Admission Presection
Admission Presection
MACHINE LEARNING
A Project report submitted in partial fulfilment of the requirements for the
BACHELOR OF TECHNOLOGY
IN
Submitted by
ASSISTANT PROFESSOR
1
BABA INSTITUTE OF TECHNOLOGY AND SCIENCES
DEPARTMENT OF COMPUTER SCIENCE AND
ENGINEERING
CERTIFICATE
This is to Certify That the Project Work Entitled “UNIVERSITY ADMISSION PREDICTION
USING MACHINE LEARNING” is Bonafide work done by, Potti Raju (19NR1A0586),
Suru Sivaji (19NR1A05A5), Siddala Venuvathi (19NR1A05A0) and Nowpada Dharmaraju
(19NR1A0575) during the year 2019-2023 in partial fulfilment of the requirements for the award of
the degree of BACHELOR OF TECHNOLOGY from BABA INSTITUTE OF TECHNOLOGY
AND SCIENCES, Affiliated to J.N.T.U. Kakinada, P.M Palem, Madhurwada, Visakhapatnam.
EXTERNAL EXAMINER
2
DECLARATION
We, Potti Raju (19NR1A0586), Suru Sivaji (19NR1A05A5), Siddala Venuvathi (19NR1A05A0)
and Nowpada Dharma raju (19NR1A0575) of 4-1 semester B.Tech., in the department of
Computer Science and Engineering from BITS, Visakhapatnam, hereby declare that the project work
entitled “UNIVERSITY ADMISSION PREDICTION USING MACHINE LEARNING" is
carried out by us and submitted in partial fulfilment of the requirements for the award of Bachelor of
Technology in Computer Science and Engineering, under the guidance of MRS. T. CHAITANYA
in Baba Institute of Technology and Sciences during the academic year (2019-2023) and has not
been submitted to any other university for the award of any kind of degree.
PROJECT STUDENTS
3
ACKNOWLEDGEMENT
We would like to express our deep gratitude to our project guide Mrs.T.Chaitanya,
Assistant Professor, Department of Computer Science and Engineering, BITS, for his guidance
with unsurpassed knowledge and immense encouragement.
We are grateful to Mr. S. Durga Prasad, Head of the Department, Department of Computer
Science and Engineering, for providing us with the required facilities for the completion of the
project work.
We are very much thankful to the Principal Dr. Mr. Govinda Raju and Management, BITS,
PM Palem, for their encouragement and cooperation to carry out this work.
We express our thanks to all teaching faculty of Department of CSE, whose suggestions during
reviews helped us in accomplishment of our project. We would like to thank all non-teaching staff of
the Department of CSE, BITS for providing great assistance in accomplishment of our project.
We would like to thank our parents, friends, and classmates for their encouragement throughout
our project period. At last, but not the least, we thank everyone for supporting us directly or indirectly
in completing this project successfully.
4
TABLE OF CONTENTS
ABSTRACT 7
1. INTRODUCTION 8
1.6 TECHNOLOGIES 12
2.1.2 GLOSSARY 16
2.1.3 REFERENCES 16
5
2.2.5 OTHER NON-FUNCTIONAL REQUIREMNTS 25
3. ANALYSIS
3.1 INTRODUCTION 27
4. DESIGN
4.1 ARCHITECTURE 42
6
ABSTRACT
UNIVERSITY ADMISSION PREDICTION USING MACHINE LEARNING
In the present conditions, students regularly have difficulty finding a fitting institution to pursue higher
studies based on their profile. There are some advisory administrations and online apps that
recommend universities but they ask huge consultancy fees and online apps are not accurate. So, the
aim of this research is to develop a model that predicts the percentage of chances into the university
accurately. This model provides also the analysis of scores versus chance of prediction based on
historical data so that students can understand whether their profile is suitable or not. The proposed
model uses Linear Regression and Random Forest Algorithms but Cat Boost Algorithm is giving
highest accuracy.
KEYWORDS: Linear Regression, Random Forest Algorithms and Cat Boost Algorithm.
7
CHAPTER 1
1. INTRODUCTION
A person’s education plays a very important role in his life because the quality of education decides
their future. After they graduate, they often have several doubts that comes in their mind regarding
pursuing higher studies and to choose the best university. Most of the students prefer the universities
with global recognition. So, higher percentage of students from India prefers united states of America
to pursue higher studies. Even though there are universities with good reputation in India, graduate
students are facing difficulties to get an admission in good rated universities and also getting placed
is quite difficult as the number of working opportunities is quite low.
