<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>VALIDATION OF A DATA MINING METHOD FOR OPTIMAL UNIVERSITY CURRICULA</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>R. Knauf</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Ilmenau University of Technology Faculty of Computer</institution>
          <addr-line>Science and Automation PO Box 100565, 98684 Ilmenau</addr-line>
          <country country="DE">Germany</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Tokyo Denki University School of Information Environment 2-1200 MuZai Gakuendai Inzai</institution>
          ,
          <addr-line>Chiba, 270-1383</addr-line>
          <country country="JP">Japan</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Y. Sakurai, K. Takada</institution>
          ,
          <addr-line>S. Tsuruta</addr-line>
        </aff>
      </contrib-group>
      <abstract>
        <p>The paper deals with modeling, processing, evaluating and refining processes with humans involved like learning. A formerly developed concept called storyboarding has been applied at Tokyo Denki University to model the various ways to study at this university. Along with this storyboard, we developed a data mining technology to estimate success chances of curricula. Here, we introduce a validation method for this technology and its results. Further, we discuss chances to improve these results by implementing a formerly introduced learner profiling concept that represents the students' individual properties, talents and preferences for personalized data mining.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>Index Terms— modeling learning processes,
storyboarding, data mining, validation</p>
    </sec>
    <sec id="sec-2">
      <title>1. INTRODUCTION</title>
      <p>Learning systems suffer from a lack of an explicit and
adaptive didactic design. University education is
especially effected by this lack, because university
professors are not necessarily educational experts. One
way of didactic support is providing a modeling
concept for didactic design, which allows the anticipation
of the learning processes.</p>
      <p>
        An explicit formal didactic design provides a firm
basis to verify and validate the didactics behind a
learning process by knowledge engineering techniques such
as machine learning and data mining. A modeling
concept called storyboarding [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] has been developed
formerly as a means of modeling learning processes.
Besides providing didactic support, this semi-formal
model is setting the stage to apply knowledge
engineering technologies to verify and validate the
didactics behind a learning process. The verification may
      </p>
      <p>This author performed the work while at Tokyo Denki University
and was sponsored by the Japan Society for the Promotion of
Science (JSPS) with an Award-Fellowship for Rainer Knauf (Fellow’s
ID S-08742) and the Research Institute for Science and Technology
of Tokyo Denki University.
include both logical consistency issues and formally to
check didactic issues. According to different learning
and teaching preferences, it includes alternative paths
and possible detours if certain concepts to be learned
need reinforcement. Using modern media technology,
a storyboard also plays the role of a server that provides
the appropriate content material.</p>
      <p>
        By storyboarding, didactics can be refined
according to revealed weaknesses and proven excellence.
Successful didactic patterns can be explored by
applying data mining techniques to the various ways
students went through a storyboard and their related
success. As a result, future instructors and students may
utilize these results by preferring those ways through
a storyboard, which turned out to be the most
promising ones. In [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], a data mining technology, which
allows students to utilize mined ”experience” of former
students to compose curricula with an optimal success
chance, is introduced.
      </p>
      <p>However, so far we did not have a practically
proven significance, that this method is appropriate.
The basic problem so far was the collection of data,
which has to be accumulated during a complete
undergraduate study, which needs a period of four years.
Meanwhile, we could gain a significant amount of data
to validate the technology.</p>
      <p>The paper is organized as follows. Section 2
introduces the storyboard concept including the present
state of the current development. Section 3 provides an
overview on our data mining technique to compose
optimal curricula for university studies. In section 4, we
describe the available data. Section 5 introduces the
validation technology and provides its results. In
section 6, we outline a refinement of the technology and
section 7 summarizes the paper.</p>
    </sec>
    <sec id="sec-3">
      <title>2. STORYBOARDING</title>
      <p>
        Our storyboard concept was introduced in [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] und later
refined (see [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] for the latest version). A storyboard
is a nested hierarchy of directed graphs with
annotated nodes and annotated edges. Nodes are scenes or
episodes. Scenes are not further structured, episodes
have a sub-graph as its implementation. Also, there is
exactly one start node and one end node in each graph.
Edges specify transitions between nodes and may be
single-color or bi-color. Nodes and edges can carry
attributes.
