LeMo: a Learning Analytics Application Focussing on User Path Analysis and Interactive Visualization
|
|
|
- Lionel Small
- 10 years ago
- Views:
Transcription
1 The 7 th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications September 2013, Berlin, Germany LeMo: a Learning Analytics Application Focussing on User Path Analysis and Interactive Visualization Albrecht Fortenbacher 1, Liane Beuster 1, Margarita Elkina 2 Leonard Kappe 1, Agathe Merceron 3, Andreas Pursian 2 Sebastian Schwarzrock 3, Boris Wenzlaff 1 1 HTW Berlin, University of Applied Sciences Wilhelminenhofstraße 75A, Berlin, Germany {liane.beuster,forte,kappe,boris.wenzlaff}@htw-berlin.de 2 HWR Berlin, Berlin School of Economics and Law Alt Friedrichsfelde 60, Berlin, Germany {margarita.elkina,andreas.pursian}@hwr-berlin.de 3 BHT Berlin, University of Applied Sciences Amrumer Straße 10, Berlin, Germany {merceron,sschwarzrock}@beuth-hochschule.de Abstract LeMo is the prototype of an application for learning analytics, which collects data about learners activities from different learning platforms. The article describes design principles of LeMo and their implications for efficient learning analytics. Focus is on the LeMo system architecture, user path analysis by algorithms of sequential pattern mining, and visualization of learners activities. Keywords learning analytics; visual analytics; sequential pattern mining; user path analysis I. INTRODUCTION The Horizon Report 2011 [1] identifies learning analytics as an emerging technology, which most likely will have a significant impact on higher education within the next years [2]. On the first LAK conference 2011 [3], learning analytics was defined as... the measurement, collection, analysis and reporting of data about learners and their contexts, for purposes of understanding and optimising learning and the environments in which it occurs... In 2011, the research project LeMo: monitoring of the learning process on personalizing and non-personalizing learning platforms started at three universities of applied sciences in Berlin [4]. It aims at developing an analytics and visualization tool, to facilitate learning analytics for teachers, E-learning providers and researchers. Basic requirements were connectivity to various platforms for online learning, powerful analysis and mining of data ob- This work is supported by the European Regional Development Fund and the Institut für Angewandte Forschung Berlin. tained from the platforms, and an intuitive visualization of analytic results, providing insight into learning processes. The following section describes the methodical approach of LeMo, which guided requirements analysis and refinement throughout the project. Then, basic design principles of the LeMo application are explained. The following sections focus on user path analysis and visualization. The last section concludes the findings of the LeMo project, and refers to future work. II. METHODOLOGY Requirements analysis in LeMo is based on a survey amongst stakeholders (project partners), representing the three target groups teachers, E-learning providers and researchers. This generic qualitative method was targeted at supporting teaching with a variety of didactic methods and different degrees of technology support, e.g. E-learning as a supplement to face-to-face teaching, or online learning as a basis for distance learning. The result of the survey was a catalogue of about 80 questions and assumptions regarding students learning behavior and the use of online media. Some of the questions were beyond the scope of an analytics tool which relies on learners activities obtained from a learning (management) platform. The catalogue of questions was segmented into six categories representing different areas of interest. The first two categories contain questions about users and groups of users, as well as learning objects and type of learning objects. Interactions with the learning environment are modeled through the categories usage analysis, user path analysis, communication and collaboration, and performance.
2 Based on the catalogue of questions, 27 indicators were derived, that provide data analysis to help answering the referred questions. The most important indicators were activity / time and activity / learning object, both related to the category usage analysis, as well as frequent paths and activity graph, related to user path analysis. The survey showed a considerable interest in analyzing the sequence of user interactions. This interest can be contextualized and supported by the theoretical approach of connectivism. According to Siemens, learning is organized in a network internally as a neural network and externally as a network of nodes, representing a specialization and aggregates as actions concerning the environment [5]. In a first step, this network is visualized as an activity graph in LeMo. Consequently, the four indicators mentioned above were the first indicators realized in LeMo. Whereas usage analysis is quite common in comparable tools, the indicators frequent paths and activity graph, together with intuitive visualization, are unique characteristics of the LeMo tool. A. System Architecture III. LEMO APPLICATION LeMo is designed as a 3-tier application, which facilitated distributed development among the three universities [6]. The first tier (data) contains a data model as well as functionality for data management, which includes connectivity to different learning platforms. Data analysis takes place in the second tier (data). Results of data analysis are passed to the third tier (presentation), where the data are visualized. Filtering data, e.g. selecting male or female students within a course, is presently done in the data tier, but eventually should be performed in the third tier, thus reducing the number of requests to the data tier. Both servers are realized via web apps, which could be run by a simple Tomcat server, but also, for performance and security reasons, be distributed within a network. Figure 2. data-management server A data-management server may connect to more than one LMS (learning management system). Presently, connectors for different versions of moodle, clix and Chemgapedia are implemented. Figure 3. application server Figure 1. 2-server architecture The LeMo application consists of a data-management server, which basically comprises the first and second tier, and a application server. From user interaction, the application server generates requests, which are passed via a web-service interface to the data-management server. The application server provides for visualization and user interaction. Using a JavaScript framework, this is done locally on the client, reducing server load and network traffic. B. Data Management In [7], three factors for the development of learning analytics are listed: online learning, big data, and political concerns. This list is reflected by the design principles of LeMo.
