2022
DOI: 10.11591/ijere.v11i2.23242
|View full text |Cite
|
Sign up to set email alerts
|

Extracting student patterns from log file Moodle course: A case study

Abstract: <span lang="EN-US">This paper introduces a set of extracted factors from Moodle log file of the selected course as a case study that aims to capture student Engagement (E), Behavior (B), Personality (Pers) and Performance (P). The factors are applied to identify students’ EBPersP with different course activities. The data set used in this paper was selected from the "Introduction to Computer Science" online course that captures 273,906 records as a log file for 29 students, delivered in Spring 2020. The … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 24 publications
0
3
0
Order By: Relevance
“…801 -Baghdad, Iraq, ca. 873] (Figure 2) who proved how code breaking for simple monoalphabetic substitution was relatively easy if the language of the original message is known, and a statistical analysis is applied to the ciphered message and checked against the letter frequencies in such a language [6].…”
Section: Ancient Cryptographymentioning
confidence: 99%
See 1 more Smart Citation
“…801 -Baghdad, Iraq, ca. 873] (Figure 2) who proved how code breaking for simple monoalphabetic substitution was relatively easy if the language of the original message is known, and a statistical analysis is applied to the ciphered message and checked against the letter frequencies in such a language [6].…”
Section: Ancient Cryptographymentioning
confidence: 99%
“…The relevance of the text was underestimated up to the XXth century. While it was known for the fi rst description of the cipher disk, it also contains a refi ned analysis of the language, aimed both at deciphering -as it was in the Al-Kindi treatise [6] -and at improving ciphering, by providing important new contributions [12].…”
Section: The Renaissance Of Cryptography: Leon Battista Albertimentioning
confidence: 99%
“…Besides, Moodle is equipped with several practical features, such as the features of learning material, assignments, quizzes, discussion, and others [31], [35], that support hybrid learning [34], [36]. Moodle can cover the limitations of offline learning, which is limited by space and time because students and lecturers can interact anytime and from anywhere [27], [31], [37].…”
Section: Introductionmentioning
confidence: 99%