Automated assessment in computer science education: A state-of-the-art review
Practical programming competencies are critical to the success in computer science (CS)
education and go-to-market of fresh graduates. Acquiring the required level of skills is a long …
education and go-to-market of fresh graduates. Acquiring the required level of skills is a long …
A systematic review of academic dishonesty in online learning environments
FK Chiang, D Zhu, W Yu - Journal of Computer Assisted …, 2022 - Wiley Online Library
Background During the COVID‐19 pandemic, online learning has played an increasingly
crucial role in the educational system. Academic dishonesty (AD) in online learning is a …
crucial role in the educational system. Academic dishonesty (AD) in online learning is a …
Cyber security threats detection in internet of things using deep learning approach
The IoT (Internet of Things) connect systems, applications, data storage, and services that
may be a new gateway for cyber-attacks as they continuously offer services in the …
may be a new gateway for cyber-attacks as they continuously offer services in the …
A systematic literature review on source code similarity measurement and clone detection: Techniques, applications, and challenges
M Zakeri-Nasrabadi, S Parsa, M Ramezani… - Journal of Systems and …, 2023 - Elsevier
Measuring and evaluating source code similarity is a fundamental software engineering
activity that embraces a broad range of applications, including but not limited to code …
activity that embraces a broad range of applications, including but not limited to code …
RALF: an adaptive reinforcement learning framework for teaching dyslexic students
SAH Minoofam, A Bastanfard… - Multimedia Tools and …, 2022 - Springer
Dyslexia is a learning disorder in which individuals have significant reading difficulties.
Previous studies found that using machine learning techniques in content supplements is …
Previous studies found that using machine learning techniques in content supplements is …
Source code authorship attribution using hybrid approach of program dependence graph and deep learning model
F Ullah, J Wang, S Jabbar, F Al-Turjman… - IEEE Access, 2019 - ieeexplore.ieee.org
Source Code Authorship Attribution (SCAA) is to find the real author of source code in a
corpus. Though, it is a privacy threat to open-source programmers, but, it may be …
corpus. Though, it is a privacy threat to open-source programmers, but, it may be …
An effective text plagiarism detection system based on feature selection and SVM techniques
MA El-Rashidy, RG Mohamed, NA El-Fishawy… - Multimedia Tools and …, 2024 - Springer
Text plagiarism has greatly spread in the recent years, it becomes a common problem in
several fields such as research manuscripts, textbooks, patents, academic circles, etc. There …
several fields such as research manuscripts, textbooks, patents, academic circles, etc. There …
Syntax trees and information retrieval to improve code similarity detection
O Karnalim, Simon - Proceedings of the Twenty-Second Australasian …, 2020 - dl.acm.org
In dealing with source code plagiarism and collusion, automated code similarity detection
can be used to filter student submissions and draw attention to pairs of programs that appear …
can be used to filter student submissions and draw attention to pairs of programs that appear …
[HTML][HTML] Hybrid dual-channel convolution neural network (DCCNN) with spider monkey optimization (SMO) for cyber security threats detection in internet of things
P Vijayalakshmi, D Karthika - Measurement: Sensors, 2023 - Elsevier
Applications for the Internet of Things (IoT) have been employed in a broad range of
industries, including smart homes, healthcare, smart energy, and Industrial 4.0. IoT offers …
industries, including smart homes, healthcare, smart energy, and Industrial 4.0. IoT offers …
ES‐Plag: Efficient and sensitive source code plagiarism detection tool for academic environment
L Sulistiani, O Karnalim - Computer Applications in …, 2019 - Wiley Online Library
Source code plagiarism detection using Running‐Karp‐Rabin Greedy‐String‐Tiling
(RKRGST) is a common practice in academic environment. However, such approach is time …
(RKRGST) is a common practice in academic environment. However, such approach is time …