SlideShare a Scribd company logo
1 of 5
Download to read offline
ACEEE Int. J. on Network Security , Vol. 02, No. 02, Apr 2011



       Design and Implementation of Efficient Search
       Methodology for Content-Based Retrieval in E-
                  Learning Environment
                                             Arindam Ray, Amlan Chakrabarti
                                                Awadh Centre of Education
                                         Guru Gobind Singh Indraprastha University
                                                     New Delhi, India
                                              arindamray_2007@yahoo.co.in
                                      A K Choudhury School of Information Technology
                                                   University of Calcutta
                                                Kolkata, West Bengal, India
                                                   acakcs@caluniv.ac.in

Abstract - E-Learning portal is the full of content of different        repository of digital image, video, and audio data. There is a
formats like text, metadata, image, audio, and video. Current           controlled vocabulary or thesaurus provided. Hybrid search
search methodologies have a direct impact on the fundamental            systems are also found among search engines; however, it is
retrieval issues that information seekers encounter in their use        the popularity of full text searching that has changed the
of the vast number of search systems on the web today. Recently,        road map to information access. However, searching for a
information retrieval for text and multimedia content has               multimedia content is not as easy because the multimedia
become an important research area. Content-based retrieval
                                                                        data, as opposed to text, needs many stages of pre-processing
in multimedia is a challenging problem since multimedia data
needs detailed interpretation from pixel values. Based on
                                                                        to yield indices relevant for querying. Since an image or a
several new technologies, such as ubiquitous computing,                 video sequence can be interpreted in numerous ways, there
ontology engineering, semantic web and grid computing, it is            is no commonly agreed-upon vocabulary. Thus, the strategy
observed that for flexible educational platform architecture            of manually assigning a set of labels to a multimedia data,
for E-Learning that is OntoEdu is must. In this paper we offer          storing it and matching the stored label with a query will not
review report of E-Learning architecture and propose efficient          be effective. As per the grid architecture [1], the large volume
search algorithm to retrieve multimedia content from the E-             of video data makes any assignment of text labels a massively
Learning environment. The purpose of this technique is to               labor intensive effort. In recent years, research has focused
efficient and fast retrieval of data from content based
                                                                        on the use of internal features of images and videos computed
environment. The results of these proposed searching
techniques have been found satisfactorily.
                                                                        in an automated or semi-automated way [2]. Automated
                                                                        analysis calculates statistics, which can be approximately
Keywords- Content based retrieval, Syntactic indexing,                  correlated to the content features. The common strategy for
Semantic indexing, Perceptual features, Matching techniques             automatic indexing had been based on using syntactic
e-learning, Ontology, Grid Computing, Learning methods                  features alone. However, due to its complexity of operation,
                                                                        there is a paradigm shift in the research of identifying
                    I.INTRODUCTION                                      semantic features [4]. Web based courses are now developed
                                                                        and presented through so-called Learning Management
    Architecture on E-Learning Grid has been proposed by                Systems such as Blackboard or WebCT (Web Course Tools).
Victor Pankratius, Gottfried Vossen [1] in the year 2003. In            Learning Management systems are powerful integrated
that paper they proposed the basic architecture of Grid                 system that supports a number of activities performed by
Computing (Fig 1). The grid computing paradigm essentially              teachers and students during the E-Learning process. Our
aggregates the view on existing hardware and software                   proposed searching algorithm is based on the proposed
resources. The proposed architecture is the combination of              architecture on E-Learning Grid [1]. This paper put forward
Core Grid Middleware and Learning Management System                     the efficient searching mechanism to retrieve data from the
which content two set of database one maintain in grid level            content based portal. The organization of the paper is as
operation and another one maintain the content retrieval. In            follows:
this paper our focus is to present efficient and fast search the            The abstraction of the content organization and the need
content as per the learner’s requirement. It can only be done           of searching under e-learning environment have been
if we can organize the content with appropriate architecture.           explained in Section II. The basic architecture of e-learning
We reviewed learning management system architecture and                 environment, grid computing, is explained in Section III.
their file system. Content organization is one of the major             The proposed algorithm and its explanation for image and
concerns in E-Learning paradigm. E-Learning Portal has                  video search are presented in Section IV. The implementation
resulted in a substantial progress in the multimedia and                of the algorithm is explained in section V, Result and
storage technology that has led to building of a large
© 2011 ACEEE                                                       45
DOI: 01.IJNS.02.02.258
ACEEE Int. J. on Network Security , Vol. 02, No. 02, Apr 2011

conclusion is described in section VI and references in section           going to search the object from their enrol content then before
VII.                                                                      searching it must check the authentication and then search
         II.ABSTRACTION OF THE CONTENT                                    the content. The Core grid database will control the enter
        ORGANIZATION AND SEARCHING NEED                                   scenario of the particular learner. It maintain number of
                                                                          database as per the level of security of the organization. This
          The technological landscape of modern E-Learning                is called grid level activity. Another division of architecture
environment is dominated by Learning Management System.                   is called Learning Management System (LMS). After
Efficient and effective handling of text, audio and video                 overcoming the LMS the control comes to the search the
documents depends on the availability of indexes. Manual                  desired data. First it checks the content type, and then it
indexing is unfeasible for large video collections. Content               proceeds to search.
organization is also an important issue. In the existing                      Multimedia content can be modeled as a hierarchy of
environment, Learning Management System, there is a lack                  abstractions. At the lowest level are the raw pixels with
of proper searching of contents. The multimedia contents                  unprocessed and coarse information such as color or
are stored along with the subsequent text information in the              brightness. The intermediate level consists of objects and
database. When learner searches the multimedia content then               their attributes, while the human level concepts involving
it searches that text from the database. In case of spontaneous           the interpretation of the objects and perceptual emotion form
uploading of multimedia content along with instant retrieval              the highest level. Based on the above hierarchy, descriptive
is not possible. It is not acceptable for content based retrieval.        features in multimedia, furnished to the users of content-
In this paper we proposed direct multimedia content                       based technology, can be categorized as either syntactic
searching methodology from E-Learning environment. The                    features or semantic features [5]. A syntactic feature is a low-
Grid architecture is used which is based on ontology                      level characteristic of an image or a video such as an object
technology, Grid technology, Semantic Web technology. The                 boundary or color histogram. A semantic feature [3], which
content based retrieval is categorized into basic three types             is functionally at a higher level of hierarchy, represents an
of multimedia content Audio, Video and Text. For each                     abstract feature. Whereas the label grass assigned to a region
category same type of searching methodology is used.                      of an image or descriptor ‘empathy of apprehension’ for a
                                                                          video shot (a shot is a sequentially recorded set of frames
  III.BASIC ARCHITECTURE OF THE E-LEARNING                                representing a continuous action in time and space by a single
                  ENVIRONMENT                                             camera). At higher level of user interaction, the semantic
  The Architecture, we have observed that searching text,                 features are more useful as compared to the syntactic features
audio and video from the learning environment with different              [6].
courses is too complicated. We have found that learners when




