Risk-Based Testing: A Case Study

Size: px
Start display at page:

Download "Risk-Based Testing: A Case Study"

Transcription

1 2010 Seventh International Conference on Information Technology Risk-Based Testing: A Case Study Ellen Souza Information Systems Bachelor Federal Rural University of Pernambuco Fazenda Saco, S/N C.P. 063, Serra Talhada PE, Brazil Cristine Gusmão, Júlio Venâncio Department of Systems and Computing University of Pernambuco Rua Benfica, 455, Madalena, Recife PE, Brazil Abstract This paper describes the application of risk-based testing for a software product evaluation in a real case study. Risk-based testing consists of a set of activities regarding risk factors identification related to software requirements. Once identified, the risks are prioritized according to their likelihood and impact and test cases are designed based on the strategies for treatment of the identified risk factors. Thus, test efforts are continuously adjusted according to risk monitoring. The paper also briefly reviews available risk-based es, describes the benefits that are likely to accrue from the growing body of work in this area and provides a set of problems, challenges and future work. Keywords: Case Study, Risk-Based Testing, Risk Management, Software Testing, Testing Process. 1. Introduction Software testing activity aims to improve the quality of software products through checking compliance of software products with its specification. However, software testing requires significant efforts. Testing activity may cost up to forty percent of the initial software development value [1]. Also, because the growth is exponential, the later a defect is found, the more expensive it is to correct [2]. In the delivery of software products, the test activity commonly does not receive the appropriate attention, because of restrictions of time, resources and cost. On the other hand, organizations do not want to miss clients due to bad product quality. In this context, it is fundamental to find a way to prioritize efforts and allocate resources to the software components that need to be tested carefully. Risk-Based Testing (RBT) aims to minimize some of these problems by risk factors identification related to software requirements [3]. Once identified, requirements are prioritized through risk analysis and the test cases are designed based on the strategies for treatment of the identified risks factors. Thus, test efforts are continually adjusted according to risk control and monitoring. This article presents a practical use of an RBT (RBTProcess) [4] during a software development project. The main objectives of this case study are to: (i) check if RBT can find defects faster than a non RBT ; and (ii) check whether the discovered defects are the ones with high severity. After this introduction, this paper is organized as follows: Section 2 presents the related work, showing some practical uses of RBT, results and restrictions; Section 3 gives an overview about the RBT process applied in this case study RBTProcess; Section 4 describes the case study execution flow and also the observed results; and finally, Section 5 draws some conclusions and points the way to further studies. 2. Related Work Traditional testers deal with risks and software testing, but commonly in an ad hoc fashion based on personal judgment [5]. Risk-based Testing concept addresses the explicit use of risk management activities inside the testing process. RBT justifies the testing efforts, focusing the testing activities where the probability of failure and loss are higher in the software. There are several RBT es in the literature. Some authors did not only propose, but also validate their es through empirical studies. Amland [5] proposes a set of metrics for risk analysis in order to support the RBT. The metrics consider that functionalities that are new, complex, with bad quality, are more likely to fail. The author proposes: (i) a functionality prioritization technique according to the risk exposure value obtained through /10 $ IEEE DOI /ITNG

2 defined metrics; (ii) some metrics to control and monitor the test activity and (iii) performed a case study in a financial application where the results were satisfactory as the time spent to test and the number of used resources suffered a considerable reduction comparing with a non RBT. Chen [6] proposes a method for test case and scenario selection based on risk for regression testing. The strategy for test cases and scenarios prioritization is based on Amland [5], presented previously. The author performed a case study in an industrial software product and its method was also considered very effective. Rosenberg and other authors [7] provide an for the object oriented paradigm, where classes that are more prone to fail are identified. The authors assume that the more complex is the code, higher is the incidence of failures in the software. They defined a set of object oriented software metrics which help to find classes with more probability to failure. These metrics were applied for three years at NASA (National Aeronautics and Space Administration) projects and they provided a good basis for test planning, allowing developers to find important defects as soon as possible. Stallbaum and other authors [8] propose an automated technique for risk-based test case prioritization using activity diagrams as test models. The authors implemented a prototype with the proposed and they applied it in a software product developed by the German Federal Ministry of Finance. According to the authors, their enables the early detection of critical faults during the development process. Next Section presents the RBTProcess, a complete RBT software testing process with well defined phases, activities, artifacts, roles, and metrics. 3. RBT Approach This Section briefly presents the RBTProcess, a testing process model based on risks. Figure 1 shows the process structure, where the activities in dark gray are the ones from risk management included in the test process (the activities in white). Further information about RBTProcess organization can be found in [3, 4]. Risk Identification: its main objective is to identify only technical risks that are commonly related to software functionalities or requirements. It includes a review of risks sources and categories to adapt the Taxonomy Based Questionnaire (TBQ) [9] and/or a risk checklist. The TBQ is answered by the project members, followed by a brainstorming meeting to validate the identified risks. Figure 1. RBTProcess activities, roles and phases Risk Analysis: in this activity, the software functionalities are prioritized by an heuristic risk analysis where the software engineers, together with the risk analyst, inform values to metrics like complexity, cost, size, quality, and others in order to find the Risk Exposure (RE) value for each functionality. Test Planning: the test manager defines the test, as well as the strategy and the number of test cycles based on the RE value. Using the RBT, the manager has more information about the software quality due to risk identification and analysis, making better use of time and resources. Test Design: the test cases are designed to mitigate the identified risks. For each risk, at least, one test case is designed. When software engineers answer the TBQ, they state the kind of risk and how that functionality can fail, so this information is used by the test design to project the risk-based test cases. Test Execution: the designed RBT test cases are executed in the RE order. The idea is to test first the functionalities that are more likely to fail. Test Evaluation and Risk Control: these activities monitor, respectively, the progress of test cases and the identified risks. A risk is mitigated when all test cases designed to assess it have been executed and passed. The test efforts are continuously adjusted according to risk monitoring. A set of metrics were proposed by the authors for risk monitoring in [3]. 1033