3 Data analyzed by the LeMo tool are basically user activities obtained from platforms for online learning. LeMo connects to various platforms, including the learning management systems (LMS) Moodle and Clix, as well as the online encyclopedia Chemgapedia. The LeMo connectors for Moodle and Clix are implemented to access the underlying databases directly. In case of Chemgapedia, which is a web application, data stem from the server log file. During the ETL (Extraction Translation Load) phase, data are imported into a database with a unified data model. While LMS provide detailed information on content and on users, server log files just contain page visits. Here, session information is needed to identify anonymous users (students). The LeMo data model contains entities for learning objects, e.g. courses, resources, wikis, or tests, and associations between learning objects, e.g. resource X belongs to course A. There exist students and teachers related to courses. Degree programs can group courses, a department is responsible for different degree programs, and an institution consists of several departments. The data model also includes user activities, which basically are represented as tuples [U, L, T ] (user, learning object, time stamp). Additionally, an action is stored with each user activity, which may be one of view, download, modification, creation, attempt, or submit. And finally, platforms are represented in the data model. Given an element E, which was imported from platform P, a unique primary key for this element can be constructed from the pair [E, P ]. In the case of Chemgapedia, some data are not available, examples being department/faculty, or a student s enrollment in courses. This data has to be left empty, leading to sparse data, and eventually reducing the number of available analyses. Big data denote huge sets of, generally unstructured, data, which typically originate from social networks, and which are processed using analytic methods ( social media analytics ). Recording activity data on platforms for online learning, over a long period of time, a huge amount of data is produced. For interactive analytics applications, it is critical to handle big data efficiently, which can be achieved via data compression, efficient data retrieval and efficient mining algorithms. Reviewing usage statistics on the Chemgapedia web server, it became apparent that log data have to be preprocessed in order to exclude activities not corresponding to learners (e.g. traffic generated by web crawlers). To solve this problem, an optional functionality was added which excludes all log entries with one of the following characteristics: multiple accesses per second, frequent repetition of time intervals between accesses, and many accesses to the same page. The use of this filter reduced the number of log entries by about 47%, while excluding just 5% of all users. With the actual LeMo prototype, data are stored in a relational data base. While this is sufficiently efficient for the (relatively small) amount of data considered so far, non-standard ways of storing data, e.g. in a NoSQL data base, will be investigated. C. Data Privacy One political concern of learning analytics is data privacy. Traditionally, personalized interactions and user modeling have significant implications on data privacy. Personal information about a user is collected and analyzed, which might not be in the interest of the user. Recently, collection of user data in social networks, and possible violation of data-privacy legislation, have been published frequently. As a result, even more strict dataprivacy regulations at universities are established, which in turn limits the use of learning analytics. The LeMo approach towards data privacy aims at achieving a high level of anonymity. The activity sequence, i.e. learning path of a particular student may be analyzed, but personal data, which could serve to identify the student, must not be exposed. This is done by omitting all personal data in the ETL process, the only exception being gender information which is valuable for learning analytics. Furthermore, small data samples must not be used for a specific analysis, if this leads to the identification of a particular student (k-anonymity [8]). An example is a course with just one female (male) participant; this student could be identified easily using a gender filter. For most of the analyses, courses must be identified by their name. Also, the title of learning objects like learning material (e.g. powerpoint presentations), the name of threads in a course-related forum, or results of a test provided in the course, are essential for efficient analysis, but must not imply the identification learners (students). To implement a role teacher, courses taught by a given teacher must be identified. This cannot be done using some unique attribute, like name, personal ID or login name (user ID). All these attributes are omitted during ETL process. Instead, a mapping φ : T eachers Courses can be realized by a pseudonym (hash value) derived from a unique attribute during ETL. If the LeMo application uses the same authentication scheme (e.g. authentication via LDAP) as the connected platform, the pseudonym is derived from the login name. When a teacher logs in, he sees the list of his courses. IV. USER-PATH ANALYSIS Regarding sequences of learning activities, we can construct user paths reflecting navigation of students (within a course). A user path is a sequence of learning objects. For each user path, there exists a set of users who access the learning objects in the order given by that user path. Let P = (L 1...L n ) (1)
4 be a user path, and A(U) = (A 1...A k ) (2) the sequence al all user activities of user U, ordered by time. Now we can define U f (P ), the set of all users U supporting user path P, by the following conditions 1 i n 1 j i k : A ji = [U, L i, T ji ] (3) j 1 <... < j n (4) In the context of a course, or of several courses, with a defined number k of students, the support of a user path is the number of students following this path, relative to the total number of students: S f (P ) = U f (P )/k (5) Given some minimal support S, we can define the set of frequent paths: FP(S) = {P S f (P ) S} (6) Choosing an appropriate minimal support, a teacher can investigate if the majority of students access the learning objects in the intended order. Direct paths, which are followed by students who don t have any extra user activity between accessing the first and last object, might provide further insight into the learning process. The set U d (P ) consists of all users U supporting directly a user path P. U supports P directly, if a position p within A(U) can be found with 1 i n : A i+p 1 = [U, L i, T i+p 1 ] (7) i.e. if the user path P can be embedded as a subsequence into the sequence of activities of user U. Similar to the definition of frequent paths, direct paths can be defined as a function of minimal support: S d (P ) = U d /k (8) DP(S) = {P S d (P ) S} (9) Figure 4. frequent paths In the LeMo application, the BIDE algorithm [9] is used to identify frequent paths. If the support parameter is lowered, the number of frequent paths increases, as well as the response time of the BIDE algorithm. The drastically increased processing time of BIDE for low support values poses a serious problem to the usability of the LeMo application. As a solution, a default value for minimal support is determined, depending on parameters number of user paths, average length of user paths, and number of learning objects within a given course. Since BIDE uses an a-priori approach to determine reoccurring sub-paths, the processing time increases dramatically when the number of frequent sequences is large [10]. A typical users behavior is to try out low support values (which might cause BIDE to run for ever ), and then increase the values until a result is achieved within a reasonable response time. This might start a couple of BIDE algorithms running as parallel threads, and eventually bring down the system. To avoid this, the algorithm must be terminated when a user requires the next analysis. Thus, in a multi-user environment, the number of running BIDE algorithms is limited to the number of active users. Furthermore, after a pre-defined lapse of time, the algorithm is terminated (default value: 5 minutes), which does not leave hung threads in the system. Not surprisingly, computing direct paths is a much easier task, allowing for interactive learning analytics. The Fournier-Viger algorithm [11], which is used for direct paths, returns results within a very short time, even for low support values like 10%, which significantly increases the number of direct paths. V. VISUALIZATION The design of the user interface in LeMo follows the explorative metaphor overview first, filter and details on demand, which assists analysis of learning data in an explorative way [12]. Especially when displaying large amounts of data, this approach supports a highly intuitive reception of the results of analyses. Visualization was designed according to the following guidelines: support pre-attentive perception: through the use of visual attributes, e.g. shape, size, color and position provide details on demand: detailed information on a specific learning object are available (context sensitive), without overloading the initial visualization facilitate exploration: the interface provides the possibility to customize the visualization, to best fit the personal expectations, through features like translation, rotation, filtering, and zooming The results of an analysis activity graph are visualized by a navigation network. This analysis can be used to obtain information on the degree of cross-linking between learning objects. The activity graph is visualized by a graph, with learning objects as nodes and navigation steps as edges. Nodes are color-coded to support the visual
5 Figure 5. activity graph Figure 7. alternative form of activity graph perception of content type transitions. Learning objects are adjusted in size to encode the absolute number of user requests. Edges are weighted and color-coded to encode the amount of navigational steps. Detailed information on specific elements of the graph can be made visible by interacting with the visualization, including tool tips with information on learning objects, and rearranging the graph, focussing on nodes of interest. Figure 6. different visualizations For the visualization of frequent paths (results of the BIDE algorithm), the following premises are important: A path is visualized by a sequence of nodes (learning objects) and edges (navigation steps). Learning objects are color-coded to allow a visually easy correlation of navigational patterns across different paths. Detailed information on specific elements of the path is visible through user interaction. LeMo provides a variety of different visualizations, which are suitable for analysis of specific learning situations and processes. For example, For example, the performance of students based on self-tests can be visualized. Alternatively, students performance could be used as a filter for other analyses, exploring correlations between performance and navigation [13]. In some cases, LeMo provides even different visual styles for the same analysis, an example being activity graph. The first version features a volatile visualization of the navigation graph, which facilitates user interaction. The second version is a more static visualization, which, as an overview, just displays learning objects, where the size of the circles corresponds to the number of related user activities. Edges are omitted - selected edges appear, when a specific learning object is selected. The two visualizations support different ways of perceiving information, allowing users to develop their personal style of doing learning analytics. VI. CONCLUSION AND FUTURE WORK The actual LeMo prototype proved to be a useful tool for teachers, giving hints on the learning behaviour of