Computer Science ›› 2023, Vol. 50 ›› Issue (11A): 220900067-10.doi: 10.11896/jsjkx.220900067

• Big Data & Data Science • Previous Articles     Next Articles

Personalized Learning Path Recommendation and Verification Method Based on Similar Learners Determination

FENG Shu1,3, ZHU Yi1,2,3, SONG Mei1,3, JU Chengcheng1,3   

  1. 1 School of Computer Science and Technology,Jiangsu Normal University,Xuzhou,Jiangsu 221116,China
    2 Key Laboratory of Ministry of Industry and Information Technology for Software Development and Verification Technology of High Security Systems,Nanjing University of Aeronautics and Astronautics,Nanjing 211106,China
    3 Jiangsu Education Information Engineering Technology Research Center,Xuzhou,Jiangsu 221116,China
  • Published:2023-11-09
  • About author:FENG Shu,born in 1996,postgraduate,is a member of China Computer Federation.Her main research interests include adaptive learning,formal methods and software engineering.
    ZHU Yi,born in 1976,Ph.D,professor,is a member of China Computer Federation.His main research interests include software engineering,formal methods,software reliability,adaptive learning and cyber-physical fusion systems.
  • Supported by:
    National Natural Science Foundation of China(62077029),CCF-Huawei Populus Grove Fund(CCF-HuaweiFM202209),Open Project Fund of Key Laboratory of Safety-Critical Software Ministry of Industry and Information Technology(NJ2020022),Future Network Scientific Research Fund Project(FNSRFP-2021-YB-32) and Graduate Science Research Innovation Program of Jiangsu Normal University(2021XKT1384).

Abstract: The similarity-based learner determination method is widely used in the field of personalized recommendation due to its light weight.At present,machine learning methods such as collaborative filtering are generally used.However,such methods cannot guarantee the interpretability of the determination process and the availability of the determination results.To solve this problem,a personalized learning path recommendation and verification method based on similar learner determination is proposed,which uses the method of process bisimulation to study the determination process of similar learners.Firstly,the behavior characteristics of calculus of communication system(CCS) are extended,and learning resources-calculus of communication system(LR-CCS) is used to model the learning behavior sequence of learners.Secondly,the bisimulation theory of process algebra is used to determine the similarity of learners’ learning behavior sequences,and the algorithms for determining the strong(weak) bisimulation relationship of learning behavior sequence is proposed.Thirdly,the bisimulation verification tool mobile workbench(MWB) is used to verify the similarity of the learner’s learning behavior sequence,and the candidate recommended paths which satisfy the bisimulation relationship are obtained to ensure the correctness of the judgment result.Finally,a case study of a recommender system based on similar learners verifies the effectiveness of this method.

Key words: Similarity of learning behavior sequence, Process algebra, CCS, Bisimulation

CLC Number: 

