SlideShare a Scribd company logo
Advanced Computational Intelligence: An International Journal (ACII), Vol.2, No.1, January 2015
1
LEARNING STRATEGY WITH GROUPS ON PAGE
BASED STUDENTS' PROFILES
San San Tint1
and Ei Ei Nyunt2
1
Department of Research and Development II, University of Computer Studies,
Mandalay, Myanmar
2
Master of Computer Science, University of computer Studies Mandalay, Myanmar
Abstract
Most of students desire to know about their knowledge level to perfect their exams. In learning environment
the fields of study overwhelm on page with collaboration or cooperation. Students can do their exercises
either individually or collaboratively with their peers. The system provides the guidelines for students'
learning system about interest fields as Java in this system. Especially the system feedbacks information
about exam to know their grades without teachers. The participants who answered the exam can discuss
with each others because of sharing e mail and list of them.
Keywords
Collaboration, Grade, Learning, Profiles, Feedback
1. INTRODUCTION
Thinking of participants is the first step of collaborative learning system. In this step the system
used the student attributes or properties from their profiles. The properties and the values of the
properties are specified by the system. The think step and pair step of the Think-Pair-Share (TPS)
Strategy are measured by the clustering method such as K-means method [1-5].
Data clustering is a data exploration technique that allows objects with similar characteristics to
be grouped together in order to facilitate their further processing. In the system clustering method
is used to produce the groups of student participants according to their properties as shown in
Table 1. The objects are the students and the initial number of cluster is specified with the random
number of students [4], [6].
Cluster analysis is a formal study of methods for understanding and algorithm for learning. K-
mean is the first choice for clustering with an initial number of clusters. K-mean algorithm is
most widely used algorithm in data mining applications. It is a simple, scalable, easily
understandable and can be adopted to deal with high dimensional data. A distance measuring
function is used to measure the similarity among objects, in such a way that more similar objects
have lower dissimilarity value. Several distance measures can be employed for clustering tasks.
The K-Mean algorithm finds partitions with distance measuring function in the cluster which is
minimized [7-9].
Advanced Computational Intelligence: An International Journal (ACII), Vol.2, No.1, January 2015
2
2. BACKGROUND THEORY
2.1. Think-Pair-Share (TPS) Strategy
Think-Pair-Share is a relatively low-risk and short collaborative learning technique, and is suited
for instructors and students who are new to collaborative learning.
Think-Pair-Share technique in education is also about:
Think about your answer individually.
Pair with a partner and see your answers.
Share you or your partner’s answer, when called upon.
The purposes of this technique are to process information, having a communication and develop
thinking among students. This strategy helps students become active participants in learning and
can include writing as a way of organizing thoughts generated from discussions [6].
2.2. Think-Pair-Share Technique Role
The teacher decides upon the text to be read and develops the set of questions or prompts that
target key content concepts. The teacher then describes the purpose of the strategy and provides
guidelines for discussions. As with all strategy instruction, teachers should model the procedure
to ensure that students understand how to use the strategy. Teachers should monitor and support
students as they work. In the system the Think-Pair-Share technique will be applied as following:
Thinking: each student thinking of his/her profile attributes and answering the given questions.
Pair: Pair the students’ grade and the K-means clustering result which is used students’ profile.
The students of grades (A-C) will be specified by using his/her exam result.
Share: Share the students’ list that contains not only Grade A and Grade B with their results but
also their email and original group number to communicate each other.
When the system basic level step is finished, both thinking and first part of pairing of the students
who get other Grade can retry the questions next time [3].
2.3. The Main properties of Objects (7 attributes)
The objects of the system are students’ data which are specified by the system. The main
attributes of student information are specified as objects’ properties to calculate the similarity
among objects. The attributes are specified by the collaborative learning system and are
calculated as k-means objects to determine the group of the participants. The attributes and values
of the clustering categories are specified as following Table 1. These all attributes are belonging
to the student objects which are specified by the students’ data of their profile. The system is
defined the students to fill their data which is belong to the following properties and values. The
students’ information and exam results are calculated to apply the TPS theories in this system.
Advanced Computational Intelligence: An International Journal (ACII), Vol.2, No.1, January 2015
3
Table .1 Attributes and Values for Student Objects
Attribute Name Value 1 Value 2 Value 3
Education Information Technology E.P Engineering Computer Technology
Occupation Student Graduate Post Graduate
Math Skill Normal Grade Distinction
Physic Skill Normal Grade Distinction
Programming
Skill
Learner Developer Expert
10th
standard
Passed Year
2006-2013(after) 1998-2005 1990-1997
Interest in
subject
OOP Networking Web Development
These attributes are specified for the calculation of clustering of the student objects’. There are
three or five clusters to group the students. The students’ attributes are calculated by the
Euclidean distance function to determine the groups of students [11].
2.4. Distance Measuring Function for K-Means Clustering
The system specifies the random objects or students by using Rnd function on attributes. And get
top three or five objects to specify the centroids of initial clusters. Then the system calculates the
members of clusters by using the Euclidean distance function which is shown as following:
(1)
The mean for a cluster is:
∑∈
=
ji Cx
i
j
j x
C
m
1
(2)
Where, ),...,,( 112111 nxxxX =
),...,,( 222212 nxxxX =
jC = number of data points in cluster jC
2.4.1. K-Means Clustering Algorithm for the System
Input:
Let k=5 is the number of clusters to partition.
D is a database containing n objects:(n is the number of students’ attributes from profile).
Output:
A set of k clusters: ( including class of attributes with their member’s objects.)
Method:
arbitrarily choose k objects from D as the initial cluster centers;
Let Ct =new centroids ( t=1,2,3,…,k)
Advanced Computational Intelligence: An International Journal (ACII), Vol.2, No.1, January 2015
4
xi=arbitrarily students’ attributes(i=1,2,3,…,k)
xj=all students’ attributes (j=1,2,3,…,n)
Dt =data set of distance values (t=1,2,3,…,k)
Initialize xi=1 , xj=1;
3) repeat j
repeat i
d(xi ,xj) = || xi – xj ||2
increase i
until i <= k
choose minimum distance value and assign to Dt.
increase t
increase j
until j <= n
Compare Dt with minimize pair value and reassign each object to the cluster to which the object
is the most similar based on the means value of the objects in the cluster (Ct, where t=1, 2,
3,…,k).Update the cluster means; i.e., calculate the mean value of the objects for each cluster
until no change.
2.4.2. Roles of Student Profiles
In the clustering method of the system, the role of students’ profiles is to calculate the groups of
students. The groups of students are specified by the clustering method. Then the students answer
the exam questions which are become the input of next step of the collaborative learning of the
system. The next step is the calculation of paring students according to the result of their exam
marks and their grades. The inputs of the first step are as shown in the following Table 2.
Table 2. Example profile table of the Students
Stude
nt
Obj
Education Occupation Math
Skill
Physic
Skill
Program
Skill
10th
Std
Passed
Year
Interested
in Subject
a1 1 2 1 2 2 2 3
a2 3 1 2 1 1 1 1
a3 2 1 2 2 1 1 1
a4 1 1 1 1 1 1 2
b1 1 3 2 1 2 2 3
b2 2 1 2 1 1 1 1
b3 3 2 2 1 3 2 3
c1 2 3 1 3 1 3 2
c2 1 1 3 1 2 1 2
c3 3 3 3 2 3 3 2
Education 1 = IT 2 = EP 3 = Computer
Occupation 1 = Student 2 = Graduate 3 = Post Graduate
Math Skill 1 = Normal 2 = Grade 3 = Distinction
Physic Skill 1 = Normal 2 = Grade 3 = Distinction
Program Skill 1 = Learner 2 = Developer 3 = Expert
10th
Standard Passed Year 1 = 2006-2013 2 = 1998-2005 3= 1990-1997
later
Interested in Subject 1 = OOP 2 = Networking 3=Web
Advanced Computational Intelligence: An International Journal (ACII), Vol.2, No.1, January 2015
5
In K-means method, the number of clusters must be specified as the initial clusters’ centroid.
Therefore the example objects are specified from the student profile table as the initial clusters’
centroid are as shown in the following Table 3. The initial cluster centroids are calculated with
other objects in the student profile table by substitution of the Euclidean distance function.
Table 3. Objects from the Profile as initial Cluster
Obj Education Occupation Math
Skill
Physic
Skill
Program
Skill
10th
Std
Passed
Year
Interested
in Subject
a1 1 2 1 2 2 2 3
b2 2 1 2 1 1 1 1
c3 3 3 3 2 3 3 2
Table 4. Centroids for Second Iteration
Student
Obj
Education Occupation Math
Skill
Physic
Skill
Program
Skill
10th
Std
Passed
Year
Interested
in Subject
a1 , b1, c1 1.3 2.7 1.3 2 1.7 2.3 2.7
a2 ,a3 ,a4
,b2 ,c2
1.8 1 2 1.2 1.2 1 1.4
b3 , c3 3 2.5 2.5 1.5 3 2.5 2.5
Step 6
The centroid from second iteration is no change. The k-means algorithm is terminated. The
cluster is illustrated with set graph as shown in fig.1.
Figure 1. Clusters of Students with similar properties
2.5. Distance Measuring for New Student
The distance Measure for new student is calculated with Table 5 cetroids which are derived from
k-mean distance measuring function. The derivation of new student’s group is as shown in the
following Table 6.
Advanced Computational Intelligence: An International Journal (ACII), Vol.2, No.1, January 2015
6
Table 5. New Student’s Profile
( ),111 dcbaDist = 3.967
( ),22432 dcbaaaDist = 1.5
),( 33 dcbDist = 3.354
Figure 2. Cluster for new Student with Similar Properties
2.6. Pair and Sharing of Participants
The pair and sharing of participants is the final step of the system. The system thinks the
participants’ or students’ skills both calculating the k-mean clustering method and examination
method. The system decides the pair of participants with the grade of advance level students’
marks. Then the system shares the similar upper levels of students’ skill. The students will answer
two steps of exam with their groups. The finally the students are shared among the upper two
levels of groups with their examination information.
Table 6. Student Grade Table
