Citation: | Jia Rui, Dong Yongquan, Liu Yuan, Chen Cheng. Deep Knowledge Tracing Model with the Integration of Skills Relation and Forgetting Degree[J]. Journal of Computer Research and Development, 2025, 62(2): 364-373. DOI: 10.7544/issn1000-1239.202330697 |
Knowledge tracing is a pivotal technique for modeling students’ knowledge level, and typically relies on their past learning interactions to predict their future performance on exercises. These interactions represent a student’s process of answering a sequence of questions. Current knowledge tracing methods ignore times a skill has been practiced when modeling student’s forgetting behaviors. Also, few models consider the relation between skills and its influence on performance prediction. To address these questions, we propose a deep knowledge tracing model with the integration of skills relation and forgetting degree. Firstly, a relation matrix is constructed using statistical methods to capture the relation between skills. Secondly, the time intervals between interactions and the times a student practices the same skill are used to compute the forgetting degree of each skill for better modeling of students’ forgetting behaviors. Finally, skills relation and forgetting degrees are integrated into an attention module to obtain the influence of each past interaction on future performance prediction. Based on new attention weights, students’ performance on future exercises and knowledge level can be predicted. Experiments on two real-world online education datasets, algebra2005-2006 and ASSISTment2012, demonstrate that the proposed model achieves better prediction results compared with existing mainstream methods.
[1] |
刘铁园,陈威,常亮,等. 基于深度学习的知识追踪研究进展[J]. 计算机研究与发展,2022,59(1):81−104 doi: 10.7544/issn1000-1239.20200848
Liu Tieyuan, Chen Wei, Chang Liang, et al. Research advances in the knowledge tracing based on deep learning[J]. Journal of Computer Research and Development, 2022, 59(1): 81−104 (in Chinese) doi: 10.7544/issn1000-1239.20200848
|
[2] |
刘坤佳,李欣奕,唐九阳,等. 可解释深度知识追踪模型[J]. 计算机研究与发展,2021,58(12):2618−2629 doi: 10.7544/issn1000-1239.2021.20211021
Liu Kunjia, Li Xinyi, Tang Jiuyang, et al. Interpretable deep knowledge tracing model[J]. Journal of Computer Research and Development, 2021, 58(12): 2618−2629 (in Chinese) doi: 10.7544/issn1000-1239.2021.20211021
|
[3] |
王宇,朱梦霞,杨尚辉,等. 深度知识追踪模型综述和性能比较[J]. 软件学报,2023,34(3):1365−1395
Wang Yu, Zhu Mengxia, Yang Shanghui, et al. Review and performance comparison of deep knowledge tracing models[J]. Journal of Software, 2023, 34(3): 1365−1395 (in Chinese)
|
[4] |
Yeung C K, Yeung D Y. Incorporating features learned by an enhanced deep knowledge tracing model for STEM/Non-STEM job prediction[J]. International Journal of Artificial Intelligence in Education, 2019, 29(3): 253−278
|
[5] |
Corbett A T, Anderson J R. Knowledge tracing: Modeling the acquisition of procedural knowledge[J]. User Modelling and User-Adapted Interaction, 1995, 4(4): 253−278 doi: 10.1007/BF01099821
|
[6] |
Piech C, Spencer J, Huang J, et al. Deep knowledge tracing[J]. arXiv preprint, arXiv: 1506.05908, 2015
|
[7] |
Zhang Jiani, Shi Xingjia, King I, et al. Dynamic key-value memory networks for knowledge tracing[C]//Proc of the 26th Int Conf on World Wide Web. New York: ACM, 2017: 765−774
|
[8] |
Pandey S, Karypis G. A self-attentive model for knowledge tracing[J]. arXiv preprint, arXiv: 1907.06837, 2019
|
[9] |
Choffin B, Popineau F, Bourda Y, et al. DAS3H: Modeling student learning and forgetting for optimally scheduling distributed practice of skills[J]. arXiv preprint, arXiv: 1905.06873, 2019
|
[10] |
Nagatani K, Zhang Qian, Sato M, et al. Augmenting knowledge tracing by considering forgetting behavior[C]//Proc of the 19th World Wide Web Conf. New York: ACM, 2019: 3101−3107
|
[11] |