3 4. Case Study This section presents the case study characteristics by providing its purpose, the tool used to evaluate the called MPhyScas (Section 4.1), the performed steps to execute the case study (Section 4.2) and, finally, the observed results (Section 4.3). The MPhyScas team, together with the authors, performed the RBTProcess activities, explained in previous section, and a group of undergraduate students in computer engineering, with basic software testing knowledge, executed the designed RBT and non RBT test cases. 4.1 MPhyScaS: Evaluated Tool The RBTProcess was applied to the MPhyScaS (Multi-Physics and Multi-Scales Solver Environment) [10] tool development. MPhyScaS is an Eclipse RCP [11] environment dedicated to the automatic development of simulators based on Finite Element Method (FEM). MPhyScas is divided in four modules: (1) Components Repository with scientific software; (2) Executable Simulator, an interface for data input and executable simulator; (3) Interface for modeling and simulators builder and (4) Builder Module is the simulator framework. The Interface for modeling and simulators builder module was considered in this case study. It reads the simulator.xml file to present the simulation structure. After that, the user can model and build their own simulation by inputting values to the tree structure simulator. Therefore, the tool validates the inputted values at the beginning of the simulation. The tested functionalities are presented at Table 2 and Case Study Execution Flow Figure 2 shows the performed steps in the case study and they are detailed as follows. (1) The MPhyScas team members and the volunteers received four hours training about the RBTProcess and basic software testing knowledge. After that, the authors, together with MPhyScas team leader instantiated RBTProcess, creating the TBQ, explained in step three, and defining the process roles, as shown below: Risk Analyst: one of the authors Test Manager: one of the authors Test Design: one of the authors (risk-based) and an MPhyScas team member (non risk-based) Tester: Five computer engineering students Other Software Process Roles: MPhyScas team members (1) RBTProcess and basic software test training (7) (6) Cycle 1 (2) MPhyScas training (5) Test Planning Non-Risk based Test Case Risk-based Cycle 2 Non Riskbased Test Design Test Execution Non Riskbased Hybrid (8) Test Evaluation Risk-based Test Case Hybrid Risk based Figure 2. Case study execution flow (3) Risk Identification (4) Risk Analysis (2) Volunteers received two hours training about MPhyScas functionalities. (3) After requirement elicitation phase, MPhyScas members performed the RPTProcess Risk Identification activity. They answered the TBQ for each one of the software functionalities. An example of a question included in the TBQ is shown in Figure 3. The answers of MPhyScas members for the FUNC10 - GroupTasks functionality is also presented in this figure. (Q1) Is this functionality completely defined? If the answer is NO, which part is not defined? Answer 1: No. The types of state are missing for the Assembler Group Task. Answer 2: No. It is not clear the way Custom Group Task works. Figure 3. Example of TBQ questions At the end, the Risk Analyst summarizes the answers, removing also the inconsistencies. This questionnaire is the primary requirement for the test design, as it contains the risk to be tested for each functionality. 1034

4 (4) In this step, the MPhyScas members gave values to metrics related to requirement dependency, complexity, costs, size, quality, and others, to calculate the Risk Exposure (RE) for each functionality. The RE is used to classify, prioritize and define the sequence that functionalities are tested. (5) In this activity, the Test Manager defined the amount of test and cycles that are necessary to test the tool based on the number of identified risks. In the RBTProcess, the functionalities are classified as high, medium and low priority. Only functionalities classified as high and medium were tested in this case study. (6) Two types of test cases were designed: non riskbased (functional) and risk-based test cases. Risk-based: one of the authors designed riskbased test cases for the most important functionalities. For each identified risk a test case was created. As shown in Figure 3, the Group Task functionality is not completely defined, so riskbased test cases could be designed to evaluate only the Assembler and the Custom Group Tasks, which are the undefined parts informed by MPhyScas members. It is important to note that functional test cases would check all Group Tasks. Also, in order to keep the same number of non risk-based test cases, eleven test cases were designed to mitigate the eleven most important risks. Non Risk-based: an MPhyScas member with test design training designed functional test cases for each one of the software functionalities, resulting in a suite with eleven test cases. (7) For the test execution, the volunteers were divided in three groups. In each cycle, a group performed different type of test case, as shown in Figure 2. The three test execution es are explained below: Risk-based : test cases based on risks, designed according to RBTProcess Test Design activity and executed in the order specified by RE. Non risk-based : functional test cases projected by an MPhyScas team member and executed in an order that represents the users way of use. Hybrid : non risk-based test cases executed in the RE order. (8) After the test execution, the Test Manager and the MPhyScas team leader analyzed all test cases results, removing inconsistencies and false defects, and summarizing the results. 4.3 Observed Results Table 1 and Table 2 present the metrics related to the risks identification using the Taxonomy Based Questionnaire (TBQ) technique. Table 1. Time spent to identify risks in minutes M1 Time spent to identify risks per functionality 2.41 M2 Time spent to identify risks per person M3 Total time to identify risks 106 M1 presents the average time to identify a risk per functionality, while M2 presents the average time to identify risks for all functionalities per person (M2 = M1 * number of functionalities = 2.41 * 11). M3 is the total time spent to identify the risks associated to all functionalities (M3 = M2 * number of participants = * 4). Table 2. Quantity and types of the identified risks M4 Quantity of identified risks 49 M5 Quantity of different risks 30 M6 Quantity of different risks per functionality FUNC01-Simulator Properties 3 FUNC02-Kernel Configuration 3 FUNC03-Global States 0 FUNC04-Blocks 1 FUNC05-Create Group 1 FUNC06-Local States 0 FUNC07-Create Phenomenon 7 FUNC08-Phenomenon-State Relation 1 FUNC09-Quantity Tasks 1 FUNC10-Group Tasks 5 FUNC11-Search 8 M7 Quantity of different risks per person 7.5 M8 Quantity of different risks per type Stability 2 Completeness 11 Validity 8 Feasibility 8 Clarity 1 M4 is the quantity of risks identified by all participants, M5 is the quantity of risks identified by all participants, removing the repeated ones (M5 = M4 Number of Repeated Risks = 49-19) and M6 shows the quantity of identified risks per functionality. Functionalities seven, eleven and ten are the ones that appear to have more risks. M7 is the average quantity of different risks identified per person (M7 = M5 / number of participants = 30 / 4) and M8 shows the number of risks identified per type. Most identified risks are related to completeness, which indicates that functionalities are not completely defined and it was confirmed by all MPhyScas members. Table 3 presents the metrics related to the risks analysis using RBTProcess metrics. M9 presents the average time to analyze a risk per functionality, while M10 presents the average time to analyze risks for all 1035

