OPTIMAL ALGORITHM FOR PREDICTING STUDENTS ACADEMIC PERFORMANCE
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 4, Issue 1
Abstract
Machine learning has been successfully applied to numerous domains such as pattern recognition, image recognition, fraud detection, medical diagnosis, banking, bioinformatics, commodity trading, computer games and various control applications. Recently, this paradigm is been employed to enhance and evaluate higher education tasks. The focus of this work is on identifying the optimal algorithm suitable for predicting first-year tertiary students academic performance based on their family background factors and previous academic achievement. One thousand five hundred (1,500) enrolment records of students admitted into computer science programme Babcock University, Nigeria between 2001 and 2010 was used. The students’ first year academic performance was measured by Cumulative Grade Point Average (CGPA) at the end of the first session and the previous academic achievement was measured by SSCE grade score and UME score. Waikato Environment for Knowledge Analysis (WEKA) was used to generate 10 classification models( five decision tree algorithms -Random forest, Random tree, J48, Decision stump and REPTree and five rule induction algorithms –JRip, OneR, ZeroR, PART, and Decision table)  and a multilayer perceptron, an artificial neural network function. These algorithms were compared using 10-fold cross validation and hold-out method considering accuracy level, confusion matrices and CPU time to determine the optimal model. This work will be taken further by designing a framework of predictive system based on the rules generated from the optimal model.
Authors and Affiliations
Afolashade Kuyoro, Prof. Nicolae Goga, Dr. Oludele Awodele, Dr. Samuel Okolie
IMPLEMENTATION AND ANALYSIS OF FIR FILTER USING TMS 320C6713 DSK
In most of the applications, analog signals are produced in response to some physical phenomenon or activity. But it is quite difficult to process that analog signal; here comes the need to convert an analog signal to a...
Application of Steganography in Symmetric Key Cryptography with Genetic Algorithm
Embedding maximum information in a stego-image with minimum change in its appearance has been a major concern in image-based steganography techniques. In this paper, utilizing Genetic algorithm (GA) we have built up a co...
Effects of Internal Heat Generation and Variable Viscosity on Onset of Rayleigh-Benard Convection
In the present study, onset of stationary Rayleigh-Benard convective instability in a fluid layer, with internal heating and thermally dependent viscosity has been investigated by means of linear stability analysis. The...
An Effective Approach to Contention Based Bandwidth Request Mechanism in WiMAX Networks
In this paper the IEEE 802.16 standard based Mobile WiMAX (Worldwide Interoperability for Microwave Access) system is investigated for the purpose of Quality of Service provisioning. As a potential solution, scheduling...
UNDERSTANDING THE DEVELOPER PARTICIPATION IN BUG FIX PROCESS
Prediction of the bug fix time in open source softwares is a challenging job. A software bug consists of many attributes that define the characteristics of the bug. Some of the attributes get filled at the time of report...