347 research outputs found

    The Investigation of Student Dropout Prediction Model in Thai Higher Education Using Educational Data Mining: A Case Study of Faculty of Science, Prince of Songkla Uni-versity

    Get PDF
    The student’s retention rate is one of the challenging issues that representing the quality of the university. A high dropout rate of students affects not only the reputation of the university but also the students’ career in the future. Therefore, there is a need of student dropout analysis in order to improve the academic plan and management to reduce students drop out from the university as well as to  enhance the quality of the higher education system. Data mining technique provides powerful methods for analysis and the prediction the dropout. This paper proposes a model for predicting students’ dropout using the dataset from the representative of the largest public university in the Southen part of Thailand. In this study, data from Faculty of Science, Prince of Songkla University was collected from academic year of 2013 to 2017. The experiment result shows that JRip rule induction is the best technique to generate a prediction model receiving the highest accuracy value of 77.30%. The results highlight the potential prediction model that can be used to detect the early state of dropping out of the student which the university can provide supporting program to improve the student retention rat

    IDENTIFICATION OF STUDENTS AT RISK OF LOW PERFORMANCE BY COMBINING RULE-BASED MODELS, ENHANCED MACHINE LEARNING, AND KNOWLEDGE GRAPH TECHNIQUES

    Get PDF
    Technologies and online learning platforms have changed the contemporary educational paradigm, giving institutions more alternatives in a complex and competitive environment. Online learning platforms, learning-based analytics, and data mining tools are increasingly complementing and replacing traditional education techniques. However, academic underachievement, graduation delays, and student dropouts remain common problems in educational institutions. One potential method of preventing these issues is by predicting student performance through the use of institution data and advanced technologies. However, to date, scholars have yet to develop a module that can accurately predict students’ academic achievement and commitment. This dissertation attempts to bridge that gap by presenting a framework that allows instructors to achieve four goals: (1) track and monitor the performance of each student on their course, (2) identify at-risk students during the earliest stages of the course progression (3), enhance the accuracy with which at-risk student performance is predicted, and (4) improve the accuracy of student ranking and development of personalized learning interventions. These goals are achieved via four objectives. Objective One proposes a rule-based strategy and risk factor flag to warn instructors about at-risk students. Objective Two classifies at-risk students using an explainable ML-based model and rule-based approach. It also offers remedial strategies for at-risk students at each checkpoint to address their weaknesses. Objective Three uses ML-based models, GCNs, and knowledge graphs to enhance the prediction results. Objective Four predicts students’ ranking using ML-based models and clustering-based KGEs with the aim of developing personalized learning interventions. It is anticipated that the solution presented in this dissertation will help educational institutions identify and analyze at-risk students on a course-by-course basis and, thereby, minimize course failure rates

    Classification of Adversarial Attacks Using Ensemble Clustering Approach

    Get PDF
    As more business transactions and information services have been implemented via communication networks, both personal and organization assets encounter a higher risk of attacks. To safeguard these, a perimeter defence like NIDS (network-based intrusion detection system) can be effective for known intrusions. There has been a great deal of attention within the joint community of security and data science to improve machine-learning based NIDS such that it becomes more accurate for adversarial attacks, where obfuscation techniques are applied to disguise patterns of intrusive traffics. The current research focuses on non-payload connections at the TCP (transmission control protocol) stack level that is applicable to different network applications. In contrary to the wrapper method introduced with the benchmark dataset, three new filter models are proposed to transform the feature space without knowledge of class labels. These ECT (ensemble clustering based transformation) techniques, i.e., ECT-Subspace, ECT-Noise and ECT-Combined, are developed using the concept of ensemble clustering and three different ensemble generation strategies, i.e., random feature subspace, feature noise injection and their combinations. Based on the empirical study with published dataset and four classification algorithms, new models usually outperform that original wrapper and other filter alternatives found in the literature. This is similarly summarized from the first experiment with basic classification of legitimate and direct attacks, and the second that focuses on recognizing obfuscated intrusions. In addition, analysis of algorithmic parameters, i.e., ensemble size and level of noise, is provided as a guideline for a practical use
    • …
    corecore