332 resultados para Java programming language
Resumo:
In this research paper, we study a simple programming problem that only requires knowledge of variables and assignment statements, and yet we found that some early novice programmers had difficulty solving the problem. We also present data from think aloud studies which demonstrate the nature of those difficulties. We interpret our data within a neo-Piagetian framework which describes cognitive developmental stages through which students pass as they learn to program. We describe in detail think aloud sessions with novices who reason at the neo-Piagetian preoperational level. Those students exhibit two problems. First, they focus on very small parts of the code and lose sight of the "big picture". Second, they are prone to focus on superficial aspects of the task that are not functionally central to the solution. It is not until the transition into the concrete operational stage that decentration of focus occurs, and they have the cognitive ability to reason about abstract quantities that are conserved, and are equipped to adapt skills to closely related tasks. Our results, and the neo-Piagetian framework on which they are based, suggest that changes are necessary in teaching practice to better support novices who have not reached the concrete operational stage.
Resumo:
Language and Mobility is the latest monograph by Alastair Pennycook. It is part of the series, Critical Language and Literacy Studies. Co-edited by Pennycook, along with Brian Morgan and Ryuko Kubota, the series looks at relations of power in diverse worlds of language and literacy. As the title indicates, Pennycook’s own volume explores the idea of language turning up in ‘unexpected’ places, for example, Cornish in Moonta, South Australia, a century or two after it supposedly died with its last speaker. Why is it, Pennycook asks, that we expect to find a (particular form of a) language in a particular place? This question is generated by a critical project that seeks to leverage the educational potential of everyday moments of language use...
Resumo:
This paper presents a new method to determine feeder reconfiguration scheme considering variable load profile. The objective function consists of system losses, reliability costs and also switching costs. In order to achieve an optimal solution the proposed method compares these costs dynamically and determines when and how it is reasonable to have a switching operation. The proposed method divides a year into several equal time periods, then using particle swarm optimization (PSO), optimal candidate configurations for each period are obtained. System losses and customer interruption cost of each configuration during each period is also calculated. Then, considering switching cost from a configuration to another one, dynamic programming algorithm (DPA) is used to determine the annual reconfiguration scheme. Several test systems were used to validate the proposed method. The obtained results denote that to have an optimum solution it is necessary to compare operation costs dynamically.
Resumo:
Using Shaun Tan’s picture book Rules of Summer (2013) as a pretext, this practical session will explore how primary teachers can engage middle and upper primary students in drama-based activities that support student learning and assessment outcomes in both English and The Arts (with a particular emphasis on drama and media arts). The session will explore notions of persuasive text (written and oral), points of view, devised storytelling and embodied learning.
Resumo:
Although there are many approaches for developing secure programs, they are not necessarily helpful for evaluating the security of a pre-existing program. Software metrics promise an easy way of comparing the relative security of two programs or assessing the security impact of modifications to an existing one. Most studies in this area focus on high level source code but this approach fails to take compiler-specific code generation into account. In this work we describe a set of object-oriented Java bytecode security metrics which are capable of assessing the security of a compiled program from the point of view of potential information flow. These metrics can be used to compare the security of programs or assess the effect of program modifications on security using a tool which we have developed to automatically measure the security of a given Java bytecode program in terms of the accessibility of distinguished ‘classified’ attributes.
Resumo:
This case study research investigated the extent to which Vietnamese teachers understood the concept of learner autonomy and how their beliefs about this concept were applied in their teaching practices. Data were collected through two phases of the study and revealed that teachers generally lacked understanding about learner autonomy; there was an alignment between this lack of understanding and teachers' actual teaching practices regarding learner autonomy. The findings of this study will provide teachers and policy-makers new insights into learner autonomy against the backdrop of educational reforms in Vietnam.
