Paper ID #7468Piloting a New Curriculum: A View from the TrenchesDr. Krystal S Corbett, Cyber Innovation CenterDr. Chuck Gardner, New Orleans Military and Maritime AcademyMr. Anthony Joseph Taffaro Jr., New Orleans Military and Maritime Academy Mr. Anthony Joseph Taffaro, Jr. is a native of New Orleans, Louisiana, and has resided in the New Orleans area his entire life. Mr. Taffaro is a graduate of Jesuit High School New Orleans and Tulane University. At Tulane, Mr. Taffaro received Bachelor of Arts in Social Sciences and a minor in Business Studies. Mr. Taffaro spent much of his career in the banking industry and entered
demonstrate differences in team performance for simulations and real robotexperiments. While simulations are good for quicker testing and a cheaper solution thanpurchasing equipment, conducting experiments with real robots allows for more accurate results.In physical experiments, there are many factors, such as robot interference, an unknownenvironment, and delayed communications, which can influence results. However, running realexperiments are required to accurately test the efficiency of an approach. Future work includesexamining these factors further.Bibliography[1] S. Dawson, B. L. Wellman, and M. Anderson, “Using simulation to predict multi-robot performance on coveragetasks,” in Intelligent Robots and Systems (IROS), 2010 IEEE/RSJ
mance. Figu ure 10: A flow wchart for a laboratory eexperiment llinking pagee.Figure 100 shows a floowchart for this t feature, while Figurre 11 shows the front endd of thisapplicatio on. As it is now, n there are a ten experriments availlable for possting for the students. W Withthe drop down menu, one can cho oose which experiment((s) can be poosted and theen click on thhesubmit buutton
Pennsylvania in May 2012. Currently, his research interests consist of higher education curricula, both with universities and medical schools.Dr. Ali Sanati-Mehrizy Dr. Ali Sanati-Mehrizy is a graduate of the Milton S. Hershey Pennsylvania State University College of Medicine. He completed his undergraduate studies in Biology from the University of Utah. In July 2013, he will begin a Pediatrics residency at the UMDNJ-Newark University Hospital. His research interests involve pediatric hematology and oncology as well as higher education curricula, both with universities and medical schools.Dr. Reza Sanati-Mehrizy, Utah Valley University REZA SANATI MEHRIZY is a professor of Computing Sciences Department at Utah Valley
appreciate the lab experience.While all these topics are addressed in the class, with supporting data, and examples, the lab onlyaddresses a subset of these concepts.The lab is designed around the idea of the time-machine in the movie “Back to the Future”. Asmall microcontroller is connected to two analog input devices—representing the brake andaccelerator of the DeLorean Sports car/time machine used in the movie. The microcontrollerincludes web server hardware and software and it serves up a dynamic web page. Thespeedometer of the DeLorean is displayed on a web page both as an analog speedometer dial andas a digital display.There was some concern that since the movie trilogy was released in the 1980’s, that many of thestudents would be unfamiliar
“Revolution Postponed” is a critical analysis and review of the Human Genome Project. In thisarticle, published in Scientific American, author Stephen S. Hall compares the current progressof the endeavor to its projected outcome and discusses its future potential. The overall sentimentof the article is that the extensive amount of research and resources applied to the project hasproduced too few valuable results. Page 23.636.4When the Human Genome Project commenced in 2000, many anticipated that it would transformmedicine and essentially lead to the cure of most human diseases within ten years. That ten yearwindow has closed, and while the project has
, 2009.10. J. Wang, H. Abid, S. Lee, L. Shu, and F. Xia, “A Secured Health Care Application Architecture for Cyber- Physical Systems.” Control Engineering and Applied Informatics, Vol.13, No.3, pp. 101-108, 201111. N. Falliere, L. O. Murchu, and E. Chien, “W32 . Stuxnet Dossier version 1.4,” [Online] http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_stuxnet_doss ier.pdf, 2011.12. N. Adam, "Workshop on Future Directions in Cyber-Physical Systems Security ", in Report on Workshop on Future Directions in Cyber-Physical Systems Security, January, 2010.13. M.J. Peterson, “Bhopal Plant Disaster – Situation Summary,” Science, Technology & Society Initiative, University of