Class of Grade Marks
Grade A >=8
Grade B 7 4
Grade C < 4
In the sharing stage of students, the system gives the students’ information such as email
addresses each other. The students will go on sharing and learning the sense or assuming on the
relative subject with their mail addresses.
Advanced Computational Intelligence: An International Journal (ACII), Vol.2, No.1, January 2015
7
3. IMPLEMENTATION OF THE SYSTEM
The two main parts of the implementation system have explained as shown in the following
figures. The figures demonstrate the collaborative system how to cluster the profiles and hold the
examinations.
3.1. Main Page for Administrator
Figure 3. Main Page for Administrator
The Figure 3 is Main Page for Administrator page. In this page, there are two links such as
Administrator Login and About System. Moreover the introduction of collaborative system is
described on this page.
3.2. Admin Login Page
Figure 4. Admin Login Page
The Figure 4 is the Login Page for Administrator. In this page, the admin can enter into the
system by using his/her name and password. There are two links such as Home and About
System to join the home page and About System page.
Advanced Computational Intelligence: An International Journal (ACII), Vol.2, No.1, January 2015
8
3.3. Admin Role Page
Figure 5. Admin Role Page
The Admin Role Page, Figure 5 consists of seven links such as Arrange Exam Date, Arrange
Groups, Insert Questions, View Marks and View Students. Log Out! and Home links are used to
connect with Admin Login Page and Admin Home Page.
3.4. Arrange Exam Date
Figure 6. Arrange Exam Date with Exam ID
Figure 7. Error Page for Arrange Exam Date
Advanced Computational Intelligence: An International Journal (ACII), Vol.2, No.1, January 2015
9
Figure 8. The New Arrange Exam Date
Above Figure 6, 7, and 8 illustrate the specification of New Exam Date. According to Figure 6
the admin needs to type Exam ID and Exam ID fields. And then press Add Date button. In Figure
7 the system replies that the exam date is pass over or impossible date to specify for the
examination. In Figure 8 the Exam Date is successfully specified by the administrator and then
the system displays the new Exam Date with old list.
3.5. Arrange Groups
Figure 9. Arrange Group with Initial Group Numbers
Advanced Computational Intelligence: An International Journal (ACII), Vol.2, No.1, January 2015
10
Figure 10. Arrange Groups with Initial Cluster Number
Figure 11. Arrange Groups with Random Students’ profile
Figure 12. Arrange Groups with Students’ Profiles List
Advanced Computational Intelligence: An International Journal (ACII), Vol.2, No.1, January 2015
11
Figure 13. Error Page for Arrange Groups
From Figure 6 to 12 are shown the Arrange Groups. The system shows the arrange groups
numbers for initial clusters as shown in Figure 10. Figure 11 and 12 show the three random
students’ profiles to calculate the groups of students who are signed up the system. If the exam is
hold on today, then the administrator cannot specify the groups. Figure 12 shows the students’
profile records with their groups. The error message as in Figure 13 will be shown.
3.6. Insert Question Page
Figure 14. Question Entry Form
Advanced Computational Intelligence: An International Journal (ACII), Vol.2, No.1, January 2015
12
The admin can add question by using Question Entry Form as shown in Figure 14 and the
administrator fills this form and press Add button. Then the system saves the question to the
database.
3.7. View Marks Page
Figure 15. View the Student List With their exam Marks
Figure 16. Error Page for View Marks
The administrator can view the students list with their exam marks and groups as shown in the
Figure 15. When the students are grouped next time and the exam date has been specified or the
new examination is not hold yet, the error page for View Marks will be displayed as shown in
Figure 16.
Advanced Computational Intelligence: An International Journal (ACII), Vol.2, No.1, January 2015
13
3.8. Student Main Page
Figure 17. Student Main Page
Student Main Page as shown in Figure 17 represents the students or participant of the
Collaborative Learning System. The student can enter into the system by using the Student Login
link. About System link is used for the description bout the Collaborative Learning System.
3.9. Student Login Page
Figure 18. Student Login Page
Figure 18 shows the login page for student by using their names and passwords. If there is no
exam for the student today, the system shows Message as shown in Figure 19. Moreover, the
exam date is not specified, then the system will display the old shared groups’ list with student as
in Figure 20.
Advanced Computational Intelligence: An International Journal (ACII), Vol.2, No.1, January 2015
14
Figure 19. Error Page for Exam Date
Figure 20. Student Group List Page
But the system shows the past student grades with their groups list to the login student. If the
student has completed the past exam, and the grade is high then he/she can see the same students’
groups. If the student is new for this system, he/she must fill the form as shown in Figure 21. If
today is the exam date, the new student cannot enter the exam pages as in Figure 22.
Advanced Computational Intelligence: An International Journal (ACII), Vol.2, No.1, January 2015
15
Figure 21. Student Sign Up Page for New Student
Figure 22. Error Page for New Student’s Logo in
3.10. Grouping and Pairing Students
In this part the student can see the examination entrance page to participate the exam with their
groups. Figure 23 shows the entrance page for student to enter the examination. At first, the
student can answer basic level of exam and can send his/her answers by pressing the submit
button as in Figure 24. Then the system display basic level marks and grade of student as shown
in Figure 25. If the student's grade does not reached at specified level, the student must answers
the basic level again. If the students log out at the end of basic level, the system shows the basic
grade. When the student re-enters again to the system, the system shows the message as shown in
Figure 26. If the student's the grade reaches at specified level, the student can answer the advance
level as the next step. After finishing the exam, the student can see his/her grade with his/her
marks. If the student reached at the specified level, he/she can see the shared list with his/her
name as shown in Figure 28. But the student did not reach at specified level, his/her name does
not appear in upper list.
Advanced Computational Intelligence: An International Journal (ACII), Vol.2, No.1, January 2015
16
Figure 23. Entrance Page for Student Examination
Figure 24. Basic Level Examination Page
Figure 25. Basic Level of Student’s Marks, Grade and Group
Advanced Computational Intelligence: An International Journal (ACII), Vol.2, No.1, January 2015
17
Figure 26. Student who does not answer the Advance Level yet
Figure 27. Students’ Information with Advance Grades
Figure 28. Error Entrance of Student who answered all questions
Advanced Computational Intelligence: An International Journal (ACII), Vol.2, No.1, January 2015
18
Figure 29. Student Grade with Marks
In Figure 28, there is a Error Entrance of Student who answered all questions. If the student had
answered all questions and passed level, he/she can see the message as in Figure 28 when he/she
enters to the system again. In Figure 29, the student can see only the groups of students who get
the similar grade with him/her.
4. CONCLUSION
This system aims at the students in order to promote active learning in computer based learning
environment. A well-known collaborative learning technique, the “Think-Pair-Share” is applied
because it has simplicity and suitability to be implemented in a collaborative learning
environment. This system provides the benefits to specify the grades and group of the students by
using K-mean clustering algorithm and also improves the students' learning without difficulties to
find out their interest fields.
ACKNOWLEDGEMENTS
Our heartfelt thanks go to all people, who support us at the University of Computer Studies,
Mandalay, Myanmar. This paper is dedicated to our parents. Our special thanks go to all
respectable persons who support for valuable suggestion in this paper.
REFERENCES
[1] N. A. N. Azlina, "CETLs : Supporting Collaborative Activities Among Students and Teachers
Through the Use of Think-Pair-Share Techniques", IJCSI International Journal of Computer Science
Issues, Vol. 7, Issue 5, September 2010, ISSN (Online): 1694-0814, www. IJCSI. org.
[2] Grand Rapids Community College Center, "Ten Techniques For Energizing Your Classroom
Discussions for Teaching and Learning ", [On-line] http://web.grcc.cc.mi.us.
[3] Schreyer Institute for Teaching Excellence, Penn State, 301 Rider Building II, University Park, PA
16802, www.schreyerinstitute.psu.edu, 2007.
[4] SI Showcase, "The Basic Collaborative Learning Techniques", Supplemental Instruction Iowa State
University, 1060 Hixson-Lied Student Success Center, 294-6624, www.si.iastate.edu.
[5] E. Barkley, K. P. Cross and C. Major, "Collaboration learning techniques", San Francisco, CA:
Jossey-Bass, 2005.
Advanced Computational Intelligence: An International Journal (ACII), Vol.2, No.1, January 2015
19
[6] J. M. Tighe and F. T. Lyman, “Cueing Thinking in the Classroom: The Promise of Theory-
Embedded Tools”, Educational Leadership, 1988, Vol. 45, pp. 18-24.
[7] T. Yerigan, “Getting Active In The Classroom.”, Journal of College Teaching and Learning, Vol. 5,
Issue 6, 2008, pp. 19-24.
[8] C. Opitz, and W. L. Bowman, " ", Elementary School, Anchorage School District, 2008.
[9] P. Berkhin, Knoll and S. Jose, "Survey of Clustering Data Mining Techniques", Pavel Berkhin
Accrue Software, Inc.
[10] P. Vora and B. Oza, “A Survey on K-mean Clustering and Particle Swarm Optimization",
International Journal of Science and Modern Engineering (IJISME) ISSN: 2319-6386, Volume-1,
Issue-3, February, 2013.
[11] N. Kaur, J. K. Sahiwal and N. Kaur, “Efficient K-MEANS Clustering Algorithm using Ranking
Method in Data Mining”, ISSN: 2278 – 1323, International Journal of Advanced Research in Computer
Engineering & Technology, Volume 1, Issue 3, May 2012.
Authors
She is Associate Professor, Head of Department of Research and Development II in
University of Computer Studies, Mandalay, Myanmar. Her research areas include
Information Retrieval, Cryptography and Network Security, Web Mining and Networking.
She received her B.Sc. (Physics), M.Sc.(Physics) from Yangon University, Myanmar and
M.A.Sc.(Computer Engineering) and Ph.D.( Information Technology) from University of
Computer Studies, Yangon, Myanmar.Author studied computer science at the University of Computer
Studies, lasho, Myanmar where she received her B.C.Sc Degree in 2011. She received B.C.Sc(Hons:) in
computer science from the University of Computer Studies, Lasho, Myanmar in 2012. Since 2012, Author
has studied computer science at the University of Computer Studies, Mandalay, Myanmar where her
primary interests include web mining, graph clustering, grouping and web log analysis.

