The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The lack of strong reading comprehension skills affects a student's success in school. This paper aims to examine how fluent and non-fluent readers process text and images by utilizing eye movement methodology. Three types of diagnostic instruments were used to collect data (text-only, text and image and image-only). The experiments also involved personal observation, interviews and Q&A sessions...
Chinese ink animation occupies an important position in the world animation history, while its complex processes and painting techniques have always been the pride of Chinese people. With the advent of the digital age, the popularity of computer technology and network provides a new creative environment and platform for painting. Compared with traditional painting, computer painting not only is faster,...
In the last two decades the use of technology in art projects has proliferated, as is the case of the interactive projections based on movement used in artistic performances and installations. However, the artists responsible for creating this work typically have to rely on computer experts to implement this type of interactive systems. The tool herein presented, MotionDesigner, intends to assist...
This work presents the development of a remote laboratory service and its application during the teaching of Control Systems subject of third course in a Telecommunication Technology and Service Engineering degree. The application was successful allowing the student to control the same components as remotely, in a similar way as they were in the laboratory. There was an elevated interest by the students,...
With deference to Butler Lampson, I present five hints specifically for building high-assurance cyber-physical systems: (1) use Turing-incomplete languages (2) simple interfaces are secure interfaces, (3) program the glue code and architecture, (4) system verification is a probabilistic game, and (5) high-assurance systems require a high-assurance culture.
Method for increasing protection level of desktop PC type computer software application and user data using smartphone is proposed and presented in this paper. Smartphones are widely used, almost every person has one and manufacturers of smartphones offer wide range of the devices. All desktop computer applications for some particular and special purposes have applied some kind of protection. This...
Intelligent Network Application Protocol allows telecom operators to differentiate themselves by providing value-added services in addition to the standard telecom services. In some telecom operators, switch-wide usage of INAP service causes interaction for tandem calls which need to be transited towards adjacent switch instead of INAP query. In this work, we share our experience and design solution...
With the increasing role of software in every field, concern has grown over the quality of software products. One such measure of software quality is the reliability, which is the probability of failure-free operation of a computer program in a specified environment for a specified time. Prior to the release of software, failure data are obtained during testing, using which, future reliability of...
The incorporation of peer code reviews as being part of a developer's work flow, and hence the software development lifecycle, has steadily grown in popularity over the past three decades. During the process of statically inspecting code, developers of a codebase are able to collaboratively detect possible code defects, as well as use code reviews as a means of transferring knowledge to improve the...
Cyber-Physical Systems are embedded computers that control complex physical processes and components while cooperating as agents in distributed networks. Due to the scale and complexity of the interactions that occur within cyber-physical systems, requirements traceability strategies that are accurate and easy to manage are hard to implement and maintain. However, the information traces provide is...
The aim of this paper the extraction of human body dimensions using the latest Microsoft Kinect device. Another focus is the analysis of various application of this device in specific branches of science and research and its application in estimation of dimensions. Brief analysis of the device itself is carried out as well. The principal output of this paper the software application that utilizes...
Methods of Computer Algebra have shown to be useful when formally verifying data-centric hardware designs. This has been demonstrated especially for cases where complex arithmetic computations are tightly coupled with the system's control structures at the bit level. As a consequence of current design trends, however, more and more functionality that was traditionally implemented in hardware is now...
Evidence suggests that dental emergencies are likely to occur when preferred care is less accessible. Communication barriers often exist that cause patients to receive suboptimal treatment or experience discomfort for extended lengths of time. Furthermore, limitations in the conventional approach for managing dental emergencies prevent dentists from receiving critical information before patient visits...
We present a desktop monitoring application that combines keyboard, mouse, desktop and application-level activities. It has been developed to discover differences in cognitive functioning amongst older computer users indicative of mild cognitive impairment (MCI). Following requirements capture from clinical domain experts, the tool collects all Microsoft Windows events deemed potentially useful for...
Fear of technology, computer illiteracy and linguistic challenges are the prime concern for uplifting the day to day lives of rural mass. This paper describes a unique platform called Gyansetu (meaning Knowledge Bridge) with specialized hardware and software, which simplifies the access of information from internet for the rural mass. The interactive GUI used within the framework is more image-driven...
Many computing students do not receive adequate training in software quality management. Some students do not have the opportunity to practice software process improvement activities even if they do see the topics covered in their course lectures and textbooks. Serious games are gaining popularity as a means of instruction in higher education. Some excellent prescriptive software process simulation...
Preserving important troubleshooting experience gained in industrial practice, often referred to as “tribal knowledge”, and making it readily available to be re-applied in similar situations represent a serious challenge for many companies in heavy industry. The solution is very often tied to building mental models to capture and express key latent cognitive variables. In this paper, we first attempt...
This paper builds on the authors' previous work with Augmented Reality (AR) technology as a tool to enhance traditional visualizations and facilitate the understanding of complex information. In this paper, we expand our previous work with AR technology by focusing on the process of creating custom content. Based on users' feedback, we describe and compare various strategies to create 3D models from...
With the advent of small satellites and affordable communications hardware, there has been an increase in academic interest in space education. Small satellites are often created with an educational purpose, and they transmit strong signals that are easy to detect. They pass over large areas of the planet a few times a day, providing increased opportunities for successful communication. On the hardware...
Program visualizations help students understand the runtime behavior of other programs. They are educational tools to complement lectures or replace inefficient static drawings. A recent survey found 46 program visualizations developed from 1979 to 2012 reported that their effectiveness is unclear. They also evaluated learner engagement strategies implemented by visualization systems, but other learning...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.