students’ performanceas measured by their grades, students’ perceptions and opinions obtained on surveys, field notesfrom observing the classes, interview data at the end of the course, and the interaction logs thatour system records. After the pilot test, students’ average grade in the treatment group wasslightly (but not significantly) better than the control group on the post test. Students’ survey andinterview data indicated positive feedback about OpenDSA, with the average response on howwell they liked using the OpenDSA materials increasing after use as compared to a similar pre-test question about whether they would like to use such materials.1. IntroductionWe present our first evaluation results from an ongoing research and development
partnerships with peer departments and institutions.1 IntroductionInternational partnerships are frequently proposed, but many never make it beyond anexpression of mutual interest. The challenges to overcome are initiating first contact, discussingresearch areas to determine if there are overlapping areas or topics of mutual interest, seekingout and pursuing visiting and funding opportunities, and loss of initial momentum.To overcome these challenges, we have developed a process for building and strengtheninginternational partnerships in computing and information technology.2 Our Approach Page 23.567.2Our approach consists of three primary stages
complementary sequences of a four character alphabet (AGTC)representing the nucleotides, as shown in Figure 1. Page 23.636.3 Figure 1: A representation of a flattened segment of a double-sided DNA strandMeeting 1: Introduction2, 3, 4, 5, 6This meeting consisted of an introduction to the course, of students, course objectives, andcourse grading. The promise of genomics was discussed by referencing articles from both thepopular press and technical literature. Additional discussion points included fundamental tools,microscopes and spectrum analyzers, advances in computer chips, sequencing methods, andbioinformatics. Lastly, the students were engaged in
detect the presence of groups of collinear figure points. In this paper,the use of basic math such as the polar coordinate system, for line detection in an image wasdescribed. In these algorithms both mesh and tree connections of processors were exploited.1-IntroductionParallel computing for image processing has recently received considerable attentions 1,3,10,13.Technological advances have made the design of fine-grain architectures possible and many practicalalgorithms have been implemented. Line detection by the Hough Transform 1 method is a powerfultool in shape analysis. It extracts global features from images; however, because of its computationalcomplexity, it is not easily implemented in real-time for some applications. One approach
suitable for Internet accessible remoteexperimentation. Considering the challenge, the authors have developed a custom designedLMS for an Internet accessible remote laboratory. This paper describes the design anddevelopment of an integrated facility with Internet accessible remote laboratory and an LMS. Interms of the remote experimentation part, it uses computer interfacing hardware and softwarefrom National Instruments (Input/Output cards and LabVIEW). The LMS part is mainlysoftware tools that are implemented by using MySQL and .NET technologies.1. IntroductionThe presence of computer technology in education has increased dramatically, and predictionsare that this trend will continue to accelerate. Many of the new technologies are
(measured by credit-hours completed). Students’ programming backgrounds vary from none to paid programmers. • Lab equipment is limited. The class is large enough to require 15 identical lab stations. Therefore the system had to be designed so that the cost, multiplied by 15, was reasonable. Even with 15 stations students work in pairs, and two or three lab sections are required.Measurement of effectiveness of the student experienceIn line with the research goals of the lab experience measurements will be made of: 1. Students’ understanding of CPS 2. Students’ understanding of the pillars of IT relevant to this experience. 3. Students’ evaluation (opinion) of the relationship between CPS and IT.These
controls for IPv6 (ACLs, Policies, etc) Observe and mitigate first hop security threats Implement control plane protection mechanisms Observe and mitigate security threats introduced by transition mechanisms Secure IPv6 networking (routing protocols, DNS, and MPLS) Configure IPsec for IPv6Remote Lab environmentHands-on lab experience for the students was an essential element of this course. In theliterature there are numerous examples showing that lab experience plays a critical role instudent learning.1, 2, 18 Because this course is taught completely online, the labs must be eitherremote equipment or simulation. Literature shows that simulation software can limit studentcuriosity and experimentation.6 Therefore, to allow
heavily weighted withstudents from traditionally underrepresented groups, including women and minorities.Most students, whether at the undergraduate or graduate level, are reentering an academicenvironment after having been out in the working world for some time. Like any otheruniversity, NU is always considered a center of excellence with main objectives toprovide education, conduct research, in addition to providing public service to itsconstuents [1]. Similarly, National University Library System (NULS) supports alleducational and research activities of students, faculty, and staff of all of the affiliates ofthe National University System. Our library uses a Library Management System (LMS)that provides easy access to a countless array of
computational thinking practices: Connecting Computing Developing computational artifacts Abstracting Analyzing problems and artifacts Communicating Working effectively in teamsThey are grouped by seven big ideas and 23 key concepts as shown in Table 1. Page 23.301.4 Table 1 – Big Ideas and Key Concepts – CS Principles13 Big Idea Key Concept Creativity: Computing is a A. Computing fosters the creation of artifacts. creative activity. B. Computing fosters creative expression C. Programming is a
