<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Closures and Partial Implications in Educational Data Mining</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Diego Garc a-Saiz</string-name>
          <email>garciasad@unican.es</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Marta Zorrilla</string-name>
          <email>marta.zorrilla@unican.es</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Jose L. Balcazar</string-name>
          <email>jose.luis.balcazar@upc.edu</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>LSI Department, UPC</institution>
          ,
          <addr-line>Campus Nord, Barcelona</addr-line>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Mathematics, Statistics and Computation Department, University of Cantabria</institution>
          <addr-line>Avda. de los Castros s/n, Santander</addr-line>
          ,
          <country country="ES">Spain</country>
        </aff>
      </contrib-group>
      <fpage>98</fpage>
      <lpage>113</lpage>
      <abstract>
        <p>Educational Data Mining (EDM) is a growing eld of use of data analysis techniques. Speci cally, we consider partial implications. The main problems are, rst, that a support threshold is absolutely necessary but setting it \right" is extremely di cult; and, second, that, very often, large amounts of partial implications are found, beyond what an EDM user would be able to manually inspect. Our program yacaree, recently developed, is an associator that tackles both problems. In an EDM context, our program has demonstrated to be competitive with respect to the amount of partial implications output. But \ nding few rules" is not the same as \ nding the right rules". We extend the evaluation with a deeper quantitative analysis and a subjective evaluation on EDM datasets, eliciting the opinion of the instructors of the courses under analysis to assess the pertinence of the rules found by di erent association miners.</p>
      </abstract>
      <kwd-group>
        <kwd>Closure Lattices</kwd>
        <kwd>Partial Implications</kwd>
        <kwd>Association Rules</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>Education is evolving at all levels since the appearance of e-learning
environments: Learning Content Management Systems (LCMS), Intelligent Tutoring
Systems, or Adaptive Educational Hypermedia Systems. These systems log all
the activity carried out by students and instructors, and this raw data,
adequately analyzed, might help instructors to obtain a better understanding of
the students and of their learning processes. In remote learning, instructors may
never see their students in person. Data analysis techniques could help them to
detect problems (lack of motivation, under-performance, drop-out. . . ) and,
possibly, to take action. Yet, unless the course itself is on data mining, it is unlikely
that the instructors know much about data mining techniques. If we want to
help teachers of, say, philology or law, we need to work out data mining tools
that do not require much tuning or technical understanding.</p>
      <p>
        Here we focus on the particular case of mining partial implications [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] (a
relaxed form of implication analysis in concept lattices [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]), and their close
relatives: association rules [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. Most of the available algorithms depend on one or
more parameters whose value is to be set by the user, and whose semantics are
unlikely to be easy to understand by teachers of other disciplines.
      </p>
      <p>We have explored the output of ve association algorithms on datasets from
educational sources, and evaluated not only the amounts of partial implications
found but also the subjective pertinency of the rules obtained. For this last task
we kept close cooperation with the end user, namely, the teachers of the online
courses from which the datasets were obtained. Our conclusions are in the form
of strengths and weaknesses of each of the ve algorithms compared.</p>
      <p>
        One of the algorithms participating in the evaluation was a contribution of
our group, demonstrated at [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] and described in more detail in [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]: the yacaree
association miner. This associator extracts partial implications from the \iceberg"
(frequent part of the) FCA lattice [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]; it attempts at o ering a more user-friendly,
parameter-less interface, through self-tuning the support threshold and a
threshold on a relative form of con dence studied in [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]: the closure-based con dence
boost.
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], a two-page poster publication, we have provided a preliminary initial
description of this study, containing only the quantitative analysis (a part of
Table 2 below) but using a version of yacaree which did not report yet rules of
con dence 100%. This paper extends it largely with further quantitative
analyses and a qualitative, user-based, subjective evaluation of the usefulness of the
resulting rules. The main question to study is whether a price, in terms of
usefulness of the output for the end user, was being paid for the parameter-less
interface. Any parameter-free alternative should stand a comparison of its
output with that of other, \expert"-oriented algorithms, to clarify whether, for the
subjective perception of the teacher, the outcome does make sense and results
useful. Actually, our main conclusion is that they do, and that, developed
according to our strategy, a self-tuning associator is able to provide sensible quantities
of partial implications that result useful and informative to the end user.
1.1
      </p>
    </sec>
    <sec id="sec-2">
      <title>Related work</title>
      <p>
        In the educational context, data mining techniques are used in order to
understand learner behaviour [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], to recommend activities or topics [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], to o er
learning experiences [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] or to provide instructional messages to learners [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]
with the aim of improving the e ectiveness of the course, promoting group-based
collaborative learning [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ], or even predicting students' performance [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. Two
interesting papers which detail and summarize the application of data mining to
educational systems are [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] and [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ].
      </p>
      <p>
        The FCA community has also contributed in this arena. We must name
Romashkin et al. [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ] who used closed sets of students and their marks to reveal
some interesting patterns and implications in student assessment data, especially
to trace dynamic; and Ignatov et al. [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ] who showed that FCA taxonomies are
a useful tool for representing object-attribute data which helps to reveal some
frequent patterns and to present dependencies in data entirely at a certain level
of details. They carried out the analysis of university applications to the Higher
School of Economics as case study. Another interesting work in this research
line was previously carried out by Belohlavek et al. [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ] in order to evaluate
questionnaires.
      </p>
      <p>
        In the particular case of the association rules technique, we nd works such
as [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ] in which association rules are used to nd mistakes often made together
while students solve exercises in propositional logic, [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ] where rules are used to
discover the tools which virtual students employ frequently together during their
learning sessions, and [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ] where association rules and collaborative ltering are
used inside an architecture for making recommendations in courseware.
