<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Combining clustering and sequential pattern mining to detect behavioral differences in log data: conceptualization and case study</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Universitat Autonoma de Barcelona, Engineering School</institution>
          ,
          <addr-line>Campus UAB, 08193 Bellaterra</addr-line>
          ,
          <country country="ES">Spain</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Universitat Oberta de Catalunya, Rambla del Poblenou</institution>
          ,
          <addr-line>156, 08018 Barcelona</addr-line>
          ,
          <country country="ES">Spain</country>
        </aff>
      </contrib-group>
      <fpage>25</fpage>
      <lpage>38</lpage>
      <abstract>
        <p>Many on-campus universities are shifting their methodologies towards blended learning models. In these models, students cover some content online normally associated with traditional lectures and quiz practice-, and attend also on-campus activities. Online activity is recorded in Learning Management Systems (LMS) logs, where interactions of the students with content are recorded. In this article, we propose a method to detect differences in behavior considering only data recorded in the LMS log. We begin by clustering students based on activity log information. This process is carried out on a periodical basis. Clustering results are translated into meaningful states and then sequenced. The generated sequence is mined through sequential pattern mining (SPM). Besides method description, we apply our method to a specific case-study to prove its validity. In particular, we analyze differences between passing and failing students in a blended-learning course. We prove that the method can generate meaningful sequences which - once analyzed - show relevant behavioral differences between students who pass and those who fail. In particular, failing students show more disengagement patterns than those who pass, while working attitudes - in particular, continuous working - are more common among the passing group.</p>
      </abstract>
      <kwd-group>
        <kwd>behavioral analysis</kwd>
        <kwd>sequential pattern mining</kwd>
        <kwd>process mining</kwd>
        <kwd>student modelling</kwd>
        <kwd>learning analytics</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>Learning management systems (LMSs) are nowadays a common piece in any
university. Some of them were in fact born thanks to these systems. On the other side,
some traditional on-campus universities were initially reluctant to develop them on
their campuses. The perceived added value of the campus life – including campus
classes – was considered a core value which did not admit changes.</p>
      <p>This initial view is nowadays no more than a reminder of the days where the Internet
was stilly maturing. Today, it would be difficult to find any university which has not
adopted some kind of LMS [1]. LMSs have contributed to nuclear changes in the way
instructors teach and students learn [2]. Beyond its relevant participation in the learning
process, it has provided researchers with a valuable item: data.</p>
      <p>Data coming from LMSs can be analyzed alone, combined with pre-existing student
data, or with data coming from other systems. A whole set of data-mining techniques
has been developed to solve different problems that range from performance prediction
to analysis of social engagement [3]–[5]. These techniques can be analyzed from a
computational perspective – which in the educational field leads to Educational Data
Mining (EDM) [6] – or looking for its application in the learning process – giving place
to Learning Analytics (LA) [7], [8]-.</p>
      <p>Among these techniques, educational process mining (EPM) has gained popularity
in recent years [9], [10]. EPM derives from generic process mining (PM) [11] but
applies specifically to educational data. Inside this subset, sequential pattern mining
(SPM) [12] tries to find interesting subsequences in a dataset. In the learning scenario,
potential applications of this technique covers a broad range of topics. While our
interest focuses on the detection of behavioral differences, other applications include
better curriculum design or performance prediction [13]–[15].</p>
      <p>In this paper we describe a method based on SPM to detect behavioral differences
between passing and failing students in a blended-learning course based on log data.
The method is tested on a first‐year Engineering course offered at a public university.
The subject under analysis was designed with blended-learning approach and lasts for
12 weeks, including three main milestones which correspond to intermediate tests
performed in weeks 4 and 8 and a final test in week 12. The edition we analyze has a
total of 337 students enrolled – 199 of them passing the subject -. A detailed description
of the course structure can be found in [16], where results show that both groups
effectively behave differently.</p>
      <p>Our goal is to evaluate if we can detect these differences through a new method. The
method we describe begins by clustering log activity on a per-week basis. Output of
this clustering process is then interpreted to determine the weekly state of the student.
We iterate this process in consecutive periods to create a sequence of states. Data is
then split in two groups – associated to passing and failing students – and SPM is used
to detect behavioral differences. In particular, we raise the following research question
(RQ):
• RQ: Can the method exposed collect and show behavioral differences among both
group of students?</p>
      <p>To answer the question, we describe the method in detail and apply it to the
aforementioned case study. Once done, we analyze if different behavioral patterns can
be found in the sequences present in the failing and passing group. Results will reveal
that behavior is different for the passing and failing group, and specific patterns which
anticipate potential failure arise. This fact, combined with the simplicity to gather and
process data, opens interesting applications such as predictor or alarm indicator.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Theoretical framework</title>
      <p>Research on learning analytics [7], [8] focuses on different aspects of learning, being
one of them the analysis of the learning process itself [9], [17]. In this context, studies
that apply process analysis tool to learning environments have emerged with rising
interest in recent years, as different compilations show [9], [10].</p>
      <p>The process approach was common in other disciplines [18], in particular in business
and industry. In the learning scenario, specific areas of interest include curriculum
mining, computer-based assessment or LMS log analysis. Expected results include the
detection of learning difficulties, learning flows or sequential patterns[9].</p>
      <p>While processes can be designed based on theoretical behavior, complex or
unstructured processes need a process discovery stage [18]. The learning process totally
fits into this categorization. Process discovery constitutes a discipline on its own, where
one of the approaches is to model processes based on log records, that are translated
into real models, including the detection of variants in the same process[19]–[21]. The
field is promising, but initial models usually conform spaghetti-like graphs, which
require simplification [22]. In addition, direct interpretation is not straightforward.</p>
      <p>For these reasons, some studies focus on analysis of sub-processes, or look for
meaningful sequence of actions. The basics for these techniques were introduced in
[23] and constitute the core of SPM. In particular, SPM deals with ”sequences of events,
items, or tokens occurring in an ordered metric space appear often in data and the
requirement to detect and analyze frequent subsequences is a common problem.“ [24].</p>
      <p>SPM applications are common in different knowledge areas ranging from medicine
to business processes [12]. Applications are broad, depending on the topic under
analysis. For instance in the medical field, they range from prescription [25] to
detection of specific patterns, such as gene mutation [26].</p>
      <p>In the learning field, we can find different studies and applications. [27] looks for
better understanding of the learning process through the use of a specific algorithm.
