<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Model for Evaluating Student Performance Through Their Interaction With Version Control Systems</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Angel Manuel Guerrero-Higueras</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Vicente Matellan-Olivera</string-name>
          <email>vicente.matellan@fcsc.es</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Gonzalo Esteban Costales</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Camino Fernandez-Llamas</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Francisco Jesus Rodr guez-Sedano</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Miguel Angel Conde</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Research Institute on Applied Sciences in Cybersecurity (RIASC). Universidad de Leon</institution>
          ,
          <addr-line>Av. de los Jesuitas s/n. ES-24008 Leon</addr-line>
          ,
          <country country="ES">Spain</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Robotics Group. Universidad de Leon</institution>
          ,
          <addr-line>Av. de los Jesuitas s/n. ES-24008 Leon</addr-line>
          ,
          <country country="ES">Spain</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Supercomputacion de Castilla y Leon (SCAYLE)</institution>
          ,
          <addr-line>Campus de Vegazana s/n, ES.24071 Leon</addr-line>
          ,
          <country country="ES">Spain</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2018</year>
      </pub-date>
      <abstract>
        <p>Version Control Systems are commonly used for Information and communication technology professionals. They also allows to follow the activity of a single programmer working in a project. For these reasons, Version Control Systems are also used by educational institutions. The aim of this work is to demonstrate that the student performance may be evaluated, and even predicted, by monitoring their interaction with a Version Control System. In order to do so we have build a Machine Learnings model to predict student results in a speci c task of the Ampliacion de Sistemas Operativos subject from the second course of the degree in Computer Science of the University of Leon through their interaction with a Git repository.</p>
      </abstract>
      <kwd-group>
        <kwd>Version Control System</kwd>
        <kwd>Machine Learning</kwd>
        <kwd>Learning analytics</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>The emergence of the Information and Communication Technologies have change
the landscape of the teaching and learning processes. Teachers can employ a lot
of tools in their classes with the aim to improve students learning. In addition
students can use di erent application to learn in their education center and
beyond it. However, Is it possible to say if a tool is improving student performance?
If we can assert this, it would be possible to use the tool that better ts with
speci c lessons or students. There are several studies regarding to this, and this
issue is specially link to trends such as Learning Analytics and Educational Data
Mining.</p>
      <p>Copyright © 2018 for this paper by its authors. Copying permitted for private and academic purposes</p>
      <p>
        The most accepted de nition of learning analytics considers that it comprises
\the measurement, collection, analysis and reporting of data about learners and
their contexts, for purposes of understanding and optimising learning and the
environments in which it occurs" [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Learning analytics facilitates discovery of
\hidden" knowledge about teaching and learning processes (see [
        <xref ref-type="bibr" rid="ref2 ref3">2,3</xref>
        ]).
Therefore, the use of learning analytics allows learners and instructors to obtain and
visualize information about di erent issues and between them the suitability of
contents and/or tools and their impact in students' performance [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. Educational
institutions and instructors could use the information obtained by applying these
techniques to make changes in the courses in order to improve the whole learning
process and experience [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
      </p>
      <p>
        In this case the idea is to explore how students' performance is a ected by
the use of Version Control Systems (VCSs). VCSs facilitate the management of
changes in the components of a software product or its con guration[
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. The
version, release or edition is the state of this product in a speci c moment. But
why to use such tools? This is because it is a high demanded tool for future
computer science engineers and it is introduced as a tool of several Computer
Science Subjects.
      </p>
      <p>The aim of this work is to build a model that allows to predict student
results at a practical assignment by monitoring their use of a VCS. We assume
the premise that the students activity with this type of systems is an indicator
of the evolution of their progress.</p>
      <p>The rest of the paper is organized as follows: Section 2 describes the
empirical evaluation of the classi cation algorithms presenting the experimental
environment, materials, and methods used. Section 3 summarizes the results of
the evaluation. The discussion of the results is developed in Section 4. Section 5
presents the conclusions and future lines of research.
2</p>
      <p>Materials and Methods
This section describes all the elements and the methodology used to build and
evaluate the model for predicting student results. Among the elements used
there are a speci c practical assignment to provide student results, and a VCS.
Regarding the methodology, a set of classifying algorithms have been evaluated
by analysing some well-known Key Performance Indicators (KPIs).