5 functionalities per person (M10 = M9 * number of functionalities = 11). M11 is the total time spent to analyze all functionalities (M11 = M10 * number of participants = * 4). Table 3. Time spent to analyze risks in minutes M9 Time spent to analyze risks per functionality 1.05 M10 Time spent to analyze risks per person M11 Total time to analyze risks 46.2 Another key point is that the time spent for risk analysis and identification were collected to check if the risk management activities executed do not overload the testing process. The Risk Exposure (RE) value for each functionality is shown in Table 4. Table 4. Risk exposure value M11 Risk Exposure Value High FUNC10-Group Tasks 1.74 High FUNC02-Kernel Configuration 1.64 High FUNC11-Search 1.44 High FUNC07-Create Phenomenon 1.21 Medium FUNC04-Blocks 1.10 Medium FUNC05-Create Group 1.10 Medium FUNC03-Global States 1.04 Low FUNC09-Quantity Tasks 0.84 Low FUNC08-Phenomenon-State Relation 0.81 Low FUNC06-Local States 0.75 Low FUNC01-Simulator Properties 0.65 They were classified as high, medium and low priority. Functionalities classified as high and medium were tested in this case study. For the ones classified with low priority, test cases were created only if they had a risk associated to and test cases were executed if there was enough time. The risk-based and hybrid test cases run following the RE value order. Table 5 presents a general test execution result for the three es explained in Section 4, where Non RBT means Non risk-based and RBT means riskbased. Table 5. General test execution results Tester Cycle Approach Executed Test Cases Reported Defects Severity H M L One One Non RBT Three Two Non RBT Four One Non RBT Total Two One RBT Three One RBT Five Two RBT Total Five One Hybrid One Two Hybrid Four Two Hybrid Total Five volunteers executed different test es in two test cycles with approximately two hours duration. As an example, the tester called one performed non risk-based test cases in cycle one and hybrid test cases in cycle two. Regarding severity, column H means High, M is Medium and L is Low. This table also demonstrates that the risk-based found more defects than the others and what is interesting is that the hybrid the Non RBT test cases order by RE value, had also a result near to RBT. Analyzing now the severity, again, RBT had a better result, proving that the focus on the functionalities that are more likely to fail. Table 6 shows the defect concentration per test cases. Table 6. Defect found by test case Tester Cycle Approach Test Case Number Three Two Non RBT One One Non RBT 1 1 Four One Non RBT 1 Total Five Two RBT 8 2 Two One RBT 4 Three One RBT 4 Total Four Two Hybrid Five One Hybrid One Two Hybrid 1 Total While RBT found more defects in the first test cases, the Non RBT found more defects in the last ones. We could see also that the RBT was more effective than the hybrid as it found more than eight percent of the defects after the first test cases execution. It is worthwhile to say that RBT test case one explores the same functionality as Non RBT test case eleven. Table 7 completes the results from Table 6. It shows that, because of the execution order, the RBT and the hybrid es found most defects after 30 minutes execution. Table 7. Time to find a defect in minutes Tester Cycle Approach Time to find a defect in minutes Three Two Non RBT One One Non RBT 1 1 Four One Non RBT 1 Total Two One RBT Three One RBT Five Two RBT Total Five One Hybrid One Two Hybrid 1 Four Two Hybrid Total Table 8 shows the number of defects found per software functionality. 1036

6 Table 8. Defects found per functionality Tester Cycle Approach Functionalities One One Non RBT 1 1 Three Two Non RBT Four One Non RBT 1 Total Five Two RBT 8 2 Two One RBT 4 Three One RBT 4 Total Five One Hybrid One Two Hybrid 1 Four Two Hybrid Total The main finding here is that, the functionality that appears in this table with most defects is the one that had the greater risk exposure value in the risk analysis shown in Table Conclusion and Ongoing Work For this case study, through RBTProcess, we could prove that RBT really focuses on the parts of the software that are more likely to fail. This helps test managers to make better user of their limited time and resources. Therefore, we could prove also that RBT finds the most important defects earlier than functional, so they can be fixed earlier and consequently the software quality is improved faster and thus we can demonstrate cost benefit. As shown in Table 1 and Table 3, the time spent, respectively, to identify and analyze risks is not time consuming, confirming the adoption viability for most organizations that develop software. Also, the MPhyScas members did not find it difficult to perform these activities and externalized that the really attacked the correct functionalities, saving project time and resources. However, we cannot generalize those results, and other case studies and experiments needed to be performed to confirm those benefits. Therefore, some of the RBTProcess activities were performed by the authors due to an unavailability of human resources. Also, the MPhyScas members suggested a review in the risk analysis guide as they found it confusing to give values to some of the metrics. Another problem is that the results were summarized manually by the authors, taking a long to conclude. To minimize this problem, a tool, called RBTTool [12], is under development to provide support to RBT activities, especially to the ones related to risk management, which test engineers find more difficult to perform. Concluding, we can state that, although having some limitations, the RBT has a great potential applicability and it is also a cost saving. 6. References [1] Pressman, R. Engenharia de Software. 1st ed. Makron Books, São Paulo, Brazil, [2] Graham, D., van Veenendaal, E., Evans, I., Black, R. Foundations of Software Testing: ISTQB Certification. Thomson Learning, [3] Souza, E., Gusmão, C., Alves, K., Venâncio, J., Melo, R. Measurement and Control for Risk-based Test Cases and Activities. 10th IEEE Latin American Test Workshop - LATW, [4] Souza, E. RBTProcess: Modelo de Processo de Teste de Software baseado em Riscos. Master Thesis, University of Pernambuco, Recife/Brazil, [5] Amland, S., Risk Based Testing and Metrics: Risk analysis fundamentals and metrics for software testing. 5o International Conference EuroSTAR 99, [6] Chen, Y. Specification-based Regression Testing Measurement with Risk Analysis. Master Thesis, University of Ottawa/Canada, [7] Rosenberg, L. H., Stapko, R., Gallo. A. Risk-based object oriented testing. 24o Annual Software Engineering Workshop, NASA SEW24, [8] Stallbaum, H., Metzger, A., Pohl, K. An Automated Technique for Risk-based Test Case Generation and Prioritization. 3rd Workshop on Automation of Software Test, [9] Carr, M. J., Konda, S.L., Monarch, I., Ulrich, F. C., Walker, C. Taxonomy Based Risk Identification. Technical Report CMU/SEI-93-TR-6. Software Engineering Institute, [10] Oliveira, C., Rocha, F., Medeiros, R. W., Lima, R., Soares, S., Santos, F., Santos, I. H. S. Dynamic Interface for Multi-physics Simulators. International Journal of Modeling and Simulation for the Petroleum Industry, v. 2, p , [11] Burnette, E. Rich Client Platform (RCP) Tutorial One. Available at 1/tutorial1.html, 2006 [12] Venâncio, J., Gusmão, C., Mendes, E., Souza, E. RBTTool - Uma Ferramenta de Apoio à Abordagem de Teste de Software baseado em Riscos. 23o Brazilian Symposium on Software Engineering,

IT4305: Rapid Software Development Part 2: Structured Question Paper

IT4305: Rapid Software Development Part 2: Structured Question Paper UNIVERSITY OF COLOMBO, SRI LANKA UNIVERSITY OF COLOMBO SCHOOL OF COMPUTING DEGREE OF BACHELOR OF INFORMATION TECHNOLOGY (EXTERNAL) Academic Year 2014/2015 2 nd Year Examination Semester 4 IT4305: Rapid

More information

Visit us at:

Visit us at: White Paper Integrating Six Sigma and Software Testing Process for Removal of Wastage & Optimizing Resource Utilization 24 October 2013 With resources working for extended hours and in a pressurized environment,

More information

Implementing a tool to Support KAOS-Beta Process Model Using EPF

Implementing a tool to Support KAOS-Beta Process Model Using EPF Implementing a tool to Support KAOS-Beta Process Model Using EPF Malihe Tabatabaie Malihe.Tabatabaie@cs.york.ac.uk Department of Computer Science The University of York United Kingdom Eclipse Process Framework

More information

Software Maintenance

Software Maintenance 1 What is Software Maintenance? Software Maintenance is a very broad activity that includes error corrections, enhancements of capabilities, deletion of obsolete capabilities, and optimization. 2 Categories

More information

Towards a Collaboration Framework for Selection of ICT Tools

Towards a Collaboration Framework for Selection of ICT Tools Towards a Collaboration Framework for Selection of ICT Tools Deepak Sahni, Jan Van den Bergh, and Karin Coninx Hasselt University - transnationale Universiteit Limburg Expertise Centre for Digital Media

