Free Learning Analytics Methods and Systems
20170345109 · 2017-11-30
Inventors
Cpc classification
G09B7/00
PHYSICS
G09B5/12
PHYSICS
International classification
Abstract
This invention concerns methods and systems for monitoring one or more students' use of computers, measuring, analyzing, and summarizing in statistical and pedagogical ways learning quality, on-task versus off-taskness, making diagnostic and prescriptive recommendations, and displaying relevant and configurable results in real time and historically in meaningful ways to students, teachers, and various educationalists and managers.
Claims
1. A method for visualizing free learning analytics (FLA) data for one or more students, comprising: (a) on a student computer for each student for whom FLA data is to be visualized, an FLA application that directs (i) collection, and optionally storage, of raw activity data about the student's use of the computer, and (ii) transmission of the raw activity data to an FLA server; (b) an FLA server connected to each student computer, which FLA server is configured for pre-processing the student's raw activity data to generate pre-processed activity data, wherein pre-processed activity data is further processed by the FLA server to generate educationally meaningful FLA data; and (c) on the student computer and/or a third party computer, outputting for visualization at least a portion of the student's meaningful FLA data.
2. A method according to claim 1 that provides visualization of meaningful FLA data in real-time and/or historically for a plurality of students, wherein the output of a particular student's meaningful FLA data is optionally restricted to the particular student and accredited third parties, optionally her/his parent(s), educators, and school and/or district administrators.
3. A method according to claim 1 wherein the student computer is a personal computer, a tablet computer, or a smart phone.
4. A method according to claim 1 wherein the FLA application directs collection of raw activity data that reflects the totality of the student's use of her/his student computer.
5. A method according to claim 4 wherein the raw activity data comprises foreground application data about any foreground application utilized by the student when s/he uses her/his student computer, wherein the foreground application data optionally comprises at least one of foreground application name, foreground application process, and, if the foreground application process is a web browser, the URL and the URL's tab title displayed on the browser Tab, application active usage time, optionally application active usage time that exceeds two or more seconds, and idle time when no computer input is detected for a period of time e.g., from 5 seconds to 300 seconds.
6. A method according to claim 1 wherein the student's pre-processed activity data is processed by the FLA server from the students' raw activity data to generate educationally meaningful student activity data using a heuristic algorithm, wherein the heuristic algorithm optionally identifies foreground application name, foreground application process, and, if the foreground application process is a web browser, sequentially stripping from the accessed specific URL each terminal page resource string in order to identify the more generic and re-visited web page domain name, stored in a domain name database accessible by the FLA server, which more general web page domain name present in the domain name database is associated with a student activity.
7. A method according to claim 1 wherein the student's meaningful FLA data is graphically displayed on the student computer and/or a third party computer, optionally via a dashboard interface.
8. A computer system for analyzing free learning analytics (FLA) data for a plurality of students, comprising: (a) a plurality of student computers each having an FLA application that directs (i) collection, and optionally storage, of raw activity data about the particular student's use of the computer, and (ii) transmission of the student's raw activity data to an FLA server; (b) an FLA server capable of continuous or intermittent connection to each of the plurality of student computers, which FLA server is configured for pre-processing each student's raw activity data to generate pre-processed activity data for that student, wherein pre-processed activity data for that student is further processed by the FLA server to generate meaningful FLA data for that student; and (c) one or more output computers configured to output, optionally for visualization, at least a portion of the meaningful FLA data for at least one of the students, wherein the output computer(s) is(are) a student computer and/or a third party computer.
9. A computer system according to claim 8 that further provides for visualization of meaningful FLA data in real-time and/or historically, wherein the output of a particular student's meaningful FLA data is optionally restricted to the particular student and accredited third parties, optionally her/his parent(s), educators, and school and/or district administrators.
10. A computer system according to claim 8 wherein the student computer is a personal computer, a tablet computer, or a smart phone.