More Related Content

What's hot

Predicting the Presence of Learning Motivation in Electronic Learning: A New ...
Predicting the Presence of Learning Motivation in Electronic Learning: A New ...Predicting the Presence of Learning Motivation in Electronic Learning: A New ...
Predicting the Presence of Learning Motivation in Electronic Learning: A New ...
TELKOMNIKA JOURNAL
 
IRJET- Ordinal based Classification Techniques: A Survey
IRJET-  	  Ordinal based Classification Techniques: A SurveyIRJET-  	  Ordinal based Classification Techniques: A Survey
IRJET- Ordinal based Classification Techniques: A Survey
IRJET Journal
 
Tweets Classification using Naive Bayes and SVM
Tweets Classification using Naive Bayes and SVMTweets Classification using Naive Bayes and SVM
Tweets Classification using Naive Bayes and SVM
Trilok Sharma
 
27 11 sep17 29aug 8513 9956-1-ed (edit)
27 11 sep17 29aug 8513 9956-1-ed (edit)27 11 sep17 29aug 8513 9956-1-ed (edit)
27 11 sep17 29aug 8513 9956-1-ed (edit)
IAESIJEECS
 
Modeling Text Independent Speaker Identification with Vector Quantization
Modeling Text Independent Speaker Identification with Vector QuantizationModeling Text Independent Speaker Identification with Vector Quantization
Modeling Text Independent Speaker Identification with Vector Quantization
TELKOMNIKA JOURNAL
 
Chapter - 6 Data Mining Concepts and Techniques 2nd Ed slides Han &amp; Kamber
Chapter - 6 Data Mining Concepts and Techniques 2nd Ed slides Han &amp; KamberChapter - 6 Data Mining Concepts and Techniques 2nd Ed slides Han &amp; Kamber
Chapter - 6 Data Mining Concepts and Techniques 2nd Ed slides Han &amp; Kamber
error007
 
Tuition Reduction Determination Using Fuzzy Tsukamoto
Tuition Reduction Determination Using Fuzzy TsukamotoTuition Reduction Determination Using Fuzzy Tsukamoto
Tuition Reduction Determination Using Fuzzy Tsukamoto
Universitas Pembangunan Panca Budi
 
Research scholars evaluation based on guides view using id3
Research scholars evaluation based on guides view using id3Research scholars evaluation based on guides view using id3
Research scholars evaluation based on guides view using id3
eSAT Journals
 
Research scholars evaluation based on guides view
Research scholars evaluation based on guides viewResearch scholars evaluation based on guides view
Research scholars evaluation based on guides view
eSAT Publishing House
 
slides
slidesslides
slidesbutest
 
G045073740
G045073740G045073740
G045073740
IJERA Editor
 
supervised learning
supervised learningsupervised learning
supervised learning
Amar Tripathi
 
Data Mining
Data MiningData Mining
Data Mining
IIIT ALLAHABAD
 
Project prSentiment Analysis of Twitter Data Using Machine Learning Approach...
Project prSentiment Analysis  of Twitter Data Using Machine Learning Approach...Project prSentiment Analysis  of Twitter Data Using Machine Learning Approach...
Project prSentiment Analysis of Twitter Data Using Machine Learning Approach...
Geetika Gautam
 
Profile Analysis of Users in Data Analytics Domain
Profile Analysis of   Users in Data Analytics DomainProfile Analysis of   Users in Data Analytics Domain
Profile Analysis of Users in Data Analytics Domain
Drjabez
 

What's hot (16)

Predicting the Presence of Learning Motivation in Electronic Learning: A New ...
Predicting the Presence of Learning Motivation in Electronic Learning: A New ...Predicting the Presence of Learning Motivation in Electronic Learning: A New ...
Predicting the Presence of Learning Motivation in Electronic Learning: A New ...
 
