Results 41 to 50 of about 514,599 (310)
Critters in the Classroom: A 3D Computer-Game-Like Tool for Teaching Programming to Computer Animation Students [PDF]
The brewing crisis threatening computer science education is a well documented fact. To counter this and to increase enrolment and retention in computer science related degrees, it has been suggested to make programming "more fun" and to offer ...
Anderson, Eike F., McLoughlin, L.
core +1 more source
Reading skills can predict the programming performance of novices: an eye-tracking study
Due to the character of programming languages, reading ability may have more impact on learning to program than on learning in other subjects. This paper describes an exploratory study of the relationship between reading skills, as perceived through eye
doaj +3 more sources
(1) The existing frameworks for water quality modeling overlook the connection between multiple dynamic factors affecting spatiotemporal sediment yields (SY).
Pooja Preetha, Ashraf Al-Hamdan
doaj +1 more source
The shape of a cable hanging under its own weight and uniform horizontal tension between two power poles is a catenary. The catenary is a curve which has an equation defined by a hyperbolic cosine function and a scaling factor.
Eric Costello
doaj +1 more source
Android-Based Introduction to Agricultural Crops and Pests
The number of farmers in Indonesia continues to increase during the pandemic. However, this increase was not accompanied by good literacy related to plants and pests. The main factor is the increasing amount of information that is not credible.
Aldi Susanto+3 more
doaj +1 more source
Język migowy w świetle współczesnego paradygmatu głuchoty
The main issue addressed in this paper is a practical application of sign language in early development support for deaf and hard of hearing children in Poland.
Piotr Tomaszewski, Lucyna Kościelniak
doaj +1 more source
C# parser for extracting cryptographic protocols structure from source code
Cryptographic protocols are the core of any secure system. With the help of them, data is transmitted securely and protected from third parties' negative impact.
Ilya Aleksandrovich Pisarev+1 more
doaj +1 more source
Julia: A Fresh Approach to Numerical Computing [PDF]
Bridging cultures that have often been distant, Julia combines expertise from the diverse fields of computer science and computational science to create a new approach to numerical computing. Julia is designed to be easy and fast. Julia questions notions
Bezanson, Jeff+3 more
core +3 more sources
The article describes methods for applying two-factor authentication (2FA). An example of two-factor authentication using mobile devices as identifiers and the generation of a temporary password based on the hash function of encryption standards is ...
О. А. Ussatova+2 more
doaj +1 more source
Lifted Variable Elimination for Probabilistic Logic Programming
Lifted inference has been proposed for various probabilistic logical frameworks in order to compute the probability of queries in a time that depends on the size of the domains of the random variables rather than the number of instances.
Bellodi, Elena+4 more
core +1 more source