As students are not sure about which university is better, they invest time and money for the
guidance. Apart from consultancy offices and advisors, there are some blogs and websites that
encourage and guide the students about the chances of admission but those resources are not very
high accurate and cannot completely depend on that. When filling out admission inquiry forms,
educational institutes may use knowledge mining to concentrate on the most relevant details in the
data they have collected. It finds information hidden in the data that queries and reports are unable to
disclose.
This technique must be used to evaluate a collection of trends of students seeking admission in
college after collecting data from admission forms filled out by students seeking admission over many
years.
This paper establishes a machine learning model, which takes into account boundaries such as
GRE Score, TOEFL Score, the University Ranking, the Proposal Statement and the Recommendation
Letter Power, the Undergraduate GPA and the Study Experience.
After getting all the inputs, it predicts the chance of admission. On obscure test occasions, the
prepared model has substantial factual findings for the (like) estimate of the probability of
confirmation and, accordingly, offers an unprejudiced impression of measurement.
8
1.2 FEASIBILITY STUDY
The feasibility study is basically the test of proposed system in the light of its workability,
meeting the user’s requirements, effective use of resources and cost effectiveness.
The feasibility study describes pros and cons of undertaking a project before they invest the lot of
time and money into it. For feasibility analysis, some understanding of the major requirements for
the system is essential.
1. Economical Feasibility
2. Technical Feasibility
3. Operational Feasibility
• This study is carried out to check the economic impact that the system will have on the
organization. The amount of fund that the company can pour into the research and development
of the system is limited. The expenditures must be justified. Thus, the developed system as
well within the budget and this was achieved because most of the technologies used are freely
available. Only the customized products had to be purchased.
• For this project, the main cost is documentation cost.
• Technical feasibility assessment is focused on the present technical resource available in the
organization. It’s also evaluating the hardware and the software requirement of the proposed
system.
• Technical feasibility analysis is an attempt to study the project basically from a technician’s
angle.
• For this project no specific hardware or software are required. It required only latest version
of python.
9
1.2.3 OPERATIONAL FEASILBITY:
• The aspect of study is to check the level of acceptance of the system by the user. This includes
the process of training the user to use the system efficiently. The user must not feel threatened
by the system, instead must accept it as a necessity.
• The level of acceptance by the users solely depends on the methods that are employed to
educate the user about the system and to make him familiar with it. His level of confidence
must be raised so that he is also able to make some constructive criticism, which is welcomed,
as he is the final user of the system.
• For this project, it does not require any skill set operate it.
After they graduate, they often have several doubts that comes in their mind regarding pursuing
higher studies and to choose the best university. Most of the students prefer the universities with
global recognition. So, higher percentage of students from India prefer united states of America to
pursue higher studies. Even though there are universities with good reputation in India, graduate
students are facing difficulties to get an admission in good rated universities and also getting placed
is quite difficult as the number of working opportunities is quite low.
• This technique must be used to evaluate a collection of trends of students seeking admission in
college after collecting data from admission forms filled out by students seeking admission over
many years.
• As students are not sure about which university is better, they invest time and money for the
guidance.
In the model development, the dataset is consistently split into train and test set of 80% and 20%.
Train set has 400 profiles and test set has 100 profiles. The dataset used for modelling looks like this.
Pre-processing is a crucial step in method. The aim is to clean the data and prepare it for use in a
10
prediction algorithm. Few improvements are required for the data obtained from Occidental College
in order to make it suitable for the proposed machine learning algorithms.
Determining how to deal with missing data is a common problem in data cleaning. Since the function
in question could be a good predictor of the algorithm's outcome, it's critical to find missing entries,
locate them, and apply a treatment based on the variable form that enables us to use the data in the
model. The data was pre-processed and split into two classes at random: a training set and a testing
set.
• Now we can predict the percentage of chances. Recommended universities are also shown
where students with similar type of profile having higher chance of prediction
• The variable to be predicted is Chance of Admit. The steps involved in model development
are mentioned below.
GRE Score: Graduate Record Exam (GRE) score. The score will be out of 340 points (numeric).
