts of corporations to use sustainability as a marketing tool and an expanding literature exploring consumers’ response to such marketing, the definition of sustainable consumption of clothing products (SCCP) remains unclear. Academic works lack comprehensive discussions regarding SCCP in the perspective of consumers’ awareness and behavior. Furthermore, no widely accepted measurement tool of this concept exists. The validated measurement instrument will eventually help the diagnosing of the mental and behavior status of clothing consumers’ SCCP and further support to establish consumer guidance aimed at resolving sustainability issues related clothing consumption. This study aimed to conceptualize, develop and validate a scale to measure SCCP from the perspective of general clothing consumers. Literature review and interview were used to collect qualitative data for scale item generation. Then, surveys were conducted two times to acquire quantitative data from respondents to purify and validate the scale items. Content analysis, exploratory factor analysis and confirmatory factor analysis using MPlus were used to explore and predict the data. Based on reliability and validity check, the results are apparent that the scale shows good psychometric properties.


2020 ◽  
Vol 3 (2) ◽  
pp. 143-148
Author(s):  
Kendey Kendey ◽  
Rizkan Rizkan ◽  
Ririn Gusti

This research is aimed to know organizing training by Kelompok Penyanyi Jalanan (KPJ) Bengkulu City. The subjects of this research are four people, that is Andi as chairman of the KPJ Bengkulu City, Nita as a member of the KPJ Bengkulu City, Herman and Heri as a street child who was fostered by KPJ Bengkulu City. The method used in this research is qualitative method. The technique of collecting data used interview, observation and documentation. The data analysis techniques used data reduction, data presentation and conclusion retractation. The validity check used triangulation technique which starts from the triangulation of subject, triangulation of time and triangulation of technic.  From research result, Organizing carried out by the Kelompok Penyanyi Jalanan (KPJ) Bengkulu City has been carried out. This can be seen by the organizational structure that has been compiled, which is then for each individual involved in it charged with duties and responsibilities in accordance with positions they have agreed upon previously. Keywords: , Organizing, Training, Groups,


2020 ◽  
Vol 3 (2) ◽  
pp. 115-139
Author(s):  
Khoirin Nikmah ◽  
Nahdliyyatul Azimah

Purpose:This study focuses on an online Arabic learning through synchronous and asynchronous approaches. Meanwhile, the aims of this study are; 1) describing implementation of synchronous and asynchronous online Arabic learning in higher education, 2) investigating its advantages and disadvantages, 3) offering solutions in learning Arabic through e-learning. Design/methodology/approach:This is a descriptive qualitative research that applies an observation method, interview, and documentation to collect the data. Afterwards, identity method is used to investigate the data. Then, triangulation is applied for validity check Findings/result:The result shows that synchronous e-learning is the most widely applied in learning Arabic for IPIREL UMY (75 %) and IPIEF UMY (62%). On the contrary, Arabic learning (IBA) at UINSA tends to apply asynchronous e-learning (75%). Originality/value:It is important for lecturer to prepare the best method and media for distance learning. By understanding what students need, lecturer may determine how important for students to learn Arabic through synchronous or asynchronous approach. Paper type:Research paper


2020 ◽  
Vol 16 (4) ◽  
pp. 285-295
Author(s):  
Fatima Zohra Ennaji ◽  
Abdelaziz El Fazziki ◽  
Hasna El Alaoui El Abdallaoui ◽  
Hamada El Kabtane

As social networking has spread, people started sharing their personal opinions and thoughts widely via these online platforms. The resulting vast valuable data represent a rich source for companies to deduct their products’ reputation from both social media and crowds’ judgments. To exploit this wealth of data, a framework was proposed to collect opinions and rating scores respectively from social media and crowdsourcing platform to perform sentiment analysis, provide insights about a product and give consumers’ tendencies. During the analysis process, a consumer category (strict) is excluded from the process of reaching a majority consensus. To overcome this, a fuzzy clustering is used to compute consumers’ credibility. The key novelty of our approach is the new layer of validity check using a crowdsourcing component that ensures that the results obtained from social media are supported by opinions extracted directly from real-life consumers. Finally, experiments are carried out to validate this model (Twitter and Facebook were used as data sources). The obtained results show that this approach is more efficient and accurate than existing solutions thanks to our two-layer validity check design.


2020 ◽  
Author(s):  
Cong Li ◽  
Qingni Shen ◽  
Zhikang Xie ◽  
Xinyu Feng ◽  
Yuejian Fang ◽  
...  

Abstract Attribute-based encryption with equality test (ABEET) simultaneously supports fine-grained access control on the encrypted data and plaintext message equality comparison without decrypting the ciphertexts. Recently, there have been several literatures about ABEET proposed. Nevertheless, most of them explore the ABEET schemes in the random oracle model, which has been pointed out to have many defects in practicality. The only existing ABEET scheme in the standard model, proposed by Wang et al., merely achieves the indistinguishable against chosen-plaintext attack security. Considering the aforementioned problems, in this paper, we propose the first direct adaptive chosen-ciphertext security ciphertext-policy ABEET scheme in the standard model. Our method only adopts a chameleon hash function and adds one dummy attribute to the access structure. Compared with the previous works, our scheme achieves the security improvement, ciphertext validity check and large universe. Besides, we further optimize our scheme to support the outsourced decryption. Finally, we first give the detailed theoretical analysis of our constructions in computation and storage costs, then we implement our constructions and carry out a series of experiments. Both results indicate that our constructions are more efficient in Setup and Trapdoor and have the shorter public parameters than the existing ABEET ones do.


Sign in / Sign up

Export Citation Format

Share Document