      </p>
      <p>
        However, association rule algorithms still have some drawbacks, as analyzed
in [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ]: mainly, rst, as most often the instructors are not data mining experts,
the decisions about setting to useful values the parameters of the algorithms
present di culties. Then, a second di culty is the large number of rules often
obtained as output, most of which are redundant and non-interesting for decision
making and, in many occasions, exhibit low understandability. The authors of
[
        <xref ref-type="bibr" rid="ref22">22</xref>
        ] o er some solutions although none of them is automatized or gathered in
an algorithm. For example, they propose to use Predictive Apriori, rather than
the implementation of Apriori in Weka [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ], since it only requires one parameter
which is the number of rules that the user wants to obtain. In [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ], it is argued
that cosine and added value (or equivalently lift) are well suited to educational
data, and that instructors can interpret their results easily. In our opinion, these
measures lack actionability since they are symmetric, which reduces the use of
the rules in decision making tasks. Orientation is a crucial and very suggestive
property of association rules and partial implications, and we consider that it
must be preserved in an e ective but asymmetric measure, as close as possible
to con dence. Many measures of intensity of implication are described e.g. in
[
        <xref ref-type="bibr" rid="ref25">25</xref>
        ],[
        <xref ref-type="bibr" rid="ref26">26</xref>
        ].
2
      </p>
      <sec id="sec-2-1">
        <title>Case Studies</title>
        <p>This section contains our major contributions: we compare the output of ve
well-known association rule miners on ve educational datasets and evaluate the
subjective pertinency of the rules obtained in close cooperation with the teachers
involved in the two virtual courses analyzed.
2.1</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Association rule miners</title>
      <p>
        There is a long list of association rule miners; large sets of references and surveys
appear e.g. in http://michael.hahsler.net/research/bib/association rules/ and in
all main Data Mining reference works. Among them, we have chosen the following
algorithms for our comparison: the implementation of Apriori by Borgelt [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ],
the implementation of Apriori in the Weka package [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ], the Predictive Apriori
implementation in Weka [
        <xref ref-type="bibr" rid="ref28">28</xref>
        ], the implementation of ChARM [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ] available in
the Coron System [
        <xref ref-type="bibr" rid="ref30">30</xref>
        ], and our own closure-lattice-based associator yacaree [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
      </p>
      <p>
        The implementation of Apriori by Borgelt [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ] is a representative of the
standard usage of association rules in data mining, as per [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], particularly in the way
support and con dence parameters are handled, as well as in the restriction to
association rules with a single item in the consequent. In this fully standard
approach, rst, one constructs all frequent sets, and then each item in each frequent
set is tried as consequent with the rest of the frequent itemset as antecedent,
and the con dence of the rule evaluated; the rule is reported if its con dence
is high enough. This implementation is amazingly well streamlined for speed. It
o ers, additionally, an ample repertory of additional evaluation measures (lift,
normalized chi-square. . . ), and we must warn that a speci c ag must be set
(as we did, \-o") so that support is computed accordingly with the notion of
support in other tools.
      </p>
      <p>
        Weka is one of the oldest and most extended open-source data mining suites,
and all implementations there are widely used. The implementation of Apriori
in the Weka package is similar to the one just described, employing con dence
and support constraints; it departs slightly from [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], though. First, the rules
generated can have more than one item in the consequent. Also, instead of xing
the support at the given threshold at once, the user is requested to indicate a
number of rules and a \delta" parameter. Then, support is set initially at 100%
and iteratively reduced by \delta" until either the support threshold is reached
or the requested number of rules is collected.
      </p>
      <p>
        The Predictive Apriori implementation in Weka follows [
        <xref ref-type="bibr" rid="ref28">28</xref>
        ]. The advantage
of this algorithm is that it only requires from the user to set the number of
rules to be discovered, which is appropriate for users that are not data mining
experts, provided that, in some sense, \the right rules" are found. The algorithm
automatically attempts at balancing optimally support and con dence on the
basis of Bayesian criteria related to the so-called expected predictive accuracy. A
disadvantage of this method is that it often requires longer running times than
the previous ones.
      </p>
      <p>
        These three implementations construct partial implications on the basis of all
frequent itemsets. Our other two systems work on the basis of frequent closures,
which allow one to know the support of any frequent itemset without storing
all of them. The Coron system [
        <xref ref-type="bibr" rid="ref30">30</xref>
        ] o ers several implementations of di erent
closed-set-based algorithms. These methods return the same set of closure-based
partial implications, although they compute them in di erent ways. We have
used ChARM [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ], but the speci c method is not relevant here because we do
not include yet running times in our evaluation: we concentrate on the usefulness
of the output.
      </p>
      <p>
        The fth implementation is our own association miner yacaree [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. Like
ChARM, it is based on closures, and allows for several items in the consequent
of the partial implications. In the partial implications output by this system,
both antecedent and total set of items in each rule will be closed sets. The
currently most recent version 1.2.0 is the rst to report rules of con dence 100%.
      </p>
      <p>
        First, it constructs the Closure Lattice up to a support bound that is adjusted
autonomously during the run, on the basis of the technological limitations, so
that the user does not need to select it. Second, it constructs a basis of partial
implications out of these closures. Third, it lters the partial implications along
the way, on the basis of the closure-based con dence boost [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], whereby the
condence of an association rule is compared to that of other similar rules: a rule
must o er a clear improvement on similar ones to be considered useful.
