The aim purposed of this research is to evaluate clinical management information system called (E-CLINIC) which is integrated with the Primary Care (Pcare) application provided by Indonesia sosial healt insurance orga...
详细信息
Visual impairment is a condition that affects the sense of sight. In Indonesia, around 1.5% of the 4 million people are blind. In their daily activities, the visually impaired rely on their sense of touch to recognize...
详细信息
In this paper we present a case study of our candidate design for the user-interface of a wireless vital-signs monitor. We reflect on our design of the user-interface, and relate our design experience to theories of a...
详细信息
ISBN:
(纸本)9781450373265
In this paper we present a case study of our candidate design for the user-interface of a wireless vital-signs monitor. We reflect on our design of the user-interface, and relate our design experience to theories of artefact design, evaluating from this case study how the theories apply to the broader design context of design for AR. Theories of 'good design' in artefact design literature do not unilaterally apply to the design for an augmented reality device. In many cases, design in AR fields requires the designer to create new cultural conventions by virtue of the fact that the designer is immersing the user in an unfamiliar environment. Thus, the designer is often unable to utilise affordances and existing cultural conventions because the functions and/or use of the object expands the environment in which affordances and cultural conventions currently have meaning. Copyright 2000 ACM.
Many methods used to perform a password authentication using user’s biometrics such as fingerprint recognition, retina recognition, voice recognition, etc. However, additional sensors needed to perform most of biomet...
详细信息
Many methods used to perform a password authentication using user’s biometrics such as fingerprint recognition, retina recognition, voice recognition, etc. However, additional sensors needed to perform most of biometric recognition methods and will be invasive to users caused by additional tools needed to perform a password authentication. Keyboard Dynamics is one of the solution to perform password authentication without adding any tools which being disruptive to some users. The biometric keystroke dynamic system is relatively unexplored compared to other behavioral authentications discipline. Coupled with the limited number of studies that have been done compared with other biometric systems. Several machine learning research has been conducted but few of them applying deep learning for solving this problem. This research will be focusing in deep learning using optimizer to beat the previous research which using another machine learning techniques. This research shows a better result using optimizer in deep learning resulting in 92.60% accuracy.
Despite the increasing computing power of shared memory systems with high core counts, parallel graph processing frameworks cannot exploit it effectively. The reason behind this is the inherent challenges in parallel ...
详细信息
We demonstrate a precision time protocol (PTP) used to synchronize clocks in industrial wireless local area network (iWLAN) communication systems. The implementation of the system on FPGA boards for accurate verificat...
详细信息
To accommodate the wide range of input voltages supplied by redundant batteries and ensure an adequate hold-up time for communication systems during utility power failures, power supplies used in 5 G base stations typ...
详细信息
In order to ensure the safety and manufacturing efficiency of pharmaceuticals, rigorous quality control measures are necessary. However, existing quality control systems often struggle with industrial process complexi...
详细信息
The COVID-19 outbreak has restricted most outdoor activities, leads to increasing interest in exercise at home with online trainers. One issue of online exercise technology is the safety since improper motion might re...
详细信息
We show that the internal path length of a red-black tree of size N is bounded above by 2N(log N - log log N) + O(N) and that this is, asymptotically, tight. This result further affirms a conjecture that whenever tree...
详细信息
暂无评论