Validating the Evaluation of Adaptive Systems by User Profile Simulation Javier Bravo and Alvaro Ortigosa {javier.bravo, Universidad.

Slides:



Advertisements
Similar presentations
A Model Based on Semantic Nets to Support Evolutionary and Adaptive Hypermedia Systems N. Padilla Zea M. Medina Medina M. J. Cabrera F. Molina Ortiz L.
Advertisements

An Adaptive Course on Template-based Adaptive Hypermedia Design Félix Muñoz, Alvaro Ortigosa Universidad Autónoma de Madrid
From Local Patterns to Global Models: Towards Domain Driven Educational Process Mining Nikola Trčka Mykola Pechenizkiy.
Asun Gómez-Pérez. The SEALS Platform for Scholarly Research. Beyond the PDF2 Conference th March Amsterdam The SEALS Platform for Scholarly.
Javier Bravo 1, César Vialardi 2 and Alvaro Ortigosa 1 1 Computer Science Department, Universidad Autónoma de Madrid, Spain 2 Computer Science Department,
1 Relational Data Mining Applied to Virtual Engineering of Product Designs Monika Žáková 1, Filip Železný 1, Javier A. Garcia-Sedano 2, Cyril Masia Tissot.
PICTURE ¬ Focus Group – Avila 11 de octubre 2005 ASENSIO - MORTARI – UAM – Universidad Autónoma de Madrid PICTURE ¬ Focus Group – Avila 11 de octubre 2005.
An adaptive hierarchical questionnaire based on the Index of Learning Styles Alvaro Ortigosa, Pedro Paredes, Pilar Rodriguez Universidad Autónoma de Madrid.
DFF 2014 February 24, Self-adapting Sensor Networks for Semi- automated Threat Detection in a Controlled Area By Jorge Buenfil US ARMY RDECOM ARDEC.
Konstanz, Jens Gerken ZuiScat An Overview of data quality problems and data cleaning solution approaches Data Cleaning Seminarvortrag: Digital.
Design & Decision Support Systems for Architectural Design and Urban Planning Prof.dr.ir B. de Vries M.A. Orzechowski, Msc.
Florence Workshop, 16th June 2003 The MESMUSES portal of La Cité des Sciences et de l’Industrie Demonstration of the MESMUSES portal at the “Cité des Sciences.
University of Minho School of Engineering Algoritmi Centre Uma Escola a Reinventar o Futuro – Semana da Escola de Engenharia - 24 a 27 de Outubro de 2011.
ECE Synthesis & Verification1 ECE 667 Spring 2011 Synthesis and Verification of Digital Systems Verification Introduction.
Queen Mary, University of London
Marakas: Decision Support Systems, 2nd Edition © 2003, Prentice-Hall Chapter Chapter 7: Expert Systems and Artificial Intelligence Decision Support.
Advanced Data Mining and Integration Research for Europe ADMIRE – Framework 7 ICT ADMIRE Overview European Commission 7 th.
Intrusion Detection System Marmagna Desai [ 520 Presentation]
Real-Time Odor Classification Through Sequential Bayesian Filtering Javier G. Monroy Javier Gonzalez-Jimenez
Intrusion and Anomaly Detection in Network Traffic Streams: Checking and Machine Learning Approaches ONR MURI area: High Confidence Real-Time Misuse and.
Bloom’s Critical Thinking Level 1 Knowledge Exhibits previously learned material by recalling facts, terms, basic concepts, and answers.
The 2nd International Conference of e-Learning and Distance Education, 21 to 23 February 2011, Riyadh, Saudi Arabia Prof. Dr. Torky Sultan Faculty of Computers.
Business Process Performance Prediction on a Tracked Simulation Model Andrei Solomon, Marin Litoiu– York University.
1 Numerical Integration Section Why Numerical Integration? Let’s say we want to evaluate the following definite integral:
Presentation Outline Motivation Basic concept Bakground Futur work Conclusion Nesrine MEZHOUDI User Interface Adaptation.
Improving Intrusion Detection System Taminee Shinasharkey CS689 11/2/00.
Next-Generation IDS: A CEP Use Case in 10 Minutes 3rd Draft – November 8, nd Event Processing Symposium Redwood Shores, California Tim Bass, CISSP.
General Theme In general work in teams combining architects, compiler developers, performance and tools engineers, and application experts –Note this extends.
Zhiyong Wang In cooperation with Sisi Zlatanova
Monitoring Energy Consumption in Android Applications Marco Couto Departamento de Informática Universidade do Minho João Saraiva Universidade.
Supporting Heterogeneous Users in Collaborative Virtual Environments using AOP CoopIS 2001 September 5-7, Trento, Italy M. Pinto, M. Amor, L. Fuentes,
1 Description and Schedulability Analysis of the Software Architecture of an Automated Vehicle Control System Stavros Tripakis VERIMAG EMSOFT’02.
23-aug-05Intrusion detection system1. 23-aug-05Intrusion detection system2 Overview of intrusion detection system What is intrusion? What is intrusion.
Research Heaven, West Virginia A Compositional Approach for Validation of Formal Models Bojan Cukic, Dejan Desovski West Virginia University NASA OSMA.
Pontificia Universidad Católica de Chile School of Engineering Department of Computer Science A feedback-based framework for process enhancement of causal.
