Children with autism have high sensitivity, so when they feel too much noise, they can't concentrate, and as time passes, they become isolated and autistic. High-sensitive pointers often present a self-protection ...
详细信息
Children with autism have high sensitivity, so when they feel too much noise, they can't concentrate, and as time passes, they become isolated and autistic. High-sensitive pointers often present a self-protection behavior, perhaps by covering their hands with their own ears or by making a higher frequency noise, which is a way of comforting and stabilizing themselves when they are confronted with a strong disorder. It lowers the child's sensitivity to sound by conveying the voice directly through the body through bone conduction. By reducing sensitivity to the outside world and adj usting the interaction of sensory organs, this improves the ability of autistic children to focus less. In this paper, the comparison of auditory perception between bone conduction headphones and traditional headphones is further understood to understand whether the use of bone conduction is helpful to the improvement of the concentration of autistic children.
The latest development of internet technologies and globalization have increased the risks of running business in Indonesia. With hundred million of Indonesian users exposed to the internet and increasing reliance of ...
详细信息
The inventory control systems has an important role to monitor the condition of the goods at the supply chain stage of goods distribution from the central warehouse to retail in accordance with consumer demand. The re...
详细信息
The mediated semi-quantum key distribution (MSQKD) protocol is an important research issue that lets two classical participants share secret keys securely between each other with the help of a third party (TP). Howeve...
详细信息
Application architecture and information technology systems in the company should be able to support the company’s policy that leads to their alignment with the business objectives. The alignment of the implementatio...
Application architecture and information technology systems in the company should be able to support the company’s policy that leads to their alignment with the business objectives. The alignment of the implementation of information technology systems to the needs and goals of the organization will be able to be answered by taking into account the integration in the development, so that the gap of these two things can be minimized. As a company engaged in IT consulting, project management system is one form of application systems that support core business objective of the company: to produce high-quality software. Nevertheless, the project management system should be able to work together with other supporting information systems, so that the flow of information within the company can run effectively. To achieve these objectives, required the analysis and design of an integrated system, which can be achieved through a service-oriented architecture based system. which includes the stages of requirements and analysis, design and development, and the last is the IT operations. The final result expected is the design of the service-oriented architecture based project management system which built through top-down approach that focuses on improving the effectiveness of business process.
The purpose of this study is to determine the factors that encourage the use of visual electronic banking system (VEBS) application in Bank Central Asia Corporation, and provide an idea to increase the use of VEBS. Th...
The purpose of this study is to determine the factors that encourage the use of visual electronic banking system (VEBS) application in Bank Central Asia Corporation, and provide an idea to increase the use of VEBS. This study using UTAUT 2 model approach. The primary data obtained from interviews, direct observation and questionnaires that distributed and processed using SEM-PLS. The results of this study provide qualitative calculation results of UTAUT 2 variable. The conclusion obtained that interest of the use of application VEBS affected by variables facilitating condition, performance expectancy and behavioral intention. From these conclusions this study provided an idea to the future development of application's features for more effective and efficient use.
Every organization must ensure that information assets are protected and information security system has been implemented well. PT. IndoDev Niaga Internet is a provider of business solutions applications and implement...
Every organization must ensure that information assets are protected and information security system has been implemented well. PT. IndoDev Niaga Internet is a provider of business solutions applications and implementation services that include application Human Resource information System (HRIS) and Enterprise Resource Planning (ERP). In order to ensure the security of the information, then in 2015 PT. IndoDev Niaga Internet implement ISO 27001: 2013. Through the implementation of ISO 27001: 2013, it is expected that information can be properly maintained, which in turn will affect the business continuity. Companies need to know the extent to which the process has been applied and what actions can be done to improve the performance of the application of ISO 27001: 2013. Factor analysis was conducted first to determine the factors that affect to the information security. After the factors that affect to the information security known, then observation and interview conducted to gather data about PT. IndoDev Niaga Internet ISO 27001:2013 implementation according to the factors that affect. And then recommendation and corrective action developed using gap analysis method. The most influential factor to the security of customer information PT. IndoDev Niaga Internet is a factor access control and security operations. For the audit results IS027001: 2013 from the aspect of access control, they found 11 check items that fit into the category of NC (Non-Conformance) of 33 check items in which 9 of them in the category of major and two remaining categories minor, while for operations security aspects of the 12 check items, found 5 that goes into the category of NC (Non-Conformance) and everything was included into the category of minor.
Depth Image-Based Rendering (DIBR) is an approach to generate a 3-D image by the original 2-D color image with the corresponding 2-D depth map. Although DIBR is a quite convenient to convert 2D images to 3D ones, ther...
详细信息
A good age in optimizing aspects of development is at the age of 4-6 years, namely with psychomotor development. Psychomotor is broader, more difficult to monitor but has a meaningful value for the child's life be...
A good age in optimizing aspects of development is at the age of 4-6 years, namely with psychomotor development. Psychomotor is broader, more difficult to monitor but has a meaningful value for the child's life because it directly affects his behavior and deeds. Therefore, there is a problem to predict the child's ability level based on psychomotor. This analysis uses backpropagation method analysis with artificial neural network to predict the ability of the child on the psychomotor aspect by generating predictions of the child's ability on psychomotor and testing there is a mean squared error (MSE) value at the end of the training of 0.001. There are 30% of children aged 4-6 years have a good level of psychomotor ability, excellent, less good, and good enough.
In this research, the determination of the appropriate values of Gap for the assessment of promotion criteria of position in an institution / company. In this study the authors use Fuzzy Sugeno logic on the determinat...
In this research, the determination of the appropriate values of Gap for the assessment of promotion criteria of position in an institution / company. In this study the authors use Fuzzy Sugeno logic on the determination of Gap values used in Profile Matching method. Test results of 5 employees obtained the eligibility of promotion with the position of Z* values between in 3.20 to 4.11.
暂无评论