scispace - formally typeset
Search or ask a question

Showing papers on "Laptop published in 2018"


Journal ArticleDOI
01 Sep 2018
TL;DR: It is shown that whereas taking more notes can be beneficial, laptop note takers’ tendency to transcribe lectures verbatim rather than processing information and reframing it in their own words is detrimental to learning.
Abstract: Taking notes on laptops rather than in longhand is increasingly common. Many researchers have suggested that laptop note taking is less effective than longhand note taking for learning. Prior studies have primarily focused on students’ capacity for multitasking and distraction when using laptops. The present research suggests that even when laptops are used solely to take notes, they may still be impairing learning because their use results in shallower processing. In three studies, we found that students who took notes on laptops performed worse on conceptual questions than students who took notes longhand. We show that whereas taking more notes can be beneficial, laptop note takers’ tendency to transcribe lectures verbatim rather than processing information and reframing it in their own words is detrimental to learning.

116 citations


Journal ArticleDOI
TL;DR: This article reports on a systematic literature review of research presented or published between 2007 and 2016 that evaluated the effect of smartphone questionnaire design features on indicators of response quality, and identifies design heuristics, or general principles, for creating effective smartphone questionnaires.
Abstract: Design principles for survey questionnaires viewed on desktop and laptop computers are increasingly being seen as inadequate for the design of questionnaires viewed on smartphones. Insights gained ...

31 citations


Book ChapterDOI
15 Jul 2018
TL;DR: Results show that there are significant differences in device usage between the activities under study and between the four analyzed technology generations.
Abstract: Our daily life is characterized by increasing digitalization. As a result digital technologies are becoming an integrated part of everyday activities. The most used devices are desktop PCs or laptops, tablet PCs, and smartphones, which mainly differ with regard to the screen size and the method of data entry. Given the growing diffusion of technological devices, the increasing ownership of multiple devices, and the resulting different usage patterns between devices, it is essential to gain insights into which devices are used for which activities. The aim of this analysis was to examine a total of 21 activities people engage in on a day-to-day basis with regard to desktop PC or laptop, tablet PC, and smartphone usage. When considering user characteristics with regard to technology, one of the most influential factors is the user’s age. Therefore, the sample (N = 1923) was analyzed with regard to four different technology generations. Results show that there are significant differences in device usage between the activities under study and between the four analyzed technology generations.

28 citations


Journal ArticleDOI
TL;DR: This brief investigates the performance of an automated robotic system, which uses a combination of vision and force sensing to remove screws from the back of laptops, as well as a sensor-equipped (SE) screwdriver.
Abstract: This brief investigates the performance of an automated robotic system, which uses a combination of vision and force sensing to remove screws from the back of laptops. This robotic system uses two webcams, one that is fixed over the robot and the other mounted on the robot, as well as a sensor-equipped (SE) screwdriver. Experimental studies were conducted to test the performance of the SE screwdriver and vision system. The parameters that were varied included the internal brightness settings on the webcams, the method in which the workspace was illuminated, and color of the laptop case. A localized light source and higher brightness setting as the laptop’s case became darker produced the best results. In this brief, the SE screwdriver was able to successfully remove 96.5% of the screws. Note to Practitioners —The amount of discarded electronic waste (e-waste) is increasing rapidly, yet efficient, nondestructive, automated methods to handle the waste have not been developed. Many e-waste products such as laptops use fasteners that need to be removed. In this brief, we focus on removing screws from laptops in a nondestructive manner in order to not damage the laptop, so its parts can be recycled. Due to the vast amounts of laptop models, it is necessary to create a method that will automatically recognize the locations of these fasteners. This brief presents a prototype robotic system that integrates force and vision sensing to automatically locate and remove screws from various models of laptops. The methodology presented in this brief is applicable to other e-waste products with a casing attached by screws. A current limitation of this brief is the robotic system that has to investigate all potential hole locations found by the vision system, although some of these locations may not correspond to valid screw locations. This brief can be extended to include a memory feature that will remember the locations of the screws for cases with similar laptops that are handled by the system to improve the processing time.

26 citations


Proceedings ArticleDOI
01 Feb 2018
TL;DR: The proposed IoTSHS, which can provide the remote control to smart home through mobile, infrared(IR) remote control as well as with PC/Laptop, was designed, programmed, fabricated and tested with excellent results.
Abstract: This paper basically deals with design of an IoT Smart Home System (IoTSHS) which can provide the remote control to smart home through mobile, infrared(IR) remote control as well as with PC/Laptop. The controller used to design the IoTSHS is WiFi based microcontroller. Temperature sensor is provided to indicate the room temperature and tell the user if it's needed to turn the AC ON or OFF. The designed IoTSHS need to be interfaced through switches or relays with the items under control through the power distribution box. When a signal is sent from IoTSHS, then the switches will connect or disconnect the item under control. The designed IoT smart home system can also provide remote controlling for the people who cannot use smart phone to control their appliances Thus, the designed IoTSHS can benefits the whole parts in the society by providing advanced remote controlling for the smart home. The designed IoTSHS is controlled through remote control which uses IR and WiFi. The IoTSHS is capable to connect to WiFi and have a web browser regardless to what kind of operating system it uses, to control the appliances. No application program is needed to purchase, download, or install. In WiFi controlling, the IoTSHS will give a secured Access Point (AP) with a particular service set identifier (SSID). The user will connect the device (e.g. mobile-phone or Laptop/PC) to this SSID with providing the password and then will open the browser and go to particular fixed link. This link will open an HTML web page which will allow the user to interface between the Mobile-Phone/Laptop/PC and the appliances. In addition, the IoTSHS may connect to the home router so that the user can control the appliances with keeping connection with home router. The proposed IoTSHS was designed, programmed, fabricated and tested with excellent results.

24 citations


Journal ArticleDOI
01 Jan 2018
TL;DR: This inaugural tech review is about such a student response system (SRS), namely Mentimeter, which is easy to use and may make your lectures more interactive and interesting.
Abstract: Student response systems have been around for decades. This inaugural tech review is about such a student response system (SRS), namely Mentimeter. Why should you be interested in Mentimeter? It is freemium (i.e. free and premium versions are available); no extra hardware (apart from the standard laptop, projector and students’ own digital devices are needed); it is easy to use and it may make your lectures more interactive and interesting.

20 citations


Proceedings ArticleDOI
27 Apr 2018
TL;DR: The feasibility of the proposed gateway using a prototype and its performance by command execution time are proved and the limitations of the Z-Wave protocol are discussed based on the experience.
Abstract: Z-Wave is one of the most popular wireless protocols for home area networks. However, there have been few studies about this protocol in recent years. Unlike Wi-Fi, Z-Wave is not an IP-compatible protocol, thus a Z-Wave device cannot directly connect to the Internet or common user devices (e.g., smartphone, laptop). The Z-Wave network uses a controller to manage and control all devices. The controller also acts as a gateway and allows a user to interact with Z-Wave devices from smartphone or laptop via the Internet or a local network. In this paper, we designed and implemented a Z-Wave gateway controller for a smart home system. We proved the feasibility of the proposed gateway using a prototype and evaluated its performance by command execution time. We also discussed the limitations of the Z-Wave protocol based on our experience.

18 citations


Journal ArticleDOI
TL;DR: An ICT approach through multimedia-based digital storybook design with an EPUB reflowable format that can be accessed using various electronic devices, whether desktop, laptop, or mobile is proposed.
Abstract: Storytelling is one of the suitable approaches to deliver the right information and build the character education of young children. The story content presented by utilizing multimedia elements is able to offer more attractive and increase interest for children. This paper proposes an ICT approach through multimedia-based digital storybook design with an EPUB reflowable format that can be accessed using various electronic devices, whether desktop, laptop, or mobile. The research subjects are limited to 4-5-year-old preschool children. The research reveals that children were very enthusiastic about storybooks, with or without supports from teachers

14 citations


01 Dec 2018
TL;DR: Somewhere in a school near you some teacher is struggling to handle a query from a student whose laptop has a flat battery, or another who is watching an amusing cat video on a phone.
Abstract: Somewhere in a school near you some teacher is struggling to handle a query from a student whose laptop has a flat battery, or another who is watching an amusing cat video on a phone. Perhaps the wireless internet connection is dropping in and out, or the electronic whiteboard is playing up.

