Users behavioral patterns are one of the main research directions in web usage mining. Web based ... more Users behavioral patterns are one of the main research directions in web usage mining. Web based educational systems are particularly interesting since behavioral patterns are closely related to educational performance. In this paper we focus on attractors in web based educational systems, i.e., qualitative specific behavioral patterns to which users adhere over time. The research has been conducted on a locally developed e-learning platform called PULSE. Data gathered from weblogs have been preprocessed and conceptual landscapes of knowledge have been built using Formal Concept Analysis. Users behavioral patterns have been detected herefrom, or by moving ahead a triadic view. Triadic concepts enabled us to detect unstructured attractors, while conceptual hierarchies and triadic concept sets made possible to investigate the educational attractors and to derive valuable knowledge about bundle of users and their behavior related to their educational performance.
Using a learning management system (LMS) is a common practise nowadays. Such instruments are used... more Using a learning management system (LMS) is a common practise nowadays. Such instruments are used in educational institutions to enhance and support the teaching act as well as in industry for training purposes. In a computer science department of an university such instrument tends to be a basic requirement. That is because not only it allows a better management of courses and a better communication between students and professors, but can also serve as a perfect instrument for presenting teaching related materials for computer science subjects. During the years I have created and used several such instruments: a System with Interactive ackNowledgement and Evaluation of students work during laboratory sessions (SINE), a Php Utility used in Laboratories for Student Evaluation (PULSE), and PULSE Extended. The aim of this paper is to present the current enhancements of PULSE.
2011 7th International Conference on Next Generation Web Services Practices, 2011
QoS routing is used for finding feasible paths that satisfy simultaneously multiple constraints a... more QoS routing is used for finding feasible paths that satisfy simultaneously multiple constraints and it is a NP-complete problem. The difficulty of solving such problems increases in the hierarchical context, where aggregation techniques influence the path computation process. This paper offers a solution for hierarchical QoS routing by introducing the protocol called Multi-constrained Macro-routing. This protocol uses Macro-routing protocol with the Extended Full-Mesh aggregation technique to determine multiple hierarchical QoS routes. Tests presented here prove that Multi-constrained Macro-routing out-performs any other hierarchical routing protocol that uses the Full-Mesh aggregation by finding better and more QoS paths.
ABSTRACT Nowadays the use of e-learning systems is increasing, especially in academia. Most resea... more ABSTRACT Nowadays the use of e-learning systems is increasing, especially in academia. Most researchers use Web Usage Mining (WUM) techniques to study the behavior of users of such systems. The results thus obtained are used to enhance e-learning systems or make different predictions. Current tools used for Web Usage Mining can offer a partial view on the usage of such systems. This paper presents the use of Formal Concept Analysis (FCA) as a Web Usage Mining instrument. It is also shown how different methods of FCA can be applied for revealing user behavior patterns within a system as well as users dynamics. The detection of users dynamics is a current research topic used to reveal how a system (e-learning instrument in our case) is built. Various authors who use FCA for Web Usage Mining propose ontology generation, semantic web personalisation, but none are using the whole range of FCA tools for exploration. In this paper, we debut by representing user dynamics patterns using ToscanaJ. Then, we use a triadic approach in order to investigate the behavioral patterns of students using the e-learning system. We also show how frequent triconcepts can be used for Web Usage Mining. Then, we use CIRCOS to represent the information content of the triadic data selection
We describe a problem of traffic redundancy over Inter- net Service Provider Networks (ISPs) that... more We describe a problem of traffic redundancy over Inter- net Service Provider Networks (ISPs) that occurs when the links to the client's network are highly utilized. The in- going traffic is highly unpredictable when multiple ingress points exists for the flows originating in the Internet. There- fore, traffic engineering mechanisms are more difficult to apply. A solution for avoiding this
... Despite the fact that each person's learning requirements may be different, there ar... more ... Despite the fact that each person's learning requirements may be different, there are often wide areas of overlap between individuals that can be mutually beneficial. ... WEB ANALYTICS FOR EDUCATIONAL CONTENT 271 Testing and experimentation: By using slight variations ...
