You are on page 1of 8

(IJCNS) International Journal of Computer and Network Security, 1

Vol. 2, No. 10, 2010

Intelligent Online Course evaluation system Using


NLP Approach
Behrang Parhizkar, Kerfalla Kourouma, Siti Fazilah, Yap Sing Nian, Sujata Navartnam, Edmund Ng Giap
Wen
Faculty of Ict, Limkokwing University of Creative Technology,
Cyberjaya, Selangor, Malaysia
haniukm@yahoo.com
kk@limkokwing.edu.my
sitifazilah@limkokwing.edu.my
yapsn@limkokwing.edu.my
sujata@leadership.edu.my
nggiapweng@yahoo.co

Abstract: Every semester students are asked to complete course on by introducing the web-based approach. However some
evaluations at Limkokwing University. The main goal of the universities have conducted research and implemented the
course evaluation is to collect feedback from student in order to online course evaluation and have found it effective. Online
improve the quality of the education. However, a traditional
evaluation system promises a lower costs compared to
method of using paper and pencil is the current approach in
Limkokwing University. In this paper we proposed an intelligent paper-based evaluation. In addition it saves time for the
online course evaluation system that aims to automate this faculty, anonymity for students, better safeguards against
routine in order to facilitate data gathering, analysis and tampering, and more flexibility in questionnaire and report
storage. The document is an essential element as it provides a design [2]. Just like any normal system, the online
summary of the literature about online course evaluation in the evaluation system also has some drawbacks which include
first part of the paper and describes our findings on the
easy sensitive data access by unauthorized users, lower
approaches use for text mining in the second part. And finally
we discussed about the proposed system and the implementation
response rates and ratings may be less favourable to
of Natural Language Processing. lecturers.
KeyWords: Online Course evaluation, data mining, Natural In this paper we discuss about the argument over the online
Language Processing. and offline course evaluation method. We also discuss about
the evolution of online course evaluation system, and we
presented an intelligent online course evaluation proposed to
replace the current paper method use in Limkokwing
1. Introduction
University.
The evolution of technology and computer reveals the
Internet as the fastest medium of communication where the 2. Previous Works
information is at your fingertips. This evolution has brought
a new era where real time information are being accessed 2.1. Evolution of Course evaluation
from everywhere. As part of that evolution the education has According to Haskell the student evaluation of faculty
come to the level where universities, lecturers and students members was first used at the Univeristy of Wisconsin in the
communication through internet. We are living the era of early 1920s to collect students’ feedbacks. Many other
virtual world where everything seems to be transformed universities introduce it in the 1960s as a decision-support
from physical to digital form. Thus, new concepts such as tool regarding salary, promotion, and tenure. Since then it
virtual classrooms and digital libraries have been introduced has been the dominant method for evaluating teaching
to break the barriers of education and meet challenges of the across North America, and continue to be the same today
new millennium. but used for formative purpose to help faculty improve
The Idea of online course evaluation system is to abandon teaching instead of summative decisions regarding salary,
the paper evaluation system that has been used for years. promotion, tenure and merit.
The evolution from paper to online student evaluation With the emergence of internet we were introduced to online
system is an innovative idea of the new millennium where evaluation system in the 1990s. In 1997, Columbia
everything is been automated and accessed from home., If University implemented their Web course Evaluation system
students can study online and register online why not [30]. This system allowed faculty to customize their surveys
evaluate their lecturer online? Despite the growth of World and was linked directly to the registrar’s office for security.
Wide Web, the online course evaluation remains a new topic The result of evaluation was published on a public web
to many institutions of higher education. Most of them are where anyone could view.
stuck on the traditional approach and have problem to move In Australia, Deakin University recognized the potential
2 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 10, 2010