More information

Activities, Exercises, Assignments Copyright 2009 Cem Kaner 1

Activities, Exercises, Assignments Copyright 2009 Cem Kaner 1 Patterns of activities, iti exercises and assignments Workshop on Teaching Software Testing January 31, 2009 Cem Kaner, J.D., Ph.D. kaner@kaner.com Professor of Software Engineering Florida Institute of

More information

Requirements-Gathering Collaborative Networks in Distributed Software Projects

Requirements-Gathering Collaborative Networks in Distributed Software Projects Requirements-Gathering Collaborative Networks in Distributed Software Projects Paula Laurent and Jane Cleland-Huang Systems and Requirements Engineering Center DePaul University {plaurent, jhuang}@cs.depaul.edu

More information

IBM Software Group. Mastering Requirements Management with Use Cases Module 6: Define the System

IBM Software Group. Mastering Requirements Management with Use Cases Module 6: Define the System IBM Software Group Mastering Requirements Management with Use Cases Module 6: Define the System 1 Objectives Define a product feature. Refine the Vision document. Write product position statement. Identify

More information

TEACHING IN THE TECH-LAB USING THE SOFTWARE FACTORY METHOD *

TEACHING IN THE TECH-LAB USING THE SOFTWARE FACTORY METHOD * TEACHING IN THE TECH-LAB USING THE SOFTWARE FACTORY METHOD * Alejandro Bia 1, Ramón P. Ñeco 2 1 Centro de Investigación Operativa, Universidad Miguel Hernández 2 Depto. de Ingeniería de Sistemas y Automática,

More information

Summary BEACON Project IST-FP

Summary BEACON Project IST-FP BEACON Brazilian European Consortium for DTT Services www.beacon-dtt.com Project reference: IST-045313 Contract type: Specific Targeted Research Project Start date: 1/1/2007 End date: 31/03/2010 Project

More information

An Automated Data Fusion Process for an Air Defense Scenario

An Automated Data Fusion Process for an Air Defense Scenario 16 th ICCRTS 2011, June An Automated Data Fusion Process for an Air Defense Scenario André Luís Maia Baruffaldi [andre_baruffaldi@yahoo.com.br] José Maria P. de Oliveira [parente@ita.br] Alexandre de Barros

More information

University of Groningen. Systemen, planning, netwerken Bosman, Aart

University of Groningen. Systemen, planning, netwerken Bosman, Aart University of Groningen Systemen, planning, netwerken Bosman, Aart IMPORTANT NOTE: You are advised to consult the publisher's version (publisher's PDF) if you wish to cite from it. Please check the document

More information

Module 12. Machine Learning. Version 2 CSE IIT, Kharagpur

Module 12. Machine Learning. Version 2 CSE IIT, Kharagpur Module 12 Machine Learning 12.1 Instructional Objective The students should understand the concept of learning systems Students should learn about different aspects of a learning system Students should

More information

Multimedia Courseware of Road Safety Education for Secondary School Students

Multimedia Courseware of Road Safety Education for Secondary School Students Multimedia Courseware of Road Safety Education for Secondary School Students Hanis Salwani, O 1 and Sobihatun ur, A.S 2 1 Universiti Utara Malaysia, Malaysia, hanisalwani89@hotmail.com 2 Universiti Utara

More information

The IDN Variant Issues Project: A Study of Issues Related to the Delegation of IDN Variant TLDs. 20 April 2011

The IDN Variant Issues Project: A Study of Issues Related to the Delegation of IDN Variant TLDs. 20 April 2011 The IDN Variant Issues Project: A Study of Issues Related to the Delegation of IDN Variant TLDs 20 April 2011 Project Proposal updated based on comments received during the Public Comment period held from

More information

Experience and Innovation Factory: Adaptation of an Experience Factory Model for a Research and Development Laboratory

Experience and Innovation Factory: Adaptation of an Experience Factory Model for a Research and Development Laboratory Experience and Innovation Factory: Adaptation of an Experience Factory Model for a Research and Development Laboratory Full Paper Attany Nathaly L. Araújo, Keli C.V.S. Borges, Sérgio Antônio Andrade de

More information

Document number: 2013/ Programs Committee 6/2014 (July) Agenda Item 42.0 Bachelor of Engineering with Honours in Software Engineering

Document number: 2013/ Programs Committee 6/2014 (July) Agenda Item 42.0 Bachelor of Engineering with Honours in Software Engineering Document number: 2013/0006139 Programs Committee 6/2014 (July) Agenda Item 42.0 Bachelor of Engineering with Honours in Software Engineering Program Learning Outcomes Threshold Learning Outcomes for Engineering

More information

What is beautiful is useful visual appeal and expected information quality

What is beautiful is useful visual appeal and expected information quality What is beautiful is useful visual appeal and expected information quality Thea van der Geest University of Twente T.m.vandergeest@utwente.nl Raymond van Dongelen Noordelijke Hogeschool Leeuwarden Dongelen@nhl.nl

More information

TU-E2090 Research Assignment in Operations Management and Services

TU-E2090 Research Assignment in Operations Management and Services Aalto University School of Science Operations and Service Management TU-E2090 Research Assignment in Operations Management and Services Version 2016-08-29 COURSE INSTRUCTOR: OFFICE HOURS: CONTACT: Saara

More information

Problem Solving for Success Handbook. Solve the Problem Sustain the Solution Celebrate Success

Problem Solving for Success Handbook. Solve the Problem Sustain the Solution Celebrate Success Problem Solving for Success Handbook Solve the Problem Sustain the Solution Celebrate Success Problem Solving for Success Handbook Solve the Problem Sustain the Solution Celebrate Success Rod Baxter 2015

More information

Maximizing Learning Through Course Alignment and Experience with Different Types of Knowledge

Maximizing Learning Through Course Alignment and Experience with Different Types of Knowledge Innov High Educ (2009) 34:93 103 DOI 10.1007/s10755-009-9095-2 Maximizing Learning Through Course Alignment and Experience with Different Types of Knowledge Phyllis Blumberg Published online: 3 February

More information

What is PDE? Research Report. Paul Nichols

What is PDE? Research Report. Paul Nichols What is PDE? Research Report Paul Nichols December 2013 WHAT IS PDE? 1 About Pearson Everything we do at Pearson grows out of a clear mission: to help people make progress in their lives through personalized

More information

Guidelines for Writing an Internship Report

Guidelines for Writing an Internship Report Guidelines for Writing an Internship Report Master of Commerce (MCOM) Program Bahauddin Zakariya University, Multan Table of Contents Table of Contents... 2 1. Introduction.... 3 2. The Required Components

More information

A Pipelined Approach for Iterative Software Process Model

A Pipelined Approach for Iterative Software Process Model A Pipelined Approach for Iterative Software Process Model Ms.Prasanthi E R, Ms.Aparna Rathi, Ms.Vardhani J P, Mr.Vivek Krishna Electronics and Radar Development Establishment C V Raman Nagar, Bangalore-560093,

More information

Knowledge Elicitation Tool Classification. Janet E. Burge. Artificial Intelligence Research Group. Worcester Polytechnic Institute