IRJET- Ordinal based Classification Techniques: A Survey
IRJET-  	  Ordinal based Classification Techniques: A SurveyIRJET-  	  Ordinal based Classification Techniques: A Survey
IRJET- Ordinal based Classification Techniques: A Survey
 
Tweets Classification using Naive Bayes and SVM
Tweets Classification using Naive Bayes and SVMTweets Classification using Naive Bayes and SVM
Tweets Classification using Naive Bayes and SVM
 
27 11 sep17 29aug 8513 9956-1-ed (edit)
27 11 sep17 29aug 8513 9956-1-ed (edit)27 11 sep17 29aug 8513 9956-1-ed (edit)
27 11 sep17 29aug 8513 9956-1-ed (edit)
 
Modeling Text Independent Speaker Identification with Vector Quantization
Modeling Text Independent Speaker Identification with Vector QuantizationModeling Text Independent Speaker Identification with Vector Quantization
Modeling Text Independent Speaker Identification with Vector Quantization
 
Machine learning
Machine learningMachine learning
Machine learning
 
Chapter - 6 Data Mining Concepts and Techniques 2nd Ed slides Han &amp; Kamber
Chapter - 6 Data Mining Concepts and Techniques 2nd Ed slides Han &amp; KamberChapter - 6 Data Mining Concepts and Techniques 2nd Ed slides Han &amp; Kamber
Chapter - 6 Data Mining Concepts and Techniques 2nd Ed slides Han &amp; Kamber
 
Tuition Reduction Determination Using Fuzzy Tsukamoto
Tuition Reduction Determination Using Fuzzy TsukamotoTuition Reduction Determination Using Fuzzy Tsukamoto
Tuition Reduction Determination Using Fuzzy Tsukamoto
 
Research scholars evaluation based on guides view using id3
Research scholars evaluation based on guides view using id3Research scholars evaluation based on guides view using id3
Research scholars evaluation based on guides view using id3
 
Research scholars evaluation based on guides view
Research scholars evaluation based on guides viewResearch scholars evaluation based on guides view
Research scholars evaluation based on guides view
 
slides
slidesslides
slides
 
G045073740
G045073740G045073740
G045073740
 
supervised learning
supervised learningsupervised learning
supervised learning
 
Data Mining
Data MiningData Mining
Data Mining
 
Project prSentiment Analysis of Twitter Data Using Machine Learning Approach...
Project prSentiment Analysis  of Twitter Data Using Machine Learning Approach...Project prSentiment Analysis  of Twitter Data Using Machine Learning Approach...
Project prSentiment Analysis of Twitter Data Using Machine Learning Approach...
 
Profile Analysis of Users in Data Analytics Domain
Profile Analysis of   Users in Data Analytics DomainProfile Analysis of   Users in Data Analytics Domain
Profile Analysis of Users in Data Analytics Domain
 

Viewers also liked

Audio Signal Identification and Search Approach for Minimizing the Search Tim...
Audio Signal Identification and Search Approach for Minimizing the Search Tim...Audio Signal Identification and Search Approach for Minimizing the Search Tim...
Audio Signal Identification and Search Approach for Minimizing the Search Tim...
aciijournal
 
Web spam classification using supervised artificial neural network algorithms
Web spam classification using supervised artificial neural network algorithmsWeb spam classification using supervised artificial neural network algorithms
Web spam classification using supervised artificial neural network algorithms
aciijournal
 
LOCALIZATION OF OVERLAID TEXT BASED ON NOISE INCONSISTENCIES
LOCALIZATION OF OVERLAID TEXT BASED ON NOISE INCONSISTENCIESLOCALIZATION OF OVERLAID TEXT BASED ON NOISE INCONSISTENCIES
LOCALIZATION OF OVERLAID TEXT BASED ON NOISE INCONSISTENCIES
aciijournal
 
Erca energy efficient routing and reclustering
Erca energy efficient routing and reclusteringErca energy efficient routing and reclustering
Erca energy efficient routing and reclustering
aciijournal
 
Historia
HistoriaHistoria
Historia
marielitasssss
 
TRUST METRICS IN RECOMMENDER SYSTEMS: A SURVEY
TRUST METRICS IN RECOMMENDER SYSTEMS: A SURVEYTRUST METRICS IN RECOMMENDER SYSTEMS: A SURVEY
TRUST METRICS IN RECOMMENDER SYSTEMS: A SURVEY
aciijournal
 
A literature survey on recommendation
A literature survey on recommendationA literature survey on recommendation
A literature survey on recommendation
aciijournal
 
Automatic Unsupervised Data Classification Using Jaya Evolutionary Algorithm
Automatic Unsupervised Data Classification Using Jaya Evolutionary AlgorithmAutomatic Unsupervised Data Classification Using Jaya Evolutionary Algorithm
Automatic Unsupervised Data Classification Using Jaya Evolutionary Algorithm
aciijournal
 
Wall Wallpaper
Wall WallpaperWall Wallpaper
Wall Wallpaper
indoorwallpaper
 
New microsoft office power point presentation
New microsoft office power point presentationNew microsoft office power point presentation
New microsoft office power point presentationLiezel Taguiwalo
 
SURVEY SURFER: A WEB BASED DATA GATHERING AND ANALYSIS APPLICATION
SURVEY SURFER: A WEB BASED DATA GATHERING AND ANALYSIS APPLICATIONSURVEY SURFER: A WEB BASED DATA GATHERING AND ANALYSIS APPLICATION
SURVEY SURFER: A WEB BASED DATA GATHERING AND ANALYSIS APPLICATION
aciijournal
 
Text mining open source tokenization
Text mining open source tokenizationText mining open source tokenization
Text mining open source tokenization
aciijournal
 
DwightSite Presentation
DwightSite PresentationDwightSite Presentation
DwightSite Presentation
Liz Hammond
 
An Intelligent Method for Accelerating the Convergence of Different Versions ...
An Intelligent Method for Accelerating the Convergence of Different Versions ...An Intelligent Method for Accelerating the Convergence of Different Versions ...
An Intelligent Method for Accelerating the Convergence of Different Versions ...
aciijournal
 
Blood groups matcher frame work based on three level rules in myanmar
Blood groups matcher frame work based on three  level rules in myanmarBlood groups matcher frame work based on three  level rules in myanmar
Blood groups matcher frame work based on three level rules in myanmar
aciijournal
 
HYBRID DATA CLUSTERING APPROACH USING K-MEANS AND FLOWER POLLINATION ALGORITHM
HYBRID DATA CLUSTERING APPROACH USING K-MEANS AND FLOWER POLLINATION ALGORITHMHYBRID DATA CLUSTERING APPROACH USING K-MEANS AND FLOWER POLLINATION ALGORITHM
HYBRID DATA CLUSTERING APPROACH USING K-MEANS AND FLOWER POLLINATION ALGORITHM
aciijournal
 
Prediction of lung cancer using image
Prediction of lung cancer using imagePrediction of lung cancer using image
Prediction of lung cancer using image
aciijournal
 

Viewers also liked (17)

Audio Signal Identification and Search Approach for Minimizing the Search Tim...
Audio Signal Identification and Search Approach for Minimizing the Search Tim...Audio Signal Identification and Search Approach for Minimizing the Search Tim...
Audio Signal Identification and Search Approach for Minimizing the Search Tim...
 
