<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Dynamic Time Warping in Analysis of Student Dynamic Time Warping in Analysis of Student Behavioral Patterns Behavioral Patterns</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Kateˇrina Slaninova´</string-name>
          <email>R@evpusbl.iccz</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Toma´sˇ Kocyan</string-name>
          <email>tomas.kocyan@vsb.cz</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Jan Martinovicˇ</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Katerina SPlaavnlianDovraa´zˇ</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>iTloovma´</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>sanKdoVcya´acnla</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>SJnaa´nsˇeMl</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>artinovic</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Pavla Drazdilova</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Vaclav Snasel</string-name>
          <email>vaclav.snasel@vsb.cz</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>VSB - TechInTi4cIanlnUovnaitvioernssi,ty of Ostrava</institution>
          ,
          <addr-line>17. listopadu 15/21I7T2,47In0n8o3v3aOtiostnrasv,a</addr-line>
          ,
          <country>Czech</country>
          <addr-line>Republic (toma1s7.</addr-line>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>y VofSEBle-ctTrieccahlEnincgailneUenriinvgerasnidtyCofmOpusterravSac</institution>
          ,
          <addr-line>ience, Facu17lt.yliostfoEpaldecut1ri5c/a2l17E2n, g7i0n8ee3r3inOgstaranvda,CCozmecphuRterpuSbcliecnce, (k1a7t</addr-line>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2012</year>
      </pub-date>
      <fpage>49</fpage>
      <lpage>59</lpage>
      <abstract>
        <p>E-learning systems store large amount of data based on the history of users' interactions with the system. These pieces of information are usually used for further course optimization, finding e-tutors in collaboration learning, analysis of students' behavior, or for other purposes. The paper deals with an analysis of students' behavior in learning management system. The main goal of the paper is to find, how selected methods can influence finding of behavioral patterns in learning management system and how we can reduce the amount of extracted sequences. The methods of process mining and sequential pattern mining were used for extraction of behavioral patterns. The authors present the comparison of selected methods for the definition of students' behavior with the focus to influence of dynamic time warping. Obtained patterns and relations between them are presented using complex networks; the visualization and pattern clusters extraction is optimized by spectral graph partitioning.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1 Introduction</title>
      <p>
        E-learning is a method of education which utilizes a wide spectrum of technologies,
mainly internet or computer-based, in the learning process. It is naturally related to
distance learning, but nowadays is commonly used to support face-to-face learning as
well. Learning management systems (LMS) provide effective maintenance of
particular courses and facilitate communication within the student community and between
educators and students [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. Such systems usually support the distribution of study
materials to students, content building of courses, preparation of quizzes and assignments,
discussions, or distance management of classes. In addition, these systems provide a
number of collaborative learning tools such as forums, chats, news, file storage etc.
      </p>
      <p>
        LMS based on computer and web-based education environments provide storage
of large amount of accessible information. These systems record information about
students’ actions and interactions onto log files or databases. Within these records, data
about students learning habits can be found including favored reading materials, note
taking styles, tests and quizzes, ways of carrying out various tasks, communication with
other students in virtual classes using chat, forum, and etc. Other common data, such
as personal information about students and educators (user profiles), student results and
user interaction data, is also available in the system databases [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>
        Such data collections are essential for analyzing students’ behavior and can be very
useful in providing feedback both to students and educators. For students, this can be
achieved through various recommended systems and through course adaptation based
on student learning behavior. For teachers, some benefits would include the ability to
evaluate the courses and the learning materials, to detect the typical learning behavior
or to find possible students suitable for collaborative learning [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ].
      </p>
      <p>
        Regardless of LMS benefits, huge amount of recorded data in large collections
makes often too difficult to manage them and to extract useful information from them.
To overcome this problem, some LMS offer basic reporting tools. However, in such
large amount of information the outputs become quite obscure and unclear. In addition,
they do not provide specific information of student activities while evaluating the
structure and content of the courses and its effectiveness for the learning process [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ]. The
most effective solution to this problem is to use data mining techniques [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>The main goal of the paper is to compare selected data mining methods suitable
for the extraction of students’ behavioral patterns performed in LMS Moodle. The
behavioral patterns are obtained using methods of process mining and sequential mining,
the patterns are presented using methods from graph theory. The organization of the
paper is as follows: Section 2 consists of the background related to the methods used
for the analysis of students’ behavior. Process mining issues and selected methods for
comparison of sequences are presented here. In Section 3 is presented an extraction of
sequences used for students’ behavior description from log file of e-learning system.
