Journal articles on the topic 'AT commands'

To see the other types of publications on this topic, follow the link: AT commands.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'AT commands.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Balzano, Gerald J. "Command performances, performance commands." Contemporary Music Review 4, no. 1 (January 1989): 437–46. http://dx.doi.org/10.1080/07494468900640471.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wang, Zi Ming, Dong Li, Han Li Wang, and Jing Li. "Command Pattern Classification Model Based on Experimental Data Mining." Applied Mechanics and Materials 543-547 (March 2014): 2377–80. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.2377.

Full text
Abstract:
This paper builds sample analysis data sets through the analysis of specific commands behavior in command behavior experiment, and selects typical commanders as reference sample, proposes a command pattern classification model based on k-means clustering algorithms. The command model calculation is simple, easy for computer implementation, and is of great significance in understanding and mastering specific commanders characteristics, and application to practical operations and training.
APA, Harvard, Vancouver, ISO, and other styles
3

Kusumadewi, Luh Kade Diana, Luh Diah Surya Adnyani, and Ni Putu Astiti Pratiwi. "Effective Commands to Overcome Students with Disruptive Behavior in the Classroom." ENGLISH FRANCA : Academic Journal of English Language and Education 4, no. 2 (November 13, 2020): 181. http://dx.doi.org/10.29240/ef.v4i2.1822.

Full text
Abstract:
This study was conducted which aimed at investigating effective commands used by teachers in TK Aura Sukma Insani to overcome disruptive behaviors by identifying: 1) the types of disruptive behavior done by students, 2) the types of command used by the teachers, and 3) the commands which are effective based on students’ responses. Teachers and students from A2, A1, and toddler class were the subject of the study while disruptive behaviors done by the students and commands used by the teacher were the object of the study. All the data were gathered through observation, questionnaire, and interview. The result revealed that there were 145 disruptive behaviors found and seven type of commands used by the teachers including question command, regular command, indirect command, don’t command, stop command, negative command and other command. Moreover, most of the commands given were effective based on the effects on students’ behavior. From the result, it could be concluded that regular command and other command were the most effective types of command used by teachers to overcome disruptive behaviors because the commands related were clear, understandable, and simple. Therefore, the student were easy to understand what the teachers intended.
APA, Harvard, Vancouver, ISO, and other styles
4

Schultz-Bergin, Marcus. "The Authority Dilemma." Hobbes Studies 29, no. 2 (October 25, 2016): 148–67. http://dx.doi.org/10.1163/18750257-02902003.

Full text
Abstract:
Thomas Hobbes’s attempt to resolve the problem of commanded blasphemy in Leviathan results in a dilemma for his theory. According to what I call the Authority Dilemma, Hobbes is simultaneously committed to subjects being the authors of all that the sovereign does and commands as well as to the sovereign being the sole author of commanded blasphemy, meaning the subjects are not the authors of that command. I review a variety of ways Hobbes and various commentators have attempted to resolve this tension, but ultimately suggest that the tension persists. I spell out the implications of both horns of the authority dilemma: if subjects authorize all actions and commands, then the possibility of commanded blasphemy risks the stability of the commonwealth; if subjects do not authorize all actions and commands, then the commonwealth is not properly unified and thus cannot be stable. Thus, either way, Hobbes fails to establish how individuals can form a stable commonwealth. I conclude with a Hobbesian inspired solution that accepts that subjects authorize all actions and commands, including blasphemy. However, I leverage two recent lines of scholarship – one regarding the inalienable right of self-preservation and the other regarding the fear of eternal damnation – to provide a means for disobedience without the risk of instability.
APA, Harvard, Vancouver, ISO, and other styles
5

Rahimi, Simin. "Divine Command Theory in the Passage of History." Forum Philosophicum 14, no. 2 (November 1, 2009): 307–28. http://dx.doi.org/10.35765/forphil.2009.1402.23.

Full text
Abstract:
Are actions that are morally good, morally goosd because God makes them so (e.g., by commanding them)? Or does God urge humans to do them because they are morally good anyway? What is, in general, the relationship between divine commands and ethical duties? It is not an uncommon belief among theists that morality depends entirely on the will or commands of God: all moral facts consist exclusively in facts about his will or commands. Thus, not only is an action right because it is commanded by God, but its conformity to his commands is what alone makes it right. An action is right (wrong) solely because he commands (forbids) it, and solely in virtue of his doing so. This view has come to be known as the „divine command theory of morality". This paper is devoted to a brief reconstruction of claims and controversies surrounding the theory, beginning with Plato's Euthyphro, which is the historical initiator of the debate and to a reconstruction of the various lines of argument that have been set forth to defend the theory.
APA, Harvard, Vancouver, ISO, and other styles
6

Lorang, Emily K., and Audra Sterling. "Parent Command Use and Child Compliance During Parent–Child Interactions Including Children With Down Syndrome." American Journal of Speech-Language Pathology 30, no. 3 (May 18, 2021): 1203–9. http://dx.doi.org/10.1044/2021_ajslp-20-00251.

Full text
Abstract:
Purpose This study investigated maternal and paternal command use and child compliance in children with Down syndrome during mother–child and father–child free-play interactions. We also examined child compliance to direct versus indirect commands, and the relationships between maternal command use, paternal command use, child compliance, and child speech and language abilities. Method Fifteen families including a mother, father, and child with Down syndrome participated. Mother–child and father–child dyads participated in free-play interactions. We coded overall parent command use, command type (direct or indirect), and child compliance with the commands. Child language abilities were measured using a standardized assessment as well as during free-play. Results Mothers and fathers of children with Down syndrome used a similar number of commands, and children complied similarly across interactions. Children were more likely to comply with direct versus indirect commands. Parent command use was related to child language abilities in different ways for mothers and fathers. Child compliance was not related to receptive or expressive language abilities. Conclusions Mothers and fathers of children with Down syndrome use commands in similar ways but may base their command use on different child factors. Using direct commands with children with Down syndrome may be beneficial when increasing compliance during early interactions.
APA, Harvard, Vancouver, ISO, and other styles
7

Dodds, Klaus, and Alan D. Hemmings. "The United States 2002 Unified Command Plan: Antarctica and the areas of responsibility of military commanders." Polar Record 44, no. 2 (April 2008): 173–77. http://dx.doi.org/10.1017/s0032247407007164.

Full text
Abstract:
ABSTRACTIn October 2002, following the 11 September 2001 attacks on the United States, the Unified Command Plan (UCP), that sets out the geographical responsibilities of combatant commanders, was revised with regard to their areas of responsibility. Accompanying these changes was a map, which detailed the geographical boundaries of the US Northern, Pacific, Southern, European and Central Commands. The map indicated that two of these Commands, Southern and European Command stretched as far south as the Antarctic coastline while a third (Pacific) not only did that but also included the entire Antarctic continent. In 2007, a new Africa Command comprising the southern part of European Command, was instituted and this, too, stretched to the Antarctic coastline. This note briefly considers some of the implications that might follow from these changes to the UCP and highlights logistical patterns, search and rescue matters and the question of the demilitarisation of Antarctica.
APA, Harvard, Vancouver, ISO, and other styles
8

Zhao, Cui, Zhenjiang Li, Han Ding, Wei Xi, Ge Wang, and Jizhong Zhao. "Anti-Spoofing Voice Commands." Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 5, no. 3 (September 9, 2021): 1–22. http://dx.doi.org/10.1145/3478116.

Full text
Abstract:
This paper presents an anti-spoofing design to verify whether a voice command is spoken by one live legal user, which supplements existing speech recognition systems and could enable new application potentials when many crucial voice commands need a higher-standard verification in applications. In the literature, verifying the liveness and legality of the command's speaker has been studied separately. However, to accept a voice command from a live legal user, prior solutions cannot be combined directly due to two reasons. First, previous methods have introduced various sensing channels for the liveness detection, while the safety of a sensing channel itself cannot be guaranteed. Second, a direct combination is also vulnerable when an attacker plays a recorded voice command from the legal user and mimics this user to speak the command simultaneously. In this paper, we introduce an anti-spoofing sensing channel to fulfill the design. More importantly, our design provides a generic interface to form the sensing channel, which is compatible to a variety of widely-used signals, including RFID, Wi-Fi and acoustic signals. This offers a flexibility to balance the system cost and verification requirement. We develop a prototype system with three versions by using these sensing signals. We conduct extensive experiments in six different real-world environments under a variety of settings to examine the effectiveness of our design.
APA, Harvard, Vancouver, ISO, and other styles
9

Srinivasan, Arumugam, ThangaRaj Vinoth, R. Ravinder, SamuelPriyan Mosses, and Yagnesh Kumar. "Voice Controlled Wheel Chair with Intelligent Stability." Journal of Computational and Theoretical Nanoscience 17, no. 8 (August 1, 2020): 3689–93. http://dx.doi.org/10.1166/jctn.2020.9262.

Full text
Abstract:
This paper is about a wheel chair controlled by voice command developed to help the physically challenged people. The physically challenged person as user can control the wheel chair by voice commands such as forward, reverse etc. ‘Julian’ a grammar based recognizer is used in this system. The basic commands, the short motion command and the command of verification are the three commands given to the system. Julian has successful recognition rate of 98% of commands given to it based on the studies and experiments conducted. Patients and physically challenged people are depending on others while moving on wheel chair hence they do not have freedom in motion. This voice command controlled wheel chair provides freedom of motion to patients and physically challenged to be independent on movement to the respective places. Arduino control the motor by motor driver based on the commands processed by the voice recognition module. This voice command controlled wheel chair provides motion on the patient or physically challenged people voice. Gyroscopic sensor is used to maintain the level straight of the wheel chair when the person travelling in the slope it prevents the person to feel off from the chair which is operated by servo motor.
APA, Harvard, Vancouver, ISO, and other styles
10

Anderson, Gary A. "Biblical Origins and the Problem of the Fall." Pro Ecclesia: A Journal of Catholic and Evangelical Theology 10, no. 1 (February 2001): 17–30. http://dx.doi.org/10.1177/106385120101000102.

Full text
Abstract:
Rabbi Abbahu said: Just as I led Adam into the garden of Eden and commanded him and he transgressed my commandment, whereupon I punished him by dismissal and exile … so also did I bring his descendants into the land of Israel and command them, and they transgressed my commands and I punished them by dismissal and exile ( Genesis Rabbah).
APA, Harvard, Vancouver, ISO, and other styles
11

Zhang, Jian Dong, Ming Yang Liu, Guo Qing Shi, and Wei Hua Pan. "A MIL-STD-1553B Bus Command Optimization Algorithm Based on Load Balance." Applied Mechanics and Materials 130-134 (October 2011): 3839–42. http://dx.doi.org/10.4028/www.scientific.net/amm.130-134.3839.

Full text
Abstract:
The paper, based on the MIL-STD-1553B bus communication protocol, makes the computer-aided analysis to optimize bus transmission algorithm. An optimized algorithm is proposed by rearranging the commands set by the bus controller (BC), achieving the bus load balance in a major period. Through the command sequence optimization, this algorithm could manage the commands to be transmitted and generate an optimized bus command table. Based on the algorithm, software used in the PC is development, which could manage the commands to be transmitted, and generate optimized command table for bus communication transmission. The actual application shows that this algorithm can do well in optimizing the bus command table and improve the efficiency of bus transmission.
APA, Harvard, Vancouver, ISO, and other styles
12

Zheng, Xuanci, Jie Li, Hongfei Ji, Lili Duan, Maozhen Li, Zilong Pang, Jie Zhuang, Lu Rongrong, and Gao Tianhao. "Task Transfer Learning for EEG Classification in Motor Imagery-Based BCI System." Computational and Mathematical Methods in Medicine 2020 (December 15, 2020): 1–11. http://dx.doi.org/10.1155/2020/6056383.

Full text
Abstract:
The motor-imagery brain-computer interface system (MI-BCI) has a board prospect for development. However, long calibration time and lack of enough MI commands limit its use in practice. In order to enlarge the command set, we add the combinations of traditional MI commands as new commands into the command set. We also design an algorithm based on transfer learning so as to decrease the calibration time for collecting EEG signal and training model. We create feature extractor based on data from traditional commands and transfer patterns through the data from new commands. Through the comparison of the average accuracy between our algorithm and traditional algorithms and the visualization of spatial patterns in our algorithm, we find that the accuracy of our algorithm is much higher than traditional algorithms, especially as for the low-quality datasets. Besides, the visualization of spatial patterns is meaningful. The algorithm based on transfer learning takes the advantage of the information from source data. We enlarge the command set while shortening the calibration time, which is of significant importance to the MI-BCI application.
APA, Harvard, Vancouver, ISO, and other styles
13

Zhao, Yong Tao, and Yun An Hu. "Design of the Scheme Flight Trajectory Command for the Tactical Missile." Key Engineering Materials 480-481 (June 2011): 1426–31. http://dx.doi.org/10.4028/www.scientific.net/kem.480-481.1426.

