نتایج جستجو برای: obtrusive instruction
تعداد نتایج: 41499 فیلتر نتایج به سال:
This paper presents a watermarking algorithm for binary images. The original binary image is blurred to a gray-level image and we embed the watermark by biasing the threshold in binarization. A loop is used to control the quality of watermarked images and robustness, and a key is generated for extraction. We employ error correction codes to reduce extraction error. This algorithm can be applied...
The art and philosophy of a culture capture more than just the most developed consciousness of a people. Particularly in their structural forms as well as in their emphases, selection, and transformation of material cultural artifacts reproduce essential elements of the social context, bringing out the prevailing suppositions and conditioning forces and displaying them prominently. According to...
The literature of home telehealth technology recommends that systems be designed to minimize their obtrusiveness to end users. However, this term is neither explicitly defined nor consistently used. This paper presents a definition of the concept of obtrusiveness. Within this definition, twenty-two categories of what may be perceived as obtrusive in home telehealth technology are proposed based...
Nowadays, computing environments are almost ubiquitous systems. Users own several machines and need to manage them in a non-obtrusive and transparent way. In addition, users eventually need to share their devices with other people. Traditional Single Sign-On (SSO) schemes do not handle well scenarios where users work simultaneously with more than one device because their agents do not cooperate...
Artificial Intelligence provides a rich set of methods and tools for implementing the Ambient Intelligence vision, i.e. to transform our environments into smart spaces assisting as with our everyday tasks in an intelligent, seamless and non-obtrusive way. Among them, Semantic Web technologies, such as RDF, ontology languages and others, can be used to address several of the challenges that come...
Wireless sensor networks are one of the most rapidly evolving research and development fields for microelectronics. Their applications are countless, and the market potentials are huge. However, many technical hurdles have to be overcome to achieve a widespread diffusion of wireless sensor network technology. This paper summarizes the trends of evolution in wireless sensor network nodes, focusi...
the purpose of this study was to probe the effect of metacognitive strategy instruction through dialogic interaction on the reading comprehension performance and metacognitive awareness of iranian efl learners. the data were collected through the survey of reading strategies (sors) and a reading test to examine changes in metacognitive awareness and reading performance before and after the inte...
Think Aloud is cost effective, promises access to the user’s mind and is the applied usability technique. But ”keep talking” is difficult, besides, the multimodal interface is visual not verbal. Eye-tracking seems to get around the verbalisation problem. It captures the visual focus of attention. However, it is expensive, obtrusive and produces huge amount of data. Besides, eye-tracking do not ...
We propose a forensic VANET application to aid an accurate accident reconstruction. Our application provides a new source of objective real-time data impossible to collect using existing methods. By leveraging inter-vehicle communications, we compile digital evidence describing events before, during, and after an accident in its entirety. In addition to sensors data and major components status,...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید