The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
It would be difficult and stressful for a single operator to operate an underwater manipulator using his/her both hands in deep sea environments while the operator has to monitor or manipulate additional equipment. In order to reduce the operating pressure and make full use of the operator potentials, in this paper we propose a control strategy for operating the underwater manipulator via P300 brainwaves,...
This paper introduces how minimum variance control principles are applied to the control of human emotion - excitement signal. We use changing distance-between-eyes in a virtual 3D face as a control signal. A minimum variance control law is synthesized by minimizing control quality criterion in an admissible domain. Admissible domain is composed of input signal boundaries. Relatively high control...
The objective of the study is to design an alternative mouse for persons with hand disability. It is composed of microcontroller and sensor pad. Sensor pad consist of commonly used shortcut keys and four arrow keys. Sensor pad will determine which of the shortcut and arrow keys where pressed. The microcontroller processes the input coming from the sensor pad and it outputs the cursor's navigation...
Nowadays information retrieval based on specific queries is already used in computer system. One of the popular methods is document ranking using Vector Space Model (SVM) based on TF.IDF term-weighting. In this paper TF.IDF.ICSδF term-weighting based class-indexing is proposed, afterward comparing its effectiveness to TF.IDF and TF.IDF.ICF term weighting. Each method is investigated through Al-Qur'an...
Qubit models for defining the structures and functionalities are developed to improve the performance of the analysis of digital devices by increasing the dimension of the data and memory structures. The basic concepts, terminology, definitions, necessary for the implementation of quantum computation in the practice of modeling computer structures, are introduced. The examples proving the efficiency...
In this work, we address the issue of automatic assessment for programming assignments. The objective is to provide immediate feedback to the learners and save teachers from manually managing all the students' solutions. We will present a method merging results from dynamic and static analysis to ensure a reliable and objective evaluation job. While dynamic analysis is based on unit testing framework,...
Multi-cycle scan-based tests allow more faults to be detected by keeping the circuit in functional mode for more than one clock cycle. Optimizing a multi-cycle test set can improve test quality and/or test application time. It is also possible to capture the primary outputs of a circuit multiple times between the scan operations. This ensures that if a fault is detected at the primary outputs, increasing...
This paper is devoted to the development of objects and methods in on-line testing. Requirements imposed to computer systems and on-line testing of their digital components are analyzed in efficiency of use of resources and in restriction of the hidden processes. The low level of execution of these requirements in the modern computer systems and in circuits of on-line testing because of domination...
The article presents an eye tracking analysis based study in context of learning IT skills. The goal of eye tracking analysis is to determine the gaze movement differences between students with different prior knowledge during answering a question in the topic of computer networks. The gaze movement was tracked by cost-effective Eye Tribe tracker, and the eye movement data was evaluated by Ogama software...
This work proposes an accurate marker-less fingertip detection method under single camera. The moving skin regions are analyzed via enhanced mixture models. The models with adaptive learning rates can separate the backgrounds and moving skins effectively. For multiple fingertip detection, we propose an algorithm based on the likelihood computation of contour and curvature information. Furthermore,...
During testing process of any SDLC, efforts are made to successfully find out flaws and make the system bug free, but at times while removing the existing limitations some new bugs might embed into the software system. In order to have a competitive advantage, a firm has to quickly come up with its offering despite the presence of some issues in the software. Therefore, it cannot be assured that the...
In this work, a dual flapping tidal current generator is developed and then validated in indoor and in-situ experiments. It is recognized from the indoor experiments that the dual flapping generation system is optimal at the reduced frequency, 0.125 in terms of power extraction. In the consecutive in-situ experiments, system power, 6.4kW and system efficiency 36.5 % are obtained. The dual power transmission,...
Understanding the hydrodynamic maneuvering capabilities of our Navy's submarines is a vital aspect of submarine design and in-service life. In the Hydrodynamics Testing Branch at the Naval Surface Warfare Center, Carderock Division (NSWCCD), autonomous underwater vehicles (AUVs) that are scale models of the Navy's submarines are developed to provide high fidelity data on maneuvering characteristics...
Randomized controlled trials (RCTs) are the gold standard for scientific research but pose many obstacles for game- based learning (GBL) studies. This poster is intended to foster a discussion about RCTs by summarizing two recent trials performed by the authors and comparing the distinctly different protocols including length of stimulus exposure, levels of internal and external validity, and sample...
One of the most important elements in the system development is the way the system provides an interaction with users through an easy to use graphical user interface. This paper introduces a method for testing systems and to evaluate the degree of usability for web-based systems. The method has been utilized in two phases and applied to the Emirates Airlines website as a case study. In the first phase...
The purpose of this paper is to adapt a few sentiment analysis methods to obtain sentiment value for social network statements in the Polish language. Developed methods represent different approaches. Starting with PMI-IR, expansion of dictionary through conjunctive connections method, to determining bigram sentiment by analyzing its neighborhood. Obtained results were compared to the commercial solution...
Internet technology today is not free from many problems or security holes. This security holes could be exploited by an unauthorized person to steal important data. The case of the attacks occurred because the party that was attacked also did not realize the importance of network security to be applied to the system. Honeypot is a system that is designed to resemble the original production system...
The design, assembly and testing of a multi-sensor platform that could be used to detect specific parameters of ambient environment is presented in this paper. This platform will be packaged using System-Level integration and could be used as one of the nodes in a sensor network. It is composed of commercial off-the-shelf components, which allows low cost and flexible component selection. The sensors...
Teaching a course on game designing and development is as exciting as it is challenging. The "fun" factors have to be combined with art, narration, designing, and logic development. This paper strives to describe the pedagogy used for teaching this challenging course. Also discussed are some of the issues faced for the duration of the courses. Students' projects were implemented using Unity3d...
Internet usage is rising at a frenzied rate as knowledge and information sharing becomes easy and time-saving. Regrettably, the visually impaired do not enjoy this liberty and they have difficulties in using the computer and the Internet to obtain any shared and published information. This difficulty is also faced by the visually impaired Bahasa Melayu (BM) language medium Internet users. Existing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.