isecure: Integrating Learning Resources for Information Security Research and Education The isecure team

Size: px
Start display at page:

Download "isecure: Integrating Learning Resources for Information Security Research and Education The isecure team"

Transcription

1 isecure: Integrating Learning Resources for Information Security Research and Education The isecure team 1

2 isecure NSF-funded collaborative project ( ) Faculty NJIT Vincent Oria Jim Geller Reza Curtmola CUNY Soon Ae Chun MSU Edina Renfro-Michel Students NJIT Sheetal Rajgure (PhD) Arwa Wali (PhD) Deepthi Mandepudi (MS) Krithika Raghavan (MS) MSU Sailume Walo (PhD) 2

3 Millennials Multitask Have Short Attention Spans Tend to be Visual Learners Bore Easily Want Instant Gratification Want Control Over Their Learning Have an Expectation to Achieve Lack Self-Reflection Skills 3

4 Millennials Successful online courses need to utilize a variety of teaching tools Enhance learning for students using different learning styles Keep student attention Individualize learning (pace & information) 4

5 Online courses It can be difficult for students to coordinate all of the course material in a meaningful way How to reduce attrition rates for online courses? How can we make online teaching more attractive and effective? 5

6 isecure Online lecture materials are very popular Coursera MIT OpenCourseWare Multimedia data often relies on annotation. However, manual annotation is tedious How to effectively and efficiently search such a huge amount of heterogeneous data? 6

7 isecure Integration of multi-media teaching materials (slides, videos and textbooks) for Security courses based on a security ontology Segmenting and annotating learning media based on their learning content Building a Security Ontology to be used for annotating and querying the learning objects Adapting lecture contents to student learning styles Evaluating the usability and effectiveness of the linked multimedia learning system 7

8 Presentation Outline isecure modules Ultimate Course Search tool Security Ontology Evaluation & Learning styles Conclusion 8

9 isecure and Multimedia Learning Materials Multimedia is more and more used in teaching Slides, textbook, videos No link across the media The classical approaches based on visual features are not applicable Learning concepts Learning Concepts Complex semantics 9

10 Security Ontology isecure Modules SLOB: Security Ontology Browsing and Searching SKAT: Security Knowledge Acquisition Tool Team: James Geller, Soon Ae Chun, Arwa Wali, with Reza Curtmola and Roberto Rubino as the Information Security experts Ultimate Course Search (UCS) Slide, video and textbook indexing and search Team: Vincent Oria, Sheetal Rajgure, Krithika Raghavan, Deepthi Mandepudi, Hardikrasiklal Dasadia (MS), Saishashank Devannagari (MS) Evaluation UCS currently being used in CS NJIT Team: Edina Renfro-Michel, Sailume Walo 10

11 Ultimate Course Search Indexing, Searching (Scoring and Ranking) 11

12 isecure and Multimedia Learning Materials: Goal The purpose of this tool is to bring different learning media (textbook, PowerPoint slides, and videos) to a single platform Enhance learning of students Enable easy search of lecture materials 12

13 TF-IDF Vector Space Model from Information Retrieval Documents and queries are represented as weighted vectors Distinct index term (keyword) is treated as a dimension in the vector space, and weights are TF-IDF values TermFrequency(t,x) is proportional with the number of occurrences of the term t in x InverseDocumentFrequency(t) is inversely proportional with the number of documents containing term t 13

14 PowerPoint Presentation Structuring the slides Every slide s content is extracted and structured in the form of XML elements consisting of slide number, slide title and slide text <Presentation title= Ptitle > <Slide slidenumber= 1 > </Slide> </Presentation> Analyze the content <SlideTitle> title </SlideTitle> <SlideText> text </SlideText> Text is broken into a series of atomic elements/tokens The keywords are identified after the text is analyzed to remove whitespaces, stop words etc. The keywords are stemmed using English Stemmer, updated version of Porter Stemmer s algorithm 14

15 PowerPoint Presentation Indexing Build an inverted index for stemmed keywords For every keyword, keep a list of triples: (slide number, frequency in slide title, frequency in slide body) For every presentation, keep a list of slides associated with that presentation 15

16 PowerPoint Presentation Searching A slide s relevance is based on: Term frequency / Inverse document frequency Cosine similarity: Sim(q, d) = V(q)!V(d) V(q)! V(d) Keyword location in the slide (title, body) Only consider slides that contain query keywords A presentation s relevance is based on: An aggregation (sum) of the relevancy scores of the slides in the presentation Presentations are ranked and displayed based on their relevancy (higher to lower) 16

17 17

18 Lecture Video To identify which portion of a lecture refers to a specific slide, we need to segment the lecture video We determine slide transition in the video: Based on features of recording software (for new videos) Based on image processing techniques (for videos priorly recorded) Once transition is found, we can easily determine the duration of the slide segment in the video 18

19 Lecture Video Indexing The video lectures are converted to an XML hierarchy: <Video filename = videofilename.mp4 presentationfilename = relatedpresentationfile.ppt > <Slide slidenumber = 1> </Slide> </Video> <StartTime>in ms</starttime> <EndTime> in ms </EndTime> For every video segment corresponding to a presentation slide, record the slide number and the presentation associated with that video segment 19

20 Lecture Video Searching For incorporating search on videos, we rely on extracted text and scoring for PowerPoint slides When a user searches for a keyword, the video files corresponding to the slides are linked to the result with the start and end time 20

21 21

22 Textbook Indexing and Searching We use the textbook s Index of Terms and the Security Ontology to create our index An inverted index that keeps a list of textbook page numbers for every Index Term The book s index terms and page numbers of each term s occurrences are organized as the following XML: <Textbook title = textbooktitle > <Keyword> <Word> index term</word> <PageNumber>1,2,3 </PageNumber> </Keyword> </Textbook> To search, we match query keywords with Index Terms 22

23 23

24 isecure: Security Ontology Soon Ae Chun, CUNY-CSI James Geller, NJIT Reza Curtmola, NJIT Arwa Wali, NJIT PhD Student Amy Luo, CUNY-CSI Honors College 24

25 Outline Project Goals Develop Security Ontology Approach & results Bootstrapping approach SOB Tool Expert Tool SKAT Tool Ongoing and Next Steps 25