      </p>
      <p>A storyboard may be seen as a model of an
anticipated reception process that is interpreted as follows.</p>
      <p>Scenes denote a non-decomposable learning
activity that can be implemented in any way, e.g. by the
presentation of a (media) document, opening a tool that
supports learning (an URL or an e-learning system) or
an informal activity description. Episodes are defined
by their sub-graph. Graphs are interpreted by the paths,
on which they can be traversed.</p>
      <p>A start node of a graph defines the starting point
of a legal graph traversing. An end node of a graph
defines the final target point of a legal graph traversing.</p>
      <p>Edges denote transitions between nodes. There are
rules to leave a node by an outgoing edge, namely (1)
The outgoing edge must have the same color as the
incoming edge by which the node was reached and (2) If
there is a condition specified as the edge’s key attribute,
this condition has to be met for leaving the node by this
edge. So the colors express the dependence of ways
leaving a node from the way of arriving there.</p>
      <p>
        Key attributes of nodes specify application driven
information, which is necessary for all nodes of the
same type, e.g. actors and locations. Key attributes
of edges specify conditions, which have to be true for
traversing on this edge. Free attributes specify
whatever the storyboard author wants the user to know:
didactic intentions, useful methods, necessary
equipment, e.g. For further information, the reader may see
[
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] or [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
      </p>
    </sec>
    <sec id="sec-4">
      <title>3. CURRICULUM VALIDATION BY DATA</title>
    </sec>
    <sec id="sec-5">
      <title>MINING</title>
      <p>
        A basic objective of storyboarding is to use knowledge
engineering technologies on the (semi-) formal process
models [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
      </p>
      <p>
        In particular, we aim at inductively “learning”
successful storyboard patterns and recommendable paths.
This is some sort of meta-learning, i.e. the learning of
learning knowledge. It is performed by an analysis of
the paths where former students went through the
storyboard [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
      <p>To show the feasibility and benefit of high level
storyboarding for its qualified assistance of students
suffering from the “jungle of opportunities and
constraints” in university education, we developed a simple
prototype storyboard for curricula of a university study.</p>
      <p>
        This prototype is used to validate curricula, which
are created or modified by the students in advance of
their study [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ][
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] based on the success of former
students, who went a similar path through their study.
      </p>
      <p>For this purpose, we introduced a concept to
estimate success chances of curricula, which are composed
by students at the School of Information Environment
of the Tokyo Denki University in their curriculum
planning class in the first semester. Along with the
estimation, the students also receive (1) a significance of the
provided estimation statement (according to the
sufficiency of the available data) and (2) a recommendation
for modifications of their plan with respect to an
optimal success chance.</p>
      <p>
        For such curricula we developed a data mining
technique, which is applied to storyboard paths that
(former) students went. Based on these examples, the
success chance of intended paths can be estimated [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
      <p>The data mining technique is applied to the paths of
students through a storyboard, which anticipates
possible ways through a complete study.</p>
      <p>In a pre-processing step to determine the paths, the
individually visited items (episodes and scenes) in the
storyboard graph-hierarchy are “flatten down” to a big
graph that contains scenes only. This is performed by
systematically replacing episodes by the individually
visited items of the episode’s related sub-graph.</p>
      <p>In the granularity of this storyboard application, a
scene is a course that holds over one semester. As a
result, we have a linear list of course sets, in which
each list item is the set of courses that the student took
in the subsequent semesters.</p>
      <p>The technique consists of two steps, namely (1)
constructing a decision from the examples of former
students and (2) applying this decision tree to the
planned curricula.</p>
      <p>The decision tree is based on the concept of
bundling common starting sequences of the various
paths to a node of the tree. Different subsequent
following (next) nodes of the paths will result in different
sub-trees right below the actual root on the last node of
the common starting sequence.</p>
      <p>This continues for each lower level sub-tree
accordingly. If there are different paths with a common
starting sequence from the root to the actual root different
in the next (subsequent) nodes, related sub-trees will be
established.</p>
      <p>The utilization or application of this decision tree is
performed as follows.</p>
      <p>If a submitted path is already represented in the
decision tree, the prediction or estimation is very easily
done through presenting the average Grade Point
Average (average of a numeric performance metric of a
student over all subjects, weighted by the number of
each subject) that students gained, who went exactly
this paths, too.</p>
      <p>In the other case, the longest leading (starting and
its succeeding) part in common with the path
representing the submitted curriculum plan will be identified and
code</p>
      <p>
        subject
the average GPA of all students’ paths in the sub-trees
that start from that point, will be presented as a success
estimation. Additionally, the degree of similarity and
a recommended change of the submitted path will be
presented. T he data mining technology is described
more detailed in [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
    </sec>
    <sec id="sec-6">
      <title>4. DATA PREPROCESSING</title>
      <p>We collected 188 individual storyboard paths of
students, who studied Information Environment at the
School of Information Environment of Tokyo Denki
University from 2005 till 2009.</p>
      <p>From these samples, we removed two samples of
students, who joint the university after taking several
semesters elsewhere, because their marks were derived
by recognition of marks received in similar subjects at
another university. This led to 186 samples.</p>
      <p>After collecting and studying all the samples and
organizational material rules to compose a curriculum,
which was available in Japanese only, we chose a
compact data representation by coding the particular
subjects and the particular students. Table 1 shows an
extract from the subject coding list.</p>
      <p>By using subject codes 1-155 and student IDs
1186, we composed a complete decision tree from the
186 samples.</p>
      <p>To make sure that identical starting sequences of
semester curricula really end up in the same path, the
decision tree is well sorted: (1) the subject sequence
within a semester is sorted by ascending subject codes
and (2) the students samples are sorted by the code lists,
which are, compared element by element, ascending,
too. We adopted this technology from a similar
technology, which is usually performed in data mining for
item lists to efficiently generate association rules.</p>
      <p>Figure 1 shows an extract of the decision tree
composed by all the samples. For each student (coded by
his/her ID),
each semester (columns s, with yellow-brown
background),
the subjects (courses, columns c with light green
background),
their number of units (columns u with light
yellow background) and
the achieved results (with light blue
background), i.e. the mark (columns m: S, A, B,
C, D, or E) and the number of grade points
(columns GP: 4, 3, 2, or 0)
are listed up.</p>
      <p>The last row contains a weighted (by the number of
units) grade point average GPA, which quantifies the
degree of success in the study. Again, both the subject
lists of the students within a semester and the complete
students’ samples (which are lists of lists), are sorted
by subject code. The bars between the paths show,
up to which semester the curricula of adjacent students
are identical (circles) respectively from which semester
they are different from each other (bullets). Thus, the
grey bars separate the sub-trees from each other.</p>
      <p>The entire table has 42 columns and 1616 rows.</p>
      <p>Figuratively spoken, the table illustrates the decision
tree in a horizontal direction wit the root being on the
very left hand side and the leaves being on the very
right hand side. The grey bars separate sub-trees from
each other.</p>
      <p>Before applying the validation technology, we
found some “exotic samples” of students, who are not
representative. This applies to those students, who
never finished their study (as this was the case with
students 8, 11, 59, 97, 113, 118, 121 and 153) and
removed them because of incomplete data, i.e. 177
samples left. As a “learning curve”, in future validations,
we will leave at least those “dead end” paths in the set,
which are caused by a lack of performance.</p>
      <p>Our validation technology uses an example set to
construct a decision tree and a test set to check its
performance. Both the example set and the test set are
recruited from the given samples.</p>
      <p>Those storyboard paths, which are unique and do
not have anything in common with any other path, are
not appropriate for such a technology, because the test
set origins from the same source of data. If the test set
contained samples that do not have anything in
common with any path of the decision tree, any data mining
can not really work because of missing data.</p>
      <p>In practice, our data mining technology degenerates
to merge all paths of the decision tree and provides the
average degree of success of all former students.</p>
      <p>Since this is not really a result of data mining, we
excluded such paths, which led us to 104 remaining
paths, which are used to validate the technology.</p>
      <p>For practical use in the success estimation of new
paths submitted by students, however, we kept these
73 “lonely” paths, of course, because new paths may
be similar to them as well. In fact, any new path is
”lonely” when somebody goes it the first time, before
it may gain popularity and grow evolutionary towards
a sub-tree.
56 … … … … … … … … … … … … … … … … … … … … … … … … … … … … … … … … … … … … … … … … 3,90</p>
    </sec>
    <sec id="sec-7">
      <title>5. VALIDATION TECHNOLOGY AND</title>
    </sec>
    <sec id="sec-8">
      <title>RESULTS</title>
      <p>There are several approaches to validate data mining
technologies.</p>
      <p>The holdout method splits the data into a training
set and a test set, typically in the ratio 2/3 by 1/3. The
data mining technology is applied to the training set
and validated with the test set. This method suffers
from the fact that it does not use the available data
exhaustively. A sample, which is in the test set, is not
available for building the model (the decision tree, in
our case) and thus, decreases the performance of the
model. Thus, some performance features of the data
mining technology may not be revealed by such a
testing method. The splitting ratio is a trade off between
the quality of the model and a trustable statement about
the performance of the data mining technology.</p>
      <p>Random sub-sampling is a refinement of this
method, which is a repeated holdout with various splits
of the available data and thus, uses the data a little more
exhaustively. However, there is no control on the issue,
how often a data object is used for building the model
and how often it is used for test.</p>
      <p>A more exhaustive utilization of the available data
is done by cross validation. Here, each data object
is used for training with the same frequency and for
test exactly once. The data set is split into k equally
sized subsets. In k cycles, each subset is used for test,
whereas the the other k 1 sets is used for training.</p>
      <p>The leave one out approach is a special case of
cross validation with k being the number of data
objects and makes the most exhaustive use of the data.</p>
      <p>Finally, we used this approach to validate our data
mining technology. In 104 cycles, we removed one
path from the complete decision tree and used this
sample to check the remaining decision tree.</p>
      <p>As a result, we received a list of all the 104 samples
along with their original GPA and the GPA as estimated
by the data mining technology as shown in Table 2. The
mean of the difference between both was 0.43 with a
standard deviation of 0.30.</p>
      <p>Having in mind that this result is just based on a
statistical analysis of former students’ curricula and their
related success, an average error of 0.43 grade points is
not too bad and promises remarkable results, when the
learner’ individual characteristics are also included in
the data mining technology.</p>
    </sec>
    <sec id="sec-9">
      <title>6. PERSONALIZED DATA MINING AND ITS</title>
    </sec>
    <sec id="sec-10">
      <title>REALIZATION</title>
      <p>Individual learning plans should not only be based on
the success of former students who went similar ways.
Additionally, individual properties, talents and
preferences should be considered.</p>
      <p>For example, some students are more talented for
analytical challenges, some are more successful in
creative or composing tasks, and others may have an
extraordinary talent to memorize a lot of factual
knowledge. Consequently, we need to include individual
learner profiles to avoid lavishing the students with
suggestions that don’t match their individual preferences
and talents.</p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], we introduced an approach of personalized
data mining. This approach adopts the GARDNER’S
theory of multiple intelligences [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] and the learning
style model of FELDER and SILVERMAN [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. The
assumption behind this approach is that there is a link
between
typical “competence traits” (according to
GARDNER) and subjects that typically challenge the
one or other “kind of intelligence” more than
others and
typical teaching methods (according to FELDER
and SILVERMAN) and subjects that are typically
taught with these methods.
      </p>
      <p>
        According to [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], the next steps of collecting and
processing data to integrate this technology, are (1) the
appraisal of the learner profile introduced in [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] for the
very best students in each subject, (2) the derivation a
typical “success profile” for each subject, (3) the
estimation of learner profiles for all students as a (by
success degree) weighted average success profile of the
subjects they took, and (4) the application of the same
technology to the data of “personalized” decision trees
for each learner, which are composed by samples of
learners, which have a similar learner profile.
      </p>
      <p>The appraisal of the GARDNER - like items in the
learner profile can be performed by a questionnaire,
which derives an estimation of a human’s intelligence
distribution by his/her answers on 70 questions. This
questionnaire is available to the public in the Internet
as a downloadable Microsoft Excel file.1</p>
      <p>The FELDER-SILVERMAN - like items of the
learner profile can be estimated by a questionnaire as
well. This questionnaire is also available to the public
in the Internet.2</p>
      <p>1see http://www.businessballs.com/howardgardnermultiple. . .
. . . intelligences.htm
2see http://www.engr.ncsu.edu/learningstyles/ilsweb.html
attribute
d1
d2
d3
d4
d5
d6
d7
d8
d9
d10
d11
attribute description
value range
Linguistic intelligence
Logical-mathematical
intelligence
Musical intelligence
Bodily-kinesthetic
intelligence
Spatial intelligence
Interpersonal intelligence
Intrapersonal intelligence
Active vs. Reflective style
Sensing vs. Intuitive style
Visual vs. Verbal style
Sequential vs. Global style
0
0
0
0
0
0
0
0
0
0
0
v1
v2
v3
v4
v5
v6
v7
v8
v9
v10
v11
1
1
1
1
1
1
1
1
1
1
1</p>
      <p>We consider both in our model, which is defined as
an array of 11 attribute-value pairs that contains 7
intelligence attributes and 4 learning style attributes. Both
can be appraised by questionnaires that are available to
the public in the web.</p>
      <p>To make the dimensions of both sources
comparable to each other and see the quantitative relations, we
normalized them in a way that they all have the same
range of values. The intelligence dimensions rage from
10 to 40. The learning style dimensions range from
11 to +11 (opposite algebraic sign for opposite styles).
The normalization can be done by
v = result=40 for the intelligence dimensions
according to GARDNER and
v = (result + 11)=22 for the learning style
dimensions accodrding to FELDER and
SILVERMAN.</p>
      <p>Finally, our learner model looks as shown in Table 3.</p>
      <p>However, it turned out to be very hard to find
former students, who are still accessible and, moreover,
willing to fill in such questionnaires to obtain their
learner profiles. Our students are very sensible in
respecting privacy and, vice versa, in expecting the same
respect from others. Since answers to the questions in
the questionnaire may reveal some private issues, it is
hard to ask them to answer these questions.</p>
      <p>However, there are some students, who we dare to
ask for filling in the questionnaires because they had a
quite confidential relation to the one or other professor,
but these students are not necessarily the best ones.</p>
      <p>Therefore, steps one and two of this plan need to
be changed. To infer a typical ”success profile” of a
subject, we can collect the questionnaire answers be
some student, which are not necessarily the best ones.</p>
      <p>Thus, we modified the approach of computing
an ”average profile” of the best students towards a
succis =
”weighted average profile” of all available students,
who took part in a particular subject.</p>
      <p>Let L(s) be the set of learners, who took part in the
subject s and for who a learner profile can be composed
from the questionnaires’ answers. So for each learner
li 2 L(s), i = 1:::jL(s)j, a learner profile p(li) =
[di1; di2; ; di11 is available. Let
 1:00


 0:80



 0:60</p>
      <p>0:40


 0:20


 0:00
; if li received in subject s mark S
; if li received in subject s mark A
; if li received in subject s mark B
; if li received in subject s mark C
; if li received in subject s mark D
; if li received in subject s mark E
be the success degree of the learner l1i in subject s.</p>
      <p>By using this success degree as a weight factor, the
“typical success profile” of a subject s can be computed
as
p(s) =
jL∑(S)j
i=1
1





succis 

∑jL(s)j(succis</p>
      <p>i=1
∑jL(s)j(succis
i=1
.
.</p>
      <p>.
∑jL(s)j(succis
i=1
This calculation has to be done for each subject
separately and the set of “most successful students” differs
from subject to subject, of course. The idea behind is
to mine a “typical success profile” for each subject
separately.</p>
      <p>
        After performing these computations, steps three
and four can be conducted as planned originally and
described in [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. As a result of processing this additional
data in the way sketched above, we expect a remarkable
improvement the performance compared to the results
presented in section 5.
      </p>
    </sec>
    <sec id="sec-11">
      <title>7. SUMMARY AND OUTLOOK</title>
      <p>The research reported here is focused on modeling,
processing, evaluating and refining processes with
humans involved like learning. A formerly developed
concept called storyboarding is briefly introduced.</p>
      <p>Along with a storyboard application, we developed
a data mining technology to estimate success chances
of curricula, which are composed by students. So far,
there was no practical significance for the performance
of this technology.</p>
      <p>The basic problem so far was the collection of data,
which has to be accumulated during a complete
undergraduate study of, which needs a period of four years.
Meanwhile, we could gain a significant amount of data
to validate the technology.</p>
      <p>By cross validation with the available data, we
could empirically show performance of our data
mining technology.</p>
      <p>However, the currently implemented way of
statistically analyzing all former students’ curricula ignores
the fact that the success chance heavily depends on
individual properties.</p>
      <p>A formerly developed approach to validate
curricula personalized by building the decision tree based on
former students with a similar learner profile only, was
refined here. This was necessary, because the required
personal data is not available.</p>
      <p>As a result of practically implementing this
refined approach, we expect a remarkable improvement
of these results.</p>
      <p>8. REFERENCES</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>K.P.</given-names>
            <surname>Jantke</surname>
          </string-name>
          and
          <string-name>
            <given-names>R.</given-names>
            <surname>Knauf</surname>
          </string-name>
          , “
          <article-title>Didactic design though storyboarding: Standard concepts for standard tools,”</article-title>
          <source>in Proc. of 4th Int. Symposium on Information and Communication Technologies, Workshop on Dissemination of e-Learning Technologies and Applications</source>
          , Cape Town, South Africa.
          <year>2005</year>
          , ISBN 0-9544145-6-X, pp.
          <fpage>20</fpage>
          -
          <lpage>25</lpage>
          , New York: ACM Press.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>R.</given-names>
            <surname>Knauf</surname>
          </string-name>
          , R. Bo¨ck,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Sakurai</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Dohi</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Tsuruta</surname>
          </string-name>
          , “
          <article-title>Knowledge mining for supporting learning processes,”</article-title>
          <source>in Proc. of the 2008 IEEE Int. Conference on Systems, Man, and Cybernetics (SMC</source>
          <year>2008</year>
          ),
          <article-title>Singapore</article-title>
          . IEEE, Piscataway, NJ, USA,
          <year>2008</year>
          ,
          <string-name>
            <surname>IEEE</surname>
          </string-name>
          <article-title>Catalog number CFP08SMC-USB</article-title>
          ,
          <source>ISBN 978-1-4244-2384-2</source>
          , Library of Congress:
          <volume>2008903109</volume>
          , pp.
          <fpage>2615</fpage>
          -
          <lpage>2621</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>R.</given-names>
            <surname>Knauf</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Sakurai</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Tsuruta</surname>
          </string-name>
          , and
          <string-name>
            <given-names>K.P.</given-names>
            <surname>Jantke</surname>
          </string-name>
          , “
          <article-title>Modeling didactic knowledge by storyboarding</article-title>
          ,
          <source>” Journal of Educational Computing and Research</source>
          , vol.
          <volume>42</volume>
          , no.
          <issue>4</issue>
          , pp. in press,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Sakurai</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Dohi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Tsuruta</surname>
          </string-name>
          , and
          <string-name>
            <given-names>R.</given-names>
            <surname>Knauf</surname>
          </string-name>
          , “
          <article-title>Modeling academic education processes by dynamic storyboarding</article-title>
          ,
          <source>” Journal of Educational Technology &amp; Society</source>
          , vol.
          <volume>12</volume>
          , no.
          <issue>2</issue>
          , ISSN 1436- 4522
          <source>(online) and 1176-3647 (print)</source>
          , pp.
          <fpage>307</fpage>
          -
          <lpage>333</lpage>
          ,
          <year>April 2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>R.</given-names>
            <surname>Knauf</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Sakurai</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Tsuruta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Takada</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Dohi</surname>
          </string-name>
          , “
          <article-title>Personalized curriculum composition by learner profile driven data mining,”</article-title>
          <source>in Proc. of the 2009 IEEE Int. Conference on Systems, Man, and Cybernetics (SMC</source>
          <year>2009</year>
          ), San Antonio, TX, USA,
          <year>2009</year>
          ,
          <source>ISBN 978-1-4244- 2794-9</source>
          , pp.
          <fpage>2137</fpage>
          -
          <lpage>2142</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>H.</given-names>
            <surname>Gardner</surname>
          </string-name>
          , Frames of Mind:
          <source>The Theory of Multiple Intelligences</source>
          , New York: Basic Books,
          <year>1993</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>R.M.</given-names>
            <surname>Felder</surname>
          </string-name>
          and
          <string-name>
            <given-names>L.K.</given-names>
            <surname>Silverman</surname>
          </string-name>
          , “
          <article-title>Learning and teaching styles in en-gineering education,” Engineering Education</article-title>
          , vol.
          <volume>78</volume>
          , no.
          <issue>7</issue>
          , pp.
          <fpage>647</fpage>
          -
          <lpage>681</lpage>
          ,
          <year>1988</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>