Then, we are presented results of experiments provided on e-learning system Moodle.
The experiments are focused to the extraction of students’ behavioral patterns and to
the comparison of selected methods. For easier analysis of the students’ behavior is
important the reduction of amount of sequences. We have used spectral clustering
algorithm, which determine number of important clusters with behavioral patterns. The last
Section 4 contains the conclusion.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Analysis of Students’ Behavior</title>
      <p>
        Several authors published contributions with relation to mining data from e-learning
systems to extract knowledge that describe students’ behavior. Among others we can
mention for example [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ], where authors investigated learning process of students by
the analysis of web log files. A ’learnograms’ were used to visualize students’ behavior
in this publication. Chen et al. [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] used fuzzy clustering to analyze e-learning
behavior of students. El-Hales [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] used association rule mining, classification using decision
trees, E-M clustering and outlier detection to describe students’ behavior. Yang et al.
[
        <xref ref-type="bibr" rid="ref22">22</xref>
        ] presented a framework for visualization of learning historical data, learning
patterns and learning status of students using association rules mining. The agent
technology and statistical analysis methods were applied on student e-learning behavior to
evaluate findings within the context of behavior theory and behavioral science in [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
      <p>However, contributions oriented to analysis of students’ behavior in e-learning
systems describe the behavior using statistical information, for visualization and
representation of obtained information are mostly used only common statistical tools like figures
or graphs. They usually do not provide information about behavioral patterns with
effective visualization, nor information about relations between students based on their
behavior.
2.1</p>
      <sec id="sec-2-1">
        <title>Process Mining</title>
        <p>
          Our subject of interest in this paper is student behavior in LMS, which is recorded in
form of events and stored in the logs. Thus, we can define the student behavior with the
terms of process mining which are used commonly in business sphere. Aalst et al. [
          <xref ref-type="bibr" rid="ref19 ref20">20,
19</xref>
          ] defines event log as follows:
Definition 1. Let A be a set of activities (also referred as tasks) and U as set of
performers (resources, persons). E = A ×U is the set of (possible) events (combinations of
an activity and performer). For a given set A, A∗ is the set of all finite sequences over A.
A finite sequence over A of length n is mapping σ =&lt; a1, a2, . . . , an &gt;, where ai = σ (i)
for 1 ≤ i ≤ n. C = E∗ is the set of possible event sequences. A simple event log is a
multiset of traces over A.
        </p>
        <p>Then, student behavior in LMS can be described by set of event sequences. More
detailed description is presented in Section 3.</p>
        <p>The paper is oriented to finding behavioral patterns. Behavioral patterns are
discovered using similarity of extracted sequences. A sequence is an ordered list of
elements, denoted &lt; e1, e2, . . . , el &gt;. Given two sequences α =&lt; a1, a2, . . . , an &gt; and
β =&lt; b1, b2, . . . , bm &gt;. α is called a subsequence of β , denoted as α ⊆ β , if there
exist integers 1 ≤ j1 &lt; j2 &lt; . . . &lt; jn ≤ m such that a1 = b j1, a2 = b j2, . . . , an = b jn. β
is than a super sequence of α.</p>
        <p>In the problem of finding similar behavior, we do not use traditional methods of
sequential pattern mining where usually frequently repeated patterns are extracted. For
finding the behavioral patterns, we need to use the methods for the sequence
comparison, described in Section 2.2.
2.2</p>
      </sec>
      <sec id="sec-2-2">
        <title>Comparison of Sequences</title>
        <p>There are generally known two basic groups of algorithms for the comparison of two or
more categorical sequences. The first group divides the algorithms by the fact, whether
the sequences consist of ordered or unordered elements. The second group of algorithms
focuses on the comparison of the sequences with the different lengths and with the
possible error or distortion.</p>
        <p>
          The basic approach to the comparison of two sequences, where the order of elements
is important, is The longest common substring (LCS) method [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ] (see example in Table
1). As obvious from the name of the method, the main principle of the method is to find
the length of the common longest substring. Given the two sequences x and y, we can
find such subsequence z =&lt; z1, z2, . . . , zp &gt;, where zk = xi+k−1 = y j+k−1 ∀k = 1, . . . p
and p ≤ m, n.