26 Project Goals: Cyber Security Ontology Learning starts with grasping the Concepts and Rela,onships in a domain. Model Cyber Security Domain Knowledge o Develop Cyber Security Ontology Apply Cyber Security Ontology for Cyber Security EducaJon o SemanJc DescripJon o SemanJc Linking o SemanJc Search and Browsing o Security Learning by Concepts o Support sharing, querying and reuse of domain knowledge 26

27 Develop Cyber Security Ontology Challenges: Knowledge Engineering has been labor intensive, resorjng to manual processes Our approach Semi- automajcally build ontology from textbook index Challenge of idenjfying Security Domain Concepts Challenge of building hierarchical structure of ontology & other relajonships Categories or classes (is- a or taxonomic relajons) RelaJonships between concepts (property) Challenge of verifying ontology Manual categorizajon ValidaJon of ontology 27

28 Our Approach: Seed Ontology- based bootstrapping Use of Textbook index terms as domain concepts Use an exisjng Ontology as a basic scaffold Herzog s ontology Fenz s ontology Develop a human expert tool VerificaJon and manual classificajon and edijng 28

29 Seed Ontology: Top- Level Concepts and RelaJonships Asset Counterm easure/ Control Threat Vulnerability Fenz et al

30 Seed Ontology: Upper level Security Ontology Threat Countermeas ures Asset Asset, Counter Measures, Vulnerability, Threat Goal, Model, Product, defense strategy Herzog et al h^p:// 30

31 Herzog et al. Fenz et al. Criteria to choose a seed ontology: AnnotaJon power Useful concepts to annotate the learning objects Covering power Number of terms covered in the security textbook 31

32 Ontology Enrichment Components Textbook Index Pre- processing Seed Ontology Ontology Enrichment Engine Exact String matching Substring Matching Wikipedia Category TOC for rela,onships Concept Defini,ons Enriched Security Ontology WIKIPedia NIST DefiniJons 32

33 Results Total 724 index terms Seed Ontology Index terms Enriched Ontology 263 Index terms

34 SKAT: Security Knowledge AcquisiJon Tool Allow domain experts to classify lehover index terms from a security textbook into the security ontology. Design Goals RecommendaJon of concept classes for unclassified index terms, to minimize cognijve burden Help the security expert define most related class for an index term 34

35 Recommending Ontology Concepts Co- occurrence Analysis For the lehover index terms, we use human experts to classify them to the ontology Recommend the potenjally related ontology classes (concepts) for each index term Coocurrence analysis From Textbook, idenjfy all sentences where Term t in index co- occur with concept classes (c1, c2, ) in the ontology Recommend these co- occurring concepts for the term t 271 Terms co- occur with ontology concepts and 44 do not co- occur with any concepts An expert knowledge acquisijon TOOL 35

36 Ontology Bootstrapping Components Textbook Index Pre- processing Ontology Enrichment Engine Exact String matching Substring Matching Wikipedia Category TOC for rela,onships Concept Defini,ons Enriched Security Ontology Bootstrap Ontology SKAT Tool WIKIPedia NIST DefiniJons 36

37 Current acjvijes SKAT tool- based expert classificajon EvaluaJon of efficacy of the tool EvaluaJon of the automated bootstrapping based ontology SOB: Cyber Security Ontology Browser Enrich Security Ontology Pre- requisite relajons between Learning concepts, difficulty levels of concepts, etc. 37

38 SKAT Tool 38

39 SOB Tool 39

40 Next Phase AcJviJes Develop Linked Data of Learning Resources Not only the classroom materials but also open learning objects, learning data Cyber- security ontology based annotajon/indexing Modeling of Learners Learning preferences Learning history SLOBS: Security Learning by Ontology Browsing and Searching Learning concept definijons and related resources Ranking and presentajon of search results Consider Learners model for Search and PresentaJon EvaluaJon of the tool for learning cyber security 40

41 Evaluation Integrate Learning Information, teach this information to students Acquire Feedback from Students to Improve UCS Determine Student Usage of UCS Determine Learning Outcomes of UCS 41

42 Learning Preferences Index of Learning Preferences (Felder & Soloman, 1993) Four Types of Learners Active Reflective Sensing Intuitive Visual Verbal Sequential - Global 42

43 ILS Learning Styles Inventory Active and Reflective Active learners like to interact with new material Reflective learners like to think about applying material Sensing and Intuitive Sensing learners like material that applies to the real world Intuitive learners enjoy learning new material and dislike repetition 43

44 ILS Learning Styles Inventory Visual and Verbal Visual learners remember material presented through pictures or demonstrations Verbal learners tend to remember written and spoken explanations Sequential and Global Sequential learners like to link information in logical steps Global learners like looking at the big picture and how it related to larger themes before understanding all of the details 44

45 ILS Results on a Continuum ACT REF 11a 9a 7a 5a 3a 1a 1b 3b 5b 7b 9b 11b SEN INT 11a 9a 7a 5a 3a 1a 1b 3b 5b 7b 9b 11b VIS VRB 11a 9a 7a 5a 3a 1a 1b 3b 5b 7b 9b 11b SEQ GLO 11a 9a 7a 5a 3a 1a 1b 3b 5b 7b 9b 11b 45

46 The Research Currently Collecting Data in a Security Course Control and Experimental Demographics, Pre-Post Test, ILS User Feedback and Suggestions Back End User Data 46

47 Midterm Survey Feedback How are the students using UCS? Search for Information/specific words & terms Review video podcast lectures As a reference To study for the Midterm To help complete class projects 47

48 Midterm Survey Feedback What did the students like about UCS? User friendly Search engine Fast and accurate Search exact words Tabs and specific information Search Videos Searches lead to a lot of information 48

49 Implications for Higher Education Reduce attrition Increase clarity of course organization Increase student interaction with materials Individualize learning Create connections within and between courses 49

50 Q&A CONTACT INFO Ultimate Course Search Tool Vincent Oria: Security Ontology Soon Ae Chun: James Geller: Evaluation & Learning styles Edina Renfro-Michel: 50

Search and Information Retrieval

Search and Information Retrieval Search and Information Retrieval Search on the Web 1 is a daily activity for many people throughout the world Search and communication are most popular uses of the computer Applications involving search

