this paper addresses and resolves an interesting question concerning the reason for anthropomorphic user interface feedback being more effective (in two of three contexts) and preferred by users compared to an equival...
详细信息
ISBN:
(纸本)9728865198
this paper addresses and resolves an interesting question concerning the reason for anthropomorphic user interface feedback being more effective (in two of three contexts) and preferred by users compared to an equivalent non-anthropomorphic feedback. Firstly the paper will summarise the author's three internationally published experiments and results. these will show statistically significant results indicating that in two of the three contexts anthropomorphic user interface feedback is more effective and preferred by users. Secondly some of the famous work by Reeves and Nass will be introduced. this basically shows that humans behave in a social manner towards computers through a user interface. thirdly the reasons for the obtained results by the author are inextricably linked to the work of Reeves and Nass. It can be seen that the performance results and preferences are due to the subconscious social behaviour of humans towards computers through a user interface. the conclusions reported in this paper are of significance to user interface designers as they allow one to design interfaces which match more closely our human characteristics. these in turn would enhance the profits of a software house.
Project-based learning (PBL) is one of the most interesting instructional strategies in the field of technical and signal processing systems. However it is especially complex and difficult to implement when applied to...
详细信息
Project-based learning (PBL) is one of the most interesting instructional strategies in the field of technical and signal processing systems. However it is especially complex and difficult to implement when applied to laboratory courses with a high student-to-faculty ratio. In this paper, we describe our six-year experience of teaching laboratory courses in electronics in the telecommunication engineering studies (a career that is a mixture of computer science and electronics engineering) after the adoption of the PBL philosophy, and the design and implementation of several strategies and tools to ease the administrative, teaching and learning tasks in these laboratories. Finally, we offer some evaluation results, showing that the adoption and combination of all our strategies and software tools actually works. Boththe laboratory acceptance of the students (3.7 on a 1-5 scale) and students performance are high (they get 78.3% of the maximum grade, on average)
High-bandwidth traffic aggregates may occur during times of flooding-based distributed denial-of-service attacks or flash crowds. Congestion control of these traffic aggregates is important to avoid congestion collaps...
详细信息
High-bandwidth traffic aggregates may occur during times of flooding-based distributed denial-of-service attacks or flash crowds. Congestion control of these traffic aggregates is important to avoid congestion collapse of network services. this paper presents a class of feedback-control algorithms that proactively protect a network server from overload by installing rate throttles in a set of upstream routers. A control-theoretical framework is proposed to optimize the control setting such that throttling can be achieved in a distributed and fair manner. We develop control-theoretic algorithms that (1) are highly adaptive by avoiding the configuration of unnecessary control parameters, (2) provide max-min fairness for any number of throttling routers, (3) respond very quickly to network changes, (4) are extremely robust against extrinsic factors beyond the system control, and (5) are stable under given delay bounds.
One of the most important steps in traditional digital circuit design is the reduction of the Boolean expression that describes the particular circuit design. An important tool to achieve the above is the Karnaugh-Vie...
详细信息
One of the most important steps in traditional digital circuit design is the reduction of the Boolean expression that describes the particular circuit design. An important tool to achieve the above is the Karnaugh-Vieth maps method. this method has been used for electronic engineering students. It gives a simple graphic layout that leads to a drastic reduction (although not exhaustive) for the final expression of moderate designs. One of the most important drawbacks of this method appears when there are more than 5 Boolean design variables. Here, the designed map becomes complex and susceptible to design errors. the present paper describes two simple and powerful methods for Boolean functions simplification for 5 or more variables: the variable entered maps (VEM) and the miniterms ring map (McCalla (1994)). A comparison between two mapping methods is also presented Finally, the importance of the use VEM and RMM in electronics engineering programs as tools for a previous step to learning, before taking or teaching advanced courses, where complex systems can be simplified, is shown.
In this study, the LAPSs (light addressable potentiometric sensors) which have devices of Si/sub 3/N/sub 4//SiO/sub 2//Si, Ta/sub 2/O/sub 5//SiO/sub 2//Si structure were fabricated. Also, it was investigated the respo...
详细信息
ISBN:
(纸本)0780389948
In this study, the LAPSs (light addressable potentiometric sensors) which have devices of Si/sub 3/N/sub 4//SiO/sub 2//Si, Ta/sub 2/O/sub 5//SiO/sub 2//Si structure were fabricated. Also, it was investigated the response characteristics to penicillin concentration and detected the 2D images of 128 /spl times/ 128 pixels. the penicillinase was immobilized on the devices to hydrolyze the penicillin using self-assembled monolayer (SAM) method. the measuring system was simplified by using Lab VIEW software. the result of the enzyme reaction, the sensitivity of the sensor which has Si/sub 3/N/sub 4/ surfaces was 60 mV/decade and Ta/sub 2/O/sub 5/ surfaces was 74 mV/decade in the range of 0.1 mM /spl sim/ 10 mM of the penicillin concentration. Image detecting time by an enzyme reaction between penicillin and penicillinase took about 10 minutes at 128 /spl times/ 128 pixels in 1 /spl times/ 1 cm sensing area.
One of the key elements in describing a software development method is the roles that are assigned to the members of the software team. this article describes our experience in assigning roles to students who are invo...
详细信息
ISBN:
(纸本)3540221379
One of the key elements in describing a software development method is the roles that are assigned to the members of the software team. this article describes our experience in assigning roles to students who are involved in the development of software projects, working in Extreme Programming teams. this experience, which is based on 25 such projects, teaches us that a personal role for each teammate increases personal responsibility while maintaining the essence of the software development method. In this paper we discuss ways in which different software development methods address the place of roles in a software development team. We also share our experience in refining role specifications and suggest a way to achieve and measure progress by using the perspective of the different roles.
As with to other agile methods, which value "Individuals and interactions over processes and tools" (http://***/), Extreme Programming (XP) cares about the interaction among the people involved in software d...
详细信息
ISBN:
(纸本)3540221379
As with to other agile methods, which value "Individuals and interactions over processes and tools" (http://***/), Extreme Programming (XP) cares about the interaction among the people involved in software development processes. the four XP values and its twelve practices inspire this feeling as well. Accordingly, and not surprisingly, in a course that we teach about human aspects of softwareengineering and in a book that we are writing about the topic [7], we find it illuminating to highlight human aspects of softwareengineering incorporated in XP. this article gathers these illuminations into one place.
ECSAM is a requirements engineering and modeling method for computer-based systems (CBS). It is practiced and enhanced since 1980 by large numbers of systems and software engineers. ECSAM was developed in part at Isra...
详细信息
ISBN:
(纸本)0769521258
ECSAM is a requirements engineering and modeling method for computer-based systems (CBS). It is practiced and enhanced since 1980 by large numbers of systems and software engineers. ECSAM was developed in part at israel Aircraft Industries for the analysis and design of complex reactive embedded systems and software. ECSAM guides the developers in systematic analysis and modeling of systems being developed and describing those using three consistent views;its conceptual architecture, operating modes, and system's capabilities. Each capability is further analyzed and described as a dynamic process. Using ECSAM it is possible to generate systematically the system's use cases and the resulting operational scenarios. the modeling technique is applicable in the analysis of systems and any level of subsystems. the method guides the developer in the derivation of the system requirements and their systematic allocation to and association withthe model's elements at the respective levels. ECSAM was the prime motive for the development of the Statecharts technology developed by Prof. David Harel as part of the method. the paper provides an overview of the ECSAM method, which is described in detail in a book that will be published in 2004 [1].
the main objective of this paper is the analysis of the possibilities of overcoming barriers to the implementation of integrated systems withthe use of specialised software supporting the implementation process (mode...
详细信息
ISBN:
(纸本)3540240888
the main objective of this paper is the analysis of the possibilities of overcoming barriers to the implementation of integrated systems withthe use of specialised software supporting the implementation process (modelers and constructors) and the use of reference models in integrated systems. Firstly, the basic implementation problems are identified. Subsequently, we shall move on to discuss the possible steps to overcoming these barriers withthe use of I-CASE tools and knowledge contained in reference models, and the concept of a knowledge management system supporting this process.
Until recently, integration of enterprise systems has been supported largely by monolithic architectures. From a technical perspective, this approach has been challenged by the suggestion of component-based enterprise...
详细信息
ISBN:
(纸本)3540238948
Until recently, integration of enterprise systems has been supported largely by monolithic architectures. From a technical perspective, this approach has been challenged by the suggestion of component-based enterprise systems. Lately, the nature of software as proprietary item has been questioned through the increased use of open source software in business computing in general. this suggests the potential for altered technological and commercial constellations for the design of enterprise systems, which are presented in four scenarios.
暂无评论