computing curricula are being developed for elementary school classrooms, yet research evidence is scant for learning trajectories that drive curricular decisions about what topics should be addressed at each grade le...
详细信息
ISBN:
(纸本)9781450349680
computing curricula are being developed for elementary school classrooms, yet research evidence is scant for learning trajectories that drive curricular decisions about what topics should be addressed at each grade level, at what depth, and in what order. this study presents learning trajectories based on an in-depth review of over 100 scholarly articles in computer science education research. We present three levels of results. First, we present the characteristics of the 600+ learning goals and their research context that affected the learning trajectory creation process. Second, we describe our first three learning trajectories (Sequence, Repetition, and Conditionals), and the relationship between the learning goals and the resulting trajectories. Finally, we discuss the ways in which assumptions about the context (mathematics) and language (e.g., Scratch) directly influenced the trajectories.
the proceedings contain 55 papers. the special focus in this conference is on Active, Real-Time, Robot Vision, Segmentation, Vision systems Engineering, Evaluation and Calibration. the topics include: Partitioned samp...
ISBN:
(纸本)3540676864
the proceedings contain 55 papers. the special focus in this conference is on Active, Real-Time, Robot Vision, Segmentation, Vision systems Engineering, Evaluation and Calibration. the topics include: Partitioned sampling, articulated objects, and interface-quality hand tracking;real-time tracking of multiple articulated structures in multiple views;vision-based guidance and control of robots in projective space;image segmentation by nonparametric clustering based on the kolmogorov-Smirnov distance;Euclidean group invariant computation of stochastic completion fields using shiftable-twistable functions;bootstrap initialization of nonparametric texture models for tracking;tracking discontinuous motion using Bayesian inference;direction control for an active docking behaviour based on the rotational component of log-polar optic flow;the construction of 3 dimensional models using an active vision system;coupled geodesic active regions for image segmentation;level lines as global minimizers of energy functionals in image segmentation;a probabilistic interpretation of the saliency network;layer extraction with a Bayesian model of shapes;statistical foreground modelling for object localisation;nautical scene segmentation using variable size image windows and feature space reclustering;on the performance characterisation of image segmentation algorithms;statistical significance as an aid to system performance evaluation;a unifying theory for central panoramic systems and practical applications;binocular self-alignment and calibration from planar scenes;hand-eye calibration from image derivatives;a physically-based statistical deformable model for brain image analysis;minimal paths in 3d images and application to virtual endoscopy and calibration of a moving camera using a planar pattern.
A significant aspect of design science research is ensuring that the artifact meets the specified requirements, that is, evaluation. the literature indicates that a series of tests have been done to evaluate RFID syst...
详细信息
A significant aspect of design science research is ensuring that the artifact meets the specified requirements, that is, evaluation. the literature indicates that a series of tests have been done to evaluate RFID systems in the supply chain. However a paucity of data exists on RFID Library system. the purpose of this research is to evaluate the performance of the RFID artifact in its operating environment and compare the results to vendors' specification. this paper will apply a design science approach to the evaluation of the artifact and develop test metrics based on the literature. the factors examined include tag location, reader orientation sensitivity, read distance, metal and electromagnetic interference. the findings of this study will be helpful to library practitioners in understanding the behavior of RFID system in a library setting and provide suggestions for best practices.
E-Gov is a multidisciplinazy field which addresses many issues ranging from the social sciences to the technological ones. One of the big challenges is the underlying complexity to elicit and model requirements. In pr...
详细信息
E-Gov is a multidisciplinazy field which addresses many issues ranging from the social sciences to the technological ones. One of the big challenges is the underlying complexity to elicit and model requirements. In practice it is quite hard to encompass the requirements of all citizens or organisations involved in the project. To deal withthis challenge we propose a flexible distributed systems approach, which allies tailoring concepts to Organisational Semiotics methods in a SOA based architecture. It is based on two Organisational Semiotics methods: the Semantic Analysis, which delivers a stable ontology of the context, and the Norm Analysis, that can be used to speci1,' the volatile individual and collective requirements. the paper shows how norms changes in high level interfaces can have effect on different components of the software architecture. the architecture is experimented in a proof of concept for an e-Gov project.
An optical outer product architecture is presented which performs residue arithmetic operations via position-coded look-up tables. the architecture can implement arbitrary integer- valued functions of two independent ...
详细信息
ISBN:
(纸本)0819408689
An optical outer product architecture is presented which performs residue arithmetic operations via position-coded look-up tables. the architecture can implement arbitrary integer- valued functions of two independent variables in a single gate delay. the outer product configuration possesses spatial complexity (gate count) which grows linearly withthe size of the modulus, and therefore withthe system dynamic range, in contrast to traditional residue look-up tables which have quadratic growth in spatial complexity. the use of linear arrays of sources and modulators leads to power requirements that also grew linearly withthe size of the modulus. Design and demonstration of a proof-of-concept experiment are also presented.
the application of fashion technology systems and Artificial Intelligence (AI) implanted in Industrial Automation (IA), and Artificial Intelligence consciousness is a huge registration field for modern retail industri...
详细信息
We demonstrate that almost all non-parametric dimensionality reduction methods can be expressed by a simple procedure: regularized loss minimization plus singular value truncation. By distinguishing the role of the lo...
详细信息
ISBN:
(纸本)9781450312851
We demonstrate that almost all non-parametric dimensionality reduction methods can be expressed by a simple procedure: regularized loss minimization plus singular value truncation. By distinguishing the role of the loss and regularizer in such a process, we recover a factored perspective that reveals some gaps in the current literature. Beyond identifying a useful new loss for manifold unfolding, a key contribution is to derive new convex regularizers that combine distance maximization with rank reduction. these regularizers can be applied to any loss. Copyright 2012 by the author(s)/owner(s).
Software security metrics are measurements to assess security related imperfections (or perfections) introduced during software development. A number of security metrics have been proposed. However, all the perspectiv...
详细信息
ISBN:
(纸本)9781605580425
Software security metrics are measurements to assess security related imperfections (or perfections) introduced during software development. A number of security metrics have been proposed. However, all the perspectives of a software system have not been provided specific attention. While most security metrics evaluate software from a system-level perspective, it can also be useful to analyze defects at a lower level, i.e., at the source code level. To address this issue, we propose some code-level security metrics which can be used to suggest the level of security of a code segment. We provide guidelines about where and how these metrics can be used to improve source code structures. We have also conducted two case studies to demonstrate the applicability of the proposed metrics. Copyright 2008 ACM.
Multiple Access Edge computing (MEC) is a key driver in the development of 5G/6G networks for the provision of time-critical services. this is primarily due to the ability to compute and cache in close proximity to us...
详细信息
暂无评论