Computational creativity research has produced many computational systems that are
described as creative [1]. A comprehensive literature survey reveals that although such systems are
labelled as creative, there is a distinct lack of evaluation of the Creativity of creative systems [1].
Nowadays, a number of online testing websites exist but the drawback of these tests is that every
student who gives a particular test will always be given the same set of questions irrespective of their
caliber. Thus, a student with a very high Intelligence Quotient (IQ) may be forced to answer basic
level questions and in the same way weaker students may be asked very challenging questions which
they cannot response. This method of testing results into a wastage of time for the high IQ students
and can be quite frustrating for the weaker students. This would never benefit a teacher to understand
a particular student’s caliber for the subject under Consideration. Each learner has different learning
status and therefore different test items should be used in their evaluation. This paper proposes an
Adaptive Evaluation System developed based on an Item Response Theory and would be created for
mobile end user keeping in mind the flexibility of students to attempt the test from anywhere. This
application would not only dynamically customize questions for students based on the previous
question he/she has answered but also by adjusting the degree of difficulty for test questions
depending on student ability, a teacher can acquire a valid & reliable measurement of student’s
competency.
Correlation based feature selection (cfs) technique to predict student perfro...IJCNCJournal
Education data mining is an emerging stream which h
elps in mining academic data for solving various
types of problems. One of the problems is the selec
tion of a proper academic track. The admission of a
student in engineering college depends on many fact
ors. In this paper we have tried to implement a
classification technique to assist students in pred
icting their success in admission in an engineering
stream.We have analyzed the data set containing inf
ormation about student’s academic as well as socio-
demographic variables, with attributes such as fami
ly pressure, interest, gender, XII marks and CET ra
nk
in entrance examinations and historical data of pre
vious batch of students. Feature selection is a pro
cess
for removing irrelevant and redundant features whic
h will help improve the predictive accuracy of
classifiers. In this paper first we have used featu
re selection attribute algorithms Chi-square.InfoGa
in, and
GainRatio to predict the relevant features. Then we
have applied fast correlation base filter on given
features. Later classification is done using NBTree
, MultilayerPerceptron, NaiveBayes and Instance bas
ed
–K- nearest neighbor. Results showed reduction in c
omputational cost and time and increase in predicti
ve
accuracy for the student model
Correlation based feature selection (cfs) technique to predict student perfro...IJCNCJournal
Education data mining is an emerging stream which h
elps in mining academic data for solving various
types of problems. One of the problems is the selec
tion of a proper academic track. The admission of a
student in engineering college depends on many fact
ors. In this paper we have tried to implement a
classification technique to assist students in pred
icting their success in admission in an engineering
stream.We have analyzed the data set containing inf
ormation about student’s academic as well as socio-
demographic variables, with attributes such as fami
ly pressure, interest, gender, XII marks and CET ra
nk
in entrance examinations and historical data of pre
vious batch of students. Feature selection is a pro
cess
for removing irrelevant and redundant features whic
h will help improve the predictive accuracy of
classifiers. In this paper first we have used featu
re selection attribute algorithms Chi-square.InfoGa
in, and
GainRatio to predict the relevant features. Then we
have applied fast correlation base filter on given
features. Later classification is done using NBTree
, MultilayerPerceptron, NaiveBayes and Instance bas
ed
–K- nearest neighbor. Results showed reduction in c
omputational cost and time and increase in predicti
ve
accuracy for the student model
Association rule discovery for student performance prediction using metaheuri...csandit
According to the increase of using data mining tech
niques in improving educational systems
operations, Educational Data Mining has been introd
uced as a new and fast growing research
area. Educational Data Mining aims to analyze data
in educational environments in order to
solve educational research problems. In this paper
a new associative classification technique
has been proposed to predict students final perform
ance. Despite of several machine learning
approaches such as ANNs, SVMs, etc. associative cla
ssifiers maintain interpretability along
with high accuracy. In this research work, we have
employed Honeybee Colony Optimization
and Particle Swarm Optimization to extract associat
ion rule for student performance prediction
as a multi-objective classification problem. Result
s indicate that the proposed swarm based
algorithm outperforms well-known classification tec
hniques on student performance prediction
classification problem.
Predictive models are quasi experimental structures used to determine the future
patterns in data. These meaningful data patterns form the building block of any
decision support system. Researchers all over the world have built many prediction
models for major industries. Research works in the educational sector has increased
steeply. This steep increase may be due to the high availability of data in the
educational domain. This survey tries to comprehend a few literary works on
academic performance prediction of engineering students with the focus on grade
predictions. Meaningful interpretations have been made and inferences are presented
at the end of this paper
Big shadow test
Big-Shadow-Test Method is used to solve a large simultaneous problem as a sequence of smaller simultaneous problems.
Shadow tests are no regular tests; their items are always returned to the pool. They are only assembled to balance the selection of items between current and future tests. Because of their presence, they neutralize the greedy character inherent in sequential test-assembly methods. In doing so, they prevent the best items from being assigned only to earlier tests and keep the later test-assembly problems feasible.
An accurate ability evaluation method for every student with small problem it...Hideo Hirose
To enhance the chance of use of the item response theory (IRT) in universities, we developed a test evaluation system via the Web for university teachers, and we have been evaluating students' abilities by using the IRT system in midterm and final examinations for two years.
We show a surprising aspect regarding the adoption of the IRT system in university tests. That is, the IRT can not only give us the problem difficulty information but also can provide the accurate student ability evaluation, even if the number of problems is small. Therefore, we can include high and low level test items together so that we can assess a variety of students' abilities accurately and fairly; we do not worry about providing easier problems that will make the lecture level decline; in other words, we do not care about finding the most appropriate problem levels to each student. We can provide all level problems uniformly distributed to all students, and we can still assess the students' abilities accurately. Consequently, students do not raise claims about their scores; they seem to be satisfied with it.
We show these results, in this paper, by a theoretical background, a simulation study, and our empirical results.
Word Problems are designed to help students to learn the application of mathematical concepts, algebraic identities and formulae in the real world. Variables are assigned the values of „real-world‟ entities and a logical approach in solving them is established. They help the students to bridge the gap between theoretical knowledge and the real world application of it by giving them hypothetical situations about the same. Probability is a measure or estimation of how likely it is that a particular event will happen. Probability concepts need to be properly understood before attempting to solve any problem related to it. In view of this a survey was conducted. Students from various schools and coaching classes were approached for the same. The study shows that majority of the students experience difficulties in identifying and understanding what exactly the word problem signifies and what approach it demands. Also, the process of learning Probability needs to be specialized given the different understanding levels of each and every student in contrast to the generalized education techniques that are being used in traditional classrooms. Keeping in mind these issues, Word Problem Solver for Probability is implemented, which caters to the learning needs of each and every student individually by providing a step-by-step solution to all problems from the Probability domain.
COMPARISON INTELLIGENT ELECTRONIC ASSESSMENT WITH TRADITIONAL ASSESSMENT FOR ...cseij
In education, the use of electronic (E) examination systems is not a novel idea, as E-examination systems
have been used to conduct objective assessments for the last few years. This research deals with randomly
designed E-examinations and proposes an E-assessment system that can be used for subjective questions.
This system assesses answers to subjective questions by finding a matching ratio for the keywords in
instructor and student answers.
A Mamdani Fuzzy Model to Choose Eligible Student EntryTELKOMNIKA JOURNAL
This paper presented about study that have been created a new student choosing system by
using fuzzy mamdani inference systems method. Fuzzy mamdani is used because it has characteristics
such as human perceptions on choosing of students with some specified criteria. The choosing students
who want entry to the school have been difficult if it is manually process. With the fuzzy mamdani, the
process can be possible completed execute and can be reduced the time of choose. To accomplish the
process, the fuzzy variable is created by the national final exam scores, report grade, general competency
test, physical test, interview and psychological test. Based on testing 270 data, the fuzzy mamdani has
been reached 75.63% accuracy.
Association rule discovery for student performance prediction using metaheuri...csandit
According to the increase of using data mining tech
niques in improving educational systems
operations, Educational Data Mining has been introd
uced as a new and fast growing research
area. Educational Data Mining aims to analyze data
in educational environments in order to
solve educational research problems. In this paper
a new associative classification technique
has been proposed to predict students final perform
ance. Despite of several machine learning
approaches such as ANNs, SVMs, etc. associative cla
ssifiers maintain interpretability along
with high accuracy. In this research work, we have
employed Honeybee Colony Optimization
and Particle Swarm Optimization to extract associat
ion rule for student performance prediction
as a multi-objective classification problem. Result
s indicate that the proposed swarm based
algorithm outperforms well-known classification tec
hniques on student performance prediction
classification problem.
Predictive models are quasi experimental structures used to determine the future
patterns in data. These meaningful data patterns form the building block of any
decision support system. Researchers all over the world have built many prediction
models for major industries. Research works in the educational sector has increased
steeply. This steep increase may be due to the high availability of data in the
educational domain. This survey tries to comprehend a few literary works on
academic performance prediction of engineering students with the focus on grade
predictions. Meaningful interpretations have been made and inferences are presented
at the end of this paper
Big shadow test
Big-Shadow-Test Method is used to solve a large simultaneous problem as a sequence of smaller simultaneous problems.
Shadow tests are no regular tests; their items are always returned to the pool. They are only assembled to balance the selection of items between current and future tests. Because of their presence, they neutralize the greedy character inherent in sequential test-assembly methods. In doing so, they prevent the best items from being assigned only to earlier tests and keep the later test-assembly problems feasible.
An accurate ability evaluation method for every student with small problem it...Hideo Hirose
To enhance the chance of use of the item response theory (IRT) in universities, we developed a test evaluation system via the Web for university teachers, and we have been evaluating students' abilities by using the IRT system in midterm and final examinations for two years.
We show a surprising aspect regarding the adoption of the IRT system in university tests. That is, the IRT can not only give us the problem difficulty information but also can provide the accurate student ability evaluation, even if the number of problems is small. Therefore, we can include high and low level test items together so that we can assess a variety of students' abilities accurately and fairly; we do not worry about providing easier problems that will make the lecture level decline; in other words, we do not care about finding the most appropriate problem levels to each student. We can provide all level problems uniformly distributed to all students, and we can still assess the students' abilities accurately. Consequently, students do not raise claims about their scores; they seem to be satisfied with it.
We show these results, in this paper, by a theoretical background, a simulation study, and our empirical results.
Word Problems are designed to help students to learn the application of mathematical concepts, algebraic identities and formulae in the real world. Variables are assigned the values of „real-world‟ entities and a logical approach in solving them is established. They help the students to bridge the gap between theoretical knowledge and the real world application of it by giving them hypothetical situations about the same. Probability is a measure or estimation of how likely it is that a particular event will happen. Probability concepts need to be properly understood before attempting to solve any problem related to it. In view of this a survey was conducted. Students from various schools and coaching classes were approached for the same. The study shows that majority of the students experience difficulties in identifying and understanding what exactly the word problem signifies and what approach it demands. Also, the process of learning Probability needs to be specialized given the different understanding levels of each and every student in contrast to the generalized education techniques that are being used in traditional classrooms. Keeping in mind these issues, Word Problem Solver for Probability is implemented, which caters to the learning needs of each and every student individually by providing a step-by-step solution to all problems from the Probability domain.
