SlideShare uma empresa Scribd logo
1 de 54
· You may choose one or more chapters from E.G. Whites, The
Ministry of Healing. You will then write a reflection paper
regarding your thoughts, meaningful ideas, feelings, and/or
reactions, and the application of these to nursing practice or
your own spiritual growth and self-care.
· Readings from E.G. White; The Ministry of Healing
· Chapter 19 In Contact with Nature
· Chapter 29 The Builders of the Home
· Chapter 31 The Mother
· Chapter 34 True Education, a Missionary Training
Grading Criteria
Points Possible
Points Earned/Comments
1. Paper is typed in at least 3 pages, double spaced, and turned
in on time via D2L, with title page in APA format
10 Points
2. Introductory paragraph is attention-getting
10 Points
3. Spelling, grammar, mechanics, and usage are correct
throughout the paper
10 Points
4. Thoughts are expressed in a coherent and logical manner.
20 Points
5. Viewpoints and interpretations are insightful, demonstrating
an in-depth reflection.
20 Points
6. Concluding paragraph sums up information, reiterates ideas
and opinions, and leaves the reader with a call to action or
something meaningful to remember
10 Points
7. Pertinent reference sources are skillfully woven throughout
paper without overuse of quotations but, rather, attempt to
paraphrase
10 Points
8. References are properly cited in APA format with no
plagiarism.
5 Points
9. At least 3 references are cited, including a reference from
current class assigned chapter readings in White, and two
journal articles of your own choice (one may be the Bible).
5 Points
Total
100 Possible Points
Actual Points =
References: White, E. G. (2011). The Ministry of healing.
Guildford, UK: White Crow Books.
APA format reference that you may use for free:
https://owl.english.purdue.edu/owl/resource/560/01/
Technology in Education - Research Article
Educational data mining using cluster
analysis and decision tree technique:
A case study
Snježana Križanić
1
Abstract
Data mining refers to the application of data analysis techniques
with the aim of extracting hidden knowledge from data by
performing the tasks of pattern recognition and predictive
modeling. This article describes the application of data mining
techniques on educational data of a higher education institution
in Croatia. Data used for the analysis are event logs
downloaded from an e-learning environment of a real e-course.
Data mining techniques applied for the research are
cluster analysis and decision tree. The cluster analysis was
performed by organizing collections of patterns into groups
based on student behavior similarity in using course materials.
Decision tree was the method of interest for generating a
representation of decision-making that allowed defining classes
of objects for the purpose of deeper analysis about how
students learned.
Keywords
Educational data mining, cluster analysis, decision trees, case
study, log file
Date received: 30 September 2019; accepted: 18 January 2020
Introduction
Data mining is a widely spread approach for analyzing
large data repositories to extract necessary or useful infor -
mation. The goal of data mining application is to extract
hidden data patterns and to detect relationships between
parameters in a vast amount of data. The exploration of
data in education using data mining techniques is com-
monly known as educational data mining.
1
Different edu-
cational data are stored in large databases. This is
especially true for online programs, for the support of
teaching processes and in which student learning behaviors
can be recorded and stored. The most common type of such
information systems is learning management system.
2
Many educational institutions evaluate the performance
of their students based on final grades which depend on a
course structure assessment and learning objectives to
achieve an effective and consistent learning process.
3
In this article, cluster analysis and decision tree tech-
nique are used to analyze student behavior for a real
e-course during one semester. The data used for analysis
are event logs downloaded from an e-learning system for
one e-course at a higher education institution in Croatia for
a student generation in 2017/2018. The file in which infor-
mation system records are stored is called a log file and the
data in it are called event logs.
4
Cluster analysis is a technique for creating organized
collections of patterns into groups based on their similarity
of some property or action.
5
Because of the fact that cluster
analysis is used for different purposes in educational data
mining, one of the most interesting areas of its application
is for grouping the students to identify typical patterns of
behavior.
6
1 Faculty of Organization and Informatics, University of
Zagreb, Varaždin,
Croatia
Corresponding author:
Snježana Križanić, Faculty of Organization and Informatics,
University of
Zagreb, Varaždin 42000, Croatia.
Email: [email protected]
International Journal of Engineering
Business Management
Volume 12: 1–9
ª The Author(s) 2020
DOI: 10.1177/1847979020908675
journals.sagepub.com/home/enb
Creative Commons CC BY: This article is distributed under the
terms of the Creative Commons Attribution 4.0 License
(https://creativecommons.org/licenses/by/4.0/) which permits
any use, reproduction and distribution of the work without
further
permission provided the original work is attributed as specified
on the SAGE and Open Access pages
(https://us.sagepub.com/en-us/nam/
open-access-at-sage).
https://orcid.org/0000-0002-0834-1710
https://orcid.org/0000-0002-0834-1710
mailto:[email protected]
https://doi.org/10.1177/1847979020908675
http://journals.sagepub.com/home/enb
https://creativecommons.org/licenses/by/4.0/
https://us.sagepub.com/en-us/nam/open-access-at-sage
https://us.sagepub.com/en-us/nam/open-access-at-sage
http://crossmark.crossref.org/dialog/?doi=10.1177%2F18479790
20908675&domain=pdf&date_stamp=2020-02-25
The purpose of decision trees is to identify specific
object classes. Decision trees use different object attributes
to classify different object subsets and do not use just one
attribute or a fixed set of attributes.
7
The attractiveness of
decision trees is in their easiness for understandability and
interpretability.
The aim of this article is to investigate which recorded
elements of student behavior in the e-learning system could
contribute to successful passing of exams in the observed e-
course. The research questions this article is trying to
answer are as follows:
1. Which student information can be extracted from
event logs of an e-learning system?
2. Which variable values have a significant influence
on grouping students with regard to their behavior in
the e-learning system?
The motivation for writing this article comes from
finding a course that is interesting to analyze due to its
variety of student activities based on which advanced data
mining techniques can be applied to improve content
management in that course. The quality of e-course exe-
cution at higher education institutions in Croatia reflects
the quality of teaching according to which higher educa-
tion institutions are ranked.
In the literature review, an analysis of the existing lit-
erature is conducted. In this chapter, educational data min-
ing, application of logs, cluster analysis, and decision tree
technique are researched. Further on, research methodol -
ogy of this article is presented with the aim of introduction
on research data and research technique. Methodology is
followed by a description of the results obtained by cluster
analysis and decision tree technique. Article ends with
final discussion remarks on perceived knowledge and
future work.
Literature review
Logs could contain a wide range of information about pro-
cess executions.
8
Data mining shares some characteristics
with automatic process discovery techniques, and in data
mining, “meaningful information is extracted from fine-
granular data, so that these techniques of automatic process
discovery are subsumed to the research area of process
mining.”
4
Data mining is the process of extracting useful informa-
tion and knowledge from a large set of data warehouses. It
involves the application of data analytics tools to detect
unknown patterns and relationships in large data sets.
1
“Data mining is a multidisciplinary area in which several
computing paradigms converge: decision tree construction,
rule induction, artificial neural networks, instance-based
learning, Bayesian learning, logic programming, statistical
algorithms, etc.”
9
In addition, some of the most useful data
mining tasks and methods are statistics, visualization,
clustering, classification, and association rule mining.
These methods reveal new, interesting, and useful knowl -
edge based on the available information.
9
The application of data mining techniques on educa-
tional data is called educational data mining.
6
The primary
goal of using data mining techniques in the field of educa-
tion is to develop models by which we can predict the
overall performance of students in selected courses.
1
The steps to improve the level of education are as
follows:
� Creating data sources of predictive variables.
� Identification of different characteristics or factors
that influence student learning performance during
academic life.
� Construction of a predictive model using classifica-
tion data mining techniques based on predictive
variables.
� Validation of a model that was developed according
to students’ performance while learning.
10
As there are many databases containing students’ infor-
mation, it is possible to operate with large repositories of
data reflecting how students learn.
11
Folino et al. were
investigating the usage of external-memory decision tree
induction approach to deal efficiently with large logs.
8
Data
mining techniques economically provide adjustable educa-
tion, effectively improve the system, and reduce the costs
of an educational process.
10
Higher education institutions
are concerned about the quality of education and use a
variety of ways to analyze and advance understanding of
student achievements.
3
In the context of teaching and learn-
ing, student data can be used to create and construct pre-
dictive models through which student performance can be
identified.
3
“By extracting information from data, it is pos-
sible to generate process models representing various pro-
cess scenarios in education.”
11
Asif et al. state that the aim
of forecasting in educational data mining is to predict stu-
dents’ educational outcomes.
6
Examples of data mining
techniques usage in the e-learning process are assessing
student learning performance, ensuring course adjustment,
and generating learning recommendations based on student
behavior while learning, evaluating teaching materials and
educational courses, providing feedback to teachers and
students, and discovering atypical student behavior while
learning.
9
Márquez-Vera et al. present a method for predicting
student success, which consists of the following commonly
used steps in educational data mining:
1. Data collection. Refers to collecting all available
student information. Users create data files starting
with e-learning databases.
9
2. Data preprocessing. At this stage, a data set is pre-
pared for the application of data mining techniques.
To successfully complete this stage, data
2 International Journal of Engineering Business Management
preprocessing methods such as data cleansing,
variable transformation, and data partitioning must
be used.
3. Data mining. Data mining algorithms, such as clas-
sification and clustering, are applied to predict
student success.
4. Interpretation. At this stage, the models are ana-
lyzed to predict student success.
12
Various data mining techniques such as classification
and clustering are applied to reveal hidden knowledge
from educational data.
6
Clustering is used by pattern anal-
ysis, decision-making, and machine learning, which
includes data mining, document retrieval, image segmen-
tation, and pattern classification.
5
Various pieces of infor-
mation stored for each event can be used for clustering,
correlating, and finding causal relationships in the event
logs.
4
Using cluster analysis, we separate students into
groups, so that students in the same group share the same
progression within the group.
6
Data clustering used with
k-means algorithm enables teachers to predict student
performance and associate learning styles of different
learner types and their behavior with the aim of collec-
tively improving institutional performance.
13
K-means
is the most popular and the simplest partitional algori -
thm used for clustering.
14
“Measuring the similarity of
two objects is done by calculating a distance measure
such as the Euclidean Distance attributes having numer-
ical values.”
6
Several methods have been developed to solve classifi -
cation problems. Among all these methods, decision tree is
recognized as suitable, because it is considered to be one of
the most commonly used methods in the supervised learn-
ing approach.
15
Decision tree is a classification algorithm that is dis-
played in the form of a tree in which two different types of
nodes are connected by branches.
3
The induction of the
decision tree is done through a supervised knowledge dis-
covery process in which prior class knowledge was used to
channel new knowledge.
16
The tree consists of internal
nodes that match the logical attribute test and the connect-
ing branches which represent the test outcomes.
6
The deci-
sion tree classifies instances by sorting them down the tree
from the root to the leaf nodes.
2
The decision tree is con-
sidered to be a procedure that decides whether a particular
value will be accepted or rejected, uses IF-THEN rule, and
ensures that the current state is mapped to a future state to
make a different decision.
3
IF-THEN rule is one of the
most popular forms of knowledge representation because
it is easy to understand and interpret by nonexpert users
and can be directly applied in the decision-making pro-
cess.
12
The nodes and the branches form a consecutive
path through the decision tree that reaches the leaves, and
it represents a specific mark. All the nodes in the tree
correspond to a subset of data. Ideally, the leaf is clean,
which means that all elements in the leaf have an equal
chance of being a target variable or a class.
6
In the context
of learning through the decision tree, the target variables
refer to attributes. Each attribute node splits a set of
instances into two or more subsets. The root of the tree
corresponds to all instances.
17
Decision trees are easy to understand and well adapted
to the classification problems. They suffer from a sensi -
tivity of the data used in their construction and they are a
less natural model for regression. The advantage of deci -
sion trees is that there is a large number of efficient algo-
rithms, which can find approximately optimal tree
architectures.
18
In addition, decision trees are able to
break down the complex problem of decision-making into
several simpler ones.
15
The steps in decision tree building are as follows:
1. Suppose C is a set of objects to be classified by
starting from the current node. If all members within
a set C are of the same class or C is empty, we
determine that the current node is a node of the leaf,
label it according to its class, and complete the pro-
cedure. Otherwise, we move on to step 2.
2. Suppose Ai is the attribute selected for the current
node. The attribute Ai has possible values in Vi ¼
fAi1, Ai2, . . . , Aivg.
3. We use attribute values to divide the set of objects C
into mutually exclusive and exhaustive subsets fCi1,
Ci2, . . . , Civg. Each subset of Cij contains objects in
C which have the value Aij for the attribute Ai.
4. We create a child node in the tree for each attribute
of the Aij value and the corresponding subset of Cij.
Then we label the arc from the current node to the
child node with the attribute value Aij.
5. For each child node, we recursively call the pro-
cedure over the subset Cij with the set of available
attributes fA � Aig.7
Decision nodes are usually represented as squares and
child nodes are drawn to the right of their parents.
19
The
decision tree can be used to predict and classify new stu-
dents depending on their activities and decisions made,
because the attributes and values, which are used for clas-
sification, are also represented in the form of a tree.
9
According to knowledge from the data associated with the
execution of numerous traces, the aim is to build a decision
tree model for use to predict membership into the clusters
for forthcoming enactments.
8
In comparison with other
data-driven approaches, decision trees are easy to under-
stand and their application does not include complex com-
puter knowledge.
20
Methodology
In this paragraph, research methodology used for conduct-
ing the analysis will be presented. First, the proposed model
for educational data mining using cluster analysis and
Križanić 3
decision tree technique is presented. Then, the data source
and the data type are described.
Educational data mining model
According to the literature researched in the previous stage,
the activities shown in Figure 1 are recognized as some of
the most important ones in educational data mining using
cluster analysis and decision tree technique.
First, the analyst needs to select a data set to analyze,
that is, to select the targeted e-course. After selecting an e-
course, log files from an e-learning environment need to be
downloaded. On the basis of the downloaded event logs,
the next phase of the educational data mining process can
be provided. When the data are downloaded and stored,
data cleaning activity can be launched. In this activity, the
data analyst performs unnecessary data cleaning and data
separation of information that are not relevant for the anal -
ysis. After data cleaning activity, data partitioning is per -
formed. This means that the relevant data are extracted and
combined for further analysis. This activity depends on
data mining techniques and the outcome of the analysis.
Once there are manageable data, the application of cluster
analysis can be performed to create groups of students
similar within the group and different to another group.
According to these groups, it is possible to apply another
data mining technique over the obtained data, for example,
decision tree technique. In other words, after having the
obtained data from cluster analysis, the same could be
exported and prepared for decision tree technique
implementation. When there is a model resulted from the
previous activities, the model validation can be performed.
The analyst should be informed in a way of controlling the
correctness of the resulting model. After confirming the
model validation, the obtained model can be interpreted
according to the results.
Data description
The data used for the analysis are event logs downloaded
from an e-learning system for one e-course of a higher
education institution in Croatia for a student generation in
the 2017/2018 academic year. The time span in which the
data were observed was from February 2018 to June 2018.
Originally, there were 62,985 records, and after data clean-
ing and removing around 3000 records about course admin-
istrations and teachers, 59,605 records remained for
analysis. These records represented the raw data which
consisted of access date and time, student names, context
(e.g. lecture materials), component (e.g. “record”), activity
description, source (e.g. “web”), and the IP address of the
student who accessed the e-course.
The data cleaning included removing information about
the activity of system administrators and teachers because
only students’ behavior in the e-learning system was inter-
esting for this analysis. In addition, due to the sensibility of
the data and privacy, only a subset of anonymized data was
extracted for further analysis. In total, there were 185 stu-
dents participating in the e-course during the semester.
There were two mid-term exams which were performed
Figure 1. Educational data mining process using cluster analysis
and decision tree technique.
4 International Journal of Engineering Business Management
in April 2018 and in June the same year. Each mid-term
exam had 40 points at maximum, and there was no thresh-
old for the required minimum points. The results of the
mid-term exams were assigned for each student individu-
ally in the e-learning system.
As stated in previous research,
11
the following variables
were recognized as significant for cluster formation:
1. “Context” from the event logs that provides infor-
mation about the e-content type.
2. A description of the activity that relates the activity
with the unique student identification label.
Previous research aimed to find groups of students
according to their behavior in the e-learning system but
another generation. By applying the same variables on
another data set (the generation 2017/2018 in this case), the
usefulness of the context variables is tested. To further ana-
lyze and understand student behavior, this study takes a
deeper approach and applies additional decision tree tech-
nique on data.
The values of the variable “Context” were as follows:
access to lecture materials, access to auditory materials,
access to laboratory materials, and access to forums. Lec-
ture materials were available to students each week when
the teaching topic was processed. Before or after the
lectures, students were able to download the teaching mate-
rials from the e-learning system. Before auditory exercises
(AEs), students were able to download and print teaching
materials so they could easily follow the class. On average,
it took about five clicks to download each material. Labora-
tory exercises (LEs) were held in laboratory classes at a
higher education institution where students were asked to
show independency in solving the assignments. During the
class, students were required to download e-learning mate-
rials, which also required approximately five clicks. The
forums consisted of a Discussion Forum, where students
were able to ask questions about the e-course and commu-
nicate mutually, and a News Forum that contained news
related to the e-course and teacher consultations, which
were addressed by the teachers themselves.
After data cleaning, a pivot table was created, contain-
ing information about frequency of access for each student
according to his or her recorded identification label. Fre-
quency of access to the e-content shows the popularity of
the content, and the “popularity” can be measured by how
many times requests are made for the e-content during the
semester.
21
By the frequency of access to the e-content in
the e-course, it is possible to determine which e-content
students recognized as relevant for passing the mid-term
exams and whether the frequencies of the access influenced
the final outcome of the exams.
11
So, the pivot table con-
tained student identification labels in a form of numbers
and numerical frequencies of access to materials from lec-
tures, AEs, LEs, and forums for each student. This table
was imported into RapidMiner
22
tool that has been used for
performing the next data mining techniques: cluster analy-
sis and decision tree. These data mining techniques were
selected because, according to the literature,
12
data mining
uses a more direct approach, such as the percentage usage
of well-classified data, while statistical techniques are usu-
ally used as a quality criterion for the veracity of the data
given model. Besides, data mining techniques work well
with very large amounts of data, while the statistics does
not work well in large databases with high dimensionality.
The tool settings for the cluster analysis were the applied
algorithm was k-means, the number of groups was 3
(according to testing, it was considered to be the best value
with promising results), the grouping variable was stu-
dent’s ID, the method chosen for normalization was
Z-transformation, measure types for grouping were
numerical measures, and chosen numerical measure was
Euclidean distance. Finally, the selected influential vari -
ables on grouping were frequencies of access to materials
from lectures, AEs and LEs, and forums.
The tool settings for the performance of decision tree
technique were respectively: the target variable whose out-
come was intended to be predicted is the number of stu-
dents’ points achieved in two mid-term exams where both
mid-term exams amounted to 80 points in total. Student’s
points are the variable that yields the highest information
gain. Further on, the method chosen for normalization was
Z-transformation, the criterion by which the decision trees
were created was the least square, maximal depth of the
trees was 10, minimal leaf size was 2, minimal size for split
was 4, and a number of prepruning alternatives was 3.
These settings were applied to all decision trees which
resulted from this research. The difference was in the size
of the minimal gain, and it was as follows:
� For the decision tree of the cluster number 0: 0.105.
� For the decision tree of the cluster number 1: 0.081.
� For the decision tree of the cluster number 2: 0.08.
These values were chosen considering the best resulted
branching of the trees and the acceptability of the results for
interpretation according to previously obtained clustering
models.
Results
The educational data mining analysis, conducted in this
research, resulted with one model by cluster analysis show-
ing groups of students according to their behavior in the e-
learning system and three models of decision tree made
according to previously conducted cluster analysis. The
following section describes the results of the grouping anal-
ysis and decision tree. In addition, a box plot diagram made
by points of the students from the mid-term exams is pre-
sented to show the verification of gained models by stu-
dent’s success.
Križanić 5
Interpretation of the grouping results
The aim of grouping the students was to find groups of
students who were similar to each other within the group
and different in respect to the other groups. The similarity
depends on the behavior of the students in an e-learning
system during the semester. Behavioral intention is an
important predictor of student behavior that varies between
different behavioral, control, and normative beliefs on the
desired behavior.
23
The application of the k-means method
over the data which contained information about 185 stu-
dents in one e-course, at a higher education institution,
resulted with the following three groups:
� Group 0 contained 84 students.
� Group 1 contained 82 students.
� Group 2 contained 19 students.
Figure 2 represents the groups of the students in a form
of a tree, while Figure 3 represents the plot with the move-
ments of the value of the variable “Context” according to
the range of the centroid values.
Figure 2 shows the groups of students in a form of a tree.
According to Table 1, which is a centroid table, group 0
contains the students who had the lowest access to the
content in the e-course. This group shows weekly down-
loading activity of materials from LEs and lectures. Group
1 contains students who had a medium frequency of access
to e-content. They mostly accessed materials from LEs and
lectures. The least accessed set of materials for this group is
related to forums. In group 2, there are 19 students who had
a high frequency of access to materials from AEs, lectures,
and LEs. Figure 3 represents a plot diagram showing the
movement of groups by the value of the variable “Context”
and the range of the centroid values. According to this
analysis, group 0 contains the students with the lowest
frequency of access to the content in the e-course, and
group 2 contains the students with the highest frequency
of access to materials from the e-learning system.
Interpretation of the results obtained by
the decision tree technique
After conducting a cluster analysis, which resulted with one
model showing three groups of students, three decision
trees were created based on these groups. Each decision
tree model represents the behavior of one group of the
students. Figure 4 represents the decision tree demonstrat-
ing the behavior of the students from group 0, Figure 5
represents the behavior of the students from group 1, and
finally, Figure 6 represents the decision tree showing the
behavior of the students from group 2. The variable that
gives the highest information gain is the student’s points
from the mid-term exams. The nodes represent the contents
of the e-course or the value of the variable “Context,” and
the values on the arcs represent the frequencies of access to
the e-contents.
Figure 4 represents the decision tree model for group 0
from the grouping method. The model shows that there
were only a few students for whom the highest frequency
of access to materials from lectures meant the highest fre-
quency of access to other e-contents. Many students in this
group had low frequency of access to lecture materials.
However, those students who attended the lecture materials
mostly accessed the forums. Frequent access to forums did
not mean frequent access to other e-contents. Low access to
forums also led to low access to materials from AEs. Low
access to materials from AEs also led to low access to
materials from LEs. Students with greater points in mid-
term exams combined frequent access to materials from
lectures with frequent access to materials from LEs.
The model from Figure 5 represents the decision tree for
group 1 by cluster analysis. The more often students
accessed materials from lectures, the more they accessed
forums. Low frequency of access to lecture materials
resulted with poor results in the mid-term exams. There
were many students in this group who mostly applied the
combination of accessing lecture materials and materials
from AEs. Students in this group with the highest number
of points in mid-term exams seemed to recognize the
importance of accessing the combination of materials from
lectures, AEs, and LEs. The more often they accessed lec-
ture materials and materials from AEs, the more likely they
were to score better points in the mid-term exams. Unlike
group 0, group 1 consisted mostly of students who had
medium frequency of access to all e-contents.
Finally, the third decision tree model in Figure 6 repre-
sents the behavior of the students from group 2. This group
was the smallest and contained 19 students who had the
highest frequency of access to the contents from the e-
learning system. According to Figure 6, low frequency of
access to materials from AEs and LEs indicated lower score