and high school social studies classes. Page 23.144.1 Dr. Gardner-McCune recently completed a year and a half long Post-Doctoral Research position in com- puter science education at Georgia Institute of Technology’s College of Computing where she led the design of the I-3 Experience programs. She holds a B. S. degree in Computer Engineering from Syra- cuse University, and earned both her masters and doctorate in Computer Science from Georgia Institute c American Society for Engineering Education, 2013
. In Presence: Teleoperators and Virtual Environments 6, 4(August 1997), 355-385.[3] Mellor, J.P., "Enhanced Reality Visualization in a Surgical Environment, A.I. Technical Report No. 1544," 1995.[4] Grimson, W. E. L., Ettinger, G. J., White, S. J. and Lozano-Perez, T. "An automatic registration method forframeless stereotaxy, image guided surgery, and enhanced reality," IEEE Transactions on Medical Imaging, vol. 15,pp. 129-140, 1996.[5] Schmalsteig, D., Fuhrmann, A., Hessina, G., Szalavari, Z., Encarnacao, L. M., Gervautz, M., Purgathofer, W.,"The Studierstube Augmented Reality Project," Presence, vol. II, pp. 33-54, February, 2002 2002.[6] Chastine, J.W., Brooks, J. C., Zhu, Y., Owen, G. S., Harrison, R. W., and I.T. Weber, "AMMP-Vis
betweeneach variable and each factor. For items that were loaded under two factors, only thehighest loading was retained. The following variances were reported for the factors:factor1, σ2 = 38.62%; factor2, σ2 = 8.41%; factor3, σ2 = 6.73%; factor4, σ2 = 5.36%; andfactor5, σ2 = 4.81%.After evaluating the items loaded under each factor, factor1 was labelled CommunityInfluence (CI), factor2 Satisfaction (S), factor3 Service Quality (SQ), factor4 Learnability(L) and factor5 Technical Quality (TQ). Five new variables were computed on the basisof the means of the items falling under each factor. To compare the factors as rated byusers, one-way repeated measures ANOVA was applied to the five variables. Repeatedmeasures ANOVA indicated significant
prepared and given resources necessary to run a successful workshop. ● Only evaluated or research-based practices that work with diverse students are presented. Evidence of effectiveness is provided for all recommended practices. ● Presented examples and resources are easily used and adapted without ongoing support or instruction. ● Inclusion of success stories by energetic high school teachers (local if possible) using recommended practices. ● Active learning components; e.g., group problem solving to facilitate workshop ice breaker activities. ● Sessions including: ○ Current conditions and need for computing in high school. ○ CS1-type course(s) that promotes more and diverse computing majors
architecture,” Proc. IEEE Workshop Computer Architecture Pattern Anal. Machine Intel., pp. 115-121, Oct.1987.4. R. O. Duda and P. E. Hart, “Use of the Hough transformation to detect lines and curves in pictures,” CACM, 15, (1),pp. 11-15, 1972.5. A. L. Fisher and P. T. Highnam, “Computing the Hough Transforms on a Scan Line Array Processor,” IEEE Trans.on PAMI, vol. 11, no. 3, pp.262-265, March 1989.6. H. A. H. Ibrahim, J. R. Kender, and D. E. Shaw, “The Analysis and Performance of Two Middle-level Vision Taskson a Fine-grained SIMD Tree Machine,” Proceedings IEEE Conf. Comput. Vis. Pattern Recog. pp. 248-256, June 1985.7. P. V. C. Hough, “A method and means for recognizing complex patterns,”U.S. Patent 3,069,654, 1962.8. C. S. Kannan and H. Y. H
Security Instruction. J. Educ. Resour. Comput. 6(4), 5. doi: 10.1145/1248453.1248458.2. Cao, X., Y. Wang. Wang, A. Carciula & Wang. 2009. Developing a multifunctional network laboratory for teaching and research. In Proceedings of the 10 th ACM conference on SIG-information technology education, 155-160. Fairfax, Virginia, USA: ACM.3. Curtis, S. 2011. World IPv4 Stocks Finally Run Out. TechWeek Europe.4. DoD HPC. 2012. IPv6 not Needed Here. Retrieved 11 December, 2012 from http://www.hpcmo.hpc.mil/cms2/5. EMC. 2012. EMC Academic Alliance. Retrieved 11 December, 2012, from https://education.emc.com/academicalliance.6. Hamza, M. K., Alhalabi, B., Hsu, S., Larrondo-Petre, M. M., and Marcovitz, D.M. 2003. Remote
satisfaction and delivery.Communications management: Proceed with systems development even if client isunavailable to review and give feedback on progress; the initial requirements should begood enough to do so. This will eliminate major development delays. We have not yetcompleted a survey of users to establish this and to determine whether there are anysoftware and hardware problems in implementing the automated system.Reference:1. Jayaprakash, M. and Balasubramani, R. (2011). “Status of Automation in University Libraries of Tamilnadu: A Survey”. European Journal of Scientific Research, 53(1), pp. 17-24.2. Rajput, P. and Jain, S. (2006). “Status of automation in special library and information centers of Gwalior: A survey”. NCIMDL, pp. 55-64.3
Page 23.154.3contain the item in y. Properties of association rules may be expressed in terms of differentdefined measures. The support count of an itemset is the number of transactions that contain theitemset. We denote the number of elements in an itemset x by |x|. Then the support of itemset x is σ ( x) = {t i | x ∈ t i , t i ∈ T } .The support of a rule x→ y, is the proportion of transactions that contain the itemsets in the rule.This is the support count of the union of the antecedent and the consequent divided by the totalnumber of transactions as in Equation 1. σ ( x ∪ y) s( x → y
Science Education, pages 131-152.3. C.A. Shaffer, M.L. Cooper, A.J.D. Alon, M. Akbar, M. Stewart, S. Ponce, and S.H. Edwards. (2010). Algorithmvisualization: The state of the Field. ACM Transactions on Computing Education, 10:1-22.4. E. Fouh, M. Akbar, and C.A. Shaffer (2012). The Role of Visualization in Computer Science Education, Com-puters in the Schools 29, Issue 1-2, 95—117.5. L. Malmi, V. Karavirta, A. Korhonen, J. Nikander, O. Seppala, and P. Silvasti (2004). Visual algorithm simula-tion exercise system with automatic assessment: TRAKLA2. Informatics in Education, 3(2):267- 288.6. C.A. Shaffer, M. Akbar, A.J.D. Alon, M. Stewart, and S.H. Edwards (2011). Getting Algorithm Visualizationsinto the Classroom in Proceedings of the 42nd ACM
Science with an emphasis in Database Engineering. He is currently employed at Lucid Software Inc.Dr. Afsaneh Minaie, Utah Valley University Afsaneh Minaie is a professor of Computer Engineering at Utah Valley University. Her research interests include gender issues in the academic sciences and engineering elds, Embedded Systems Design, Mobile Computing, Wireless Sensor Networks, and Databases.Dr. Ali Sanati-Mehrizy Dr. Ali Sanati-Mehrizy is a graduate of the Milton S. Hershey Pennsylvania State University College of Medicine. He completed his undergraduate studies in Biology from the University of Utah. In July 2013, he will begin a Pediatrics residency at the UMDNJ-Newark University Hospital. His research interests
. Sci. Coll., 27(3):31–37, January 2012.[28] Mendeley Ltd. Mendeley: Reference Manager and Academic Social Network. http://www.mendeley.com/, September 2012.[29] Masoud Milani, S. Masoud Sadjadi, Raju Rangaswami, Peter J. Clarke, and Tao Li. Research experiences for undergraduates: autonomic computing research at fiu. In The Fifth Richard Tapia Celebration of Diversity in Computing Conference: Intellect, Initiatives, Insight, and Innovations, TAPIA ’09, pages 93–97, New York, NY, USA, 2009. ACM.[30] Joan Peckham, Fatma Mili, Daniela Stan Raicu, and Ingrid Russell. Reus: undergraduate research experiences and funding. J. Comput. Sci. Coll., 23(5):208–211, May 2008
recomendations for the future," Josurnal of Information Science, vol. 18, pp. 217-224, 1992.5. T. R. Guskey, "Professional development and teacher change," Teachers and Teaching: theory and practice, vol. 8, pp. 381-391, 2002.6. M. Palacios, Por una reforma de la educación técnica y tecnológica para modernizar a Colombia. 19907. EAFIT. (2011, August 20). Alianza Futuro Digital Medellin. Available: http://www.futurodigital.org/8. S. Kemmis and R. McTaggart, The action research reader: Deakin university press, 1988.9. W. Hunter, "Action research as a framework for science education research," in Theoretical frameworks for research in chemistry/science education, G. Bodner and M. K. Orgill, Eds., ed: Prentice Hall, 2007, pp
Paper ID #6904Application of Wireless Sensor Networks in Health Care SystemDr. Afsaneh Minaie, Utah Valley University Afsaneh Minaie is a professor of Computer Engineering at Utah Valley University. Her research interests include gender issues in the academic sciences and engineering elds, Embedded Systems Design, Mobile Computing, Wireless Sensor Networks, and Databases.Dr. Ali Sanati-Mehrizy Dr. Ali Sanati-Mehrizy is a graduate of the Milton S. Hershey Pennsylvania State University College of Medicine. He completed his undergraduate studies in Biology from the University of Utah. In July 2013, he will begin a
findings, problems, action plans, and the success of action plans are documented in TrackDat, a database tracking corrective action plans used for continuous quality improvement. 7. Communicate results Reports on assessment findings are released to all stakeholders and the schedule and frequencies for the reporting the assessment results is summarized and documented in the BSIT Continuous Improvement Plan (see Appendix 1). 8. Use information to improve the program(s) After the assessment finds are distributed to stakeholders, action plans are developed by the faculty and staff to address problems. The Dean is responsible for approving the proposed action plans and ensuring that the plans are