                                      Figure1: Learning Management System (LMS) – Grid Model


© 2011 ACEEE                                                         46
DOI: 01.IJNS.02.02.258
ACEEE Int. J. on Network Security , Vol. 02, No. 02, Apr 2011

               IV.PROPOSED ALGORITHM                                     Algorithm 1: Generate N × K Random (i, t) Pairs
                                                                         Input: N,K,D,min[D],max[D],w[D]
    As per the architecture of the grid architecture of E-               Output: p[D], rnd_i[N][K], rnd_t[N][K]
Learning, we propose the video searching algorithm based                 pi = wi × (maxi “ mini); for i = 0, . . . ,D “ 1
on Semantic and Syntactic Indexing technique. Semantic
search seeks to improve search accuracy by understanding                 normalize pi s.t.
learners intent and the contextual meaning of terms as they              for (n = 0; n < N; n + +) do
appear in the searchable dataarea, whether on the Web or                    for (k = 0; k < K; k + +) do
within a closed system, to generate more relevant results.                                  pick random number r € [0, 1)
User’s query: A query specified by the user is translated
directly into pruning operations on intrinsic parameters. In             find i s.t.
a query is specified by the colors, sizes and arbitrary spatial          rnd_i[n][k] = i
layouts of the color regions, which include both absolute                pick random number t € [min i,maxi]
and relative spatial locations.                                          rnd_t[n][k] = t
To find the region that best match:                                                 end for
            Q = { cq; (xq; yq); areaq; (wq; hq)}                                  end for
    The query is processed by first computing the individual
queries for color, location, size and spatial extent. Query              Algorithm 2: Convert Feature Vector to N-Bit Vector
object X, the goal is to find all objects Y in the collection                    Input: v[D],N,K, rnd_i[N][K], rnd_t[N][K]
such that the distance d(X, Y) is within an allowed range. A                     Output: b[N]
simple representation for objects with D numeric attributes                      for (n = 0; n < N; n + +) do
is to represent them by points in D-dimensional space. One                       x=0
particular class of distance functions commonly used with                            for (k = 0; k < K; k + +) do
such a representation are the lp norms, where the distance                                 i = rnd_i[n][k]; t = rnd_t[n][k]
between points X(X1, . . . ,XD) and Y (Y1, . . . , YD) is given                            y = (vi < t)? 0: 1
by                                                                                         x = x XOR y
                                                                                    end for
                                                                                     bn = x
                                                                                 end for
    For the complex data, objects are better represented by a
set of feature vectors, each a point in some high dimensional              Analysis: We briefly explain the intuition behind the sketch
space with an associated weight. The general mathematical                construction procedure and refer the reader to [8] for
representation for a feature-rich data object is:                        technical details and proofs. Algorithm 1 shows the
          X = {< X1,ω(X1) > . . . ,< Xk,ω(Xk) >}                         initializing process, where N × K random (i, t) pairs are
Where Xi = (Xi1, . . . ,XiD), ω(Xi) is the weight of Xi, and k is        generated. Then, for every high dimensional feature vector,
variable. Since k may vary from object to object, this                   Algorithm 2 constructs N × K bits using the (i, t) pairs
representation is flexible and applicable to most feature-rich           generated by Algorithm 1. This procedure is designed such
data types.                                                              that the expected distance between any pair of such N ×K
The algorithm is proposed to find image or video object                  bits is proportional to the l 1 distance between the
distance and results will be returned accordingly.                       corresponding high dimensional feature vectors. Further,
The sketch construction unit constructs a bit vector (sketch)            every group of K bits are XORed to produce the final N-bit
for each high-dimensional feature vector, such that the l1               sketch. The Hamming distances between these final bit
distance of two high-dimensional feature vectors can be                  vectors are proportional to a transformed version of the l1
estimated by computing Hamming distance between                          distances between the feature vectors.
sketches, via XOR operations. To initialize the sketch
construction unit, one needs to specify:                                                     V.IMPLEMENTATION
          • N: sketch size in bits,
          • min[D]: min values of the D dimensions,                          The implementation of the algorithm is very prospective.
          • max[D]: max values of the D dimensions,                      The main issue is that one object may be matched with the
          • ω[D] (optional): the weight of each dimension,               number of different queries. It is very important to input the
          and                                                            data with proper attribute. One multimodal object could be
          • K (optional): threshold control whose default value          the result of multiple queries. The proposed algorithm works
is 1. When K is greater than 1, the sketch construction unit             as the block, which is sketched below (Figure: 2)
produces sketches approximating a transformed version of
the segment distance (akin to applying a threshold) to reduce
the effect of outliers.




© 2011 ACEEE                                                        47
DOI: 01.IJNS.02.02.258
ACEEE Int. J. on Network Security , Vol. 02, No. 02, Apr 2011

                                                                                   is twice as large. The ideal result is still 100% and
                                                                                   higher values mean better similarity search results.
                                                                        iii.     Average precision considers where data objects of
                                                                               a query similarity set appear in the search results.
                                                                               Consider a query q with an unordered gold standard
                                                                               set Q and k = |Q| “ 1. Let ranki be the rank of the i-th
                                                                               data object of Q in the ordering returned by the search
                                                                               operation. For evaluation purposes, we will assume
                                                                               that any data item not returned in the result set by the
                                                                               search procedure has a default rank equal to the size
                                                                               of the dataset. Then average precision is defined as
                Figure 2: Searching Process (Steps)
                                                                               follows:
    After receiving the input object segmentation and feature
extraction of multimodal data, input data object is passed to
a data specific segmentation and feature extraction unit,              All results reported in this paper are average numbers
which is provided by the programmer. This unit will segment            obtained by running experiments multiple times
the input data object and generate a feature vector for each
segment. Each data object is now represented by a set of
feature vectors which are then passed to the sketch
construction unit. The sketch construction component
converts each feature vector into a compact bit vector. The
sketches will then be passed to the database which is managed
by the metadata management component. When a query is
presented to the similarity search engine, the query data is
first passed to the same segmentation and feature extraction
unit. Similar to processing the input data, the unit will
segment the query data into segments and generate a set of
feature vectors. The feature vectors will be passed to the
sketch construction component to convert them into a set of
sketches for the filtering unit and similarity checking unit
                                                                                 For search quality and speed we do experiment with
and shows the result.                                                  the search-quality benchmark suite. For each benchmark
                                                                       dataset, we used the first data object in each “gold standard”
             VI.RESULT & CONCLUSIONS                                   similarity set as the query data object to obtain result. We
To obtain the search result from the content base                      also compared our results with the best known domain spe-
environment, we measure the three parameters:                          cific search tools. Table 1 reports our results. The results
 a.      Search speed: we use the average running time of              show that all three systems achieve good search quality for
                                                                       the benchmarks. For the image benchmark, our image search
         all the queries on our benchmark datasets.
                                                                       system achieves much better search quality (average preci-
 b.      Space requirement: we use different sketch sizes              sion of 0.59). For the audio benchmark, our system achieves
         and show the corresponding search quality and                 average precision 0.73. For the 3D shape models, our sys-
         search speed.                                                 tem achieves almost the same search quality numbers 0.33.
 c.      Similarity search quality: we use three commonly              Table 2 shows the results from the search-speed benchmark.
         used search-quality metrics: first-tier, second-tier
         and average precision:
     i. 1st tier is the percentage of data objects in the query
           similarity set that appear within the top k search
           results, where k depends on the size of the query
           similarity set Specifically, for a query similarity
           set Q, k = |Q|”1. The first-tier statistic indicates
           the recall for the smallest k that could include
           100% of the data objects in the query similarity
           set.
          nd
     ii. 2 tier is similar to the first tier except that k =2 x
           (|Q| “ 1). The second-tier is less stringent since k

