SlideShare una empresa de Scribd logo
1 de 8
Descargar para leer sin conexión
Research Inventy: International Journal Of Engineering And Science
Vol.3, Issue 11 (November 2013), PP 07-14
Issn(e): 2278-4721, Issn(p):2319-6483, Www.Researchinventy.Com

Risk Status Prediction and Modelling Of Students’
Academicachievement - A Fuzzy Logic Approach
Adeleke Raheem Ajiboye1, Ruzaini Abdullah Arshah2, Hongwu Qin3
1,2,3,

Faculty Of Computer Systems And Software Engineering
Universiti Malaysia Pahang, Malaysia.

ABSTRACT: Several students usually fall victims of low grade point at the end of their first year in the
institution of higher learning and some were even withdrawn due to their unacceptable grade point average
(GPA); this could be prevented if necessary measures were taken at the appropriate time. In this paper, a model
using fuzzy logic approach to predict the risk status of students based on some predictive factors is proposed.
Some basic information that has some correlations with students’ academic achievement and other predictive
variables were modelled, the simulated model shows some degree of risk associated with their past academic
achievement. The result of this study would enable the teacher to pay more attention to student’s weaknesses
and could also help school management in decision making, especially for the purpose of giving scholarship to
talented students whose risk of failure was found to be very low; while students identified as having high risk of
failure, could be counselled and motivated with a view to improving their learning ability.

KEYWORDS: fuzzy logic, academic achievement, prediction and risk status.
I.

INTRODUCTION

In the institution of higher learning, several students are found of having low grades while they are in
first year; findings reported in [5] revealed that, stress during this period is associated with overall academic
adjustment and low GPA. Modeling of student’s achievement is a useful tool for both educators and students, as
this can help to have better understanding of student’s weakness and bring about enhancement [8]. First year
students needs some form of monitoring especially as regards to their academic performance. Modelling the
past academic achievement in order to establish the risk of students’ failure based on some information they
earlier submitted for admission purposes is a step in the right direction, though, a challenging task. According to
[10], working with uncertain information makes estimation with the actual number value difficult, but this could
be easily understood if done with natural language. Fuzzy logic technique (FLT) provides efficient and feasible
solutions by following the input output system represented in Fig 2. The knowledge of fuzzy logic is most
suitable according to [11], when modelling of human evaluation is needed. Also, in [19], it was reported that
FLT is the most important technique to handle imprecision and uncertainty. It is of paramount importance to
evaluate students’ achievement after the students complete their registration as such exercise would enable the
teachers to offer assistance to them for better performance. Knowing fully well that education is very essential
and inevitable for the upliftment and progress of a nation [1], all hands must always be on deck to make it
promising.
The objective of this paper was to explore the students’ academic achievement of newly admitted
students with a view to classifying their risk status using fuzzy logic technique. The rest of this paper is
organised as follows: Some related works reported in literature on prediction of student’s performance were
discussed in the next section; in section 3, we discussed briefly about fuzzy logic concept and its basic
operations; while in section 4, we present the design, analysed the method used and display our results;
discussion of results is in section 5 and the whole work is concluded in section 6.

II.

RELATED WORKS

Several classification algorithms have been applied to predict students’ academic achievements, in the
process, the levels of accuracies were measured; however, most of these methods are subjective. It is important
to predict students’ performance in order to differentiate between the fast learners and slow learners as observed
in [9]. It was revealed in their findings that, students’ academic performance should not depend on their own
efforts alone, relevant predictive factors were also identified. A comparative analysis of techniques for
predicting academic performance was proposed in [2], models were constructed using weka tool, a very high
accuracy was reported and diverse grading systems was identified as the difficulty encountered in the course of
applying the technique to international students. The academic predictors were measured in [3] to determine

7
Risk Status Prediction And Modelling...
their accuracy and efforts were made at establishing their level of reliability most especially at discriminating
from success and failure cases of classifier or predictive model. Research conducted in [5] shows that matureage students achieved higher final degree GPA compared to young undergraduates. Though, this may be
environment specific.
Achievement evaluation model reported in [4] proposed Radial Basis Function Neural Network and
similarity filter to evaluate learning achievement, three phases that can reduce bias assessment were identified,
these include: selection of important feature attributes to enhance classification performance, using of minimal
entropy principle approach to fuzzify the quantitative data, model construction and accuracy evaluation.
Genetic fuzzy approach was proposed in [19] to identify students’ skills. The idea to combine the two
techniques was to explore soft computing techniques that support learning and evolution. Rules for identifying
some intelligence were generated for the achievement and powerful classification of human capabilities.Also, in
a survey carried out on Fuzzy Inference-Based student evaluation methods in [17], five different evaluation
methods capable of unveiling students’ achievement were identified; these include: Fuzzy Classification, Baiand-Chen’s Method, Saleh-and-Kim’s Method, Fuzzy Rule Interpolation and Rasmani-and-Shen’s Method. It
was concluded that Fuzzy inference based solutions offer a transparency result due to the humanly interpretable
rules.Evaluation of students’ performance using data-driven fuzzy rule was proposed in [6], the approach was
reported to perform Norm-Referenced Evaluation which produced new and informative scores based on several
information retrieved from data. It was concluded that the findings was meant to help strengthen the system that
is commonly in use, as the approach was intended to provide additional information for decision making.

III.

FUZZY LOGIC

Fuzzy logic (FL) can be described as logic of fuzzy sets [13]. It is an area of soft computing that
enables a computer system to reason with uncertainty [16]. The concept was initially formalized by Lofti Zadeh
in his seminar 1965 paper “Fuzzy sets”. A fuzzy set is distinct from a crisp or Boolean set because it allows its
elements to have a degree of membership i.e the characteristics function of a fuzzy set can have values between
0 and 1 [15]. The core of a fuzzy set is its membership function: a surface or line that defines the relationship
between a value in the set’s domain and its degree of membership [13].Fuzzy logic according to [12] has two
different meanings: It can be referred to as a logical system which may be viewed as an extension and
generalization of classical multi-valued logics. In a wider sense, FL is almost synonymous with the theory of
fuzzy sets as any field X and any theory Y can be fuzzified by replacing the concept of a crisp set in X and Y by
that of a fuzzy set [12]. The fuzzy linguistics variable “risk” can be categorized as: very low, low, medium, high
and very high. Each category is called a linguistic modifier. The modifier can take its degree of membership
from [0, 1] as shown in figure 3. The scales on this figure are used to distinguish the prediction of students’
academic achievement risk (very low risk, low risk, medium risk, high risk and very high risk).

IV.

DESIGN AND METHODS

4.1 Dataset and Data Preparation
Getting rid of errors and outliers that may be present in the data are parts of pre-processing task that
should be done to make the data suitable for modelling. In many real-world applications, most especially in
cases when it involves huge amounts of data, the subset of cases with complete data may be relatively small.
Errors can result from data entry mistakes, transposing digits or specifying invalid dates; too much noise can
result in poor quality models [17]. The dataset was collected from a university in north central, Nigeria. The
data comprised of 37 records of candidates that were offered admission to study Computer Science. TABLE 1
contains the predictive variables, while Fig. 1 shows data preparation using rapidminer tool.
Table 1: The predictive variables
S/NO
1

INPUT
VARIABLE
SSRS

DESCRIPTION

OPTIONS

2

NSSSE

3

EM

Secondary
School
Result
Strength
Number of sittings in secondary
school examination
Entry mode

A1;A2;A3;B2
;B3;C4;C5;C6
1 attempt ;
2 attempts
Utme1
Remedial 2
Literate 1
Illiterate 2
Private 1

4

PLS

Parent literacy status

5

OSSA

Ownership of secondary school

8

VALUES
OBTAINABLE
1-7
1-2
1-2
1-2
1-2
Risk Status Prediction And Modelling...

6

LSSA

7

SOJE

attended
Location of secondary school
attended
Score obtained in Unified
Tertiary
Matriculation
Examination.

Public 2
Town 1; City
2; Village 3
Above 250 1
221 – 250 2
200 – 220 3
Below 200
4

1-3
1-4

Figure 1: Data cleaning
Table 2 Transformed students’ data

As shown in TABLE 2, the individual student’s data were transformed based on the options and obtainable
values in TABLE 1.
4.2 Analysis of fuzzy set structure and operations
If X is a collection of objects denoted generically by x, then a “fuzzy set” A in X is defined as a set of ordered
pairs [15]:
A = {x, μx) | x Є X}………………… (1)
where μx) is called membership function for the fuzzy set A which maps each element of X to a
membership value between 0 and 1. Element x may have full, partial or no membership in A. Its degree of
membership would be considered to be full if μ = 1; partial, if μx) lies between 0 and 1 i.e 0 <
x)

9
Risk Status Prediction And Modelling...
μx) < 1; and no membershipexist if μ
x) = 0. s illustrated in Fig. 3, a fuzzy set is formed when a
A
linguistic variable combines with a linguistic modifier (i.e. very low_risk,low_risk, high_risk, medium_risk
etc). Each linguistic modifier is linked to a numerical value on a scale ranges from 0 to 9 that represents the
academic achievement risk. Also, each element represents a corresponding value of a degree of membership in
the universe of discourse. Fuzzy sets can be manipulated using one of the four standard fuzzy set operations:
union, intersection, complementation, and implication operations [14]. Though, the set operations discussed
here are often used, fuzzy set operations are not limited to this four. A fuzzy set union is performed by applying
the maximum (Max) function to the elements of two sets, for instance,
let μx) = {1,
3,5,8,9} and μBy) = {1,
7,4,8,9}
the union of fuzzy set C = A B; it follows that:
μCz) = μ(x) μB (y) = Max { μA(x) , μB (y)}
A
μCz) = {1,
7,5,8,9}.
The intersection of two sets can be determined by applying the minimum (Min) function:
μx) μBy)= Min { μA(x) , μB (y)} = {0,4,1,0,0}
Complement of a set is can be computed by subtracting each element of the set from its maximum possible
value:
μĀx) = {9 μx) = {8,
6,4,1,0}
The implication function decides if a particular set is true, to what extent can we conclude the other set can be
said to be true? To illustrate implication operation, we can compute:
μĀ μB (q) = μĀx) μy)
μĀ μB (q) = {8,6,4,1,0} {1,7,4,8,9} = {8,7,4,8,9}
4.3 Proposed model for academic achievement risk status
Due to vagueness in grading educational system, according to [18], the use of fuzzy theory provide
better models of subjective judgment. This approach essentially involves three main tasks: fuzzification,
inference and defuzzification as represented in Fig. 2. Excerpt of 37 records from the data collected were
modelled and a fuzzy set A was formed. The set takes its values from {X} in a closed interval [0,1]. From
equation 1 and degree of membership in Fig. 3,
.fA(x) = {0.1, 0.2, 0.4, 0.5, 0.8, 1}

Knowledge
based
Input

Fuzzifier

Defuzzifier
Inference

Output

There are different forms of membership functions, here we used trapezoidal to illustrate the membership
function. According to [15], a trapezoidal membership function is specified by four parameters {a,b,c,d} as
shown in equation 2:
Figure 2 Input /Output of a fuzzy logic system

10
Risk Status Prediction And Modelling...

Very low

Figure 3

Fuzzy set structure for risk status

The parameters {a,b,c,d} with a < b < = c < d, determine the x coordinates of the four corners of the underlying
high
trapezoidal membership function.

Trapezoid (x; a,b,c,d) =

0,
(x-a) / (b-a),

x <= a.
a <= x <= b.

1,
(d-x) / (d-c),

b <= x <= c.

……….(2)

c <= x <= d.

0,

d <= x.

Table 3 Predictive variables and degree of membership
Predictive variable
SSRS
NSSSE
EM
PLS
OSSA
LSSA
SOJE

Membership value fB(y)
0.8
0.5
0.4
0.6
0.7
0.6
1.0

Representation (y)
V1
V2
V3
V4
V5
V6
V7

37 students were considered in this research and the researchers evaluated 7 predictive factors on which
predictions were based. From the data displayed in TABLE 3, a fuzzy set B was formed and it takes its values
from the closed interval [0,1]. Also from equation 1,
B = {y, μy) | y Є Y}………………… (3)

11
Risk Status Prediction And Modelling...
fB(y) = {0.8, 0.5, 0.4, 0.6, 0.7, 0.6, 1.0} as shown in TABLE 3. The table also shows the membership values
assigned to each predictive variable which translates to its predictive relevance. Linguistic variables were
mapped to corresponding fuzzy values which results to another set as shown in equation 4:
C = {y, μy) | y Є Y} ……………
……...(4)
fC(y) = {0.1, 0.2, 0.5, 0.8, 1.0} as shown in TABLE 4.
Table 4 Fuzzy linguistic variables and membership values
Linguistic variables
Very low risk
Low risk
Medium risk
High risk
Very high risk

Fuzzy values
0 <= x<= 2
1 <= x<= 3
2 <= x<= 5
4 <= x<= 7
6 <= x<= 9

Relative importance
1.0
0.8
0.5
0.2
0.1

As shown in Fig. 3 and TABLE 4, the five fuzzy sets can be interpreted as follows:
Very low risk : {1|1.0, 2|0.8, 3|0.0, 4|0.0, 5|0.0, 6|0.0, 7|0.0, 8|0.0, 9|0.0}
Low risk : {1|0.6, 2|0.8, 3|0.5, 4|0.0, 5|0.0, 6|0.0, 7|0.0, 8|0.0, 9|0.0}
Medium risk : {1|0.0, 2|0.3, 3|0.5, 4|0.4, 5|0.0, 6|0.0, 7|0.0, 8|0.0, 9|0.0}
High risk : {1|0.0, 2|0.0, 3|0.0, 4|0.4, 5|0.4, 6|0.2, 7|0.2, 8|0.0, 9|0.0}
Very high risk : {1|0.0, 2|0.0, 3|0.0, 4|0.0, 5|0.0, 6|0.2, 7|0.2, 8|0.1, 9|0.1}
The technique of fuzzy set addresses the representation of parameters using linguistic variables [7], it also
provides dynamic framework to handle qualitative information especially when quantitative seems
inappropriate. Through the process of fuzzification, we find the membership value of all the input values in
TABLE 2, these values were transformed to form another set as shown in TABLE 5. From TABLE 5, the
researchers formed 37 fuzzy sets fc1(y), fc2(y)………fc37(y) that takes its membership values from [0,1]. This
process of reduction otherwise known as defuzzification [13] produced the final single scaler results shown in
TABLE 6, the table displayed the risk status of all the students (37 cases).
fc1(y) = {0.5, 1.0, 0.8, 1.0, 0.8, 0.5, 1.0}
fc2(y) = {0.8, 1.0, 0.8, 0.8, 0.8, 1.0, 1.0}
---fc37(y) = {0.5, 0.8, 0.8, 0.5, 0.8, 0.8, 1.0}
Table 5
CASE
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22

V1
0.5
0.8
0.8
0.5
0.5
0.8
0.5
0.8
0.8
0.5
0.8
0.2
0.8
0.5
0.2
0.5
0.5
0.5
0.8
0.5
0.5
0.5

V2
1.0
1.0
1.0
1.0
1.0
1.0
1.0
1.0
1.0
1.0
1.0
1.0
1.0
1.0
1.0
1.0
1.0
1.0
1.0
1.0
1.0
1.0

The academic achievements of all the 37 students
V3
0.8
0.8
0.8
0.8
0.8
0.8
0.8
0.8
0.5
0.8
0.8
0.5
0.8
0.8
0.8
0.8
0.5
0.5
0.8
0.8
0.8
0.5

V4
1.0
0.8
1.0
1.0
1.0
0.8
1.0
1.0
1.0
1.0
1.0
0.8
1.0
0.8
0.8
0.8
1.0
1.0
1.0
1.0
1.0
0.8

12

V5
0.8
0.8
0.8
1.0
0.8
0.8
0.8
0.8
0.8
0.8
1.0
0.8
0.8
1.0
1.0
0.8
0.8
0.8
1.0
1.0
1.0
1.0

V6
0.5
1.0
1.0
0.8
0.8
0.5
1.0
0.8
0.5
1.0
0.8
1.0
0.5
1.0
0.8
1.0
1.0
1.0
1.0
0.8
0.8
0.8

V7
1.0
1.0
1.0
1.0
1.0
0.8
1.0
1.0
0.8
1.0
1.0
1.0
1.0
0.8
1.0
1.0
1.0
1.0
1.0
0.8
0.8
1.0
Risk Status Prediction And Modelling...
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37

0.5
0.2
0.5
0.5
0.2
0.8
0.5
0.5
0.2
0.5
0.2
0.2
0.5
0.5
0.5

1.0
0.8
1.0
1.0
1.0
0.8
1.0
1.0
0.8
0.8
0.8
0.8
1.0
1.0
0.8

0.8
0.8
0.8
0.8
0.8
0.8
0.8
0.8
0.5
0.8
0.8
0.8
0.8
0.8
0.8

1.0
0.5
1.0
0.5
0.5
1.0
1.0
1.0
1.0
1.0
0.5
1.0
1.0
0.5
0.5

1.0
0.8
0.8
1.0
0.8
0.8
0.8
0.8
1.0
0.8
0.8
1.0
0.8
0.8
0.8

0.8
0.8
0.8
0.8
1.0
0.5
0.8
0.8
0.8
1.0
0.5
0.8
0.8
0.8
0.8

1.0
0.8
1.0
1.0
1.0
0.8
1.0
1.0
0.8
1.0
0.8
0.8
0.8
0.8
1.0

By applying the Min function to the degree of membership displayed in TABLE 5, we arrived at the decision on
the risk status of individual case as shown in TABLE 6.
Table 6
CASE
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19

VALUES
0.5
0.8
0.8
0.5
0.8
0.5
0.5
0.8
0.5
0.5
0.8
0.2
0.5
0.5
0.2
0.5
0.5
0.5
0.8

The risk status of all the students

RISK STATUS
medium
low
low
medium
low
medium
medium
low
medium
medium
low
high
medium
medium
high
medium
medium
medium
low

V.

CASE
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37

VALUES
0.5
0.5
0.5
0.5
0.2
0.5
0.5
0.2
0.5
0.5
0.5
0.2
0.5
0.2
0.2
0.5
0.5
0.5

RISK STATUS
medium
medium
medium
medium
high
medium
medium
high
medium
medium
medium
high
medium
high
high
medium
medium
medium

DISCUSSION OF RESULTS

TABLE 6 shows the risk status of all the 37 students.The analysis of the results revealed three clusters
of students as regards their risk status. Information from the result also shows that, 24 of the students were
predicted to have medium risk; 6 of the students were predicted to have low risk; there is no need to exercise
any fear about the future performance on these category of students. However, 7 students were predicted to
have high risk; this category of students deserves special attention so that they can cope well with their studies.
Generally, cases with values above 0.5 have satisfactory academic achievement, while cases with values less
than 0.5 needs to sit up and make extra efforts to meet the challenges ahead.

VI.

CONCLUSION

This research adds to the rationale for having prior knowledge about the academic achievement of all
the newly admitted and registered students, at the earliest possible time of their studentship, with a view to
determining their strengths and weaknesses.The researchers modelled the transformed input predictive variables
using the approach of fuzzy logic. The various methods used to predict student’s performance were discussed;
the risk status of students of Computer Science department which comprised of 37 records were predicted in
this research, the researchers would extend the technique to cover many departments across faculties in
subsequent research. The technique of fuzzy logic applied in this research shows its capability of handling
uncertainty.The results segmented the students according to their risk status, the model can be applied to predict

13
Risk Status Prediction And Modelling...
the academic performance of all applicants seeking admission to Nigerian institutions of higher learning and the
technique used can be generalized to make similar prediction in any institution outside Nigeria. Exploring
students’ achievement at the early stage of their studies would help the teacher to pay special attention to
students predicted to have high risk of failure and render needed assistance to them when it matters most.

REFERENCES
[1]
[2]

[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]
[20]

B.K. Bhardwaj and S. Pal, Data Mining: A prediction for performance improvement using classification, International Journal
of Computer Science and Information Security, Vol. 9(4), 2011.
V. Juana-Maria and F. Manuel, How does one assess the accuracy of academic success predictors? ROC analysis applied to
university entrance factors, International Journal of Mathematical Education in Science and Technology, Vol. 39 (3), 2008, pp.
325–340.
S. Michael, Hardiness commitment, gender and age differentiate university academic
performance, British Journal of
Educational Psychology, 79, 2009, pp.189–204.
C. Ching-Hsue, et al., A new e-learning achievement evaluation model based on RBF-NN and simulation filter, Neural
Computing & Application; 20, 2011, 659–669.
L.J. Friedlander, G.J. Reid, N. Shupak, & R. Cribbie, Social support, self-esteemand stress as predictors of adjustment to
university among first-year undergraduates, Journal of College Student Development,48(3), 2007, 259-274.
K.A. Rasmani and Q. Shen, Data-driven fuzzy rule generation and its application for student academic performance
evaluation; Springer, Applied Intelligence, 25, 2006, 305–319.
F. Herrera and E. Herrera-Viedma, Linguisticss decision analysis: Steps for solving decision problem under linguistics
information, Fuzzy sets and system management, 115, 2000, 67-82.
P. Cortez, and A. Silva, Using data mining to predict secondary school student performance, A Proceedings of 5th Annual
Future Business Technology Conference, Porto, 2008.
N.T. Nghe, P. Janecek, and P. Haddawy, A Comparative Analysis ofTechniques for Predicting Academic Performance, 37th
ASEE/IEEE Frontiers in Education Conference, 2007.
M. Delgado, F. Herrera, E. Herrera-Viedma, L. Martinez, Combining numerical and linguistic information in group decision
making, Information Sciences, 107, 1998, 177–194.
K. Cengiz, Fuzzy Engineering Economics with Applications (Springer-Verlag Berlin Heidelberg, 2008).
J.K. George, and B. Yuan, Fuzzy sets and Fuzzy logic: Theory and Applications (Printice-Hall of India private limited, New
Delhi, 2008).
E. Cox, Fuzzy modelling and genetic algorithms for data mining and exploration (Morgan Kaufman, 2005).
J.M. Mendel, Uncertain Rule-Based Fuzzy Logic Systems: Introduction and New Directions ( Prentice-Hall Publishing
Company, 2001).
O. Castillo, P. Melin, Type-2 Fuzzy logic: Theory and Applications (Springer-Verlag, Berlin Heidelberg, 2008).
O. Castillo, P. Melin,. Soft Computing for Control of non-linear dynamic systems
(Springer, Heidelberg, 2001).
Z. C. Johanyák, Survey on Five Fuzzy Inference-Based Student Evaluation Methods; I.J. Rudas et al. (Eds.): Computational
Intelligence in Engineering (SCI 313, Springer-Verlag Berlin Heidelberg, 2010) pp. 219–228.
R. Biswas . An application of fuzzy sets in students’ evaluation. Fuzzy Sets System 74, 1995, 187–194.
K. Mankad, P.S. Sajja, and R. Akerkar, An automatic evolution of rules to identify students’ multiple intelligence N.
Meghanathan et al. (Eds): (CCSIT, Springer-Verlag Berlin Heidelberg, 2011).

14

Más contenido relacionado

La actualidad más candente

Predicting Success : An Application of Data Mining Techniques to Student Outc...
Predicting Success : An Application of Data Mining Techniques to Student Outc...Predicting Success : An Application of Data Mining Techniques to Student Outc...
Predicting Success : An Application of Data Mining Techniques to Student Outc...IJDKP
 
An overview on data mining designed for imbalanced datasets
An overview on data mining designed for imbalanced datasetsAn overview on data mining designed for imbalanced datasets
An overview on data mining designed for imbalanced datasetseSAT Publishing House
 
An Automatic Question Paper Generation : Using Bloom's Taxonomy
An Automatic Question Paper Generation : Using Bloom's   TaxonomyAn Automatic Question Paper Generation : Using Bloom's   Taxonomy
An Automatic Question Paper Generation : Using Bloom's TaxonomyIRJET Journal
 
A cluster-based analysis to diagnose students’ learning achievements
A cluster-based analysis to diagnose students’ learning achievementsA cluster-based analysis to diagnose students’ learning achievements
A cluster-based analysis to diagnose students’ learning achievementsMiguel R. Artacho
 
Enhancing Performance in Medical Articles Summarization with Multi-Feature Se...
Enhancing Performance in Medical Articles Summarization with Multi-Feature Se...Enhancing Performance in Medical Articles Summarization with Multi-Feature Se...
Enhancing Performance in Medical Articles Summarization with Multi-Feature Se...IJECEIAES
 
Analyzing undergraduate students’ performance in various perspectives using d...
Analyzing undergraduate students’ performance in various perspectives using d...Analyzing undergraduate students’ performance in various perspectives using d...
Analyzing undergraduate students’ performance in various perspectives using d...Alexander Decker
 
IRJET- Predictive Analytics for Placement of Student- A Comparative Study
IRJET- Predictive Analytics for Placement of Student- A Comparative StudyIRJET- Predictive Analytics for Placement of Student- A Comparative Study
IRJET- Predictive Analytics for Placement of Student- A Comparative StudyIRJET Journal
 
IJSRED-V3I6P13
IJSRED-V3I6P13IJSRED-V3I6P13
IJSRED-V3I6P13IJSRED
 
Data Mining Techniques for School Failure and Dropout System
Data Mining Techniques for School Failure and Dropout SystemData Mining Techniques for School Failure and Dropout System
Data Mining Techniques for School Failure and Dropout SystemKumar Goud
 
Hybrid Classifier for Sentiment Analysis using Effective Pipelining
Hybrid Classifier for Sentiment Analysis using Effective PipeliningHybrid Classifier for Sentiment Analysis using Effective Pipelining
Hybrid Classifier for Sentiment Analysis using Effective PipeliningIRJET Journal
 
A Study on Learning Factor Analysis – An Educational Data Mining Technique fo...
A Study on Learning Factor Analysis – An Educational Data Mining Technique fo...A Study on Learning Factor Analysis – An Educational Data Mining Technique fo...
A Study on Learning Factor Analysis – An Educational Data Mining Technique fo...iosrjce
 
IRJET - A Study on Student Career Prediction
IRJET - A Study on Student Career PredictionIRJET - A Study on Student Career Prediction
IRJET - A Study on Student Career PredictionIRJET Journal
 

La actualidad más candente (14)

583 h139-rufi'i
583 h139-rufi'i583 h139-rufi'i
583 h139-rufi'i
 
Predicting Success : An Application of Data Mining Techniques to Student Outc...
Predicting Success : An Application of Data Mining Techniques to Student Outc...Predicting Success : An Application of Data Mining Techniques to Student Outc...
Predicting Success : An Application of Data Mining Techniques to Student Outc...
 
An overview on data mining designed for imbalanced datasets
An overview on data mining designed for imbalanced datasetsAn overview on data mining designed for imbalanced datasets
An overview on data mining designed for imbalanced datasets
 
An Automatic Question Paper Generation : Using Bloom's Taxonomy
An Automatic Question Paper Generation : Using Bloom's   TaxonomyAn Automatic Question Paper Generation : Using Bloom's   Taxonomy
An Automatic Question Paper Generation : Using Bloom's Taxonomy
 
A cluster-based analysis to diagnose students’ learning achievements
A cluster-based analysis to diagnose students’ learning achievementsA cluster-based analysis to diagnose students’ learning achievements
A cluster-based analysis to diagnose students’ learning achievements
 
Translation of mathematical representation: characteristics of verbal represe...
Translation of mathematical representation: characteristics of verbal represe...Translation of mathematical representation: characteristics of verbal represe...
Translation of mathematical representation: characteristics of verbal represe...
 
Enhancing Performance in Medical Articles Summarization with Multi-Feature Se...
Enhancing Performance in Medical Articles Summarization with Multi-Feature Se...Enhancing Performance in Medical Articles Summarization with Multi-Feature Se...
Enhancing Performance in Medical Articles Summarization with Multi-Feature Se...
 
Analyzing undergraduate students’ performance in various perspectives using d...
Analyzing undergraduate students’ performance in various perspectives using d...Analyzing undergraduate students’ performance in various perspectives using d...
Analyzing undergraduate students’ performance in various perspectives using d...
 
IRJET- Predictive Analytics for Placement of Student- A Comparative Study
IRJET- Predictive Analytics for Placement of Student- A Comparative StudyIRJET- Predictive Analytics for Placement of Student- A Comparative Study
IRJET- Predictive Analytics for Placement of Student- A Comparative Study
 
IJSRED-V3I6P13
IJSRED-V3I6P13IJSRED-V3I6P13
IJSRED-V3I6P13
 
Data Mining Techniques for School Failure and Dropout System
Data Mining Techniques for School Failure and Dropout SystemData Mining Techniques for School Failure and Dropout System
Data Mining Techniques for School Failure and Dropout System
 
Hybrid Classifier for Sentiment Analysis using Effective Pipelining
Hybrid Classifier for Sentiment Analysis using Effective PipeliningHybrid Classifier for Sentiment Analysis using Effective Pipelining
Hybrid Classifier for Sentiment Analysis using Effective Pipelining
 
A Study on Learning Factor Analysis – An Educational Data Mining Technique fo...
A Study on Learning Factor Analysis – An Educational Data Mining Technique fo...A Study on Learning Factor Analysis – An Educational Data Mining Technique fo...
A Study on Learning Factor Analysis – An Educational Data Mining Technique fo...
 
IRJET - A Study on Student Career Prediction
IRJET - A Study on Student Career PredictionIRJET - A Study on Student Career Prediction
IRJET - A Study on Student Career Prediction
 

Destacado

The factors importance to economization produced cheese mozzarella from cow's...
The factors importance to economization produced cheese mozzarella from cow's...The factors importance to economization produced cheese mozzarella from cow's...
The factors importance to economization produced cheese mozzarella from cow's...inventy
 
F047041048
F047041048F047041048
F047041048inventy
 
F044045052
F044045052F044045052
F044045052inventy
 
Design and Analysis of Auger in KAMCO Power Tiller
Design and Analysis of Auger in KAMCO Power TillerDesign and Analysis of Auger in KAMCO Power Tiller
Design and Analysis of Auger in KAMCO Power Tillerinventy
 
A0440109
A0440109A0440109
A0440109inventy
 
A05401010
A05401010A05401010
A05401010inventy
 
Mangrove Woods Damage Based On Time of Water Absorption Rate of Woods
Mangrove Woods Damage Based On Time of Water Absorption Rate of WoodsMangrove Woods Damage Based On Time of Water Absorption Rate of Woods
Mangrove Woods Damage Based On Time of Water Absorption Rate of Woodsinventy
 
Common Fixed Theorems Using Random Implicit Iterative Schemes
Common Fixed Theorems Using Random Implicit Iterative SchemesCommon Fixed Theorems Using Random Implicit Iterative Schemes
Common Fixed Theorems Using Random Implicit Iterative Schemesinventy
 
Numerical modeling of the welding defect influence on fatigue life of the wel...
Numerical modeling of the welding defect influence on fatigue life of the wel...Numerical modeling of the welding defect influence on fatigue life of the wel...
Numerical modeling of the welding defect influence on fatigue life of the wel...inventy
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
Ethical Issues and Safety in the Use of Clinical Decision Support Systems (CDSS)
Ethical Issues and Safety in the Use of Clinical Decision Support Systems (CDSS)Ethical Issues and Safety in the Use of Clinical Decision Support Systems (CDSS)
Ethical Issues and Safety in the Use of Clinical Decision Support Systems (CDSS)inventy
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
Design of Linear Array Transducer Using Ultrasound Simulation Program Field-II
Design of Linear Array Transducer Using Ultrasound Simulation Program Field-IIDesign of Linear Array Transducer Using Ultrasound Simulation Program Field-II
Design of Linear Array Transducer Using Ultrasound Simulation Program Field-IIinventy
 
Web Based Fuzzy Clustering Analysis
Web Based Fuzzy Clustering AnalysisWeb Based Fuzzy Clustering Analysis
Web Based Fuzzy Clustering Analysisinventy
 
An empirical review of Motivation as a Constituent to Employees' Retention
An empirical review of Motivation as a Constituent to Employees' RetentionAn empirical review of Motivation as a Constituent to Employees' Retention
An empirical review of Motivation as a Constituent to Employees' Retentioninventy
 
J047077085
J047077085J047077085
J047077085inventy
 
Elliptic Curves as Tool for Public Key Cryptography
Elliptic Curves as Tool for Public Key CryptographyElliptic Curves as Tool for Public Key Cryptography
Elliptic Curves as Tool for Public Key Cryptographyinventy
 
Ejector Expansion Refrigeration Systems
Ejector Expansion Refrigeration SystemsEjector Expansion Refrigeration Systems
Ejector Expansion Refrigeration Systemsinventy
 
Spectral studies of praseodymium doped heavy metal borate glass systems
Spectral studies of praseodymium doped heavy metal borate glass systemsSpectral studies of praseodymium doped heavy metal borate glass systems
Spectral studies of praseodymium doped heavy metal borate glass systemsinventy
 

Destacado (19)

The factors importance to economization produced cheese mozzarella from cow's...
The factors importance to economization produced cheese mozzarella from cow's...The factors importance to economization produced cheese mozzarella from cow's...
The factors importance to economization produced cheese mozzarella from cow's...
 
F047041048
F047041048F047041048
F047041048
 
F044045052
F044045052F044045052
F044045052
 
Design and Analysis of Auger in KAMCO Power Tiller
Design and Analysis of Auger in KAMCO Power TillerDesign and Analysis of Auger in KAMCO Power Tiller
Design and Analysis of Auger in KAMCO Power Tiller
 
A0440109
A0440109A0440109
A0440109
 
A05401010
A05401010A05401010
A05401010
 
Mangrove Woods Damage Based On Time of Water Absorption Rate of Woods
Mangrove Woods Damage Based On Time of Water Absorption Rate of WoodsMangrove Woods Damage Based On Time of Water Absorption Rate of Woods
Mangrove Woods Damage Based On Time of Water Absorption Rate of Woods
 
Common Fixed Theorems Using Random Implicit Iterative Schemes
Common Fixed Theorems Using Random Implicit Iterative SchemesCommon Fixed Theorems Using Random Implicit Iterative Schemes
Common Fixed Theorems Using Random Implicit Iterative Schemes
 
Numerical modeling of the welding defect influence on fatigue life of the wel...
Numerical modeling of the welding defect influence on fatigue life of the wel...Numerical modeling of the welding defect influence on fatigue life of the wel...
Numerical modeling of the welding defect influence on fatigue life of the wel...
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Ethical Issues and Safety in the Use of Clinical Decision Support Systems (CDSS)
Ethical Issues and Safety in the Use of Clinical Decision Support Systems (CDSS)Ethical Issues and Safety in the Use of Clinical Decision Support Systems (CDSS)
Ethical Issues and Safety in the Use of Clinical Decision Support Systems (CDSS)
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Design of Linear Array Transducer Using Ultrasound Simulation Program Field-II
Design of Linear Array Transducer Using Ultrasound Simulation Program Field-IIDesign of Linear Array Transducer Using Ultrasound Simulation Program Field-II
Design of Linear Array Transducer Using Ultrasound Simulation Program Field-II
 
Web Based Fuzzy Clustering Analysis
Web Based Fuzzy Clustering AnalysisWeb Based Fuzzy Clustering Analysis
Web Based Fuzzy Clustering Analysis
 
An empirical review of Motivation as a Constituent to Employees' Retention
An empirical review of Motivation as a Constituent to Employees' RetentionAn empirical review of Motivation as a Constituent to Employees' Retention
An empirical review of Motivation as a Constituent to Employees' Retention
 
J047077085
J047077085J047077085
J047077085
 
Elliptic Curves as Tool for Public Key Cryptography
Elliptic Curves as Tool for Public Key CryptographyElliptic Curves as Tool for Public Key Cryptography
Elliptic Curves as Tool for Public Key Cryptography
 
Ejector Expansion Refrigeration Systems
Ejector Expansion Refrigeration SystemsEjector Expansion Refrigeration Systems
Ejector Expansion Refrigeration Systems
 
Spectral studies of praseodymium doped heavy metal borate glass systems
Spectral studies of praseodymium doped heavy metal borate glass systemsSpectral studies of praseodymium doped heavy metal borate glass systems
Spectral studies of praseodymium doped heavy metal borate glass systems
 

Similar a Research Inventy : International Journal of Engineering and Science

PREDICTING SUCCESS: AN APPLICATION OF DATA MINING TECHNIQUES TO STUDENT OUTCOMES
PREDICTING SUCCESS: AN APPLICATION OF DATA MINING TECHNIQUES TO STUDENT OUTCOMESPREDICTING SUCCESS: AN APPLICATION OF DATA MINING TECHNIQUES TO STUDENT OUTCOMES
PREDICTING SUCCESS: AN APPLICATION OF DATA MINING TECHNIQUES TO STUDENT OUTCOMESIJDKP
 
PREDICTING SUCCESS: AN APPLICATION OF DATA MINING TECHNIQUES TO STUDENT OUTCOMES
PREDICTING SUCCESS: AN APPLICATION OF DATA MINING TECHNIQUES TO STUDENT OUTCOMESPREDICTING SUCCESS: AN APPLICATION OF DATA MINING TECHNIQUES TO STUDENT OUTCOMES
PREDICTING SUCCESS: AN APPLICATION OF DATA MINING TECHNIQUES TO STUDENT OUTCOMESIJDKP
 
Data Mining Techniques in Higher Education an Empirical Study for the Univer...
Data Mining Techniques in Higher Education an Empirical Study  for the Univer...Data Mining Techniques in Higher Education an Empirical Study  for the Univer...
Data Mining Techniques in Higher Education an Empirical Study for the Univer...IJMER
 
A COMPARATIVE ANALYSIS OF SELECTED STUDIES IN STUDENT PERFORMANCE PREDICTION
A COMPARATIVE ANALYSIS OF SELECTED STUDIES IN STUDENT PERFORMANCE PREDICTIONA COMPARATIVE ANALYSIS OF SELECTED STUDIES IN STUDENT PERFORMANCE PREDICTION
A COMPARATIVE ANALYSIS OF SELECTED STUDIES IN STUDENT PERFORMANCE PREDICTIONIJDKP
 
IRJET- A Conceptual Framework to Predict Academic Performance of Students usi...
IRJET- A Conceptual Framework to Predict Academic Performance of Students usi...IRJET- A Conceptual Framework to Predict Academic Performance of Students usi...
IRJET- A Conceptual Framework to Predict Academic Performance of Students usi...IRJET Journal
 
Student Performance Prediction via Data Mining & Machine Learning
Student Performance Prediction via Data Mining & Machine LearningStudent Performance Prediction via Data Mining & Machine Learning
Student Performance Prediction via Data Mining & Machine LearningIRJET Journal
 
PREDICTING ACADEMIC MAJOR OF STUDENTS USING BAYESIAN NETWORKS TO THE CASE OF ...
PREDICTING ACADEMIC MAJOR OF STUDENTS USING BAYESIAN NETWORKS TO THE CASE OF ...PREDICTING ACADEMIC MAJOR OF STUDENTS USING BAYESIAN NETWORKS TO THE CASE OF ...
PREDICTING ACADEMIC MAJOR OF STUDENTS USING BAYESIAN NETWORKS TO THE CASE OF ...ijcax
 
PREDICTING ACADEMIC MAJOR OF STUDENTS USING BAYESIAN NETWORKS TO THE CASE OF ...
PREDICTING ACADEMIC MAJOR OF STUDENTS USING BAYESIAN NETWORKS TO THE CASE OF ...PREDICTING ACADEMIC MAJOR OF STUDENTS USING BAYESIAN NETWORKS TO THE CASE OF ...
PREDICTING ACADEMIC MAJOR OF STUDENTS USING BAYESIAN NETWORKS TO THE CASE OF ...ijcax
 
PREDICTING ACADEMIC MAJOR OF STUDENTS USING BAYESIAN NETWORKS TO THE CASE OF ...
PREDICTING ACADEMIC MAJOR OF STUDENTS USING BAYESIAN NETWORKS TO THE CASE OF ...PREDICTING ACADEMIC MAJOR OF STUDENTS USING BAYESIAN NETWORKS TO THE CASE OF ...
PREDICTING ACADEMIC MAJOR OF STUDENTS USING BAYESIAN NETWORKS TO THE CASE OF ...ijcax
 
CORRELATION BASED FEATURE SELECTION (CFS) TECHNIQUE TO PREDICT STUDENT PERFRO...
CORRELATION BASED FEATURE SELECTION (CFS) TECHNIQUE TO PREDICT STUDENT PERFRO...CORRELATION BASED FEATURE SELECTION (CFS) TECHNIQUE TO PREDICT STUDENT PERFRO...
CORRELATION BASED FEATURE SELECTION (CFS) TECHNIQUE TO PREDICT STUDENT PERFRO...IJCNCJournal
 
CORRELATION BASED FEATURE SELECTION (CFS) TECHNIQUE TO PREDICT STUDENT PERFRO...
CORRELATION BASED FEATURE SELECTION (CFS) TECHNIQUE TO PREDICT STUDENT PERFRO...CORRELATION BASED FEATURE SELECTION (CFS) TECHNIQUE TO PREDICT STUDENT PERFRO...
CORRELATION BASED FEATURE SELECTION (CFS) TECHNIQUE TO PREDICT STUDENT PERFRO...IJCNCJournal
 
PREDICTING ACADEMIC MAJOR OF STUDENTS USING BAYESIAN NETWORKS TO THE CASE OF ...
PREDICTING ACADEMIC MAJOR OF STUDENTS USING BAYESIAN NETWORKS TO THE CASE OF ...PREDICTING ACADEMIC MAJOR OF STUDENTS USING BAYESIAN NETWORKS TO THE CASE OF ...
PREDICTING ACADEMIC MAJOR OF STUDENTS USING BAYESIAN NETWORKS TO THE CASE OF ...ijcax
 
IRJET- Academic Performance Analysis System
IRJET- Academic Performance Analysis SystemIRJET- Academic Performance Analysis System
IRJET- Academic Performance Analysis SystemIRJET Journal
 
DIFFERENCE OF PROBABILITY AND INFORMATION ENTROPY FOR SKILLS CLASSIFICATION A...
DIFFERENCE OF PROBABILITY AND INFORMATION ENTROPY FOR SKILLS CLASSIFICATION A...DIFFERENCE OF PROBABILITY AND INFORMATION ENTROPY FOR SKILLS CLASSIFICATION A...
DIFFERENCE OF PROBABILITY AND INFORMATION ENTROPY FOR SKILLS CLASSIFICATION A...ijaia
 
A comparative study of machine learning algorithms for virtual learning envir...
A comparative study of machine learning algorithms for virtual learning envir...A comparative study of machine learning algorithms for virtual learning envir...
A comparative study of machine learning algorithms for virtual learning envir...IAESIJAI
 
UNIVERSITY ADMISSION SYSTEMS USING DATA MINING TECHNIQUES TO PREDICT STUDENT ...
UNIVERSITY ADMISSION SYSTEMS USING DATA MINING TECHNIQUES TO PREDICT STUDENT ...UNIVERSITY ADMISSION SYSTEMS USING DATA MINING TECHNIQUES TO PREDICT STUDENT ...
UNIVERSITY ADMISSION SYSTEMS USING DATA MINING TECHNIQUES TO PREDICT STUDENT ...IRJET Journal
 
Data mining in higher education university student dropout case study
Data mining in higher education  university student dropout case studyData mining in higher education  university student dropout case study
Data mining in higher education university student dropout case studyIJDKP
 
STUDENTS’PATTERNS OF INTERACTION WITH A MATHEMATICS INTELLIGENT TUTOR:LEARNIN...
STUDENTS’PATTERNS OF INTERACTION WITH A MATHEMATICS INTELLIGENT TUTOR:LEARNIN...STUDENTS’PATTERNS OF INTERACTION WITH A MATHEMATICS INTELLIGENT TUTOR:LEARNIN...
STUDENTS’PATTERNS OF INTERACTION WITH A MATHEMATICS INTELLIGENT TUTOR:LEARNIN...IJITE
 
Student's Patterns of Interaction with a Mathematics Intelligent Tutor: Learn...
Student's Patterns of Interaction with a Mathematics Intelligent Tutor: Learn...Student's Patterns of Interaction with a Mathematics Intelligent Tutor: Learn...
Student's Patterns of Interaction with a Mathematics Intelligent Tutor: Learn...IJITE
 

Similar a Research Inventy : International Journal of Engineering and Science (20)

PREDICTING SUCCESS: AN APPLICATION OF DATA MINING TECHNIQUES TO STUDENT OUTCOMES
PREDICTING SUCCESS: AN APPLICATION OF DATA MINING TECHNIQUES TO STUDENT OUTCOMESPREDICTING SUCCESS: AN APPLICATION OF DATA MINING TECHNIQUES TO STUDENT OUTCOMES
PREDICTING SUCCESS: AN APPLICATION OF DATA MINING TECHNIQUES TO STUDENT OUTCOMES
 
PREDICTING SUCCESS: AN APPLICATION OF DATA MINING TECHNIQUES TO STUDENT OUTCOMES
PREDICTING SUCCESS: AN APPLICATION OF DATA MINING TECHNIQUES TO STUDENT OUTCOMESPREDICTING SUCCESS: AN APPLICATION OF DATA MINING TECHNIQUES TO STUDENT OUTCOMES
PREDICTING SUCCESS: AN APPLICATION OF DATA MINING TECHNIQUES TO STUDENT OUTCOMES
 
Data Mining Techniques in Higher Education an Empirical Study for the Univer...
Data Mining Techniques in Higher Education an Empirical Study  for the Univer...Data Mining Techniques in Higher Education an Empirical Study  for the Univer...
Data Mining Techniques in Higher Education an Empirical Study for the Univer...
 
A COMPARATIVE ANALYSIS OF SELECTED STUDIES IN STUDENT PERFORMANCE PREDICTION
A COMPARATIVE ANALYSIS OF SELECTED STUDIES IN STUDENT PERFORMANCE PREDICTIONA COMPARATIVE ANALYSIS OF SELECTED STUDIES IN STUDENT PERFORMANCE PREDICTION
A COMPARATIVE ANALYSIS OF SELECTED STUDIES IN STUDENT PERFORMANCE PREDICTION
 
IRJET- A Conceptual Framework to Predict Academic Performance of Students usi...
IRJET- A Conceptual Framework to Predict Academic Performance of Students usi...IRJET- A Conceptual Framework to Predict Academic Performance of Students usi...
IRJET- A Conceptual Framework to Predict Academic Performance of Students usi...
 
Student Performance Prediction via Data Mining & Machine Learning
Student Performance Prediction via Data Mining & Machine LearningStudent Performance Prediction via Data Mining & Machine Learning
Student Performance Prediction via Data Mining & Machine Learning
 
PREDICTING ACADEMIC MAJOR OF STUDENTS USING BAYESIAN NETWORKS TO THE CASE OF ...
PREDICTING ACADEMIC MAJOR OF STUDENTS USING BAYESIAN NETWORKS TO THE CASE OF ...PREDICTING ACADEMIC MAJOR OF STUDENTS USING BAYESIAN NETWORKS TO THE CASE OF ...
PREDICTING ACADEMIC MAJOR OF STUDENTS USING BAYESIAN NETWORKS TO THE CASE OF ...
 
PREDICTING ACADEMIC MAJOR OF STUDENTS USING BAYESIAN NETWORKS TO THE CASE OF ...
PREDICTING ACADEMIC MAJOR OF STUDENTS USING BAYESIAN NETWORKS TO THE CASE OF ...PREDICTING ACADEMIC MAJOR OF STUDENTS USING BAYESIAN NETWORKS TO THE CASE OF ...
PREDICTING ACADEMIC MAJOR OF STUDENTS USING BAYESIAN NETWORKS TO THE CASE OF ...
 
PREDICTING ACADEMIC MAJOR OF STUDENTS USING BAYESIAN NETWORKS TO THE CASE OF ...
PREDICTING ACADEMIC MAJOR OF STUDENTS USING BAYESIAN NETWORKS TO THE CASE OF ...PREDICTING ACADEMIC MAJOR OF STUDENTS USING BAYESIAN NETWORKS TO THE CASE OF ...
PREDICTING ACADEMIC MAJOR OF STUDENTS USING BAYESIAN NETWORKS TO THE CASE OF ...
 
K0176495101
K0176495101K0176495101
K0176495101
 
CORRELATION BASED FEATURE SELECTION (CFS) TECHNIQUE TO PREDICT STUDENT PERFRO...
CORRELATION BASED FEATURE SELECTION (CFS) TECHNIQUE TO PREDICT STUDENT PERFRO...CORRELATION BASED FEATURE SELECTION (CFS) TECHNIQUE TO PREDICT STUDENT PERFRO...
CORRELATION BASED FEATURE SELECTION (CFS) TECHNIQUE TO PREDICT STUDENT PERFRO...
 
CORRELATION BASED FEATURE SELECTION (CFS) TECHNIQUE TO PREDICT STUDENT PERFRO...
CORRELATION BASED FEATURE SELECTION (CFS) TECHNIQUE TO PREDICT STUDENT PERFRO...CORRELATION BASED FEATURE SELECTION (CFS) TECHNIQUE TO PREDICT STUDENT PERFRO...
CORRELATION BASED FEATURE SELECTION (CFS) TECHNIQUE TO PREDICT STUDENT PERFRO...
 
PREDICTING ACADEMIC MAJOR OF STUDENTS USING BAYESIAN NETWORKS TO THE CASE OF ...
PREDICTING ACADEMIC MAJOR OF STUDENTS USING BAYESIAN NETWORKS TO THE CASE OF ...PREDICTING ACADEMIC MAJOR OF STUDENTS USING BAYESIAN NETWORKS TO THE CASE OF ...
PREDICTING ACADEMIC MAJOR OF STUDENTS USING BAYESIAN NETWORKS TO THE CASE OF ...
 
IRJET- Academic Performance Analysis System
IRJET- Academic Performance Analysis SystemIRJET- Academic Performance Analysis System
IRJET- Academic Performance Analysis System
 
DIFFERENCE OF PROBABILITY AND INFORMATION ENTROPY FOR SKILLS CLASSIFICATION A...
DIFFERENCE OF PROBABILITY AND INFORMATION ENTROPY FOR SKILLS CLASSIFICATION A...DIFFERENCE OF PROBABILITY AND INFORMATION ENTROPY FOR SKILLS CLASSIFICATION A...
DIFFERENCE OF PROBABILITY AND INFORMATION ENTROPY FOR SKILLS CLASSIFICATION A...
 
A comparative study of machine learning algorithms for virtual learning envir...
A comparative study of machine learning algorithms for virtual learning envir...A comparative study of machine learning algorithms for virtual learning envir...
A comparative study of machine learning algorithms for virtual learning envir...
 
UNIVERSITY ADMISSION SYSTEMS USING DATA MINING TECHNIQUES TO PREDICT STUDENT ...
UNIVERSITY ADMISSION SYSTEMS USING DATA MINING TECHNIQUES TO PREDICT STUDENT ...UNIVERSITY ADMISSION SYSTEMS USING DATA MINING TECHNIQUES TO PREDICT STUDENT ...
UNIVERSITY ADMISSION SYSTEMS USING DATA MINING TECHNIQUES TO PREDICT STUDENT ...
 
Data mining in higher education university student dropout case study
Data mining in higher education  university student dropout case studyData mining in higher education  university student dropout case study
Data mining in higher education university student dropout case study
 
STUDENTS’PATTERNS OF INTERACTION WITH A MATHEMATICS INTELLIGENT TUTOR:LEARNIN...
STUDENTS’PATTERNS OF INTERACTION WITH A MATHEMATICS INTELLIGENT TUTOR:LEARNIN...STUDENTS’PATTERNS OF INTERACTION WITH A MATHEMATICS INTELLIGENT TUTOR:LEARNIN...
STUDENTS’PATTERNS OF INTERACTION WITH A MATHEMATICS INTELLIGENT TUTOR:LEARNIN...
 
Student's Patterns of Interaction with a Mathematics Intelligent Tutor: Learn...
Student's Patterns of Interaction with a Mathematics Intelligent Tutor: Learn...Student's Patterns of Interaction with a Mathematics Intelligent Tutor: Learn...
Student's Patterns of Interaction with a Mathematics Intelligent Tutor: Learn...
 

