Pub Date : 2022-11-23DOI: 10.1109/Informatics57926.2022.10083429
Michal Mrázek, P. Částková
The didactics of technically oriented subjects with a focus on students' creative activity and the development of their competencies in the technical field in the context of basic education in the Czech Republic lacks a comprehensive elaboration of the theory of psychomotor tasks applicable in the work of the teacher. The aim of this paper is to present the initial results of a research investigation focused on feedback from practicing teachers, including the methodology of validation of the research instrument, and in relation to the results to discuss the possibilities of implementing the developed typology of teaching tasks at the 1 st and 2nd level of primary school.
{"title":"Implementation of the psychomotor task typology in the teaching of technically oriented subjects at primary and secondary school (ISCED 1, ISCED 2)","authors":"Michal Mrázek, P. Částková","doi":"10.1109/Informatics57926.2022.10083429","DOIUrl":"https://doi.org/10.1109/Informatics57926.2022.10083429","url":null,"abstract":"The didactics of technically oriented subjects with a focus on students' creative activity and the development of their competencies in the technical field in the context of basic education in the Czech Republic lacks a comprehensive elaboration of the theory of psychomotor tasks applicable in the work of the teacher. The aim of this paper is to present the initial results of a research investigation focused on feedback from practicing teachers, including the methodology of validation of the research instrument, and in relation to the results to discuss the possibilities of implementing the developed typology of teaching tasks at the 1 st and 2nd level of primary school.","PeriodicalId":101488,"journal":{"name":"2022 IEEE 16th International Scientific Conference on Informatics (Informatics)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129700339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-23DOI: 10.1109/Informatics57926.2022.10083451
Renáta Cenková, William Steingartner
Luxury is a measurable value in society, but every customer perceives this concept differently. Luxury represented different values before the outbreak of the COVID-19 pandemic than it represents today. The aim of this article is to examine and statistically evaluate, on the basis of questionnaires, the view of respondents in Slovakia, especially on luxury in the time of COVID-19.
{"title":"Luxury in the Time of COVID-19","authors":"Renáta Cenková, William Steingartner","doi":"10.1109/Informatics57926.2022.10083451","DOIUrl":"https://doi.org/10.1109/Informatics57926.2022.10083451","url":null,"abstract":"Luxury is a measurable value in society, but every customer perceives this concept differently. Luxury represented different values before the outbreak of the COVID-19 pandemic than it represents today. The aim of this article is to examine and statistically evaluate, on the basis of questionnaires, the view of respondents in Slovakia, especially on luxury in the time of COVID-19.","PeriodicalId":101488,"journal":{"name":"2022 IEEE 16th International Scientific Conference on Informatics (Informatics)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120964625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-23DOI: 10.1109/Informatics57926.2022.10083461
Sylwia Stachowiak, M. Kurkowski, Artur Soboń
Many significant computational problems can be converted to SAT problems. Although these problems are often encoded by formulas with hundreds of thousands of clauses and propositional variables such formulas can sometimes be effectively solved by contemporary SAT solvers. Such solvers can be successfully used for cryptanalysis of symmetric ciphers. In this case, operations of the cipher are written in the form of Boolean formulas. Then, together with randomly selected bits of the plaintext and the key, it is transformed into a set of clauses corresponding to the encryption of the given algorithm. The ciphertext obtained using SAT solvers is used to create a set of decryption clauses. Using the SAT solver again, we go to the cryptanalysis of the cipher with the selected open text, looking for the bits of the encryption key. In this article, we examine how SAT techniques behave to the AES cipher, the current standard for symmetric encryption. We also compare the results obtained in this case by several SAT solvers.
{"title":"New results in SAT – cryptanalysis of the AES","authors":"Sylwia Stachowiak, M. Kurkowski, Artur Soboń","doi":"10.1109/Informatics57926.2022.10083461","DOIUrl":"https://doi.org/10.1109/Informatics57926.2022.10083461","url":null,"abstract":"Many significant computational problems can be converted to SAT problems. Although these problems are often encoded by formulas with hundreds of thousands of clauses and propositional variables such formulas can sometimes be effectively solved by contemporary SAT solvers. Such solvers can be successfully used for cryptanalysis of symmetric ciphers. In this case, operations of the cipher are written in the form of Boolean formulas. Then, together with randomly selected bits of the plaintext and the key, it is transformed into a set of clauses corresponding to the encryption of the given algorithm. The ciphertext obtained using SAT solvers is used to create a set of decryption clauses. Using the SAT solver again, we go to the cryptanalysis of the cipher with the selected open text, looking for the bits of the encryption key. In this article, we examine how SAT techniques behave to the AES cipher, the current standard for symmetric encryption. We also compare the results obtained in this case by several SAT solvers.","PeriodicalId":101488,"journal":{"name":"2022 IEEE 16th International Scientific Conference on Informatics (Informatics)","volume":"182 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126015093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-23DOI: 10.1109/Informatics57926.2022.10083413
A. Fekete, Z. Porkoláb
Program comprehension takes up a significant amount of the average developer's work time. Most development tasks require broad understanding of the code base. Modern integrated development environments (IDEs) possess a basic program comprehension toolset, but the primary goal of such tools is supporting program development, not comprehension. Standalone or built-in code comprehension tools provide a wider function set. Such tools could be especially important for junior programmers who lack experience with understanding large foreign codebase. In this paper, we describe an experiment we conducted with the participation of a group of Computer Science MSc students. The participants were given a simple programming task to solve which required understanding the software they modified. The students used CodeCompass, an open-source comprehension framework. During the experiment we collected various data on the students' comprehension strate-gies. We compare the results to previous comprehension models, considering the amount of programming experience and feedback from students.
{"title":"Report on a Field Experiment of the Comprehension Strategies of Computer Science MSc Students","authors":"A. Fekete, Z. Porkoláb","doi":"10.1109/Informatics57926.2022.10083413","DOIUrl":"https://doi.org/10.1109/Informatics57926.2022.10083413","url":null,"abstract":"Program comprehension takes up a significant amount of the average developer's work time. Most development tasks require broad understanding of the code base. Modern integrated development environments (IDEs) possess a basic program comprehension toolset, but the primary goal of such tools is supporting program development, not comprehension. Standalone or built-in code comprehension tools provide a wider function set. Such tools could be especially important for junior programmers who lack experience with understanding large foreign codebase. In this paper, we describe an experiment we conducted with the participation of a group of Computer Science MSc students. The participants were given a simple programming task to solve which required understanding the software they modified. The students used CodeCompass, an open-source comprehension framework. During the experiment we collected various data on the students' comprehension strate-gies. We compare the results to previous comprehension models, considering the amount of programming experience and feedback from students.","PeriodicalId":101488,"journal":{"name":"2022 IEEE 16th International Scientific Conference on Informatics (Informatics)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130641455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-23DOI: 10.1109/Informatics57926.2022.10083395
Bogdan Walek, Patrik Müller
Evaluation of unsupervised and semi-supervised learning methods, especially in the field of information retrieval and recommender systems is a problematic and resource-intensive task. Often, there is no way to evaluate the used machine learning model until user testing is performed. We investigated hyperparameter optimization options of Gensim's Word2Vec implementation by evaluating model performance on word analogies and word pairs tests and statistics of out-of-vocabulary ratio. These automatic and task-independent offline (pre-) evaluations techniques could provide a simple way to reduce the set of final model variants used for resource-demanding user testing or hybrid recommender models, thus we investigated whether those tests were useful for the accuracy of our final task of providing similar articles to a chosen article. We also consider options of using Wikipedia articles for the model training input or the pre-trained FastText model.
{"title":"Using Word2Vec for news articles recommendations: Considering evaluation options for hyperparameter optimization and different input options","authors":"Bogdan Walek, Patrik Müller","doi":"10.1109/Informatics57926.2022.10083395","DOIUrl":"https://doi.org/10.1109/Informatics57926.2022.10083395","url":null,"abstract":"Evaluation of unsupervised and semi-supervised learning methods, especially in the field of information retrieval and recommender systems is a problematic and resource-intensive task. Often, there is no way to evaluate the used machine learning model until user testing is performed. We investigated hyperparameter optimization options of Gensim's Word2Vec implementation by evaluating model performance on word analogies and word pairs tests and statistics of out-of-vocabulary ratio. These automatic and task-independent offline (pre-) evaluations techniques could provide a simple way to reduce the set of final model variants used for resource-demanding user testing or hybrid recommender models, thus we investigated whether those tests were useful for the accuracy of our final task of providing similar articles to a chosen article. We also consider options of using Wikipedia articles for the model training input or the pre-trained FastText model.","PeriodicalId":101488,"journal":{"name":"2022 IEEE 16th International Scientific Conference on Informatics (Informatics)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130663635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-23DOI: 10.1109/Informatics57926.2022.10083411
Marek Kvet
This paper brings a short overview of heuristics developed for solving the problem of multi-objective service system designing. Even though there are plenty of effective exact and approximate solving tools for different mathematical models, they are usually not able to manage more than one objective function simultaneously. Furthermore, multi-criteria optimization assumes producing a set of non-dominated solutions instead of one resulting center deployment. Since obtaining the complete Pareto front of non-dominated solutions is extremely demanding, the development of efficient heuristics is necessary from the practical point of view. In this paper, the quality of the resulting set of solutions is studied together with the dynamics of the heuristic itself. All suggested approaches are experimentally verified making use of a dataset from real world.
