Classifying Student Attentiveness Using Machine Learning Technique for Improving Learning Systems
Abstract
Full Text:
PDFReferences
Shan, C., Chen, B., Hu, C., Xue, J., & Li, N. (2014). Software defect prediction model based on LLE and SVM.
Moyo, S., & Mnkandla, E. (2020). A Novel Lightweight Solo Software Development Methodology With Optimum Security Practices. IEEE Access, 8, 33735-33747.
Siboni, S., Sachidananda, V., Meidan, Y., Bohadana, M., Mathov, Y., Bhairav, S., ... & Elovici, Y. (2019). Security testbed for internet-of-things devices. IEEE Transactions on Reliability, 68(1), 23-44.
Zhao, X., Xue, J., Hu, C., Ma, R., & Zhang, S. (2014). Research on software behavior modeling based on extended finite state automata.
Dong, H., Li, C., Li, T., Du, Y., & Xu, G. (2014). Research on the security model of mobile application.
Márquez, G., Astudillo, H., & Taramasco, C. (2020). Security in Telehealth Systems From a Software Engineering Viewpoint: A Systematic Mapping Study. IEEE Access, 8, 10933-10950.
Eom, T., Hong, J. B., An, S., Park, J. S., & Kim, D. S. (2019). A Systematic Approach to Threat Modeling and Security Analysis for Software Defined Networking. Ieee Access, 7, 137432-137445.
Huang, Y., Bian, Y., Li, R., Zhao, J. L., & Shi, P. (2019). Smart contract security: A software lifecycle perspective. IEEE Access, 7, 150184-150202.
Cornish, P. L., Knowles, S. R., Marchesano, R., Tam, V., Shadowitz, S., Juurlink, D. N., & Etchells, E. E. (2005). Unintended medication discrepancies at the time of hospital admission. Archives of internal medicine, 165(4), 424-429.
T Tam, V. C., Knowles, S. R., Cornish, P. L., Fine, N., Marchesano, R., & Etchells, E. E. (2005). Frequency, type and clinical importance of medication history errors at admission to hospital: a systematic review. Cmaj, 173(5), 510-515.
Refbacks
- There are currently no refbacks.