Redirigiendo al acceso original de articulo en 21 segundos...
ARTÍCULO
TITULO

Features of using data mining methods in training information systems

Sergey Kozlov    

Resumen

The article discusses the application of data mining methods in the educational process. The possibilities of their implementation in the training process as functional tools of training information systems are analyzed. Features of their use to build optimal learning paths of students are considered. Galois's compliance methodology is proposed as a method of data mining in such systems. The author describes versions of its application in case of representation of the subject area in the form of a graph model G of educational material. On the examples of graph models, various possible situations are characterized. Case classification is based on the allocation of sets of non-learned knowledge elements associated with the vertices of graph G. Parameters of diameter d and number of vertices are selected as criteria of division into subsets. For each of the cases d = 0, d = 1 and d = 2 a meaningful interpretation is given. The case with n vertices of diameter d of more than two is also disassembled. Based on the identified situations, a rule is formulated for the subgraphs G1, G2, ..., Gn of the graph G according to unlearned knowledge elements for each student. This allowed to describe the algorithm of application of Galois correspondence as a method of data mining in training information systems. The author consistently gives a characteristic of each of the stages of the algorithm. Particular importance is attached to the formation of optimal training strategies in accordance with the identified cases of application of the Galois methodology for the graph model G of the material under study. The relevance of the article is related to the need to support the educational process with the help of training information systems.

 Artículos similares

       
 
Falah Amer Abdulazeez, Ismail Taha Ahmed and Baraa Tareq Hammad    
A significant quantity of malware is created on purpose every day. Users of smartphones and computer networks now mostly worry about malware. These days, malware detection is a major concern in the cybersecurity area. Several factors can impact malware d... ver más
Revista: Applied Sciences

 
Bahaa Yamany, Mahmoud Said Elsayed, Anca D. Jurcut, Nashwa Abdelbaki and Marianne A. Azer    
Ransomware is a type of malicious software that encrypts a victim?s files and demands payment in exchange for the decryption key. It is a rapidly growing and evolving threat that has caused significant damage and disruption to individuals and organizatio... ver más
Revista: Information

 
Syed Safdar Hussain and Syed Sajjad Haider Zaidi    
This study introduces a novel predictive methodology for diagnosing and predicting gear problems in DC motors. Leveraging AdaBoost with weak classifiers and regressors, the diagnostic aspect categorizes the machine?s current operational state by analyzin... ver más
Revista: Applied Sciences

 
Lin Guo, Anand Balu Nellippallil, Warren F. Smith, Janet K. Allen and Farrokh Mistree    
When dealing with engineering design problems, designers often encounter nonlinear and nonconvex features, multiple objectives, coupled decision making, and various levels of fidelity of sub-systems. To realize the design with limited computational resou... ver más
Revista: Algorithms

 
Lin Yang, Yansong Wang, Lei Wei and Yao Chen    
The spaceborne solar observation system is crucial for the study of space phenomena such as solar flares, which requires high tracking accuracy. This study presents a coupling model that integrates mechanical, electrical, and control models to investigat... ver más
Revista: Aerospace