More information

INDEX OF LEARNING STYLES *

INDEX OF LEARNING STYLES * INDEX OF LEARNING STYLES * DIRECTIONS Enter your answers to every question on the ILS scoring sheet. Please choose only one answer for each question. If both a and b seem to apply to you, choose the one

More information

Association between Brain Hemisphericity, Learning Styles and Confidence in Using Graphics Calculator for Mathematics

Association between Brain Hemisphericity, Learning Styles and Confidence in Using Graphics Calculator for Mathematics Eurasia Journal of Mathematics, Science & Technology Education, 2007, 3(2), 127-131 Association between Brain Hemisphericity, Learning Styles and Confidence in Using Graphics Calculator for Mathematics

More information

Giuseppe Riccardi, Marco Ronchetti. University of Trento

Giuseppe Riccardi, Marco Ronchetti. University of Trento Giuseppe Riccardi, Marco Ronchetti University of Trento 1 Outline Searching Information Next Generation Search Interfaces Needle E-learning Application Multimedia Docs Indexing, Search and Presentation

More information

Recommender Systems: Content-based, Knowledge-based, Hybrid. Radek Pelánek

Recommender Systems: Content-based, Knowledge-based, Hybrid. Radek Pelánek Recommender Systems: Content-based, Knowledge-based, Hybrid Radek Pelánek 2015 Today lecture, basic principles: content-based knowledge-based hybrid, choice of approach,... critiquing, explanations,...

More information

Legal Informatics Final Paper Submission Creating a Legal-Focused Search Engine I. BACKGROUND II. PROBLEM AND SOLUTION

Legal Informatics Final Paper Submission Creating a Legal-Focused Search Engine I. BACKGROUND II. PROBLEM AND SOLUTION Brian Lao - bjlao Karthik Jagadeesh - kjag Legal Informatics Final Paper Submission Creating a Legal-Focused Search Engine I. BACKGROUND There is a large need for improved access to legal help. For example,

More information

Mining Text Data: An Introduction

Mining Text Data: An Introduction Bölüm 10. Metin ve WEB Madenciliği http://ceng.gazi.edu.tr/~ozdemir Mining Text Data: An Introduction Data Mining / Knowledge Discovery Structured Data Multimedia Free Text Hypertext HomeLoan ( Frank Rizzo

More information

Training Management System for Aircraft Engineering: indexing and retrieval of Corporate Learning Object

Training Management System for Aircraft Engineering: indexing and retrieval of Corporate Learning Object Training Management System for Aircraft Engineering: indexing and retrieval of Corporate Learning Object Anne Monceaux 1, Joanna Guss 1 1 EADS-CCR, Centreda 1, 4 Avenue Didier Daurat 31700 Blagnac France

More information

PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS.

PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS. PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS Project Project Title Area of Abstract No Specialization 1. Software

More information

Intinno: A Web Integrated Digital Library and Learning Content Management System

Intinno: A Web Integrated Digital Library and Learning Content Management System Intinno: A Web Integrated Digital Library and Learning Content Management System Synopsis of the Thesis to be submitted in Partial Fulfillment of the Requirements for the Award of the Degree of Master

More information

A Study in Learning Styles of Construction Management Students. Amit Bandyopadhyay, Ph.D., PE, F.ASCE State University of New York -FSC

A Study in Learning Styles of Construction Management Students. Amit Bandyopadhyay, Ph.D., PE, F.ASCE State University of New York -FSC A Study in Learning Styles of Construction Management Students Amit Bandyopadhyay, Ph.D., PE, F.ASCE State University of New York -FSC Abstract Students take in and process information in different ways.

More information

MIRACLE at VideoCLEF 2008: Classification of Multilingual Speech Transcripts

MIRACLE at VideoCLEF 2008: Classification of Multilingual Speech Transcripts MIRACLE at VideoCLEF 2008: Classification of Multilingual Speech Transcripts Julio Villena-Román 1,3, Sara Lana-Serrano 2,3 1 Universidad Carlos III de Madrid 2 Universidad Politécnica de Madrid 3 DAEDALUS

More information

Semantic Concept Based Retrieval of Software Bug Report with Feedback

Semantic Concept Based Retrieval of Software Bug Report with Feedback Semantic Concept Based Retrieval of Software Bug Report with Feedback Tao Zhang, Byungjeong Lee, Hanjoon Kim, Jaeho Lee, Sooyong Kang, and Ilhoon Shin Abstract Mining software bugs provides a way to develop

More information

Blended Course Evaluation Standards

Blended Course Evaluation Standards Introduction: Blended learning is defined as to combine Face-to-Face instruction with computer-mediated instruction Graham 2006. Mixing technology and content does not necessarily yield effective learning.

More information

A SUCCESSFUL STAND ALONE BRIDGE COURSE

A SUCCESSFUL STAND ALONE BRIDGE COURSE A SUCCESSFUL STAND ALONE BRIDGE COURSE Joann Segovia* Professor Minnesota State University Moorhead 1104 7th Avenue South Moorhead, MN 56563 Phone: (218) 477-4067 E-Mail: segovia@mnstate.edu James Hansen

More information

An Investigation into Visualization and Verbalization Learning Preferences in the Online Environment

An Investigation into Visualization and Verbalization Learning Preferences in the Online Environment An Investigation into Visualization and Verbalization Learning Preferences in the Online Environment Dr. David Seiler, Assistant Professor, Department of Adult and Career Education, Valdosta State University,

More information

Search Engines. Stephen Shaw <stesh@netsoc.tcd.ie> 18th of February, 2014. Netsoc

Search Engines. Stephen Shaw <stesh@netsoc.tcd.ie> 18th of February, 2014. Netsoc Search Engines Stephen Shaw Netsoc 18th of February, 2014 Me M.Sc. Artificial Intelligence, University of Edinburgh Would recommend B.A. (Mod.) Computer Science, Linguistics, French,

More information

Semantic Web based e-learning System for Sports Domain

Semantic Web based e-learning System for Sports Domain Semantic Web based e-learning System for Sports Domain S.Muthu lakshmi Research Scholar Dept.of Information Science & Technology Anna University, Chennai G.V.Uma Professor & Research Supervisor Dept.of