Web spam classification using supervised artificial neural network algorithms
Web spam classification using supervised artificial neural network algorithmsWeb spam classification using supervised artificial neural network algorithms
Web spam classification using supervised artificial neural network algorithms
 
LOCALIZATION OF OVERLAID TEXT BASED ON NOISE INCONSISTENCIES
LOCALIZATION OF OVERLAID TEXT BASED ON NOISE INCONSISTENCIESLOCALIZATION OF OVERLAID TEXT BASED ON NOISE INCONSISTENCIES
LOCALIZATION OF OVERLAID TEXT BASED ON NOISE INCONSISTENCIES
 
Erca energy efficient routing and reclustering
Erca energy efficient routing and reclusteringErca energy efficient routing and reclustering
Erca energy efficient routing and reclustering
 
Historia
HistoriaHistoria
Historia
 
TRUST METRICS IN RECOMMENDER SYSTEMS: A SURVEY
TRUST METRICS IN RECOMMENDER SYSTEMS: A SURVEYTRUST METRICS IN RECOMMENDER SYSTEMS: A SURVEY
TRUST METRICS IN RECOMMENDER SYSTEMS: A SURVEY
 
A literature survey on recommendation
A literature survey on recommendationA literature survey on recommendation
A literature survey on recommendation
 
Automatic Unsupervised Data Classification Using Jaya Evolutionary Algorithm
Automatic Unsupervised Data Classification Using Jaya Evolutionary AlgorithmAutomatic Unsupervised Data Classification Using Jaya Evolutionary Algorithm
Automatic Unsupervised Data Classification Using Jaya Evolutionary Algorithm
 
Wall Wallpaper
Wall WallpaperWall Wallpaper
Wall Wallpaper
 
New microsoft office power point presentation
New microsoft office power point presentationNew microsoft office power point presentation
New microsoft office power point presentation
 
SURVEY SURFER: A WEB BASED DATA GATHERING AND ANALYSIS APPLICATION
SURVEY SURFER: A WEB BASED DATA GATHERING AND ANALYSIS APPLICATIONSURVEY SURFER: A WEB BASED DATA GATHERING AND ANALYSIS APPLICATION
SURVEY SURFER: A WEB BASED DATA GATHERING AND ANALYSIS APPLICATION
 
Text mining open source tokenization
Text mining open source tokenizationText mining open source tokenization
Text mining open source tokenization
 
DwightSite Presentation
DwightSite PresentationDwightSite Presentation
DwightSite Presentation
 
An Intelligent Method for Accelerating the Convergence of Different Versions ...
An Intelligent Method for Accelerating the Convergence of Different Versions ...An Intelligent Method for Accelerating the Convergence of Different Versions ...
An Intelligent Method for Accelerating the Convergence of Different Versions ...
 
Blood groups matcher frame work based on three level rules in myanmar
Blood groups matcher frame work based on three  level rules in myanmarBlood groups matcher frame work based on three  level rules in myanmar
Blood groups matcher frame work based on three level rules in myanmar
 
HYBRID DATA CLUSTERING APPROACH USING K-MEANS AND FLOWER POLLINATION ALGORITHM
HYBRID DATA CLUSTERING APPROACH USING K-MEANS AND FLOWER POLLINATION ALGORITHMHYBRID DATA CLUSTERING APPROACH USING K-MEANS AND FLOWER POLLINATION ALGORITHM
HYBRID DATA CLUSTERING APPROACH USING K-MEANS AND FLOWER POLLINATION ALGORITHM
 
Prediction of lung cancer using image
Prediction of lung cancer using imagePrediction of lung cancer using image
Prediction of lung cancer using image
 

Similar to Learning strategy with groups on page based students' profiles

Data Clustering in Education for Students
Data Clustering in Education for StudentsData Clustering in Education for Students
Data Clustering in Education for Students
IRJET Journal
 
Predicting Students Performance using K-Median Clustering
Predicting Students Performance using  K-Median ClusteringPredicting Students Performance using  K-Median Clustering
Predicting Students Performance using K-Median Clustering
IIRindia
 
A Model for Predicting Students’ Academic Performance using a Hybrid of K-mea...
A Model for Predicting Students’ Academic Performance using a Hybrid of K-mea...A Model for Predicting Students’ Academic Performance using a Hybrid of K-mea...
A Model for Predicting Students’ Academic Performance using a Hybrid of K-mea...
Editor IJCATR
 
A Model for Predicting Students’ Academic Performance using a Hybrid of K-mea...
A Model for Predicting Students’ Academic Performance using a Hybrid of K-mea...A Model for Predicting Students’ Academic Performance using a Hybrid of K-mea...
A Model for Predicting Students’ Academic Performance using a Hybrid of K-mea...
Editor IJCATR
 
Study of Clustering of Data Base in Education Sector Using Data Mining
Study of Clustering of Data Base in Education Sector Using Data MiningStudy of Clustering of Data Base in Education Sector Using Data Mining
Study of Clustering of Data Base in Education Sector Using Data Mining
IJSRD
 
Study of Clustering of Data Base in Education Sector Using Data Mining
Study of Clustering of Data Base in Education Sector Using Data MiningStudy of Clustering of Data Base in Education Sector Using Data Mining
Study of Clustering of Data Base in Education Sector Using Data Mining
IJSRD
 
Study of Clustering of Data Base in Education Sector Using Data Mining
Study of Clustering of Data Base in Education Sector Using Data MiningStudy of Clustering of Data Base in Education Sector Using Data Mining
Study of Clustering of Data Base in Education Sector Using Data Mining
IJSRD
 
Predicting students' performance using id3 and c4.5 classification algorithms
Predicting students' performance using id3 and c4.5 classification algorithmsPredicting students' performance using id3 and c4.5 classification algorithms
Predicting students' performance using id3 and c4.5 classification algorithms
IJDKP
 
K0176495101
K0176495101K0176495101
K0176495101
IOSR Journals
 
A Study on Learning Factor Analysis – An Educational Data Mining Technique fo...
A Study on Learning Factor Analysis – An Educational Data Mining Technique fo...A Study on Learning Factor Analysis – An Educational Data Mining Technique fo...
A Study on Learning Factor Analysis – An Educational Data Mining Technique fo...
iosrjce
 
Automated Question Paper Generator And Answer Checker Using Information Retri...
Automated Question Paper Generator And Answer Checker Using Information Retri...Automated Question Paper Generator And Answer Checker Using Information Retri...
Automated Question Paper Generator And Answer Checker Using Information Retri...
Sheila Sinclair
 
Perfomance Comparison of Decsion Tree Algorithms to Findout the Reason for St...
Perfomance Comparison of Decsion Tree Algorithms to Findout the Reason for St...Perfomance Comparison of Decsion Tree Algorithms to Findout the Reason for St...
Perfomance Comparison of Decsion Tree Algorithms to Findout the Reason for St...
ijcnes
 
Empirical Study on Classification Algorithm For Evaluation of Students Academ...
Empirical Study on Classification Algorithm For Evaluation of Students Academ...Empirical Study on Classification Algorithm For Evaluation of Students Academ...
Empirical Study on Classification Algorithm For Evaluation of Students Academ...
iosrjce
 
K017626773
K017626773K017626773
K017626773
IOSR Journals
 
IRJET- Personalized E-Learning using Learner’s Capability Score (LCS)
IRJET- Personalized E-Learning using Learner’s Capability Score (LCS)IRJET- Personalized E-Learning using Learner’s Capability Score (LCS)
IRJET- Personalized E-Learning using Learner’s Capability Score (LCS)
IRJET Journal
 
IRJET- Personalized E-Learning using Learner’s Capability Score (LCS)
IRJET- Personalized E-Learning using Learner’s Capability Score (LCS)IRJET- Personalized E-Learning using Learner’s Capability Score (LCS)
IRJET- Personalized E-Learning using Learner’s Capability Score (LCS)
IRJET Journal
 
Student Selection Based On Academic Achievement System using k-mean Algorithm
Student Selection Based On Academic Achievement System using k-mean AlgorithmStudent Selection Based On Academic Achievement System using k-mean Algorithm
Student Selection Based On Academic Achievement System using k-mean Algorithm
Nik Ridhuan
 
[IJET-V2I1P2] Authors: S. Lakshmi Prabha1, A.R.Mohamed Shanavas
[IJET-V2I1P2] Authors: S. Lakshmi Prabha1, A.R.Mohamed Shanavas[IJET-V2I1P2] Authors: S. Lakshmi Prabha1, A.R.Mohamed Shanavas
[IJET-V2I1P2] Authors: S. Lakshmi Prabha1, A.R.Mohamed Shanavas
IJET - International Journal of Engineering and Techniques
 

Similar to Learning strategy with groups on page based students' profiles (20)

Data Clustering in Education for Students
Data Clustering in Education for StudentsData Clustering in Education for Students
Data Clustering in Education for Students
 
Cs268
Cs268Cs268
Cs268
 
Predicting Students Performance using K-Median Clustering
Predicting Students Performance using  K-Median ClusteringPredicting Students Performance using  K-Median Clustering
Predicting Students Performance using K-Median Clustering
 
A Model for Predicting Students’ Academic Performance using a Hybrid of K-mea...
A Model for Predicting Students’ Academic Performance using a Hybrid of K-mea...A Model for Predicting Students’ Academic Performance using a Hybrid of K-mea...
A Model for Predicting Students’ Academic Performance using a Hybrid of K-mea...
 
