9,518 research outputs found

    Data Mining Applications in Higher Education and Academic Intelligence Management

    Get PDF
    Higher education institutions are nucleus of research and future development acting in a competitive environment, with the prerequisite mission to generate, accumulate and share knowledge. The chain of generating knowledge inside and among external organizations (such as companies, other universities, partners, community) is considered essential to reduce the limitations of internal resources and could be plainly improved with the use of data mining technologies. Data mining has proven to be in the recent years a pioneering field of research and investigation that faces a large variety of techniques applied in a multitude of areas, both in business and higher education, relating interdisciplinary studies and development and covering a large variety of practice. Universities require an important amount of significant knowledge mined from its past and current data sets using special methods and processes. The ways in which information and knowledge are represented and delivered to the university managers are in a continuous transformation due to the involvement of the information and communication technologies in all the academic processes. Higher education institutions have long been interested in predicting the paths of students and alumni (Luan, 2004), thus identifying which students will join particular course programs (Kalathur, 2006), and which students will require assistance in order to graduate. Another important preoccupation is the academic failure among students which has long fuelled a large number of debates. Researchers (Vandamme et al., 2007) attempted to classify students into different clusters with dissimilar risks in exam failure, but also to detect with realistic accuracy what and how much the students know, in order to deduce specific learning gaps (Piementel & Omar, 2005). The distance and on-line education, together with the intelligent tutoring systems and their capability to register its exchanges with students (Mostow et al., 2005) present various feasible information sources for the data mining processes. Studies based on collecting and interpreting the information from several courses could possibly assist teachers and students in the web-based learning setting (Myller et al., 2002). Scientists (Anjewierden et al., 2007) derived models for classifying chat messages using data mining techniques, in order to offer learners real-time adaptive feedback which could result in the improvement of learning environments. In scientific literature there are some studies which seek to classify students in order to predict their final grade based on features extracted from logged data ineducational web-based systems (Minaei-Bidgoli & Punch, 2003). A combination of multiple classifiers led to a significant improvement in classification performance through weighting the feature vectors. The author’s research directions through the data mining practices consist in finding feasible ways to offer the higher education institutions’ managers ample knowledge to prepare new hypothesis, in a short period of time, which was formerly rigid or unachievable, in view of large datasets and earlier methods. Therefore, the aim is to put forward a way to understand the students’ opinions, satisfactions and discontentment in the each element of the educational process, and to predict their preference in certain fields of study, the choice in continuing education, academic failure, and to offer accurate correlations between their knowledge and the requirements in the labor market. Some of the most interesting data mining processes in the educational field are illustrated in the present chapter, in which the author adds own ideas and applications in educational issues using specific data mining techniques. The organization of this chapter is as follows. Section 2 offers an insight of how data mining processes are being applied in the large spectrum of education, presenting recent applications and studies published in the scientific literature, significant to the development of this emerging science. In Section 3 the author introduces his work through a number of new proposed directions and applications conducted over data collected from the students of the Babes-Bolyai University, using specific data mining classification learning and clustering methods. Section 4 presents the integration of data mining processes and their particular role in higher education issues and management, for the conception of an Academic Intelligence Management. Interrelated future research and plans are discussed as a conclusion in Section 5.data mining,data clustering, higher education, decision trees, C4.5 algorithm, k-means, decision support, academic intelligence management

    Recognition decision-making model using temporal data mining technique

    Get PDF
    An accurate and timely decision is crucial in any emergency situation. This paper presents a recognition decision making model that adopts the temporal data mining approach in making decisions. Reservoir water level and rainfall measurement were used as the case study to test the developed computational recognition-primed decision (RPD) model in predicting the amount of water to be dispatched represented by the number of spillway gates. Experimental results indicated that new events can be predicted from historical events. Patterns were extracted and can be transformed into readable and descriptive rule based form

    Information and Communication-Based Collaborative Learning and Behavior Modeling Using Machine Learning Algorithm