The LCS method respects the order of elements in the sequence. However, the main
disadvantage is, that it can find only identical subsequences, where no extra element
is presented in the sequence. For some domains, typically where is large amount of
different sequences, gives this fact too strict limitation.
        </p>
        <p>
          As a solution of this problem we can consider The longest common subsequence
(LCSS) described for example in [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ] (see example in Table 1). Contrary to The longest
common substring, this method allows (or ignores) the inserted extra elements in the
sequence, and therefore, it is immune to slight distortions.
        </p>
        <p>a b c
Sequence X EABCF EAEBCE ABBCC
Sequence Y ZABCT FABCF EABCE
Longest Common substring ABC BC AB
Common subsequence (LCSS) ABC ABC ABC
Common subsequence (TWLCS) ABC ABC ABBCC</p>
        <p>Whether we define the similarity of compared sequences as a function using a length
of common subsequence, we can find one characteristic of this method. The length of
the common subsequence is not immune to recurrence of identical elements, which can
occur only in one of the compared sequences. We can find such situations, for example
due to inappropriate sampling or due to any kind of distortion.</p>
        <p>
          In some applications, it is suitable (or sometimes even required) to eliminate such
type of distortions and to work with them like with equivalent elements. The
solution is in another method, The time-warped longest common subsequence (T-WLCS)
[
          <xref ref-type="bibr" rid="ref9">9</xref>
          ] (see example in Table 1). The method combines the advantages of LCSS method
with dynamic time warping[
          <xref ref-type="bibr" rid="ref13">13</xref>
          ]. Dynamic time warping is used for finding the optimal
visualization of elements in two sequences to match them as much as possible. This
method is immune to minor distortions and to time non-linearity. It is able to compare
sequences, which are for standard metrics evidently not comparable.
        </p>
        <p>The method emphasizes recurrence of elements in one of the compared sequences.
Due to this fact the length of the common subsequence can be longer than the shorter
length of the compared sequences.</p>
        <p>In the experiments described in the paper, the authors compare the impact of LCSS
and T-WLCS methods to the construction of derived network based on similar behavior
of students in e-learning system.
3</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Sequence Extraction in LMS Moodle</title>
      <p>In this section is presented the extraction of students’ behavioral patterns performed
in the e-learning educational process. The analyzed data collections were stored in the
Learning Management System (LMS) Moodle logs used to support e-learning
education at Silesian University, Czech Republic.</p>
      <p>The logs consist of records of all events performed by Moodle users, such as
communication in forums and chats, reading study materials or blogs, taking tests or quizzes
etc. The users of this system are students, tutors, and administrators; the experiment was
limited to the events performed only by students.</p>
      <p>Let us define a set of students (users)U , set of courses C and term Activity ak ∈ A,
where A = P × B is a combination of activity prefix pm ∈ P (e.g. course view, resource
view, blog view, quiz attempt) and an action bn ∈ B, which describes detailed
information of an activity prefix (concrete downloaded or viewed material, concrete test etc.).
Event e j ∈ E then represents the activity performed by certain student ui ∈ U in LMS.
On the basis of this definition, we have created a setSi of sequences si j for the user ui,
which represents the students’ (users’) paths (sessions) on the LMS website. Sequence
si j is defined as a sequence of activities, for examplesi j =&lt; a1 j, a2 j, . . . , aq j &gt;, which
is j-th sequence of the user ui.</p>
      <p>
        The sequences were extracted likewise the user sessions on the web; the end of the
sequences was identified by at least 30 minutes of inactivity, which is based on our
previous experiments [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. Similar conclusion was presented by Zorrilla et al. in [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ].
      </p>
      <p>Using this method, we have obtained a set of all sequences S = ∪∀iSi, which
consisted of large amount of different sequences sl performed in LMS Moodle. We have
selected the course Microeconomy A as an example for the demonstration of proposed
method. In Table 2 is presented detailed information about the selected course.</p>
      <p>Records
65 012</p>
      <p>Students
807</p>
      <p>Prefixes
67</p>
      <p>Actions
951</p>
      <p>Sequences
8 854
Sequence appearance in the selected course follows the power law distribution.</p>
      <p>As mentioned in Section 3, the obtained set S of sequences consisted of large
amount of different sequences, often very similar. Such large amount of information
is hard to clearly visualize and to present in well arranged way. Moreover, the
comparison of users based on their behavior is computationally expensive with such dimension.
Therefore, we present the identification of significant behavioral patterns based on the
sequence similarity, which allows us to reduce amount of extracted sequences.</p>
      <p>
        Following experiment is oriented to exploration, how the different methods for
measurement of sequence similarity can influence finding of behavioral patterns. We have
used LCSS a T-WLCS methods for the similarity measurement of sequences, described
in Section 2.2, with comparison to the common one, cosine similarity. Cosine similarity
[
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] is well known method for similarity measurement in informational retrieval while
working with vector model. Both methods LCSS and T-WLCS find the longest
common subsequence α of compared sequences βx and βy, where α ⊆ βx ∧ α ⊆ βy, with
relation to both methods, see Section 2.2. Similarity was counted by the Equation 1.
      </p>
      <p>Sim(βx, βy) =
(l(α) ∗ h)2
l(βx) ∗ l(βy)
,
(1)
where l(α) is a length of the longest common subsequence α for sequences βx and
βy; l(βx) and l(βy) are analogically lengths of compared sequences βx and βy, and
h =</p>
      <p>Min(l(βx), l(βy))
Max(l(βx), l(βy))
(2)
Numbers in the brackets present the length of the founded longest common
sequence for each method. From Table 3 (for example from the second row of the table)
is evident the significant disadvantage of cosine similarity: it does not take into
consideration the ordering of events in the sequence, while the methods LCSS and T-WLCS
do. However, cosine similarity supports weighted vector model, where frequency of
attributes is taken into consideration. In our method, tf-idf weighting was used. From the
9th row we can see the difference between the methods LCSS and T-WLCS. T-WLCS
method takes into consideration the recurrence of elements in one of the compared
sequences.</p>
      <p>On the basis of selected method for finding the similarity of sequences, we have
constructed the similarity matrix for sequences (|S| × |S|) which can be represented
using tools of graph theory. For the visualization of network was constructed weighted
graph G(V, E), where weight w is defined as function w : E(G) → R, when w(e) &gt; 0.
Set V is represented by set of sequences S, weights w are evaluated by the similarity of
sequences, see Equation 1, depending on selected method. In Table 4 is more detailed
description of weighted graphs of sequences, where weight is defined by cosine
similarity and similarity counted on the basis of LCSS and T-WLCS method for selected
threshold θ . The number of nodes for each graph is 5908.</p>
      <p>From Table 4 we can see, that each graph consists of large amount of similar
sequences. Moreover, they are dense and very large for further processing. Better
interpretation of results is possible by finding the components, which can represent the</p>
      <p>
        Cosine Measure
θ Isolated Nodes Edges Avg. Degree Avg. Weighted Degree
0.1 0 13292202 2249.865 464.377
0.2 2 4651152 787.263 261.303
0.3 5 2040406 345.363 155.013
0.4 32 1050138 177.748 97.387
0.5 122 554278 93.818 60.066
0.6 395 290632 49.193 35.747
0.7 897 147984 25.048 20.181
0.8 1851 67584 11.439 10.034
0.9 3289 21966 3.718 3.524
behavioral patterns. The graph reduction using only threshold θ leads to undesirable
loss of information. Due to this reason, we have used spectral clustering by Fiedler
vector and algebraic connectivity [
        <xref ref-type="bibr" rid="ref7 ref8">7, 8</xref>
        ]. More detailed description of finding components
using this method was presented in our previous work [
        <xref ref-type="bibr" rid="ref14 ref21">21, 14</xref>
        ].
      </p>
      <p>In table 5 are described graphs with different methods for computing similarity
between sequences. The threshold was selected θ ≥ 0.1 or 0.2 for comparison between
the largest components with similar size (bold numbers). We have analysed the largest
connected components of each graph and we have obtained significant clusters after
spectral clustering.
Connected Components
Size of the Largest Component
Clusters in the Largest Component
Size of Cluster 1
Size of Cluster 2
Size of Cluster 3
Size of Cluster 4
Size of Cluster 5</p>
      <p>In Figure 1 we can see the weighted graph constructed for better visualization of
the components with the similar sequences.</p>
      <p>The graph was constructed using an open souce software Gephi3. In Figure 1, the
nodes in the graph represent the sequences, while the edges are weighted by their
similarity using T-WLCS method. The graph was constructed using threshold θ =0.8. Each
component in the graph can represent a behavioral pattern of similar sequences.</p>
      <p>It is possible to generate subgraphs relevant to selected activity, which can be in
the area of our interest. The filtering by selected activities is performed by using vector
model of sequences × activities.
