• 제목/요약/키워드: e-Learning Systems

검색결과 641건 처리시간 0.024초

A Natural Language Question Answering System-an Application for e-learning

  • Gupta, Akash;Rajaraman, Prof. V.
    • 한국지능정보시스템학회:학술대회논문집
    • /
    • 한국지능정보시스템학회 2001년도 The Pacific Aisan Confrence On Intelligent Systems 2001
    • /
    • pp.285-291
    • /
    • 2001
  • This paper describes a natural language question answering system that can be used by students in getting as solution to their queries. Unlike AI question answering system that focus on the generation of new answers, the present system retrieves existing ones from question-answer files. Unlike information retrieval approaches that rely on a purely lexical metric of similarity between query and document, it uses a semantic knowledge base (WordNet) to improve its ability to match question. Paper describes the design and the current implementation of the system as an intelligent tutoring system. Main drawback of the existing tutoring systems is that the computer poses a question to the students and guides them in reaching the solution to the problem. In the present approach, a student asks any question related to the topic and gets a suitable reply. Based on his query, he can either get a direct answer to his question or a set of questions (to a maximum of 3 or 4) which bear the greatest resemblance to the user input. We further analyze-application fields for such kind of a system and discuss the scope for future research in this area.

  • PDF

동기식 멀티미디어 교육콘텐츠 저작도구 설계 (Design of Authoring tool for Synchronizing Multimedia Educational Contents)

  • 박승범;김태희
    • 한국콘텐츠학회논문지
    • /
    • 제7권2호
    • /
    • pp.142-149
    • /
    • 2007
  • 기존의 교육시스템에서는 멀티미디어 콘텐츠의 동기화표현이 불가능하거나 별도의 클라이언트 어플리케이션이 필요하였다. SMIL(Synchronized Multimedia Integration Language)은 멀티미디어 객체들의 시간적, 공간적 배열이 가능한 XML기반의 언어로서 웹브라우저 상에서 효과적인 멀티미디어 표현을 가능하게 한다. 기존의 웹기반 교육콘텐츠에 SMIL을 적용하게 되면 별도의 클라이언트 어플리케이션이 없이 웹브라우저만으로도 고품질의 멀티미디어 서비스가 가능하게 된다 본 논문에서는 SMIL를 적용한 멀티미디어 교육 콘텐츠 개발 방법을 제안하고, XSLT를 이용하여 SMIL 문서에서 XHTML 문서로 변환시킴으로써 별도의 플러그인이나 어플리케이션을 이용하지 않고 일반 사용자들이 쉽게 사용할 수 있는 저작툴을 설계하였다.

정보통신윤리 의식 함양을 위한 블랜디드 문제중심학습 시스템 설계 및 구현 (Design and Implementation of Blended PBL Systems for Cultivating Consciousness of Information Communication Ethics)

  • 이준희;류관희
    • 한국컴퓨터정보학회:학술대회논문집
    • /
    • 한국컴퓨터정보학회 2011년도 제43차 동계학술발표논문집 19권1호
    • /
    • pp.327-330
    • /
    • 2011
  • 본 논문의 목적은 효과적인 정보통신윤리 교육을 통한 정보통신윤리 의식 함양에 있다. 블랜디드 PBL의 교수-학습 목표 달성을 위해서 온라인 학습과 면대면 수업이 체계적으로 혼합되었고, 온라인 학습을 위한 주요 모듈은 오픈소스 학습관리시스템인 무들(Moodle)에서 운영되었다. 온라인을 통한 PBL 단계(문제제시, 문제확인, 자료수집, 해결안 도출, 문제해결안 발표, 정리 및 평가)에 따른 블랜디드 활동에서 학습자가 스스로 문제를 해결해 가면서 학습계획을 세우고, 지식 데이터베이스 등을 활용하여 정보의 획득과 평가, 새로운 아이디어를 적용할 수 있는 e-PBL 시스템을 구현하였다. 블랜디드 PBL 시스템의 교육적인 효과를 검증하기 위해서 대학교 2학년 재학생 60명을 실험집단(30명), 통제집단(30명)으로 구성하였다. 실험 집단과 통제집단은 모두 6명을 1개 조로 하여 각각 5개 조를 구성하였다. 실험집단에는 블랜디드 PBL을 이용하여 수업을 실시한 후에 정보통신윤리 의식 평가를 실시하고, 통제집단은 면대면 PBL을 이용하여 수업을 실시하였다. 두 집단의 정보통신윤리 의식에 유의미한 차이가 있는지를 검증하기 위하여 SPSS 18.0을 활용한 t-Test를 실시하였다. 실험결과, 블랜디드 PBL을 적용하여 정보통신윤리를 학습한 실험 집단이 면대면 PBL을 적용하여 정보통신윤리를 학습한 통제집단보다 정보통신윤리 의식의 절제, 존중, 책임, 참여 지표에서 높은 향상을 보였다.