11. A computer system according to claim 8 wherein the FLA application directs collection of raw activity data that reflects the totality of the student's use of her/his student computer.
12. A computer system according to claim 11 wherein the raw activity data comprises foreground application data about any foreground application utilized by the student when s/he uses her/his student computer, wherein the foreground application data optionally comprises at least one of foreground application name, foreground application process, and, if the foreground application process is a web browser, the URL and the URL's tab title, application active usage time, optionally application active usage time that exceeds two or more seconds, and idle time.
13. A computer system according to claim 8 wherein the student's pre-processed activity data is processed by the FLA server from the students' raw activity data to generate meaningful student activity data using a heuristic algorithm, wherein the heuristic algorithm optionally identifies foreground application name, foreground application process, and, if the foreground application process is a web browser, sequentially stripping from the accessed URL each then-terminal page resource string in order to identify a more generic web page domain name present in a domain name database accessible by the FLA server, which more general web page domain name present in the domain name database is associated with a student activity.
14. A computer system according to claim 8 wherein the student's meaningful FLA data is graphically displayed on the student computer and/or a third party computer, optionally via a dashboard interface.
15. A server computer, comprising: (a) a central processing unit (CPU) configured for continuous or intermittent connection to each of the plurality of student computers, which FLA server is further configured for pre-processing each student's raw activity data to generate pre-processed activity data for that student, wherein pre-processed activity data for that student is further processed by the FLA server to generate meaningful FLA data for that student; (b) a memory functionally associated with the CPU; and (c) a power supply.
16. A server computer according to claim 15 that is further configured to output meaningful FLA data for a student, which data is transmitted over a computer network that includes the server computer to a student computer and/or a third party computer for visualization of at least a portion of the student's meaningful FLA data.
17. A server computer according to claim 15 wherein the student's pre-processed activity data is processed by the server computer from a student' raw activity data to generate meaningful student activity data using a heuristic algorithm, wherein the heuristic algorithm optionally identifies foreground application name, foreground application process, and, if the foreground application process is a web browser, sequentially stripping from the accessed URL each then-terminal page resource string in order to identify a more general web page domain name present in a domain name database accessible by the FLA server, which more general web page domain name present in the domain name database is associated with a student activity.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0054] In this specification, reference will be made in detail to several embodiments that are illustrated in the accompanying drawings. In the drawings, the same reference numerals and corresponding descriptions are used to refer to the same apparatus elements and method steps. The drawings are in a simplified form, not to scale, and omit apparatus elements and method steps that can be added to the described systems and methods, while possibly including certain optional elements and steps.
[0055]
[0056]
[0057]
[0058]
[0059]
[0060]
[0061]
[0062]
[0063]
[0064]
[0065]
[0066]
[0067]
[0068]
[0069]
[0070]
[0071]
[0072]
[0073]
[0074]
[0075]
[0076]
[0077]
[0078]
DETAILED DESCRIPTION OF THE INVENTION
[0079] In the following detailed description, reference is made to the accompanying drawings (
Representative Embodiments
[0080] The following descriptions illustrate several preferred exemplary embodiments of the invention by reference to the accompanying drawings.
[0081]
[0082]
[0083]
[0084]
[0085]
[0086] As will be appreciated, where color-coding is mentioned as a visualization tool, any other suitable tool or visual aid can be employed to distinguish differences in the metric(s) being considered. For example, a metric may be represented as a geometric shape, the size of which may vary to reflect differences in metric over time, between students, etc. Also, the invention contemplates combining visualization tools (e.g., color-coding and differently sized geometric shapes for different metrics) in various embodiments.