bytheir Center for Neural Basis of Cognition (CNBC). This minor is open to students in any majorof any college at Carnegie Mellon. This minor seeks to attract undergraduate students fromcomputer science, engineering, biology, statistics, and others. This minor requires a total of fivecourses. Four courses are drawn from neural computation, neuroscience, cognitive psychology,and intelligence system analysis areas, and one additional depth elective chosen one of the coreareas that is outside of the student’s major. This depth elective can be replaced by a one-yearresearch project in computational neuroscience27.Models for Integration of Computing Intelligence in CurriculumsTable 1 provides a list of computing intelligence course offerings of
c American Society for Engineering Education, 2013 Crop Monitoring System: A Case of Teaching Machine Vision through Undergraduate Research AbstractNorthwest Nazarene University, which is located in the Treasure Valley of Idaho, is developing acrop monitoring platform (CMP). The CMP, which uses a machine vision system, estimates fruittree parameters such as tree canopy volume and canopy reflectance characteristics. This researchproject, conducted by undergraduate engineering students, is integrated with the teaching ofmachine vision in a Control Systems course. This paper presents a case for teaching machinevision through undergraduate research.1. IntroductionNorthwest
Internetaccess restriction imposed by some governments increased the technical challenges that wouldneed to be met by our solution.Prior to creating a custom solution, the group evaluated a wide range of commercial and open‐source streaming platforms using a robust set of objective criteria. The most important criteriawere identified as: (1) ability to stream content to any common client (PCs/Macs, Tablets,mobile phones), (2) ability to encode / transcode content into any necessary format in real‐timeor faster, (3) ability to adequately handle adverse conditions such as network congestion, and(4) ability to handle a large number of simultaneous client requests.B. system overviewTo accomplish encoding, the team erected a computing farm with a cluster of
. To begin, we discuss the structure of the course, the challenges that emerged, andthe development approaches that were employed. We conclude with the results of twoanonymous surveys on engagement; the first was given to students who participated in the class,while the second was sent to the general computing population of the university.BackgroundMilgram describes mixed reality environments as a spectrum, with the physical world at oneextreme and purely virtual environments at the other [1]. In purely virtual environments, most(if not all) aspects of the user experience are synthesized. However, because virtual objects areembedded within the physical world, AR lies between these two extremes. Its strong ties to thephysical world naturally
; Oakes1 conducted research based on audiology records to help audiology technicianswhen the decision between an ITE, hearing aid worn ‘in the ear’, and a BTE, hearing aid worn‘behind the ear’. Audiology technicians generally will make the decision based on theaudiogram results and a consultation with the patient and the decision to be made at that point isgenerally pretty clear. However, there are occasions where the data leaves them in a spot wherethey can go either way. In these cases, they might “benefit from a second opinion given by anautomatic system with an explanation of how that second opinion was arrived at”1. The data thatAnwar & Oakes collected consisted of the audiograms, which graphs the auditory thresholds ofthe patient at 6
c American Society for Engineering Education, 2013 Alternate Pathways to Careers in Computing: Recruiting and Retaining Women Students I. Introduction The U.S. Department of Labor (2005) has predicted an increase in demand for computer systemanalysts (29%), database administrators (37%), and software engineers (38%). Even with theseincreasing demands, there is a severe lack of representation of minority women in the field.Participation of women in computing and information technology, although never equitable, hasdeclined during the past decade (Misa, 2010)1. With numerous reasons cited, includingstereotypes of the field, a lack of role models, and a desire to help others, attracting and
describe the application of a particular data analysis tool, association analysis,and demonstrate its relevance to data generated by learners in an OLE. Specifically, wedemonstrate how association analysis can be used to: 1) better understand learner behavior on anOLE discovering common usage patterns in the site anf 2) identify the learner interactions withthe site that correspond to resultant learning of the site’s target learning objectives.The first of these analyses generates rules of the type “users who visited page x and page y alsovisited page z” and shed light common usage patterns. They can be used both for betterunderstanding how learners are interacting with an OLE and also for recommending particularpages. For examples, upon observing
individual embedded systems that are capable of 1. interacting with their environment through various sensors, 2. processing information locally, and 3. communicating this information wirelessly with their neighbors. “19A sensor node (embedded system) usually consists of three components which are19: • Wireless modules or motes – key components of the network which consists of a microcontroller, transceiver, power source, memory unit, and may contain few sensors. Examples: Mica2, Cricket, MicaZ, Iris, Telos, SunSPOT, and Imote2. • A sensor board which is mounted on the mote and is embedded with multiple types of sensors. Examples: MTS300/400 and MDA100/300. • A programming board (gateway board) – provides multiple
analysis wasemployed and generated five factors: community influence, satisfaction, service quality,learnability and technical quality. Repeated measures ANOVA showed communityinfluence as the highest rated by participants, followed by satisfaction, service quality,learnability and technical quality. The findings are discussed providing evidence for theusefulness of implementing Moodle as a free open source course management system forboth teaching and learning.IntroductionMoodle, the most popular free open source course management system (CMS), wasdeveloped from a social constructivist perspective by Martin Dougmias in Australia 1.This free application provides instructors with useful features such as the ability to embedresources, activities
discuss artificial intelligence through computer science usingheuristics. Additionally, the students debate the ethics associated with artificial intelligence andwhen legal rights should apply to artificial beings.Teachers attend a week-long, immersive professional development workshop for Cyber Sciencethe summer prior to teaching the course6. Following the professional development workshopteachers gain access to all curriculum materials including lesson plans, master notes, andsupplemental documents which are found on NICERC’s website. Communication is maintainedthroughout the school year via the website allowing for any questions, concerns, or issues ateacher may experience when teaching the material.Narrative #1 – High School Teachers
this paper, we illustrate how several high quality open source tools can be used to overcome some of these challenges. We identify various tasks that comprise the research workflow pipeline and discuss solutions for a subset of the tasks.1 IntroductionThe number of open access and online scholarly journals featuring disciplinary research hasincreased tremendously in recent years. Added to this is an increasing number of annual researchconferences which range in scope from regional to international. For example, there are literallyhundreds of international conferences being held every year in computer science discipline.Keeping track of advances even in a specialized area of an academic discipline is a challengingtask for
worse results in simulations.Figure 1: Robots disperse and search pre-agreed sectors. Since the environment is unknown, sectors aredetermined by using a semicircle to represent the environment. The arc of a semicircle is always 180°. If thereare N robots, then sectors can be divided and robot will disperse 180°/N apart.Sector Search with Rendezvous AlgorithmIn Sector Search with Rendezvous, robots explore pre-agreed areas or sectors and periodicallyrendezvous to share information about what was found. Each robot performs frontier-basedexploration in their sectors. Frontier-based exploration18 involves robots recursively exploring anunknown environment while building a map represented by an occupancy grid19. Robots use adistance sensor to detect
specific to CPS aspects of the system. Theuse of CPS in medical systems to collect, exchange, store and control electronic health data relyheavily on existing computer and communication technologies. These technologies expose themedical systems to similar threats that are familiar to conventional computer systems. Some ofthese threats, as mentioned by Venkatasubramanian and Gupta 9 include: Page 23.1057.7 1. Unauthorized access to health data 2. Deliberate alteration of health data, leading to incorrect diagnosis, treatment and ultimately fatality. 3. Deliberate generation of false alarms or suppression or real alarms raised by the
they have been unintentionally excluding girls.Evaluation of this session shows that 75% of the survey respondents strongly agreed that theinformation provided was useful (N=204) and over 60% of the 49 respondents to the summer2011 follow-up survey indicated that they had used the information during the prior school year.CS1 redesignThere have been several successful attempts in recent years to modify CS1 pedagogy andpractices to make the curriculum interesting to diverse groups of people.1, 19, 12 We alwaysinclude a session with a CS1 instructor whose practices are particularly encouraging to womenand minorities. The CS1X effort developed at University of Virginia has been of particularinterest to high school computer science teachers because
committee and fine tuned based on our own experience7. 1. Introduction. Basic concepts, definitions and terminology of data mining should be covered here. Motivate the field with real-world applications of where data mining has been used. We encourage you to discuss current uses of data mining by pulling examples from various news repositories. Discuss some of the implications of data mining, such as privacy and ownership. Using the examples from the news and current events, discuss the different kinds of data repositories on which data mining can be performed. Encourage them to think about the different kinds of patterns and knowledge that can be mined. Introduce the idea of what it might mean
1451 standards and discusshow to create WSNs and intelligent interactive devices, and interface with smart sensors andtransducers. Moreover, the WirelessHART(Highway Addressable Remote Transducer), IEEE1451, ZigBee / 802.15.4, and 6LoWPAN standards will be explained. Networking actuators andsmart sensors and real-world technical challenges will also be highlighted.Advances in computing and instrumentation have sparked the need of engineering technologygraduates who can update and improve manufacturing facilities and product design. This paper isan attempt to expose engineering technology students earlier to WSNs and other emergingtechnologies in lieu of taking WSN track in their technology curriculum.1. IntroductionThe field of wireless
studentlearning are documented in the Institutional Assessment Plan of Student Learning (IAPSL).Under the College’s assessment framework, the School of Business and Technology develop anassessment plan that incorporates a systematic process to measure the achievement of fourinterrelated categories of student learning outcomes – program educational objectives (PEOs),and program (student) outcomes (PO/SOs). Page 23.1299.3Following Huba & Freed’s1 process for assessment of student learning, SBT adopts thefollowing eight steps in developing the assessment plans for the intended outcomes: 1. Develop articulated statements of intended goals/outcomes