Named Entity Recognition (NER) represents a fundamental operation within Natural Language Processing (NLP), focused on the extraction and classification of specific entities embedded in textual data. Given the rising ...
详细信息
Chatbots, also known as talkbots or interactive agents, are software applications designed to facilitate communication between humans and machines. While most students in Bangladesh currently waste their valuable time...
详细信息
Many vehicular tasks shall be completed in a timely manner as they move. In automotive edge computing, a vehicle can offload such tasks to an edge server in proximity to process them faster than using the cloud comput...
详细信息
Peer instruction is instructional in guiding students to learn by answering questions, and explaining and discussing their answers with peers. Researchers recommended asking students to write down their answers and ex...
详细信息
ISBN:
(纸本)9798350307207
Peer instruction is instructional in guiding students to learn by answering questions, and explaining and discussing their answers with peers. Researchers recommended asking students to write down their answers and explanations before discussion to prevent social loafing. In addition, text-based explanations can be recorded and analyzed. The quality of students' explanations varies, ranging from superficial and low-quality to detailed and in-depth high-quality explanations. In tradition, the qualities of students' explanations were assessed by experts. Recently, machine learning classification models have been developed and applied to classify texts. However, the level of explanations of questions are question-dependent. Thus, each question needs its classification model. Therefore, a feature transformation was applied in this study so that the explanations of different questions could be combined and applied to train the same classification model. An automated explanation quality assessment mechanism was developed based on the similarity of representative explanations of different qualities. Students' text-based explanations were collected and assessed by experts into four levels, ranging from 0 (worst) to 3 (best). The four-level classifications were merged into binary classifications of low (0 and 1) and high (2 and 3). Different classification models, including Support Vector Machine (SVM), Naive Bayes (NB), K Nearest Neighbor (KNN), Logistic Regression (LR), Random Forest (RF), and Bidirectional Encoder Representations from Transformers (BERT) were applied to train models and evaluate the accuracy of the models. In addition, three ensemble learning algorithms, including voting, stacking, and boosting, were applied to combine models chosen from SVM, NB, KNN, LR, and RF. The results showed that RF and RF+KNN+NB with stacking model showed the best accuracy (75.3%) among all four-level classification models whereas RF with boosting model showed the best accuracy (9
K-Nearest Neighbors (KNN), a simple and widely used algorithm, is extremely valuable in the field of machine learning models. Finding an optimal value of the nearest neighbor parameter in the KNN algorithm has been a ...
详细信息
The latest advancements in blockchain technology have significantly influenced several sectors, such as banking, healthcare, and supply chain networks. Because of its distinct attributes, like decentralization, trustw...
详细信息
The Himalaya region, known for its ecological sensitivity, also faces recurring natural hazards such as earthquakes, landslides, sinking, glacier bursts, and flash floods, which necessitate the implementation of effec...
详细信息
The problem with traditional notice boards is their static nature, leading to outdated information and manual effort to update. An IoT-based smart notice board solves this by providing real-time updates but requires a...
详细信息
Medicinal plant use is widespread throughout many cultures and geographical areas, frequently entwined with customs and knowledge. The use of technology, especially deep learning, to improve the identification and cla...
详细信息
Text-based password authentication is a common method used to verify the identity of users who are trying to access a secure system or service. In order to use this authentication method, the user must input a passwor...
详细信息
暂无评论