Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 42

Domain: Application

Technology: Python

PRIVACY-PRESERVING ON-SCREEN ACTIVITY


TRACKING AND CLASSIFICATION IN E-LEARNING
USING FEDERATED LEARNING

Web: www.takeoffprojects.com Phone: 08772261612


Email: info@takeoffprojects.com +91-9030333433
Domain: Application
Technology: Python

CONTENT PAGE NO

Web: www.takeoffprojects.com Phone: 08772261612


Email: info@takeoffprojects.com +91-9030333433
Domain: Application
Technology: Python

Abstract

1.INTRODUCTION

1.1 Motivation

1.2 Problem Statement

1.3 Objective of the Project

1.4 Scope

1.5 Project Introduction

2.LITERATURE SURVEY

2.1 Related Work

3. SYSTEM ANALYSIS

3.1 Existing System

3.2 Disadvantages

3.3 Proposed System

3.4 Advantages

3.5 work Flow of Proposed system

Web: www.takeoffprojects.com Phone: 08772261612


Email: info@takeoffprojects.com +91-9030333433
Domain: Application
Technology: Python

4. REQUIREMENT ANALYSIS

4.1 Function and non-functional requirements

4.2 Hardware Requirements

4.3 Software Requirements

4.4 Architecture

5. SYSTEM DESIGN

5.1 Introduction of Input design

5.2 UML Diagram (class, use case, sequence, collaborative, deployment,


activity, ER diagram and Component diagram)

5.3 Data Flow Diagram

6. IMPLEMENTATION AND RESULTS

6.1 Modules

6.2 Output Screens

7. SYSTEM STUDY AND TESTING

7.1 Feasibility study

7.2 Types of test & Test Cases

Web: www.takeoffprojects.com Phone: 08772261612


Email: info@takeoffprojects.com +91-9030333433
Domain: Application
Technology: Python

8. 8. CONCLUSION

9. FUTURE ENHANCEMENT

10. REFERENCES

ABSTRACT:

Web: www.takeoffprojects.com Phone: 08772261612


Email: info@takeoffprojects.com +91-9030333433
Domain: Application
Technology: Python

In the rapidly evolving landscape of remote and online learning, the ability to monitor and assess
students' engagement and productivity has become increasingly vital. This paper presents a
pioneering approach to address this challenge through "Privacy-Preserving On-Screen Activity
Tracking and Classification in E-Learning Using Federated Learning." Our innovative solution
combines the benefits of real-time user monitoring with stringent privacy protection, aiming to
distinguish whether students are effectively utilizing their time for knowledge development or,
regrettably, wasting it. E-learning platforms have gained immense popularity, especially in light
of global events necessitating remote education. However, ensuring that students are actively
engaged and focused during online sessions remains a significant concern. Our approach
leverages Federated Learning, a decentralized machine learning paradigm, to safeguard user
privacy while accurately classifying on-screen activities. By employing this technique, we
address the dual challenge of preserving user privacy and providing valuable insights into the
efficiency of online learning. Federated Learning empowers our system to train machine learning
models collaboratively across multiple user devices, eliminating the need to centralize sensitive
data on a single server. This ensures that individual user data, including screen recordings and
interactions, remains on their devices, preserving user privacy and complying with stringent data
protection regulations such as GDPR and HIPAA. This decentralized approach sets our solution
apart from traditional methods that risk privacy breaches and data security concerns.Our system's
classification capabilities are built upon deep learning models that analyze on-screen activities in
real-time. By considering various factors such as user interactions, screen content, and time
management patterns, our system can effectively differentiate between productive knowledge
development and unproductive behavior, such as distractions or disengagement. This information
empowers educators and institutions to take timely corrective actions, thereby enhancing the
overall effectiveness of online education. "Privacy-Preserving On-Screen Activity Tracking and
Classification in E-Learning Using Federated Learning" represents a groundbreaking
contribution to the field of e-learning monitoring. By integrating Federated Learning with
advanced classification models, we strike a delicate balance between user privacy and
educational effectiveness. This innovative approach enables educators to make informed
decisions, fosters student engagement, and ultimately ensures that time spent in e-learning
environments is optimized for knowledge development rather than wasted. As the landscape of

Web: www.takeoffprojects.com Phone: 08772261612


Email: info@takeoffprojects.com +91-9030333433
Domain: Application
Technology: Python

education continues to evolve, our system provides a robust foundation for privacy-preserving,
data-driven, and effective e-learning practices.

KEYWORDS: CNN, decision tree, linear discriminant analysis.

1. INTRODUCTION

1.1 Motivation:

In the digital age, safeguarding user privacy is paramount, especially in the realm of e-learning.
Our project, "Privacy-Preserving On-Screen Activity Tracking and Classification in E-learning
Using Federated Learning," aims to revolutionize educational technology by employing
federated learning. By prioritizing user privacy, we empower learners with a secure and
personalized educational experience. This innovative approach ensures that sensitive on-screen
activities are tracked and classified without compromising individual privacy, fostering a
trustworthy and adaptive e-learning environment for all.

