Search Results - (( pen game ) OR ( open game ))

Refine Results
  1. 1

    Games, Rhymes, and Wordplay of London Children by Kelsey, N. G. N.

    Published 2019
    Full-text access
    View in OPAC
    e-Book
  2. 2
  3. 3

    Advances in Human Factors in Wearable Technologies and Game Design Proceedings of the AHFE 2017 International Conference on Advances in Human Factors and Wearable Technologies, Jul...

    Published 2018
    Table of Contents: “…A wearable flexible sensor network platform for the analysis of different sport movements -- Emotion recognition using physiological signals: Laboratory vs. wearable sensors -- A wearable device supporting multiple touch- and gesture-based languages for the deaf-blind -- A step in the right direction - privacy concerns and perceived sensitivity of fitness trackers -- Development of customized orthotics based on lower-leg anthropometric data and task -- An intelligent pen to assess anxiety levels through pressure sensors and fuzzy logic -- Real-time eye-interaction system developed with eye tracking glasses and motion capture -- Accuracy and efficiency validation of a helmet mounted vibrotactile feedback system for aerodynamic head position during cycling -- The pressure comfort sensation of female's body parts caused by compression garment -- Wearability and user experience through user engagement: The case study of a wearable plurisensorial device -- The implementation of acoustic in the game design-insight from the recently "onmyoji" phenomenon in China -- Game design for students: Teaching as a whole context -- Gaming as a driver for social behavior change for sustainability. .…”
    Full-text access
    View in OPAC
    e-Book
  4. 4

    Increasing student engagement and retention using immersive interfaces virtual worlds, gaming, and simulation /

    Published 2012
    Table of Contents: “…Innovative approaches in higher education : an introduction to using immersive interfaces / Patrick Blessinger, Charles Wanke -- Learner engagement in the use of individual and collaborative serious games / Margarida Romero -- Strategies for designing engaging e-learning instructions : know your learners' need / Wei Lian Tan -- Game mechanics for classroom engagement / Stayc DuBravac -- Increasing student engagement using client-based peer assessment in multi-role, whole-enterprise simulations / Steve Gove -- Bringing the classroom to life : using virtual worlds to develop teacher candidate skills / Danielle Mirliss, Grace May, Mary Zedeck -- Engaging Chinese students and enhancing leadership development through virtual simulation : a cross-cultural perspective / Scott A. …”
    Full-text access
    View in OPAC
    e-Book
  5. 5

    Intelligent Methods and Big Data in Industrial Applications

    Published 2019
    Table of Contents: “…- Modelling OpenStreepMap data for determination of the fastest route under varying driving conditions -- Evolution algorithm for community detection in social networks using node centrality -- High Performance Computing By The Crowd -- Zero-overhead monitoring of remote terminal devices -- Asynchronous Specication of Production Cell Benchmark in Integrated Model of Distributed Systems -- Implementing the Bus Protocol of a Microprocessor in a Software-Dened Computer -- ISMIS 2017 Data Mining Competition: TradingBased on Recommendations - XGBoost approach with feature engineering -- Fast Discovery of Generalized Sequential Patterns -- Seismic attributes similarity in facies classication -- Ecient Discovery of Sequential Patterns from Event-Based Spatio-Temporal Data by Applying Microclustering Approach -- Unsupervised machine learning in classication of neurobiological data -- Incorporating Fuzzy Logic in Object-Relational Mapping Layer for Flexible Medical Screenings -- Multimodal learning determines rules of disease development in longitudinal course with Parkinson's patients -- Comparison of Methods for Real and Imaginary Motion Classication from EEG Signals -- Procedural Generation of Multilevel Dungeons for Application in Computer Games using Schematic Maps and L-system -- An HMM-Based Framework for Supporting Accurate Classication of Music Datasets -- Classication of musical genres by means of listening tests and decision algorithms -- Handwritten signature verication system employing wireless biometric pen -- Towards Entity Timeline Analysis in Polish Political News -- Automatic Legal Document Analysis: Improving the Results of Information Extraction Processes using an Ontology -- To improve, or not to improve; how changes in corpora inuence the results of machine learning tasks on the example of datasets used for paraphrase identication -- Context Sensitive Sentiment Analysis of Financial Tweets: A New Dictionary.…”
    Full-text access
    View in OPAC
    e-Book
  6. 6
  7. 7

    The Hackable City Digital Media and Collaborative City-Making in the Network Society /

    Published 2019
    Table of Contents: “…The Hacker, the City and Their Institutions: From Grassroots Urbanism to Systemic Change -- Part I: Design Practices in the Hackable City -- Power to the People: Hacking the City with Plug-In Interfaces for Community Engagement -- Rapid Street Game Design: Prototyping Lab for Urban Change -- The City as Perpetual Beta: Fostering Systemic Urban Acupuncture -- Part II: Changing Roles -- Transforming Cities by Designing with Communities -- Economic Resilience Through Community-driven (Real Estate) Development in Amsterdam-Noord -- This is Our City! …”
    Full-text access
    View in OPAC
    e-Book
  8. 8
  9. 9

    Digital Humanities and New Ways of Teaching

    Published 2019
    Table of Contents: “…Part 1: Digital Archiving and Cultural Heritage Preservation -- Chapter 1: "Digital Humanities in the German speaking world" by Monika Gänßbauer -- Chapter 2:"Digital Humanities Projects on Chinese Canadian Studies" by Jack Hang-tat Leong -- Chapter 3: "The Philippine Performance Archive on Cultural Performances: Archive as Performative Cultural Memory and Pedagogy" by Sir Anril Pineda Tiatco, Bryan Levina Viray, and Jem Roque Javier -- Part 2: Current Research on Digital Humanities -- Chapter 4: "Digitalization and Literature: The Approach of a Poet-Critic to Digital Influences on Poetry and Fiction with Special Reference to My Own Experience as a Writer" by Andrew Parkin -- Chapter 5: "Initiatives of Digital Humanities in Cantonese Studies: A Corpus of Mid-20th Century Hong Kong Cantonese" by Andy Chi-on Chin -- Chapter 6: "Building Cantonese Dictionaries Using Crowd-sourcing Strategies: The words.hk Project" by Chaak-ming Lau -- Part 3: Teaching on Digital Humanities -- Chapter 7: "An Exploration of Design Principles to Enhance Students' L2 Acquisition in a Flipped Class" by Helena Hing-wa Sit and Sijia Guo -- Chapter 8: "Gaming Literacy and Its Pedagogical Implications" by Noble Po-kan Lo and Billy Cheuk-yuen Mok -- Chapter 9: "Locating Digital Humanities: Teaching E-Literature in the Pacific" by John Paolo Sarce -- Part 4: Future Directions in Digital Humanities -- Chapter 10: "Visitors' Perception of a Multimodal Exhibition: A Case Study at the Hong Kong Heritage Museum" by Anna Wing-bo Tso and Janet Man-ying Lau -- Chapter 11: "Digital Storytelling Using Both Keyboard and Pen" by Dora Wong -- Chapter 12: "Adult Learners' Digital Literacies on an Online Social Networking Site - Facebook" by Winnie Siu-yee Ho.…”
    Full-text access
    View in OPAC
    e-Book
  10. 10

    The M in CITAMS@30 : media sociology /

    Published 2018
    Table of Contents: “…Prelims -- Introduction to volume 18: The M in CITAMS@30: media sociology -- Part 1 Inequalities and media -- Closing the digital divide: a justification for government intervention -- Public knowledge and digital divide: the role and impact of China's media -- Changing politics of tribalism and morality in I Am Legend and its remakes -- A niagara of intemperance and vice: newspaper reports on immigrant New York, 18001900 -- Part 2 Cultural production and consumption -- Everyone's a critic? openness as a means to closure in cultural journalism -- The attractions of "recoil" tv: the story-world of Game of Thrones -- From the raja to the desi romance: a sociological discourse on family, class, and gender in Bollywood -- Liberalism without a press: eighteenth-century Minas Geraes and the roots of Brazilian development -- Affective (im)mediations and the communication process -- Afterword: Reflections on my path to CITASA/CITAMS and the future of our section -- Index.…”
    Full-text access
    View in OPAC
    e-Book
  11. 11

