The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A novel approach to design capacity-approaching variable-length constrained sequence codes has recently been developed. A critical step in this design process is the construction of minimal sets based on a finite state machine description of the encoders. In this paper we propose three generalized criteria to select the state that will result in construction of the minimal set with the best achievable...
The problems of subspace coding of large cardinality are considered. The main most interesting results which were published to this time are presented. A few directions of the development of this scientific area are mentioned. One of the direction was stated by Koetter, Kschischang and Silva and simultaneously was continued by Gabidulin and Bossert. It is based on so called lifting constructions of...
We introduce multi-phase project planning (MPPP) as the problem of finding an executable sequence of sets of actions to achieve all hard subgoals of all milestones and achieve hard and soft subgoals optimally, using fully-specified initial state, milestones and their subgoals, preconditions and effects of operators, rewards and penalties associated achievement and cancellation of soft subgoals, rewards...
Highly technical STEM MOOCs have recently become widely available, but little is known about the motivations of the various groups of learners participating. In this work, we perform a detailed survey of 1,624 learners to examine their motivations in detail. These learners exhibited overall high levels of intrinsic motivation, but varied in their extrinsic motivation, according to their current position...
In a technology-fueled world, coding is an essential skill for young people. MOOCs (Massive Open Online Courses), which are free online courses available to a very large number of people, are an effective and increasingly popular option for teaching scientific topics to a worldwide audience. However, despite the large number of MOOCs available on computer science, there is a scarcity of coding-related...
This paper gives the performance study of a cascaded diamond network. A route that provides the maximum of minimum value of available SNRs of all paths is elected. At first, the cumulative distribution function (CDF) of the overall SNR of the considered system is found. By using the derived CDF, the outage probability, coding and diversity gain of the considered system are derived. Later, ergodic...
In this paper, we consider some educational aspects related to mathability. Our main goal is to approach an answer to the question what are computer assisted ways to assimilate mathematical knowledge and possess mathematical abilities.
As the rapid development of the Internet of Things (IoT), communication between object, device and machine becomes a popular topic. The application of barcode has become an irreplaceable technique in the field, which provides a new way to embed various information such as hyperlink and text. In this paper, we present a novel voice-based 2D barcode system, which directly embeds voice into a barcode...
During the 1940s John Atanasoff with the help of one of his students Clifford E. Berry, in Iowa State College, created the ABC (Atanasoff-Berry Computer) that was the first electronic digital computer. The ABC computer was not a general-purpose one, but still, it was the first to implement three of the most important ideas used in computers nowadays: binary data representation; using electronics instead...
We describe the design and a trial run of an integrated course of instruction in reading, writing, and computer programming, in order to assess potential synergies of learning them together. Twelve pre-teen students diagnosed with dyslexia each took a sequence of lessons of approximately 90 minutes each over a 3-month period. In addition to computer learning activities in handwriting, word reading,...
We consider the problem of finding the capacity of noisy networks under the presence of Byzantine adversaries, modeled by a joint compound channel and arbitrarily varying channel (AVC) model. This extends our earlier work which considers these models only in isolation. The motivation for this setup is that typically the adversary first selects an arbitrary subset of edges from the network and then...
APT(Advanced Persistent Threat) attacks that cause unauthorized transfer of sensitive information from the targeted organization are serious threats. The attackers in APT attacks use RAT(Remote Access Trojan or Remote Administration Tool)s to take the control of the victim's computer. The attackers in APT attacks occasionally use malicious document files to camouflage themselves. If a RAT is embedded...
In this paper, we describe our process for designing the DePaul Hour of Code event, a free, annual event hosted at DePaul University. The four-day event was designed to 1) engage underrepresented youth in computing activities, 2) identify unseen barriers to participation, and 3) explore ways to reduce structural barriers to participation. We share our design process, lessons learned, and recommendations...
Recent technological advancement in mobile technologies had changed the learning process for urban poor group in Malaysia. However, the main problem is lacking of understanding of the factors that drive urban poor to use m-learning. Thus, the main objectives of this exploratory research are (i) to identify the factors that drive urban poor to use m-learning and (ii) to provide recommendations to improve...
Many works have been done for secure computation of functions. Most of them assume computation on computers. The protocols are difficult for the people who has no knowledge on cryptography. Therefore, secure computation using cards was considered. Since nothing other than the cards are used, the protocols are easy to understand for the people who has no knowledge on cryptography. This paper presents...
Former literature reviews or research syntheses on digital game-based learning have provided important results, but little is known about the use of digital games in specific learning domains, with language education being one fertile area for additional research. While the use of digital games for educational purposes varies in different contexts, understanding the emerging trends of how digital...
Meta-analysis is a quantitative research method for synthesizing research results. This paper explores the application of meta-analysis in educational technology research from 2000. A total of 37 articles from 14 SSCI journals were selected and analyzed with the basic information of the articles, including the publication year and type of cooperation. Then, the moderator variables, such as grade level,...
Gamification and in particular game-based learning is significantly gaining ground during the latest decades. It expresses a different approach to education that is mixing education with gaming, aiming to enhance the learning experience with game mechanics and rules and to provide stronger motivations for lifelong learning. Many works have illustrated the benefits of learning while playing. This work...
There is high need for data encryption. Accordingly, there are several techniques to encrypt and encode data. Unicode has become a unified global coding system. The special feature of Unicode system is that it can be expanded and it is adopted by many computer fonts' ready-package programs. This research work uses FontCreator program, which adopts unified global coding system, to generate computer...
The ability of the Arduino platform to enhance student interest and performance in science, technology, engineering, and mathematics (STEM) courses, while fostering skills that are important prerequisites for future IT careers, has been proven more than once in the past years. But can the future be crafted without the past? We believe that many past inventions crave the future, so their understanding...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.