1.2 Problem Statement:

The rise of e-learning platforms has created a need for monitoring user activities to distinguish
between productive engagement and time-wasting behavior. Traditional methods lack privacy
protection and may compromise sensitive user data. This project aims to tackle this problem by
employing Federated Learning techniques, which allow the classification of user activities
without compromising individual privacy.

1.3 Objective of the Project:

The main objective of this project is to develop a privacy-preserving system that leverages
Federated Learning to track and classify on-screen activities in e-learning environments
accurately. Specifically, it aims to:

 Monitor user interactions with e-learning content.


 Classify activities into knowledge development or time-wasting categories.

Web: www.takeoffprojects.com Phone: 08772261612


Email: info@takeoffprojects.com +91-9030333433
Domain: Application
Technology: Python

 Protect user privacy by employing Federated Learning techniques.


 Provide valuable insights to educational institutions for optimizing online learning
experiences.

1.4 Scope:

This project's scope encompasses the development of a privacy-preserving system for on-screen
activity tracking and classification in e-learning environments. It targets students and users of
online learning platforms. The system employs Federated Learning to ensure data privacy while
assessing user engagement. It aims to differentiate between productive learning and time-wasting
activities, ultimately providing insights to enhance e-learning experiences.

1.5 Project Introduction:

In the dynamic landscape of e-learning, the demand for personalized and adaptive learning
experiences has grown exponentially. As educational platforms incorporate sophisticated
technologies to enhance user engagement and tailor content delivery, concerns about user
privacy have become increasingly prominent. Traditional on-screen activity tracking methods
often compromise user privacy, raising ethical and legal issues. This project introduces a
groundbreaking solution — Privacy-Preserving On-Screen Activity Tracking and Classification
in E-Learning using Federated Learning. The primary goal of this project is to develop a robust
system that seamlessly integrates on-screen activity tracking and classification mechanisms into
e-learning platforms while prioritizing user privacy through the implementation of federated
learning. Federated learning is a decentralized machine learning approach that enables model
training across multiple devices or servers without exchanging raw data. By adopting this
paradigm, our system ensures that sensitive user information remains localized and secure on
individual devices.

The proposed system leverages advanced machine learning algorithms to analyze on-screen
activities, including mouse movements, keyboard inputs, and other relevant metrics, to
understand user engagement and learning patterns. Through federated learning, these algorithms
are trained collectively without exposing individual data points, preserving the privacy of each
learner. This innovative approach not only enhances the adaptability of e-learning content but
Web: www.takeoffprojects.com Phone: 08772261612
Email: info@takeoffprojects.com +91-9030333433
Domain: Application
Technology: Python

also addresses the critical concerns surrounding data privacy in educational technology. The
project aims to contribute to the broader discourse on the responsible integration of technology in
education by providing a privacy-centric solution for on-screen activity tracking. In doing so, it
seeks to strike a balance between the benefits of personalized learning experiences and the
imperative to protect user privacy. As the educational landscape continues to evolve, this
research initiative holds the promise of shaping the future of e-learning, making it more secure,
adaptive, and respectful of individual privacy.

Web: www.takeoffprojects.com Phone: 08772261612


Email: info@takeoffprojects.com +91-9030333433
Domain: Application
Technology: Python

2. LITERATURE SURVEY

2.1 Related Work:

[1] M. Xu, J. M. David, and S. H. Kim, ‘‘The fourth industrial revolution: Opportunities
and challenges,’’ Int. J. Financial Res., vol. 9, no. 2, pp. 90–95, 2018.
The article by M. Xu, J. M. David, and S. H. Kim explores the opportunities and challenges
associated with the fourth industrial revolution (4IR). Published in the International Journal of
Financial Research in 2018, the authors delve into the transformative impact of emerging
technologies on various industries. They discuss the potential advantages of the 4IR, such as
increased efficiency and innovation, while also acknowledging the challenges, including
concerns related to job displacement and ethical considerations. The literature survey highlights
the complex landscape of the 4IR, offering insights into the multifaceted implications of
technological advancements on the financial domain and beyond.

[2] J. Goet, ‘‘Impact of social media on academic performance of students,’’ KIC Int. J.
Social Sci. Manage., vol. 1, no. 1, pp. 35–42, Dec. 2022.

The study conducted by J. Goet investigates the influence of social media on students' academic
performance. Published in the KIC International Journal of Social Sciences and Management in
December 2022, the research explores the complex relationship between social media usage and
academic outcomes. Goet delves into the potential impacts of social media on students,
examining factors such as time management, distractions, and information assimilation. The
findings contribute to the ongoing discourse on the intersection of technology and education,
offering insights into the challenges and opportunities posed by social media in the academic
context. This research serves as a valuable resource for educators, policymakers, and researchers
seeking a nuanced understanding of the implications of social media on student learning.

