Browsing by Author "Erabadda, ELBH"
Now showing 1 - 2 of 2
- Results Per Page
- Sort Options
- item: Thesis-Full-textAutomatic evaluation and error identification of solutions to single-variable algebraic questionsErabadda, ELBH; Ranathunga, S; Dias, GThere are two types of single-variable equation solving questions that are present in the Ordinary Level mathematics curriculum in Sri Lanka: linear equations with fractions and quadratic equations. Answers to these questions are open-ended and multi-step in nature. This thesis describes a mechanism that evaluates answers to these two types of questions and awards full/ partial credit. It is quite common that students make mistakes in their answers, which results in partial credit. They may repeat the same errors if they do not receive feedback on their mistakes. Therefore feedback in student errors is important for any subject. This thesis introduces a method to automatically identify the errors that the students make in their answers for the aforementioned two types of questions. To the best of our knowledge, this is the first work on automatically identifying student errors in complex multi-step solutions to single-variable equation solving questions. Our evaluations show that the system we have implemented is capable of awarding full/ partial credit to student answers according to a marking scheme and also to identify errors in student answers with minimal teacher intervention. These evaluations were carried out using student answers from different sources.
- item: Conference-Full-textNetwork security: analysis of network crimes and data protection methodologies(Department of Computer Science and Engineering, University of Moratuwa., 2012) Adhikarinayake, CK; Baddegama, VW; Bandara, GM; Erabadda, ELBH; Senarathna, MSRConP^rs have replaced majority of file based systems. File shareing has become essntional for any company and for any individual with incerasing usuage of technology. systems to be successful. In this paper we have discussed how security of computer based systems can be threatened due to vanous reasons and how these threats can be minimized adopting various methodologies. We bring up current solutions implemented in the current world and some new the oretical designs. The paper is mainly focuses on the users at the endpoints of the network. The security aspect related to provide secured connections between them (data encryption, etc.) is not discussed in the paper.