Asee peer logo
Displaying results 1 - 30 of 43 in total
Conference Session
Potpourri
Collection
2014 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Reza Sanati-Mehrizy, Utah Valley University; Paymon Sanati-Mehrizy, Icahn School of Medicine at Mount Sinai; Ali Sanati-Mehrizy
Tagged Divisions
Computing & Information Technology
rangeSun SPOTs consist of a battery pack, a processor board (main board), and a sensor board(eDemo Board) as shown in Figure 1. Figure 1: Free Range Sun SPOT9The two free range Sun SPOTs come with a rechargeable battery for use in the field as well asconnections to be powered by an external source. Figure 2, illustrates the schematic ofconnections between boards and battery for a Sun SPOT device. The eSPOT Main Board is thebrain of the Sun SPOT system. The eSPOT Main Board contains the main processor, the mainboard communication, memory, wireless radio, and power controller. The eDEMO boardcontains the sensors. Figure 3 illustrates the block diagram of the eSPOT Main Board
Conference Session
Emerging Computing and Information Technologies
Collection
2014 ASEE Annual Conference & Exposition
Authors
Raymond A. Hansen, Purdue University; Tomasz Wiktor Wlodarczyk, University of Stavanger; Thomas J. Hacker, Purdue University, West Lafayette
Tagged Divisions
Computing & Information Technology
systems, allowing them to be effective in thelaboratory and, ultimately, as data analysts/scientists [1][2][3][4]. One paradigm that has beenwidely adopted in industry is MapReduce as implemented in open-source tool, Hadoop [3].Although these systems are based on many years of research work, the conceptual framework onwhich these systems were built differs largely from what could be found in the earlier researchwork and education curricula. University courses available today are largely focused aroundvarious areas (some from repackaged content) that cover some selected parts of Big Dataspectrum, mostly: data mining, distributed systems and most recently data science [5][6][7].We believe that the pedagogical approach used by related education
Conference Session
Information and Network Security
Collection
2014 ASEE Annual Conference & Exposition
Authors
Richard Scott Bell, Kansas State University; Eugene Y. Vasserman, Kansas State University; Eleanor C. Sayre, Kansas State University
Tagged Divisions
Computing & Information Technology
professionalism) 2 . Similarly, in2013, for the first time, the ACM and the IEEE have included information assurance and securityas a separate knowledge area within their recommended Computer Science Curricula 1 . As withthe IT curriculum, the CS curriculum also incorporates components of cybersecurity throughoutthe various other computer science knowledge areas. While both guidelines providerecommended cybersecurity topics that should be covered within the respective curricula, they do Page 24.61.3not include any pedagogical best practices to guide instructors as to how they should engagestudents within the cybersecurity classroom or how to assess their
Conference Session
New Trends in Computing and Information Technology Education
Collection
2014 ASEE Annual Conference & Exposition
Authors
Stephen J. Zilora, Rochester Institute of Technology (CAST); Jim Leone
Tagged Divisions
Computing & Information Technology
process to achieve the same goals.1. Introduction1.1 AttitudesEducators regularly assess their students’ work with carefully constructed tools. There are manytools available such as tests, projects, and homework assignments. These tools are used based onthe task at hand and new tools are developed as necessary. Such assessments assist the educatorin determining the student’s degree of subject mastery. Formative assessments point out gaps ina student’s understanding and provide opportunity for improvement. Final, summativeassessments involve the review of not just the final course average, but also the progress thestudent has made, the consistency of effort, and additional factors. Typically, the educatorexpends significant consideration to
Conference Session
Potpourri
Collection
2014 ASEE Annual Conference & Exposition
Authors
Jeremy Webb, Department of Mechanical and Biomedical Engineering Boise State University; Inanc Senocak, Boise State University; Dazhi Yang, Boise State University
Tagged Divisions
Computing & Information Technology
, they tend to discuss the history anddifferences between the Fahrenheit and Celsius scales4,5,11,22,27,30. Few textbooks includeda section discussing the physical origin of temperature as the measure of molecularenergy12,25. This type of coverage may leave students with an incomplete understandingof temperature, or even erroneous understanding as they try to apply their understandingof the gas phase to the liquid and solid phases of matter, leading to potentialmisconceptions in the phase change physics. Page 24.123.5Figure 1. Screen shot of molecular motion animation in the solid phase.In our instructional approach, temperature is explained as an
Conference Session
Potpourri
Collection
2014 ASEE Annual Conference & Exposition
Authors
