Open Access. Powered by Scholars. Published by Universities.®

Computer and Systems Architecture Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Digital Communications and Networking (401)
- Physical Sciences and Mathematics (384)
- Computer Sciences (359)
- Data Storage Systems (306)
- Electrical and Computer Engineering (292)
-
- Social and Behavioral Sciences (244)
- Business (214)
- Hardware Systems (191)
- Other Computer Engineering (187)
- Management Information Systems (166)
- Technology and Innovation (165)
- Library and Information Science (160)
- Operations Research, Systems Engineering and Industrial Engineering (146)
- E-Commerce (125)
- Systems and Communications (122)
- Communication (120)
- Management Sciences and Quantitative Methods (113)
- Science and Technology Studies (112)
- Communication Technology and New Media (111)
- Business Intelligence (101)
- Information Literacy (97)
- Operational Research (97)
- Digital Circuits (91)
- Systems Architecture (91)
- Social Media (89)
- Software Engineering (87)
- VLSI and Circuits, Embedded and Hardware Systems (83)
- Institution
-
- Selected Works (146)
- California State University, San Bernardino (122)
- SelectedWorks (112)
- California Polytechnic State University, San Luis Obispo (100)
- Singapore Management University (83)
-
- Portland State University (79)
- Air Force Institute of Technology (51)
- University of Nebraska - Lincoln (45)
- University of Arkansas, Fayetteville (41)
- Technological University Dublin (40)
- University of Massachusetts Amherst (38)
- Old Dominion University (37)
- University of Tennessee, Knoxville (33)
- Florida International University (29)
- University of Nevada, Las Vegas (26)
- Embry-Riddle Aeronautical University (22)
- Western University (21)
- Association of Arab Universities (18)
- Interscience Research Network (18)
- Purdue University (16)
- Syracuse University (16)
- University of Pennsylvania Carey Law School (16)
- Kennesaw State University (15)
- University of Kentucky (15)
- Cleveland State University (13)
- Kansas State University Libraries (13)
- Morehead State University (13)
- University of North Florida (13)
- City University of New York (CUNY) (12)
- Nova Southeastern University (11)
- Keyword
-
- Inventive Problem Solving (50)
- TRIZ (45)
- Software Patents (34)
- Graphical User Interface (32)
- Software inventions (29)
-
- Security (28)
- Machine learning (21)
- GUI (20)
- Innovation (20)
- Computer Hardware (19)
- Computer Keyboard (19)
- Hardware Inventions (19)
- Computer architecture (18)
- Computer science (18)
- Keyboard design (17)
- Software Inventions (17)
- Android (16)
- Cloud computing (16)
- Information Retrieval (16)
- Simulation (16)
- Invention (15)
- GUI design (14)
- Internet (14)
- Performance (14)
- Privacy (14)
- Technology (14)
- Blockchain (13)
- Cloud Computing (13)
- Deep learning (13)
- FPGA (13)
- Publication Year
- Publication
-
- Journal of International Technology and Information Management (102)
- Research Collection School Of Computing and Information Systems (77)
- Theses and Dissertations (61)
- Umakant Mishra (59)
- Computer Engineering (45)
-
- Computer Science Faculty Publications and Presentations (44)
- Master's Theses (35)
- Masters Theses (32)
- FIU Electronic Theses and Dissertations (29)
- Doctoral Dissertations (28)
- Graduate Theses and Dissertations (25)
- Dr Deogratias Harorimana (24)
- Computational Modeling & Simulation Engineering Faculty Publications (23)
- Electronic Theses and Dissertations (23)
- Electronic Thesis and Dissertation Repository (20)
- Future Computing and Informatics Journal (18)
- Hong-Ning Dai (17)
- Faculty Scholarship at Penn Carey Law (16)
- Computer Science and Software Engineering (15)
- Publications (15)
- Conference papers (14)
- Dissertations and Theses (14)
- Electronic Theses, Projects, and Dissertations (14)
- Library Philosophy and Practice (e-journal) (13)
- Morehead State Theses and Dissertations (13)
- UNF Graduate Theses and Dissertations (13)
- Central Plains Network for Digital Asset Management (12)
- Robert A Iannucci (12)
- College of Engineering and Computing Course Catalogs (11)
- Electrical and Computer Engineering Faculty Publications (11)
- Publication Type
Articles 1 - 30 of 1536
Full-Text Articles in Computer and Systems Architecture
Open Resources For Teaching Iot Physical Security, Maria Valero
Open Resources For Teaching Iot Physical Security, Maria Valero
All Things Open
The Internet of Things (IoT) and physical devices are around us all the time. From a simple watch that measures your heartbeat to an advanced voice assistant that turns on your light, IoT devices are everywhere. Teaching security in this type of physical device is a new topic, and finding good quality resources for teaching is also a complicated task. In this project, the instructor took the best online open-source materials and created 15 modules with hands-on activities that teach students about the interaction with IoT devices and their security. The materials include labs with emulators of physical devices like …
Procedural Model Of The Monitoring System, Fayzullajon Botirov
Procedural Model Of The Monitoring System, Fayzullajon Botirov
Chemical Technology, Control and Management
This article discusses the process of monitoring information security incidents and factors affecting the effectiveness of monitoring. A procedural model of the functioning of the information security incident monitoring system is constructed, based on the study of its structure, the principles of operation of individual components and literature data, the analysis of individual stages.
