The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The purpose of this research is to determine based on an empirical study, what requirements traceability types are of importance to SCRUM teams, and what value and motive are behind the adoption taken from the perspective of different key players; developers, system analysts, SCRUM masters and project owners. This is in particular important as there a big number of requirements traceability models...
In Turkey, there are many exams for transition to a higher education institution. These exams are all stages of life and have a great importance in the lives of students.As the severity rating of the exam, particularly students, parents and teachers are affected and exams create anxiety for students.Examination results are very important in shaping the lives of future students. Therefore, in this...
This paper presents the design process and testing of NaVaSH, a stand-alone software application for conducting online exams. Initially, it starts with depiction of various related softwares and later RGUKT Examination System has taken as the basis and survey results were presented. Next the detailed description of NaVaSH modules along with their new features has explained with the help of intermediate...
In recent years, an increasing number of school children is beginning to learn about robotics in the classroom in order to stir their interest in STEM professions. Teachers rely on simple educational robots and intuitive programming environments and graphical programming environments have become a frequent starting point for young robotics new bies. However, currently available tools do often not...
With growing popularity of online services, the amount of information on web increases dramatically, which has resulted in increasingly concerns on web application security. Subject knowledge is in desperate need to guide security testing against advanced attacks. Unlike common software security weakness study pattern, a combination analysis method based on Colored Petri Net is presented in this paper...
Software plagiarism, an act of illegally copying others' code, has become a serious concern for honest software companies and the open source community. In this paper, we propose LoPD, a program logic based approach to software plagiarism detection. Instead of directly comparing the similarity between two programs, LoPD searches for any dissimilarity between two programs by finding an input that will...
Software testing plays an important role in ensuring software quality by running a program with test suites. Mutation testing is designed to evaluate whether a test suite is adequate in detecting faults. Due to the expensive cost of mutation testing, selective mutation testing was proposed to select a subset of mutants whose effectiveness is similar to the whole set of generated mutants. Although...
In the context of product line engineering (PLE), providing immediate feedback on the correctness of a manual configuration step to users has a practical impact on whether a configuration process with tool support can be successfully adopted in practice. Model-based PLE has brought opportunities to enable automated product configuration and derivation for large-scale systems/software, in which models...
Plagiarism and cheating are critical issues that jeopardize quality assurance in higher education. When it comes to e-learning and m-learning, fair use of information becomes even more crucial. This case study is an attempt to imprint academics' knowledge, beliefs and strategies regarding plagiarism and cheating. It was found that most of academics were well informed but they did not spend time in...
PBL (Problem Based Learning) has been used for teaching in number of courses for a long time. The objective of this learning method is to encourage the students to study from reality problem. The problem that often occurred during the PBL process was a failure of the project. In this paper, we tried to use an agile method that is a successful technique by using in a software development process in...
The aim of this paper is to present a game based application constructed for the School of Law at the University of Westminster, London. The application is to be used for teaching purposes and is based on a hypothetical scenario. The paper discusses the challenges of designing game based applications for teaching Law and proposes some design solutions. The ‘Articulate Storyline’ e-learning authoring...
This paper primarily relates to the engineering of affective (emotional) computing (AC) capabilities in machines and also considers how such developments may be used to advance the quantified self (QS) paradigm. Our work will provide a literature and technology review providing some general insights and discussion around AC applications, technologies, tools, platforms and alternative controls/interfaces...
This paper deals with the Embedded platform for didactical aids development. It shortly summaries one of the aids that was derived from the base embedded platform. The design of the aid was focused on special pedagogues needs in field of specific learning disabilities (SLD). It will aim to reduce the SLD like dyscalculia, conceptual thinking, motor activity etc. This aid was build and its contribution...
Through the study of the Bejaia's University students' marks in Computer Science, we want to show the interest of the Statistical Implicative Analysis (SIA). This method, developed by Régis Gras and his collaborators, is used to discover and analyze the most relevant implications between different studied modules. CHIC (Cohesive Hierarchical Implicative Classification) is a software implementing most...
Many risk factors affect software development and risk management has become one of the major activities in software development. Discovering causal directions among risk factors and project performance are important support for risk management. The Additive Noise Model (ANM) is an effective algorithm for discovering the direction on one-to-one causalities, but ineffective on many-to-one causalities...
This paper is focused on the use of a computer aided method for analyzing the drawings of patients' undergoing projective psychological tests. The sketches are drawn on a standard A4 paper placed over a specially designed touch screen. The authors developed the software aimed to automatically both to automatically measure the geometrical characteristics of the designed object and to deliver some additional...
This paper is dedicated to the presentation of the Tempus project “rESeau maghrébIn de laboratoirEs à distance”, eSience, which aims to create an eLab for the realization of remote practical courses in Maghreb countries (Algeria, Morocco, Tunisia). In this paper, we present a prototype for a remote laboratory for electronics implemented in the National Electronics and Telecommunications school of...
There has been a massive explosion in the use of the internet and specifically the world wide web (or web) over the last few years. This paper discusses IoT interoperability to deal with the use of distant ELabs of different universities. This paper puts light on a part of the tempus project that aimed at collaborating distant ELabs of different Maghrebian and European universities. The emphasis will...
Autism Spectrum Disorders (ADS), with unknown etiology, is one of the most understudy fields of research worldwide that requires complicated and delicate analytical study methods. The purpose of this study was to compare active regions of Brain Default Mode Network (DMN) using Group Independent Component Analysis (6ICA) among resting state patients with Autism Disorder and healthy subjects. Default...
Parents is disturbing about effect on radiation electromagnetic safety to children organism when provide wireless network in school. Author considers correspondence of russian and foreign safety standard of E-field radiation, and came to conclusion that Russian standard is more harder. Researches of E-field radiation influence to human brain come to the conclusion that blood-brain barrier, protecting...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.