Results (19)
Search Parameters:
Section: ctmMulti Attribute Stratified Sampling: An Automated Framework for Privacy-Preserving Healthcare Data Publishing with Multiple Sensitive Attributes
The accumulation and analysis of large-scale patient data have led to breakthrough discoveries in potential flags for diseases based on pattern recognition, highlight medication efficacy, and local population health trends that would be impossible with traditional paper-based records. However, these benefits come with unique challenges posed by the application of data sharing for research and…
Read MoreText Line Segmentation on Myanmar Handwritten Document using Average Linkage Clustering Algorithm
Text line segmentation from document images is a significant challenge in the field of document image analysis. It involves extracting individual text lines from Myanmar handwritten document images to enable text recognition. This task becomes particularly challenging in Myanmar handwritten documents, especially those with irregular or cursive writing styles, due to variations in line spacing,…
Read MoreValue Trace Problems for Code Reading Study in C Programming
C programming is taught in a lot of universities across the world as the first computer programming language. Then, for novice students, it is important to read many simple C source codes and understand their behaviors to be familiar to the programming paradigm. Unfortunately, effective tools to support independent code reading study at home have…
Read MoreModelling and Testing Services with Continuous Time SRML
The SENSORIA Reference Modeling Language (SRML) aims at modelling composite services at a high level. Continuous time SRML extends SRML so that it can model services whose components can perform both discrete processes and continuous processes. In order to show how continuous time SRML is applied, in this paper, we systematically introduce our study on…
Read MoreBlockchain-Based Decentralized Digital Self-Sovereign Identity Wallet for Secure Transaction
Blockchain (BC) as the widespread innovations in the 21st century has recognized itself to be immutable, tamper-resistant, decentralize and secure. This emerging technology is used as a functional technology for refining present technology and forming new applications for its robustness and disintermediation. Decentralized Digital Self-Sovereign Identity (DDSSI) is an identity mapped with individual identity information…
Read MoreSurvey of Agent-Based Simulations for Modelling COVID-19 Pandemic
On the 11th of March 2020, the World Health Organization (WHO) declared COVID-19 as a pandemic. Part of controlling measures of the pandemic is to understand the disease’s trajectories. There are several possible interventions that can prevent and control its spread. Determining an optimal strategy is critical for policymakers to understand the impact of different…
Read MoreImplementation of Blended Learning Models to Improve Student Learning Outcomes in Junior High School
The purpose of this study is to determine the improvement of the competence of junior high school students through the application of blended learning models. This is a Classroom Action Research comprising of two cycles and two observations of student activities, with the descriptive statistics used for data analysis. From the results of the learning…
Read MoreSimulating COVID-19 Trajectory in the UAE and the Impact of Possible Intervention Scenarios
This paper aims to simulate the current trajectory of the pandemic growth in the UAE; when it is likely to end and at what cost? It also examines the current and additional possible measures to contain the second wave of the pandemic. The method used is a simple Susceptible-Infected-Recovered (SIR) model called covid19_scenarios. The key…
Read MoreSensitivity Analysis of Data Normalization Techniques in Social Assistance Program Decision Making for Online Learning
Data sensitivity analysis using normalization techniques in decision making has an impact on preference values and rankings in the case of social assistance programs for student online. The distribution of assistance is disproportionate and not on target to potential recipients. This study aims to analyze data sensitivity from simple data normalization techniques and linear techniques…
Read MoreProphet Architecture in Normalized Meter Energy Consumption Prediction on Building
Normalized Metered Energy Consumption (NMEC) is a solution for investors in determining the best energy-saving strategy for buildings. But on the other hand, investors need a fast and reliable evaluation results in measuring how effective the savings methods they use without wasting money. To address this issue, we selected Facebook’s latest predictive time series method…
Read MoreAn Empirical Study on Factors Influencing the Intention to use Mobile Learning
Lately, the use of mobile learning has increased in higher education at a global level. Especially after the new Coronavirus (Covid-19). Therefore, trust issues towards the benefits of mobile learning are still important matters just as important as quality dimensions (e.g. service quality, information quality and system quality) for both technology and its content. These…
Read MoreEnglish as a Foreign Language Learning Students’ Perceptions of Blended Learning in University Institutions: A Case Study of a University in UAE
This study aims to review English as a foreign language learning students’ perception of blended learning on various aspects of learning process. The study seeks to answer the question as to whether there is any correlation among students derived independent variable and their perception with respect to the merits and demerits of online blended learning.…
Read MoreThe Effect of User Experience from Teksologi
A meaningful User Experience can indicate successful of the application, so it is important to provide positive experience which aims to maximize the usability of an application. The purpose of this current study is to evaluate the user experience of an application called Teksologi: Gamification interactive typing for visually impaired children in Indonesia. User Experience…
Read MoreBalance as One of the Attributes in the Customer Segmentation Analysis Method: Systematic Literature Review
The banking industry is very competitive. To utilize the information, they have in order to be a competitive advantage winner is reasonably very crucial for the company. At present, the company does not only focus on the company’s strategy that prioritizes products (e.g. product or service oriented), however also necessitates to focus on the company’s…
Read MoreEvolutionary Quantum Technology: The Future with Holographic Plasma Voxel
This current situation will affect the future, technology models that are unthinkable or which impossible to happen pops up one by one. Like the hologram, this technology began to develop as a solution to increase user comfort in operating a system that is needed. This paper explains the development of hologram technology that is currently…
Read MoreA Blockchain-Based Architecture for Smart Healthcare System: A Case Study of Saudi Arabia
eHealth is the use of Information and Communication Technologies (ICT) to enhance health quality access. Health care innovations are an essential element of Vision 2030 and National Transformation Program (NTP) 2020 operational plan that will lead to an improvement in the quality of health care in Saudi Arabia. The objective of this paper is to…
Read MoreCognitive Systems for Monitoring: Architectural View
The modern stage of information technology development is characterized by the acute need to use cognitive technologies for the solution of tasks of practice, in particular, in the sphere of real world objects monitoring and management. Practical usage of cognitive systems of monitoring is significantly limited to two factors now: operation at the level of…
Read MoreComputational and Technological Models of Cognitive Monitoring Systems
The approach to the construction of promising cognitive monitoring systems is considered. Based on the analysis of known solutions, the problem of automatic synthesis of computational models of cognitive monitoring is posed. In the synthesis of models, it is proposed to reduce them to relatively finite operational automata. An example of a synthesized model of…
Read MoreCan parallelization save the (computing) world?
As all other laws of the growth in computing, the growth of computing performance also shows a ”logistic curve”-like behavior, rather than an unlimited exponential growth. The stalling of the single-processor performance experienced nearly two decades ago forced computer experts to look for alternative methods, mainly for some kind of parallelization. Solving the task needs…
Read More
