Classifying Student Attentiveness Using Machine Learning Technique for Improving Learning Systems
Autor: | Dr Piyush Kumar Pareek |
---|---|
Jazyk: | angličtina |
Rok vydání: | 2021 |
Předmět: | |
DOI: | 10.5281/zenodo.4457313 |
Popis: | In the studies carried out where different researchers have done various studies to categorize the student’s concentration. Many methods are reliant on the Qualitative Estimation and has many lacking Quantitative Estimation. Thus the work is to bridge the difference between the two Estimation methods for effective attention of the student. This research applies the ML algorithms such as K-means and SVM algorithm. Results of the research can be used to improvise the teaching for all the teachers at any levels and can make them utilize the method to strategize their teaching systems. The paper mentions about ML algorithms with can be used by teachers to get feedback for teaching. Thus, benefitting the students to improve learning method. Ultimately this yield to students to do better in the respective subjects. {"references":["Shan, C., Chen, B., Hu, C., Xue, J., & Li, N. (2014). Software defect prediction model based on LLE and SVM.","Moyo, S., & Mnkandla, E. (2020). A Novel Lightweight Solo Software Development Methodology With Optimum Security Practices. IEEE Access, 8, 33735-33747.","Siboni, S., Sachidananda, V., Meidan, Y., Bohadana, M., Mathov, Y., Bhairav, S., ... & Elovici, Y. (2019). Security testbed for internet-of-things devices. IEEE Transactions on Reliability, 68(1), 23-44.","Zhao, X., Xue, J., Hu, C., Ma, R., & Zhang, S. (2014). Research on software behavior modeling based on extended finite state automata.","Dong, H., Li, C., Li, T., Du, Y., & Xu, G. (2014). Research on the security model of mobile application.","Márquez, G., Astudillo, H., & Taramasco, C. (2020). Security in Telehealth Systems From a Software Engineering Viewpoint: A Systematic Mapping Study. IEEE Access, 8, 10933-10950.","Eom, T., Hong, J. B., An, S., Park, J. S., & Kim, D. S. (2019). A Systematic Approach to Threat Modeling and Security Analysis for Software Defined Networking. Ieee Access, 7, 137432-137445.","Huang, Y., Bian, Y., Li, R., Zhao, J. L., & Shi, P. (2019). Smart contract security: A software lifecycle perspective. IEEE Access, 7, 150184-150202.","Cornish, P. L., Knowles, S. R., Marchesano, R., Tam, V., Shadowitz, S., Juurlink, D. N., & Etchells, E. E. (2005). Unintended medication discrepancies at the time of hospital admission. Archives of internal medicine, 165(4), 424-429.","T Tam, V. C., Knowles, S. R., Cornish, P. L., Fine, N., Marchesano, R., & Etchells, E. E. (2005). Frequency, type and clinical importance of medication history errors at admission to hospital: a systematic review. Cmaj, 173(5), 510-515."]} |
Databáze: | OpenAIRE |
Externí odkaz: |