More information

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Karagpur

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Karagpur Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Karagpur Lecture No. #06 Cryptanalysis of Classical Ciphers (Refer

More information

HELP DESK SYSTEMS. Using CaseBased Reasoning

HELP DESK SYSTEMS. Using CaseBased Reasoning HELP DESK SYSTEMS Using CaseBased Reasoning Topics Covered Today What is Help-Desk? Components of HelpDesk Systems Types Of HelpDesk Systems Used Need for CBR in HelpDesk Systems GE Helpdesk using ReMind

More information

ONTOLOGY-BASED GENERIC TEMPLATE FOR RETAIL ANALYTICS

ONTOLOGY-BASED GENERIC TEMPLATE FOR RETAIL ANALYTICS ONTOLOGY-BASED GENERIC TEMPLATE FOR RETAIL ANALYTICS Kenneth I. Davou 1 and Rosnah Idrus 2 1 Universiti Sains Malaysia (USM), Malaysia, kid11_ttm071@student.usm.my 2 Universiti Sains Malaysia (USM), Malaysia,

More information

Movie Classification Using k-means and Hierarchical Clustering

Movie Classification Using k-means and Hierarchical Clustering Movie Classification Using k-means and Hierarchical Clustering An analysis of clustering algorithms on movie scripts Dharak Shah DA-IICT, Gandhinagar Gujarat, India dharak_shah@daiict.ac.in Saheb Motiani

More information

ConTag: Conceptual Tag Clouds Video Browsing in e-learning

ConTag: Conceptual Tag Clouds Video Browsing in e-learning ConTag: Conceptual Tag Clouds Video Browsing in e-learning 1 Ahmad Nurzid Rosli, 2 Kee-Sung Lee, 3 Ivan A. Supandi, 4 Geun-Sik Jo 1, First Author Department of Information Technology, Inha University,

More information

K@ A collaborative platform for knowledge management

K@ A collaborative platform for knowledge management White Paper K@ A collaborative platform for knowledge management Quinary SpA www.quinary.com via Pietrasanta 14 20141 Milano Italia t +39 02 3090 1500 f +39 02 3090 1501 Copyright 2004 Quinary SpA Index

More information

So today we shall continue our discussion on the search engines and web crawlers. (Refer Slide Time: 01:02)

So today we shall continue our discussion on the search engines and web crawlers. (Refer Slide Time: 01:02) Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #39 Search Engines and Web Crawler :: Part 2 So today we

More information

Search Result Optimization using Annotators

Search Result Optimization using Annotators Search Result Optimization using Annotators Vishal A. Kamble 1, Amit B. Chougule 2 1 Department of Computer Science and Engineering, D Y Patil College of engineering, Kolhapur, Maharashtra, India 2 Professor,

More information

1 o Semestre 2007/2008

1 o Semestre 2007/2008 Departamento de Engenharia Informática Instituto Superior Técnico 1 o Semestre 2007/2008 Outline 1 2 3 4 5 Outline 1 2 3 4 5 Exploiting Text How is text exploited? Two main directions Extraction Extraction

More information

LMS Evaluation Tool User Guide

LMS Evaluation Tool User Guide LMS Evaluation Tool User Guide August 2004 CC-BY-SA 3waynet Inc. and the Commonwealth of Learning LMS Evaluation Tool User Guide: Issue 1.2 ii Table of Contents 1. Introduction...1 2. General Overview...2

More information

A Review On Authoring Tools

A Review On Authoring Tools 2011 5th International Conference on Distance Learning and Education IPCSIT vol.12 (2011) (2011) IACSIT Press, Singapore A Review On Authoring Tools Maryam Khademi 1+, Maryam Haghshenas 2 and Hoda Kabir

More information

Best Practices in Online Course Design

Best Practices in Online Course Design Best Practices in Online Course Design For the Instructor Mark Timbrook Minot State University, Office of Instructional Technology 4/24/2014 Best Practices in Online Course Design Best Practices in Online

More information

Semantic Search in Portals using Ontologies

Semantic Search in Portals using Ontologies Semantic Search in Portals using Ontologies Wallace Anacleto Pinheiro Ana Maria de C. Moura Military Institute of Engineering - IME/RJ Department of Computer Engineering - Rio de Janeiro - Brazil [awallace,anamoura]@de9.ime.eb.br

More information

Fuzzy Keyword Search over Encrypted Stego in Cloud

Fuzzy Keyword Search over Encrypted Stego in Cloud International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-02 E-ISSN: 2347-2693 Fuzzy Keyword Search over Encrypted Stego in Cloud TanmayDahake 1*, MirsohailShaikh

More information

Improving Student Question Classification

Improving Student Question Classification Improving Student Question Classification Cecily Heiner and Joseph L. Zachary {cecily,zachary}@cs.utah.edu School of Computing, University of Utah Abstract. Students in introductory programming classes

More information

The Application Research of Ant Colony Algorithm in Search Engine Jian Lan Liu1, a, Li Zhu2,b

The Application Research of Ant Colony Algorithm in Search Engine Jian Lan Liu1, a, Li Zhu2,b 3rd International Conference on Materials Engineering, Manufacturing Technology and Control (ICMEMTC 2016) The Application Research of Ant Colony Algorithm in Search Engine Jian Lan Liu1, a, Li Zhu2,b

More information

Automated News Item Categorization

Automated News Item Categorization Automated News Item Categorization Hrvoje Bacan, Igor S. Pandzic* Department of Telecommunications, Faculty of Electrical Engineering and Computing, University of Zagreb, Croatia {Hrvoje.Bacan,Igor.Pandzic}@fer.hr

More information

dm106 TEXT MINING FOR CUSTOMER RELATIONSHIP MANAGEMENT: AN APPROACH BASED ON LATENT SEMANTIC ANALYSIS AND FUZZY CLUSTERING

dm106 TEXT MINING FOR CUSTOMER RELATIONSHIP MANAGEMENT: AN APPROACH BASED ON LATENT SEMANTIC ANALYSIS AND FUZZY CLUSTERING dm106 TEXT MINING FOR CUSTOMER RELATIONSHIP MANAGEMENT: AN APPROACH BASED ON LATENT SEMANTIC ANALYSIS AND FUZZY CLUSTERING ABSTRACT In most CRM (Customer Relationship Management) systems, information on

More information

LinkZoo: A linked data platform for collaborative management of heterogeneous resources

LinkZoo: A linked data platform for collaborative management of heterogeneous resources LinkZoo: A linked data platform for collaborative management of heterogeneous resources Marios Meimaris, George Alexiou, George Papastefanatos Institute for the Management of Information Systems, Research

More information

Developing your Blackboard Course for ipad Delivery

Developing your Blackboard Course for ipad Delivery Outline for Course and Clerkship Coordinator/Faculty Education Developing your Blackboard Course for ipad Delivery Help and Support from Miner Library Staff... 2 UR SMD Document and Technology Standards...