[13], [28] show applications in recommender systems. Other uses include impact of
behavior during practical sessions on final performance [29] or discovering of
navigational patterns [14]. Applications to behavioral analysis can also performed
through SPM [30].</p>
      <p>Practical implementation of SPM can be done in two different ways: either a-priori
or using pattern growth. A-priori methods are based on [23], and rely on the hypothesis
that if a sequence is not frequent, super sequences based on it can neither be frequent.
Pattern-growth methods are based on [31]. Any of these methods can provide, for each
of the detected sequences, its support, which indicates the percentage of items where
the sequence is present.</p>
      <p>In order to feed these SPM algorithms with data coming from log files, preprocessing
is needed, as a sequence of states is required as input. [32] remarks that one of the
challenges when translating logs into process is the granularity of log data. In order to
translate this log data into states, an aggregation is needed, as working with
lowgranularity data can be useless [14].</p>
      <p>An interesting approach to this aggregation is the use of clustering based on log data,
which can be found in studies such as [33], [34]. In particular, in [34] clustering is used
to detect groups, while SPM is used to detect sequences in that group. Following this
research line, we plan to create the sequences based on the clustering process itself. In
other words, we do not plan to cluster students, but to cluster states on a periodical basis
that will finally constitute a sequence.</p>
      <p>To feed clustering algorithms, commonly interesting variables include the number
of lectures viewed, quizzes assessed or time between consecutive sessions. These
parameters show relevant for student success, with relevance depending on the case
under study [35]. Some of these parameters require a deep knowledge of the course
structure. While it is relatively simple to know how many times a user logins per week,
knowing how many lectures or quizzes a user performs requires prior classification of
LMS items – associating a category to each individual item–.</p>
      <p>Regarding the algorithm itself, different techniques can be used. [36] performs a
compilation of potentially interesting algorithms which are common in e-Learning
problems.
3</p>
    </sec>
    <sec id="sec-3">
      <title>Methodology</title>
      <p>Linking these ideas, we build a sequence of states for each user and time interval. The
states are created through clustering based on data extracted from log files. These states
are sequenced and a search is performed. Analysis will look for relevant patterns that
can show behavioral differences.</p>
      <p>We decided to analyze activity on a per-week basis for two reasons. First, due to the
dynamics of the blended course. Instructors anticipate contents the students should
cover before attending class, and this is normally done on a weekly basis. Second reason
influencing this decision takes into account student habits. While some students are
full-time students and can possibly cover contents during the week, some others may
only be able to cover them during the weekend. The weekly analysis accommodates
this situation, showing whether students are effectively engaged during the different
weeks of the course.</p>
      <p>Clustering results for the different weeks is then be analyzed and labelled according
to meaningful patterns. Once done, a sequence is created for each student. This
sequence will be meaningful, as labels will have been assigned to each of the states.</p>
      <p>Finally, and in order to validate the method with a practical case study, we will apply
it to a real case. We separate students into two groups. This segmentation will be done
according to academic result – pass or fail – For each of these groups, we will perform
SPM. After getting the results, comparison will be made between groups, in order to
validate if the method properly detects differences in support for specific patterns
between groups.
3.1</p>
      <sec id="sec-3-1">
        <title>Clustering: input data and algorithms</title>
        <p>As outlined in the introduction, we will focus in online activity. The data we analyze
corresponds to that gathered in the LMS. We do not include data from other sources,
neither take into account any evaluative marks obtained by the students. We consider
the global amount of online activity performed, but also classify interactions according
to the kind of content covered.</p>
        <p>Online activity will be classified based on the categorization of the tasks students are
instructed to follow. On each class, students are suggested to cover specific contents
before to prepare forthcoming sessions. These contents fit into one of these categories:
─ Lectures: which correspond to encapsulated videos provided prior to face-to-face
sessions.
