Detecting Anomalies in Students‟ Results Using Decision Trees

Full Text (PDF, 467KB), PP.31-40

Views: 0 Downloads: 0

Author(s)

Hamza O. Salami 1,* Ruqayyah S. Ibrahim 1 Mohammed O. Yahaya 2

1. Department of Computer Science, Federal University of Technology, PMB 65, Minna, Nigeria

2. Computer Science and Engineering Department, University of Hafr Al Batin, Hafr Al Batin 31991, Saudi Arabia

* Corresponding author.

DOI: https://doi.org/10.5815/ijmecs.2016.07.04

Received: 22 Mar. 2016 / Revised: 12 May 2016 / Accepted: 10 Jun. 2016 / Published: 8 Jul. 2016

Index Terms

Decision trees, examination results, anomaly detection, educational data mining, result anomaly

Abstract

Examinations are one of the most important activities that take place in institutions of learning. In many Nigerian universities, series of meetings are held to manually examine and approve computed student examination results. During such meetings, students‟ results are scrutinized. Reasonable explanations must be provided for any anomaly that is discovered in a result before the result is approved. This result approval process is prone to some challenges such as fatigue arising from the long duration of the meetings and wastage of man-hours that could have been used for other productive tasks. The aim of this work is to build decision tree models for automatically detecting anomalies in students‟ examination results. The Waikato Environment for Knowledge Analysis (WEKA) data mining workbench was used to build decision tree models, which generated interesting rules for each anomaly. Results of the study yielded high performances when evaluated using accuracy, sensitivity and specificity. Moreover, a Windows-based anomaly detection tool was built which incorporated the decision tree rules.

Cite This Paper

Hamza O. Salami, Ruqayyah S. Ibrahim, Mohammed O. Yahaya, "Detecting Anomalies in Students' Results Using Decision Trees", International Journal of Modern Education and Computer Science(IJMECS), Vol.8, No.7, pp.31-40, 2016. DOI:10.5815/ijmecs.2016.07.04

Reference

[1]G. A. Miller, “The magical number seven, plus or minus two: some limits on our capacity for processing information,” Psychological Review. 63(2), p. 81, 1956.
[2]S. Agrawal and J. Agrawal, “Survey on anomaly detection using data mining techniques,” Procedia Computer Science, 60, pp. 708-713, 2015.
[3]V. Chandola, A. Banerjee and V. Kumar, “Anomaly detection: a survey,” ACM Computing Surveys (CSUR), 41(3), p. 15, 2009.
[4]K. H. Rao, G. Srinivas, A. Damodhar and M. V. Krishna, “Implementation of anomaly detection technique using machine learning algorithms,” International Journal of Computer Science and Telecommunications, 2(3), pp. 25-31, 2011.
[5]S. Ruggieri, “Efficient C4.5 [Classification Algorithm],” . Knowledge and Data Engineering, IEEE Transactions on, 14(2), pp. 438-444, 2002.
[6]T. M. Lakshmi, A. Martin, R. M. Begum and V. P. Venkatesan, “An analysis on performance of decision tree algorithms using student’s qualitative data,” I.J. Modern Education and Computer Science, 5(3), pp. 18-27, 2013.
[7]S. Yoo and S. Kim, “Two-phase malicious webpage detection scheme using misuse and anomaly detection,” International Journal of Reliable Information and Assurancee, 2(1), pp. 1 – 9, 2014.
[8]B. Viswanath, M. A. Bashir, M. Crovella, S. Guha, K. P. Gummadi, B. Krishnamurthy and A. Mislove, “Towards detecting anomalous user behaviour in online social network”. Proceedings of 23rd USENIX Security Symposium. San Diego, CA: USENIX, USENIX Security Symposium (USENIX Security 14), 2014, pp. 223-238.
[9]Y. Wang, D. Li, Y. Du and Z. Pan, “Anomaly detection in traffic using L1-norm minimization extreme learning machine,” Neurocomputing, 149 (2015), pp. 415-425, 2015.
[10]A. S. Aneetha and S. Bose, “The combined approach for anomaly detection using neural networks and clustering techniques,” Computer Science & Engineering, 2(4), pp. 37 – 46, 2012.
[11]S. Zhao, M. Chandrashekar, Y. Lee and D. Medhi, “Real-time network anomaly detection system using machine learning,” 11th International Conference on the Design of Reliable Communication Networks, Kansas City, United States, 2015, pp. 267-270.
[12]B. Vrat, N. Aggarwal and S. Venkatesan, “Anomaly detection in IPv4 and IPv6 networks using machine learning,” 12th IEEE India International Conference (INDICON), New Delhi, India, December 2015, pp. 1-6.
[13]C. Romero and S. Ventura, “Data mining in education,” Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 3(1), pp. 12-27, 2013.
[14]L. Rokach and O. Maimon, “Decision trees” - Chapter 9. In Data Mining and Knowledge Discovery handbook, pp. 165-192, 2005.
[15]Y. Li, H. Xing, Q. Hua, and X. Wang, “Classification of BGP anomalies using decision trees and fuzzy rough sets,” In Systems, Man and Cybernetics, IEEE International Conference on (SMC), October 2014, pp. 1312–1317.
[16]I. H. Witten and E. Frank,. Data mining: practical machine learning tools and techniques. Morgan Kaufmann, 2011.