Results (486)
Search Parameters:
Keyword: ImplementA Model for the Application of Automatic Speech Recognition for Generating Lesson Summaries
Automatic Speech Recognition (ASR) technology has the potential to improve the learning experience of students in the classroom. This article addresses some of the key theoretical areas identified in the pursuit of implementing a speech recognition system, capable of lesson summary generation in the educational setting. The article discusses: some of the applica- tions of…
Read MoreDevelopment and Improvement of Web Services Selections using Immigrants Scheme of Multi-Objective Genetic Algorithm
Quality of service is a significant part of formulating a composing of web services to satisfy the user’s request, especially when several services exist and have been implemented in the same field and functionality. The selection process of web services among many options can be taken based on the quality of service considerations, fitness parameters,…
Read MoreStudents’ Preparedness to Learn in e-Learning Environment and their Perception on The MPKT Lecturers’ Readiness to Manage Online Class
This study has two objectives: to determine the level of readiness of first-year undergraduate students at the Universitas Indonesia (UI) and to investigate student’s perception of MPKT (Integrated Character Development course) lecturers’ readiness to manage online learning class. Proportional cluster sampling was applied, and 1466 freshmen from thirteen faculties participated. Data clustering and imputation of…
Read MoreArchitecture of Real-Time Patient Health Monitoring Based on 5G Technologies
Worldwide, the epidemiological situation is constantly changing and with the exponential increase in the number of confirmed coronavirus cases, the number of health care workers has decreased significantly and this is due to the direct and daily contact of patients. One of the major challenges of the last few months is to prevent the spread…
Read MoreFactors Affecting Behavioural Intention to Shop in Self-Service Retail Case Study: JD.ID X Mart
This paper aims to measure the acceptance level of Indonesian customers to JD.ID X retail and to reveal the driving factors of behavioral intention to shop at the retail. JD.ID X is new retail that implements a new shopping technology called Just walk-out technology (JWOT) also known as retail without a cashier. JWOT is one…
Read MoreFuzzy Analytical Hierarchy Process and Fuzzy Comprehensive Evaluation Method Applied to Assess and Improve Human and Organizational Factors Maturity in Mining Industry
The literature shows a growing interest in taking into account human and organizational factors (HOFs) to achieve safe and successful human performance by reducing the risk of errors. In this sense, the concept of maturity models aims to help companies in the integration of these factors by assessing the current level of maturity and define…
Read MoreAutomatic Comprehension and Summarisation of Legal Contracts
Contracts may range from a simple agreement between a tenant and a landlord or a gym contract, or it could be as important as an employment or marital contract. No matter the level of importance, individuals are legally obligated to obey and carry out all clauses in the contract. In this paper, we have identified…
Read MoreHow Ready is Renewable Energy? A Review Paper on Educational Materials and Reports Available for the Teaching of Hydrogen Fuel Cells in Schools
Today, the costs of most Renewable Energy (RE) technologies especially hydrogen energy technologies such as fuel cells, are still beyond the means of poorer economies in developing countries. Hence, there is little public awareness and local expertise in RE in these countries and even lesser in hydrogen energy. To solve this problem, it is important…
Read MoreA-MnasNet and Image Classification on NXP Bluebox 2.0
Computer Vision is a domain which deals with the challenge of enabling technology with vision capabilities. This goal is accomplished with the use of Convolutional Neural Networks. They are the backbone of implementing vision applications on embedded systems. They are complex but highly efficient in extracting features, thus, enabling embedded systems to perform computer vision…
Read MoreEvent Modeller Data Analytic for Harmonic Failures
The optimum performance of power plants has major technical and economic benefits. A case study in one of the Malaysian power plants reveals an escalating harmonic failure trend in their Continuous Ship Unloader (CSU) machines. This has led to a harmonic filter failure causing performance loss leading to costly interventions and safety concerns. Analysis of…
Read MoreRecording of Academic Transcript Data to Prevent the Forgery based on Blockchain Technology
Diploma certificate and transcript forgery is a serious issue in education. The government is still finding the best way to prevent and minimize this issue in the future. The diploma certificate and transcript are very easy to duplicate, not only from third parties. Even the university can easily produce a fake diploma certification and transcript…
Read MoreArtificial Neural Network Approach using Mobile Agent for Localization in Wireless Sensor Networks
Wireless sensor networks (WSNs) are having large demands in enormous applications for the decade. The main issue in WSNs is estimating the exact location of unknown nodes. All applications are dependent on the location information of unknown nodes in WSNs. Location information of mobile anchor node is used to estimate the location of unknown nodes.…
Read MoreInvestigation of the LoRa Transceiver in Conditions of Multipath Propagation of Radio Signals
The article presents some results of the research of the LoRa module. These modules can be the basis of possible IoT technologies are implementing, providing enough good range of receiving and transmitting messages. The SX1276 transceiver has been testing to determine the signal loss in the propagation channel. These experiments took in a highly-populated Kyiv…
Read MoreDesign of Platform to Support Workflow Continuity in Multi-Device Applications
Nowadays, the Internet has become an indispensable tool for the realization and continuity of activity at a different time, place, and technological context (e.g., mobile, pc, tablet), so that interaction techniques through the use of multi-device support have become of great interest. From this perspective, continuity in interactions is an essential concept in the face…
Read MorePrioritization of Sustainable Supply Chain Management Practices in an Automotive Elastomer Manufacturer in Thailand
Nowadays the sustainable awareness trend is increasing. The consumers’ attitude has changed, causing companies to pay more attention to management in a sustainable way. Effective sustainable supply chain management (SSCM) can increase social, economic, and environmental benefits. Important factors from literatures were gather and organized to be a framework for SSCM. The proposed framework incorporates…
Read MoreCustomer Behavior of Green Advertising: Confirmatory Factor Analysis
The implementation of green advertising is relatively low for credibility but has an impact on green customer behavior. Based on the phenomenon, the purpose of this study is to examine factors affecting green advertising development, which is based on experienced customers towards products and advertisements and environmental issues. This research focuses on customers to create…
Read MoreModel of Fish Cannery Supply Chain Integrating Environmental Constraints (AHP and TOPSIS)
This paper proposes a modeling framework (analytical modeling) for the case of fish cannery supply chain (FCSC) to optimize the environmental impact of the set of its processes; indeed, for our knowledge, there were few studies attempting to address this case study as a model of green supply chain. Implementation of the proposed model is…
Read MoreBlockchain Technology for Tracing Drug with a Multichain Platform: Simulation Method
This study builds the implementation of the traceability process by conducting simulation tests using business process simulations with the implementation of blockchain technology to track drugs. This research focus involved stakeholders, including the pharmaceutical industry, pharmaceutical wholesalers (distributors/wholesalers), health services (drug stores, hospitals), consumers. Simulation methods are used to describe the distribution and traceability of…
Read MoreDeep Deterministic Policy Gradients for Optimizing Simulated PoA Blockchain Networks Based on Healthcare Data Characteristics
Blockchain technology has proven to be the best solution for digital data storage today, which is decentralized and interconnected via cryptography. Many consensus algorithms can be options for implementation. One of them is the PoA consensus algorithm, which is proven to provide high performance and fault tolerance. Blockchain has been implemented in many sectors, including…
Read MoreA Recommendation Approach in Social Learning Based on K-Means Clustering
E-learning, among the most prominent modes of learning, offers learners the opportunity to attend online courses. To improve the quality of online learning, social learning through social networks promotes interaction and collaboration among learners. As part of the learning process management in these environments, the implementation of recommendation systems facilitates the provision of content adapted…
Read MoreAn Innovative Angle of Attack Virtual Sensor for Physical-Analytical Redundant Measurement System Applicable to Commercial Aircraft
The angle of attack is a critical flight parameter for commercial aviation aircraft, because automatic envelope protection systems rely on it to keep the aircraft within its safe flight envelope. Faulty measurements of the angle of attack could have catastrophic effects, leading to aircraft loss of control in flight and fatalities, as demonstrated by the…
Read MoreA Novel Blockchain-Based Authentication and Access Control Model for Smart Environment
With the increase of smart factories and smart cities following the recent 4th industrial revolution, internal user authentication and authorization have become an important issue. The user authentication model using the server-client structure has a problem of forgery of the access history caused by the log manipulation of the administrator and unclearness of the responsibility.…
Read MoreOptimal PMU Placement Using Genetic Algorithm for 330kV 52-Bus Nigerian Network
The phasor Measurement Unit is a modern tracking tool mounted on a network to track and manage power systems. PMU is accurate and time-synchronized device that gives voltage phasor measurements in nodes and current phasor measurements connected to those nodes where the PMU is installed. This study introduces the Genetic Algorithm for optimization of allocation…
Read MoreNovel Infrastructure Platform for a Flexible and Convertible Manufacturing
Sales behavior and the technical development of products influence their fabrication. As market influences become increasingly volatile and unpredictable, factories will have to adapt their manufacturing to market trends even more in the future. Adaptation is referred to as convertibility and can be achieved, among other things, by mobile and intercompatible machines. Enabling machines to…
Read MorePrOMor: A Proposed Prototype of V2V and V2I for Crash Prevention in the Moroccan Case
Road safety has become an object of research and many research institutes have invested in this field because a lot of people die and many others are injured every year due to road accidents. The deployment of wireless communication technologies for vehicular networks can considerably improve road safety. It can enable new services such as…
Read More
