DETERMINING OPTIMIZED LEARNING PATH FOR AN ELEARNING SYSTEM USING ANT COLONY OPTIMIZATION ALGORITHM
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2015, Vol 6, Issue 2
Abstract
This paper analyzes the optimized learning path based on the behavior of student’s pattern by applying ant colony optimization algorithm in e-learning application. The behavior of pattern is analyzed based on the behavior of each particular students and the resource is analyzed through learning management system which can be used to predict the student’s motivation for the first time user. The student’s motivation is main factor for the successful completion of e-learning course. According to the knowledge of student’s motivation it provides the outcomes which to optimize the learning path.
Authors and Affiliations
Dr. N. Sivakumar , R. Praveena
Standalone Command Processor – Onchip Peripheral control and arbiteration
There are many soft-core processors or microcontroller available in contemporary technological world. Many of those when used for and on-chip peripheral control and arbitration are either tend to under use when used for...
A Novel Approach to Recognize the off-line Handwritten Numerals using MLP and SVM Classifiers
This paper presents a new approach to off-line handwritten numeral recognition. Recognition of handwritten numerals has been one of the most challenging task in pattern recognition. Recognition of handwritten numerals po...
Role of CMS Services in fulfilling the basic requirement of an ideal E-Learning website
During the past decades, researchers, schools, and governments around the world have supported enhancing student learning by using digital tools, i.e. the e-learning. E-learning is essentially the computer and network en...
A REVIEW PAPER ON SMS TEXT TO PLAIN ENGLISH TRANSLATION(Text Normalization)
Mobile technology as well as social networking technology plays an important role in communication across internet. A large amount of information is found in noisy contexts as texting and chat lingo have become increasin...
Secure Authentication Protocol to Detect Sybil Attacks in MANETs
Mobile ad-hoc networks (MANETs) are well known to be susceptible to various attacks, due to features such as lack of centralized control, dynamic topology, limited physical security and energy constrained operations. In...