─ Problem sets: where the student can test to what extent she has acquired knowledge
properly
─ Evaluative quizzes: that correspond to quizzes that have impact on final grade
─ Specific non-assessed contents: which correspond to contents related to the subject,
and which are covered in classes, but that are not assessed in any evaluation, and do
not have impact on the final grade
─ Suggested readings.</p>
        <p>Instructors were asked to detect and inform relevant content for each week of the
course. Students are specifically instructed to cover these contents before attending
specific face-to-face sessions. A total of 150 items were considered. Table 1 shows the
type and amount of activities considered.</p>
        <p>Data for each of these five kind of content are kept along with the number of login
sessions the user performs in the period under consideration. For each week and
student, we summarize the number of items in each category – for instance, a student
can watch 5 lectures, review 3 problem sets and do not perform any other kind of
activity –, performing 4 login sessions. This information will constitute the input to the
clustering algorithm. To be able to extract this information, instructors must classify
contents in advance in order to properly account each access. It is interesting to note
that once this is done, the approach is computationally simple, and data to feed the
clustering algorithm is readily available.</p>
        <p>Our idea when running this experiment was to obtain a clear view of different group
behaviors for each week of the course. For instance, we expected to detect a cluster
containing students who show high activity, or a cluster clearly focused on evaluative
assessments. Clustering in the different stages should be consistent to allow comparison
among weeks – same label should indicate same behavior –. In this way, we could
check temporal evolution. For instance, a sequence could indicate that a student begins
in the ‘high activity’ group and then changes to the ‘assessment oriented’ during the
following week.</p>
        <p>Regarding the clustering technique, we opted to select k-Means as clustering
algorithm for being commonly used [36]. In this technique, clusters are created based
on the distance to a centroid, which constitutes the center of this cluster. Interpretation
of centroid data will allow to assign meaningful labels to the clusters obtained.</p>
        <p>To implement this approach, we needed to consider the number of clusters in
advance. Literature indicates 4-5 clusters is a common number for this kind of
environments[33], [37]. Our tests will be done considering k=4 as a potentially
interesting number of clusters, as our scenario can be considered similar to [33] in
terms of course methodology – flipped –, course duration and LMS data as main data
source.</p>
        <p>The translation form cluster labels to meaningful naming will be done based on
centroid information analysis. Centroids will be kept to allow proper interpretation and
appropriate labelling of the cluster. We must keep in mind that the sequence we look
for would be useless having non-meaningful states such as ‘cluster n’. Analyzing
centroids will allow us to interpret the meaning of the cluster, and label a particular
group with meaningful attributes such as ‘high activity’ or ‘assessment oriented’.</p>
        <p>Besides individual week cluster labeling, centroids will also be used to provide
cluster coherence among different weeks. In other words, the same detected behavior
should map to the same label, even among different weeks. For clarity purposes, we
will try to keep the same number of clusters – and interpretation if possible - for all
weeks. This analysis will be done manually, as human intervention is needed to
properly interpret cluster results, and to provide coherence among weeks.
3.2</p>
      </sec>
      <sec id="sec-3-2">
        <title>Establishing and mining sequence of actions</title>
        <p>In order to properly model student behavior through the course, we map the information
obtained through the clustering process into a sequence of situations. For instance,
assuming the clustering process leaves three groups, labeled as ‘Low activity’ (1), ‘Quiz
oriented’(2) and ’Low login’ (3), a sequence such as (1,2,3,3,3,3) would mean the user
begins by performing low (1), she then has a quiz-oriented week (2), and after that four
weeks with low login activity (associated to the 3333 in the sequence.</p>
        <p>This sequence will be treated as a sequence of states that will be mined with sequence
mining tools. Data will be split between passing and failing students, in order to detect
differences in support for the most relevant patterns. As noted in the theoretical
framework, different techniques exist [12]. We selected generalized sequential pattern
(GSP) algorithm for being commonly used [12], due to the existence of proven
implementations, and considering performance is not a constraint (n=337 students).
Our focus will be set on the interpretation of results, and not on the algorithm itself. We
will keep sequence and associated support for each of the groups under analysis. An
open-source implementation will be used [38].
4
4.1</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Results</title>
      <sec id="sec-4-1">
        <title>Clustering</title>
        <p>The clustering process was carried out with k-means. x-means was previously used to
explore the potential number of interesting clusters and confirmed k=4 was a proper
number, which could accommodate clustering results for the different weeks.</p>
        <p>The centroid analysis provided also interesting results. While almost all studies
suggest there is a low activity group and a high activity group, some other behaviors
exists. For instance, gamers who try to game the system and perform high number of
quizzes but do not follow lessons in such a way. Table 2 shows centroid data for the
first two weeks:</p>
        <p>As Table 2 shows, for our case study the group with higher values for login sessions
per week shows also higher activity in the different categories. This finding suggests
that the clustering is really showing the amount of work performed by the student. For
instance, the low on-line activity group – which for Table 2 would be cl1 for week 1 or
cl0 for week 2 - is always present, showing low performance in all items (lectures,
quizzes, …). The other three clusters are graded according to their amount of work. For
this reason, we identified the clusters as low (L), medium (M), high (H) and extreme
(E) activity.</p>
      </sec>
      <sec id="sec-4-2">
        <title>Segmentation</title>
        <p>The results of the clustering process were compiled into sequences for each of the
students. As stated, we segmented the dataset into two groups according to final
academic result. This segmentation is performed in order to detect differences in
patterns between the passing and the failing group.</p>
        <p>Once segmentation is performed, GSP algorithm is run on each of the resulting
sequence dataset.
4.3</p>
      </sec>
      <sec id="sec-4-3">
        <title>Relevant patterns for the failing group</title>
        <p>GSP algorithm run on the failing group dataset looking for sequences with a minimum
support of 0.6. Among the resulting sequences, Table 3 shows those with greater
support. As it could be expected, long periods of low-activity are present among those
students who finally fail the subject. It is also noticeable that most sequences include
one or more low activity periods (L).</p>
      </sec>
      <sec id="sec-4-4">
        <title>Relevant patterns for the passing group</title>
        <p>We carried out the same process for the passing group. Again, we used 0.6 as minimum
support. Most common sequences and their support are shown in Table 4:
Despite Tables 3 and 4 already show noticeable differences, we perform a specific
search to determine the support for sequences in the failing group inside the passing
group. In this case, support for a specific sequence can be below 0.6, as it can be
common only in the failing group. We also sort the table according to this difference in
support. Results are shown in Table 5:
Results in Tables 3,4 and 5 allow us to answer the RQ raised in the introduction. The
application of the described method to our case study has proven valid to detect
differences in behavior between the two groups under study: students who pass and
those who fail behave differently. That means that behavior is kept in the state
sequence. We deepen into the process itself and its results for this particular case.</p>
        <p>The process described uses SPM to mine sequences generated through clustering.
Clustering is the initial stage, and in our case, produced pure activity groups. Students
who show higher volume of activity show it on all kind of items. In particular, and for
instance, students with higher number of login sessions show also higher lecture
activity and higher quiz completions.</p>
        <p>This fact can be compared with other clustering analysis present in the literature. A
similar scenario – university course, first year engineering, computer science topic and
flipped design – can be found in [33]. In this case, a clustering process is also performed
aimed to detect student strategies. As a key different to our study, assessment data is
included into the clustering process. The study detects four initial clusters, two oriented
to assessments – formative or summative – and two related to content – one more
oriented to video lecture and one to reading materials-.</p>
        <p>[37] provides also a study of two courses focused on activity. Four clusters are also
identified, being two of them clearly identified as highly active and low active. This
study includes only activity, gathered also from a LMS platform. Clusters showing
activity show also higher activity for the values considered – in this case, resource view,
forum view and forum participation – with the exception of one single group showing
least forum activity.</p>
        <p>In the MOOC environment, this kind of studies is also present to analyze
engagement in courses [39], [40]. We believe this scenario shows relevant differences
in behavior to our case. This reason explains different pattern detection, such as
samplers or returners. We believe this behavior is common in MOOC courses, but not
so much in regular university courses.</p>
        <p>Regarding behavioral sequences, Table 3 shows more common behavior for failing
students. 95% of them show low activity in at least one of the weeks, and almost 90%
in two consecutive weeks. A week with low activity is present in top-5 sequences, and
in 7 out of 8 of those sequences with a minimum of two items. For the passing group,
the most common situation is to follow medium or high engagement combinations.</p>
        <p>Differences become more evident if we have a look at Table 5. While almost 70%
of failing students show 5 consecutive weeks of low engagement with content, only
30% of passing students show this behavior. At the same time, it is also noticeable that
sequences showing two or more low access weeks show the higher differences with
passing students.</p>
        <p>In fact, and according to Table 4, sequences which include at least one week of
medium or high activity are more common in passing students. That indicates that
passing students perform higher volume of online activity. From a pedagogical point of
view, the interpretation of results in Table 5 shows that while one disengagement week
makes no major difference, failure probability increases as the number of disengaged
weeks does. In other words, the continuous detection of low online activity can indicate
the student is more likely to fail.</p>
        <p>Besides specific interpretation of this case study, we believe the approach provides
an interesting insight to log analysis and its transformation into a process model. Log
processing is simple and no specific restrictions have been imposed to algorithms for
clustering or SPM. We have also indicated a potential selection of specific tools, such
as k-means clustering and GSP.</p>
        <p>We consider two parameters make the approach particularly attractive. First, the
system is easy to implement. Only data obtained from log is needed. No sociological,
preexisting or data coming from other record systems is needed. Classification does not
require prior categorization as the work is done according to individual behavior in
relation to the group.</p>
        <p>Second, the process takes into account not only static values, but a dynamic picture
of the student. A low engagement week may not be relevant, but it can become a
problem if two consecutive weeks – or more – are accumulated. In short, the model is
capturing a relevant part of the learning process. And this learning process is not a static
picture. Analysis can only be done when the process is seen in perspective. In this sense,
we consider the method depicted can provide a new and interesting insight to many
problems related to research in learning analytics.
6</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Conclusions</title>
      <p>The process described generates a sequence of states based on behavioral clustering.
This sequence is then analyzed in order to detect differences between two groups of
students (passing and failing). Results show that behavior is effectively different and
that this difference is contained in the sequences analyzed.</p>
      <p>While we have focused on the method itself, we envision two groups of potential
applications of this process. First, the use as a potential failure indicator. Second, as a
detector of points of disengagement during the course, which could lead to curriculum
redesign.</p>
      <p>In order to implement potential applications in any of these groups, a previous
extension of the study would be advisable. This extension can be done to successive
editions of the same course, or to other courses, opening interesting research lines.</p>
      <p>In the first case, results could be potentially extended to analyze forthcoming
editions of the same course. While the issue of portability has not been addressed, we
believe the study could open a different approach in prediction processes. The method
could be carried out on a per-week basis as described and raise alarms when sequences
indicating failure are detected.</p>
      <p>Regarding portability to other courses, it would be interesting to compare results
among courses, and even deep into the pedagogical implications of course type and
methodology in results. For instance, results could help to detect differences not only
in terms of passing and failing groups, but can detect differences among on-campus or
on-line courses, methodologies - i.e. blended, flipped, MOOC- or even topic – STEM
vs social -. This extensions could allow deeper comparison of results with some
references analyzed in this study (for instance [37], [39], [41] for the MOOC case).</p>
      <p>Finally, and while our interest has remained on pure non-grading activity data, the
method could also be extended to other scenarios, and include other aspects in the
clustering process, such as sociological data or even impact of specific learning
activities (i.e. quizzes or evaluative assessments). Authors are open to collaborate in
these open scenarios, in particular looking for practical applications and contributions
to better learning designs.
[15]
[16]
[17]
[18]
[19]
[20]
[21]
[22]
[23]
[24]
[25]
[26]
[27]
[28]
[29]</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <string-name>
            <given-names>W.</given-names>
            <surname>Lasanthika</surname>
          </string-name>
          and
          <string-name>
            <given-names>W.</given-names>
            <surname>Tennakoon</surname>
          </string-name>
          , “
          <article-title>Assessing the Adoption of Learning Management Systems in Higher Education,” GATR Glob</article-title>
          .
          <source>J. Bus. Soc. Sci. Rev</source>
          ., vol.