on the mid-term exams. Higher frequency of access to
Figure 2. Groups of students.
6 International Journal of Engineering Business Management
materials from LEs and AEs, as well as more frequent
retrieval of lecture materials, provided better points at the
mid-term exams. Many students in this group combined all
of these three elements and they achieved very good results
at the mid-term exams.
This analysis indicates that, from the teacher perspec-
tive, content management in the form of focusing on the
quality of theory-oriented materials is crucial due to the
fact that, without a well-presented theoretical background,
students cannot successfully complete the course.
Analysis of students’ achievement through
mid-term exams
There were two mid-term exams in the e-course through
which the students could pass the exam. Each mid-term
exam contained a maximum of 40 points. The mid-term
exams included two types of questions: theory oriented
(mainly from lecture materials) and practical assignments
(mainly from materials from AEs and LEs).
11
No minimum
number of points from the first mid-term exam was
required to access the second mid-term exam. Figure 7
represents the points from both exams in total for all the
students in the e-course. Cluster 0 represents the points of
those students who by cluster analysis on Figure 2 in this
article belong to group 0. Cluster 1 contains the points from
the exams of those students who by cluster analysis on
Figure 2 belong to group 1. Finally, cluster 2 demonstrates
the points from those students who by cluster analysis
belong to group 2. As can be seen from Figure 7, cluster
0 contains the points of the students whose behavior can be
described as the one with the least attention to downloading
learning materials continuously from the e-learning system.
Besides, the students in this group gained the lowest points
at the mid-term exams. Cluster 1 contains the points of the
students who had medium frequency of access to e-learning
materials, and their points vary. Some students achieved
low points (e.g. less than 10 of 80), and some achieved a
high number of points (e.g. more than 70). Cluster 2 con-
tains the points of the students who had the highest fre-
quency of access to the e-learning materials. These points
are globally the highest points in the e-course. According to
the data on created groups and the most accessed contents
by these groups, the content-related variable of behavior
that makes the difference between the points achieved by
the students is found in the behavior of accessing the lec-
ture materials. Students who accessed materials from the
lectures more often achieved better results at the mid-term
exams.
Conclusion
In this article, educational data mining field was explored.
This field became very popular in recent years due to the
Figure 3. Movements of the groups according to “Context.”
Table 1. Centroid table.
The value of the
variable “Context” Group 0 Group 1 Group 2
Lectures materials �0.723 0.385 1.536
Auditory exercises �0.675 0.223 2.020
Laboratory exercises �0.784 0.451 1.522
Forums �0.440 0.115 1.449
Križanić 7
emergence of big data stored in databases containing
records about students’ behavior in e-courses of higher
education institutions. The quality of study programs is
very important due to the competition between the higher
education institutions and because of the knowledge stu-
dents bring with them to the job market after graduation.
Educational data mining is a part of data mining field and
therefore cluster analysis and decision tree technique have
been applied in the research conducted in this article. The
cluster analysis resulted with groups of students according
to the frequencies of access to the e-contents, confirming
author’s previous research. The decision tree technique was
applied to the grouping results to enable a deeper analysis
Figure 4. Decision tree for group 0 from the cluster analysis.
Figure 5. Decision tree for group 1 from the cluster analysis.
Figure 6. Decision tree for group 2 from the cluster analysis.
Figure 7. The points of the students from the mid-term exams by
the groups they belong.
8 International Journal of Engineering Business Management
of student behavior in teaching and learning processes.
Based on the knowledge acquired by educational data min-
ing, course teachers can identify the content of the e-course
that is worth putting more attention to emphasize its impor-
tance and select more suitable motivating techniques to
encourage students to use that content while preparing for
the exams. The following research could focus on collect-
ing data from other generations and conducting similar
analysis on other courses with similar process scenarios for
the purpose of revealing differences between the behavior s
of students’ generations or differences that are related to
course management.
Declaration of conflicting interests
The author(s) declared no potential conflicts of interest with
respect to the research, authorship, and/or publication of this
article.
Funding
The author(s) received no financial support for the research,
authorship, and/or publication of this article.
ORCID iD
Snježana Križanić https://orcid.org/0000-0002-0834-1710
References
1. Ahmad F, Ismail NH, and Aziz AA. The prediction of stu-
dents’ academic performance using classification data mining
techniques. Appl Math Sci 2015; 9: 6415–6426.
2. Hung JL, Hsu YCH, and Rice K. Integrating data mining in
program evaluation of k-12 online education. Educat Technol
Soc 2012; 15(3): 27–41.
3. Bin Mat U, Buniyamin N, Arsad PM, et al. An overview of
using academic analytics to predict and improve students’
achievement: a proposed proactive intelligent intervention.
In: IEEE 5th Conference on Engineering Education
(ICEED), Kuala Lumpur, 4–5 December 2013, pp.126–130.
4. Dumas M, La Rosa M, Mendling J, et al. Fundamentals of
business process management. Berlin: Springer, 2013, pp.
353–367.
5. Jain AK, Murty MN, and Flynn PJ. Data clustering: a review.
ACM Comput Surv 1999; 31: 264–323.
6. Asif R, Merceron A, Ali SB, et al. Analyzing undergraduate
students’ performance using educational data mining. Com-
put Educat 2017; 113: 177–194.
7. Selby RW and Porter AA. Learning from examples: genera-
tion and evaluation of decision trees for software resource
analysis. IEEE Transact Soft Eng 1988; 14(12): 1743–1757.
8. Folino F, Greco G, Guzzo A, et al. Mining usage scenarios in
business processes: outlier-aware discovery and run-time pre-
diction. Data Knowl Eng 2011; 70: 1005–1029.
9. Romero C, Espejo P, Zafra A, et al. Web usage mining for
predicting final marks of students that use Moodle courses.
Comput Appl Eng Educat 2013; 21: 135–146.
10. Devasia T, Vinushree TP, and Hegde V. Prediction of stu-
dents performance using educational data mining. In: Pro-
ceedings of 2016 International Conference on Data Mining
and Advanced Computing, Ernakulam, 16–18 March 2016,
pp. 91–95.
11. Križanić S and Tomičić-Pupek K. Process parameters
discov-
ery based on application of k-means algorithm—a real case
experimental study. In: Central European Conference on
Information and Intelligent Systems (CECIIS), Faculty of
Organization and Informatics, Varaždin, Croatia, 02–04
October 2019.
12. Márquez-Vera C, Morales CR, and Soto SV. Predicting
school failure and dropout by using data mining techniques.
IEEE J Lat-Amer Lear Technol 2013; 8(1): 7–14.
13. Dutt A, Ismail MA, and Herawan T. A systematic review on
educational data mining. IEEE Access, 2017; 5:
15991–16005.
14. Jain AK. Data clustering: 50 years beyond K-means. Pat
Recog Let 2010; 31(8): 651–666.
15. Elouedi Z, Mellouli K, and Smets P. Belief decision trees:
the-
oretical foundations. Int J Approx Reason 2001; 28: 91–124.
16. Osei-Bryson KM. Evaluation of decision trees: a multi-
criteria approach. Comput Operat Res 2004; 31: 1933–1945.
17. Van Der Aalst W. Process mining. Berlin, Heidelberg:
Springer, 2011, pp.94–97.
18. Suârez A and Lutsko J. Globally optimal fuzzy decision
trees
for classification and regression. IEEE Transact Pat Anal
Mach Intel. 1999;21(12):1297–1311.
19. Kamiński B, Jakubczyk M, and Szufel P. A framework for
sensitivity analysis of decision trees. Cent Eur J Operat Res
2018; 26(1): 135–159.
20. Wei Y, Zhang X, Shi Y, et al. A review of data-driven
approaches for prediction and classification of building energy
consumption. Renew Sust Energ Rev 2018; 82(1): 1027–1047.
21. Namasudra S and Roy P. PpBAC: popularity based access
control model for cloud computing. J Organizat End User
Comput 2018; 30(4): 14–31.
22. RapidMiner Studio, https://rapidminer.com/products/studio/
(2019, accessed 24 September 2019).
23. Grublješič T, Coelho PS, and Jaklič J. The shift to socio-
organizational drivers of business intelligence and analytics
acceptance. J Organizat End User Comput 2019; 31(2):
37–62.
Križanić 9
https://orcid.org/0000-0002-0834-1710
https://orcid.org/0000-0002-0834-1710
https://orcid.org/0000-0002-0834-1710
https://rapidminer.com/products/studio/
<<
/ASCII85EncodePages false
/AllowTransparency false
/AutoPositionEPSFiles true
/AutoRotatePages /None
/Binding /Left
/CalGrayProfile (Gray Gamma 2.2)
/CalRGBProfile (sRGB IEC61966-2.1)
/CalCMYKProfile (U.S. Web Coated 050SWOP051 v2)
/sRGBProfile (sRGB IEC61966-2.1)
/CannotEmbedFontPolicy /Warning
/CompatibilityLevel 1.4
/CompressObjects /Off
/CompressPages true
/ConvertImagesToIndexed true
/PassThroughJPEGImages false
/CreateJobTicket false
/DefaultRenderingIntent /Default
/DetectBlends true
/DetectCurves 0.1000
/ColorConversionStrategy /LeaveColorUnchanged
/DoThumbnails false
/EmbedAllFonts true
/EmbedOpenType false
/ParseICCProfilesInComments true
/EmbedJobOptions true
/DSCReportingLevel 0
/EmitDSCWarnings false
/EndPage -1
/ImageMemory 1048576
/LockDistillerParams true
/MaxSubsetPct 100
/Optimize true
/OPM 1
/ParseDSCComments true
/ParseDSCCommentsForDocInfo true
/PreserveCopyPage true
/PreserveDICMYKValues true
/PreserveEPSInfo true
/PreserveFlatness false
/PreserveHalftoneInfo false
/PreserveOPIComments false
/PreserveOverprintSettings true
/StartPage 1
/SubsetFonts true
/TransferFunctionInfo /Apply
/UCRandBGInfo /Remove
/UsePrologue false
/ColorSettingsFile ()
/AlwaysEmbed [ true
]
/NeverEmbed [ true
]
/AntiAliasColorImages false
/CropColorImages false
/ColorImageMinResolution 266
/ColorImageMinResolutionPolicy /OK
/DownsampleColorImages true
/ColorImageDownsampleType /Average
/ColorImageResolution 175
/ColorImageDepth -1
/ColorImageMinDownsampleDepth 1
/ColorImageDownsampleThreshold 1.50286
/EncodeColorImages true
/ColorImageFilter /DCTEncode
/AutoFilterColorImages true
/ColorImageAutoFilterStrategy /JPEG
/ColorACSImageDict <<
/QFactor 0.40
/HSamples [1 1 1 1] /VSamples [1 1 1 1]
>>
/ColorImageDict <<
/QFactor 0.76
/HSamples [2 1 1 2] /VSamples [2 1 1 2]
>>
/JPEG2000ColorACSImageDict <<
/TileWidth 256
/TileHeight 256
/Quality 30
>>
/JPEG2000ColorImageDict <<
/TileWidth 256
/TileHeight 256
/Quality 30
>>
/AntiAliasGrayImages false
/CropGrayImages false
/GrayImageMinResolution 266
/GrayImageMinResolutionPolicy /OK
/DownsampleGrayImages true
/GrayImageDownsampleType /Average
/GrayImageResolution 175
/GrayImageDepth -1
/GrayImageMinDownsampleDepth 2
/GrayImageDownsampleThreshold 1.50286
/EncodeGrayImages true
/GrayImageFilter /DCTEncode
/AutoFilterGrayImages true
/GrayImageAutoFilterStrategy /JPEG
/GrayACSImageDict <<
/QFactor 0.40
/HSamples [1 1 1 1] /VSamples [1 1 1 1]
>>
/GrayImageDict <<
/QFactor 0.76
/HSamples [2 1 1 2] /VSamples [2 1 1 2]
>>
/JPEG2000GrayACSImageDict <<
/TileWidth 256
/TileHeight 256
/Quality 30
>>
/JPEG2000GrayImageDict <<
/TileWidth 256
/TileHeight 256
/Quality 30
>>
/AntiAliasMonoImages false
/CropMonoImages false
/MonoImageMinResolution 900
/MonoImageMinResolutionPolicy /OK
/DownsampleMonoImages true
/MonoImageDownsampleType /Average
/MonoImageResolution 175
/MonoImageDepth -1
/MonoImageDownsampleThreshold 1.50286
/EncodeMonoImages true
/MonoImageFilter /CCITTFaxEncode
/MonoImageDict <<
/K -1
>>
/AllowPSXObjects false
/CheckCompliance [
/None
]
/PDFX1aCheck false
/PDFX3Check false
/PDFXCompliantPDFOnly false
/PDFXNoTrimBoxError true
/PDFXTrimBoxToMediaBoxOffset [
0.00000
0.00000
0.00000
0.00000
]
/PDFXSetBleedBoxToMediaBox false
/PDFXBleedBoxToTrimBoxOffset [
0.00000
0.00000
0.00000
0.00000
]
/PDFXOutputIntentProfile (U.S. Web Coated 050SWOP051
v2)
/PDFXOutputConditionIdentifier (CGATS TR 001)
/PDFXOutputCondition ()
/PDFXRegistryName (http://www.color.org)
/PDFXTrapped /Unknown
/CreateJDFFile false
/Description <<
/ENU
<FEFF00550073006500200074006800650073006500200053006
1006700650020007300740061006e006400610072006400200073
0065007400740069006e0067007300200066006f0072002000630
0720065006100740069006e006700200077006500620020005000
440046002000660069006c00650073002e0020005400680065007
30065002000730065007400740069006e0067007300200063006f
006e006600690067007500720065006400200066006f007200200
04100630072006f006200610074002000760037002e0030002e00
20004300720065006100740065006400200062007900200054007
2006f00790020004f007400730020006100740020005300610067
00650020005500530020006f006e002000310031002f003100300
02f0032003000300036002e000d000d0032003000300050005000
49002f003600300030005000500049002f004a005000450047002
0004d0065006400690075006d002f004300430049005400540020
00470072006f0075007000200034>
>>
/Namespace [
(Adobe)
(Common)
(1.0)
]
/OtherNamespaces [
<<
/AsReaderSpreads false
/CropImagesToFrames true
/ErrorControl /WarnAndContinue
/FlattenerIgnoreSpreadOverrides false
/IncludeGuidesGrids false
/IncludeNonPrinting false
/IncludeSlug false
/Namespace [
(Adobe)
(InDesign)
(4.0)
]
/OmitPlacedBitmaps false
/OmitPlacedEPS false
/OmitPlacedPDF false
/SimulateOverprint /Legacy
>>
<<
/AllowImageBreaks true
/AllowTableBreaks true
/ExpandPage false
/HonorBaseURL true
/HonorRolloverEffect false
/IgnoreHTMLPageBreaks false
/IncludeHeaderFooter false
/MarginOffset [
0
0
0
0
]
/MetadataAuthor ()
/MetadataKeywords ()
/MetadataSubject ()
/MetadataTitle ()
/MetricPageSize [
0
0
]
/MetricUnit /inch
/MobileCompatible 0
/Namespace [
(Adobe)
(GoLive)
(8.0)
]
/OpenZoomToHTMLFontSize false
/PageOrientation /Portrait
/RemoveBackground false
/ShrinkContent true
/TreatColorsAs /MainMonitorColors
/UseEmbeddedProfiles false
/UseHTMLTitleAsMetadata true
>>
<<
/AddBleedMarks false
/AddColorBars false
/AddCropMarks false
/AddPageInfo false
/AddRegMarks false
/BleedOffset [
9
9
9
9
]
/ConvertColors /ConvertToRGB
/DestinationProfileName (sRGB IEC61966-2.1)
/DestinationProfileSelector /UseName
/Downsample16BitImages true
/FlattenerPreset <<
/ClipComplexRegions true
/ConvertStrokesToOutlines false
/ConvertTextToOutlines false
/GradientResolution 300
/LineArtTextResolution 1200
/PresetName ([High Resolution])
/PresetSelector /HighResolution
/RasterVectorBalance 1
>>
/FormElements true
/GenerateStructure false
/IncludeBookmarks false
/IncludeHyperlinks false
/IncludeInteractive false
/IncludeLayers false
/IncludeProfiles true
/MarksOffset 9
/MarksWeight 0.125000
/MultimediaHandling /UseObjectSettings
/Namespace [
(Adobe)
(CreativeSuite)
(2.0)
]
/PDFXOutputIntentProfileSelector /DocumentCMYK
/PageMarksFile /RomanDefault
/PreserveEditing true
/UntaggedCMYKHandling /UseDocumentProfile
/UntaggedRGBHandling /UseDocumentProfile
/UseDocumentBleed false
>>
]
/SyntheticBoldness 1.000000
>> setdistillerparams
<<
/HWResolution [288 288]
/PageSize [612.000 792.000]
>> setpagedevice