TOEFL Score: Test of English as a Foreigner Language2 (TOEFL) score, which will be out of 120
points (numeric).
University Rating: University Rating that indicates the Bachelor University ranking among the other
universities. The score will be out of 5 (numeric).
SOP: Statement of purpose (SOP) which is a document written to show the candidate's life, ambitious
and the motivations for the chosen degree/ university. The score will be out of 5 points (numeric).
LOR: Letter of Recommendation Strength (LOR) which verifies the candidate professional
experience, builds credibility, boosts confidence and ensures your competency. The score is out of 5
points (numeric).
CGPA: Undergraduate GPA (CGPA) out of 10 (numeric).
Research: Research Experience that can support the application, such as publishing research papers
in conferences, working as research assistant with university professor (either yes or no) (categorical).
Chance of Admit: One dependent variable can be predicted which is chance of admission, that is
according to the input given will be ranging from 0 to 1 (numeric).
11
1.6 TECHNOLOGIES USED:
• UML
• HTML
• CSS
• PYTHON
• DJANGO
UML:
The Unified Modelling Language (UML) is an open method used to specify, visualize,
construct and document the artifacts of an object-oriented software-intensive system under
development offers a standard way to write a system's blueprints, including conceptual components
such as: Actors, Business processes and System’s components and activities.
HTML:
CSS:
• CSS stands for Cascading Style Sheets. It is a style sheet language which is used to describe
the look and formatting of a document written in markup language. It provides an additional
feature to HTML.
• CSS describes how HTML elements are to be displayed on screen, paper, or in other media
• CSS saves a lot of work. It can control the layout of multiple web pages all at once.
PYTHON:
12
keywords), and a syntax that allows programmers to express concepts in fewer lines of code
than might be used in languages such as C++or java.
DJANGO:
• Django is a Python framework that makes it easier to create web sites using Python.
• Django takes care of the difficult stuff so that you can concentrate on building your web
applications.
• Django is especially helpful for database driven websites. Django emphasizes reusability of
components, rapid development, and the principle of also referred to as DRY (don't repeat
yourself), and comes with ready-to-use features like login system, database connection and
CRUD operations (Create Read Update Delete).
13
CHAPTER 2
2.1 INTRODUCTION
• Correctness: User review is used to provide the accuracy of requirements stated in the
SRS. SRS is said to be perfect if it covers all the needs that are truly expected from the
system.
• Completeness: The SRS is complete if, and only if, it includes the following elements.
• Consistency: The SRS is consistent if, and only if, no subset of individual requirements
described in its conflict.
• Verifiability: SRS is correct when the specified requirements can be verified with a cost-
effective system to check whether the final software meets those requirements.
14
• Traceability: The SRS is traceable if the origin of each of the requirements is clear and if
it facilitates the referencing of each condition in future development or enhancement
documentation.
• Unambiguousness: SRS is unambiguous when every fixed requirement has only one
interpretation. This suggests that each element is uniquely interpreted. In case there is a
method used with multiple definitions, the requirements report should determine the
implications in the SRS so that it is clear and simple to understand.
• Testability: An SRS should be written in such a method that it is simple to generate test
cases and test plans from the report.
Document Conventions
We used “Times new roman” font for all the document, in this bold letter are used for headings
and normal letters are for content.
PURPOSE:
The main objective of this project is to help the students to save their time and money that they
have to spend at the education consultancy firms. And also, it will help them to limit their number of
applications to a small number by proving them the suggestion of the universities where they have the
best chance of securing admission thus saving more money on the application fees.
SCOPE:
• Providing accessibility to all users who have a valid user ID and password.
• User can upload dataset after data pre-processing. It can predict the chance of admission in
particular universities.
15
2.1.2 GLOSSARY:
TERM DEFINITION
HTTP Hyper Text Transfer Protocol
UML Unified Modeling Language
URL Uniform Resource Locator
HTML Hyper Text Markup Language
CSS Cascading Style Sheet
RF Random Forest
LR Logistic Regression
MAE Mean Absolute Error
MSE Mean Square Error
OS Operating System
2.1.3 REFERENCES:
[1] Acharya MS, Armaan A, Antony AS (2019) A comparison of regression models for prediction
of graduate admissions.
