NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 3 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Karolína Dockalová Burská; Jakub Rudolf Mlynárik; Radek Ošlejšek – Education and Information Technologies, 2024
In cyber security education, hands-on training is a common type of exercise to help raise awareness and competence, and improve students' cybersecurity skills. To be able to measure the impact of the design of the particular courses, the designers need methods that can reveal hidden patterns in trainee behavior. However, the support of the…
Descriptors: Computer Science Education, Information Security, Computer Security, Training Methods
Peer reviewed Peer reviewed
Direct linkDirect link
Ni Li – International Journal of Web-Based Learning and Teaching Technologies, 2025
In depth exploration of how the pandemic has reshaped the education ecosystem over the past three years, especially in the context of the surge in demand for online education courses and learning platforms, this article focuses on the field of student ideological and political education, and innovatively constructs a moral and political education…
Descriptors: Artificial Intelligence, Computer Software, Technology Integration, Algorithms
Jennifer Hu – ProQuest LLC, 2023
Language is one of the hallmarks of intelligence, demanding explanation in a theory of human cognition. However, language presents unique practical challenges for quantitative empirical research, making many linguistic theories difficult to test at naturalistic scales. Artificial neural network language models (LMs) provide a new tool for studying…
Descriptors: Linguistic Theory, Computational Linguistics, Models, Language Research