196 research outputs found

    Using Semantic Waves to Analyse the Effectiveness of Unplugged Computing Activities

    Get PDF
    We apply the notion of ‘semantic waves’ from Legitimation Code Theory (LCT), a powerful educational framework, to Computer Science Education. We consider two case studies exploring how a simple analysis can help improve learning activities. The case studies focus on unplugged activities used in the context of both teaching school students and teacher continuing professional development. We used a simple method based on LCT to analyse the activities in terms of their ‘semantic profiles’: changes in the context-dependence and complexity of the knowledge being taught.This led to improvements to the activities. We argue that ‘semantic waves’, or moves back and forth between concrete/simpler and abstract/complex knowledge, help show ways that an unplugged activity might be effective or not, and how small changes to the activities can make a difference in potentially offering a more fruitful learning experienc

    Abstract Models and Cognitive Mismatch in Formal Verification

    Get PDF
    We present ongoing work to accommodate fine-grained analysis of interactive systems via model checking. We argue that this can be achieved by combining a basic abstract model of user behaviour and a separate constraint on the acceptable degree of cognitive mismatch. To explain the problem and illustrate our approach, we present a simple scenario related to number entry in infusion pumps

    Developing computational thinking in the classroom: a framework

    No full text
    Computational thinking sits at the heart of the new statutory programme of study for Computing: “A high quality computing education equips pupils to use computational thinking and creativity to understand and change the world” (Department for Education, 2013, p. 188). This document aims to support teachers to teach computational thinking. It describes a framework that helps explain what computational thinking is, describes pedagogic approaches for teaching it and gives ways to assess it. Pupil progression with the previous ICT curriculum was often demonstrated through ‘how’ (for example, a software usage skill) or ‘what’ the pupil produced (for example, a poster). This was partly due to the needs of the business world for office skills. Such use of precious curriculum time however has several weaknesses. Firstly, the country’s economy depends on technological innovation not just on use of technology. Secondly, the pace of technology and organisational change is fast in that the ICT skills learnt are out of date before a pupil leaves school. Thirdly, technology invades all aspects of our life and the typically taught office practice is only a small part of technology use today

    Preface

    Get PDF

    Enthusing and inspiring with reusable kinaesthetic activities

    Get PDF
    We describe the experiences of three University projects that use a style of physical, non-computer based activity to enthuse and teach school students computer science concepts. We show that this kind of activity is effective as an outreach and teaching resource even when reused across different age/ability ranges, in lecture and workshop formats and for delivery by different people. We introduce the concept of a Reusable Outreach Object (ROO) that extends Reusable Learning Objects. and argue for a community effort in developing a repository of such objects

    A Generic User Interface Architecture for Analyzing Use Hazards in Infusion Pump Software

    Get PDF
    This paper presents a generic infusion pump user interface (GIP-UI) architecture that intends to capture the common characteristics and functionalities of interactive software incorporated in broad classes of infusion pumps. It is designed to facilitate the identification of use hazards and their causes in infusion pump designs. This architecture constitutes our first effort at establishing a model-based risk analysis methodology that helps manufacturers identify and mitigate use hazards in their products at early stages of the development life-cycle. The applicability of the GIP-UI architecture has been confirmed in a hazard analysis focusing on the number entry software of existing infusion pumps, in which the GIP-UI architecture is used to identify a substantial set of user interface design errors that may contribute to use hazards found in infusion pump incidents

    PVSio-web: a tool for rapid prototyping device user interfaces in PVS

    Get PDF
    We present PVSio-web which extends the simulation component of the PVS proof system with functionalities for rapid prototyping device user interfaces. The tool presents itself as a classic image-editing environment with functionalities such as area selection and hyperlink creation, thus reducing the barriers that prevent non-experts in formal methods from using PVS. Designers load a picture of the layout of the device user interface under development, specify interactive areas over the layout, and link them to a PVS specification. They can then explore the behaviour of the formal user interface specification through point-and-click interactions. The architecture of the tool is general, and can be used as the basis for extending other verification tools. A demonstration of the capabilities of PVSio-web is presented through an example based on a commercial medical device user interface. Our ultimate aim is to promote and facilitate the use of formal verification tools when developing device user interfaces

    Modelling Distributed Cognition Systems in PVS

    Get PDF
    We report on our efforts to formalise DiCoT, an informal structured approach for analysing complex work systems, such as hospital and day care units, as distributed cognition systems. We focus on DiCoT's information flow model, which describes how information is transformed and propagated in the system. Our contribution is a set of generic models for the specification and verification system PVS. The developed models can be directly mapped to the informal descriptions adopted by human-computer interactions experts. The models can be verified against properties of interest in the PVS theorem prover. Also, the same models can be simulated, thus facilitating analysts to engage with stakeholders when checking the correctness of the model. We trial our ideas on a case study based on a real-world medical system
    corecore