Results (326)
Search Parameters:
Keyword: ValueDevelopment and Application of Value Karuta to Understand Value in Lean Management: Initial Small-group Trial in Japan and the UK
This study proposes the Value Karuta (VK), an application of the traditional Japanese card game karuta. Its goal is to contribute to the understanding of value, which is the first principle of lean management. After stating the problems of lean management and the specifications of VK, this paper confirms the validity of the proposal by…
Read MoreValue Trace Problems for Code Reading Study in C Programming
C programming is taught in a lot of universities across the world as the first computer programming language. Then, for novice students, it is important to read many simple C source codes and understand their behaviors to be familiar to the programming paradigm. Unfortunately, effective tools to support independent code reading study at home have…
Read MoreRedlich-Kister Finite Difference Solution for Solving Two-Point Boundary Value Problems by using Ksor Iteration Family
In this paper, we are concerned to investigate the efficiency of the second-order Redlich-Kister Finite Difference (RKFD) discretization scheme together with the Four Point Explicit Group Kaudd Successive Over Relaxation (4EGKSOR) iterative method for solving two-point boundary value problems (TPBVPs). In order to apply this block iteration to solve any linear system, firstly we discretize…
Read MoreMultiple Machine Learning Algorithms Comparison for Modulation Type Classification Based on Instantaneous Values of the Time Domain Signal and Time Series Statistics Derived from Wavelet Transform
Modulation type classification is a part of waveform estimation required to employ spectrum sharing scenarios like dynamic spectrum access that allow more efficient spectrum utilization. In this work multiple classification features, feature extraction, and classification algorithms for modulation type classification have been studied and compared in terms of classification speed and accuracy to suggest the…
Read MoreEducation Value Chain Model for Examination, Grading, and Evaluation Process in Higher Education based on Blockchain Technology
Blockchain is a solution to improve data integrity and minimize data manipulation. Blockchain technology can be used in student examination management in universities. The process of managing student examination produces some information that can be stored in a blockchain database such as information about the lecturer as the exam creator, exam proctor, student attendance, student…
Read MoreDigital Sovereignty Between “Accountability” and the Value of Personal Data
In the last year, especially in Europe, the expression “digital sovereignty” has been used very frequently to describe, above all, the primacy of a State. Indeed, the “digital sovereignty” is a complex concept, which entails cross-reference with several sectors and contexts. We believe that the concept of “digital sovereignty” can be two sides of a…
Read MoreLinear Logic Synthesis of Multi-Valued Sequential Circuits
The basics of unconventional design of current circuits of two-valued and multi-valued memory elements (ME) for storing current digital signals and flip-flops of the main types on their basis are considered. A nontraditional method of ME synthesis is proposed, which is based on the mathematical tool of linear algebra. Linear equations, structural and functional schemes…
Read MoreWell Balanced Multi-value Sequence and its Properties Over Odd Characteristic Field
The authors propose a well balanced multi-value sequence (including a binary sequence). All the sequence coe_cients (except the zero) appear almost the same in number, thus, the proposed sequence is so called the well balanced sequence. This paper experimentally describes some prominent features regarding a sequence, for instance, its period, autocorrelation, and cross-correlation. The value…
Read MoreApplication of The Half-Sweep Egsor Iteration for Two-Point Boundary Value Problems of Fractional Order
The point of this study is to explore and elucidating the performance of the four-point Half-Sweep EGSOR (4HSEGSOR) iterative method to solve fractional two-point boundary value problems by using Caputo’s fractional operator and family of finite differences (FD) schemes. To apply the iterative methods, linear system needs to be constructed via the discretization process with…
Read MoreModeling an Energy Consumption System with Partial-Value Data Associations
Many existing system modeling techniques based on statistical modeling, data mining and machine learning have a shortcoming of building variable relations for the full ranges of variable values using one model, although certain variable relations may hold for only some but not all variable values. This shortcoming is overcome by the Partial-Value Association Discovery (PVAD)…
Read MoreThe Value of Integrating MSRP Protocol in E-learning Platforms of Universities
The proposed solution is intended for virtual universities wishing to improve their distance learning platforms. These enhancements include the instructional content model, how to deliver courses to students, and how to evaluate students’ knowledge. With this solution that improves the functionality of Moodle, virtual classes now include new features such as the transfer of heavy…
Read MoreThe First Study on Ionospheric Peak Variability over Equatorial Africa (COSMIC-2)
In regions like the African equatorial region, where ground-based sensors like ionosondes and incoherent scatter radars are limited, satellite-based radio occultation (RO) observations offer a new alternative for ionospheric data collecting and optimization. Using RO measurements from the mostly newly launched COSMIC-2 (Constellation Observing System for Meteorology, Ionosphere, and Climate-2) mission, hence, the equatorial Africa,…
Read MorePredictive Analytics in Marketing: Evaluating its Effectiveness in Driving Customer Engagement
