Analysis of the Effectiveness of Online Learning Using Eda Data Science and Machine Learning

Authors

DOI:

10.33395/sinkron.v7i1.11206

Keywords:

Data Science, K-Means ,Exploratory Data Analysis, Clustering

Abstract

In educational institutions, it is important to evaluate the performance of lecturers. One aspect that can be used as a reference in assessing the performance of lecturers is the assessment in terms of teaching (learning - teaching process). Value data in the learning evaluation process can be further processed to classify or map the results of the learning evaluation. In this study, the authors use Data Science and Exploratory Data Analysis (EDA) techniques and apply the K-Means++ clustering algorithm using the Java programming language to determine the value of the learning process. group learning evaluation data. To determine the number of clusters to be formed, the elbow method is applied. Meanwhile, to measure the quality of each cluster formed, the silhouette coefficient method is applied. The elbow graph can visualize the Sum of Square Error (SSE) value as a way to determine the best k value in the clustering process. From the tests carried out 12 times, using 6 datasets with variations in 4 areas of assessment, 10 tests resulted in a value of k = 3, 10 tests produced a value of k = 4, and 1 test resulted in a value of k = 5 as the best number of clusters. In the cluster quality measurement process, 13 tests have good clustering quality, because on average they produce clusters that have a good structure with a Global Silhouette Coefficient > 0.65.

GS Cited Analysis

Downloads

Download data is not yet available.

References

Syahputra E.R., Sembing B.O., Dewi A.R., Hasdiana H. and Maulana H. 2018 Ads block management system using open Virtual Private Network on Ubuntu operating system International Journal of Engineering Technology 7 58-61 20182018

Y. Kong, B. Lyu, F. Chen and Z. Yang, "The Security Network Coding System With Physical Layer Key Generation in Two-Way Relay Networks," in IEEE Access, vol. 6, pp. 40673-40681, 2018

A. Lara and B. Ramamurthy, "OpenSec: Policy-Based Security Using Software-Defined Networking," in IEEE Transactions on Network and Service Management, vol. 13, no. 1, pp. 30-42, March 2016

H. Xie, Z. Yan, Z. Yao and M. Atiquzzaman, "Data Collection for Security Measurement in Wireless Sensor Networks: A Survey," in IEEE Internet of Things Journal, vol. 6, no. 2, pp. 2205-2224, April 2019

A. Abdou, P. C. van Oorschot and T. Wan, "Comparative Analysis of Control Plane Security of SDN and Conventional Networks," in IEEE Communications Surveys & Tutorials, vol. 20, no. 4, pp. 3542-3559, Fourthquarter 2018

A. Shameli-Sendi, Y. Jarraya, M. Pourzandi and M. Cheriet, "Efficient Provisioning of Security Service Function Chaining Using Network Security Defense Patterns," in IEEE Transactions on Services Computing, vol. 12, no. 4, pp. 534-549, 1 July-Aug. 2019

J. S. Aidan, H. K. Verma and L. K. Awasthi, "Comprehensive Survey on Petya Ransomware Attack," 2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS), Jammu, 2017, pp. 122-125

J. Ko, J. Jo, D. Kim, S. Choi and J. Kwak, "Real Time Android Ransomware Detection by Analyzed Android Applications," 2019 International Conference on Electronics, Information, and Communication (ICEIC), Auckland, New Zealand, 2019, pp. 1-5

A. O. Almashhadani, M. Kaiiali, S. Sezer and P. O’Kane, "A Multi-Classifier Network-Based Crypto Ransomware Detection System: A Case Study of Locky Ransomware," in IEEE Access, vol. 7, pp. 47053-47067, 2019

S. Iqbal and M. Zulkernine, "SpyDroid: A Framework for Employing Multiple Real-Time Malware Detectors on Android," 2018 13th International Conference on Malicious and Unwanted Software (MALWARE), Nantucket, MA, USA, 2018,pp. 1-8

O.P. Samantray, S. N. Tripathy and S. K. Das, "A study to Understand Malware Behavior through Malware Analysis," 2019 IEEE International Conference on System, Computation, Automation and Networking (ICSCAN), Pondicherry, India, 2019, pp. 1-5

S. M. Pudukotai Dinakarrao, H. Sayadi, H. M. Makrani, C. Nowzari, S. Rafatirad and

H. Homayoun, "Lightweight Node-level Malware Detection and Network-level Malware Confinement in IoT Networks," 2019 Design, Automation & Test in Europe Conference & Exhibition (DATE), Florence, Italy, 2019, pp. 776-78

H.Garg and M. Dave, "Securing IoT Devices and SecurelyConnecting the Dots Using REST API and Middleware," 2019 4th International Conference on Internet of Things: Smart Innovation and Usages (IoT-SIU), Ghaziabad, India, 2019, pp. 1-6

V. S. A. A. A. Don, S. W. Loke and A. Zaslavsky, "IoT-Aided Charity: An Excess Food Redistribution Framework," 2018 3rd International Conference On Internet of Things: Smart Innovation and Usages (IoT-SIU), Bhimtal, 2018, pp. 1-6

