A Data-Driven and Modular Flask-Based Architecture for Secure and Intelligent Programming Education Powered by LLMs
In this paper, the research is about a modular, AI data-driven programming education platform developed using the Flask web framework and integrated with the LLaMA 2 large language model (LLM) to deliver dynamic, personalized learning experiences. The system combines real-time question generation, c...
| Main Authors: | J., Ranjith, Manasi, Agarwal, V., Neha, M., Mounika, B., Padmasri |
|---|---|
| Format: | Article |
| Language: | English English |
| Published: |
INTI International University
2025
|
| Subjects: | |
| Online Access: | http://eprints.intimal.edu.my/2155/ http://eprints.intimal.edu.my/2155/1/jods2025_13.pdf http://eprints.intimal.edu.my/2155/2/698 |
Similar Items
Model driven security frameworks for addressing security problems of Service Oriented Architecture
by: Saleem, M. Q., et al.
Published: (2010)
by: Saleem, M. Q., et al.
Published: (2010)
Cybersecurity in Big Data Era: From Securing Big Data to Data-Driven Security
by: Manjunatha, V., et al.
Published: (2024)
by: Manjunatha, V., et al.
Published: (2024)
Hierarchical structural driven model for integrative information management architecture
by: Mohd Tamrin, Mohd Izzuddin, et al.
Published: (2013)
by: Mohd Tamrin, Mohd Izzuddin, et al.
Published: (2013)
A Study On AI-Driven Solutions for Cloud Security Platform
by: Menaga, Segar, et al.
Published: (2024)
by: Menaga, Segar, et al.
Published: (2024)
Network security architecture design for Malaysian maritime enforcement agency
by: Abdul Hamid, Mahathir
Published: (2007)
by: Abdul Hamid, Mahathir
Published: (2007)
Modular smart home using WiFi technology
by: Yus Kamalrul, Mohamed Yunus
Published: (2019)
by: Yus Kamalrul, Mohamed Yunus
Published: (2019)
Securing the Calea architecture against denial of service attacks
by: Lim, Kong Hua
Published: (2011)
by: Lim, Kong Hua
Published: (2011)
An architecture design of the intelligent agent for speech recognition and translation
by: Ahmad, Abdul Manan, et al.
Published: (2005)
by: Ahmad, Abdul Manan, et al.
Published: (2005)
Biologically inspired architecture for securing hybrid mobile ad hoc networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
Bio Inspired Intrusion Prevention and Self-healing Architecture for Network Security
by: Muna , Elsadig, et al.
by: Muna , Elsadig, et al.
Data-Driven on Resilient Network Security Against SYN Flood Attacks at PT PUSRI
by: Misinem, ., et al.
Published: (2024)
by: Misinem, ., et al.
Published: (2024)
Designing a logical security framework for enterprise service oriented architecture (ESOA)
by: Kalantari, Alaeddin
Published: (2009)
by: Kalantari, Alaeddin
Published: (2009)
Developmental approaches covering context area mobile applications service oriented architecture and model driven architecture
by: Kim, Haeng Kon, et al.
Published: (2016)
by: Kim, Haeng Kon, et al.
Published: (2016)
Security monitoring tool system using threat intelligence vs threat hunting
by: Wan Ikbal Ismat Wan Kamal,
Published: (2021)
by: Wan Ikbal Ismat Wan Kamal,
Published: (2021)
An integrated vision-based architecture for home security system
by: See, J., et al.
Published: (2007)
by: See, J., et al.
Published: (2007)
Enterprise security architecture framework (ESAF) for banking industry / Mahathelge Nicholas Ruwan Dias
by: Mahathelge Nicholas , Ruwan Dias
Published: (2017)
by: Mahathelge Nicholas , Ruwan Dias
Published: (2017)
Knowledge design in rule-based system architecture for C tutorial / V Thavachelvi Velautham
by: V Thavachelvi, Velautham
Published: (2005)
by: V Thavachelvi, Velautham
Published: (2005)
Enhancing cognitive aspects of software visualization using DocLike modularized graph
by: Sulaiman, Shahida, et al.
Published: (2005)
by: Sulaiman, Shahida, et al.
Published: (2005)
Data-Driven Web-Based Service Travel Resume Information System
by: Marlindawati, ., et al.
Published: (2024)
by: Marlindawati, ., et al.
Published: (2024)
Framework to study the requirements-driven collaboration in agile teams / Irum Inayat
by: Irum, Inayat
Published: (2015)
by: Irum, Inayat
Published: (2015)
BROOD: business rules-driven object oriented design
by: Loucopoulos, P., et al.
Published: (2008)
by: Loucopoulos, P., et al.
Published: (2008)
An efficient PKC-based security architecture for wireless sensor networks
by: Haque, Md. Mokammel, et al.
Published: (2007)
by: Haque, Md. Mokammel, et al.
Published: (2007)
An asymmetric key-based security architecture for wireless sensor networks
by: Haque, Md. Mokammel, et al.
Published: (2008)
by: Haque, Md. Mokammel, et al.
Published: (2008)
Smart Home Security Using Facial Authentication
by: Rakshitha, M.V., et al.
Published: (2024)
by: Rakshitha, M.V., et al.
Published: (2024)
Secure login authentication system
by: Chow, Wen Chai
Published: (2018)
by: Chow, Wen Chai
Published: (2018)
Guideline for privacy and security in Cloud First Security Environment
by: Abdul Aziz, Normaziah, et al.
Published: (2017)
by: Abdul Aziz, Normaziah, et al.
Published: (2017)
A study of database connection pool in microservice architecture
by: Nur Ayuni, Nor Sobri, et al.
Published: (2022)
by: Nur Ayuni, Nor Sobri, et al.
Published: (2022)
On the security of golden cryptosystems
by: Tahghighi, Muhammad, et al.
Published: (2012)
by: Tahghighi, Muhammad, et al.
Published: (2012)
A pattern-based release planning methodology for market-driven software / Amir Seyed Danesh
by: Amir, Seyed Danesh
Published: (2016)
by: Amir, Seyed Danesh
Published: (2016)
GOPE: A MVC driven mobile framework using HTML5 for pervasive device container
by: Lim, Tong Ming *, et al.
Published: (2013)
by: Lim, Tong Ming *, et al.
Published: (2013)
Data-Driven Similarity Measures for Matrimonial Application
by: Chia, Yong Fang
Published: (2020)
by: Chia, Yong Fang
Published: (2020)
Utilizing modular neural network for prediction of possible
emergencies locations within point of interest of Hajj pilgrimage
by: Abubakar, Adamu, et al.
Published: (2016)
by: Abubakar, Adamu, et al.
Published: (2016)
An efficient public key based security architecture for wireless sensor networks
by: Haque, Md. Mokammel, et al.
Published: (2007)
by: Haque, Md. Mokammel, et al.
Published: (2007)
Corpus-driven Malay language tweet normalization / Mohammad Arshi Saloot
by: Mohammad Arshi , Saloot
Published: (2018)
by: Mohammad Arshi , Saloot
Published: (2018)
Test Data Generation for Event Driven System Using Bees Algorithm
by: Mohammed Zabil, Mohd H., et al.
Published: (2013)
by: Mohammed Zabil, Mohd H., et al.
Published: (2013)
User interest driven semantic query expansion for effective web search
by: Raza, Muhammad Ahsan, et al.
Published: (2021)
by: Raza, Muhammad Ahsan, et al.
Published: (2021)
Data-driven SIRMs-connected FIS for prediction of external tendon stress
by: Tay, K.M, et al.
Published: (2015)
by: Tay, K.M, et al.
Published: (2015)
An automated tool for business rule-driven, object-oriented software evolution
by: Wan Kadir, Wan M. N.
Published: (2008)
by: Wan Kadir, Wan M. N.
Published: (2008)
Design of an Autonomic Services Oriented Architecture
by: M.A.C., Bhakti, et al.
Published: (2010)
by: M.A.C., Bhakti, et al.
Published: (2010)
Development of kernel for RISC architecture system
by: Ng, Chun Hong
Published: (2014)
by: Ng, Chun Hong
Published: (2014)
Similar Items
-
Model driven security frameworks for addressing security problems of Service Oriented Architecture
by: Saleem, M. Q., et al.
Published: (2010) -
Cybersecurity in Big Data Era: From Securing Big Data to Data-Driven Security
by: Manjunatha, V., et al.
Published: (2024) -
Hierarchical structural driven model for integrative information management architecture
by: Mohd Tamrin, Mohd Izzuddin, et al.
Published: (2013) -
A Study On AI-Driven Solutions for Cloud Security Platform
by: Menaga, Segar, et al.
Published: (2024) -
Network security architecture design for Malaysian maritime enforcement agency
by: Abdul Hamid, Mahathir
Published: (2007)