2.2
      </p>
    </sec>
    <sec id="sec-4">
      <title>Datasets</title>
      <p>For the case studies, we used the data from two courses o ered in the University
of Cantabria. Both courses are eminently practical. The rst one, entitled
\Introduction to multimedia methods", has the objective of teaching the students how
to use a particular multimedia tool (in what follows, we refer to it as the
multimedia dataset) and the second one, \Basic administration of a UNIX-LINUX
system" (the Linux dataset) teaches the students the basic utilities and tools to
install and con gure correctly a LINUX operating system.</p>
      <p>The multimedia course is designed by means of web pages and includes some
video tutorials, ash animations and interactive elements. The students must
perform 4 exercises, 2 projects and one nal exam online. The course is open to
all degrees and the number of students enrolled was 79.</p>
      <p>Unlike the multimedia course, the Linux course only allows 24 students to
be enrolled, all of them from a telecommunications degree. All materials of the
course are available since the rst day of the course. Furthermore, the contents
of a previous edition of the course is also o ered in pdf; these les have the
advantage that they can be kept locally and used for study in case any technical
problem would prevent access to the updated les, but do not include all the
contents of the present edition. Additionally, during the course, the students
must deliver 6 practical exercises and pass two online exams. The course includes
38 self-tests, one for each topic of the course. The instructor indicates the topics
and self-tests that they must perform every week on the calendar.</p>
      <p>We worked with ve datasets. The rst one, \linux materials", gathers the
access logs to materials prepared by the instructor (html pages, pdf les, tests, and
so on) as used by each student in each learning session of the Linux course. The
datasets \linux resources" and "multimedia resources" are the session-wise log of
the resources and tools used by each student in each learning session(assessment,
content-pages, forum, and so on). It was immediately apparent that, in these
datasets, one speci c resource led to some \noise": the \organizer" resource acts
as front page of most sessions (near 84% in Linux and 85% in multimedia, as
the only other alternative is the access through the forum) and hence it appears
in many rules and creates many variants, mostly of low information contents.
Thus, we prepared two datasets, named \linux resources reduced" and
\multimedia resources reduced" respectively, which are identical to the second and
third dataset, except that the \organizer" resource is fully removed. The number
of di erent items and transactions of each dataset is shown in Table 1. For the
sake of better understanding, we show a diagram of the intents of the concept
lattice of the linux dataset above 13% support in Fig. 1.</p>
      <p>;
contentpage assignment
assessment
discussion
mygrades
contentpage
assignment
assignment
assessment
assignment
discussion</p>
      <p>assignment
assessment mygrades
discussion
assignment assessment discussion
assessment
mygrades
discussion
mygrades
With the aim of comparing several association programs, one di culty is always
the setting of the parameters, particularly the support, as the value chosen might
favor one particular algorithm in larger degree. In our case, there is an extra
level of di culty, as one of the participating algorithms, yacaree, self-tunes the
support on itself. In order to nd fair comparison grounds, we performed a brief
preprocessing.</p>
      <p>Running on one of the \Linux resources" dataset, yacaree took about four
minutes (a bit long for a non-expert to wait) and delved down to 0.02% support;
however, for this low threshold, both Weka alternatives were substantially worse
(Predictive Apriori took 40 minutes and Apriori led to over ow even when given
2GB of memory). Similar facts happened for the other datasets.</p>
      <p>Given this information, we decided to x at 1% the support threshold for all
the computations, and at 66% the con dence threshold (initial value set up by
yacaree). In all the runs, we left unbounded, or, in the case of Weka tools, we set
very high (10000) the number of rules to be found, even if this meant overriding
their default value for this quantity. We show the number of rules obtained
utilizing the di erent algorithms on our datasets in Table 2. The entries marked
\|" on the table are cases where the corresponding algorithm was unable to
complete in 6 hours.
Results from \resources reduced" datasets If we analyze the results
obtained with Apriori from Weka, we can see that the number of rules is
unmanageable, e.g. 4249 rules for Linux resources reduced dataset. The rst 243 are
implications of full con dence, 100%, low support, and high redundancy: see
rules 2 and 3 and 235 and 236 and the followings in Table 3. Had we used the
tool's default settings of the parameters, we would have found essentially no
information. The same happens with multimedia dataset (we do not show the
table for space reasons).</p>
      <p>The analysis of the results obtained from Predictive Apriori is very costly,
as it generates as many rules as we allow it to. With 10000 rules required, they
are obtained on dataset2 and dataset3 waiting for more than 20 minutes, and
the accuracy is still high, so that many further rules could be obtained. If we
restrict ourselves to the rst few rules returned, they turn out to o er a very low
support and quite some redundancy (see Table 4).</p>
      <p>The output o ered by Borgelt's implementation presents a large number of
rules: 1876 and 404 rules in Linux and multimedia reduced datasets respectively,
No. Association rule
2 announcement tracking ) assessment
3 announcement mygrades tracking) assessment
235 assignments calendar contentpage discussion medialibrary syllabus
) assessment
236 assessment calendar contentpage discussion medialibrary syllabus
) assignments
2523 announcement assessment calendar syllabus</p>
      <p>) assignments contentpage
2524 announcement assessment calendar syllabus</p>
      <p>) assignments discussion
2530 announcement calendar mail ) contentpage
2534 announcement assignments calendar chat ) contentpage</p>
      <p>No. Association rule (Support, Accuracy)
122 assignments calendar search ) syllabus (0.85, 0.95439)
123 assignments chat weblinks ) assessment syllabus (0.85, 0.95439)
124 assignments chat weblinks ) discussion syllabus (0.85, 0.95439)
125 assignments discussion search ) assessment syllabus (0.85, 0.95439)
of which 141 and 2 are implications. Coming up with speci c conclusions becomes
harder. The rules tend to be small, exhibit high redundancy and involve
lowsupport tools that are almost never used, so that they o er little interest to the
instructor. As shown in Table 5, where the rules 11, 12, 13 di er slightly from
the rules 99, 100 and 101 which contain the announcement tool in the antecedent
with a very low support and similar con dence.</p>
      <p>No. Association rule (Supp. , Conf. )
11 chat ) discussion (3.7, 84.9)
12 chat ) assignments (3.7, 75.6)
13 chat ) assessment (3.7, 81.4)
99 chat announcement ) discussion (2.0, 84.8)
100 chat announcement ) assignments (2.0, 87.0)
101 chat announcement ) assessment (2.0, 93.5)</p>
      <p>ChARM returns a higher number of rules, 2586 and 469 with 193 and 2
implications in Linux and multimedia resources reduced datasets respectively.</p>
      <p>As in previous cases, the rules also present high redundancy (see rules 3 to 6
and 7 and 8 in Table 6 and rules 10,11,12 and 31,32,33 in Table 7).