Mais conteúdo relacionado

Semelhante a · You may choose one or more chapters from E.G. Whites, The Minist

EBUS5423 Data Analytics and Reporting Bl
EBUS5423 Data Analytics and Reporting BlEBUS5423 Data Analytics and Reporting Bl
EBUS5423 Data Analytics and Reporting BlDr. Bruce A. Johnson
 
A LEARNING ANALYTICS APPROACH FOR STUDENT PERFORMANCE ASSESSMENT
A LEARNING ANALYTICS APPROACH FOR STUDENT PERFORMANCE ASSESSMENTA LEARNING ANALYTICS APPROACH FOR STUDENT PERFORMANCE ASSESSMENT
A LEARNING ANALYTICS APPROACH FOR STUDENT PERFORMANCE ASSESSMENTTye Rausch
 
A LEARNING ANALYTICS APPROACH FOR STUDENT PERFORMANCE ASSESSMENT
A LEARNING ANALYTICS APPROACH FOR STUDENT PERFORMANCE ASSESSMENTA LEARNING ANALYTICS APPROACH FOR STUDENT PERFORMANCE ASSESSMENT
A LEARNING ANALYTICS APPROACH FOR STUDENT PERFORMANCE ASSESSMENTAIRCC Publishing Corporation
 
A Survey on Research work in Educational Data Mining
A Survey on Research work in Educational Data MiningA Survey on Research work in Educational Data Mining
A Survey on Research work in Educational Data Miningiosrjce
 
Learning Analytics In Higher Education: Struggles & Successes (Part 2)
Learning Analytics In Higher Education: Struggles & Successes (Part 2)Learning Analytics In Higher Education: Struggles & Successes (Part 2)
Learning Analytics In Higher Education: Struggles & Successes (Part 2)Lambda Solutions
 
Analysis of Learning Behavior Characteristics and Prediction of Learning Effe...
Analysis of Learning Behavior Characteristics and Prediction of Learning Effe...Analysis of Learning Behavior Characteristics and Prediction of Learning Effe...
Analysis of Learning Behavior Characteristics and Prediction of Learning Effe...Shakas Technologies
 
A Survey on Educational Data Mining Techniques
A Survey on Educational Data Mining TechniquesA Survey on Educational Data Mining Techniques
A Survey on Educational Data Mining TechniquesIIRindia
 
EDM_IJTIR_Article_201504020
EDM_IJTIR_Article_201504020EDM_IJTIR_Article_201504020
EDM_IJTIR_Article_201504020Ritika Saxena
 
IRJET- Academic Performance Analysis System
IRJET- Academic Performance Analysis SystemIRJET- Academic Performance Analysis System
IRJET- Academic Performance Analysis SystemIRJET Journal
 
Krakow presentation speak_appsmngm_final
Krakow presentation speak_appsmngm_finalKrakow presentation speak_appsmngm_final
Krakow presentation speak_appsmngm_finalSpeakApps Project
 
Automatic Assessment of University Teachers Critical Thinking Levels.pdf
Automatic Assessment of University Teachers  Critical Thinking Levels.pdfAutomatic Assessment of University Teachers  Critical Thinking Levels.pdf
Automatic Assessment of University Teachers Critical Thinking Levels.pdfTracy Morgan
 
Learning Analytics Dashboards for Advisors – A Systematic Literature Review
Learning Analytics Dashboards for Advisors – A Systematic Literature ReviewLearning Analytics Dashboards for Advisors – A Systematic Literature Review
Learning Analytics Dashboards for Advisors – A Systematic Literature ReviewIJCI JOURNAL
 
1st Seminar Presentation By Ali Aijaz Shar [Autosaved].pptx
1st Seminar Presentation By Ali Aijaz Shar [Autosaved].pptx1st Seminar Presentation By Ali Aijaz Shar [Autosaved].pptx
1st Seminar Presentation By Ali Aijaz Shar [Autosaved].pptxAli Aijaz
 
Developing a framework to improve information literacy in an entry to practic...
Developing a framework to improve information literacy in an entry to practic...Developing a framework to improve information literacy in an entry to practic...
Developing a framework to improve information literacy in an entry to practic...IL Group (CILIP Information Literacy Group)
 
Identifying the Key Factors of Training Technical School and College Teachers...
Identifying the Key Factors of Training Technical School and College Teachers...Identifying the Key Factors of Training Technical School and College Teachers...
Identifying the Key Factors of Training Technical School and College Teachers...ijtsrd
 
Volume 2-issue-6-2034-2036
Volume 2-issue-6-2034-2036Volume 2-issue-6-2034-2036
Volume 2-issue-6-2034-2036Editor IJARCET
 

Semelhante a · You may choose one or more chapters from E.G. Whites, The Minist (20)

EBUS5423 Data Analytics and Reporting Bl
EBUS5423 Data Analytics and Reporting BlEBUS5423 Data Analytics and Reporting Bl
EBUS5423 Data Analytics and Reporting Bl
 
A LEARNING ANALYTICS APPROACH FOR STUDENT PERFORMANCE ASSESSMENT
A LEARNING ANALYTICS APPROACH FOR STUDENT PERFORMANCE ASSESSMENTA LEARNING ANALYTICS APPROACH FOR STUDENT PERFORMANCE ASSESSMENT
A LEARNING ANALYTICS APPROACH FOR STUDENT PERFORMANCE ASSESSMENT
 
A LEARNING ANALYTICS APPROACH FOR STUDENT PERFORMANCE ASSESSMENT
A LEARNING ANALYTICS APPROACH FOR STUDENT PERFORMANCE ASSESSMENTA LEARNING ANALYTICS APPROACH FOR STUDENT PERFORMANCE ASSESSMENT
A LEARNING ANALYTICS APPROACH FOR STUDENT PERFORMANCE ASSESSMENT
 
G017224349
G017224349G017224349
G017224349
 
A Survey on Research work in Educational Data Mining
A Survey on Research work in Educational Data MiningA Survey on Research work in Educational Data Mining
A Survey on Research work in Educational Data Mining
 
Learning Analytics In Higher Education: Struggles & Successes (Part 2)
Learning Analytics In Higher Education: Struggles & Successes (Part 2)Learning Analytics In Higher Education: Struggles & Successes (Part 2)
Learning Analytics In Higher Education: Struggles & Successes (Part 2)
 
Developing a Learning Model to Promote the Skills of Analytical Thinking
Developing a Learning Model to Promote the Skills of Analytical ThinkingDeveloping a Learning Model to Promote the Skills of Analytical Thinking
Developing a Learning Model to Promote the Skills of Analytical Thinking
 
Analysis of Learning Behavior Characteristics and Prediction of Learning Effe...
Analysis of Learning Behavior Characteristics and Prediction of Learning Effe...Analysis of Learning Behavior Characteristics and Prediction of Learning Effe...
Analysis of Learning Behavior Characteristics and Prediction of Learning Effe...
 
A Survey on Educational Data Mining Techniques
A Survey on Educational Data Mining TechniquesA Survey on Educational Data Mining Techniques
A Survey on Educational Data Mining Techniques
 
EDM_IJTIR_Article_201504020
EDM_IJTIR_Article_201504020EDM_IJTIR_Article_201504020
EDM_IJTIR_Article_201504020
 
Scientific Paper-2
Scientific Paper-2Scientific Paper-2
Scientific Paper-2
 
L016136369
L016136369L016136369
L016136369
 
IRJET- Academic Performance Analysis System
IRJET- Academic Performance Analysis SystemIRJET- Academic Performance Analysis System
IRJET- Academic Performance Analysis System
 
Krakow presentation speak_appsmngm_final
Krakow presentation speak_appsmngm_finalKrakow presentation speak_appsmngm_final
Krakow presentation speak_appsmngm_final
 
Automatic Assessment of University Teachers Critical Thinking Levels.pdf
Automatic Assessment of University Teachers  Critical Thinking Levels.pdfAutomatic Assessment of University Teachers  Critical Thinking Levels.pdf
Automatic Assessment of University Teachers Critical Thinking Levels.pdf
 
Learning Analytics Dashboards for Advisors – A Systematic Literature Review
Learning Analytics Dashboards for Advisors – A Systematic Literature ReviewLearning Analytics Dashboards for Advisors – A Systematic Literature Review
Learning Analytics Dashboards for Advisors – A Systematic Literature Review
 
1st Seminar Presentation By Ali Aijaz Shar [Autosaved].pptx
1st Seminar Presentation By Ali Aijaz Shar [Autosaved].pptx1st Seminar Presentation By Ali Aijaz Shar [Autosaved].pptx
1st Seminar Presentation By Ali Aijaz Shar [Autosaved].pptx
 
Developing a framework to improve information literacy in an entry to practic...
Developing a framework to improve information literacy in an entry to practic...Developing a framework to improve information literacy in an entry to practic...
Developing a framework to improve information literacy in an entry to practic...
 
Identifying the Key Factors of Training Technical School and College Teachers...
Identifying the Key Factors of Training Technical School and College Teachers...Identifying the Key Factors of Training Technical School and College Teachers...
Identifying the Key Factors of Training Technical School and College Teachers...
 