2.1</p>
    </sec>
    <sec id="sec-2">
      <title>Practical assigment: ASSOOFS</title>
      <p>The Ampliacion de Sistemas Operativos (ASSOO) subject from the second
course of the degree in Computer Science of the University of Leon broadens
knowledge about operating systems. In particular, it addresses the internal
functioning of storage management, both volatile (memory management) and
nonvolatile ( le management). Issues related to security in operating systems are
also addressed.</p>
      <p>
        Main practical assignment consists on implementing an inode-based le
system called Ampliacion de Sistemas Operativos File System (ASSOOFS).
According to the proposed speci cation, this le system must work on computers
that run the Linux operating system. Therefore, students have to implement a
module for the Linux kernel [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] that supports, at least, the following operations:
mounting of devices formatted with this system; creation, reading and writing
of regular les; creation of new directories and the visualization of the content
of existing directories.
      </p>
      <p>This is an individual assignment and each student is encouraged to use a
VCS during the completion of the task.
2.2</p>
    </sec>
    <sec id="sec-3">
      <title>GitHub Classrrom</title>
      <p>
        In software engineering, it is known as control of versions to the management
of the changes that are made on the elements of some product [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. It is called
version, revision or edition, to the state of the product at a given time.
      </p>
      <p>
        Version management can be done manually, although it is advisable to use
some tool to facilitate this task. These tools are known as VCSs [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. Among the
most popular there are the following: CVS, Subversion [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] or Git [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ].
      </p>
      <p>A VCS must provide, at least, the following features:
{ Storage for the di erent elements to be managed (source code, images,
documentation).
{ Edition the stored elements (creation, deletion, modi cation, renaming, etc.).
{ Registration and labelling of all actions carried out, of so that they allow an
element to be returned to a state previous.</p>
      <p>
        For the development of ASSOOFS, students are encouraged to use a Git
repository. Git follows a distributed scheme, and contrary to other systems that
follow the client-server models, each copy of the repository includes the story
complete of all the changes made [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ].
      </p>
      <p>
        In order to provide some organizing capabilities and private repositories for
students the GitHub Classroom platform was used [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. GitHub is a web-based
hosting service for software development projects that utilize the Git revision
control system. In addition, GitHub Classroom allows to assign tasks to students,
or groups of students, framed in the same centralized organization: ASSOO
students in our case.
      </p>
      <p>Features Regarding the input data to predict results, usually called features in
a Machine Learning (ML) context, we have considered the following information
coming from students activity on their repositories:
{ Commits : total number of commit operations carried by the student.
{ #Days with commit operations : total number of days where there is at least
one commit operation.</p>
      <p>{ Commits/date: average number of commit operations per date.
{ Additions: number of lines of code added during the assignment completion.
{ Deletions: number of lines deleted during the assignment completion.</p>
      <p>In addition to the above data, all obtained from the GitHub Classroom
platform, we have also considered the students grade on a proof carried out to control
the authorship of the code in student repositories. This authorship proof allows
to verify that the students really worked in the content of their repository. The
authorship proof has two possible results: \1", if the student passed the proof;
\0" otherwise.</p>
      <p>Input data explained above will be used by the model to predict a class: AP,
for those students who will nish the practical assignment successfully; and SS,
for those who not.
2.3</p>
    </sec>
    <sec id="sec-4">
      <title>Model</title>
      <p>We want to generate a model whose inputs are quantitative, while its output
is a discrete value: AP, and SS. Two types of ML algorithms may be used:
classi ers and predictors, whereby considering the rst ones will be better. We
have evaluated the following well-known methods that we think are the more
promising ones: Adaptive Boosting (AB), Classi cation And Regression Tree
(CART), K-Nearest Neighbors (KNN), Linear Discriminant Analysis (LDA),
Logistic Regression (LR), Multi-Layer Perceptron (MLP), Naive Bayes (NB),
and Random Forest (RF).</p>
      <p>AB Ensemble methods are techniques that combine di erent basic classi ers
turning a weak learner into a more accurate method. Boosting is one of the
most successful types of ensemble methods, and AB one of the most popular
boosting algorithms.</p>
      <p>
        CART A decision tree is a method which predicts the label associated with an
instance by travelling from a root node of a tree to a leaf [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. It is a
nonparametric method in which the trees are grown in an iterative, top-down
process.