No. Association rule (Supp. , Conf. )
3 announcement, contentpage, medialibrary, syllabus ) assessment (1.02, 96.00)
4 announcement, assessment, medialibrary, syllabus ) contentpage (1.02, 88.89)
5 announcement, assessment, contentpage, medialibrary ) syllabus (1.02, 70.59)
6 announcement, medialibrary, syllabus ) assessment, contentpage (1.02, 82.76)
7 announcement, medialibrary, syllabus ) contentpage (1.07, 86.21)
8 announcement, contentpage, medialibrary ) syllabus (1.07, 67.57)</p>
      <p>No. Association rule (Supp. , Conf. )
10 chat, contentpage, discussion ) assessment (1.13, 81.01)
11 assessment, chat contentpage ) discussion (1.13, 94.12)
12 chat, contentpage ) assessment, discussion (1.13, 71.91)
31 contentpage, discussion, syllabus, ) assessment (1.12, 84.00)
32 assessment, discussion, syllabus, ) contentpage (1.12, 66.32)
33 assessment, contentpage, syllabus, ) discussion (1.12, 79.75)</p>
      <p>Despite the fact that the number of rules obtained with yacaree on reduced
resources datasets is a bit high, 93 for dataset3 and 46 for dataset5, it is possible
to discover the resources which students use frequently together in each learning
session and, at the same time, the kind of sessions which they perform. It is
remarkable the reduction in the number of rules due to the use of con dence
boost parameter. A subset of the most relevant rules obtained with yacaree on
Linux resources reduced dataset is shown in Table 8. However, there appear as
well quite a few trivial and non-interesting rules for the instructor. For instance,
rule 1 is trivial because it is obvious that to send a task is necessary to use the
le manager tool. The rules 6, 18 and 19 do not o er new information to the
instructor given that he uses the forum in order to establish the date of the
exams. So that these kind of sessions are known to the instructor. The rules 7,
12, 36 and 50 gather sessions in which students want to know speci c dates:
deadlines for tasks or assessments, exam dates. Rule 16 indicates quite a few
sessions in which the students are interested in knowing their progress, and rules
8 and 10 gather the study sessions in which the students combine reading of
content pages with tackling self-tests.</p>
      <p>Table 9 depicts a subset of the most relevant rules obtained with yacaree
on multimedia resources reduced dataset. As in the previous result, there are
No. Association rule (Supp., Conf., Lift, Cboost)
1 lemanager ) assignments (4.6, 93.9, 1.908, 1.908)
6 discussion whoisonline ) assessment (3.0, 75.5, 1.648, 1.379)
18 discussion mail ) assessment (3.2, 72.1, 1.574, 1.268)
19 announcement mail ) assessment discussion (1.6, 80.9, 3.381, 1.267)
7 announcement ) assessment (7.6, 88.1, 1.923, 1.369)
12 calendar ) assessment (9.1, 75.9, 1.656, 1.337)
36 calendar ) assignments (8.1, 67.0, 1.362, 1.219)
50 announcement calendar ) assessment assignments (2.6, 77.2, 2.941, 1.200)
16 tracking ) mygrades (6.8, 80.3, 2.409, 1.272)
8 contentpage mygrades ) assessment (3.8, 84.8, 1.850, 1.369)
10 contentpage discussion ) assessment (7.3, 75.1, 1.639, 1.339)
some trivial and non-interesting rules for the instructor. For example, rule 1
already explained, and rule 2 and 40 which gather sessions in which students
wanted to know speci c dates for assignments. Instead, other rules as rule 7, 14
and 36 allowed the teacher to discover the students visited the content pages
and the forum in working sessions with the aim at solving problems or doubts
in the resolution of the tasks. Furthermore, she was happy when observed that
learning objectives tool was used while studying the contents (rule 3). This
means that students played the videotutorials which she had recorded with great
e ort. Additionally, rule 4 informed her about the joint use of contents and
weblinks tools. This last one contains the links to downloadable material. This
reinforced her idea that the material should be presented in both formats, online
and downloadable.</p>
      <p>No. Association rule (Supp., Conf., Lift, Cboost)
1 lemanager ) assignments (5.1, 71.5, 1.871, 1.871)
2 calendar ) assignments (6.1, 74.9, 1.961, 1.610)
40 announcement ) assignments (3.9, 67.2, 1.759, 1.153)
3 weblinks ) contentpage (3.7, 78.2, 2.105, 1.588)
4 learningobjectives ) contentpage (4.5, 81.4, 2.192, 1.530)
7 contentpage mygrades ) assignments (2.7, 66.7, 1.746, 1.421)
14 assignments whoisonline ) discussion (1.7, 72.5, 1.612, 1.301)
36 discussion weblinks ) assignments (1.9, 73.4, 1.923, 1.180)</p>
    </sec>
    <sec id="sec-5">
      <title>Results from \resources" datasets, not reduced From the point of view</title>
      <p>of a virtual course instructor who is not an expert in Data Mining, the decision
of removing the \organizer" item from the \resources" dataset is debatable. This
would be rather an action typical of a Data Mining expert. We consider that it
was appropriate to do it, as the designers of the e-learning platform could easily
predict that this \organizer" item was to be extremely frequent, and thus the
option of discarding it could be incorporated by design into a set of related data
mining tools ahead of time. However, we brie y discuss now what happens if one
works with the complete \resources" dataset.</p>
      <p>With yacaree we obtain 255 and 182 rules in dataset2 and dataset4
respectively. In both cases, one of them indicates that \organizer" is used in near 84%
and 85% of the sessions respectively (see Tables 10 and 11). For this format
of rule, with empty antecedent, support and con dence clearly must coincide.
