{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T02:46:57Z","timestamp":1747190817135,"version":"3.40.5"},"reference-count":41,"publisher":"Wiley","license":[{"start":{"date-parts":[[2022,8,30]],"date-time":"2022-08-30T00:00:00Z","timestamp":1661817600000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Applied Computational Intelligence and Soft Computing"],"published-print":{"date-parts":[[2022,8,30]]},"abstract":"<jats:p>Program accreditation is important for determining whether or not a program or institution meets quality standards. It helps employers to evaluate the programs and qualifications of their graduates as well as to achieve its strategic goals and its continuous improvement plans. Preparing for accreditation requires extensive effort. One of the required documents is the program\u2019s self-study report (SSR), which includes the PEO-SO map (which allocates the program\u2019s educational objectives (PEOs) to student learning outcomes (SOs)). It influences program structure design, performance monitoring, assessment, and continuous improvement. Professionals in each academic engineering program have designed their PEO-SO maps in accordance with their experiences. The problem with the incorrect design of map design is that the SOs are either missing altogether or cannot be assigned to the correct PEOs. The objective of this work is to use a hybrid data mining approach to design the correct PEO-SO map. The proposed hybrid approach utilizes three different data mining techniques: classification to find the similarities between PEOs, crisp association rules to find the crisp rules for the PEO-SO map, and rough set association rules to find the coarse association rules for the PEO-SO map. The work collected 200 SSRs of accredited engineering programs by the ABET-EAC. The paper presents the different phases of the work, such as data collection and preprocessing, building of three data mining models (classification, crisp association rules, and rough set association rules), and analysis of the results and comparison with related work. The validation of the obtained results by different fifty specialists (from the academic engineering field) and their recommendations were also presented. The comparison with other related works proved the success of the proposed approach to discover the correct PEO-SO maps with higher performance.<\/jats:p>","DOI":"10.1155\/2022\/1699976","type":"journal-article","created":{"date-parts":[[2022,8,31]],"date-time":"2022-08-31T00:50:08Z","timestamp":1661907008000},"page":"1-14","source":"Crossref","is-referenced-by-count":1,"title":["The Design of Academic Programs Using Rough Set Association Rule Mining"],"prefix":"10.1155","volume":"2022","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3224-1506","authenticated-orcid":true,"given":"Mofreh A.","family":"Hogo","sequence":"first","affiliation":[{"name":"Department of Electrical Engineering, Benha Faculty of Engineering, Benha University, Benha, Egypt"},{"name":"Department of Computer Science, University College in Umluj, University of Tabuk, Tabuk, Saudi Arabia"}]}],"member":"311","reference":[{"article-title":"Outcome-based learning: a case study","author":"S. Subbaraman","key":"1","doi-asserted-by":"crossref","DOI":"10.1109\/MITE.2013.6756371"},{"volume-title":"Guidelines for Assessment and Evaluation of Engineering and Engineering Technology Programs","year":"2007","author":"S. Balachandran","key":"2"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.4018\/ijicte.2019040108"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.28945\/323"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksues.2014.09.001"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.48084\/etasr.3751"},{"key":"7","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2020.105992","article-title":"Systematic ensemble model selection approach for educational data mining","volume":"200","author":"M. Injadat","year":"2020","journal-title":"Knowledge-Based Systems"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2019.01.007"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.03.358"},{"key":"10","doi-asserted-by":"crossref","DOI":"10.1016\/j.stueduc.2020.100875","article-title":"Educational Data Mining: Identification of factors associated with school effectiveness in PISA assessment","volume":"66","author":"F. Mart\u00ednez-Abad","year":"2020","journal-title":"Studies in Educational Evaluation"},{"issue":"2","key":"11","first-page":"386","article-title":"Analyzing the relationship between student\u2019s assignment submission behaviors and course achievement through process mining analysis","volume":"11","author":"G. Ak\u00e7apinar","year":"2020","journal-title":"T\u00fcrk Bilgisayar Ve Matematik E\u011fitimi Dergisi"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2894066"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2019.12.130"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2018.03.023"},{"article-title":"An automated system for collection and analysis of ABET curriculum requirements","author":"J. Alhiyafi","key":"15","doi-asserted-by":"crossref","DOI":"10.1109\/CSCI46756.2018.00133"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/j.teln.2017.01.007"},{"article-title":"Minimizing effort for ABET Student Outcomes Assessment while maintaining effective results","author":"J. Miller","key":"17","doi-asserted-by":"crossref","DOI":"10.1109\/CSCI.2016.0075"},{"article-title":"Class association rules mining-based rough set method","year":"2015","author":"T. Slimani","key":"18"},{"article-title":"Studies on the application of rough set analysis in mining of association rules and the realization in provincial road transportation management information system","author":"X. Zheng","key":"19","doi-asserted-by":"crossref","DOI":"10.1109\/ICICEE.2012.364"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/b978-0-12-385214-4.00003-9"},{"issue":"6","key":"21","first-page":"479","article-title":"A dataset of program educational objectives mapped to ABET outcomes: data cleansing, exploratory data analysis, and modeling","volume":"12","author":"A. Osman","year":"2018","journal-title":"International Journal of Computer and Information Engineering"},{"key":"22","first-page":"361","article-title":"Association rules mining algorithm based on a rough set","volume":"1","author":"J. Xun","year":"2012","journal-title":"Proc International Symposium on Information Technologies in Medicine and Education"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2008.06.003"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1016\/j.pec.2007.03.007"},{"issue":"3","key":"25","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1016\/B978-0-08-044894-7.01318-X","article-title":"Data mining for education","volume":"7","author":"R. S. Baker","year":"2010","journal-title":"International Encyclopedia of Education"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2018.04.002"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/69.991727"},{"article-title":"Network intrusion detection system using J48 Decision Tree","author":"S. Sahu","key":"28","doi-asserted-by":"crossref","DOI":"10.1109\/ICACCI.2015.7275914"},{"article-title":"User movement prediction: the contribution of machine learning techniques","author":"S. Banitaan","key":"29","doi-asserted-by":"crossref","DOI":"10.1109\/ICMLA.2016.0100"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.3724\/sp.j.1001.2008.02597"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1145\/170036.170072"},{"issue":"1","key":"32","first-page":"307","article-title":"Fast discovery of association rules","volume":"12","author":"R. Agrawal","year":"1996","journal-title":"Advances in Knowledge Discovery and Data Mining"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1523\/jneurosci.0233-04.2004"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclinepi.2012.09.016"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1007\/bf01001956"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1016\/s0020-0255(02)00197-4"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1016\/s0377-2217(00)00167-3"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1016\/j.scienta.2006.03.006"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1080\/16742834.2013.11447112"},{"article-title":"European patent application No. 19880300330","year":"1993","author":"H. Takiguchi","key":"40"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2007.05.005"}],"container-title":["Applied Computational Intelligence and Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/acisc\/2022\/1699976.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/acisc\/2022\/1699976.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/acisc\/2022\/1699976.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,31]],"date-time":"2022-08-31T00:50:27Z","timestamp":1661907027000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/acisc\/2022\/1699976\/"}},"subtitle":[],"editor":[{"given":"Manikandan","family":"Ramachandran","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2022,8,30]]},"references-count":41,"alternative-id":["1699976","1699976"],"URL":"https:\/\/doi.org\/10.1155\/2022\/1699976","relation":{},"ISSN":["1687-9732","1687-9724"],"issn-type":[{"type":"electronic","value":"1687-9732"},{"type":"print","value":"1687-9724"}],"subject":[],"published":{"date-parts":[[2022,8,30]]}}}