A Model for Predicting Students’ Academic Performance using a Hybrid of K-mea...
A Model for Predicting Students’ Academic Performance using a Hybrid of K-mea...A Model for Predicting Students’ Academic Performance using a Hybrid of K-mea...
A Model for Predicting Students’ Academic Performance using a Hybrid of K-mea...
 
Study of Clustering of Data Base in Education Sector Using Data Mining
Study of Clustering of Data Base in Education Sector Using Data MiningStudy of Clustering of Data Base in Education Sector Using Data Mining
Study of Clustering of Data Base in Education Sector Using Data Mining
 
Study of Clustering of Data Base in Education Sector Using Data Mining
Study of Clustering of Data Base in Education Sector Using Data MiningStudy of Clustering of Data Base in Education Sector Using Data Mining
Study of Clustering of Data Base in Education Sector Using Data Mining
 
Study of Clustering of Data Base in Education Sector Using Data Mining
Study of Clustering of Data Base in Education Sector Using Data MiningStudy of Clustering of Data Base in Education Sector Using Data Mining
Study of Clustering of Data Base in Education Sector Using Data Mining
 
Predicting students' performance using id3 and c4.5 classification algorithms
Predicting students' performance using id3 and c4.5 classification algorithmsPredicting students' performance using id3 and c4.5 classification algorithms
Predicting students' performance using id3 and c4.5 classification algorithms
 
K0176495101
K0176495101K0176495101
K0176495101
 
A Study on Learning Factor Analysis – An Educational Data Mining Technique fo...
A Study on Learning Factor Analysis – An Educational Data Mining Technique fo...A Study on Learning Factor Analysis – An Educational Data Mining Technique fo...
A Study on Learning Factor Analysis – An Educational Data Mining Technique fo...
 
L016136369
L016136369L016136369
L016136369
 
Automated Question Paper Generator And Answer Checker Using Information Retri...
Automated Question Paper Generator And Answer Checker Using Information Retri...Automated Question Paper Generator And Answer Checker Using Information Retri...
Automated Question Paper Generator And Answer Checker Using Information Retri...
 
Perfomance Comparison of Decsion Tree Algorithms to Findout the Reason for St...
Perfomance Comparison of Decsion Tree Algorithms to Findout the Reason for St...Perfomance Comparison of Decsion Tree Algorithms to Findout the Reason for St...
Perfomance Comparison of Decsion Tree Algorithms to Findout the Reason for St...
 
Empirical Study on Classification Algorithm For Evaluation of Students Academ...
Empirical Study on Classification Algorithm For Evaluation of Students Academ...Empirical Study on Classification Algorithm For Evaluation of Students Academ...
Empirical Study on Classification Algorithm For Evaluation of Students Academ...
 
K017626773
K017626773K017626773
K017626773
 
IRJET- Personalized E-Learning using Learner’s Capability Score (LCS)
IRJET- Personalized E-Learning using Learner’s Capability Score (LCS)IRJET- Personalized E-Learning using Learner’s Capability Score (LCS)
IRJET- Personalized E-Learning using Learner’s Capability Score (LCS)
 
IRJET- Personalized E-Learning using Learner’s Capability Score (LCS)
IRJET- Personalized E-Learning using Learner’s Capability Score (LCS)IRJET- Personalized E-Learning using Learner’s Capability Score (LCS)
IRJET- Personalized E-Learning using Learner’s Capability Score (LCS)
 
Student Selection Based On Academic Achievement System using k-mean Algorithm
Student Selection Based On Academic Achievement System using k-mean AlgorithmStudent Selection Based On Academic Achievement System using k-mean Algorithm
Student Selection Based On Academic Achievement System using k-mean Algorithm
 
[IJET-V2I1P2] Authors: S. Lakshmi Prabha1, A.R.Mohamed Shanavas
[IJET-V2I1P2] Authors: S. Lakshmi Prabha1, A.R.Mohamed Shanavas[IJET-V2I1P2] Authors: S. Lakshmi Prabha1, A.R.Mohamed Shanavas
[IJET-V2I1P2] Authors: S. Lakshmi Prabha1, A.R.Mohamed Shanavas
 