Essentially, the output of yacaree is not that di erent from the previous cases:
many rules from the previous analysis reappear now in pairs, once with
\organizer" and once without; when such a pair appears, the rule having \organizer"
may look sometimes redundant, but its con dence boost value shows that it has
high enough con dence so as to make it nonredundant (see Tables 10 and 11).</p>
      <p>No. Association rule (Supp., Conf., Lift, Cboost)
2 ) organizer (83.9, 83.9, 1.000, 1.982)
158 mygrades tracking ) assessment organizer (4.6, 71.7, 1.888, 1.109)
287 mygrades tracking ) assessment (5.0, 78.6, 1.818, 1.096 )</p>
      <p>No. Association rule (Supp., Conf., Lift, Cboost)
1 ) organizer (84.9, 84.9, 1.000, 2.421)
9 chat ) discussion organizer (2.0, 77.6, 2.324, 1.283)
113 chat ) discussion (2.2, 84.2, 1.954, 1.085)</p>
      <p>The extra e ort to be spent on the yacaree output is not that high compared
with the alternative algorithms. ChARM and Borgelt's Apriori runs into the
same di culties indicated for the reduced datasets, increased by the fact that
the number of rules is, with ChARM, 5610 in dataset2 and 1427 in dataset4, and
with Borgelt, 3751 in dataset2 and 1023 in dataset4, which include a considerable
number of rules whose only consequent is \organizer". Intuitively, all of them are
pointing out to the fact that this item is so prevalent. Similarly, Weka Apriori
obtains over 7000 rules in dataset2 and 1442 in dataset4, of which the rst
568 are implications of 100% con dence, 474 of which are again rules that only
have \organizer" as consequent. Predictive Apriori, beyond taking 45 minutes
to complete, also generates a large amount of rules (which we limited to 10000
again); and again the rst ones have as single consequent \organizer", and the
next ones are long rules of very low support.</p>
    </sec>
    <sec id="sec-6">
      <title>Results from the \linux materials" dataset We show in the Table 12 some</title>
      <p>of the most relevant rules among the 40 rules, of which 16 are implications of
con dence 100%, selected by yacaree on this dataset. Such a limited output size
allows for easy inspection by the instructor.
No. Association rule (Supp., Conf., Lift, Cboost)
1 topic6 ) topic-pdf (13.3, 1.0, 2.544, 2.544)
2 topic7 ) topic-pdf (9.8, 1.0, 2.544, 2.500)
3 topic4 topic-pdf ) topic5 (6.4, 76.5, 5.764, 2.266)
18 topic1 topic3 ) topic2 (3.9, 72.7, 4.055, 1.377)
6 topic9 ) topic10 topic-pdf (0.057, 1.0, 7.537, 1.917)
7 topic10 topic7 ) topic8 topic-pdf (0.037, 1.0, 14.536, 1.875)
23 topic-pdf topic10 topic6 ) topic8 (2.9, 66.7, 9.690, 1.286)
40 exam2 topic-pdf ) topic10 (1.7, 77.8, 5.862, 1.167)
9 test2 ) test1 test3 (4.9, 71.4, 13.844, 1.667)
10 test9 ) test6 test7 test8 topic-pdf topic10 (2.5, 66.7, 27.133, 1.667)
14 test7 topic-pdf topic10 ) test6 test8 test9 (2.5, 76.9, 31.308, 1.538)
23 test9 ) test8 topic-pdf topic10 (3.4, 93.3, 23.742, 1.273)
28 test3 test4 ) test5 topic-pdf (2.7, 73.3, 14.213, 1.222)
The rules show that the course is divided clearly in two parts, up to topic
and test number 5 and the followings (see rules 2 and 18 and 6, 7 and 23 as
well as the set of rules from 9 to 28). The instructor observed that not all topics
get really studied: some are worked out only through self-tests (set rule from
9 to 28 with a higher support than the corresponding to topic rules). He was
very interested by these rules: rst, as many of them indicate that students do
not really study their assigned materials, but rather they undertake the tests
and only look at the study materials when they do not know the answer, hence
reversing the intended order of use of the materials; second, because they show
that the outdated, incomplete materials from the earlier edition of the course
(topic-pdf appears in most rules), which were thought of as a remedial o er for
cases of technical connectivity di culties only, were actually used much more
than intended, even in sessions devoted to learning through self-tests. The rst
seven rules shown in the table also seems to suggest that students checked at
what extent the contents of each topic di ers from the old compiled version
and as it was easier to manage and carry out searches, they frequently used it
with tests. Another piece of interesting information, as judged by the teacher, is
the fact that the topics in the second half of the course were consulted in more
sessions than the rst; this did match his perception that he had had to o er
more \moral support" to students on the brink of failure towards the end of the
course. Rule 38 shows a good support for exam2, which is not the case for exam1;
in fact, the exams are one-shot events. This unexpected support for exam2 was
due to technical problems: half the students lost their connections and had to
reconnect later in order to nish their exams, accounting for a misleadingly high
number of sessions. (The instructor was surprised that our association rules could
detect this.).</p>
      <p>With Coron's ChARM many of the rules generated are somewhat redundant
variants of the rules found by yacaree. Many other rules are also found:
essentially, longish rules of con dence 100% (see Table 13). The task of browsing
through the hundreds of rules, however, is slow and not user-friendly, and we do
not believe a regular instructor would display enough patience to nd out the
most instructive rules among those returned by the algorithm.</p>
      <p>No. Association rule (Supp. , Conf. )
6 topic7 topic9 topic10 topic-pdf ) topic8 (1.23, 100.00)
7 topic7 topic8 topic9 topic-pdf ) topic10 (1.23, 100.00)
8 topic7 topic8 topic9 topic10 ) topic-pdf (1.23, 100.00)
9 topic7 topic9 topic-pdf ) topic8 topic10 (1.23, 100.00)
65 test5 test7 test8 test9 topic10 topic-pdf ) test6 (1.47, 100.00)
66 test5 test6 test8 test9 topic10 topic-pdf ) test7 (1.47, 100.00)
67 test5 test6 test7 test9 topic10 topic-pdf ) test8 (1.47, 100.00)</p>
      <p>This objection also happens in Borgelt's implementation and worsens with
the Weka Apriori, which produces 2272 rules, of which 1522 are again longish
implications of con dence 100%. Still, one can see that some of the rules having
several items as consequent subsume into a single line several rules that the
classical scheme separates into one rule per consequent item. Predictive Apriori
generates 1730 rules, of which the rst handful are 100% con dence implications
with topic-pdf (the old material) as consequent, and the rest consists mostly of
rules of rather low support.
