{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T16:07:27Z","timestamp":1773418047755,"version":"3.50.1"},"reference-count":41,"publisher":"Informa UK Limited","issue":"3","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Human\u2013Computer Interaction"],"published-print":{"date-parts":[[2025,2]]},"DOI":"10.1080\/10447318.2022.2115645","type":"journal-article","created":{"date-parts":[[2022,8,31]],"date-time":"2022-08-31T06:29:51Z","timestamp":1661927391000},"page":"1817-1828","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":20,"title":["Human Computer Interaction System for Teacher-Student Interaction Model Using Machine Learning"],"prefix":"10.1080","volume":"41","author":[{"given":"Aili","family":"Zhang","sequence":"first","affiliation":[{"name":"Pedagogy, Ideological and Political Education, Zhoukou Normal University","place":["Zhoukou, China"]}]}],"member":"301","published-online":{"date-parts":[[2022,8,30]]},"reference":[{"key":"e_1_3_2_2_1","doi-asserted-by":"crossref","unstructured":"Ahmad U. Song H. Bilal A. Alazab M. & Jolfaei A. (2018 December 11). Secure passive keyless entry and start system using machine learning [Paper presentation]. International Conference on Security Privacy and Anonymity in Computation Communication and Storage (p. 304\u2013313) Cham.","DOI":"10.1007\/978-3-030-05345-1_26"},{"key":"e_1_3_2_3_1","doi-asserted-by":"crossref","unstructured":"Anupriya K. Gayathri R. Balaanand M. & Sivaparthipan C. B. (2018). Eshopping scam identification using machine learning [Paper presentation]. In 2018 International Conference on Soft-Computing and Network Security (ICSNS) 2018 February 14 Coimbatore India: IEEE 1\u20137.","DOI":"10.1109\/ICSNS.2018.8573687"},{"key":"e_1_3_2_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-020-01168-6"},{"key":"e_1_3_2_5_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3275433"},{"key":"e_1_3_2_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s40593-015-0090-8"},{"key":"e_1_3_2_7_1","doi-asserted-by":"publisher","DOI":"10.1186\/s41239-017-0044-3"},{"key":"e_1_3_2_8_1","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2017.01403"},{"key":"e_1_3_2_9_1","doi-asserted-by":"publisher","DOI":"10.1111\/exsy.12649"},{"key":"e_1_3_2_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2018.06.032"},{"key":"e_1_3_2_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.childyouth.2018.11.030"},{"key":"e_1_3_2_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-020-01168-6"},{"key":"e_1_3_2_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2018.12.006"},{"key":"e_1_3_2_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.11.022"},{"key":"e_1_3_2_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2018.04.007"},{"key":"e_1_3_2_16_1","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/6347186"},{"key":"e_1_3_2_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-018-9620-8"},{"key":"e_1_3_2_18_1","doi-asserted-by":"publisher","DOI":"10.1111\/bjet.12837"},{"key":"e_1_3_2_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.aml.2009.09.020"},{"key":"e_1_3_2_20_1","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/9720396"},{"key":"e_1_3_2_21_1","doi-asserted-by":"publisher","DOI":"10.1117\/1.JEI.28.3.033027"},{"key":"e_1_3_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2021.3051330"},{"key":"e_1_3_2_23_1","doi-asserted-by":"publisher","DOI":"10.3233\/WOR-203423"},{"key":"e_1_3_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2851790"},{"key":"e_1_3_2_25_1","doi-asserted-by":"publisher","DOI":"10.1111\/inm.12572"},{"key":"e_1_3_2_26_1","doi-asserted-by":"crossref","unstructured":"Raizada S. Verma Y. Mala S. Shankar A. & Thakur S. (2021). Organ risk prediction for Parkinson's disease using deep learning techniques [Paper presentation]. 2021 11th International Conference on Cloud Computing Data Science & Engineering (Confluence) January 28 Noida India: IEEE 978\u2013983.","DOI":"10.1109\/Confluence51648.2021.9377174"},{"key":"e_1_3_2_27_1","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4221"},{"key":"e_1_3_2_28_1","doi-asserted-by":"publisher","DOI":"10.11591\/eei.v10i1.2098"},{"key":"e_1_3_2_29_1","doi-asserted-by":"publisher","DOI":"10.3390\/app10031042"},{"key":"e_1_3_2_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-02560-4"},{"key":"e_1_3_2_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.lcsi.2021.100492"},{"key":"e_1_3_2_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tsc.2020.100747"},{"key":"e_1_3_2_33_1","doi-asserted-by":"publisher","DOI":"10.1080\/00461520.2020.1793763"},{"key":"e_1_3_2_34_1","doi-asserted-by":"publisher","DOI":"10.3934\/math.2021096"},{"key":"e_1_3_2_35_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13662-020-03046-5"},{"key":"e_1_3_2_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2019.106189"},{"key":"e_1_3_2_37_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0219265921440047"},{"key":"e_1_3_2_38_1","doi-asserted-by":"crossref","unstructured":"Wang L. Sy A. Liu L. & Piech C. (2017 April). Deep knowledge tracing on programming exercises [Paper presentation]. Proceedings of the Fourth (2017) ACM Conference on Learning@ Scale Cambridge MA USA. 201\u2013204.","DOI":"10.1145\/3051457.3053985"},{"key":"e_1_3_2_39_1","doi-asserted-by":"crossref","unstructured":"Wu M. Mosse M. Goodman N. & Piech C. (2019 July). Zero shot learning for code education: Rubric sampling with deep learning inference. Proceedings of the AAAI Conference on Artificial Intelligence 33(01) 782\u2013790.","DOI":"10.1609\/aaai.v33i01.3301782"},{"key":"e_1_3_2_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3005956"},{"key":"e_1_3_2_41_1","doi-asserted-by":"publisher","DOI":"10.1080\/22797254.2020.1790995"},{"key":"e_1_3_2_42_1","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3757"}],"container-title":["International Journal of Human\u2013Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/10447318.2022.2115645","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,14]],"date-time":"2025-02-14T10:58:47Z","timestamp":1739530727000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/10447318.2022.2115645"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,30]]},"references-count":41,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,2]]}},"alternative-id":["10.1080\/10447318.2022.2115645"],"URL":"https:\/\/doi.org\/10.1080\/10447318.2022.2115645","relation":{},"ISSN":["1044-7318","1532-7590"],"issn-type":[{"value":"1044-7318","type":"print"},{"value":"1532-7590","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,8,30]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=hihc20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=hihc20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2022-01-13","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-03-07","order":1,"name":"revised","label":"Revised","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-03-21","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-08-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}