Zobrazeno 1 - 10
of 69
pro vyhledávání: '"Atul Sajjanhar"'
Publikováno v:
Multimodal Technologies and Interaction, Vol 7, Iss 12, p 116 (2023)
There are various ways that teachers manage student disengagement levels during their class lessons, and managing disengagement can be both stressful and challenging, especially since each student is unique. Methods and techniques utilised are specif
Externí odkaz:
https://doaj.org/article/c4eebf005a9f46c4afb5acac6b9b4c2e
Publikováno v:
Multimodal Technologies and Interaction, Vol 7, Iss 5, p 46 (2023)
The transition from kindergarten to primary school involves preparing students for a more structured classroom-based learning environment, which is typically different from the play-based model in kindergartens. Building on the Forest Room concept, w
Externí odkaz:
https://doaj.org/article/9296a390d25347c3aeeeb55aae7cdc97
Publikováno v:
Education Sciences, Vol 13, Iss 1, p 17 (2022)
Student performance predictive analysis has played a vital role in education in recent years. It allows for the understanding students’ learning behaviours, the identification of at-risk students, and the development of insights into teaching and l
Externí odkaz:
https://doaj.org/article/dd3a25208c50422cb402d903a6aa0063
Publikováno v:
Multimodal Technologies and Interaction, Vol 5, Iss 12, p 75 (2021)
Usability is a principal aspect of the system development process to improve and augment system facilities and meet users’ needs and necessities in all domains. It is no exception for cultural heritage. Usability problems of the interactive technol
Externí odkaz:
https://doaj.org/article/650280c8e966400187c5b2a8e3d476b7
Publikováno v:
Applied Sciences, Vol 10, Iss 14, p 4945 (2020)
Cybersecurity attacks can arise from internal and external sources. The attacks perpetrated by internal sources are also referred to as insider threats. These are a cause of serious concern to organizations because of the significant damage that can
Externí odkaz:
https://doaj.org/article/086f3f41410a43ea946ff8afebd28646
Publikováno v:
Information, Vol 10, Iss 8, p 262 (2019)
Anomaly detection of network traffic flows is a non-trivial problem in the field of network security due to the complexity of network traffic. However, most machine learning-based detection methods focus on network anomaly detection but ignore the us
Externí odkaz:
https://doaj.org/article/67545aac809d40a0be9f1c024b11d7db
Publikováno v:
Information, Vol 8, Iss 4, p 155 (2017)
Color models are widely used in image recognition because they represent significant information. On the other hand, texture analysis techniques have been extensively used for facial feature extraction. In this paper; we extract discriminative featur
Externí odkaz:
https://doaj.org/article/c73714118f0d4ea4a53536c34ef5a9bd
Publikováno v:
New Review of Hypermedia and Multimedia. 27:275-300
The cultural heritage (CH) sector has always been looking for preeminent ways to improve visitors’ interactions with their collections through interactive technologies such as applications and webs...
Publikováno v:
2022 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct).
Publikováno v:
2022 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct).