The use of IT applications in teaching and learning had changed the way students learn using e-learning which was more modern, effective and efficient. This paper will explain the result for e-learning system performa...
详细信息
This paper presents a study aimed at investigating on whether the text mining technique using graphs can be used to analyze the relevance of the messages in online forums. Experiments were carried out with a program t...
详细信息
Contribution: This research full paper investigates the use of Spaced Repetition (SR) methodology in teaching markup and scripting programming languages to assess its impact on academic performance, knowledge retentio...
详细信息
This paper discusses the proposal for a systematic approach to computational support specification for Digital Democracy. The basis for this proposal is the definition of a model for Digital Democracy support through ...
详细信息
ISBN:
(纸本)9781424435340
This paper discusses the proposal for a systematic approach to computational support specification for Digital Democracy. The basis for this proposal is the definition of a model for Digital Democracy support through communication and informationtechnology comprising three aspects: collaboration, transparency and memory. The paper presents an exploratory study which analyses the proposed model potential in the context of decision-making processes in a public organization.
Some researchers find data with imbalanced class conditions, where there are data with a number of minorities and a majority. SMOTE is a data approach for an imbalanced classes and XGBoost is one algorithm for an imba...
详细信息
It is proposed in this session that the interactivity necessary in ubiquitous learning can be enhanced by the virtual tutor who mediates between the learner and the e-Learning contents. Arousing students' intellec...
详细信息
This paper proposes a new method for obtaining self and mutual inductances in wireless power transfer (WPT) systems using a deep neural network (DNN). In this paper, five structural parameters of a WPT system were exp...
详细信息
The RSA public key cryptosystem was among the first algorithms to implement the Diffie-Hellman key exchange protocol. At the core of RSA's security is the problem of factoring its modulus, a very large integer, in...
详细信息
Magnetic coupled wireless power transfer systems have been incorporated in various devices including smartphones, and are becoming important to charge multiple devices at the same time. In this paper, we propose a new...
详细信息
The purpose of this study is to develop a system that instructs the user to put the throat microphone on the suitable position. Therefore, we investigated the location of the throat microphone, where voice quality is ...
详细信息
暂无评论