Skip to main content
Top
Published in: Wireless Personal Communications 4/2021

08-04-2021

Assessing Teacher’s Performance Evaluation and Prediction Model Using Cloud Computing Over Multi-dimensional Dataset

Author: K. Kavitha

Published in: Wireless Personal Communications | Issue 4/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The main objective is to create a secured classifier for datasets based on clustering algorithm. K-means algorithm is one of the efficient techniques for mining large databases based on cloud computing platform to store large database with least cost. Cloud computing allows users to outsource their data. For multi-dimensional data the clustering technique is implemented which performs clustering of related elements without advance knowledge. The K-nearest neighbor classification is analyzed by using dataset under different conditions of parameters. In view of the above, the development of data management with a cloud computing is gaining more attention towards multi-dimensional datasets. It is a challenging task to obtain secured data in evolution of data mining technique based on cloud computing employed using classifier techniques. Quality of education depends largely on teacher’s ability, performance, knowledge, assessment and prediction on the basis of data mining techniques and clustering. These approaches permit the educational institution to decide and evaluate the classification rule to determine and recruit the best teacher based on knowledge by using cloud database which is a challenging task. The proposed technique provides secured cloud computing details regarding teacher’s recruitment, privacy of user’s input query, selecting the best teacher and hides the access patterns on cloud. The proposed idea is computed by extracting the data and proves that it provides better accuracy for selecting the best teachers and also improves the speed and constancy of recruitment application. The teacher’s recruitment is used in evaluating the ranks based on performance so that, the institution takes a better decision for recruitment.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Agrawal, R. & Srikant, R. (2000, May). Privacy-preserving data mining. In ACM sigmod record (Vol. 29, No. 2, pp. 439–450). ACM. Agrawal, R. & Srikant, R. (2000, May). Privacy-preserving data mining. In ACM sigmod record (Vol. 29, No. 2, pp. 439–450). ACM.
2.
go back to reference Ahmad, A., & Dey, L. (2007). A k-mean clustering algorithm for mixed numeric and categorical data. Data & Knowledge Engineering, 63(2), 503–527.CrossRef Ahmad, A., & Dey, L. (2007). A k-mean clustering algorithm for mixed numeric and categorical data. Data & Knowledge Engineering, 63(2), 503–527.CrossRef
3.
go back to reference Ahmadi, F. & Ahmad, M. S. (2013). Data mining in teacher evaluation system using WEKA. International Journal of Computer Applications, 63, 10. Ahmadi, F. & Ahmad, M. S. (2013). Data mining in teacher evaluation system using WEKA. International Journal of Computer Applications, 63, 10.
4.
go back to reference Badur, B. & Mardikyan, S. (2011). Analyzing teaching performance of instructors using data mining techniques. Informatics in Education-An International Journal, 10(2), 245–257. Badur, B. & Mardikyan, S. (2011). Analyzing teaching performance of instructors using data mining techniques. Informatics in Education-An International Journal, 10(2), 245–257.
5.
go back to reference Baradwaj, B. K. & Pal, S. (2012). Mining educational data to analyze students' performance. arXiv preprint arXiv:1201.3417. Baradwaj, B. K. & Pal, S. (2012). Mining educational data to analyze students' performance. arXiv preprint arXiv:1201.3417.
6.
go back to reference Bhasin, M. L. (2006). Data mining: A competitive tool in the banking and retail industries. The Chartered Accountant, pp.588–594. Bhasin, M. L. (2006). Data mining: A competitive tool in the banking and retail industries. The Chartered Accountant, pp.588–594.
7.
go back to reference Cao, N., Wang, C., Li, M., Ren, K., & Lou, W. (2014). Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Transactions on parallel and distributed systems, 25(1), 222–233.CrossRef Cao, N., Wang, C., Li, M., Ren, K., & Lou, W. (2014). Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Transactions on parallel and distributed systems, 25(1), 222–233.CrossRef
8.
go back to reference Chiang, W. Y. (2011). To mine association rules of customer values via a data mining procedure with improved model: An empirical case study. Expert Systems with Applications, 38(3), 1716–1722.CrossRef Chiang, W. Y. (2011). To mine association rules of customer values via a data mining procedure with improved model: An empirical case study. Expert Systems with Applications, 38(3), 1716–1722.CrossRef
9.
go back to reference Daneshgar, F., Van Toorn, C. & Schlagwein, D. (2012). A theoretical model of E-learning ability to support attainment of students’ graduate attributes. Daneshgar, F., Van Toorn, C. & Schlagwein, D. (2012). A theoretical model of E-learning ability to support attainment of students’ graduate attributes.
10.
go back to reference Di Vimercati, S.D.C., Foresti, S. & Samarati, P. (2012). October. Managing and accessing data in the cloud: Privacy risks and approaches. In Risk and Security of Internet and Systems (CRiSIS), 2012 7th International Conference on (pp. 1–9). IEEE. Di Vimercati, S.D.C., Foresti, S. & Samarati, P. (2012). October. Managing and accessing data in the cloud: Privacy risks and approaches. In Risk and Security of Internet and Systems (CRiSIS), 2012 7th International Conference on (pp. 1–9). IEEE.
11.
go back to reference Elmehdwi, Y., Samanthula, B.K. & Jiang, W. (2014, March). Secure k-nearest neighbor query over encrypted data in outsourced environments. In Data Engineering (ICDE), 2014 IEEE 30th International Conference on (pp. 664–675). IEEE. Elmehdwi, Y., Samanthula, B.K. & Jiang, W. (2014, March). Secure k-nearest neighbor query over encrypted data in outsourced environments. In Data Engineering (ICDE), 2014 IEEE 30th International Conference on (pp. 664–675). IEEE.
12.
go back to reference Fayyad, U., Piatetsky-Shapiro, G., & Smyth, P. (1996). From data mining to knowledge discovery in databases. AI magazine, 17(3), 37. Fayyad, U., Piatetsky-Shapiro, G., & Smyth, P. (1996). From data mining to knowledge discovery in databases. AI magazine, 17(3), 37.
13.
go back to reference Goil, S. & Choudhary, A. (1998, March). High performance data mining using data cubes on parallel computers. In Parallel Processing Symposium, 1998. IPPS/SPDP 1998. Proceedings of the First Merged International... and Symposium on Parallel and Distributed Processing 1998 (pp. 548–555). IEEE. Goil, S. & Choudhary, A. (1998, March). High performance data mining using data cubes on parallel computers. In Parallel Processing Symposium, 1998. IPPS/SPDP 1998. Proceedings of the First Merged International... and Symposium on Parallel and Distributed Processing 1998 (pp. 548–555). IEEE.
14.
go back to reference Goil, S., & Choudhary, A. (2000). Efficient parallel classification using dimensional aggregates. In M. J. Zaki & C. T. Ho (Eds.), Large-scale parallel data mining. Lecture notes in computer ccience. (Vol 1759, pp. 197–210). Berlin, Heidelberg: Springer. Goil, S., & Choudhary, A. (2000). Efficient parallel classification using dimensional aggregates. In M. J. Zaki & C. T. Ho (Eds.), Large-scale parallel data mining. Lecture notes in computer ccience. (Vol 1759, pp. 197–210). Berlin, Heidelberg: Springer.
15.
go back to reference Grossman, R. & Gu, Y. (2008, August). Data mining using high performance data clouds: experimental studies using sector and sphere. In Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining (pp. 920–927). ACM. Grossman, R. & Gu, Y. (2008, August). Data mining using high performance data clouds: experimental studies using sector and sphere. In Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining (pp. 920–927). ACM.