savings in time and expense they would gain by shifting In 2002 and 2004, Teaching Questionnaire ratings were
from traditional evaluation to an online evaluation system collected online in several University departments in Pilot
[31]. Before the implementation of their online system in tests. A low performance of web-based Teaching
1998, off-campus students used to mail their evaluation Questionnaire compared to the standard was observed in the
form and the compilation of these forms into electronic form tests with a lower response rate and less favourable
could take up to 3 months to complete. The implementation responses [2]. Several studies demonstrated the low
of an HTML and CGI-based online system raised the response rate provided by the web-based questionnaires
response rate to 50% in 1997. Then later after the which are illustrated in Table 1.
implementation the complete online evaluation system,
online and offline student could log in with their unique ID Table 1: comparison between web Based and Paper approach
and complete the evaluation. Researchers Yea Web Mail/
In the late 1990s two (2) other universities in china r Based/ pape
(HKUST, HKU and HKPU) collaborated to create 2 online E-mail r
evaluation systems [32]. COSSET (Centralised Online Medlin et al 1999 28% 47%
System for Student Evaluation of Teaching) and OSTEI Guterbock et al 2000 37% 48%
(Online System for Teaching Evaluation of Instructors). Kwak and Radler 2000 27% 42%
Comparatively, COSSET provided more features than Crawford et al 2001 35%
Ranchlod & Zhou 2001 20% 6%
OSTEI and relied on registration information for student
logins while OSTEI used a combination of instructor ID and
questionnaire ID for logins which was less secure. But A research since 1986 [11] noticed a drop of email-survey
OSTEI was flexible and allowed instructor to register and response rates from 46% in 1995/1996 to 31% in
create their own questionnaire and also provided a bank of 1998/1999. Other research also noticed a drop of response
800 questions to allow custom questionnaire. rates in a survey completed in 1995 and 1998 [12].
Another system was implemented by Drexel University [30]. Layne also was conducted a comparative study between
This system was based on HTML, SQL and the Perl electronic and paper course evaluation [13]. In this survey a
scripting language. Instructors would submit their questions number of 2,453 were evaluated using the same question in
on a template email which would be uploaded as evaluation the electronically and paper-based evaluation. The response
forms into the system. The students name and birth date rate was 60.6% for the class evaluation against 47.8% for
were used to log in and complete the evaluation. to the online evaluation. Another research that conducted in
encourage more participation, E-mail was used as main 2000 had a very less participation of student in the online-
means of communication between students and the faculty based evaluation, and the reason was that students were
to remind student about completing the evaluations. satisfied with their lecturers’ performances which give them
According to Hmieleski in a report on higher education in an excuse not to fill the evaluation form [14]. Students
2000, only 2 institutions ranked as the most wired were found the online evaluation easy to use and liked it because
using the online evaluation among the 200 wired- of the anonymity. The online method gave them the ability
institutions in Australia. However In 2002, the online to provide more thoughtful comment than the traditional
evaluation system was still considered limited in higher method.
education. However some researchers found a positive result in email
Electronic Evaluation Method Vs Traditional paper response rates. Unlike table 1, Tables 2 provides the
Method: findings that demonstrates high response rate for online
Many Universities hesitate to convert to web-based evaluation over the traditional approach.
evaluation due to fears regarding cost, return rates, and
Tables 2: Comparison between E-mail and Mail Evaluation
response quality [1] but in one of the previous studies on
this topic, [4] compared traditional course evaluation with
Authors Year Email Mail
online evaluations at Rutgers College of Pharmacy. they
compared the evaluation rates of both methods and found
Parker 1992 60% 38%
that the paper had a evaluation rate of 97% with a response
rate of 45% to the open-ended questions whereas online Kiesler & 1986 67% -
method had an evaluation rate of 88% and a response rate of Sproull
33% for the open-ended questions. Dommeyer also
conducted a survey to determine preferred method of student Walsh et al 1992 76%
appraisal where the tagged was a group of business
professors [3]. Out of 159 faculty members, 33% responded Jaclyn M, 1998-2002 64%
and there was a preference for the paper evaluation because Grahan H
they believed it has a higher response rate and accurate
response. It was concluded that the online approach could Some others researchers in their research stated that the
be more appealing to faculty members if techniques could be advantage of E-mail or web based survey over traditional
used to increase students’ response rates. method is that Paper resource use savings decrease costs by
(IJCNS) International Journal of Computer and Network Security, 3
Vol. 2, No. 10, 2010