Daniel Raviv, Florida Atlantic University; Yumi Kahori Nakagawa; George Roskovich, Florida Atlantic University
Tagged Divisions
Computing & Information Technology
of the method by monitoring the progress of a class andits individuals as the semester moves on. 1. Introduction According to research, 65% percent of the population benefits more from visual learning than anyother style1. Incidentally, 90% of the information that the brain processes is visual2. Although there is alot of research to conduct regarding visualization as a tool for teaching and learning, there is a consensusin terms of the effectiveness of catering to this style of learning. Studies have shown, students withdifferent learning styles favor visualization as a means of learning a new concept 3. Considering thosefacts, the learning examples for this approach to teaching computer algorithms strives to use the
Conference Session
New Trends in Computing and Information Technology Education
Collection
2014 ASEE Annual Conference & Exposition
Authors
Tanya Stanko P.E., Innopolis University; Oksana Zhirosh, Unium
Tagged Divisions
Computing & Information Technology
entering ITcareers, students of IT specialties, and IT professionals. Figure 1 shows the diagram ofgroups of stakeholders involved in the survey.The respondents were asked to grade the importance of IT competencies on the scale: 1 -Not Important, 2 – Moderately Important, 3 – Important, 4 – Highly Important, 5 –Essential.In addition to the online anonymous survey we conducted a set of interviews withselected representatives from each group.The questionnaire has been split into three blocks: 1. Information about current occupation and work experience 2. Grading IT competencies 3. Information on gender, age group, country of birth, country of study, and country of current occupationRespondents were not allowed to start grading IT
Conference Session
Topics in Computing and Information Technologies
Collection
2014 ASEE Annual Conference & Exposition
Authors
Abul K. M. Azad, Northern Illinois University; Namratha Siripragada, Northern Illinois University
Tagged Divisions
Computing & Information Technology
for administrative and student levels of access. When offering theremote laboratory, a large volume of data is collected for experience sampling method and weeklysurvey. An evaluation scheme was implemented to assess the effectiveness of the system as wellthe students’ learning outcomes. In-built capability to collect systems’ operational data and weeklysurvey are used to evaluate the effectiveness of the system, while pre- and post-tests are utilized tomeasure the student learning outcomes.1. IntroductionOne of the major limitations of distance-learning programs is their failure to deliver the laboratoryrelated courses.1, 2 For distance learning programs, students currently have to visit a campus toperform the laboratory sessions or
Conference Session
New Trends in Computing and Information Technology Education
Collection
2014 ASEE Annual Conference & Exposition
Authors
Vicky L. Smith, Indiana University Purdue University, Indianapolis; Eugenia Fernandez, Indiana University Purdue University, Indianapolis
Tagged Divisions
Computing & Information Technology
CIT courses. In addition, a significant relationship was shown betweenretention and grade point average (GPA), the number of completed credit hours, and the numberof attempted credit hours in the second semester. The results of this study illustrate the need forthe faculty to focus their efforts towards providing outstanding instructors for, and maintaining ahigh quality curriculum in, first year CIT courses.IntroductionRetaining students is a challenge at any university. Educators are trying to determine whichfactors may impact a student’s decision to remain in his or her program of study. A majorinitiative is being undertaken at Indiana University Purdue University Indianapolis (IUPUI) toimprove student retention in all fields.1 The
Conference Session
Topics in Computing and Information Technologies
Collection
2014 ASEE Annual Conference & Exposition
Authors
Gholam Ali Shaykhian, NASA; Mohd Abdelgadir Khairi, Najran University
Tagged Divisions
Computing & Information Technology
“thus part of the operational fabric of an IT environment” [3].Operational risk such as Denial of Service (DoS) could be mitigated by using CDMwhich has centralized place to enforce security [3]. CDM is a dedicated system that storesa golden version of master data. In operational uses using the CDM approach, the masterdata published to downstream systems while source systems (upstream) maintainsovereignty to manage and own data.CDM Approach – consolidation approach – viewed in analytical use cases, clean andconsistent master data published to data warehouse and BI applications [12]. In addition,[1] states that the CDM transcends operational and analytical use and into globalgovernance on data management throughout the enterprise. Shankar and
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2014 ASEE Annual Conference & Exposition
Authors
David M. Whittinghill, Purdue University, West Lafayette; Jacob Samuel Brown, Purdue University
Tagged Divisions
Computing & Information Technology
; Kinect; behavior modificationIntroductionCerebral palsy (CP) is a chronic movement and muscle disorder whose onset begins in childhoodand persists for the duration of an individual’s life 23, 25. Though there is not a cure for the disease,physical therapy (PT), particularly when applied to the upper extremities, has been shown toameliorate some CP symptoms 1, 18. Despite the demonstrated effectiveness of PT, patientadherence to therapy is problematic, as patients tend only to maintain their regimen whileactively enrolled in a therapy program 2. The reasons for the lack of compliance are multi-factored and not completely understood 29. This lack of adherence has been observed to be evenworse in pediatric CP patients 4, 6, 20. This results not
Conference Session
Topics in Computing and Information Technologies
Collection
2014 ASEE Annual Conference & Exposition
Authors
Manaz Rusi Taleyarkhan, Purdue University; Oluwatosin Alabi, Purdue University, West Lafayette; Alejandra J. Magana, Purdue University, West Lafayette; Thomas J. Hacker, Purdue University, West Lafayette
Tagged Divisions
Computing & Information Technology
that allow them to collaborate and atthe same time share resources such as data and tools. Technologies that can support theseprocesses are internet-based science gateways defined as “technological innovations whose aimis to bring about a radical transformation in research” 1. Such science gateways are also calledcyberinfrastructure or e-science 1. Cyberinfrastructure is considered to be the basis for dynamicclusters of individuals, organizations, and resources such as computational tools and services,which enable flexibility, security and collaboration among their users 2,3. The George E. Brown,Jr. Network for Earthquake Engineering Simulation (NEES) operates a cyberinfrastructure(centered on the NEEShub accessible at nees.org) for research
Conference Session
New Trends in Computing and Information Technology Education
Collection
2014 ASEE Annual Conference & Exposition
Authors
Rob Elliott, Purdue University School of Engineering and Technology, Indiana University Purdue University at Indianapolis
Tagged Divisions
Computing & Information Technology
to infuse recorded coursematerials and automated assessment into a traditional classroom-based course. In short theflipped classroom asks students to interact with course material prior to coming to the classroomso that face-to-face time can be used for active learning [1, 2]. Flipping provides students earlierexposure to course topics in order to give them a common vocabulary and fundamentalknowledge to be immediately applied in inquiry-based learning activities.This study describes the student attitudes of the flipped classroom, as measured by anonymoussurvey data collected at the start, midpoint, and end of the semester. The course examined in thestudy is a sophomore-level computer systems analysis and design from the fall semester of
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2014 ASEE Annual Conference & Exposition
Authors
Jeffrey Chastine, Southern Polytechnic State University (ENG); Charles Richard Cole, Southern Polytechnic State University; Christopher Welty, Southern Polytechnic State University
Tagged Divisions
Computing & Information Technology
collaborative potential with the Game Design and Development stu-dents and instructors.The Perspective of Gaming The game development program at our university is taught as an applied form of comput-er science. In addition to requiring several “core” computer science courses, students are re-quired to complete 14 courses that are specific to game development and gaming algorithms. Asa culmination of this coursework, students are required to complete a two-semester sequence ofstudio and capstone courses in which they exercise their design and development skills throughthe implementation a full game prototype. Students self-organize into groups, which typicallyrange in size from 1 to 3 members. Groups are encouraged to pursue the genre of gaming
Conference Session
Information and Network Security
Collection
2014 ASEE Annual Conference & Exposition
Authors
Jane LeClair, National Cybersecurity Institute at Excelsior College; Denise Pheils, National Cybersecurity Institute
Tagged Divisions
Computing & Information Technology
could have had their data stolen. The bombshell news sent the value of Target stockinto decline with an immediate drop of 2%. Finkle (2013)6 noted that “Target's shares closeddown 2.2 percent at $62.15 on the New York Stock Exchange on Thursday afternoon”. Analystsnoted that “The timing of the [Target] news is particularly bad, said MKM Partners analystPatrick McKeever. It’s right in front of the Saturday before Christmas, the biggest day of theyear for many retailers. We do think there could be some negative impact to [quarterly] sales,and there will very likely be a cost, both in dollars and in management time [and] attention.”(Cheng, 2013)1 The investigation of the Target breach is just beginning, but by all accounts itcould have a serious
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2014 ASEE Annual Conference & Exposition
Authors
Norman Pestaina, Florida International University; Tiana Solis, Florida International University; Peter J. Clarke, Florida International Univeristy
Tagged Divisions
Computing & Information Technology
national accrediting agencies. A critical part of theassessment process is the generation of useful data for analysis and evaluation yielding indicatorsfor program improvement. Senior year capstone projects are a fertile source of such data. In thispaper, we outline the Student Outcomes and Senior Project course of the BS-CS program atFlorida International University (FIU). We describe and evaluate a methodology used to performassessment of attainment of the BS-CS Student Outcomes using data from the Senior Projectcourse.1. IntroductionUndergraduate program assessment continues to be a significant undertaking in manyinstitutions. It is the critical component of the continuous improvement process, and may providestakeholders with some confidence in
Conference Session
Topics in Computing and Information Technologies
Collection
2014 ASEE Annual Conference & Exposition
Authors
Quan Do, New Mexico State University; Rajeev K. Agrawal, North Carolina A&T State University; Dhana Rao; Venkat N Gudivada, Marshall University
Tagged Divisions
Computing & Information Technology
for assessing students’ SQL learning. SQL concepts are modeled using RDFS. The user can select SQL concepts to be included in an assessment and our approach will generate appropriate queries. The proposed approach is generic and is database metadata driven. A Web-based prototype system is developed to illustrate the effectiveness of the proposed approach.1. Introduction and MotivationAutomatic question generation is an active area of research. Its practical applications are many,especially in the context of learning assessment. In both online and traditional face-to-facecourses, learning outcomes are used as standards for measuring and comparing performance andachievement of learners. In a broader context, outcomes-based
Conference Session
Embedded Systems and Mobile Computing
Collection
2014 ASEE Annual Conference & Exposition
Authors
Mohammad Rafiq Muqri, DeVry University, Pomona; Brian Joseph Lane
Tagged Divisions
Computing & Information Technology
the front of the vehicle; when the sonar detects an object it stops, reverses, rotates to theleft, and continues at half speed for one second and then returns to full speed again. Thevehicle has a track configuration for many types of terrain. Setting 1 starts with the tracks in Page 24.234.2the lowered position for smooth terrain while input is taken from the sonar. Setting 2 has thetracks in a raised position for rough terrain with input also taken from the sonar. Setting 3starts out with the tracks in a raised position and takes input from the accelerometer mountedto the vehicle. The vehicle then adjusts the tracks left, right, up, or down
Conference Session
Topics in Computing and Information Technologies
Collection
2014 ASEE Annual Conference & Exposition
Authors
Gholam Ali Shaykhian, NASA; Mohd A. Khairi, Najran University
Tagged Divisions
Computing & Information Technology
-OrientedArchitecture (SOA), and Software as a Service (SaaS) has prompted a great deal of interest inMaster Data Management (MDM). The recent emphasis on regulatory compliance, SOA, andmergers and acquisitions has made the creating and maintaining of accurate and complete masterdata a business imperative” (p. 1).Enterprise Data Management, an IT discipline, is composed of a set of tools and processes todefine enterprise data entities of an organization. Enterprise data management objectives are to Page 24.266.2organize and manage the organization’s enterprise data. This paper focused on the twoarchitectural models, Centralized and Federated, for enterprise data
Conference Session
Emerging Computing and Information Technologies
Collection
2014 ASEE Annual Conference & Exposition
Authors
Mudasser Fraz Wyne, National University; Jimmy Faraon, National University
Tagged Divisions
Computing & Information Technology
rates offered Page 24.277.2can be converted into monthly usage depending on the length of time that can beafforded. For our case study we choose four cloud vendors: (1) Rackspace Cloud, (2)GoGrid, (3) Amazon Web Service, and (4) HP Cloud Service (HPCS). Each of them hasvariable options in pricing due to their economic outlook and the nature of the cloudbusiness. Final cost will also be depended on the customers’ preference on how theywould like to utilize operate and the cost management.2.1. RackspaceRackspace is an Infrastructure-as-a-Service (IaaS) cloud company provider that basedtheir design on the idea that we still need a traditional data
Conference Session
Potpourri
Collection
2014 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Reza Sanati-Mehrizy, Utah Valley University; Paymon Sanati-Mehrizy, Icahn School of Medicine at Mount Sinai; Ali Sanati-Mehrizy
Tagged Divisions
Computing & Information Technology
4730 Embedded Systems • CS 3400 Software Engineering Page 24.306.6 • CS 3520 Database Theory • CS 3670 Network Programming • CS 4470 Artificial Intelligence • CS 4510 Operating Systems DesignTo summarize, the students in the Computer Engineering area of specialization take 36 hours ofgeneral education, 13 hours of Science, 20 hours of Math, 39 hours of computer science, 18hours of engineering requirements, and 15 hours of electives.Table 1 summarizes the curriculum comparison of the Computer Engineering Program andComputer Engineering Area of Specialization in the Computer Science
Conference Session
Emerging Computing and Information Technologies
Collection
2014 ASEE Annual Conference & Exposition
Authors
Seyed Mousavinezhad, Idaho State University; R. Eugene Stuffle, Idaho State University; Wei Pan, Idaho State University; Steven Grant Maclure, Idaho State University
Tagged Divisions
Computing & Information Technology
represent time. f(x,y) is a two-dimensional signal(e.g., image) of variables x and y. In digital signal processing we study discrete-time ordigital signals which can be obtained by sampling a continuous-time (analog) signal. Forthe purpose of discussion in this paper we will follow the notation in reference 1 and usex[n] to represent a digital signal x(nT) where T = 1/Fs is the sampling period (interval)and Fs is the sampling frequency. It is important to distinguish the difference between adiscrete-time signal and a digital one (again for more information we ask readers toconsult reference 1.)One important area in SP is the design/analysis of filters, this is also the topic whichstudents find usually more mathematically challenging. Basically a
Conference Session
Embedded Systems and Mobile Computing
Collection
2014 ASEE Annual Conference & Exposition
Authors
Cory Brozina, Virginia Tech; David B. Knight, Virginia Tech Department of Engineering Education
Tagged Divisions
Computing & Information Technology
university semester lasts 15 weeks, andthe enrolled MOOCs encompassed a total of 16 weeks.Three courses were chosen from the Coursera platform that fit the graduate student’s researchinterests as well as his learning needs. The first course, Computing for Data Analysis, began onSeptember 23rd and lasted for four weeks with a noted workload of approximately three to fivehours per week: 1) Computing for Data Analysis—Roger Peng—Johns Hopkins University https://www.coursera.org/course/compdata “This course is about learning the fundamental computing skills necessary for effective data analysis. You will learn to program in R and to use R for reading data, writing functions, making informative graphs, and applying modern
Conference Session
Information and Network Security
Collection
2014 ASEE Annual Conference & Exposition
Authors
Janusz Zalewski, Florida Gulf Coast University; Andrew J. Kornecki, Embry-Riddle Aeronautical Univ., Daytona Beach; Bogdan Denny Czejdo, Fayetteville State University; Fernando Garcia Gonzalez, Florida Gulf Coast University; Nary Subramanian, University of Texas, Tyler; Dawid Trawczynski, Advanced Micro Devices
Tagged Divisions
Computing & Information Technology
embeddedsystems security. The topics selected in the first round include: (1) General educational moduleson security, such as “General Introduction to Computer Security”, “Introduction toCryptography” and “Embedded Systems Security”; (2) Security of specific technologies used inembedded systems, which in this edition involve “FPGA Security”, “RFID Security” and“SCADA Security”; and (3) Software aspects of embedded systems security, such as “JavaSecurity” and “Threat Modeling.” Each module includes the following components: Objectives, Introduction, Student Activitiescomposed of Suggested Readings and Hands-on Exercise, and Assessment. Eight modulesdeveloped thus far have been tested in undergraduate courses on embedded systems andcomputer networks at
Conference Session
Topics in Computing and Information Technologies
Collection
2014 ASEE Annual Conference & Exposition
Authors
Manghui Tu, Purdue University Calumet; Kimberly Lynn Spoa-Harty, Purdue University Calumet Graduate Student
Tagged Divisions
Computing & Information Technology
incident identification, tracking, andreconstruction are discussed.1. IntroductionThe advances in internet technologies, the proliferation of mobile devices, and the developmentof electronic healthcare records, have driven healthcare services online and ubiquitous to provideconvenience and flexibility to users and patients14, 31. However, due to the untrustworthy internetenvironment and sophisticated healthcare service and business processes involved, healthcaresector faces severe challenges on securing protected healthcare information9, 10, 12, 14, 31. Over thepast few years, millions of sensitive data records in healthcare and other private and publicsectors were exposed10, 12, 14, 20, 24 and has resulted in substantial financial and
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2014 ASEE Annual Conference & Exposition
Authors
Osvaldo Mangual, Honeywell Aerospace; Marvi Teixeira, Polytechnic University of Puerto Rico; Reynaldo Lopez-Roig, Polytechnic University of Puerto Rico; Felix Javier Nevarez-Ayala, Polytechnic University of Puerto Rico
Tagged Divisions
Computing & Information Technology
mixed-mode (MPI-OpenMP) parallel implementation, including performance and scalability studies, carried out inour 16-node, 64 processor cluster.Based on the prime factor decomposition of the signal length this algorithm, which is based on ablock diagonal factorization of the circulant matrices, breaks a one-dimensional cyclicconvolution into shorter cyclic sub-convolutions. The subsections can be processed,independently, either in serial or parallel mode. The only requirement is that the signal length, N,admits at least an integer, r0, as a factor; N = r0.s. The Argawal-Cooley Cyclic Convolutionalgorithm, has a similar capability but requires that the signal length can be factored intomutually prime factors; N = r0.s with (r0,s) = 1. Since the
Conference Session
New Trends in Computing and Information Technology Education
Collection
2014 ASEE Annual Conference & Exposition
Authors
Ge Jin, Purdue University Calumet (College of Technology); Gerald A. Dekker Jr., Purdue University Calumet; John Moreland, Purdue University Calumet; Barbara Jean Nicolai, Purdue University Calumet
Tagged Divisions
Computing & Information Technology
, the Katrina hurricane along the GulfCoast of the United States in 2005, the earthquake in Haiti in 2010, or the most recentlyearthquake and tsunami in Japan. From the White House report on Hurricane Katrina, the stateand local government should develop modern, flexible and transparent logistic system forstockpiling commodities and supplies during the emergency [1]. Improvements in emergencymanagement information and decisions will have a positive impact on those most affected by thedisaster – the affected population. The affected population, however, can create difficulties forthe decision-maker. Each has varying disaster-caused or exacerbated needs and varied demandsfor services from the response organizations. With a general perception of
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2014 ASEE Annual Conference & Exposition
Authors
MD B. Sarder, University of Southern Mississippi
Tagged Divisions
Computing & Information Technology
Page 24.760.2members without revealing information to other groups.IntroductionAs students learning is widely accepted as key metric of student success, increased attention isbeing paid to the tools and techniques best suited to its successful adoption in classroomenvironment. It is very evident that technology seems to offer a natural and accessible way toadvance students learning [1]. ECAR has surveyed undergraduate students annually since 2004about technology in higher education and found that more and more students are using latesteducation technology in their education [2]. On an average student to computer ratio of 4:1 and ateacher and student population ready, willing and able to use technology (Figure 1). Yet despiteits availability
Conference Session
Emerging Computing and Information Technologies
Collection
2014 ASEE Annual Conference & Exposition
Authors
Alireza Kavianpour, DeVry University, Pomona
Tagged Divisions
Computing & Information Technology
digitalcircuits. Most of the examples presented in this paper were implemented on the microcontrollerStellaris LM3S8962 based on ARM processor. LabVIEW based classwork explained in thispaper has been implemented in several courses and has helped students further theirunderstandings on the fundamentals of computer hardware and software.1-IntroductionComputer programming in languages such as Visual Basic, C++, or JAVA follow a control flowmodel of program execution. In control flow, the sequential order of program elementsdetermines the execution order of a program. A program written in LabVIEW uses a slightlydifferent approach to than programs written in other languages1,2. This is called dataflowprogramming and, when a function such as addition or
Conference Session
Embedded Systems and Mobile Computing
Collection
2014 ASEE Annual Conference & Exposition
Authors
Cho Sehyeong, Myong Ji University; Yeonseung Ryu, Myongji University; Sang-Kyun Kim, Myongji University
Tagged Divisions
Computing & Information Technology
ofnodes related to execution: processing, I/O, decision, and function nodes. Table 1 summarizesCFL node types. CFL is executable, and, therefore, has features related to execution. Thesefeatures include: one accumulator register, one floating point accumulator, 6 integer variables, 6floating point variables, the input buffer, the output window, and two execution buttons – onefor single stepping and the other for running the whole flowchart until it reaches the end. Integervariables are initially named from ‘a’ to ‘f’ and floating point variables are named ‘u’ to ‘z’, butthey can be renamed. During the execution, students can watch the inner workings of theprogram: the control flow by a moving red dot, changing values by flashing colors, and