their students, and helping with the evaluation of their didactic concept. The combination of user path analysis combined with a powerful interactive visualization distinguishes LeMo from other tools for learning analytics. Focus of future work will be on improving the LeMo application with respect to efficiency and usability, as well as on enhancing data analytics and visual analytics. System improvements will include a standardized ETL interface, connectivity with further platforms, a (nonstandard) data model for efficient data retrieval, and additional pattern-mining and data-mining algorithms. Functionality will be enhanced by realizing more indicators derived from the stakeholders original list of requirements (questions). Of special interest are indicators referring to group of users, students performance, and communication and collaboration. The actual prototype realizes the role teacher, where a teacher can analyze his/her own courses. In the future, the roles E-learning provider and researcher should be defined and implemented. For all improvements on the functionality and usability of the LeMo tool, an evaluation study is essential and will be conducted in the immediate future. REFERENCES [1] L. Johnson, R. Smith, H. Willis, A. Levine, and K. Haywood, The 2011 horizon report, The New Media Consortium, Austin,
6 [2] A. Fortenbacher, Learning analytics for higher education - perspectives and challenges, in Pratsi: Scientific, science and technology collected articles, issue 1(40) ed. Odessa National Polytechnic University, 2013, pp [3] 1st International Conference on Learning Analytics and Knowledge. ACM Digital Library, [4] A. Beuster, M. Elkina, A. Fortenbacher, L. Kappe, A. Merceron, A. Pursian, S. Schwarzrock, and B. Wenzlaff, Learning analytics und visualisierung mit dem lemo-tool, in Proceedings of Interaktive Vielfalt - DeLFI, Bremen, [5] G. Siemens, Connectivism: Learning theory of pasttime of the selfamused, selfamused.html, [6] L. Beuster, M. Elkina, A. Fortenbacher, L. Kappe, A. Merceron, A. Pursian, S. Schwarzrock, and B. Wenzlaff, Prototyp einer plattformunabhängigen learning analytics applikation fokussiert auf nutzungsanalyse und pfadanalyse, in E-Learning Symposium 2012 Aktuelle Anwendungen, innovative Prozesse und neueste Ergebnisse aus der E-Learning-Praxis, U. Lucke, Ed. Universitätsverlag Potsdam, 2012, pp [7] R. Ferguson, The state of learning analytics in 2012: A review and future challenges, Knowledge Media Institute, The Open University, UK, Tech. Rep. KMI-12-01, [8] V. Ciriani, S. D. C. di Vimercati, S. Foresti, and P. Samarati, Kanonymity, in Secure Data Management in Decentralized Systems, ser. Advances in Information Security, T. Yu and S. Jajodia, Eds. Springer, Berlin Heidelberg, 2007, vol. 33, pp [9] J. Wang and J. Han, Efficient mining of frequent closed sequences, in Proceedings of the 20th International Conference on Data Engineering, Boston, MA, USA, [10] S. Schwarzrock, Analysis of learner navigation on web-based platforms using algorithms for sequential pattern mining, in Pratsi: Scientific, science and technology collected articles, issue 1(40) ed. Odessa National Polytechnic University, 2013, pp [11] P. Fournier-Viger, R. Nkambou, and E. M. Nguifo, A knowledge discovery framework for learning task models from user interactions in intelligent tutoring systems, in Proceedings of MICAI, ser. LNAI 5317, A. Gelbukh and E. Morales, Eds. Springer-Verlag Berlin Heidelberg, 2008, pp [12] A. Pursian, An interactive approach to information visualization in the context of learning analytics, in Pratsi: Scientific, science and technology collected articles. Odessa National Polytechnic University, [13] A. Merceron, L. Beuster, M. Elkina, A. Fortenbacher, L. Kappe, A. Pursian, S. Schwarzrock, and B. Wenzlaff, Visual exploration of interactions and performance with lemo, in Proceedings of the 6th International Conference on Educational Data Mining, Memphis, USA, 2013.
Augmented Search for Web Applications. New frontier in big log data analysis and application intelligence
Augmented Search for Web Applications New frontier in big log data analysis and application intelligence Business white paper May 2015 Web applications are the most common business applications today.
Business Intelligence in E-Learning
Business Intelligence in E-Learning (Case Study of Iran University of Science and Technology) Mohammad Hassan Falakmasir 1, Jafar Habibi 2, Shahrouz Moaven 1, Hassan Abolhassani 2 Department of Computer
COURSE RECOMMENDER SYSTEM IN E-LEARNING
International Journal of Computer Science and Communication Vol. 3, No. 1, January-June 2012, pp. 159-164 COURSE RECOMMENDER SYSTEM IN E-LEARNING Sunita B Aher 1, Lobo L.M.R.J. 2 1 M.E. (CSE)-II, Walchand
Arti Tyagi Sunita Choudhary
Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Web Usage Mining
NEW TRENDS IN HIGHER EDUCATION MANAGEMENT: TEACHERS' PERCEPTION OF THE INCLUSION OF LIBRARIES' E-SERVICES INTO LMS
NEW TRENDS IN HIGHER EDUCATION MANAGEMENT: TEACHERS' PERCEPTION OF THE INCLUSION OF LIBRARIES' E-SERVICES INTO LMS Anita Papić J. J. Strossmayer University of Osijek, Croatia [email protected] Ivanka Stričević
Understanding Web personalization with Web Usage Mining and its Application: Recommender System
Understanding Web personalization with Web Usage Mining and its Application: Recommender System Manoj Swami 1, Prof. Manasi Kulkarni 2 1 M.Tech (Computer-NIMS), VJTI, Mumbai. 2 Department of Computer Technology,
REUSING DISCUSSION FORUMS AS LEARNING RESOURCES IN WBT SYSTEMS
REUSING DISCUSSION FORUMS AS LEARNING RESOURCES IN WBT SYSTEMS Denis Helic, Hermann Maurer, Nick Scerbakov IICM, University of Technology Graz Austria ABSTRACT Discussion forums are highly popular and
Data Mining Solutions for the Business Environment
Database Systems Journal vol. IV, no. 4/2013 21 Data Mining Solutions for the Business Environment Ruxandra PETRE University of Economic Studies, Bucharest, Romania [email protected] Over
AN EFFICIENT APPROACH TO PERFORM PRE-PROCESSING