Pandey S, Srivastava J. RKT: Relation-aware self-attention for knowledge tracing[C]//Proc of the 29th ACM Int Conf on Information & Knowledge Management. New York: ACM, 2020: 1205−1214
|
[12] |
Liu Qi, Shen Shuanghong, Huang Zhenya, et al. A survey of knowledge tracing[J]. arXiv preprint, arXiv: 2105.15106, 2021
|
[13] |
Yudelson M V, Koedinger K R, Gordon G J. Individualized Bayesian knowledge tracing models[C]//Proc of the 16th Int Conf on Artificial Intelligence in Education. Berlin: Springer, 2013: 171−180
|
[14] |
Baker R S J, Corbett A T, Aleven V. More accurate student modeling through contextual estimation of slip and guess probabilities in Bayesian knowledge tracing[G]//LNCS 5091: Proc of the 9th Int Conf on Intelligent Tutoring Systems (ITS 2008). Berlin: Springer, 2008: 406−415
|
[15] |
Pardos Z A, Heffernan N T. Modeling individualization in a Bayesian networks implementation of knowledge tracing[G]//LNCS 6075: Proc of the 18th Int Conf on User. Berlin: Springer, 2010: 255−266
|
[16] |
Yeung C K, Yeung D Y. Addressing Two problems in deep knowledge tracing via prediction-consistent regularization[J]. arXiv preprint, arXiv: 1806.02180, 2018
|
[17] |
Vaswani A, Shazeer N, Parmar N, et al. Attention is all you need[C]//Proc of the 31st Int Conf on Neural Information Processing Systems. San Dieg, California: Curran Associates, 2017: 5998−6008
|
[18] |
Zhou Yuhao, Li Xihua, Cao Yunbo, et al. LANA: Towards personalized deep knowledge tracing through distinguishable interactive sequences[J]. arXiv preprint, arXiv: 2105.06266, 2021
|
[1] | Zhang Qiang, Ye Ayong, Ye Guohua, Deng Huina, Chen Aimin. k-Anonymous Data Privacy Protection Mechanism Based on Optimal Clustering[J]. Journal of Computer Research and Development, 2022, 59(7): 1625-1635. DOI: 10.7544/issn1000-1239.20210117 |
[2] | Fu Yao, Li Qingdan, Zhang Zehui, Gao Tiegang. Data Integrity Verification Scheme for Privacy Protection and Fair Payment[J]. Journal of Computer Research and Development, 2022, 59(6): 1343-1355. DOI: 10.7544/issn1000-1239.20210023 |
[3] | Zhang Shaobo, Wang Guojun, Liu Qin, Liu Jianxun. Trajectory Privacy Protection Method Based on Multi-Anonymizer[J]. Journal of Computer Research and Development, 2019, 56(3): 576-584. DOI: 10.7544/issn1000-1239.2019.20180033 |
[4] | Wang Ziyu, Liu Jianwei, Zhang Zongyang, Yu Hui. Full Anonymous Blockchain Based on Aggregate Signature and Confidential Transaction[J]. Journal of Computer Research and Development, 2018, 55(10): 2185-2198. DOI: 10.7544/issn1000-1239.2018.20180430 |
[5] | Jiang Huowen, Zeng Guosun, Hu Kekun. A Graph-Clustering Anonymity Method Implemented by Genetic Algorithm for Privacy-Preserving[J]. Journal of Computer Research and Development, 2016, 53(10): 2354-2364. DOI: 10.7544/issn1000-1239.2016.20160435 |
[6] | Dai Hua, Yang Geng, Xiao Fu, Zhou Qiang, He Ruiliang. An Energy-Efficient and Privacy-Preserving Range Query Processing in Two-Tiered Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2015, 52(4): 983-993. DOI: 10.7544/issn1000-1239.2015.20140066 |
[7] | Chen Wei, Xu Ruomei, Li Yuling. A Privacy-Preserving Integrity-Verification-Based Top-k Query Processing[J]. Journal of Computer Research and Development, 2014, 51(12): 2585-2592. DOI: 10.7544/issn1000-1239.2014.20140666 |
[8] | Dai Hua, Yang Geng, Qin Xiaolin, Liu Liang. Privacy-Preserving Top-k Query Processing in Two-Tiered Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2013, 50(6): 1239-1252. |
[9] | Xu Yong, Qin Xiaolin, Yang Yitao, Yang Zhongxue, Huang Can. A QI Weight-Aware Approach to Privacy Preserving Publishing Data Set[J]. Journal of Computer Research and Development, 2012, 49(5): 913-924. |
[10] | Liu Yubao, Huang Zhilan, Ada Wai Chee Fu, Yin Jian. A Data Privacy Preservation Method Based on Lossy Decomposition[J]. Journal of Computer Research and Development, 2009, 46(7): 1217-1225. |