          <volume>7</volume>
          , no.
          <issue>3</issue>
          , pp.
          <fpage>204</fpage>
          -
          <lpage>209</lpage>
          , Sep.
          <year>2019</year>
          , doi: 10.35609/gjbssr.
          <year>2019</year>
          .
          <volume>7</volume>
          .
          <issue>3</issue>
          (
          <issue>5</issue>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <string-name>
            <given-names>H.</given-names>
            <surname>Coates</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>James</surname>
          </string-name>
          , and G. Baldwin, “
          <article-title>A critical examination of the effects of learning management systems on university teaching and learning</article-title>
          ,” Tert. Educ. Manag., vol.
          <volume>11</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>19</fpage>
          -
          <lpage>36</lpage>
          , Mar.
          <year>2005</year>
          , doi: 10.1007/s11233-004-3567-9.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <string-name>
            <given-names>F.</given-names>
            <surname>Castro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Vellido</surname>
          </string-name>
          , À. Nebot, and
          <string-name>
            <given-names>F.</given-names>
            <surname>Mugica</surname>
          </string-name>
          , “
          <article-title>Applying data mining techniques to elearning problems,”</article-title>
          <string-name>
            <surname>Stud. Comput. Intell.</surname>
          </string-name>
          ,
          <year>2007</year>
          , doi: 10.1007/978-3-
          <fpage>540</fpage>
          -71974-
          <issue>8</issue>
          _
          <fpage>8</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <string-name>
            <given-names>C.</given-names>
            <surname>Romero</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Ventura</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. G.</given-names>
            <surname>Espejo</surname>
          </string-name>
          , and
          <string-name>
            <given-names>C.</given-names>
            <surname>Hervás</surname>
          </string-name>
          , “
          <article-title>Data mining algorithms to classify students,”</article-title>
          <source>in Educational Data Mining 2008 - 1st International Conference on Educational Data Mining, Proceedings</source>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <string-name>
            <given-names>C.</given-names>
            <surname>Vieira</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Parsons</surname>
          </string-name>
          , and
          <string-name>
            <given-names>V.</given-names>
            <surname>Byrd</surname>
          </string-name>
          , “
          <article-title>Visual learning analytics of educational data: A systematic literature review and research agenda,” Comput</article-title>
          . Educ., vol.
          <volume>122</volume>
          ,
          <year>2018</year>
          , doi: 10.1016/j.compedu.
          <year>2018</year>
          .
          <volume>03</volume>
          .018.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <string-name>
            <given-names>R. S. J. D.</given-names>
            <surname>Baker</surname>
          </string-name>
          and
          <string-name>
            <given-names>K.</given-names>
            <surname>Yacef</surname>
          </string-name>
          , “
          <article-title>The State of Educational Data Mining in 2009 : A Review and Future Visions,”</article-title>
          <string-name>
            <given-names>J.</given-names>
            <surname>Educ</surname>
          </string-name>
          . Data Min.,
          <year>2009</year>
          , doi: http://doi.ieeecomputersociety.
          <source>org/10</source>
          .1109/ASE.
          <year>2003</year>
          .
          <volume>1240314</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <string-name>
            <given-names>G.</given-names>
            <surname>Siemens</surname>
          </string-name>
          , “
          <article-title>Learning analytics: Envisioning a research discipline and a domain of practice</article-title>
          ,” in ACM International Conference Proceeding Series,
          <year>2012</year>
          , doi: 10.1145/2330601.2330605.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <string-name>
            <surname>Technol. Enhanc. Learn.</surname>
          </string-name>
          , vol.
          <volume>4</volume>
          , no.
          <issue>5</issue>
          , pp.
          <fpage>304</fpage>
          -
          <lpage>317</lpage>
          ,
          <year>2012</year>
          , doi: 10.1504/IJTEL.
          <year>2012</year>
          .
          <volume>051816</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <string-name>
            <given-names>A.</given-names>
            <surname>Bogarín</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Cerezo</surname>
          </string-name>
          , and
          <string-name>
            <given-names>C.</given-names>
            <surname>Romero</surname>
          </string-name>
          , “
          <article-title>A survey on educational process mining</article-title>
          ,” Wiley Interdiscip.
          <source>Rev. Data Min. Knowl. Discov.</source>
          , vol.
          <volume>8</volume>
          , no.
          <issue>1</issue>
          , p.
          <fpage>e1230</fpage>
          ,
          <string-name>
            <surname>Jan</surname>
          </string-name>
          .
          <year>2018</year>
          , doi: 10.1002/widm.1230.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          <string-name>
            <surname>M. A. Ghazal</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          <string-name>
            <surname>Ibrahim</surname>
            , and
            <given-names>M. A.</given-names>
          </string-name>
          <string-name>
            <surname>Salama</surname>
          </string-name>
          , “
          <article-title>Educational process mining: A systematic literature review</article-title>
          ,”
          <source>in Proceedings - 2017 European Conference on Electrical Engineering and Computer Science</source>
          , EECS
          <year>2017</year>
          , Jul.
          <year>2018</year>
          , pp.
          <fpage>198</fpage>
          -
          <lpage>203</lpage>
          , doi: 10.1109/EECS.
          <year>2017</year>
          .
          <volume>45</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          <string-name>
            <surname>W. Van Der Aalst</surname>
          </string-name>
          , “
          <article-title>Process mining: Overview and opportunities</article-title>
          ,
          <source>” ACM Transactions on Management Information Systems</source>
          , vol.
          <volume>3</volume>
          , no.
          <issue>2</issue>
          . pp.
          <fpage>1</fpage>
          -
          <lpage>17</lpage>
          , Jul.
          <year>2012</year>
          , doi: 10.1145/2229156.2229157.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          <string-name>
            <given-names>P.</given-names>
            <surname>Fournier-Viger</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Chun</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Lin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. U.</given-names>
            <surname>Kiran</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y. S.</given-names>
            <surname>Koh</surname>
          </string-name>
          , and R. Thomas, “A Survey of Sequential Pattern Mining,”
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          <string-name>
            <surname>M. Salehi</surname>
          </string-name>
          et al., “
          <article-title>Personalized recommendation of learning material using sequential pattern mining and attribute based collaborative filtering</article-title>
          ,” doi: 10.1007/s10639-012- 9245-5.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          <string-name>
            <surname>L. K. M. Poon</surname>
            ,
            <given-names>S. C.</given-names>
          </string-name>
          <string-name>
            <surname>Kong</surname>
            ,
            <given-names>M. Y. W.</given-names>
          </string-name>
          <string-name>
            <surname>Wong</surname>
            , and
            <given-names>T. S. H.</given-names>
          </string-name>
          <string-name>
            <surname>Yau</surname>
          </string-name>
          , “
          <article-title>Mining sequential patterns of students' access on learning management system</article-title>
          ,
          <source>” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)</source>
          ,
          <year>2017</year>
          , vol.
          <volume>10387</volume>
          LNCS, pp.
          <fpage>191</fpage>
          -
          <lpage>198</lpage>
          , doi: 10.1007/978-3-
          <fpage>319</fpage>
          -61845-6_
          <fpage>20</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          <string-name>
            <given-names>P.</given-names>
            <surname>Fournier-Viger</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. C. W.</given-names>
            <surname>Lin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. T.</given-names>
            <surname>Chi</surname>
          </string-name>
          , and
          <string-name>
            <given-names>R.</given-names>
            <surname>Uday</surname>
          </string-name>
          <string-name>
            <surname>Kiran</surname>
          </string-name>
          , “
          <article-title>Mining costeffective patterns in event logs,” Knowledge-Based Syst</article-title>
          ., vol.
          <volume>191</volume>
          ,
          <string-name>
            <surname>Mar</surname>
          </string-name>
          .
          <year>2020</year>
          , doi: 10.1016/j.knosys.
          <year>2019</year>
          .
          <volume>105241</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          <string-name>
            <given-names>J. A.</given-names>
            <surname>Martínez-Carrascal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. Márquez</given-names>
            <surname>Cebrián</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Sancho-Vinuesa</surname>
          </string-name>
          , and E. Valderrama, “
          <article-title>Impact of early activity on flipped classroom performance prediction: A case study for a first-year Engineering course</article-title>
          ,” Comput. Appl. Eng. Educ.,
          <string-name>
            <surname>Mar</surname>
          </string-name>
          .
          <year>2020</year>
          , doi: 10.1002/cae.22229.
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          <string-name>
            <given-names>P.</given-names>
            <surname>Strecht</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Cruz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Soares</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Mendes-Moreira</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>R.</given-names>
            <surname>Abreu</surname>
          </string-name>
          , “
          <article-title>A Comparative Study of Classification and Regression Algorithms for</article-title>
          Modelling Students' Academic Performance,”
          <year>2015</year>
          . Accessed: Apr.
          <volume>11</volume>
          ,
          <year>2019</year>
          . [Online]. Available: http://www.educationaldatamining.org/EDM2015/proceedings/short392-
          <fpage>395</fpage>
          .pdf.
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          <string-name>
            <surname>W. Van Der Aalst</surname>
          </string-name>
          , “
          <article-title>Process mining: Overview and opportunities</article-title>
          ,
          <source>” ACM Transactions on Management Information Systems</source>
          , vol.
          <volume>3</volume>
          , no.
          <issue>2</issue>
          .
          <string-name>
            <surname>Jul</surname>
          </string-name>
          .
          <year>2012</year>
          , doi: 10.1145/2229156.2229157.
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          <string-name>
            <given-names>N.</given-names>
            <surname>Tax</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Sidorova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Haakma</surname>
          </string-name>
          , and
          <string-name>
            <surname>W. M. P. van der Aalst</surname>
          </string-name>
          , “
          <article-title>Mining local process models,”</article-title>
          <string-name>
            <given-names>J.</given-names>
            <surname>Innov</surname>
          </string-name>
          . Digit. Ecosyst.,
          <year>2016</year>
          , doi: 10.1016/j.jides.
          <year>2016</year>
          .
          <volume>11</volume>
          .001.
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          <string-name>
            <given-names>A.</given-names>
            <surname>Bolt</surname>
          </string-name>
          , M. de Leoni, and
          <string-name>
            <surname>W. M. P. van der Aalst</surname>
          </string-name>
          , “
          <article-title>Process variant comparison: Using event logs to detect differences in behavior and business rules,” Inf</article-title>
          . Syst., vol.
          <volume>74</volume>
          , pp.
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          53-
          <fpage>66</fpage>
          , May
          <year>2018</year>
          , doi: 10.1016/j.is.
          <year>2017</year>
          .
          <volume>12</volume>
          .006.
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          <string-name>
            <given-names>S.</given-names>
            <surname>Rizvi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Rienties</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Rogaten</surname>
          </string-name>
          , and
          <string-name>
            <given-names>R. F.</given-names>
            <surname>Kizilcec</surname>
          </string-name>
          , “
          <article-title>Investigating variation in learning processes in a FutureLearn MOOC,”</article-title>
          <string-name>
            <given-names>J.</given-names>
            <surname>Comput</surname>
          </string-name>
          . High. Educ., vol.
          <volume>32</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>162</fpage>
          -
          <lpage>181</lpage>
          , Apr.