AN EFFIIENT APPROAH TO PERFORM PRE-PROESSING S. Prince Mary Research Scholar, Sathyabama University, hennai- 119 [email protected] E. Baburaj Department of omputer Science & Engineering, Sun Engineering
Enhance Preprocessing Technique Distinct User Identification using Web Log Usage data
Enhance Preprocessing Technique Distinct User Identification using Web Log Usage data Sheetal A. Raiyani 1, Shailendra Jain 2 Dept. of CSE(SS),TIT,Bhopal 1, Dept. of CSE,TIT,Bhopal 2 [email protected]
131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10
1/10 131-1 Adding New Level in KDD to Make the Web Usage Mining More Efficient Mohammad Ala a AL_Hamami PHD Student, Lecturer m_ah_1@yahoocom Soukaena Hassan Hashem PHD Student, Lecturer soukaena_hassan@yahoocom
Healthcare Measurement Analysis Using Data mining Techniques
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 03 Issue 07 July, 2014 Page No. 7058-7064 Healthcare Measurement Analysis Using Data mining Techniques 1 Dr.A.Shaik
BOOSTING - A METHOD FOR IMPROVING THE ACCURACY OF PREDICTIVE MODEL
The Fifth International Conference on e-learning (elearning-2014), 22-23 September 2014, Belgrade, Serbia BOOSTING - A METHOD FOR IMPROVING THE ACCURACY OF PREDICTIVE MODEL SNJEŽANA MILINKOVIĆ University
How To Use Data Mining For Knowledge Management In Technology Enhanced Learning
Proceedings of the 6th WSEAS International Conference on Applications of Electrical Engineering, Istanbul, Turkey, May 27-29, 2007 115 Data Mining for Knowledge Management in Technology Enhanced Learning
Visualizing e-government Portal and Its Performance in WEBVS
Visualizing e-government Portal and Its Performance in WEBVS Ho Si Meng, Simon Fong Department of Computer and Information Science University of Macau, Macau SAR [email protected] Abstract An e-government
Data Mining in Web Search Engine Optimization and User Assisted Rank Results
Data Mining in Web Search Engine Optimization and User Assisted Rank Results Minky Jindal Institute of Technology and Management Gurgaon 122017, Haryana, India Nisha kharb Institute of Technology and Management
ONTOLOGY BASED FEEDBACK GENERATION IN DESIGN- ORIENTED E-LEARNING SYSTEMS
ONTOLOGY BASED FEEDBACK GENERATION IN DESIGN- ORIENTED E-LEARNING SYSTEMS Harrie Passier and Johan Jeuring Faculty of Computer Science, Open University of the Netherlands Valkenburgerweg 177, 6419 AT Heerlen,
An Overview of Knowledge Discovery Database and Data mining Techniques
An Overview of Knowledge Discovery Database and Data mining Techniques Priyadharsini.C 1, Dr. Antony Selvadoss Thanamani 2 M.Phil, Department of Computer Science, NGM College, Pollachi, Coimbatore, Tamilnadu,
Data Models in Learning Analytics
Data Models in Learning Analytics Vlatko Lukarov, Dr. Mohamed Amine Chatti, Hendrik Thüs, Fatemeh Salehian Kia, Arham Muslim, Christoph Greven, Ulrik Schroeder Lehr- und Forschungsgebiet Informatik 9 RWTH
Internationalization Processes for Open Educational Resources
Internationalization Processes for Open Educational Resources Henri Pirkkalainen 1, Stefan Thalmann 2, Jan Pawlowski 1, Markus Bick 3, Philipp Holtkamp 1, Kyung-Hun Ha 3 1 University of Jyväskylä, Global
Evolution of Interests in the Learning Context Data Model
Evolution of Interests in the Learning Context Data Model Hendrik Thüs, Mohamed Amine Chatti, Roman Brandt, Ulrik Schroeder Informatik 9 (Learning Technologies), RWTH Aachen University, Aachen, Germany
HTML5 Data Visualization and Manipulation Tool Colorado School of Mines Field Session Summer 2013
HTML5 Data Visualization and Manipulation Tool Colorado School of Mines Field Session Summer 2013 Riley Moses Bri Fidder Jon Lewis Introduction & Product Vision BIMShift is a company that provides all
Program Visualization for Programming Education Case of Jeliot 3
Program Visualization for Programming Education Case of Jeliot 3 Roman Bednarik, Andrés Moreno, Niko Myller Department of Computer Science University of Joensuu [email protected] Abstract:
A Survey on Web Mining From Web Server Log
A Survey on Web Mining From Web Server Log Ripal Patel 1, Mr. Krunal Panchal 2, Mr. Dushyantsinh Rathod 3 1 M.E., 2,3 Assistant Professor, 1,2,3 computer Engineering Department, 1,2 L J Institute of Engineering
Advanced Preprocessing using Distinct User Identification in web log usage data
Advanced Preprocessing using Distinct User Identification in web log usage data Sheetal A. Raiyani 1, Shailendra Jain 2, Ashwin G. Raiyani 3 Department of CSE (Software System), Technocrats Institute of
Learning and Academic Analytics in the Realize it System
Learning and Academic Analytics in the Realize it System Colm Howlin CCKF Limited Dublin, Ireland [email protected] Danny Lynch CCKF Limited Dublin, Ireland [email protected] Abstract: Analytics
Binary Coded Web Access Pattern Tree in Education Domain
Binary Coded Web Access Pattern Tree in Education Domain C. Gomathi P.G. Department of Computer Science Kongu Arts and Science College Erode-638-107, Tamil Nadu, India E-mail: [email protected] M. Moorthi
Automatic Recommendation for Online Users Using Web Usage Mining
Automatic Recommendation for Online Users Using Web Usage Mining Ms.Dipa Dixit 1 Mr Jayant Gadge 2 Lecturer 1 Asst.Professor 2 Fr CRIT, Vashi Navi Mumbai 1 Thadomal Shahani Engineering College,Bandra 2
Transforming the Telecoms Business using Big Data and Analytics
Transforming the Telecoms Business using Big Data and Analytics Event: ICT Forum for HR Professionals Venue: Meikles Hotel, Harare, Zimbabwe Date: 19 th 21 st August 2015 AFRALTI 1 Objectives Describe
A Framework for the Delivery of Personalized Adaptive Content
A Framework for the Delivery of Personalized Adaptive Content Colm Howlin CCKF Limited Dublin, Ireland [email protected] Danny Lynch CCKF Limited Dublin, Ireland [email protected] Abstract
ANALYSIS OF WEB-BASED APPLICATIONS FOR EXPERT SYSTEM
Computer Modelling and New Technologies, 2011, Vol.15, No.4, 41 45 Transport and Telecommunication Institute, Lomonosov 1, LV-1019, Riga, Latvia ANALYSIS OF WEB-BASED APPLICATIONS FOR EXPERT SYSTEM N.