Knowledge Elicitation Tool Classification. Janet E. Burge. Artificial Intelligence Research Group. Worcester Polytechnic Institute Page 1 of 28 Knowledge Elicitation Tool Classification Janet E. Burge Artificial Intelligence Research Group Worcester Polytechnic Institute Knowledge Elicitation Methods * KE Methods by Interaction Type

More information

Software Security: Integrating Secure Software Engineering in Graduate Computer Science Curriculum

Software Security: Integrating Secure Software Engineering in Graduate Computer Science Curriculum Software Security: Integrating Secure Software Engineering in Graduate Computer Science Curriculum Stephen S. Yau, Fellow, IEEE, and Zhaoji Chen Arizona State University, Tempe, AZ 85287-8809 {yau, zhaoji.chen@asu.edu}

More information

Different Requirements Gathering Techniques and Issues. Javaria Mushtaq

Different Requirements Gathering Techniques and Issues. Javaria Mushtaq 835 Different Requirements Gathering Techniques and Issues Javaria Mushtaq Abstract- Project management is now becoming a very important part of our software industries. To handle projects with success

More information

Success Factors for Creativity Workshops in RE

Success Factors for Creativity Workshops in RE Success Factors for Creativity s in RE Sebastian Adam, Marcus Trapp Fraunhofer IESE Fraunhofer-Platz 1, 67663 Kaiserslautern, Germany {sebastian.adam, marcus.trapp}@iese.fraunhofer.de Abstract. In today

More information

The open source development model has unique characteristics that make it in some

The open source development model has unique characteristics that make it in some Is the Development Model Right for Your Organization? A roadmap to open source adoption by Ibrahim Haddad The open source development model has unique characteristics that make it in some instances a superior

More information

Introduction of Open-Source e-learning Environment and Resources: A Novel Approach for Secondary Schools in Tanzania

Introduction of Open-Source e-learning Environment and Resources: A Novel Approach for Secondary Schools in Tanzania Introduction of Open-Source e- Environment and Resources: A Novel Approach for Secondary Schools in Tanzania S. K. Lujara, M. M. Kissaka, L. Trojer and N. H. Mvungi Abstract The concept of e- is now emerging

More information

Reducing Features to Improve Bug Prediction

Reducing Features to Improve Bug Prediction Reducing Features to Improve Bug Prediction Shivkumar Shivaji, E. James Whitehead, Jr., Ram Akella University of California Santa Cruz {shiv,ejw,ram}@soe.ucsc.edu Sunghun Kim Hong Kong University of Science

More information

Using Team-based learning for the Career Research Project. Francine White. LaGuardia Community College

Using Team-based learning for the Career Research Project. Francine White. LaGuardia Community College Team Based Learning and Career Research 1 Using Team-based learning for the Career Research Project Francine White LaGuardia Community College Team Based Learning and Career Research 2 Discussion Paper

More information

NATIONAL CENTER FOR EDUCATION STATISTICS RESPONSE TO RECOMMENDATIONS OF THE NATIONAL ASSESSMENT GOVERNING BOARD AD HOC COMMITTEE ON.

NATIONAL CENTER FOR EDUCATION STATISTICS RESPONSE TO RECOMMENDATIONS OF THE NATIONAL ASSESSMENT GOVERNING BOARD AD HOC COMMITTEE ON. NATIONAL CENTER FOR EDUCATION STATISTICS RESPONSE TO RECOMMENDATIONS OF THE NATIONAL ASSESSMENT GOVERNING BOARD AD HOC COMMITTEE ON NAEP TESTING AND REPORTING OF STUDENTS WITH DISABILITIES (SD) AND ENGLISH

More information

Platform for the Development of Accessible Vocational Training

Platform for the Development of Accessible Vocational Training Platform for the Development of Accessible Vocational Training Executive Summary January/2013 Acknowledgment Supported by: FINEP Contract 03.11.0371.00 SEL PUB MCT/FINEP/FNDCT/SUBV ECONOMICA A INOVACAO

More information

Execution Plan for Software Engineering Education in Taiwan

Execution Plan for Software Engineering Education in Taiwan 2012 19th Asia-Pacific Software Engineering Conference Execution Plan for Software Engineering Education in Taiwan Jonathan Lee 1, Alan Liu 2, Yu Chin Cheng 3, Shang-Pin Ma 4, and Shin-Jie Lee 1 1 Department

More information

Software Development Plan

Software Development Plan Version 2.0e Software Development Plan Tom Welch, CPC Copyright 1997-2001, Tom Welch, CPC Page 1 COVER Date Project Name Project Manager Contact Info Document # Revision Level Label Business Confidential

More information

4th Term MBA-2016 ½ credit

4th Term MBA-2016 ½ credit 4th Term MBA-2016 ½ credit Prof. Carlos García Pont MBA Program Academic Director Second Year Prof. Paulo Rocha e Oliveira E-mail: paulo@iese.edu Brazil Projects Introduction The IESE Brazil Field Project

More information

Including the Microsoft Solution Framework as an agile method into the V-Modell XT

Including the Microsoft Solution Framework as an agile method into the V-Modell XT Including the Microsoft Solution Framework as an agile method into the V-Modell XT Marco Kuhrmann 1 and Thomas Ternité 2 1 Technische Universität München, Boltzmann-Str. 3, 85748 Garching, Germany kuhrmann@in.tum.de

More information

PRODUCT COMPLEXITY: A NEW MODELLING COURSE IN THE INDUSTRIAL DESIGN PROGRAM AT THE UNIVERSITY OF TWENTE

PRODUCT COMPLEXITY: A NEW MODELLING COURSE IN THE INDUSTRIAL DESIGN PROGRAM AT THE UNIVERSITY OF TWENTE INTERNATIONAL CONFERENCE ON ENGINEERING AND PRODUCT DESIGN EDUCATION 6 & 7 SEPTEMBER 2012, ARTESIS UNIVERSITY COLLEGE, ANTWERP, BELGIUM PRODUCT COMPLEXITY: A NEW MODELLING COURSE IN THE INDUSTRIAL DESIGN

More information

Beyond the Blend: Optimizing the Use of your Learning Technologies. Bryan Chapman, Chapman Alliance

Beyond the Blend: Optimizing the Use of your Learning Technologies. Bryan Chapman, Chapman Alliance 901 Beyond the Blend: Optimizing the Use of your Learning Technologies Bryan Chapman, Chapman Alliance Power Blend Beyond the Blend: Optimizing the Use of Your Learning Infrastructure Facilitator: Bryan

More information

On-Line Data Analytics

On-Line Data Analytics International Journal of Computer Applications in Engineering Sciences [VOL I, ISSUE III, SEPTEMBER 2011] [ISSN: 2231-4946] On-Line Data Analytics Yugandhar Vemulapalli #, Devarapalli Raghu *, Raja Jacob

More information

Institutionen för datavetenskap. Hardware test equipment utilization measurement

Institutionen för datavetenskap. Hardware test equipment utilization measurement Institutionen för datavetenskap Department of Computer and Information Science Final thesis Hardware test equipment utilization measurement by Denis Golubovic, Niklas Nieminen LIU-IDA/LITH-EX-A 15/030

More information

COURSE LISTING. Courses Listed. Training for Cloud with SAP SuccessFactors in Integration. 23 November 2017 (08:13 GMT) Beginner.

COURSE LISTING. Courses Listed. Training for Cloud with SAP SuccessFactors in Integration. 23 November 2017 (08:13 GMT) Beginner. Training for Cloud with SAP SuccessFactors in Integration Courses Listed Beginner SAPHR - SAP ERP Human Capital Management Overview SAPHRE - SAP ERP HCM Overview Advanced HRH00E - SAP HCM/SAP SuccessFactors

More information

A Coding System for Dynamic Topic Analysis: A Computer-Mediated Discourse Analysis Technique

A Coding System for Dynamic Topic Analysis: A Computer-Mediated Discourse Analysis Technique A Coding System for Dynamic Topic Analysis: A Computer-Mediated Discourse Analysis Technique Hiromi Ishizaki 1, Susan C. Herring 2, Yasuhiro Takishima 1 1 KDDI R&D Laboratories, Inc. 2 Indiana University

More information

UCEAS: User-centred Evaluations of Adaptive Systems

UCEAS: User-centred Evaluations of Adaptive Systems UCEAS: User-centred Evaluations of Adaptive Systems Catherine Mulwa, Séamus Lawless, Mary Sharp, Vincent Wade Knowledge and Data Engineering Group School of Computer Science and Statistics Trinity College,

More information

Generating Test Cases From Use Cases

Generating Test Cases From Use Cases 1 of 13 1/10/2007 10:41 AM Generating Test Cases From Use Cases by Jim Heumann Requirements Management Evangelist Rational Software pdf (155 K) In many organizations, software testing accounts for 30 to

More information

M55205-Mastering Microsoft Project 2016

M55205-Mastering Microsoft Project 2016 M55205-Mastering Microsoft Project 2016 Course Number: M55205 Category: Desktop Applications Duration: 3 days Certification: Exam 70-343 Overview This three-day, instructor-led course is intended for individuals

More information

PRINCE2 Practitioner Certification Exam Training - Brochure

PRINCE2 Practitioner Certification Exam Training - Brochure PRINCE2 Practitioner Certification Exam Training - Brochure The Credential that makes you a Project Management Specialist Course Name : PRINCE2_P Version : INVL_PRINCE2P_BR_02_035_1.2 Course ID : PMGT

More information

Nearing Completion of Prototype 1: Discovery

Nearing Completion of Prototype 1: Discovery The Fit-Gap Report The Fit-Gap Report documents how where the PeopleSoft software fits our needs and where LACCD needs to change functionality or business processes to reach the desired outcome. The report

More information

Introduction to CRC Cards

Introduction to CRC Cards Softstar Research, Inc Methodologies and Practices White Paper Introduction to CRC Cards By David M Rubin Revision: January 1998 Table of Contents TABLE OF CONTENTS 2 INTRODUCTION3 CLASS4 RESPONSIBILITY

More information

Grade 2: Using a Number Line to Order and Compare Numbers Place Value Horizontal Content Strand

Grade 2: Using a Number Line to Order and Compare Numbers Place Value Horizontal Content Strand Grade 2: Using a Number Line to Order and Compare Numbers Place Value Horizontal Content Strand Texas Essential Knowledge and Skills (TEKS): (2.1) Number, operation, and quantitative reasoning. The student

More information

THEORY OF PLANNED BEHAVIOR MODEL IN ELECTRONIC LEARNING: A PILOT STUDY

THEORY OF PLANNED BEHAVIOR MODEL IN ELECTRONIC LEARNING: A PILOT STUDY THEORY OF PLANNED BEHAVIOR MODEL IN ELECTRONIC LEARNING: A PILOT STUDY William Barnett, University of Louisiana Monroe, barnett@ulm.edu Adrien Presley, Truman State University, apresley@truman.edu ABSTRACT

More information

Developing Students Research Proposal Design through Group Investigation Method

Developing Students Research Proposal Design through Group Investigation Method IOSR Journal of Research & Method in Education (IOSR-JRME) e-issn: 2320 7388,p-ISSN: 2320 737X Volume 7, Issue 1 Ver. III (Jan. - Feb. 2017), PP 37-43 www.iosrjournals.org Developing Students Research

More information

Note: Principal version Modification Amendment Modification Amendment Modification Complete version from 1 October 2014

Note: Principal version Modification Amendment Modification Amendment Modification Complete version from 1 October 2014 Note: The following curriculum is a consolidated version. It is legally non-binding and for informational purposes only. The legally binding versions are found in the University of Innsbruck Bulletins

More information

Hawai i Pacific University Sees Stellar Response Rates for Course Evaluations

Hawai i Pacific University Sees Stellar Response Rates for Course Evaluations Improvement at heart. CASE STUDY Hawai i Pacific University Sees Stellar Response Rates for Course Evaluations From my perspective, the company has been incredible. Without Blue, we wouldn t be able to

More information

Automating the E-learning Personalization

Automating the E-learning Personalization Automating the E-learning Personalization Fathi Essalmi 1, Leila Jemni Ben Ayed 1, Mohamed Jemni 1, Kinshuk 2, and Sabine Graf 2 1 The Research Laboratory of Technologies of Information and Communication

More information

Unit 3. Design Activity. Overview. Purpose. Profile

Unit 3. Design Activity. Overview. Purpose. Profile Unit 3 Design Activity Overview Purpose The purpose of the Design Activity unit is to provide students with experience designing a communications product. Students will develop capability with the design

More information

A cognitive perspective on pair programming

A cognitive perspective on pair programming Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2006 Proceedings Americas Conference on Information Systems (AMCIS) December 2006 A cognitive perspective on pair programming Radhika

More information

Integrating simulation into the engineering curriculum: a case study

Integrating simulation into the engineering curriculum: a case study Integrating simulation into the engineering curriculum: a case study Baidurja Ray and Rajesh Bhaskaran Sibley School of Mechanical and Aerospace Engineering, Cornell University, Ithaca, New York, USA E-mail:

More information

Module Title: Managing and Leading Change. Lesson 4 THE SIX SIGMA

Module Title: Managing and Leading Change. Lesson 4 THE SIX SIGMA Module Title: Managing and Leading Change Lesson 4 THE SIX SIGMA Learning Objectives: At the end of the lesson, the students should be able to: 1. Define what is Six Sigma 2. Discuss the brief history

More information

A GENERIC SPLIT PROCESS MODEL FOR ASSET MANAGEMENT DECISION-MAKING

A GENERIC SPLIT PROCESS MODEL FOR ASSET MANAGEMENT DECISION-MAKING A GENERIC SPLIT PROCESS MODEL FOR ASSET MANAGEMENT DECISION-MAKING Yong Sun, a * Colin Fidge b and Lin Ma a a CRC for Integrated Engineering Asset Management, School of Engineering Systems, Queensland

More information

Major Milestones, Team Activities, and Individual Deliverables

Major Milestones, Team Activities, and Individual Deliverables Major Milestones, Team Activities, and Individual Deliverables Milestone #1: Team Semester Proposal Your team should write a proposal that describes project objectives, existing relevant technology, engineering