[0087]
[0088]
[0089]
System Flow Charts
[0090]
[0091]
[0092] The student's activities on her/his computer, terminal, etc. are collected by an FLA application (120) resident on her/his computer, the mainframe connected to the terminal, etc. The FLA application (120) collects raw data related to the student's use of various other applications on her/his computer, for example, word processors, spreadsheets, presentation preparation applications, photo editors, web browsers, games, etc. In the case of web browsers, the FLA application (120) also collects the Internet domain(s) being accessed. The raw data may be collected and stored on the student's computer for later transmission (sharing), preferably via a public or other Internet (or other local or wide area network (LAN or WAN, respectively)) connection to a server computer on the network; alternatively, the FLA application (120) can direct the data's immediate transmission elsewhere across the network, as it is collected. As a representative example, the raw data can be transmitted via an Internet connection to a LearnMeter™ server in the cloud (90), where the data may be stored, for example, in a relational database (110), categorized from specific to generic activities using an activities categorization algorithm or engine (105), and analyzed into pedagogically meaningful FLA information, for example, by a collection (or toolbox) of heuristic LA algorithms (100).
[0093] Reports about the student's activities can be generated by the cloud-based server using the meaningful FLA data generated from the analyses performed by the heuristic FLA algorithms (100). If requested by an authorized user (e.g., the student's teacher), a report may be prepared and delivered across the network (e.g., the Internet) to the user's computer. Reports of various types can be generated, including standard, system-generated reports using standard forms and templates. If desired, the user may also generate custom reports having a general or specific format, for example, a standard format prepared by the service provider that makes the system available to the particular students and other authorized users (typically for a fee), which report format may, for example, be designed to minimize the cognitive load on the stakeholder (i.e., authorized user) (115) requesting or viewing the report. In an alternative embodiment, the system elements described as residing in the Cloud could be located on a server in the school or similar institution (for example, as part of a WAN hosted and maintained by a large institution, or group of institutions, for example, a school district with several schools, a university system, a large corporation, etc.).
[0094]
[0095] In some embodiments, the activities collection application detects and reports user actions, for example, typing and/or clipboard use for, for example, copying and pasting, which in some of these embodiments may be used to further qualify the educational value of particular activities carried out by the student. From this raw data, the activities collection application generates activity reports. Preferably, the activity reports are transmitted to the FLA server (in this example, the FLA server a Cloud-based server). The information in an activity report may then be categorized by a heuristic activities categorization algorithm (105) into a category, for example, of “learning”, “non-learning”, or “unknown” using a lookup table stored in a database (132) accessible by the FLA application running on the FLA server. The results may then be saved as particular activity events. The FLA application can also call on other databases, for example, a database (142) that contains data on specific assignments assigned by the student's teacher(s). That information may also be integrated with the student activities categorization to provide even more specific definition of the particular activity(ies) as activity event(s), which can be stored in an other database stored in database 142 to become Activity Events, stored in an activity events database (112). Data for the student from the activity events database can then be input to the LA toolbox algorithm/application.
[0096] The school can enter identifying data about the student manually, using transfer files, or by an automated process from data stored on the school's server. Such information may, for example, include, student-specific information (e.g., age, gender, class, parent(s) and/or guardian(s), etc.), the names of and other information about student's teacher(s), classroom rosters, assigned computer(s), internet resources for a particular academic subject, class and/or project name, and test results. Student identity may be optionally encrypted and decrypted on a school encryption server, so, for example, all information leaving the school is de-identified.
[0097] In preferred embodiments, the activities categories database (132) and other databases (e.g., the assignments database (142)) is routinely updated, manually or, preferably, by an automated process such as via an update engine (135).
[0098]
[0104] Now, by reference to
[0105] If an application is determined not to be an Internet browser or an internal computer processes, for example, by comparing (165) the application's name (or other identifier) to those listed in a lookup table, then the activity is deemed to be an active application and its name and its window title, if available, are recorded. If the application is determined to be an Internet browser, then the URL and the browser title of the foreground tab is recorded as the activity. In preferred embodiments, an important criterion for being deemed to be an active application is whether the user (i.e., student) is actively using the particular application. This is detected (155) by monitoring for user inputs such as keyboard use, mouse movement or clicks, screen touch (for devices that employ touchscreens), etc. This data is processed (170) with time averaging and, if no input is detected for a timeout period (or threshold) such as 60 seconds, but which could be any suitable value to indicate inactivity (e.g., from 5 seconds to 300 seconds), then a special “idle” flag is added to the activity (185).