2 AIMS: an Agent-based Intelligent Tool for Informational Support
Aroyo, L. & Dicheva, D. (2000). Domain and user knowledge in a web-based courseware engineering course, knowledge-based software engineering. In T. Hruska, M. Hashimoto (Eds.) Joint Conference knowledge-based
E-Learning Using Data Mining. Shimaa Abd Elkader Abd Elaal
E-Learning Using Data Mining Shimaa Abd Elkader Abd Elaal -10- E-learning using data mining Shimaa Abd Elkader Abd Elaal Abstract Educational Data Mining (EDM) is the process of converting raw data from
Data Quality Mining: Employing Classifiers for Assuring consistent Datasets
Data Quality Mining: Employing Classifiers for Assuring consistent Datasets Fabian Grüning Carl von Ossietzky Universität Oldenburg, Germany, [email protected] Abstract: Independent
Self-adaptive e-learning Website for Mathematics
Self-adaptive e-learning Website for Mathematics Akira Nakamura Abstract Keyword searching and browsing on learning website is ultimate self-adaptive learning. Our e-learning website KIT Mathematics Navigation
So today we shall continue our discussion on the search engines and web crawlers. (Refer Slide Time: 01:02)
Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #39 Search Engines and Web Crawler :: Part 2 So today we
Web Mining. Margherita Berardi LACAM. Dipartimento di Informatica Università degli Studi di Bari [email protected]
Web Mining Margherita Berardi LACAM Dipartimento di Informatica Università degli Studi di Bari [email protected] Bari, 24 Aprile 2003 Overview Introduction Knowledge discovery from text (Web Content
Integration of Learning Management Systems with Social Networking Platforms
Integration of Learning Management Systems with Social Networking Platforms E-learning in a Facebook supported environment Jernej Rožac 1, Matevž Pogačnik 2, Andrej Kos 3 Faculty of Electrical engineering
EFL LEARNERS PERCEPTIONS OF USING LMS
EFL LEARNERS PERCEPTIONS OF USING LMS Assist. Prof. Napaporn Srichanyachon Language Institute, Bangkok University [email protected] ABSTRACT The purpose of this study is to present the views, attitudes,
Mobile Phone APP Software Browsing Behavior using Clustering Analysis
Proceedings of the 2014 International Conference on Industrial Engineering and Operations Management Bali, Indonesia, January 7 9, 2014 Mobile Phone APP Software Browsing Behavior using Clustering Analysis
Formal Methods for Preserving Privacy for Big Data Extraction Software
Formal Methods for Preserving Privacy for Big Data Extraction Software M. Brian Blake and Iman Saleh Abstract University of Miami, Coral Gables, FL Given the inexpensive nature and increasing availability
Effects of Scaffolded Video Analysis on Pre-Service English Teachers Classroom Interactions and Professional Development
, pp.283-290 http://dx.doi.org/10.14257/ijmue.2016.11.3.27 Effects of Scaffolded Video Analysis on Pre-Service English Teachers Classroom Interactions and Professional Development Yoonhee Choe Department
Issues of Pedagogy and Design in e-learning Systems
2004 ACM Symposium on Applied Computing Issues of Pedagogy and Design in e-learning Systems Charalambos Vrasidas Intercollege 46 Makedonitissas Ave. P.O. Box. 25005 Nicosia, 1700, Cyprus Tel. +357-22357661
Efficient Integration of Data Mining Techniques in Database Management Systems
Efficient Integration of Data Mining Techniques in Database Management Systems Fadila Bentayeb Jérôme Darmont Cédric Udréa ERIC, University of Lyon 2 5 avenue Pierre Mendès-France 69676 Bron Cedex France
Designing Massive Open Online Courses
Designing Massive Open Online Courses Vladimir Kukharenko 1 1 National Technical University Kharkiv Polytechnic Institute, Frunze Street 21, 61002 Kharkiv Ukraine [email protected] Abstract. Connective
Layered Approach of Intrusion Detection System with Efficient Alert Aggregation for Heterogeneous Networks
Layered Approach of Intrusion Detection System with Efficient Alert Aggregation for Heterogeneous Networks Lohith Raj S N, Shanthi M B, Jitendranath Mungara Abstract Protecting data from the intruders
TIBCO Spotfire Network Analytics 1.1. User s Manual
TIBCO Spotfire Network Analytics 1.1 User s Manual Revision date: 26 January 2009 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO
OpenText Information Hub (ihub) 3.1 and 3.1.1
OpenText Information Hub (ihub) 3.1 and 3.1.1 OpenText Information Hub (ihub) 3.1.1 meets the growing demand for analytics-powered applications that deliver data and empower employees and customers to
Running head: LEARNING ANALYTICS, ASSESSMENT FOR LEARNING!1. Learning Analytics as Assessment for Learning. Lisa Rubini-LaForest
Running head: LEARNING ANALYTICS, ASSESSMENT FOR LEARNING!1!!!!! Learning Analytics as Assessment for Learning Lisa Rubini-LaForest University of Calgary LEARNING ANALYTICS, ASSESSMENT FOR LEARNING!2 Abstract
EXPLOITING FOLKSONOMIES AND ONTOLOGIES IN AN E-BUSINESS APPLICATION
