{"id":4159,"date":"2018-08-12T10:19:27","date_gmt":"2018-08-12T04:49:27","guid":{"rendered":"https:\/\/projectsgeek.com\/?p=4159"},"modified":"2018-08-12T10:20:02","modified_gmt":"2018-08-12T04:50:02","slug":"secure-e-learning-using-data-mining-techniques","status":"publish","type":"post","link":"https:\/\/projectsgeek.com\/2018\/08\/secure-e-learning-using-data-mining-techniques.html","title":{"rendered":"Secure E-Learning Using Data Mining Techniques"},"content":{"rendered":"<h2 style=\"text-align: justify;\"><span style=\"font-size: 14pt; font-family: 'times new roman', times, serif; color: #000000;\"><strong>Objective<\/strong><\/span><\/h2>\n<p style=\"text-align: justify;\"><span style=\"font-size: 14pt; font-family: 'times new roman', times, serif; color: #000000;\">The main objective of this system is to develop the enhanced security for e-Learning application through the data mining techniques which will be a booming application of this era.<\/span><\/p>\n<p><a href=\"https:\/\/images.projectsgeek.com\/2018\/08\/Secure-E-Learning-Using-Data-Mining.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-4160\" src=\"https:\/\/images.projectsgeek.com\/2018\/08\/Secure-E-Learning-Using-Data-Mining-1024x156.jpg\" alt=\"Secure E-Learning Using Data Mining\" width=\"1024\" height=\"156\" srcset=\"https:\/\/images.projectsgeek.com\/2018\/08\/Secure-E-Learning-Using-Data-Mining.jpg 1024w, https:\/\/images.projectsgeek.com\/2018\/08\/Secure-E-Learning-Using-Data-Mining-300x46.jpg 300w, https:\/\/images.projectsgeek.com\/2018\/08\/Secure-E-Learning-Using-Data-Mining-768x117.jpg 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n<h2 style=\"text-align: justify;\"><span style=\"font-size: 14pt; font-family: 'times new roman', times, serif; color: #000000;\"><strong>\u00a0<\/strong><strong>Project Overview<\/strong><\/span><\/h2>\n<p style=\"text-align: justify;\"><span style=\"font-size: 14pt; font-family: 'times new roman', times, serif; color: #000000;\">Data mining is the concept for extracting the appropriate data from the large set of database. In today\u2019s world it is widely used for many applications where learning applications is one of the major part. The e-Learning is the booming technology where anyone can learn everything from any part of the world. It is the digital way of learning the concepts and does not require the help of other persons to do so. It also requires the large space for data storage such as user information, course records and course details and so on. There are lot of learning applications available on the internet among which some might be subjected to frauds. So the security is the demanding thing every users looking for to protect their details. The users also seek for flexibility of using the applications. Thus the admin acts as the major source for providing the security in this system. The users should be authenticated to access the materials available on the internet. The encryption and decryption on the study materials has been performed in this study in order to avoid access by the people outside the platform.<\/span><\/p>\n<h2 style=\"text-align: justify;\"><span style=\"font-size: 14pt; font-family: 'times new roman', times, serif; color: #000000;\"><strong>Proposed System<\/strong><\/span><\/h2>\n<p style=\"text-align: justify;\"><span style=\"font-size: 14pt; font-family: 'times new roman', times, serif; color: #000000;\"><strong>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/strong>This system proposes the development of secured e-learning application where it allows only the authorized people to access the services. For the user to authorized the cryptographic algorithm is used where the secret key is send to the user\u2019s email id. The user is allowed to access the platform only after he\/she authenticates the secret code by entering in the website.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 14pt; font-family: 'times new roman', times, serif; color: #000000;\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 This system also includes various services. They include the following<\/span><\/p>\n<ul style=\"text-align: justify;\">\n<li><span style=\"font-size: 14pt; font-family: 'times new roman', times, serif; color: #000000;\">Discussion forum<\/span><\/li>\n<li><span style=\"font-size: 14pt; font-family: 'times new roman', times, serif; color: #000000;\">Online test<\/span><\/li>\n<li><span style=\"font-size: 14pt; font-family: 'times new roman', times, serif; color: #000000;\">Rating based review of the database contents<\/span><\/li>\n<li><span style=\"font-size: 14pt; font-family: 'times new roman', times, serif; color: #000000;\">Filtered web search<\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><span style=\"font-size: 14pt; font-family: 'times new roman', times, serif; color: #000000;\">The discussion forum allows the user to post the queries and discuss about the new<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 14pt; font-family: 'times new roman', times, serif; color: #000000;\">concepts. The feedback collected will be used for the development of the sites. This secured learning allows user to analyse their knowledge standard by taking online tests. The test results will be analysed by the admin authorization. The rating and reviews would act as an impression board for the users to understand the application well. So this application also welcomes the user\u2019s ratings. The security has been implemented in order to eliminate the fake ratings by which people can be deceived easily and it is the modern technique employed widely in the market to make their apps popular. The filtered web provides the best outcome of search when the user enters the keyword by eliminating the unwanted page loads. The elimination of unwanted page loads also saves more space and time in the system.<\/span><\/p>\n<h2 style=\"text-align: justify;\"><span style=\"font-size: 14pt; font-family: 'times new roman', times, serif; color: #000000;\"><strong>Software Requirements<\/strong><\/span><\/h2>\n<ul style=\"text-align: justify;\">\n<li><span style=\"font-size: 14pt; font-family: 'times new roman', times, serif; color: #000000;\">Windows OS<\/span><\/li>\n<li><span style=\"font-size: 14pt; font-family: 'times new roman', times, serif; color: #000000;\">Weka<\/span><\/li>\n<li><span style=\"font-size: 14pt; font-family: 'times new roman', times, serif; color: #000000;\">Rapidminer<\/span><\/li>\n<\/ul>\n<h2 style=\"text-align: justify;\"><span style=\"font-size: 14pt; font-family: 'times new roman', times, serif; color: #000000;\"><strong>Hardware Requirements<\/strong><\/span><\/h2>\n<ul style=\"text-align: justify;\">\n<li><span style=\"font-size: 14pt; font-family: 'times new roman', times, serif; color: #000000;\">Hard Disk \u2013 1 TB or Above<\/span><\/li>\n<li><span style=\"font-size: 14pt; font-family: 'times new roman', times, serif; color: #000000;\">RAM required \u2013 8 GB or Above<\/span><\/li>\n<li><span style=\"font-size: 14pt; font-family: 'times new roman', times, serif; color: #000000;\">Processor \u2013 Core i3 or Above<\/span><\/li>\n<\/ul>\n<h2 style=\"text-align: justify;\"><span style=\"font-size: 14pt; font-family: 'times new roman', times, serif; color: #000000;\"><strong>Technology Used<\/strong><\/span><\/h2>\n<ul>\n<li style=\"text-align: justify;\"><span style=\"font-size: 14pt; font-family: 'times new roman', times, serif; color: #000000;\">Encryption<\/span><\/li>\n<li style=\"text-align: justify;\"><span style=\"font-size: 14pt; font-family: 'times new roman', times, serif; color: #000000;\">Data Mining<\/span><\/li>\n<li style=\"text-align: justify;\"><span style=\"font-size: 14pt; font-family: 'times new roman', times, serif; color: #000000;\">Business Intelligence<\/span><\/li>\n<\/ul>\n<h2><span style=\"font-size: 14pt; font-family: 'times new roman', times, serif;\"><strong>Download Project<\/strong><\/span><\/h2>\n<p><span style=\"font-size: 14pt; font-family: 'times new roman', times, serif; color: #000000;\"><a rel=\"nofollow\" href=\"http:\/\/projectsgeek.com\/downloads\/linkredirector.php?linkone=https:\/\/drive.google.com\/file\/d\/1ScAKXPomucxsdT0U70Y7mXsgtmfJcml3&#038;name=Secured%20e-learning%20using%20data%20mining%20techniques.docx\" id=\"\" class=\"button green\" target=\"_blank\">Download Abstract<\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Objective The main objective of this system is to develop the enhanced security for e-Learning application through the data mining techniques which will be a booming application of this era. \u00a0Project Overview Data mining is the concept for extracting the appropriate data from the large set of database. In today\u2019s world it is widely used [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[95,93],"tags":[94,96],"class_list":{"0":"post-4159","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-datascience-projects","7":"category-data-mining-projects","8":"tag-data-mining-projects","9":"tag-datascience-projects","10":"entry"},"_links":{"self":[{"href":"https:\/\/projectsgeek.com\/wp-json\/wp\/v2\/posts\/4159","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/projectsgeek.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/projectsgeek.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/projectsgeek.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/projectsgeek.com\/wp-json\/wp\/v2\/comments?post=4159"}],"version-history":[{"count":0,"href":"https:\/\/projectsgeek.com\/wp-json\/wp\/v2\/posts\/4159\/revisions"}],"wp:attachment":[{"href":"https:\/\/projectsgeek.com\/wp-json\/wp\/v2\/media?parent=4159"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/projectsgeek.com\/wp-json\/wp\/v2\/categories?post=4159"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/projectsgeek.com\/wp-json\/wp\/v2\/tags?post=4159"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}