Author of the publication

Using HMM to compare interaction activity patterns of student groups with different achievements in MPOCs.

, , , , and . Interact. Learn. Environ., 27 (5-6): 766-781 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Self-similar structures based genuinely two-dimensional Riemann solvers in curvilinear coordinates., , , and . J. Comput. Phys., (2020)Deep reinforcement learning and LSTM for optimal renewable energy accommodation in 5G internet of energy with bad data tolerant., , , , , and . Comput. Commun., (2020)An implicit large eddy simulation method based on all-speed schemes., , and . Comput. Math. Appl., (2022)Design and validation of a diagnostic MOOC evaluation method combining AHP and text mining algorithms., , and . Interact. Learn. Environ., 29 (2): 315-328 (2021)A genuinely two-dimensional Riemann solver for compressible flows in curvilinear coordinates., , , and . J. Comput. Phys., (2019)A Novel Image Segmentation Algorithm Based on Improved Active Contour Model., , , and . IScIDE (1), volume 9242 of Lecture Notes in Computer Science, page 90-99. Springer, (2015)Deep Supervised Image Retargeting., , , , and . ICME, page 1-6. IEEE, (2021)A 28.5 to 38.5GHz LC-VCO with -107.84dBc/email protected Phase Noise for 5G Millimeter Wave Communication., , , , , , and . EITCE, page 200-204. ACM, (2020)Mural Sketch Generation via Style-aware Convolutional Neural Network., , , and . CGI, page 239-245. ACM, (2018)Detection of False Data Injection Attack Based on Improved Distortion Index Method., , , , and . ICCT, page 1161-1168. IEEE, (2020)