COMPARISON INTELLIGENT ELECTRONIC ASSESSMENT WITH TRADITIONAL ASSESSMENT FOR ...cseij
In education, the use of electronic (E) examination systems is not a novel idea, as E-examination systems
have been used to conduct objective assessments for the last few years. This research deals with randomly
designed E-examinations and proposes an E-assessment system that can be used for subjective questions.
This system assesses answers to subjective questions by finding a matching ratio for the keywords in
instructor and student answers.
A Mamdani Fuzzy Model to Choose Eligible Student EntryTELKOMNIKA JOURNAL
This paper presented about study that have been created a new student choosing system by
using fuzzy mamdani inference systems method. Fuzzy mamdani is used because it has characteristics
such as human perceptions on choosing of students with some specified criteria. The choosing students
who want entry to the school have been difficult if it is manually process. With the fuzzy mamdani, the
process can be possible completed execute and can be reduced the time of choose. To accomplish the
process, the fuzzy variable is created by the national final exam scores, report grade, general competency
test, physical test, interview and psychological test. Based on testing 270 data, the fuzzy mamdani has
been reached 75.63% accuracy.
Clustering Students of Computer in Terms of Level of ProgrammingEditor IJCATR
Educational data mining (EDM) is one of the applications of data mining. In educational data mining, there are two key domains, i.e. student domain and faculty domain. Different type of research work has been done in both domains.
In existing system the faculty performance has calculated on the basis of two parameters i.e. Student feedback and the result of student in that subject. In existing system we define two approaches one is multiple classifier approach and the other is a single classifier approach and comparing them, for relative evaluation of faculty performance using data mining
Techniques. In multiple classifier approach K-nearest neighbor (KNN) is used in first step and Rule based classification is used in the second step of classification while in single classifier approach only KNN is used in both steps of classification.
But in proposed system, I will analyse the faculty performance using 4 parameters i.e., student complaint about faculty, Student review feedback for faculty, students feedback, and students result etc.
For this proposed system I will be going to use opinion mining technique for analyzing performance of faculty and calculating score of each faculty.
This powerpoint presentation tells what are CATs and how we can make and apply computer adaptive tests. These slides are made by tabraiz bukhari who works on https://www.ppr-i.com/
A New Active Learning Technique Using Furthest Nearest Neighbour Criterion fo...ijcsa
Active learning is a supervised learning method that is based on the idea that a machine learning algorithm can achieve greater accuracy with fewer labelled training images if it is allowed to choose the image from which it learns. Facial age classification is a technique to classify face images into one of the several predefined age groups. The proposed study applies an active learning approach to facial age classification which allows a classifier to select the data from which it learns. The classifier is initially trained using a small pool of labeled training images. This is achieved by using the bilateral two dimension linear discriminant analysis. Then the most informative unlabeled image is found out from the unlabeled pool using the furthest nearest neighbor criterion, labeled by the user and added to the
appropriate class in the training set. The incremental learning is performed using an incremental version of bilateral two dimension linear discriminant analysis. This active learning paradigm is proposed to be applied to the k nearest neighbor classifier and the support vector machine classifier and to compare the performance of these two classifiers.
Data Mining Techniques for School Failure and Dropout SystemKumar Goud
Abstract: Data mining techniques are applied to predict college failure and bum of the student. This is method uses real data on middle-school students for prediction of failure and drop out. It implements white-box classification strategies, like induction rules and decision trees or call trees. Call tree could be a call support tool that uses tree-like graph or a model of call and their possible consequences. A call tree is a flowchart-like structure in which internal node represents a "test" on an attribute. Attribute is the real information of students that is collected from college in middle or pedagogy, each branch represents the outcome of the test and each leaf node represents a class label. The paths from root to leaf represent classification rules and it consists of three kinds of nodes which incorporates call node, likelihood node and finish node. It is specifically used in call analysis. Using this technique to boost their correctness for predicting which students might fail or dropout (idler) by first, using all the accessible attributes next, choosing the most effective attributes. Attribute choice is done by using WEKA tool.
Keywords: dataset, classification, clustering.
Universidad Técnica Particular de Loja
Ciclo Académico Abril Agosto 2011
Carrera: Inglés
Docente: Mgs. Orlando Lizaldes E.
Ciclo: Sexto
Bimestre: Segundo
Learning to Teach: Improving Instruction with Machine Learning TechniquesBeverly Park Woolf
Machine learning techniques enable instructional systems to learn about their students, topics, and pedagogical strategy. Just like master teachers who learn after years of experience, tutoring systems learn to adapt their teaching strategies to new students, and new domains and to personalize their teaching for individual students. Typical instructional systems persist in the same behavior originally encoded within them. However by using ML, tutoring systems learn from the behavior of earlier students and extend their existing knowledge. A variety of ML techniques are used with intelligent tutors, including HMM, neural networks, expectation maxima, Bayes Networks, statistical learning, regression modeling, causal modeling, and statistical models.
Similar to An Adaptive Evaluation System to Test Student Caliber using Item Response Theory (20)
A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIPEditor IJMTER
System-on-chip (soc) based system has so many disadvantages in power-dissipation as
well as clock rate while the data transfer from one system to another system in on-chip. At the same
time, a higher operated system does not support the lower operated bus network for data transfer.
However an alternative scheme is proposed for high speed data transfer. But this scheme is limited to
SOCs. Unlike soc, network-on-chip (NOC) has so many advantages for data transfer. It has a special
feature to transfer the data in on-chip named as transitional encoder. Its operation is based on input
transitions. At the same time it supports systems which are higher operated frequencies. In this
project, a low-power encoding scheme is proposed. The proposed system yields lower dynamic
power dissipation due to the reduction of switching activity and coupling switching activity when
compared to existing system. Even-though many factors which is based on power dissipation, the
dynamic power dissipation is only considerable for reasonable advantage. The proposed system is
synthesized using quartus II 9.1 software. Besides, the proposed system will be extended up to
interlink PE communication with help of routers and PE’s which are performed by various
operations. To implement this system in real NOC’s contains the proposed encoders and decoders for
data transfer with regular traffic scenarios should be considered.
