The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this work, the student performance in an introductory programming course given at the department of information technology at Uppsala University is analyzed. The results from the final exam are studied and the potential bimodality of the distribution is investigated. A questionnaire, answered by the students at the final exam, including study behavior and potential connections to the performance...
The growth of employment opportunities in the information technology sector and the shortage of well-trained professionals in this field are a recurring theme in recent years in both Europe and North America. In this sense, research studies that analyse the causes of the reduction of students who are interested in computer science mainly point to young people being unaware of the type of tasks computer...
Computational thinking, a problem solving method that uses computer science techniques, has recently become mainstream as many governments and major Internet companies are promoting programming skills among children. However, little is known about how programming affects other aspects of life beyond the acquired programming skills. In this regard, this paper summarizes the work done in the school...
A video is made up of frames. Generally few video processing applications demand to process each video frame one by one, but processing each frame consumes lot of video content summarization helps in improvising the processing speed for such applications. Key frames in video are considered for content summarization. Key frame is a frame in which there is a major change as compared to the previous...
Rapid growth in Information technology and Communication networking, have increased the inclination of professionals in storage and archival of multimedia-video data. Efficient and accurate retrieval of archived video data is essential need of many professional groups like researchers, analyst, journalist and historians. Textual metadata based video retrieval is intuitive and subject to human perception...
Outsourcing of data is increasing with the rapid growth of internet. There is every possibility that data reaches illegal hands. As a result, there is increase in illegal copying of data, piracy, illegal redistribution, forgery and theft. Watermarking technology is a solution for these challenges. It addresses the ownership problem. It deters illegal copying and protects copyright of data. Watermarking...
We investigate channel resolvability for the l-user multiple-access channel (MAC) with two different families of encoders. The first family consists of invertible extractors, while the second one consists of injective group homomorphisms, and was introduced by Hayashi for the point-to-point channel resolvability. The main benefit of these two families is to provide explicit low-complexity channel...
In 1994 the QED Manifesto described an ideal whereby mathematics is communicated via a computerized system in a fully formalized fashion complete with automatic proof checking and other derived tools facilitating profound improvements to the way mathematics is taught, the way new results are disseminated, and ultimately to how mathematics is practiced. Two decades later it is safe to say the dream...
The test module is a part of an educational-assessment system for simulation study of convolutional encoders and decoders in terms of noise which includes also the modules “Divide and search”, “Convolutional encoding and decoding”, “Determining the performance of convolutional encoders” and “Simulation study of cascaded convolutional encoders”. The software system was implemented using MATLAB 7 on...
We show how modern interactive verification tools can be used to prove complex properties of vote-counting software. Specifically, we give an ML implementation of a votecounting program for plurality voting; we give an encoding of this program into the higher-order logic of the HOL4 theorem prover; we give an encoding of the monotonicity property in the same higher-order logic; we then show how we...
Techniques used in text steganography are more difficult to develop, since there is less redundancy in text than other media, such as image, video and audio. A text hiding method using multiple-base encoding is proposed. The occurrence number of each word is counted and sorted in descending order, which is set as a base in the multiple-base notation system. Those unrepeated words are treated as a...
Scripts for computer-supported collaborative learning (CSCL scripts) usually provide just-in-time support for learners to engage in a meaningful collaborative learning process that eventually leads to domain-specific learning. In contrast, CSCL scripts are often criticized to hamper the naturally emerging processes in collaborative learning, and research about the effectiveness of CSCL scripts has...
The existing research of distributed provenance storage is at the preliminary stage. Most of the researchers are endeavor to improve the query efficiency of storage solution, whereas, very few people pay attention to the matching problem of provenance and data and the waste of storage space. Two aspects on the problem of provenance storage were proposed in this paper. First one is the relationship...
In this paper, we propose a new encoding method for converting an electroencephalogram (EEG) signal into binary sequences which use for supplying the random numbers. We focus on low-cost EEG signal since it can be used in real applications that require true random number generator, such as gaming, gambling, and some complex model simulations. Our encoding method uses fluctuations that lie in EEG data...
Software Cybernetics emphasises controlling software while Creative Computing emphasises being creative, in the whole software life cycle. It seems that they conflict each other. Nevertheless, controlling and being creative are almost the two most important aspects in software development and evolution. This paper discusses how best to combine these two aspects in improving software by proposing models...
According to Unicode theory, this paper introduced a solution for developing international software based on Unicode. Firstly, multi-language support software system concept and main characteristics was presented. Secondly, Unicode basic concept was given. Thirdly, several type of character encoding were discussed, includes SBCS (Single-Byte Character Set), MBCS (Multi-Byte Character Set), and Unicode...
We present an innovative scheme for performing pattern recognition in wireless sensor networks. It is based on the concept of a distributed computer that can alter itself to adjust to the user's needs. By emulating the distributed nature of biological computational devices and evenly spreading the computational and communication workload throughout the network, we will reduce energy consumption and...
Personal Software Process (PSP) is a structured framework which aims to improve overall performance of software engineers in an individual level. PSP practitioners need to extensively collect their development data using specially designed tools. However, all currently available tools have limitations such as disruption and unstructured documentation. These unfortunates could subsequently reduce potential...
A Bloom filter is a compact and randomized data structure popularly used for networking applications. A standard Bloom filter only answers yes/no questions about membership, but recent studies have improved it so that the value of a queried item can be returned, supporting multiple-set membership testing. In this paper, we design a new data structure for multiple-set membership testing, Bloom tree,...
Key-value (k-v) storage has been used as a crucial component for many network applications, such as social networks, online retailing, and cloud computing. Such storage usually provides support for operations on key-value pairs, and can be stored in memory to speed up responses to queries. So far, existing methods have been deterministic: they will faithfully return previously inserted key-value pairs...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.