eLearning content authentication using bipartite matching

Dewan, Jahangir, Chowdhury, Morshed and Batten, Lynn 2013, eLearning content authentication using bipartite matching, in SNPD 2013 : Proceedings of the 14th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, IEEE Computer Society Conference Publishing Services (CPS), Piscataway, N. J., pp. 51-55.

Attached Files
Name Description MIMEType Size Downloads

Title eLearning content authentication using bipartite matching
Author(s) Dewan, Jahangir
Chowdhury, Morshed
Batten, Lynn
Conference name Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing. Conference (14th : 2013 : Honolulu, Hawaii)
Conference location Honolulu, Hawaii
Conference dates 1-3 Jul. 2013
Title of proceedings SNPD 2013 : Proceedings of the 14th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing
Editor(s) [Unknown]
Publication date 2013
Conference series Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing Conference
Start page 51
End page 55
Total pages 5
Publisher IEEE Computer Society Conference Publishing Services (CPS)
Place of publication Piscataway, N. J.
Keyword(s) bipartite matching
graph partitioning
graph clustering
elearning
DRM (Digital Right Management)
confidence interval
hypothesis test
Summary Content authenticity and correctness is one of the important challenges in eLearning as there can be many solutions for one specific problem in the cyber space. Therefore, we feel the necessity of mapping problem to solutions using graph partition and weighted bipartite matching. This paper presents a novel architecture and methodology for a personal eLearning system called PELS that is developed by us. We also present an efficient algorithm to partition question-answer (QA) space and explore best possible solution to a particular problem. Our approach can be efficiently applied to social eLearning space where there is one-to-many and many-to-many relationship with a level of bonding. The main advantage of our approach is that we use QA ranking by adjusted edge weights provided by subject matter experts (SME) or expert database. Finally, we use statistical methods called confidence interval and hypothesis test on the data to check the reliability and dependability of the quality of results.
ISBN 9780769550053
Language eng
Field of Research 080503 Networking and Communications
Socio Economic Objective 890404 Publishing and Print Services (incl. Internet Publishing)
HERDC Research category E1 Full written paper - refereed
Copyright notice ©2013, IEEE
Persistent URL http://hdl.handle.net/10536/DRO/DU:30054503

Document type: Conference Paper
Collection: School of Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Google Scholar Search Google Scholar
Access Statistics: 53 Abstract Views, 2 File Downloads  -  Detailed Statistics
Created: Mon, 22 Jul 2013, 11:31:17 EST by Sandra Dunoon

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.