[2] Gupta N, Sawhney A, Roth D (2016) Will I get in? modeling the graduate admission process for
American universities. In: 2016 IEEE 16th international conference on data mining workshops
(ICDMW). IEEE
[3] Mishra, S. and Sahoo, S. (2016). A Quality Based Automated Admission
System for Educational Domain, pp. 221–223, International conference on Signal Processing,
Communication, Power and Embedded System (SCOPES)- 2016.
The main objective of this project is to help the students to save their time and money that they
have to spend at the education consultancy firms. a machine learning model, which takes into account
boundaries such as GRE Score, TOEFL Score, the University Ranking, the Proposal Statement and
the Recommendation Letter Power, the Undergraduate GPA and the Study Experience. After getting
all the inputs, it predicts the chance of admission.
16
2.2 REQUIREMENT SPECIFICATIONS:
In this, software interfaces which mean how software program communicates with each other or
users either in form of any language, code, or message are fully described and explained. Examples
can be shared memory, data streams, etc. These requirements include user interfaces (interaction logic
between software and user), screen layouts, buttons, functions on every screen, hardware interfaces
(here a team describes what devices the software is created for), and other relevant particularities.
Also, software interfaces like frontend and backend stack, database management system, etc. must
be included.
USER INTERFACES:
This tells about user interfaces how it will work and how it will be display like that. User interface is
part of software and is designed such a way that it is expected to provide the user insight of the
software. UI provides fundamental platform for human-computer interaction.
HARDWARE REQUIREMENTS:
The Collection of internal electronic circuits and external physical devices used in building a
computer is called Hardware.
The minimum hardware requirement specification for developing this project is as follows:
• RAM - 8 GB (min)
• Monitor - Any
17
SOFTWARE REQUIREMENTS:
A set of programs associated with the operation of a computer is called software. Software is the
part of the computer system which enables the user to interact with several physical hardware devices.
The minimum software requirement specifications for developing this project are as follows:
These are the requirements that the end user specifically demands as basic facilities that the
system should offer. All these functionalities need to be necessarily incorporated into the system as a
part of the contract. These are represented or stated in the form of input to be given to the system, the
operation performed and the output expected. They are basically the requirements stated by the user
which one can see directly in the final product, unlike the non-functional requirements.
Actors are external entities that interact with the system. Examples of actors include users and admin.
Description:
18
Description:
For this use case to be initiated Registered users can log in to the system. If it is a
successful login the user will be directed to the main home page. Else if the user enters invalid
information, he will be asked to check the entered information.
Flow of events:
Description:
• Every new user can register by clicking on “register now “link.
• Every new user needs to register themselves in the system with a unique name and email.
• The user will enter the details in the registration form according to the required fields.
• The fields include
User Name
Password
Mobile number
Locality
Address
city
State
19
Post condition: Registration page is displayed.
Flow of events:
Description:
For this use case to be initiated Here when the user will access our website the user will
be redirected to the home page where the home page will have will have the detail description about
our website and its features.
Pre-Condition: Each user must have a valid user id and password.
Description: For this use case to be initiated After User logging in successfully, the user can
upload dataset into dataset column.
20
Description:
For this use case to be initiated the dataset is subjected to machine learning classifiers are
used to calculated and displayed results. The user can select the desired split ratio and can choose
the required model to view the result from the dataset.
Description: For this use case to be initiated the user can upload the dataset and view their
uploaded dataset.
21
Description:
For this use case to be initiated Providing Security by entering valid username and password.
Security question is asked whenever user forgets password.
Flow of events:
• Whenever the user forgets password, the user is asked with security question.
• If the user doesn’t provide correct user name and password, the user cannot enter into
the system
Description:
For this use case to be initiated After using the information available with this site, user’s
logout of this system.
Flow of events: When the user is logged out of the system, the user goes to login page again.
Description:
For this use case to be initiated Admin can log in to the system. If it is a successful
login the admin will be directed to the main home page. Else if the user enters invalid information,
he will be asked to check the entered information.
22
Pre-Condition: Each admin must have a valid user id and password.
Flow of events:
Description:
For this use case to be initiated Admin can activate the registered users. Once he
activates then only the user can login into our system.
Name of the Use Case: Admin view user details
Description:
For this use case to be initiated Admin can view the user enter details into the system.
Admin can view the overall data in the browser.
Name of the Use Case: Results
23
Description:
For this use case to be initiated Admin can click the Results in the web page so calculated
Mean Square Error (MSE), Mean Absolute Error (MAE), Accuracy and F1-Score based on the
algorithms is displayed.
• Admin
• Data Preprocessing
• Machine Learning
MODULES DESCRIPTION:
User:
The User can register the first. While registering he required a valid user email and mobile for
further communications. Once the user register then admin can activate the user. Once admin
activated the user then user can login into our system.
User can upload the dataset based on our dataset column matched. For algorithm execution data must
be in float format. Here we took Graduate Admission dataset for testing purpose. User can also add
the new data for existing dataset based on our Django application.
User can click the Classification in the web page so that the data calculated Mean Absolute Error
(MAE), Mean Square Error (MSE) Accuracy and R2-Score based on the algorithms.
User can click Prediction in the web page so that user can write the review after predict the review
That will display results depends upon review like positive, negative or neutral.
Admin:
Admin can login with his login details. Admin can activate the registered users. Once he
activates then only the user can login into our system. Admin can view the overall data in the browser.
Admin can click the Results in the web page so calculated Mean Square Error (MSE), Mean Absolute
Error (MAE), Accuracy and F1-Score based on the algorithms is displayed.
All algorithms execution complete then admin can see the overall accuracy in web page.
24
Data Preprocessing:
A dataset can be viewed as a collection of data objects, which are often also called as a records,
points, vectors, patterns, events, cases, samples, observations, or entities.
Data objects are described by a number of features that capture the basic characteristics of an object,
such as the mass of a physical object or the time at which an event occurred, etc. Features are often
called as variables, characteristics, fields, attributes, or dimensions.
The data preprocessing in this forecast uses techniques like removal of noise in the data, the expulsion
of missing information, modifying default values if relevant and grouping of attributes for prediction
at various levels.
Machine learning:
Based on the split criterion, the cleansed data is split into 60% training and 40% test, then the
dataset is subjected to four machine learning classifiers such as Logistic Regression (LR), Support
Vector Machine (SVM), Random Forest (RF). The accuracy and F1-Score of the classifiers was
calculated and displayed in my results. The classifier which bags up the highest accuracy could be
determined as the best classifier
These are basically the quality constraints that the system must satisfy according to the project
contract. The priority or extent to which these factors are implemented varies from one project to
other. They are also called non-behavioural requirements.
• Portability
• Security
• Maintainability
• Performance
• Reusability
• Flexibility
25
Portability:
Security:
The web Application is secured by registration page and login page and Security question is
asked whenever user forgets password.
Maintainability:
This system can be maintained easily because it does not require skill sets. The only thing the
user needs to do is input the files and gets desired output.
Usability:
How easily the system supports the interactions of user with input and output of the applications.
The website is user-friendly which makes the user easier to use by its features.
Availability:
Our web Application is available for the user who ever provides the data and predict whether the
Getting admission on universities.
Throughput:
The total time taken by a system to take the input, process it and produces output based on the
given input.
CONCLUSION:
This SRS has given details of the application need to build.
26
CHAPTER 3
ANALYSIS
3.1 INTRODUCTION:
The goal is for UML to become a common language for creating models of object-oriented
computer software.
• Visualizing
• Specifying
• Constructing
• Documenting
Applications
The UML is intended primarily for the software-intensive system.
To understand the UML, you need to form a conceptual model of the language, and this
requires learning three major elements: the UML’s basic building blocks.
27
Building Blocks of the UML
The vocabulary of the UML encompasses three kinds of building blocks:
• Things
• Relationships
• Diagrams
Things are the abstractions that are first-class citizens in a model; relationships tie these things
together; diagrams group interesting collections of things.
• Structural things
• Behavioural things
• Grouping things
• Annotational things
Structural Things
Nouns that depict the static behaviour of a model are termed as structural things. They display
the physical and conceptual components. They include class, object, interface, node, collaboration,
component, and a use case.
Class:
A Class is a set of identical things that outlines the functionality and properties of an object.
It also represents the abstract class whose functionalities are not defined. Its notation is as follows;
28
Object:
An individual that describes the behaviour and the functions of a system. The notation of the
object is similar to that of the class; the only difference is that the object name is always underlined
and its notation is given below
Interface:
A set of operations that describes the functionality of a class, which is implemented whenever
an interface is implemented.
