The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This showpiece will present iSnap, an extension of the block-based, novice programming environment Snap!, which supports struggling students by providing on-demand hints and feedback that help them complete programming assignments. iSnap extends the existing syntactic scaffolding offered by block-based programming to additionally support the implementation of programming tasks. Research on iSnap has...
We describe a collaborative software engineering course between sighted college students and high school students with visual impairments. We designed the course as a mentorship experience, in which one college student mentor is connected to one high school student mentee. Each pair of students is responsible for a programming project. The students must learn to communicate programming concepts and...
A process graph is a graph designed to visually explain the action of programs which make use of the fork and wait system calls. We outline a tool that automatically generates process graphs for a class of C programs. The key idea behind our tool is to use a program's control flow graph (CFG) to determine its process graph.
In this paper, we present an animation developed in the Wolfram Mathematica System for the visualization of the m-convex hull of sets containing finitely many points on the Cartesian plane.
Now a days many people are doing online financial transactions. This transaction needs to be secure. There are various attacks present behind this. Phishing is one type of attack. For detecting this attack, various anti-phishing mechanisms are used. In phishing process, suppose cheater sends out thousands of phishing emails with a link to the fake website. Victims click on links in email believing...
This paper introduces a classification scheme for the visual classification of cyber attacks. Through the use of the scheme, the impact of various cyber attacks throughout the history of South Africa are investigated and classified. The goal of this paper is to introduce a classification scheme that arranges attacks into different classes and sub-classes, which is presented visually. To enhance the...
Phishing refers to cybercrime that use social engineering and technical subterfuge techniques to fool online users into revealing sensitive information such as username, password, bank account number or social security number. In this paper, we propose a novel solution to defend zero-day phishing attacks. Our proposed approach is a combination of white list and visual similarity based techniques....
Illustrators who have some drawing experience can sometimes draw an ideal stroke repeatedly. However, they cannot always reproduce an ideal stroke that they have drawn, because they do not understand how they moved their own hands while drawing it. Therefore we proposed a new drawing learning support system based on present- ing the ideal stroke motion of the learners (past brilliant learner- self...
People in ICT domain must prepare some environmental changes based on Operating systems and Programming languages. Instructors and learners of higher education, for example, sometimes face unfortunately drastic changes where their educational tools can not work correctly nor suitably although they were exactly working at the previous environments. This paper describes one of such an environmental...
We present stego-marbling-texture, a new and unique texture design method which allows users to deliver personalized messages with beautiful marbling textures. Our approach is inspired by the success of the recent work on modeling traditional marbling operations as mathematical functions. The encrypter transforms an input image or a text message into an intricate marbling pattern using marbling operations...
Other than visual information, perceptions through tactile senses play a very important role in perceiving product quality and thus in choice making for product purchase by consumers. Presently, it is felt by marketing research people that there is always a need of satisfying tactile perception of the targeted buyers for increasing sale. Since it is still not feasible to have direct perception of...
The Q-matrix representation of a large network graph is a transformation yielding meaningful visualizations which can reveal internal structure, help classify networks according to their application area, and in some cases distinguish and identify real networks from synthetically generated data. However, the issue remains whether computing the Q-matrix is prohibitively expensive for problem sizes...
Spain is one of the world-wide leaders in High Speed Railways, being the most vast in Europe and the second in the world. Other countries are interested in the technology developed by the Spanish Administrator in charge of the public Railways Infrastructure (ADIF). This paper describes the work carried out during more than fifteen years between CALPE team, a multidisciplinary research group of civil...
There is a growing interest in using serious games to uncover personality traits of people for job assessment. The disadvantage of the old paper questionnaires and interviews is the risk of giving socially desirable answers. Accommodating assessment in a game can provide a richer, less repetitive and more immersive context in which players might act more natural and intuitive. In order to design games...
The paper describes the proposition for a novel method aiming to computer-aided mental flexibility training. The method is based on the use of visual illusions in the information feedback loop in combination with the use of non-invasive brain-computer interaction methods to materialize objective visual perceptions. The paper reports the experimental training bench and some preliminary results.
The method and the device for a contactless exploring of distributions of an electric charge under an act of the infrared radiation is described, allowing to study kinetics processes with follow-on visualization on a shield of an oscillograph and an opportunity of a treatment by means of the computer.
According to the problem of graph cuts matching algorithm that lots of false matches appears in weak texture area, an improved graph cuts matching algorithm for dense matching is proposed in this paper. First, corner point detection and matching are made between stereo image pairs, and false matches are eliminated by relaxation algorithm and LMeds algorithm. Secondly, triangulate partitioning of discrete...
This paper describes the design, development and user study of a text-to-speech system for reviewing email messages. The system retrieves messages, converts them to audio files, and facilitates transferring the messages to a portable listening device. This study reviews the efficacy of such a system and compares the users' ability to comprehend spoken audio messages verses written messages. According...
A common problem in many user studies is gathering natural user behavior unintrusively over a long period of time. We describe a methodology for conducting passive longitudinal studies, where the participant is able to go about their daily routine without taking any disruptive action such as writing a diary entry or responding to an interruption. Although passive user observations have been done through...
We present StreamLiner, originally developed as an interactive `focus+context' tool for visualizing biologists' laboratory notebooks and other time-based activities, both online and off-line. We describe how to adapt StreamLiner as a teaching tool for biology students: Streamliner provides a unified way to visualize any type of stream, including the course calendar (lectures, labs, homework, exams),...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.