    Get PDF
    Rapid growth of smart phone industries has led people to use more technology and thus aided in adoption of information and communication technology (ICT) in educational purposes for enhancing students? performance. This chapter shows that students use social media platform or virtual environment for learning, especially in Open University or online learning system. In such environment, the students? drop rate is extremely high. This work primarily aims at reducing students? dropout or students? fails to finish course within prerequisite time using student behavior styles. For addressing research problems, this research aims in building efficient student behavior learning model for improving the performance of student applying machine learning (ML) models. The behavior extraction and study have been carried utilizing decision tree (DT) ML algorithm. Further, a model has been proposed for provisioning student contextual information to different students utilizing VLE platform interaction (collaborative learning) using DT algorithm which considered bagging. The DT with bagging is an ensemble learning (EL) model that depicts bootstrap aggregating (BA), which is modeled for enhancing accuracies and stabilities of every distinct predictive trees. Bagging aids DT in influencing overfitting problems and minimizes its variance. The proposed method is efficient in extracting learning styles and intrinsic behavior of students

    Design of risk assessment methodology for IT/OT systems : Employment of online security catalogues in the risk assessment process

    Get PDF
    The revolution brought about with the transition from Industry 1.0 to 4.0 has expanded the cyber threats from Information Technology (IT) to Operational Technology (OT) systems. However, unlike IT systems, identifying the relevant threats in OT is more complex as penetration testing applications highly restrict OT availability. The complexity is enhanced by the significant amount of information available in online security catalogues, like Common Weakness Enumeration, Common Vulnerabilities and Exposures and Common Attack Pattern Enumeration and Classification, and the incomplete organisation of their relationships. These issues hinder the identification of relevant threats during risk assessment of OT systems. In this thesis, a methodology is proposed to reduce the aforementioned complexities and improve relationships among online security catalogues to identify the cybersecurity risk of IT/OT systems. The weaknesses, vulnerabilities and attack patterns stored in the online catalogues are extracted and categorised by mapping their potential mitigations to their security requirements, which are introduced on security standards that the system should comply with, like the ISA/IEC 62443. The system's assets are connected to the potential threats through the security requirements, which, combined with the relationships established among the catalogues, offer the basis for graphical representation of the results by employing tree-shaped graphical models. The methodology is tested on the components of an Information and Communication Technology system, whose results verify the simplification of the threat identification process but highlight the need for an in-depth understanding of the system. Hence, the methodology offers a significant basis on which further work can be applied to standardise the risk assessment process of IT/OT systems

    Beyond the IT Magic Bullet: HIV Prevention Education and Public Policy

    Full text link
    Analytic applications are vital in the assessments of public health and surveillance as these applications can drive resource allocation, community assessment and public policy. Using a dataset of nearly 90,000 patient hospital encounters, the number of instances with an ICD code of HIV and co-morbidities was identified. Blacks accounted for 75 percent of HIV hospital encounters in the dataset. While business analytic applications informed this study of cross-tabulations and interaction effects among race, age and gender, there appears to be a significant relationship among HIV diagnoses and substance abuse. Payer data is informed by the Healthcare Cost and Utilization Project (HCUP), and these findings indicate significant service utilization among those insured by Medicare. More importantly, these issues raise more salient implications among the current health and public policy among HIV care delivery, in general, and among the Black community, in particular. Attention to health and public policy warrants further investigation given that this discourse has shifted to a focus on curvative medicine and away from prevention and education

    From Social Data Mining to Forecasting Socio-Economic Crisis

    Full text link
    Socio-economic data mining has a great potential in terms of gaining a better understanding of problems that our economy and society are facing, such as financial instability, shortages of resources, or conflicts. Without large-scale data mining, progress in these areas seems hard or impossible. Therefore, a suitable, distributed data mining infrastructure and research centers should be built in Europe. It also appears appropriate to build a network of Crisis Observatories. They can be imagined as laboratories devoted to the gathering and processing of enormous volumes of data on both natural systems such as the Earth and its ecosystem, as well as on human techno-socio-economic systems, so as to gain early warnings of impending events. Reality mining provides the chance to adapt more quickly and more accurately to changing situations. Further opportunities arise by individually customized services, which however should be provided in a privacy-respecting way. This requires the development of novel ICT (such as a self- organizing Web), but most likely new legal regulations and suitable institutions as well. As long as such regulations are lacking on a world-wide scale, it is in the public interest that scientists explore what can be done with the huge data available. Big data do have the potential to change or even threaten democratic societies. The same applies to sudden and large-scale failures of ICT systems. Therefore, dealing with data must be done with a large degree of responsibility and care. Self-interests of individuals, companies or institutions have limits, where the public interest is affected, and public interest is not a sufficient justification to violate human rights of individuals. Privacy is a high good, as confidentiality is, and damaging it would have serious side effects for society.Comment: 65 pages, 1 figure, Visioneer White Paper, see http://www.visioneer.ethz.c
    • …
    corecore