2017
DOI: 10.1007/s11042-017-4615-z
|View full text |Cite
|
Sign up to set email alerts
|

Multimedia based student-teacher smart interaction framework using multi-agents in eLearning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 7 publications
(8 citation statements)
references
References 18 publications
0
7
0
Order By: Relevance
“…ACM Q2 [23], [24], [25], [26] IEEE Q1 [27], [28], [29], [30], [31], [32], [33] Science Direct Q1 [34], [35], [36], [13], [33], [37], [38] Springer Q1 [39], [40], [41], [42], [43], [44], [45], [46], [47], [48], [49], [50], [51], [52], [53], [54], [18], [55], [56], [57], [58] Others Q1 [59], [60] Q2 [61], [62], [63], [64],…”
Section: Publisher Quartile Papermentioning
confidence: 99%
See 2 more Smart Citations
“…ACM Q2 [23], [24], [25], [26] IEEE Q1 [27], [28], [29], [30], [31], [32], [33] Science Direct Q1 [34], [35], [36], [13], [33], [37], [38] Springer Q1 [39], [40], [41], [42], [43], [44], [45], [46], [47], [48], [49], [50], [51], [52], [53], [54], [18], [55], [56], [57], [58] Others Q1 [59], [60] Q2 [61], [62], [63], [64],…”
Section: Publisher Quartile Papermentioning
confidence: 99%
“…Asynchronous [18], [25], [26], [28], [29], [30], [31], [33], [34], [35], [39], [40], [41], [43], [44], [45], [46], [47], [49], [50], [51], [52], [53], [54], [55], [56], [57], [58], [59], [60], [61], [63], [66], Synchronous [24], [27], [38], [62] Other [48] Role Peer [18], [47], [55], [58] Tutor [24], [28], [29], [30][26], [31], [34], [35], [37], [38],…”
Section: Environ -Mentmentioning
confidence: 99%
See 1 more Smart Citation
“…The enhancement and conformities required to run the computation-intensive jobs need a testbed composed of very costly hardware. The investigation is also helpful for the exascale calculation in future [5]. The technique depends on the presumption of "common" bond lengths and points, deviation from which prompts strain, and the presence of torsional connections and appealing or potentially terrible van der Waals and dipolar powers between nonfortified molecules [19].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Cloud computing data security and privacy are enhanced by using the Single Sign-On approach. This approach uses identity management techniques like OAuth, Figure 1: Multimedia big data particular levels [4,5]. OpenID, and SAML for the enhancement of cloud users' security and privacy [1].…”
Section: Introductionmentioning
confidence: 99%