          <year>2020</year>
          , doi: 10.1007/s12528-019-09231-0.
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          <string-name>
            <given-names>D.</given-names>
            <surname>Fahland</surname>
          </string-name>
          and
          <string-name>
            <surname>W. M. P. van der Aalst</surname>
          </string-name>
          , “
          <source>Simplifying Mined Process Models: An Approach Based on Unfoldings</source>
          ,” Springer, Berlin, Heidelberg,
          <year>2011</year>
          , pp.
          <fpage>362</fpage>
          -
          <lpage>378</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          <string-name>
            <given-names>R.</given-names>
            <surname>Agrawal</surname>
          </string-name>
          and
          <string-name>
            <given-names>R.</given-names>
            <surname>Srikant</surname>
          </string-name>
          , “Mining sequential patterns,”
          <source>in Proceedings - International Conference on Data Engineering</source>
          ,
          <year>1995</year>
          , pp.
          <fpage>3</fpage>
          -
          <lpage>14</lpage>
          , doi: 10.1109/icde.
          <year>1995</year>
          .
          <volume>380415</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          <string-name>
            <given-names>C. H.</given-names>
            <surname>Mooney</surname>
          </string-name>
          and
          <string-name>
            <given-names>J. F.</given-names>
            <surname>Roddick</surname>
          </string-name>
          , “
          <article-title>Sequential pattern mining - Approaches and algorithms</article-title>
          ,
          <source>” ACM Computing Surveys</source>
          , vol.
          <volume>45</volume>
          , no.
          <issue>2</issue>
          .
          <string-name>
            <surname>Feb</surname>
          </string-name>
          .
          <year>2013</year>
          , doi: 10.1145/2431211.2431218.
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          <string-name>
            <given-names>A. P.</given-names>
            <surname>Wright</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. T.</given-names>
            <surname>Wright</surname>
          </string-name>
          ,
          <string-name>
            <surname>A. B. McCoy</surname>
            ,
            <given-names>and D. F.</given-names>
          </string-name>
          <string-name>
            <surname>Sittig</surname>
          </string-name>
          , “
          <article-title>The use of sequential pattern mining to predict next prescribed medications,”</article-title>
          <string-name>
            <given-names>J.</given-names>
            <surname>Biomed</surname>
          </string-name>
          . Inform., vol.
          <volume>53</volume>
          , pp.
          <fpage>73</fpage>
          -
          <lpage>80</lpage>
          , Feb.
          <year>2015</year>
          , doi: 10.1016/j.jbi.
          <year>2014</year>
          .
          <volume>09</volume>
          .003.
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          <string-name>
            <given-names>A. S.</given-names>
            <surname>Johnsha</surname>
          </string-name>
          <string-name>
            <surname>Ali</surname>
          </string-name>
          , “
          <article-title>Frequent Sequential Patterns (FSP) Algorithm for Finding Mutations in BRCA2 Gene,”</article-title>
          <string-name>
            <given-names>Int. J. Recent</given-names>
            <surname>Technol</surname>
          </string-name>
          . Eng.,
          <source>no. 3</source>
          , pp.
          <fpage>2277</fpage>
          -
          <lpage>3878</lpage>
          ,
          <year>2019</year>
          , doi: 10.35940/ijrte.C6507.098319.
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          <string-name>
            <given-names>A.</given-names>
            <surname>Bogarín</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Cerezo</surname>
          </string-name>
          , and
          <string-name>
            <given-names>C.</given-names>
            <surname>Romero</surname>
          </string-name>
          , “
          <article-title>Discovering learning processes using inductive miner: A case study with learning management systems</article-title>
          (LMSs),
          <source>” Psicothema</source>
          , vol.
          <volume>30</volume>
          , no.
          <issue>3</issue>
          , pp.
          <fpage>322</fpage>
          -
          <lpage>329</lpage>
          ,
          <year>2018</year>
          , doi: 10.7334/psicothema2018.
          <fpage>116</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          <string-name>
            <surname>Syst.</surname>
          </string-name>
          , vol.
          <volume>72</volume>
          , pp.
          <fpage>37</fpage>
          -
          <lpage>48</lpage>
          , Jul.
          <year>2017</year>
          , doi: 10.1016/j.future.
          <year>2017</year>
          .
          <volume>02</volume>
          .049.
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          <string-name>
            <given-names>R.</given-names>
            <surname>Venant</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Sharma</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Vidal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Dillenbourg</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Broisin</surname>
          </string-name>
          , “
          <article-title>Using sequential pattern mining to explore learners' behaviors and evaluate their correlation with performance in inquiry-based learning</article-title>
          ,
          <source>” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)</source>
          ,
          <year>2017</year>
          , vol.
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          <source>10474 LNCS</source>
          , pp.
          <fpage>286</fpage>
          -
          <lpage>299</lpage>
          , doi: 10.1007/978-3-
          <fpage>319</fpage>
          -66610-5_
          <fpage>21</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          <string-name>
            <given-names>Educ. Data</given-names>
            <surname>Min</surname>
          </string-name>
          ., vol.
          <volume>5</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>190</fpage>
          -
          <lpage>219</lpage>
          , May
          <year>2013</year>
          , doi: 10.5281/ZENODO.3554617.
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          <string-name>
            <surname>Newsl.</surname>
          </string-name>
          , vol.
          <volume>2</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>14</fpage>
          -
          <lpage>20</lpage>
          , Dec.
          <year>2000</year>
          , doi: 10.1145/380995.381002.