80 to 95% [11] [19] [20]. Compared to a normal mail survey the University to implement an online rating system,
it is cheaper and the cost decreases as survey size increases including communication and training as essential
[21]. In addition, students provide more answers to the open components of the system. They also recommend comments
ended question online [21] [12], according to another not to be stored in the database or electronics files after
research on 1998 email surveys are cheaper and faster than using them as they could be easily accessed by an
paper surveys, encourage respondents to reply and can unauthorized user which reduce the Freedom of Information
provide a friendly environment [22]. Act (FOIA). And they also stated that authors of comments
According to [3], St. Louis College of pharmacy compared and ratings should not be identified during collection of
the traditional paper with online evaluation. Out of 169 data. And the list of respondents should be deleted from the
students in the survey, 50 were randomly chosen to complete system and should never be available to the faculty and
the same form online, and the other 119 students to teachers.
complete the traditional paper. This study showed that In addition they gave recommendation to overcome one of
despite the small number of students completing the online the common concerns of online evaluation system which is
evaluation, they provided more comment than the big low response rates. They forbid Universities to use
amount of student that completed traditionally; and the incentives and sanctions to improve the response but
number of words typed online was 7 times the number of instead, use targeted announcements and frequent follow-up
words typed offline. The time spent by students to complete reminders for students during period when the evaluation is
was approximately 10 minutes online VS 25 minutes offline. being collected.
The staff took 30 hours to compile scores and comment from Completion time indicated in the invitation, timing of the
the paper VS an hour to just download scores and comments reminder notice, access to the survey. Perceived anonymity
from the online survey. and confidentiality of responses including reward are factors
may affect the email survey response rates [6]. An
2.2. Web based survey methodology
investigation of another research on 2001 shows that more
Based on our research we found that either paper or web the time given to complete the survey increases more the
based survey; the methodology matters as it affects the response rate decreases because the user will not focus
response rates. A research shows that there is a way to knowing that he has a lot of time to complete it [10].
maximise response rates by keeping the questionnaire short Online respondent are more distracted with others opened
and the following up notice is an important aspect that windows and may have less attention. A risk of being
affects the response rate. A reminder after two days had a attacked by virus is considerable and the download time or
completion rate of 30.3% while a reminder after five days number of pages accessed may affect the online survey.
had a completion rate of 24.3 %(p<0.050) . In general, two Unlike the web-based, these are generally not issues with the
days reminder notice is suggested [6]. But others paper or mail survey [6]. Due to the big amount of email
researchers [23] have found improved response rates with received by users, it is likely that they may ignore email
fourth contacts. form unknown senders [10].
In a Crawford et al study, the authors mentioned that the
more complicated is the access to the questionnaire; fewer
3. Text Mining
users are motivated to respond. Researchers have
demonstrated that the ease of access to the survey page is As the human speak or write English, he uses a lot of word
important. Dommeryer and Moriarty showed that an combination to express something or to explain something.
embedded survey with an en easy access had a better Out of 50 words spoken or written, the useful information
response rate compared to an attached questionnaire that needed by others might only be 10 to 20 words, the rest are
requires downloading, completing and uploading the the way to make the English language beautiful. when we
questionnaire [24]. To minimize the download time of read a text, our brain try to get the useful information out of
questionnaire pages other researchers recommended the use it and try to match it with something store on our mind in
of simple designs for the system [25]. The question should order to understand and interpret it for decision support . So
be straight forward and simple, in addition each point does the computer through test mining.
should ask only one question [26]. Text mining also called text data mining, processes
A lack of anonymity in the use of email surveys has been unstructured textual information to extract high quality
underline as one of the reason of the low response rates [16] information through patterns and trends such as statistical
[25]. Administrators can track passwords and easily access pattern learning. Data mining involve the process of
user answers. Especially with Emails, an author is easily structuring text that would be stored in a database and
traceable via return email on which the respondent email restore later for interpretation. Text mining tasks include
may be included. And if the survey is designed online and text categorization, text clustering, and concept/entity
no password, there is no way to follow up on non extraction, production of granular taxonomies, sentiment
respondents and there won’t be any control over the number analysis, document summarization, and entity relation
of survey complication per person rates [6]. modelling.
Some research teams provided recommendation for the Text mining also called knowledge discovery for text was
methodology to be used. There was a recommendation for mentioned for the first time by. Un Yong N. and Raymond
4 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 10, 2010

J. M defined it as “the process of finding useful or KDD and data mining are two terms that are sometimes
interesting patterns, models, directions, trends, rules from confusing and used as synonyms. Reasons given were that
unstructured text”. It refers generally to the process of Data mining includes all the aspect of knowledge discovery
extracting interesting information and knowledge from process [33] and that data mining was a part of the KDD-
unstructured text [32]. It has been describe as truly processes or modelling phase of KDD process. However data
interdisciplinary method drawing on information retrieval, mining represent the same concept as KDD and has for goal
machine learning, statistics, computational linguistics and to retrieve useful information in data. It was defined by [33]
especially data mining [32]. That implies that text mining as the search for valuable information in large quantities of
uses techniques for information extraction and natural data. For data mining to achieve its goals, few research
language processing (NLP) to extract data to which areas need to be included which are database, machine
algorithms and methods of KDD can be applied. This learning and statistics.
technique is widely used by many authors [2] [32]. Text • Database is not only used to store found information
mining was also described as the extraction of not yet only but it is necessary to support the data mining
discovered information in large collections of texts [35]. It is algorithms for the identification of useful information.
considered as process oriented approach on texts. For a • Machine learning (ML) is a field of artificial
good comprehension of the topic, there are few terms that intelligence which consists of developing techniques to
you need to be familiar with. allow computers to learn by analysis of data.
3.1Text Mining Approaches • Statistics deals with science for the analysis of
empirical data. Today many methods of statistics are
Text mining has several approaches or techniques. Some
used in the field of KDD [33].
proposed techniques are knowledge Discovery and Data
Information Retrieval (IR):
mining, Information Retrieval, Information Extraction,
Information retrieval is the finding of documents which
Knowledge Discovery and Data mining:
contain answers to questions and not the finding of answers
Knowledge discovery or knowledge discovery in databases
itself [35]. IR refers to the research of information using
(KDD) is defined by [35] as the non-trivial process of
methods, automatic processing of text data and comparison
identifying valid, novel, potentially useful, and ultimately
of question and answer. IR is a research area that has been
understandable patterns in data. It considers the application
widely used with the growth of World Wide Web. It was
of statistical and machine-learning methods to discover
first used for automatic indexing. IR also refers to the
novel relationships in large relational databases [34]. KDD
extraction of information based of keywords such as search
has for goal finding hidden patterns or facts in a database or
engines [33].
text file and includes several processing steps that have to be
applied to the data in order to achieve this goal. The main 3.2Natural Language Processing (NLP)
steps defined by Cross Industry Standard process for Data Natural Language Processing refers to text processing for an
mining (Crisp DM) is shown in Figure 1 namely: phases of understanding of human language by a computer. Its goal is
Crip DM [10]. Business understanding and Data to interpret human language through the use of computers
understanding are the first steps that consist of analysis and [36]. Natural Language Processing is a linguistic analyse
understanding of the initial problem. The next step which is technique for a fast text processing.
Data preparation consist of pre-processing to convert data The concept of Natural Language Processing is all about
from textual to a format that can be suitable for the data understanding an input in a form of natural language and
mining algorithm which is applied at the Modelling phase. producing an interpretation of it in sentence in a form of
The process is completed by an evaluation and deployment natural language as well through the use of computer. The
of the obtained model. process of understanding a sentence by the computer in
Natural Language Processing is illustrated in Figure 2.