Volume 2-issue-6-2034-2036
Volume 2-issue-6-2034-2036Volume 2-issue-6-2034-2036
Volume 2-issue-6-2034-2036
 

Mais de LesleyWhitesidefv

• • ELEVENTH EDITION BUSINESS DATA NETWORKS AND
• • ELEVENTH EDITION BUSINESS DATA NETWORKS AND • • ELEVENTH EDITION BUSINESS DATA NETWORKS AND
• • ELEVENTH EDITION BUSINESS DATA NETWORKS AND LesleyWhitesidefv
 
⁎ Corresponding author.E-mail addresses [email protected] (
⁎ Corresponding author.E-mail addresses [email protected] (⁎ Corresponding author.E-mail addresses [email protected] (
⁎ Corresponding author.E-mail addresses [email protected] (LesleyWhitesidefv
 
‘ICHAPTER TWOChapter Objectives• To define stakehold
‘ICHAPTER TWOChapter Objectives• To define stakehold‘ICHAPTER TWOChapter Objectives• To define stakehold
‘ICHAPTER TWOChapter Objectives• To define stakeholdLesleyWhitesidefv
 
– 272 –C H A P T E R T E Nk Introductionk Alber
– 272 –C H A P T E R  T E Nk  Introductionk  Alber– 272 –C H A P T E R  T E Nk  Introductionk  Alber
– 272 –C H A P T E R T E Nk Introductionk AlberLesleyWhitesidefv
 
‘Jm So when was the first time you realised you were using everyd
‘Jm So when was the first time you realised you were using everyd‘Jm So when was the first time you realised you were using everyd
‘Jm So when was the first time you realised you were using everydLesleyWhitesidefv
 
•2To begin with a definition Self-esteem is the disp
•2To begin with a definition Self-esteem is the disp•2To begin with a definition Self-esteem is the disp
•2To begin with a definition Self-esteem is the dispLesleyWhitesidefv
 
• Sultan Alalshaikh, Doctoral Student, Pepperdine University G
• Sultan Alalshaikh, Doctoral Student, Pepperdine University G• Sultan Alalshaikh, Doctoral Student, Pepperdine University G
• Sultan Alalshaikh, Doctoral Student, Pepperdine University GLesleyWhitesidefv
 
•2Notes for the professorMuch of the content on these
•2Notes for the professorMuch of the content on these•2Notes for the professorMuch of the content on these
•2Notes for the professorMuch of the content on theseLesleyWhitesidefv
 
· You must respond to at least two of your peers by extending, ref
· You must respond to at least two of your peers by extending, ref· You must respond to at least two of your peers by extending, ref
· You must respond to at least two of your peers by extending, refLesleyWhitesidefv
 
· You have choices. You should answer three of the four available
· You have choices. You should answer three of the four available · You have choices. You should answer three of the four available
· You have choices. You should answer three of the four available LesleyWhitesidefv
 
· · Prepare a 2-page interprofessional staff update on HIPAA and
· · Prepare a 2-page interprofessional staff update on HIPAA and· · Prepare a 2-page interprofessional staff update on HIPAA and
· · Prepare a 2-page interprofessional staff update on HIPAA andLesleyWhitesidefv
 
·  Review the case study and, based on the provided information,
·  Review the case study and, based on the provided information,·  Review the case study and, based on the provided information,
·  Review the case study and, based on the provided information,LesleyWhitesidefv
 
·   · Introduction· What is hyperpituitarism and hypopituitari
·   · Introduction· What is hyperpituitarism and hypopituitari·   · Introduction· What is hyperpituitarism and hypopituitari
·   · Introduction· What is hyperpituitarism and hypopituitariLesleyWhitesidefv
 
· · Write a 3 page paper in which you analyze why regulatory age
· · Write a 3 page paper in which you analyze why regulatory age· · Write a 3 page paper in which you analyze why regulatory age
· · Write a 3 page paper in which you analyze why regulatory ageLesleyWhitesidefv
 
· Write a response as directed to each of the three case studies a
· Write a response as directed to each of the three case studies a· Write a response as directed to each of the three case studies a
· Write a response as directed to each of the three case studies aLesleyWhitesidefv
 
· Write a brief (one paragraph) summary for each reading.· · R
· Write a brief (one paragraph) summary for each reading.· · R· Write a brief (one paragraph) summary for each reading.· · R
· Write a brief (one paragraph) summary for each reading.· · RLesleyWhitesidefv
 
· Write a 2-page single spaced (12 font Times New Roman) book repo
· Write a 2-page single spaced (12 font Times New Roman) book repo· Write a 2-page single spaced (12 font Times New Roman) book repo
· Write a 2-page single spaced (12 font Times New Roman) book repoLesleyWhitesidefv
 
· Weight 11 of course gradeInstructionsData Instrument and D
· Weight 11 of course gradeInstructionsData Instrument and D· Weight 11 of course gradeInstructionsData Instrument and D
· Weight 11 of course gradeInstructionsData Instrument and DLesleyWhitesidefv
 
· Week 3 Crime Analysis BurglaryRobbery· ReadCozens, P. M.
· Week 3 Crime Analysis BurglaryRobbery· ReadCozens, P. M.· Week 3 Crime Analysis BurglaryRobbery· ReadCozens, P. M.
· Week 3 Crime Analysis BurglaryRobbery· ReadCozens, P. M.LesleyWhitesidefv
 
· What does the Goodale and Humphrey (1998) article mean by the f
· What does the Goodale and Humphrey (1998) article mean by the f· What does the Goodale and Humphrey (1998) article mean by the f
· What does the Goodale and Humphrey (1998) article mean by the fLesleyWhitesidefv
 

Mais de LesleyWhitesidefv (20)

• • ELEVENTH EDITION BUSINESS DATA NETWORKS AND
• • ELEVENTH EDITION BUSINESS DATA NETWORKS AND • • ELEVENTH EDITION BUSINESS DATA NETWORKS AND
• • ELEVENTH EDITION BUSINESS DATA NETWORKS AND
 
⁎ Corresponding author.E-mail addresses [email protected] (
⁎ Corresponding author.E-mail addresses [email protected] (⁎ Corresponding author.E-mail addresses [email protected] (
⁎ Corresponding author.E-mail addresses [email protected] (
 
‘ICHAPTER TWOChapter Objectives• To define stakehold
‘ICHAPTER TWOChapter Objectives• To define stakehold‘ICHAPTER TWOChapter Objectives• To define stakehold
‘ICHAPTER TWOChapter Objectives• To define stakehold
 
– 272 –C H A P T E R T E Nk Introductionk Alber
– 272 –C H A P T E R  T E Nk  Introductionk  Alber– 272 –C H A P T E R  T E Nk  Introductionk  Alber
– 272 –C H A P T E R T E Nk Introductionk Alber
 
‘Jm So when was the first time you realised you were using everyd
‘Jm So when was the first time you realised you were using everyd‘Jm So when was the first time you realised you were using everyd
‘Jm So when was the first time you realised you were using everyd
 
•2To begin with a definition Self-esteem is the disp
•2To begin with a definition Self-esteem is the disp•2To begin with a definition Self-esteem is the disp
•2To begin with a definition Self-esteem is the disp
 
• Sultan Alalshaikh, Doctoral Student, Pepperdine University G
• Sultan Alalshaikh, Doctoral Student, Pepperdine University G• Sultan Alalshaikh, Doctoral Student, Pepperdine University G
• Sultan Alalshaikh, Doctoral Student, Pepperdine University G
 
•2Notes for the professorMuch of the content on these
•2Notes for the professorMuch of the content on these•2Notes for the professorMuch of the content on these
•2Notes for the professorMuch of the content on these
 
· You must respond to at least two of your peers by extending, ref
· You must respond to at least two of your peers by extending, ref· You must respond to at least two of your peers by extending, ref
· You must respond to at least two of your peers by extending, ref
 
· You have choices. You should answer three of the four available
· You have choices. You should answer three of the four available · You have choices. You should answer three of the four available
· You have choices. You should answer three of the four available
 
· · Prepare a 2-page interprofessional staff update on HIPAA and
· · Prepare a 2-page interprofessional staff update on HIPAA and· · Prepare a 2-page interprofessional staff update on HIPAA and
· · Prepare a 2-page interprofessional staff update on HIPAA and
 
·  Review the case study and, based on the provided information,
·  Review the case study and, based on the provided information,·  Review the case study and, based on the provided information,
·  Review the case study and, based on the provided information,
 
·   · Introduction· What is hyperpituitarism and hypopituitari
·   · Introduction· What is hyperpituitarism and hypopituitari·   · Introduction· What is hyperpituitarism and hypopituitari
·   · Introduction· What is hyperpituitarism and hypopituitari
 
· · Write a 3 page paper in which you analyze why regulatory age
· · Write a 3 page paper in which you analyze why regulatory age· · Write a 3 page paper in which you analyze why regulatory age
· · Write a 3 page paper in which you analyze why regulatory age
 
· Write a response as directed to each of the three case studies a
· Write a response as directed to each of the three case studies a· Write a response as directed to each of the three case studies a
· Write a response as directed to each of the three case studies a
 
· Write a brief (one paragraph) summary for each reading.· · R
· Write a brief (one paragraph) summary for each reading.· · R· Write a brief (one paragraph) summary for each reading.· · R
· Write a brief (one paragraph) summary for each reading.· · R
 
· Write a 2-page single spaced (12 font Times New Roman) book repo
· Write a 2-page single spaced (12 font Times New Roman) book repo· Write a 2-page single spaced (12 font Times New Roman) book repo
· Write a 2-page single spaced (12 font Times New Roman) book repo
 
· Weight 11 of course gradeInstructionsData Instrument and D
· Weight 11 of course gradeInstructionsData Instrument and D· Weight 11 of course gradeInstructionsData Instrument and D
· Weight 11 of course gradeInstructionsData Instrument and D
 
· Week 3 Crime Analysis BurglaryRobbery· ReadCozens, P. M.
· Week 3 Crime Analysis BurglaryRobbery· ReadCozens, P. M.· Week 3 Crime Analysis BurglaryRobbery· ReadCozens, P. M.
· Week 3 Crime Analysis BurglaryRobbery· ReadCozens, P. M.
 
· What does the Goodale and Humphrey (1998) article mean by the f
· What does the Goodale and Humphrey (1998) article mean by the f· What does the Goodale and Humphrey (1998) article mean by the f
· What does the Goodale and Humphrey (1998) article mean by the f
 

Último

What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinojohnmickonozaleda
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 

Último (20)

What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipino
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 