    Multi-agent and Complex Systems

    Published 2017
    Table of Contents: “…1.Adaptive Forwarder Selection for Distributed Wireless Sensor Networks -- 2.Trust Transference on Social Exchanges among Triads of Agents Based on Dependence Relations and Reputation -- 3.A Multiagent-Based Domain Transportation Approach for Optimal Resource Allocation in Emergency Management -- 4.A proto-type of a portable ad hoc simple water gauge and real world evaluation -- 5.Exploiting Vagueness for Multi-Agent Consensus 6.Selecting Robust Strategies Based on Abstracted Game Models -- 7.Simulating and Modeling Dual Market Segmentation Using PSA Framework -- 8.CORPNET: Towards a Decision Support System for Organizational Network Analysis using Multiplex Interpersonal Relations -- 9.Membership Function Based Matching Approach of Buyers and Sellers Through a Broker in Open E-Marketplace -- 10.The Effect of Assertiveness and Empathy on Heider's Balance Theory for Friendship Network Models information on submission -- 11.Associative Memory-based Approach to Multi-task Reinforcement Learning under Stochastic Environments -- 12.Preliminary Estimating Method of Opponent's Preferences using Simple Weighted Functions for Multi-lateral Closed Multi-issue Negotiations -- 13.Multi-Objective Nurse Rerostering Problem -- 14.Preference Aware Influence Maximization -- 15.Norm Emergence through Collective Learning and Information Diffusion in Complex Relationship Networks -- 16.Agent-Based Computation of Decomposition Games with Application in Software Requirements Decomposition.…”
    Full-text access
    View in OPAC
    e-Book
  12. 12
  13. 13

    Cyber Security: Power and Technology

    Published 2018
    Full-text access
    View in OPAC
    e-Book
  14. 14
  15. 15
  16. 16

    Disciplinary Convergence in Systems Engineering Research

    Published 2018
    Table of Contents: “…An Empirical Study of Technical Debt in Open-Source Software Systems -- Part 2: System-of-Systems Integration -- Chapter10. …”
    Full-text access
    View in OPAC
    e-Book
  17. 17

    Shortest Path Solvers. From Software to Wetware

    Published 2018
    Full-text access
    View in OPAC
    e-Book
  18. 18

    Advances in Soft and Hard Computing

    Published 2019
    Table of Contents: “…Quality Control and Interaction Procedure of Service Subsystems -- Validation of Safety-Like Properties for Entity-Based Access Control Policies -- Randomness Evaluation of PP-1 and PP-2 Block Ciphers Round Keys Generators -- New Results in Direct SAT-based Cryptanalysis of DES-like Ciphers -- Secure Generators of q-valued Pseudo-random Sequences on Arithmetic Polynomials -- A Hybrid Approach to Fault Detection in One Round of PP-1 Cipher -- Protection of Information from Imitation on the Basis of Crypt-code -- On a New Intangible Reward for Card-Linked Loyalty Programs -- KaoChow Protocol Timed Analysis -- Electronic Document Interoperability in Transactions Executions -- L-system Application to Procedural Generation of Room Shapes for 3D Dungeon Creation in Computer Games -- Hardware-Efficient Algorithm for 3D Spatial Rotation -- Driver Drowsiness Estimation by Means of Face Depth Map Analysis -- Vehicle Passengers Detection for Onboard eCall-Compliant Devices -- An Algorithm for Computing the True Discrete Fractional Fourier Transform -- Region Based Approach for Binarization of Degraded Document Images -- Partial Face Images Classification Using Geometrical Features -- A Method of Feature Vector Modification in Keystroke Dynamics -- Do-It-Yourself Multi-material 3D Printer for Rapid Manufacturing of Complex Luminaries -- Multichannel Spatial Filters for Enhancing SSVEP Detection.…”
    Full-text access
    View in OPAC
    e-Book
  19. 19

    Software Engineering Perspectives and Application in Intelligent Systems Proceedings of the 5th Computer Science On-line Conference 2016 (CSOC2016), Vol 2 /

    Published 2016
    Table of Contents: “…-Software usability Evaluation Based on the User Pinpoint Activity Heat Map -- Inflated Power Iteration Clustering Algorithm to Optimize Convergence Using Lagrangian Constraint -- Virtualization of Operating System Using Type-2 Hypervisor -- A New Game-Theoretical Approach in Network Routing: Algorithms and Their Performance Analysis in OMNeT++ -- Using Analytical Programming for Software Effort Estimation -- Intra-Frame Prediction Mode Decision for Efficient Compression and Signal Quality -- Multidimensional Design of OLAP System for Context-Aware Analysis in the Ambient Intelligence Environment -- A Process for Creating the Elicitation Guide of Non-Functional Requirements -- A Data-Centric Algorithm for Identifying Use Cases -- Algorithm to Balance Compression and Signal Quality using Novel Compressive Sensing in Medical Images -- Application of Virtualization Technology for Implementing Smart House Control Systems -- Utilization of Motion Animation for Analysis of Basic Self-defense Techniques -- EMG Analysis for Basic Self-defense Techniques -- Proposal of the Web Application for Selection Of Suitable Job Applicants Using Expert System -- The technique of Selecting Multiversion Software System Structure with Minimum Simultaneous Module Version Usage -- Expressing Pre- and Post-conditions, Attributesand Business Constraints in Artifact-Centric Business Processes Using Object Role Modeling -- Spam Detection: Naive Bayesian Classification and Rpn Expression-Based Lgp Approaches Compared -- An Agile Approach to Improve Process-Oriented Software Development -- Ad-hoc Routing Protocols Comparison Using Open-Source Simulation Tool -- Discrete Event Simulation of Loading Unloading Operations in a Specific Intermodal Transportation Context -- Parallelization of Fuzzy Logic Analysis for Pattern Recognition -- Performance Management Using Autonomous Control-Based Distributed Coordination Approach in a Volunteer Grid Computing Environment.…”
    Full-text access
    View in OPAC
    e-Book
  20. 20