Figure 1: Phases of Crip DM (Andreas H, Andreas N,


Gerhard P 2005)
(IJCNS) International Journal of Computer and Network Security, 5
Vol. 2, No. 10, 2010

Generation that is done based on the user goal. The process


accepts any goal input from the user and the text planning
consults the planning operators to get an appropriate
operator that suit the goal. Then the linguistic realisation
linearlises the message content from the hierarchical
structure to generate cohesive unit of text then finally maps
it into the surface sentences.

Figure 4. A general architecture of natural language


generation (Josef Leung & Ching-Long Yeh)
3.3Information Extraction (IE)
Un Yong N. and Raymond J. M consider it as a key
component for text mining with the goal to find specific
data in natural-language text [34]. That information is
Figure 2. Modules of Natural language understanding stored in database like patterns and data to be extracted is
(Josef Leung & Ching-Long Yeh) given by a template containing the information needed and
The pre-processing block reforms the words in the input blank field to be filled with information retrieved from the
sentence in various forms of single words. Then the pre- text. Example: my name is kerfalla kourouma, i was born in
processed is received as input in the parsing block that 1986 in the US. I am married with two children and live in
constructs syntactic structure by referring to a syntax rule paris.
database. The syntax rules would specify the type of words Let’s say that from this short text our goal was to know the
(i.e Noun, Verb). Figure 3 demonstrates how a sentence is personal details of the author of the text. The information
segmented to form a syntactic structure. that would be looking for would be the name, birth date,
marital status, address and phone number. Therefore our
template would by default contain these titles with blank slot
that would be filled with information extracted in the text or
document.
Name: kerfalla Kourouma
Birth date: 1986
Marital status: married
Location: Paris

The above information is now in a structure form and can be


stored in a database and retrieve later for a further use. From
the above example we would describe information extraction
Figure 3. A Sample Syntactic structure (Josef Leung & as retrival and transformation of unstructured information
Ching-Long Yeh) into structure information stored in a database. Califf
The semantics component represents the meaning of the suggested using machine learning techniques for extracting
sentences in a semantic representation. Semantic information from text documents in order to create easily
interpretation maps the syntactic structure of a sentence to searchable databases from the information, thus making the
the logic based representation which as result is the information more easily accessible.
interpretation of the context-independent meaning of Text Encoding:
sentence. The process of mapping the semantic In text mining, it’s very important to encode a plain text
representation to the knowledge representation, contextual into a data structure for a more appropriate processing. Most
interpretation, is performed to obtain the way the sentence is text mining approaches are based on the idea that a text
used in particular context. document can be represented by a set of words [33].those
Figure 4 illustrates the process of Natural language words are contained in a bag-of-words representation. The
6 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 10, 2010

words are defined using vector representation whereby as Tribune Company use text mining to monetize the
numerical value is stored for each word. The currently content.
predominant approaches are the vector space model [39], • Sentiment analysis may involve analysis of movie reviews
the probabilistic model [25] and the logical model. to estimating how favourable a review is for a movie.
The Vector Space Model: • Academic applications: text mining is an important tool
The vector space model was introduced first for indexing for publishers who hold database of information and
and information retrieval [25] but now it is also used for text require indexing for retrieval.
mining and in most currently available document retrieval Example of Applications using text Mining:
systems [33]. It enables efficient analysis of huge text • AeroText: is a package of text mining applications for
documents by representing them as vectors in m- content analysis.
dimensional space. Each document d is described by a • Attensity: can be hosted, integrated or stand-alone text
numerical feature vector w(d) =( x(d, t1), . . . , x(d, tm)) mining software that uses natural language processing
thus, the documents can be compared by use of simple technology to address collective intelligence in social
vector operations and even queries can be performed by media and forums.
encoding the query terms similar to the document in a query • Endeca Technologies: provides software to analyze and
vector. The query vector can then be compared to each cluster unstructured text.
document and a result list can be obtained by ordering the • Autonomy: suite of text mining, clustering and
documents according to the computed similarity [25]. categorization solutions for a variety of industries.
• Expert System- suit of semantic technologies and
3.4Applications for text Mining products for developers and knowledge managers.
Text mining is an area currently used in various domains.
Security applications:
Text mining is usually used to analyze plain text source in 4. Proposed System
internet. Text can be filtered by removing some In our research we noticed that most online course
inappropriate terms such as bad word in a chat room. It is evaluation have common requirements that many programs
used as well to automate the classification of texts. i.e it can meet such as user authentication to prevent from
be applied to filter undesirable junk email based on certain unauthorized use of the system and prevent double
terms or words that are not likely to appear in normal evaluation, student anonymity that protects them from being
messages. Those messages can be automatically discarded or trace by their lecturers, user validation and report. However
routed to the most appropriate department. we found that only very few existing system use chart to
Analyzing open-ended survey responses: represent data in the report and none of them allow the
It is used in survey research in which various open-ended system to provide suggestion to the manager based on the
questions about the topic are included. The idea is to allow students comment. That is the reason we propose an
respondents to express their opinions with no limitation or intelligent course evaluation system that will generate a
without constraining them to a particular response format. report that includes suggestion and chart. It would be a
Text mining is now used in marketing applications to system that uses algorithms to understand and retrieve from
analyze customer relationship management apply it to students open-ended responses useful data and interpret it
improve predictive analytics models for customer attrition. into information for the report.
This method is often used by marketing to discover a certain
set to words used to describe the pro’s and con’s of a 4.1. Proposed System Features and user Roles
product or service. The intelligent online evaluation system would have 3 user
The proposed system falls into this area of application. It roles: The faculty members that would own the admin role,
will be using the same concept to interpret the student the student and the lecturer role. These roles have different
comment in the open-ended question of the student level of access to data and are provided with different
appraisal. features.
Analyzing warranty or insurance clains, diagnostic Students: are the potential stakeholders of this system.
interviews, etc: Upon log in they are provided questionnaire link for each
In some business domains, most data are collected in open- module that they can evaluate only once. They can see the
ended textual form. For example warranty claims or medical status of each evaluation questionnaire to know which
interviews are usually written in text form by a customer to modules they have not evaluated yet. Their input will be
explain the problems and the needs. These information are processed and used to generate the report.
type electronically and available for input text mining Lecturers: have a passive or viewer role. They are only able
algorithms. And as output, can generate useful structured to view students comments related to the course they teach
information that identifies common clusters of problems. without having a possibility to trace the authors. This would
Others applications: help them to know what student think about the course and
• Various biomedical applications use text mining such as would know how to improve their way of teaching.
PubGene, GoPubMed.org and GoAnnatator. Faculty members: the faculty members are those who can
• Online Media applications uses by media companies such view every single thing except the student name of a
(IJCNS) International Journal of Computer and Network Security, 7
Vol. 2, No. 10, 2010

particular response. They give account to lecturer and and reduce work as it would provide chart and suggestion
student, allocate module to student and lecturer, create, edit using Artificial Intelligence (Natural Language Processing).
and delete questionnaire and view report. The report With a proper project plan the proposed system would be a
includes the student’s feedback, statistical result with chart platform that would be benefiting the University.
for every lecturer and suggestion that would help the faculty Future Enhancement
to take strategic and academic decision. The faculty As the time past, new challenges are presented to man-kind.
members would be able to view as well the response One of the most common challenges of the new millennium
percentage of each module and can set starting date and is the rapid access of information and very recently the
finishing date of the questionnaire. mobility of the information. The technology is moving to
The challenges presented here brought us into other area of mobile computing, and all the businesses are introducing it
research that would allow us to achieve this innovative and to have a huge amount of customer. As future enhancement
very useful change. We conducted research in the area of of the intelligent online course evaluation we are planning
Artificial Intelligence and to be more specific in text to provide a platform that would allow student the
processing method. The idea is to understand the student evaluation of their lecturer through mobile phone and PDA.
answers to the open ended question (in Natural language),
process it and provide reports and suggestion (in Natural Acknowledgment
language).
We would like to express our sincere gratitude to ARASH
In our research we studied various text mining approaches
HABIBI LASHKARI (PHD candidate of UTM) for his
and found the Natural Language processing (NLP) as the
supervision and guidance. Also, we would like to express
suitable approach to meet the system requirement. As the
our appreciation to our parents and all the teachers and
students would be writing their comment in sentence using
lecturers who help us to understand the importance of
their ordinary way to speak and write, the system would
knowledge and show us the best way to gain it.
need a robust natural language analysis to process the
students input (sentences) and interpret it to generate a
report in sentences. References
To generate the report in sentences, some element would be [1] K. Hmieleski & M.V. Champagne, “barrier to online
needed as input in the report generator at the first place. Evaluation’ surveying the nation’s top 200 most wired
First, input first as data mining results in a form of rules. colleges”; interactive and distance Education
Then input the background information such as variables Assessment laboratory at Rensselaer Polytechnic
names and categories. The next step is to set the text goal
Institute,2000
for the report generator to produce sentences accordingly
[2] H Gavin , L Maria , H Lisa Annemarie , K James, N
[29].
Helen, P Diana, T Michael, W Gretchen;”report one of
4.2. Proposed System Technology the task force on online Evaluations & placement
The system will be built using ASP.NET MVC which is a Examinations”, Online Course Evaluations, 2005, pp.
part of the ASP.Net framework newly adopted by Microsoft 1-15
to improve the productivity when creating web application [3] M Heidi, Anderson, Jeff Cain & Eleanora,”Review of
and improve maintainability of the application as it allows literature and a pilot study”, Online Student Course
the user to have nimbleness and flexibility in building and Evaluations, American journal of Pharmaceutical
maintaining the application. Using this framework to
Education, 2005, pp. 34-41
develop our system will ensure the authenticity of the
[4] DK Woodward ,”Comparison of course evaluations by
technology as ASP.NET MVC 2.0 was released last month
traditional and computerized on-line methods”, Am J
along with Visual Studio 2010.
SQL Server 2008 Expression will be used to store and Pharm Educ., 1998, pp 62-90
manage the database. SQL Server 2008 is a robust Database [5] CJ Dommeyer , P Baum, KS Chapman, RW Hanna ,”
management system and easy to connect to visual studio. Attitudes of business faculty towards two methods of
SyncFusion is third party software that provides content for collection teaching evaluations: paper Vs. Online”,
.Net application. SyncFusion will be used to generate excel Asses Eval Higher Educ., 2002, pp. 455-462
report and create chart. [6] M Jaclyn, H Grahan ,”Use of electronic surveys in
course evaluation”, British journal of Educational
5. Conclusion technology, 2002, vol 33 No 5. pp. 583-592,
The literature presented in this paper outline the previous [7] N Kwak, BT Radler ,”using the web for public opinion
research and evidence about online evaluation system and research: a comparative analysis between data collected
shows how important and effective would be to implement via mail and the web paper”, annual meeting of the
the intelligent online course evaluation system to replace the American Association for public Opinion research
paper and pencil approach in Limkokwing University. The Portland Oregon May,2000
implementation of this system would save time, resource
8 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 10, 2010

[8] C Medlin, S Roy and T Ham Chain, ”World Wide Web [26] JK Peat, ”Health Science Research’ A handbook of
versus mail surveys”, ANZMAC99 conference,1999 quantitative methods”, Allen and Unwin Crows
[9] T Guterbock, B Meekins, A Weaver & J Fries,” ‘Web Nest,2001
[27] P Thomas, W Jeromie, X Yingcai, ”existing online
versus paper’ A mode experiment in a survey of
evaluation system, A Role-based online evaluation
university computing”, American Association for public System Text Mining”, retrieved on May 15th, 2010 from
opinion Research Portland Oregon May,2000 http://www.statsoft.com/textbook/text-mining/
[10] Crawford, A Ranchhod & F Zhou, “Comparing [28] Text mining retrieved on May 27th 2010 from
respondents of email and mail surveys”, Marketing http://en.wikipedia.org/wiki/Text_mining
Intelligence and planning ,2001, pp. 245-262 [29] Josef Leung & Ching-Long Yeh,”Natural Language
Processing for Verbatim Text Coding and Data Mining
[11] K Sheenan,” Email survey response rates”, journal of
Report Generation”, 2010, pp. 1-14
computer Mediated communication,2001 [30] J Mc Gourty , K Scoles & S Thorpe, ”Web-based course
[12] DP Bachmann, J Elfrink & G Vazzana, ”Email and evaluation: comparing the experience at tow
snail mail face off in rematch Marketing Universities”, 2002
Research”,1999 [31] Goodman;”Developing Appropriate Administrative
[13] BH Layne, JR DeCristofor, D McGinty, ”Electronic Support for Online Teaching with an Online Unit
versus traditional student ratings of instruction”, Res Evaluation System”, Proceedings of ISIMADE 99
(international symposium on Intelligent Multimedia
Higher Educ, 1999, pp. 221-232
and Distance Education), 1999, pp. 17-22
[14] B Ravelli ,”Anonymous online teaching assessments: [32] T Ha, J Marsh & J Jones ,”A web-based System for
preliminary findings”, Annual National Conference of Teaching Evaluation, Retrieved on April 12th, 2010
the American Association for Higher Education,2000 from
[15] L Parker, ”Collecting data the email way training and http://home.ust.hk/~eteval/cosset/ncitt98.pdf
Development”, 1992 ,pp. 52-54, [33] H Andreas, N Andreas, P Gerhard, ”A brief Survey of
Text Mining”, LDV Forum, Band 20, 2005, Pp 19-56
[16] S Kiesler and LS Sproull, ”Response effects in the
[34] N Un Yong and JM Raymond ,”Text Mining with
electronic survey public opinion Quarterly”, 1986, pp. Information Extraction”, American Association for
401-413 Artificial Intelligence,2002, pp. 60-67
[17] J Walsh, S Kiesler, LS Sproull and B Hesse, ”Self [35] M Hearst,”untangling text data mining. In Proc. Of
selected and randomly”, computer network survey ACL 99 the 37th Annual Meeting of the Association for
Public Opinion Quarterly, 1992, pp. 241-244 computational Linguistics, 1999
[36] L Kaufman & Rouseeuw, ”finding groups in data, an
[18] K sheenan and Hoy , ”Using email to survey internet
introduction to cluster analysis, 1990
users in the United states”, journal of computer [37] R Feldman & L Dagan,”Kdt – Knowledge discovery in
Mediated Communication, 1999 texts”, In Proc. Of the first int. Conf. On knowledge
[19] Weible and J Wallace, ”the impact of the Internet on Discovery (KDD), 1995, pp.112-117
data collection”, Marketing Research;1998, pp. 19-23 [38] G Salton, A wong & C Yang, ”A vector space model for
[20] JH Watt, ”Internet systems for evaluation research in automatic indexing”, Communications of the ACM,
1975, pp. 613-620
Gay G and Bennington T L”, social moral
[39] G Salton, J Allan & C Buckley, ”Automatic structuring
epistemological and practical implication JosseyBass, and retrieval of large text files”, Communication of the
San Francisco, 1999, pp. 24-44 ACM, 1994, pp. 97-108
[21] GW Yun ,”Comparative response to a survey executed [40] R Haskell,” Academic freedom, tenure, and student
by post email and web form”, journal of Computer evaluation of faculty”, Galloping polls in the 21st
Mediated Communication, 2000 century,1997
[22] ABC Tse ,”Comparing the response rates response
speed and response quality of two methods of sending
questionnaires’ email vs mail”, journal of the Market
Research Society,1998, pp. 353-362
[23] R Mehta & E Sivada, ”Comparing response rates and
response content in mail versus electronic mail”,
surveys journal of the Market Research Society,1995
pp. 429-439
[24] CJ Dommeyer & E Moriarty, ”Comparing two forms of
an email survey’ embedded vs attached”, International
Journal of Market Research,1999, pp. 39-50
[25] A Ranchhod and F Zhou,”Comparing respondents of
email mail surveys’ understanding the implications of
technology”, Marketing Intelligence and Planning,
2001, 245-262.

You might also like