Creating a Knowledge Database for Lectures of Faculty Members, Proposed E-Module for Isra University
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2015, Vol 6, Issue 11
Abstract
Higher education in Jordan is currently expanding as new universities open and compete for offering the best learning experience. Many universities face accreditation challenges, hence, they attend to recruit lecturers who may not have a solid teaching experience. Experienced lecturers tend to have high turnover rate, which cause knowledge loss. To prevent such loss, this research presents a knowledge repository framework. This framework will serve as a reference and a vessel of knowledge that builds and develops the educational and teaching capacities of professors/lecturers. It can also be seen as part of the electronic learning system, which brings benefits to students and enables them to retrieve any lectures they need. The main question we aim to answer is whether a knowledge memory can be designed and created to contribute in supporting the educational and teaching capacities of university lecturers. In order to answer this question, this research creates an electronic knowledge database to store explicit knowledge taken from lectures (written, audio and visual). These lectures are prepared and circulated or presented by university professors/lecturers throughout all university colleges and departments. This knowledge database resembles a cognitive memory that grows and develops with time.
Authors and Affiliations
Dr. Amaal Al-Amawi, Dr. Salwa Alsmarai, Dr. Manar Maraqa
Cluster based Hybrid Approach to Task Scheduling in Cloud Environment
Cloud computing technology enables sharing of computer system resources among users through internet. Many numbers of users may request for sharable resources from a cloud. The sharable resources must be effectively dist...
Cyberspace Challenges and Law Limitations
Privacy and Data security are heating topic in the modern technologically advanced economy. Technological Innovations have created new forms of electronic data which are more vulnerable to theft or loss when compared to...
Integrated Approach to Conceptual Modeling
Conceptual modeling is supporting understanding and communication of the requirements in developing the information system (IS). The nature of requirements is usually divided into the functional (FRs) and non-functional...
Efficient Iris Pattern Recognition Method by using Adaptive Hamming Distance and 1D Log-Gabor Filter
Iris recognition is one of the highly reliable security methods as compared to the other bio-metric security techniques. The iris is an internal organ whose texture is randomly de-termined during embryonic gestation and...
Attacking Misaligned Power Tracks Using Fourth-Order Cumulant
Side channel attacks (SCA) use the leaked confidential data to reveal the cipher key. Power consumptions, electromagnetic emissions, and operation timing of cryptographic hardware are examples of measurable parameters (a...