More information

Swirl. Multiplayer Gaming Simplified. CS4512 Systems Analysis and Design. Assignment 1 2010. Marque Browne 0814547. Manuel Honegger - 0837997

Swirl. Multiplayer Gaming Simplified. CS4512 Systems Analysis and Design. Assignment 1 2010. Marque Browne 0814547. Manuel Honegger - 0837997 1 Swirl Multiplayer Gaming Simplified CS4512 Systems Analysis and Design Assignment 1 2010 Marque Browne 0814547 Manuel Honegger - 0837997 Kieran O' Brien 0866946 2 BLANK MARKING SCHEME 3 TABLE OF CONTENTS

More information

Analysis of Data Mining Concepts in Higher Education with Needs to Najran University

Analysis of Data Mining Concepts in Higher Education with Needs to Najran University 590 Analysis of Data Mining Concepts in Higher Education with Needs to Najran University Mohamed Hussain Tawarish 1, Farooqui Waseemuddin 2 Department of Computer Science, Najran Community College. Najran

More information

Facilitating Knowledge Intelligence Using ANTOM with a Case Study of Learning Religion

Facilitating Knowledge Intelligence Using ANTOM with a Case Study of Learning Religion Facilitating Knowledge Intelligence Using ANTOM with a Case Study of Learning Religion Herbert Y.C. Lee 1, Kim Man Lui 1 and Eric Tsui 2 1 Marvel Digital Ltd., Hong Kong {Herbert.lee,kimman.lui}@marvel.com.hk

More information

MIS630 Data and Knowledge Management Course Syllabus

MIS630 Data and Knowledge Management Course Syllabus MIS630 Data and Knowledge Management Course Syllabus I. Contact Information Professor: Joseph Morabito, Ph.D. Office: Babbio 419 Office Hours: By Appt. Phone: 201.216.5304 Email: jmorabit@stevens.edu II.

More information

Learning and Teaching Styles in Language, Science and Technology Education in Nigeria.

Learning and Teaching Styles in Language, Science and Technology Education in Nigeria. , Vol.5 No.2 (2012) BritishJournal Publishing, Inc. 2012 http://www.bjournal.co.uk/bjass.aspx Learning and Teaching Styles in Language, Science and Technology Education in Nigeria. Olasumbo S.Apanpa (Ph.D)

More information

SEARCH ENGINE WITH PARALLEL PROCESSING AND INCREMENTAL K-MEANS FOR FAST SEARCH AND RETRIEVAL

SEARCH ENGINE WITH PARALLEL PROCESSING AND INCREMENTAL K-MEANS FOR FAST SEARCH AND RETRIEVAL SEARCH ENGINE WITH PARALLEL PROCESSING AND INCREMENTAL K-MEANS FOR FAST SEARCH AND RETRIEVAL Krishna Kiran Kattamuri 1 and Rupa Chiramdasu 2 Department of Computer Science Engineering, VVIT, Guntur, India

More information

Enhancing the relativity between Content, Title and Meta Tags Based on Term Frequency in Lexical and Semantic Aspects

Enhancing the relativity between Content, Title and Meta Tags Based on Term Frequency in Lexical and Semantic Aspects Enhancing the relativity between Content, Title and Meta Tags Based on Term Frequency in Lexical and Semantic Aspects Mohammad Farahmand, Abu Bakar MD Sultan, Masrah Azrifah Azmi Murad, Fatimah Sidi me@shahroozfarahmand.com

More information

NNMi120 Network Node Manager i Software 9.x Essentials

NNMi120 Network Node Manager i Software 9.x Essentials NNMi120 Network Node Manager i Software 9.x Essentials Instructor-Led Training For versions 9.0 9.2 OVERVIEW This course is designed for those Network and/or System administrators tasked with the installation,

More information

WHITE PAPER. Peter Drucker. intentsoft.com 2014, Intentional Software Corporation

WHITE PAPER. Peter Drucker. intentsoft.com 2014, Intentional Software Corporation We know now that the source of wealth is something specifically human: knowledge. If we apply knowledge to tasks we already know how to do, we call it productivity. If we apply knowledge to tasks that

More information

Chapter 3: Data Mining Driven Learning Apprentice System for Medical Billing Compliance

Chapter 3: Data Mining Driven Learning Apprentice System for Medical Billing Compliance Chapter 3: Data Mining Driven Learning Apprentice System for Medical Billing Compliance 3.1 Introduction This research has been conducted at back office of a medical billing company situated in a custom

More information

DIGITAL MARKETING TRAINING

DIGITAL MARKETING TRAINING DIGITAL MARKETING TRAINING Digital Marketing Basics Keywords Research and Analysis Basics of advertising What is Digital Media? Digital Media Vs. Traditional Media Benefits of Digital marketing Latest

More information

Recognition. Sanja Fidler CSC420: Intro to Image Understanding 1 / 28

Recognition. Sanja Fidler CSC420: Intro to Image Understanding 1 / 28 Recognition Topics that we will try to cover: Indexing for fast retrieval (we still owe this one) History of recognition techniques Object classification Bag-of-words Spatial pyramids Neural Networks Object

More information

CTL Online Workshop Program Referral Resource Sheet

CTL Online Workshop Program Referral Resource Sheet ACADEMIC POLICIES THAT CAN AFFECT YOU AS A UMUC FACULTY MEMBER Familiarizes faculty with UMUC Academic Policies and their effect on faculty responsibilities and expectations for students Intended for all

More information

LEARNING STYLE PREFERENCES AND LEARNING STRATEGIES IN INTENSIVE CARE NURSE EDUCATION.