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...Editor IJMTER
Coins are important part of our life. We use coins in a places like stores, banks, buses, trains
etc. So it becomes a basic need that coins can be sorted, counted automatically. For this, there is
necessary that the coins can be recognized automatically. Automated Coin Recognition System for the
Indian Coins of Rs. 1, 2, 5 and 10 with the rotation invariance. We have taken images from the both
sides of coin. So this system is capable to recognizing coins from both sides. Features are taken from the
images using techniques as a Hough Transformation, Pattern Averaging etc.
Analysis of VoIP Traffic in WiMAX EnvironmentEditor IJMTER
Worldwide Interoperability for Microwave Access (WiMAX) is currently one of the
hottest technologies in wireless communication. It is a standard based on the IEEE 802.16 wireless
technology that provides a very high throughput broadband connections over long distances. In
parallel, Voice Over Internet Protocol (VoIP) is a new technology which provides access to voice
communication over internet protocol and hence it is becomes an alternative to public switched
telephone networks (PSTN) due to its capability of transmission of voice as packets over IP
networks. A lot of research has been done in analyzing the performances of VoIP traffic over
WiMAX network. In this paper we review the analysis carried out by several authors for the most
common VoIP codec’s which are G.711, G.723.1 and G.729 over a WiMAX network using various
service classes. The objective is to compare the results for different types of service classes with
respect to the QoS parameters such as throughput, average delay and average jitter.
A Hybrid Cloud Approach for Secure Authorized De-DuplicationEditor IJMTER
The cloud backup is used for the personal storage of the people in terms of reducing the
mainlining process and managing the structure and storage space managing process. The challenging
process is the deduplication process in both the local and global backup de-duplications. In the prior
work they only provide the local storage de-duplication or vice versa global storage de-duplication in
terms of improving the storage capacity and the processing time. In this paper, the proposed system
is called as the ALG- Dedupe. It means the Application aware Local-Global Source De-duplication
proposed system to provide the efficient de-duplication process. It can provide the efficient deduplication process with the low system load, shortened backup window, and increased power
efficiency in the user’s personal storage. In the proposed system the large data is partitioned into
smaller part which is called as chunks of data. Here the data may contain the redundancy it will be
avoided before storing into the storage area.
Aging protocols that could incapacitate the InternetEditor IJMTER
The biggest threat to the Internet is the fact that it was never really designed. For e.g., the
BGP protocol is used by Internet routers to exchange information about changes to the Internet's
network topologies. However, it also is among the most fundamentally broken; as Internet routing
information can be poisoned with bogus routing information. Instead, it evolved in fits and start,
thanks to various protocols that have been cobbled together to fulfill the needs of the moment. Few
of protocols from them were designed with security in mind. or if they were sported no more than
was needed to keep out a nosy neighbor, not a malicious attacker. The result is a welter of aging
protocols susceptible to exploit on an Internet scale. Here are six Internet protocols that could stand
to be replaced sooner rather than later or are (mercifully) on the way out.
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...Editor IJMTER
The emergence of exactitude agriculture has been promoted by the numerous developments within
the field of wireless sensing element actor networks (WSAN). These WSANs offer important data
for gathering, work management, development of crops, and limitation of crop diseases. Goals of
this paper to introducing cloud computing as a brand new way (technique) to be utilized in addition
to WSANs to any enhance their application and benefits to the area of agriculture.
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMESEditor IJMTER
Carpooling (also car-sharing, ride-sharing, lift-sharing), is the sharing of car journeys so
that more than one person travels in a car. It helps to resolve a variety of problems that continue to
plague urban areas, ranging from energy demands and traffic congestion to environmental pollution.
Most of the existing method used stochastic disturbances arising from variations in vehicle travel
times for carpooling. However it doesn’t deal with the unmet demand with uncertain demand of the
vehicle for car pooling. To deal with this the proposed system uses Chance constrained
formulation/Programming (CCP) approach of the problem with stochastic demand and travel time
parameters, under mild assumptions on the distribution of stochastic parameters; and relates it with a
robust optimization approach. Since real problem sizes can be large, it could be difficult to find
optimal solutions within a reasonable period of time. Therefore solution algorithm using tabu
heuristic solution approach is developed to solve the model. Therefore, we constructed a stochastic
carpooling model that considers the in- fluence of stochastic travel times. The model is formulated as
an integer multiple commodity network flow problem. Since real problem sizes can be large, it could
be difficult to find optimal solutions within a reasonable period of time.
Sustainable Construction With Foam Concrete As A Green Green Building MaterialEditor IJMTER
A green building is an environmentally sustainable building, designed, constructed and
operated to minimise the total environmental impacts. Carbon dioxide (CO2) is the primary
greenhouse gas emitted through human activities. It is claimed that 5% of the world’s carbon dioxide
emission is attributed to cement industry, which is the vital constituent of concrete. Due to the
significant contribution to the environmental pollution, there is a need for finding an optimal solution
along with satisfying the civil construction needs. Apart from normal concrete bricks, a clay brick,
Foam concrete is a new innovative technology for sustainable building and civil construction which
fulfills the criteria of being a Green Material. This paper concludes that Foam Concrete can be an
effective sustainable material for construction and also focuses on the cost effectiveness in using
Foam Concrete as a building material in replacement with Clay Brick or other bricks.
