405 research outputs found
Introductory Problem Solving in Computer Science
This paper describes our experiences in devising a lightweight, informal methodology for problem solving in introductory, university level, computer science. We first describe the original context of the experiment and the background to the methodology. We then give the details of the steps of the Problem Solving Cycle - Understanding, Designing, Writing and Reviewing - and the lessons we learned about our teaching from devising the material. We also present practical examples of how it has been applied in a variety of units in our programme
em Where do I begin? A problem solving approach to teaching functional programming
This paper introduces a problem solving method for teaching functional programming, based on Polya's `How To Solve It', an introductory investigation of mathematical method. We first present the language independent version, and then show in particular how it applies to the development of programs in Haskell. The method is illustrated by a sequence of examples and a larger case study
Exploring the motivation behind cybersecurity insider threat and proposed research agenda
Cyber exploitation and malicious activities have become more sophisticated. Insider threat is one of the most significant cyber security threat vector, while posing a great concern to corporations and governments. An overview of the fundamental motivating forces and motivation theory are discussed. Such overview is provided to identify motivations that lead trusted employees to become insider threats in the context of cyber security. A research agenda with two sequential experimental research studies are outlined to address the challenge of insider threat mitigation by a prototype development. The first proposed study will classify data intake feeds, as recognized and weighted by cyber security experts, in an effort to establish predictive analytics of novel correlations of activities that may lead to cyber security incidents. It will also develop approach to identify how user activities can be compared against an established baseline, the user’s network cyber security pulse, with visualization of simulated users’ activities. Additionally, the second study will explain the process of assessing the usability of a developed visualization prototype that intends to present correlated suspicious activities requiring immediate action. Successfully developing the proposed prototype via feeds aggregation and an advanced visualization from the proposed research could assist in the mitigation of malicious insider threat
The Ontology based FMEA of Lead Free Soldering Process
Paper is directed to improvement of a FMEA (Failure Mode and Effects Analysis) procedure in the field of reflow lead free soldering by the use of an ontology paradigm. Some ontology editor tools, suitable for our intention, are presented. Particular phases of ontology utilization for development of more exact approach to the FMEA procedure of reflow lead free soldering are analyzed. A proposal of a user's guide for the FMEA procedure based on an ontology paradigm is presented. This user's guide is included in university courses Management of Production Quality and Complex Quality Control provided by the Department of Electro-Technology
- …
