Content of Educational Data Management in our journal

        Published in last 1 year |  In last 2 years |  In last 3 years |  All
    Please wait a minute...
    For Selected: Toggle Thumbnails
    Heterogeneous data generation tools for online education scenarios
    Wei ZHOU, Ke WANG, Huiqi HU
    Journal of East China Normal University(Natural Science)    2024, 2024 (5): 114-127.   DOI: 10.3969/j.issn.1000-5641.2024.05.011
    Abstract930)   HTML18)    PDF(pc) (795KB)(650)       Save

    In the digital education application domain, developers of platforms such as online classrooms face the challenges of privacy issues and existing datasets’ insufficient size in their pursuit of data-driven optimization. To address this, a set of heterogeneous data models adapted to the characteristics of education were constructed, and corresponding data generation tools (E-Tools) that can be used to simulate data interactions in complex educational scenarios were implemented. Experimental results have shown that the tool can maintain an efficient data generation speed (64–74 $ {\rm{MB}}\cdot {{\rm{s}}^{-1}} $) under a variety of data sizes, demonstrating good linear scaling ability, which validates the model’s effectiveness and the tool’s ability to generate larger data volumes. A heterogeneous data query load reflecting students’ learning behaviors was also designed to provide strong support for performance evaluation and the education platform’s optimization.

    Table and Figures | Reference | Related Articles | Metrics | Comments0
    Algorithm for security management and privacy protection of education big data based on smart contracts
    Shaojie QIAO, Yuhe JIANG, Chenxu LIU, Cheqing JIN, Nan HAN, Shuaiwei HE
    Journal of East China Normal University(Natural Science)    2024, 2024 (5): 128-140.   DOI: 10.3969/j.issn.1000-5641.2024.05.012
    Abstract1495)   HTML17)    PDF(pc) (1051KB)(315)       Save

    Conventional education big data management is faced with security risks such as privacy data leakage, questionable data credibility, and unauthorized access. To avoid the above risks, a novel type of education big data security management and privacy protection method, Algorithm for security management and privacy protection of education big data based on smart contracts (ASPES), is proposed. It integrates an improved key splitting and sharing algorithm based on the secret sharing of Shamir, a hybrid encryption algorithm based on SM2-SHA256-AES, and a smart contract management algorithm based on hierarchical data access control. Experiments are conduced on the real dataset of MOOCCube and the results indicate that the execution efficiency and security of ASPES are significantly improved when compared with the state-of-the-art methods, which can effectively store and manage education big data and realize the reasonable distribution of educational resources. By embedding smart contracts into the blockchain and inputting operations like data reading and writing into the blockchain, ASPES can optimize the management path, improve management efficiency, ensure the fairness of education, and considerably improve the quality of education.

    Table and Figures | Reference | Related Articles | Metrics | Comments0
    Online analytical processing query cardinality estimation capability evaluation
    Wei JIAN, Zirui HU, Rong ZHANG
    Journal of East China Normal University(Natural Science)    2024, 2024 (5): 141-151.   DOI: 10.3969/j.issn.1000-5641.2024.05.013
    Abstract940)   HTML11)    PDF(pc) (915KB)(111)       Save

    Query optimization can significantly enhance the analysis efficiency of online analytical processing (OLAP) database systems for massive educational data, providing fast and accurate data support for intelligent educational systems. The optimizer mainly consists of three modules: cardinality estimation, space enumeration, and cost models. Specifically, cardinality estimation determines the results of the cost model and guides the selection of query plans. Therefore, the evaluation of the cardinality estimation module of the optimizer plays a crucial role in the optimization of OLAP database systems. This study designs and implements an effective workload generation tool based on primary key-driven diversified data distribution and data relationship construction. The tool includes data generation technology with custom relationships, workload template generation technology based on finite state machines, and parameter instantiation technology driven by target cardinality. Experiments were conducted on three databases: OceanBase, TiDB, and PostgreSQL, analyzing the issues of their optimizers and providing suggestions.

    Table and Figures | Reference | Related Articles | Metrics | Comments0
    Blocking analysis and scheduling strategy in transactions based on lock-avoidance
    Xiangrong LING, Siyang WENG, Rong ZHANG
    Journal of East China Normal University(Natural Science)    2024, 2024 (5): 152-161.   DOI: 10.3969/j.issn.1000-5641.2024.05.014
    Abstract802)   HTML8)    PDF(pc) (1107KB)(89)       Save

    In the modern educational environment, efficient and reliable data management systems are essential for the operation of online education platforms and student information management systems. With the continuous growth of educational data and the increase in the frequency of multi-user access, database systems face the challenge of high throughput requirements owing to concurrent conflict operations. Among the many concurrency control strategies, the lock-based control strategy is commonly used in database systems. However, the blocking caused by locks affects the performance of concurrent execution of transactions in the database. Existing work mainly reduces lock contention by scheduling the execution order between transactions or optimizing stored procedures. To improve transaction throughput further, this study conducts blocking analysis and cost modeling within transactions based on lock avoidance, and proposes an intra-transaction scheduling strategy. The scheduling cost is estimated by analyzing the blocking of the workload, and then the operation order is exchanged to a limited extent within the transaction according to certain rules to reduce the delay caused by lock blocking, thereby improving performance. Finally, comparing the conventional and proposed scheduling strategies, the latter is verified to improve throughput and reduce the average transaction delay.

    Table and Figures | Reference | Related Articles | Metrics | Comments0