Results (31)
Search Parameters:
Keyword: ReadingValue Trace Problems for Code Reading Study in C Programming
C programming is taught in a lot of universities across the world as the first computer programming language. Then, for novice students, it is important to read many simple C source codes and understand their behaviors to be familiar to the programming paradigm. Unfortunately, effective tools to support independent code reading study at home have…
Read MoreAnalysis of Reading Time and the Number of Characters within One Gazing Point
Concomitant with the ubiquity of lightweight electronic terminals, such as smartphones and tablets, e-books have increased in popularity. However, studies have shown that their display method and information-presentation efficiency need improvement. We investigated visual information processing during reading to develop a more efficient display method that presents information in an easier to see fashion than…
Read MoreImproving of Heat Spreading in a SiC Propulsion Inverter using Graphene Assembled Films
The focus of this work is first to establish the effect of the chip temperature and thermal feedback on the determination of the power loss in a three-phase propulsion inverter, then to demonstrate the possibility of achieving an improved heat spreading through the different layers inside a SiC power module by using graphene assembled films…
Read MoreReading Acquisition Software for Portuguese: Preliminary Results
The persistent difficulties in reading and spelling acquisition are a risk factor for learning motivation. Play-like intervention tools have been developed to face these difficulties. “I read” is a software that seeks to develop and introduce systematic reading and spelling skills training in a playful and complementary way. This software is intended for children at…
Read MoreHiding Information in DNA Sequence Data using Open Reading Frame Guided Splicing
Encouraged by the huge publicly available genomic databases, research in the field of steganography was recently extended to utilize DNA sequence data to conceal secret information. As an extension of the work presented earlier by the author, this paper proposes an approach for a secure data communication channel between two parties. At one side of…
Read MoreAnalysis of Gaze Time Spent at the Gazing Point that is Required During Reading
This paper aims to clarify the lower limit of the gaze time required during reading by investigating at a display time of 98 msec or less using the visual information processing analyzer developed in the previous research. The image display range and display time at the point of gaze was controlled by moving the window…
Read MoreEffectiveness of a voice analysis technique in the assessment of depression status of individuals from Ho Chi Minh City, Viet Nam: A cross-sectional study
The Mind Monitoring System (MIMOSYS) is a novel voice analysis technique for mental health assessment that has been validated in some languages; however, no research has been conducted on the Vietnamese yet. This study aimed to examine the ability of the Vitality score extracted from the MIMOSYS system to assess depression status based on the…
Read MoreAnalysis of Linear and Non-Linear Short-Term Pulse Rate Variability to Evaluate Emotional Changes during the Trier Social Stress Test
In conjunction with psychological stress, physiological indicators such as heart rate (HR) and heart rate variability (HRV) are frequently employed. This study uses a substitute for heart rate variability (HRV) known as short-term pulse rate variability (PRV) to evaluate emotional changes. We examined sixteen college students using a low-cost photoplethysmograph and obtained a short-term PRV…
Read MoreAssociation Rules for Knowledge Discovery From E-News Articles: A Review of Apriori and FP-Growth Algorithms
Owing to technological development, the internet has become the world’s largest platform where an unaccountable amount of e-news information is freely available to use. Most of the time, e-newspaper readers have to examine the massive collection of e-news articles to locate necessary information relevant to them. Massive semi-structured and unstructured texts usually mislead the readers…
Read MoreA Proposal of Code Modification Problem for Self-study of Web Client Programming Using JavaScript
In current societies, web application systems take central roles in computer systems. Thus, web client programming using JavaScript has increased values to add dynamic features and functions in web pages by well working with HTML and CSS. In this paper, as a new type of exercise problem for its self-study, we propose a code modification…
Read MoreIntermediation in Technology Transfer Processes in Agro-Industrial Innovation Systems: State of Art
Considering the importance of addressing innovation issues that impact the development of economic sectors, this document presents the research work aimed at establishing a state of the art related to technology transfer and intermediation issues, which can be adopted in the innovation systems. In this case, the agro-industrial innovation system is taken as a reference…
Read MoreAnalysis of Learning Difficulties in Object Oriented Programming in Systems Engineering Students at UNTELS
The learning difficulties of Object-Oriented Programming can be one of the causes of failure in college students, which can even lead to student dropout. This article has the purpose of analyzing the main learning difficulties of object-oriented programming using the Java programming language in Systems Engineering students of the Universidad Nacional Tecnológica de Lima Sur…
Read MoreTime Granularity-based Privacy Protection for Cloud Metering Systems
Due to the advent of cloud computing and Internet of Things, smart meters have become a crucial part of smart cities. Smart meters generate vast amounts of fine-grained data that can immediately provide useful information to electricity consumers, such as automatic billing, load monitoring, and dynamic time pricing. This will make the electricity consumers more…
Read MorePolarity Switch within Social Networks
It is the age of information. Social networks are the main reason why, following the increasing activity of online users. With this comes a big impact on the real world, it can be positive and highly negative as well. Therefore, research in this field is highly needed for the betterment of societal behaviors within social…
Read MoreCovid-19 Pandemic Lockdown: The Consequences Towards Project Success in Malaysian Construction Industry
The Covid-19 is a pandemic issue that is causing widespread global disruption forcing lockdowns in many countries including Malaysia as an effort in disconnecting the virus from spreading. As an initiative, the Malaysia government has call for the Movement Control Order (MCO) as one of the lockdown alternatives starting on 18th March 2020. Due to…
Read MoreEvaluation of Type A Uncertainty in a Network Analyzer From 300 kHz to 8.5 GHz
Network Analyzer is equipment widely used for the execution of radio frequency application scattering parameters. Throughout absolute reading the scattering parameter measured. An absolute reading does not include error, drift, offset, linearity, resolution, coefficient of sensitivity and several other variables that will contribute to the measured measurement dispersion. Type A evaluations of measurement uncertainty clarified…
Read MoreThe Financial Services Authority of Indonesia E-Reporting System Development Based on Metadata XBRL Taxonomy
The XBRL taxonomy has been proven to be able to restore various forms of redundancies and ambiguities in making financial reports from financial service institutions. However, the nature of XBRL which is oriented towards documents and based on XML makes the XBRL taxonomy difficult to use because the information cannot be directly read by ordinary…
Read MoreMulti-Stage Enhancement Approach for Image Dehazing
Over the past decades, huge efforts have been devoted for image enhancement under uncontrolled scene such as fog and haze. This work proposes Multi-stage de-hazing approach for improving the quality of hazy images. Four main stages are introduced, in our approach, to achieve an automated, efficient and robust de-hazy processing. The first two stages are…
Read MoreA Joint Source Channel Decoding for Image Transmission
In this paper, we present a joint source-channel decoding (JSCD) scheme for image transmission. The binary sequences, resulting from the compression of several number of image blocks using arithmetic coding (AC), are written line-wise in the so called read- matrix (RM). In succession, a systematic Low Density Parity Check (LDPC) encoding is applied to the…
Read MoreDevelopment of Tactile Display and an Efficient Approach to Enhance Perceptual Analysis in Rehabilitation
Tactile displays are widely used in the rehabilitation and education of blind persons, as it is one of the media of communication amongst them. Tactile display performance is measured in terms of accuracy in presenting pattern, accuracy in identification, recognition and reading time of presented pattern. However, it has had meager attention from researchers. This…
Read MoreAn Efficient Automotive Paint Defect Detection System
Vision-based defect detection techniques are widely used for quality control purposes. In this work, an efficient deflectometry based detection system is developed for semi-specular/painted surface defect detection. This system consists of a robotic arm that carries a screen/camera setup and can detect defects on large surfaces with different topologies, such as a car bumper, by…
Read MoreA Novel Rule Based Technique to Detect Electricity Theft in India
It is high time to control and prevent power theft by manipulating the meter reading and tampering of the meter. It is possible to deal power theft by developing Advanced Metering Infrastructure (AMI) and smart grids. For most of the distribution companies, utility smart meters’ data is serving as wealthy source of information beyond billing.…
Read MoreExtending the Life of Legacy Robots: MDS-Ach via x-Ach
Our work demonstrates how to use contemporary software tools on older or “legacy” robots while keeping compatibility with the original control, tools, and calibration procedures. This is done by implementing a lightweight middle-ware called MDS-Ach connected directly to the hardware communications layer of the robot’s control system. The MDS-Ach middle-ware, which relies on the x-Ach…
Read MoreDifference in Speech Analysis Results by Coding
Mental health disorder is becoming a social problem, and there is a need for technology that can easily check for states of stress and depression as a countermeasure. Conventional methods of diagnostic support and screening include self-administered psychological tests and use of biomarkers. However, there are problems such as burden on subjects, examination costs, dedicated…
Read MorePredicting Smoking Status Using Machine Learning Algorithms and Statistical Analysis
Smoking has been proven to negatively affect health in a multitude of ways. As of 2009, smoking has been considered the leading cause of preventable morbidity and mortality in the United States, continuing to plague the country’s overall health. This study aims to investigate the viability and effectiveness of some machine learning algorithms for predicting…
Read More