  • PDF

공학교육인증제도 효과 분석 연구 (A Study on the Effects of Engineering Education Accreditation)

  • 강소연;홍성조;최금진;박선희;조성희
    • 공학교육연구
    • /
    • 제18권3호
    • /
    • pp.59-68
    • /
    • 2015
  • This study was implemented for the purpose of analyzing the effects of Engineering Education Accreditation. Now, 15 years has passed adopting the engineering education system. We need to analyze the effect that this system has changed on the ground of engineering education, and it cultivated the human resource. In order to achieve the purpose of this study, the survey were done on the professors, graduates, and workers. The results and conclusions of this study are summarized as follows: First, it is urgent need to change the system of accreditation, and to get the public trust on assessment. Second, it is necessary to make circumstance that engineering education accreditation is advertised to the industries, and the industry can join the development, consulting, evaluation of curriculum. Third, government needs to make the policy that gives the incentive to the industries, if they give some merits to the accreditation graduates. Fourth, certificate of program graduate is desired to spread the accreditation proliferation. Fifth, government should systemize that accreditation program can get advantage to be selected for the public finance business(e.g. BK, LINC).. It will impact the quality Improvement and accountability of engineering programs.

Feature Based Techniques for a Driver's Distraction Detection using Supervised Learning Algorithms based on Fixed Monocular Video Camera

  • Ali, Syed Farooq;Hassan, Malik Tahir
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권8호
    • /
    • pp.3820-3841
    • /
    • 2018
  • Most of the accidents occur due to drowsiness while driving, avoiding road signs and due to driver's distraction. Driver's distraction depends on various factors which include talking with passengers while driving, mood disorder, nervousness, anger, over-excitement, anxiety, loud music, illness, fatigue and different driver's head rotations due to change in yaw, pitch and roll angle. The contribution of this paper is two-fold. Firstly, a data set is generated for conducting different experiments on driver's distraction. Secondly, novel approaches are presented that use features based on facial points; especially the features computed using motion vectors and interpolation to detect a special type of driver's distraction, i.e., driver's head rotation due to change in yaw angle. These facial points are detected by Active Shape Model (ASM) and Boosted Regression with Markov Networks (BoRMaN). Various types of classifiers are trained and tested on different frames to decide about a driver's distraction. These approaches are also scale invariant. The results show that the approach that uses the novel ideas of motion vectors and interpolation outperforms other approaches in detection of driver's head rotation. We are able to achieve a percentage accuracy of 98.45 using Neural Network.

A comparative study for design of boundary combined footings of trapezoidal and rectangular forms using new models

  • Luevanos-Rojas, Arnulfo;Barquero-Cabrero, Jose Daniel;Lopez-Chavarria, Sandra;Medina-Elizondo, Manuel
    • Coupled systems mechanics
    • /
    • 제6권4호
    • /
    • pp.417-437
    • /
    • 2017
  • This paper shows a comparative study for design of reinforced concrete boundary combined footings of trapezoidal and rectangular forms supporting two columns and each column transmits an axial load and a moment around of the axis X (transverse axis of the footing) and other moment around of the axis Y (longitudinal axis of the footing) to foundation to obtain the most economical combined footing. The real soil pressure acting on the contact surface of the footings is assumed as a linear variation. Methodology used to obtain the dimensions of the footings for the two models consider that the axis X of the footing is located in the same position of the resultant, i.e., the dimensions is obtained from the position of the resultant. The main part of this research is to present the differences between the two models. Results show that the trapezoidal combined footing is more economical compared to the rectangular combined footing. Therefore, the new model for the design of trapezoidal combined footings should be used, and complies with real conditions.

Palliates the Attack by Hacker of Android Application through UID and Antimalware Cloud Computing

  • Zamani, Abu Sarwar;Ahmad, Sultan;Uddin, Mohammed Yousuf;Ansari, Asrar Ahmad;Akhtar, Shagufta
    • International Journal of Computer Science & Network Security
    • /
    • 제21권8호
    • /
    • pp.182-186
    • /
    • 2021
  • The market for smart phones has been booming in the past few years. There are now over 400,000 applications on the Android market. Over 10 billion Android applications have been downloaded from the Android market. Due to the Android popularity, there are now a large number of malicious vendors targeting the platform. Many honest end users are being successfully hacked on a regular basis. In this work, a cloud based reputation security model has been proposed as a solution which greatly mitigates the malicious attacks targeting the Android market. Our security solution takes advantage of the fact that each application in the android platform is assigned a unique user id (UID). Our solution stores the reputation of Android applications in an anti-malware providers' cloud (AM Cloud). The experimental results witness that the proposed model could well identify the reputation index of a given application and hence its potential of being risky or not.