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          <string-name>
            <surname>M. Zhou</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          <string-name>
            <surname>Xu</surname>
            ,
            <given-names>J. C.</given-names>
          </string-name>
          <string-name>
            <surname>Nesbit</surname>
            , and
            <given-names>P. H.</given-names>
          </string-name>
          <string-name>
            <surname>Winne</surname>
          </string-name>
          , “
          <article-title>Sequential pattern analysis of learning logs: Methodology and applications</article-title>
          ,” in
          <source>Handbook of Educational Data Mining</source>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          <string-name>
            <given-names>J.</given-names>
            <surname>Jovanović</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Gašević</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Dawson</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Pardo</surname>
          </string-name>
          , and
          <string-name>
            <given-names>N.</given-names>
            <surname>Mirriahi</surname>
          </string-name>
          , “
          <article-title>Learning analytics to unveil learning strategies in a flipped classroom,” Internet High</article-title>
          . Educ., vol.
          <volume>33</volume>
          , pp.
          <fpage>74</fpage>
          -
          <lpage>85</lpage>
          , Apr.
          <year>2017</year>
          , doi: 10.1016/j.iheduc.
          <year>2017</year>
          .
          <volume>02</volume>
          .001.
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          <string-name>
            <given-names>D.</given-names>
            <surname>Perera</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Kay</surname>
          </string-name>
          , I. Koprinska,
          <string-name>
            <given-names>K.</given-names>
            <surname>Yacef</surname>
          </string-name>
          , and
          <string-name>
            <given-names>O. R.</given-names>
            <surname>Zaane</surname>
          </string-name>
          , “
          <article-title>Clustering and sequential pattern mining of online collaborative learning data</article-title>
          ,
          <source>” IEEE Trans. Knowl. Data Eng.</source>
          , vol.
          <volume>21</volume>
          , no.
          <issue>6</issue>
          , pp.
          <fpage>759</fpage>
          -
          <lpage>772</lpage>
          , Jun.
          <year>2009</year>
          , doi: 10.1109/TKDE.
          <year>2008</year>
          .
          <volume>138</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          <string-name>
            <given-names>R.</given-names>
            <surname>Conijn</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Snijders</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Kleingeld</surname>
          </string-name>
          , and U. Matzat, “
          <article-title>Predicting student performance from LMS data: A comparison of 17 blended courses using moodle LMS,”</article-title>
          IEEE Trans.
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          <string-name>
            <surname>Learn. Technol.</surname>
          </string-name>
          ,
          <year>2017</year>
          , doi: 10.1109/TLT.
          <year>2016</year>
          .
          <volume>2616312</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          <string-name>
            <given-names>A.</given-names>
            <surname>Dutt</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. A.</given-names>
            <surname>Ismail</surname>
          </string-name>
          , and T. Herawan, “
          <article-title>A Systematic Review on Educational Data Mining</article-title>
          ,” IEEE Access,
          <year>2017</year>
          , doi: 10.1109/ACCESS.
          <year>2017</year>
          .
          <volume>2654247</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          <string-name>
            <given-names>I. P.</given-names>
            <surname>Ratnapala</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. G.</given-names>
            <surname>Ragel</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Deegalla</surname>
          </string-name>
          , “
          <article-title>Students behavioural analysis in an online learning environment using data mining,” in 2014 7th International Conference on Information and Automation for Sustainability: “Sharpening the Future with Sustainable Technology”</article-title>
          ,
          <source>ICIAfS</source>
          <year>2014</year>
          , Mar.
          <year>2014</year>
          , doi: 10.1109/ICIAFS.
          <year>2014</year>
          .
          <volume>7069609</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref41">
        <mixed-citation>
          <string-name>
            <given-names>P.</given-names>
            <surname>Fournier-Viger</surname>
          </string-name>
          et al., “
          <article-title>The SPMF open-source data mining library version 2</article-title>
          ,
          <source>” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)</source>
          ,
          <year>2016</year>
          , doi: 10.1007/978-3-
          <fpage>319</fpage>
          - 46131-
          <issue>1</issue>
          _
          <fpage>8</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref42">
        <mixed-citation>
          <string-name>
            <given-names>R.</given-names>
            <surname>Ferguson</surname>
          </string-name>
          and
          <string-name>
            <given-names>D.</given-names>
            <surname>Clow</surname>
          </string-name>
          , “
          <article-title>Examining engagement: Analysing learner subpopulations in massive open online courses (MOOCs),</article-title>
          ” in ACM International Conference Proceeding Series, Mar.
          <year>2015</year>
          , vol.
          <volume>16</volume>
          -20-March-2015, pp.
          <fpage>51</fpage>
          -
          <lpage>58</lpage>
          , doi: 10.1145/2723576.2723606.
        </mixed-citation>
      </ref>
      <ref id="ref43">
        <mixed-citation>
          <string-name>
            <given-names>L.</given-names>
            <surname>Shi</surname>
          </string-name>
          and
          <string-name>
            <surname>A. I. Cristea</surname>
          </string-name>
          , “
          <article-title>In-depth exploration of engagement patterns in MOOCs,”</article-title>
          <source>in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)</source>
          , Nov.
          <year>2018</year>
          , vol.
          <volume>11234</volume>
          LNCS, pp.
        </mixed-citation>
      </ref>
      <ref id="ref44">
        <mixed-citation>
          395-
          <fpage>409</fpage>
          , doi: 10.1007/978-3-
          <fpage>030</fpage>
          -02925-8_
          <fpage>28</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref45">
        <mixed-citation>
          <string-name>
            <surname>Comput. High. Educ.</surname>
          </string-name>
          , vol.
          <volume>29</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>114</fpage>
          -
          <lpage>132</lpage>
          , Apr.
          <year>2017</year>
          , doi: 10.1007/s12528-016- 9126-9.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>