    Information Technology - New Generations 15th International Conference on Information Technology /

    Published 2018
    Table of Contents: “…Part I Cybersecurity -- Safeguarding Personal Health Information: Case Study -- Cybersecurity as People Powered Perpetual Innovation -- Performance Study of the Impact of Security on 802.11ac Networks -- Training Neural Tensor Networks with the Never Ending Language Learner -- PERIA-Framework: A Prediction Extension Revision Image Annotation Framework -- The Modern State and the Further Development Prospects of Information Security in the Republic of Kazakhstan -- Evaluating Cyber Threats to the United Kingdom's National Health Service (NHS) Spine Network -- A Virtual Animated Commentator Architecture for Cybersecurity Competitions -- Malicious Software Classification using VGG16 Deep Neural Network's Bottleneck Features -- Cybersecurity Vulnerabilities Assessment (A Systematic Review Approach) -- A Self Proxy Signature Scheme over NTRU Lattices -- Towards an Ontology of Security Assessment: a core model proposal -- Integration of Mobile Forensic Tool Capabilities -- Deep Packet Inspection: A Key Issue for Network Security -- What Petya/NotPetya Ransomware is and What its Remidiations are -- Analysis of Security Vulnerability and Analytics of Internet of Things (IOT) Platform -- New Techniques for Public Key Encryption with Sender Recovery -- Cloud Intrusion Detection and Prevention system for M-voting application in South Africa -- Protecting Personal Data with Blockchain Technology -- The Role of CAE-CDE in Cybersecurity Education for Workforce Development -- Software Optimizations for DES -- Part II Networking and Wireless Communications -- Design and Development of VXLAN based Cloud Overlay Network Monitoring System and Environment -- End to End Delay Analysis in a Two Tier Cluster Hierarchical Wireless Sensor Networks -- Tools to Support SMEs to Migrate to the Cloud: Opportunities and Challenges -- A Dual canister medicine IoT Dispenser -- Local Clock Synchronization without Transmission Delay Estimation of Control Messages in Wireless Sensor Networks -- Denial of service attacks inwireless sensor networks with proposed countermeasures -- Part III Education and Technology -- Internet-Based Education: A New Milestone for Formal Language and Automata Courses -- Teaching Communication Management in Software Projects through Serious Educational Games -- Gamification applied in the teaching of agile Scrum methodology -- An Experience of Using a Board Serious Virtual Game for Teaching the SCRUM Framework -- Part IV Agile Software Testing and Development -- Teaching Scrum by Doing Scrum in Internships in South Africa to Prepare Interns for Agile Projects -- Alignment of Requirements and Testing in Agile: an Industrial Experience -- Health Care Information Systems: A Crisis Approach -- Using Correct-by-Construction Software Agile Development -- Service-Centered Operation Methodology (MOCA) application supported by computer science to improve continuously care quality in public services -- Improving Agile Software Development with Domain Ontologies -- A Stratified Sampling Algorithmfor Artificial Neural Networks -- Part V Data Mining/Machine Learning -- Mining ENADE Data from the Ulbra Network Institution -- Fault diagnostic of variance shifts in clinical monitoring using an Artificial Neural Network Input Gain Measurement Approximation (ANNIGMA) -- Investigating Attribute Assessment for Credit Granting on a Brazilian Retail Enterprise -- Cross-language approach for sentiment classification in Brazilian Portuguese with ConvNets -- Thematic Spatiotemporal Association Rules to Track the Evolving of Visual Features and their Meaning in Satellite Image Time Series -- DeRis: Information system supporting the prediction of default risk in companies -- Taking a Steppe towards optimizing Note-Taking Software by creation of a Note Classification Algorithm -- Pattern Recognition for Time Series Forecasting: A Case Study of a Helicopter's Flight Dynamics -- A model for hour-wise prediction of mobile device energy availability -- Enhancing Lipstick Try-On with Augmented Reality and Color Prediction Model -- A Traffic Light Recognition Device -- An Approach to Prepare Data to Feed Visual Metaphors in a Multiple View Interactive Environment -- Reproducible Research in Document Analysis and Recognition -- Music Genre Classification using Data Mining and Machine Learning -- Improving word representations using Paraphrase dataset -- A Initial Experimental Evaluation of the NeuroMessenger: A Collaborative Tool to Improve the Empathy of Text Interactions -- Dual Long Short-Term Memory Networks for Sub-Character Representation Learning -- Business Intelligence Dashboard Application for Insurance Cross Selling -- Speech Features Analysis for Tone Language Speaker Discrimination Systems -- Selection of Transformations of Continuous Predictors in Logistic Regression -- Part VI Software Engineering -- A Generic Approach to Efficiently Parallelize Legacy Sequential Software -- Clustering and Combinatorial Methods for Test Suite Prioritization of GUI and Web Applications -- A Timed Petri NetModel to Specify Scenarios of Video Games -- Survey of Biometric Techniques for Automotive Applications -- A Survey on adoption Good Practices for ICT Governance at Enhanced Organizations -- Budget and User Feedback Control Strategy-based PRMS Scenario Web Application -- A Controlled Natural Language Editor for Semantic of Business Vocabulary and Rules -- An Approach Based on Possibilistic WorkFlow Nets to Model Multiplayer Video Games -- A Requirements Engineering-based Approach for evaluating Security Requirements Engineering Methodologies -- Increasing the prediction quality of software defective modules with automatic feature engineering -- Part VII High Performance Computing Architectures -- NSF Noyce Recruitment and Mentorship -- Mining Associations between Two Categories using Unstructured Text Data in Cloud -- A Note on Computational Science Curriculum -- Development of a Local Cloud-Based Bioinformatics Architecture -- Part VIII Computer Vision, Image Processing/Analysis -- AComputer Vision Based Algorithm for Obstacle Avoidance -- The ST-Vis tool for SpatioTemporal Visualization -- Detection of early gastric cancer from endoscopic images using Wavelet Transform Modulus Maxima -- Detection method of early esophageal cancer from endoscopic image using dyadic wavelet transform and four-layer neural network -- Study of Specific Location of Exhaustive Matching in Order to Improve the Optical Flow Estimation -- Solarpowered UAV Platform System: a Case Study for Ground Change Detection in BRIC Countries -- Part IX Health, Bioinformatics, Pattern Detection and Optimization -- Benefits of Establishing Makerspaces in Distributed Development Environment -- Semantic Description of Healthcare Devices to Enable Data Integration -- Applying transfer learning to QSAR regression models -- Investigating the Recognition of Non-Articulatory Sounds by using Statistical Tests and Support Vector Machine -- A Complete Diabetes Management and Care System -- On the use of van der PauwTechnique to Monitor Skin Burning in Patients Undergoing Interferential Current Therapy (IFC) with Extension to Other E-Stim Monitoring -- Part X Potpourri -- Smart Lighting Controlling System: Case Study of Yarmouk University Museum -- Incremental Topology Generated for ANN A Case Study on a Helicopter's Flight Simulation -- Degree Aware Triangulation of Annular Regions -- Heuristic Approaches for the Open-Shop Scheduling Problem -- Continuous State Power-down Systems for Renewable Energy Management -- Extracting Timing Models from Component-based Multi-criticality Vehicular Embedded Systems -- Part XI Short Papers -- Customer services management and satisfaction of Internet-related banking of First National Bank -- BIG IoT - Interconnecting IoT Platforms from different domains - First success story -- Cross-Cultural Perspective of E-Commerce -- Website Usability Requirements: Through the Lens of Individual's Perception -- Methods of Ensuring the Reliability and Fault Tolerance of Information Systems -- Applying a Method for Credit Limit Reviews in a Brazilian Retail Enterprise -- Application of an Effective Methodology for Analysis of Fragility and Its Components in the Elderly -- A Classifier Evaluation for Payments' Default Predictions in a Brazilian Retail Company -- Confidentiality, Integrity & Availability in Electronic Health Records:An Integrative Review -- Operating System Security Management and…”
    Full-text access
    View in OPAC
    e-Book