The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper we will present a case study and an analysis conducted to evaluate the use of lecture learning as a helpful companion to the classical teaching. This effort is done around the Opencast Matterhorn software, a system that is able to record classroom presentations and publish them on a LMS automatically, without the intervention of a technician dedicated to it. So we delivered a university-wide...
In this paper, we propose an explicit signaling of RDPCM scheme for a lossy intra-coded block, and achieve a significant coding gain over the HEVC Range Extension reference software in the screen contents coding. We define three RDPCM modes, and transmit the side information so that the best RDPCM mode can be applied to residual signals after all available angular directional predictions. Contexts...
The use of educational software in teaching and learning Science, Mathematics and English are encouraged among teachers. The Ministry of Education (MOE) has provided teachers with a variety of software to achieve the objectives and goals of teaching and learning Science, Mathematics and English and also helped students to master Mathematics and Science concepts easily. The purpose of this study was...
Mutation testing is widely used in experiments. Some papers experiment with mutation directly, while others use it to introduce faults to measure the effectiveness of tests created by other methods. There is some random variation in the mutation score depending on the specific test values used. When generating tests to use in experiments, a common, although not universal practice, is to generate multiple...
Information Security Awareness (ISA) is a considerable break in the wall of information security. People may show different level of awareness for security threats based on their knowledge, behaviour and culture. In Saudi, studies showed that employees are less aware to security risks due to lack of knowledge and the demanded culture. This paper presents the influence of students' knowledge on their...
The exam is an important part of the process of teaching, tests and feedbacks are important teaching management tool. Comprehensive quality evaluation and analysis is an integral way for teaching effect feedbacks, the results can provide feedbacks for teaching to help teachers understand students' environment better and learn to improve teaching methods. However the analysis process is burdensome...
To improve the efficiency of localization technique, a parameter combination approach to direct multiple faults localization is proposed in this paper. We consider bisection methods as clustering rules to partition failed test cases into smaller fault-focused clusters with different kinds of combinations. Correlation coefficient can be a tolerance to accept or reject that one cluster aims at specific...
Nowadays, many software organizations rely on automatic problem reporting tools to collect crash reports directly from users' environments. These crash reports are later grouped together into crash types. Usually, developers prioritize crash types based on the number of crash reports and file bugs for the top crash types. Because a bug can trigger a crash in different usage scenarios, different crash...
In already published joint papers written by the Rheinischen Fachhochschule Köln - University of to Applied Sciences and the University of Rijeka the reasons for the intellectual fraud were analyzed. This study about the intellectual fraud becomes extended by inclusion of other international partners which are contributing to the study by including the own national and organizational view to the subject...
The interface design of software used on Home Appliances targeted at satisfying passenger's physiology and psychological needs when operating the machine to the maximum extent is a complicated synthetic topic which embracing ergonomics, visual communication design, user experience design, behavior psychology, cultural studies of the consumer, optics and Chromatics and so on. So, it is very difficult...
Risk correlation is an important topic in software development. This study applied meta-analysis to both collect risk checklists and compose a natural language description set of 1932 sentences. Co-word analysis was performed to obtain a word co-occurrence matrix. The correlation network features were then analyzed in the form of a social network. Characters including density, centrality, distance...
The rapid development in information technology has enabled students to learn computer in different levels of education, however problems arose not only in students' computer learning, but in the course connection between computer courses in secondary and tertiary education. This paper reports on results of comparisons, survey and interviews relating to computer education in different educational...
The authors analyzed 2500 communication activities of student teams engaged in global software development projects during an 18 month period to determine the temporal behavior of students engaged in distributed group activities. The data revealed a number of daily, weekly, and project regularities, which provide insights into how distributed teams use their time. The results from this study show...
Traditional methods of generating test data may result in redundancy of test data, which brings many troubles to software testing. In order to solve the redundancy of test data, this study proposed a novel approach of generating test data by reducing target statements based on dominant relations. First, basic concepts and principles concerning dominance are listed. Then, an approach is proposed to...
This study employs cooperative learning to create an Educational Board Game Design Course. The curriculum of activities required pre-service teachers to work cooperatively in learning-groups to complete a prototype of a board game. Group discussion via an Online Interactive Platform supported the process of the participants as they carried out the curriculum of activities. A questionnaire enabled...
Differentiated instruction in the form of tiered take-home lab exercises was implemented for students of an undergraduate-level programming course. This paper attempts to uncover the perceptions and usage patterns of students toward these new lab exercises using a comprehensive survey. Findings reveal that these tiered exercises are generally very well received and preferred over their traditional...
Trust plays an important role in software usage. It helps users overcome perceptions of uncertainty and risk and engages in trust behaviors. In this position paper, we propose using the trust behavior as a main characteristic to provide software recommendations. We explore a model of trust behavior that contains three root constructs: using behavior, reflection behavior and correlation behavior. The...
A number of languages have short vowels using smaller acoustic space, hence more centralized, as compared to long vowels which are also known to be peripheral vowels using a larger acoustic space. Such a phenomenon is attested in Hindi, English and several other languages including Japanese and Korean. This is a spectrographic study of all the 18 vowels of Thai in comparison with all the ten vowels...
To find effective estimations of tail dependence, we present the estimators of upper tail dependence coefficient by using survival copula. We research to two problems by using the samples from t-copula. Firstly, do the estimators estimate effectively the upper tail dependence coefficients of copula? Which is the best among the estimators? Secondly, if sample isn't from true distribution, do the estimators...
This paper puts forward a new method (Cost Assessment of the inter-Project Dependence with Correlation Right algorithm) for quantitative analysis to the dependence of inter-project. It is a good guide for the project development and implementation. It can make a great help for program designer, programmer, and program users to analyze the special project. It provides a quantitative value; and with...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.