learning content management
Recently Published Documents


TOTAL DOCUMENTS

83
(FIVE YEARS 8)

H-INDEX

8
(FIVE YEARS 0)

Author(s):  
Артем Григорович Тецький ◽  
Ольга Ігорівна Морозова

The subject of study in the article is the platforms used to organize the educational process in the context of distance learning. The following platforms are selected: learning content management systems (open source systems and individual development), Google Classroom service, e-mail, and cloud data storage. The objects of the educational process for which the security state must be provided are shown. Such assets are files (lectures, tasks for laboratory work), a bank of questions (a total set of questions from which tests are created to control knowledge), and grades (for laboratory work and modular control of knowledge). The goal of the work is a comparative analysis of distance learning platforms in the aspect of cybersecurity. The main threats are a violation of the availability and confidentiality of data in the educational process. It is also possible to modify marks due to the exploitation vulnerabilities of the system or gaining access to the functions of the learning content management system administrator. The probability of data being compromised is higher than the probability of modification, as evidenced by information from vulnerability databases about numerous vulnerabilities in learning content management systems. An accessibility violation is a result of a denial of service, that is, the resource on which the necessary files are located becomes inaccessible to users. The method of expert evaluation with variables of fuzzy logic is used. As a result of the analysis, it was revealed that the most flexible and convenient platform is the learning content management system of individual development, at the same time it is the most unsecure among the platforms considered. An open-source learning content management system is a more secure platform due to the presence of a global community that can identify security problems faster than attackers. Using Google Classroom and using email with cloud storage is safer, but these approaches are inferior in usability and functionality. Conclusions. Choosing a distance-learning platform is about finding a compromise between security and convenience in the form of a wide functionality of the system. When deploying a centralized learning content management system, it is important to remember that this system is an object of critical information infrastructure, and the requirements for critical systems must be met for it.


TEM Journal ◽  
2020 ◽  
pp. 731-739
Author(s):  
Angelina Kirkova-Bogdanova ◽  
Daniela Taneva

The aims of this study were to investigate the extent and benefits of ICT usage; barriers to learning content management systems (LCMS) deployment; perception and attitude to e-learning of the academic staff in the healthcare majors at the Medical University – Plovdiv. The results indicated that the educators use technologies extensively, they are experienced with computers but this is not a predisposition for teaching in the LCMS. Staff demonstrates acceptance of e-learning and critical attitude to its implementation, but the activity in the LCMS is low. Leading barriers in e-course creation are the heavy workload and the need for support in creating interactive learning content. A training course framework is proposed.


2020 ◽  
Vol 24 (3 Part A) ◽  
pp. 1713-1720
Author(s):  
Han Yang ◽  
Shuaiwei Dong ◽  
Zhiyong Sun ◽  
Yaoming Wang ◽  
Xuefeng Luo ◽  
...  

Catalpa ovata G. Don. has a certain degree of appreciation because of its unique tree shape and wide crown. It also has certain adaptability. This experiment uses organic materials such as Fourier transform infrared (FT-IR) spectroscopy, gas chromatography-mass spectrometer (GC-MS), learning content management system, thermal desorption - GC-MS, termal gravimetric analyzer and other modern techniques to extract organic reagents from Catalpa ovata G. Don?s Leaves. The original powder was tested differently and analyzed, investigated. To explored and developed its potential medicinal value, and better understood its use in biomedicine, as well as perfumery and chemical industries, providing some research for further and in-depth research basis.


By traversing through time we realize that not only the education system has changed be also the way of teaching needs to be changed which ultimately can get from LCMS, it is one of the widely used tool for the educating system. Now many institutions are adopting it in order to improve their system of education, but after all these activities there is also a need for the security. Learning management system is one of the entities which takes part with excessive size content material transport. It additionally enables to use it in far off area in addition to useful for the man or woman with disabilities. LMS help in studying the modules based at the individual ability on person timeframe. Many situations together with screen lock and tool interest disable is carried out in previous method to keep away from content material leak through unauthorized get admission to. Consequently locating proper answer structure on LCMS is one of the goal necessities. On this paper, creation of the security over LCMS and in addition finding an enhance version for imparting the safety in data gaining access to and managing is furnished.