Collaboration:
It represents the interaction between things that are done to meet the goal. It is symbolized as
a dotted ellipse with its name written inside it.
Use case:
Use case is the core concept of object-oriented modelling. It portrays a set of actions executed
by a system to achieve the goal.
29
Actor:
It comes under the use case diagrams. It is an object that interacts with the system, for example,
a user.
Component:
Node:
Behavioural Things
They are the verbs that encompass the dynamic parts of a model. It depicts the behaviour of a
system. They involve state machine, activity diagram, interaction diagram, grouping things,
annotation things
State Machine:
It defines a sequence of states that an entity goes through in the software development
lifecycle. It keeps a record of several distinct states of a system component.
30
Interaction:
Grouping Things
It is a method that together binds the elements of the UML model. In UML, the package is the
only thing, which is used for grouping.
Package:
A package is the only thing that is available for grouping behavioural and structural things.
Annotation Things
It is a mechanism that captures the remarks, descriptions, and comments of UML model
elements. In UML, a note is the only Annotational thing.
Note:
It is used to attach the constraints, comments, and rules to the elements of the model. It is a
kind of yellow sticky note.
31
Relationships
It illustrates the meaningful connections between things. It shows the association between the
entities and defines the functionality of an application.
Dependency:
Dependency is a kind of relationship in which a change in the target element affects the source
element, or simply we can say the source element is dependent on the target element. It is one of the
most important notations in UML. It depicts the dependency from one entity to another.
Association:
A set of links that associates the entities to the UML model. It tells how many elements are
actually taking part in forming that relationship.
It is denoted by a dotted line with arrowheads on both sides to describe the relationship with the
element on both sides.
Generalization:
It portrays the relationship between a general thing (a parent class or superclass) and a specific
kind of that thing (a child class or subclass). It is used to describe the concept of inheritance.
32
Realization:
It is a semantic kind of relationship between two things, where one defines the behaviour to
be carried out, and the other one implements the mentioned behaviour. It exists in interfaces.
• Class diagram
• Interaction Diagram
• Use case Diagram
• State Diagram
• Activity Diagram
• Component Diagram
• Deployment Diagram
In UML there are five diagrams available to model the dynamic nature and use case diagram is
one of them. Now as we have to discuss the use case diagram is dynamic in nature, there should some
internal or external factors for making the interaction. The internal and external agents are known as
actors. use case diagram consists of actors, use case and their relationships. The diagram is used to
model the system of an application. A single use case diagram captures a particular functionality of a
system.
33
1.USER
In the above Use case Diagram system and user are the Actors and Register, Login,
machine learning, dataset view, prediction, predicting results, logout are the use cases.
Registration:
Every new user needs to register themselves in the system with a unique name and email.
Login:
Machine learning:
The user can select the desired split ratio and can choose the required model to view the result
from the dataset.
Dataset View:
After logging in successfully, the user can view their uploaded dataset.
34
Prediction:
After upload dataset in web application transform data into understandable form. The user
can predict outcomes from the system.
2.ADMIN
Login:
Activate:
Admin can activate the registered users. Once he activates then only the user can login into
our system.
User details:
Admin can view the user enter details into the system. Admin can view the overall data in the
browser.
35
FIG 3.2 USE CASE DIAGRAM
A sequence diagram is an interaction diagram that emphasizes the time ordering of messages.
Graphically, a sequence diagram is a table that shows objects arranged along x-axis and messages,
ordered in increasing time, along the y-axis.
A Collaboration is a society of classes, interfaces, and other elements that work together to provide
some cooperative behavior that’s bigger than the sum of all its parts.
36
3.3.1 SEQUENCE DIAGRAM:
Sequence diagram is a diagram that shows object interactions arranged in time sequence. In
particular it shows objects participating in the interaction and the sequence of messages exchanged.
It is a construct of a Message Sequence Chart. Sequence diagrams are sometimes called event
diagrams, event scenarios, and timing diagrams.
➢ Objects
➢ Links
➢ Messages
Like all other diagrams, sequence diagrams may contain notes and constrains.
37
User register with valid mail id and password once the user register then admin can activate the user.
User can select dataset for data pre-process techniques like removal of noise in the data, the expulsion
of missing information, modifying default values. Use the models like Confusion matrix,
Random forest Confusion matrix, cat boost Confusion matrix and machine learning. Generate
prediction form add data and admin can prediction results.