[2] Alberto, T. C., Lochter, J. V., & Almeida, T. A. (2015, December). Tubespam: Comment spam
filtering on youtube. In Machine Learning and Applications (ICMLA), 2015 IEEE 14th International

Web: www.takeoffprojects.com Phone: 08772261612


Email: info@takeoffprojects.com +91-9030333433
Domain: Application
Technology: Python

The profitability
Conference on (pp. 138-143). IEEE. In this paper,

promoted by Google in its brand


new video distribution platform YouTube
has attracted an
increasing number of users. However, such
success has also
attracted malicious users, which aim to
self-promote their videos
or disseminate viruses and malwares.
Since YouTube offers
limited tools for comment moderation, the
spam volume is
shockingly increasing which lead owners
of famous channels to
disable the comments section in their
videos. Automatic comment
spam filtering on YouTube is a challenge
even for established
classification methods, since the messages
are very short and
Web: www.takeoffprojects.com Phone: 08772261612
Email: info@takeoffprojects.com +91-9030333433
Domain: Application
Technology: Python

often rife with slangs, symbols and


abbreviations. In this work, we
have evaluated several top-performance
classification techniques
for such purpose. The statistical analysis of
results indicate that,
with 99.9% of confidence level, decision
trees, logistic regression,
Bernoulli Na¨
ıve Bayes, random forests, linear and
Gaussian SVMs
are statistically equivalent. Based on this,
we have also offered
the TubeSpam
[3] S. I. U. Rehman, H. S. Ullah, and A. Akhtar, ‘‘Consumption of social media and
academic performance: A cross-sectional survey of perception of students in KP
universities,’’ Global Mass Commun. Rev., vol. 5, no. 4, pp. 57–71, Dec. 2020
The research conducted by S. I. U. Rehman, H. S. Ullah, and A. Akhtar explores the relationship
between social media consumption and academic performance through a cross-sectional survey
of students in universities in Khyber Pakhtunkhwa (KP), Pakistan. Published in the Global Mass
Communication Review in December 2020, the study investigates students' perceptions
regarding the impact of social media use on their academic achievements. The findings provide
insights into the complex dynamics between social media engagement and academic
performance, offering a valuable perspective for educators, policymakers, and researchers
Web: www.takeoffprojects.com Phone: 08772261612
Email: info@takeoffprojects.com +91-9030333433
Domain: Application
Technology: Python

interested in understanding the challenges and opportunities associated with the intersection of
students' digital lives and academic success.

[4] C. Li and F. Lalani, The COVID-19 Pandemic has Changed Education Forever. This is
How, vol. 29. Geneva, Switzerland: World Economic Forum, 2020

In their seminal work, "The COVID-19 Pandemic has Changed Education Forever. This is
How," C. Li and F. Lalani underscore the transformative impact of the global pandemic on
education. Published in the World Economic Forum's volume 29, the authors delve into the
profound shifts induced by the pandemic in educational paradigms. They explore the accelerated
adoption of digital learning tools, the challenges posed to traditional classroom structures, and
the emergence of remote and hybrid learning models. The literature survey highlights the
pandemic's lasting imprint on education, emphasizing the imperative for innovative solutions and
adaptive strategies to navigate the evolving landscape shaped by unprecedented disruptions.

[5] A. Aristovnik, D. Keržič, D. Ravšelj, N. Tomaževič, and L. Umek, ‘‘Impacts of the


COVID-19 pandemic on life of higher education students: A global perspective,’’
Sustainability, vol. 12, no. 20, p. 8438, Oct. 2020.

The cited literature by A. Aristovnik et al. (2020) explores the global repercussions of the
COVID-19 pandemic on higher education students. The study delves into the multifaceted
impacts, shedding light on the challenges faced by students worldwide. It scrutinizes the
transformative effects on academic, social, and psychological aspects, offering a comprehensive
understanding of the pandemic's profound influence. The research emphasizes the need for
adaptable educational strategies and support systems to mitigate the adverse effects on students'
lives. By providing a global perspective, the study contributes valuable insights for
policymakers, educators, and institutions grappling with the unprecedented challenges posed by
the pandemic in sustaining a resilient and effective higher education environment.

[6] I. E. Allen and J. Seaman, ‘‘Digital learning compass: Distance education enrollment
report,’’ Babson Survey Res. Group, Wellesley, MA, USA, Tech. Rep. 2017-1, 2017.
Web: www.takeoffprojects.com Phone: 08772261612
Email: info@takeoffprojects.com +91-9030333433
Domain: Application
Technology: Python

The literature survey conducted by I. E. Allen and J. Seaman, titled "Digital Learning Compass:
Distance Education Enrollment Report," published by the Babson Survey Research Group in
2017, provides a comprehensive analysis of distance education enrollment trends. The report
offers insights into the evolving landscape of digital learning, highlighting the increasing
prevalence of online education. It explores factors influencing enrollment, such as institutional
policies, student demographics, and emerging technologies. The findings contribute valuable
data for understanding the dynamics of distance education, aiding educators, policymakers, and
institutions in adapting to the changing educational paradigm. This research serves as a crucial
resource for stakeholders seeking to navigate and optimize digital learning environments.

3. SYSTEM ANALYSIS

3.1 Existing Method:

The existing method for on-screen activity classification relies on Stochastic Gradient Descent
(SGD), a widely used optimization algorithm in machine learning. However, while SGD has
been effective in various applications, it presents several limitations when applied to the task of
on-screen activity classification in e-learning environments.

