Author of the publication

Personalized Learning Objects Recommendation based on the Semantic-Aware Discovery and the Learner Preference Pattern.

, , , and . J. Educ. Technol. Soc., 10 (3): 84-105 (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using a style-based ant colony system for adaptive learning, , and . Expert Systems with Applications, 34 (4): 2449--2464 (May 2008)Enhancing skill in constructing scientific explanations using a structured argumentation scaffold in scientific inquiry., , , and . Comput. Educ., (2015)Applying game mechanics and student-generated questions to an online puzzle-based game learning system to promote algorithmic thinking skills., and . Comput. Educ., (2018)The Design of a STEM-Oriented Project-Based Course for the Higher Grades of Elementary Schools., and . SETE@ICWL, volume 10676 of Lecture Notes in Computer Science, page 137-143. Springer, (2017)A secure VLAN construction protocol in wireless ad hoc networks., , and . ITRE, page 68-72. IEEE, (2005)Personalized Learning Objects Recommendation based on the Semantic-Aware Discovery and the Learner Preference Pattern., , , and . J. Educ. Technol. Soc., 10 (3): 84-105 (2007)The development of SCORM-conformant learning content based on the learning cycle using participatory design., , and . J. Comput. Assist. Learn., 26 (5): 392-406 (2010)An English Vocabulary Learning System Based on Fuzzy Theory and Memory Cycle., , , , and . ICWL, volume 5686 of Lecture Notes in Computer Science, page 420-423. Springer, (2009)Using Self-Explanation and Ontology for Providing Proper Feedbacks in a Programming Environment., and . IIAI-AAI, page 585-590. IEEE Computer Society, (2017)Inter-Cluster Routing Authentication for Ad Hoc Networks by a Hierarchical Key Scheme., , and . J. Comput. Sci. Technol., 21 (6): 997-1011 (2006)