Search Word(s) in Title, Keywords, Authors, and Abstract: Edge

An Improved Level Set Method to Image Segmentation Based on Saliency
Yan Wang and Xianfa Xu
Page: 7~21, Vol. 15, No.1, 2019
10.3745/JIPS.02.0105
Keywords: Canny Operator, Edge Energy, Level Set Method, Local Renyi Entropy, Saliency Map
Show / Hide Abstract

Movie Recommendation Algorithm Using Social Network Analysis to Alleviate Cold-Start Problem
Khamphaphone Xinchang, Phonexay Vilakone and Doo-Soon Park
Page: 616~631, Vol. 15, No.3, 2019
10.3745/JIPS.04.0121
Keywords: Cold Start Problem, Collaborative Filtering (CF), Movie Recommendation System, Social Network Analysis
Show / Hide Abstract

Future Trends of AI-based Smart Systems and Services: Challenges, Opportunities, and Solutions
Daewon Lee and Jong Hyuk Park
Page: 717~723, Vol. 15, No.4, 2019
10.3745/JIPS.02.0113
Keywords: Artificial Intelligence, Deep Learning, Sentiment Analysis, Smart Systems and Services
Show / Hide Abstract

Emerging Technologies for Sustainable Smart City Network Security: Issues, Challenges, and Countermeasures
Jeong Hoon Jo, Pradip Kumar Sharma, Jose Costa Sapalo Sicato and Jong Hyuk Park
Page: 765~784, Vol. 15, No.4, 2019
10.3745/JIPS.03.0124
Keywords: Blockchain, Edge Computing, Internet of Things, Network Security, Smart City
Show / Hide Abstract

Comprehensive Survey on Internet of Things, Architecture, Security Aspects, Applications, Related Technologies, Economic Perspective, and Future Directions
Khusanbek Gafurov and Tai-Myoung Chung
Page: 797~819, Vol. 15, No.4, 2019
10.3745/JIPS.03.0125
Keywords: Cloud, Edge, IoT, IoT Security, MEC/MCC, RFID, WSN, 5G
Show / Hide Abstract

Cyber Kill Chain-Based Taxonomy of Advanced Persistent Threat Actors: Analogy of Tactics, Techniques, and Procedures
Pooneh Nikkhah Bahrami, Ali Dehghantanha, Tooska Dargahi, Reza M. Parizi, Kim-Kwang Raymond Choo and Hamid H. S. Javadi
Page: 865~889, Vol. 15, No.4, 2019
10.3745/JIPS.03.0126
Keywords: Advanced Persistent Threats (APT), Cyber-Attacks, Cyber Kill Chain (CKC), Intelligence Sharing, Knowledge Sharing
Show / Hide Abstract

Mobile User Interface Pattern Clustering Using Improved Semi-Supervised Kernel Fuzzy Clustering Method
Wei Jia, Qingyi Hua, Minjun Zhang, Rui Chen, Xiang Ji and Bo Wang
Page: 986~1016, Vol. 15, No.4, 2019
10.3745/JIPS.04.0131
Keywords: Intuitionistic Fuzzy Entropy Measure, Mobile User Interface Pattern, Particle Swarm Optimization, Population Search Strategy, Semi-Supervised Kernel Fuzzy C-Means
Show / Hide Abstract

Intelligent Resource Management Schemes for Systems, Services, and Applications of Cloud Computing Based on Artificial Intelligence
JongBeom Lim, DaeWon Lee, Kwang-Sik Chung and HeonChang Yu
Page: 1192~1200, Vol. 15, No.5, 2019
10.3745/JIPS.04.0139
Keywords: Artificial Intelligence, Cloud Computing, Edge-Cloud Systems, Fog Computing, Resource Management
Show / Hide Abstract

[EDITORIAL] Practical Approaches Based on Deep Learning and Social Computing
Jong Hyuk Park
Page: 1~5, Vol. 14, No.1, 2018
10.3745/JIPS.00.0009
Keywords:
Show / Hide Abstract

A Survey about Consensus Algorithms Used in Blockchain
Giang-Truong Nguyen and Kyungbaek Kim
Page: 101~128, Vol. 14, No.1, 2018
10.3745/JIPS.01.0024
Keywords: Blockchain, Consensus Algorithm
Show / Hide Abstract