Resource Management In Mobile Edge Computing For Compute-Intensive Application, Xiaojie Zhang
Resource Management In Mobile Edge Computing For Compute-Intensive Application, Xiaojie Zhang
Dissertations, Theses, and Capstone Projects
With current and future mobile applications (e.g., healthcare, connected vehicles, and smart grids) becoming increasingly compute-intensive for many mission-critical use cases, the energy and computing capacities of embedded mobile devices are proving to be insufficient to handle all in-device computation. To address the energy and computing shortages of mobile devices, mobile edge computing (MEC) has emerged as a major distributed computing paradigm. Compared to traditional cloud-based computing, MEC integrates network control, distributed computing, and storage to customizable, fast, reliable, and secure edge services that are closer to the user and data sites. However, the diversity of applications and a variety …
Effect Of Cyber Vulnerabilities On The Adoption Of Self-Driving Vehicles – A Review, Vidhi Shah
Effect Of Cyber Vulnerabilities On The Adoption Of Self-Driving Vehicles – A Review, Vidhi Shah
International Journal of Smart Sensor and Adhoc Network
One of the leading disruptive technologies in the upcoming technological revolution is Self-Driving vehicles. However, the absence of security is the greatest obstacle to adoption. This study looks at how cybersecurity impacts the adoption of driverless cars. The purpose of this paper is to perform a literature review supporting the in-depth analysis of cybersecurity and its impacts on the slower adoption rate of Self-Driving Vehicles. The study's primary goal is to determine the connection between worries about cybersecurity and the rate of adoption of self-driving vehicles. Driverless vehicles are the most effective and cutting-edge technology in the transportation sector, yet …
Cloud Computing For Supply Chain Management And Warehouse Automation: A Case Study Of Azure Cloud, Pawankumar Sharma
Cloud Computing For Supply Chain Management And Warehouse Automation: A Case Study Of Azure Cloud, Pawankumar Sharma
International Journal of Smart Sensor and Adhoc Network
In recent times, organizations are examining the art training situation to improve the operation efficiency and the cost of warehouse retail distribution and supply chain management. Microsoft Azure emerges as an expressive technology that leads optimization by giving infrastructure, software, and platform resolutions for the whole warehouse retail distribution and supply chain management. Using Microsoft Azure as a cloud computing tool in retail warehouse distribution and supply manacle management contributes to active and monetary benefits. At the same time, potential limitations and risks should be considered by the retail warehouse distribution and the supply chain administration investors. In this research …
Improvement Of Key Financial Performance Indicators In The Insurance Industry Using Machine Learning – A Quantitative Analysis, Vineeth Jeppu
Improvement Of Key Financial Performance Indicators In The Insurance Industry Using Machine Learning – A Quantitative Analysis, Vineeth Jeppu
International Journal of Smart Sensor and Adhoc Network
AI and Machine learning are playing a vital role in the financial domain in predicting future growth and risk and identifying key performance areas. We look at how machine learning and artificial intelligence (AI) directly or indirectly alter financial management in the banking and insurance industries. First, a non-technical review of the prior machine learning and AI methodologies beneficial to KPI management is provided. This paper will analyze and improve key financial performance indicators in insurance using machine learning (ML) algorithms. Before applying an ML algorithm, we must determine the attributes directly impacting the business and target attributes. The details …
Data Integration Based Human Activity Recognition Using Deep Learning Models, Basamma Umesh Patil, D V Ashoka, Ajay Prakash B. V
Data Integration Based Human Activity Recognition Using Deep Learning Models, Basamma Umesh Patil, D V Ashoka, Ajay Prakash B. V
Karbala International Journal of Modern Science
Regular monitoring of physical activities such as walking, jogging, sitting, and standing will help reduce the risk of many diseases like cardiovascular complications, obesity, and diabetes. Recently, much research showed that the effective development of Human Activity Recognition (HAR) will help in monitoring the physical activities of people and aid in human healthcare. In this concern, deep learning models with a novel automated hyperparameter generator are proposed and implemented to predict human activities such as walking, jogging, walking upstairs, walking downstairs, sitting, and standing more precisely and robustly. Conventional HAR systems are unable to manage real-time changes in the surrounding …
Towards Hardware-Based Application Fingerprinting With Microarchitectural Signals For Zero Trust Environments, Tor J. Langehaug, Scott R. Graham
Towards Hardware-Based Application Fingerprinting With Microarchitectural Signals For Zero Trust Environments, Tor J. Langehaug, Scott R. Graham
Faculty Publications
The interactions between software and hardware are increasingly important to computer system security. This research collects sequences of microprocessor control signals to develop machine learning models that identify software tasks. The proposed approach considers software task identification in hardware as a general problem with attacks treated as a subset of software tasks. Two lines of effort are presented. First, a data collection approach is described to extract sequences of control signals labeled by task identity during real (i.e., non-simulated) system operation. Second, experimental design is used to select hardware and software configuration to train and evaluate machine learning models. The …
A Literature Review On Agile Methodologies Quality, Extreme Programming And Scrum, Naglaa A. Eldanasory, Engy Yehia, Amira M. Idrees
A Literature Review On Agile Methodologies Quality, Extreme Programming And Scrum, Naglaa A. Eldanasory, Engy Yehia, Amira M. Idrees
Future Computing and Informatics Journal
most applied methods in the software development industry. However, agile methodologies face some challenges such as less documentation and wasting time considering changes. This review presents how the previous studies attempted to cover issues of agile methodologies and the modifications in the performance of agile methodologies. The paper also highlights unresolved issues to get the attention of developers, researchers, and software practitioners.
Enhancing Query Processing On Stock Market Cloud-Based Database, Hagger Essam, Ahmed G. Elish, Essam M. Shaban
Enhancing Query Processing On Stock Market Cloud-Based Database, Hagger Essam, Ahmed G. Elish, Essam M. Shaban
Future Computing and Informatics Journal
Cloud computing is rapidly expanding because it allows users to save the development and implementation time on their work. It also reduces the maintenance and operational costs of the used systems. Furthermore, it enables the elastic use of any resource rather than estimating workload, which may be inaccurate, as database systems can benefit from such a trend. In this paper, we propose an algorithm that allocates the materialized view over cloud-based replica sets to enhance the database system's performance in stock market using a Peer-to-Peer architecture. The results show that the proposed model improves the query processing time and network …
The Metaverse: A Virtual World In The Palm Of Your Hand, Ziad Doughan, Hadi Al Mubasher, Mustafa El Bizri, Ali Haidar
The Metaverse: A Virtual World In The Palm Of Your Hand, Ziad Doughan, Hadi Al Mubasher, Mustafa El Bizri, Ali Haidar
BAU Journal - Science and Technology
This paper explores the actual and future impact of the Metaverse as a virtual space. Thus, it focuses the probe on the technical challenges that face this everlasting emerging technology. Today, the Metaverse presents a digital environment to build collective architecture and historical heritage in a virtual space. In this digital world, the modeling and design methodology is based on individual archetypes that can puzzle new elements. Currently, traditional methods require change and adaptation in both the education and work market, especially due to the remote-work integration in the last few years. For example, many components are required to build …
Hybrid Life Cycles In Software Development, Eric Vincent Schoenborn
Hybrid Life Cycles In Software Development, Eric Vincent Schoenborn
Culminating Experience Projects
This project applied software specification gathering, architecture, work planning, and development to a real-world development effort for a local business. This project began with a feasibility meeting with the owner of Zeal Aerial Fitness. After feasibility was assessed the intended users, needed functionality, and expected user restrictions were identified with the stakeholders. A hybrid software lifecycle was selected to allow a focus on base functionality up front followed by an iterative development of expectations of the stakeholders. I was able to create various specification diagrams that express the end projects goals to both developers and non-tech individuals using a standard …
Towards Multipronged On-Chip Memory And Data Protection From Verification To Design And Test, Senwen Kan, Jennifer Dworak
Towards Multipronged On-Chip Memory And Data Protection From Verification To Design And Test, Senwen Kan, Jennifer Dworak
Computer Science and Engineering Theses and Dissertations
Modern System on Chips (SoCs) generally include embedded memories, and these memories may be vulnerable to malicious attacks such as hardware trojan horses (HTHs), test access port exploitation, and malicious software. This dissertation contributes verification as well as design obfuscation solutions aimed at design level detection of memory HTH circuits as well as obfuscation to prevent HTH triggering for embedded memory during functional operation. For malicious attack vectors stemming from test/debug interfaces, this dissertation presents novel solutions that enhance design verification and securitization of an IJTAG based test access interface. Such solutions can enhance SoC protection by preventing memory test …
