Results (156)
Search Parameters:
Keyword: TFOpinion and Effectiveness of Kahoot! use in Online Distance Learning in Crop Production at Higher Education Level: A Case of Study
Kahoot is one of the most popular learning platforms, with over 2.5 billion players per year worldwide, used mainly for knowledge review through gamification. However, students´ opinion and its effectiveness in online distance learning as well as in another language teaching has been little studied. With these aims, this study was carried out in the…
Read MoreTETRA™ Techniques to Assess and Manage the Software Technical Debt
The paper examines the company’s proprietary means for determining the quality of a software product and measuring its technical debt. The paper’s authors explain how a software product’s quality is directly correlated with the amount of varying technical debts that the end-users receive. All debts can be paid, and technical debt is no exception: one…
Read MoreAn Alternative Approach for Thai Automatic Speech Recognition Based on the CNN-based Keyword Spotting with Real-World Application
An automatic speech recognition (ASR) is a key technology for preventing an ongoing global coronavirus epidemic. Due to the limited corpus database and the morphological diversity of the Thai language, Thai speech recognition is still difficult. In this research, the automatic speech recognition model was built differently from the traditional Thai NLP systems by using…
Read MoreA Survey of FPGA Robotics Applications in the Period 2010 – 2019
FPGAs constitute a flexible and increasingly popular controlling solution for robotic applications. Their core advantages regarding high computational performance and software-like flexibility make them suitable controller platforms for robots. These robotic applications include localization / navigation, image processing, industrial or even more complex procedures such as operating on medical or human assistant tasks. This paper…
Read MoreRecognition of Emotion from Emoticon with Text in Microblog Using LSTM
With the advent of internet technology and social media, patterns of social communication in daily lives have changed whereby people use different social networking platforms. Microblog is a new platform for sharing opinions by means of emblematic expressions, which has become a resource for research on emotion analysis. Recognition of emotion from microblogs (REM) is…
Read MoreA Review on TAM and TOE Framework Progression and How These Models Integrate
The TAM is a model that is widely used to understand IT adoption and usage process accordingly and the reason for its popularity is that the model clarifies variances like behavioral intention (BI) relevant to IT appropriation and use over a broad range of settings. The model’s main factors for system use is perceived usefulness…
Read MoreIntegration Information Systems Design of Material Planning in the Manufacturing Industry using Service Oriented Architecture
PT XYZ has an Enterprise Resource Planning application that is used by the Planning Department to view stocks and plan production materials. Currently calculation of production materials takes more than 30 seconds just to export to Excel then a few minutes to adjust the data format to the planning form and the data used is…
Read MorePlummeting Makespan by Proficient Workflow Scheduling in Cloud Environment
Cloud is an Internet-based computing technology in which on-demand shared resources such as software, platforms, repositories, and information are delivered to customers. In the emerging era of computing cloud environment provide the use of resources with the concept of virtualization. Workflow of the tasks has vital role for the improvement of computing performance which leads…
Read MorePerformance Evaluation of Convolutional Neural Networks (CNNs) And VGG on Real Time Face Recognition System
Face Recognition (FR) is considered as a heavily studied topic in computer vision field. The capability to automatically identify and authenticate human’s faces using real-time images is an important aspect in surveillance, security, and other related domains. There are separate applications that help in identifying individuals at specific locations which help in detecting intruders. The…
Read MoreNode-Node Data Exchange in IoT Devices Using Twofish and DHE
Internet of Things provides the support for devices, people and things to collaborate in collecting, analyzing and sharing sensitive information from one device onto the other through the internet. The internet of things is thriving largely due to access, connectivity, artificial intelligence and machine learning approaches that it supports. The stability and enhanced speed of…
Read MoreHow Ready is Renewable Energy? A Review Paper on Educational Materials and Reports Available for the Teaching of Hydrogen Fuel Cells in Schools
Today, the costs of most Renewable Energy (RE) technologies especially hydrogen energy technologies such as fuel cells, are still beyond the means of poorer economies in developing countries. Hence, there is little public awareness and local expertise in RE in these countries and even lesser in hydrogen energy. To solve this problem, it is important…
Read MoreA-MnasNet and Image Classification on NXP Bluebox 2.0
Computer Vision is a domain which deals with the challenge of enabling technology with vision capabilities. This goal is accomplished with the use of Convolutional Neural Networks. They are the backbone of implementing vision applications on embedded systems. They are complex but highly efficient in extracting features, thus, enabling embedded systems to perform computer vision…
Read MoreCombining ICT Technologies To Serve Societal Challenges
