Diarrhea is one of the biggest diseases in the world that can cause death. Diarrhea can be caused by poor environmental sanitation or poor lifestyle habits. Prevention can be done early, such as education at the prima...
Diarrhea is one of the biggest diseases in the world that can cause death. Diarrhea can be caused by poor environmental sanitation or poor lifestyle habits. Prevention can be done early, such as education at the primary education level to reduce the high number of diarrheal diseases. However, the education provided is still minimal. This is caused by the educational media which still uses books and blackboards, thus affecting students' understanding of diarrheal disease so that it is less than optimal in preventing diarrheal disease. Animation technology is one example of learning media development. Through animation, students become more interested and teachers become more helpful in communicating diarrheal disease material. In this paper, animation development is carried out. We develop 2D video animation using computer Generated Imagery techniques. The results of beta testing via a questionnaire administered to respondents showed that 98.43% of respondents agreed that animated videos could be used as a learning medium for diarrheal disease material.
This paper examines the applications of Artificial Neural Networks (ANNs) in the field of finance, particularly in stock price forecasting. Artificial neural networks are mathematical models that mimic biological nerv...
详细信息
The satellite simulator platform is necessary for the satellite development. It is an essential tool to verify the operations of flight software. The Controller-in-the-Loop simulation with Simulation Third Generation ...
详细信息
The performance of Wireless Sensor Networks(WSNs)is an important fragment of the Internet of Things(IoT),where the current WSNbuilt IoT network’s sensor hubs are enticing due to their critical *** grouping hubs,a clu...
详细信息
The performance of Wireless Sensor Networks(WSNs)is an important fragment of the Internet of Things(IoT),where the current WSNbuilt IoT network’s sensor hubs are enticing due to their critical *** grouping hubs,a clustering convention offers a useful solution for ensuring energy-saving of hubs andHybridMedia Access Control(HMAC)during the course of the ***,current grouping standards suffer from issues with the grouping structure that impacts the exhibition of these conventions *** this investigation,we recommend an Improved Energy-Proficient Algorithm(IEPA)for HMAC throughout the lifetime of the WSN-based *** consecutive segments are *** the covering of adjusted clusters,an ideal number of clusters is determined ***,fair static clusters are shaped,based on an updated calculation for fluffy cluster heads,to reduce and adapt the energy use of the sensor *** heads(CHs)are,ultimately,selected in optimal locations,with the pivot of the cluster heads working among cluster ***,the proposed convention diminishes and balances the energy utilization of hubs by improving the grouping structure,where the IEPAis reasonable for systems that need a long *** assessment results demonstrate that the IEPA performs better than existing conventions.
This paper presents a novel approach to automatically summarize lecture slides using eye-tracking data. The tool generates personalized summaries by analyzing learners’ visual attention patterns, with the aim of redu...
This paper presents a novel approach to automatically summarize lecture slides using eye-tracking data. The tool generates personalized summaries by analyzing learners’ visual attention patterns, with the aim of reducing information overload and enhancing comprehension. While existing text summarization methods often overlook individual preferences and attention patterns, our proposed approach considers all slide elements, including text and visuals. It dynamically selects areas of interest based on learners’ fixation points. The tool is developed as a web application, enabling users to access presentations, receive personalized summaries, and save them for optimized studying. It incorporates features such as administration and settings, slides uploading, and summary viewing. To evaluate the tool, we conducted an experiment involving 62 participants to assess usability and satisfaction with the automated summaries. The evaluation results indicated positive feedback in terms of ease of use and visual appeal. Participants expressed satisfaction with the generated summaries and were given the option to select their preferred summarization percentage. Our analysis revealed that summarization preferences are not related to prior knowledge. Overall, this tool demonstrates the potential of personalized summarization based on eye-tracking data, thereby enhancing learning experiences.
Batik, a unique blend of art and craftsmanship, is a distinct artistic and technological creation for Indonesian society. Research on batik motifs is primarily focused on classification. However, further studies may e...
详细信息
In the evolving landscape of Industry 4.0, the convergence of peer-to-peer (P2P) systems, LoRa-enabled wireless sensor networks (WSNs), and distributed hash tables (DHTs) represents a major advancement that enhances s...
详细信息
Devices and networks constantly upgrade,leading to rapid technological ***-dimensional(3D)point cloud transmission plays a crucial role in aerial computing terminology,facilitating information *** network types,includ...
详细信息
Devices and networks constantly upgrade,leading to rapid technological ***-dimensional(3D)point cloud transmission plays a crucial role in aerial computing terminology,facilitating information *** network types,including sensor networks and 5G mobile networks,support this ***,Flying Ad hoc Networks(FANETs)utilize Unmanned Aerial Vehicles(UAVs)as nodes,operating in a 3D environment with Six Degrees of Freedom(6DoF).This study comprehensively surveys UAV networks,focusing on models for Light Detection and Ranging(LiDAR)3D point cloud compression/*** topics covered include autonomous navigation,challenges in video streaming infrastructure,motivations for Quality of Experience(QoE)enhancement,and avenues for future ***,the paper conducts an extensive review of UAVs,encompassing current wireless technologies,applications across various sectors,routing protocols,design considerations,security measures,blockchain applications in UAVs,contributions to healthcare systems,and integration with the Internet of Things(IoT),Artificial Intelligence(AI),Machine Learning(ML),and Deep Learning(DL).Furthermore,the paper thoroughly discusses the core contributions of LiDAR 3D point clouds in UAV systems and their future prediction along with mobility *** also explores the prospects of UAV systems and presents state-of-the-art solutions.
Currently cyberspace has often been used for crime. Ransomware is a type of malware that takes the victim's data hostage by asking for a ransom accompanied by threats. This attack is more aimed at Windows users. P...
Currently cyberspace has often been used for crime. Ransomware is a type of malware that takes the victim's data hostage by asking for a ransom accompanied by threats. This attack is more aimed at Windows users. Preventive measures are needed to prevent ransomware attacks, one of which is a learning-based approach. The challenge to the learning-based approach is data. We propose a static non-signature approach for extracting PE-based ransomware. The main focus of this research is the development of a non-signature static analysis approach that can identify and extract ransomware code from PE files without being affected by signature obfuscation or mutation. We extracted the 3 main headers namely dos_header, file_header, and optional_header plus the derived feature. The results show that from 132 samples, 71 of them were successfully extracted with PE file ransomware. This research contributes to the development of ransomware detection methodologies by offering a non-signature static analysis approach that improves resilience against evolving ransomware threats.
In today's world, where digital threats are on the rise, one particularly concerning threat is the Mirai botnet. This malware is designed to infect and command a collection of Internet of Things (IoT) devices. The...
详细信息
暂无评论