Understanding and responding to customer feedback is critical for business success. Customer response data offers valuable insights into preferences, behaviours, and sentiment. By analysing this data, businesses can optimize strategies, enhance customer experiences, and drive growth. Many analysis have been conducted in this field, while the review covers a broad range of AI and ML…
Read MoreCooperative Game Theory for Grid Service Pricing: A Utility-Centric Approach
This study presents a novel alternative to traditional Net Energy Metering (NEM) by proposing a set of innovative pricing schemes for solar customers participating in utility-led grid service programs through the aggregation of Distributed Energy Resources (DERs). Grounded in cooperative game theory, the proposed framework facilitates equitable and efficient value allocation among key stakeholders, namely…
Read MoreCharacteristics of Crystal Defects due to the Inverse Piezoelectric Effect in Aluminum Gallium Nitride / Gallium Nitride High Electron Mobility Transistors
Gallium nitride (GaN) is expected to be used as a material for power semiconductor devices. However, it is crucial to focus on the dielectric properties of GaN. In this study, we investigated the transient response of the drain current during high-frequency application after intentionally maintaining the current collapse in the AlGaN/GaN high electron mobility transistors.…
Read MoreAI-Based Photography Assessment System using Convolutional Neural Networks
Providing timely and meaningful feedback in photography education is challenging, particularly in large classes where manual assessment can delay skill development. This paper presents M-Stock, an AI-based automated photo evaluation system that uses Convolutional Neural Networks (CNNs) to assess student photography assignments on web browser. M-Stock evaluates both technical aspects (such as lighting, composition, and…
Read MoreGenerative Artificial Intelligence and Prompt Engineering: A Comprehensive Guide to Models, Methods, and Best Practices
This article enhances discussions on Generative Artificial Intelligence (GenAI) and prompt engineering by exploring critical pitfalls and industry-specific advantages. It begins with a foundational overview of AI evolution, emphasizing how generative models such as GANs, VAEs, and Transformers have revolutionized language processing, image generation, and drug discovery. Prompt engineering is highlighted as a key methodology…
Read MoreText Line Segmentation on Myanmar Handwritten Document using Average Linkage Clustering Algorithm
Text line segmentation from document images is a significant challenge in the field of document image analysis. It involves extracting individual text lines from Myanmar handwritten document images to enable text recognition. This task becomes particularly challenging in Myanmar handwritten documents, especially those with irregular or cursive writing styles, due to variations in line spacing,…
Read MoreHardware and Secure Implementation of Enhanced ZUC Steam Cipher Based on Chaotic Dynamic S-Box
Despite the development of the Internet and wired networks such as fiber optics, mobile networks remain the most used thanks to the mobility they offer to the user. However, data protection in these networks is more complex because of the radio channels they use for transmission. Hence,there is a need to find more sophisticated data…
Read MoreFrom Sensors to Data: Model and Architecture of an IoT Public Network
RetePAIoT of Emilia-Romagna region is an IoT Public Network, financed by Emilia-Romagna Region and developed by Lepida Scpa, where citizens, private companies and Public Administrations can integrate free of charge their own sensors of any type and anywhere in the region. The main objective of the project is to provide a facility to implement the…
Read MoreProposal and Implementation of Seawater Temperature Prediction Model using Transfer Learning Considering Water Depth Differences
Aquaculture is one of the most important industries worldwide, and most marine products are produced by aquaculture. On the other hand, the aquaculture farmers are faced on the challenge of damage to marine products due to abnormal seawater temperatures. Research on seawater temperature prediction have been conducted, but many of them require a large amount…
Read MoreAnalysis of Components and Effects of Chest Compression Posture using CPR Training System
Cardiopulmonary resuscitation (hereafter CPR) is a life-saving procedure to combat our day-to-day risks of cardiac arrest. However, there are a few citizens who can accurately carry out CPR by encountering the scene of the cardiac arrest of others, and there are many unclear parts on the methods such as the correct attitude of CPR, and…
Read MoreVerify of Left and Right Differences in Sleep Index using the Ring-type Sensor
In this study, two healthy women in their 40s wore Oura Rings on both fingers and verified left and right differences in sleep index. Bed time, sleep time, rem sleep, sleep score, and heart rate had small left and right differences in both subjects, and a high correlation of 0.8 or more was observed(subjectA:P<0.001,subjectB:P<0.01). Subject…
Read MoreOptimizing the Performance of Network Anomaly Detection Using Bidirectional Long Short-Term Memory (Bi-LSTM) and Over-sampling for Imbalance Network Traffic Data
Cybercriminal exploits integrity, confidentiality, and availability of information resources. Cyberattacks are typically invisible to the naked eye, even though they target a wide range of our digital assets, such as internet-connected smart devices, computers, and networking devices. Implementing network anomaly detection proves to be an effective method for identifying these malicious activities. The traditional anomaly…
Read MoreAugmented Reality Based Visual Programming of Robot Training for Educational Demonstration Site
The human resource development of robotics and automation in the smart factory is an important factor in “Thailand 4.0” roadmap, which is following the industry 4.0 model. To pursue this goal of Thailand 4.0 roadmap of labor development, the effective and intuitive training system must be easy to understand. This study proposes the implementation of…
Read More
