Redirigiendo al acceso original de articulo en 18 segundos...
ARTÍCULO
TITULO

Features of using data mining methods in training information systems

Sergey Kozlov    

Resumen

The article discusses the application of data mining methods in the educational process. The possibilities of their implementation in the training process as functional tools of training information systems are analyzed. Features of their use to build optimal learning paths of students are considered. Galois's compliance methodology is proposed as a method of data mining in such systems. The author describes versions of its application in case of representation of the subject area in the form of a graph model G of educational material. On the examples of graph models, various possible situations are characterized. Case classification is based on the allocation of sets of non-learned knowledge elements associated with the vertices of graph G. Parameters of diameter d and number of vertices are selected as criteria of division into subsets. For each of the cases d = 0, d = 1 and d = 2 a meaningful interpretation is given. The case with n vertices of diameter d of more than two is also disassembled. Based on the identified situations, a rule is formulated for the subgraphs G1, G2, ..., Gn of the graph G according to unlearned knowledge elements for each student. This allowed to describe the algorithm of application of Galois correspondence as a method of data mining in training information systems. The author consistently gives a characteristic of each of the stages of the algorithm. Particular importance is attached to the formation of optimal training strategies in accordance with the identified cases of application of the Galois methodology for the graph model G of the material under study. The relevance of the article is related to the need to support the educational process with the help of training information systems.

 Artículos similares

       
 
Abdelghani Azri, Adil Haddi and Hakim Allali    
Collaborative filtering (CF), a fundamental technique in personalized Recommender Systems, operates by leveraging user?item preference interactions. Matrix factorization remains one of the most prevalent CF-based methods. However, recent advancements in ... ver más
Revista: Information

 
Yussuf Ahmed, Muhammad Ajmal Azad and Taufiq Asyhari    
In recent years, there has been a notable surge in both the complexity and volume of targeted cyber attacks, largely due to heightened vulnerabilities in widely adopted technologies. The Prediction and detection of early attacks are vital to mitigating p... ver más
Revista: Information

 
Monica Fira, Hariton-Nicolae Costin and Liviu Goras    
We analyzed the possibility of detecting and predicting ventricular fibrillation (VF), a medical emergency that may put people?s lives at risk, as the medical prognosis depends on the time in which medical personnel intervene. Therefore, besides immediat... ver más
Revista: Applied Sciences

 
Bahaa Yamany, Mahmoud Said Elsayed, Anca D. Jurcut, Nashwa Abdelbaki and Marianne A. Azer    
Ransomware is a type of malicious software that encrypts a victim?s files and demands payment in exchange for the decryption key. It is a rapidly growing and evolving threat that has caused significant damage and disruption to individuals and organizatio... ver más
Revista: Information

 
Falah Amer Abdulazeez, Ismail Taha Ahmed and Baraa Tareq Hammad    
A significant quantity of malware is created on purpose every day. Users of smartphones and computer networks now mostly worry about malware. These days, malware detection is a major concern in the cybersecurity area. Several factors can impact malware d... ver más
Revista: Applied Sciences