2023
DOI: 10.3390/appliedmath3010014
|View full text |Cite
|
Sign up to set email alerts
|

A Rule-Based Approach for Mining Creative Thinking Patterns from Big Educational Data

Abstract: Numerous studies have established a correlation between creativity and intrinsic motivation to learn, with creativity defined as the process of generating original and valuable ideas, often by integrating perspectives from different fields. The field of educational technology has shown a growing interest in leveraging technology to promote creativity in the classroom, with several studies demonstrating the positive impact of creativity on learning outcomes. However, mining creative thinking patterns from educa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 44 publications
0
5
0
Order By: Relevance
“…In order to ease educational challenges, professionals must recognize the impact of big data in education. Modern cultures require training in creative thinking abilities in order to keep up with technological advancements, knowledge growth, and the constant flow of information [12]. It's all about devising tools for analyzing the precise types of knowledge that emerge from educational settings and using these approaches to better understand what students learn in such contexts [13].…”
Section: Figure 2 Edm Areasmentioning
confidence: 99%
“…In order to ease educational challenges, professionals must recognize the impact of big data in education. Modern cultures require training in creative thinking abilities in order to keep up with technological advancements, knowledge growth, and the constant flow of information [12]. It's all about devising tools for analyzing the precise types of knowledge that emerge from educational settings and using these approaches to better understand what students learn in such contexts [13].…”
Section: Figure 2 Edm Areasmentioning
confidence: 99%
“…To efficiently manage infinitely increasing data within limited storage space, graph compression is essential, allowing for the efficient use of storage space to accommodate increasing amounts of data [17][18][19][20][21][22]. Techniques that incorporate graph pattern mining methods also exist [23][24][25][26][27][28]. Generally, graph compression is performed using graph mining techniques to select frequently occurring sub-graphs as reference patterns, recording changes that occur in these reference patterns.…”
Section: Introductionmentioning
confidence: 99%
“…These approaches involve a time-consuming compression process, especially imposing constraints on immediate processing in a graph stream environment. High accuracy and compression rates are provided by pattern extraction techniques, such as those in [14][15][16][23][24][25][26]; however, their long processing times during graph compression also render them difficult to be applied in real-time environments. As a solution to these issues, research on the use of provenance has been proposed [29][30][31].…”
Section: Introductionmentioning
confidence: 99%
“…To efficiently manage infinitely increasing data within a limited storage space, graph compression is essential, allowing for the efficient use of storage space to accommodate increasing amounts of data [17][18][19][20][21][22]. Techniques that incorporate graph pattern mining methods also exist [23][24][25][26][27][28]. Generally, graph compression is performed using graph mining techniques to select frequently occurring sub-graphs as reference patterns and recording changes that occur in these reference patterns.…”
Section: Introductionmentioning
confidence: 99%
“…These approaches involve a time-consuming compression process, especially imposing constraints on immediate processing in a graph stream environment. High accuracy and compression rates are provided by pattern extraction techniques, such as [14][15][16][23][24][25][26]; however, their long processing times during graph compression also render them difficult to be applied in real-time environments. As a solution to these issues, research on the use of provenance has been proposed [29][30][31].…”
Section: Introductionmentioning
confidence: 99%