      </p>
      <p>
        KNN Although nearest neighbours is the foundation of many other learning
methods, notably unsupervised, supervised neighbour-based learning is also
available to classify data with discrete labels. It is a non-parametric technique
which classi es new observations based on the distance to observation in the
training set. A good presentation of the analysis is given in [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] and [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ].
LDA Parametric method that assumes that distributions of the data are
multivariate Gaussian [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]. Also, LDA assumes knowledge of population
parameters. In another case, the maximum likelihood estimator can be used.
LDA uses Bayesian approaches to select the category which maximizes the
conditional probability (see [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ], [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ] or [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ]).
      </p>
      <p>
        LR Linear methods are intended for regressions in which the target value is
expected to be a linear combination of the input variables. LR, despite its name,
is a linear model for classi cation rather than regression. In this model, the
probabilities describing the possible outcomes of a single trial are modeled
using a logistic function.
MLP An arti cial neural network is a model inspired by the structure of the
brain. Neural networks are used when the type of relationship between inputs
and outputs is not known. It is supposed that the network is organized
in layers (input layer, output layer and hidden layers). An MLP consists
of multiple layers of nodes in a directed graph so that each layer is fully
connected to the next one. An MLP is a modi cation of the standard linear
perceptron and, the best characteristic is that it is able to distinguish data
which is not linearly separable. An MLP uses back-propagation for training
the network, see [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ] and [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ].
      </p>
      <p>
        NB This method is based on applying Bayes' theorem with the \naive"
assumption of independence between every pair of features, see [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] and [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ].
RF Classi er consisting of a collection of decision trees, in which each tree is
constructed by applying an algorithm to the training set and an additional
random vector that is sampled via boostrap re-sampling [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ].
      </p>
      <p>
        To evaluate the previous methods, the implementation of the Scikit-learn
library has been used [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ].
2.4
      </p>
    </sec>
    <sec id="sec-5">
      <title>Methodology</title>
      <p>
        In order to train the models we have use the data obtained by the ASSOO
students from de 2016{2017 course presented at [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ]. These data includes the
features mentioned at section 2.2 for the 46 students who tried the ASSOOFS
assignment. We carried out 2 kind of analysis: in the rst one we do not include
the authorship proof as an input feature; in the second one, we do.
      </p>
      <p>
        To evaluate the above algorithms with there input data, we have followed
the method proposed at [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ] to select the model which better ts our problem.
The method proposes a 10-iteration cross-validation analysis for selecting the
most suitable learning algorithm. Moreover, the accuracy classi cation score has
been used to evaluate the performance of the models. The accuracy classi cation
score is computed as shown at equation 1, where P Tp is the number of true
positives, and P Tn is the number of true negatives.
      </p>
      <p>accuracy =</p>
      <p>P Tp + P Tn</p>
      <p>P total data</p>
      <p>The three models with the highest accuracy classi cation score have been
pre-selected for in-depth evaluation by considering the following KPIs: Precision
(P ), Recall (R), and F1-score; all of which were obtained through the confusion
matrix.</p>
      <p>The Precision (P ) is computed as shown at equation 2, where P Fp is the
number of false positives.</p>
      <p>P =</p>
      <p>P Tp</p>
      <p>P Tp + P Fp</p>
      <p>The Recall (R) is computed at equation 3, where P Fn is the number of false
negatives.
(1)
(2)</p>
      <p>R =</p>
      <p>P Tp</p>
      <p>P Tp + P Fn
According to the above results, as shown at Table 1{left, RF classi er works
better (accuracy score = 0.8) than any other for selected features, in this case:
Commits, #days with commit operations, commits/date, additions, and
deletions. CART classi er works slightly worse (accuracy score = 0.7) than RF,
while all the other classi ers o er very poor results.</p>
      <p>Once the best models are pre-selected, a deeper analysis with the confusion
matrix of each one is given. Another important item that should be analysed
is the sensitivity of the model for detecting a passed assignment (AP): i.e., the
rate of APs that the model classi es incorrectly. Table 1{right and Fig 1, show
that the RF classi er gets better average values for Precision (P ), Recall (R)
and F1-score than CART and LR.
This work aim to build a model to predict students results by monitoring their
activity at VCSs. We start from the premise that analysing the students activity
at VCSs allows to predict their results.</p>
      <p>To build the model several classi ers have been evaluated. In addition to
select the best classi er, we have demonstrated that our premise is true due to
the fact that we can predict the students results with a success high percentage.