3.2 Disadvantages:

Web: www.takeoffprojects.com Phone: 08772261612


Email: info@takeoffprojects.com +91-9030333433
Domain: Application
Technology: Python

Privacy Concerns: SGD requires centralized data, posing a significant privacy risk as user data
is stored and processed on a central server.

Scalability Issues: It may not scale well for large-scale e-learning platforms with numerous
users and diverse activities.

Data Imbalance: SGD may struggle to handle imbalanced datasets, affecting the accuracy of
classification.

3.3 PROPOSED METHOD


Our proposed system harnesses the power of three advanced machine learning techniques:
Convolutional Neural Networks (CNN), Decision Trees, and Linear Discriminant Analysis
(LDA) for the purpose of on-screen activity classification. This ensemble of methods brings a
multi-faceted approach to the task, ensuring accurate and comprehensive analysis of user
behavior during e-learning sessions.

3.4 Advantages:

Privacy-Preserving: Federated Learning ensures that user data remains on local devices,
preserving individual privacy.

Accuracy: CNN excels at feature extraction from on-screen activities, while Decision Trees and
Linear Discriminant Analysis enhance classification accuracy.

Scalability: The combination of these algorithms allows the system to scale effectively,
accommodating a large number of users and diverse learning activities.

3.5 work Flow of Proposed system

Web: www.takeoffprojects.com Phone: 08772261612


Email: info@takeoffprojects.com +91-9030333433
Domain: Application
Technology: Python

4. REQUIREMENT ANALYSIS

4.1 Functional and non-functional requirements

Requirement’s analysis is very critical process that enables the success of a system or software
project to be assessed. Requirements are generally split into two types: Functional and non-
functional requirements.

Web: www.takeoffprojects.com Phone: 08772261612


Email: info@takeoffprojects.com +91-9030333433
Domain: Application
Technology: Python

Functional Requirements: These are the requirements that the end user specifically
demands as basic facilities that the system should offer. All these functionalities need to be
necessarily incorporated into the system as a part of the contract. These are represented or
stated in the form of input to be given to the system, the operation performed and the output
expected. They are basically the requirements stated by the user which one can see directly in
the final product, unlike the non-functional requirements.
Examples of functional requirements:
1) Authentication of user whenever he/she logs into the system
2) System shutdown in Medical Insurance Cost.
3) A verification email is sent to user whenever he/she register for the first time on some
software system.
Non-functional requirements: These are basically the quality constraints that the
system must satisfy according to the project contract. The priority or extent to which these
factors are implemented varies from one project to other. They are also called non-behavioral
requirements.
They basically deal with issues like:
 Portability
 Security
 Maintainability
 Reliability
 Scalability
 Performance
 Reusability
 Flexibility
Examples of non-functional requirements:
1) Emails should be sent with a latency of no greater than 12 hours from such an activity.
2) The processing of each request should be done within 10 seconds
3) The site should load in 3 seconds whenever of simultaneous users are > 10000
4.2 Hardware Requirements
Processor - I3/Intel Processor
Hard Disk - 160GB
Web: www.takeoffprojects.com Phone: 08772261612
Email: info@takeoffprojects.com +91-9030333433
Domain: Application
Technology: Python

Key Board - Standard Windows Keyboard


Mouse - Two or Three Button Mouse
Monitor - SVGA
RAM - 8GB
4.3 Software Requirements:

Operating System : Windows 7/8/10


Server side Script : HTML, CSS, Bootstrap & JS
Programming Language : Python
Libraries : Flask, Pandas, Mysql.connector, Os, Smtplib, Numpy
IDE/Workbench : PyCharm
Technology : Python 3.6+
Server Deployment : Xampp Server
Database : MySQL

4.4 Architecture:

Web: www.takeoffprojects.com Phone: 08772261612


Email: info@takeoffprojects.com +91-9030333433
Domain: Application
Technology: Python

5. SYSTEM DESIGN

5.1 Introduction of Input Design:

In an information system, input is the raw data that is processed to produce output. During the
input design, the developers must consider the input devices such as PC, MICR, OMR, etc.

Therefore, the quality of system input determines the quality of system output. Well-designed
input forms and screens have following properties −

 It should serve specific purpose effectively such as storing, recording, and retrieving the
information.
 It ensures proper completion with accuracy.
 It should be easy to fill and straightforward.
 It should focus on user’s attention, consistency, and simplicity.

Web: www.takeoffprojects.com Phone: 08772261612


Email: info@takeoffprojects.com +91-9030333433
Domain: Application
Technology: Python

 All these objectives are obtained using the knowledge of basic design principles
regarding −
o What are the inputs needed for the system?
o How end users respond to different elements of forms and screens.

Objectives for Input Design:

The objectives of input design are −

 To design data entry and input procedures


 To reduce input volume
 To design source documents for data capture or devise other data capture methods
 To design input data records, data entry screens, user interface screens, etc.
 To use validation checks and develop effective input controls.

