Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Rodelas, Nelson"'
Publikováno v:
IJFMR Volume 6, Issue 2, March-April 2024
Common problems in playing online mobile and computer games were related to toxic behavior and abusive communication among players. Based on different reports and studies, the study also discusses the impact of online hate speech and toxicity on play
Externí odkaz:
http://arxiv.org/abs/2403.15458
Autor:
Aglibar, Kent Darryl, Rodelas, Nelson
Ticketing system is common in Technical Support in Information Technology Industry. At present time, even management is using it. It serves as a way to connect the company and the client, end to end. The researchers conducted research where it aims t
Externí odkaz:
http://arxiv.org/abs/2203.03709
Autor:
Aglibar, Kent Darryl, Alegre, Garret Christopher, Del Mundo, Gerald, Duro, Kenny Francis, Rodelas, Nelson
IT companies are popular in the present time as technology arises in the entire world. Incidents and Requests for either clients or company internal are hard to manually track as it is a day-to-day transaction. To keep all the logs, IT Companies are
Externí odkaz:
http://arxiv.org/abs/2202.06213
This study aims to shed light on the rise of play-to-earn games in the Philippines alongside cryptocurrency. The lack of research and public understanding of its benefits and drawbacks prompted the researchers to investigate its market. As such, the
Externí odkaz:
http://arxiv.org/abs/2202.07467
Autor:
XIAOLONG LIU, RODELAS, NELSON C.
Publikováno v:
Scalable Computing: Practice & Experience; Nov2024, Vol. 25 Issue 6, p5603-5613, 11p
Autor:
Justo, Reynalen C., Ramos, Ronel F., Llandelar, Sherry Mae R., Sanares, Roda N., Rodelas, Nelson C.
Publikováno v:
AIP Conference Proceedings; 2022, Vol. 2502 Issue 1, p1-10, 10p
Autor:
Rodelas, Nelson C., Ballera, Melvin A.
Publikováno v:
Indonesian Journal of Electrical Engineering and Computer Science. 24:843
To innovate a proactive surveillance camera, there is a need for efficient face detection and recognition algorithm. The researchers used one of the ViolaJones algorithm and used different image processing techniques to recognize intruders or not. Th