© 2011 ACEEE                                                      48
DOI: 01.IJNS.02.02.258
ACEEE Int. J. on Network Security , Vol. 02, No. 02, Apr 2011

                                                                       content-based portal and coordinating for content
                                                                       organization, designing and developing content. And also
                                                                       we are supporting learner’s requirements over the portal. Our
                                                                       future research work will be to design a more effective and
                                                                       efficient methodology for content based E-Learning systems.

                                                                                               VI.REFERENCES
                                                                       [1] Victor Pankratius , Gottfried Vossen, “Towards E-Learning
                                                                       Grids: Using Grid Computing in Electronic Learning”, Pages 4-
    In this paper, we present the efficient searching algorithm        15,Oct 2003
                                                                       [2] M. Flickner et al., “Query By Image and video Content: the
from the content based environment. Using this, we have
                                                                       QBIC system”, IEEE Computer, September 1995, pages 23–32.
built E-Learning multimodal direct search systems for image,           [3] K. Otsuji and Y. Tonomura,” Projection-detecting filter for video
audio, and 3D shape model data. An external research group             cut detection”, Multimedia Systems, Vol. 1, 1994, pages 205–210.
has also used for genomic data analysis. Our experience has            [4] J. Fan, A. K. Elmagarmid, X. Zhu, W. G. Aref, and L. Wu.,”
shown that it is straightforward to use Content Based                  Classview: Hierarchical video shot classification, indexing, and
Retrieval method.                                                      accessing”, IEEE Transactions on
    In summary, there is a great need to extract semantic              Multimedia, vol. 6, 2004, pages 70–86.
indices for making the CBR system serviceable to the user.              [5] M. L. Cascia and E. Ardizzone, “JACOB: Just a content-based
Though extracting all such indices might not be possible,              query system for video databases”, In IEEE Int. Conf. on Acoustics,
                                                                       Speech and Signal Processing,
there is a great scope for furnishing the semantic indices
                                                                       May 1996, pages 1216–1219.
with a certain well-established structure. Fortunately, our            [6] Joël Fislera, Franziska Schneidera, “Creating, handling and
work shares many goals with several other active Web-related           implementing e-learning courses and content using the open source
research areas, enabling us to re-use possible standards,              tools olat and elml at the university of zurich “, aUniversity of
solutions and ideas from these areas. It gives our group, along        Zurich, IT Services, Winterthurerstr, 2008
with other similarly-motivated groups, a good chance of                [7] JohanW. H. Tangelder · Remco C. Veltkamp, “A survey of
succeeding in bringing this new generation of adaptive E-              content based 3D shape retrieval methods”, 2007
Learning systems and tools to the educational world. We                 [8] Q. Lv, M. Charikar, and K. Li. Image similarity search with
need more time to find out more optimum searching                      compact data structures. In Proc. of the 13th ACM Conf. on
methodology to search content. We are now working on a                 Information and Knowledge Management, pages 208–217,2004.




© 2011 ACEEE                                                      49
DOI: 01.IJNS.02.02.258

More Related Content

What's hot

Class Three
Class ThreeClass Three
Class Threemfazioli
 
Ontology-based Semantic Approach for Learning Object Recommendation
Ontology-based Semantic Approach for Learning Object RecommendationOntology-based Semantic Approach for Learning Object Recommendation
Ontology-based Semantic Approach for Learning Object RecommendationIDES Editor
 
665 Session1-intro-S13
665 Session1-intro-S13665 Session1-intro-S13
665 Session1-intro-S13Diane Nahl
 
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...IJERA Editor
 
Jarrar.lecture notes.ontologyintroduction
Jarrar.lecture notes.ontologyintroductionJarrar.lecture notes.ontologyintroduction
Jarrar.lecture notes.ontologyintroductionSinaInstitute
 
The technologies of ai used in different corporate world
The technologies of ai used in different  corporate worldThe technologies of ai used in different  corporate world
The technologies of ai used in different corporate worldEr. rahul abhishek
 
The concept and architecture of learning cell
The concept and architecture of learning cellThe concept and architecture of learning cell
The concept and architecture of learning cellWei Cheng
 
DESIGN AND IMPLEMENTATION OF A DIGITAL ARCHIVE OF LEARNING OBJECTS FOR REMOTE...
DESIGN AND IMPLEMENTATION OF A DIGITAL ARCHIVE OF LEARNING OBJECTS FOR REMOTE...DESIGN AND IMPLEMENTATION OF A DIGITAL ARCHIVE OF LEARNING OBJECTS FOR REMOTE...
DESIGN AND IMPLEMENTATION OF A DIGITAL ARCHIVE OF LEARNING OBJECTS FOR REMOTE...Khalid Md Saifuddin
 
Establishing a Common Ground for IA Practice and Education
Establishing a Common Ground for IA Practice and EducationEstablishing a Common Ground for IA Practice and Education
Establishing a Common Ground for IA Practice and EducationAndrea Resmini
 
Jurnal an implementable architecture of an e-learning system
Jurnal   an implementable architecture of an e-learning systemJurnal   an implementable architecture of an e-learning system
Jurnal an implementable architecture of an e-learning systemUniversitas Putera Batam
 
SCORM implementation in elearning course
SCORM implementation in elearning courseSCORM implementation in elearning course
SCORM implementation in elearning courseRajesh R. Nair
 
The Path and Thinking of Education Reform Driven by Blockchain Technology Lip...
The Path and Thinking of Education Reform Driven by Blockchain Technology Lip...The Path and Thinking of Education Reform Driven by Blockchain Technology Lip...
The Path and Thinking of Education Reform Driven by Blockchain Technology Lip...eraser Juan José Calderón
 