Output Design:

The design of output is the most important task of any system. During output design, developers
identify the type of outputs needed, and consider the necessary output controls and prototype
report layouts.

Objectives of Output Design:

The objectives of input design are:

 To develop output design that serves the intended purpose and eliminates the production
of unwanted output.
 To develop the output design that meets the end user’s requirements.
 To deliver the appropriate quantity of output.
 To form the output in appropriate format and direct it to the right person.
 To make the output available on time for making good decisions.

5.2 UML Diagrams:

Web: www.takeoffprojects.com Phone: 08772261612


Email: info@takeoffprojects.com +91-9030333433
Domain: Application
Technology: Python

UML stands for Unified Modelling Language. UML is a standardized general-purpose


modelling language in the field of object-oriented software engineering. The standard is
managed, and was created by, the Object Management Group.
The goal is for UML to become a common language for creating models of object-
oriented computer software. In its current form UML is comprised of two major components: a
Meta-model and a notation. In the future, some form of method or process may also be added to;
or associated with, UML.
The Unified Modelling Language is a standard language for specifying, Visualization,
Constructing and documenting the artifacts of software system, as well as for business modelling
and other non-software systems.
The UML represents a collection of best engineering practices that have proven
successful in the modelling of large and complex systems.
The UML is a very important part of developing objects-oriented software and the
software development process. The UML uses mostly graphical notations to express the design
of software projects.

GOALS:
The Primary goals in the design of the UML are as follows:
1. Provide users a ready-to-use, expressive visual modelling Language so that they can
develop and exchange meaningful models.
2. Provide extendibility and specialization mechanisms to extend the core concepts.
3. Be independent of particular programming languages and development process.
4. Provide a formal basis for understanding the modelling language.
5. Encourage the growth of OO tools market.
6. Support higher level development concepts such as collaborations, frameworks, patterns
and components.
7. Integrate best practices.

Web: www.takeoffprojects.com Phone: 08772261612


Email: info@takeoffprojects.com +91-9030333433
Domain: Application
Technology: Python

5.3 USE CASE DIAGRAM

 A use case diagram in the Unified Modeling Language (UML) is a type of behavioral
diagram defined by and created from a Use-case analysis.

 Its purpose is to present a graphical overview of the functionality provided by a system in


terms of actors, their goals (represented as use cases), and any dependencies between
those use cases.

 The main purpose of a use case diagram is to show what system functions are performed
for which actor. Roles of the actors in the system can be depicted.

Web: www.takeoffprojects.com Phone: 08772261612


Email: info@takeoffprojects.com +91-9030333433
Domain: Application
Technology: Python

CLASS DIAGRAM

In software engineering, a class diagram in the Unified Modeling Language (UML) is a type of
static structure diagram that describes the structure of a system by showing the system's classes,
their attributes, operations (or methods), and the relationships among the classes. It explains
which class contains information

SEQUENCE DIAGRAM

 A sequence diagram in Unified Modeling Language (UML) is a kind of interaction


diagram that shows how processes operate with one another and in what order.

 It is a construct of a Message Sequence Chart. Sequence diagrams are sometimes called


event diagrams, event scenarios, and timing diagrams

Web: www.takeoffprojects.com Phone: 08772261612


Email: info@takeoffprojects.com +91-9030333433
Domain: Application
Technology: Python

COLLABORATION DIAGRAM:

In collaboration diagram the method call sequence is indicated by some numbering technique as
shown below. The number indicates how the methods are called one after another. We have
taken the same order management system to describe the collaboration diagram. The method
calls are similar to that of a sequence diagram. But the difference is that the sequence diagram
does not describe the object organization whereas the collaboration diagram shows the object
organization.

Web: www.takeoffprojects.com Phone: 08772261612


Email: info@takeoffprojects.com +91-9030333433
Domain: Application
Technology: Python

DEPLOYMENT DIAGRAM

Deployment diagram represents the deployment view of a system. It is related to the component
diagram. Because the components are deployed using the deployment diagrams. A deployment
diagram consists of nodes. Nodes are nothing but physical hardware’s used to deploy the
application.

ACTIVITY DIAGRAM:

Activity diagrams are graphical representations of workflows of stepwise activities and actions
with support for choice, iteration and concurrency. In the Unified Modeling Language, activity
diagrams can be used to describe the business and operational step-by-step workflows of
components in a system. An activity diagram shows the overall flow of control.

Web: www.takeoffprojects.com Phone: 08772261612


Email: info@takeoffprojects.com +91-9030333433
Domain: Application
Technology: Python

COMPONENT DIAGRAM:

A component diagram, also known as a UML component diagram, describes the organization
and wiring of the physical components in a system. Component diagrams are often drawn to help
model implementation details and double-check that every aspect of the system's required
function is covered by planned development.

Web: www.takeoffprojects.com Phone: 08772261612


Email: info@takeoffprojects.com +91-9030333433
Domain: Application
Technology: Python

ER DIAGRAM:

An Entity–relationship model (ER model) describes the structure of a database with the help of a
diagram, which is known as Entity Relationship Diagram (ER Diagram). An ER model is a
design or blueprint of a database that can later be implemented as a database. The main
components of E-R model are: entity set and relationship set.

An ER diagram shows the relationship among entity sets. An entity set is a group of similar
entities and these entities can have attributes. In terms of DBMS, an entity is a table or attribute
of a table in database, so by showing relationship among tables and their attributes, ER diagram
shows the complete logical structure of a database. Let’s have a look at a simple ER diagram to
understand this concept.

DFD DIAGRAM:

A Data Flow Diagram (DFD) is a traditional way to visualize the information flows within a
system. A neat and clear DFD can depict a good amount of the system requirements graphically.
It can be manual, automated, or a combination of both. It shows how information enters and

Web: www.takeoffprojects.com Phone: 08772261612


Email: info@takeoffprojects.com +91-9030333433
Domain: Application
Technology: Python

leaves the system, what changes the information and where information is stored. The purpose of
a DFD is to show the scope and boundaries of a system as a whole. It may be used as a
communications tool between a systems analyst and any person who plays a part in the system
that acts as the starting point for redesigning a system.

Contrast Level:

Level 1:

Web: www.takeoffprojects.com Phone: 08772261612


Email: info@takeoffprojects.com +91-9030333433
Domain: Application
Technology: Python

Web: www.takeoffprojects.com Phone: 08772261612


Email: info@takeoffprojects.com +91-9030333433
Domain: Application
Technology: Python

Level 2:

Web: www.takeoffprojects.com Phone: 08772261612


Email: info@takeoffprojects.com +91-9030333433
Domain: Application
Technology: Python

6. IMPLEMENTATION AND RESULTS

User:
1. Data Upload Module: Users can securely upload their e-learning activity data to the system
for analysis and classification, ensuring their privacy.
2. Data Preprocessing Module: Users' data is cleaned, anonymized and features are extracted,
safeguarding their personal information while enhancing classification accuracy.
3. Algorithm Implementation Module: Users benefit from the system's advanced machine
learning algorithms, including CNN, Decision Trees, and Linear Discriminant Analysis, which
classify their activities effectively, providing insights into their learning habits.
4. Model Evaluation Module: Users can assess the performance and accuracy of the
classification models, gaining a deeper understanding of the system's effectiveness.
5. Prediction Module: Users receive predictions about their engagement levels in e-learning,
helping them understand whether they are effectively utilizing their time or potentially wasting
it, ultimately improving their learning experience.
For System:
1. Data Upload Module: This module securely collects user-generated data from various e-
learning platforms and stores it for further processing within the system.
2. Data Preprocessing Module: Data is processed by cleaning it, removing personally
identifiable information, and extracting relevant features, ensuring data quality for subsequent
classification.
3. Algorithm Implementation Module: The system deploys state-of-the-art machine learning
algorithms like CNN, Decision Trees, and Linear Discriminant Analysis to classify user
activities based on preprocessed data, ensuring accurate categorization.
4. Model Evaluation Module: This module rigorously evaluates the accuracy and effectiveness
of the classification models, ensuring the reliability of the system's predictions.
5. Prediction Module: Based on classified activities, this module predicts user engagement
levels, providing valuable insights for educational institutions and administrators to optimize e-
learning experiences and resource allocation.

Web: www.takeoffprojects.com Phone: 08772261612


Email: info@takeoffprojects.com +91-9030333433
Domain: Application
Technology: Python

ALGORITHMS

Decision Tree: A decision tree classifier is a popular machine learning algorithm used for both
classification and regression tasks. It operates by recursively partitioning the input data into
subsets based on the most influential features, creating a tree-like structure of decision nodes.
Each node represents a decision based on a specific feature, leading to a sequence of decisions
that culminate in a final prediction or classification. Decision trees are interpretable, easy to
visualize, and effective in capturing complex relationships within the data. They are widely
employed in diverse fields for their ability to handle both categorical and numerical data, making
them a versatile tool in predictive modeling.

Linear Discriminant Analysis: Linear Discriminant Analysis (LDA) is a dimensionality


reduction and classification technique. The workflow involves calculating class-specific means
and scatter matrices for input features. It aims to maximize the distance between class means
while minimizing the spread within each class. Next, it computes the eigenvalues and
eigenvectors of the generalized eigenvalue problem derived from the scatter matrices. The
eigenvectors corresponding to the largest eigenvalues form the basis for the subspace, where the
data is projected. Finally, the data is transformed into this lower-dimensional space, optimizing
discrimination between classes while preserving relevant information for effective classification
tasks.

CNN: Convolutional Neural Networks (CNNs) are a class of deep learning algorithms designed
for image and pattern recognition. Inspired by the visual processing in the human brain, CNNs
excel in extracting hierarchical features from input data. Comprising convolutional layers,
pooling layers, and fully connected layers, CNNs automatically learn spatial hierarchies of
features, enabling them to recognize complex patterns and structures in images. Widely
employed in computer vision tasks, such as image classification and object detection, CNNs
have revolutionized fields like image processing and have applications in various domains,
including healthcare, autonomous vehicles, and facial recognition technology.