A Comparative Study On Blockchain-Based Electronic Health Record Systems: Performance, Privacy, And Security Between Hyperledger Fabric And Ethereum Frameworks, Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero, Xia Li
A Comparative Study On Blockchain-Based Electronic Health Record Systems: Performance, Privacy, And Security Between Hyperledger Fabric And Ethereum Frameworks, Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero, Xia Li
Master of Science in Software Engineering Theses
Traditional data collection, storage, and processing of Electronic Health Records (EHR) utilize centralized techniques that pose several risks of single point of failure and lean the systems to a number of internal and external data breaches that compromise their reliability and availability. Addressing the challenges of conventional database techniques and improving the overall aspects of EHR application, blockchain technology is being evaluated to find a possible solution. Blockchain refers to an emerging distributed technology and incorruptible database of records or digital events which execute, validate, and maintain by a ledger technology to provide an immutable architecture and prevent records manipulation …
Development Of Directed Randomization For Discussing A Minimal Security Architecture, Henrique Oyama, Dominic Messina, Keshav Kasturi Rangan, Akkarakaran Francis Leonard, Kip Nieman, Helen Durand, Katie Tyrrell, Katrina Hinzman, Michael Williamson
Development Of Directed Randomization For Discussing A Minimal Security Architecture, Henrique Oyama, Dominic Messina, Keshav Kasturi Rangan, Akkarakaran Francis Leonard, Kip Nieman, Helen Durand, Katie Tyrrell, Katrina Hinzman, Michael Williamson
Chemical Engineering and Materials Science Faculty Research Publications
Strategies for mitigating the impacts of cyberattacks on control systems using a control-oriented perspective have become of greater interest in recent years. Our group has contributed to this trend by developing several methods for detecting cyberattacks on process sensors, actuators, or both sensors and actuators simultaneously using an advanced optimization-based control strategy known as Lyapunov-based economic model predictive control (LEMPC). However, each technique comes with benefits and limitations, both with respect to one another and with respect to traditional information technology and computer science-type approaches to cybersecurity. An important question to ask, therefore, is what the goal should be of …
Applying Hls To Fpga Data Preprocessing In The Advanced Particle-Astrophysics Telescope, Meagan Konst
Applying Hls To Fpga Data Preprocessing In The Advanced Particle-Astrophysics Telescope, Meagan Konst
McKelvey School of Engineering Theses & Dissertations
The Advanced Particle-astrophysics Telescope (APT) and its preliminary iteration the Antarctic Demonstrator for APT (ADAPT) are highly collaborative projects that seek to capture gamma-ray emissions. Along with dark matter and ultra-heavy cosmic ray nuclei measurements, APT will provide sub-degree localization and polarization measurements for gamma-ray transients. This will allow for devices on Earth to point to the direction from which the gamma-ray transients originated in order to collect additional data. The data collection process is as follows. A scintillation occurs and is detected by the wavelength-shifting fibers. This signal is then read by an ASIC and stored in an ADC …
A Design Of A Digital Lockout Tagout System With Machine Learning, Brandon H. Chen
A Design Of A Digital Lockout Tagout System With Machine Learning, Brandon H. Chen
Master's Theses
Lockout Tagout (LOTO) is a safety procedure instated by the Occupational Safety and Health Administration (OSHA) when doing maintenance on dangerous machinery and hazardous power sources. In this procedure, authorized workers shut off the machinery and use physical locks and tags to prevent operation during maintenance. LOTO has been the industry standard for 32 years since it was instantiated, being used in many different industries such as industrial work, mining, and agriculture. However, LOTO is not without its issues. The LOTO procedure requires employees to be trained and is prone to human error. As well, there is a clash between …
Benchmarking Of Embedded Object Detection In Optical And Radar Scenes, Vijaysrinivas Rajagopal
Benchmarking Of Embedded Object Detection In Optical And Radar Scenes, Vijaysrinivas Rajagopal
Masters Theses
A portable, real-time vital sign estimation protoype is developed using neural network- based localization, multi-object tracking, and embedded processing optimizations. The system estimates heart and respiration rates of multiple subjects using directional of arrival techniques on RADAR data. This system is useful in many civilian and military applications including search and rescue.
The primary contribution from this work is the implementation and benchmarking of neural networks for real time detection and localization on various systems including the testing of eight neural networks on a discrete GPU and Jetson Xavier devices. Mean average precision (mAP) and inference speed benchmarks were performed. …
Proposed Web Application For Guidance And Support Of Students: Smartlad, Mukul Aggarwal, Himanshu Tariyal
Proposed Web Application For Guidance And Support Of Students: Smartlad, Mukul Aggarwal, Himanshu Tariyal
International Journal of Computer and Communication Technology
SmartLAD is a Support Platform that connects students, mentors, and professionals of the field and enables them to share their knowledge and experience. We equip the students with a powerful network to rely on, skill-oriented courses that impart real-life skills, and experienced mentors to guide them. Our platform helps students to stay focused on their goals and keep on working hard to achieve their dreams. SmartLAD works as a Support Platform that helps students in their journey of being successful and excelling in their careers by providing them with skills, resources, guidance, and network. We help the students by providing …
Secure Cloud-Based Iot Water Quality Gathering For Analysis And Visualization, Soin Abdoul Kassif Baba M Traore, Maria Valero, Amy Gruss
Secure Cloud-Based Iot Water Quality Gathering For Analysis And Visualization, Soin Abdoul Kassif Baba M Traore, Maria Valero, Amy Gruss
KSU Proceedings on Cybersecurity Education, Research and Practice
Water quality refers to measurable water characteristics, including chemical, biological, physical, and radiological characteristics usually relative to human needs. Dumping waste and untreated sewage is the reason for water pollution and several diseases to the living hood. The quality of water can also have a significant impact on animals and plant ecosystems. Therefore, keeping track of water quality is a substantial national interest. Much research has been done for measuring water quality using sensors to prevent water pollution. In summary, those systems are built based on online and reagent-free water monitoring SCADA systems in wired networks. However, centralized servers, transmission …
Compilation Optimizations To Enhance Resilience Of Big Data Programs And Quantum Processors, Travis D. Lecompte
Compilation Optimizations To Enhance Resilience Of Big Data Programs And Quantum Processors, Travis D. Lecompte
LSU Doctoral Dissertations
Modern computers can experience a variety of transient errors due to the surrounding environment, known as soft faults. Although the frequency of these faults is low enough to not be noticeable on personal computers, they become a considerable concern during large-scale distributed computations or systems in more vulnerable environments like satellites. These faults occur as a bit flip of some value in a register, operation, or memory during execution. They surface as either program crashes, hangs, or silent data corruption (SDC), each of which can waste time, money, and resources. Hardware methods, such as shielding or error correcting memory (ECM), …
Digital Readiness Of Container Terminals For Digital Technology Adoption: A Case Study Of Vietnam, Anh Tuấn Vu
Digital Readiness Of Container Terminals For Digital Technology Adoption: A Case Study Of Vietnam, Anh Tuấn Vu
World Maritime University Dissertations
No abstract provided.
Comparative Analysis Of Cloud-Based Server And Conventional Server Of Simulators For Marine Engineering, Jose Maria Razon Nalus
Comparative Analysis Of Cloud-Based Server And Conventional Server Of Simulators For Marine Engineering, Jose Maria Razon Nalus
World Maritime University Dissertations
No abstract provided.
The Impact Of The Digital Maturity Level On Port Operations In Africa, Joyce Wanjiru Kaburu
The Impact Of The Digital Maturity Level On Port Operations In Africa, Joyce Wanjiru Kaburu
World Maritime University Dissertations
No abstract provided.
The Determination Of Port Automation Levels Using An Analytic Hierarchical Process : A Case Study For The Port Of Colombo, Waruna Lasantha De Silva Amarathunga
The Determination Of Port Automation Levels Using An Analytic Hierarchical Process : A Case Study For The Port Of Colombo, Waruna Lasantha De Silva Amarathunga
World Maritime University Dissertations
No abstract provided.
Research On The Early Warning And Intervention Of Learning Crisis Based On Smart Classroom, Tan Aiping, Wang Sainan
Research On The Early Warning And Intervention Of Learning Crisis Based On Smart Classroom, Tan Aiping, Wang Sainan
International Journal of Computer and Communication Technology
Under the normal state of online and offline integrated learning of open courses, the low participation of learners and low learning results are hot issues that scholars in the industry pay more attention to. Accurate learning crisis warning and personalized teaching intervention are important measures to solve the above problems and improve teaching quality. Based on the analysis of the shortcomings of the existing learning early warning and teaching intervention, this study constructs a research framework of online open course learning early warning and intervention under the intelligent classroom learning environment. The framework diagnoses and warns learners' learning state from …
Design Of An Efficient Memristor-Based Dynamic Exclusive-Or Gate., Annu Chauhan, Dishika Chopra, Lirisha Tayal, Utsav Singal, Kirti Gupta, Monica Gupta
Design Of An Efficient Memristor-Based Dynamic Exclusive-Or Gate., Annu Chauhan, Dishika Chopra, Lirisha Tayal, Utsav Singal, Kirti Gupta, Monica Gupta
International Journal of Computer and Communication Technology
In this paper, an efficient memristor-based dynamic logic design for an Exclusive-OR gate is proposed. The proposed realization reduces the number of cascaded stages and component count thereby providing an overall performance improvement. The performance of the proposed design is compared with the most recent existing design through LTspice software simulations at 32 nm technology node in terms of total power consumption, average propagation delay, and number of components used in the implementation. The outcomes depict that the proposed design consumes 57 % reduced power and provides faster operation with 5.09 % improvement in propagation delay in comparison to its …
Towards Qos-Based Embedded Machine Learning, Tom Springer, Erik Linstead, Peiyi Zhao, Chelsea Parlett-Pelleriti
Towards Qos-Based Embedded Machine Learning, Tom Springer, Erik Linstead, Peiyi Zhao, Chelsea Parlett-Pelleriti
Engineering Faculty Articles and Research
Due to various breakthroughs and advancements in machine learning and computer architectures, machine learning models are beginning to proliferate through embedded platforms. Some of these machine learning models cover a range of applications including computer vision, speech recognition, healthcare efficiency, industrial IoT, robotics and many more. However, there is a critical limitation in implementing ML algorithms efficiently on embedded platforms: the computational and memory expense of many machine learning models can make them unsuitable in resource-constrained environments. Therefore, to efficiently implement these memory-intensive and computationally expensive algorithms in an embedded computing environment, innovative resource management techniques are required at the …
Height Information Aided 3d Real-Time Large-Scale Underground User Positioning, Houbing Song, Chengkai Tang, Cunle Zhang, Lingling Zhang, Yi Zhang
Height Information Aided 3d Real-Time Large-Scale Underground User Positioning, Houbing Song, Chengkai Tang, Cunle Zhang, Lingling Zhang, Yi Zhang
Publications
Due to the cost of inertial navigation and visual navigation equipment and lake of satellite navigation signals, they cannot be used in large‐scale underground mining environment. To solve this problem, this study proposes large‐scale underground 3D real‐time positioning method with seam height assistance. This method uses the ultrawide band positioning base station as the core and is combined with seam height information to build a factor graph confidence transfer model to realise3D positioning. The simulation results show that the proposed real‐time method is superior to the existing algorithms in positioning accuracy and can meet the needs of large‐scale underground users.
Evaluation Of Classroom Gamification In Higher Education, Dipali Ghatge, Dayanand Ghatge, Rajeswari Kannan Dr., Amir Shaikh, Varsha Naik
Evaluation Of Classroom Gamification In Higher Education, Dipali Ghatge, Dayanand Ghatge, Rajeswari Kannan Dr., Amir Shaikh, Varsha Naik
Graduate Research in Engineering and Technology (GRET)
Using games for teaching-Learning include features that engage the learners. Gamified instruction builds learning for the better in many ways. First, it empowers students to be responsible for their learning. Well-designed games are particularly effective at keeping reluctant learners engaged because they keep the learner close to but not over their capacity threshold. Second, gamified methods help students maintain a skillful mindset when encountering new obstacles. Moreover finally, gamified instructional techniques build on the ways games boost a player to survive in the face of challenges to help students better overcome hurdles in their learning environment. Engagement of the students …