Publication Date
In 2025 | 0 |
Since 2024 | 2 |
Since 2021 (last 5 years) | 3 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 3 |
Descriptor
Artificial Intelligence | 3 |
Decision Support Systems | 3 |
Educational Technology | 3 |
Algorithms | 2 |
Technology Uses in Education | 2 |
Accuracy | 1 |
Active Learning | 1 |
College Students | 1 |
Computer Security | 1 |
Computer Simulation | 1 |
Cybernetics | 1 |
More ▼ |
Author
Abubakir Siedahmed | 1 |
Jian-Wei Tzeng | 1 |
Kishor Datta Gupta | 1 |
Moran P. Lee | 1 |
Neil T. Heffernan | 1 |
Nen-Fu Huang | 1 |
Ting-Wei Huang | 1 |
Yi-Hsien Chen | 1 |
Yu-Sheng Su | 1 |
Publication Type
Reports - Research | 2 |
Dissertations/Theses -… | 1 |
Journal Articles | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 1 |
Postsecondary Education | 1 |
Audience
Location
Taiwan | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Moran P. Lee; Abubakir Siedahmed; Neil T. Heffernan – Grantee Submission, 2024
Contextual multi-armed bandits have previously been used to personalize student support messages given to learners by supplying a model with relevant context about the user, problem, and available student supports. In this work, we propose using careful feature selection with relevant domain knowledge to improve the quality of student support…
Descriptors: Artificial Intelligence, Educational Technology, Technology Uses in Education, Reinforcement
Jian-Wei Tzeng; Nen-Fu Huang; Yi-Hsien Chen; Ting-Wei Huang; Yu-Sheng Su – Educational Technology & Society, 2024
Massive open online courses (MOOCs; online courses delivered over the Internet) enable distance learning without time and place constraints. MOOCs are popular; however, active participation level among students who take MOOCs is generally lower than that among students who take in-person courses. Students who take MOOCs often lack guidance, and…
Descriptors: MOOCs, Artificial Intelligence, Electronic Learning, Student Participation
Kishor Datta Gupta – ProQuest LLC, 2021
Defenses against adversarial attacks are essential to ensure the reliability of machine learning models as their applications are expanding in different domains. Existing ML defense techniques have several limitations in practical use. I proposed a trustworthy framework that employs an adaptive strategy to inspect both inputs and decisions. In…
Descriptors: Artificial Intelligence, Cybernetics, Information Processing, Information Security