AR navigation is one of the interactive ways to use augmented reality. By displaying virtual guides in physical space using a smartphone, users can navigate from point to point more naturally than by comparing the map...
详细信息
In 2020, He, Ahmad, Afify and Goual proposed a new family based on classical Arcsine distribution and exponentiated family named Arcsine Exponentiated-X family. the main purpose of this work is to continue studying th...
详细信息
the security of one9;s residence or property is an essential consideration that warrants careful attention to safeguard the premises and its contents. It has become increasingly apparent today that physical key doo...
详细信息
ISBN:
(纸本)9798350370126
the security of one's residence or property is an essential consideration that warrants careful attention to safeguard the premises and its contents. It has become increasingly apparent today that physical key door locks are susceptible to damage and can be compromised by unauthorized individuals. the inherent vulnerability of physical key door locks stems from their susceptibility to misplaced keys and duplication, as individuals are required to always carry them. this work presents a novel Internet of things (IoT) enabled smart door access system designed to improve the security of homes or premises. the system offers keyless access to individuals who have been granted authorization. the system's architectural design incorporates the utilization of a NodeMCU ESP 8266 microcontroller to oversee door operations. Access control functionality is facilitated through the implementation of the Virtuino IoT application, which enables the unlocking of doors using smartphones. Additionally, a MQTT broker, specifically the HiveMQ, is implemented to facilitate effective machine-to-machine communication within the IoT components. the rationale behind the adoption of this IoT-based solution stems from the inherent weaknesses of traditional physical key door locks, which are prone to damage and replication, consequently jeopardizing security measures. the proposed system aims to address these limitations by rendering traditional keys obsolete, thereby improving both security and convenience for users. the system has undergone comprehensive development, testing, and operationalization, resulting in a highly functional system. the success rate of all functions has consistently achieved a 100% level, which serves as an indication of the system's robustness and effectiveness. In addition, the practical implementation of the system in the Centre of Excellence for Cybersecurity (CoExCys) office at Kuliyyah of ICT IIUM exhibited smooth operation and the absence of any operational chall
this study aims to explore an educational learning environment that supports students to learn conceptual modelling withthe unified modelling language (UML). In this study, we call the describing models "UML pro...
详细信息
C programming has been the fundamental subject to a lot of university students for studying programming languages, algorithms, and computer architecture. Currently, we are developing C programming learning assistant s...
详细信息
ISBN:
(纸本)9781665419338
C programming has been the fundamental subject to a lot of university students for studying programming languages, algorithms, and computer architecture. Currently, we are developing C programming learning assistant system (CPLAS) for its self-study by extending our works of JPLAS for Java programming. JPLAS provides the code completion problem (CCP) to offer practical programming exercises. A CCP instance asks the completion of the given source code by filling in the missing elements. the correctness of the answer is marked through string matching by comparing each answer statement withthe correct one. In this paper, we present the CCP by extending our works of the element fill-in-blank problem (EFP) in CPLAS. For evaluations, we generated 10 CCP instances and assigned them to 54 undergraduate students in Myanmar and Japan. their solution results show that the CCP instances are generally suitable for C programming study by novice students, but those on pointer need improvements for better solutions.
We present a massively parallel algorithm for computing persistent homology, a concept within the field of topological data analysis, and we implement it in the purely functional array-based language Futhark, which ha...
详细信息
ISBN:
(纸本)9781450386142
We present a massively parallel algorithm for computing persistent homology, a concept within the field of topological data analysis, and we implement it in the purely functional array-based language Futhark, which has an efficient compiler targeting GPUs. Computing persistent homology consists of bringing a certain sparse matrix to a reduced form. We compare our implementation with OpenPH, an existing library for computing persistent homology on GPUs, and on large matrices we achieve speedups of 2.3 to 5. Our work shows boththat persistent homology can be computed efficiently entirely on GPU hardware, and that Futhark can be used for this kind of sparse matrix manipulation.
Adopting technology in education has been introduced in different models. Flipped classroom as one of the blended learning approach was tested and applied in teaching computing courses. this approach shows promising e...
详细信息
ISBN:
(纸本)9781665419338
Adopting technology in education has been introduced in different models. Flipped classroom as one of the blended learning approach was tested and applied in teaching computing courses. this approach shows promising evidence that it is efficient through research evaluating it. this paper aims to review the research conducted in the flipped classroom, and in particular from computer science education perspective. the study involved a review of 20 studies that applied the flipped classroom in teaching computing courses. these studies involved experiments varying from longitudinal to a single semester evaluation. Indeed, the majority of these reports concerned a CS1 course (introductory programming course). therefore, this paper discusses and reviews the current literature reporting research conducted on flipped classroom from computer science perspectives.
Welch–Gong (WG) is a hardware-oriented LFSR-based stream cipher. WG-7 is a version of the eStream submission Welch–Gong, used for RFID encryption and authentication purposes. It offers 80-bit cryptographic security....
详细信息
the problem of automatic control of elastic computing granularity can be solved based on self-similar (fractal) network patterns. these patterns can control the level of granularity and ensure quick and efficient resp...
the problem of automatic control of elastic computing granularity can be solved based on self-similar (fractal) network patterns. these patterns can control the level of granularity and ensure quick and efficient response to user demand, leading to optimal performance and minimized resource usage. For controlling and programming elastic computing granularity, the Fractal Abstract Machine (FAM) is proposed. It is also a theoretical framework for designing and modeling elastic computer systems, as well as for simulated elastic granularity, in order to solve optimization problems. Currently, FAM is investigating how to regulate an elastic network model while allocating containers and scheduling tasks in distribution networks. the correspondent example is considered. the idea of fractal computing, which controls elastic computing granularity, is explored.
the paper considers the principles of building a home walking robot capable of walking on complex surfaces – stairs and ladders. A home walking robot must walk confidently on various flat surfaces and be able to step...
详细信息
暂无评论