10 citations


Journal ArticleDOI
TL;DR: The seismo-live project as mentioned in this paper provides a growing library with dozens of Jupyter notebooks for training in seismology, including data processing, computational seismology and earthquake physics, as well as reproducible papers and graphics.
Abstract: Efficient computer programming is becoming a central requirement in quantitative Earth science education. This applies not only to the early career stage but-due to the rapid evolution of programming paradigms-also throughout professional life. At universities, workshops, or any software training events, efficient practical programming exercises are hampered by the heterogeneity of hardware and software setups of participants. Jupyter notebooks offer an attractive solution by providing a platform-independent concept and allowing the combination of text-editing, program execution, and plotting. Here, we document a growing library with dozens of Jupyter notebooks for training in seismology. The library is made "live" through a server that allows accessing and running the notebooks in the browser on any system (PC, laptop, tablet, smartphone), provided there is internet access. The library seismo-live contains notebooks on many aspects of seismology, including data processing, computational seismology, and earthquake physics, as well as reproducible papers and graphics. It is a community effort and is intended to benefit from continuous interaction with seismologists around the world.

10 citations


Proceedings ArticleDOI
07 Mar 2018
TL;DR: This research will provides information and recommendation for the industries to be considered that there are some others crucial aspects regarding user preferences and user behavioral tendencies, rather than just technical aspect as they develop their products and massproduce it, in order to be accepted by end users.
Abstract: This research is based on the belief that “the Asian people prefer more colorful interfaces with images rather than plain interfaces” (Tzvetanova, 2007) [2]. The previous research conducted by Tzvetanova was about interface, the question is what if it’s a three dimensional form of daily use product? Will the same preferences and tendencies happen when it comes about daily use product such as laptop? There are evidences that people add stickers on their laptop, which brings up question like “what kind of users and what drives them do such activity toward their laptop?” To add/put stickers on the laptop makes it looks more literally colorful, and it also makes the laptop feels more personal. Using simple Psychographic method compared with Emotional design [1] approach, the authors made description about users who did put stickers on their laptop and dug out about what drives them did such activity. In turn this research will provides information and recommendation for the industries to be considered that there are some others crucial aspects regarding user preferences and user behavioral tendencies, rather than just technical aspect as they develop their products and massproduce it, in order to be accepted by end users.

Journal ArticleDOI
28 Feb 2018
TL;DR: SAW method and WP showed the same results that the most favored type of laptop laptop mode DEL INSPIRON 15Z-5523 with a value preference for SAW method amounted to 0.9518 while the WPmethod amounted to0.9511.
Abstract: Laptops have become an important requirement for most students is to support educational activities and business activities. The number of brands of laptops or types of laptops that exist makes consumers especially students have their own preferences in choosing a laptop. The method can be used to select the favorite laptop are SAW (Simple Additive weighting) and WP (Weighted Product). Both of these methods are the methods used to solve the problem of MADM (Multi Attribute Decision Making). There are 30 types of laptops that will be used in the selection of the favorite laptops.For the selection criteria for the type of laptop that is priced, RAM (Random Access Memory), HDD (hard drive), a processor, a VGA (Video Graphics Array), weight, color, screen size, service centers, warranty, availability of spare parts, battery capacity, equipped with OS and application software. Selection of the favorite type of laptop is done with the help of MATLAB (Graphical User Interface) GUI (Matrix Laboratory) as a computing tool. SAW method and WP, in this research showed the same results that the most favored type of laptop laptop mode DEL INSPIRON 15Z-5523 with a value preference for SAW method amounted to 0.9518 while the WP method amounted to 0.9511. Keywords: SAW, WP, Laptop, favorite, GUI

Book ChapterDOI
01 Jan 2018
TL;DR: This chapter presents the comparative analysis of the various tools and applications in terms of energy-efficiency and how much energy is consumed by an ordinary citizen on typical things of everyday use on the web.
Abstract: This chapter presents the comparative analysis of the various tools and applications in terms of energy-efficiency. Due to increasing demand of Green technology it is very challenging to minimize the energy consumption of software and hardware components. In addition, the use of applications or software on our computers consumes energy and it also affects the energy drain of several hardware components and system resources. Consequently, running web browsers, media players, file transfer protocols, wired and wireless security protocol applications will utilize the considerable amount of energy. In this remarkable research, we have run different types of experiments which contain the use of several measuring tools. Firstly, joulemeter and powertop (pTop) are used to monitor and calculate the energy drain of hardware and software while running web-based and stand-alone applications with Windows 7 and Linux (i.e. Ubuntu 16.04) operating systems on desktop and laptop computers. Secondly, it is presented that how much energy is consumed by an ordinary citizen on typical things of everyday use on the web.

Proceedings ArticleDOI
01 Dec 2018
TL;DR: A virtual writing tablet system, VPad, for traditional laptops without touch screens that leverages two speakers and one microphone for trajectory tracking without additional hardware and employs acoustic signals to accurately track hand movements and recognize characters user writes in the air.
Abstract: Human-computer interaction based on touch screens plays an increasing role in our daily lives. Besides smartphones and tablets, laptops are the most popular mobile devices used in both work and leisure. To satisfy requirements of many emerging applications, it becomes desirable to equip both writing and drawing functions directly on laptop screens. In this paper, we design a virtual writing tablet system, VPad, for traditional laptops without touch screens. VPad leverages two speakers and one microphone, which are available in most commodity laptops, for trajectory tracking without additional hardware. It employs acoustic signals to accurately track hand movements and recognize characters user writes in the air. Specifically, VPad emits inaudible acoustic signals from two speakers in a laptop. Then VPad applies Sliding-window Overlap Fourier Transformation technique to find Doppler frequency shift with higher resolution and accuracy in real time. Furthermore, we analyze frequency shifts and energy features of acoustic signals received by the microphone to track the trajectory of hand movements. Finally, we employ a stroke direction sequence model based on possibility estimation to recognize characters users write in the air. Our experimental results show that VPad achieves the average trajectory tracking error of only 1.55cm and the character recognition accuracy of above 90% merely through two speakers and one microphone on a laptop,

Proceedings ArticleDOI
01 Feb 2018
TL;DR: A unique approach for Keyboard Invariant Biometric Authentication System is presented, which models the biometric data for one type of keyboard using the data from another type of Keyboard (laptop) in heterogeneous environment.
Abstract: Biometric authentication over internet is challenging due to the requirement of additional hardware devices to capture the required biometric data. Keystroke dynamics based approaches may be a good choice for numerous internet applications. However, keystroke data varies significantly across different types of keyboards for a given user (within user variability) which lowers the authentication accuracy, it becomes challenging to use keystroke dynamics in internet applications for authentication. In this paper, we present a unique approach for Keyboard Invariant Biometric Authentication System, which models the biometric data for one type of keyboard using the data from another type of keyboard (laptop). The experimental setup involves a desktop and a laptop computer in heterogeneous environment. Total 98 subjects have been participated in this research. We have compared the flight time of different users using desktop and laptop with the help of key pair. Regression technique is used to map the data for the two types of keyboard.

Journal ArticleDOI
TL;DR: This work compares two Apple MacBook computers with two virtual hosted desktops, and finds that benchmarks do not necessarily provide the best indication of performance, and virtual hosted Desktops can provide a better user experience, even with lower performing graphics cards.

Journal ArticleDOI
TL;DR: In this paper, the authors describe laptop usage among children in the context of the One Laptop per Child (OLPC) project 4 years after the laptops were first introduced in a community in Madagascar.
Abstract: Information and communication technology (ICT) use among children in low-income countries remains understudied. The purpose of this study is to describe laptop usage among children in the context of the One Laptop per Child (OLPC) project 4 years after the laptops were first introduced in a community in Madagascar. The study was conducted using a mixed-method approach combining analysis of ICT use history, empirical observations, and interviews with children and parents. In class, activities involving laptops—including educational games, information research, and the creation of texts and storyboards—were found to be aligned with existing classroom activities. Outside school, computers were found to be used in individual, group, or family settings to listen to music and watch videos, play games, share content, and do homework. The study also found that computers play a major role in everyday routines, opening up new possibilities in photography and video-making. The findings also indicate that com...

Proceedings ArticleDOI
01 Apr 2018
TL;DR: A low cost intelligent system for monitoring, control, safety and security of industries, which includes a password based door lock with facial recognition based authentication log and a CNN algorithm to recognize faces of employee and update their entry/exit details into a database.
Abstract: This paper proposes a low cost intelligent system for monitoring, control, safety and security of industries. The monitoring system incorporate sensors like temperature, gas, ultrasonic, current and voltage, which screen parameters continuously and send data to a remote server using a ZigBee module for real time inspection. The monitored data log is stored in spreadsheet and can be updated to a cloud. The system has also utilized Red Tacton, a NFC based device which uses human touch to capture data and viewing can be done using a wearable or laptop. When abnormal readings are received, suitable actions and alerts are triggered by the server. This system can also control the appliances from a remote server laptop/computer. The security framework includes a password based door lock with facial recognition based authentication log. Door can be opened/closed using a passkey or through a mobile/web application. Facial recognition system uses CNN algorithm to recognize faces of employee and update their entry/exit details into a database. If an intruder tries to break in, an email alert is sent to the respective officials for action.

Journal ArticleDOI
TL;DR: The Online Dynamical Systems and Control web application has been developed for the introductory dynamics and control courses taught to engineers and business engineering of Ghent university and is designed to be responsive, working equally well on both mobile phone as on a laptop or PC.

Journal ArticleDOI
TL;DR: In this article, the authors present the results of a project conducted to identify the perceptions of students and faculty about ways in which the laptop use affects the learning environment at the Petroleum Institute, Abu Dhabi for two courses: Strategies for Team Based Engineering Problem Solving and Communication.
Abstract: Today’s digital natives enthuse educators to consider the impact of technology on learning and plan proper instruction, involving the use of laptop along with other technologies. However, implementing laptop use in classrooms without adequate support from administration, IT and faculty can have limited benefits. This article presents the results of a project conducted to identify the perceptions of students and faculty about ways in which the laptop use affects the learning environment at the Petroleum Institute, Abu Dhabi for two courses: Strategies for Team Based Engineering Problem Solving and Communication. Sixty-four freshman students, six instructors and two IT members were involved in the project. Quantitative and qualitative data were collected from students and faculty using a student survey, weekly electronic faculty-feedback logs, and electronic student journals . Data revealed that the use of laptops in the classrooms enhanced the feedback process on team-assignments in particular. Instructors felt that integration of laptops facilitated syllabus delivery and classroom management. Results also indicated challenges related to technical issues such as battery-life and Wi-Fi interference. It was further found that initial student and faculty training is essential for the project to have greater success. Results are discussed and recommendations are made for effective integration of the laptop in active learning environments.

Patent
20 Sep 2018
TL;DR: In this article, the authors present a hybridized user interface model where different interaction methods work together in concert to make public conference calling devices much easier to use. The interaction on the device consists of voice UI together with physical capacitive touch interaction (variable function based on context), as well as remote control from any personal computing device, i.e. mobile phone, tablet, laptop computer.
Abstract: The present technology is a hybridized user interface model where different interaction methods work together in concert to make public conference calling devices much easier to use. The interaction on the device consists of voice UI together with physical capacitive touch interaction (variable function based on context), as well as remote control from any personal computing device, i.e. mobile phone, tablet, laptop computer, etc.

Proceedings ArticleDOI
Maria Husmann1, Alfonso Murolo1, Nicolas Kick1, Linda Di Geronimo1, Moira C. Norrie1 
03 Sep 2018
TL;DR: An IDE that makes use of additional personal devices, such as a phone or a tablet, and parts of the IDE can be offloaded to these mobile devices, for example the application that is being developed, a debugging console or navigational elements.
Abstract: Software developers typically use multiple large screens in their office setup. However, they often work away from the office where such a setup is not available, instead only working with a laptop computer and drastically reduced screen real estate. We explore how developers can be better supported in ad-hoc scenarios, for example when they work in a cafe, an airport, or at a client's site. We present insights into current work practices and challenges when working away from the usual office desk sourced from a survey of professional software developers. Based on these insights, we introduce an IDE that makes use of additional personal devices, such as a phone or a tablet. Parts of the IDE can be offloaded to these mobile devices, for example the application that is being developed, a debugging console or navigational elements. A qualitative evaluation with professional software developers showed that they appreciate the increased screen real estate.

Proceedings ArticleDOI
15 Oct 2018
TL;DR: This video has constructed Meet AR-bot, which helps users to keep meeting going smoothly, based on the projection of Augmented Reality(AR), which can easily provide meeting room environment through the movable setting via wheel-based stand.
Abstract: Many kinds of preparations are needed when meeting. For example, projector, laptop, cables and ETC. As such, this video have constructed Meet AR-bot, which helps users to keep meeting going smoothly, based on the projection of Augmented Reality(AR). Our system can easily provide meeting room environment through the movable setting via wheel-based stand. Users do not need to carry a personal laptop and connect them to the projector. Robot reconstructs the 3D geometry information through pan-tilt system and compute projection areas to project information in the space. Users can also control through mobile devices. We offer presentation, table interaction, file sharing and virtual object registration by mobile device.

Journal ArticleDOI
25 Dec 2018-Sensors
TL;DR: A prototype of a Mobile Device Management (MDM) module for Plan Ceibal is developed over an IoT infrastructure, and the results of a controlled experiment over a sample of the devices are shown.
Abstract: Plan Ceibal is the name coined in Uruguay for the local implementation of the One Laptop Per Child (OLPC) initiative. Plan Ceibal distributes laptops and tablets to students and teachers, and also deploys a nationwide wireless network to provide Internet access to these devices, provides video conference facilities, and develops educational applications. Given the scale of the program, management in general, and specifically device management, is a very challenging task. Device maintenance and replacement is a particularly important process; users trigger such kind of replacement processes and usually imply several days without the device. Early detection of fault conditions in the most stressed hardware parts (e.g., batteries) would permit to prompt defensive replacement, contributing to reduce downtime, and improving the user experience. Seeking for better, preventive and scalable device management, in this paper we present a prototype of a Mobile Device Management (MDM) module for Plan Ceibal, developed over an IoT infrastructure, showing the results of a controlled experiment over a sample of the devices. The prototype is deployed over a public IoT infrastructure to speed up the development process, avoiding, in this phase, the need for local infrastructure and maintenance, while enforcing scalability and security requirements. The presented data analysis was implemented off-line and represents a sample of possible metrics which could be used to implement preventive management in a real deployment.

Proceedings ArticleDOI
01 Aug 2018
TL;DR: There is no difference between the solutions given to the table design in terms of consumer expectation between the cause and effect chain analysis (CECA) and engineering contradiction and the validation of the success of the solution was determined by using a homogeneity test.
Abstract: Students are among the most common users of laptop devices. With the variety of activities done by students using their laptops, many issues are faced because the physical interaction between user and laptop is not well designed. This research aims to produce a laptop desk design for students. The study was conducted with 30 undergraduate and postgraduate student subjects in an integrated campus environment of Universitas Islam Indonesia. Based on the results of questionnaires given to the subjects, six main problems of the laptop desks were identified: storage, lack of additional functions, lack of laptop mats, complaints while typing or using laptops, and complaints of neck pain. An analysis was done to find a solution using the TRIZ method. The TRIZ analysis tools used were cause and effect chain analysis (CECA) and engineering contradiction. The validation of the success of the solution was determined by using a homogeneity test with P > 0.05. This shows that there is no difference between the solutions given to the table design in terms of consumer expectation.

