Estimating Brain Vigor in Discussion from Behavioral Reaction for Stressful Load
Journal Title: International Research Journal of Computer Science - Year 2016, Vol 0, Issue 0
Abstract
To create new idea, young persons often have one-to-one discussion with their mentors.In such meeting,heavy stressful loads are often imposed on young persons. We should improve the quality of discussion in progress so that the discussion should bring about a good new idea. The paper proposes a method which estimates the brain vigor of idea proposers in discussion from their behavioral reactions under stressful loads. In this method, behavioral reactions are measured with web-cameras because the discussion participants do not have to wear any sensors. The method figures out the spectrum of the upper half body, the hip, and the lower half body. It discriminates behavioral reactions under stressful loads from the spectrum using Random Forest. The experiment revealed we can estimate the brain vigor of a person from behavioral reactions of his hip at 70% in the f-measure. With the method, a mentor can proceed with discussion which is promising to create a good idea, because he can judge the brain vigor of the person refining the idea.
Authors and Affiliations
Shun Okamura, Yusuke Kajiwara
A Study on Reactive Protocols or On-demand Routing Protocols
Data transmission between two nodes requires multiple hops as nodes transmission range is limited in Mobile Ad hoc networks (MANET’s). Mobility of the networks nodes to makes the situation even more complicated in wirele...
Utilization of GPS Technology to Control Regional Development Project with the Efficient Use of Energy Consumption - Based Smartphone
GPS (Global Positioning System) has a variety of applications among which real-time tracking finds significance in day-to-day life. One of the technologies used to find locations by GPS (global positioning system). Servi...
Mobile Technology and Education: Theoretical Study
The aim of this study is to build a knowledge system, which features a clear picture of the mobile learning technology environment in the field, benefits, barriers and applications of mobile learning. Where the study con...
The False Positive Alert Reduction Using Data mining Techniques in Intrusion Detection System
Information security is a vital aspect of any organization. Most of the organizations relay and trust on the intrusion Detection System (IDS) which play important role in detecting intrusions in data network environment....
Data Compression and Encryption Technique for Secure Data Transfer
Securing data is a challenging issue in the present time. Data security refers to protective digital privacy measures that are applied to prevent unauthorized access to the important information. Cryptography protects us...