Resumo:
Mocombe and Tomlin’s Language, Literacy, and Pedagogy in Postindustrial Societies: The Case of Black Academic Underachievement is part of the Routledge Research in Education series. The purpose of the work is to set out a theoretical framework for understanding the black/white academic achievement gap in the age of globalisation and post-industrialism. The authors use each chapter to develop an explanation for the persistent black/white academic achievement gap, by theorising that the gap is an epiphenomenon of global capitalist, post-industrial structures, reinforced by education as an apparatus of the system...
Resumo:
The Business Process Management domain has evolved at a dramatic pace over the past two decades and the notion of the business process has become a ubiquitous part of the modern business enterprise. Most organizations now view their operations in terms of business processes and manage these business processes in the same way as other corporate assets. In recent years, an increasingly broad range of generic technology has become available for automating business processes. This is part of a growing trend in the software engineering field throughout the past 40 years, where aspects of functionality that are potentially reusable on a widespread basis have coalesced into generic software components. Figure 2.1 illustrates this trend and shows how software systems have evolved from the monolithic applications of the 1960s developed in their entirety often by a single development team to today’s offerings that are based on the integration of a range of generic technologies with only a small component of the application actually being developed from scratch. In the 1990s, generic functionality for the automation of business processes first became commercially available in the form of workflow technology and subsequently evolved in the broader field of business process management systems (BPMS). This technology alleviated the necessity to develop process support within applications from scratch and provided a variety of off-the-shelf options on which these requirements could be based. The demand for this technology was significant and it is estimated that by 2000 there were well over 200 distinct workflow offerings in the market, each with a distinct conceptual foundation. Anticipating the difficulties that would be experienced by organizations seeking to utilize and integrate distinct workflow offerings, the Workflow Management Coalition (WfMC), an industry group formed to advance technology in this area, proposed a standard reference model for workflow technology with an express desire to seek a common platform for achieving workflow interoperation.
Resumo:
Process Modeling is a widely used concept for understanding, documenting and also redesigning the operations of organizations. The validation and usage of process models is however affected by the fact that only business analysts fully understand them in detail. This is in particular a problem because they are typically not domain experts. In this paper, we investigate in how far the concept of verbalization can be adapted from object-role modeling to process models. To this end, we define an approach which automatically transforms BPMN process models into natural language texts and combines different techniques from linguistics and graph decomposition in a flexible and accurate manner. The evaluation of the technique is based on a prototypical implementation and involves a test set of 53 BPMN process models showing that natural language texts can be generated in a reliable fashion.
Resumo:
Mobile devices are rapidly developing into the primary technology for users to work, socialize, and play in a variety of settings and contexts. Their pervasiveness has provided researchers with the means to investigate innovative solutions to ever more complex user demands. Tools for Mobile Multimedia Programming and Development investigates the use of mobile platforms for research projects, focusing on the development, testing, and evaluation of prototypes rather than final products, which enables researchers to better understand the needs of users through image processing, object recognition, sensor integration, and user interactions. This book benefits researchers and professionals in multiple disciplines who utilize such techniques in the creation of prototypes for mobile devices and applications. This book is part of the Advances in Wireless Technologies and Telecommunication series collection.
Resumo:
Ghost stories are unusual amongst supernatural literatures in their modelling of a recognisable, mimetic reality interrupted or infiltrated by immaterial forces. In its discussion of Australian ghost stories, this thesis advances a new approach to ghost narratives which seeks to model and articulate the mechanics of ghosts and hauntings as something reliant on and engaged with the material and the mundane.
Resumo:
This thesis investigated the information literacy experiences of EFL (English as a Foreign Language) students in a higher education institution in the United Arab Emirates (UAE). Phenomenography was used to investigate how EFL students' 'used information to learn' (ie. information literacy). The study revealed that EFL students' experienced information literacy across four categories and had varying experiences of information and learning. The research also showed that EFL students' faced a number of challenges and barriers due to language that impacted on their experiences of reading, understanding, accessing and translating information.