Digital Transformation in Summer Training Process at King Abdulaziz University: Action Design Research in Practice

  • Bahaddad, Adel;Bitar, Hind
    • International Journal of Computer Science & Network Security
    • /
    • 제22권7호
    • /
    • pp.171-180
    • /
    • 2022
  • In the knowledge development of online assessment in learning management systems (LMSs), many assessments are evaluated weekly in the summer training course for undergraduate students in the Faculty of Computing and Information Technology at King Abdul-Aziz University in Saudi Arabia. The number of performance assessments in the summer training course reaches 15 weeks. Many of them, however, are sent or done informally or through unreliable ways and cannot be verified by third parties. Therefore, applying the concept of digital transformation is essential. This research study reported herein used the action design research (ADR) method to build a new information technology system that could assist in the digital transformation. An electronic platform was designed, developed, implemented, and evaluated using the ADR method so that the main people involved in the summer training process (i.e., students, academic supervisors, and administrators) would have a high level of satisfaction with it. The study was conducted on 452 students, 105 academic supervisors, and 15 administrative staff and was conducted during the summer semester of 2020. All the training processes were digitally transformed and automated to control and raise the level and reliability of the training. All involved people were satisfied, thus, shifting the process to be in a digital form assist in achieving the high-level goal.

An IPSO-KELM based malicious behaviour detection and SHA256-RSA based secure data transmission in the cloud paradigm

  • Ponnuviji, N.P.;Prem, M. Vigilson
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권11호
    • /
    • pp.4011-4027
    • /
    • 2021
  • Cloud Computing has emerged as an extensively used technology not only in the IT sector but almost in all sectors. As the nature of the cloud is distributed and dynamic, the jeopardies present in the current implementations of virtualization, numerous security threats and attacks have been reported. Considering the potent architecture and the system complexity, it is indispensable to adopt fundamentals. This paper proposes a secure authentication and data sharing scheme for providing security to the cloud data. An efficient IPSO-KELM is proposed for detecting the malicious behaviour of the user. Initially, the proposed method starts with the authentication phase of the data sender. After authentication, the sender sends the data to the cloud, and the IPSO-KELM identifies if the received data from the sender is an attacked one or normal data i.e. the algorithm identifies if the data is received from a malicious sender or authenticated sender. If the data received from the sender is identified to be normal data, then the data is securely shared with the data receiver using SHA256-RSA algorithm. The upshot of the proposed method are scrutinized by identifying the dissimilarities with the other existing techniques to confirm that the proposed IPSO-KELM and SHA256-RSA works well for malicious user detection and secure data sharing in the cloud.

Association Rule Mining and Collaborative Filtering-Based Recommendation for Improving University Graduate Attributes

  • Sheta, Osama E.
    • International Journal of Computer Science & Network Security
    • /
    • 제22권6호
    • /
    • pp.339-345
    • /
    • 2022
  • Outcome-based education (OBE) is a tried-and-true teaching technique based on a set of predetermined goals. Program Educational Objectives (PEOs), Program Outcomes (POs), and Course Outcomes (COs) are the components of OBE. At the end of each year, the Program Outcomes are evaluated, and faculty members can submit many recommended measures which dependent on the relationship between the program outcomes and its courses outcomes to improve the quality of program and hence the overall educational program. When a vast number of courses are considered, bad actions may be proposed, resulting in unwanted and incorrect decisions. In this paper, a recommender system, using collaborative filtering and association rules algorithms, is proposed for predicting the best relationship between the program outcomes and its courses in order to improve the attributes of the graduates. First, a parallel algorithm is used for Collaborative Filtering on Data Model, which is designed to increase the efficiency of processing big data. Then, a parallel similar learning outcomes discovery method based on matrix correlation is proposed by mining association rules. As a case study, the proposed recommender system is applied to the Computer Information Systems program, College of Computer Sciences and Information Technology, Al-Baha University, Saudi Arabia for helping Program Quality Administration improving the quality of program outcomes. The obtained results revealed that the suggested recommender system provides more actions for boosting Graduate Attributes quality.