William Steingartner
YOU?
Author Swipe
View article: National Cybersecurity Strategy Action Plan Implementation for Cyber Resilience: Qualitative Exploration and Achievements
National Cybersecurity Strategy Action Plan Implementation for Cyber Resilience: Qualitative Exploration and Achievements Open
The national cybersecurity strategy and action plan were developed and implemented based on the methodology developed by the National Council for Cybersecurity, which includes an evaluation model and an action plan with implementation meas…
View article: Morning Circle Web Application for Students with Special Educational Needs
Morning Circle Web Application for Students with Special Educational Needs Open
Every student is unique, exhibiting differences not only in their abilities and learning styles but also in their personal needs and interests. An individualized approach is especially vital in special schools, where students with a range …
View article: Perspectives of semantic modeling in categories
Perspectives of semantic modeling in categories Open
This paper explores the domain of semantic modeling, emphasizing the thoughtful influence of category theory on imperative programming. We aim to present a formal semantics model by seamlessly integrating categorical concepts. A core focus…
View article: Enhancing Semantics Learning: A Dynamic Environment for Abstract Language Implementation Education
Enhancing Semantics Learning: A Dynamic Environment for Abstract Language Implementation Education Open
The abstract implementation of the language on some abstract machine is a logical step in the definition of its operational semantics and in the definition of its (partially) correct implementation. An abstract machine for operational sema…
View article: Innovative Solutions for Tetraplegia: A Smart Hand Orthosis Design
Innovative Solutions for Tetraplegia: A Smart Hand Orthosis Design Open
Spinal cord injury (SCI) poses a significant medical challenge, affecting both hand dexterity and locomotor abilities. Ongoing advancements in medical technologies, spanning a spectrum of wearable devices, coupled with concurrent progress …
View article: Proof of equivalence of semantic methods for a selected domain-specific language
Proof of equivalence of semantic methods for a selected domain-specific language Open
Journal of Applied Mathematics and Computational Mechanics, Prace Naukowe Instytutu Matematyki i Informatyki, Politechnika Częstochowska, Scientific Research of the Institute of Mathematics and Computer Science, Czestochowa University of T…
View article: PA12 Surface Treatment and Its Effect on Compatibility with Nutritional Culture Medium to Maintain Cell Vitality and Proliferation
PA12 Surface Treatment and Its Effect on Compatibility with Nutritional Culture Medium to Maintain Cell Vitality and Proliferation Open
This research investigates the suitability of printed polyamide 12 (PA12) and its dyed version to support cells in bioengineering applications. For this purpose, human gingival fibroblasts (hGF06) were cultured on PA-12 scaffolds that were…
View article: Common Errors in High School Novice Programming
Common Errors in High School Novice Programming Open
Identifying and classifying the commonness of errors made by novices learning to write computer programs has long been of interest to both: researchers and educators. When teachers understand the nature of these errors and how students cor…
View article: Operational semantics in a domain-specific robot control language: A pedagogical use case
Operational semantics in a domain-specific robot control language: A pedagogical use case Open
In this paper, we focus on some aspects of structural operational semantics for a selected domain-specific language for robot control. After defining a syntax for two independent languages for control of a robot?s movements, we define a st…
View article: Valuation of Internet Companies – Selected Issues
Valuation of Internet Companies – Selected Issues Open
Authors have described selected problems related to valuation and value creation of Internet related companies. In case of intangible assets related to the new economy and Internet companies, valuation is usually much more complicated due …
View article: High School Students` Common Errors in Programming
High School Students` Common Errors in Programming Open
Identifying and classifying the commonness of errors made by novices learning to write computer programs has long been of interest to both: researchers and educators.Teachers understand the nature of these errors and how students act to co…
View article: The visualization of a graph semantics of imperative languages
The visualization of a graph semantics of imperative languages Open
This work aims to present the software support for teaching in the field of formal semantics of imperative programming languages. The main part focuses on a software tool that provides a visual representation of the individual steps of the…
View article: Formal Model of IDS Based on BDI Logic