Journal Article
TL;DR: The system has been adequately developed, where the design and suitable components were considered in order to make it able to carry a laptop which acts as the communicator with the suitable sensor that will scan the surroundings and a host personal computer (PC).
Abstract: Scanning an indoor environment has become a necessity in the various field of applications in Architecture, Engineering, Construction (AEC) area. However, most of the available scanning systems are stationary, hence making the process of data collection more difficult, especially when dealing with the larger indoor area. Therefore, a mobile scanning system is developed here to handle the above issue. This paper will highlight the process of designing and developing the system. It has been adequately developed, where the design and suitable components were considered in order to make it able to carry a laptop which acts as the communicator with the suitable sensor that will scan the surroundings and a host personal computer (PC). Kinect sensor is used due to its advantages regarding workability and cost. The system is also equipped with an Android-based controller, connected to the platform via Bluetooth, which can be used to manoeuvre the mobile scanner using either auditory/voice or an arrow pad. Based on several experiments and testing conducted, the system can scan and display its surroundings in the 2D image and depth data. These are important in developing a suitable model representing the scanning area in the future. Both auditory and arrow pad controller is also working, where, by utilising an Android-based platform as the controller, the system is having the advantages of more freedom and beneficial compared to the existing mobile system without a similar controller.

Proceedings ArticleDOI
01 Jul 2018
TL;DR: The aim is not only space saving of the mobile office, but also the attempt based on the idea of "design, which cannot be copied", that implement the analog tool or operability into the digital device or environment.
Abstract: Computer mouse have become necessary devices to use computers. There are many people who use external mice as the interfaces even today when it is common to carry laptop computers. It means that "Analog operability", to move a Mouse with hands, is suitable for a human being. However, today, a small laptop has various functions. In addition, the data is stored in the cloud service. From those reasons, to carry an external device is not suitable to today's lifestyle. Thereupon, we propose an application to turn smartphones as external mice. The goal is not the concept of IoT (Internet of Things), which suggests that various things should be connected to the Internet and be digitalized, but the concept that implement the analog tool or operability into the digital device or environment. Digital tools or environments have serious problems that those are stolen or copied easily. If the appearance or the operability is fundamentally unique, the similarity is quite obvious, and possibilities of being copied are low. Our aim is not only space saving of the mobile office, but also the attempt based on the idea of "design, which cannot be copied".


Journal ArticleDOI
TL;DR: This paper is to provide an inclusive expansion in the recently existing applications based on the eye-gaze estimation systems by considering different applications; driver assistance systems, Smartphone as an input mechanism, controlling smart homes/TV, virtual space and entertainment, medicine, human robot interaction, sports, security, and authentication.
Abstract: Eye-gaze is the mirror of speech, the language of nonverbal communication. The research investigations in eye-gaze estimation systems may reveal what persons think about on the basis of where they are looking. Nowadays, the eye-gaze estimation systems represent a combination of appropriate hardware and related software for estimating the eye-gaze directions to provide new domains of applications. The purpose of this paper is to provide an inclusive expansion in the recently existing applications based on the eye-gaze estimation systems by considering different applications; driver assistance systems, Smartphone as an input mechanism, controlling smart homes/TV, virtual space and entertainment, medicine, human robot interaction, sports, security, and authentication. Additionally, an implementation of an accurate, reliable and a low cost eye-gaze estimation approach based on Laptop Webcam is presented. This paper contains the main preliminaries, up-to-date advantages, and disadvantages, in addition to the necessity of future expansion in the domain.

Patent
25 Oct 2018
TL;DR: In this article, Li et al. proposed a protocol for the transfer of battery status information to an information handling system such as a laptop computer through the same cable as the power.
Abstract: Battery status information may be provided to an information handling system, such as a laptop computer, through the same cable as the power. The transfer of battery status information may be facilitated by a power delivery (PD) controller in the external battery that communicates with a power delivery (PD) controller in the laptop computer. One cable type that can support the transfer of battery status information is a Universal Serial Bus (USB) Type-C cable. Battery status information may be transferred as packetized data according to a vendor-defined messaging (VDM) protocol from the external battery to the laptop computer. An embedded controller within the laptop computer may decode the packets and report the battery status information to components within the laptop computer. The battery status may be accessed through application programming interfaces (APIs) by third-party applications or displayed through the operating system.