Full text
Abstract:
For the case of the scheme trajectory command design for the tactical missile, the longitudinal and lateral commands and the compound controller of the attitude and height were designed. In the launch segment, four kinds of heading angle commands were presented adopting the arc method and reduction law. In the variable height flight segment, two kinds of height commands were gained by using the parabolic and exponential function. Considering the earth curvature, the formula of the great circle course and distance was gotten applying spherical triangle solution method, and the flight command along the route dot in the lateral plane was obtained. The simulation results show that the designed scheme trajectory commands are feasible and effectively.
APA, Harvard, Vancouver, ISO, and other styles
14

Nguyen, Quang H., and Tuan-Dung Cao. "A Novel Method for Recognizing Vietnamese Voice Commands on Smartphones with Support Vector Machine and Convolutional Neural Networks." Wireless Communications and Mobile Computing 2020 (March 1, 2020): 1–9. http://dx.doi.org/10.1155/2020/2312908.

Full text
Abstract:
This paper will present a new method of identifying Vietnamese voice commands using Google speech recognition (GSR) service results. The problem is that the percentage of correct identifications of Vietnamese voice commands in the Google system is not high. We propose a supervised machine-learning approach to address cases in which Google incorrectly identifies voice commands. First, we build a voice command dataset that includes hypotheses of GSR for each corresponding voice command. Next, we propose a correction system using support vector machine (SVM) and convolutional neural network (CNN) models. The results show that the correction system reduces errors in recognizing Vietnamese voice commands from 35.06% to 7.08% using the SVM model and 5.15% using the CNN model.
APA, Harvard, Vancouver, ISO, and other styles
15

Rooney, Paul. "Divine Commands and Arbitrariness." Religious Studies 31, no. 2 (June 1995): 149–65. http://dx.doi.org/10.1017/s0034412500023465.

Full text
Abstract:
According to the divine command theory of morality, what is right or wrong, good or bad, is entirely dependent on the will and command of God: what He commands is right and what He forbids is wrong just because He commands or forbids it. It is argued here that the principal religious objection to this theory – that if it were true, moral precepts would be arbitrary – is rendered ineffective when due consideration is given to the consequences of God's omnipotence, and in particular, to His rationality and to His responsibility for deciding, in creation, what the characteristics of human nature are to be.
APA, Harvard, Vancouver, ISO, and other styles
16

Tanaya, Prianggada Indra. "Preliminary Development of Subsumption Architecture Control for Automated Guided Vehicle." ROTASI 21, no. 4 (October 23, 2019): 200. http://dx.doi.org/10.14710/rotasi.21.4.200-208.

Full text
Abstract:
Subsumption control architecture is an control architecture based on parallel system. Input of information of sensors is directly connected through modules in the control system, and further the decision making is connected to actuators. Automated Guided Vehicle or AGV is an automated component within integrated manufacturing system. In this article, this control architecture will be designed and implemented to an AGV. Commands are designed based on Object-Oriented technology. The commands are arranged in subsumption, where a command higher subsumed other command of its lower level. GPFO (Greater Priority First Out) technique is implemed for executing the commands by using multi-threading. Experimentation is performed to have the characteristics of commands being executed. This work introduce our effort to design an operating system for an AGV.
APA, Harvard, Vancouver, ISO, and other styles
17

Xiong, Yinqiao, Ziyu Yang, Baoyao Wang, Peng Xun, and Tiantian Deng. "False Sequential Command Attack of Large-Scale Cyber-Physical Systems." Electronics 7, no. 9 (September 4, 2018): 176. http://dx.doi.org/10.3390/electronics7090176.

Full text
Abstract:
Previous studies have demonstrated that false commands can cause severe damage to large-scale cyber-physical systems (CPSs). We focus on a kind of threat called false sequential command attack, with which attackers can generate false sequential commands, resulting in the illegal control of the physical process. We present a feasible attack model. Attackers delay the disaggregation of former commands by manipulating maliciously sub-controllers. Simultaneously, bad feedback data is injected to defeat the controller to issue latter commands. Thus, false command sequence is executed and the disruption of physical process can be obtained. It is also difficult for the detector to identify such attacks as injecting bad data. We also discuss other possible attack paths and analyze the corresponding disadvantages. Compared with other paths, the proposed model is more feasible and has more difficulties to be detected. A case study is given to validate the feasibility and effectiveness of proposed false sequential command attack model. Finally, we discuss the possible countermeasure.
APA, Harvard, Vancouver, ISO, and other styles
18

Topoleanu, Tudor, Gheorghe Leonte Mogan, and Cristian Postelnicu. "On Semantic Graph Language Processing for Mobile Robot Voice Interaction." Applied Mechanics and Materials 162 (March 2012): 286–93. http://dx.doi.org/10.4028/www.scientific.net/amm.162.286.

Full text
Abstract:
This paper describes a simple semantic graph based model for processing natural language commands issued to a mobile robot. The proposed model is intended for translating natural language commands given by naïve users into an action or sequence of actions that the robot can execute via its available functionality, in order to complete the commands. This approach to language processing is easily extensible through automated learning, it also is simpler and more scalable than hard-coded command to action mapping, while also being flexible and covering any number of command formulations that could be generated by a user.
APA, Harvard, Vancouver, ISO, and other styles
19

Klein, Daniel. "Extensions to the label commands." Stata Journal: Promoting communications on statistics and Stata 19, no. 4 (December 2019): 867–82. http://dx.doi.org/10.1177/1536867x19893630.

Full text
Abstract:
Data management tasks include manipulating variables, variable labels, and value labels. While Stata has versatile commands and functions to address the first task, managing variable and value labels is not as convenient. In this article, I introduce a new command, elabel, that enhances the capabilities of Stata’s label commands. I discuss these enhancements using various examples. I also demonstrate how to add new commands to elabel.
APA, Harvard, Vancouver, ISO, and other styles
20

Wang, Zhiqiang. "Two Postestimation Commands for Assessing Confounding Effects in Epidemiological Studies." Stata Journal: Promoting communications on statistics and Stata 7, no. 2 (June 2007): 183–96. http://dx.doi.org/10.1177/1536867x0700700203.