[0106] An “activity report” containing activity descriptors as already listed (140) is assembled (190), and if no Internet or other network connection is then available, the activity report is stored locally until the Internet (or other network) connection becomes available, whereupon the activity report is transmitted, preferably securely (200) to the Cloud-based FLA server (205).
[0107]
[0108] With regard to activities that are URLs, in this embodiment each URL is stripped of its specific resource URI and its remaining domain name is attempted to be matched with activity domains in the categories database to identify the activity. If the domain name is new, it is visited by an automated “crawler” script (215) to retrieve the domain page title (225) and, preferably, any meta-tag information, which title and/or meta-tag information may be further analyzed for educational and/or other significance (235). The domain name may then be looked up in one of a number of proprietary, non-public or public website databases to determine the domain's general topic (210). The topic(s) thus identified can then be mapped onto an educational category via a lookup table (230) together with the domain name and tab title generate a new categorized reference computer activity (237) stored in the categories database (132).
[0109] In some embodiments, common computer activities characterized in the categories database (132) are periodically inspected by human experts (240) and manually categorized, if necessary. Teacher- or school-assigned resources (270) can be harvested for consistent categorization (265, 260), and together with moderated user-suggested or-requested categories (255, 250), can be used to override (245) categories in the categories database (132).
[0110]
[0111]
[0117] In this example, the activity-matching algorithm accepts as input data from an activity report (190). If the data corresponds to a URL, the URL is preferably first converted by algorithm to a more generic domain name, for example, by removing resource specifiers from the URL (290) and then attempting to match the resulting more generic domain name with the closest activity in activities database (132). If no match is found by this test (300), a new unknown activity (212) is assigned to the URL (and its genericized permutation(s)) and added to the activities database (132) as a yet unknown category, pending revision of further updating by an update method (135). Otherwise, activity educational categories for the URL (and its genericized permutation(s)) are defined (305, 315) by the system, and a new computer activity record is generated for storage in the activities database (132).
[0118]
[0119] An activity report's (325) educational category may be modified (330) according to the student's context data (335), which may include such student-specific information as student age, sex, class (e.g., 1.sup.st grade, 6.sup.th grade, etc.), parent(s)/guardian(s), country, state/province, county, city, school, school district, and may also be modified (340) according to school and teacher data, e.g., school, school district, teacher name, class/subject name, teacher-specified resources, etc., and may also include a specific category override to allow, for example, a teacher of the student to override or name the educational category for the particular activity. When an override function is provided, the system preferably tracks information related to any such override (e.g., date of override, source of override (e.g., identification information for the computer or other device from which the override was made), the information changed by the override, etc.) for subsequent review, if desired.
[0120]
[0121] Activities for the student may then be scored for higher-order thinking (for example, by using a higher order thinking analyzer (360). For instance, the system can distinguish between the student's use of a science simulation program versus her/his passively watching a video on her/his computer or other device. Also, in preferred embodiments, a student's Internet search skills, based on an automated analysis of search queries used, can be scored by, for example, an Internet searching analyzer (365).
[0122] In such embodiments, activities are parsed for blocks of study using an activity block finder (370), which, for example, can be determined from predominant learning activities weighted to 5-90 minute period windows and behavioral parameters of focus times and distractibility, as can be calculated from uninterrupted durations of learning activities and frequency of interruptions by non-learning activities, respectively. Patterns of block study and behavior therein can be combined into scores that reflect the student's self-regulation. Results from these various automated tools can then be summarized in a generalized high level skills set, for example the currently popular 21st Century Skills, assessment toolbox (380) for teachers and other authorized stakeholders (e.g., the particular student, her/his parent(s)/guardian(s), school administrators, school counselors, etc.). In a preferable implementation, student test results, uploaded from one or more schools, can then be correlated with the above indices, and correlations tested by interventional trials and prospective data collection to obtain validation by educational experts to iteratively improve and validate the design and implementation of such an LA algorithm toolbox.
