2016
DOI: 10.17485/ijst/2016/v9i3/86392
|View full text |Cite
|
Sign up to set email alerts
|

An Adaptive Educational Data Mining Technique for Mining Educational Data Models in Elearning Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

2
9
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(11 citation statements)
references
References 14 publications
2
9
0
Order By: Relevance
“…One of those procedures is the so-called association rules , one of the most commonly used and best known Data Mining techniques ( Romero et al, 2010a ) in very different research disciplines such as medicine ( Antonie et al, 2001 ), earth sciences ( Tan et al, 2001 ), banking ( Aburrous et al, 2010 ), telecommunications ( Wei and Chiu, 2002 ), and the stock-market ( Hajizadeh et al, 2010 ), and also in the educational field. This methodology has been extensively used to identify e-learning indicators and their influence on student performance ( Paule-Ruiz et al, 2015 ), describe learning behavioral profiles ( Goda et al, 2015 ), point out variables that influence instruction ( Romero et al, 2010a ), to improve a collaborative learning experience ( Mora et al, 2014 ), to test 3D virtual reality environments ( Cherenkova et al, 1996 ), to understand the role of social networks in learning ( Paredes and Chung, 2012 ), and as the basis of adaptive learning systems ( Murugananthan and ShivaKumar, 2016 ). Based on this body of previous research, and as Han already concluded in 2001, it seems as though this methodology could produce enough knowledge to discover patterns from a huge amount of data which would be a useful base for a decision-making process ( Han and Kamber, 2001 ).…”
Section: Introductionmentioning
confidence: 99%
“…One of those procedures is the so-called association rules , one of the most commonly used and best known Data Mining techniques ( Romero et al, 2010a ) in very different research disciplines such as medicine ( Antonie et al, 2001 ), earth sciences ( Tan et al, 2001 ), banking ( Aburrous et al, 2010 ), telecommunications ( Wei and Chiu, 2002 ), and the stock-market ( Hajizadeh et al, 2010 ), and also in the educational field. This methodology has been extensively used to identify e-learning indicators and their influence on student performance ( Paule-Ruiz et al, 2015 ), describe learning behavioral profiles ( Goda et al, 2015 ), point out variables that influence instruction ( Romero et al, 2010a ), to improve a collaborative learning experience ( Mora et al, 2014 ), to test 3D virtual reality environments ( Cherenkova et al, 1996 ), to understand the role of social networks in learning ( Paredes and Chung, 2012 ), and as the basis of adaptive learning systems ( Murugananthan and ShivaKumar, 2016 ). Based on this body of previous research, and as Han already concluded in 2001, it seems as though this methodology could produce enough knowledge to discover patterns from a huge amount of data which would be a useful base for a decision-making process ( Han and Kamber, 2001 ).…”
Section: Introductionmentioning
confidence: 99%
“…Zhang Xizheng [1] proposes a recommendation structure using connection control mining and course of action. Set of connection rules are mined from customers' necessities databases using apriori computation Tanbeer et al [2] have proposed a tree-based data structure, called RPS-tree that gets customer given consistency edge and mines reliable cases in a data streams with the help of fp advancement count and prohibitive illustration based and relating unexpected trees. Wang et al, [3] suggested a direct weighting approach in Classification Association Rule Mining.…”
Section: Literature Surveymentioning
confidence: 99%
“…The dimensions and excessive dimensionality of datasets most of the time available as input to the challenge of sample detection make it a excellent project of fixing multiple nodes in parallel. Reminiscence and CPU speed boundaries are the main motives that faced through a single node [2] [3]. So it can be giant to design an robust parallel algorithm to do the job.…”
Section: Introductionmentioning
confidence: 99%
“…These days the most persuasive apparatus to snatch designs and connections inside in us information is Data mining [1]. The information mining system can likewise be utilized as a part of conventional instructive system [2]. The technique for information mining is additionally utilized as a part of stock trade in organizations for recovering expansive sum of data [3].…”
Section: Introductionmentioning
confidence: 99%