Full text
Abstract:
Confounding is a major issue in observational epidemiological studies. This paper describes two postestimation commands for assessing confounding effects. One command (confall) displays and plots all possible effect estimates against one of p-value, Akaike information criterion, or Bayesian information criterion. This computing-intensive procedure allows researchers to inspect the variability of the effect estimates from various possible models. Another command (chest) uses a stepwise approach to identify variables that have substantially changed the effect estimate. Both commands can be used after most common estimation commands in epidemiological studies, such as logistic regression, conditional logistic regression, Poisson regression, linear regression, and Cox proportional hazards models.
APA, Harvard, Vancouver, ISO, and other styles
21

Ji, Ran, Jian Wang, Chaojing Tang, and Ruilin Li. "Automatic Reverse Engineering of Private Flight Control Protocols of UAVs." Security and Communication Networks 2017 (2017): 1–9. http://dx.doi.org/10.1155/2017/1308045.

Full text
Abstract:
The increasing use of civil unmanned aerial vehicles (UAVs) has the potential to threaten public safety and privacy. Therefore, airspace administrators urgently need an effective method to regulate UAVs. Understanding the meaning and format of UAV flight control commands by automatic protocol reverse-engineering techniques is highly beneficial to UAV regulation. To improve our understanding of the meaning and format of UAV flight control commands, this paper proposes a method to automatically analyze the private flight control protocols of UAVs. First, we classify flight control commands collected from a binary network trace into clusters; then, we analyze the meaning of flight control commands by the accumulated error of each cluster; next, we extract the binary format of commands and infer field semantics in these commands; and finally, we infer the location of the check field in command and the generator polynomial matrix. The proposed approach is validated via experiments on a widely used consumer UAV.
APA, Harvard, Vancouver, ISO, and other styles
22

Faber, Paul. "The Euthyphro Objection to Divine Normative Theories: A Response." Religious Studies 21, no. 4 (December 1985): 559–72. http://dx.doi.org/10.1017/s0034412500017753.

Full text
Abstract:
The ethical theories often called divine command theories have a long philosphical history. As early as Plato's dialogue Euthyphro, persons – in this case, Euthyphro – were advocating theories that claim such things as whatever is morally obligatory is obligatory because and only because God commands it. There is a range of such theories, however, and offering one description that adequately characterizes them all is very difficult. Some theorists focus on the moral obligatoriness of actions, others on the moral virtue of traits of character, and still others on the moral goodness of states of affairs. Some theorists take God's commanding as creating the obligation (or whatever), others think God's willing an action creates the obligation. Theories concentrating on God's loving, his preferring, and perhaps other states, too, could be advanced. Paul Helm in the introduction to his anthology Divine Commands and Morality regards this sort of theory as holding’…that God does issue commands and that these commands are to form the basis of a believer's morality.…’ And Janine Marie Idziak in the introduction to her Divine Command Morality: Historical and Contemporary Readings writes, ‘Generally speaking, a ‘divine command moralist’ is one who maintains that the content of morality (i.e. what is right and wrong, good and evil, just and unjust, and the like) is directly and solely dependent upon the commands and prohibitions of God.’ Rather than spend much time attempting to develop necessary and sufficient conditions characterizing all such theories, however, let us label them all ‘divine normative theories’ and hope that the basic nature of divine normative theories is relatively clear.
APA, Harvard, Vancouver, ISO, and other styles
23

Kerssens, Chantal, Jan Klein, and Benno Bonke. "Awareness: Monitoring versus Remembering What Happened." Anesthesiology 99, no. 3 (September 1, 2003): 570–75. http://dx.doi.org/10.1097/00000542-200309000-00011.

Full text
Abstract:
Background Awareness during anesthesia is foremost assessed with postoperative interviews, which may underestimate its incidence. On-line monitors such as the Bispectral Index and patient response to verbal command are not necessarily commonly used. This study investigated response to command during deep sedation (Bispectral Index 60-70) and the ability of prevailing monitoring techniques to indicate awareness and predict recall. Methods The authors systematically assessed the response to command using the isolated forearm technique while monitoring electroencephalographic and hemodynamic variables. Fifty-six elective surgical patients were repeatedly given verbal instructions to squeeze the observer's hand during target-controlled infusion with propofol and alfentanil. After recovery, conscious recall was assessed with a short structured interview. Results Overall, 1,082 commands were given. No response was observed to 887 (82%) commands, an equivocal response was observed to 56 (5%) commands, and an unequivocal response was observed to 139 (13%) commands. Of the 37 patients (66%) with an unequivocal response to command ("awareness"), nine (25%) reported conscious recall after recovery. Their reports provided valuable insights as to how awareness may be adequately addressed. Hemodynamic variables poorly predicted awareness, whereas parameters derived from the encephalogram, especially the Bispectral Index, were highly significant predictors (P < 0.0001). Electroencephalographic parameters did not discriminate between patients with or without conscious recall, whereas heart rate and responsiveness to command did. Conclusions The incidence of awareness is underestimated when conscious recall is taken as evidence. Awareness can be monitored on-line with behavioral and modern neurophysiologic measures. Providing feedback during intra-anesthetic awareness helps patients to cope with a potentially stressful situation.
APA, Harvard, Vancouver, ISO, and other styles
24

Enlow, Eric G. "MOSAIC COMMANDS FOR LEGAL THEOLOGY." Journal of Law and Religion 32, no. 1 (March 2017): 26–32. http://dx.doi.org/10.1017/jlr.2017.3.

Full text
Abstract:
Here is a model for “legal theology,” a way of learning and teaching about God that arises in and responds to the desire to understand the significance of law: a son is moved to ask “what is the meaning” of the law followed by his father, and the father is commanded to explain by teaching about God's deliverance. There are three similar commands in Exodus (Exodus 12:26, 13:8, 13:14), linked in tradition, where sons wonder and fathers are commanded to explain how a particular law signifies God's redemption. These four commands in Exodus and Deuteronomy indicate a method for legal theology.
APA, Harvard, Vancouver, ISO, and other styles
25

Azaria, Amos, and Keren Nivasch. "SAIF: A Correction-Detection Deep-Learning Architecture for Personal Assistants." Sensors 20, no. 19 (September 29, 2020): 5577. http://dx.doi.org/10.3390/s20195577.