Users behavioral patterns are one of the main research directions in web usage mining. Web based ... more Users behavioral patterns are one of the main research directions in web usage mining. Web based educational systems are particularly interesting since behavioral patterns are closely related to educational performance. In this paper we focus on attractors in web based educational systems, i.e., qualitative specific behavioral patterns to which users adhere over time. The research has been conducted on a locally developed e-learning platform called PULSE. Data gathered from weblogs have been preprocessed and conceptual landscapes of knowledge have been built using Formal Concept Analysis. Users behavioral patterns have been detected herefrom, or by moving ahead a triadic view. Triadic concepts enabled us to detect unstructured attractors, while conceptual hierarchies and triadic concept sets made possible to investigate the educational attractors and to derive valuable knowledge about bundle of users and their behavior related to their educational performance.
Using a learning management system (LMS) is a common practise nowadays. Such instruments are used... more Using a learning management system (LMS) is a common practise nowadays. Such instruments are used in educational institutions to enhance and support the teaching act as well as in industry for training purposes. In a computer science department of an university such instrument tends to be a basic requirement. That is because not only it allows a better management of courses and a better communication between students and professors, but can also serve as a perfect instrument for presenting teaching related materials for computer science subjects. During the years I have created and used several such instruments: a System with Interactive ackNowledgement and Evaluation of students work during laboratory sessions (SINE), a Php Utility used in Laboratories for Student Evaluation (PULSE), and PULSE Extended. The aim of this paper is to present the current enhancements of PULSE.
2011 7th International Conference on Next Generation Web Services Practices, 2011
QoS routing is used for finding feasible paths that satisfy simultaneously multiple constraints a... more QoS routing is used for finding feasible paths that satisfy simultaneously multiple constraints and it is a NP-complete problem. The difficulty of solving such problems increases in the hierarchical context, where aggregation techniques influence the path computation process. This paper offers a solution for hierarchical QoS routing by introducing the protocol called Multi-constrained Macro-routing. This protocol uses Macro-routing protocol with the Extended Full-Mesh aggregation technique to determine multiple hierarchical QoS routes. Tests presented here prove that Multi-constrained Macro-routing out-performs any other hierarchical routing protocol that uses the Full-Mesh aggregation by finding better and more QoS paths.
ABSTRACT Nowadays the use of e-learning systems is increasing, especially in academia. Most resea... more ABSTRACT Nowadays the use of e-learning systems is increasing, especially in academia. Most researchers use Web Usage Mining (WUM) techniques to study the behavior of users of such systems. The results thus obtained are used to enhance e-learning systems or make different predictions. Current tools used for Web Usage Mining can offer a partial view on the usage of such systems. This paper presents the use of Formal Concept Analysis (FCA) as a Web Usage Mining instrument. It is also shown how different methods of FCA can be applied for revealing user behavior patterns within a system as well as users dynamics. The detection of users dynamics is a current research topic used to reveal how a system (e-learning instrument in our case) is built. Various authors who use FCA for Web Usage Mining propose ontology generation, semantic web personalisation, but none are using the whole range of FCA tools for exploration. In this paper, we debut by representing user dynamics patterns using ToscanaJ. Then, we use a triadic approach in order to investigate the behavioral patterns of students using the e-learning system. We also show how frequent triconcepts can be used for Web Usage Mining. Then, we use CIRCOS to represent the information content of the triadic data selection
We describe a problem of traffic redundancy over Inter- net Service Provider Networks (ISPs) that... more We describe a problem of traffic redundancy over Inter- net Service Provider Networks (ISPs) that occurs when the links to the client's network are highly utilized. The in- going traffic is highly unpredictable when multiple ingress points exists for the flows originating in the Internet. There- fore, traffic engineering mechanisms are more difficult to apply. A solution for avoiding this
... Despite the fact that each person's learning requirements may be different, there ar... more ... Despite the fact that each person's learning requirements may be different, there are often wide areas of overlap between individuals that can be mutually beneficial. ... WEB ANALYTICS FOR EDUCATIONAL CONTENT 271 Testing and experimentation: By using slight variations ...
Peer-to-peer (p2p) traffic not only encourages illegal distribution of copyrighted material but a... more Peer-to-peer (p2p) traffic not only encourages illegal distribution of copyrighted material but also takes most of the bandwidth, therefore reducing the service quality of business critical network applications. While corporate firewalls are trying to address this issue by blocking certain TCP ports, p2p applications avoid those by disguising as well known applications such as HTTP, HTTPS, SMTP or instant messaging
Uploads