A. K. Gupta and R. Johari, "IOT based Electrical Device Surveillance and Control System," 2019 4th International Conference on Internet of Things: Smart Innovation and Usages (IoT-SIU), Ghaziabad, India, 2019, pp. 1-5

M. A. López Peña and I. Muñoz Fernández, "SAT-IoT: An Architectural Model for a High-Performance Fog/Edge/Cloud IoT Platform," 2019 IEEE 5th World Forum on Internet of Things (WF-IoT), Limerick, Ireland, 2019, pp. 633-63

Z. Zhang, J. Zhang and T. Huang, "The Reliability Mapping Monitoring Method of Network Function Virtualization," 2018 IEEE 4th International Conference on Computer and Communications (ICCC), Chengdu, China, 2018, pp. 555-559

Y. Guo, T. Lin, K. Liang and G. Chen, "Network Quality Monitoring for Typical Power Services," 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), Chengdu, China, 2019, pp. 1437-1441

C. Ma, J. Zhang, Y. Zhao, M. F. Habib, S. S. Savas and B. Mukherjee, "Traveling repairman problem for optical network recovery to restore virtual networks after a disaster [invited]," in IEEE/OSA Journal of Optical Communications and Networking, vol. 7, no. 11, pp. B81-B92, 1 November 2015

K. Baohua, S. Changsheng and X. Xiaoshen, "Configuration design and networking of space information transmission backbone network," 2017 2nd International Conference on Frontiers of Sensors Technologies (ICFST), Shenzhen, 2017, pp. 345-349

A. S. Katasev and D. V. Kataseva, "Neural network diagnosis of anomalous network activity in telecommunication systems," 2016 Dynamics of Systems, Mechanisms and Machines (Dynamics), Omsk, 2016, pp. 1-4

S. van der Meer, J. Keeney, L. Fallon, S. Feghhi and A. de Buitléir, "Large-scale Experimentation with Network Abstraction for Network Configuration Management," 2019 22nd Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN), Paris, France, 2019, pp. 60-65

S. van der Meer, J. Keeney, L. Fallon, S. Feghhi and A. de Buitléir, "Large-scale Experimentation with Network Abstraction for Network Configuration Management," 2019 22nd Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN), Paris, France, 2019, pp. 60-65

F. López, F. J. Torres, V. A. Ramírez, D. A. Núñez, R. Corona and A. R. López, "Raspberry Pi for Implementation of Web Technology in an Automation Process," 2019 IEEE International Autumn Meeting on Power, Electronics and Computing (ROPEC), Ixtapa, Mexico, 2019, pp. 1-6

N. R. Sogi, P. Chatterjee, U. Nethra and V. Suma, "SMARISA: A Raspberry Pi Based Smart Ring for Women Safety Using IoT," 2018 International Conference on Inventive Research in Computing Applications (ICIRCA), Coimbatore, 2018, pp. 451-454

Hanane, L., 2015. Internet of Things and Network Management : LNMP, SNMP, COMAN protocols. IPv6 Forum.

Jacquout, A. et al., 2010. A New Management Method. IEEE IFIP Annual Mediterranean Ad Hoc Networking Worshop.

Karren, R., 2015. he Internet of Things : An Overview Understanding the Issues andChallenge of a More Connected World, Geneva, Switzerland: Internet Society.

Paykin, J., Krishnaswami, N. R. & Zdancewic, S., 2016. The Essence of Event-Driven Programming. Leibniz, Leibniz International Proceedings in Informatics.

Z. Yanping, J. Yuehui, C. Yidong and Q. Xirong, 2009. "The reasearch of hierarchy model for ad hoc network monitoring based on clustering,"2nd IEEE International Conference on Broadband Network & Multimedia Technology, Beijing, 2009, pp. 276-280.

Chandra, F., Arifianto, D. 2011. Jago Rangkaian Elektronika Rangkaian Sistem Otomatis. Jakarta Selatan: PT Kawan Pustaka.

Kadir, Abdul.,(2012). Panduan Praktis Mempelajari Aplikasi Mikrokontroler dan Pemrogramannya Menggunakan Arduino. Yogyakarta: Andi

Z. Zhou, C. An and J. Yang, "A Programmable Network Management Architecture for Address Driven Network," 2018 10th International Conference on Communications, Circuits and Systems (ICCCAS), Chengdu, China, 2018, pp. 199-206.

J Case, R Mundy, D Partain et al., Introduction and applicability statements for internet standard management framework[J], 2002.

Downloads


Crossmark Updates

How to Cite

Maulana, H., & Al-Khowarizmi, A.-K. (2022). Analysis of the Effectiveness of Online Learning Using Eda Data Science and Machine Learning. Sinkron : Jurnal Dan Penelitian Teknik Informatika, 6(1), 222-231. https://doi.org/10.33395/sinkron.v7i1.11206