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TESTEditor IJMTER
A good education system is required for overall prosperity of a nation. A tremendous
growth in the education sector had made the administration of education institutions complex. Any
researches reveal that the integration of ICT helps to reduce the complexity and enhance the overall
administration of education. This study has been undertaken to identify the various functional areas
to which ICT is deployed for information administration in education institutions and to find the
current extent of usage of ICT in all these functional areas pertaining to information administration.
The various factors that contribute to these functional areas were identified. A theoretical model was
derived and validated.
Textual Data Partitioning with Relationship and Discriminative AnalysisEditor IJMTER
Data partitioning methods are used to partition the data values with similarity. Similarity
measures are used to estimate transaction relationships. Hierarchical clustering model produces tree
structured results. Partitioned clustering produces results in grid format. Text documents are
unstructured data values with high dimensional attributes. Document clustering group ups unlabeled text
documents into meaningful clusters. Traditional clustering methods require cluster count (K) for the
document grouping process. Clustering accuracy degrades drastically with reference to the unsuitable
cluster count.
Textual data elements are divided into two types’ discriminative words and nondiscriminative
words. Only discriminative words are useful for grouping documents. The involvement of
nondiscriminative words confuses the clustering process and leads to poor clustering solution in return.
A variation inference algorithm is used to infer the document collection structure and partition of
document words at the same time. Dirichlet Process Mixture (DPM) model is used to partition
documents. DPM clustering model uses both the data likelihood and the clustering property of the
Dirichlet Process (DP). Dirichlet Process Mixture Model for Feature Partition (DPMFP) is used to
discover the latent cluster structure based on the DPM model. DPMFP clustering is performed without
requiring the number of clusters as input.
Document labels are used to estimate the discriminative word identification process. Concept
relationships are analyzed with Ontology support. Semantic weight model is used for the document
similarity analysis. The system improves the scalability with the support of labels and concept relations
for dimensionality reduction process.
Testing of Matrices Multiplication Methods on Different ProcessorsEditor IJMTER
There are many algorithms we found for matrices multiplication. Until now it has been
found that complexity of matrix multiplication is O(n3). Though Further research found that this
complexity can be decreased. This paper focus on the algorithm and its complexity of matrices
multiplication methods.
Malware is a worldwide pandemic. It is designed to damage computer systems without
the knowledge of the owner using the system. Software‟s from reputable vendors also contain
malicious code that affects the system or leaks information‟s to remote servers. Malware‟s includes
computer viruses, spyware, dishonest ad-ware, rootkits, Trojans, dialers etc. Malware detectors are
the primary tools in defense against malware. The quality of such a detector is determined by the
techniques it uses. It is therefore imperative that we study malware detection techniques and
understand their strengths and limitations. This survey examines different types of Malware and
malware detection methods.
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICEEditor IJMTER
Practical requirements for securely demonstrating identities between two handheld
devices are an important concern. The adversary can inject a Man-In- The-Middle (MITM) attack to
intrude the protocol. Protocols that employ secret keys require the devices to share private
information in advance, in which it is not feasible in the above scenario. Apart from insecurely
typing passwords into handheld devices or comparing long hexadecimal keys displayed on the
devices’ screen, many other human-verifiable protocols have been proposed in the literature to solve
the problem. Unfortunately, most of these schemes are unsalable to more users. Even when there are
only three entities attempt to agree a session key, these protocols need to be rerun for three times.
So, in the existing method a bipartite and a tripartite authentication protocol is presented using a
temporary confidential channel. Besides, further extend the system into a transitive authentication
protocol that allows multiple handheld devices to establish a conference key securely and efficiently.
But this method detects only the outsider attacks. Method does not consider the insider attacks. So,
in the proposed method trust score based method is introduced which computes the trust values for
the nodes and provide the security. The trust score is computed has a positive influence on the
confidence with which an entity conducts transactions with that node. Network the behavior of the
node will be monitored periodically and its trust value is also updated .So depending on the behavior
of the node in the network trust relation will be established between two nodes.
GLAUCOMA is a chronic eye disease that can damage optic nerve. According to WHO It
is the second leading cause of blindness, and is predicted to affect around 80 million people by 2020.
Development of the disease leads to loss of vision, which occurs increasingly over a long period of
time. As the symptoms only occur when the disease is quite advanced so that glaucoma is called the
silent thief of sight. Glaucoma cannot be cured, but its development can be slowed down by
treatment. Therefore, detecting glaucoma in time is critical. However, many glaucoma patients are
unaware of the disease until it has reached its advanced stage. In this paper, some manual and
automatic methods are discussed to detect glaucoma. Manual analysis of the eye is time consuming
and the accuracy of the parameter measurements also varies with different clinicians. To overcome
these problems with manual analysis, the objective of this survey is to introduce a method to
automatically analyze the ultrasound images of the eye. Automatic analysis of this disease is much
more effective than manual analysis.
Survey: Multipath routing for Wireless Sensor NetworkEditor IJMTER
Reliability is playing very vital role in some application of Wireless Sensor Networks
and multipath routing is one of the ways to increase the probability of reliability. More over energy
consumption is constraint. In this paper, we provide a survey of the state-of-the-art of proposed
multipath routing algorithm for Wireless Sensor Networks. We study the design, analyze the tradeoff
of each design, and overview several presenting algorithms.
