52,815 research outputs found

    A framework of integrated continuous online learner with fuzzy neural network application in learning environment

    Get PDF
    Online learning has become popular among university due to its flexibility and adaptability. This technology offers the capability of learning, anytime and anywhere, based on student preferences. However, the general method of Personal Identification Number (pin) to verify the user does not guarantee a person's identity, because other people can use it. Even occasional visitors and users tend to pass their tokens or share their passwords with their colleagues to make their work easier. In all scenarios, online assessments such as quiz, test and examination are conducted without face-to-face supervisions. This situation potentially leads the students to find help from their peers or other sources to get high scores. This research addressed the issue related to the online assessment. The main objective of this work was to propose the use of the Online Learner Verification Framework (OLVF). This proposed solution utilizes the keystroke analysis and activity-based authentication for the online learner authentication. Besides, a fuzzy neural network approach was used to train and validate the learners’ identity to predict their cheating tendency. In addition, challenge questions are also generated randomly by the system, based on user profiling. An online learning system was designed specifically in this study to simulate an original online learning assessment. It is expected to contribute to the field of security, where dynamic profile queries are asked, based on the previous history extracted from the online learning system. The proposed framework was validated using experimental datasets from an online learning system, elearning2u.com. The results obtained showed that, the proposed framework is able to overcome problems associated with the existing methods, thus improving the security level of the current online learning systems. Among others, appropriate questions and answers for the system-generated challenging questions are such that, invalid users will find them very difficult to guess. As a result, valid users too will find it difficult to provide their usernames and passwords to a third party or to ask others to answer online assessments for them. The results obtained proved this framework to be the safest method to be used, if implemented in the current online learning system

    Data mining based cyber-attack detection

    Get PDF

    Efficient intrusion detection scheme based on SVM

    Get PDF
    The network intrusion detection problem is the focus of current academic research. In this paper, we propose to use Support Vector Machine (SVM) model to identify and detect the network intrusion problem, and simultaneously introduce a new optimization search method, referred to as Improved Harmony Search (IHS) algorithm, to determine the parameters of the SVM model for better classification accuracy. Taking the general mechanism network system of a growing city in China between 2006 and 2012 as the sample, this study divides the mechanism into normal network system and crisis network system according to the harm extent of network intrusion. We consider a crisis network system coupled with two to three normal network systems as paired samples. Experimental results show that SVMs based on IHS have a high prediction accuracy which can perform prediction and classification of network intrusion detection and assist in guarding against network intrusion
    • …
    corecore