Search
Search Results
-
A method for recognizing facial expression intensity based on facial muscle variations
Expression intensity recognition is a research problem in the field of computer vision and pattern recognition, which can be understood as the...
-
Cyber intrusion detection using dual interactive Wasserstein generative adversarial network with war strategy optimization in wireless sensor networks
Wireless sensor network (WSN) is one of the essential components of a multi-hop cyber-physical system comprising many fixed or moving sensors. There...
-
Dual strategy for single image denoising and generation using deep neural network
Removing noise in the real-world scenario has been a daunting task in the field of natural language processing. Research has shown that Deep Neural...
-
UDCT: lung Cancer detection and classification using U-net and DARTS for medical CT images
Lung cancer is the most fatal disease in recent times. Early detection of the same is very crucial and challenging task. Therefore, proper diagnostic...
-
Multitask EfficientNet affective computing for student engagement detection
In the realm of education, feedback emerges as a pivotal component, serving to foster engagement and interaction while also facilitating the...
-
Fostering preservice teachers socio-emotional, technological, and metacognitive knowledge (STM-K) using e-portfolios
Preservice teachers often face challenges in develo** Socio-emotional, Technological, and Metacognitive Knowledge (STM-K) due to a lack of...
-
Data science career preference of Nigeria University students
This study examined the data science career preference, data science skills, and core competencies of 416 students from fourteen Nigerian...
-
Insights into mobile assisted language learning research in Iran: A decade review (2010–2023)
Mobile technologies and the widespread application of mobile devices have become significant in educational settings. Mobile-assisted language...
-
Dynamic Market Behavior and Price Prediction in Cryptocurrency: An Analysis Based on Asymmetric Herding Effects and LSTM
This study employs the cross-sectional absolute deviation model and Carhart pricing model to examine the existence and authenticity of various market...
-
Is Default Risk Contagious? Evidence from Global Energy Leaders and Environmentally Conscious Energy Firms
We examine the default risk spillover for two groups of global energy firms, including top energy firms from seven different sectors as well as...
-
Towards an integrative model of blended design studios: a multiple case study across architecture, design and planning education
Design education embodies distinctive pedagogical practices rooted in experiential learning, frequent interactions between students and instructors,...
-
Technological solutions to foster preschool children’s spatial ability: A situational interactive e-book approach
Spatial ability is a significant component of mathematical ability and a foundation for children to master mathematical knowledge. Although many...
-
A systematic review of factors, data sources, and prediction techniques for earlier prediction of traffic collision using AI and machine Learning
The prevalence of road traffic collisions is a pressing issue both worldwide and within the United States. The consequences of these incidents are...
-
Research on a quantification model of online learning cognitive load based on eye-tracking technology
Online learning is characterized by a high degree of complexity and a wealth of information when compared to traditional classroom learning. This can...
-
eFuseNet: A deep ensemble fusion network for efficient detection of Arrhythmia and Myocardial Infarction using ECG signals
Myocardial infarction (MI) and cardiac arrhythmias remain leading causes of mortality within cardiovascular diseases. Accurate and timely diagnosis...
-
Designing interactive, gamified learning environments: a methodological approach with a case study on statistical quality control
Statistical Quality Control is a subject present in many engineering degrees. Literature identifies shortcomings in the application of Statistical...
-
Secure speaker identification in open and closed environments modeled with symmetric comb filters
Speech is a fundamental means of human interaction. Speaker Identification (SI) plays a crucial role in various applications, such as authentication...
-
Advanced dairy cow monitoring: enhanced detection with precision 3D tracking
Ensuring the welfare of dairy cows requires precise monitoring of their daily exercise to evaluate their physical health. This necessitates...
-
Poietic symbiosis or algorithmic subjugation: generative AI technology in marketing communications education
This exploratory study investigates the convergence of marketing communications and AI-powered technology in higher education, adopting a perspective...