The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper deals with the intrinsic image decomposition problem, a long-standing ill-posed problem that decomposes an input image into shading and reflectance ones. Based on the observation that colors in the scene are usually dominated by a set of representative material colors, we sample material colors in the scene and recover a set of dominant material colors through a voting scheme. With this...
The aim of this research is to analyse the learning habit of the undergraduate mechanical engineering students in the second semester and compare it within the last five years. My personal experience shows the big part of the students until the present period do not have learned the teaching material week in week out and just have visited the presentations or simply stayed at home. The situation is...
According to reliable online sources for Africa, access to the internet in 2011 was 16%, and there were 600 million Africans without access to electricity. Yet there are very few low-tech initiatives aimed at bridging this e-learning divide. One such initiative, for Nigeria, was funded by the Commonwealth of Learning in 2011/12: the use of audiovision for in-service teacher training. Audiovision (a...
This paper builds on work previously published as best paper at CSEDU 2013 [1], which describes the motivation gap between the teacher's view of student motivation and their actual motivation. As a result of this mismatch, the gamified Software Engineering course under observation [2], did not appeal to the students in the expected way. Our findings give rise to a number of design criteria for e-Learning...
This paper describes the setup for a gamified classroom for the subject of Software Engineering. A series of papers have resulted from this work: “Understanding Student Motivation” at CSEDU 2013 [1] and “Bridging the Motivation Gap”, an IGIP SPEED Young Scientist award paper here at ICL 2013 [2]. The intention behind gamifying the course was to increase student engagement and motivation by allowing...
The design of learner-centered guided in-service program for technical teacher education has been launched at Estonian Centre for Engineering Pedagogy at Tallinn University of Technology. The aim of the designed program has been facilitating the initial in-service teaching experience, involving mentoring, peer support and cognitive apprenticeship. The emphasis has been on teaching for knowledge application,...
Every student arrives with full digital competency from secondary school to higher education. Is it a true statement? Teachers and professors in higher education expect that according to the National Curricula, students start to learn ICT - info-communication technology - in primary school and improve them in secondary education. It would be a theoretical situation but the reality is totally different...
In our present work, we study and compare two Hungarian regions, from the viewpoint of complexity and self-assembly. In the size-order log-log diagram, we can observe two linear sections. There are two types of linear sections, which are corresponds to the two types of driving forces. We study, how the talents of the two regions in the diagrams appear and what do they mean from the viewpoint of driving...
This paper deals with the e-application (plug-in) designed for the online course where individual learning preferences were reflected. The content is structured in several parts: (1) introduction to the learning styles theory, (2) research objective and design, including the Johnston's concept, (3) plug-in description and implementation in the course and (4) feedback collected from the course participants...
At present hardly anybody can do without the use of information and communication technologies (ICT). They have undoubtedly penetrated in all spheres of human life, including education. Thus, the purpose of this article is to discuss to what extent and in what ways ICT have altered traditional teaching practices. This is done by examining both positive and negative outcomes of ICT exploitation in...
With technologies shrinking and design complexity increasing, it becomes crucial that embedded in chip test and repair solutions keep up with the advances in order to consistently provide superior chip quality and yield optimization. The embedded test approaches developed for designs done a few years ago are not sufficient for today's designs, which are bigger, faster, hierarchical and much more sensitive...
The gossip problem (telephone problem) is an information dissemination problem in which each the of n nodes of communication network has a unique piece of information that should be transmitted to all other nodes using two-way communications (telephone calls) between the pairs of nodes. During a call between the given two nodes, they exchange the whole information known to them at that moment. In...
Some semantics of the predicate formulas in the framework of the symmetric constructive logic [1] is defined. The following theorems are proved: (1) any predicate formula deducible in the symmetric constructive predicate calculus is identically true in the sense of the introduced semantics; (2) some predicate formulas not deducible in the mentioned calculus are not identically true in the sense of...
This paper proposes a decomposition of generic software security problems, mapping them to smaller problems of static and dynamic binary code analysis.
In this paper, the problems of detection of unauthorized changes to the content of a digital image, determination of distorted parts and partial recovering of the content from the damaged parts, are considered. most types of image tampering are based on the well known operations of Copy-Paste, Copy-Move or their combinations. In many investigations the basic approach for tamper detection is based...
An edge-coloring of a graph G with colors 1, …, t is an interval t-coloring if all colors are used, and the colors of edges incident to each vertex of G are distinct and form an interval of integers. A graph G is interval colorable if it has an interval t-coloring for some positive integer t. In this paper we prove that K1, m, n is interval colorable if and only if gcd(m+1, n + 1) = 1, where gcd(m+1,...
The possibility of the formalization of chess high level subjective concepts, such as: "beautiful mate", "unexpected move" and others is considered. To analyze these concepts the mathematical apparatus of fuzzy sets is applied and an acceptable correlation between computer and humans estimations of the "beautiful mate" for certain positions is demonstrated.
We treat the problem of inversion of an element in GF(2n). Our approach is based on representation of this inversion in the form of an appropriate determinant (Hankel polynomial) and further its computation with the aid of suggested recursive procedure.
A quick power consumption estimation method for designs generated by RTL compilers which is based on linear and polynomial interpolation is proposed. The method is applied to in industrial RTL compilers. The maximum achieved estimation error is 10%.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.