  • TP311
[1]YUN Y,DAI H,ZHANG P Y,et al.State-of-the-Art Survey of Personalized Learning Path Recommendation [J].Journal of Software,2022,33(12):4590-4615.
[2]JAIN A,NAGAR S,SINGH P K,et al.EMUCF:Enhancedmultistage user-based collaborative filtering through non-linear similarity for recommendation systems[J].Expert Systems with Applications,2020,161:113724.
[3]SARWAR B,KARYPIS G,KONSTAN J,et al.Item-based collaborative filtering recommendation algorithms[C]//Procee-dings of the 10th international conference on World Wide Web.2001:285-295.
[4]TEWARI A S.Generating items recommendations by fusingcontent and user-item based collaborative filtering[C]//Procedia Computer Science,2020,167:1934-1940.
[5]YU M,QUAN T,PENG Q,et al.A model-based collaborate filtering algorithm based on stacked AutoEncoder[J].Neural Computing and Applications,2022,34(4):2503-2511.
[6]WANG X,KADIOĞLU S.Modeling uncertainty to improve personalized recommendations via Bayesian deep learning[J].International Journal of Data Science and Analytics,2021,16(2/3):191-201.
[7]TAN W Z.The Algorithmic Risk of Artificial Intelligence in Edu-cation[J].Open Education Research,2019,25(6):20-30.
[8]LI L.Design and Implementation of Recommendation A lgo-rithm Based on Post Hoc Interpretability[D].Taiyuan:Shanxi University,2021.
[9]LIU H L,GUO Y,MA J.Research Progress of Similarity Algorithm in Collaborative Filtering [J].Computer Engineering and Applications,2022,58(13):27-35.
[10]MA S C,SHI J Q,HUANG Y H,et al.Minimal-unsatisfiable-core-driven Local Explainability Analysis for Random Forest [J].Journal of Software,2022,33(7):2447-2463.
[11]GOODFELLOW I J,SHLENS J,SZEGEDY C.Explaining andHarnessing Adversarial Examples[C]//ICLR.2015.
[12]WU Y,ZHANG M.Tightening Robustness Verification of Convolutional Neural Networks with Fine-Grained Linear Approximation[C]//The Thirty-Fifth AAAI Conference on Artificial Intelligence(AAAI-21).2021.
[13]MILNER R.A Calculus of Communicating Systems[C]//Springer Berlin Heidelberg,1980.
[14]HOARE C A R.Communicating sequential processes[J].Communications of the ACM,1978,21(8):666-677.
[15]ISO.ISO 8807.LOTOS Standard[OL].http://www.iso.org/iso/iso_catalogue/catalogue_tc/catalogue_detail.htm?csnumber=16258.
[16]MILNER R.Communication and concurrency[M].EnglewoodCliffs:Prentice hall,1989.
[17]FIORE M,CATTANI G L,WINSKEL G.Weak bisimulationand open maps.Proceedings[C]//14th Symposium on Logic in Computer Science(Cat.No.PR00158).IEEE,1999:67-76.
[18]MA Z Q,WANG Y C,YUE Y Z,et al.Research on OnlineLearning Behavior Pattern from the Perspective of Learning Analysis[J].Modern Distance Education,2019(6):35-44.
[19]BAKEMAN R,GOTTMAN J M.Observing interaction:An introduction to sequential analysis[M].Cambridge university press,1997.
[20]ZHANG H,CUI Y L,YU L Y,et al.Study of Classroom Event Logic Graph of Intelligent Teaching based on Method of Data Mining[J].Journal of Distance Education,2020,38(2):80-88.
[21]BAKEMAN R,QUERA V.Analyzing interaction:Sequentialanalysis with SDIS and GSEQ[M].Cambridge University Press,1995.
[22]LI Y,LI X.A Verification Tool MWB for CCS[J].Communications Technology,2005(S1):178-180.
[23]ZHU Y,XIAO F X,ZHOU H,et al.Method for Modeling and Analyzing Software Energy Consumption of Embedded Real-Time System[J].Journal of Computer Research and Development,2014,51(4):848-855.
[24]CHEN X Y,ZHU Y,ZHAO Y,et al.Hybrid AADL Modeling and Model Transformation for CPS Time and Space Properties Verification[J].Journal of Software,2021,32(6):1779-1798.
[25]FEI Y,ZHONG L,JHA N K.An energy-aware framework for dynamic software management in mobile computing systems[J].ACM Transactions on Embedded Computing Systems(TECS),2008,7(3):1-31.
[26]FERNANDEZ J C,MOUNIER L.Verifying Bisimulations “On the Fly”[C]//FORTE.1990:95-110.
[27]LEI G Q.Comparison and Application of Bisimulation Verification Algorithm[M].East China Normal University,2018.
[28]ZHENG G,YU H,XU W.Collaborative filtering recommendation algorithm with item label features[J].International Core Journal of Engineering,2020,6(1):160-170.
[29]CHEN J,WANG X,ZHAO S,et al.Deep attention user-basedcollaborative filtering for recommendation[J].Neurocomputing,2020,383:57-68.
[30]ZHOU W,DU Y,DUAN M,et al.NtCF:Neural Trust-Aware Collaborative Filtering Toward Hierarchical Recommendation Services[J].Arabian Journal for Science and Engineering,2022,47(2):1239-1252.
[31]LIU M,LI J,LIU K,et al.Graph-ICF:Item-based collaborative filtering based on graph neural network[J].Knowledge-Based Systems,2022,251:109208.
[32]WANG L S.Research on Theory and Application of Access Control Based on Resources [D].Nanjing:Nanjing University of Aeronautics and Astronautics,2010.
[33]LEE I,PHILIPPOU A,SOKOLSKY O.Resources in process algebra[J].The Journal of Logic and Algebraic Programming,2007,72:98-122.
[34]LEE I,PHILIPPOU A,SOKOLSKY O.A general resourceframework for real-time systems[C]//Proceedings of RISSEF’02,LNCS 2941.2002:234-248.
[35]BǍDICǍ A,BǍDICǍC,LOGOFǍTU D,et al.Modeling blockstructured project scheduling with resource constraints[C]//International Conference on Large-Scale Scientific Computing.Cham:Springer,2019:484-492.
[36]CHEN X Y,ZHU Y,ZHAO Y,et al.Modeling and safety verification method for CPS time and topology constrained resources[J].Journal of Software,2022,33(8):2815-2838.
[37]JOHNSEN E B,STEFFEN M,STUMPF J B.Virtually timedambients:A calculus of nested virtualization[J].Journal of Lo-gical and Algebraic Methods in Programming,2018,94:109-127.
[38]FERNANDEZ J C,MOUNIER L.Verifying bisimulations onthe fly[C]//Proceedings of the 3rd International Conference on Formal Description Techniques for Distributed Systems and Communication Protocols.North-Holland Publishing Co.,1990:95-110.
[39]DU W J,DENGY X.A quasi-local algorithm for checking bisi-milarity[C]//Proceedingsof the IEEE International Conference.on Computer Science and Automation Engineering.2011:1-5.
[40]ZHENG X L,DENG Y X,FU C,et al.Extension and Implementation of the Quasi-Local Algorithm for Checking Bisimilarity [J].Journal of Software,2018,29(6):1517-1526.
[41]DOVIER A,PIAZZA C,POLICRITI A.An efficient algorithm for computing bisimulation equivalence[J].Theoretical Compu-ter Science,2004,311(1/2/3):221-256.
[42]GROOTE J F,RIVERA VERDUZCO J,DE VINK E P.An efficient algorithm to determine probabilistic bisimulation[J].Algorithms,2018,11(9):131.
[43]HUYBERS R,LAARMAN A.A Parallel Relation-Based Algorithm for Symbolic Bisimulation Minimization[C]//Interna-tional Conference on Verification,Model Checking,and Abstract Interpretation.Cham:Springer,2019:535-554.
[44]PRABHAKAR P.Bisimulations for Neural Network Reduction[C]//International Conference on Verification,Model Che-cking,and Abstract Interpretation.Cham:Springer,2022:285-300.
[1] CAI Yu-tong, WANG Yong, WANG Ran-ran, JIANG Zheng-tao, DAI Gui-ping. Formal Verification of Otway-Rees Protocol Based on Process Algebra [J]. Computer Science, 2021, 48(6A): 477-480.
[2] TAN Li-xing, WANG Fu-jun. On Logic of Graded Argumentation System [J]. Computer Science, 2020, 47(5): 27-31.
[3] LIN Lei-lei, ZHOU Hua, DAI Fei, HE Zhen-li, SHEN Yong and KANG Hong-wei. Method of Software Architecture Refinement Based on Algebraic Semantics [J]. Computer Science, 2017, 44(7): 141-146.
[4] ZHENG Ming, LI Tong, LIN Ying, ZHOU Xiao-xuan, LI Xiang and MING Li. Dynamic Evolution Consistency Verification Method for Component System Modeling [J]. Computer Science, 2017, 44(11): 80-86.
[5] QIAN Ye, LI Tong, YU Yong, SUN Ji-hong, YU Qian and PENG Lin. Approach to Modeling Software Evolution Process for Synchronous Interaction [J]. Computer Science, 2016, 43(8): 154-158.
[6] HUANG Yong WU Jin-zhao. Security Model for Distributed System Based on Seal Calculus [J]. Computer Science, 2015, 42(7): 178-181.
[7] WU Xin-xing, HU Guo-sheng and CHEN Yi-xiang. Quantification and Conformance of Web Service Degraded Substitution [J]. Computer Science, 2015, 42(2): 81-85.
[8] PAN Li,ZHENG Hong,YANG Bo and ZHOU Xin-min. Characteristic Conditions and Timed Properties of Time Petri Nets with Mixed Semantics [J]. Computer Science, 2014, 41(12): 202-205.
[9] ZHANG Wei. Axiomatizing Weak Covariant-contravariant Simulation Semantics [J]. Computer Science, 2014, 41(11): 99-102.
[10] ZHU Rui,LI Tong,MO Qi,ZHANG Xuan,WANG Yi-quan,LIN Lei-lei and DAI Fei. Research on Deviation Diagnostic of Software Process Behavior Based on EPMM Modelling [J]. Computer Science, 2014, 41(11): 56-62.
[11] . Dynamic Collaborative Filtering Recommender Model Based on Rolling Time Windows and its Algorithm [J]. Computer Science, 2013, 40(2): 206-209.
[12] . Extended Pi-calculus for Service Selection Using Particle Swarm Optimization [J]. Computer Science, 2012, 39(Z11): 259-269.
[13] . Formal Verification of Trusted Connection Architecture [J]. Computer Science, 2012, 39(Z11): 230-233.
[14] . Security Process Algebra-based Analysis and Verification of Non-deducibility Security Model [J]. Computer Science, 2012, 39(2): 56-58.
[15] . Computation Tree Logic CTL* Based on Possibility Measure and Possibilistic Bisimulation [J]. Computer Science, 2012, 39(10): 258-263.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!