Web: www.takeoffprojects.com Phone: 08772261612


Email: info@takeoffprojects.com +91-9030333433
Domain: Application
Technology: Python

6.2 Output Screens

Home: This Is PRIVACY-PRESERVING Home Page.

Login page: Here the user will login with his credentials.

Web: www.takeoffprojects.com Phone: 08772261612


Email: info@takeoffprojects.com +91-9030333433
Domain: Application
Technology: Python

Register Page: User need register with his/her credentials.

View data: User can view the PRIVACY-PRESERVING dataset.

Web: www.takeoffprojects.com Phone: 08772261612


Email: info@takeoffprojects.com +91-9030333433
Domain: Application
Technology: Python

Model Selection: Here we are selecting model for training/testing based on dataset.

Web: www.takeoffprojects.com Phone: 08772261612


Email: info@takeoffprojects.com +91-9030333433
Domain: Application
Technology: Python

Prediction: User need to enter input based on selecting model, it will predict whether it
Knowledge Development or not.

7. SYSTEM STUDY AND TESTING

7.1 System Testing


The purpose of testing is to discover errors. Testing is the process of trying to discover every
conceivable fault or weakness in a work product. It provides a way to check the functionality of
components, sub-assemblies, assemblies and/or a finished product It is the process of exercising
software with the intent of ensuring that the

Software system meets its requirements and user expectations and does not fail in an
unacceptable manner. There are various types of test. Each test type addresses a specific testing
requirement.

7.2 Types of Tests

7.2.1 Unit testing


Unit testing involves the design of test cases that validate that the internal program logic is
functioning properly, and that program inputs produce valid outputs. All decision branches and

Web: www.takeoffprojects.com Phone: 08772261612


Email: info@takeoffprojects.com +91-9030333433
Domain: Application
Technology: Python

internal code flow should be validated. It is the testing of individual software units of the
application .it is done after the completion of an individual unit before integration. This is a
structural testing, that relies on knowledge of its construction and is invasive. Unit tests perform
basic tests at component level and test a specific business process, application, and/or system
configuration. Unit tests ensure that each unique path of a business process performs accurately
to the documented specifications and contains clearly defined inputs and expected results.

7.2.2 Integration testing

Integration tests are designed to test integrated software components to determine if they actually
run as one program. Testing is event driven and is more concerned with the basic outcome of
screens or fields. Integration tests demonstrate that although the components were individually
satisfaction, as shown by successfully unit testing, the combination of components is correct and
consistent. Integration testing is specifically aimed at exposing the problems that arise from the
combination of components.

Software integration testing is the incremental integration testing of two or more integrated
software components on a single platform to produce failures caused by interface defects.

The task of the integration test is to check that components or software applications, e.g.
components in a software system or – one step up – software applications at the company level –
interact without error.

Test Results: All the test cases mentioned above passed successfully. No defects encountered.

Acceptance Testing

User Acceptance Testing is a critical phase of any project and requires significant participation
by the end user. It also ensures that the system meets the functional requirements.

Test Results: All the test cases mentioned above passed successfully. No defects encountered.

Web: www.takeoffprojects.com Phone: 08772261612


Email: info@takeoffprojects.com +91-9030333433
Domain: Application
Technology: Python

7.2.3 Functional testing

Functional tests provide systematic demonstrations that functions tested are available as
specified by the business and technical requirements, system documentation, and user manuals.

Functional testing is centered on the following items:

Valid Input : identified classes of valid input must be accepted.

Invalid Input : identified classes of invalid input must be rejected.

Functions : identified functions must be exercised.

Output : identified classes of application outputs must be exercised.

Systems/Procedures: interfacing systems or procedures must be invoked.

Organization and preparation of functional tests is focused on requirements, key functions, or


special test cases. In addition, systematic coverage pertaining to identify Business process flows;
data fields, predefined processes, and successive processes must be considered for testing.
Before functional testing is complete, additional tests are identified and the effective value of
current tests is determined.

7.2.4 White Box Testing

White Box Testing is a testing in which in which the software tester has knowledge of the inner
workings, structure and language of the software, or at least its purpose. It is purpose. It is used
to test areas that cannot be reached from a black box level.

7.2.5 Black Box Testing

Black Box Testing is testing the software without any knowledge of the inner workings, structure
or language of the module being tested. Black box tests, as most other kinds of tests, must be
written from a definitive source document, such as specification or requirements document, such
as specification or requirements document. It is a testing in which the software under test is

Web: www.takeoffprojects.com Phone: 08772261612


Email: info@takeoffprojects.com +91-9030333433
Domain: Application
Technology: Python

treated, as a black box. you cannot “see” into it. The test provides inputs and responds to outputs
without considering how the software works.

Test objectives

 All field entries must work properly.

 Pages must be activated from the identified link.

 The entry screen, messages and responses must not be delayed.

Features to be tested

 Verify that the entries are of the correct format

 No duplicate entries should be allowed

 All links should take the user to the correct page.


