Visible to the public Biblio

Filters: Keyword is Atmosphere  [Clear All Filters]
2023-07-19
Zuo, Langyi.  2022.  Comparison between the Traditional and Computerized Cognitive Training Programs in Treating Mild Cognitive Impairment. 2022 2nd International Conference on Electronic Information Engineering and Computer Technology (EIECT). :119—124.
MCI patients can be benefited from cognitive training programs to improve their cognitive capabilities or delay the decline of cognition. This paper evaluated three types of commonly seen categories of cognitive training programs (non-computerized / traditional cognitive training (TCT), computerized cognitive training (CCT), and virtual/augmented reality cognitive training (VR/AR CT)) based on six aspects: stimulation strength, user-friendliness, expandability, customizability/personalization, convenience, and motivation/atmosphere. In addition, recent applications of each type of CT were offered. Finally, a conclusion in which no single CT outperformed the others was derived, and the most applicable scenario of each type of CT was also provided.
2022-08-04
Ganesan, Dhandapani, Sharum, Mohd Yunus, Mohd Sani, Nor Fazlida binti, Mohd Ariffin, Noor Afiza bt.  2021.  A Survey on Advanced Schemes applied within Trusted Platform modules (TPM) and IaaS in cloud computing. 2021 5th International Conference on Computing Methodologies and Communication (ICCMC). :317—322.
Trusted Platform Modules (TPM) have grown to be crucial safeguards from the number of software-based strikes. By giving a restricted range of cryptographic providers by way of a well-defined user interface, divided as a result of the program itself, TPM and Infrastructure as a service (IaaS) can function as a root of loyalty so when a foundation aimed at advanced equal protection methods. This information studies the works aimed at uses on TPM within the cloud computing atmosphere, by journal times composed somewhere among 2013 as well as 2020. It identifies the present fashion as well as goals from these technologies within the cloud, as well as the kind of risks that it mitigates. The primary investigation is being focused on the TPM's association to the IaaS security based on the authorization and the enabling schema for integrity. Since integrity measurement is among the key uses of TPM and IaaS, particular focus is given towards the evaluation of operating period phases as well as S/W levels it's put on to. Finally, the deep survey on recent schemes can be applied on Cloud Environment.