4</p>
    </sec>
    <sec id="sec-4">
      <title>Conclusion</title>
      <p>The paper is oriented to finding the students’ behavioral patterns performed in the
elearning system. The behavioral patterns were obtained using the methods of process
mining and sequential mining, the patterns were visualized by the methods from graph
theory. The authors focused on the comparison of the selected data mining methods
suitable for the definition of the sequence similarity.</p>
      <p>
        On the basis of previous experiments with suffix tree method and common vector
model [
        <xref ref-type="bibr" rid="ref16 ref17">17, 16</xref>
        ] we have found, that the sequences are order dependent and it is better
to respect this fact while comparing the sequence similarity. Due to this reason, the
methods for finding the longest common subsequence were used.
      </p>
      <p>In the experiments, the comparison of methods LCSS and T-WLCS with common
vector model was described. Our results showed that each method has its unique
characteristics. Vector model does not take into consideration ordering of actions inside the
sequences, which is important disadvantage. On the other side, it allows weighting of
activities on the basis of their frequency. LCSS and T-WLCS methods work with action
ordering and allow slight distortions in the sequence, while T-WLCS emphasizes the
recurrence of elements in one of the compared sequences. These methods allowed to
find the similarity between the two sequences more precisely.</p>
      <p>On the basis of our experiments we have found that proposed method is usable for
sequence extraction. Moreover, it can be effectively used for the reduction of sequence
dimension. As we can see from presented results, we need to provide more precise
division of extracted components to obtain more accurate behavioral patterns in some
cases. The LCSS and T-WLCS methods are more time demanding than common
cosine similarity. In our further work we intent to focus on their optimization. Another
possible further work can be oriented to the definition of sequence similarity which
will exploit the advantages from cosine measure and methods for finding the longest
common subsequence.</p>
      <p>Proposed method is suitable for finding the students’ behavioral patterns in e-learning,
which can be useful in providing feedback both to students and educators. Such type
of information is valuable neither in e-learning sphere, nor in other areas like business
process mining, finding behavior of users on the web, marketing etc.</p>
    </sec>
    <sec id="sec-5">
      <title>Acknowledgment</title>
      <p>This work was partially supported by SGS, VSB – Technical University of Ostrava,
Czech Republic, under the grant No. SP2012/151 Large graph analysis and
processing and by the European Regional Development Fund in the IT4Innovations Centre of
Excellence project (CZ.1.05/1.1.00/02.0070).</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <given-names>F.</given-names>
            <surname>Castro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Vellido</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Nebot</surname>
          </string-name>
          , and
          <string-name>
            <given-names>F.</given-names>
            <surname>Mugica</surname>
          </string-name>
          .
          <article-title>Applying data mining techniques to elearning problems</article-title>
          .
          <source>Studies in Computational Intelligence (SCI)</source>
          ,
          <volume>62</volume>
          :
          <fpage>183</fpage>
          -
          <lpage>221</lpage>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <given-names>B.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Shen</surname>
          </string-name>
          , G. Ma,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Zhang</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Y.</given-names>
            <surname>Zhou</surname>
          </string-name>
          .
          <article-title>The evaluation and analysis of student e-learning behaviour</article-title>
          .
          <source>In IEEE/ACIS 10th International Conference on Computer and Information Science (ICIS)</source>
          ,
          <year>2011</year>
          , pages
          <fpage>244</fpage>
          -
          <lpage>248</lpage>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>J.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Huang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Wang</surname>
          </string-name>
          , and
          <string-name>
            <given-names>H.</given-names>
            <surname>Wang</surname>
          </string-name>
          .
          <article-title>E-learning behavior analysis based on fuzzy clustering</article-title>
          .
          <source>In Proceedings of International Conference on Genetic and Evolutionary Computing</source>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4. P. Dra´zˇdilova´, G. Obadi, K. Slaninova´,
          <string-name>
            <given-names>S.</given-names>
            <surname>Al-Dubaee</surname>
          </string-name>
          ,
          <string-name>
            <surname>J. Martinovicˇ</surname>
          </string-name>
          , and V. Sna´sˇel.
