2,688 Hits in 8.9 sec

Using Multiple Accounts for Harvesting Solutions in MOOCs

Jose A. Ruiperez-Valiente, Giora Alexandron, Zhongzhou Chen, David E. Pritchard
2016 Proceedings of the Third (2016) ACM Conference on Learning @ Scale - L@S '16  
The second is characterizing key factors within the course that affect it, and suggesting possible remedies that are likely to decrease the amount of cheating.  ...  In total, ∼2.5% of the users who earned a certificate in the course obtained the majority of their points by using this method, and ∼10% of them used it to some extent. This paper has two main goals.  ...  ACKNOWLEDGMENTS The first author wants to thank the projects 'eMadrid' (Regional Government of Madrid) under grant S2013/ICE-2715 and 'RESET' (Ministry of Economy and Competiveness) under grant RESET TIN2014  ... 
doi:10.1145/2876034.2876037 dblp:conf/lats/ValienteACP16 fatcat:3kqqrp42djgmzhjyiso7wjs4gm

Organization of taking exams of university students in online format: problems and opportunities

Egor Borisov, Elena Petrenko, Elena Zatsarinnaya, Alexey Romanov, Vera Cherkina, Lyudmila Sotnikova, V. Breskich
2020 E3S Web of Conferences  
The authors made attempts to study the main problems of University students passing exams and tests in an online format in order to avoid them in the future, and also developed ways to improve this technology  ...  Online learning, e-learning, e-learning tools and digital assessments are not innovations in the full sense of the word, but the widespread use of these technologies took place in mid-2020, due to the  ...  The third problem is related to ease of use for both academics and students.  ... 
doi:10.1051/e3sconf/202021708005 fatcat:zrrrrgd3frcb5pw4nnogjqfdz4

A Method for Thematic and Structural Visualization of Academic Content

Alexander Amigud, Joan Arnedo-Moreno, Thanasis Daradoumis, Ana-Elena Guerrero-Roldan
2017 2017 IEEE 17th International Conference on Advanced Learning Technologies (ICALT)  
He was part of us and when he died, all the actions stopped dead and there was no one to do them the way he did.  ...  for maintaining academic integrity that promotes accountability, accessibility and efficiency, preserves privacy, and minimizes disruption to the learning process.  ...  Joan Arnedo-Moreno, and Dr. Ana-Elena Guerrero-Roldan-for their guidance throughout this demanding and incredible journey. A special thanks goes to Dr.  ... 
doi:10.1109/icalt.2017.24 dblp:conf/icalt/AmigudADG17 fatcat:voezr7hg6nfcxlubzzgsbnzpi4

Identifying and characterizing students suspected of academic dishonesty in SPOCs for credit through learning analytics

Daniel Jaramillo-Morillo, José Ruipérez-Valiente, Mario F. Sarasty, Gustavo Ramírez-Gonzalez
2020 International Journal of Educational Technology in Higher Education  
We have developed a learning analytics algorithm to detect dishonest students based on submission time and exam responses providing as output a number of indicators that can be easily used to identify  ...  courses, compared to 62% for the rest of students.  ...  This publication reflects the views only of the authors, and the Commissionand the Agency cannot be held responsible for any use which may be made of the information contained therein.  ... 
doi:10.1186/s41239-020-00221-2 fatcat:u2oqi7eb7rgsvpxwarpm5nnire

Enhancing Trust in eAssessment - the TeSLA System Solution [article]

Malinka Ivanova, Sushil Bhattacharjee, Sebastien Marcel, Anna Rozeva, Mariana Durcheva
2019 arXiv   pre-print
The results of questionnaires to students and teachers involved in the TUS pilot tests are analyzed and summarized in this work.  ...  The use of biometric verification technologies to authenticate the identity and authorship claims of individual students in online-education scenarios is a significant component of TeSLA.  ...  Acknowledgements This work has been supported by the H2020 project TeSLA -An Adaptive Trust-based e-assessment System for Learning (grant №. 688520).  ... 
arXiv:1905.04985v1 fatcat:niwirsswkrbsnn7puhkpt7lufq

A Systematic Review of Deep Learning Approaches to Educational Data Mining

Antonio Hernández-Blanco, Boris Herrera-Flores, David Tomás, Borja Navarro-Colorado
2019 Complexity  
Deep Learning is a machine learning method based on neural network architectures with multiple layers of processing units, which has been successfully applied to a broad set of problems in the areas of  ...  Educational Data Mining (EDM) is a research field that focuses on the application of data mining, machine learning, and statistical methods to detect patterns in large collections of educational data.  ...  Conflicts of Interest The authors declare that there are no conflicts of interest regarding the publication of this paper.  ... 
doi:10.1155/2019/1306039 fatcat:dhrisvjatbhgnn77otztfjwgvi

User characterization for online social networks

Tayfun Tuna, Esra Akbas, Ahmet Aksoy, Muhammed Abdullah Canbaz, Umit Karabiyik, Bilal Gonen, Ramazan Aygun
2016 Social Network Analysis and Mining  
We believe our summary of analysis of user characterization will provide important insights to researchers and better services to online users.  ...  Online social network analysis has attracted great attention with a vast number of users sharing information and availability of APIs that help to crawl online social network data.  ...  the same usernames and names, analyze entity matching for multiple accounts of the same user in the same OSN, analyze user behavior for entity matching with respect to multiple OSNs, and increase the number  ... 
doi:10.1007/s13278-016-0412-3 fatcat:fragk2zfhzcffn6b3cu5nd662u

Hardwired to Monitor: An Empirical Investigation of Agency-Type Social Contracts in Business Organizations [chapter]