· You may choose one or more chapters from E.G. Whites, The Minist

  • 1. · You may choose one or more chapters from E.G. Whites, The Ministry of Healing. You will then write a reflection paper regarding your thoughts, meaningful ideas, feelings, and/or reactions, and the application of these to nursing practice or your own spiritual growth and self-care. · Readings from E.G. White; The Ministry of Healing · Chapter 19 In Contact with Nature · Chapter 29 The Builders of the Home · Chapter 31 The Mother · Chapter 34 True Education, a Missionary Training Grading Criteria Points Possible Points Earned/Comments 1. Paper is typed in at least 3 pages, double spaced, and turned in on time via D2L, with title page in APA format 10 Points 2. Introductory paragraph is attention-getting 10 Points 3. Spelling, grammar, mechanics, and usage are correct throughout the paper 10 Points 4. Thoughts are expressed in a coherent and logical manner. 20 Points 5. Viewpoints and interpretations are insightful, demonstrating an in-depth reflection. 20 Points 6. Concluding paragraph sums up information, reiterates ideas and opinions, and leaves the reader with a call to action or
  • 2. something meaningful to remember 10 Points 7. Pertinent reference sources are skillfully woven throughout paper without overuse of quotations but, rather, attempt to paraphrase 10 Points 8. References are properly cited in APA format with no plagiarism. 5 Points 9. At least 3 references are cited, including a reference from current class assigned chapter readings in White, and two journal articles of your own choice (one may be the Bible). 5 Points Total 100 Possible Points Actual Points = References: White, E. G. (2011). The Ministry of healing. Guildford, UK: White Crow Books. APA format reference that you may use for free: https://owl.english.purdue.edu/owl/resource/560/01/ Technology in Education - Research Article Educational data mining using cluster analysis and decision tree technique: A case study Snježana Križanić
  • 3. 1 Abstract Data mining refers to the application of data analysis techniques with the aim of extracting hidden knowledge from data by performing the tasks of pattern recognition and predictive modeling. This article describes the application of data mining techniques on educational data of a higher education institution in Croatia. Data used for the analysis are event logs downloaded from an e-learning environment of a real e-course. Data mining techniques applied for the research are cluster analysis and decision tree. The cluster analysis was performed by organizing collections of patterns into groups based on student behavior similarity in using course materials. Decision tree was the method of interest for generating a representation of decision-making that allowed defining classes of objects for the purpose of deeper analysis about how students learned. Keywords Educational data mining, cluster analysis, decision trees, case study, log file Date received: 30 September 2019; accepted: 18 January 2020 Introduction Data mining is a widely spread approach for analyzing large data repositories to extract necessary or useful infor - mation. The goal of data mining application is to extract hidden data patterns and to detect relationships between parameters in a vast amount of data. The exploration of
  • 4. data in education using data mining techniques is com- monly known as educational data mining. 1 Different edu- cational data are stored in large databases. This is especially true for online programs, for the support of teaching processes and in which student learning behaviors can be recorded and stored. The most common type of such information systems is learning management system. 2 Many educational institutions evaluate the performance of their students based on final grades which depend on a course structure assessment and learning objectives to achieve an effective and consistent learning process. 3 In this article, cluster analysis and decision tree tech- nique are used to analyze student behavior for a real e-course during one semester. The data used for analysis are event logs downloaded from an e-learning system for
  • 5. one e-course at a higher education institution in Croatia for a student generation in 2017/2018. The file in which infor- mation system records are stored is called a log file and the data in it are called event logs. 4 Cluster analysis is a technique for creating organized collections of patterns into groups based on their similarity of some property or action. 5 Because of the fact that cluster analysis is used for different purposes in educational data mining, one of the most interesting areas of its application is for grouping the students to identify typical patterns of behavior. 6 1 Faculty of Organization and Informatics, University of Zagreb, Varaždin, Croatia Corresponding author: Snježana Križanić, Faculty of Organization and Informatics, University of
  • 6. Zagreb, Varaždin 42000, Croatia. Email: [email protected] International Journal of Engineering Business Management Volume 12: 1–9 ª The Author(s) 2020 DOI: 10.1177/1847979020908675 journals.sagepub.com/home/enb Creative Commons CC BY: This article is distributed under the terms of the Creative Commons Attribution 4.0 License (https://creativecommons.org/licenses/by/4.0/) which permits any use, reproduction and distribution of the work without further permission provided the original work is attributed as specified on the SAGE and Open Access pages (https://us.sagepub.com/en-us/nam/ open-access-at-sage). https://orcid.org/0000-0002-0834-1710 https://orcid.org/0000-0002-0834-1710 mailto:[email protected] https://doi.org/10.1177/1847979020908675 http://journals.sagepub.com/home/enb https://creativecommons.org/licenses/by/4.0/ https://us.sagepub.com/en-us/nam/open-access-at-sage https://us.sagepub.com/en-us/nam/open-access-at-sage http://crossmark.crossref.org/dialog/?doi=10.1177%2F18479790 20908675&domain=pdf&date_stamp=2020-02-25
  • 7. The purpose of decision trees is to identify specific object classes. Decision trees use different object attributes to classify different object subsets and do not use just one attribute or a fixed set of attributes. 7 The attractiveness of decision trees is in their easiness for understandability and interpretability. The aim of this article is to investigate which recorded elements of student behavior in the e-learning system could contribute to successful passing of exams in the observed e- course. The research questions this article is trying to answer are as follows: 1. Which student information can be extracted from event logs of an e-learning system? 2. Which variable values have a significant influence on grouping students with regard to their behavior in the e-learning system?
  • 8. The motivation for writing this article comes from finding a course that is interesting to analyze due to its variety of student activities based on which advanced data mining techniques can be applied to improve content management in that course. The quality of e-course exe- cution at higher education institutions in Croatia reflects the quality of teaching according to which higher educa- tion institutions are ranked. In the literature review, an analysis of the existing lit- erature is conducted. In this chapter, educational data min- ing, application of logs, cluster analysis, and decision tree technique are researched. Further on, research methodol - ogy of this article is presented with the aim of introduction on research data and research technique. Methodology is followed by a description of the results obtained by cluster analysis and decision tree technique. Article ends with final discussion remarks on perceived knowledge and future work.
  • 9. Literature review Logs could contain a wide range of information about pro- cess executions. 8 Data mining shares some characteristics with automatic process discovery techniques, and in data mining, “meaningful information is extracted from fine- granular data, so that these techniques of automatic process discovery are subsumed to the research area of process mining.” 4 Data mining is the process of extracting useful informa- tion and knowledge from a large set of data warehouses. It involves the application of data analytics tools to detect unknown patterns and relationships in large data sets. 1 “Data mining is a multidisciplinary area in which several computing paradigms converge: decision tree construction, rule induction, artificial neural networks, instance-based
  • 10. learning, Bayesian learning, logic programming, statistical algorithms, etc.” 9 In addition, some of the most useful data mining tasks and methods are statistics, visualization, clustering, classification, and association rule mining. These methods reveal new, interesting, and useful knowl - edge based on the available information. 9 The application of data mining techniques on educa- tional data is called educational data mining. 6 The primary goal of using data mining techniques in the field of educa- tion is to develop models by which we can predict the overall performance of students in selected courses. 1 The steps to improve the level of education are as follows: � Creating data sources of predictive variables. � Identification of different characteristics or factors
  • 11. that influence student learning performance during academic life. � Construction of a predictive model using classifica- tion data mining techniques based on predictive variables. � Validation of a model that was developed according to students’ performance while learning. 10 As there are many databases containing students’ infor- mation, it is possible to operate with large repositories of data reflecting how students learn. 11 Folino et al. were investigating the usage of external-memory decision tree induction approach to deal efficiently with large logs. 8 Data mining techniques economically provide adjustable educa- tion, effectively improve the system, and reduce the costs of an educational process.
  • 12. 10 Higher education institutions are concerned about the quality of education and use a variety of ways to analyze and advance understanding of student achievements. 3 In the context of teaching and learn- ing, student data can be used to create and construct pre- dictive models through which student performance can be identified. 3 “By extracting information from data, it is pos- sible to generate process models representing various pro- cess scenarios in education.” 11 Asif et al. state that the aim of forecasting in educational data mining is to predict stu- dents’ educational outcomes. 6 Examples of data mining
  • 13. techniques usage in the e-learning process are assessing student learning performance, ensuring course adjustment, and generating learning recommendations based on student behavior while learning, evaluating teaching materials and educational courses, providing feedback to teachers and students, and discovering atypical student behavior while learning. 9 Márquez-Vera et al. present a method for predicting student success, which consists of the following commonly used steps in educational data mining: 1. Data collection. Refers to collecting all available student information. Users create data files starting with e-learning databases. 9 2. Data preprocessing. At this stage, a data set is pre- pared for the application of data mining techniques. To successfully complete this stage, data 2 International Journal of Engineering Business Management
  • 14. preprocessing methods such as data cleansing, variable transformation, and data partitioning must be used. 3. Data mining. Data mining algorithms, such as clas- sification and clustering, are applied to predict student success. 4. Interpretation. At this stage, the models are ana- lyzed to predict student success. 12 Various data mining techniques such as classification and clustering are applied to reveal hidden knowledge from educational data. 6 Clustering is used by pattern anal- ysis, decision-making, and machine learning, which includes data mining, document retrieval, image segmen- tation, and pattern classification. 5 Various pieces of infor-
  • 15. mation stored for each event can be used for clustering, correlating, and finding causal relationships in the event logs. 4 Using cluster analysis, we separate students into groups, so that students in the same group share the same progression within the group. 6 Data clustering used with k-means algorithm enables teachers to predict student performance and associate learning styles of different learner types and their behavior with the aim of collec- tively improving institutional performance. 13 K-means is the most popular and the simplest partitional algori - thm used for clustering. 14 “Measuring the similarity of two objects is done by calculating a distance measure
  • 16. such as the Euclidean Distance attributes having numer- ical values.” 6 Several methods have been developed to solve classifi - cation problems. Among all these methods, decision tree is recognized as suitable, because it is considered to be one of the most commonly used methods in the supervised learn- ing approach. 15 Decision tree is a classification algorithm that is dis- played in the form of a tree in which two different types of nodes are connected by branches. 3 The induction of the decision tree is done through a supervised knowledge dis- covery process in which prior class knowledge was used to channel new knowledge. 16 The tree consists of internal nodes that match the logical attribute test and the connect-
  • 17. ing branches which represent the test outcomes. 6 The deci- sion tree classifies instances by sorting them down the tree from the root to the leaf nodes. 2 The decision tree is con- sidered to be a procedure that decides whether a particular value will be accepted or rejected, uses IF-THEN rule, and ensures that the current state is mapped to a future state to make a different decision. 3 IF-THEN rule is one of the most popular forms of knowledge representation because it is easy to understand and interpret by nonexpert users and can be directly applied in the decision-making pro- cess. 12 The nodes and the branches form a consecutive path through the decision tree that reaches the leaves, and
  • 18. it represents a specific mark. All the nodes in the tree correspond to a subset of data. Ideally, the leaf is clean, which means that all elements in the leaf have an equal chance of being a target variable or a class. 6 In the context of learning through the decision tree, the target variables refer to attributes. Each attribute node splits a set of instances into two or more subsets. The root of the tree corresponds to all instances. 17 Decision trees are easy to understand and well adapted to the classification problems. They suffer from a sensi - tivity of the data used in their construction and they are a less natural model for regression. The advantage of deci - sion trees is that there is a large number of efficient algo- rithms, which can find approximately optimal tree architectures. 18