Más de inventy

Experimental Investigation of a Household Refrigerator Using Evaporative-Cool...
Experimental Investigation of a Household Refrigerator Using Evaporative-Cool...Experimental Investigation of a Household Refrigerator Using Evaporative-Cool...
Experimental Investigation of a Household Refrigerator Using Evaporative-Cool...inventy
 
Copper Strip Corrossion Test in Various Aviation Fuels
Copper Strip Corrossion Test in Various Aviation FuelsCopper Strip Corrossion Test in Various Aviation Fuels
Copper Strip Corrossion Test in Various Aviation Fuelsinventy
 
Additional Conservation Laws for Two-Velocity Hydrodynamics Equations with th...
Additional Conservation Laws for Two-Velocity Hydrodynamics Equations with th...Additional Conservation Laws for Two-Velocity Hydrodynamics Equations with th...
Additional Conservation Laws for Two-Velocity Hydrodynamics Equations with th...inventy
 
Comparative Study of the Quality of Life, Quality of Work Life and Organisati...
Comparative Study of the Quality of Life, Quality of Work Life and Organisati...Comparative Study of the Quality of Life, Quality of Work Life and Organisati...
Comparative Study of the Quality of Life, Quality of Work Life and Organisati...inventy
 
A Study of Automated Decision Making Systems
A Study of Automated Decision Making SystemsA Study of Automated Decision Making Systems
A Study of Automated Decision Making Systemsinventy
 
Crystallization of L-Glutamic Acid: Mechanism of Heterogeneous β -Form Nuclea...
Crystallization of L-Glutamic Acid: Mechanism of Heterogeneous β -Form Nuclea...Crystallization of L-Glutamic Acid: Mechanism of Heterogeneous β -Form Nuclea...
Crystallization of L-Glutamic Acid: Mechanism of Heterogeneous β -Form Nuclea...inventy
 
Evaluation of Damage by the Reliability of the Traction Test on Polymer Test ...
Evaluation of Damage by the Reliability of the Traction Test on Polymer Test ...Evaluation of Damage by the Reliability of the Traction Test on Polymer Test ...
Evaluation of Damage by the Reliability of the Traction Test on Polymer Test ...inventy
 
Application of Kennelly’model of Running Performances to Elite Endurance Runn...
Application of Kennelly’model of Running Performances to Elite Endurance Runn...Application of Kennelly’model of Running Performances to Elite Endurance Runn...
Application of Kennelly’model of Running Performances to Elite Endurance Runn...inventy
 
Development and Application of a Failure Monitoring System by Using the Vibra...
Development and Application of a Failure Monitoring System by Using the Vibra...Development and Application of a Failure Monitoring System by Using the Vibra...
Development and Application of a Failure Monitoring System by Using the Vibra...inventy
 
The Management of Protected Areas in Serengeti Ecosystem: A Case Study of Iko...
The Management of Protected Areas in Serengeti Ecosystem: A Case Study of Iko...The Management of Protected Areas in Serengeti Ecosystem: A Case Study of Iko...
The Management of Protected Areas in Serengeti Ecosystem: A Case Study of Iko...inventy
 
Size distribution and biometric relationships of little tunny Euthynnus allet...
Size distribution and biometric relationships of little tunny Euthynnus allet...Size distribution and biometric relationships of little tunny Euthynnus allet...
Size distribution and biometric relationships of little tunny Euthynnus allet...inventy
 
Removal of Chromium (VI) From Aqueous Solutions Using Discarded Solanum Tuber...
Removal of Chromium (VI) From Aqueous Solutions Using Discarded Solanum Tuber...Removal of Chromium (VI) From Aqueous Solutions Using Discarded Solanum Tuber...
Removal of Chromium (VI) From Aqueous Solutions Using Discarded Solanum Tuber...inventy
 
Effect of Various External and Internal Factors on the Carrier Mobility in n-...
Effect of Various External and Internal Factors on the Carrier Mobility in n-...Effect of Various External and Internal Factors on the Carrier Mobility in n-...
Effect of Various External and Internal Factors on the Carrier Mobility in n-...inventy
 
Transient flow analysis for horizontal axial upper-wind turbine
Transient flow analysis for horizontal axial upper-wind turbineTransient flow analysis for horizontal axial upper-wind turbine
Transient flow analysis for horizontal axial upper-wind turbineinventy
 
Choice of Numerical Integration Method for Wind Time History Analysis of Tall...
Choice of Numerical Integration Method for Wind Time History Analysis of Tall...Choice of Numerical Integration Method for Wind Time History Analysis of Tall...
Choice of Numerical Integration Method for Wind Time History Analysis of Tall...inventy
 
Impacts of Demand Side Management on System Reliability Evaluation
Impacts of Demand Side Management on System Reliability EvaluationImpacts of Demand Side Management on System Reliability Evaluation
Impacts of Demand Side Management on System Reliability Evaluationinventy
 
Reliability Evaluation of Riyadh System Incorporating Renewable Generation
Reliability Evaluation of Riyadh System Incorporating Renewable GenerationReliability Evaluation of Riyadh System Incorporating Renewable Generation
Reliability Evaluation of Riyadh System Incorporating Renewable Generationinventy
 
The effect of reduced pressure acetylene plasma treatment on physical charact...
The effect of reduced pressure acetylene plasma treatment on physical charact...The effect of reduced pressure acetylene plasma treatment on physical charact...
The effect of reduced pressure acetylene plasma treatment on physical charact...inventy
 
Experimental Investigation of Mini Cooler cum Freezer
Experimental Investigation of Mini Cooler cum FreezerExperimental Investigation of Mini Cooler cum Freezer
Experimental Investigation of Mini Cooler cum Freezerinventy
 
Growth and Magnetic properties of MnGeP2 thin films
Growth and Magnetic properties of MnGeP2 thin filmsGrowth and Magnetic properties of MnGeP2 thin films
Growth and Magnetic properties of MnGeP2 thin filmsinventy
 

Más de inventy (20)

Experimental Investigation of a Household Refrigerator Using Evaporative-Cool...
Experimental Investigation of a Household Refrigerator Using Evaporative-Cool...Experimental Investigation of a Household Refrigerator Using Evaporative-Cool...
Experimental Investigation of a Household Refrigerator Using Evaporative-Cool...
 
Copper Strip Corrossion Test in Various Aviation Fuels
Copper Strip Corrossion Test in Various Aviation FuelsCopper Strip Corrossion Test in Various Aviation Fuels
Copper Strip Corrossion Test in Various Aviation Fuels
 
Additional Conservation Laws for Two-Velocity Hydrodynamics Equations with th...
Additional Conservation Laws for Two-Velocity Hydrodynamics Equations with th...Additional Conservation Laws for Two-Velocity Hydrodynamics Equations with th...
Additional Conservation Laws for Two-Velocity Hydrodynamics Equations with th...
 
Comparative Study of the Quality of Life, Quality of Work Life and Organisati...
Comparative Study of the Quality of Life, Quality of Work Life and Organisati...Comparative Study of the Quality of Life, Quality of Work Life and Organisati...
Comparative Study of the Quality of Life, Quality of Work Life and Organisati...
 
A Study of Automated Decision Making Systems
A Study of Automated Decision Making SystemsA Study of Automated Decision Making Systems
A Study of Automated Decision Making Systems
 
Crystallization of L-Glutamic Acid: Mechanism of Heterogeneous β -Form Nuclea...
Crystallization of L-Glutamic Acid: Mechanism of Heterogeneous β -Form Nuclea...Crystallization of L-Glutamic Acid: Mechanism of Heterogeneous β -Form Nuclea...
Crystallization of L-Glutamic Acid: Mechanism of Heterogeneous β -Form Nuclea...
 
Evaluation of Damage by the Reliability of the Traction Test on Polymer Test ...
Evaluation of Damage by the Reliability of the Traction Test on Polymer Test ...Evaluation of Damage by the Reliability of the Traction Test on Polymer Test ...
Evaluation of Damage by the Reliability of the Traction Test on Polymer Test ...
 
Application of Kennelly’model of Running Performances to Elite Endurance Runn...
Application of Kennelly’model of Running Performances to Elite Endurance Runn...Application of Kennelly’model of Running Performances to Elite Endurance Runn...
Application of Kennelly’model of Running Performances to Elite Endurance Runn...
 
Development and Application of a Failure Monitoring System by Using the Vibra...
Development and Application of a Failure Monitoring System by Using the Vibra...Development and Application of a Failure Monitoring System by Using the Vibra...
Development and Application of a Failure Monitoring System by Using the Vibra...
 
The Management of Protected Areas in Serengeti Ecosystem: A Case Study of Iko...
The Management of Protected Areas in Serengeti Ecosystem: A Case Study of Iko...The Management of Protected Areas in Serengeti Ecosystem: A Case Study of Iko...
The Management of Protected Areas in Serengeti Ecosystem: A Case Study of Iko...
 
Size distribution and biometric relationships of little tunny Euthynnus allet...
Size distribution and biometric relationships of little tunny Euthynnus allet...Size distribution and biometric relationships of little tunny Euthynnus allet...
Size distribution and biometric relationships of little tunny Euthynnus allet...
 
Removal of Chromium (VI) From Aqueous Solutions Using Discarded Solanum Tuber...
Removal of Chromium (VI) From Aqueous Solutions Using Discarded Solanum Tuber...Removal of Chromium (VI) From Aqueous Solutions Using Discarded Solanum Tuber...
Removal of Chromium (VI) From Aqueous Solutions Using Discarded Solanum Tuber...
 
Effect of Various External and Internal Factors on the Carrier Mobility in n-...
Effect of Various External and Internal Factors on the Carrier Mobility in n-...Effect of Various External and Internal Factors on the Carrier Mobility in n-...
Effect of Various External and Internal Factors on the Carrier Mobility in n-...
 
Transient flow analysis for horizontal axial upper-wind turbine
Transient flow analysis for horizontal axial upper-wind turbineTransient flow analysis for horizontal axial upper-wind turbine
Transient flow analysis for horizontal axial upper-wind turbine
 
Choice of Numerical Integration Method for Wind Time History Analysis of Tall...
Choice of Numerical Integration Method for Wind Time History Analysis of Tall...Choice of Numerical Integration Method for Wind Time History Analysis of Tall...
Choice of Numerical Integration Method for Wind Time History Analysis of Tall...
 
Impacts of Demand Side Management on System Reliability Evaluation
Impacts of Demand Side Management on System Reliability EvaluationImpacts of Demand Side Management on System Reliability Evaluation
Impacts of Demand Side Management on System Reliability Evaluation
 
Reliability Evaluation of Riyadh System Incorporating Renewable Generation
Reliability Evaluation of Riyadh System Incorporating Renewable GenerationReliability Evaluation of Riyadh System Incorporating Renewable Generation
Reliability Evaluation of Riyadh System Incorporating Renewable Generation
 
The effect of reduced pressure acetylene plasma treatment on physical charact...
The effect of reduced pressure acetylene plasma treatment on physical charact...The effect of reduced pressure acetylene plasma treatment on physical charact...
The effect of reduced pressure acetylene plasma treatment on physical charact...
 