However, the models were evaluated using a small dataset. It would be desirable
to get a larger volume of data to perform the analysis.</p>
      <p>Regarding the chosen features, we observe that in addition to consider the
repository activity, adding an authoring proof helps to increase the accuracy.</p>
      <p>Future work will be related to the tuning the hyper-parameters of models
in order to obtain better results. In addition, we need to increase de training
dataset.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Siemens</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Long</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Penetrating the fog: Analytics in learning and education</article-title>
          .
          <source>EDUCAUSE review 46(5)</source>
          ,
          <volume>30</volume>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Hernandez-Garc</surname>
            <given-names>a</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            ,
            <surname>Gonzalez-Gonzalez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            ,
            <surname>Jimenez-Zarco</surname>
          </string-name>
          ,
          <string-name>
            <surname>A.I.</surname>
          </string-name>
          , ChaparroPelaez, J.:
          <article-title>Applying social learning analytics to message boards in online distance learning: A case study</article-title>
          .
          <source>Computers in Human Behavior</source>
          <volume>47</volume>
          ,
          <issue>68</issue>
          {
          <fpage>80</fpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Agudo-Peregrina</surname>
            ,
            <given-names>A.F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Iglesias-Pradas</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Conde-Gonzalez</surname>
            ,
            <given-names>M.A.</given-names>
          </string-name>
          ,
          <article-title>HernandezGarc a, A.: Can we predict success from log data in vles? classi cation of interactions for learning analytics and their relation with performance in vle-supported f2f and online learning</article-title>
          .
          <source>Computers in human behavior 31</source>
          ,
          <volume>542</volume>
          {
          <fpage>550</fpage>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Conde</surname>
            ,
            <given-names>M.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hernandez-Garc</surname>
            <given-names>a</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            ,
            <surname>Oliveira</surname>
          </string-name>
          ,
          <string-name>
            <surname>A.</surname>
          </string-name>
          :
          <article-title>Endless horizons?: addressing current concerns about learning analytics</article-title>
          .
          <source>In: Proceedings of the 3rd International Conference on Technological Ecosystems for Enhancing Multiculturality</source>
          . pp.
          <volume>259</volume>
          {
          <fpage>262</fpage>
          .
          <string-name>
            <surname>ACM</surname>
          </string-name>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Conde</surname>
            ,
            <given-names>M.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hernandez-Garc</surname>
            <given-names>a</given-names>
          </string-name>
          , A.:
          <article-title>Learning analytics for educational decision making</article-title>
          .
          <source>Computers in Human Behavior (47)</source>
          ,
          <volume>1</volume>
          {
          <issue>3</issue>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Fischer</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pinzger</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gall</surname>
          </string-name>
          , H.:
          <article-title>Populating a release history database from version control and bug tracking systems</article-title>
          .
          <source>In: Software Maintenance</source>
          ,
          <year>2003</year>
          .
          <article-title>ICSM 2003</article-title>
          . Proceedings. International Conference on. pp.
          <volume>23</volume>
          {
          <fpage>32</fpage>
          .
          <string-name>
            <surname>IEEE</surname>
          </string-name>
          (
          <year>2003</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Corbet</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rubini</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kroah-Hartman</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          :
          <article-title>Linux Device Drivers: Where the Kernel Meets the Hardware. "</article-title>
          <string-name>
            <surname>O'Reilly Media</surname>
          </string-name>
          ,
          <source>Inc."</source>
          (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Spinellis</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Version control systems</article-title>
          .
          <source>IEEE Software 22(5)</source>
          ,
          <volume>108</volume>
          {
          <fpage>109</fpage>
          (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Pilato</surname>
            ,
            <given-names>C.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Collins-Sussman</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fitzpatrick</surname>
            ,
            <given-names>B.W.</given-names>
          </string-name>
          :
          <article-title>Version Control with Subversion: Next Generation Open Source Version Control. "</article-title>
          <string-name>
            <surname>O'Reilly Media</surname>
          </string-name>
          ,
          <source>Inc."</source>
          (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Torvalds</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hamano</surname>
          </string-name>
          , J.: Git:
          <article-title>Fast version control system</article-title>
          . http://git-scm.
          <source>com</source>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>De Alwis</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sillito</surname>
          </string-name>
          , J.:
          <article-title>Why are software projects moving from centralized to decentralized version control systems?</article-title>
          <source>In: Proceedings of the 2009 ICSE Workshop on cooperative and human aspects on software engineering</source>
          . pp.