By traversing through time we realize that not only the education system has changed be also the way of teaching needs to be changed which ultimately can get from LCMS, it is one of the widely used tool for the educating system. Now many institutions are adopting it in order to improve their system of education, but after all these activities there is also a need for the security. Learning management system is one of the entities which takes part with excessive size content material transport. It additionally enables to use it in far off area in addition to useful for the man or woman with disabilities. LMS help in studying the modules based at the individual ability on person timeframe. Many situations together with screen lock and tool interest disable is carried out in previous method to keep away from content material leak through unauthorized get admission to. Consequently locating proper answer structure on LCMS is one of the goal necessities. On this paper, creation of the security over LCMS and in addition finding an enhance version for imparting the safety in data gaining access to and managing is furnished.


Author(s):  
Maitri Maulik Jhaveri ◽  
Jyoti Pareek

Online learning repositories are the heart of learning content management systems. This article proposes a model that utilizes the educational content of learning repositories, to create and display multiple learning paths to the students. When a student specifies a topic to study, the model creates the learning paths in form of a tree, with student specified learning concepts as the root node and its co-existing concepts as the child nodes. The model also proposes to automatically extract three co-existing concepts: prerequisites, subsequent topics and features. Use of pattern-based mining and a rule-based classification approach is proposed for the extraction of co-existing concepts. Automatically extracted results are checked for meaningfulness and usefulness against expert generated results. Evaluation of the authors' model on various learning materials shows the appropriate generation of learning paths depicting the co-exiting concepts. The average F1 score obtained for automatic prerequisite extraction is 78%, automatic subsequent topic extraction is 83% and automatic feature extraction is 88%.


Author(s):  
Mukta Goyal ◽  
Rajalakshmi Krishnamurthi

This chapter explores a novel learning content management system. This chapter presents a novel system based on integration of voice authentication, face recognition technique, and signature of a person to recognize in e-learning system. Voice-based authentication, face recognition, and signature of a person is most widely used to authenticate human identity. The main concern in an e-learning system is to demotivate unknown users from taking the examination in place of the learner. Different techniques have been introduced to stop this fraud if any unknown person wants to imitate person's identity. In order to avoid the fraudulent handling of e-learning systems, the authentication based on voice recognition is discussed as one of the efficient techniques in literature.


2018 ◽  
Vol 13 (1) ◽  
pp. 035
Author(s):  
Dewi Salma Prawiradilaga

The article is about a descriptive finding on the function of an LCMS used by the official website of the Department of Curriculum and Educational Technology, Faculty of Education, State University of Jakarta, www.courses.web-bali.net. Based on the observation, there are some principles that may be applied in uploading course content. They are topic analysis and message design principles which should intensively be applied during developing and structuring learning objects in a learning path. Chunk is the main concept in content development. Regarding copyright issue, all parties should respect to those who write or produce creative works accessible through online.


2018 ◽  
Vol 12 (2) ◽  
pp. 255 ◽  
Author(s):  
Hansiswany Kamarga

The purpose of this paper is to find a comparison between the use of QuestGarden learning content management system and Edmodo learning management system in learning particularly for the teaching of history. Characteristics of history filled with facts mastery often make teacher forget the real purpose of history learning. The abundance of facts characteristics brought up in history teaching, so it often put history learning as facts mastery learning through rote learning activity. This writing attempt to lift other approach in history learning namely online based learning that was identified can improve the ability to think. The results show QuestGarden (LCMS) or Edmodo (LMS) can be implemented in the history teaching learning, though both have different characters and use. Teachers need to understand them so that they can implement it in a synergic position.


Sign in / Sign up

Export Citation Format

Share Document