24.07.2013 Views

July 2007 Volume 10 Number 3 - Educational Technology & Society

July 2007 Volume 10 Number 3 - Educational Technology & Society

July 2007 Volume 10 Number 3 - Educational Technology & Society

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

of each learning item in I in the form of (ESi, descriptioni), where encoded string ESi ∈ I , 2) an access database,<br />

ADBorigin, which consists of a set of user access data (UIDi, {ESx, …, ESy}), where UIDi is a user’s identifier and<br />

ESi ∈ I (for i=x, …, y), and 3) the notation of ‘*’ represents a class or concept in an encoded string ESi. To clarify<br />

our discussion, an abstract example is introduced in the following sections.<br />

(111)<br />

Amplifiers<br />

(1**)<br />

Electrical Engineering<br />

(11*)<br />

Electric Circuits<br />

(112)<br />

Ohm’s Law<br />

(121)<br />

Ampere’s<br />

Law<br />

(12*)<br />

Electromagnetism<br />

(122)<br />

Faraday’s Law<br />

(211)<br />

FET Circuit<br />

Analysis<br />

Figure 1. An example of a curriculum scheme<br />

Example 1: For instance, the taxonomy information of the curriculum scheme is constructed as shown in Figure 1,<br />

and the encoded access database ADBorigin is shown in Table 1. We use a unique encoded string to represent a<br />

corresponding accessing-identifier, which is shown in the parenthesis in front of each accessing-identifier. In this<br />

example scheme, the Electrical Engineering & Computer Science curriculum is given in three layers. The first layer<br />

enumerates all the departments in this Electrical Engineering & Computer Science curriculum. The second layer lists<br />

all the courses in the corresponding departments. The third layer itemizes all the learning items including in the<br />

courses. For instance, the learning item ‘Wireless’ is encoded as ‘231’ in which the first digit, ‘2’, represent<br />

‘Engineering Science’ at layer 1, the second, ‘3’, for ‘Data Communications’ at layer 2, and the third, ‘1’, for the<br />

learning item ‘Wireless’ at layer 3.<br />

Table 1. An example of user access database ADBorigin.<br />

UID Items<br />

U1 {231, 321, 322, 312}<br />

U2 {111, 112, 212, 321, 322, 231}<br />

U3 {322, 321, 111, 212, 231}<br />

U4 {111, 222, 112, 212,211}<br />

U5 {112, 211,212, 311}<br />

U6 {111, 311, 212, 112, 231}<br />

{231, 121, 321}<br />

U7<br />

Electrical Engineering & Computer Science<br />

(21*)<br />

Analysis of<br />

Electronics Circuit<br />

(212)<br />

Operational<br />

Amplifier Design<br />

(221)<br />

Registers<br />

(2**)<br />

Engineering Science<br />

(22*)<br />

Logic Design<br />

(222)<br />

Counters<br />

(231)<br />

Wireless<br />

(23*)<br />

Data<br />

Communications<br />

(31*)<br />

Digital Circuit<br />

(3**)<br />

Computer Science<br />

(32*)<br />

Wireless<br />

Communications<br />

In this research, the frequent patterns are not restricted to the same layer (Han and Fu, 1999) but extend to the<br />

different layers. For this reason, we increase the higher-level items in the access database ADBorigin to be an enriched<br />

access database, ADBenriched. Whenever the lower-level items achieve a specified portion of count, the higher-level<br />

items should be added into the enriched access database ADBenriched (shown in Table 2). For example, the access data<br />

U6 in Table 2 contains the encoded items - 111, 112, 121, and 122, and these items fulfill the state we mentioned.<br />

(232)<br />

QoS<br />

(311)<br />

Accumulator<br />

(312)<br />

Multiplexer<br />

(321)<br />

Wireless LAN<br />

(322)<br />

Bluetooth<br />

307

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!