Spelling suggestions: "subject:"core""
421 |
Refaktoring v PHP / PHP refactoringMartišek, Jiří January 2012 (has links)
This thesis deals with a methodology for PHP web applications refactoring. The main objective is to propose such a methodology, and to apply it on a real project. The first chapter contains objectives, restrictions and contributions of the thesis. The research of the existing literature on similar topics follows in the second chapter. The third chapter comments on selected software development methodologies' approach to refactoring. The fourth chapter describes known code smells, and adds some new ones appearing particularly in PHP. Specifics of PHP refactoring are also described. The fifth chapter deals with the methodology proposal itself. It sums up requirements, deployment assumptions, the methodology principles and general characteristics. The next part contains the recommended procedure of PHP web applications refactoring with its parts commented farther on. These parts are mainly code smells identification techniques, prioritization and finally best practices. The chapter ends with this methodology deployment recommendations. The sixth chapter shows a practical usage of the proposed methodology when refactoring a real web application. The performed steps are explained in terms of the methodology. The chapter closes with observations gained during this refactoring.
|
422 |
Motivations behind code-switching among Kuwaiti bilingual schools' studentsMahsain, Fatemah H. M. January 2015 (has links)
Code-switching is a language-contact phenomenon in which the juxtaposition of languages is intentional and purposeful. The Kuwaiti speech community has a distinctive code-switching mechanism because of the unique sociolinguistic and cultural setting; as they code-switch to English even though they are neither an immigrant community nor are/were colonised by an English speaking country. In Kuwait, code-switching between Kuwaiti Arabic and English is very common among the youth, even though English is considered to be a foreign language. It is observed that the code-switching behaviour of Kuwaiti bilinguals attending bilingual/multilingual schools differs from that of those attending monolingual schools. In this thesis, an ethnographic study has been conducted to corroborate this observation. Both bilingual/multilingual school students and bilingual students attending monolingual schools were interviewed in order to identify the motivations behind their code-switching behaviour. The interviews were analysed sequentially by adopting the conversational analysis framework. The sequential approach (Auer 1984) focuses on a turn-by-turn participant-oriented analysis (Li Wei 1994) to seek answers to the questions of how and why bilingual speakers code-switch. Here, the different code-switching behaviours of these young Kuwaitis were investigated in an attempt to analyse the conversational functions behind them. Without exception, bilinguals in monolingual schools preferred conversing in Kuwaiti Arabic with a few one-word English insertions here and there, even though free language choice was emphasised at the beginning of each conversation. On the other hand, the language choice of bilingual school students varied from choosing Kuwaiti Arabic or English as the language of conversation to code-switching between the two languages on a continuous basis. Code-switching ranged from English insertions into Kuwaiti Arabic speech or Kuwaiti Arabic insertions into English speech to alternating between the two languages. In addition to the different code-switching styles, various conversational functions behind code-switching were also recognised. In this thesis, code-switching was treated as a contextualisation cue (Gumperz 1982), highlighting the pragmatic functions and contributing to an understanding of the intended meaning. At least five motivations behind code-switching among bilingual school students were identified in our corpus: accommodation, repair, contrastiveness, filling linguistic gaps, and floor holding, among others.
|
423 |
Matlab Implementation of a Tornado Forward Error Correction CodeNoriega, Alexandra 05 1900 (has links)
This research discusses how the design of a tornado forward error correcting channel code (FEC) sends digital data stream profiles to the receiver. The complete design was based on the Tornado channel code, binary phase shift keying (BPSK) modulation on a Gaussian channel (AWGN). The communication link was simulated by using Matlab, which shows the theoretical systems efficiency. Then the data stream was input as data to be simulated communication systems using Matlab. The purpose of this paper is to introduce the audience to a simulation technique that has been successfully used to determine how well a FEC expected to work when transferring digital data streams. The goal is to use this data to show how FEC optimizes a digital data stream to gain a better digital communications systems. The results conclude by making comparisons of different possible styles for the Tornado FEC code.