Crowdsourcing Software Development: Task Assignment Using PDDL Artificial Intelligence Planning
Muhammad Zahid Tunio, Haiyong Luo, Cong Wang and Fang Zhao
Page: 129~139, Vol. 14, No.1, 2018
10.3745/JIPS.04.0055
Keywords: AI, Crowdsourcing, Personality, Planning Language, Software Development, Task
Show / Hide Abstract

Feature Subset for Improving Accuracy of Keystroke Dynamics on Mobile Environment
Sung-Hoon Lee, Jong-hyuk Roh, SooHyung Kim and Seung-Hun Jin
Page: 523~538, Vol. 14, No.2, 2018
10.3745/JIPS.03.0093
Keywords: Feature Subset, Keystroke Dynamics, Smartphone Sensor
Show / Hide Abstract

A Method of Coupling Expected Patch Log Likelihood and Guided Filtering for Image Denoising
Shunfeng Wang, Jiacen Xie, Yuhui Zheng, Jin Wang and Tao Jiang
Page: 552~562, Vol. 14, No.2, 2018
10.3745/JIPS.02.0085
Keywords: Edge Preserving, Expected Patch Log Likelihood, Image De-noising, Guided Filtering
Show / Hide Abstract

Applying Lexical Semantics to Automatic Extraction of Temporal Expressions in Uyghur
Alim Murat, Azharjan Yusup, Zulkar Iskandar, Azragul Yusup and Yusup Abaydulla
Page: 824~836, Vol. 14, No.4, 2018
10.3745/JIPS.02.0089
Keywords: Feature Combination, Lexical Semantics, Morphosyntax, Temporal Expression Extraction, Uyghur
Show / Hide Abstract

Artificial Intelligence for the Fourth Industrial Revolution
Young-Sik Jeong and Jong Hyuk Park
Page: 1301~1306, Vol. 14, No.6, 2018
10.3745/JIPS.00.0014
Keywords: Artificial Intelligence, Super intelligence, Superconnection
Show / Hide Abstract

Triqubit-state Measurement-based Image Edge Detection Algorithm
Zhonghua Wang and Faliang Huang
Page: 1331~1346, Vol. 14, No.6, 2018
10.3745/JIPS.04.0095
Keywords: Edge Detection, Partial Differential Equation, Pixel Saliency, Qubit State, Quantum Measurement
Show / Hide Abstract

Combining Multi-Criteria Analysis with CBR for Medical Decision Support
Mansoul Abdelhak and Atmani Baghdad
Page: 1496~1515, Vol. 13, No.6, 2017
10.3745/JIPS.04.0050
Keywords: Case-Based Reasoning (CBR), Decision Support, Medical Diagnosis, Multi-Criteria Analysis (MCA), Multimodal Reasoning
Show / Hide Abstract

An Intuitionistic Fuzzy Approach to Classify the User Based on an Assessment of the Learner’s Knowledge Level in E-Learning Decision-Making
Mukta Goyal, Divakar Yadav and Alka Tripathi
Page: 57~67, Vol. 13, No.1, 2017
10.3745/JIPS.04.0011
Keywords: Domain Model, E-Learning, E-Learning Environment, Fuzzy Rules, Intuitionistic Fuzzy Set, User Modeling
Show / Hide Abstract

Fuzzy-Membership Based Writer Identification from Handwritten Devnagari Script
Rajiv Kumar, Kiran Kumar Ravulakollu and Rajesh Bhat
Page: 893~913, Vol. 13, No.4, 2017
10.3745/JIPS.02.0018
Keywords: CPAR-2012, Devnagari, Fuzzy Membership, Handwritten Script, Writer Identification
Show / Hide Abstract

Self-Identification of Boundary’s Nodes in Wireless Sensor Networks
Kouider Elouahed Moustafa and Haffaf Hafid
Page: 128~140, Vol. 13, No.1, 2017
10.3745/JIPS.03.0062
Keywords: Boundary Recognition, Military Applications, Military Surveillance, Wireless Sensor Network
Show / Hide Abstract

Blind Image Quality Assessment on Gaussian Blur Images
Liping Wang, Chengyou Wang and Xiao Zhou
Page: 448~463, Vol. 13, No.3, 2017
10.3745/JIPS.02.0059
Keywords: Blind Image Quality Assessment (BIQA), Gaussian Blur Image, Saliency Map, Structure Tensor, Structural Similarity (SSIM)
Show / Hide Abstract

Using Semantic Knowledge in the Uyghur-Chinese Person Name Transliteration
Alim Murat, Turghun Osman, Yating Yang, Xi Zhou, Lei Wang and Xiao Li
Page: 716~730, Vol. 13, No.4, 2017
10.3745/JIPS.02.0065
Keywords: Gender, Language Origin, Semantic Knowledge-based Model, Transliteration of Person Name
Show / Hide Abstract

[EDITORIAL] Efficient Approaches to Computer Vision and Pattern Recognition
Jong Hyuk Park
Page: 1043~1051, Vol. 13, No.5, 2017
10.3745/JIPS.00.0007
Keywords:
Show / Hide Abstract

Extraction of ObjectProperty-UsageMethod Relation from Web Documents
Chaveevan Pechsiri, Sumran Phainoun and Rapeepun Piriyakul
Page: 1103~1125, Vol. 13, No.5, 2017
10.3745/JIPS.04.0046
Keywords: Medicinal Property, N-Word-Co, Semantic Relation, Usage-Method
Show / Hide Abstract

Similarity Evalution between Graphs: A Formal Concept Analysis Approach
Fei Hao, Dae-Soo Sim, Doo-Soon Park and Hyung-Seok Seo
Page: 1158~1167, Vol. 13, No.5, 2017
10.3745/JIPS.04.0048
Keywords: Formal Concept Analysis, Graph, Social Networks, Similarity Evaluation
Show / Hide Abstract

A Comprehensive Review of Emerging Computational Methods for Gene Identification
Ning Yu, Zeng Yu, Bing Li, Feng Gu and Yi Pan
Page: 1~34, Vol. 12, No.1, 2016
10.3745/JIPS.04.0023
Keywords: Cloud Computing, Comparative Methods, Deep Learning, Fourier Transform, Gene Identification, Gene Prediction, Hidden Markov Model, Machine Learning, Protein-Coding Region, Support Vector Machine
Show / Hide Abstract

Feasibility Study of a Distributed and Parallel Environment for Implementing the Standard Version of AAM Model
Moulkheir Naoui, Saïd Mahmoudi and Ghalem Belalem
Page: 149~168, Vol. 12, No.1, 2016
10.3745/JIPS.02.0039
Keywords: Active Appearance Model, Data Parallelism, Deformable Model, Distributed Image Processing, Parallel Image Processing, Segmentation
Show / Hide Abstract

Practical (Second) Preimage Attacks on the TCS_SHA-3 Family of Cryptographic Hash Functions
Gautham Sekar and Soumyadeep Bhattacharya
Page: 310~312, Vol. 12, No.2, 2016
10.3745/JIPS.03.0021
Keywords: Cryptanalysis, Hash Function, (Second) Preimage Attack
Show / Hide Abstract

Image Deblocking Scheme for JPEG Compressed Images Using an Adaptive-Weighted Bilateral Filter
Liping Wang, Chengyou Wang, Wei Huang and Xiao Zhou
Page: 631~643, Vol. 12, No.4, 2016
10.3745/JIPS.02.0046
Keywords: Image Deblocking, Adaptive-Weighted Bilateral Filter, Blind Image Quality Assessment (BIQA), Local Entropy
Show / Hide Abstract

A Novel DWT-SVD Canny-Based Watermarking Using a Modified Torus Technique
Salima Lalani and D. D. Doye
Page: 681~687, Vol. 12, No.4, 2016
10.3745/JIPS.02.0045
Keywords: DWT, Image Watermarking, Torus
Show / Hide Abstract

A Novel Approach for Integrating Security in Business Rules Modeling Using Agents and an Encryption Algorithm
Nawal Sad Houari and Noria Taghezout
Page: 688~710, Vol. 12, No.4, 2016
10.3745/JIPS.03.0056
Keywords: Business Rules (BR), Business Rules Management System (BRMS), Encryption Algorithms, Security Agent
Show / Hide Abstract

X-Ray Image Enhancement Using a Boundary Division Wiener Filter and Wavelet-Based Image Fusion Approach
Sajid Ullah Khan, Wang Yin Chai, Chai Soo See and Amjad Khan
Page: 35~45, Vol. 12, No.1, 2016
10.3745/JIPS.02.0029
Keywords: Image Enhancement, Image Fusion, Poisson/Impulse Noise, Sharpening, Wavelet Transform
Show / Hide Abstract