Full text
Abstract:
Intelligent agents that can interact with users using natural language are becoming increasingly common. Sometimes an intelligent agent may not correctly understand a user command or may not perform it properly. In such cases, the user might try a second time by giving the agent another, slightly different command. Giving an agent the ability to detect such user corrections might help it fix its own mistakes and avoid making them in the future. In this work, we consider the problem of automatically detecting user corrections using deep learning. We develop a multimodal architecture called SAIF, which detects such user corrections, taking as inputs the user’s voice commands as well as their transcripts. Voice inputs allow SAIF to take advantage of sound cues, such as tone, speed, and word emphasis. In addition to sound cues, our model uses transcripts to determine whether a command is a correction to the previous command. Our model also obtains internal input from the agent, indicating whether the previous command was executed successfully or not. Finally, we release a unique dataset in which users interacted with an intelligent agent assistant, by giving it commands. This dataset includes labels on pairs of consecutive commands, which indicate whether the latter command is in fact a correction of the former command. We show that SAIF outperforms current state-of-the-art methods on this dataset.
APA, Harvard, Vancouver, ISO, and other styles
26

Hamm, Thomas M., and Zong-Sheng Han. "Is λ an appropriate control variable for locomotion?" Behavioral and Brain Sciences 18, no. 4 (December 1995): 761–62. http://dx.doi.org/10.1017/s0140525x0004084x.

Full text
Abstract:
AbstractThe lambda model predicts that the command received by each motor nucleus during locomotion is specific for the joint at which its muscle acts and is independent of external conditions. However, investigation of the commands received by motor nuclei during fictive locomotion and of the sensitivity of these commands to feedback from the limb during locomotion indicates that neither condition is satisfied.
APA, Harvard, Vancouver, ISO, and other styles
27

Jiang, Hongxu, Shenglan Li, Huiyong Li, Tingshan Liu, and Jinyuan Lu. "A High-Performance and Hardware-Efficient PCIe Transmission for a Multi-Channel Video Using Command Caching and Dynamic Splicing on FPGA." Journal of Circuits, Systems and Computers 27, no. 04 (December 6, 2017): 1850067. http://dx.doi.org/10.1142/s0218126618500676.

Full text
Abstract:
With the increasing requirements of transmitting larger amounts of diverse video and image data, the PCI express (PCIe) interface has been extensively used in high-speed digital systems for multimedia processing and communication. However, the existing PCIe transmission methods are not efficient to transmit multi-channel videos on FPGA processors, as they waste PCIe bandwidth and hardware resources. In this paper, an efficient PCIe transmission method for multi-channel video is presented on an FPGA processor. First, to reduce the programmed I/O (PIO) write latency, the command caching method is adopted. The traditional DMA descriptors are transformed into DMA commands, which are smaller, and the command buffer is used to store these commands. Second, a dynamic splicing mechanism is proposed for data transmission and commands the scheduling separately. The multi-type data is transmitted concurrently in this dynamic splicing mechanism. Moreover, the adjacent commands are spliced into one command, which reduces the DMA initiation times. Finally, the direct kernel memory access technique and timer self-feedback monitor technique are applied to improve the transmission efficiency and enhance the system reliability. The experimental results show that the transmission efficiency of the proposed method is increased by nearly 30% compared with other conventional methods, and the highest measured transfer rate is 1631 Mbytes/s on write and 1582 Mbytes/s on read, which reaches 84.4% of the theoretical maximum.
APA, Harvard, Vancouver, ISO, and other styles
28

Sung, Yoon-Gyung, and Chang-Lae Kim. "Deflection Reduction Shaping Commands with Asymmetric First-Order Actuators." Applied Sciences 9, no. 19 (September 23, 2019): 3982. http://dx.doi.org/10.3390/app9193982.

Full text
Abstract:
In this paper, two approaches for generating deflection reduction shaping commands are proposed to reduce the transient and residual deflections of flexible systems subject to asymmetric first-order actuators. The commands are limited-state in that they consist of two positive actuations of different magnitudes and one negative actuation, similar to on-off-on commands. Standard on–off commands that are commonly used in robots, cranes, and spacecrafts can degrade the control performance of conventional input-shaped commands and cause detrimental damage resulting from large transient deflections of flexible structures due to asymmetric first-order actuators. Therefore, to cope with the performance degradation resulting from the effects of first-order actuators, an approximated closed-form solution and a numerically optimized approach for deflection reduction shaping commands are presented with an exponential function, final impulse magnitude modification of an input shaper is determined by a transient deflection constraint and a phasor vector approach. The performance assessment showed that the approximated analytical approach has an advantage in real-time control applications. The characteristics of the proposed deflection reduction shaping commands are analyzed with respect to system parameters, deflection reduction ratios, and actuator time constants. The proposed command shaping techniques are numerically evaluated using a pendulum system and are experimentally validated on a mini-bridge crane.
APA, Harvard, Vancouver, ISO, and other styles
29

Babu, B. Shoban, V. Priyadharshini, and Prince Patel. "Review of Voice Controlled Robotic Arm-Raspberry Pi." European Journal of Electrical Engineering and Computer Science 5, no. 2 (March 10, 2021): 1–4. http://dx.doi.org/10.24018/ejece.2021.5.2.302.

Full text
Abstract:
One of the most essential life skills is to be able to communicate easily. In order to produce greater comprehension, communication is described as transmitting knowledge. Communication and technologies are not mutually exclusive. Speech Recognition is a technique that facilitates the processing of voice information to text and is independent of the speaker. This enables it to be used in various applications, from digital assistants to machinery control. The aim of this paper is to study numerous robotic vehicles powered by human speech commands. To accomplish this functionality, most of these systems run with the use of an android smart phone that transmits voice commands to a raspberry pi. The voice-operated robot is used to build one moving object. It is moved as per the voice recognition module commands, and the robot obtains that command. The robot compares the command with the stored software and then sets the command using wireless communication as per voice. These suggested methods would be useful for devices such as assistive robotics for people with disabilities or automotive applications such as work robots.
APA, Harvard, Vancouver, ISO, and other styles
30

Panchuk, Michelle. "Has God Indeed Said? Skeptical Theism and Scriptural Hermeneutics." Journal of Analytic Theology 9 (September 22, 2021): 45–66. http://dx.doi.org/10.12978/jat.2021-9.120804150010.