Experimental Investigation of Mini Cooler cum Freezer
Experimental Investigation of Mini Cooler cum FreezerExperimental Investigation of Mini Cooler cum Freezer
Experimental Investigation of Mini Cooler cum Freezer
 
Growth and Magnetic properties of MnGeP2 thin films
Growth and Magnetic properties of MnGeP2 thin filmsGrowth and Magnetic properties of MnGeP2 thin films
Growth and Magnetic properties of MnGeP2 thin films
 

Último

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

Último (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

Research Inventy : International Journal of Engineering and Science

  • 1. Research Inventy: International Journal Of Engineering And Science Vol.3, Issue 11 (November 2013), PP 07-14 Issn(e): 2278-4721, Issn(p):2319-6483, Www.Researchinventy.Com Risk Status Prediction and Modelling Of Students’ Academicachievement - A Fuzzy Logic Approach Adeleke Raheem Ajiboye1, Ruzaini Abdullah Arshah2, Hongwu Qin3 1,2,3, Faculty Of Computer Systems And Software Engineering Universiti Malaysia Pahang, Malaysia. ABSTRACT: Several students usually fall victims of low grade point at the end of their first year in the institution of higher learning and some were even withdrawn due to their unacceptable grade point average (GPA); this could be prevented if necessary measures were taken at the appropriate time. In this paper, a model using fuzzy logic approach to predict the risk status of students based on some predictive factors is proposed. Some basic information that has some correlations with students’ academic achievement and other predictive variables were modelled, the simulated model shows some degree of risk associated with their past academic achievement. The result of this study would enable the teacher to pay more attention to student’s weaknesses and could also help school management in decision making, especially for the purpose of giving scholarship to talented students whose risk of failure was found to be very low; while students identified as having high risk of failure, could be counselled and motivated with a view to improving their learning ability. KEYWORDS: fuzzy logic, academic achievement, prediction and risk status. I. INTRODUCTION In the institution of higher learning, several students are found of having low grades while they are in first year; findings reported in [5] revealed that, stress during this period is associated with overall academic adjustment and low GPA. Modeling of student’s achievement is a useful tool for both educators and students, as this can help to have better understanding of student’s weakness and bring about enhancement [8]. First year students needs some form of monitoring especially as regards to their academic performance. Modelling the past academic achievement in order to establish the risk of students’ failure based on some information they earlier submitted for admission purposes is a step in the right direction, though, a challenging task. According to [10], working with uncertain information makes estimation with the actual number value difficult, but this could be easily understood if done with natural language. Fuzzy logic technique (FLT) provides efficient and feasible solutions by following the input output system represented in Fig 2. The knowledge of fuzzy logic is most suitable according to [11], when modelling of human evaluation is needed. Also, in [19], it was reported that FLT is the most important technique to handle imprecision and uncertainty. It is of paramount importance to evaluate students’ achievement after the students complete their registration as such exercise would enable the teachers to offer assistance to them for better performance. Knowing fully well that education is very essential and inevitable for the upliftment and progress of a nation [1], all hands must always be on deck to make it promising. The objective of this paper was to explore the students’ academic achievement of newly admitted students with a view to classifying their risk status using fuzzy logic technique. The rest of this paper is organised as follows: Some related works reported in literature on prediction of student’s performance were discussed in the next section; in section 3, we discussed briefly about fuzzy logic concept and its basic operations; while in section 4, we present the design, analysed the method used and display our results; discussion of results is in section 5 and the whole work is concluded in section 6. II. RELATED WORKS Several classification algorithms have been applied to predict students’ academic achievements, in the process, the levels of accuracies were measured; however, most of these methods are subjective. It is important to predict students’ performance in order to differentiate between the fast learners and slow learners as observed in [9]. It was revealed in their findings that, students’ academic performance should not depend on their own efforts alone, relevant predictive factors were also identified. A comparative analysis of techniques for predicting academic performance was proposed in [2], models were constructed using weka tool, a very high accuracy was reported and diverse grading systems was identified as the difficulty encountered in the course of applying the technique to international students. The academic predictors were measured in [3] to determine 7
  • 2. Risk Status Prediction And Modelling... their accuracy and efforts were made at establishing their level of reliability most especially at discriminating from success and failure cases of classifier or predictive model. Research conducted in [5] shows that matureage students achieved higher final degree GPA compared to young undergraduates. Though, this may be environment specific. Achievement evaluation model reported in [4] proposed Radial Basis Function Neural Network and similarity filter to evaluate learning achievement, three phases that can reduce bias assessment were identified, these include: selection of important feature attributes to enhance classification performance, using of minimal entropy principle approach to fuzzify the quantitative data, model construction and accuracy evaluation. Genetic fuzzy approach was proposed in [19] to identify students’ skills. The idea to combine the two techniques was to explore soft computing techniques that support learning and evolution. Rules for identifying some intelligence were generated for the achievement and powerful classification of human capabilities.Also, in a survey carried out on Fuzzy Inference-Based student evaluation methods in [17], five different evaluation methods capable of unveiling students’ achievement were identified; these include: Fuzzy Classification, Baiand-Chen’s Method, Saleh-and-Kim’s Method, Fuzzy Rule Interpolation and Rasmani-and-Shen’s Method. It was concluded that Fuzzy inference based solutions offer a transparency result due to the humanly interpretable rules.Evaluation of students’ performance using data-driven fuzzy rule was proposed in [6], the approach was reported to perform Norm-Referenced Evaluation which produced new and informative scores based on several information retrieved from data. It was concluded that the findings was meant to help strengthen the system that is commonly in use, as the approach was intended to provide additional information for decision making. III. FUZZY LOGIC Fuzzy logic (FL) can be described as logic of fuzzy sets [13]. It is an area of soft computing that enables a computer system to reason with uncertainty [16]. The concept was initially formalized by Lofti Zadeh in his seminar 1965 paper “Fuzzy sets”. A fuzzy set is distinct from a crisp or Boolean set because it allows its elements to have a degree of membership i.e the characteristics function of a fuzzy set can have values between 0 and 1 [15]. The core of a fuzzy set is its membership function: a surface or line that defines the relationship between a value in the set’s domain and its degree of membership [13].Fuzzy logic according to [12] has two different meanings: It can be referred to as a logical system which may be viewed as an extension and generalization of classical multi-valued logics. In a wider sense, FL is almost synonymous with the theory of fuzzy sets as any field X and any theory Y can be fuzzified by replacing the concept of a crisp set in X and Y by that of a fuzzy set [12]. The fuzzy linguistics variable “risk” can be categorized as: very low, low, medium, high and very high. Each category is called a linguistic modifier. The modifier can take its degree of membership from [0, 1] as shown in figure 3. The scales on this figure are used to distinguish the prediction of students’ academic achievement risk (very low risk, low risk, medium risk, high risk and very high risk). IV. DESIGN AND METHODS 4.1 Dataset and Data Preparation Getting rid of errors and outliers that may be present in the data are parts of pre-processing task that should be done to make the data suitable for modelling. In many real-world applications, most especially in cases when it involves huge amounts of data, the subset of cases with complete data may be relatively small. Errors can result from data entry mistakes, transposing digits or specifying invalid dates; too much noise can result in poor quality models [17]. The dataset was collected from a university in north central, Nigeria. The data comprised of 37 records of candidates that were offered admission to study Computer Science. TABLE 1 contains the predictive variables, while Fig. 1 shows data preparation using rapidminer tool. Table 1: The predictive variables S/NO 1 INPUT VARIABLE SSRS DESCRIPTION OPTIONS 2 NSSSE 3 EM Secondary School Result Strength Number of sittings in secondary school examination Entry mode A1;A2;A3;B2 ;B3;C4;C5;C6 1 attempt ; 2 attempts Utme1 Remedial 2 Literate 1 Illiterate 2 Private 1 4 PLS Parent literacy status 5 OSSA Ownership of secondary school 8 VALUES OBTAINABLE 1-7 1-2 1-2 1-2 1-2
  • 3. Risk Status Prediction And Modelling... 6 LSSA 7 SOJE attended Location of secondary school attended Score obtained in Unified Tertiary Matriculation Examination. Public 2 Town 1; City 2; Village 3 Above 250 1 221 – 250 2 200 – 220 3 Below 200 4 1-3 1-4 Figure 1: Data cleaning Table 2 Transformed students’ data As shown in TABLE 2, the individual student’s data were transformed based on the options and obtainable values in TABLE 1. 4.2 Analysis of fuzzy set structure and operations If X is a collection of objects denoted generically by x, then a “fuzzy set” A in X is defined as a set of ordered pairs [15]: A = {x, μx) | x Є X}………………… (1) where μx) is called membership function for the fuzzy set A which maps each element of X to a membership value between 0 and 1. Element x may have full, partial or no membership in A. Its degree of membership would be considered to be full if μ = 1; partial, if μx) lies between 0 and 1 i.e 0 < x) 9
