Fig. 3From: Recognizing patterns of student’s modeling behaviour patterns via process miningProportion of non-operational log-in manipulationBack to article page