3</p>
      <sec id="sec-6-1">
        <title>Conclusions</title>
        <p>One of the drawbacks of some data mining algorithms is a dependence on
suitable parameter settings which can be di cult for \non-expert data miners" to
determine. Another aspect is the degree of di culty of interpretation of the
results. Although the results obtained by association rule miners can be considered
easy to interpret by end-users, the large number of rules generated by the more
commonly used algorithms, most of which contain facts that, intuitively, will
be seen as redundant by users, makes their interpretation and comprehension
di cult.</p>
        <p>
          Our comparison of di erent associators shows that they are vastly di erent
in mere quantitative terms (already advanced in [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ] and con rmed in this work);
most associators lead to voluminous output; on the other hand, yacaree provides
several dozen rules that may contain good knowledge yet will not overwhelm the
user.
        </p>
        <p>The main question, then, is: are they \the right ones?" Our educational
datasets seem to require a low support threshold, but do include items of rather
high support; and this combination seriously hinders the ability of traditional
association miners to o er interesting output. On the other hand, the most
recent version of yacaree, which includes implications of con dence 100%, seems
particularly well-suited to these cases, and nds rules of both high and low
supports; and indeed we nd that in most cases these rules \say di erent things".
All our conclusions have been thoroughly discussed with the instructors of the
virtual courses to which the datasets refer.</p>
        <p>Summarizing, we can say that yacaree o ers several advantages for
nonexpert data miners. First, it o ers a parameter-less interface, which makes its
usage easier. Second, it generates a reduced number of rules, as it works with
closed frequent itemsets, mines only a rule basis, and prunes the rules through
the con dence boost parameter. Third, it shows the support, con dence, lift
and con dence boost in the output at the same time, which allows end-users to
better assess the rules, once these measures are conveniently explained.</p>
        <p>The current (and previous) versions of yacaree present a limitation: by
default, it sets up the number of output rules to 50; our study reveals that this
condition should be removed or, at least, relaxed. Previous versions did not search
for full implications, and only the latest current version (1.2.0) does; our studies
con rm that this must be maintained, as a number of interesting implications
for our external user were missed in previous versions.</p>
        <p>As nal conclusion, our interaction with the instructors involved in the
virtual courses analyzed indicates that the results of yacaree are superior, in the
case of analyzing datasets coming from logs of educational learning systems, in
comparison with the rest of the algorithms used in our case study. This program
can be freely downloaded from SourceForge, and a link has been provided in the
web page on FCA software kindly maintained by prof. Uta Priss.</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Luxenburger</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Implications partielles dans un contexte</article-title>
          .
          <source>Mathematiques et Sciences Humaines</source>
          <volume>29</volume>
          (
          <year>1991</year>
          )
          <volume>35</volume>
          {
          <fpage>55</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Ganter</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wille</surname>
          </string-name>
          , R.:
          <source>Formal Concept Analysis: Mathematical Foundations</source>
          . Springer-Verlag (
          <year>1999</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Agrawal</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mannila</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Srikant</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Toivonen</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Verkamo</surname>
            ,
            <given-names>A.I.</given-names>
          </string-name>
          :
          <article-title>Fast discovery of association rules</article-title>
          . In:
          <article-title>Advances in Knowledge Discovery and Data Mining</article-title>
          . AAAI/MIT Press (
          <year>1996</year>
          )
          <volume>307</volume>
          {
          <fpage>328</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Balcazar</surname>
            ,
            <given-names>J.L.</given-names>
          </string-name>
          :
          <article-title>Parameter-free association rule mining with yacaree</article-title>
          . In Khenchaf,
          <string-name>
            <given-names>A.</given-names>
            ,
            <surname>Poncelet</surname>
          </string-name>
          , P., eds.
          <source>: EGC</source>
          . Volume
          <string-name>
            <surname>RNTI-E-</surname>
          </string-name>
          20 of Revue des Nouvelles Technologies de l'Information., Hermann-Editions (
          <year>2011</year>
          )
          <volume>251</volume>
          {
          <fpage>254</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Balcazar</surname>
            ,
            <given-names>J.L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Garc</surname>
          </string-name>
          a-Saiz, D., de la Dehesa, J.:
          <article-title>Iterator-based algorithms in self-tuning discovery of partial implications</article-title>
          . ICFCA,
          <string-name>
            <surname>Supplementary proceedings</surname>
          </string-name>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Stumme</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Taouil</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bastide</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pasquier</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lakhal</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Computing iceberg concept lattices with Titanic</article-title>
          .
          <source>Data Knowl. Eng</source>
          .
          <volume>42</volume>
          (
          <issue>2</issue>
          ) (
          <year>2002</year>
          )
          <volume>189</volume>
          {
          <fpage>222</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Balcazar</surname>
            ,
            <given-names>J.L.</given-names>
          </string-name>
          :
          <article-title>Formal and computational properties of the con dence boost in association rules</article-title>
          . Available at: [http://personales.unican.es/balcazarjl].
          <source>Extended abstract appeared as [31]</source>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Zorrilla</surname>
            ,
            <given-names>M.E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Garc</surname>
            a-Saiz,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Balcazar</surname>
            ,
            <given-names>J.L.</given-names>
          </string-name>
          :
          <article-title>Towards parameter-free data mining: Mining educational data with yacaree</article-title>
          .
          <source>[32] 363{364</source>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Hung</surname>
            ,
            <given-names>J.L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhang</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          :
          <article-title>Revealing online learning behaviors and activity patterns and making predictions with data mining techniques in online teaching</article-title>
          .
          <source>Journal of Online Learning and Teaching</source>
          <volume>4</volume>
          (
          <issue>4</issue>
          ) (
          <year>2008</year>
          )
          <volume>426</volume>
          {
          <fpage>436</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10. Zaane,
          <string-name>
            <surname>O.R.</surname>
          </string-name>
          :
          <article-title>Building a recommender agent for e-learning systems</article-title>
          .
          <source>In: Proc. of the International Conference on Computers in Education (ICCE)</source>
          , Washington, DC, USA, IEEE Computer Society (
          <year>2002</year>
          )
          <volume>55</volume>
          {
          <fpage>59</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Au</surname>
            ,
            <given-names>T.W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sadiq</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          :
          <article-title>Learning from experience: Can e-learning technology be used as a vehicle?</article-title>
          <source>In: Proceed ings of the fourth International Conference on e-Learing</source>
          , Toronto: Academic Publishing Limited (
          <year>2009</year>
          )
          <volume>32</volume>
          {
          <fpage>39</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Ueno</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Okamoto</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Bayesian agent in e-learning</article-title>
          .
          <source>IEEE International Conference on Advanced Learning Technologies</source>
          (
          <year>2007</year>
          )
          <volume>282</volume>
          {
          <fpage>284</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Perera</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kay</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Koprinska</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yacef</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          , Zaane,
          <string-name>
            <surname>O.R.</surname>
          </string-name>
          :
          <article-title>Clustering and sequential pattern mining of online collaborative learning data</article-title>
          .
          <source>IEEE Transactions on Knowledge and Data Engineering</source>
          <volume>21</volume>
          (
          <issue>6</issue>
          ) (
          <year>2009</year>
          )
          <volume>759</volume>
          {
          <fpage>772</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Romero</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ventura</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Educational data mining: A review of the state-of-theart</article-title>
          .
          <source>IEEE Tansactions on Systems, Man and Cybernetics</source>
          , part C:
          <article-title>Applications</article-title>
          and Reviews
          <volume>40</volume>
          (
          <issue>6</issue>
          ) (
          <year>2010</year>
          )
          <volume>601</volume>
          {
          <fpage>618</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Castro</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vellido</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nebot</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mugica</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Applying data mining techniques to e-learning problems</article-title>
          . In Kacprzyk, J.,
          <string-name>
            <surname>Jain</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tedman</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tedman</surname>
          </string-name>
          , D., eds.:
          <article-title>Evolution of Teaching and Learning Paradigms in Intelligent Environment</article-title>
          . Volume
          <volume>62</volume>
          of Studies in Computational Intelligence. Springer Berlin Heidelberg (
          <year>2007</year>
          )
          <volume>183</volume>
          {
          <fpage>221</fpage>
          10.1007/978-3-
          <fpage>540</fpage>
          -71974-8
          <fpage>8</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Romashkin</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ignatov</surname>
            ,
            <given-names>D.I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kolotova</surname>
          </string-name>
          , E.:
          <article-title>How university entrants are choosing their department? mining of university admission process with fca taxonomies</article-title>
          . [
          <volume>32</volume>
          ]
          <fpage>229</fpage>
          {
          <fpage>234</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Ignatov</surname>
            ,
            <given-names>D.I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mamedova</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Romashkin</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shamshurin</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>What can closed sets of students and their marks say</article-title>
          ? [
          <volume>32</volume>
          ]
          <fpage>223</fpage>
          {
          <fpage>228</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Belohlavek</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sklenar</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zacpal</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sigmund</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          :
          <article-title>Evaluation of questionnaires supported by formal concept analysis</article-title>
          . In Eklund, P.W.,
          <string-name>
            <surname>Diatta</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Liquiere</surname>
          </string-name>
          , M., eds.
          <source>: CLA</source>
          . Volume
          <volume>331</volume>
          of CEUR Workshop Proceedings., CEUR-WS.org (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Merceron</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yacef</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          :
          <article-title>Mining student data captured from a web-based tutoring tool: Initial exploration and results</article-title>
          .
          <source>Journal of Interactive Learning Research</source>
          <volume>15</volume>
          (
          <issue>4</issue>
          ) (
          <year>2004</year>
          )
          <volume>319</volume>
          {
          <fpage>346</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Zorrilla</surname>
            ,
            <given-names>M.E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Garc</surname>
            a-Saiz,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Mining service to assist instructors involved in virtual education</article-title>
          . In Zorrilla, M.E.,
          <string-name>
            <surname>Mazon</surname>
            ,
            <given-names>J.N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Oscar</surname>
            <given-names>Ferrandez</given-names>
          </string-name>
          , Garrigos,
          <string-name>
            <given-names>I.</given-names>
            ,
            <surname>Daniel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            ,
            <surname>Trujillo</surname>
          </string-name>
          , J., eds.:
          <source>Business Intelligence Applications and the Web: Models, Systems and Technologies. Information Science Reference (IGI Global Publishers) (September</source>
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Garc</surname>
            <given-names>a</given-names>
          </string-name>
          , E.,
          <string-name>
            <surname>Romero</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ventura</surname>
            , S., de Castro,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>An architecture for making recommendations to courseware authors using association rule mining and collaborative ltering</article-title>
          .