LEARNING STYLE PREFERENCES AND LEARNING STRATEGIES IN INTENSIVE CARE NURSE EDUCATION. LEARNING STYLE PREFERENCES AND LEARNING STRATEGIES IN INTENSIVE CARE NURSE EDUCATION. Sharon M Wetzig RN, BN, GCN (Critical Care), MEd (Further Education & Training). Nurse Educator - Intensive Care, Princess

More information

9. Text & Documents. Visualizing and Searching Documents. Dr. Thorsten Büring, 20. Dezember 2007, Vorlesung Wintersemester 2007/08

9. Text & Documents. Visualizing and Searching Documents. Dr. Thorsten Büring, 20. Dezember 2007, Vorlesung Wintersemester 2007/08 9. Text & Documents Visualizing and Searching Documents Dr. Thorsten Büring, 20. Dezember 2007, Vorlesung Wintersemester 2007/08 Slide 1 / 37 Outline Characteristics of text data Detecting patterns SeeSoft

More information

Big Data Text Mining and Visualization. Anton Heijs

Big Data Text Mining and Visualization. Anton Heijs Copyright 2007 by Treparel Information Solutions BV. This report nor any part of it may be copied, circulated, quoted without prior written approval from Treparel7 Treparel Information Solutions BV Delftechpark

More information

Automatic Timeline Construction For Computer Forensics Purposes

Automatic Timeline Construction For Computer Forensics Purposes Automatic Timeline Construction For Computer Forensics Purposes Yoan Chabot, Aurélie Bertaux, Christophe Nicolle and Tahar Kechadi CheckSem Team, Laboratoire Le2i, UMR CNRS 6306 Faculté des sciences Mirande,

More information

Use of a Web-Based GIS for Real-Time Traffic Information Fusion and Presentation over the Internet

Use of a Web-Based GIS for Real-Time Traffic Information Fusion and Presentation over the Internet Use of a Web-Based GIS for Real-Time Traffic Information Fusion and Presentation over the Internet SUMMARY Dimitris Kotzinos 1, Poulicos Prastacos 2 1 Department of Computer Science, University of Crete

More information

Distance Education Learning Resources Unit Document Title: Online Course Review Checklist Last Updated: July 17, 2013 by the DE Office Draft Final

Distance Education Learning Resources Unit Document Title: Online Course Review Checklist Last Updated: July 17, 2013 by the DE Office Draft Final Distance Education Learning Resources Unit Document Title: Online Course Review Checklist Last Updated: July 17, 2013 by the DE Office Draft Final Section 1: Course Overview and Introduction Addresses

More information

Wiley PLUS Student User Guide

Wiley PLUS Student User Guide Wiley PLUS Student User Guide Table Of Contents egrade Plus... 1 egrade Plus Help... 1 Getting Additional Help and Technical Support... 1 System Requirements... 2 Getting Started... 5 Logging in and Registering

More information

Integrating Business Intelligence Module into Learning Management System

Integrating Business Intelligence Module into Learning Management System Integrating Business Intelligence Module into Learning Management System Mario Fabijanić and Zoran Skočir* Cognita Address: Radoslava Cimermana 64a, 10020 Zagreb, Croatia Telephone: 00 385 1 6558 440 Fax:

More information

ACQUIRING, ORGANISING AND PRESENTING INFORMATION AND KNOWLEDGE ON THE WEB. Pavol Návrat

ACQUIRING, ORGANISING AND PRESENTING INFORMATION AND KNOWLEDGE ON THE WEB. Pavol Návrat Computing and Informatics, Vol. 28, 2009, 393 398 ACQUIRING, ORGANISING AND PRESENTING INFORMATION AND KNOWLEDGE ON THE WEB Pavol Návrat Institute of Informatics and Software Engineering Faculty of Informatics

More information

How To Improve Cloud Computing With An Ontology System For An Optimal Decision Making

How To Improve Cloud Computing With An Ontology System For An Optimal Decision Making International Journal of Computational Engineering Research Vol, 04 Issue, 1 An Ontology System for Ability Optimization & Enhancement in Cloud Broker Pradeep Kumar M.Sc. Computer Science (AI) Central

More information

Web Mining. Margherita Berardi LACAM. Dipartimento di Informatica Università degli Studi di Bari berardi@di.uniba.it

Web Mining. Margherita Berardi LACAM. Dipartimento di Informatica Università degli Studi di Bari berardi@di.uniba.it Web Mining Margherita Berardi LACAM Dipartimento di Informatica Università degli Studi di Bari berardi@di.uniba.it Bari, 24 Aprile 2003 Overview Introduction Knowledge discovery from text (Web Content

More information

Enterprise Architecture Modeling PowerDesigner 16.1

Enterprise Architecture Modeling PowerDesigner 16.1 Enterprise Architecture Modeling PowerDesigner 16.1 Windows DOCUMENT ID: DC00816-01-1610-01 LAST REVISED: November 2011 Copyright 2011 by Sybase, Inc. All rights reserved. This publication pertains to

More information

Incorporating Window-Based Passage-Level Evidence in Document Retrieval

Incorporating Window-Based Passage-Level Evidence in Document Retrieval Incorporating -Based Passage-Level Evidence in Document Retrieval Wensi Xi, Richard Xu-Rong, Christopher S.G. Khoo Center for Advanced Information Systems School of Applied Science Nanyang Technological

More information

Business Intelligence and Decision Support Systems

Business Intelligence and Decision Support Systems Chapter 12 Business Intelligence and Decision Support Systems Information Technology For Management 7 th Edition Turban & Volonino Based on lecture slides by L. Beaubien, Providence College John Wiley

More information

How To Develop Software

How To Develop Software Software Engineering Prof. N.L. Sarda Computer Science & Engineering Indian Institute of Technology, Bombay Lecture-4 Overview of Phases (Part - II) We studied the problem definition phase, with which