Full text
Abstract:
This paper demonstrates that the skeptical theist’s response to the problem of evil deprives the analytic theologian of theoretical resources necessary to avoid accepting as veridical merely apparent divine commands that endorse cruelty. In particular, I argue that the same skeptical considerations that lead analytic theologians to endorse skeptical theism also lead to what I call “divine command skepticism”—an inability to make certain kinds of judgements about what a good God would or would not command. The danger of divine command skepticism is not that it generates new reasons to think that God has commanded horrors, but, rather, that it undercuts the defeaters we might otherwise have for thinking that God has commanded those horrors. It does so both by rendering illicit certain theological and hermeneutical methodologies employed within liberatory frameworks (i.e., various kinds of liberation theologies) and by depriving the theologian of some of the more “traditional” mechanisms for resolving such apparent conflicts.
APA, Harvard, Vancouver, ISO, and other styles
31

Cho, Gyu-Sang. "A New Timestamp Digital Forensic Method Using a Modified Superincreasing Sequence." International Journal of Digital Crime and Forensics 8, no. 3 (July 2016): 11–33. http://dx.doi.org/10.4018/ijdcf.2016070102.

Full text
Abstract:
This paper proposes a new digital forensic method using a modified superincreasing sequence. Timestamp changes by file commands in Windows NTFS file system are used for identifying what commands were executed and are a useful and a logical way for performing digital forensics. A superincreasing sequence is modified for the timestamp change patterns to make each timestamp pattern have a distinct value. The method has two functions; one is a timestamp change check function and the other is a forensic evaluation function. The former checks differences of timestamps between before and after command execution, and the latter produces a characteristic output by applying ten kinds of timestamp change patterns. According to the characteristic output, the kind of command that is executed is identified. By virtue of adopting the modified superincreasing sequence, the evaluation function could produce distinct characteristic output values and thereby provides a way to reconstruct executed file commands.
APA, Harvard, Vancouver, ISO, and other styles
32

Dunne, Steve. "Abstract Commands:." Electronic Notes in Theoretical Computer Science 42 (January 2001): 104–23. http://dx.doi.org/10.1016/s1571-0661(04)80881-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Coleman, Matthew. "Silent Commands." Hearing Journal 65 (July 2012): 1. http://dx.doi.org/10.1097/01.hj.0000416307.81696.8f.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Berry, Michael J. A. "System commands." ACM SIGAPL APL Quote Quad 15, no. 4 (May 12, 1985): 49–51. http://dx.doi.org/10.1145/255315.255338.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Firmansyah, Anas Ardi. "Design and Development of Hand Disabilities Tool To Turn On and Off Electronic Devices Using Voice Recognition Module V3." Jurnal Jartel: Jurnal Jaringan Telekomunikasi 3, no. 2 (November 7, 2016): 47–52. http://dx.doi.org/10.33795/jartel.v3i2.220.

Full text
Abstract:
In today's modern era, electronic devices have become a necessity that is often used in everyday life. With the development of increasingly advanced science and technology, many things can be used to meet the needs in terms of controlling electronic devices, one of which is controlling electronic devices using voice commands, where this system can be used for people with hand disabilities. In this research, a system will be made using Voice Recognition Module V3 as voice recognition to turn on and turn off electronic devices. The Voice Recognition Module will receive input in the form of voice commands via the microphone as a transducer and is connected to Arduino uno as the main microcontroller which will access the Control Panel which consists of Relay and Contactor components as controlled objects connected to Electronic Devices (Lamps, TV and AC). In the results of the system research, the percentage of successful speech recognition according to the voice sample is 96.6% from 10 times the pronunciation of the command given to each command. While the percentage of success when giving orders only with fragments of words is 21.25%. At the success rate of giving voice commands to different people, the percentage of success is 81%. The success rate for giving commands will be more responsive when in a room without noise or conducive, but the success rate for giving commands will decrease when pronunciation is at a distance of 1M.
APA, Harvard, Vancouver, ISO, and other styles
36

Gu, Ariel, and Hong Il Yoo. "vcemway: A one-stop solution for robust inference with multiway clustering." Stata Journal: Promoting communications on statistics and Stata 19, no. 4 (December 2019): 900–912. http://dx.doi.org/10.1177/1536867x19893637.

Full text
Abstract:
Most Stata commands allow cluster( varname) or vce(cluster clustvar) as an option, popularizing the use of standard errors that are robust to oneway clustering. For adjusting standard errors for multiway clustering, there is no solution that is as widely applicable. While several community-contributed packages support multiway clustering, each package is compatible only with a subset of models that Stata’s ever-expanding library of commands allows the researcher to fit. We introduce a command, vcemway, that provides a one-stop solution for multiway clustering. vcemway works with any estimation command that allows cluster( varname) as an option, and it adjusts standard errors, individual significance statistics, and confidence intervals in output tables for multiway clustering in specified dimensions. The covariance matrix used in making this adjustment is stored in e(V), meaning that any subsequent call to postestimation commands that use e(V) as input (for example, test and margins) will also produce results that are robust to multiway clustering.
APA, Harvard, Vancouver, ISO, and other styles
37

Konopko, Grzegorz. "Organisation of command and staff training in Army Recruitment Commands." Zeszyty Naukowe Akademii Sztuki Wojennej 105, no. 4 (August 28, 2017): 66–98. http://dx.doi.org/10.5604/01.3001.0010.3525.

Full text
Abstract:
The article presents the organisation of command and staff training at the level of territorial organs of military administration. There have been general assumptions presented of the implementation of projects in the training of command and staff, including issues deciding about the essence, content and objectives of command and staff training at the level of Voivodeship Military Staff and Military Conscription and Recruiting Headquarters30. In addition, there have been proposed types, forms, criteria and models of exercises and indicated organisational assumptions in the process of implementing, monitoring, evaluation and course completion exercises with commands and staffs at territorial organs of military administration. Specific rules have also been determined for coordinating combat systems. Presented proposals and variants in the area of conducting exercises with commands and staffs have a conceptual dimension. They can be used in training activity at this level. They can also provide a basis for further discussion in this spectrum of activities.
APA, Harvard, Vancouver, ISO, and other styles
38

LUFF, PAUL, and CHRISTIAN HEATH. "The collaborative production of computer commands in command and control." International Journal of Human-Computer Studies 52, no. 4 (April 2000): 669–99. http://dx.doi.org/10.1006/ijhc.1999.0354.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Ye, Xiaoqing, and Yixiao Sun. "Heteroskedasticity- and Autocorrelation-robust F and t Tests in Stata." Stata Journal: Promoting communications on statistics and Stata 18, no. 4 (December 2018): 951–80. http://dx.doi.org/10.1177/1536867x1801800412.