David M. Wasieleski
2011 Evolutionary Psychology in the Business Sciences  
En route to this goal, the research project empirically tests for the presence of cheater-detection/social-contract neural algorithms in a sample of business practitioners and undergraduate business students  ...  Rather, the neural circuits which formed in response to adaptive challenges facing our ancestors are susceptible to cultural influences, hierarchical arrangements, and organizational elaboration.  ...  hypotheses and deductive accounts which claim that humans' past experience and logical capabilities account for the detection of cheaters on tasks.  ... 
doi:10.1007/978-3-540-92784-6_8 fatcat:5qutbno6a5dmbnuotqivsfu7se

Educational Data Mining for Teaching and Learning

Zhi-Jun PEI
2017 DEStech Transactions on Social Science Education and Human Science  
of student performance, and detection of undesirable student behaviors.  ...  Educational Data Mining (EDM ) seeks to use plethora of data in educational context to better understand learners and learning.  ...  Acknowledgement This research was financially supported by Research Foundation of Tianjin University of Technology and Education under Grant No. KJY1312.  ... 
doi:10.12783/dtssehs/iced2017/15101 fatcat:martvco5vvaexftwlfggfwezwu

Predicting Student Performance and Deficiency in Mastering Knowledge Points in MOOCs Using Multi-Task Learning

Shaojie Qu, Kan Li, Bo Wu, Xuri Zhang, Kaihao Zhu
2019 Entropy  
to intervene and improve learning outcomes of students facing difficulties.  ...  However, there remain deficiencies in understanding the relationship between online behavior of students and their performance, and in verifying how well a student comprehends learning material.  ...  Multitask Learning Multi-task learning is a method of machine learning that uses the shared network to carry out multiple tasks at the same time to achieve a better learning effect.  ... 
doi:10.3390/e21121216 fatcat:e5ydaxg37fcjhbtcgioh4kbdvq

Data Mining for Education Decision Support: A Review

Suhirman Suhirman, Tutut Herawan, Haruna Chiroma, Jasni Mohamad Zain
2014 International Journal of Emerging Technologies in Learning (iJET)  
This will be able to do the necessary evaluation of various data, information, and knowledge of both internal and external institutions.  ...  The collected data could be utilized to evaluate quality, perform analyses and diagnoses, evaluate dependability to the standards and practices of curricula and syllabi, and suggest alternatives in decision  ...  Detecting Behaviour of Student Learning The objective of detecting student behavior is to discover/detect those students who have some type of problem or unusual behavior such as: erroneous actions, low  ... 
doi:10.3991/ijet.v9i6.3950 fatcat:yk4kyrr2onclnhgaevpuhmkrlq

Sneak into Devil's Colony- A study of Fake Profiles in Online Social Networks and the Cyber Law [article]

Mudasir Ahmad Wani, Suraiya Jabin, Ghulam Yazdani, Nehaluddin Ahmadd
2018 arXiv   pre-print
Furthermore, an attempt is made to present several machine learning techniques employed to design different fake profile detection systems.  ...  of the security and privacy laws to curtail the cyber crime.  ...  In [44] , a machine learning based approach has been used for the detection of social bots in the Twitter network where the author has used profile feature like the ratio of followers to the followee  ... 
arXiv:1803.08810v1 fatcat:c6kqphdeyvfkfhho4lkoxl7zay

A Systematic Review of Online Exams Solutions in E-learning: Techniques, Tools and Global Adoption

Abdul Wahab Muzaffar, Muhammad Tahir, Muhammad Waseem Anwar, Qaiser Chaudry, Shamaila Rasheed Mir, Yawar Rasheed
2021 IEEE Access  
Particularly, online exams are conducted on E-learning platforms without the physical presence of students and instructors at the same place.  ...  However, a study summarizing and analyzing latest developments, particularly in the area of online examination, is hard to find in the literature.  ...  A typical example of such solution is PageFocus [55] where the behavior of examinee's browser window is analyzed to detect cheating abnormalities.  ... 
doi:10.1109/access.2021.3060192 fatcat:qszfvtbmonbp5k4mk6yan43luu

Data Mining in Web Applications [chapter]

Julio Ponce, Alberto Hernndez, Alberto Ochoa, Felipe Padilla, Alejandro Padilla, Francisco lvarez, Eunice Ponce de Le
2009 Data Mining and Knowledge Discovery in Real Life Applications  
In the features database is assigned the Student Personnel ID that is used to link the students' personnel information with the fingerprint image.  ...  A 20% noticed a way to commit cheat using a system like ours, the ways are: turn the camera to some else, use a photo, use a cheating list, and just one person thinks to dirt the fingerprint reader.  ... 
doi:10.5772/6454 fatcat:kog666xfhrcxpe3rbsy4zza67a

A Systematic Review on AI-based Proctoring Systems: Past, Present and Future

Aditya Nigam, Rhitvik Pasricha, Tarishi Singh, Prathamesh Churi
2021 Education and Information Technologies : Official Journal of the IFIP technical committee on Education  
The COVID-19 pandemic has provided students more opportunities to learn and improve themselves at their own pace.  ...  There have been giant leaps in the field of education in the past 1-2 years.. Schools and colleges are transitioning online to provide more resources to their students.  ...  Acknowledgements The author would like to thank the anonymous reviewers and editors for taking valuable time to go through the paper. Author would like to thank Mr.  ... 
doi:10.1007/s10639-021-10597-x pmid:34177348 pmcid:PMC8220875 fatcat:utxtzqlc3ndvhe3pvjyb4psv4i
« Previous Showing results 1 — 15 out of 2,688 results