• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Hu Xuegang, Liu Fei, Bu Chenyang. Research Advances on Knowledge Tracing Models in Educational Big Data[J]. Journal of Computer Research and Development, 2020, 57(12): 2523-2546. DOI: 10.7544/issn1000-1239.2020.20190767
Citation: Hu Xuegang, Liu Fei, Bu Chenyang. Research Advances on Knowledge Tracing Models in Educational Big Data[J]. Journal of Computer Research and Development, 2020, 57(12): 2523-2546. DOI: 10.7544/issn1000-1239.2020.20190767

Research Advances on Knowledge Tracing Models in Educational Big Data

Funds: This work was supported by the National Key Research and Development Program of China (2016YFB1000901), the National Natural Science Foundation of China (61806065), and the Fundamental Research Funds for the Central Universities (JZ2020HGQA0186).
More Information
  • Published Date: November 30, 2020
  • With the in-depth advancement of informational education and the rapid development of online education, a large amount of fragmented educational data are generated during the learning process of students. How to mine and analyze these educational big data has become an urgent problem in the education and the knowledge engineering with big data fields. As for the dynamic education data, knowledge tracing models trace the cognitive status of students over time by analyzing the students’ exercising data generated in the learning process, so as to predict the exercising performance of students in the future time. In this paper, knowledge tracing models in educational big data are reviewed, analyzed, and discussed. Firstly, knowledge tracing models are introduced in detail from the perspective of their principles, steps, and model variants, including two mainstream knowledge tracing models based on Bayesian methods and deep learning methods. Then, the application scenarios of knowledge tracing models are explained from five aspects: student performance prediction, cognitive state assessment, psychological factor analysis, exercise sequence, and programming practice. The strengths and weaknesses in Bayesian knowledge tracing models and Deep Knowledge Tracing models are discussed through the two classic models BKT and DKT. Finally, some future directions of knowledge tracing models are given.
  • Related Articles

    [1]Fu Hao, Long Chun, Gong Liangyi, Wei Jinxia, Huang Pan, Lin Yanzhong, Sun Degang. Malicious Domain Detection Technology Based on Semantic Graph Learning[J]. Journal of Computer Research and Development. DOI: 10.7544/issn1000-1239.202440375
    [2]Liu Qixu, Liu Jiaxi, Jin Ze, Liu Xinyu, Xiao Juxin, Chen Yanhui, Zhu Hongwen, Tan Yaokang. Survey of Artificial Intelligence Based IoT Malware Detection[J]. Journal of Computer Research and Development, 2023, 60(10): 2234-2254. DOI: 10.7544/issn1000-1239.202330450
    [3]Pan Jianwen, Cui Zhanqi, Lin Gaoyi, Chen Xiang, Zheng Liwei. A Review of Static Detection Methods for Android Malicious Application[J]. Journal of Computer Research and Development, 2023, 60(8): 1875-1894. DOI: 10.7544/issn1000-1239.202220297
    [4]Fan Zhaoshan, Wang Qing, Liu Junrong, Cui Zelin, Liu Yuling, Liu Song. Survey on Domain Name Abuse Detection Technology[J]. Journal of Computer Research and Development, 2022, 59(11): 2581-2605. DOI: 10.7544/issn1000-1239.20210121
    [5]Yang Zheng, Yin Qilei, Li Haoran, Miao Yuanli, Yuan Dong, Wang Qian, Shen Chao, Li Qi. Study of Wechat Sybil Detection[J]. Journal of Computer Research and Development, 2021, 58(11): 2319-2332. DOI: 10.7544/issn1000-1239.2021.20210461
    [6]Yang Wang, Gao Mingzhe, Jiang Ting. A Malicious Code Static Detection Framework Based on Multi-Feature Ensemble Learning[J]. Journal of Computer Research and Development, 2021, 58(5): 1021-1034. DOI: 10.7544/issn1000-1239.2021.20200912
    [7]Wang Jialai, Zhang Chao, Qi Xuyan, Rong Yi. A Survey of Intelligent Malware Detection on Windows Platform[J]. Journal of Computer Research and Development, 2021, 58(5): 977-994. DOI: 10.7544/issn1000-1239.2021.20200964
    [8]Wang Lina, Tan Cheng, Yu Rongwei, Yin Zhengguang. The Malware Detection Based on Data Breach Actions[J]. Journal of Computer Research and Development, 2017, 54(7): 1537-1548. DOI: 10.7544/issn1000-1239.2017.20160436
    [9]Li Peng, Wang Ruchuan, Wu Ning. Research on Unknown Malicious Code Automatic Detection Based on Space Relevance Features[J]. Journal of Computer Research and Development, 2012, 49(5): 949-957.
    [10]Dai Hua, Qin Xiaolin, and Bai Chuanjie. A Malicious Transaction Detection Method Based on Transaction Template[J]. Journal of Computer Research and Development, 2010, 47(5): 921-929.

Catalog

    Article views (2209) PDF downloads (1662) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return