In the continuously evolving and growing landscape of Big Data, a key challenge lies in the transformation of a Data Lake into a Data Mesh structure. Unveiling a transformative approach through semantic data blueprint...
详细信息
As Virtual Reality (VR) is on the rise in popularity in learning contexts, the corresponding ethical challenges of its use increase in complexity and importance. This theoretical paper discusses the ethical consequenc...
详细信息
This paper introduces a novel multimedia learning environment designed to support holistic learning of web development. ANNs and the WSM model have been adopted to implement the framework of the VARK learning style mo...
详细信息
Sign Language (SL) translation remains an extremely challenging task despite recent breakthrough progress in the constituent fields of computer Vision and Machine Learning, especially when tackled under a general unco...
详细信息
The pervasive impact of digital technologies has permeated all facets of our society. As technology continues to evolve rapidly, it is imperative for educators to adapt and integrate these advancements into their teac...
详细信息
With increasing embedding of artificial intelligence (AI) in web information systems (WIS), the maximum assurance on the reliability of such AI systems is solicited. Although this aspect is gaining importance, no comp...
详细信息
This research investigates the integration of a Digital Educational Escape Room in teaching fifth-grade history. The study explores how the Digital Educational Escape Room can enhance student engagement, collaboration...
详细信息
G cellular networks have achieved significant improvements in capacity and performance, while they have incurred a substantial increase in energy consumption at the base station (BS) level. To address this escalating ...
详细信息
The study identifies how the game elements of points, badges, and leaderboards could be used to engage students to enhance learning outcomes in educational settings. As the innovative teaching paradigm is gaining impo...
详细信息
Unmanned Aerial Vehicles (UAVs) are used in a wide range of applications. However, since they are vulnerable to cyberattacks security protocols for their data are used. Common existing approaches for data encryption/d...
详细信息
暂无评论