This paper presents a clear and detailed conceptual framework for creating Virtual Reality (VR) applications that incorporate personalization and gamification techniques. The framework comprises several layers designe...
详细信息
As big data analytics becomes increasingly prevalent, fostering a comprehensive understanding of digital information ownership and responsibility is crucial. This paper presents an educational game that uses mobile au...
详细信息
Mental health disorders can affect a person's emotions and behavior and can impact their health and daily activities. The most serious consequence of poor mental health is death by suicide. The problem in this res...
详细信息
Augmented reality is an emerging technology that aims to enrich the elements of the real world with virtual information through the use of appropriate devices. These new technological devices, namely smart mobile devi...
详细信息
Smart Door Lock System is used to protect priceless and prevent unwanted access to a room. A usability evaluation is required to raise the system's usability level because it will help to decide how acceptable the...
详细信息
In the modern era marked by technological advancement, vehicle recognition using computer vision has become increasingly important. The ability to accurately identify and classify vehicles has far-reaching implication...
详细信息
This paper investigates a security problem of simultaneously addressing two types of attacks:Eavesdropping and *** authors model the target system as a discrete-event system(DES)with subsets of concealable events and ...
详细信息
This paper investigates a security problem of simultaneously addressing two types of attacks:Eavesdropping and *** authors model the target system as a discrete-event system(DES)with subsets of concealable events and protectable events,in order to make the proposed methodology applicable to various practical systems and employ two existing works of DES security:Degree of opacity and state ***,the authors consider that all protectable events are observable,and some observable events are *** addition,protectable events cannot be protected once they are *** such a constraint,the goal is to figure out which events to conceal and which transitions to protect so that the prescribed requirements of degree of opacity and state protection are *** this work the authors decide which events to conceal as all transitions of a given event label are concealed or not *** proposed problem formulation also requires a solution to only involve absolutely necessary protectable events in order for the system to avoid superfluous protection *** authors first examine a general version of our security problem with an intuitive algorithm to compute acceptable solutions,and then present a special version which results in a reduced computation time compared to the general version.
Waste is a complex and severe problem with detrimental environmental impacts if not appropriately managed. The process of buying and selling waste is essential in waste management. With its smart contracts, blockchain...
详细信息
Neural Machine Translation is already used for Indonesian informal to formal style transfer. It works by translating the input language to the target language. In Indonesian informal-to-formal style transfer task, inf...
详细信息
Global anxiety and depression have become 25% more prevalent, with teenagers and women being the most affected. Approximately 280 million people suffer from depression. Doctors and psychologists are able to diagnose d...
详细信息
暂无评论