Step up DC-DC Impedance source network based PMDC Motor DriveEditor IJMTER
This paper is devoted to the Quasi Z source network based DC Drive. The cascaded
(two-stage) Quasi Z Source network could be derived by the adding of one diode, one inductor,
and two capacitors to the traditional quasi-Z-source inverter The proposed cascaded qZSI inherits all
the advantages of the traditional solution (voltage boost and buck functions in a single stage,
continuous input current, and improved reliability). Moreover, as compared to the conventional qZSI,
the proposed solution reduces the shoot-through duty cycle by over 30% at the same voltage boost
factor. Theoretical analysis of the two-stage qZSI in the shoot-through and non-shoot-through
operating modes is described. The proposed and traditional qZSI-networks are compared. A
prototype of a Quasi Z Source network based DC Drive was built to verify the theoretical
assumptions. The experimental results are presented and analyzed.
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATIONEditor IJMTER
The paper reflects the spiritual philosophy of Aurobindo Ghosh which is helpful in today’s
education. In 19th century he wrote about spirituality, in accordance with that it is a core and vital part
of today’s education. It is very much essential for today’s kid. Here I propose the overview of that
philosophy.At the utmost regeneration of those values in today’s generation is the great deal with
education system. To develop the values and spiritual education in the youngers is the great moto of
mine. It is the materialistic world and without value redefinition among them is the harder task but not
difficult.
Software Quality Analysis Using Mutation Testing SchemeEditor IJMTER
The software test coverage is used measure the safety measures. The safety critical analysis is
carried out for the source code designed in Java language. Testing provides a primary means for
assuring software in safety-critical systems. To demonstrate, particularly to a certification authority, that
sufficient testing has been performed, it is necessary to achieve the test coverage levels recommended or
mandated by safety standards and industry guidelines. Mutation testing provides an alternative or
complementary method of measuring test sufficiency, but has not been widely adopted in the safetycritical industry. The system provides an empirical evaluation of the application of mutation testing to
airborne software systems which have already satisfied the coverage requirements for certification.
The system mutation testing to safety-critical software developed using high-integrity subsets of
C and Ada, identify the most effective mutant types and analyze the root causes of failures in test cases.
Mutation testing could be effective where traditional structural coverage analysis and manual peer
review have failed. They also show that several testing issues have origins beyond the test activity and
this suggests improvements to the requirements definition and coding process. The system also
examines the relationship between program characteristics and mutation survival and considers how
program size can provide a means for targeting test areas most likely to have dormant faults. Industry
feedback is also provided, particularly on how mutation testing can be integrated into a typical
verification life cycle of airborne software. The system also covers the safety and criticality levels of
Java source code.
Software Defect Prediction Using Local and Global AnalysisEditor IJMTER
The software defect factors are used to measure the quality of the software. The software
effort estimation is used to measure the effort required for the software development process. The defect
factor makes an impact on the software development effort. Software development and cost factors are
also decided with reference to the defect and effort factors. The software defects are predicted with
reference to the module information. Module link information are used in the effort estimation process.
Data mining techniques are used in the software analysis process. Clustering techniques are used
in the property grouping process. Rule mining methods are used to learn rules from clustered data
values. The “WHERE” clustering scheme and “WHICH” rule mining scheme are used in the defect
prediction and effort estimation process. The system uses the module information for the defect
prediction and effort estimation process.
The proposed system is designed to improve the defect prediction and effort estimation process.
The Single Objective Genetic Algorithm (SOGA) is used in the clustering process. The rule learning
operations are carried out sing the Apriori algorithm. The system improves the cluster accuracy levels.
The defect prediction and effort estimation accuracy is also improved by the system. The system is
developed using the Java language and Oracle relation database environment.
Software Cost Estimation Using Clustering and Ranking SchemeEditor IJMTER
Software cost estimation is an important task in the software design and development process.
Planning and budgeting tasks are carried out with reference to the software cost values. A variety of
software properties are used in the cost estimation process. Hardware, products, technology and
methodology factors are used in the cost estimation process. The software cost estimation quality is
measured with reference to the accuracy levels.
Software cost estimation is carried out using three types of techniques. They are regression based
model, anology based model and machine learning model. Each model has a set of technique for the
software cost estimation process. 11 cost estimation techniques fewer than 3 different categories are
used in the system. The Attribute Relational File Format (ARFF) is used maintain the software product
property values. The ARFF file is used as the main input for the system.
The proposed system is designed to perform the clustering and ranking of software cost
estimation methods. Non overlapped clustering technique is enhanced with optimal centroid estimation
mechanism. The system improves the clustering and ranking process accuracy. The system produces
efficient ranking results on software cost estimation methods.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Gen AI Study Jams _ For the GDSC Leads in India.pdf
An Adaptive Evaluation System to Test Student Caliber using Item Response Theory
1. Scientific Journal Impact Factor (SJIF): 1.711
International Journal of Modern Trends in Engineering
and Research
www.ijmter.com
@IJMTER-2014, All rights Reserved 329
e-ISSN: 2349-9745
p-ISSN: 2393-8161
An Adaptive Evaluation System to Test Student Caliber using Item
Response Theory
Safa Hamdare
Computers Department, SFIT
Abstract: Computational creativity research has produced many computational systems that are
described as creative [1]. A comprehensive literature survey reveals that although such systems are
labelled as creative, there is a distinct lack of evaluation of the Creativity of creative systems [1].
Nowadays, a number of online testing websites exist but the drawback of these tests is that every
student who gives a particular test will always be given the same set of questions irrespective of their
caliber. Thus, a student with a very high Intelligence Quotient (IQ) may be forced to answer basic
level questions and in the same way weaker students may be asked very challenging questions which
they cannot response. This method of testing results into a wastage of time for the high IQ students
and can be quite frustrating for the weaker students. This would never benefit a teacher to understand
a particular student’s caliber for the subject under Consideration. Each learner has different learning
status and therefore different test items should be used in their evaluation. This paper proposes an
Adaptive Evaluation System developed based on an Item Response Theory and would be created for
mobile end user keeping in mind the flexibility of students to attempt the test from anywhere. This
application would not only dynamically customize questions for students based on the previous
question he/she has answered but also by adjusting the degree of difficulty for test questions
depending on student ability, a teacher can acquire a valid & reliable measurement of student’s
competency.
Keywords: Intelligent Quotient (IQ), Adaptive Testing, Intelligent System, Artificial Intelligence,
Item Response Theory (IRT), Tailored Testing, Computer Adaptive Theory (CAT).
I. INTRODUCTION
The traditional method of Testing using Pen and Paper, since ages around the world uses “One Size
Fits All” approach. However there are many shortcomings that the traditional system faces like: the
need to being tied to fixed class timings to appear for the test, the need to travel to distant places to
reach the place where test is to be conducted, and the need to deal with different students in a
different manner. Even if the traditional system of testing is web based, it also faces certain
shortcomings like: No separate marking scheme for different level of questions and difficulty level of
question doesn’t change based on the previous response of the students. It means that still Computer
tests are conducted but it is not adaptive to student’s caliber, as the level of questions does not toggle
between easy, medium and high based on response to previous question and same marking scheme is
followed for a correct answer for each level. Despite its weaknesses, traditional test methods have
ruled the amount of intellectual and thought processing capabilities in the educational system. In
2. International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 330
spite of this dominance, traditional methods have the limitation of sample dependency for estimating
the test items parameters namely the item difficulty and item refinement. Nowadays leading testing
associations such as ETS (Educational Testing Service) have created adaptive tests using Item
Response Theory that dynamically pose questions to the users based on how the user answers the
previous questions. Based on this concept this paper proposes an Adaptive Evaluation System (AES)
that adapts to the examinee's ability level. For this reason, it has also been called tailored testing. As
this test dynamically customizes itself to an individual user thus can’t be considered as a standard
test having identical set of questions for all the students. As a result it provides very accurate results.
An Adaptive system is a different and advanced means which will help in conducting test on
computer as well as on mobile device allowing the students to access and attempt the test from
anywhere and anytime around the world in order to overcome the limitations of traditional testing
methods.
II. ITEM RESPONSE THEORY
Adaptive evaluation systems are computer-based systems for measuring the performance of
individuals or of teams by tailoring the presentation order provided by the system based on ongoing
user responses in order to match the assessment level to that of the learner or team [3]. Developing
such Adaptive Evaluation System has become possible using the concept of Item Response Theory
(IRT). Item response theory (IRT) was first proposed in the field of psychometrics for the purpose of
ability assessment [2]. It is widely used in education to calibrate and evaluate items in tests and to
score subjects on their abilities. During the last several decades, educational assessment has used
more and more IRT-based techniques to develop tests [2]. Today, all major educational tests, such as
the Scholastic Aptitude Test (SAT) and Graduate Record Examination (GRE), are developed by
using item response theory, because the methodology can knowingly progress measurement
correctness and reliability while providing potentially important reductions in assessment time and
effort, especially via computerized adaptive testing. Lord (1980) invented IRT in the early 1950s,
which utilized probability to explain the relationship between the examinee’s ability and the question
item response [5]. IRT is the probability of responding an item correctly or of accomplishing a
particular response level. It is modeled as a function of an individual’s ability and the characteristics
of the item. An utmost goal of IRT is guessing the probability of an examinee’s level of correct
response to an item of a specific difficulty. Theoretical range of ability can be measured on a
transformable scale from negative infinity to positive infinity; practical considerations usually limit
the range of values from –3 to +3 [8]. IRT models are mathematical functions that specify the
probability of discrete outcome, such as a correct response to an item, in terms of persons and item
parameters. Specifically, a mathematical model, called Item Characteristic Function (ICF) that
derives a continuous increasing curve for predicting the ability and test performance, and was
developed to infer the examinee’s ability or potential quality. There are traditionally three IRT
mathematical equations termed, one parameter model (1PLM or Rasch model), two parameter model
(2PLM), and three parameter model (3PLM) that are used to make predictions. All three models
have an item difficulty parameter (b). The ICF model [6]
One-parameter model equation is given as follows:
( ) =
( )
1 + ( )
Two-parameter model equation is given as follows:
( ) =
( )
1 + ( )
3. International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 331
Three-parameter model equation is given as follows:
( ) = + (1 − ).
( )
1 + ( )
In addition, the 2PL and 3PLmodels possess a discrimination parameter ( ), which allows the items
to discriminate differently among the examinees. The 3PL model contains a third parameter, referred
to as the pseudo-chance parameter (c). The pseudo-chance parameter (c) corresponds to the lower
asymptote of the item characteristic curve (ICC) which represents the probability that low ability test
takers will answer the item correctly and provide an estimate of the pseudo-chance parameter [7]. All
IRT-based models have some common features: They assume the existence of latent traits or
aptitudes (in our particular case the trait is the examinee's knowledge level) that allow us to predict
or explain examinee behavior; The relation between the trait and the answers that a person gives to
test items can be described with an increasing monotonous function called the Item Characteristic
Curve (ICC) [5].
Table 1: Advantage and Dis advantage of IRT
Advantage of IRT Disadvantage of IRT
Item statistics are independent of the sample
from which they were estimated.
The choice of a model may depend upon the
sample available, particularly during the testing
phase of an exam.
Examinee scores are independent of test
difficulty
Assumptions made for using the IRT model are
more rigorous and strict than those required of
traditional test methods.
Test analysis doesn’t require strict parallel tests
for assessing reliability.
IRT models require large samples to obtain
accurate and stable parameter estimates,
although Rasch measurement models are
useful with small to moderate samples
Item statistics and examinee ability are both
reported on the same scale
The parameters of the ICC must be previously
known for each item.