  • 19. In addition, decision trees are able to break down the complex problem of decision-making into several simpler ones. 15 The steps in decision tree building are as follows: 1. Suppose C is a set of objects to be classified by starting from the current node. If all members within a set C are of the same class or C is empty, we determine that the current node is a node of the leaf, label it according to its class, and complete the pro- cedure. Otherwise, we move on to step 2. 2. Suppose Ai is the attribute selected for the current node. The attribute Ai has possible values in Vi ¼ fAi1, Ai2, . . . , Aivg. 3. We use attribute values to divide the set of objects C into mutually exclusive and exhaustive subsets fCi1, Ci2, . . . , Civg. Each subset of Cij contains objects in C which have the value Aij for the attribute Ai. 4. We create a child node in the tree for each attribute of the Aij value and the corresponding subset of Cij.
  • 20. Then we label the arc from the current node to the child node with the attribute value Aij. 5. For each child node, we recursively call the pro- cedure over the subset Cij with the set of available attributes fA � Aig.7 Decision nodes are usually represented as squares and child nodes are drawn to the right of their parents. 19 The decision tree can be used to predict and classify new stu- dents depending on their activities and decisions made, because the attributes and values, which are used for clas- sification, are also represented in the form of a tree. 9 According to knowledge from the data associated with the execution of numerous traces, the aim is to build a decision tree model for use to predict membership into the clusters for forthcoming enactments. 8 In comparison with other
  • 21. data-driven approaches, decision trees are easy to under- stand and their application does not include complex com- puter knowledge. 20 Methodology In this paragraph, research methodology used for conduct- ing the analysis will be presented. First, the proposed model for educational data mining using cluster analysis and Križanić 3 decision tree technique is presented. Then, the data source and the data type are described. Educational data mining model According to the literature researched in the previous stage, the activities shown in Figure 1 are recognized as some of the most important ones in educational data mining using cluster analysis and decision tree technique. First, the analyst needs to select a data set to analyze,
  • 22. that is, to select the targeted e-course. After selecting an e- course, log files from an e-learning environment need to be downloaded. On the basis of the downloaded event logs, the next phase of the educational data mining process can be provided. When the data are downloaded and stored, data cleaning activity can be launched. In this activity, the data analyst performs unnecessary data cleaning and data separation of information that are not relevant for the anal - ysis. After data cleaning activity, data partitioning is per - formed. This means that the relevant data are extracted and combined for further analysis. This activity depends on data mining techniques and the outcome of the analysis. Once there are manageable data, the application of cluster analysis can be performed to create groups of students similar within the group and different to another group. According to these groups, it is possible to apply another data mining technique over the obtained data, for example, decision tree technique. In other words, after having the
  • 23. obtained data from cluster analysis, the same could be exported and prepared for decision tree technique implementation. When there is a model resulted from the previous activities, the model validation can be performed. The analyst should be informed in a way of controlling the correctness of the resulting model. After confirming the model validation, the obtained model can be interpreted according to the results. Data description The data used for the analysis are event logs downloaded from an e-learning system for one e-course of a higher education institution in Croatia for a student generation in the 2017/2018 academic year. The time span in which the data were observed was from February 2018 to June 2018. Originally, there were 62,985 records, and after data clean- ing and removing around 3000 records about course admin- istrations and teachers, 59,605 records remained for analysis. These records represented the raw data which
  • 24. consisted of access date and time, student names, context (e.g. lecture materials), component (e.g. “record”), activity description, source (e.g. “web”), and the IP address of the student who accessed the e-course. The data cleaning included removing information about the activity of system administrators and teachers because only students’ behavior in the e-learning system was inter- esting for this analysis. In addition, due to the sensibility of the data and privacy, only a subset of anonymized data was extracted for further analysis. In total, there were 185 stu- dents participating in the e-course during the semester. There were two mid-term exams which were performed Figure 1. Educational data mining process using cluster analysis and decision tree technique. 4 International Journal of Engineering Business Management in April 2018 and in June the same year. Each mid-term exam had 40 points at maximum, and there was no thresh- old for the required minimum points. The results of the
  • 25. mid-term exams were assigned for each student individu- ally in the e-learning system. As stated in previous research, 11 the following variables were recognized as significant for cluster formation: 1. “Context” from the event logs that provides infor- mation about the e-content type. 2. A description of the activity that relates the activity with the unique student identification label. Previous research aimed to find groups of students according to their behavior in the e-learning system but another generation. By applying the same variables on another data set (the generation 2017/2018 in this case), the usefulness of the context variables is tested. To further ana- lyze and understand student behavior, this study takes a deeper approach and applies additional decision tree tech- nique on data.
  • 26. The values of the variable “Context” were as follows: access to lecture materials, access to auditory materials, access to laboratory materials, and access to forums. Lec- ture materials were available to students each week when the teaching topic was processed. Before or after the lectures, students were able to download the teaching mate- rials from the e-learning system. Before auditory exercises (AEs), students were able to download and print teaching materials so they could easily follow the class. On average, it took about five clicks to download each material. Labora- tory exercises (LEs) were held in laboratory classes at a higher education institution where students were asked to show independency in solving the assignments. During the class, students were required to download e-learning mate- rials, which also required approximately five clicks. The forums consisted of a Discussion Forum, where students were able to ask questions about the e-course and commu- nicate mutually, and a News Forum that contained news
  • 27. related to the e-course and teacher consultations, which were addressed by the teachers themselves. After data cleaning, a pivot table was created, contain- ing information about frequency of access for each student according to his or her recorded identification label. Fre- quency of access to the e-content shows the popularity of the content, and the “popularity” can be measured by how many times requests are made for the e-content during the semester. 21 By the frequency of access to the e-content in the e-course, it is possible to determine which e-content students recognized as relevant for passing the mid-term exams and whether the frequencies of the access influenced the final outcome of the exams. 11 So, the pivot table con- tained student identification labels in a form of numbers and numerical frequencies of access to materials from lec-
  • 28. tures, AEs, LEs, and forums for each student. This table was imported into RapidMiner 22 tool that has been used for performing the next data mining techniques: cluster analy- sis and decision tree. These data mining techniques were selected because, according to the literature, 12 data mining uses a more direct approach, such as the percentage usage of well-classified data, while statistical techniques are usu- ally used as a quality criterion for the veracity of the data given model. Besides, data mining techniques work well with very large amounts of data, while the statistics does not work well in large databases with high dimensionality. The tool settings for the cluster analysis were the applied algorithm was k-means, the number of groups was 3 (according to testing, it was considered to be the best value with promising results), the grouping variable was stu-
  • 29. dent’s ID, the method chosen for normalization was Z-transformation, measure types for grouping were numerical measures, and chosen numerical measure was Euclidean distance. Finally, the selected influential vari - ables on grouping were frequencies of access to materials from lectures, AEs and LEs, and forums. The tool settings for the performance of decision tree technique were respectively: the target variable whose out- come was intended to be predicted is the number of stu- dents’ points achieved in two mid-term exams where both mid-term exams amounted to 80 points in total. Student’s points are the variable that yields the highest information gain. Further on, the method chosen for normalization was Z-transformation, the criterion by which the decision trees were created was the least square, maximal depth of the trees was 10, minimal leaf size was 2, minimal size for split was 4, and a number of prepruning alternatives was 3. These settings were applied to all decision trees which
  • 30. resulted from this research. The difference was in the size of the minimal gain, and it was as follows: � For the decision tree of the cluster number 0: 0.105. � For the decision tree of the cluster number 1: 0.081. � For the decision tree of the cluster number 2: 0.08. These values were chosen considering the best resulted branching of the trees and the acceptability of the results for interpretation according to previously obtained clustering models. Results The educational data mining analysis, conducted in this research, resulted with one model by cluster analysis show- ing groups of students according to their behavior in the e- learning system and three models of decision tree made according to previously conducted cluster analysis. The following section describes the results of the grouping anal- ysis and decision tree. In addition, a box plot diagram made by points of the students from the mid-term exams is pre- sented to show the verification of gained models by stu-
  • 31. dent’s success. Križanić 5 Interpretation of the grouping results The aim of grouping the students was to find groups of students who were similar to each other within the group and different in respect to the other groups. The similarity depends on the behavior of the students in an e-learning system during the semester. Behavioral intention is an important predictor of student behavior that varies between different behavioral, control, and normative beliefs on the desired behavior. 23 The application of the k-means method over the data which contained information about 185 stu- dents in one e-course, at a higher education institution, resulted with the following three groups: � Group 0 contained 84 students. � Group 1 contained 82 students. � Group 2 contained 19 students.
  • 32. Figure 2 represents the groups of the students in a form of a tree, while Figure 3 represents the plot with the move- ments of the value of the variable “Context” according to the range of the centroid values. Figure 2 shows the groups of students in a form of a tree. According to Table 1, which is a centroid table, group 0 contains the students who had the lowest access to the content in the e-course. This group shows weekly down- loading activity of materials from LEs and lectures. Group 1 contains students who had a medium frequency of access to e-content. They mostly accessed materials from LEs and lectures. The least accessed set of materials for this group is related to forums. In group 2, there are 19 students who had a high frequency of access to materials from AEs, lectures, and LEs. Figure 3 represents a plot diagram showing the movement of groups by the value of the variable “Context” and the range of the centroid values. According to this analysis, group 0 contains the students with the lowest
  • 33. frequency of access to the content in the e-course, and group 2 contains the students with the highest frequency of access to materials from the e-learning system. Interpretation of the results obtained by the decision tree technique After conducting a cluster analysis, which resulted with one model showing three groups of students, three decision trees were created based on these groups. Each decision tree model represents the behavior of one group of the students. Figure 4 represents the decision tree demonstrat- ing the behavior of the students from group 0, Figure 5 represents the behavior of the students from group 1, and finally, Figure 6 represents the decision tree showing the behavior of the students from group 2. The variable that gives the highest information gain is the student’s points from the mid-term exams. The nodes represent the contents of the e-course or the value of the variable “Context,” and the values on the arcs represent the frequencies of access to
  • 34. the e-contents. Figure 4 represents the decision tree model for group 0 from the grouping method. The model shows that there were only a few students for whom the highest frequency of access to materials from lectures meant the highest fre- quency of access to other e-contents. Many students in this group had low frequency of access to lecture materials. However, those students who attended the lecture materials mostly accessed the forums. Frequent access to forums did not mean frequent access to other e-contents. Low access to forums also led to low access to materials from AEs. Low access to materials from AEs also led to low access to materials from LEs. Students with greater points in mid- term exams combined frequent access to materials from lectures with frequent access to materials from LEs. The model from Figure 5 represents the decision tree for group 1 by cluster analysis. The more often students accessed materials from lectures, the more they accessed
  • 35. forums. Low frequency of access to lecture materials resulted with poor results in the mid-term exams. There were many students in this group who mostly applied the combination of accessing lecture materials and materials from AEs. Students in this group with the highest number of points in mid-term exams seemed to recognize the importance of accessing the combination of materials from lectures, AEs, and LEs. The more often they accessed lec- ture materials and materials from AEs, the more likely they were to score better points in the mid-term exams. Unlike group 0, group 1 consisted mostly of students who had medium frequency of access to all e-contents. Finally, the third decision tree model in Figure 6 repre- sents the behavior of the students from group 2. This group was the smallest and contained 19 students who had the highest frequency of access to the contents from the e- learning system. According to Figure 6, low frequency of access to materials from AEs and LEs indicated lower score
