Blockchain, Metaverse & NFT are technologies that were booming during the Pandemic. As a derivative product of blockchain, the Non-Fungible Token (NFT) is one of the technologies that has attracted the most intere...
Blockchain, Metaverse & NFT are technologies that were booming during the Pandemic. As a derivative product of blockchain, the Non-Fungible Token (NFT) is one of the technologies that has attracted the most interest from investors and the public because of its potential benefits and has always been closely associated with the Metaverse as a main purposes research of the NFTs. This paper is to explore the possibilities and provide an overview of the current use of NFT technology so that it can provide insight for further research & gap with the big picture that it is trying to present in this paper. However, after exploring further related to NFT in this research, it was found that the problem that most people are trying to solve through NFT is related to the topic of Decentralization & Web3 not as a Metaverse main backbone.
This paper explores the development of a multilabel machine learning system for predicting both gender and age from human gait patterns. Gait analysis, a non-intrusive method of identifying subtle nuances in human mov...
This paper explores the development of a multilabel machine learning system for predicting both gender and age from human gait patterns. Gait analysis, a non-intrusive method of identifying subtle nuances in human movement, has proven to be a rich source of information related to demographic characteristics. The research extends beyond traditional single-label classification approaches, adopting a multilabel framework to simultaneously predict gender and age *** study evaluates various multilabel machine learning algorithms, with the Random k-labeLsets (RAKEL) algorithm demonstrating superior performance in predicting gender and age labels from human gait datasets. The accuracy of the algorithm can reach up to 87%. We also compared the multilabel approach with several multiclass algorithms such as Decision Tree, Random Forest, Gradient Boosting, K-Neighbors and XGBoost. However, when we also considering the training time, Classifier Chain algorithm showed the best trade off with the accuracy of 86% and the training time is twice faster than the RAKEL algorithm.
National governments around the world have made every effort to fight Covid-19. One of which is by building mobile applications that can be used to trace and monitor the citizens' health during this pandemic. Thes...
详细信息
To day's society is different from the past, where the speed of the internet is getting more sophisticated, and the existing gadget technology is getting faster, and of course, this is also changing the lifestyle ...
To day's society is different from the past, where the speed of the internet is getting more sophisticated, and the existing gadget technology is getting faster, and of course, this is also changing the lifestyle of today's people, which of course almost half of their daily life is spent in front of gadgets. On the one hand, this is undoubtedly very good and supports humans in carrying out their daily life activities, but on the other hand, this raises new problems where humans start to lack time to communicate and socialize with each other and often making them stressed and anxious because they are already tired and do not know how to socialize anymore. This paper begins with a model and implementation of a very simple mobile application that behaves as a social media inspired by *** as a social media for academics. The design of this mobile application is done by using use case diagrams to describe existing processes and class diagrams to describe class relationships.
From a requirements engineering point of view, the elicitation of contextaware functionalities calls for context modeling, an early step that aims at understanding the application contexts and how it may influence use...
详细信息
We have been developing MEIMAT (MEiji Microprocessor Architecture Design Tools). The MEIMAT is essentially designed to be able to represent any instruction of various processors by the MEIMAT meta-instruction in two w...
We have been developing MEIMAT (MEiji Microprocessor Architecture Design Tools). The MEIMAT is essentially designed to be able to represent any instruction of various processors by the MEIMAT meta-instruction in two ways of semantic and functional expressions. In this paper, we have verified the RISC-V support to the MEIMAT, and have improved so that MEIMAT further supports RISC-V. First, we have verified whether the RISC-V instructions can be expressed by the MEIMAT semantic expression. It is also verified that the functional expression is automatically generated from the semantic instruction, and the corresponding correct circuit diagrams are generated in the MEIMAT instruction visualization tool. Then, we have newly developed a stage configuration mechanism to implement the RISC-V instructions. Because the RISC-V architecture is implemented by 4 or 5 processing stages in most actual processors. To develop further an easy-to-understand design tool, we have also introduced illustration windows for RISC-V specified hardware modules such as a register file, especially a status register in the instruction visualization tool. Finally, through these verifications and improvements, we have successfully confirmed that the 43 instructions in the RISCV (RV32I) instructions set of the RISC-V architecture can be converted into MEIMAT meta-instructions, and then they can be represented as circuit diagrams with the RISC-V stage configuration in the MEIMAT instruction visualization tool.
Unmanned Aerial Vehicles(UAVs)provide a reliable and energyefficient solution for data collection from the Narrowband Internet of Things(NB-IoT)***,the UAV’s deployment optimization,including locations of the UAV’s ...
详细信息
Unmanned Aerial Vehicles(UAVs)provide a reliable and energyefficient solution for data collection from the Narrowband Internet of Things(NB-IoT)***,the UAV’s deployment optimization,including locations of the UAV’s stop points,is a necessity to minimize the energy consumption of the UAV and the NB-IoT devices and also to conduct the data collection *** this regard,this paper proposes GainingSharing Knowledge(GSK)algorithm for optimizing the UAV’s *** GSK,the number of UAV’s stop points in the three-dimensional space is encapsulated into a single individual with a fixed length representing an entire *** superiority of using GSK in the tackled problem is verified by simulation in seven *** provides significant results in all seven scenarios compared with other four optimization algorithms used before with the same ***,the NB-IoT is proposed as the wireless communication technology between the UAV and IoT devices.
Educational Robotics offers an interactive learning approach where students can turn abstract theories into concrete projects. With the exponential growth in content creation on internet platforms, finding specific, h...
详细信息
ISBN:
(数字)9798350391084
ISBN:
(纸本)9798350391091
Educational Robotics offers an interactive learning approach where students can turn abstract theories into concrete projects. With the exponential growth in content creation on internet platforms, finding specific, high-quality learning objects about robotics in education can be challenging. Platforms like YouTube, for example, have a vast collection of educational videos that cover various topics related to educational robotics. However, they are scattered among a massive amount of available data, making it difficult to have more assertive searches and identify the best resources. This work aims to present Robot Finder v2, a software that uses an automated approach to feed RepositORE, a repository of Learning Objects in Educational Robotics. The Robot Finder v2 searches and stores data from YouTube videos to make the search for this content simpler and more effective. The collected data feeds the RepostiORE, where these objects can be adapted and researched by users looking to acquire skills in educational robotics. For the objects to be found accurately, the software uses the YouTube Data API v3, which has a set of metadata in addition to the descriptions of the videos provided by their creators. The processing done in the Robot Finder optimizes the search and registration of information by mapping API endpoints and seeking correlations of metadata between RepositORE objects and YouTube videos.
The rise of blockchain technology and smart contracts has brought widespread attention due to their capacity to transform multiple industrial sectors through decentralized, transparent, secure transactions. However, d...
The rise of blockchain technology and smart contracts has brought widespread attention due to their capacity to transform multiple industrial sectors through decentralized, transparent, secure transactions. However, despite their promise to revolutionize various fields worldwide, lingering concerns regarding security risks impede their adoption rate. Addressing these concerns is crucial now more than ever; therefore, we conducted a comprehensive literature review within our study's scope that focused on published papers between 2014-2023 centered around security risks concerning blockchain and smart contracts. Our systematic approach using the PRISMA checklist analyzed nine categorized research model-based primary studies while recognizing vulnerabilities in smart contract development and providing best practices to mitigate such issues. These findings benefit both researchers and practitioners as they showcase how acknowledging these vulnerabilities can further develop into exploring more significant aspects of blockchain technology's security issues and smart contract development processes. Our study contributes significantly by expanding knowledge in this field while providing novel insights valuable for individuals involved in designing or implementing blockchain technologies.
In the realm of research, the global health challenge posed by lung cancer remains pronounced, contributing substantially to annual cancer-related fatalities. The critical imperative lies in the early identification o...
详细信息
ISBN:
(纸本)9798400716874
In the realm of research, the global health challenge posed by lung cancer remains pronounced, contributing substantially to annual cancer-related fatalities. The critical imperative lies in the early identification of pulmonary nodules, frequently indicative of impending lung cancer, to enhance patient outcomes and diminish mortality rates. Computed Tomography (CT) imaging stands out as a pivotal diagnostic instrument for the timely detection of these nodules. The swift proliferation of medical imaging data has underscored the pressing necessity for precise and efficient methodologies dedicated to nodule segmentation and measurement. These approaches are crucial in assisting radiologists in their diagnostic and clinical decision-making endeavors. In this study, we introduced a thorough method for analyzing lung nodules, leveraging dataset from Far Eastern Memorial Hospital (FEMH) comprising original CT images and manually annotated ground truth masks obtained with the assistance of radiologists at FEMH. This dataset is utilized for the segmentation of nodules. We employed advanced deep learning models, specifically the U-Net architecture, identified as the optimal model through our training process. We made substantial progress in nodule segmentation, attaining an Intersection over Union (IoU) score of 0.824 and a Dice Coefficient of 0.903 for the FEMH dataset. Furthermore, our performance improved when utilizing the merged dataset comprising FEMH and Luna16, yielding an IoU score of 0.862 and a Dice Coefficient of 0.926. Luna16 has been extensively utilized in numerous studies related to nodule detection and segmentation. In the next phase of the study, the best-performing model from our segmentation phase was utilized to predict nodule masks on the merged dataset. Subsequently, we measured the size of each predicted nodule by comparing it with the size ground truth mask in millimeters. In detail, this study achieved the Pearson Correlation Coefficient (PCC) at 0.
暂无评论