III. PROBLEM STATEMENT
In traditionally followed methods, system doesn’t adapt to students ability level and based on the
previous question answered by him/her the difficulty level of next question is not changed. Also
students have to be present at the desired location on an exact time to appear for the test. This paper
proposes an Adaptive Evaluation System that would evaluate students based on their performance in
a test. For example, if a student performs well on medium level question, he will then be presented
with a more difficult question of high level. Or, if he performed poorly, he would be presented with a
simple question of easy level. Compared to static multiple choice tests where all the students are
required to attempt a fixed set of questions, this system requires fewer test questions to be attempted
by a student, to arrive at an equal accurate score. As student attempting many high level questions
will attempt less questions as compared to student attempting only low level question. The main
objective of this system is that it dynamically customizes the test question based on Individual user
Caliber. It helps teacher to evaluate student and put student into different categories based on their
caliber, this could further play a vital role for focusing more attention on weak students. Also, each
4. International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 332
student is attempting different sets of question so there would not be any copying. This system also
provides flexibility for the students to attempt the test using any internet enabled mobile handset
making it easy for the examinee to appear for the test from anywhere.
IV. PROPOSED SYSTEM METHODOLOGY
The Proposed Adaptive Evaluation System will be implemented over web and would be accessed
using a computer or a mobile application for wired and wireless connection respectively. So that test
for students could be conducted in Laboratories using computer as well in Classroom using mobile
device remotely. In order to serve this functionality, a responsive website would be created and then
set of objective type questionnaire to be used would be formed. The system would then be tested to
check whether web application is compatible and customizable to screen size of any mobile and also
works properly on any browser of the computer. The System successively selects questions so as to
maximize the precision of the exam based on what is known about the examinee from previous
questions. From the examinee's perspective, the difficulty of the exam seems to tailor itself to his or
her level of ability. We have devised a system wherein different levels of questions will have
different marking schemes. Initially system poses a question from an easy level to all the examinee.
If an examinee answers correctly then adaptive tests require fewer test items to arrive at equally
accurate scores. For the test, the following sample marking scheme will be used, assuming a student
attempting a test of 50 marks:
Table 2: Marking Scheme for Adaptive Evaluation System
Question Level Marks Questions Need to be Attempted
Easy +2
For Example: First question attempted is of 2 marks, if answered
correctly then examinee moves to attempt the next level question of
3 marks, if this also answered correctly then he needs to attempt 9
more questions of difficult level correctly to complete the score of
50. So a student with high IQ would attempt only 11 questions.
Whereas if a student is unable to answer correctly the first question
of easy level then to complete the test he needs to go through at
least 25 questions.
Medium +3
Difficult +5
Student can login and appear for a test. Based on the student’s answer for the given question, the
subsequent questions will toggle between different levels. The IRT model is used for this purpose.
Item response theory places examinees and items on the same metric. Therefore, if the system has an
estimate of examinee ability, it is able to select an item that is most appropriate for that estimate.
Technically, this is done by selecting the item with the greatest information at that point. Information
is a function of the discrimination parameter of the item, as well as the conditional variance and
pseudo guessing parameter.
V. CONCLUSION
The proposed research work is a new and innovative method of conducting tests more efficiently and
would be of great help in teaching learning process. This method of testing will allow the students to
be assessed accurately in a shorter period of time compared to the traditional testing methods. In
traditional testing methods, all students are provided with same set of questions irrespective of their
performance in the test. This leads to longer tests with possibly redundant questions. As Questions
5. International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 333
are administered to the students dynamically based on their performance in the test; no two students
will be given the same set of questions. Thus by making use of this system, a dynamic testing
environment would be created which will provide accurate results to students, while at the same time
reducing testing time for the teacher. The applications of this project are several. Some possible
applications include: It can be used by students preparing for competitive exams such as GRE, CAT,
etc.; it can be used by educational institutions for conducting online tests; it can be used by schools
and colleges for conducting exams instead of the traditional testing approach which is currently used.
REFERENCES
[1] Anna Jordanous, “Evaluating Evaluation: Assessing Progress in Computational Creativity Research”, 2nd
International Conference on Computational Creativity, ICCC 2011.
[2] Xinming An and Yiu-Fai Yung, SAS Institute Inc., “Item Response Theory: What It Is and How You Can Use the
IRT Procedure to Apply It”, Paper SAS364-2014.
Encyclopedia of the sciences of Learning, Springer Link, Prof. Roy B. Clariana, Simon Hooper.
[3] Kavitha Rajamani and Vijaya Kathiravan, “An Adaptive Assessment System to compose Serial Test Sheets using
Item Response Theory”, Proceedings of the 2013 International Conference on Pattern Recognition, Informatics and
Mobile Engineering (PRIME) February 21-22.
[4] Omobola O. Adedoyin and J. A. Adedoyin , “Assessing the comparability between classical test theory (CTT) and
item response theory (IRT) models in estimating test item parameters”, Herald Journal of Education and General
Studies Vol. 2 (3), pp 107 - 114 August, 2013.
[5] Yu-Hui Tao, Yu-Lung Wu and Hsin-Yi Chang, “A Practical Computer Adaptive Testing Model for Small-Scale
Scenarios”, Educational Technology & Society, 11(3), 259–274.
[6] Eduardo Guzmán and Ricardo Conejo, “Self-Assessment in a Feasible, Adaptive Web-Based Testing System”, IEEE
TRANSACTIONS ON EDUCATION, VOL. 48, NO. 4, NOVEMBER 2005.
[7] Embretson SE, Reise SP, “Item Response Theory for Psychologists”, New Jersey: Lawrence Erlbaum Associates,
2000.
[8] Hambleton RK, Swaminathan H, Roger HJ, “Fundamentals of item response theory”, Newbury Park. C.A: Sage,
1991.