          <source>User Model. User-Adapt. Interact</source>
          .
          <volume>19</volume>
          (
          <issue>1-2</issue>
          ) (
          <year>2009</year>
          )
          <volume>99</volume>
          {
          <fpage>132</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Garc</surname>
            <given-names>a</given-names>
          </string-name>
          , E.,
          <string-name>
            <surname>Romero</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ventura</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Calders</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Drawbacks and solutions of applying association rule mining in learning management systems</article-title>
          .
          <source>In: Procs of the International Workshop on Applying Data Mining in e-Learning</source>
          .
          <article-title>(</article-title>
          <year>2007</year>
          )
          <volume>13</volume>
          {
          <fpage>22</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Witten</surname>
            ,
            <given-names>I.H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Frank</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          :
          <article-title>Data Mining: Practical Machine Learning Tools and Techniques (2ed)</article-title>
          . Morgan Kaufmann (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Merceron</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yacef</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          :
          <article-title>Interestingness measures for associations rules in educational data</article-title>
          . In de Baker,
          <string-name>
            <given-names>R.S.J.</given-names>
            ,
            <surname>Barnes</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            ,
            <surname>Beck</surname>
          </string-name>
          , J.E., eds.: EDM, www.educationaldatamining.org (
          <year>2008</year>
          )
          <volume>57</volume>
          {
          <fpage>66</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Geng</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hamilton</surname>
            ,
            <given-names>H.J.:</given-names>
          </string-name>
          <article-title>Interestingness measures for data mining: A survey</article-title>
          .
          <source>ACM Comput. Surv</source>
          .
          <volume>38</volume>
          (
          <issue>3</issue>
          ) (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Lenca</surname>
          </string-name>
          , P., Meyer, P.,
          <string-name>
            <surname>Vaillant</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lallich</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>On selecting interestingness measures for association rules: User oriented description and multiple criteria decision aid</article-title>
          .
          <source>European Journal of Operational Research</source>
          <volume>184</volume>
          (
          <issue>2</issue>
          ) (
          <year>2008</year>
          )
          <volume>610</volume>
          {
          <fpage>626</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Borgelt</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>E cient implementations of apriori and eclat</article-title>
          . In Goethals,
          <string-name>
            <given-names>B.</given-names>
            ,
            <surname>Zaki</surname>
          </string-name>
          , M.J., eds.
          <source>: FIMI</source>
          . Volume
          <volume>90</volume>
          of CEUR Workshop Proceedings., CEUR-WS.org (
          <year>2003</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28. Sche er, T.:
          <article-title>Finding association rules that trade support optimally against con - dence</article-title>
          .
          <source>In: In: 5th European Conference on Principles of Data Mining and Knowledge Discovery</source>
          . (
          <year>2001</year>
          )
          <volume>424</volume>
          {
          <fpage>435</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <surname>Zaki</surname>
            ,
            <given-names>M.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hsiao</surname>
            ,
            <given-names>C.J.:</given-names>
          </string-name>
          <article-title>E cient algorithms for mining closed itemsets and their lattice structure</article-title>
          .
          <source>IEEE Transactions on Knowledge and Data Engineering</source>
          <volume>17</volume>
          (
          <issue>4</issue>
          ) (
          <year>2005</year>
          )
          <volume>462</volume>
          {
          <fpage>478</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          30.
          <string-name>
            <surname>Kaytoue</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Marcuola</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Napoli</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Szathmary</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Villerd</surname>
            ,
            <given-names>J.:</given-names>
          </string-name>
          <article-title>The Coron System</article-title>
          . In
          <string-name>
            <surname>Boumedjout</surname>
          </string-name>
          , L.,
          <string-name>
            <surname>Valtchev</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kwuida</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sertkaya</surname>
          </string-name>
          , B., eds.: 8th International Conference on Formal Concept
          <string-name>
            <surname>Analsis (ICFCA) - Supplementary</surname>
            <given-names>Proceedings.</given-names>
          </string-name>
          (
          <year>2010</year>
          )
          <volume>55</volume>
          {58 (demo paper).
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          31.
          <string-name>
            <surname>Balcazar</surname>
            ,
            <given-names>J.L.</given-names>
          </string-name>
          :
          <article-title>Objective novelty of association rules: Measuring the con dence boost</article-title>
          . In Yahia, S.B.,
          <string-name>
            <surname>Petit</surname>
          </string-name>
          , J.M., eds.
          <source>: EGC</source>
          . Volume
          <string-name>
            <surname>RNTI-E-</surname>
          </string-name>
          19 of Revue des Nouvelles Technologies de l'Information.,
          <string-name>
            <surname>Cepadues-Editions</surname>
          </string-name>
          (
          <year>2010</year>
          )
          <volume>297</volume>
          {
          <fpage>302</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          32.
          <string-name>
            <surname>Pechenizkiy</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Calders</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Conati</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ventura</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Romero</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stamper</surname>
          </string-name>
          , J.C., eds.:
          <source>Procs of the 4th International Conference on Educational Data Mining, Eindhoven, The Netherlands, July 6-8</source>
          ,
          <year>2011</year>
          . In Pechenizkiy,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Calders</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            ,
            <surname>Conati</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Ventura</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Romero</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Stamper</surname>
          </string-name>
          , J.C., eds.: EDM, www.educationaldatamining.org (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>