Learning to Prevent Inactive Student of Indonesia Open University
Bayu Adhi Tama
Page: 165~172, Vol. 11, No.2, 2015
10.3745/JIPS.04.0015
Keywords: Educational Data Mining, Ensemble Techniques, Inactive Student, Open University
Show / Hide Abstract

A Note on Computing the Crisp Order Context of a Fuzzy Formal Context for Knowledge Reduction
Prem Kumar Singh and Ch. Aswani Kumar
Page: 184~204, Vol. 11, No.2, 2015
10.3745/JIPS.04.0009
Keywords: Crisp Context, Concept Lattice, Formal Concept Analysis, Fuzzy Formal Concept, Fuzzy Relation, Knowledge Reduction
Show / Hide Abstract

A Review of Fixed-Complexity Vector Perturbation for MU-MIMO
Manar Mohaisen
Page: 354~369, Vol. 11, No.3, 2015
10.3745/JIPS.03.0035
Keywords: Block Diagonalization, MU-MIMO, Perfect and Imperfect Channel Knowledge, Quantization, Vector Perturbation
Show / Hide Abstract

Robust ROI Watermarking Scheme Based on Visual Cryptography: Application on Mammograms
Meryem Benyoussef, Samira Mabtoul, Mohamed El Marraki and Driss Aboutajdine
Page: 495~508, Vol. 11, No.4, 2015
10.3745/JIPS.02.0032
Keywords: Copyright Protection, Mammograms, Medical Image, Robust Watermarking, Visual Cryptography
Show / Hide Abstract

Text Detection in Scene Images Based on Interest Points
Minh Hieu Nguyen and Gueesang Lee
Page: 528~537, Vol. 11, No.4, 2015
10.3745/JIPS.02.0026
Keywords: Connected Component, Interest Point, Tensor Voting, Text Detection
Show / Hide Abstract

Push-N-Scheme with Timeout for Content Delivery of Social Networking Services
Kyungkoo Jun
Page: 81~92, Vol. 10, No.1, 2014
10.3745/JIPS.2014.10.1.081
Keywords: Push Scheme, Content Delivery, SNS, Wait Time
Show / Hide Abstract

Cooperation-Aware VANET Clouds: Providing Secure Cloud Services to Vehicular Ad Hoc Networks
Rasheed Hussain and Heekuck Oh
Page: 103~118, Vol. 10, No.1, 2014
10.3745/JIPS.2014.10.1.103
Keywords: VANET Clouds, Security, Privacy, Traffic Information, Data Dissemination, Cloud Computing
Show / Hide Abstract

Optical Image Encryption and Decryption Considering Wireless Communication Channels
Myungjin Cho and In-Ho Lee
Page: 215~222, Vol. 10, No.2, 2014
10.3745/JIPS.03.0003
Keywords: Optical Encryption and Decryption, Wireless Communication Channels
Show / Hide Abstract

The Design of the IIR Differintegrator and its Application in Edge Detection
Madhu Jain, Maneesha Gupta and N. K. Jain
Page: 223~239, Vol. 10, No.2, 2014
10.3745/JIPS.02.0001
Keywords: Digital integrator, digital differentiator, edge detection and image processing
Show / Hide Abstract

Content Modeling Based on Social Network Community Activity
Kyung-Rog Kim and Nammee Moon
Page: 271~282, Vol. 10, No.2, 2014
10.3745/JIPS.04.0001
Keywords: Social network community activities, content model, learning objects, content granularity, content aggregation level
Show / Hide Abstract

Training-Free Fuzzy Logic Based Human Activity Recognition
Eunju Kim and Sumi Helal
Page: 335~354, Vol. 10, No.3, 2014
10.3745/JIPS.04.0005
Keywords: Activity Semantic Knowledge, Fuzzy Logic, Human Activity Recognition, Multi-Layer Neural Network
Show / Hide Abstract

An Unified Representation of Context Knowledge Base for Mobile Context-Aware System
Jang-Seop Jeong and Dae-Wook Bang
Page: 581~588, Vol. 10, No.4, 2014
10.3745/JIPS.01.0002
Keywords: Context-Awareness, Knowledge Base, Unified Context Information
Show / Hide Abstract

An Efficient Color Edge Detection Using the Mahalanobis Distance
Kittiya Khongkraphan
Page: 589~601, Vol. 10, No.4, 2014
10.3745/JIPS.02.0010
Keywords: Color Image, Edge Detection, Mahalanobis Distance
Show / Hide Abstract

A Robust Face Detection Method Based on Skin Color and Edges
Deepak Ghimire and Joonwhoan Lee
Page: 141~156, Vol. 9, No.1, 2013
10.3745/JIPS.2013.9.1.141
Keywords: Face Detection, Image Enhancement, Skin Tone Percentage Index, Canny Edge, Facial Features
Show / Hide Abstract

Interactive Semantic Image Retrieval
Pushpa B. Patil and Manesh B. Kokare
Page: 349~364, Vol. 9, No.3, 2013
10.3745/JIPS.2013.9.3.349
Keywords: Content-based Image Retrieval (CBIR), Relevance Feedback (RF), Rotated Complex Wavelet Filt ers (RCWFs), Dual Tree Complex Wavelet, and Image retrieval
Show / Hide Abstract

A New Approach for Information Security using an Improved Steganography Technique
Mamta Juneja and Parvinder Singh Sandhu
Page: 405~424, Vol. 9, No.3, 2013
10.3745/JIPS.2013.9.3.405
Keywords: Adaptive LSB Steganography, AES; Hybrid Feature Detection, Random Pixel Embeddin g, Steganography, Two Component based LSB Steganography
Show / Hide Abstract

A Regularity-Based Preprocessing Method for Collaborative Recommender Systems
Raciel Yera Toledo, Yailé Caballero Mota and Milton García Borroto
Page: 435~460, Vol. 9, No.3, 2013
10.3745/JIPS.2013.9.3.435
Keywords: Collaborative Recommender Systems, Inconsistencies, Rating Regularities
Show / Hide Abstract

Anonymous Authentication Scheme based on NTRU for the Protection of Payment Information in NFC Mobile Environment
Sung-Wook Park and Im-Yeong Lee
Page: 461~476, Vol. 9, No.3, 2013
10.3745/JIPS.2013.9.3.461
Keywords: NFC Mobile Payment, Zero Knowledge Proof, NTRU, Ring Signature
Show / Hide Abstract

Developing a Web-Based Knowledge Product Outsourcing System at a University
Mark B. Onte and Dave E. Marcial
Page: 548~566, Vol. 9, No.4, 2013
10.3745/JIPS.2013.9.4.548
Keywords: Knowledge Product Outsourcing, Management, Web 2.0, IT in Education
Show / Hide Abstract

Simple Fuzzy Rule Based Edge Detection
O.P. Verma, Veni Jain and Rajni Gumber
Page: 575~591, Vol. 9, No.4, 2013
10.3745/JIPS.2013.9.4.575
Keywords: Edge detection, Edge improvement, Fuzzy rules, Membership function
Show / Hide Abstract

Dynamic knowledge mapping guided by data mining: Application on Healthcare
Menaouer Brahami, Baghdad Atmani and Nada Matta
Page: 1~30, Vol. 9, No.1, 2013
10.3745/JIPS.2013.9.1.001
Keywords: Knowledge Management, Knowledge Mapping (Knowledge Cartography), Knowledge Representation, Boolean Modeling, Cellular Machine, Data Mining, Boolean Inference Engine
Show / Hide Abstract

Supporting Java Components in the SID Simulation System
Hasrul Ma'ruf, Hidayat Febiansyah and Jin Baek Kwon
Page: 101~118, Vol. 8, No.1, 2012
10.3745/JIPS.2011.8.1.101
Keywords: Embedded System, Simulation System, SID Simulator
Show / Hide Abstract

A Vision-Based Method to Find Fingertips in a Closed Hand
Ankit Chaudhary, Kapil Vatwani, Tushar Agrawal and J.L. Raheja
Page: 399~408, Vol. 8, No.3, 2012
10.3745/JIPS.2012.8.3.399
Keywords: Hand Shape Parameters, Fingertips Detection, Skin Filter, Natural Computing, Corner Detection
Show / Hide Abstract

Design and Development of m-Learning Service Based on 3G Cellular Phones
Kwang Sik Chung and Jeong Eun Lee
Page: 521~538, Vol. 8, No.3, 2012
10.3745/JIPS.2012.8.3.521
Keywords: m-Learning, e-Learning Service Platform, Mobile Education Device, Cellular Phone, 3G Networks, H.264
Show / Hide Abstract

