Asee peer logo
Displaying all 4 results
Conference Session
POTPOURRI
Collection
2013 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Paymon Sanati-Mehrizy, Icahn School of Medicine at Mount Sinai; Ali Sanati-Mehrizy; Reza Sanati-Mehrizy, Utah Valley University
Tagged Divisions
Computing & Information Technology
/schoolofcomputerscience/courses/ , accessed on January 6, 2013.28. Stanford University, http://cs.stanford.edu/Courses/ , accessed on January 6, 2013.29. University of Essex, http://www.essex.ac.uk/csee/Default.aspx , accessed on January 6, 2013.30. University of Iowa, http://www.engineering.uiowa.edu/ece , accessed on January 6, 2013.31. Rensselaer Polytechnic Institute, https://www.rpi.edu/dept/cct/public/eship/aboutus.html, accessed on January 6, 2013.32. Utah Valley University, http://www.uvu.edu , accessed on January 6, 2013.33. University of Waterloo, https://ece.uwaterloo.ca/Undergrad/Q/, accessed on January 6, 2013.34. University of Surrey- Guildford, http://www.surrey.ac.uk/, accessed on January 6, 2013.35. University of Sheffield, http
Conference Session
Embedded Systems and Mobile Computing
Collection
2013 ASEE Annual Conference & Exposition
Authors
Javad Shakib, DeVry University, Pomona
Tagged Divisions
Computing & Information Technology
, the behavioral change is possible because the involved systems haveknowledge about other co-located wireless devices. Page 23.1244.13References1. Gang Zhao, Network Protocols and Algorithms, 2011, Vol. 3, No. 1, Wireless Sensor Networks for Industrial Process Monitoring and Control: A Survey.2. L. Q. Zhuang, K. M. Goh and J. B. Zhang, 1-4244-0826-1/2007 IEEE , The Wireless Sensor Networks for Factory Automation: Issues and Challenges.3. http://www.ni.com/white-paper/7142/en, published May 05, 20124. Javad Shakib, Mohammad Muqri ,118th Annual ASEE Conference, Session: AC 2011- 389, Wireless Technologies in Industrial
Conference Session
Embedded Systems and Mobile Computing
Collection
2013 ASEE Annual Conference & Exposition
Authors
Maurice F. Aburdene, Bucknell University; Marie Catherine Pizzorno, Department of Biology, Bucknell University; Alexander P Thompson, Bucknell University
Tagged Divisions
Computing & Information Technology
numerical digits in the query sequence should either be removed or replaced by appropriateletter codes (e.g., N for unknown nucleic acid residue or X for unknown amino acid residue).The nucleic acid codes supported are:A adenosine C cytidine G guanineT thymidine N A/G/C/T (any) U uridineK G/T (keto) S G/C (strong) Y T/C (pyrimidine)M A/C (amino) W A/T (weak) R G/A (purine)B G/T/C D G/A/T H A/C/TV G/C/A - gap of indeterminate lengthFor those programs that use amino acid query sequences (BLASTP and TBLASTN), theaccepted amino acid codes are:A alanine P prolineB aspartate/asparagine Q glutamineC cystine
Conference Session
Curricular Issues in Computing and Information Technolog Programs
Collection
2013 ASEE Annual Conference & Exposition
Authors
James P Cohoon, University of Virginia; J. McGrath Cohoon, University of Virginia; Luther A Tychonievich, University of Virginia; Catherine E. Brawner, Research Triangle Educational Consultants
Tagged Divisions
Computing & Information Technology
of refreshments available throughout the day. ● Leave meals unscheduled. Attendees want to have at least that much time to chat, compare notes, and socialize; working lunches cause them to engage in these social activities at other times, displacing scheduled activities to do so. ● Avoid scheduling important content in evening presentations. Short conversations, tours, and Q&A with industry partners go over well, but content-driven talks are best restricted to daytime sessions. ● Do not schedule long days. Intense scheduling results in weariness and prevents the networking and goal setting that helps the attendees in the long run. We found that the longest appropriate daily schedule is six hours of