2016
DOI: 10.3991/ijet.v11i10.5881
|View full text |Cite
|
Sign up to set email alerts
|

Quality Assurance for Reusable Learning Objects on a Peer-To-Peer Network

Abstract: Abstract-In this research, improving on the quality of Reusable Learning Objects (RLOs) on a Peer-To-Peer (P2P) network is considered. The RLO was first redesigned to have a fundamentally inherent pedagogical structure, which gave it an immediate foundational level of quality in terms of opportunities related to reusability. Applying the Learning Object Review Instrument 1.5 (LORI 1.5) demonstrated that some of the elements are inherent in this new RLO design, so there was no need to constantly have such featu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0
1

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 11 publications
(12 reference statements)
0
4
0
1
Order By: Relevance
“…Furthermore, the data collected in this study is about the quality of learning devices. The instrument used is a validation sheet which includes the appropriateness of content, language, format, and graphic illustrations (Akpinar, 2008;Singh & Bernard, 2016).…”
Section: Research Instrumentmentioning
confidence: 99%
“…Furthermore, the data collected in this study is about the quality of learning devices. The instrument used is a validation sheet which includes the appropriateness of content, language, format, and graphic illustrations (Akpinar, 2008;Singh & Bernard, 2016).…”
Section: Research Instrumentmentioning
confidence: 99%
“…The goal this research work is to enhance the mobile P2P network's security and then we want to give a clear idea about how mobile P2P network is actually break the rule of the information security, well that is right the way that the P2P work allows the mobile user's network to be open to the other users in the network, which it will be expose to various type of attacking, theft and malware harm, also mobile P2P network sometimes allows backdoor access to the user's system information. An example on theft like an employee could steal a copyright material like software, files or (documents) of a company which they are very confidential by using any of the (Wrapster) software which they are available in the internet to disguise these files as an music files (mp3) and share it by the P2P to pass it through the company's system security and anyone outside the company can download the file and unwrap it and he will get that material, also for backdoor access and piggybacks if the software that is used for making the P2P communication if they are infected with some kind of viruses could allow the hacker to gain access to the user's system information, hard storage and bandwidth connections also for a high performance attacker he could infect may nodes in the network (malwares) causing what called Botnet [10], which can lead also a Denial of service (DDoS) [11,12], also there are many types of attacking and also a lot some security mechanism are proposed by the research which it will discuss literary in this work. So, our proposed solution for enhancing mobile P2P network's security can be constituted from three main parts web threats avoidance, P2P network attacks avoidance and P2P network encryption.…”
Section: Proposed Solution For Mobile P2p Network Securitymentioning
confidence: 99%
“…The LORI framework is widely used for evaluating the quality of RLOs. Singh and Bernard (2016) described a peer‐to‐peer network for quality assurance for reusable learning objects, which used learning object review instrument 1.5 (LORI 1.5). The LORI framework was used to evaluate eight learning objects developed by teachers for K–12 students, and overall LORI scores varied from 30 to 36 out of maximum 45 (Akpinar and Simsek, 2007).…”
Section: The Lori Model Rubric (Adapted From Leacock and Nesbit 2007)mentioning
confidence: 99%