sequential diagram
Recently Published Documents


TOTAL DOCUMENTS

4
(FIVE YEARS 1)

H-INDEX

1
(FIVE YEARS 0)

2021 ◽  
Vol 128 (2) ◽  
pp. 912-931
Author(s):  
Ghazi Rekik ◽  
Yosra Belkhir ◽  
Mohamed Jarraya

In this study, we used Cognitive Load Theory to examine the role of a sequential versus simultaneous presentation technique for learning tactical skills from computerized diagrams of soccer scenes with two levels of complexity. Young soccer players learned the evolution of soccer game systems from computer-based diagrams with three types of instructional arrows: simultaneous, sequential-without-tracing, and sequential-with-tracing. We randomly assigned participants to one of six experimental conditions (three arrow presentation methods by two levels of soccer scene complexity) and asked them to rate their invested mental efforts, complete a recall-reconstruction test, and indicate their attitudes, immediately after the learning phase. When diagram content complexity was low, the three types of arrow presentations had similar learning effects. However, when diagram content complexity was high, the two sequential means of presenting instructional arrows produced better learning outcomes (with a clear relative advantage for the sequential-with-tracing presentation). We also found that the sequential presentation of arrows elicited more positive player attitudes whatever the level of content complexity. Considering the better learning outcomes and improved player attitudes from sequential diagram presentations, soccer coaches should present computer-based instructional diagram arrows sequentially, rather than simultaneously. A sequential-with-tracing arrow presentation was particularly beneficial for learning complex team sport scenes.


Symmetry ◽  
2019 ◽  
Vol 11 (4) ◽  
pp. 491 ◽  
Author(s):  
Schon Liang Cheng ◽  
Rosa Arnaldo Valdés ◽  
Victor Gómez Comendador ◽  
Francisco Sáez Nieto

This paper aims to present the application of a fishbone sequential diagram in air traffic management (ATM) incident investigations performing as a key connection between safety occurrence analysis methodology (SOAM) and accident/incident data reporting (ADREP) approaches. SOAM analysis is focused on organizational cause detection; nevertheless, this detection of individual causes from a complete incident scenario presents a complex analysis, and even more, the chronological relationship between causes, which is lacking in SOAM, should be tracked for post-investigation analysis. The conventional fishbone diagram is useful for failure cause classification; however, we consider that this technique can also show its potential to establish temporal dependencies between causes, which are categorized and registered with ADREP taxonomy for future database creation. A loss of separation incident that occurred in the Edmonton area (Canada) is used as a case study to illustrate this methodology as well as the whole analysis process.


2017 ◽  
Vol 1 (3) ◽  
pp. 217-225
Author(s):  
Dilson Dilson ◽  
Noviardi Noviardi

Penggunaan alokasi dana desa merupakan bagian tidak terpisahkan dari pengunaan keuangan desa yang meliputi perencanaan, pelaksanaan, penatausahaan, pelaporan, dan pertanggung jawaban. Oleh sebab itu pemerintahan desa harus mampu mengelola secara transparan, akuntabel, dan bebas dari penyalahgunaan. Tujuan penelitian adalah mengembangkan sebuah aplikasi pengelolaan Alokasi Dana Desa yang dapat digunakan oleh Bendahara Desa Durian Tinggi dalam proses pengeluaran dan pembelanjaan keuangan desa berdasarkan permintaan pelaksana kegiatan. Metode penelitian yang digunakan adalah metode Design Science Reseach Method (DSRM) dengan teknik Unified Model Language (UML) sebagai alat bantu analisa data yang terdiri dari class diagram, use case diagram, sequential diagram, dan activity diagram.  Hasil yang diharapkan dari pengembangan aplikasi adalah pengelolaan keuangan khususnya pengeluaran/belanja oleh bendahara berdasarkan permintaan yang diajukan oleh Pelaksana kegiatan. Berdasarkan bukti transaksi tersebut bendahara Desa dapat dengan mudah membuatkan bukti pembelanjaan dan Laporan Realisasi Anggaran Pendapatan dan Belanja Desa (LRAPB Desa).


Author(s):  
Pranav M. Pawar ◽  
Rasmus H. Nielsen ◽  
Neeli R. Prasad ◽  
Shingo Ohmori ◽  
Ramjee Prasad

Wireless sensor networks (WSNs) are growing enormously and becoming increasingly attractive for a variety of application areas such as tele-health monitoring, industry monitoring, home automation and many more. The primary weakness shared by all wireless application and technologies is the vulnerability to security attacks/threats. The performance and behaviour of a WSN are vastly affected by such attacks. In order to be able to better address the vulnerabilities of WSNs in terms of security, it is important to understand the behaviour of the attacks. This paper addresses the behavioural modelling of medium access control (MAC) security attacks in WSNs. The MAC layer is responsible for energy consumption, delay and channel utilization of the network and attacks on this layer can introduce significant degradation of the individual sensor nodes due to energy drain and in performance due to delays. The behavioural modelling of attacks will be beneficial for designing efficient and secureMAClayer protocols. The security attacks are modelled using a sequential diagram approach of Unified Modelling Language (UML). Further, a new attack definition, specific to hybrid MAC mechanisms, is proposed.


Sign in / Sign up

Export Citation Format

Share Document