European counties continue to receive an increasing number of migrants and refugees from an also increasing number of both European and non-European countries. This results in a huge societal challenge which is societal inclusion of people speaking different languages and of diverse backgrounds. Key for their inclusion is job finding which comes with hurdles like…
Read MoreSimulating Get-Understand-Share-Connect Model using Process Mining
This paper presents the method of simulating the personal knowledge management (PKM) processes, based on Get-Understand-Share-Connect (GUSC) Model, using real event logs data from an online learning platform. The method used in here is process discovery and conformance, which are the process mining techniques. Having the model proven at granular level of multi-agent system, this…
Read MoreDeaf Chat: A Speech-to-Text Communication Aid for Hearing Deficiency
Hearing impairments have a negative impact in the lives of individuals living with them and those around such individuals. Different applications and technological tools have been developed to help reduce this negative impact. Most mobile applications that have been developed that use Speech-to-Text technology have been inconsistent such that they are not inclusive of all…
Read MoreText Mining Techniques for Cyberbullying Detection: State of the Art
The dramatic growth of social media during the last years has been associated with the emergence of a new bullying types. Platforms such as Facebook, Twitter, YouTube, and others are now privileged ways to disseminate all kinds of information. Indeed, communicating through social media without revealing the real identity has emerged an ideal atmosphere for…
Read MoreEliminating Target Anopheles Proteins to Non-Target Organisms based on Posterior Probability Algorithm
Capturing similarity in gene sequences of a target organism to detect significant regions of comparison will most likely occur because genes share a related descendant. Local sequence alignment for the targeted organisms can help preserve associations among sequences of related organisms. Such homologous genes possess identical sequences with common ancestral genes. The genes may be…
Read MoreEcosystem of Renewable Energy Enterprises for Sustainable Development: A Systematic Review
In the Global sphere, the social, environmental, and economic pillars are the main contributors and accelerators to the sustainable development goals. As a result, the latter creates a platform for interdisciplinary researchers, society and decision-makers to collaborate in formulating ways to minimize factors contributing to environmental concerns. Energy is currently referred to as one of…
Read MoreStudy of latencies in ThingSpeak
IoT platforms play an important role on modern measurement systems because they allow the ingestion and processing of huge amounts of data (big data). Given the increasing use of these platforms, it is important to characterize their performance and robustness in real application scenarios. The paper analyzes the ThingSpeak platform by measuring the latencies associated…
Read MoreRanking the Most Important Attributes of using Google Classroom in online teaching for Albanian Universities: A Fuzzy AHP Method with Triangular Fuzzy Numbers and Trapezoidal Fuzzy Numbers
This paper has conducted the study of the impact and effectiveness of Google Classroom in online teaching and learning. Based on the unified theory of acceptance and use of technology (UTAUT2), the first aim was to rank the 8 constructs namely: Performance Expectancy, Effort Expectancy, Social Influence, Facilitating Conditions, Hedonic Motivation, Habit, Behavioral Intention, and…
Read MoreDistance Teaching-Learning Experience in Early Childhood Education Teachers During the Coronavirus Pandemic
The purpose of the study was to describe the experiences of teachers in the distance teaching-learning process in early childhood education during the covid-19 pandemic. The methodology used was qualitative descriptive. Interviews were conducted with thirteen teachers from four state educational institutions at the infant level in Lima city through the virtual platform. As a…
Read MoreModified Blockchain based Hardware Paradigm for Data Provenance in Academia
Educational organizations often need to distribute academic transcripts and certificates upon student’s request since they are mandatory for admission into new scholarly programs including placement activities. Manual procedures involved with the transmission process of academic document is indeed a tedious task that results in substantial overhead. Thus the necessity for an autonomous electronic system for…
Read MoreAn Anonymity Preserving Framework for Associating Personally Identifying Information with a Digital Wallet
Growing adoption of cryptocurrencies by institutional investors coupled with recurring incidents of loss of access to digital wallets have resulted in emergence of custodial services for high net worth individuals and institutions. However, such services are not economically feasible for the wider community of crypto owners who are left with no recourse for recovery of…
Read MoreHigh-Performance Computing: A Cost Effective and Energy Efficient Approach
The world is witnessing unprecedented advancements in ICT (Information & Communication Technology) related fields. These advancements are further boosted with the emergence of big data. It goes without saying that big data requires two major operations: storage and processing. The latter is usually provided through High-Performance Computing (HPC) which is delivered through two main venues:…
Read MoreESP2: Embedded Smart Parking Prototype
The technological evolution and the frequent use of the Internet as a technology within the framework of the Internet of Things and Robotics has affected various fields such as Industry 4.0, smart agriculture, smart cities, home automation and autonomous cars. These advances applied to everyday life have facilitated the implementation of new concepts to minimize…
Read More
