Fatigue in workplace is a common thing shared by all employees. Continuous exposure of fatigue could lead to negative productivity for companies. Current research on fatigue detection mostly focused to detect fatigues...
详细信息
ISBN:
(数字)9798331506490
ISBN:
(纸本)9798331506506
Fatigue in workplace is a common thing shared by all employees. Continuous exposure of fatigue could lead to negative productivity for companies. Current research on fatigue detection mostly focused to detect fatigues from a single 2D image data, meanwhile research on fatigue detection using each frames from video data is needed for better detection for fatigue process. The main advantage of using each timesteps of frames from video data which makes the model is able to predict long term dependency of fatigue person. To solve this problem, a deep learning model is proposed that could detect employee fatigue based on image processing using video data. Three models are used to train data using Convolutional Neural Network (CNN), which are Time Distributed CNN LSTM, 3D CNN, and 3D CNN LSTM. Out of those three models, the best model to detect fatigue person from video data is Time Distributed CNN Model with F-1 Score value of 0.77 and Accuracy Score of 0.76 for testing data. The model that gives best inference time is also Time Distributed CNN Model with the average value of 382 miliseconds to detect fatigues from 58 testing data with each of the data has duration of 3 seconds and 12 frames.
The rising threat of cybercrimes in Indonesia, including a significant breach of the national data center, reveals the urgent need for effective cybersecurity education. Cryptography, a key component of cybersecurity,...
详细信息
ISBN:
(数字)9798350380439
ISBN:
(纸本)9798350380446
The rising threat of cybercrimes in Indonesia, including a significant breach of the national data center, reveals the urgent need for effective cybersecurity education. Cryptography, a key component of cybersecurity, is often difficult for beginners to grasp. To address this, we developed an interactive web game that blends puzzle-solving with a visual novel to make cryptographic concepts more accessible. This study analyzes the game’s user experience (UX) using the ARCS model—Attention, Relevance, Confidence, Satisfaction—and assesses learning outcomes by comparing pre-test and post-test results. The findings show significant improvements in participants’ understanding and high levels of engagement, demonstrating a strong correlation between positive user experience and enhanced learning outcomes. However, some aspects of the educational content still need refinement. Future updates will offer multilingual support and personalized learning paths, with pre-and post-tests targeting specific cryptography and cybersecurity sub concepts, and analysis of UX features through targeted surveys and in-game analytics to enhance learning experiences.
Shipbuilder safety and performance, structural integrity of welded joints in shipbuilding is of utmost importance. Traditional manual inspection methods to detect any potential defect can be time consuming and suscept...
详细信息
ISBN:
(数字)9798331539603
ISBN:
(纸本)9798331539610
Shipbuilder safety and performance, structural integrity of welded joints in shipbuilding is of utmost importance. Traditional manual inspection methods to detect any potential defect can be time consuming and susceptible to human errors; alternative inspection systems have proven more cost effective and accurate solutions than manual approaches for defect identification. This paper investigates how advanced software quality assessment standards and machine learning techniques such as Convolutional Neural Networks (CNNs) and You Only Look Once (YOLO) object identification framework can enhance weld defect detection. Research undertaken for this thesis addresses three core questions. 1) Which standards provide effective software quality assessments used for weld defect detection systems?; and 2) In what ways will they impact efficiency and reliability. How will implementation of these standards increase accuracy in manufacturing processes? Integrating high-quality annotated datasets, optimizing joint preparation and parameter settings, and using cloud solutions for computing needs can enable industries to achieve more reliable, efficient, and scalable defect detection. This proactive approach not only enhances immediate product quality, but also contributes to long-term durability and performance, decreasing maintenance costs and increasing overall reliability for steel plates used for marine applications. Furthermore, evidence has revealed that adopting software quality assessment standards in weld defect detection significantly enhances structural integrity as well as operational efficiency of shipbuilding operations.
This empirical study involved volunteers who played a game featuring NPCs specially developed for the research. The research investigated the influence and behaviour of NPC appearance on some factors regarding the pla...
详细信息
Prediction of software defects is an important aspect of software quality assurance, aiming to identify defective modules to improve reliability and reduce costs in the maintenance process. A systematic literature rev...
详细信息
ISBN:
(数字)9798350367492
ISBN:
(纸本)9798350367508
Prediction of software defects is an important aspect of software quality assurance, aiming to identify defective modules to improve reliability and reduce costs in the maintenance process. A systematic literature review (SLR) on software defect prediction is presented in this study, focusing on identifying commonly used datasets, methods, and frameworks in this domain between 2014 and 2023. The review follows established SLR guidelines to synthesize data from primary studies, providing insight into research trends as well as methodological advances. The results show a significant reliance on public datasets such as the NASA Metrics Data program (MDP) and the PROMISE repository. Various machine-learning techniques have been used, with Neural networks, support vector machines, and random forests becoming the most popular techniques. This review aims to guide future research by highlighting key trends and gaps in the existing literature.
The challenges in the education sector are extensive, encompassing issues such as human resource selection, technology choice, and business procedure assessment. To address these challenges both academically and pract...
详细信息
ISBN:
(数字)9798331515881
ISBN:
(纸本)9798331515898
The challenges in the education sector are extensive, encompassing issues such as human resource selection, technology choice, and business procedure assessment. To address these challenges both academically and practically, decision models can be effectively utilized. This study aims to conduct a bibliometric review to examine the trends in the use of fuzzy logic and identify popular methods combined with fuzzy logic in the development and implementation of decision models in educational contexts. The review results were then used to design a generic education decision model using an object-oriented approach. Based on the analysis of 165 selected articles from the past decade and an in-depth review of 10 articles, the study found that the use of fuzzy logic is growing rapidly, following a tight exponential trend. Additionally, the analytic hierarchy process (AHP) is frequently united with fuzzy logic in developing decision models. Consequently, an object-oriented decision model was designed, featuring 2 decision model blocks (i.e. selection and evaluation), 7 main objects, 9 use cases, and 5 human actors.
The background of this research is the condition of the covid-19 pandemic which has an impact on online ticket sales. Meanwhile, when future of covid-19 pandemic is starting to become clearer, we are going to have a l...
详细信息
Depression is a disease that affects everyone, both young and old. This mental illness not only affects the surrounding environment but everyone. Depression is characterized by deep sadness, behavioral changes and man...
详细信息
作者:
Ximenes, PabloMello, Patricia
School of Cybersecurity and Privacy College of Computing Atlanta United States
Computer Science Graduate Program Fortaleza Brazil
This paper uses the Diamond Model of intrusion analysis to discuss the intricacies and unfoldings of the cyberattack that enabled Operation 'Car Wash' leak (nicknamed 'VazaJato'), one of the most signi...
详细信息
Data selection can be used in conjunction with adaptive filtering algorithms to avoid unnecessary weight updating and thereby reduce computational overhead. This paper presents a novel correntropy-based data selection...
详细信息
暂无评论