16.
go back to reference H.M., El Emary, I., Alyoubi, B.A. & Alyoubi, A.A. Application of intelligent data mining approach in securing the cloud computing. International Journal of Advanced Computer Science & Applications, 1(7), 151–159. H.M., El Emary, I., Alyoubi, B.A. & Alyoubi, A.A. Application of intelligent data mining approach in securing the cloud computing. International Journal of Advanced Computer Science & Applications, 1(7), 151–159.
17.
go back to reference Hijazi, S.T. & Naqvi, S.M.M. (2006). Factors Affecting Students'performance. Bangladesh E-Journal of Sociology, 3, 1. Hijazi, S.T. & Naqvi, S.M.M. (2006). Factors Affecting Students'performance. Bangladesh E-Journal of Sociology, 3, 1.
18.
go back to reference Hu, H., Xu, J., Ren, C. & Choi, B. (2011, April). Processing private queries over untrusted data cloud through privacy homomorphism. In Data Engineering (ICDE), 2011 IEEE 27th International Conference on (pp. 601–612). IEEE. Hu, H., Xu, J., Ren, C. & Choi, B. (2011, April). Processing private queries over untrusted data cloud through privacy homomorphism. In Data Engineering (ICDE), 2011 IEEE 27th International Conference on (pp. 601–612). IEEE.
19.
go back to reference Imandoust, S. B., & Bolandraftar, M. (2013). Application of k-nearest neighbor (knn) approach for predicting economic events: Theoretical background. International Journal of Engineering Research and Applications, 3(5), 605–610. Imandoust, S. B., & Bolandraftar, M. (2013). Application of k-nearest neighbor (knn) approach for predicting economic events: Theoretical background. International Journal of Engineering Research and Applications, 3(5), 605–610.
20.
go back to reference Kala, K., & Ramaraj, E. (2013). ERPCA: A novel approach for risk evaluation of multidimensional risk prediction clustering algorithm. International Journal on Computer Science and Engineering, 5(10), 894. Kala, K., & Ramaraj, E. (2013). ERPCA: A novel approach for risk evaluation of multidimensional risk prediction clustering algorithm. International Journal on Computer Science and Engineering, 5(10), 894.
21.
go back to reference Kavitha, K. (2016). Ranking interesting rules for recognizing best teacher using multidimensional datacube. Kavitha, K. (2016). Ranking interesting rules for recognizing best teacher using multidimensional datacube.
22.
go back to reference Khorshed, M.T., Ali, A.S. & Wasimi, S.A. (2011, November). Monitoring insiders activities in cloud computing using rule based learning. In Trust, Security and Privacy in Computing and Communications (TrustCom), 2011 IEEE 10th International Conference on (pp. 757–764). IEEE. Khorshed, M.T., Ali, A.S. & Wasimi, S.A. (2011, November). Monitoring insiders activities in cloud computing using rule based learning. In Trust, Security and Privacy in Computing and Communications (TrustCom), 2011 IEEE 10th International Conference on (pp. 757–764). IEEE.
23.
go back to reference Khorshed, M. T., Ali, A. S., & Wasimi, S. A. (2012). A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing. Future Generation computer systems, 28(6), 833–851.CrossRef Khorshed, M. T., Ali, A. S., & Wasimi, S. A. (2012). A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing. Future Generation computer systems, 28(6), 833–851.CrossRef
24.
go back to reference Liu, X. and Zhu, X., 2010, June. Study on the Evaluation System of Individual Credit Risk in commercial banks based on data mining. In Communication Systems, Networks and Applications (ICCSNA), 2010 Second International Conference on (Vol. 2, pp. 308–311). IEEE. Liu, X. and Zhu, X., 2010, June. Study on the Evaluation System of Individual Credit Risk in commercial banks based on data mining. In Communication Systems, Networks and Applications (ICCSNA), 2010 Second International Conference on (Vol. 2, pp. 308–311). IEEE.