|
424 |
A critical analysis of two refactoring toolsDrozdz, Martin Zbigniew 24 June 2008 (has links)
This study provides a critical analysis of refactoring by surveying the refactoring tools in IDEA and Eclipse. Ways are discussed to locate targets for refactorings, via detection of code smells from static code analysis in IDEA and during the compilation process in Eclipse. New code smells are defined as well as the refactorings needed to remove the code smells. The impacts the code smells have on design are well documented. Considerable effort is made to describe how these code smells and their refactorings can be used to improve design. Practical methods are provided to detect code smells in large projects such as Sun’s JDK. The methodology includes a classification scheme to categorise code smells by their value and complexity to handle large projects more efficiently. Additionally a detailed analysis is performed on the evolution of the JDK from a maintainability point of view. Code smells are used to measure maintainability in this instance. / Dissertation (MSc (Computer Science))--University of Pretoria, 2008. / Computer Science / unrestricted
|
425 |
Using ICTs as a pedagogical resource to facilitate epistemological access in science with teacher education studentsFagan, Dominique January 2020 (has links)
Philosophiae Doctor - PhD / The study aimed to investigate the kind of knowledge privileged when student teachers use Information Communication Technologies in facilitating learning in science subjects. The assumptions were that future student teachers, through their pedagogic practices, may either reproduce or interrupt educational inequalities. The ability to interrupt inequalities is conditioned by the manner in which these student teachers have been inducted into the field of teacher education and this process includes the ability to manipulate technological resources to facilitate epistemological access. This concept originally coined by Morrow in the 1980s looked at black students seeking entry to university. Since then the concept was used to signify the importance of knowledge in the curriculum. In this study, the exploration of epistemological access goes beyond physical or formal access and includes meaningful access to knowledge. The semantics dimension of Legitimation Code Theory (LCT) proposed by Maton was used, with a particular focus on semantic density (SD) as a theoretical framework. Maton argues that semantic density can vary across teaching practices and contexts. The study assumes that student teachers, through their pedagogic practices, may either reproduce or interrupt educational inequalities
|
426 |
Blockchain based remote voting system: a performance perspectivePaneru, Sushil 05 August 2021 (has links)
Although cryptography based remote voting protocols have been researched since
1981, most of the previous protocols [9], [5], [13] assume the existence of public bul-
letins or, in other words, a publicly readable, tamper-proof, append-only log. As
blockchain or distributed ledger technology (DLT) offers properties like irreversibil-
ity, transparency and decentralization, it is suitable for realization of public bulletin
board for the voting system. We see a gap in the research of blockchain based voting
systems because there either exists work on just the protocol aspect of the voting
system or the performance aspect of the blockchain. As blockchain is a general
purpose tool, we believe that there lies opportunities for micro-optimizations that
could specifically benefit the voting system. This ushered us to focus our effort on
the performance aspect of integration of voting protocol with blockchain. Hence, in
this thesis, we first introduce a homomorphic encryption based voting protocol that
uses blockchain, Hyperledger Fabric (HLF), as bulletin board. The protocol is de-
signed such that it leverages the transaction processing characteristics of underlying
DLT. We then created an experiment where we designed a smart contract, set up
a blockchain network and exposed the system to 40k concurrent voting transactions
to profile the code of HLF. From the profile data, it was found that execution of
cryptographic operations constitutes most of the transaction processing time. This
led us to benchmark cryptographic libraries for SHA256 and digital signature algo-
rithm and integrate the faster library into HLF for better performance. We also
found that the transaction manager of HLF does not need read-write locks to ensure
transaction isolation in special scenarios, which alleviates the performance drop due to lock contention. Altogether we were able to improve the throughput and latency
of the baseline system by more than 30%. Lastly, we make a comparison between
public and permissioned DLT based remote voting system and discuss the suitability
of permissioned blockchain for the application of voting systems. / Graduate
|
427 |
Program pro demonstraci kanálového kódování / Programme for channel coding demonstrationZávorka, Radek January 2020 (has links)
The main subject of this thesis is creating a programme, used for channel coding demonstration. This programme will be used for teaching purposes. The programme contains various codes from simple ones, to those which almost reach Shanon’s channel capacity theorem. Specifically these are the Hamming code, cyclic code, convolutional code and LDPC code. These functions are based on theoretical background described in this thesis and have been programed in Matlab. Practical output of this thesis is user interface, where the user is able to input information word, simulate transmission through the transmission channel and observe coding and decoding for each code. This thesis also contains a comparison between individual codes, concerning bit-error rate depending on SNR and various parameters. There is a computer lab with theoretical background, assignment and sheets for convenient accomplishment of each task.
|
428 |
Protichybové zabezpečení v digitálních komunikačních systémech / Forward Error Correction in Digital Communication SystemsKostrhoun, Jan January 2013 (has links)
This work deals with forward error correction. In the work, basic methods and algorithms of error correction are described. For the presentation of encoding and decoding process of Hamming code, Reed-Müller code, Fire code, Reed-Solomon code and Trellis coded modulation programs in Matlab were created.
|
429 |
THE LINGUISTIC BEHAVIOR OF TURKISH CHILDREN IN JAPAN:A SOCIOLINGUISTIC STUDY / 日本在住トルコ人児童の言語行動 -社会言語学的視点より-UNAL, Bilal, ウナル, ビラル 22 March 2013 (has links)
博士(社会学) / [4], 130 p. / 一橋大学
|
430 |
Cognitive Code and Test-WritingMerriman, Carolyn S. 01 October 2017 (has links)
No description available.
|
Page generated in 0.0539 seconds