EXPLOITING FOLKSONOMIES AND ONTOLOGIES IN AN E-BUSINESS APPLICATION Anna Goy and Diego Magro Dipartimento di Informatica, Università di Torino C. Svizzera, 185, I-10149 Italy ABSTRACT This paper proposes
Prediction of Heart Disease Using Naïve Bayes Algorithm
Prediction of Heart Disease Using Naïve Bayes Algorithm R.Karthiyayini 1, S.Chithaara 2 Assistant Professor, Department of computer Applications, Anna University, BIT campus, Tiruchirapalli, Tamilnadu,
Visualization Method of Trajectory Data Based on GML, KML
Visualization Method of Trajectory Data Based on GML, KML Junhuai Li, Jinqin Wang, Lei Yu, Rui Qi, and Jing Zhang School of Computer Science & Engineering, Xi'an University of Technology, Xi'an 710048,
Search and Data Mining: Techniques. Applications Anya Yarygina Boris Novikov
Search and Data Mining: Techniques Applications Anya Yarygina Boris Novikov Introduction Data mining applications Data mining system products and research prototypes Additional themes on data mining Social
Assessing the quality of online courses from the students' perspective
Internet and Higher Education 9 (2006) 107 115 Assessing the quality of online courses from the students' perspective Andria Young, Chari Norgard 1 University of Houston-Victoria, 3007 N. Ben Wilson, Victoria,
Web Advertising Personalization using Web Content Mining and Web Usage Mining Combination
8 Web Advertising Personalization using Web Content Mining and Web Usage Mining Combination Ketul B. Patel 1, Dr. A.R. Patel 2, Natvar S. Patel 3 1 Research Scholar, Hemchandracharya North Gujarat University,
Policy-based Pre-Processing in Hadoop
Policy-based Pre-Processing in Hadoop Yi Cheng, Christian Schaefer Ericsson Research Stockholm, Sweden [email protected], [email protected] Abstract While big data analytics provides
Qlik Sense Enabling the New Enterprise
Technical Brief Qlik Sense Enabling the New Enterprise Generations of Business Intelligence The evolution of the BI market can be described as a series of disruptions. Each change occurred when a technology
Ensuring Security in Cloud with Multi-Level IDS and Log Management System
Ensuring Security in Cloud with Multi-Level IDS and Log Management System 1 Prema Jain, 2 Ashwin Kumar PG Scholar, Mangalore Institute of Technology & Engineering, Moodbidri, Karnataka1, Assistant Professor,
White Paper. How Streaming Data Analytics Enables Real-Time Decisions
White Paper How Streaming Data Analytics Enables Real-Time Decisions Contents Introduction... 1 What Is Streaming Analytics?... 1 How Does SAS Event Stream Processing Work?... 2 Overview...2 Event Stream
How To Test Your Web Site On Wapt On A Pc Or Mac Or Mac (Or Mac) On A Mac Or Ipad Or Ipa (Or Ipa) On Pc Or Ipam (Or Pc Or Pc) On An Ip
Load testing with WAPT: Quick Start Guide This document describes step by step how to create a simple typical test for a web application, execute it and interpret the results. A brief insight is provided
Identifying the Number of Visitors to improve Website Usability from Educational Institution Web Log Data
Identifying the Number of to improve Website Usability from Educational Institution Web Log Data Arvind K. Sharma Dept. of CSE Jaipur National University, Jaipur, Rajasthan,India P.C. Gupta Dept. of CSI
Component visualization methods for large legacy software in C/C++
Annales Mathematicae et Informaticae 44 (2015) pp. 23 33 http://ami.ektf.hu Component visualization methods for large legacy software in C/C++ Máté Cserép a, Dániel Krupp b a Eötvös Loránd University [email protected]
NakeDB: Database Schema Visualization
NAKEDB: DATABASE SCHEMA VISUALIZATION, APRIL 2008 1 NakeDB: Database Schema Visualization Luis Miguel Cortés-Peña, Yi Han, Neil Pradhan, Romain Rigaux Abstract Current database schema visualization tools
How To Find Influence Between Two Concepts In A Network
2014 UKSim-AMSS 16th International Conference on Computer Modelling and Simulation Influence Discovery in Semantic Networks: An Initial Approach Marcello Trovati and Ovidiu Bagdasar School of Computing
Providing Adaptive Courses in Learning Management Systems with Respect to Learning Styles *
Providing Adaptive Courses in Learning Management Systems with Respect to Learning Styles * Sabine Graf Vienna University of Technology Women's Postgraduate College for Internet Technologies Vienna, Austria
A Time Efficient Algorithm for Web Log Analysis
A Time Efficient Algorithm for Web Log Analysis Santosh Shakya Anju Singh Divakar Singh Student [M.Tech.6 th sem (CSE)] Asst.Proff, Dept. of CSE BU HOD (CSE), BUIT, BUIT,BU Bhopal Barkatullah University,
The Effect of Web-Based Learning Management System on Knowledge Acquisition of Information Technology Students at Jose Rizal University
The Effect of Web-Based Learning Management System on Knowledge Acquisition of Information Technology Students at Jose Rizal University Ryan A. Ebardo Computer Science Department, Jose Rizal University
Web Data Mining: A Case Study. Abstract. Introduction
Web Data Mining: A Case Study Samia Jones Galveston College, Galveston, TX 77550 Omprakash K. Gupta Prairie View A&M, Prairie View, TX 77446 [email protected] Abstract With an enormous amount of data stored
ASSOCIATION RULE MINING ON WEB LOGS FOR EXTRACTING INTERESTING PATTERNS THROUGH WEKA TOOL
International Journal Of Advanced Technology In Engineering And Science Www.Ijates.Com Volume No 03, Special Issue No. 01, February 2015 ISSN (Online): 2348 7550 ASSOCIATION RULE MINING ON WEB LOGS FOR
ANALYSIS OF WEBSITE USAGE WITH USER DETAILS USING DATA MINING PATTERN RECOGNITION
ANALYSIS OF WEBSITE USAGE WITH USER DETAILS USING DATA MINING PATTERN RECOGNITION K.Vinodkumar 1, Kathiresan.V 2, Divya.K 3 1 MPhil scholar, RVS College of Arts and Science, Coimbatore, India. 2 HOD, Dr.SNS
The skinny on big data in education: Learning analytics simplified
The skinny on big data in education: Learning analytics simplified By Jacqueleen A. Reyes, Nova Southeastern University Abstract This paper examines the current state of learning analytics (LA), its stakeholders
Do Supplemental Online Recorded Lectures Help Students Learn Microeconomics?*
Do Supplemental Online Recorded Lectures Help Students Learn Microeconomics?* Jennjou Chen and Tsui-Fang Lin Abstract With the increasing popularity of information technology in higher education, it has
Visual Analytics on Public Sector Open Access Data
Visual Analytics on Public Sector Open Access Data Dr. Andreas S. Maniatis Commercial Manager / Head of BI CyberStream LTD Big Data and Business Analytics: Theory and Practice Wednesday, October 24 th
Visualizing the Top 400 Universities
Int'l Conf. e-learning, e-bus., EIS, and e-gov. EEE'15 81 Visualizing the Top 400 Universities Salwa Aljehane 1, Reem Alshahrani 1, and Maha Thafar 1 [email protected], [email protected], [email protected]
Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks
Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Prashil S. Waghmare PG student, Sinhgad College of Engineering, Vadgaon, Pune University, Maharashtra, India. [email protected]
International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014
RESEARCH ARTICLE OPEN ACCESS A Survey of Data Mining: Concepts with Applications and its Future Scope Dr. Zubair Khan 1, Ashish Kumar 2, Sunny Kumar 3 M.Tech Research Scholar 2. Department of Computer
Big Data Mining Services and Knowledge Discovery Applications on Clouds
Big Data Mining Services and Knowledge Discovery Applications on Clouds Domenico Talia DIMES, Università della Calabria & DtoK Lab Italy [email protected] Data Availability or Data Deluge? Some decades
Mining for Web Engineering
Mining for Engineering A. Venkata Krishna Prasad 1, Prof. S.Ramakrishna 2 1 Associate Professor, Department of Computer Science, MIPGS, Hyderabad 2 Professor, Department of Computer Science, Sri Venkateswara
Introduction to Service Oriented Architectures (SOA)
Introduction to Service Oriented Architectures (SOA) Responsible Institutions: ETHZ (Concept) ETHZ (Overall) ETHZ (Revision) http://www.eu-orchestra.org - Version from: 26.10.2007 1 Content 1. Introduction
Hadoop Technology for Flow Analysis of the Internet Traffic
Hadoop Technology for Flow Analysis of the Internet Traffic Rakshitha Kiran P PG Scholar, Dept. of C.S, Shree Devi Institute of Technology, Mangalore, Karnataka, India ABSTRACT: Flow analysis of the internet
EFFECTIVE CONSTRUCTIVE MODELS OF IMPLICIT SELECTION IN BUSINESS PROCESSES. Nataliya Golyan, Vera Golyan, Olga Kalynychenko
380 International Journal Information Theories and Applications, Vol. 18, Number 4, 2011 EFFECTIVE CONSTRUCTIVE MODELS OF IMPLICIT SELECTION IN BUSINESS PROCESSES Nataliya Golyan, Vera Golyan, Olga Kalynychenko
Instructor and Learner Discourse in MBA and MA Online Programs: Whom Posts more Frequently?
Instructor and Learner Discourse in MBA and MA Online Programs: Whom Posts more Frequently? Peter Kiriakidis Founder and CEO 1387909 ONTARIO INC Ontario, Canada [email protected] Introduction Abstract: This
Active Directory Integration
January 11, 2011 Author: Audience: SWAT Team Evaluator Product: Cymphonix Network Composer EX Series, XLi OS version 9 Active Directory Integration The following steps will guide you through the process
aloe-project.de White Paper ALOE White Paper - Martin Memmel
aloe-project.de White Paper Contact: Dr. Martin Memmel German Research Center for Artificial Intelligence DFKI GmbH Trippstadter Straße 122 67663 Kaiserslautern fon fax mail web +49-631-20575-1210 +49-631-20575-1030
Load testing with. WAPT Cloud. Quick Start Guide
Load testing with WAPT Cloud Quick Start Guide This document describes step by step how to create a simple typical test for a web application, execute it and interpret the results. 2007-2015 SoftLogica