{"title":"Heuristics for Multi-objective Service System Designing","authors":"Marek Kvet","doi":"10.1109/Informatics57926.2022.10083411","DOIUrl":"https://doi.org/10.1109/Informatics57926.2022.10083411","url":null,"abstract":"This paper brings a short overview of heuristics developed for solving the problem of multi-objective service system designing. Even though there are plenty of effective exact and approximate solving tools for different mathematical models, they are usually not able to manage more than one objective function simultaneously. Furthermore, multi-criteria optimization assumes producing a set of non-dominated solutions instead of one resulting center deployment. Since obtaining the complete Pareto front of non-dominated solutions is extremely demanding, the development of efficient heuristics is necessary from the practical point of view. In this paper, the quality of the resulting set of solutions is studied together with the dynamics of the heuristic itself. All suggested approaches are experimentally verified making use of a dataset from real world.","PeriodicalId":101488,"journal":{"name":"2022 IEEE 16th International Scientific Conference on Informatics (Informatics)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121422507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-23DOI: 10.1109/Informatics57926.2022.10083474
Vitalii Tsimbolynets, J. Perháč
This paper is devoted to the tool developed for the visualization of the translation process of a program written in a simple imperative programming language by structural operational semantics, also known as small-step operational semantics. Our goal is that our tool will be OS-independent, therefore, we have designed to implement it as a web application. We also cover a language definition, and then, we analyze similar existing systems. We compare other solutions and their problems, which we take into account in designing our application. Next, we design a user interface and implement a prototype. In the end, we test and evaluate the application with the target group of users.
{"title":"Visualization of imperative programs translation with Structural Operational Semantics","authors":"Vitalii Tsimbolynets, J. Perháč","doi":"10.1109/Informatics57926.2022.10083474","DOIUrl":"https://doi.org/10.1109/Informatics57926.2022.10083474","url":null,"abstract":"This paper is devoted to the tool developed for the visualization of the translation process of a program written in a simple imperative programming language by structural operational semantics, also known as small-step operational semantics. Our goal is that our tool will be OS-independent, therefore, we have designed to implement it as a web application. We also cover a language definition, and then, we analyze similar existing systems. We compare other solutions and their problems, which we take into account in designing our application. Next, we design a user interface and implement a prototype. In the end, we test and evaluate the application with the target group of users.","PeriodicalId":101488,"journal":{"name":"2022 IEEE 16th International Scientific Conference on Informatics (Informatics)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116819926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-23DOI: 10.1109/Informatics57926.2022.10083467
Jirí Dostál, Radim Děrda, P. Částková, Michal Mrázek, J. Kubricky, William Steingartner, Hana Bucková, M. Janů, Jiří Kronáč
This paper presents for expert discussion partial results of the scientific research project. The aim of the project is to contribute to the innovation of STEAM education at lower secondary schools by means of applied research and through eliminating the barriers resisting the implementation of the new curriculum aimed at the development of technical thinking and creativity. In direct cooperation with the Ministry of Education, Youth, and Sports and other partners the project focuses on the following: 1) designing, creating, and verifying the on-line system (software) for setting the adequate form of technical education that would enable schools to successfully reach the expected learning results; 2) designing and verifying learning situations; 3) developing innovative teaching aids (mobile toolkits enabling sharing). The above results and products will make a positive contribution to the development of pupils' competencies - in particular, basic scientific and technical competences consisting of cognitive, motoric, social, social-moral and information-communication competencies that ensure that individuals “participate in the use of technology as an element of culture”. Specifically, the following can be mentioned: the ability to solve problems, the ability to apply creative ideas in pupils' work, the ability to take responsibility, the ability to be self-sufficient, the ability to evaluate and express one's opinions, the ability to self-identify and self-assess in the direction of one's own professional orientation, the ability to respond flexibly to changes in the labour market.
{"title":"Innovative Concept of STEAM Education at Primary Schools in the Czech Republic - Support for Implementation in School Practice","authors":"Jirí Dostál, Radim Děrda, P. Částková, Michal Mrázek, J. Kubricky, William Steingartner, Hana Bucková, M. Janů, Jiří Kronáč","doi":"10.1109/Informatics57926.2022.10083467","DOIUrl":"https://doi.org/10.1109/Informatics57926.2022.10083467","url":null,"abstract":"This paper presents for expert discussion partial results of the scientific research project. The aim of the project is to contribute to the innovation of STEAM education at lower secondary schools by means of applied research and through eliminating the barriers resisting the implementation of the new curriculum aimed at the development of technical thinking and creativity. In direct cooperation with the Ministry of Education, Youth, and Sports and other partners the project focuses on the following: 1) designing, creating, and verifying the on-line system (software) for setting the adequate form of technical education that would enable schools to successfully reach the expected learning results; 2) designing and verifying learning situations; 3) developing innovative teaching aids (mobile toolkits enabling sharing). The above results and products will make a positive contribution to the development of pupils' competencies - in particular, basic scientific and technical competences consisting of cognitive, motoric, social, social-moral and information-communication competencies that ensure that individuals “participate in the use of technology as an element of culture”. Specifically, the following can be mentioned: the ability to solve problems, the ability to apply creative ideas in pupils' work, the ability to take responsibility, the ability to be self-sufficient, the ability to evaluate and express one's opinions, the ability to self-identify and self-assess in the direction of one's own professional orientation, the ability to respond flexibly to changes in the labour market.","PeriodicalId":101488,"journal":{"name":"2022 IEEE 16th International Scientific Conference on Informatics (Informatics)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129151393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-23DOI: 10.1109/Informatics57926.2022.10083465
U. Świerczyńska-Kaczor, Małgorzata Kotlińska, Edyta Banachowska
Game developers often adapt existing materials into games and there are numerous examples with plots based on movies, novels or comic strips. However, the games based on poetry attract much less attention from game developers and - consequently - also from researchers. The conclusions of this research indicated that narrative poems are a suitable form of poetry for game development, however the adequacy of images and values embedded in the poem to the contemporary society, the adequacy of the vocabulary, the point of view of telling the story and the role of illustrations should be carefully considered. The research showed that the player experience is significantly shaped by the player agency - which may be enhanced in the discussed game - among other factors, by a selection of the second point of view in the game narrative.
{"title":"Interrelations between Player Experience and Reader Experience. Case Study of Poem-Based Game Poodle and Hound","authors":"U. Świerczyńska-Kaczor, Małgorzata Kotlińska, Edyta Banachowska","doi":"10.1109/Informatics57926.2022.10083465","DOIUrl":"https://doi.org/10.1109/Informatics57926.2022.10083465","url":null,"abstract":"Game developers often adapt existing materials into games and there are numerous examples with plots based on movies, novels or comic strips. However, the games based on poetry attract much less attention from game developers and - consequently - also from researchers. The conclusions of this research indicated that narrative poems are a suitable form of poetry for game development, however the adequacy of images and values embedded in the poem to the contemporary society, the adequacy of the vocabulary, the point of view of telling the story and the role of illustrations should be carefully considered. The research showed that the player experience is significantly shaped by the player agency - which may be enhanced in the discussed game - among other factors, by a selection of the second point of view in the game narrative.","PeriodicalId":101488,"journal":{"name":"2022 IEEE 16th International Scientific Conference on Informatics (Informatics)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129207225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-23DOI: 10.1109/Informatics57926.2022.10083459
J. Kostolny, Veronika Salgová
It is essential to pay attention to secure access to systems in today's online world. When designing access to medical data management systems, knowing who is accessing the data and ensuring access only to authorized users is necessary. At the same time, these services must be uniform for several services and technologies, which would make it easier for users of the services to access them. When designing similar services, it is necessary to decide all the risks of third-party verification and the benefits of your solution with a unique approach. As part of the medical system design with micro-services, it was necessary to resolve the authorization and the authentication of access to individual modules or data. Each service can have a different level of security, which needs to be constantly verified when accessing the service. In this work, we present the solution of access using web tokens and authentication using a third-party service - a Microsoft account, which becomes universal access to services in academic conditions and allows simplification of access to various systems.
{"title":"Access Security Module of the Medical Data Management System","authors":"J. Kostolny, Veronika Salgová","doi":"10.1109/Informatics57926.2022.10083459","DOIUrl":"https://doi.org/10.1109/Informatics57926.2022.10083459","url":null,"abstract":"It is essential to pay attention to secure access to systems in today's online world. When designing access to medical data management systems, knowing who is accessing the data and ensuring access only to authorized users is necessary. At the same time, these services must be uniform for several services and technologies, which would make it easier for users of the services to access them. When designing similar services, it is necessary to decide all the risks of third-party verification and the benefits of your solution with a unique approach. As part of the medical system design with micro-services, it was necessary to resolve the authorization and the authentication of access to individual modules or data. Each service can have a different level of security, which needs to be constantly verified when accessing the service. In this work, we present the solution of access using web tokens and authentication using a third-party service - a Microsoft account, which becomes universal access to services in academic conditions and allows simplification of access to various systems.","PeriodicalId":101488,"journal":{"name":"2022 IEEE 16th International Scientific Conference on Informatics (Informatics)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116802209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}