8,805 research outputs found

    Spartan Daily September 20, 2010

    Get PDF
    Volume 135, Issue 11https://scholarworks.sjsu.edu/spartandaily/1174/thumbnail.jp

    Do They Still Make Them Like They Used To?: A Content Analysis of Easy Readers from Selected Decades

    Get PDF
    This is an exploratory study to identify and understand changes in the easy reader genre since its inception 52 years ago. Thirty-five easy reader books were analyzed for their content: five from the 1960s, ten from the 1980s, and twenty from the 2000s. Eight Geisel Award medal and honor books were among the books from the 2000s. The books were evaluated for reading level characteristics, aspects of illustrations unique to easy readers, quality of storytelling, topics reflected, and teaching aids included. The study found that newer easy readers have a higher proportion of illustration to text and are shorter than earlier easy readers, meaning they provide less reading material per book. Several minor modifications to easy reader formulas were noted, most notably at the lowest reading level where books to be read with an adult while learning to read have been introduced. Some topics shown to interest young children, such as transportation, were found to be used relatively rarely in easy readers

    Post-Quantum Cryptography for Internet of Things: A Survey on Performance and Optimization

    Full text link
    Due to recent development in quantum computing, the invention of a large quantum computer is no longer a distant future. Quantum computing severely threatens modern cryptography, as the hard mathematical problems beneath classic public-key cryptosystems can be solved easily by a sufficiently large quantum computer. As such, researchers have proposed PQC based on problems that even quantum computers cannot efficiently solve. Generally, post-quantum encryption and signatures can be hard to compute. This could potentially be a problem for IoT, which usually consist lightweight devices with limited computational power. In this paper, we survey existing literature on the performance for PQC in resource-constrained devices to understand the severeness of this problem. We also review recent proposals to optimize PQC algorithms for resource-constrained devices. Overall, we find that whilst PQC may be feasible for reasonably lightweight IoT, proposals for their optimization seem to lack standardization. As such, we suggest future research to seek coordination, in order to ensure an efficient and safe migration toward IoT for the post-quantum era.Comment: 13 pages, 3 figures and 7 tables. Formatted version submitted to ACM Computer Survey

    THE EFFECTIVENESS OF MOODLE IN MASTERING ENGLISH BY STUDENTS PROGRAMMERS

    Get PDF
    MOODLE (Module Object-Oriented Dynamic Learning Environment) is one of the fastest growing free, open source virtual learning environments around the globe at the moment. There are certain characteristics that make this online platform particularly attractive to teachers who collaborate with their students in different subject areas. First of all, Moodle is easy to use and we don't need any programming knowledge to work out an online course in an academic discipline or to deliver a lecture to our students or to do a project. Also, we may consider Moodle a convenient tool of interaction between teachers and their students because it provides feedback on tasks and gives students independent learning pathways which are useful for students who study individually. Any student can use Moodle if they have basic computer skills and are not necessarily familiar with Moodle's basic features. This makes the Moodle online platform the most widely used learning management system in the world

    Creating R Packages: A Tutorial

    Get PDF
    This tutorial gives a practical introduction to creating R packages. We discuss how object oriented programming and S formulas can be used to give R code the usual look and feel, how to start a package from a collection of R functions, and how to test the code once the package has been created. As running example we use functions for standard linear regression analysis which are developed from scratch

    Analyse the risks of ad hoc programming in web development and develop a metrics of appropriate tools

    Get PDF
    Today the World Wide Web has become one of the most powerful tools for business promotion and social networking. As the use of websites and web applications to promote the businesses has increased drastically over the past few years, the complexity of managing them and protecting them from security threats has become a complicated task for the organizations. On the other hand, most of the web projects are at risk and less secure due to lack of quality programming. Although there are plenty of frameworks available for free in the market to improve the quality of programming, most of the programmers use ad hoc programming rather than using frameworks which could save their time and repeated work. The research identifies the different frameworks in PHP and .NET programming, and evaluates their benefits and drawbacks in the web application development. The research aims to help web development companies to minimize the risks involved in developing large web projects and develop a metrics of appropriate frameworks to be used for the specific projects. The study examined the way web applications were developed in different software companies and the advantages of using frameworks while developing them. The findings of the results show that it was not only the experience of developers that motivated them to use frameworks. The major conclusions and recommendations drawn from this research were that the main reasons behind web developers avoiding frameworks are that they are difficult to learn and implement. Also, the motivations factors for programmers towards using frameworks were self-efficiency, habit of learning new things and awareness about the benefits of frameworks. The research recommended companies to use appropriate frameworks to protect their projects against security threats like SQL injection and RSS injectio

    Spartan Daily, May 9, 2013

    Get PDF
    Volume 140, Issue 52https://scholarworks.sjsu.edu/spartandaily/1419/thumbnail.jp

    Spartan Daily, March 22, 1999

    Get PDF
    Volume 112, Issue 38https://scholarworks.sjsu.edu/spartandaily/9395/thumbnail.jp
    corecore