Search results for "Design"
showing 10 items of 5885 documents
Psychological triggers in video games
2016
Peliteollisuudesta on hyvää vauhtia tulossa liikevaihdoltaan suurin viihdeteollisuuden haara ikinä. Erilaisten pelimuotojen lisääntyminen ja suurenevat voitot vaativatkin selvitystä siitä, mikä tekee peleistä pelattavia? Tämä tutkielma pyrkii määrittämään ja selvittämään digitaalisten pelien ominaisuuksia jotka miellyttävät potentiaalisia sekä nykyisiä asiakkaita psykologiselta kannalta. Erilaisia tekijöitä analysoidaan yrittäessä määrittää ominaisuuksia jotka erottavat virtuaaliset pelit toisistaan ja vaikuttavat haluttavilta, mainittakoon muun muassa flow, immersio, tunteet ja hahmon identifikaatio. Tutkielmassa tuodaan esille erilaisia tapoja joilla saadaan flown ja immersion tunteet her…
Immersive Virtual Reality Education Application : Four Development Iterations along Design Science Research Methodology
2022
This study introduces a research and development process of an immersive Virtual Reality (VR) education application. Altogether four application development iterations are showcased along the Design Science Research methodology. The results show how initial problems change and new problems occur during the course of a long-term DSR project with multiple iterations. Moreover, the study results confirm various previous findings, for example, that VR works better on higher learning levels such as application -level and personalization is a way to achieve this. In addition, 360 photos and videos were found to be easy and cost-efficient ways to increase personalization of VR applications. The re…
Bone-Healing Pattern on the Surface of Titanium Implants at Cortical and Marrow Compartments in Two Topographic Sites: an Experimental Study in Rabbi…
2018
This study evaluates the bone-healing patterns on the surface of titanium implants at the cortical and marrow compartments of bicortically-installed implants in the diaphysis and metaphysis of rabbit tibiae. In 27 New Zealand rabbits, two implants, one for each macro-design and with equal resorbable blasted media (RBM) implant surfaces, were randomly implanted in the diaphysis or metaphysis of each tibia. The flaps were sutured to allow submerged healing. The animals were sacrificed after two, four, or eight weeks, with nine weeks used for the period of healing. Ground sections were prepared and analyzed. No statistically significant differences were found between the two groups for newly f…
Anterolateral thigh perforator flap made by customized 3D-printing fabrication of fixed positioning guide for oromaxillofacial reconstruction:a preli…
2022
Oromaxillofacial carcinomas frequently result in serious tissue defect due to enlarged resection for treating their extensive invasion, which require challenging reconstruction. Three-dimensional (3D) printing is an advanced technology which has greatly promoted the progress of craniomaxillofacial reconstructive surgery. This present study aimed to investigate the advantages of anterolateral thigh (ALT) perforator flap manufactured by 3D printing fixed positioning guide template in curing oromaxillofacial defect. Twenty patients with oromaxillofacial defects resulted from severe primary malignant tumors were divided into experimental group assisted by digital technique (n=8) and controlled …
On the History of Differentiable Manifolds
2012
International audience; We discuss central aspects of history of the concept of an affine dif-ferentiable manifold, as a proposal confirming the need for using some quantitative methods (drawn from elementary Model Theory) in Mathematical Historiography. In particular, we prove that this geometric structure is a syntactic rigid designator in the sense of Kripke-Putnam.
A Series of Hadamard Designs with Large Automorphism Groups
2000
Abstract Whilst studying a certain symmetric (99, 49, 24)-design acted upon by a Frobenius group of order 21, it became clear that the design would be a member of an infinite series of symmetric (2q2 + 1, q2, (q2 − 1)/2)-designs for odd prime powers q. In this note, we present the definition of the series and give some information about the automorphism groups of its members.
Check in, check out! : käyttäytymisen tehostettua tukea lähikoulussa
2018
Finnish schools struggle with problem behaviour and need new interventions which are effective, acceptable, and can be implemented with high fidelity in general classrooms. The aim of this study was to examine the effects of Check in check out (CICO) support in decreasing the disruptive behaviours of general education primary school pupils. CICO can be regarded as an intensified level of support in Finnish schools, and its key features are brief morning and afternoon meetings with a CICO coach, the use of a Daily Report Card (DRC), regular positive feedback during the day by the classroom teacher, and parental involvement. The specific aims of the study were threefold: first, to pilot the i…
Lignin and Cellulose Content of Fermented Rice Straw with Aspergillus niger (van Tieghem) and Trichoderma mutan AA1
2021
The rice straw has potential to be used as an alternative ruminant feed. However, it has limiting factors i.e low crude protein, high crude fiber, lignin, cellulose, and silica content. To overcome the limiting factors, immersion in a solution of alkaline (lime) or fermentation by using inoculum microbial cellulolytic and lignocellulolytic (Trichoderma mutan AA1 and Aspergillus niger.). The research method was experimental, with four treatments and repeated five times. Completely randomized design was used and if there are differences among treatments a further test with DMRT was carried out (level 1 % and 5 %). These treatments were T0: The rice straw without t fermentation; T1: Fermented …
A Knowledge Interface System for Information and Cyber Security Using Semantic Wiki
2018
Resilience against information and cyber security threats has become an essential ability for organizations to maintain business continuity. As bulletproof security is an unattainable goal, organizations need to concentrate to select optimal countermeasures against information and cyber security threats. Implementation of cyber risk management actions require special knowledge and resources, which especially small and medium-size enterprises often lack. Information and cyber security risk management establish knowledge intensive business processes, which can be assisted with a proper knowledge management system. This paper analyzes how Semantic MediaWiki could be used as a platform to assis…
Information Systems Architecture and Technology: Proceedings of 38th International Conference on Information Systems Architecture and Technology – IS…
2018
This three-volume set of books presents advances in the development of concepts and techniques in the area of new technologies and contemporary information system architectures. It guides readers through solving specific research and analytical problems to obtain useful knowledge and business value from the data. Each chapter provides an analysis of a specific technical problem, followed by the numerical analysis, simulation and implementation of the solution to the problem. The books constitute the refereed proceedings of the 2017 38th International Conference “Information Systems Architecture and Technology,” or ISAT 2017, held on September 17–19, 2017 in Szklarska Poręba, Poland. The con…