[0123]
[0124]
[0125] As will be appreciated, it could often be advantageous to infer from a student's computer-related activities when s/he may have engaged in identifiable periods of relatively sustained learning-related activities. Such activities may correspond to classes during school hours, as well as to “doing homework” outside of school hours. To this end, in a representative example of an activity block finder algorithm (370), the activity block finder tool repeatedly parses the student's computer activity records (112), or, alternatively or in addition to parsing the generic activity group records for the student, over a defined time period of interest to identify long periods, for example, between 5 to 90 minutes, of maximum learning content. This may be accomplished, for example, by dividing the student's daily computer-related activities into 5-minute increments, summing the learning content score of each, plotting the smoothed (depending on time period of interest, e.g., ‘moving box car’ of 5) values on a timeline, and then finding the relative maxima above a threshold based on that student's history or on data labels to define study blocks.
[0126] In preferred some embodiments of this tool, the system can automatically adjust the periods used for parsing a student's activity records and to define periods that are useful in order to infer what activity(ies) a student has engaged in during a certain period of computer use. For example, when an FLA system according to the invention initially begins tracking a student's computer use, a predefined time period may be used, for example, to set the periods for periodic parsing of the student's computer activity records and/or the minimum length of time the student must have been engaged in a particular activity (actual or generic) in order for an activity block finder tool to identify it as such. Over time, the system may adjust these periods automatically based on results for the particular student, groups of similarly disposed students, etc.
[0127]
[0128]
[0129] Information literacy or finding of quality information on the Internet is a key 21st century skill. To this end, in a representative example of the Internet Searching Analyzer shown in
[0130]
[0131] Behavioral parameters are important in learning and are a reflection of the 21st century skills of self-governance and time management. In a preferred embodiment of this invention, heuristic algorithms are used to identify indices of learning behavioral, dispositional, self-regulating, and meta-cognitive aspects of the learning process, which may influence learning as shown in
[0132] Data Visualization Algorithms
[0133] Functions: [0134] Compartmentalizes data visibility to preserve privacy and acceptability of LA by students and teachers. Restrictions on: [0135] Between class student-identifiable Activities visible only to Students themselves. [0136] Class LA data optionally visible to only the teacher, and not his superiors or administrators, controlled by roles and privileges setup. [0137] De-identified aggregated data for between classes and for teachers, subjects and year grades visible to all stakeholders. [0138] Displays Live LA in classroom as feedback with traffic light simplicity and minimal input from teacher to minimize distraction from face-to-face teaching. [0139] Displays summary and historical LA data and analyses for previous lessons for teacher reflection. [0140] Displays results of LA analysis filterable for student, lesson, subject, teacher, year, school, etc. [0141] Allows download of raw data [0142] For Output screen layout, refer to Implementation above
[0143]
[0144]
[0145]
[0146]
[0147] Those skilled in the art will appreciate that in some embodiments of the invention, the functional modules of the Web implementation, as well as the personal and the integrated communication devices, may be implemented as pre-programmed hardware or firmware elements (e.g., application specific integrated circuits (ASICs), electrically erasable programmable read-only memories (EEPROMs), etc.), or other related components. Mobile communication devices that can use the present invention may include but are not limited to any of the “smart” phones or tablet computers equipped with digital displays, wireless communication connection capabilities such as iPhones and iPads available from Apple, Inc., as well as communication devices configured with the Android operating system available from Google, Inc. In addition, it is anticipated the new communication devices and operating systems will become available as more capable replacements of the forgoing listed communication devices, and these may use the present invention as well.