Full text
Abstract:
In this article, we consider time-series, ordinary least-squares, and instrumental-variable regressions and introduce a new pair of commands, har and hart, that implement more accurate heteroskedasticity- and autocorrelation-robust (HAR) F and t tests. These tests represent part of the recent progress on HAR inference. The F and t tests are based on the convenient F and t approximations and are more accurate than the conventional chi-squared and normal approximations. The underlying smoothing parameters are selected to target the type I and type II errors, which are the two fundamental objects in every hypothesis testing problem. The estimation command har and the postestimation test command hart allow for both kernel HAR variance estimators and orthonormal-series HAR variance estimators. In addition, we introduce another pair of new commands, gmmhar and gmmhart, that implement the recently developed F and t tests in a two-step generalized method of moments framework. For these commands, we opt for the orthonormal-series HAR variance estimator based on the Fourier bases because it allows us to develop convenient F and t approximations as in the first-step generalized method of moments framework. Finally, we present several examples to demonstrate these commands.
APA, Harvard, Vancouver, ISO, and other styles
40

Choo, Frederick. "The Prior Obligations Objection to Theological Stateism." Faith and Philosophy 36, no. 3 (2019): 372–84. http://dx.doi.org/10.5840/faithphil201981126.

Full text
Abstract:
Theological stateist theories, the most well-known of which is Divine Command Theory (DCT), ground our moral obligations directly in some state of God. The prior obligations objection poses a challenge to theological stateism. Is there a moral obligation to obey God’s commands? If no, it is hard to see how God’s commands can generate any moral obligations for us. If yes, then what grounds this prior obligation? To avoid circularity, the moral obligation must be grounded independent of God’s commands; and therefore DCT fails to ground all moral obligations in God’s commands. I argue that DCT proponents should embrace “metaethical DCT.” On this view, there is no moral obligation to obey God. God creates our moral obligations out of normative nothingness. I argue that this helps DCT proponents to escape the prior obligations objection. Other theological stateist theories can modify their theory similarly to meet this objection.
APA, Harvard, Vancouver, ISO, and other styles
41

Piyaneeranart, Manussawee, and Mahasak Ketcham. "Automatically Moving Robot Intended for the Elderly with Voice Control." International Journal of Online and Biomedical Engineering (iJOE) 17, no. 06 (June 25, 2021): 19. http://dx.doi.org/10.3991/ijoe.v17i06.22299.

Full text
Abstract:
This research aims at an automatically moving robot intended for the elderly with voice control using voice recognition that gives a direction to the robot by a voice command. The development of this robot employed an algorithm that converts voice to text to control the robot mobility. The performance testing of the automatically moving robot intended for the elderly with Thai language voice commands revealed an accuracy of voice-to-text conversion for commanding the robot to move in designated directions of 100 percent, and the accuracy of voice-to-text conversion for commanding the robot to move in designated directions using English language was 80 percent, while that for both Thai and English commands was 70 percent. Errors in voice-to-text conversion occurred when commands were not clearly spoken or pronounced or when commands were issued from people located in a very noisy place.
APA, Harvard, Vancouver, ISO, and other styles
42

Sutikno, Sutikno, Khairul Anam, and Azmi Shaleh. "Sistem Navigasi Kursi Roda Elektrik untuk Pasien Penyandang Cacat Fisik Menggunakan Metode Convolutional Neural Network." Jurnal Rekayasa Elektrika 17, no. 1 (March 29, 2021): 29–35. http://dx.doi.org/10.17529/jre.v17i1.16376.

Full text
Abstract:
Patients with physical disabilities, such as losing a leg or experiencing paralysis, will have difficulty moving from one place to another. As a result, they need someone or a device that can help them to move. One that is often used by patients is a wheelchair. This study proposes an electric wheelchair navigation system that can be controlled by voice commands using the Convolutional Neural Network (CNN) method. CNN is used as the main method for identifying commands embedded on the Raspberry Pi microcontroller. The recorded voice data is then converted to spectrogram images before being fed to CNN. This method is proven to be better in voice command recognition with an accuracy of above 90%. There are five different voice commands: forward, backward, left, right, and stop. Preliminary experimental results indicate that the electric wheelchair is able to move according to the commands given.
APA, Harvard, Vancouver, ISO, and other styles
43

OSBORNE, THOMAS M. "Ockham as a divine-command theorist." Religious Studies 41, no. 1 (February 18, 2005): 1–22. http://dx.doi.org/10.1017/s0034412504007218.

Full text
Abstract:
Although this thesis is denied by much recent scholarship, Ockham holds that the ultimate ground of a moral judgement's truth is a divine command, rather than natural or non-natural properties. God could assign a different moral value not only to every exterior act, but also to loving God. Ockham does allow that someone who has not had access to revelation can make correct moral judgements. Although her right reason dictates what God in fact commands, she need not know that God so commands. Ockham's divine-command theory plays an important role in the shift away from a nature-based ethics, and it anticipates contemporary problems concerning truth in meta-ethics.
APA, Harvard, Vancouver, ISO, and other styles
44

Mielczarek, Magda, Bartosz Czech, Jarosław Stańczyk, Joanna Szyda, and Bernt Guldbrandtsen. "Extraordinary Command Line: Basic Data Editing Tools for Biologists Dealing with Sequence Data." Open Bioinformatics Journal 13, no. 1 (December 31, 2020): 137–45. http://dx.doi.org/10.2174/1875036202013010137.

Full text
Abstract:
The command line is a standard way of using the Linux operating system. It contains many features essential for efficiently handling data editing and analysis processes. Therefore, it is very useful in bioinformatics applications. Commands allow for rapid manipulation of large ASCII files or very numerous files, making basic command line programming skills a critical component in modern life science research. The following article is not a guide to Linux commands. In this manuscript, in contrast to many various Linux manuals, we aim to present basic command line tools helpful in handling biological sequence data. This manuscript provides a collection of simple and popular hacks dedicated to users with very basic experience in the area of the Linux command line. It includes a description of data formats and examples of editing of four types of data formats popular in bioinformatics applications.
APA, Harvard, Vancouver, ISO, and other styles
45

GAO, X. Z., and S. J. OVASKA. "FUZZY POWER COMMAND ENHANCEMENT IN MOBILE COMMUNICATIONS SYSTEMS." International Journal of Computational Intelligence and Applications 01, no. 02 (June 2001): 151–63. http://dx.doi.org/10.1142/s1469026801000147.

Full text
Abstract:
In this paper, we propose a fuzzy logic-based power command enhancement scheme for the mobile station in the cellular communications systems. By defining necessary linguistic terms of the power commands and corresponding fuzzy inference rules, an Embedded Fuzzy Unit (EFU) is constructed. The role of our EFU is to produce appropriate digital power commands instead of the one-bit discrete commands directly obtained from the base station. Simulations show that the EFU-based mobile station can generate considerably smoother received power at the base station. The transient overshoot and steady channel tracking error are small. Moreover, our method has the advantage of simplicity in both structure and algorithm, and is thus easy for hardware implementation.
APA, Harvard, Vancouver, ISO, and other styles
46

Rahimi, Simin. "Swinburne on the Euthyphro Dilemma. Can Supervenience Save Him?" Forum Philosophicum 13, no. 1 (June 1, 2008): 17–29. http://dx.doi.org/10.35765/forphil.2008.1301.02.

Full text
Abstract:
Modern philosophers normally either reject the „divine command theory” of ethics and argue that moral duties are independent of any commands, or make it dependent on God's commands but like Robert Adams modify their theory and identify moral duties in terms of the commands of a loving God. Adams regards this theory as metaphysically necessary. That is, if it is true, it is true in all possible worlds. But Swinburne's (1981) position is unprecedented insofar as he regards moral truths as analytically necessary. In this paper Swinburne's argument will be discussed and I will reveal some of the difficulties involved in categorising general moral principles (if there are such principles) as logical (analytical/necessary) truths.
APA, Harvard, Vancouver, ISO, and other styles
47

Cattaneo, Matias D., Rocío Titiunik, and Gonzalo Vazquez-Bare. "Analysis of regression-discontinuity designs with multiple cutoffs or multiple scores." Stata Journal: Promoting communications on statistics and Stata 20, no. 4 (December 2020): 866–91. http://dx.doi.org/10.1177/1536867x20976320.

Full text
Abstract:
In this article, we introduce the Stata (and R) package rdmulti, which consists of three commands (rdmc, rdmcplot, rdms) for analyzing regression-discontinuity (RD) designs with multiple cutoffs or multiple scores. The command rdmc applies to noncumulative and cumulative multicutoff RD settings. It calculates pooled and cutoff-specific RD treatment effects and provides robust biascorrected inference procedures. Postestimation and inference is allowed. The command rdmcplot offers RD plots for multicutoff settings. Finally, the command rdms concerns multiscore settings, covering in particular cumulative cutoffs and two running variable contexts. It also calculates pooled and cutoff-specific RD treatment effects, provides robust bias-corrected inference procedures, and allows for postestimation and inference. These commands use the Stata (and R) package rdrobust for plotting, estimation, and inference. Companion R functions with the same syntax and capabilities are provided.
APA, Harvard, Vancouver, ISO, and other styles
48

SHAW, JOSEPH. "The application of divine commands." Religious Studies 35, no. 3 (September 1999): 307–21. http://dx.doi.org/10.1017/s0034412599004916.

Full text
Abstract:
Divine commands are typically held, by theists, to be made not only at the foundations of morality, but also in an ‘everyday’ setting, when there are already moral considerations applicable to the addressee(s). My aim is to show how a particular command could relate to these pre-existing moral considerations, if it is more than just a repetition of them. If it is right that an action be obligatory, wrong or supererogatory, why would God want to change its status? Anyone can make a normative difference by giving information, making co-ordination proposals, or transferring rights, and it is clear why these actions will sometimes by worthwhile. The problem must be focused on when God makes a moral difference directly, using a ‘special moral authority’, when His commands are efficacious qua commands. Using this authority, God can perfect imperfect duties, which may make it easier to carry them out. He can extend duties, to make sure more value is produced. He can allocate sacrifices, which can be carried by anyone. And He can resolve conflict games, to everyone's benefit. This explains why God should issue commands in the way that theists typically represent him as doing.
APA, Harvard, Vancouver, ISO, and other styles
49

Fakhrurrazi, Fakhrurrazi. "POTRET PENDIDIKAN KELUARGA DALAM AL-QUR’AN ( Telaah QS. AT-Tahrim Ayat 6 )." Jurnal At-Tibyan: Jurnal Ilmu Alquran dan Tafsir 3, no. 2 (December 24, 2018): 188. http://dx.doi.org/10.32505/tibyan.v3i2.691.

Full text
Abstract:
The Qur'an is one source of law and legal propositions. The Qur'an is a source of knowledge. Family coaching as the main pillar of Islamic education which is connected with Allah's command in the Qur'an, as in Q.S. At-Tahri>m [66]: 6, Allah commands those who believe to protect themselves and their families from the fire of hell, whose fuel consists of humans and stones, obediently and obediently carrying out the commands of Allah swt
APA, Harvard, Vancouver, ISO, and other styles
50

Boonbrahm, Salin, Poonpong Boonbrahm, Charlee Kaewrat, Prasert Pengkaew, and Prathomjit Khachorncharoenkul. "Teaching Fundamental Programming Using Augmented Reality." International Journal of Interactive Mobile Technologies (iJIM) 13, no. 07 (July 11, 2019): 31. http://dx.doi.org/10.3991/ijim.v13i07.10738.

Full text
Abstract:
To learn a programming language, the students have to understand the logical flow of the commands as well as the syntax. The logical flow might be more difficult to understand when compared with a syntax which can detect easily. The primary flow of commands or the control structures includes the sequence, condition or selection, and iteration. The students construct the program flowchart by using these control structure. They also have to understand the result of each command execution, step by step. In this research, we propose the technique for developing the learning tool (AR flowchart) to simulate the result of the commands in program flowchart by using augmented reality (AR), so the learners can visualize the result. With this tool, the students can construct a program flowchart as a series of commands by using AR markers. The result of the execution of these commands can be displayed so the students can see whether the logic of the program is correct or not. The design of this tool aims at increasing student engagement and helping them to understand program logic better. The evaluation of the concept results by the group of university students supports our propose.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography