Pupillometry measures pupil size, and several open-source algorithms are available to analyse pupillometry data. However, only a few studies compared these algorithms’ accuracy and computational resources. This study...
详细信息
This systematic literature review (SLR) study aims to analyze the role of New Media as a Tool to Improve Creative Thinking, with relevant articles from 2018 to 2023 taken from reputable international journals. It uses...
详细信息
Nyctophobia is a phobia of the dark and is common among children but also found in adults. While the phobia itself is commonly known, the diversity of its treatment is still minimal. As technology has reached its high...
详细信息
Nyctophobia is a phobia of the dark and is common among children but also found in adults. While the phobia itself is commonly known, the diversity of its treatment is still minimal. As technology has reached its highest point, numerous inventions and innovations have emerged in the medical sector. This study aimed to examine the usability of Virtual Reality and Keyboard and Mouse as an interface using the Extended Reality Game Usability Questionnaire (XR-GUQ) in Nyctophobia therapy and to analyze the heart rate response, impact, and implications using t-test Paired/Wilcoxon Signed Rank. Thirty-four Bina Nusantara University students from various backgrounds completed the test using interfaces and a smartwatch. They were divided into two groups, high- and low fear, using the modified Acrophobia Questionnaire (AQ), which resulted in a significant difference. The XR-GUQ result was insignificant in all variables, which indicates similar usability scores on both interfaces. The t-test Paired/Wilcoxon Signed Rank test revealed a significant difference between the high- and low-fear groups when using the Virtual Reality interface compared to the Keyboard and Mouse interface. This significant difference was found within each group regardless of the interface used. This research shows similar scores in terms of usability but a significant difference in heart rate response with the help of a serious game to give a new sensation of phobia therapy.
This study conducts a systematic literature review (SLR) that focuses on optimizing deep-learning techniques for post-earthquake building damage detection. By employing the PRISMA protocol, this review aimed to collec...
详细信息
This paper introduces a novel hybrid genetic algorithm combined with data mining to solve a version of the early/tardy scheduling problem in which no unforced idle time may be inserted in a sequence. The chromosome re...
详细信息
Rhinosinusitis Mucus is mucus produced by mucus glands found in the nose in the paranasal sinus area which indicates inflammation. Segmentation of rhinosinusitis mucus is very difficult to do because of the many chara...
详细信息
Morphing attacks are based on the technique of digitally fusing two (or more) face images into one, with the final visage resembling the contributing faces. Morphed images not only pose a challenge to Face-Recognition...
详细信息
Morphing attacks are based on the technique of digitally fusing two (or more) face images into one, with the final visage resembling the contributing faces. Morphed images not only pose a challenge to Face-Recognition Systems (FRS) but also challenge experienced human observers due to high quality, postprocessing eliminating any visible artifacts, and further the printing and scanning process. Few studies have concentrated on examining how human observers can recognize morphing attacks, even as several publications have examined the susceptibility of automated FRS to morphing attacks and offered morphing attack detection (MAD) approaches. MAD approaches base their decisions either on a single image with no reference to compare against (Single-Image MAD (S-MAD)) or using a reference image (Differential MAD (D-MAD)). One prevalent misconception is that an examiner's or observer's capacity for facial morph detection depends on their subject expertise, experience, and familiarity with the issue. No works have reported the specific results of observers who regularly verify identity (ID) documents for their jobs. As human observers are involved in checking ID documents having facial images, a lapse in their competence can result in significant societal challenges. To assess the observers' proficiency, this research first builds a new benchmark database of realistic morphing attacks from 48 different subjects, resulting in 400 morphed images. Unlike the previous works, we also capture images from Automated Border Control (ABC) gates to mimic realistic border-crossing scenarios in the D-MAD setting with 400 probe images, to study the ability of human observers to detect morphed images. A new dataset of 180 morphing images is also produced to research human capacity in the S-MAD environment. In addition to creating a new evaluation platform to conduct S-MAD and D-MAD analysis, the study employs 469 observers for D-MAD and 410 observers for S-MAD who are primarily governmenta
Task oriented chatbots are a sub-topic related to chatbots, where chatbots will perform certain tasks with specific goals. One part of creating a task-oriented chatbot is doing intent classification. Intent classifica...
详细信息
Air is very beneficial and crucial for every living creature on earth, hence it is very important to protect the air quality in order to avoid diseases. However, due to the increase in population, some human activitie...
详细信息
Air is very beneficial and crucial for every living creature on earth, hence it is very important to protect the air quality in order to avoid diseases. However, due to the increase in population, some human activities have been causing detrimental damage to the air quality. Some people have realized the potential impact of this problem and have done studies on predicting future air pollution. Some implemented machine learning models such as random forest regression, support vector machine, etc, while others have utilized deep learning models in their research.. This study will implement five different models, specifically linear regression, ridge regression, random forest regression, and multilayer perceptron regression. There will be two datasets used in this paper which will be merged and processed. There will be three key evaluation metrics being used in this paper namely root mean squared error, mean absolute error, and r-squared. The results from all of the models have concluded that more optimization and factors are needed in order to boost the final result of this study.
Industrial and distribution service problems that belong to combinatorial optimization include vehicle routing with Vehicle Routing Problem. This research builds a framework and implements it in a multi-class optimiza...
详细信息
暂无评论