{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T08:24:13Z","timestamp":1767169453067,"version":"build-2238731810"},"reference-count":42,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T00:00:00Z","timestamp":1729209600000},"content-version":"vor","delay-in-days":291,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Applied Computational Intelligence and Soft Computing"],"published-print":{"date-parts":[[2024,1]]},"abstract":"<jats:p>Studies on automatically predicting student learning outcomes often focus on developing and optimizing machine learning algorithms that fit the data captured from different education systems. This approach has a fatal weakness when it is used for disadvantaged groups, such as those with academic warnings or who have dropped out, because these groups are often much smaller than other common groups in number. The imbalanced data that have class distribution skew create a big challenge to training good classification models. The significant approach to tackle this challenge is applying oversampling methods to increase the number of minor classes; however, generating good new samples from the existing instances of a minor class is still a hard issue and requires new investigation. This study presents two new methods of handling data imbalance based on the original algorithms SMOTE and adaptive synthetic sampling (ADASYN), called Improved SMOTE (I_SMOTE) and Improved ADASYN (I_ADASYN). These modifications involve a new selecting fit candidate method based on a new similarity measurement and a roulette wheel selection to generate synthetic data samples. The aim is to rebalance data and therefore improve the prediction accuracy of minor groups. The proposal methods were designed and applied to education datasets, and they were tested on public datasets and a dataset collected from a Vietnamese university for evaluation. The experimental results on learning datasets showed the high potential of novel algorithms, I_SMOTE and I_ADASYN, for student academic performance problems in general and at\u2010risk student groups especially. Empirical results proved that the recall, precision, and F1\u2010score of the minority class of I_SMOTE and I_ADASYN are strongly better than the original balancing algorithms. Besides, the I_SMOTE and I_ADASYN also improve relatively by 6.6% and 8.0% of the ROC area compared to the original SMOTE and ADASYN, respectively.<\/jats:p>","DOI":"10.1155\/2024\/4795606","type":"journal-article","created":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T08:50:07Z","timestamp":1729241407000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Increment of Academic Performance Prediction of At\u2010Risk Student by Dealing With Data Imbalance Problem"],"prefix":"10.1155","volume":"2024","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2189-0036","authenticated-orcid":false,"given":"Nguyen Giap","family":"Cu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0378-4977","authenticated-orcid":false,"given":"Thi Lich","family":"Nghiem","sequence":"additional","affiliation":[]},{"given":"Thi Hoai","family":"Ngo","sequence":"additional","affiliation":[]},{"given":"Manh Tuong Lam","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Hong Quan","family":"Phung","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2024,10,18]]},"reference":[{"key":"e_1_2_10_1_2","unstructured":"MahmoudT. M. Abd-El-HafeezT. andBadawyA. A Framework for an E-Learning System Based on Semantic Web 2013."},{"key":"e_1_2_10_2_2","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2021.698490"},{"key":"e_1_2_10_3_2","doi-asserted-by":"publisher","DOI":"10.1002\/eng2.12482"},{"key":"e_1_2_10_4_2","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1529\/5\/052041"},{"key":"e_1_2_10_5_2","doi-asserted-by":"publisher","DOI":"10.3390\/educsci9040275"},{"key":"e_1_2_10_6_2","doi-asserted-by":"publisher","DOI":"10.1111\/jcal.12247"},{"key":"e_1_2_10_7_2","doi-asserted-by":"publisher","DOI":"10.3390\/app112411845"},{"key":"e_1_2_10_8_2","doi-asserted-by":"publisher","DOI":"10.1186\/s40561-022-00192-z"},{"key":"e_1_2_10_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3093563"},{"key":"e_1_2_10_10_2","doi-asserted-by":"publisher","DOI":"10.1088\/1757-899X\/1099\/1\/012077"},{"key":"e_1_2_10_11_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-21438-7_2"},{"key":"e_1_2_10_12_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-023-09084-w"},{"key":"e_1_2_10_13_2","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2022.0130627"},{"key":"e_1_2_10_14_2","doi-asserted-by":"publisher","DOI":"10.1613\/jair.953"},{"key":"e_1_2_10_15_2","first-page":"1322","volume-title":"2008 IEEE International Joint Conference on Neural Networks, Hong Kong, China","author":"He H.","year":"2008"},{"key":"e_1_2_10_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCTCT.2018.8551020"},{"key":"e_1_2_10_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2008.239"},{"key":"e_1_2_10_18_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46578-3_98"},{"key":"e_1_2_10_19_2","doi-asserted-by":"publisher","DOI":"10.3991\/ijet.v16i12.20699"},{"key":"e_1_2_10_20_2","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2022.0130652"},{"key":"e_1_2_10_21_2","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11030457"},{"key":"e_1_2_10_22_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2013.07.046"},{"key":"e_1_2_10_23_2","doi-asserted-by":"publisher","DOI":"10.18280\/isi.250502"},{"key":"e_1_2_10_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3119596"},{"key":"e_1_2_10_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICICCS56967.2023.10142516"},{"key":"e_1_2_10_26_2","doi-asserted-by":"publisher","DOI":"10.31449\/inf.v47i1.4519"},{"key":"e_1_2_10_27_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.caeai.2021.100018"},{"key":"e_1_2_10_28_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-021-05962-3"},{"key":"e_1_2_10_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/LA-CCI54402.2022.9981340"},{"key":"e_1_2_10_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIACT.2018.8350792"},{"key":"e_1_2_10_31_2","doi-asserted-by":"publisher","DOI":"10.33003\/fjs-2023-0703-1773"},{"key":"e_1_2_10_32_2","doi-asserted-by":"publisher","DOI":"10.34218\/IJARET.11.10.2020.078"},{"key":"e_1_2_10_33_2","doi-asserted-by":"publisher","DOI":"10.7753\/ijcatr0805.1003"},{"key":"e_1_2_10_34_2","doi-asserted-by":"publisher","DOI":"10.1613\/jair.1.11192"},{"key":"e_1_2_10_35_2","article-title":"Decision Tree Analysis on J48 Algorithm for Data Mining","author":"Bhargava R.","year":"2013","journal-title":"International Journal of Advanced Research in Computer Science and Software Engineering"},{"key":"e_1_2_10_36_2","unstructured":"SalzbergS. L. C4.5: Programs for Machine Learning 1994."},{"key":"e_1_2_10_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2016.2642787"},{"key":"e_1_2_10_38_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-59745-530-5_14"},{"key":"e_1_2_10_39_2","unstructured":"PlattJ. C. Sequential Minimal Optimization: A Fast Algorithm for Training Support Vector Machines 1998."},{"key":"e_1_2_10_40_2","unstructured":"Student-Drop-India2016 https:\/\/www.kaggle.com\/datasets\/imrandude\/studentdropindia2016."},{"key":"e_1_2_10_41_2","unstructured":"Uwezo 2017 Dataset https:\/\/data.humdata.org\/dataset\/a6fb7ed1-5614-4aa2-b391-3fc2a4a94217."},{"key":"e_1_2_10_42_2","unstructured":"Oman Dataset https:\/\/zenodo.org\/records\/5591907."}],"updated-by":[{"DOI":"10.1155\/acis\/9784853","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2025,6,28]],"date-time":"2025-06-28T00:00:00Z","timestamp":1751068800000}}],"container-title":["Applied Computational Intelligence and Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2024\/4795606","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T08:50:14Z","timestamp":1729241414000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2024\/4795606"}},"subtitle":[],"editor":[{"given":"Abidhan","family":"Bardhan","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2024,1]]},"references-count":42,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,1]]}},"alternative-id":["10.1155\/2024\/4795606"],"URL":"https:\/\/doi.org\/10.1155\/2024\/4795606","archive":["Portico"],"relation":{},"ISSN":["1687-9724","1687-9732"],"issn-type":[{"value":"1687-9724","type":"print"},{"value":"1687-9732","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1]]},"assertion":[{"value":"2024-01-25","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-09-27","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-10-18","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"4795606"}}