More information

HCC ONLINE COURSE REVIEW RUBRIC

HCC ONLINE COURSE REVIEW RUBRIC HCC ONLINE COURSE REVIEW RUBRIC Adapted from Maryland Online FIPSE Project and Lake Superior College I. COURSE OVERVIEW AND INTRODUCTION General Review Standard: The overall design of the course, navigational

More information

University E-Learning System

University E-Learning System WDS'06 Proceedings of Contributed Papers, Part I, 22 26, 2006. ISBN 80-86732-84-3 MATFYZPRESS Possibilities and Use of a University E-learning System R. Remeš Faculty of Mathematics and Physics, Charles

More information

Session T1H Introducing Security in a Chemical Engineering Design Course Using Adaptive Online Learning

Session T1H Introducing Security in a Chemical Engineering Design Course Using Adaptive Online Learning Introducing Security in a Chemical Engineering Design Course Using Adaptive Online Learning Ken Debelak, Larry Howard, Yuan Xue, Christina Lee, Janos Sztipanovits Vanderbilt University, Nashville, TN 37235

More information

A SYSTEM FOR AUTOMATIC QUERY EXPANSION IN A BROWSER-BASED ENVIRONMENT

A SYSTEM FOR AUTOMATIC QUERY EXPANSION IN A BROWSER-BASED ENVIRONMENT Mario Kubek Technical University of Ilmenau, Germany mario.kubek@tu-ilmenau.de Hans Friedrich Witschel University of Leipzig, Germany witschel@informatik.uni-leipzig.de A SYSTEM FOR AUTOMATIC QUERY EXPANSION

More information

Automated Lecture Transcription

Automated Lecture Transcription Automated Lecture Transcription Brandon Muramatsu mura@mit.edu MIT, Office of Educational Innovation and Technology (Really, I m just moonlighting as an OCWC Staffer ) Citation: Muramatsu, B. (2009). Automated

More information

Designing an Object Relational Data Warehousing System: Project ORDAWA * (Extended Abstract)

Designing an Object Relational Data Warehousing System: Project ORDAWA * (Extended Abstract) Designing an Object Relational Data Warehousing System: Project ORDAWA * (Extended Abstract) Johann Eder 1, Heinz Frank 1, Tadeusz Morzy 2, Robert Wrembel 2, Maciej Zakrzewicz 2 1 Institut für Informatik

More information

Administrator's Guide

Administrator's Guide Search Engine Optimization Module Administrator's Guide Installation and configuration advice for administrators and developers Sitecore Corporation Table of Contents Chapter 1 Installation 3 Chapter 2

More information

www.tekclasses.com +91-8970005497/+91-7411642061 info@tekclasses.com / contact@tekclasses.com TABLEAU TRAINING DURATION 30hrs

www.tekclasses.com +91-8970005497/+91-7411642061 info@tekclasses.com / contact@tekclasses.com TABLEAU TRAINING DURATION 30hrs TABLEAU TRAINING DURATION 30hrs AVAILABLE BATCHES WEEKDAYS (6.30AM TO 7.30AM) & WEEKENDS (10AM TO 1PM) MODE OF TRAINING AVAILABLE ONLINE INSTRUCTOR LED CLASSROOM TRAINING (MARATHAHALLI, BANGALORE) SELF

More information

Analysing the Behaviour of Students in Learning Management Systems with Respect to Learning Styles

Analysing the Behaviour of Students in Learning Management Systems with Respect to Learning Styles Analysing the Behaviour of Students in Learning Management Systems with Respect to Learning Styles Sabine Graf and Kinshuk 1 Vienna University of Technology, Women's Postgraduate College for Internet Technologies,

More information

Copyright 2007 Ramez Elmasri and Shamkant B. Navathe. Slide 29-1

Copyright 2007 Ramez Elmasri and Shamkant B. Navathe. Slide 29-1 Slide 29-1 Chapter 29 Overview of Data Warehousing and OLAP Chapter 29 Outline Purpose of Data Warehousing Introduction, Definitions, and Terminology Comparison with Traditional Databases Characteristics

More information

Phase 1 pilot 2005/6 Intervention. GCU Caledonian Business School Business Management Page 1 of 8. Overview

Phase 1 pilot 2005/6 Intervention. GCU Caledonian Business School Business Management Page 1 of 8. Overview University Department Module Overview Glasgow Caledonian Business school Business Management The Business School has been implementing assessment re-engineering using a variety of technologies, initially

More information

Cloud Storage-based Intelligent Document Archiving for the Management of Big Data

Cloud Storage-based Intelligent Document Archiving for the Management of Big Data Cloud Storage-based Intelligent Document Archiving for the Management of Big Data Keedong Yoo Dept. of Management Information Systems Dankook University Cheonan, Republic of Korea Abstract : The cloud

More information

IT Academy Lesson Plan

IT Academy Lesson Plan 10 IT Academy Lesson Plan Microsoft Sharepoint Turn potential into success Microsoft Office SharePoint 2010: Lesson Plans Introduction Preparing to teach courses on Microsoft SharePoint 2010 for the first

More information

Monitoring Web Browsing Habits of User Using Web Log Analysis and Role-Based Web Accessing Control. Phudinan Singkhamfu, Parinya Suwanasrikham

Monitoring Web Browsing Habits of User Using Web Log Analysis and Role-Based Web Accessing Control. Phudinan Singkhamfu, Parinya Suwanasrikham Monitoring Web Browsing Habits of User Using Web Log Analysis and Role-Based Web Accessing Control Phudinan Singkhamfu, Parinya Suwanasrikham Chiang Mai University, Thailand 0659 The Asian Conference on

More information

Experiments in Web Page Classification for Semantic Web

Experiments in Web Page Classification for Semantic Web Experiments in Web Page Classification for Semantic Web Asad Satti, Nick Cercone, Vlado Kešelj Faculty of Computer Science, Dalhousie University E-mail: {rashid,nick,vlado}@cs.dal.ca Abstract We address

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 5 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 5 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 5 INTELLIGENT MULTIDIMENSIONAL DATABASE INTERFACE Mona Gharib Mohamed Reda Zahraa E. Mohamed Faculty of Science,

More information

QDquaderni. UP-DRES User Profiling for a Dynamic REcommendation System E. Messina, D. Toscani, F. Archetti. university of milano bicocca

