NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 4 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Eegdeman, Irene; Cornelisz, Ilja; Meeter, Martijn; van Klaveren, Chris – Education Economics, 2023
Inefficient targeting of students at risk of dropping out might explain why dropout-reducing efforts often have no or mixed effects. In this study, we present a new method which uses a series of machine learning algorithms to efficiently identify students at risk and makes the sensitivity/precision trade-off inherent in targeting students for…
Descriptors: Foreign Countries, Vocational Schools, Dropout Characteristics, Dropout Prevention
Peer reviewed Peer reviewed
Direct linkDirect link
Semiu Salawu; Jo Lumsden; Yulan He – International Journal of Bullying Prevention, 2022
A negative consequence of the proliferation of social media is the increase in online abuse. Bullying, once restricted to the playground, has found a new home on social media. Online social networks on their part have intensified efforts to tackle online abuse, but unfortunately, such is the scale of the problem that many young people are still…
Descriptors: Computer Mediated Communication, Bullying, Computer Software, Computational Linguistics
Peer reviewed Peer reviewed
Direct linkDirect link
Christopher E. Gomez; Marcelo O. Sztainberg; Rachel E. Trana – International Journal of Bullying Prevention, 2022
Cyberbullying is the use of digital communication tools and spaces to inflict physical, mental, or emotional distress. This serious form of aggression is frequently targeted at, but not limited to, vulnerable populations. A common problem when creating machine learning models to identify cyberbullying is the availability of accurately annotated,…
Descriptors: Video Technology, Computer Software, Computer Mediated Communication, Bullying
Peer reviewed Peer reviewed
Onorato, Eveline; Bianchi, Gianfranco – Online Review, 1981
Discusses the problem of duplicate citations resulting from file overlaps in multidatabase searching and shows that such duplicates could be identified automatically and eliminated by a host computer as a complementary service to online retrieval. Steps involved in the realization of this service are described, and 11 references are listed. (RBF)
Descriptors: Algorithms, Citations (References), Computers, Data Processing