[0148] In other embodiments, the functional modules of the mobile-to-cloud implementation may be implemented by an arithmetic and logic unit (ALU) having access to a code memory that holds program instructions for the operation of the ALU. The program instructions could be stored on a medium which is fixed, tangible and readable directly by the processor, (e.g., removable diskette, CD-ROM, ROM, or fixed disk), or the program instructions could be stored remotely but transmittable to the processor via a modem or other interface device (e.g., a communications adapter) connected to a network over a transmission medium. The transmission medium may be either a tangible medium (e.g., optical or analog communications lines) or a medium implemented using wireless techniques (e.g., microwave, infrared or other transmission schemes).
[0149] The program instructions stored in the code memory can be compiled from a high level program written in a number of programming languages for use with many computer architectures or operating systems. For example, the high level program may be written in assembly language such as that suitable for use with a pixel shader, while other versions may be written in a procedural programming language (e.g., “C”) or an object oriented programming language (e.g., “C++” or “JAVA”).
[0150] In other embodiments, cloud computing may be implemented on a web hosted machine or a virtual machine. A web host can have anywhere from one to several thousand computers (machines) that run Web hosting software, such as Apache, OS X Server, or Windows Server. A virtual machine (VM) is an environment, usually a program or operating system, which does not physically exist but is created within another environment (e.g., Java runtime). In this context, a VM is called a “guest” while the environment it runs within is called a “host.” Virtual machines are often created to execute an instruction set different than that of the host environment. One host environment can often run multiple VMs at once.
[0151] As disclosed herein, features consistent with the present inventions may be implemented via computer-hardware, software and/or firmware. For example, the systems and methods disclosed herein may be embodied in various forms including, for example, a data processor, such as a computer that also includes a database, digital electronic circuitry, firmware, software, computer networks, servers, or in combinations of them. Further, while some of the disclosed implementations describe specific hardware components, systems and methods consistent with the innovations herein may be implemented with any combination of hardware, software and/or firmware. Moreover, the above-noted features and other aspects and principles of the innovations herein may be implemented in various environments. Such environments and related applications may be specially constructed for performing the various routines, processes and/or operations according to the invention or they may include a general-purpose computer or computing platform selectively activated or reconfigured by code to provide the necessary functionality. The processes disclosed herein are not inherently related to any particular computer, network, architecture, environment, or other apparatus, and may be implemented by a suitable combination of hardware, software, and/or firmware. For example, various general-purpose machines may be used with programs written in accordance with teachings of the invention, or it may be more convenient to construct a specialized apparatus or system to perform the required methods and techniques.
[0152] It should also be noted that the various logic and/or functions disclosed herein may be enabled using any number of combinations of hardware, firmware, and/or as data and/or instructions embodied in various machine-readable or computer-readable media, in terms of their behavioral, register transfer, logic component, and/or other characteristics. Computer-readable media in which such formatted data and/or instructions may be embodied include, but are not limited to, non-volatile storage media in various forms (e.g., optical, magnetic or semiconductor storage media) and carrier waves that may be used to transfer such formatted data and/or instructions through wireless, optical, or wired signaling media or any combination thereof. Examples of transfers of such formatted data and/or instructions by carrier waves include, but are not limited to, transfers (uploads, downloads, e-mail, etc.) over the Internet and/or other computer networks via one or more data transfer protocols (e.g., HTTP, FTP, SMTP, and so on).
[0153] Machine Learning
[0154] In certain embodiments of the invention, the back end systems that include various servers and/or data storage use various aspects of machine learning and analytics in order to make decisions regarding which student-related educational or learning information and data to use for performing FLA analyses. For example, the systems may utilize machine-learning protocols that are used to generate heuristics and predictions based on known properties learned from training data. The software and systems of the invention may implement supervised learning protocols, unsupervised learning, semi-supervised learning protocols, transduction protocols, etc. using example inputs and their desired outputs, given by a “teacher”, with the goal to learn a general rule that maps inputs to outputs.
[0155] A teacher may be a human domain expert who uses a decision-making system to determine outcomes given specific inputs. For example, in the casino gaming industry, human experts are used to plan a gaming layout based on varied inputs like expected clientele, location of in casino restaurants, casino entertainment and time of year. In this example, the inputs are too varied for a machine alone to make decisions so a teacher is needed to provide a base set of rules by which to begin making decisions. In an analogous way, the systems of the invention can be configured to dynamically generate the one or more analytics responsive to received student learning information associated with defined events (or other defined inputs) to classify student information using machine-learning protocols employing one or more classifiers. Non-limiting examples of classifiers include Bayesian networks, decision trees, Gaussian process classifiers, k-Nearest Neighbors (k-NN), LASSO, linear classifiers, logistic regression, multi-layer perceptron, Naive Bayes, radial basis function (RBF) networks, etc.
[0156] In some cases, machine learning operates on unlabeled examples, i.e., input where the desired output is unknown. In an example of such an instance, an objective may be to discover structure in the data, not to generalize mapping from inputs to outputs. Machine learning approaches can then be used to combine both labeled and unlabeled examples to generate an appropriate function or classifier for the event (or other input) and student learning data collected. Transduction and/or transductive inferences may be used to try to predict new outputs on specific and fixed (test) cases from observed, specific (training) cases.
[0157] Certain examples can be used to partition certain student learning information into the one or more information subsets using one or more machine-learning toolboxes. Non-limiting examples of machine-learning toolboxes include dlib kernels, efficient learning, large-scale inference, and optimization (Elefant), java-ml, kernel-based machine learning lab (kernlab), mlpy, Nieme, Orange (University of Ljubljana), pybrain (Python), pyML (Python), SciKit.Learn (Python), Shogun, torch7, Waikato Environment for Knowledge Analysis (Weka), and the like.
[0158] The system may partition student learning information into the one or more information subsets using a spectral learning protocol electronically determining a rate of deviation from threshold condition. The systems may be used to partition the student learning information into the one or more information subsets using one or more of built-in model selection strategies, classification, domain adaptation, image processing, large scale learning, multiclass classification, multitask learning, normalization, one class classification, parallelized code, performance measures, pre-processing, regression, semi-supervised learning, serialization, structured output learning, test framework, and/or visualization. Further, systems may be used to generate the one or more analytics responsive to received student learning information associated with the particular event (or other input) to partition the student learning information into the one or more information subsets using a clustering protocol and generate the one or more analytics responsive to received student learning information associated with, for example, a browser event related to student learning.
[0159] Unless the context clearly requires otherwise, throughout the description above and the appended claims, the words “comprise,” “comprising,” and the like are to be construed in an inclusive sense as opposed to an exclusive or exhaustive sense; that is to say, in a sense of “including, but not limited to.” Words using the singular or plural number also include the plural or singular number, respectively. Additionally, the words “herein,” “hereunder,” “above,” “below,” and words of similar import refer to this application as a whole and not to any particular portions of this application. When the word “or” is used in reference to a list of two or more items, that word covers all of the following interpretations of the word: any of the items in the list, all of the items in the list, and any combination of the items in the list
[0160] The foregoing description, for purpose of explanation, has been described with reference to specific embodiments. However, the illustrative discussions above are not intended to be exhaustive or to limit the invention to the precise forms disclosed. Many modifications and variations are possible in view of the above descriptions. The embodiments were chosen and described in order to best explain the principles of the invention and its practical applications to thereby enable others skilled in the art to best utilize the invention and various embodiments with various modifications as are suited to the particular use contemplated. As such, the invention extends to all functionally equivalent structures, methods, and uses, such as are within the scope of the appended claims, and it is intended that the invention be limited only to the extent required by the applicable rules of law.