Publication Date
| In 2026 | 0 |
| Since 2025 | 1 |
| Since 2022 (last 5 years) | 7 |
| Since 2017 (last 10 years) | 8 |
| Since 2007 (last 20 years) | 8 |
Descriptor
Source
Author
| Abdelhadi Raihani | 1 |
| Aleksandra Maslennikova | 1 |
| Anna Monreale | 1 |
| Bouchaib Cherradi | 1 |
| Chaoyang Zhang | 1 |
| Daniela Rotelli | 1 |
| David Lefevre | 1 |
| Eastman, Caroline M. | 1 |
| Ha Le | 1 |
| Henkel, Thomas George | 1 |
| Jakub Rudolf Mlynárik | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 11 |
| Reports - Research | 9 |
| Reports - Evaluative | 2 |
| Opinion Papers | 1 |
Education Level
| Higher Education | 4 |
| Postsecondary Education | 4 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Yangyang Luo; Xibin Han; Chaoyang Zhang – Asia Pacific Education Review, 2024
Learning outcomes can be predicted with machine learning algorithms that assess students' online behavior data. However, there have been few generalized predictive models for a large number of blended courses in different disciplines and in different cohorts. In this study, we examined learning outcomes in terms of learning data in all of the…
Descriptors: Prediction, Learning Management Systems, Blended Learning, Classification
Mohammed Jebbari; Bouchaib Cherradi; Soufiane Hamida; Abdelhadi Raihani – Education and Information Technologies, 2024
With the advancements in technology and the growing demand for online education, Virtual Learning Environments (VLEs) have experienced rapid development in recent years. This demand was especially evident during the COVID-19 pandemic. The incorporation of new technologies in VLEs provides new opportunities to better understand the behaviors of…
Descriptors: MOOCs, Algorithms, Computer Simulation, COVID-19
Karolína Dockalová Burská; Jakub Rudolf Mlynárik; Radek Ošlejšek – Education and Information Technologies, 2024
In cyber security education, hands-on training is a common type of exercise to help raise awareness and competence, and improve students' cybersecurity skills. To be able to measure the impact of the design of the particular courses, the designers need methods that can reveal hidden patterns in trainee behavior. However, the support of the…
Descriptors: Computer Science Education, Information Security, Computer Security, Training Methods
Xia, Xiaona – Interactive Learning Environments, 2023
The interactive learning is a continuous process, which is full of a large number of learning interaction activities. The data generated between learners and learning interaction activities can reflect the online learning behaviors. Through the correlation analysis among learning interaction activities, this paper discusses the potential…
Descriptors: Behavior Patterns, Learning Analytics, Decision Making, Correlation
Jeff Ford; Rachel Erickson; Ha Le; Kaylee Vick; Jillian Downey – PRIMUS, 2024
In this study, we analyzed student participation and success in a college-level Calculus I course that utilized standards-based grading. By measuring the level to which students participate in this class structure, we were able to use a clustering algorithm that revealed multiple groupings of students that were distinct based on activity…
Descriptors: Calculus, Mathematics Instruction, Mathematics Achievement, Grades (Scholastic)
Aleksandra Maslennikova; Daniela Rotelli; Anna Monreale – Journal of Learning Analytics, 2023
Students organize and manage their own learning time, choosing when, what, and how to study due to the flexibility of online learning. Each person has unique learning habits that define their behaviours and distinguish them from others. To investigate the temporal behaviour of students in online learning environments, we seek to identify suitable…
Descriptors: Learning Analytics, Online Courses, Time Management, Self Management
Ni Li – International Journal of Web-Based Learning and Teaching Technologies, 2025
In depth exploration of how the pandemic has reshaped the education ecosystem over the past three years, especially in the context of the surge in demand for online education courses and learning platforms, this article focuses on the field of student ideological and political education, and innovatively constructs a moral and political education…
Descriptors: Artificial Intelligence, Computer Software, Technology Integration, Algorithms
Robert L. Peach; Sophia N. Yaliraki; David Lefevre; Mauricio Barahona – npj Science of Learning, 2019
The widespread adoption of online courses opens opportunities for analysing learner behaviour and optimising web-based learning adapted to observed usage. Here, we introduce a mathematical framework for the analysis of time-series of online learner engagement, which allows the identification of clusters of learners with similar online temporal…
Descriptors: Learning Analytics, Web Based Instruction, Online Courses, Learner Engagement
Peer reviewedHenkel, Thomas George; Wilmoth, James Noel – Journal of Experimental Education, 1992
Principal components extraction with orthogonal and oblique rotations tested the construct validity of the Personal Profile System (PPS) using data from 1,045 senior noncommissioned Air Force officers. Four factors accounted for 85 percent of the total variance, but the results do not completely justify publisher claims for the PPS. (SLD)
Descriptors: Algorithms, Behavior Patterns, Construct Validity, Factor Analysis
Peer reviewedNakkouzi, Ziad S.; Eastman, Caroline M. – Journal of the American Society for Information Science, 1990
Discusses the problems caused for both users and systems by queries containing negation, and presents an algorithm for transforming Boolean queries with negated terms into queries without negation using a hierarchical thesaurus. A set of user requests submitted to an academic library are also examined to determine the pattern and frequency of use…
Descriptors: Academic Libraries, Algorithms, Behavior Patterns, Higher Education
Peer reviewedKraft, Donald H.; Waller, W. G. – Information Processing and Management, 1981
Presents a dynamic model of user behavior when scanning an information storage and retrieval system output list, compares rules for determining the user's optimum stopping point, presents an algorithm for implementing the Bayesian model, and discusses implications for retrieval system design. Provided are 13 figures and 15 references. (Author/RBF)
Descriptors: Algorithms, Bayesian Statistics, Behavior Patterns, Graphs

Direct link