More information

Fragment Analysis and Test Case Generation using F- Measure for Adaptive Random Testing and Partitioned Block based Adaptive Random Testing

Fragment Analysis and Test Case Generation using F- Measure for Adaptive Random Testing and Partitioned Block based Adaptive Random Testing Fragment Analysis and Test Case Generation using F- Measure for Adaptive Random Testing and Partitioned Block based Adaptive Random Testing D. Indhumathi Research Scholar Department of Information Technology

More information

Utilizing Soft System Methodology to Increase Productivity of Shell Fabrication Sushant Sudheer Takekar 1 Dr. D.N. Raut 2

Utilizing Soft System Methodology to Increase Productivity of Shell Fabrication Sushant Sudheer Takekar 1 Dr. D.N. Raut 2 IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 04, 2014 ISSN (online): 2321-0613 Utilizing Soft System Methodology to Increase Productivity of Shell Fabrication Sushant

More information

Notes on The Sciences of the Artificial Adapted from a shorter document written for course (Deciding What to Design) 1

Notes on The Sciences of the Artificial Adapted from a shorter document written for course (Deciding What to Design) 1 Notes on The Sciences of the Artificial Adapted from a shorter document written for course 17-652 (Deciding What to Design) 1 Ali Almossawi December 29, 2005 1 Introduction The Sciences of the Artificial

More information

CONSULTATION ON THE ENGLISH LANGUAGE COMPETENCY STANDARD FOR LICENSED IMMIGRATION ADVISERS

CONSULTATION ON THE ENGLISH LANGUAGE COMPETENCY STANDARD FOR LICENSED IMMIGRATION ADVISERS CONSULTATION ON THE ENGLISH LANGUAGE COMPETENCY STANDARD FOR LICENSED IMMIGRATION ADVISERS Introduction Background 1. The Immigration Advisers Licensing Act 2007 (the Act) requires anyone giving advice

More information

WHY SOLVE PROBLEMS? INTERVIEWING COLLEGE FACULTY ABOUT THE LEARNING AND TEACHING OF PROBLEM SOLVING

WHY SOLVE PROBLEMS? INTERVIEWING COLLEGE FACULTY ABOUT THE LEARNING AND TEACHING OF PROBLEM SOLVING From Proceedings of Physics Teacher Education Beyond 2000 International Conference, Barcelona, Spain, August 27 to September 1, 2000 WHY SOLVE PROBLEMS? INTERVIEWING COLLEGE FACULTY ABOUT THE LEARNING

More information

Just in Time to Flip Your Classroom Nathaniel Lasry, Michael Dugdale & Elizabeth Charles

Just in Time to Flip Your Classroom Nathaniel Lasry, Michael Dugdale & Elizabeth Charles Just in Time to Flip Your Classroom Nathaniel Lasry, Michael Dugdale & Elizabeth Charles With advocates like Sal Khan and Bill Gates 1, flipped classrooms are attracting an increasing amount of media and

More information

Stacks Teacher notes. Activity description. Suitability. Time. AMP resources. Equipment. Key mathematical language. Key processes

Stacks Teacher notes. Activity description. Suitability. Time. AMP resources. Equipment. Key mathematical language. Key processes Stacks Teacher notes Activity description (Interactive not shown on this sheet.) Pupils start by exploring the patterns generated by moving counters between two stacks according to a fixed rule, doubling

More information

OilSim. Talent Management and Retention in the Oil and Gas Industry. Global network of training centers and technical facilities

OilSim. Talent Management and Retention in the Oil and Gas Industry. Global network of training centers and technical facilities NExT Oil & Gas Training and Competency Development Global network of training centers and technical facilities Talent Management and Retention in the Oil and Gas Industry Regional Offices Build multidisciplinary

More information

Chamilo 2.0: A Second Generation Open Source E-learning and Collaboration Platform

Chamilo 2.0: A Second Generation Open Source E-learning and Collaboration Platform Chamilo 2.0: A Second Generation Open Source E-learning and Collaboration Platform doi:10.3991/ijac.v3i3.1364 Jean-Marie Maes University College Ghent, Ghent, Belgium Abstract Dokeos used to be one of

More information

Motivation to e-learn within organizational settings: What is it and how could it be measured?

Motivation to e-learn within organizational settings: What is it and how could it be measured? Motivation to e-learn within organizational settings: What is it and how could it be measured? Maria Alexandra Rentroia-Bonito and Joaquim Armando Pires Jorge Departamento de Engenharia Informática Instituto

More information

Operational Knowledge Management: a way to manage competence

Operational Knowledge Management: a way to manage competence Operational Knowledge Management: a way to manage competence Giulio Valente Dipartimento di Informatica Universita di Torino Torino (ITALY) e-mail: valenteg@di.unito.it Alessandro Rigallo Telecom Italia

More information

Initial English Language Training for Controllers and Pilots. Mr. John Kennedy École Nationale de L Aviation Civile (ENAC) Toulouse, France.

Initial English Language Training for Controllers and Pilots. Mr. John Kennedy École Nationale de L Aviation Civile (ENAC) Toulouse, France. Initial English Language Training for Controllers and Pilots Mr. John Kennedy École Nationale de L Aviation Civile (ENAC) Toulouse, France Summary All French trainee controllers and some French pilots

More information

Len Lundstrum, Ph.D., FRM

Len Lundstrum, Ph.D., FRM , Ph.D., FRM Professor of Finance Department of Finance College of Business Office: 815 753-0317 Northern Illinois University Fax: 815 753-0504 Dekalb, IL 60115 llundstrum@niu.edu Education Indiana University

More information

Using Virtual Manipulatives to Support Teaching and Learning Mathematics

Using Virtual Manipulatives to Support Teaching and Learning Mathematics Using Virtual Manipulatives to Support Teaching and Learning Mathematics Joel Duffin Abstract The National Library of Virtual Manipulatives (NLVM) is a free website containing over 110 interactive online

More information

An OO Framework for building Intelligence and Learning properties in Software Agents

An OO Framework for building Intelligence and Learning properties in Software Agents An OO Framework for building Intelligence and Learning properties in Software Agents José A. R. P. Sardinha, Ruy L. Milidiú, Carlos J. P. Lucena, Patrick Paranhos Abstract Software agents are defined as

More information

Radius STEM Readiness TM

Radius STEM Readiness TM Curriculum Guide Radius STEM Readiness TM While today s teens are surrounded by technology, we face a stark and imminent shortage of graduates pursuing careers in Science, Technology, Engineering, and

More information

Designing a Rubric to Assess the Modelling Phase of Student Design Projects in Upper Year Engineering Courses

Designing a Rubric to Assess the Modelling Phase of Student Design Projects in Upper Year Engineering Courses Designing a Rubric to Assess the Modelling Phase of Student Design Projects in Upper Year Engineering Courses Thomas F.C. Woodhall Masters Candidate in Civil Engineering Queen s University at Kingston,

More information

Simulation in Maritime Education and Training

Simulation in Maritime Education and Training Simulation in Maritime Education and Training Shahrokh Khodayari Master Mariner - MSc Nautical Sciences Maritime Accident Investigator - Maritime Human Elements Analyst Maritime Management Systems Lead

More information

TA Script of Student Test Directions

TA Script of Student Test Directions TA Script of Student Test Directions SMARTER BALANCED PAPER-PENCIL Spring 2017 ELA Grade 6 Paper Summative Assessment School Test Coordinator Contact Information Name: Email: Phone: ( ) Cell: ( ) Visit

More information

White Paper. The Art of Learning

White Paper. The Art of Learning The Art of Learning Based upon years of observation of adult learners in both our face-to-face classroom courses and using our Mentored Email 1 distance learning methodology, it is fascinating to see how

More information

On the Combined Behavior of Autonomous Resource Management Agents

On the Combined Behavior of Autonomous Resource Management Agents On the Combined Behavior of Autonomous Resource Management Agents Siri Fagernes 1 and Alva L. Couch 2 1 Faculty of Engineering Oslo University College Oslo, Norway siri.fagernes@iu.hio.no 2 Computer Science

More information

Using interactive simulation-based learning objects in introductory course of programming

Using interactive simulation-based learning objects in introductory course of programming Available online at www.sciencedirect.com Procedia - Social and Behavioral Sciences 46 ( 2012 ) 2276 2280 WCES 2012 Using interactive simulation-based learning objects in introductory course of programming

More information

Specification and Evaluation of Machine Translation Toy Systems - Criteria for laboratory assignments

Specification and Evaluation of Machine Translation Toy Systems - Criteria for laboratory assignments Specification and Evaluation of Machine Translation Toy Systems - Criteria for laboratory assignments Cristina Vertan, Walther v. Hahn University of Hamburg, Natural Language Systems Division Hamburg,

More information

OCR LEVEL 3 CAMBRIDGE TECHNICAL

OCR LEVEL 3 CAMBRIDGE TECHNICAL Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT SYSTEMS ANALYSIS K/505/5481 LEVEL 3 UNIT 34 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 SYSTEMS ANALYSIS K/505/5481 LEVEL

More information

PROGRAM HANDBOOK. for the ACCREDITATION OF INSTRUMENT CALIBRATION LABORATORIES. by the HEALTH PHYSICS SOCIETY

PROGRAM HANDBOOK. for the ACCREDITATION OF INSTRUMENT CALIBRATION LABORATORIES. by the HEALTH PHYSICS SOCIETY REVISION 1 was approved by the HPS BOD on 7/15/2004 Page 1 of 14 PROGRAM HANDBOOK for the ACCREDITATION OF INSTRUMENT CALIBRATION LABORATORIES by the HEALTH PHYSICS SOCIETY 1 REVISION 1 was approved by

More information

Strategy and Design of ICT Services

Strategy and Design of ICT Services Strategy and Design of IT Services T eaching P lan Telecommunications Engineering Strategy and Design of ICT Services Teaching guide Activity Plan Academic year: 2011/12 Term: 3 Project Name: Strategy

More information

Brainstorming Tools Literature Review and Introduction to Code Development

Brainstorming Tools Literature Review and Introduction to Code Development Brainstorming Tools Literature Review and Introduction to Code Development K. Nordland August 28, 2006 1 Contents 1 Definition 3 2 Alex Osborn 3 3 Brainstorming and Stage-Gate 4 4 Recent Developments 4

More information

Evaluation of Teach For America:

Evaluation of Teach For America: EA15-536-2 Evaluation of Teach For America: 2014-2015 Department of Evaluation and Assessment Mike Miles Superintendent of Schools This page is intentionally left blank. ii Evaluation of Teach For America:

More information

Comprehensive Program Review Report (Narrative) College of the Sequoias

Comprehensive Program Review Report (Narrative) College of the Sequoias Program Review - Child Development Comprehensive Program Review Report (Narrative) College of the Sequoias Program Review - Child Development Prepared by: San Dee Hodges, Rebecca Griffith, Gwenette Aytman

More information

E-Learning project in GIS education

E-Learning project in GIS education E-Learning project in GIS education MARIA KOULI (1), DIMITRIS ALEXAKIS (1), FILIPPOS VALLIANATOS (1) (1) Department of Natural Resources & Environment Technological Educational Institute of Grete Romanou

More information

Leveraging MOOCs to bring entrepreneurship and innovation to everyone on campus

Leveraging MOOCs to bring entrepreneurship and innovation to everyone on campus Paper ID #9305 Leveraging MOOCs to bring entrepreneurship and innovation to everyone on campus Dr. James V Green, University of Maryland, College Park Dr. James V. Green leads the education activities

More information

Web-based Learning Systems From HTML To MOODLE A Case Study

Web-based Learning Systems From HTML To MOODLE A Case Study Web-based Learning Systems From HTML To MOODLE A Case Study Mahmoud M. El-Khoul 1 and Samir A. El-Seoud 2 1 Faculty of Science, Helwan University, EGYPT. 2 Princess Sumaya University for Technology (PSUT),

More information

ECE-492 SENIOR ADVANCED DESIGN PROJECT

ECE-492 SENIOR ADVANCED DESIGN PROJECT ECE-492 SENIOR ADVANCED DESIGN PROJECT Meeting #3 1 ECE-492 Meeting#3 Q1: Who is not on a team? Q2: Which students/teams still did not select a topic? 2 ENGINEERING DESIGN You have studied a great deal

More information

SESSION III: Training on Conducting the Informed Consent Process

SESSION III: Training on Conducting the Informed Consent Process SESSION III: Training on Conducting the Informed Consent Process Jennifer Lentz, Eli Lilly & Co. March 10, 2015 Session III Objectives! Present examples of innovative informed consent training programs!

More information

BUILD-IT: Intuitive plant layout mediated by natural interaction

BUILD-IT: Intuitive plant layout mediated by natural interaction BUILD-IT: Intuitive plant layout mediated by natural interaction By Morten Fjeld, Martin Bichsel and Matthias Rauterberg Morten Fjeld holds a MSc in Applied Mathematics from Norwegian University of Science

More information

Prince2 Foundation and Practitioner Training Exam Preparation

Prince2 Foundation and Practitioner Training Exam Preparation Prince2 Foundation and Practitioner Training Exam Preparation Prince2 is the UK Government Best Practice standard and is widely recognized and used for effective Project management methodology and tools.

More information

Abstract. Janaka Jayalath Director / Information Systems, Tertiary and Vocational Education Commission, Sri Lanka.

Abstract. Janaka Jayalath Director / Information Systems, Tertiary and Vocational Education Commission, Sri Lanka. FEASIBILITY OF USING ELEARNING IN CAPACITY BUILDING OF ICT TRAINERS AND DELIVERY OF TECHNICAL, VOCATIONAL EDUCATION AND TRAINING (TVET) COURSES IN SRI LANKA Janaka Jayalath Director / Information Systems,

More information

School Leadership Rubrics

School Leadership Rubrics School Leadership Rubrics The School Leadership Rubrics define a range of observable leadership and instructional practices that characterize more and less effective schools. These rubrics provide a metric

More information