QDquaderni. UP-DRES User Profiling for a Dynamic REcommendation System E. Messina, D. Toscani, F. Archetti. university of milano bicocca A01 084/01 university of milano bicocca QDquaderni department of informatics, systems and communication UP-DRES User Profiling for a Dynamic REcommendation System E. Messina, D. Toscani, F. Archetti research

More information

<is web> Information Systems & Semantic Web University of Koblenz Landau, Germany

<is web> Information Systems & Semantic Web University of Koblenz Landau, Germany Information Systems University of Koblenz Landau, Germany Exploiting Spatial Context in Images Using Fuzzy Constraint Reasoning Carsten Saathoff & Agenda Semantic Web: Our Context Knowledge Annotation

More information

Effectiveness of Flipped learning in Project Management Class

Effectiveness of Flipped learning in Project Management Class , pp. 41-46 http://dx.doi.org/10.14257/ijseia.2015.9.2.04 Effectiveness of Flipped learning in Project Management Class Jeong Ah Kim*, Hae Ja Heo** and HeeHyun Lee*** *Department of Computer Education

More information

Modifying Curriculum and Instruction

Modifying Curriculum and Instruction Modifying Curriculum and Instruction Purpose of Modification: The purpose of modification is to enable an individual to compensate for intellectual, behavioral, or physical disabi1ities. Modifications

More information

Developing Critical Thinking Skills with The Colbert Report

Developing Critical Thinking Skills with The Colbert Report Developing Critical Thinking Skills with The Colbert Report Why Teach Critical Thinking with The Colbert Report? A. Young people receive the majority of their information through popular culture. B. Using

More information

lnteractivity in CALL Courseware Design Carla Meskill University of Massachusetts/Boston

lnteractivity in CALL Courseware Design Carla Meskill University of Massachusetts/Boston lnteractivity in CALL Courseware Design Carla Meskill University of Massachusetts/Boston ABSTRACT: This article discusses three crucial elements to be considered in the design of CALL. These design attributes,

More information

GCE APPLIED ICT A2 COURSEWORK TIPS

GCE APPLIED ICT A2 COURSEWORK TIPS GCE APPLIED ICT A2 COURSEWORK TIPS COURSEWORK TIPS A2 GCE APPLIED ICT If you are studying for the six-unit GCE Single Award or the twelve-unit Double Award, then you may study some of the following coursework

More information

OPTIMIZING YOUR WEBSITE. Inbound Certification Class #2

OPTIMIZING YOUR WEBSITE. Inbound Certification Class #2 OPTIMIZING YOUR WEBSITE. Inbound Certification Class #2 #INBOUND AGENDA 1 Website optimization and inbound marketing 2 How to optimize a website: best practices 3 What website optimization in execution

More information

Clustering Technique in Data Mining for Text Documents

Clustering Technique in Data Mining for Text Documents Clustering Technique in Data Mining for Text Documents Ms.J.Sathya Priya Assistant Professor Dept Of Information Technology. Velammal Engineering College. Chennai. Ms.S.Priyadharshini Assistant Professor

More information

DESIGN AND STRUCTURE OF FUZZY LOGIC USING ADAPTIVE ONLINE LEARNING SYSTEMS

DESIGN AND STRUCTURE OF FUZZY LOGIC USING ADAPTIVE ONLINE LEARNING SYSTEMS Abstract: Fuzzy logic has rapidly become one of the most successful of today s technologies for developing sophisticated control systems. The reason for which is very simple. Fuzzy logic addresses such

More information

How to Create a Voicethread PowerPoint Presentation

How to Create a Voicethread PowerPoint Presentation CREATE A FREE VOICETHREAD ACCOUNT 1. Open a browser like Internet Explorer, Firefox, or Safari. Navigate to http://voicethread.com. 2. To create an account, click Sign in or Register. 3. Underneath the

More information

Delta Journal of Education ISSN 2160-9179

Delta Journal of Education ISSN 2160-9179 Mounce Volume 3, Issue 2, November, 2013 102 Delta Journal of Education ISSN 2160-9179 Published by Delta State University Teaching Information Literacy Online: One Librarian s Experience Michael Mounce

More information

WebSphere Business Monitor

WebSphere Business Monitor WebSphere Business Monitor Monitor sub-models 2010 IBM Corporation This presentation should provide an overview of the sub-models in a monitor model in WebSphere Business Monitor. WBPM_Monitor_MonitorModels_Submodels.ppt

More information

Desktop Computing in Skillport Finding Approved Folders and Printing Certificates of Completion

Desktop Computing in Skillport Finding Approved Folders and Printing Certificates of Completion Desktop Computing in Skillport Finding Approved Folders and Printing Certificates of Completion 1. Log in to Skillport http://e-learningcenter.skillport.com/skillportfe/login.action 2. Click on the CATALOG

More information

Annotea and Semantic Web Supported Collaboration

Annotea and Semantic Web Supported Collaboration Annotea and Semantic Web Supported Collaboration Marja-Riitta Koivunen, Ph.D. Annotea project Abstract Like any other technology, the Semantic Web cannot succeed if the applications using it do not serve

More information

Stop searching, find your files and emails fast.

Stop searching, find your files and emails fast. Stop searching, find your files and emails fast. Copernic Desktop Search Home allows individuals to instantly search their files, e-mails, and e-mail attachments stored anywhere on their PC's hard drive.

More information

INTERNET MARKETING. SEO Course Syllabus Modules includes: COURSE BROCHURE

INTERNET MARKETING. SEO Course Syllabus Modules includes: COURSE BROCHURE AWA offers a wide-ranging yet comprehensive overview into the world of Internet Marketing and Social Networking, examining the most effective methods for utilizing the power of the internet to conduct

More information

RANKING WEB PAGES RELEVANT TO SEARCH KEYWORDS

RANKING WEB PAGES RELEVANT TO SEARCH KEYWORDS ISBN: 978-972-8924-93-5 2009 IADIS RANKING WEB PAGES RELEVANT TO SEARCH KEYWORDS Ben Choi & Sumit Tyagi Computer Science, Louisiana Tech University, USA ABSTRACT In this paper we propose new methods for

More information