Text pre-processing of multilingual for sentiment analysis based on social ne...
Text pre-processing of multilingual for sentiment analysis based on social ne...Text pre-processing of multilingual for sentiment analysis based on social ne...
Text pre-processing of multilingual for sentiment analysis based on social ne...IJECEIAES
 
Learner Ontological Model for Intelligent Virtual Collaborative Learning Envi...
Learner Ontological Model for Intelligent Virtual Collaborative Learning Envi...Learner Ontological Model for Intelligent Virtual Collaborative Learning Envi...
Learner Ontological Model for Intelligent Virtual Collaborative Learning Envi...ijceronline
 
Collaborative Learning of Organisational Knolwedge
Collaborative Learning of Organisational KnolwedgeCollaborative Learning of Organisational Knolwedge
Collaborative Learning of Organisational KnolwedgeWaqas Tariq
 

What's hot (18)

Class Three
Class ThreeClass Three
Class Three
 
Ontology-based Semantic Approach for Learning Object Recommendation
Ontology-based Semantic Approach for Learning Object RecommendationOntology-based Semantic Approach for Learning Object Recommendation
Ontology-based Semantic Approach for Learning Object Recommendation
 
665 Session1-intro-S13
665 Session1-intro-S13665 Session1-intro-S13
665 Session1-intro-S13
 
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...
 
Jarrar.lecture notes.ontologyintroduction
Jarrar.lecture notes.ontologyintroductionJarrar.lecture notes.ontologyintroduction
Jarrar.lecture notes.ontologyintroduction
 
The technologies of ai used in different corporate world
The technologies of ai used in different  corporate worldThe technologies of ai used in different  corporate world
The technologies of ai used in different corporate world
 
Cv hasnain acad12
Cv hasnain acad12Cv hasnain acad12
Cv hasnain acad12
 
The concept and architecture of learning cell
The concept and architecture of learning cellThe concept and architecture of learning cell
The concept and architecture of learning cell
 
DESIGN AND IMPLEMENTATION OF A DIGITAL ARCHIVE OF LEARNING OBJECTS FOR REMOTE...
DESIGN AND IMPLEMENTATION OF A DIGITAL ARCHIVE OF LEARNING OBJECTS FOR REMOTE...DESIGN AND IMPLEMENTATION OF A DIGITAL ARCHIVE OF LEARNING OBJECTS FOR REMOTE...
DESIGN AND IMPLEMENTATION OF A DIGITAL ARCHIVE OF LEARNING OBJECTS FOR REMOTE...
 
Applying Semantic Web Technologies to Services of e-learning System
Applying Semantic Web Technologies to Services of e-learning SystemApplying Semantic Web Technologies to Services of e-learning System
Applying Semantic Web Technologies to Services of e-learning System
 
Establishing a Common Ground for IA Practice and Education
Establishing a Common Ground for IA Practice and EducationEstablishing a Common Ground for IA Practice and Education
Establishing a Common Ground for IA Practice and Education
 
Jurnal an implementable architecture of an e-learning system
Jurnal   an implementable architecture of an e-learning systemJurnal   an implementable architecture of an e-learning system
Jurnal an implementable architecture of an e-learning system
 
SCORM implementation in elearning course
SCORM implementation in elearning courseSCORM implementation in elearning course
SCORM implementation in elearning course
 
The Path and Thinking of Education Reform Driven by Blockchain Technology Lip...
The Path and Thinking of Education Reform Driven by Blockchain Technology Lip...The Path and Thinking of Education Reform Driven by Blockchain Technology Lip...
The Path and Thinking of Education Reform Driven by Blockchain Technology Lip...
 
Text pre-processing of multilingual for sentiment analysis based on social ne...
Text pre-processing of multilingual for sentiment analysis based on social ne...Text pre-processing of multilingual for sentiment analysis based on social ne...
Text pre-processing of multilingual for sentiment analysis based on social ne...
 
ICWL 2009
ICWL 2009ICWL 2009
ICWL 2009
 
Learner Ontological Model for Intelligent Virtual Collaborative Learning Envi...
Learner Ontological Model for Intelligent Virtual Collaborative Learning Envi...Learner Ontological Model for Intelligent Virtual Collaborative Learning Envi...
Learner Ontological Model for Intelligent Virtual Collaborative Learning Envi...
 
Collaborative Learning of Organisational Knolwedge
Collaborative Learning of Organisational KnolwedgeCollaborative Learning of Organisational Knolwedge
Collaborative Learning of Organisational Knolwedge
 

Viewers also liked

Pacify based video retrieval system
Pacify based video retrieval systemPacify based video retrieval system
Pacify based video retrieval systemeSAT Journals
 
Development of a new indexing technique for XML document retrieval
Development of a new indexing technique for XML document retrievalDevelopment of a new indexing technique for XML document retrieval
Development of a new indexing technique for XML document retrievalAmjad Ali
 
Elegant and Efficient Database Design
Elegant and Efficient Database DesignElegant and Efficient Database Design
Elegant and Efficient Database DesignBecky Sweger
 
Indexing Techniques: Their Usage in Search Engines for Information Retrieval
Indexing Techniques: Their Usage in Search Engines for Information RetrievalIndexing Techniques: Their Usage in Search Engines for Information Retrieval
Indexing Techniques: Their Usage in Search Engines for Information RetrievalVikas Bhushan
 
Database indexing techniques
Database indexing techniquesDatabase indexing techniques
Database indexing techniquesahmadmughal0312
 
Data indexing presentation
Data indexing presentationData indexing presentation
Data indexing presentationgmbmanikandan
 
Database management system presentation
Database management system presentationDatabase management system presentation
Database management system presentationsameerraaj
 

Viewers also liked (9)

Pacify based video retrieval system
Pacify based video retrieval systemPacify based video retrieval system
Pacify based video retrieval system
 
Development of a new indexing technique for XML document retrieval
Development of a new indexing technique for XML document retrievalDevelopment of a new indexing technique for XML document retrieval
Development of a new indexing technique for XML document retrieval
 
Elegant and Efficient Database Design
Elegant and Efficient Database DesignElegant and Efficient Database Design
Elegant and Efficient Database Design
 
Indexing
IndexingIndexing
Indexing
 
Indexing Techniques: Their Usage in Search Engines for Information Retrieval
Indexing Techniques: Their Usage in Search Engines for Information RetrievalIndexing Techniques: Their Usage in Search Engines for Information Retrieval
Indexing Techniques: Their Usage in Search Engines for Information Retrieval
 
Lucene basics
Lucene basicsLucene basics
Lucene basics
 
Database indexing techniques
Database indexing techniquesDatabase indexing techniques
Database indexing techniques
 
Data indexing presentation
Data indexing presentationData indexing presentation
Data indexing presentation
 
Database management system presentation
Database management system presentationDatabase management system presentation
Database management system presentation
 

Similar to Design and Implementation of Efficient Search Methodology for Content-Based Retrieval in ELearning Environment

Deep Learning: The Impact on Future eLearning
Deep Learning: The Impact on Future eLearningDeep Learning: The Impact on Future eLearning
Deep Learning: The Impact on Future eLearningIRJET Journal
 
Profile based Video segmentation system to support E-learning
Profile based Video segmentation system to support E-learningProfile based Video segmentation system to support E-learning
Profile based Video segmentation system to support E-learningGihan Wikramanayake
 
Big data integration for transition from e-learning to smart learning framework
Big data integration for transition from e-learning to smart learning framework Big data integration for transition from e-learning to smart learning framework
Big data integration for transition from e-learning to smart learning framework eraser Juan José Calderón
 
In tech application-of_data_mining_technology_on_e_learning_material_recommen...
In tech application-of_data_mining_technology_on_e_learning_material_recommen...In tech application-of_data_mining_technology_on_e_learning_material_recommen...
In tech application-of_data_mining_technology_on_e_learning_material_recommen...Enhmandah Hemeelee
 
An Improved Annotation Based Summary Generation For Unstructured Data
An Improved Annotation Based Summary Generation For Unstructured DataAn Improved Annotation Based Summary Generation For Unstructured Data
An Improved Annotation Based Summary Generation For Unstructured DataMelinda Watson
 
RECURRENT FEATURE GROUPING AND CLASSIFICATION MODEL FOR ACTION MODEL PREDICTI...
RECURRENT FEATURE GROUPING AND CLASSIFICATION MODEL FOR ACTION MODEL PREDICTI...RECURRENT FEATURE GROUPING AND CLASSIFICATION MODEL FOR ACTION MODEL PREDICTI...
RECURRENT FEATURE GROUPING AND CLASSIFICATION MODEL FOR ACTION MODEL PREDICTI...IJDKP
 
RECURRENT FEATURE GROUPING AND CLASSIFICATION MODEL FOR ACTION MODEL PREDICTI...
RECURRENT FEATURE GROUPING AND CLASSIFICATION MODEL FOR ACTION MODEL PREDICTI...RECURRENT FEATURE GROUPING AND CLASSIFICATION MODEL FOR ACTION MODEL PREDICTI...
RECURRENT FEATURE GROUPING AND CLASSIFICATION MODEL FOR ACTION MODEL PREDICTI...IJDKP
 
An efficient educational data mining approach to support e-learning
An efficient educational data mining approach to support e-learningAn efficient educational data mining approach to support e-learning
An efficient educational data mining approach to support e-learningVenu Madhav
 
IRJET- Proficient Recovery Over Records using Encryption in Cloud Computing
IRJET- Proficient Recovery Over Records using Encryption in Cloud ComputingIRJET- Proficient Recovery Over Records using Encryption in Cloud Computing
IRJET- Proficient Recovery Over Records using Encryption in Cloud ComputingIRJET Journal
 
Extraction and Retrieval of Web based Content in Web Engineering
Extraction and Retrieval of Web based Content in Web EngineeringExtraction and Retrieval of Web based Content in Web Engineering
Extraction and Retrieval of Web based Content in Web EngineeringIRJET Journal
 
Information Retrieval based on Cluster Analysis Approach
Information Retrieval based on Cluster Analysis ApproachInformation Retrieval based on Cluster Analysis Approach
Information Retrieval based on Cluster Analysis ApproachAIRCC Publishing Corporation
 
INFORMATION RETRIEVAL BASED ON CLUSTER ANALYSIS APPROACH
INFORMATION RETRIEVAL BASED ON CLUSTER ANALYSIS APPROACHINFORMATION RETRIEVAL BASED ON CLUSTER ANALYSIS APPROACH
INFORMATION RETRIEVAL BASED ON CLUSTER ANALYSIS APPROACHijcsit
 
Jurnal an implementable architecture of an e-learning system
Jurnal   an implementable architecture of an e-learning systemJurnal   an implementable architecture of an e-learning system
Jurnal an implementable architecture of an e-learning systemRatzman III
 
Jurnal an implementable architecture of an e-learning system
Jurnal   an implementable architecture of an e-learning systemJurnal   an implementable architecture of an e-learning system
Jurnal an implementable architecture of an e-learning systemRatzman III
 
HIGH-LEVEL SEMANTICS OF IMAGES IN WEB DOCUMENTS USING WEIGHTED TAGS AND STREN...
HIGH-LEVEL SEMANTICS OF IMAGES IN WEB DOCUMENTS USING WEIGHTED TAGS AND STREN...HIGH-LEVEL SEMANTICS OF IMAGES IN WEB DOCUMENTS USING WEIGHTED TAGS AND STREN...
HIGH-LEVEL SEMANTICS OF IMAGES IN WEB DOCUMENTS USING WEIGHTED TAGS AND STREN...IJCSEA Journal
 
Machine learning for text document classification-efficient classification ap...
Machine learning for text document classification-efficient classification ap...Machine learning for text document classification-efficient classification ap...
Machine learning for text document classification-efficient classification ap...IAESIJAI
 

Similar to Design and Implementation of Efficient Search Methodology for Content-Based Retrieval in ELearning Environment (20)

Deep Learning: The Impact on Future eLearning
Deep Learning: The Impact on Future eLearningDeep Learning: The Impact on Future eLearning
Deep Learning: The Impact on Future eLearning
 
Profile based Video segmentation system to support E-learning
Profile based Video segmentation system to support E-learningProfile based Video segmentation system to support E-learning
Profile based Video segmentation system to support E-learning
 
Big data integration for transition from e-learning to smart learning framework
Big data integration for transition from e-learning to smart learning framework Big data integration for transition from e-learning to smart learning framework
Big data integration for transition from e-learning to smart learning framework
 
In tech application-of_data_mining_technology_on_e_learning_material_recommen...
In tech application-of_data_mining_technology_on_e_learning_material_recommen...In tech application-of_data_mining_technology_on_e_learning_material_recommen...
In tech application-of_data_mining_technology_on_e_learning_material_recommen...
 
An Improved Annotation Based Summary Generation For Unstructured Data
An Improved Annotation Based Summary Generation For Unstructured DataAn Improved Annotation Based Summary Generation For Unstructured Data
An Improved Annotation Based Summary Generation For Unstructured Data
 
RECURRENT FEATURE GROUPING AND CLASSIFICATION MODEL FOR ACTION MODEL PREDICTI...
RECURRENT FEATURE GROUPING AND CLASSIFICATION MODEL FOR ACTION MODEL PREDICTI...RECURRENT FEATURE GROUPING AND CLASSIFICATION MODEL FOR ACTION MODEL PREDICTI...
RECURRENT FEATURE GROUPING AND CLASSIFICATION MODEL FOR ACTION MODEL PREDICTI...
 