 TEST CASES:

Input Output Result


Input Tested for whether the Success
network is attacked or safe

 Test cases Model building:


S.NO Test cases I/O Expected Actual O/T P/F
O/T
1 Read the Dataset path. Dataset need Dataset P
dataset. to read fetched
successfully. successfully.
2 Performing Pre- Pre- Pre- P
pre- processing processing processing
processing on part takes should be successfully
the dataset place performed on completed.
dataset

Web: www.takeoffprojects.com Phone: 08772261612


Email: info@takeoffprojects.com +91-9030333433
Domain: Application
Technology: Python

3 Model Model Need to Model P


Building Building for create model Created
the clean data using ML Successfully.
algorithm
4 Training Input fields Output Model P
provided. should be classified as
whether Knowledge
Knowledge Development
Development
5 Prediction Input fields Output Model P
provided. should be classified
whether Knowledge
Knowledge Development
Development
or not.

8.CONCLUSION

In conclusion, the implementation of privacy-preserving on-screen activity tracking and


classification in e-learning through federated learning represents a significant stride towards
addressing the delicate balance between data analytics and user privacy. This innovative
approach not only ensures the confidentiality of users' sensitive information but also fosters a
secure and trustworthy e-learning environment. By leveraging federated learning, the model
learns and improves without compromising the individual user's data, thereby mitigating privacy
concerns that often accompany traditional centralized tracking systems. The adoption of this
methodology contributes to the advancement of personalized learning experiences while
upholding the principles of user privacy, paving the way for a more ethical and sustainable

Web: www.takeoffprojects.com Phone: 08772261612


Email: info@takeoffprojects.com +91-9030333433
Domain: Application
Technology: Python

integration of technology in education. As technology continues to play a pivotal role in shaping


the future of e-learning, this privacy-preserving framework offers a promising foundation for
responsible and effective educational analytics.

9. FUTURE ENHANCEMENT

Future enhancements for privacy-preserving on-screen activity tracking and classification in e-


learning using federated learning could include refining model accuracy through advanced
machine learning algorithms. Integrate differential privacy techniques to ensure individual user
data remains confidential while still contributing to the overall model's improvement. Implement
adaptive learning mechanisms to tailor the tracking and classification models to individual user
preferences, enhancing personalized learning experiences without compromising privacy.
Explore the integration of multi-modal data sources, such as incorporating eye-tracking or
sentiment analysis, to provide a more comprehensive understanding of user engagement.
Additionally, research on optimizing federated learning protocols to reduce communication
overhead and enhance scalability for large-scale e-learning platforms, ensuring efficient and
secure collaboration across diverse user environments.

10.REFERANCES

[1] M. Xu, J. M. David, and S. H. Kim, ‘‘The fourth industrial revolution: Opportunities and
challenges,’’ Int. J. Financial Res., vol. 9, no. 2, pp. 90–95, 2018.
[2] A. Sun and X. Chen, ‘‘Online education and its effective practice: A research review,’’ J. Inf.
Technol. Educ., Res., vol. 15, pp. 157–190, May 2016.
[3] I. E. Allen and J. Seaman, ‘‘Digital learning compass: Distance education enrollment
report,’’ Babson Survey Res. Group, Wellesley, MA, USA, Tech. Rep. 2017-1, 2017.

Web: www.takeoffprojects.com Phone: 08772261612


Email: info@takeoffprojects.com +91-9030333433
Domain: Application
Technology: Python

[4] S. I. U. Rehman, H. S. Ullah, and A. Akhtar, ‘‘Consumption of social media and academic
performance: A cross-sectional survey of perception of students in KP universities,’’ Global
Mass Commun. Rev., vol. 4, pp. 57–71, 2020.
[5] I. K. Sohail and N. A. Nabaz, ‘‘The influence of social media on student’s academic
performance: A case study of Lebanese French University,’’ Mod. Manag. Theory Pract., vol.
25, no. 2, pp. 117–127, 2019.
[6] J. Goet, ‘‘Impact of social media on academic performance of students,’’ KIC Int. J. Social
Sci. Manage., vol. 1, no. 1, pp. 35–42, Dec. 2022.
[7] S. I. U. Rehman, H. S. Ullah, and A. Akhtar, ‘‘Consumption of social media and academic
performance: A cross-sectional survey of perception of students in KP universities,’’ Global
Mass Commun. Rev., vol. 5, no. 4, pp. 57–71, Dec. 2020.
[8] C. Li and F. Lalani, The COVID-19 Pandemic has Changed Education Forever. This is How,
vol. 29. Geneva, Switzerland: World Economic Forum, 2020.
[9] A. Aristovnik, D. Keržič, D. Ravšelj, N. Tomaževič, and L. Umek, ‘‘Impacts of the COVID-
19 pandemic on life of higher education students: A global perspective,’’ Sustainability, vol. 12,
no. 20, p. 8438, Oct. 2020.
[10] M. Abadi, A. Chu, I. Goodfellow, H. B. McMahan, I. Mironov, K. Talwar, and L. Zhang,
‘‘Deep learning with differential privacy,’’ in Proc. ACM SIGSAC Conf

Web: www.takeoffprojects.com Phone: 08772261612


Email: info@takeoffprojects.com +91-9030333433

You might also like