          <article-title>Computational intelligence methods for data analysis and mining of elearning activities</article-title>
          . In F. Xhafa,
          <string-name>
            <given-names>S.</given-names>
            <surname>Caballe</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Abraham</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Daradoumis</surname>
          </string-name>
          , and J. Perez, editors,
          <source>Studies in Computational Intelligence For Technology Enhanced Learning</source>
          , volume
          <volume>273</volume>
          , pages
          <fpage>195</fpage>
          -
          <lpage>224</lpage>
          . Heidelberg, Germany: Springer-Verlag,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5. P. Dra´zˇdilova´, K. Slaninova´, J. Martinovicˇ, G. Obadi, and
          <string-name>
            <given-names>V.</given-names>
            <surname>Sna</surname>
          </string-name>
          <article-title>´sˇel. Creation of students' activities from learning management system and their analysis</article-title>
          .
          <source>In A. Abraham</source>
          ,
          <string-name>
            <surname>V.</surname>
          </string-name>
          <article-title>Sna´sˇel, and</article-title>
          K. Wegrzyn-Wolska, editors,
          <source>IEEE Proceedings of International Conference on Computational Aspects of Social Networks CASON</source>
          <year>2009</year>
          , pages
          <fpage>155</fpage>
          -
          <lpage>160</lpage>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>A.</surname>
          </string-name>
          <article-title>El-halees. Mining students data to analyze learning behavior: a case study</article-title>
          .
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <given-names>M.</given-names>
            <surname>Fiedler</surname>
          </string-name>
          .
          <article-title>Algebraic connectivity of graphs</article-title>
          .
          <source>Czechoslovak Mathematical Journal</source>
          ,
          <volume>23</volume>
          :
          <fpage>298</fpage>
          -
          <lpage>305</lpage>
          ,
          <year>1973</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <given-names>M.</given-names>
            <surname>Fiedler</surname>
          </string-name>
          .
          <article-title>A property of eigenvectors of nonnegative symmetric matrices and its application to graph theory</article-title>
          .
          <source>Czechoslovak Mathematical Journal</source>
          ,
          <volume>25</volume>
          :
          <fpage>619</fpage>
          -
          <lpage>633</lpage>
          ,
          <year>1975</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <given-names>A.</given-names>
            <surname>Guo</surname>
          </string-name>
          and
          <string-name>
            <given-names>H.</given-names>
            <surname>Siegelmann</surname>
          </string-name>
          .
          <article-title>Time-Warped Longest Common Subsequence Algorithm for Music Retrieval</article-title>
          , pages
          <fpage>258</fpage>
          -
          <lpage>261</lpage>
          . Universitat Pompeu Fabra,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <given-names>D.</given-names>
            <surname>Gusfield</surname>
          </string-name>
          . Algorithms on Strings,
          <source>Trees and Sequences: Computer Science and Computational Biology</source>
          . Cambridge University Press,
          <year>1997</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <given-names>A.</given-names>
            <surname>Hershkovitz</surname>
          </string-name>
          and
          <string-name>
            <given-names>R.</given-names>
            <surname>Nachmias</surname>
          </string-name>
          .
          <article-title>Learning about online learning processes and students' motivation through web usage mining</article-title>
          .
          <source>Interdisciplinary Journal of E-Learning and Learning Objects</source>
          ,
          <volume>5</volume>
          :
          <fpage>197</fpage>
          -
          <lpage>214</lpage>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <given-names>D. S.</given-names>
            <surname>Hirschberg</surname>
          </string-name>
          .
          <article-title>Algorithms for the longest common subsequence problem</article-title>
          .
          <source>J. ACM</source>
          ,
          <volume>24</volume>
          :
          <fpage>664</fpage>
          -
          <lpage>675</lpage>
          ,
          <year>October 1977</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13. M.
          <article-title>Mu¨ller</article-title>
          .
          <source>Information Retrieval for Music and Motion</source>
          . Springer,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14. G. Obadi, P. Dra´zˇdilova´, J. Martinovicˇ, K. Slaninova´, and
          <string-name>
            <given-names>V.</given-names>
            <surname>Sna</surname>
          </string-name>
          <article-title>´sˇel. Using spectral clustering for finding student's patterns of behavior in social networks</article-title>
          .
          <source>In Proceedings of the Dateso 2010 Annual International Workshop on DAtabases, TExts, Specifications and Objects</source>
          , pages
          <fpage>118</fpage>
          -
          <lpage>130</lpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15. G. Salton and
          <string-name>
            <given-names>C.</given-names>
            <surname>Buckley</surname>
          </string-name>
          .
