Applied Mechanics and Materials Vols. 764-765

Paper Title Page

Abstract: Researchers of game-based learning have often suggested that learner’s motivation beliefs about learning achievement would likely affect their use of game-based learning strategies and ultimate success in learning. However, research which has empirically documented the link between gamification, motivation, and cognitive load is scant. Therefore, the aim of this article attempts to explore how gamification, motivation, cognitive load will affect learning achievement, and their use of Gamification Software Engineering Education Learning System (GSEELS) are related. This research involved empirical study, comprised of four sets of questionnaires concerning gamification, motivation; cognitive load and learning achievement. Tow intact class of 107 college students participated in the study. The structural equation modeling (SEM) analysis was conducted through descriptive statistics, measurement model evaluation and structured model evaluation in order to indicate the direction and relationship between the four sets of variables. The research result shows that 5 out of 6 hypotheses are supported and merely 1 hypothesis is false. Well-design GSEELS will affect student learning motivation and achievement. To conclude, this study may be important in explaining the relationship between gamification, motivation, cognitive load, as well as in suggestions for teaching and learning four aspects with a better understanding of how teacher’ beliefs about SE education related to their strategy use.
822
Abstract: In this paper, we propose an improved routing algorithm to prolong network lifetime of wireless sensor networks (WSNs) by combining the shortest hop routing tree (SHORT) algorithm and the, turn off redundant node (TORN) MAC layer protocol to cross layer SHORTORN scheme. Moreover, to prolong the lifetime of the first node death (FND) in networks, the rate of energy consumption should be balanced for all nodes. Therefore, this paper further proposes a load balancing SHORTORN scheme by combining the weight and energy-aware, called energy-aware weight-based SHORTORN (EWSHORTORN). The proposed EWSHORTORN algorithm lets more nodes share the load of the leader and balances the opportunity of data relaying to all nodes. The proposed load balancing scheme allocates energy consumption load to be more uniformly among all nodes, thus the FNL can be prolonged evidently. Simulation results show that the proposed EWSHORTORN outperforms the SHORT scheme with double lifetime of FND.Keywords: wireless sensor networks, network lifetime, cross layer protocol, load balance.
827
Abstract: The virtually multiple mouse wheels is a new input device; however, as it has not yet been supported by application software, the left scroll and right scroll can only operate a few software functions. In this study, computer software is combined with a virtually multiple mouse wheel to intercept left and right scroll signals in the background, which are converted into the start signal of software and sent to the application software in order that software functions can be operated. The left scroll and right scroll operate the preset function, and the user software interface implemented in this study enables the user to set the function to be operated, thus, meeting different users' requirements. In addition, the software interface can detect the software of the mouse cursor, and the mouse wheel function is automatically adjusted according to the software. This mouse wheel not only senses the different scroll positions of the finger, it also automatically distinguishes different software environments, which provides diversified software function responses, thus, it is called the intelligent mouse wheel.
832
Abstract: Wireless sensor networks (WSNs) are a group of wireless sensor nodes, those sensor nodes with sensing and monitoring of environmental information. Energy consumption is an important topic; the node's power is limited. Therefore, we proposed an Opportunistic Large Array Concentric Geographic Routing Algorithm (OLACGRA) to reduce the node’s energy consumption and analysis the characteristic of energy model. The sink position of our proposed OLACGRA is at the center of concentric topology architecture. The source node wants to transmit data that it needs to calculate the distance between source node and sink node. If this distance bigger than threshold value, we use the multi-hop manner. Otherwise, source node transmits data to sink node directly. Simulation results show that our proposed algorithm can effectively reduce the node’s energy consumption.
838
Abstract: Developing useful apps has never been an easy task. Although modern mobile phones/tablets have more and more computation power, it is still not possible to treat them as real computers. Hence, many apps rely on external components to provide services. However, this complicates the development of apps. Unlike students in the computer science department, information management students do not have equally solid programming background. App development related courses have a more rigid learning curve for them. In this paper, APPRush, a platform for developing usable apps and for learning app design skills, is proposed. Both students and ordinary app developers can benefit from the resulting platform.
843
Abstract: In this paper, a mechanical design oriented Python program development system was created to assist engineers to manage their programming assets more efficiently. This cloud-based platform includes a content management system and Python-in-browser IDE (Integrated Development Environment). The motivation of this research is to allow mechanical designers to store their programs and design data locally and remotely in synchronous. This paper introduces the basic concept of the platform, architecture, installation and utilization, and the advantages that can be achieved by using this platform. This platform is released under the GPL V3 license.
848
Abstract: The car video can protect the driver by clarifying the liability in the event of an accident. More and more devices and functions have been on sale for drivers in recent years. They are focused on high quality images, wide angle support and night vision functions. However, those technologies cannot help to clarify the accident liability when the sight and angle are obscured by neighbouring cars or buildings. Hence, this paper proposes the Cooperative Car Video Share and Search (CCVSS) system. The car video will be uploaded frequently, including position, heading and timestamp information on each car in the CCVSS system. Hence, the driver can search for neighbouring cars’ videos when an accident happens using the above information. This paper implements a system to help the driver to upload the car video and obtain neighbouring cars’ videos via a smartphone device.Keywords—cooperative; car video; smartphone device
853
Abstract: Due to the rapid growth of computer and communication technologies, people obtain variety of online services quickly. However, all networks are vulnerable to lots of security threats and attacks. The remote authentication scheme provides an efficient method to validate the remote users and servers. Ahirwal and Sonwanshi proposed a remote user authentication scheme with smart card in 2012. They indicated that Song’s smart card based password authentication protocol cannot resist the offline password guessing attack, insider attack, forward secrecy and denial of service attack. They proposed an ID-based authentication scheme to fix security flaws. The scheme uses one-way hash function and bitwise XOR operation such that the computation complexity is very low. However, in this article, we will show that their scheme cannot withstand the offline password guessing attack as they declared. An adversary can use the intercepted messages of two login sessions to obtain the password.
858
Abstract: In this paper, an error concealment scheme for neural-network based compression of depth image in 3D videos is proposed. In the neural-network based compression, each depth image is represented by one or more neural networks. The advantage of neural-network based compression lies in the parallel processing ability of multiple neurons, which can handle the massive data volume of 3D videos. The similarity of neuron weights of neighboring nodes is exploited to recover the loss neuron weights when transmitting with an error-prone communication channel. With a simulated noisy channel, the quality of compressed 3D video, which is reconstructed undergoing the noisy channel, can be recovered well by the proposed error concealment scheme.
863
Abstract: The Radio Frequency Identification System (RFID) is widely used in a variety of materials management for small amount deductions, tracking and control. A RFID system consists of electronic tags, transceivers, and tag reader. The advantages of RFID tags are unitary that can be record data. The data also can be either read or wrote. The purpose of the paper is to develop a RFID Roll Check System. It also combines with an existing database systems in a cloud environment. The design of RFID Roll Check System developed in this paper to improve the performance of the current roll check system. Every student is allocated an electronics tag, that the tags have detailed courses information for system’s contract. All technology and system engineering method have successfully applied in the children's summer camp courses which were held by Center for Extension Education of school. Meanwhile, the RFID Roll Check System has completed 2,500 people for roll check reliability test. The final results prove that this system has high reliability.
868

Showing 161 to 170 of 276 Paper Titles