RECURRENT FEATURE GROUPING AND CLASSIFICATION MODEL FOR ACTION MODEL PREDICTI...
RECURRENT FEATURE GROUPING AND CLASSIFICATION MODEL FOR ACTION MODEL PREDICTI...RECURRENT FEATURE GROUPING AND CLASSIFICATION MODEL FOR ACTION MODEL PREDICTI...
RECURRENT FEATURE GROUPING AND CLASSIFICATION MODEL FOR ACTION MODEL PREDICTI...
 
An efficient educational data mining approach to support e-learning
An efficient educational data mining approach to support e-learningAn efficient educational data mining approach to support e-learning
An efficient educational data mining approach to support e-learning
 
COMBI: A NEW COMBINATION OF WEB MINING TECHNIQUES FOR E- LEARNING PERSONALIZA...
COMBI: A NEW COMBINATION OF WEB MINING TECHNIQUES FOR E- LEARNING PERSONALIZA...COMBI: A NEW COMBINATION OF WEB MINING TECHNIQUES FOR E- LEARNING PERSONALIZA...
COMBI: A NEW COMBINATION OF WEB MINING TECHNIQUES FOR E- LEARNING PERSONALIZA...
 
IRJET- Proficient Recovery Over Records using Encryption in Cloud Computing
IRJET- Proficient Recovery Over Records using Encryption in Cloud ComputingIRJET- Proficient Recovery Over Records using Encryption in Cloud Computing
IRJET- Proficient Recovery Over Records using Encryption in Cloud Computing
 
Extraction and Retrieval of Web based Content in Web Engineering
Extraction and Retrieval of Web based Content in Web EngineeringExtraction and Retrieval of Web based Content in Web Engineering
Extraction and Retrieval of Web based Content in Web Engineering
 
E learning portal
E learning portalE learning portal
E learning portal
 
Information Retrieval based on Cluster Analysis Approach
Information Retrieval based on Cluster Analysis ApproachInformation Retrieval based on Cluster Analysis Approach
Information Retrieval based on Cluster Analysis Approach
 
INFORMATION RETRIEVAL BASED ON CLUSTER ANALYSIS APPROACH
INFORMATION RETRIEVAL BASED ON CLUSTER ANALYSIS APPROACHINFORMATION RETRIEVAL BASED ON CLUSTER ANALYSIS APPROACH
INFORMATION RETRIEVAL BASED ON CLUSTER ANALYSIS APPROACH
 
D04 06 2438
D04 06 2438D04 06 2438
D04 06 2438
 
International Journal of Engineering Inventions (IJEI),
International Journal of Engineering Inventions (IJEI), International Journal of Engineering Inventions (IJEI),
International Journal of Engineering Inventions (IJEI),
 
Jurnal an implementable architecture of an e-learning system
Jurnal   an implementable architecture of an e-learning systemJurnal   an implementable architecture of an e-learning system
Jurnal an implementable architecture of an e-learning system
 
Jurnal an implementable architecture of an e-learning system
Jurnal   an implementable architecture of an e-learning systemJurnal   an implementable architecture of an e-learning system
Jurnal an implementable architecture of an e-learning system
 
HIGH-LEVEL SEMANTICS OF IMAGES IN WEB DOCUMENTS USING WEIGHTED TAGS AND STREN...
HIGH-LEVEL SEMANTICS OF IMAGES IN WEB DOCUMENTS USING WEIGHTED TAGS AND STREN...HIGH-LEVEL SEMANTICS OF IMAGES IN WEB DOCUMENTS USING WEIGHTED TAGS AND STREN...
HIGH-LEVEL SEMANTICS OF IMAGES IN WEB DOCUMENTS USING WEIGHTED TAGS AND STREN...
 
Machine learning for text document classification-efficient classification ap...
Machine learning for text document classification-efficient classification ap...Machine learning for text document classification-efficient classification ap...
Machine learning for text document classification-efficient classification ap...
 

More from IDES Editor

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A ReviewIDES Editor
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...IDES Editor
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...IDES Editor
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCIDES Editor
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...IDES Editor
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingIDES Editor
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’sIDES Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance AnalysisIDES Editor
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesIDES Editor
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...IDES Editor
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...IDES Editor
 

More from IDES Editor (20)

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
 

Recently uploaded

SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 

Recently uploaded (20)

SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 

Design and Implementation of Efficient Search Methodology for Content-Based Retrieval in ELearning Environment

  • 1. ACEEE Int. J. on Network Security , Vol. 02, No. 02, Apr 2011 Design and Implementation of Efficient Search Methodology for Content-Based Retrieval in E- Learning Environment Arindam Ray, Amlan Chakrabarti Awadh Centre of Education Guru Gobind Singh Indraprastha University New Delhi, India arindamray_2007@yahoo.co.in A K Choudhury School of Information Technology University of Calcutta Kolkata, West Bengal, India acakcs@caluniv.ac.in Abstract - E-Learning portal is the full of content of different repository of digital image, video, and audio data. There is a formats like text, metadata, image, audio, and video. Current controlled vocabulary or thesaurus provided. Hybrid search search methodologies have a direct impact on the fundamental systems are also found among search engines; however, it is retrieval issues that information seekers encounter in their use the popularity of full text searching that has changed the of the vast number of search systems on the web today. Recently, road map to information access. However, searching for a information retrieval for text and multimedia content has multimedia content is not as easy because the multimedia become an important research area. Content-based retrieval data, as opposed to text, needs many stages of pre-processing in multimedia is a challenging problem since multimedia data needs detailed interpretation from pixel values. Based on to yield indices relevant for querying. Since an image or a several new technologies, such as ubiquitous computing, video sequence can be interpreted in numerous ways, there ontology engineering, semantic web and grid computing, it is is no commonly agreed-upon vocabulary. Thus, the strategy observed that for flexible educational platform architecture of manually assigning a set of labels to a multimedia data, for E-Learning that is OntoEdu is must. In this paper we offer storing it and matching the stored label with a query will not review report of E-Learning architecture and propose efficient be effective. As per the grid architecture [1], the large volume search algorithm to retrieve multimedia content from the E- of video data makes any assignment of text labels a massively Learning environment. The purpose of this technique is to labor intensive effort. In recent years, research has focused efficient and fast retrieval of data from content based on the use of internal features of images and videos computed environment. The results of these proposed searching techniques have been found satisfactorily. in an automated or semi-automated way [2]. Automated analysis calculates statistics, which can be approximately Keywords- Content based retrieval, Syntactic indexing, correlated to the content features. The common strategy for Semantic indexing, Perceptual features, Matching techniques automatic indexing had been based on using syntactic e-learning, Ontology, Grid Computing, Learning methods features alone. However, due to its complexity of operation, there is a paradigm shift in the research of identifying I.INTRODUCTION semantic features [4]. Web based courses are now developed and presented through so-called Learning Management Architecture on E-Learning Grid has been proposed by Systems such as Blackboard or WebCT (Web Course Tools). Victor Pankratius, Gottfried Vossen [1] in the year 2003. In Learning Management systems are powerful integrated that paper they proposed the basic architecture of Grid system that supports a number of activities performed by Computing (Fig 1). The grid computing paradigm essentially teachers and students during the E-Learning process. Our aggregates the view on existing hardware and software proposed searching algorithm is based on the proposed resources. The proposed architecture is the combination of architecture on E-Learning Grid [1]. This paper put forward Core Grid Middleware and Learning Management System the efficient searching mechanism to retrieve data from the which content two set of database one maintain in grid level content based portal. The organization of the paper is as operation and another one maintain the content retrieval. In follows: this paper our focus is to present efficient and fast search the The abstraction of the content organization and the need content as per the learner’s requirement. It can only be done of searching under e-learning environment have been if we can organize the content with appropriate architecture. explained in Section II. The basic architecture of e-learning We reviewed learning management system architecture and environment, grid computing, is explained in Section III. their file system. Content organization is one of the major The proposed algorithm and its explanation for image and concerns in E-Learning paradigm. E-Learning Portal has video search are presented in Section IV. The implementation resulted in a substantial progress in the multimedia and of the algorithm is explained in section V, Result and storage technology that has led to building of a large © 2011 ACEEE 45 DOI: 01.IJNS.02.02.258
  • 2. ACEEE Int. J. on Network Security , Vol. 02, No. 02, Apr 2011 conclusion is described in section VI and references in section going to search the object from their enrol content then before VII. searching it must check the authentication and then search II.ABSTRACTION OF THE CONTENT the content. The Core grid database will control the enter ORGANIZATION AND SEARCHING NEED scenario of the particular learner. It maintain number of database as per the level of security of the organization. This The technological landscape of modern E-Learning is called grid level activity. Another division of architecture environment is dominated by Learning Management System. is called Learning Management System (LMS). After Efficient and effective handling of text, audio and video overcoming the LMS the control comes to the search the documents depends on the availability of indexes. Manual desired data. First it checks the content type, and then it indexing is unfeasible for large video collections. Content proceeds to search. organization is also an important issue. In the existing Multimedia content can be modeled as a hierarchy of environment, Learning Management System, there is a lack abstractions. At the lowest level are the raw pixels with of proper searching of contents. The multimedia contents unprocessed and coarse information such as color or are stored along with the subsequent text information in the brightness. The intermediate level consists of objects and database. When learner searches the multimedia content then their attributes, while the human level concepts involving it searches that text from the database. In case of spontaneous the interpretation of the objects and perceptual emotion form uploading of multimedia content along with instant retrieval the highest level. Based on the above hierarchy, descriptive is not possible. It is not acceptable for content based retrieval. features in multimedia, furnished to the users of content- In this paper we proposed direct multimedia content based technology, can be categorized as either syntactic searching methodology from E-Learning environment. The features or semantic features [5]. A syntactic feature is a low- Grid architecture is used which is based on ontology level characteristic of an image or a video such as an object technology, Grid technology, Semantic Web technology. The boundary or color histogram. A semantic feature [3], which content based retrieval is categorized into basic three types is functionally at a higher level of hierarchy, represents an of multimedia content Audio, Video and Text. For each abstract feature. Whereas the label grass assigned to a region category same type of searching methodology is used. of an image or descriptor ‘empathy of apprehension’ for a video shot (a shot is a sequentially recorded set of frames III.BASIC ARCHITECTURE OF THE E-LEARNING representing a continuous action in time and space by a single ENVIRONMENT camera). At higher level of user interaction, the semantic The Architecture, we have observed that searching text, features are more useful as compared to the syntactic features audio and video from the learning environment with different [6]. courses is too complicated. We have found that learners when Figure1: Learning Management System (LMS) – Grid Model © 2011 ACEEE 46 DOI: 01.IJNS.02.02.258
  • 3. ACEEE Int. J. on Network Security , Vol. 02, No. 02, Apr 2011 IV.PROPOSED ALGORITHM Algorithm 1: Generate N × K Random (i, t) Pairs Input: N,K,D,min[D],max[D],w[D] As per the architecture of the grid architecture of E- Output: p[D], rnd_i[N][K], rnd_t[N][K] Learning, we propose the video searching algorithm based pi = wi × (maxi “ mini); for i = 0, . . . ,D “ 1 on Semantic and Syntactic Indexing technique. Semantic search seeks to improve search accuracy by understanding normalize pi s.t. learners intent and the contextual meaning of terms as they for (n = 0; n < N; n + +) do appear in the searchable dataarea, whether on the Web or for (k = 0; k < K; k + +) do within a closed system, to generate more relevant results. pick random number r € [0, 1) User’s query: A query specified by the user is translated directly into pruning operations on intrinsic parameters. In find i s.t. a query is specified by the colors, sizes and arbitrary spatial rnd_i[n][k] = i layouts of the color regions, which include both absolute pick random number t € [min i,maxi] and relative spatial locations. rnd_t[n][k] = t To find the region that best match: end for Q = { cq; (xq; yq); areaq; (wq; hq)} end for The query is processed by first computing the individual queries for color, location, size and spatial extent. Query Algorithm 2: Convert Feature Vector to N-Bit Vector object X, the goal is to find all objects Y in the collection Input: v[D],N,K, rnd_i[N][K], rnd_t[N][K] such that the distance d(X, Y) is within an allowed range. A Output: b[N] simple representation for objects with D numeric attributes for (n = 0; n < N; n + +) do is to represent them by points in D-dimensional space. One x=0 particular class of distance functions commonly used with for (k = 0; k < K; k + +) do such a representation are the lp norms, where the distance i = rnd_i[n][k]; t = rnd_t[n][k] between points X(X1, . . . ,XD) and Y (Y1, . . . , YD) is given y = (vi < t)? 0: 1 by x = x XOR y end for bn = x end for For the complex data, objects are better represented by a set of feature vectors, each a point in some high dimensional Analysis: We briefly explain the intuition behind the sketch space with an associated weight. The general mathematical construction procedure and refer the reader to [8] for representation for a feature-rich data object is: technical details and proofs. Algorithm 1 shows the X = {< X1,ω(X1) > . . . ,< Xk,ω(Xk) >} initializing process, where N × K random (i, t) pairs are Where Xi = (Xi1, . . . ,XiD), ω(Xi) is the weight of Xi, and k is generated. Then, for every high dimensional feature vector, variable. Since k may vary from object to object, this Algorithm 2 constructs N × K bits using the (i, t) pairs representation is flexible and applicable to most feature-rich generated by Algorithm 1. This procedure is designed such data types. that the expected distance between any pair of such N ×K The algorithm is proposed to find image or video object bits is proportional to the l 1 distance between the distance and results will be returned accordingly. corresponding high dimensional feature vectors. Further, The sketch construction unit constructs a bit vector (sketch) every group of K bits are XORed to produce the final N-bit for each high-dimensional feature vector, such that the l1 sketch. The Hamming distances between these final bit distance of two high-dimensional feature vectors can be vectors are proportional to a transformed version of the l1 estimated by computing Hamming distance between distances between the feature vectors. sketches, via XOR operations. To initialize the sketch construction unit, one needs to specify: V.IMPLEMENTATION • N: sketch size in bits, • min[D]: min values of the D dimensions, The implementation of the algorithm is very prospective. • max[D]: max values of the D dimensions, The main issue is that one object may be matched with the • ω[D] (optional): the weight of each dimension, number of different queries. It is very important to input the and data with proper attribute. One multimodal object could be • K (optional): threshold control whose default value the result of multiple queries. The proposed algorithm works is 1. When K is greater than 1, the sketch construction unit as the block, which is sketched below (Figure: 2) produces sketches approximating a transformed version of the segment distance (akin to applying a threshold) to reduce the effect of outliers. © 2011 ACEEE 47 DOI: 01.IJNS.02.02.258
  • 4. ACEEE Int. J. on Network Security , Vol. 02, No. 02, Apr 2011 is twice as large. The ideal result is still 100% and higher values mean better similarity search results. iii. Average precision considers where data objects of a query similarity set appear in the search results. Consider a query q with an unordered gold standard set Q and k = |Q| “ 1. Let ranki be the rank of the i-th data object of Q in the ordering returned by the search operation. For evaluation purposes, we will assume that any data item not returned in the result set by the search procedure has a default rank equal to the size of the dataset. Then average precision is defined as Figure 2: Searching Process (Steps) follows: After receiving the input object segmentation and feature extraction of multimodal data, input data object is passed to a data specific segmentation and feature extraction unit, All results reported in this paper are average numbers which is provided by the programmer. This unit will segment obtained by running experiments multiple times the input data object and generate a feature vector for each segment. Each data object is now represented by a set of feature vectors which are then passed to the sketch construction unit. The sketch construction component converts each feature vector into a compact bit vector. The sketches will then be passed to the database which is managed by the metadata management component. When a query is presented to the similarity search engine, the query data is first passed to the same segmentation and feature extraction unit. Similar to processing the input data, the unit will segment the query data into segments and generate a set of feature vectors. The feature vectors will be passed to the sketch construction component to convert them into a set of sketches for the filtering unit and similarity checking unit For search quality and speed we do experiment with and shows the result. the search-quality benchmark suite. For each benchmark dataset, we used the first data object in each “gold standard” VI.RESULT & CONCLUSIONS similarity set as the query data object to obtain result. We To obtain the search result from the content base also compared our results with the best known domain spe- environment, we measure the three parameters: cific search tools. Table 1 reports our results. The results a. Search speed: we use the average running time of show that all three systems achieve good search quality for the benchmarks. For the image benchmark, our image search all the queries on our benchmark datasets. system achieves much better search quality (average preci- b. Space requirement: we use different sketch sizes sion of 0.59). For the audio benchmark, our system achieves and show the corresponding search quality and average precision 0.73. For the 3D shape models, our sys- search speed. tem achieves almost the same search quality numbers 0.33. c. Similarity search quality: we use three commonly Table 2 shows the results from the search-speed benchmark. used search-quality metrics: first-tier, second-tier and average precision: i. 1st tier is the percentage of data objects in the query similarity set that appear within the top k search results, where k depends on the size of the query similarity set Specifically, for a query similarity set Q, k = |Q|”1. The first-tier statistic indicates the recall for the smallest k that could include 100% of the data objects in the query similarity set. nd ii. 2 tier is similar to the first tier except that k =2 x (|Q| “ 1). The second-tier is less stringent since k © 2011 ACEEE 48 DOI: 01.IJNS.02.02.258
  • 5. ACEEE Int. J. on Network Security , Vol. 02, No. 02, Apr 2011 content-based portal and coordinating for content organization, designing and developing content. And also we are supporting learner’s requirements over the portal. Our future research work will be to design a more effective and efficient methodology for content based E-Learning systems. VI.REFERENCES [1] Victor Pankratius , Gottfried Vossen, “Towards E-Learning Grids: Using Grid Computing in Electronic Learning”, Pages 4- In this paper, we present the efficient searching algorithm 15,Oct 2003 [2] M. Flickner et al., “Query By Image and video Content: the from the content based environment. Using this, we have QBIC system”, IEEE Computer, September 1995, pages 23–32. built E-Learning multimodal direct search systems for image, [3] K. Otsuji and Y. Tonomura,” Projection-detecting filter for video audio, and 3D shape model data. An external research group cut detection”, Multimedia Systems, Vol. 1, 1994, pages 205–210. has also used for genomic data analysis. Our experience has [4] J. Fan, A. K. Elmagarmid, X. Zhu, W. G. Aref, and L. Wu.,” shown that it is straightforward to use Content Based Classview: Hierarchical video shot classification, indexing, and Retrieval method. accessing”, IEEE Transactions on In summary, there is a great need to extract semantic Multimedia, vol. 6, 2004, pages 70–86. indices for making the CBR system serviceable to the user. [5] M. L. Cascia and E. Ardizzone, “JACOB: Just a content-based Though extracting all such indices might not be possible, query system for video databases”, In IEEE Int. Conf. on Acoustics, Speech and Signal Processing, there is a great scope for furnishing the semantic indices May 1996, pages 1216–1219. with a certain well-established structure. Fortunately, our [6] Joël Fislera, Franziska Schneidera, “Creating, handling and work shares many goals with several other active Web-related implementing e-learning courses and content using the open source research areas, enabling us to re-use possible standards, tools olat and elml at the university of zurich “, aUniversity of solutions and ideas from these areas. It gives our group, along Zurich, IT Services, Winterthurerstr, 2008 with other similarly-motivated groups, a good chance of [7] JohanW. H. Tangelder · Remco C. Veltkamp, “A survey of succeeding in bringing this new generation of adaptive E- content based 3D shape retrieval methods”, 2007 Learning systems and tools to the educational world. We [8] Q. Lv, M. Charikar, and K. Li. Image similarity search with need more time to find out more optimum searching compact data structures. In Proc. of the 13th ACM Conf. on methodology to search content. We are now working on a Information and Knowledge Management, pages 208–217,2004. © 2011 ACEEE 49 DOI: 01.IJNS.02.02.258