          <article-title>Term-weighting approaches in automatic text retrieval</article-title>
          .
          <source>Information Processing and Management</source>
          ,
          <volume>24</volume>
          (
          <issue>5</issue>
          ):
          <fpage>513</fpage>
          -
          <lpage>523</lpage>
          ,
          <year>1988</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16. K. Slaninova´, R. Dola´k, M. Misˇkus, J. Martinovicˇ, and
          <string-name>
            <given-names>V.</given-names>
            <surname>Sna</surname>
          </string-name>
          <article-title>´sˇel. User segmentation based on finding communities with similar behavior on the web site</article-title>
          .
          <source>In Proceedings - 2010 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology - Workshops, WI-IAT Workshops</source>
          <year>2010</year>
          , pages
          <fpage>75</fpage>
          -
          <lpage>78</lpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17. K. Slaninova´, J. Martinovicˇ, T. Novosa´d, P. Dra´zˇdilova´, L. Voja´cˇek, and V. Sna´sˇel.
          <article-title>Web site community analysis based on suffix tree and clustering algorithm</article-title>
          .
          <source>In Proceedings - 2011 IEEE/WIC/ACM International Joint Conferences on Web Intelligence and Intelligent Agent Technology - Workshops, WI-IAT</source>
          <year>2011</year>
          , pages
          <fpage>110</fpage>
          -
          <lpage>113</lpage>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18. V. Sna´sˇel,
          <string-name>
            <given-names>A.</given-names>
            <surname>Abraham</surname>
          </string-name>
          , J. Martinovicˇ, P. Dra´zˇdilova´, K. Slaninova´,
          <string-name>
            <given-names>T.</given-names>
            <surname>Daradoumis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Xhafa</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Marti</surname>
          </string-name>
          <article-title>´ınez-Mon e´s. E-assessment of individual and group learning processes</article-title>
          .
          <source>Journal of Computational and Theoretical Nanoscience</source>
          ,
          <volume>9</volume>
          (
          <issue>2</issue>
          ):
          <fpage>286</fpage>
          -
          <lpage>303</lpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>W. M. P. van der Aalst</surname>
          </string-name>
          .
          <source>Process Mining: Discovery, Conformance and Enhancement of Business Processes. Springer Heidelberg, 1st edition</source>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>W. M. P. van der Aalst</surname>
            ,
            <given-names>H. A.</given-names>
          </string-name>
          <string-name>
            <surname>Reijers</surname>
            , and
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Song</surname>
          </string-name>
          .
          <article-title>Discovering social networks from event logs</article-title>
          .
          <source>Comput. Supported Coop. Work</source>
          ,
          <volume>14</volume>
          (
          <issue>6</issue>
          ):
          <fpage>549</fpage>
          -
          <lpage>593</lpage>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21. L. Voja´cˇek, J. Martinovicˇ, K. Slaninova´, P. Dra´zˇdilova´, and
          <string-name>
            <surname>J</surname>
          </string-name>
          . Dvorsk y´.
          <article-title>Combined method for effective clustering based on parallel som and spectral clustering</article-title>
          . In V. Sna´sˇel, J. Pokorn y´,
          <article-title>and</article-title>
          K. Richta, editors,
          <source>Proceedings of the 11th Annual Workshop DATESO</source>
          <year>2011</year>
          , pages
          <fpage>120</fpage>
          -
          <lpage>131</lpage>
          . V SˇB
          <string-name>
            <surname>- TU Ostrava</surname>
          </string-name>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <given-names>F.</given-names>
            <surname>Yang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Shen</surname>
          </string-name>
          , and P. Han.
          <article-title>Construction and application of the learning behavior analysis center based on open e-learning platform</article-title>
          .
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>M. Zorrilla</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          <string-name>
            <surname>Menasalvas</surname>
            , D. Mar´ın, E. Mora, and
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Segovia</surname>
          </string-name>
          .
          <article-title>Web usage mining project for improving web-based learning sites</article-title>
          .
          <source>In Computer Aided Systems Theory - EUROCAST</source>
          <year>2005</year>
          , volume
          <volume>3643</volume>
          /2005 of Lecture Notes in Computer Science, chapter
          <article-title>Web Usage Mining Project for Improving Web-Based Learning Sites</article-title>
          . Springer Berlin / Heidelberg,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>