Recently uploaded

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 

Learning strategy with groups on page based students' profiles

  • 1. Advanced Computational Intelligence: An International Journal (ACII), Vol.2, No.1, January 2015 1 LEARNING STRATEGY WITH GROUPS ON PAGE BASED STUDENTS' PROFILES San San Tint1 and Ei Ei Nyunt2 1 Department of Research and Development II, University of Computer Studies, Mandalay, Myanmar 2 Master of Computer Science, University of computer Studies Mandalay, Myanmar Abstract Most of students desire to know about their knowledge level to perfect their exams. In learning environment the fields of study overwhelm on page with collaboration or cooperation. Students can do their exercises either individually or collaboratively with their peers. The system provides the guidelines for students' learning system about interest fields as Java in this system. Especially the system feedbacks information about exam to know their grades without teachers. The participants who answered the exam can discuss with each others because of sharing e mail and list of them. Keywords Collaboration, Grade, Learning, Profiles, Feedback 1. INTRODUCTION Thinking of participants is the first step of collaborative learning system. In this step the system used the student attributes or properties from their profiles. The properties and the values of the properties are specified by the system. The think step and pair step of the Think-Pair-Share (TPS) Strategy are measured by the clustering method such as K-means method [1-5]. Data clustering is a data exploration technique that allows objects with similar characteristics to be grouped together in order to facilitate their further processing. In the system clustering method is used to produce the groups of student participants according to their properties as shown in Table 1. The objects are the students and the initial number of cluster is specified with the random number of students [4], [6]. Cluster analysis is a formal study of methods for understanding and algorithm for learning. K- mean is the first choice for clustering with an initial number of clusters. K-mean algorithm is most widely used algorithm in data mining applications. It is a simple, scalable, easily understandable and can be adopted to deal with high dimensional data. A distance measuring function is used to measure the similarity among objects, in such a way that more similar objects have lower dissimilarity value. Several distance measures can be employed for clustering tasks. The K-Mean algorithm finds partitions with distance measuring function in the cluster which is minimized [7-9].
  • 2. Advanced Computational Intelligence: An International Journal (ACII), Vol.2, No.1, January 2015 2 2. BACKGROUND THEORY 2.1. Think-Pair-Share (TPS) Strategy Think-Pair-Share is a relatively low-risk and short collaborative learning technique, and is suited for instructors and students who are new to collaborative learning. Think-Pair-Share technique in education is also about: Think about your answer individually. Pair with a partner and see your answers. Share you or your partner’s answer, when called upon. The purposes of this technique are to process information, having a communication and develop thinking among students. This strategy helps students become active participants in learning and can include writing as a way of organizing thoughts generated from discussions [6]. 2.2. Think-Pair-Share Technique Role The teacher decides upon the text to be read and develops the set of questions or prompts that target key content concepts. The teacher then describes the purpose of the strategy and provides guidelines for discussions. As with all strategy instruction, teachers should model the procedure to ensure that students understand how to use the strategy. Teachers should monitor and support students as they work. In the system the Think-Pair-Share technique will be applied as following: Thinking: each student thinking of his/her profile attributes and answering the given questions. Pair: Pair the students’ grade and the K-means clustering result which is used students’ profile. The students of grades (A-C) will be specified by using his/her exam result. Share: Share the students’ list that contains not only Grade A and Grade B with their results but also their email and original group number to communicate each other. When the system basic level step is finished, both thinking and first part of pairing of the students who get other Grade can retry the questions next time [3]. 2.3. The Main properties of Objects (7 attributes) The objects of the system are students’ data which are specified by the system. The main attributes of student information are specified as objects’ properties to calculate the similarity among objects. The attributes are specified by the collaborative learning system and are calculated as k-means objects to determine the group of the participants. The attributes and values of the clustering categories are specified as following Table 1. These all attributes are belonging to the student objects which are specified by the students’ data of their profile. The system is defined the students to fill their data which is belong to the following properties and values. The students’ information and exam results are calculated to apply the TPS theories in this system.
  • 3. Advanced Computational Intelligence: An International Journal (ACII), Vol.2, No.1, January 2015 3 Table .1 Attributes and Values for Student Objects Attribute Name Value 1 Value 2 Value 3 Education Information Technology E.P Engineering Computer Technology Occupation Student Graduate Post Graduate Math Skill Normal Grade Distinction Physic Skill Normal Grade Distinction Programming Skill Learner Developer Expert 10th standard Passed Year 2006-2013(after) 1998-2005 1990-1997 Interest in subject OOP Networking Web Development These attributes are specified for the calculation of clustering of the student objects’. There are three or five clusters to group the students. The students’ attributes are calculated by the Euclidean distance function to determine the groups of students [11]. 2.4. Distance Measuring Function for K-Means Clustering The system specifies the random objects or students by using Rnd function on attributes. And get top three or five objects to specify the centroids of initial clusters. Then the system calculates the members of clusters by using the Euclidean distance function which is shown as following: (1) The mean for a cluster is: ∑∈ = ji Cx i j j x C m 1 (2) Where, ),...,,( 112111 nxxxX = ),...,,( 222212 nxxxX = jC = number of data points in cluster jC 2.4.1. K-Means Clustering Algorithm for the System Input: Let k=5 is the number of clusters to partition. D is a database containing n objects:(n is the number of students’ attributes from profile). Output: A set of k clusters: ( including class of attributes with their member’s objects.) Method: arbitrarily choose k objects from D as the initial cluster centers; Let Ct =new centroids ( t=1,2,3,…,k)
  • 4. Advanced Computational Intelligence: An International Journal (ACII), Vol.2, No.1, January 2015 4 xi=arbitrarily students’ attributes(i=1,2,3,…,k) xj=all students’ attributes (j=1,2,3,…,n) Dt =data set of distance values (t=1,2,3,…,k) Initialize xi=1 , xj=1; 3) repeat j repeat i d(xi ,xj) = || xi – xj ||2 increase i until i <= k choose minimum distance value and assign to Dt. increase t increase j until j <= n Compare Dt with minimize pair value and reassign each object to the cluster to which the object is the most similar based on the means value of the objects in the cluster (Ct, where t=1, 2, 3,…,k).Update the cluster means; i.e., calculate the mean value of the objects for each cluster until no change. 2.4.2. Roles of Student Profiles In the clustering method of the system, the role of students’ profiles is to calculate the groups of students. The groups of students are specified by the clustering method. Then the students answer the exam questions which are become the input of next step of the collaborative learning of the system. The next step is the calculation of paring students according to the result of their exam marks and their grades. The inputs of the first step are as shown in the following Table 2. Table 2. Example profile table of the Students Stude nt Obj Education Occupation Math Skill Physic Skill Program Skill 10th Std Passed Year Interested in Subject a1 1 2 1 2 2 2 3 a2 3 1 2 1 1 1 1 a3 2 1 2 2 1 1 1 a4 1 1 1 1 1 1 2 b1 1 3 2 1 2 2 3 b2 2 1 2 1 1 1 1 b3 3 2 2 1 3 2 3 c1 2 3 1 3 1 3 2 c2 1 1 3 1 2 1 2 c3 3 3 3 2 3 3 2 Education 1 = IT 2 = EP 3 = Computer Occupation 1 = Student 2 = Graduate 3 = Post Graduate Math Skill 1 = Normal 2 = Grade 3 = Distinction Physic Skill 1 = Normal 2 = Grade 3 = Distinction Program Skill 1 = Learner 2 = Developer 3 = Expert 10th Standard Passed Year 1 = 2006-2013 2 = 1998-2005 3= 1990-1997 later Interested in Subject 1 = OOP 2 = Networking 3=Web
  • 5. Advanced Computational Intelligence: An International Journal (ACII), Vol.2, No.1, January 2015 5 In K-means method, the number of clusters must be specified as the initial clusters’ centroid. Therefore the example objects are specified from the student profile table as the initial clusters’ centroid are as shown in the following Table 3. The initial cluster centroids are calculated with other objects in the student profile table by substitution of the Euclidean distance function. Table 3. Objects from the Profile as initial Cluster Obj Education Occupation Math Skill Physic Skill Program Skill 10th Std Passed Year Interested in Subject a1 1 2 1 2 2 2 3 b2 2 1 2 1 1 1 1 c3 3 3 3 2 3 3 2 Table 4. Centroids for Second Iteration Student Obj Education Occupation Math Skill Physic Skill Program Skill 10th Std Passed Year Interested in Subject a1 , b1, c1 1.3 2.7 1.3 2 1.7 2.3 2.7 a2 ,a3 ,a4 ,b2 ,c2 1.8 1 2 1.2 1.2 1 1.4 b3 , c3 3 2.5 2.5 1.5 3 2.5 2.5 Step 6 The centroid from second iteration is no change. The k-means algorithm is terminated. The cluster is illustrated with set graph as shown in fig.1. Figure 1. Clusters of Students with similar properties 2.5. Distance Measuring for New Student The distance Measure for new student is calculated with Table 5 cetroids which are derived from k-mean distance measuring function. The derivation of new student’s group is as shown in the following Table 6.
  • 6. Advanced Computational Intelligence: An International Journal (ACII), Vol.2, No.1, January 2015 6 Table 5. New Student’s Profile ( ),111 dcbaDist = 3.967 ( ),22432 dcbaaaDist = 1.5 ),( 33 dcbDist = 3.354 Figure 2. Cluster for new Student with Similar Properties 2.6. Pair and Sharing of Participants The pair and sharing of participants is the final step of the system. The system thinks the participants’ or students’ skills both calculating the k-mean clustering method and examination method. The system decides the pair of participants with the grade of advance level students’ marks. Then the system shares the similar upper levels of students’ skill. The students will answer two steps of exam with their groups. The finally the students are shared among the upper two levels of groups with their examination information. Table 6. Student Grade Table Class of Grade Marks Grade A >=8 Grade B 7 4 Grade C < 4 In the sharing stage of students, the system gives the students’ information such as email addresses each other. The students will go on sharing and learning the sense or assuming on the relative subject with their mail addresses.
