two representative student projects. This workalso discusses the results of two surveys on student perceptions of a course in AR under thehypothesis that, because AR encompasses several elements shown to be engaging in theclassroom, students would perceive AR as highly engaging. The first survey was administered tostudents who participated in the course, while the second was given to the general computingpopulation within SPSU. The goal of the survey is to help educators make informed coursedecisions using the data collected.IntroductionAs a new technology emerges, students are naturally curious about how it works and how itmight be applied across a variety of contexts. Frequently, however, there are significant costsassociated with working
collaboration with the CyberInnovation Center (CIC), a 501c3 not-for-profit corporation. Physics and Cyber Science wereoriginally piloted regionally in 2010 and 2011, respectively, and then, expanded to a largerregion including schools in the states Louisiana, Texas, and Arkansas in 2011 and 2012,respectively.Established through the CIC is the National Integrated Cyber Research Center (NICERC).NICERC’s Cyber Science and Physics courses utilize many technologies and projects to drive tothe fundamental content. Cyber Science, specifically, integrates various disciplines (engineering,computer science, and liberal arts) to convey the ideas of cyber. NICERC’s Physics utilizes amicrocontroller platform to convey physics concepts. With such unique curricula
. cognition. B. Computing enables innovation in nearly every field. C. Computing has both beneficial and harmful effects.AssessmentThe workshop participants were asked to design a lesson plan aimed to integrate at least one ofthe learning outcomes described by the College Board as related to the CS principles. A rubric,described on Table 2, was created and delivered to all the participants to conduct peer-evaluation of all projects developed during the workshop. Page 23.301.5 Table 2 – Workshop rubric for peer-assessment 1-5 6 - 10
lectures,interviews, events, etc. under different settings as well as use of equipment and humanresources. In current setup a request can be submitted, processed and managed manuallyby the library staff, whereas users demand a faster and a more efficient way of submittingmultimedia requests as it would produce faster turnaround times for scheduled projects.Therefore, a group of students was assigned the task, as their capstone project, toevaluate, develop and deploy an automated system to handle the flood of multimediarequests being received by library staff. In this paper we report a capstone experiencegained by undergraduate students. The students were required to design and implement aweb based system for not only handling the requisitions for
1991. I did postdoctoral work at Princeton University from 1991 to 1995. I taught in the Biology Department of Vassar College from 1995-1996. I became an Assistant Professor in the Biology Department at Bucknell University in 1996 and was promoted to Associate Professor in 2001.My primary research interests are the molecular biology of viruses that infect eukaryotes, specifically viruses that infect honeybees.Mr. Alexander P Thompson, Bucknell University I am a senior Electrical Engineering student at Bucknell University. I have been studying genomic signal processing for the last two years as part of a research project through the Bucknell Presidential Fellows program. My primary role in the development of the
President of ALC Consulting and has been extensively involved with numerous projects for the IAEA. Page 23.1299.1 c American Society for Engineering Education, 2013Use of Sustainable and Systematic Plan to Assess Student Learning Outcomes for Non-Traditional IT StudentsAbstractExcelsior College has been considered as a pioneer institution in distance learning. Consideringthe needs of career-oriented adults learners, Excelsior recognized that college-level knowledgecan be obtained in many ways and designed a student-centered learning model that integratestransfer credits from
address the above issues by providing faculty with important criteria that webelieve have high potential for use in an undergraduate course in data mining. We first discuss aset of core topics that such a course should include. A set of practical, widely-accepted tools andlanguages used for data mining are summarized. We provide a list of sources for real-worlddatasets that can be useful for possible course assignments and projects. We conclude with adiscussion of challenges that faculty should be aware of, including those that were encounteredin our course, with suggestions to improve course outcomes. Our paper is based on ourcollective research and industry experience in data mining, and on the development of anundergraduate course in data
) embedded assessment strategies; and e) scaffolds. These features provide anengaging laboratory experience, work with students’ pre-existing knowledge, and develop skillsof self-monitoring and reflection, which contribute toward improving the quality of STEMeducation. The project experimentation part of the facility has two major components: a) aremote laboratory and b) pedagogical design.3.1 Remote LaboratoryThis implementation proceeds through a number of inter-linked tasks covering a range ofdisciplines, which include computer interfacing, web design, interactive graphical user interface,computer networking, network/web security, experiment module designs, assessment strategy,and project evaluation.The developed facility can be presented by a
for Medicare and Medicaid Services(CMS), the national health spending in the United States in 2008 was estimated to be $2.4 trilliondollars19. The cost of heart disease and stroke takes around $394 billion19. Consequently, the UShealth care system is facing daunting future challenges. The current situation is likely to worsen Page 23.200.2with the first baby boomers reaching retirement age in the next decade. For the first time, theelderly are expected to outnumber the young, not only in the United States but worldwide.1Throughout the world, the over age 65 population is projected to more than double from 357million in 1990 to 761 million by
Paper ID #5951Evaluating Online Tutorials for Data Structures and Algorithms CoursesDr. Simin Hall, Virginia Tech Dr. Simin Hall is a Research Assistant professor in the Department of Mechanical Engineering (ME) at Virginia Tech (VT). Currently she is collaborating with Dr. Cliff Shaffer in Computer Science Department on a National Science Foundation funded TUES project to improve instruction in Data Structures and Al- gorithms (DSA) courses. Her applied research in education is in cognitive functioning using online learn- ing technologies. She has redesigned two undergraduate courses in Thermodynamics for online
Research Triangle Park Evaluators, an American Evaluation Association affiliate organization and is a member of the Amer- ican Educational Research Association and American Evaluation Association, in addition to ASEE. Dr. Brawner is also an Extension Services Consultant for the National Center for Women in Information Technology (NCWIT) and, in that role, advises computer science departments on diversifying their un- dergraduate student population. She currently serves as the principal evaluator for the Teachers Attracting Girls to Computer Science project which aims to increase and diversify the student population studying computer science in high school. Dr. Brawner previously served as principal evaluator of the NSF
engineering and automation, industrial faultdiagnosis, linguistics, material science, music, and physics6.Educational excellence requires exposing students to the current edge of research. To ensure thatstudent projects are along the same trajectory that the industry is moving, educators mustcontinually introduce emerging techniques, practices, and applications into the curriculum. Thefield of computational intelligence is growing rapidly. It is essential that the emerging field ofcomputing intelligence be integrated into the computer science and engineering curriculums.This paper is a study of different approaches that are used by different institutions of highereducation around the world to integrate computing intelligence concepts in their
curricula.Through joint efforts of the University of California at Berkeley and the College of the Atlantic,was carried for environmental monitoring. Joint efforts between Harvard University, theUniversity of New Hampshire, and the University of North Carolina have led to the deploymentof a wireless sensor network to monitor eruptions at Volcán Tungurahua, an active volcano in Page 23.1244.10central Ecuador.Just as they can be used to monitor nature, sensor networks can likewise be used to monitorhuman behavior. In the Smart Kindergarten project at UCLA, wirelessly-networked, sensor-enhanced toys and other classroom objects supervise the learning process
Undergraduate Research (NCUR) has been an annual conference since 1987.NCUR’s primary goal is to promote undergraduate research in all fields of study.National Science Foundation (NSF) funds undergraduate research through Research Experiencesfor Undergraduates (REU) program. Providing research experiences for undergraduate studentsand increasing the number of students interested in graduate programs are the goals of the REUprogram. Students work on REU projects during summer months for 8 to 10 weeks. REUprograms entail several benefits to students including increased awareness of their discipline andtechnical expertise, better career opportunities, gains in confidence levels, and elevated likelihoodof pursuing graduate degrees and research careers.6
servers. See figure 1 for an overview. Page 23.420.2 Figure 1. System overviewOn the production end of the pipeline, the team used a Blackmagic ATEM/2 switcher connectedto a document camera and a Panasonic AG-AF100 via HD-SDI at 1080p. This set up made atremendous impact on both the visual quality of the videos and increased the efficiency duringthe encoding and streaming phase of the project. The resolution of the videos (1920 x 1080)provided ample resolution for showing details.To maximize the quality of the encoding, the team insured the video produced at this stagewould be uncompressed and sampled at 4:2:2. This
. Nikolaidis, Purdue University Natasha Nikolaidis holds a bachelor’s degree from Reed College and a master’s from Portland State University. She is currently an operations manager for the Office of the Vice President for Research at Purdue University. She is responsible for project management on large faculty research portfolios in a variety of disciplines, including biology, nanotechnology, engineering, information technology, and education.Robert M Trinkle, Purdue University, West Lafayette Robert Trinkle earned a Bachelor of Science degree in Computer & Information Technology from Purdue University, West Lafayette in May 2009. In December 2009, he accepted a position as Network Engi- neer in the department of
interned with the IBM T.J. Watson Research Center, then spent the first several years of his career with IBM Microelectronics in Essex Junction, VT, where he worked in semiconductor R&D on five generations of IBM’s memory chip technologies. In 1989, he was awarded an IBM PhD Fellowship and began full-time study at the Uni- versity of California at Berkeley. He fabricated and studied nano-scale silicon-on-insulator transistors, and received the PhD degree from UC Berkeley in 1993. He transferred to the IBM Semiconductor R&D Center in Fishkill, NY where he became a team leader in the IBM/Toshiba/Siemens TRIAD multi- cultural technology development project. In 1996, he left IBM for an entrepreneurial academic start
postdoctoral fellow. His postdoctoral research focused on the development of advanced iris recognition systems us- ing high resolution sensors. His current research projects include the development of periocular-based biometric systems, ear shape based biometrics, and soft biometric classification.Tania Roy, Clemson University Tania Roy is a PhD student in the Human Centered Computing division of Clemson University. She re- ceived her B.Tech from West Bengal University of Technology, India in Computer Science & Engineering . Her research interests are in affective computing. Page 23.144.2
June, 2012 from http://www.netdevgroup.com/products.17. Pickard, J., Spence, J., Lunsford, P. 2012. IPv6 Certification and Course Development. Proceedings of the ACM SIGIT/RIIT 2012. Calgary, Alberta.18. Sarkar, N.I. (2006) Teaching computer networking fundamentals using practical laboratory exercises. Education, IEEE Transactions on, 49, 285-291.19. Sharma, S.K. & J. Sefchek (2007) Teaching information security courses: A hands-on approach. Computers & Security, 26 290-299.20. Te-Shun, C. 2011) Development of an intrusion detection and prevention course project using virtualization technology. International Journal of Education & Development using Information & Communication Technology, 7, 46-55.21. VMWare
instances of cancer, but it would beincredible to see the number of people whose lives likely were able to be saved by this form ofearly detection. The implications of being able to classify these genes are astounding to say theleast.DNA SpeculationJustin Zobel5 explores where data mining is headed. He explains the potential of DNAsequencing and what challenges are presented in trying to extract useful information from thedata gathered by the DNA sequencing process.The Human Genome Project was a joint effort to catalog all the different genes found in humanDNA. Since its completion in 2000, “the cost of sequencing DNA fell by a factor of around a
designers who addressspecific needs in the domain including integrative systems design, Human-Computer Interaction(HCI), Information Assurance and Security (IAS), reliability, networking, web interactions andmuch more. Since these skills are all part of the IT university curriculum IT professionals have asignificant role to play in the design of these complex systems. In fact most of these skills arepart of the pillars and central themes of IT education7. It is revealing that the respected annualsurvey sponsored by EE Times and others8 indicate that over 50% of the projects includenetworking and more than 30% include wireless, but in this report the designers are classified ashardware, software or firmware engineers and their lists of design tasks
also host based IDS (HIDS) which are installed on a single deviceto monitor network traffic and application activity. The operation of HIDS may also be signaturebased or anomaly based. There is on-going research into using IDS for CPS network securitywith the main objective of improving the ability of IDS to detect and stop CPS cyber-attacks.One such project by Digital Bond Inc. involved the development of attack signatures for theModbus/TCP protocol 17. Page 23.1057.13FirewallsFirewalls are devices that are used to allow certain types of network traffic to pass through thenetwork perimeter or a host device. Interconnectivity of systems works