An Embedding of Multiple Edge-Disjoint Hamiltonian Cycles on Enhanced Pyramid Graphs
Jung-Hwan Chang
Page: 75~84, Vol. 7, No.1, 2011
10.3745/JIPS.2011.7.1.075
Keywords: Enhanced Pyramid Model, Hamiltonian Cycle, Edge-Disjoint Cycle
Show / Hide Abstract

The Principle of Justifiable Granularity and an Optimization of Information Granularity Allocation as Fundamentals of Granular Computing
Witold Pedrycz
Page: 397~412, Vol. 7, No.3, 2011
10.3745/JIPS.2011.7.3.397
Keywords: Information Granularity, Principle of Justifiable Granularity, Knowledge Management, Optimal Granularity Allocation
Show / Hide Abstract

Efficient Proof of Vote Validity Without Honest-Verifier Assumption in Homomorphic E-Voting
Kun Peng
Page: 549~560, Vol. 7, No.3, 2011
10.3745/JIPS.2011.7.3.549
Keywords: Efficient Proof, E-Voting
Show / Hide Abstract

Mining Frequent Itemsets with Normalized Weight in Continuous Data Streams
Younghee Kim, Wonyoung Kim and Ungmo Kim
Page: 79~90, Vol. 6, No.1, 2010
10.3745/JIPS.2010.6.1.079
Keywords: Frequent Itemsets, Weighted Support, Window Sliding, Weighted Support FP-Tree, Data Stream, WSFI-Mine
Show / Hide Abstract

The ISDF Framework: Towards Secure Software Development
Abdulaziz Alkussayer and William H Allen
Page: 91~106, Vol. 6, No.1, 2010
10.3745/JIPS.2010.6.1.091
Keywords: Security Patterns, Secure Development, Security Framework
Show / Hide Abstract

IMTAR: Incremental Mining of General Temporal Association Rules
Anour F.A. Dafa-Alla, Ho Sun Shon, Khalid E.K. Saeed, Minghao Piao, Un-il Yun, Kyung Joo Cheoi and Keun Ho Ryu
Page: 163~176, Vol. 6, No.2, 2010
10.3745/JIPS.2010.6.2.163
Keywords: Incremental Mining of General Temporal Association Rules, Incremental TFP-Tree
Show / Hide Abstract

Mining Spatio-Temporal Patterns in Trajectory Data
Juyoung Kang and Hwan-Seung Yong
Page: 521~536, Vol. 6, No.4, 2010
10.3745/JIPS.2010.6.4.521
Keywords: Data Mining, Spatio-Temporal Data Mining, Trajectory Data, Frequent Spatio-Temporal Patterns
Show / Hide Abstract

An Efficient Web Ontology Storage Considering Hierarchical Knowledge for Jena-based Applications
Dongwon Jeong, Heeyoung Shin, Doo-Kwon Baik and Young-Sik Jeong
Page: 11~18, Vol. 5, No.1, 2009
10.3745/JIPS.2009.5.1.011
Keywords: Ontology, Jena, OWL, Ontology, Storage, Hierarchical Structure
Show / Hide Abstract

Autonomic Self Healing-Based Load Assessment for Load Division in OKKAM Backbone Cluster
Junaid Ahsenali Chaudhry
Page: 69~76, Vol. 5, No.2, 2009
10.3745/JIPS.2009.5.2.069
Keywords: Self Healing Systems, Load Estimation and Balancing, OKKAM, Entity Naming System
Show / Hide Abstract

A Knowledge Discovery Framework for Spatiotemporal Data Mining
Jun-Wook Lee and Yong-Joon Lee
Page: 124~129, Vol. 2, No.2, 2006
None
Keywords: spatiotemporal data mining, spatiotemporal knowledge discovery, spatiotemporal moving pattern, discovery framework
Show / Hide Abstract

Prototyping a Student Model for Educational Games
YoungMee Choi, MoonWon Choo and SeongAh Chin
Page: 107~111, Vol. 1, No.1, 2005
None
Keywords: edutainment, pedagogical agents, emotion generation, student modeling, Intelligent Tutoring Systems, dynamic Bayesian networks
Show / Hide Abstract