25.
go back to reference López-García, D., Calvet-Mir, L., Di Masso, M., & Espluga, J. (2019). Multi-actor networks and innovation niches: university training for local Agroecological Dynamization. Agriculture and Human Values, 36(3), 567–579.CrossRef López-García, D., Calvet-Mir, L., Di Masso, M., & Espluga, J. (2019). Multi-actor networks and innovation niches: university training for local Agroecological Dynamization. Agriculture and Human Values, 36(3), 567–579.CrossRef
26.
go back to reference Minaei-Bidgoli, B., Kashy, D.A., Kortemeyer, G. & Punch, W.F. (2003, November). Predicting student performance: an application of data mining methods with an educational web-based system. In Frontiers in education, 2003. FIE 2003 33rd annual (Vol. 1, pp. T2A-13). IEEE. Minaei-Bidgoli, B., Kashy, D.A., Kortemeyer, G. & Punch, W.F. (2003, November). Predicting student performance: an application of data mining methods with an educational web-based system. In Frontiers in education, 2003. FIE 2003 33rd annual (Vol. 1, pp. T2A-13). IEEE.
27.
go back to reference Ming, F., Wang, D., Shi, W. N., Huang, A. J., Sun, W. Y., & Ye, L. (2018). Entropic uncertainty relations in the Heisenberg XXZ model and its controlling via filtering operations. Quantum Information Processing, 17(4), 1–17.MathSciNetCrossRef Ming, F., Wang, D., Shi, W. N., Huang, A. J., Sun, W. Y., & Ye, L. (2018). Entropic uncertainty relations in the Heisenberg XXZ model and its controlling via filtering operations. Quantum Information Processing, 17(4), 1–17.MathSciNetCrossRef
28.
go back to reference Missaoui, R., Jatteau, G., Boujenoui, A. and Naouali, S., 2007. Toward Integrating Data Warehousing with Data Mining Techniques. Data warehouses and OLAP: concepts, architectures, and solutions, 253. Missaoui, R., Jatteau, G., Boujenoui, A. and Naouali, S., 2007. Toward Integrating Data Warehousing with Data Mining Techniques. Data warehouses and OLAP: concepts, architectures, and solutions, 253.
29.
go back to reference Mollah, M.B., Islam, K.R. & Islam, S.S. (2012, April). Next generation of computing through cloud computing technology. In Electrical & Computer Engineering (CCECE), 2012 25th IEEE Canadian Conference on (pp. 1–6). IEEE. Mollah, M.B., Islam, K.R. & Islam, S.S. (2012, April). Next generation of computing through cloud computing technology. In Electrical & Computer Engineering (CCECE), 2012 25th IEEE Canadian Conference on (pp. 1–6). IEEE.
30.
go back to reference Ola, A. & Pallaniappan, S. (2013). A data mining model for evaluation of instructors’ performance in higher institutions of learning using machine learning algorithms. International Journal of Conceptions on Computing and Information Technology, 1. Ola, A. & Pallaniappan, S. (2013). A data mining model for evaluation of instructors’ performance in higher institutions of learning using machine learning algorithms. International Journal of Conceptions on Computing and Information Technology, 1.
31.
go back to reference Pal, A. K., & Pal, S. (2013). Evaluation of teacher’s performance: a data mining approach. IJCSMC, 2(12), 359–369. Pal, A. K., & Pal, S. (2013). Evaluation of teacher’s performance: a data mining approach. IJCSMC, 2(12), 359–369.
32.
go back to reference Pears, R. L., Usman, M., & Fong, A. (2012). Data guided approach to generate multi-dimensional schema for targeted knowledge discovery. Pears, R. L., Usman, M., & Fong, A. (2012). Data guided approach to generate multi-dimensional schema for targeted knowledge discovery.
33.
go back to reference Petre, R. S. (2012). Data mining in cloud computing. Database Systems Journal, 3(3), 67–71. Petre, R. S. (2012). Data mining in cloud computing. Database Systems Journal, 3(3), 67–71.