A sophisticated modelling tool can easily convert a collaboration diagram into a sequence diagram
and the vice versa. Hence, the elements of a Collaboration diagram are essentially the same as that of
a Sequence diagram.
• Objects
• Links
• Messages
38
After uploading the dataset into system, it requires some input parameters which are split size, machine
learning model for analysing the uploaded data. This communication should be transferred between
the user and system and represent it has an organization system.
It tends out to be an efficient way of modeling the interactions and collaborations in the external
entities and the system. It models event-based systems to handle the state of an object. It also defines
several distinct states of a component within the system. Each object/component has a specific state.
User and admin login with unique email Id and password. If its user login successfully then loads the
dataset otherwise again login. Add data to processing then admin view the user details and active
Users’ dataset. View the results predict the percentage of chances getting admission into the
university.
39
3.5 ACTIVITY DIAGRAM:
An activity diagram shows the flow from activity to activity. An activity is an ongoing non-
atomic execution within a state machine.
Activities ultimately result in some action, which is made up of executable atomic computations that
result in a change in state of the system or the return of a value.
An activity diagram shows the overall flow of control. Activity diagrams are constructed from a
limited repertoire of shapes, connected with arrows.
• A black circle represents the start (initial state) of the workflow, an encircled black circle
represents the end (final state).
40
FIG 3.5: ACTIVITY DIAGRAM
In our activity diagram it starts from initial state. From initial state it categorized into two activities
that is admin and the user. A solid line with an arrow represents the direction flow of the activities.
The arrow points in the direction of progressing activities. In system the dataset is splits and
trained. After training the final activity is to predict results. The user here using his/her credentials
registers/login in the web page and upload the dataset of a file. After uploading file, he/she will
select the split size and select the model.
After analysing data, it is again classified into two activities that is uploading the data and testing
the data. Here after analyzing the data by joining training data (60%) and testing data (40%) we
enter the data for prediction. Now the user views the prediction. The predicted results are given
by the system. After the results user logouts.
41
CHAPTER 4
DESIGN
4.1 ARCHITECTURE
In User registration, every new user needs to register themselves in the system with a unique name
and e-mail. After registration the registered users can log into the system. After logging in
successfully, the user can upload and view their dataset.
Collecting data for training the ML model is the basic step in the machine learning pipeline. The
predictions made by ML systems can only be as good as the data on which they have been trained.
42
Data cleaning are techniques are manual and automated, remove data incorrectly added or classified.
Here the process of the system is it will take dataset, splits the dataset and model training will be done
to generate results. The system can deliver the predicted results and can be displayed to the user.
43
Project flow is a convenient way to define and plan projects. It helps link project budget and schedule
to project activities and tasks.
Traditionally it is designed in the form of a chart or diagram which is a great tool to visually represent
how a project is supposed to produce and deploy its product. Simple tree-like lists or hierarchies of
project activities are also used to map out and depict project flow
The classes in a class diagram represent both the main objects and or interactions in the
application and the objects to be programmed. In the class diagram these classes are represented with
boxes which contain three parts:
In this context, a class defines the methods and variables in an object, which is a specific entity in a
program or the unit of code representing that entity.
44
FIG 4.3: CLASS DIAGRAM
In the above class diagram admin, user data pre-process and models are the classes. And in
each one has a collection of Objects. Each object has Some of Attributes, Methods and set of
Behaviours. In User Class Login and password are the attributes and load Dataset, pre-process,
recommendations etc are the operations.
45
In component diagram there will be two components they are:
1.System component:
The system component predicts the dataset, splits, and trained, as well as predicts the results.
2.User component:
In user component the user will register/login by giving credentials like name, email-id, phone
number, Locality, Address, city, State. The user uploads the file, select the split size and select the
model.
After viewing the results by the system and the user logouts.
Contents
46
• Deployment diagrams may also contain packages or subsystems, both of which are used to
group elements of your model into larger chunks.
47
4.6.1 USER INTERFACE DESIGN FOR USER REGISTRATION:
Register
Design for user registration here, user providing fields in registration page like user name, login id,
Enter Login Id
Password
LOGIN RESET
Design for the user login into his/her account after registration. when the registration page there are
some fields to enter by user like user id and password
48
49