Virtual Reality (VR) can be used as an assistive system to learn with immersive visualization and interactive control. Anatomy is a branch of biology that is difficult to learn using textbooks because of its limitations in displaying anatomical objects in two-dimensional media. VR can display anatomical objects in the form of a three-dimensional virtual world. Besides being assisted by its immersive appearance, the interactivity learning system can also be improved by using the appropriate VR control device. In this study, three controls were used with different features and functions, namely VIVE Controller, Leap Motion Controller, and Senso Glove, and a user experience study was conducted. The user was asked to use the anatomy learning system with three different control devices, and then the user was asked to fill out a survey form, which uses the Liker scale. The survey focuses on the level of acceptability and user satisfaction in the usability factor, ease of learning, the suitability of movement, suitability of display, and haptic feedback provided by each VR controllers. From this study, it was found that the VIVE Controller is superior compared to the Leap Motion Controller and Senso Glove in terms of usability, ease of learning, movement suitability, and display suitability. The senso glove is superior in terms of haptic feedback satisfaction.
Abstract. UDP drops packet when checksum bits in header does not match the checksum bits calculated from the receive data. UDP-Late improves UDP by using partial checksum coverage. However, checksum error in both UDP and UDP-Lite headers is potentially leading to wrong decision in dropping part(s) of packet. This article proposes protocol to avoid the problem by using Forward Error Correction (FEC) code to protect checksum bits. The evaluation results show that the number of the received bytes increases up to 0.3% compared to UDP-Lite, which leads to 3 dB increment of the received image quality. IntroductionChecksum is a method to detect bit error within a bit sequence. Basically, checksum adds the bit sequence and folds the results up to 16 digits. User Datagram Protocol (UDP) [1] employs checksum to check error within its packets. If error exists, packet is discharged. On the other hand, many multimedia codecs allow information with error(s) to be decoded. Dropping packets caused by checksum error is not suitable for multimedia applications. Therefore, checksum is often ignored and left empty by using zero padding. However, Internet Protocol version 6 (IPv6) does not allow zero padding on checksum [2], so that UDP should activate the checksum field.The UDP-Lite [3] tackles UDP problem by reducing checksum coverage only for sensitive data which potentially degrades encoding process if error occurred. The UDP-Lite replaces length field on UDP header to be coverage field. Length field in UDP means the number of octets of all UDP data, while coverage field in UDP-Lite means the octet position of data which is covered by the checksum.There is a research to improve UDP-Lite performance by adding the same functionality in medium access layer (MAC) which is referred as to mac_lite [4]. The mac_lite treats voice as a priority which removes the MAC layer checksum on voice packets but applies checksum to other types of traffics. Even though it improves UDP-Lite, the mac_lite works only in a single link, depending on the type of mac. If the mac_lite is implemented on all links, the mac_lite potentially degrades the overall performances as each link is busy with error corrections. Furthermore, the mac_lite works in MAC layer, UDP-Lite is on transport layer.Alfredsson [5] implements UDP-Lite idea on TCP. TCP-lite intercepts the received data to determine acknowledgement packet be sent or not. However, TCP_lite is a reliable protocol for connection oriented application, while UDP-Lite is an unreliable protocol for connectionless application. This paper focuses on UDP-Lite improvement by avoiding error in checksum bits. Schmidt et al [6] proofs that there is a significant error percentage within UDP header. An error on checksum bits may lead wrong decision on dropping parts of packet. This weakness exists on both UDP and UDP-Lite. On the other hand, length field on UDP header is not fully used by the coverage bits of UDP-Lite [7], this empty space can be used for UDP-Lite improvement purpose. As far as the study has been done...
Renewable energy resources can be seen as an alternative energy to capture the remote rural electrification's problems. Installing and operating a renewable energy generation is not difficult but it requires cautious step as to make sure maximum use of energy can improve the electrification rate. In this work, the evaluation of potential of solar, wind and biomass energy for three locations in Malaysia's rural remote area including Pontian, Kerteh and Teluk Intan was performed using HOMER software. The results revealed that with the same rating and operating hours of biomass generator, all locations have high empty fruit bunch (EFB) biomass potential and is able to fulfill the load demand with equal annual electricity production of 601,979 kWh/year and a low cost of electricity (COE) of $0.342/kWh. Meanwhile, Pontian generates the highest annual solar electricity generation of 543,509 kWh/year due to the large size of 400 kW PV panel of the system. However, the COE produced is expensive. On the other hand, with the highest solar irradiation received in Kerteh, the PV stand-alone system requires lower size of 350 kW PV panel but at the same time is able to fulfill the demand with the lowest COE of $0.442/kWh among other locations. Finally, wind potential is not feasible inMalaysia due to low average wind speed recorded. However, the largest amount of wind output power of 16,625 kWh/year was generated in Kerteh which recorded as the highest wind speed and, in the end, produced the cheapest COE of $0.474/kWh compared to other locations.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.