- Conference Session
- POTPOURRI
- Collection
- 2013 ASEE Annual Conference & Exposition
- Authors
-
Afsaneh Minaie, Utah Valley University; Paymon Sanati-Mehrizy, Icahn School of Medicine at Mount Sinai; Ali Sanati-Mehrizy; Reza Sanati-Mehrizy, Utah Valley University
- Tagged Divisions
-
Computing & Information Technology
/schoolofcomputerscience/courses/ , accessed on January 6, 2013.28. Stanford University, http://cs.stanford.edu/Courses/ , accessed on January 6, 2013.29. University of Essex, http://www.essex.ac.uk/csee/Default.aspx , accessed on January 6, 2013.30. University of Iowa, http://www.engineering.uiowa.edu/ece , accessed on January 6, 2013.31. Rensselaer Polytechnic Institute, https://www.rpi.edu/dept/cct/public/eship/aboutus.html, accessed on January 6, 2013.32. Utah Valley University, http://www.uvu.edu , accessed on January 6, 2013.33. University of Waterloo, https://ece.uwaterloo.ca/Undergrad/Q/, accessed on January 6, 2013.34. University of Surrey- Guildford, http://www.surrey.ac.uk/, accessed on January 6, 2013.35. University of Sheffield, http
- Conference Session
- Embedded Systems and Mobile Computing
- Collection
- 2013 ASEE Annual Conference & Exposition
- Authors
-
Javad Shakib, DeVry University, Pomona
- Tagged Divisions
-
Computing & Information Technology
, the behavioral change is possible because the involved systems haveknowledge about other co-located wireless devices. Page 23.1244.13References1. Gang Zhao, Network Protocols and Algorithms, 2011, Vol. 3, No. 1, Wireless Sensor Networks for Industrial Process Monitoring and Control: A Survey.2. L. Q. Zhuang, K. M. Goh and J. B. Zhang, 1-4244-0826-1/2007 IEEE , The Wireless Sensor Networks for Factory Automation: Issues and Challenges.3. http://www.ni.com/white-paper/7142/en, published May 05, 20124. Javad Shakib, Mohammad Muqri ,118th Annual ASEE Conference, Session: AC 2011- 389, Wireless Technologies in Industrial
- Conference Session
- Embedded Systems and Mobile Computing
- Collection
- 2013 ASEE Annual Conference & Exposition
- Authors
-
Maurice F. Aburdene, Bucknell University; Marie Catherine Pizzorno, Department of Biology, Bucknell University; Alexander P Thompson, Bucknell University
- Tagged Divisions
-
Computing & Information Technology
numerical digits in the query sequence should either be removed or replaced by appropriateletter codes (e.g., N for unknown nucleic acid residue or X for unknown amino acid residue).The nucleic acid codes supported are:A adenosine C cytidine G guanineT thymidine N A/G/C/T (any) U uridineK G/T (keto) S G/C (strong) Y T/C (pyrimidine)M A/C (amino) W A/T (weak) R G/A (purine)B G/T/C D G/A/T H A/C/TV G/C/A - gap of indeterminate lengthFor those programs that use amino acid query sequences (BLASTP and TBLASTN), theaccepted amino acid codes are:A alanine P prolineB aspartate/asparagine Q glutamineC cystine
- Conference Session
- Curricular Issues in Computing and Information Technolog Programs
- Collection
- 2013 ASEE Annual Conference & Exposition
- Authors
-
James P Cohoon, University of Virginia; J. McGrath Cohoon, University of Virginia; Luther A Tychonievich, University of Virginia; Catherine E. Brawner, Research Triangle Educational Consultants
- Tagged Divisions
-
Computing & Information Technology
of refreshments available throughout the day. ● Leave meals unscheduled. Attendees want to have at least that much time to chat, compare notes, and socialize; working lunches cause them to engage in these social activities at other times, displacing scheduled activities to do so. ● Avoid scheduling important content in evening presentations. Short conversations, tours, and Q&A with industry partners go over well, but content-driven talks are best restricted to daytime sessions. ● Do not schedule long days. Intense scheduling results in weariness and prevents the networking and goal setting that helps the attendees in the long run. We found that the longest appropriate daily schedule is six hours of