  • 4. Risk Status Prediction And Modelling... μx) < 1; and no membershipexist if μ x) = 0. s illustrated in Fig. 3, a fuzzy set is formed when a A linguistic variable combines with a linguistic modifier (i.e. very low_risk,low_risk, high_risk, medium_risk etc). Each linguistic modifier is linked to a numerical value on a scale ranges from 0 to 9 that represents the academic achievement risk. Also, each element represents a corresponding value of a degree of membership in the universe of discourse. Fuzzy sets can be manipulated using one of the four standard fuzzy set operations: union, intersection, complementation, and implication operations [14]. Though, the set operations discussed here are often used, fuzzy set operations are not limited to this four. A fuzzy set union is performed by applying the maximum (Max) function to the elements of two sets, for instance, let μx) = {1, 3,5,8,9} and μBy) = {1, 7,4,8,9} the union of fuzzy set C = A B; it follows that: μCz) = μ(x) μB (y) = Max { μA(x) , μB (y)} A μCz) = {1, 7,5,8,9}. The intersection of two sets can be determined by applying the minimum (Min) function: μx) μBy)= Min { μA(x) , μB (y)} = {0,4,1,0,0} Complement of a set is can be computed by subtracting each element of the set from its maximum possible value: μĀx) = {9 μx) = {8, 6,4,1,0} The implication function decides if a particular set is true, to what extent can we conclude the other set can be said to be true? To illustrate implication operation, we can compute: μĀ μB (q) = μĀx) μy) μĀ μB (q) = {8,6,4,1,0} {1,7,4,8,9} = {8,7,4,8,9} 4.3 Proposed model for academic achievement risk status Due to vagueness in grading educational system, according to [18], the use of fuzzy theory provide better models of subjective judgment. This approach essentially involves three main tasks: fuzzification, inference and defuzzification as represented in Fig. 2. Excerpt of 37 records from the data collected were modelled and a fuzzy set A was formed. The set takes its values from {X} in a closed interval [0,1]. From equation 1 and degree of membership in Fig. 3, .fA(x) = {0.1, 0.2, 0.4, 0.5, 0.8, 1} Knowledge based Input Fuzzifier Defuzzifier Inference Output There are different forms of membership functions, here we used trapezoidal to illustrate the membership function. According to [15], a trapezoidal membership function is specified by four parameters {a,b,c,d} as shown in equation 2: Figure 2 Input /Output of a fuzzy logic system 10
  • 5. Risk Status Prediction And Modelling... Very low Figure 3 Fuzzy set structure for risk status The parameters {a,b,c,d} with a < b < = c < d, determine the x coordinates of the four corners of the underlying high trapezoidal membership function. Trapezoid (x; a,b,c,d) = 0, (x-a) / (b-a), x <= a. a <= x <= b. 1, (d-x) / (d-c), b <= x <= c. ……….(2) c <= x <= d. 0, d <= x. Table 3 Predictive variables and degree of membership Predictive variable SSRS NSSSE EM PLS OSSA LSSA SOJE Membership value fB(y) 0.8 0.5 0.4 0.6 0.7 0.6 1.0 Representation (y) V1 V2 V3 V4 V5 V6 V7 37 students were considered in this research and the researchers evaluated 7 predictive factors on which predictions were based. From the data displayed in TABLE 3, a fuzzy set B was formed and it takes its values from the closed interval [0,1]. Also from equation 1, B = {y, μy) | y Є Y}………………… (3) 11
  • 6. Risk Status Prediction And Modelling... fB(y) = {0.8, 0.5, 0.4, 0.6, 0.7, 0.6, 1.0} as shown in TABLE 3. The table also shows the membership values assigned to each predictive variable which translates to its predictive relevance. Linguistic variables were mapped to corresponding fuzzy values which results to another set as shown in equation 4: C = {y, μy) | y Є Y} …………… ……...(4) fC(y) = {0.1, 0.2, 0.5, 0.8, 1.0} as shown in TABLE 4. Table 4 Fuzzy linguistic variables and membership values Linguistic variables Very low risk Low risk Medium risk High risk Very high risk Fuzzy values 0 <= x<= 2 1 <= x<= 3 2 <= x<= 5 4 <= x<= 7 6 <= x<= 9 Relative importance 1.0 0.8 0.5 0.2 0.1 As shown in Fig. 3 and TABLE 4, the five fuzzy sets can be interpreted as follows: Very low risk : {1|1.0, 2|0.8, 3|0.0, 4|0.0, 5|0.0, 6|0.0, 7|0.0, 8|0.0, 9|0.0} Low risk : {1|0.6, 2|0.8, 3|0.5, 4|0.0, 5|0.0, 6|0.0, 7|0.0, 8|0.0, 9|0.0} Medium risk : {1|0.0, 2|0.3, 3|0.5, 4|0.4, 5|0.0, 6|0.0, 7|0.0, 8|0.0, 9|0.0} High risk : {1|0.0, 2|0.0, 3|0.0, 4|0.4, 5|0.4, 6|0.2, 7|0.2, 8|0.0, 9|0.0} Very high risk : {1|0.0, 2|0.0, 3|0.0, 4|0.0, 5|0.0, 6|0.2, 7|0.2, 8|0.1, 9|0.1} The technique of fuzzy set addresses the representation of parameters using linguistic variables [7], it also provides dynamic framework to handle qualitative information especially when quantitative seems inappropriate. Through the process of fuzzification, we find the membership value of all the input values in TABLE 2, these values were transformed to form another set as shown in TABLE 5. From TABLE 5, the researchers formed 37 fuzzy sets fc1(y), fc2(y)………fc37(y) that takes its membership values from [0,1]. This process of reduction otherwise known as defuzzification [13] produced the final single scaler results shown in TABLE 6, the table displayed the risk status of all the students (37 cases). fc1(y) = {0.5, 1.0, 0.8, 1.0, 0.8, 0.5, 1.0} fc2(y) = {0.8, 1.0, 0.8, 0.8, 0.8, 1.0, 1.0} ---fc37(y) = {0.5, 0.8, 0.8, 0.5, 0.8, 0.8, 1.0} Table 5 CASE 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 V1 0.5 0.8 0.8 0.5 0.5 0.8 0.5 0.8 0.8 0.5 0.8 0.2 0.8 0.5 0.2 0.5 0.5 0.5 0.8 0.5 0.5 0.5 V2 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 The academic achievements of all the 37 students V3 0.8 0.8 0.8 0.8 0.8 0.8 0.8 0.8 0.5 0.8 0.8 0.5 0.8 0.8 0.8 0.8 0.5 0.5 0.8 0.8 0.8 0.5 V4 1.0 0.8 1.0 1.0 1.0 0.8 1.0 1.0 1.0 1.0 1.0 0.8 1.0 0.8 0.8 0.8 1.0 1.0 1.0 1.0 1.0 0.8 12 V5 0.8 0.8 0.8 1.0 0.8 0.8 0.8 0.8 0.8 0.8 1.0 0.8 0.8 1.0 1.0 0.8 0.8 0.8 1.0 1.0 1.0 1.0 V6 0.5 1.0 1.0 0.8 0.8 0.5 1.0 0.8 0.5 1.0 0.8 1.0 0.5 1.0 0.8 1.0 1.0 1.0 1.0 0.8 0.8 0.8 V7 1.0 1.0 1.0 1.0 1.0 0.8 1.0 1.0 0.8 1.0 1.0 1.0 1.0 0.8 1.0 1.0 1.0 1.0 1.0 0.8 0.8 1.0
  • 7. Risk Status Prediction And Modelling... 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 0.5 0.2 0.5 0.5 0.2 0.8 0.5 0.5 0.2 0.5 0.2 0.2 0.5 0.5 0.5 1.0 0.8 1.0 1.0 1.0 0.8 1.0 1.0 0.8 0.8 0.8 0.8 1.0 1.0 0.8 0.8 0.8 0.8 0.8 0.8 0.8 0.8 0.8 0.5 0.8 0.8 0.8 0.8 0.8 0.8 1.0 0.5 1.0 0.5 0.5 1.0 1.0 1.0 1.0 1.0 0.5 1.0 1.0 0.5 0.5 1.0 0.8 0.8 1.0 0.8 0.8 0.8 0.8 1.0 0.8 0.8 1.0 0.8 0.8 0.8 0.8 0.8 0.8 0.8 1.0 0.5 0.8 0.8 0.8 1.0 0.5 0.8 0.8 0.8 0.8 1.0 0.8 1.0 1.0 1.0 0.8 1.0 1.0 0.8 1.0 0.8 0.8 0.8 0.8 1.0 By applying the Min function to the degree of membership displayed in TABLE 5, we arrived at the decision on the risk status of individual case as shown in TABLE 6. Table 6 CASE 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 VALUES 0.5 0.8 0.8 0.5 0.8 0.5 0.5 0.8 0.5 0.5 0.8 0.2 0.5 0.5 0.2 0.5 0.5 0.5 0.8 The risk status of all the students RISK STATUS medium low low medium low medium medium low medium medium low high medium medium high medium medium medium low V. CASE 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 VALUES 0.5 0.5 0.5 0.5 0.2 0.5 0.5 0.2 0.5 0.5 0.5 0.2 0.5 0.2 0.2 0.5 0.5 0.5 RISK STATUS medium medium medium medium high medium medium high medium medium medium high medium high high medium medium medium DISCUSSION OF RESULTS TABLE 6 shows the risk status of all the 37 students.The analysis of the results revealed three clusters of students as regards their risk status. Information from the result also shows that, 24 of the students were predicted to have medium risk; 6 of the students were predicted to have low risk; there is no need to exercise any fear about the future performance on these category of students. However, 7 students were predicted to have high risk; this category of students deserves special attention so that they can cope well with their studies. Generally, cases with values above 0.5 have satisfactory academic achievement, while cases with values less than 0.5 needs to sit up and make extra efforts to meet the challenges ahead. VI. CONCLUSION This research adds to the rationale for having prior knowledge about the academic achievement of all the newly admitted and registered students, at the earliest possible time of their studentship, with a view to determining their strengths and weaknesses.The researchers modelled the transformed input predictive variables using the approach of fuzzy logic. The various methods used to predict student’s performance were discussed; the risk status of students of Computer Science department which comprised of 37 records were predicted in this research, the researchers would extend the technique to cover many departments across faculties in subsequent research. The technique of fuzzy logic applied in this research shows its capability of handling uncertainty.The results segmented the students according to their risk status, the model can be applied to predict 13
  • 8. Risk Status Prediction And Modelling... the academic performance of all applicants seeking admission to Nigerian institutions of higher learning and the technique used can be generalized to make similar prediction in any institution outside Nigeria. Exploring students’ achievement at the early stage of their studies would help the teacher to pay special attention to students predicted to have high risk of failure and render needed assistance to them when it matters most. REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] B.K. Bhardwaj and S. Pal, Data Mining: A prediction for performance improvement using classification, International Journal of Computer Science and Information Security, Vol. 9(4), 2011. V. Juana-Maria and F. Manuel, How does one assess the accuracy of academic success predictors? ROC analysis applied to university entrance factors, International Journal of Mathematical Education in Science and Technology, Vol. 39 (3), 2008, pp. 325–340. S. Michael, Hardiness commitment, gender and age differentiate university academic performance, British Journal of Educational Psychology, 79, 2009, pp.189–204. C. Ching-Hsue, et al., A new e-learning achievement evaluation model based on RBF-NN and simulation filter, Neural Computing & Application; 20, 2011, 659–669. L.J. Friedlander, G.J. Reid, N. Shupak, & R. Cribbie, Social support, self-esteemand stress as predictors of adjustment to university among first-year undergraduates, Journal of College Student Development,48(3), 2007, 259-274. K.A. Rasmani and Q. Shen, Data-driven fuzzy rule generation and its application for student academic performance evaluation; Springer, Applied Intelligence, 25, 2006, 305–319. F. Herrera and E. Herrera-Viedma, Linguisticss decision analysis: Steps for solving decision problem under linguistics information, Fuzzy sets and system management, 115, 2000, 67-82. P. Cortez, and A. Silva, Using data mining to predict secondary school student performance, A Proceedings of 5th Annual Future Business Technology Conference, Porto, 2008. N.T. Nghe, P. Janecek, and P. Haddawy, A Comparative Analysis ofTechniques for Predicting Academic Performance, 37th ASEE/IEEE Frontiers in Education Conference, 2007. M. Delgado, F. Herrera, E. Herrera-Viedma, L. Martinez, Combining numerical and linguistic information in group decision making, Information Sciences, 107, 1998, 177–194. K. Cengiz, Fuzzy Engineering Economics with Applications (Springer-Verlag Berlin Heidelberg, 2008). J.K. George, and B. Yuan, Fuzzy sets and Fuzzy logic: Theory and Applications (Printice-Hall of India private limited, New Delhi, 2008). E. Cox, Fuzzy modelling and genetic algorithms for data mining and exploration (Morgan Kaufman, 2005). J.M. Mendel, Uncertain Rule-Based Fuzzy Logic Systems: Introduction and New Directions ( Prentice-Hall Publishing Company, 2001). O. Castillo, P. Melin, Type-2 Fuzzy logic: Theory and Applications (Springer-Verlag, Berlin Heidelberg, 2008). O. Castillo, P. Melin,. Soft Computing for Control of non-linear dynamic systems (Springer, Heidelberg, 2001). Z. C. Johanyák, Survey on Five Fuzzy Inference-Based Student Evaluation Methods; I.J. Rudas et al. (Eds.): Computational Intelligence in Engineering (SCI 313, Springer-Verlag Berlin Heidelberg, 2010) pp. 219–228. R. Biswas . An application of fuzzy sets in students’ evaluation. Fuzzy Sets System 74, 1995, 187–194. K. Mankad, P.S. Sajja, and R. Akerkar, An automatic evolution of rules to identify students’ multiple intelligence N. Meghanathan et al. (Eds): (CCSIT, Springer-Verlag Berlin Heidelberg, 2011). 14