The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The parallel composition of labeledtransition systems (LTSs) is widely used for modeling and analyzing concurrent systems. This paper reveals some new language properties of composite LTSs based on the existing results.
In work the approach to semantic representation in machine translation of a natural language with use of the augmented attribute grammar offered by the example of the Kazakh language as initial. The essence of the offered approach consists in creation for each sentence of initial (Kazakh) language a ontology, which is used for formation of the text of the sentence of target (Russian, English) language...
Conceptual change is often approached with a concrete epistemology in which students must replace their misconceptions with correct conceptions. Drawing upon the literature and our research, we propose that we need a new, discursive epistemology that describes conceptual change as language acquisition.
In this paper we consider unambiguity of languages as an extension of codes. We introduce a new classification of languages based on a type of unambiguity that is closely related to codes. A necessary and sufficient condition for a language to have finite unambiguous degree is established, and an application of unambiguous languages in the area of cryptography is introduced.
Computer software succeeds -- When it meets the needs of the people who use it, when it performs flawlessly over a long period of time, when it is easy to modify and even easier to use-it can does change things for the better. But When software fails-When its users are dissatisfied, When it is error prone, When it is difficult to change and even harder to use -- bad things can and do happen. Generally...
From the viewpoints of information theory and system theory, an Information Optimizing Model is proposed based on following rules of language: efficiency, cooperation, distinction, evolution, and reliability. It proposes that language is an optimal encoding system to communicate in the most efficient way. Using this model, a hypothesis is made that when expressing the same meaning using a sentence,...
Application specific processors as part of systems-on-a-chip (SoCs) have become increasingly popular in recent years. The need for efficient development of such processors raises the demand for simple and reliable tools and respective specification languages. This paper presents the Versatile Instruction Set Architecture Description Language (ViDL), to formally define (application specific) instruction...
The semantics and syntax of IDEF1X, a language used to represent a conceptual schema, are described. Two styles of IDEF1X model are described. 1. The key style is used to produce information models that represent the structure and semantics of data within an enterprise and is backward-compatible with the US government's Federal Information Processing Standard (FIPS) PUB 184, Integration Definition...
The paper brings up some problems of teaching programming in universities. Aspects of understanding the specificity of programming as an academic course, its links to a variety of related courses are presented. The discourse points to some difficulties that students have while learning programming and instructors have while teaching it, especially such problems as translating tasks from the language...
The algorithm pertains to creation of a middle level message transmission mechanism between the highly sophisticated encryption technique and the messages transmitted by phonetic alphabet codes. The algorithm suggests two levels in the language with each level varying in complexity and advantages.
The common universal marketplace is contributing to the rapid globalization of higher education and those institutions offering internationalized undergraduate courses stand better chances of producing globally well-prepared graduates.
Researchers have widely studied how information diffuses in Twitter and have often done so by modeling the social-networking site as a communication graph in which tweets spread depending on its nodes' graph properties (e.g., degree, centrality). The resulting models are tractable but make a crucial assumption: that the human being behind an account is a node and that, consequently, human expression...
This paper presents a tool for analysing quantified information flow (QIF) for programs written in a core imperative language. The intended application is measuring leakage of secrets. The tool can provide either exact leakage or an upper bound depending on the trade off chosen by the user between exactitude and computation speed. Approximations are created via abstractions derived from partitions...
Having a single structure for representing test program data is the cornerstone for a common architecture of a modular system that includes test program development, test program data collection, test program execution, collection of runtime data and interaction with intelligent sequencers. A common open markup language leads to common tools for data collection, test program editing, and a common...
An important question is how to determine if a person is exhibiting suicidal tendencies in behavior, speech, or writing. This paper demonstrates a method of analyzing written material to determine whether or not a person is suicidal. The method involves an analysis of word frequencies that are used in a fuzzy cognitive map. The fuzzy cognitive map determines if there are suicidal tendencies. The method...
Nowadays, numerous teachers are using Technology Enhanced Learning systems in various domains. The tracks analysis concerning students' actions logged by Technology Enhanced Learning systems can help teachers to improve their pedagogical scenarios making them more relevant to students. Very often analysis solutions are developed ad hoc and without considering the teachers observational needs. In our...
Some persons can't speak and can't use sign language because they have motion and speech disabilities. This paper describes an aided augmentative and alternative communication computational system to enhance the ability of these disabled persons to communicate. The user can create sentences just by moving his head to select symbols displayed in a monitor. Then, the prototype validates the sentences...
This study examined the perception of Malaysian secondary school teachers on the implementation of the national policy on teaching Mathematics and Science in English which was introduced in 2003 and reversed in 2009. A total of 14 public secondary schools were randomly selected using the stratification technique throughout the nation. It was further stratified based on Math and Science teachers and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.