A learning design framework to support children with learning disabilities incorporating gamification techniques
A Shaban, E Pearson - Extended Abstracts of the 2019 CHI Conference …, 2019 - dl.acm.org
Gamification is increasingly being applied in education to engage and motivate learners.
Yet the application of gaming elements can be problematic because it can have a negative …
Yet the application of gaming elements can be problematic because it can have a negative …
[HTML][HTML] A Systematic Review of Working Memory Applications for Children with Learning Difficulties: Transfer Outcomes and Design Principles
Working memory (WM) is a crucial cognitive function, and a deficit in this function is a critical
factor in learning difficulties (LDs). As a result, there is growing interest in exploring different …
factor in learning difficulties (LDs). As a result, there is growing interest in exploring different …
Evaluation of user experience, cognitive load, and training performance of a gamified cognitive training application for children with learning disabilities
This study presents a gamified application for children with learning disabilities, designed to
train and improve their working memory capacity. The application takes the form of a …
train and improve their working memory capacity. The application takes the form of a …
D2BOF-COVIDNet: A Framework of Deep Bayesian Optimization and Fusion-Assisted Optimal Deep Features for COVID-19 Classification Using Chest X-ray and MRI …
Background and Objective: In 2019, a corona virus disease (COVID-19) was detected in
China that affected millions of people around the world. On 11 March 2020, the WHO declared …
China that affected millions of people around the world. On 11 March 2020, the WHO declared …
SkinNet‐ENDO: Multiclass skin lesion recognition using deep neural network and Entropy‐Normal distribution optimization algorithm with ELM
The early diagnosis of skin cancer through clinical methods reduces the human mortality
rate. The manual screening of dermoscopic images is not an efficient procedure; therefore, …
rate. The manual screening of dermoscopic images is not an efficient procedure; therefore, …
Evaluation of user experience and cognitive load of a gamified cognitive training application for children with learning disabilities
A Shaban, E Pearson - Proceedings of the 17th international web for all …, 2020 - dl.acm.org
This study presents a gamified application for children with learning disabilities, designed to
train and improve working memory. The application takes the form of a treasure hunt, and is …
train and improve working memory. The application takes the form of a treasure hunt, and is …
Development and evaluation of a cognitive training application for children with learning difficulties: A design-based approach
The studies targeting cognitive training via computerized applications focused on suggesting
varied types of Working Memory's (WM) tasks rather than offering those tasks in a user-…
varied types of Working Memory's (WM) tasks rather than offering those tasks in a user-…
[PDF][PDF] TRANSIENT SIGNAL GENERATOR FOR FAULT INDICATOR TESTING
The paper describes an application for testing of a fault indicator but it could be used for
other network protection testing. The application is created in the Lab VIEW environment and …
other network protection testing. The application is created in the Lab VIEW environment and …
[HTML][HTML] Kretschmann-based optical sensor via thermally tunable refractive index
This study discusses whether the prism used in a Kretschmann-based surface plasmon sensor
can be fabricated from a thermotropic liquid crystal (TLC) material. The refractive index of …
can be fabricated from a thermotropic liquid crystal (TLC) material. The refractive index of …
Towards a Working Conceptual Framework: Cyber Law for Data Privacy and Information Security Management for the Industrial Internet of Things Application Domain
…, K Wnuk, N Shanmugan, A Shaban… - … on Industrial IoT, Big …, 2022 - ieeexplore.ieee.org
For Industrial Internet of Things (IIoT) and Big Data - Data Privacy presents significant
challenges in Cyber Security - specifically in the technological and legal environment. The …
challenges in Cyber Security - specifically in the technological and legal environment. The …