  • 7. Advanced Computational Intelligence: An International Journal (ACII), Vol.2, No.1, January 2015 7 3. IMPLEMENTATION OF THE SYSTEM The two main parts of the implementation system have explained as shown in the following figures. The figures demonstrate the collaborative system how to cluster the profiles and hold the examinations. 3.1. Main Page for Administrator Figure 3. Main Page for Administrator The Figure 3 is Main Page for Administrator page. In this page, there are two links such as Administrator Login and About System. Moreover the introduction of collaborative system is described on this page. 3.2. Admin Login Page Figure 4. Admin Login Page The Figure 4 is the Login Page for Administrator. In this page, the admin can enter into the system by using his/her name and password. There are two links such as Home and About System to join the home page and About System page.
  • 8. Advanced Computational Intelligence: An International Journal (ACII), Vol.2, No.1, January 2015 8 3.3. Admin Role Page Figure 5. Admin Role Page The Admin Role Page, Figure 5 consists of seven links such as Arrange Exam Date, Arrange Groups, Insert Questions, View Marks and View Students. Log Out! and Home links are used to connect with Admin Login Page and Admin Home Page. 3.4. Arrange Exam Date Figure 6. Arrange Exam Date with Exam ID Figure 7. Error Page for Arrange Exam Date
  • 9. Advanced Computational Intelligence: An International Journal (ACII), Vol.2, No.1, January 2015 9 Figure 8. The New Arrange Exam Date Above Figure 6, 7, and 8 illustrate the specification of New Exam Date. According to Figure 6 the admin needs to type Exam ID and Exam ID fields. And then press Add Date button. In Figure 7 the system replies that the exam date is pass over or impossible date to specify for the examination. In Figure 8 the Exam Date is successfully specified by the administrator and then the system displays the new Exam Date with old list. 3.5. Arrange Groups Figure 9. Arrange Group with Initial Group Numbers
  • 10. Advanced Computational Intelligence: An International Journal (ACII), Vol.2, No.1, January 2015 10 Figure 10. Arrange Groups with Initial Cluster Number Figure 11. Arrange Groups with Random Students’ profile Figure 12. Arrange Groups with Students’ Profiles List
  • 11. Advanced Computational Intelligence: An International Journal (ACII), Vol.2, No.1, January 2015 11 Figure 13. Error Page for Arrange Groups From Figure 6 to 12 are shown the Arrange Groups. The system shows the arrange groups numbers for initial clusters as shown in Figure 10. Figure 11 and 12 show the three random students’ profiles to calculate the groups of students who are signed up the system. If the exam is hold on today, then the administrator cannot specify the groups. Figure 12 shows the students’ profile records with their groups. The error message as in Figure 13 will be shown. 3.6. Insert Question Page Figure 14. Question Entry Form
  • 12. Advanced Computational Intelligence: An International Journal (ACII), Vol.2, No.1, January 2015 12 The admin can add question by using Question Entry Form as shown in Figure 14 and the administrator fills this form and press Add button. Then the system saves the question to the database. 3.7. View Marks Page Figure 15. View the Student List With their exam Marks Figure 16. Error Page for View Marks The administrator can view the students list with their exam marks and groups as shown in the Figure 15. When the students are grouped next time and the exam date has been specified or the new examination is not hold yet, the error page for View Marks will be displayed as shown in Figure 16.
  • 13. Advanced Computational Intelligence: An International Journal (ACII), Vol.2, No.1, January 2015 13 3.8. Student Main Page Figure 17. Student Main Page Student Main Page as shown in Figure 17 represents the students or participant of the Collaborative Learning System. The student can enter into the system by using the Student Login link. About System link is used for the description bout the Collaborative Learning System. 3.9. Student Login Page Figure 18. Student Login Page Figure 18 shows the login page for student by using their names and passwords. If there is no exam for the student today, the system shows Message as shown in Figure 19. Moreover, the exam date is not specified, then the system will display the old shared groups’ list with student as in Figure 20.
  • 14. Advanced Computational Intelligence: An International Journal (ACII), Vol.2, No.1, January 2015 14 Figure 19. Error Page for Exam Date Figure 20. Student Group List Page But the system shows the past student grades with their groups list to the login student. If the student has completed the past exam, and the grade is high then he/she can see the same students’ groups. If the student is new for this system, he/she must fill the form as shown in Figure 21. If today is the exam date, the new student cannot enter the exam pages as in Figure 22.
  • 15. Advanced Computational Intelligence: An International Journal (ACII), Vol.2, No.1, January 2015 15 Figure 21. Student Sign Up Page for New Student Figure 22. Error Page for New Student’s Logo in 3.10. Grouping and Pairing Students In this part the student can see the examination entrance page to participate the exam with their groups. Figure 23 shows the entrance page for student to enter the examination. At first, the student can answer basic level of exam and can send his/her answers by pressing the submit button as in Figure 24. Then the system display basic level marks and grade of student as shown in Figure 25. If the student's grade does not reached at specified level, the student must answers the basic level again. If the students log out at the end of basic level, the system shows the basic grade. When the student re-enters again to the system, the system shows the message as shown in Figure 26. If the student's the grade reaches at specified level, the student can answer the advance level as the next step. After finishing the exam, the student can see his/her grade with his/her marks. If the student reached at the specified level, he/she can see the shared list with his/her name as shown in Figure 28. But the student did not reach at specified level, his/her name does not appear in upper list.
  • 16. Advanced Computational Intelligence: An International Journal (ACII), Vol.2, No.1, January 2015 16 Figure 23. Entrance Page for Student Examination Figure 24. Basic Level Examination Page Figure 25. Basic Level of Student’s Marks, Grade and Group
  • 17. Advanced Computational Intelligence: An International Journal (ACII), Vol.2, No.1, January 2015 17 Figure 26. Student who does not answer the Advance Level yet Figure 27. Students’ Information with Advance Grades Figure 28. Error Entrance of Student who answered all questions
  • 18. Advanced Computational Intelligence: An International Journal (ACII), Vol.2, No.1, January 2015 18 Figure 29. Student Grade with Marks In Figure 28, there is a Error Entrance of Student who answered all questions. If the student had answered all questions and passed level, he/she can see the message as in Figure 28 when he/she enters to the system again. In Figure 29, the student can see only the groups of students who get the similar grade with him/her. 4. CONCLUSION This system aims at the students in order to promote active learning in computer based learning environment. A well-known collaborative learning technique, the “Think-Pair-Share” is applied because it has simplicity and suitability to be implemented in a collaborative learning environment. This system provides the benefits to specify the grades and group of the students by using K-mean clustering algorithm and also improves the students' learning without difficulties to find out their interest fields. ACKNOWLEDGEMENTS Our heartfelt thanks go to all people, who support us at the University of Computer Studies, Mandalay, Myanmar. This paper is dedicated to our parents. Our special thanks go to all respectable persons who support for valuable suggestion in this paper. REFERENCES [1] N. A. N. Azlina, "CETLs : Supporting Collaborative Activities Among Students and Teachers Through the Use of Think-Pair-Share Techniques", IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 5, September 2010, ISSN (Online): 1694-0814, www. IJCSI. org. [2] Grand Rapids Community College Center, "Ten Techniques For Energizing Your Classroom Discussions for Teaching and Learning ", [On-line] http://web.grcc.cc.mi.us. [3] Schreyer Institute for Teaching Excellence, Penn State, 301 Rider Building II, University Park, PA 16802, www.schreyerinstitute.psu.edu, 2007. [4] SI Showcase, "The Basic Collaborative Learning Techniques", Supplemental Instruction Iowa State University, 1060 Hixson-Lied Student Success Center, 294-6624, www.si.iastate.edu. [5] E. Barkley, K. P. Cross and C. Major, "Collaboration learning techniques", San Francisco, CA: Jossey-Bass, 2005.
  • 19. Advanced Computational Intelligence: An International Journal (ACII), Vol.2, No.1, January 2015 19 [6] J. M. Tighe and F. T. Lyman, “Cueing Thinking in the Classroom: The Promise of Theory- Embedded Tools”, Educational Leadership, 1988, Vol. 45, pp. 18-24. [7] T. Yerigan, “Getting Active In The Classroom.”, Journal of College Teaching and Learning, Vol. 5, Issue 6, 2008, pp. 19-24. [8] C. Opitz, and W. L. Bowman, " ", Elementary School, Anchorage School District, 2008. [9] P. Berkhin, Knoll and S. Jose, "Survey of Clustering Data Mining Techniques", Pavel Berkhin Accrue Software, Inc. [10] P. Vora and B. Oza, “A Survey on K-mean Clustering and Particle Swarm Optimization", International Journal of Science and Modern Engineering (IJISME) ISSN: 2319-6386, Volume-1, Issue-3, February, 2013. [11] N. Kaur, J. K. Sahiwal and N. Kaur, “Efficient K-MEANS Clustering Algorithm using Ranking Method in Data Mining”, ISSN: 2278 – 1323, International Journal of Advanced Research in Computer Engineering & Technology, Volume 1, Issue 3, May 2012. Authors She is Associate Professor, Head of Department of Research and Development II in University of Computer Studies, Mandalay, Myanmar. Her research areas include Information Retrieval, Cryptography and Network Security, Web Mining and Networking. She received her B.Sc. (Physics), M.Sc.(Physics) from Yangon University, Myanmar and M.A.Sc.(Computer Engineering) and Ph.D.( Information Technology) from University of Computer Studies, Yangon, Myanmar.Author studied computer science at the University of Computer Studies, lasho, Myanmar where she received her B.C.Sc Degree in 2011. She received B.C.Sc(Hons:) in computer science from the University of Computer Studies, Lasho, Myanmar in 2012. Since 2012, Author has studied computer science at the University of Computer Studies, Mandalay, Myanmar where her primary interests include web mining, graph clustering, grouping and web log analysis.