Formal Model of IDS Based on BDI Logic Open
Computer network security is an important aspect of computer science. Many researchers are trying to increase security using different methods, technologies, or tools. One of the most common practices is the deployment of an Intrusion Dete…
View article: Domain Usability Evaluation
Domain Usability Evaluation Open
Contemporary software systems focus on usability and accessibility from the point of view of effectiveness and ergonomics. However, the correct usage of the domain dictionary and the description of domain relations and properties via their…
View article: Experimental Performance Evaluation of Enhanced User Interaction Components for Web-Based Collaborative Extended Reality
Experimental Performance Evaluation of Enhanced User Interaction Components for Web-Based Collaborative Extended Reality Open
COVID-19-related quarantine measures resulted in a significant increase of interest in online collaboration tools. This includes virtual reality (VR) or, in more general term, extended reality (XR) solutions. Shared XR allows for activitie…
View article: Threat Defense: Cyber Deception Approach and Education for Resilience in Hybrid Threats Model
Threat Defense: Cyber Deception Approach and Education for Resilience in Hybrid Threats Model Open
This paper aims to explore the cyber-deception-based approach and to design a novel conceptual model of hybrid threats that includes deception methods. Security programs primarily focus on prevention-based strategies aimed at stopping atta…
View article: Cyber Threats and Cyber Deception in Hybrid Warfare
Cyber Threats and Cyber Deception in Hybrid Warfare Open
Paper deals with the design of the model of hybrid threats and cyber deception platform and solution for cyber threat detection.National networks face a broad range of cyber threats.It includes advanced and persistent peril that can evade …
View article: A denotational semantics of a concatenative/compositional programming language
A denotational semantics of a concatenative/compositional programming language Open
A distinctive feature of concatenative languages is that a concatenation of their programs corresponds to a composition of meaning functions of these programs.At first programming in such languages may resemble assembly language programmin…
View article: Visualization of Formal Semantics - Possibilities of Attracting Formal Methods in Teaching
Visualization of Formal Semantics - Possibilities of Attracting Formal Methods in Teaching Open
The goal of formal semantics of languages is to reveal the nature of a language beneath its syntactic surface.One of the popular and frequently used methods is operational semantics.Its categorical representation using coalgebras is a new …
View article: On some innovations in teaching the formal semantics using software tools
On some innovations in teaching the formal semantics using software tools Open
In this work we discuss the motivation for innovations and need of a teaching tool for the visualization of the natural semantics method of imperative programming languages. We present the rôle of the teaching software, its design, develop…
View article: Use of Internet Social Networks in Academic Environment
Use of Internet Social Networks in Academic Environment Open
Numerous national and private Slovak universities and colleges are currently confronted with a state, where the offer of study programmes exceeds its demand - students’ interests. This paper describes reasons for this situation but mainly …
View article: A Novel Categorical Approach to Semantics of Relational First-Order Logic
A Novel Categorical Approach to Semantics of Relational First-Order Logic Open
We present a categorical formalization of a variant of first-order logic. Unlike other texts on this topic, the goal of this paper is to give a very transparent and self-contained account without requiring more background than basic logic …
View article: Coalgebraic Operational Semantics for an Imperative Language
Coalgebraic Operational Semantics for an Imperative Language Open
Operational semantics is a known and popular semantic method for describing the execution of programs in detail. The traditional definition of this method defines each step of a program as a transition relation. We present a new approach o…
View article: Learning software for handling the mathematical expressions
Learning software for handling the mathematical expressions Open
Journal of Applied Mathematics and Computational Mechanics, Prace Naukowe Instytutu Matematyki i Informatyki, Politechnika Częstochowska, Scientific Research of the Institute of Mathematics and Computer Science, Czestochowa University of T…
View article: Categorical semantics of programming languages
Categorical semantics of programming languages Open
Computer science uses still more formal models to aid the understanding of complex software systems and to reason about their behavior, in particular to verify the correctness of a system or at least some desired aspects of its behavior wi…