34.
go back to reference Phyu, T.N. (2009, March). Survey of classification techniques in data mining. In Proceedings of the International MultiConference of Engineers and Computer Scientists (Vol. 1, pp. 18–20). Phyu, T.N. (2009, March). Survey of classification techniques in data mining. In Proceedings of the International MultiConference of Engineers and Computer Scientists (Vol. 1, pp. 18–20).
35.
go back to reference Rao, R. V., & Selvamani, K. (2015). Data security challenges and its solutions in cloud computing. Procedia Computer Science, 48, 204–209.CrossRef Rao, R. V., & Selvamani, K. (2015). Data security challenges and its solutions in cloud computing. Procedia Computer Science, 48, 204–209.CrossRef
36.
go back to reference Romero, C., Ventura, S. (2010). Educational data mining: a review of the state of the art. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), 40(6), 601–618. Romero, C., Ventura, S. (2010). Educational data mining: a review of the state of the art. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), 40(6), 601–618.
37.
go back to reference Said, H. M., Alyoubi, B. A., El Emary, I., & Alyoubi, A. A. (2016). Application of intelligent data mining approach in securing the cloud computing. International Journal of Advanced Computer Science and Applications, 7(9), 151–159. Said, H. M., Alyoubi, B. A., El Emary, I., & Alyoubi, A. A. (2016). Application of intelligent data mining approach in securing the cloud computing. International Journal of Advanced Computer Science and Applications, 7(9), 151–159.
38.
go back to reference Samanthula, B. K., Elmehdwi, Y., & Jiang, W. (2015). K-nearest neighbor classification over semantically secure encrypted relational data. IEEE transactions on Knowledge and data engineering, 27(5), 1261–1273.CrossRef Samanthula, B. K., Elmehdwi, Y., & Jiang, W. (2015). K-nearest neighbor classification over semantically secure encrypted relational data. IEEE transactions on Knowledge and data engineering, 27(5), 1261–1273.CrossRef
39.
go back to reference Schubert, L., Jeffery, K. & Neidecker-Lutz, B. (2010). The future for cloud computing: Opportunities for European cloud computing beyond 2010 (public version 1.0). Schubert, L., Jeffery, K. & Neidecker-Lutz, B. (2010). The future for cloud computing: Opportunities for European cloud computing beyond 2010 (public version 1.0).
40.
go back to reference Wu, C. A., Lin, W. Y., Jiang, C. L., & Wu, C. C. (2011). Toward intelligent data warehouse mining: An ontology-integrated approach for multi-dimensional association mining. Expert Systems with Applications, 38(9), 11011–11023.CrossRef Wu, C. A., Lin, W. Y., Jiang, C. L., & Wu, C. C. (2011). Toward intelligent data warehouse mining: An ontology-integrated approach for multi-dimensional association mining. Expert Systems with Applications, 38(9), 11011–11023.CrossRef
41.
go back to reference Yadav, S.K. & Pal, S. (2012). Data mining: A prediction for performance improvement of engineering students using classification. arXiv preprint arXiv:1203.3832. Yadav, S.K. & Pal, S. (2012). Data mining: A prediction for performance improvement of engineering students using classification. arXiv preprint arXiv:1203.3832.
42.
go back to reference Zakrzewska, D. (2007). On integrating unsupervised and supervised classification for credit risk evaluation. Information technology and control, 36(1A), 98–102. Zakrzewska, D. (2007). On integrating unsupervised and supervised classification for credit risk evaluation. Information technology and control, 36(1A), 98–102.
Metadata
Title
Assessing Teacher’s Performance Evaluation and Prediction Model Using Cloud Computing Over Multi-dimensional Dataset
Author
K. Kavitha
Publication date
08-04-2021
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 4/2021
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-021-08394-3

Other articles of this Issue 4/2021

Wireless Personal Communications 4/2021 Go to the issue