1 Context-dependent Product Line Practice for Constructing Reliable Embedded Systems Naoyasu UbayashiKyushu University, Japan Shin NakajimaNational Institute.
Towards a Practical Approach to Testing Pointcut Descriptors With JQuati 1 LA-WASP 2009.
A Context Model based on Ontological Languages: a Proposal for Information Visualization School of Informatics Castilla-La Mancha University Ramón Hervás.
Univ. Autónoma de Madrid 1 CADUI' June FUNDP Namur A Framework for the Automatic Generation of Software Tutoring Javier Contreras Francisco.
Telmo Zarraonandia Laboratorio DEI. Dpto. de Informática U. Carlos III de Madrid A Late Modelling Approach for the Definition of Computer-Supported Learning.
Geoffrey Duval (ISAE-SUPAERO) Naples, October 1 st, 2012.
This talk brought to you by... OPen Adaptive Hypermedia group Escuela Politécnica Superior, Universidad Autónoma de Madrid {javier.bravo,
Reactive learning Objects for Distributed e-Learning environments Patrick Duval, Agathe Merceron, Michel Scholl Computer Science Department Engineering.
1 RealProct: Reliable Protocol Conformance Testing with Real Nodes for Wireless Sensor Networks Junjie Xiong, Edith C.-Ngai, Yangfan Zhou, Michael R. Lyu.
Computational Tools for Population Biology Tanya Berger-Wolf, Computer Science, UIC; Daniel Rubenstein, Ecology and Evolutionary Biology, Princeton; Jared.
1 Interaccion 2008, IX Congreso de Interacción Persona-Ordenador, Albacete, 9-12 June 2008 ECOOL: Generation of Collaborative Multiplatform Scenarios with.
2002/1/17IDS Lab Seminar Evaluating a clustering solution: An application in the tourism market Advisor: Dr. Hsu Graduate: Yung-Chu Lin.
EVALUATION AND SELFASSESSMENT SYSTEMS FOR THE VIRTUAL TEACHING: MULTIPLE CHOICE QUESTIONNAIRES Claudio Cameselle, Susana Gouveia Departamento de Enxeñería.
Centro de Electrónica Industrial (CEI) | Universidad Politécnica de Madrid | | In magnetic components for power electronics applications.
Adaptive Faceted Browsing in Job Offers Danielle H. Lee
José Antonio Iglesias, Agapito Ledezma and Araceli Sanchis Sequence Classification Using Statistical Pattern Recognition Sequence Classification Using.
A 3 EH 4 th International Workshop on Authoring of Adaptive and Adaptable (Educational) Hypermedia Alexandra Cristea Rosa Carro & Franca Garzotto
Company: Amdocs Academic advisor: Ehud Gudes Technical advisor :Gabby Shimony Team: Uzi Lewin Elina Shlangman.
Anomaly Detection. Network Intrusion Detection Techniques. Ştefan-Iulian Handra Dept. of Computer Science Polytechnic University of Timișoara June 2010.
Using Service-Oriented Architecture in Context-Aware Applications Damião Ribeiro de Almeida Information System Laboratory Universidade Federal de Campina.
Some Great Open Source Intrusion Detection Systems (IDSs)
Introduction to Machine Learning, its potential usage in network area,
Pedro Salcedo Lagos MISTRAL: A Knowledge-Based System for Distance Education that Incorporates Neural Networks Techniques for Teaching.
Attention Tracking Tool
QianZhu, Liang Chen and Gagan Agrawal
Report by: Katiuscia Zedda
Evaluating a Real-time Anomaly-based IDS
RealProct: Reliable Protocol Conformance Testing with Real Nodes for Wireless Sensor Networks Junjie Xiong
Web Mining Department of Computer Science and Engg.
Monitoring Physical Activities Using Smartphones
Formalization of Trust, Fraud, and Vulnerability Analysis
Improving Data Security & Protection Using Data Provenance Figure 1
Title First name, last name, university, city, country
Task Manager & Profile Interface
Simulation-driven Enterprise Modelling: WHY ?
Presentation transcript:

Validating the Evaluation of Adaptive Systems by User Profile Simulation Javier Bravo and Alvaro Ortigosa {javier.bravo, Universidad Autónoma de Madrid

Motivation Evaluation of AHS is a difficult task. Log analysis tools can be used to support (semi) automatic evaluation of AHS. Look for anomalous behavioral patterns that may point to problems on the adaptation rules. Requirement: these tools should also be validated! The validation process itself is a difficult task A large set of student logs is needed to test the evaluation tool.

Main Goals Evaluation tools integrated into the AHS architecture. Provide to the course designer a tool to test if the evaluation works correctly: all anomalous patterns are detected Use simulation techniques to test the tool. Classify the anomalies.

Evaluation Based of Student Data

Approach of Validating the Evaluation

Conclusions and Future Work This approach propose a practical way to test an evaluation tool based on log analysis. Future work includes: Testing SIMULOG with real designers It is the ontology complete enough? Checking SIMULOG results against real user logs Creating an ontology for adaptive course description.

Thank you If you have any questions, I will be next to the poster.