  • 36. on the mid-term exams. Higher frequency of access to Figure 2. Groups of students. 6 International Journal of Engineering Business Management materials from LEs and AEs, as well as more frequent retrieval of lecture materials, provided better points at the mid-term exams. Many students in this group combined all of these three elements and they achieved very good results at the mid-term exams. This analysis indicates that, from the teacher perspec- tive, content management in the form of focusing on the quality of theory-oriented materials is crucial due to the fact that, without a well-presented theoretical background, students cannot successfully complete the course. Analysis of students’ achievement through mid-term exams There were two mid-term exams in the e-course through which the students could pass the exam. Each mid-term exam contained a maximum of 40 points. The mid-term
  • 37. exams included two types of questions: theory oriented (mainly from lecture materials) and practical assignments (mainly from materials from AEs and LEs). 11 No minimum number of points from the first mid-term exam was required to access the second mid-term exam. Figure 7 represents the points from both exams in total for all the students in the e-course. Cluster 0 represents the points of those students who by cluster analysis on Figure 2 in this article belong to group 0. Cluster 1 contains the points from the exams of those students who by cluster analysis on Figure 2 belong to group 1. Finally, cluster 2 demonstrates the points from those students who by cluster analysis belong to group 2. As can be seen from Figure 7, cluster 0 contains the points of the students whose behavior can be described as the one with the least attention to downloading learning materials continuously from the e-learning system.
  • 38. Besides, the students in this group gained the lowest points at the mid-term exams. Cluster 1 contains the points of the students who had medium frequency of access to e-learning materials, and their points vary. Some students achieved low points (e.g. less than 10 of 80), and some achieved a high number of points (e.g. more than 70). Cluster 2 con- tains the points of the students who had the highest fre- quency of access to the e-learning materials. These points are globally the highest points in the e-course. According to the data on created groups and the most accessed contents by these groups, the content-related variable of behavior that makes the difference between the points achieved by the students is found in the behavior of accessing the lec- ture materials. Students who accessed materials from the lectures more often achieved better results at the mid-term exams. Conclusion In this article, educational data mining field was explored.
  • 39. This field became very popular in recent years due to the Figure 3. Movements of the groups according to “Context.” Table 1. Centroid table. The value of the variable “Context” Group 0 Group 1 Group 2 Lectures materials �0.723 0.385 1.536 Auditory exercises �0.675 0.223 2.020 Laboratory exercises �0.784 0.451 1.522 Forums �0.440 0.115 1.449 Križanić 7 emergence of big data stored in databases containing records about students’ behavior in e-courses of higher education institutions. The quality of study programs is very important due to the competition between the higher education institutions and because of the knowledge stu- dents bring with them to the job market after graduation. Educational data mining is a part of data mining field and therefore cluster analysis and decision tree technique have been applied in the research conducted in this article. The
  • 40. cluster analysis resulted with groups of students according to the frequencies of access to the e-contents, confirming author’s previous research. The decision tree technique was applied to the grouping results to enable a deeper analysis Figure 4. Decision tree for group 0 from the cluster analysis. Figure 5. Decision tree for group 1 from the cluster analysis. Figure 6. Decision tree for group 2 from the cluster analysis. Figure 7. The points of the students from the mid-term exams by the groups they belong. 8 International Journal of Engineering Business Management of student behavior in teaching and learning processes. Based on the knowledge acquired by educational data min- ing, course teachers can identify the content of the e-course that is worth putting more attention to emphasize its impor- tance and select more suitable motivating techniques to encourage students to use that content while preparing for the exams. The following research could focus on collect- ing data from other generations and conducting similar
  • 41. analysis on other courses with similar process scenarios for the purpose of revealing differences between the behavior s of students’ generations or differences that are related to course management. Declaration of conflicting interests The author(s) declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article. Funding The author(s) received no financial support for the research, authorship, and/or publication of this article. ORCID iD Snježana Križanić https://orcid.org/0000-0002-0834-1710 References 1. Ahmad F, Ismail NH, and Aziz AA. The prediction of stu- dents’ academic performance using classification data mining techniques. Appl Math Sci 2015; 9: 6415–6426. 2. Hung JL, Hsu YCH, and Rice K. Integrating data mining in
  • 42. program evaluation of k-12 online education. Educat Technol Soc 2012; 15(3): 27–41. 3. Bin Mat U, Buniyamin N, Arsad PM, et al. An overview of using academic analytics to predict and improve students’ achievement: a proposed proactive intelligent intervention. In: IEEE 5th Conference on Engineering Education (ICEED), Kuala Lumpur, 4–5 December 2013, pp.126–130. 4. Dumas M, La Rosa M, Mendling J, et al. Fundamentals of business process management. Berlin: Springer, 2013, pp. 353–367. 5. Jain AK, Murty MN, and Flynn PJ. Data clustering: a review. ACM Comput Surv 1999; 31: 264–323. 6. Asif R, Merceron A, Ali SB, et al. Analyzing undergraduate students’ performance using educational data mining. Com- put Educat 2017; 113: 177–194. 7. Selby RW and Porter AA. Learning from examples: genera- tion and evaluation of decision trees for software resource analysis. IEEE Transact Soft Eng 1988; 14(12): 1743–1757.
  • 43. 8. Folino F, Greco G, Guzzo A, et al. Mining usage scenarios in business processes: outlier-aware discovery and run-time pre- diction. Data Knowl Eng 2011; 70: 1005–1029. 9. Romero C, Espejo P, Zafra A, et al. Web usage mining for predicting final marks of students that use Moodle courses. Comput Appl Eng Educat 2013; 21: 135–146. 10. Devasia T, Vinushree TP, and Hegde V. Prediction of stu- dents performance using educational data mining. In: Pro- ceedings of 2016 International Conference on Data Mining and Advanced Computing, Ernakulam, 16–18 March 2016, pp. 91–95. 11. Križanić S and Tomičić-Pupek K. Process parameters discov- ery based on application of k-means algorithm—a real case experimental study. In: Central European Conference on Information and Intelligent Systems (CECIIS), Faculty of Organization and Informatics, Varaždin, Croatia, 02–04 October 2019.
  • 44. 12. Márquez-Vera C, Morales CR, and Soto SV. Predicting school failure and dropout by using data mining techniques. IEEE J Lat-Amer Lear Technol 2013; 8(1): 7–14. 13. Dutt A, Ismail MA, and Herawan T. A systematic review on educational data mining. IEEE Access, 2017; 5: 15991–16005. 14. Jain AK. Data clustering: 50 years beyond K-means. Pat Recog Let 2010; 31(8): 651–666. 15. Elouedi Z, Mellouli K, and Smets P. Belief decision trees: the- oretical foundations. Int J Approx Reason 2001; 28: 91–124. 16. Osei-Bryson KM. Evaluation of decision trees: a multi- criteria approach. Comput Operat Res 2004; 31: 1933–1945. 17. Van Der Aalst W. Process mining. Berlin, Heidelberg: Springer, 2011, pp.94–97. 18. Suârez A and Lutsko J. Globally optimal fuzzy decision trees for classification and regression. IEEE Transact Pat Anal Mach Intel. 1999;21(12):1297–1311.
  • 45. 19. Kamiński B, Jakubczyk M, and Szufel P. A framework for sensitivity analysis of decision trees. Cent Eur J Operat Res 2018; 26(1): 135–159. 20. Wei Y, Zhang X, Shi Y, et al. A review of data-driven approaches for prediction and classification of building energy consumption. Renew Sust Energ Rev 2018; 82(1): 1027–1047. 21. Namasudra S and Roy P. PpBAC: popularity based access control model for cloud computing. J Organizat End User Comput 2018; 30(4): 14–31. 22. RapidMiner Studio, https://rapidminer.com/products/studio/ (2019, accessed 24 September 2019). 23. Grublješič T, Coelho PS, and Jaklič J. The shift to socio- organizational drivers of business intelligence and analytics acceptance. J Organizat End User Comput 2019; 31(2): 37–62. Križanić 9 https://orcid.org/0000-0002-0834-1710 https://orcid.org/0000-0002-0834-1710 https://orcid.org/0000-0002-0834-1710 https://rapidminer.com/products/studio/
  • 46. << /ASCII85EncodePages false /AllowTransparency false /AutoPositionEPSFiles true /AutoRotatePages /None /Binding /Left /CalGrayProfile (Gray Gamma 2.2) /CalRGBProfile (sRGB IEC61966-2.1) /CalCMYKProfile (U.S. Web Coated 050SWOP051 v2) /sRGBProfile (sRGB IEC61966-2.1) /CannotEmbedFontPolicy /Warning /CompatibilityLevel 1.4 /CompressObjects /Off /CompressPages true /ConvertImagesToIndexed true /PassThroughJPEGImages false /CreateJobTicket false /DefaultRenderingIntent /Default /DetectBlends true /DetectCurves 0.1000 /ColorConversionStrategy /LeaveColorUnchanged /DoThumbnails false /EmbedAllFonts true /EmbedOpenType false /ParseICCProfilesInComments true /EmbedJobOptions true /DSCReportingLevel 0 /EmitDSCWarnings false /EndPage -1 /ImageMemory 1048576 /LockDistillerParams true /MaxSubsetPct 100 /Optimize true /OPM 1 /ParseDSCComments true /ParseDSCCommentsForDocInfo true
  • 47. /PreserveCopyPage true /PreserveDICMYKValues true /PreserveEPSInfo true /PreserveFlatness false /PreserveHalftoneInfo false /PreserveOPIComments false /PreserveOverprintSettings true /StartPage 1 /SubsetFonts true /TransferFunctionInfo /Apply /UCRandBGInfo /Remove /UsePrologue false /ColorSettingsFile () /AlwaysEmbed [ true ] /NeverEmbed [ true ] /AntiAliasColorImages false /CropColorImages false /ColorImageMinResolution 266 /ColorImageMinResolutionPolicy /OK /DownsampleColorImages true /ColorImageDownsampleType /Average /ColorImageResolution 175 /ColorImageDepth -1 /ColorImageMinDownsampleDepth 1 /ColorImageDownsampleThreshold 1.50286 /EncodeColorImages true /ColorImageFilter /DCTEncode /AutoFilterColorImages true /ColorImageAutoFilterStrategy /JPEG /ColorACSImageDict << /QFactor 0.40 /HSamples [1 1 1 1] /VSamples [1 1 1 1] >> /ColorImageDict <<
  • 48. /QFactor 0.76 /HSamples [2 1 1 2] /VSamples [2 1 1 2] >> /JPEG2000ColorACSImageDict << /TileWidth 256 /TileHeight 256 /Quality 30 >> /JPEG2000ColorImageDict << /TileWidth 256 /TileHeight 256 /Quality 30 >> /AntiAliasGrayImages false /CropGrayImages false /GrayImageMinResolution 266 /GrayImageMinResolutionPolicy /OK /DownsampleGrayImages true /GrayImageDownsampleType /Average /GrayImageResolution 175 /GrayImageDepth -1 /GrayImageMinDownsampleDepth 2 /GrayImageDownsampleThreshold 1.50286 /EncodeGrayImages true /GrayImageFilter /DCTEncode /AutoFilterGrayImages true /GrayImageAutoFilterStrategy /JPEG /GrayACSImageDict << /QFactor 0.40 /HSamples [1 1 1 1] /VSamples [1 1 1 1] >> /GrayImageDict << /QFactor 0.76 /HSamples [2 1 1 2] /VSamples [2 1 1 2] >> /JPEG2000GrayACSImageDict <<
  • 49. /TileWidth 256 /TileHeight 256 /Quality 30 >> /JPEG2000GrayImageDict << /TileWidth 256 /TileHeight 256 /Quality 30 >> /AntiAliasMonoImages false /CropMonoImages false /MonoImageMinResolution 900 /MonoImageMinResolutionPolicy /OK /DownsampleMonoImages true /MonoImageDownsampleType /Average /MonoImageResolution 175 /MonoImageDepth -1 /MonoImageDownsampleThreshold 1.50286 /EncodeMonoImages true /MonoImageFilter /CCITTFaxEncode /MonoImageDict << /K -1 >> /AllowPSXObjects false /CheckCompliance [ /None ] /PDFX1aCheck false /PDFX3Check false /PDFXCompliantPDFOnly false /PDFXNoTrimBoxError true /PDFXTrimBoxToMediaBoxOffset [ 0.00000 0.00000 0.00000 0.00000
  • 50. ] /PDFXSetBleedBoxToMediaBox false /PDFXBleedBoxToTrimBoxOffset [ 0.00000 0.00000 0.00000 0.00000 ] /PDFXOutputIntentProfile (U.S. Web Coated 050SWOP051 v2) /PDFXOutputConditionIdentifier (CGATS TR 001) /PDFXOutputCondition () /PDFXRegistryName (http://www.color.org) /PDFXTrapped /Unknown /CreateJDFFile false /Description << /ENU <FEFF00550073006500200074006800650073006500200053006 1006700650020007300740061006e006400610072006400200073 0065007400740069006e0067007300200066006f0072002000630 0720065006100740069006e006700200077006500620020005000 440046002000660069006c00650073002e0020005400680065007 30065002000730065007400740069006e0067007300200063006f 006e006600690067007500720065006400200066006f007200200 04100630072006f006200610074002000760037002e0030002e00 20004300720065006100740065006400200062007900200054007 2006f00790020004f007400730020006100740020005300610067 00650020005500530020006f006e002000310031002f003100300 02f0032003000300036002e000d000d0032003000300050005000 49002f003600300030005000500049002f004a005000450047002 0004d0065006400690075006d002f004300430049005400540020 00470072006f0075007000200034> >> /Namespace [ (Adobe)
  • 51. (Common) (1.0) ] /OtherNamespaces [ << /AsReaderSpreads false /CropImagesToFrames true /ErrorControl /WarnAndContinue /FlattenerIgnoreSpreadOverrides false /IncludeGuidesGrids false /IncludeNonPrinting false /IncludeSlug false /Namespace [ (Adobe) (InDesign) (4.0) ] /OmitPlacedBitmaps false /OmitPlacedEPS false /OmitPlacedPDF false /SimulateOverprint /Legacy >> << /AllowImageBreaks true /AllowTableBreaks true /ExpandPage false /HonorBaseURL true /HonorRolloverEffect false /IgnoreHTMLPageBreaks false /IncludeHeaderFooter false /MarginOffset [ 0 0 0 0 ]
  • 52. /MetadataAuthor () /MetadataKeywords () /MetadataSubject () /MetadataTitle () /MetricPageSize [ 0 0 ] /MetricUnit /inch /MobileCompatible 0 /Namespace [ (Adobe) (GoLive) (8.0) ] /OpenZoomToHTMLFontSize false /PageOrientation /Portrait /RemoveBackground false /ShrinkContent true /TreatColorsAs /MainMonitorColors /UseEmbeddedProfiles false /UseHTMLTitleAsMetadata true >> << /AddBleedMarks false /AddColorBars false /AddCropMarks false /AddPageInfo false /AddRegMarks false /BleedOffset [ 9 9 9 9 ] /ConvertColors /ConvertToRGB
  • 53. /DestinationProfileName (sRGB IEC61966-2.1) /DestinationProfileSelector /UseName /Downsample16BitImages true /FlattenerPreset << /ClipComplexRegions true /ConvertStrokesToOutlines false /ConvertTextToOutlines false /GradientResolution 300 /LineArtTextResolution 1200 /PresetName ([High Resolution]) /PresetSelector /HighResolution /RasterVectorBalance 1 >> /FormElements true /GenerateStructure false /IncludeBookmarks false /IncludeHyperlinks false /IncludeInteractive false /IncludeLayers false /IncludeProfiles true /MarksOffset 9 /MarksWeight 0.125000 /MultimediaHandling /UseObjectSettings /Namespace [ (Adobe) (CreativeSuite) (2.0) ] /PDFXOutputIntentProfileSelector /DocumentCMYK /PageMarksFile /RomanDefault /PreserveEditing true /UntaggedCMYKHandling /UseDocumentProfile /UntaggedRGBHandling /UseDocumentProfile /UseDocumentBleed false >> ]
  • 54. /SyntheticBoldness 1.000000 >> setdistillerparams << /HWResolution [288 288] /PageSize [612.000 792.000] >> setpagedevice