          <volume>36</volume>
          {
          <fpage>39</fpage>
          . IEEE Computer Society (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Gri n</surname>
          </string-name>
          , T.,
          <string-name>
            <surname>Seals</surname>
            ,
            <given-names>S.:</given-names>
          </string-name>
          <article-title>Github in the classroom: Not just for group projects</article-title>
          .
          <source>Journal of Computing Sciences in Colleges</source>
          <volume>28</volume>
          (
          <issue>4</issue>
          ),
          <volume>74</volume>
          {
          <fpage>74</fpage>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Friedman</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hastie</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tibshirani</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          :
          <source>The elements of statistical learning Ed. 2</source>
          , vol.
          <volume>1</volume>
          . Springer series in statistics Springer, Berlin (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Devroye</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          , Gyor , L.,
          <string-name>
            <surname>Lugosi</surname>
          </string-name>
          , G.:
          <article-title>A probabilistic theory of pattern recognition</article-title>
          , vol.
          <volume>31</volume>
          . Springer Science &amp; Business
          <string-name>
            <surname>Media</surname>
          </string-name>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Duda</surname>
            ,
            <given-names>R.O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hart</surname>
            ,
            <given-names>P.E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stork</surname>
            ,
            <given-names>D.G.</given-names>
          </string-name>
          :
          <article-title>Pattern classi cation</article-title>
          . John Wiley &amp; Sons (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Bishop</surname>
            ,
            <given-names>C.M.</given-names>
          </string-name>
          :
          <article-title>Pattern recognition</article-title>
          .
          <source>Machine Learning</source>
          <volume>128</volume>
          , 1{
          <fpage>58</fpage>
          (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Koller</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Friedman</surname>
          </string-name>
          , N.:
          <article-title>Probabilistic graphical models: principles and techniques</article-title>
          . MIT press (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Murphy</surname>
            ,
            <given-names>K.P.:</given-names>
          </string-name>
          <article-title>Machine learning: a probabilistic perspective</article-title>
          . MIT press (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Rummelhart</surname>
            ,
            <given-names>D.E.</given-names>
          </string-name>
          :
          <article-title>Learning internal representations by error propagation. Parallel distributed processing (</article-title>
          <year>1986</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Cybenko</surname>
          </string-name>
          , G.:
          <article-title>Approximation by superpositions of a sigmoidal function</article-title>
          .
          <source>Mathematics of Control, Signals, and Systems (MCSS) 2</source>
          (
          <issue>4</issue>
          ),
          <volume>303</volume>
          {
          <fpage>314</fpage>
          (
          <year>1989</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Zhang</surname>
          </string-name>
          , H.:
          <article-title>The optimality of naive bayes</article-title>
          .
          <source>AA</source>
          <volume>1</volume>
          (
          <issue>2</issue>
          ),
          <volume>3</volume>
          (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Breiman</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Random forests</article-title>
          .
          <source>Machine learning 45(1)</source>
          ,
          <volume>5</volume>
          {
          <fpage>32</fpage>
          (
          <year>2001</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Pedregosa</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Varoquaux</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gramfort</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Michel</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Thirion</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Grisel</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Blondel</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Prettenhofer</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Weiss</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dubourg</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vanderplas</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Passos</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cournapeau</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Brucher</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Perrot</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Duchesnay</surname>
          </string-name>
          , E.:
          <article-title>Scikit-learn: Machine learning in Python</article-title>
          .
          <source>Journal of Machine Learning Research</source>
          <volume>12</volume>
          ,
          <volume>2825</volume>
          {
          <fpage>2830</fpage>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Guerrero-Higueras</surname>
            ,
            <given-names>A.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Conde</surname>
            ,
            <given-names>M.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Matellan</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Using version control systems to apply peer review techniques in engineering education</article-title>
          .
          <source>In: IV Congreso Internacional sobre Aprendizaje, Innovacion y Competitividad (CINAIC)</source>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Guerrero-Higueras</surname>
            ,
            <given-names>A.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>DeCastro-Garc</surname>
            <given-names>a</given-names>
          </string-name>
          , N.,
          <string-name>
            <surname>Matellan</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Detection of cyberattacks to indoor real time localization systems for autonomous robots</article-title>
          .
          <source>Robotics and Autonomous Systems</source>
          <volume>99</volume>
          ,
          <fpage>75</fpage>
          {
          <fpage>83</fpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>