4 research outputs found

    An Enhanced Learning Technology System Architecture for Web-Based Instructional Design

    No full text
    Instructional design (ID) models are proven prescriptive techniques for qualitative lessons that could guarantee learning. Existing Learning Management Systems (LMS) miss-out the roles of this important quality control mechanism by providing a mere plane and passive platform for content authoring, thus becomes vulnerable for poor instructional design. This paper demonstrates an effort to ameliorate this limitation by extending the IEEE Learning Technology System Architecture (LTSA) with ID design processes. The Use Case diagram, Activities diagram and Entity Relation diagram for the extended LTSA are presented. The extended architecture was implemented on Moodle open sourced LMS which was extended and hosted live. Students’ impressions on the functionalities and operational effects of the platform were collated using online survey. The academic effects of the platform on the students’ performance were determined using the class mean. The value obtained was compared with that of the control group in the same session and those from the previous sessions. Consequently, this work demonstrates the feasibility of integrating ID models in E-learning. It also justifies its effects on the quality of learning

    Empirical Analysis of Data Streaming and Batch Learning Models for Network Intrusion Detection

    No full text
    Network intrusion, such as denial of service, probing attacks, and phishing, comprises some of the complex threats that have put the online community at risk. The increase in the number of these attacks has given rise to a serious interest in the research community to curb the menace. One of the research efforts is to have an intrusion detection mechanism in place. Batch learning and data streaming are approaches used for processing the huge amount of data required for proper intrusion detection. Batch learning, despite its advantages, has been faulted for poor scalability due to the constant re-training of new training instances. Hence, this paper seeks to conduct a comparative study using selected batch learning and data streaming algorithms. The batch learning and data streaming algorithms considered are J48, projective adaptive resonance theory (PART), Hoeffding tree (HT) and OzaBagAdwin (OBA). Furthermore, binary and multiclass classification problems are considered for the tested algorithms. Experimental results show that data streaming algorithms achieved considerably higher performance in binary classification problems when compared with batch learning algorithms. Specifically, binary classification produced J48 (94.73), PART (92.83), HT (98.38), and OBA (99.67), and multiclass classification produced J48 (87.66), PART (87.05), HT (71.98), OBA (82.80) based on accuracy. Hence, the use of data streaming algorithms to solve the scalability issue and allow real-time detection of network intrusion is highly recommended

    Empirical Analysis of Data Streaming and Batch Learning Models for Network Intrusion Detection

    No full text
    Network intrusion, such as denial of service, probing attacks, and phishing, comprises some of the complex threats that have put the online community at risk. The increase in the number of these attacks has given rise to a serious interest in the research community to curb the menace. One of the research efforts is to have an intrusion detection mechanism in place. Batch learning and data streaming are approaches used for processing the huge amount of data required for proper intrusion detection. Batch learning, despite its advantages, has been faulted for poor scalability due to the constant re-training of new training instances. Hence, this paper seeks to conduct a comparative study using selected batch learning and data streaming algorithms. The batch learning and data streaming algorithms considered are J48, projective adaptive resonance theory (PART), Hoeffding tree (HT) and OzaBagAdwin (OBA). Furthermore, binary and multiclass classification problems are considered for the tested algorithms. Experimental results show that data streaming algorithms achieved considerably higher performance in binary classification problems when compared with batch learning algorithms. Specifically, binary classification produced J48 (94.73), PART (92.83), HT (98.38), and OBA (99.67), and multiclass classification produced J48 (87.66), PART (87.05), HT (71.98), OBA (82.80) based on accuracy. Hence, the use of data streaming algorithms to solve the scalability issue and allow real-time detection of network intrusion is highly recommended
    corecore