calculating the lo-cation and orientation of an object. An algorithm for recognitionof an individual identity based on a digitally represented image ofthe scanned retina is presented. The technology is based upon thefact that no two retinal patterns are alike. In this paper, the nine parameters of an ellipsoidal shape fit-ted into a retinal image such as coordinates of the center of theellipsoid, the length of major, minor, intermediate axes, and thedirection of three axes will be calculated. For each individual, theseparameters are unique. Key Words: Ellipsoid, image processing, pattern recognition,parallel algorithm, retina, three-dimensional moments . 1
, see, for example, [1]) whenever we are dealing with alternating current(AC) topics students are being introduced to simple forms of frequency selective structures. Asexample, in first order circuits (RC or RL) if we include AC excitations we are really dealingwith filters: low-pass, high-pass, band-pass or band-stop (reject) devices. These simple circuitsare examples of passive circuits & systems. With the introduction of operational amplifiers (Op-Amps) integrated circuits, we start description of so-called active filters. Studying theinput/output (I/O) models of these systems, students are gradually introduced to using computer-aided design, CAD, or analysis tools that can be beneficial in their work. For example after“digitizing” the
classroom setting. This makes it challenging forstudents to become self-directed learners after graduation. This study provides an overview ofthe design and development of several self-directed learning modules, along with theimplementation procedure and analysis of the preliminary results.IntroductionWith the current pace the technological advancements are achieved today, it became necessaryfor recent college graduates to keep themselves up-to-date with all the innovations andtechnological advancements.1, 2 Especially for engineering, engineering technology, andcomputer science majors, self-improvement and continuous learning after graduation became anexpectation. The concept of continuous learning can present a challenge for many recentgraduates
c American Society for Engineering Education, 2015 1 Data Management Model Selection: IT Professionals’ preferences Gholam Ali Shaykhian, Ph.D. Mohamed Abdelgadir Khairi, Ph.D. Jinan Ziade, ABDAbstractData Management Models selection (Centralized Data Model or Federated Data Model)for managing organization data is influenced by many factors. The goal is to determinethe best architectural model for managing enterprise data; and help organizations to selectan architectural model. The study compared and contrasted the federated and centralizeddata models within
features, we use feature vector with low dimension. We employ SupportVector Machine (SVM) for the classifier with the gait-based feature vector. The extracted featuredataset are divided into two parts, i.e., training and testing datasets. The training data set areused for training a SVM classifier while the testing dataset are used for the evaluation.According to the experimental results, we know that GEI is an applicable feature for human gaitrepresentation. Despite of the limitation of the dataset, e.g., different races and thickness ofclothes which weaken the distinct differences between males and females, the average accuracyof the proposed approach reaches up to 87% under 10 times holdout validation.1. IntroductionGender classification plays
module presentation and labparticipation.1. IntroductionCyber-security continues to move to the forefront of existing and new technology deployments,as well as the media in general. Recent attacks1,2 by terrorist groups on critical infrastructure arebeginning to exploit the risks and vulnerabilities of Industrial Control Systems (ICS)3,4. APresidential Executive Order has brought priority to the issue5 and Presidential Directive 76defines such critical infrastructure sectors, the vast majority of which are controlled by ICS.Therefore, there remains a critical need to educate students in the concepts of cyber-security withrespect to such systems, and to be inclusive of students not only in disciplines specializing incyber-security, such as
predecessor BroadReach, were developed at East CarolinaUniversity (ECU), by Mr. Lee Toderick, the co-author of this paper.BroadReach was created to provide automated, secure, remote connectivity between distributednodes (on or off campus) and central server resources located on campus. BroadReach Extended(BRE) was recently added to provide automatic assessment for locally created remote labexperiments to students. This section describes the functions of both.2.1 BroadReachRefer to Figure 1. The purpose of BroadReach is to use IPsec to create a secure connectionbetween two remote locations, regardless of the computer network a packet travels across8.Unlike some tunneling protocols such as SSH, IPSec passes all traffic through the virtual
paper thereby serves as an innovative way to expose technology students to this difficult topic and gives them a fresh taste of Python programming while having fun learning the Discrete and Fast Fourier Transforms. 1. Background Engineering departments are often confronted with the necessity to update laboratory exercises and equipment with the latest emerging technological trends within tight budget constraints. Another challenge faced by departments pertains to satisfying the Engineering Technology Accreditation Commission (ETAC) criteria for capstone senior project experience within the curriculum. In this paper we will explain how we attempted to solve these challenges by exposing students to new emerging
mention its impact as a source of information. This paper is organized as follows: Section II presents related work. The monitoring system is describedin Section III. The Usage Scenario is described in Section IV. Finally, the results, analyses, conclusions,and future work are presented in Sections V. II. RELATED WORK Projections indicate that by 2012, video use will constitute half the consumption of network resources allover the world, thus surpassing the P2P traffic, currently responsible for the greater part of network traffic.By the end of the decade, projections indicate that this percentage will fit about 90% of the networkbandwidth [1]. With this forecast it is extremely important to
detailed computations step by step and perform self-study. A test report system also helps the instructor verify the learning effectiveness. The FullMode is a full version of the SHA-512 cipher.SHAvisual was classroom tested in a Computer Security course. Major findings of this surveyinclude the following: (1) students indicated SHAvisual helped them understand SHA better; (2)both the Demo Mode and Practice Mode had positive impact on student learning; and (3) aMANOVA analysis suggested that the student reactions were generally independent of the timespent on using the software. Write-in comments also verified that SHAvisual did help studentslearn and the instructor teach the SHA algorithm effectively.1. IntroductionData security is vital to the
consumers and the cloud providers.1. BACKGROUNDIn a network security class, students learned the basics about how to provide confidentialityusing either symmetric key encryption or asymmetric key encryptions. They have also beentaught how to provide authenticity by applying techniques with Message Authentication Code(MAC). In this work, students were challenged to explore how the cryptography knowledge canbe applied in real world settings. Specifically, students were encouraged to first study securityconcerns in cloud computing. They were then been asked to discover how cryptography can beused to enhance security in cloud computing. In order to evaluate how practical the proposedapproach, they were instructed to establish a testing environment to
courses to be taken later by the students.In this section the objective is to observe technology preference of undergraduate and graduateSTEM majors’ when they are asked to draw the graph of functions. Questionnaire and interviewresponses of several participants will be displayed for clarity of the decisions made by theparticipants. Page 26.1614.4Q6) If you are required to draw the graph of a given function by using technology, what kind oftechnology would you use? Please either choose one of the following or write your own answerand explain why. 1. Calculator (If this is your choice please specify the kind of calculator you use) 2. Excel
. Multiple regression analysis shows that a subset of conceptualassessments consisting of repetition, classes, assignment operations and Java syntax is sufficientto predict students’ ability to write viable programs (r2 = 0.78).In conclusion: 1) Adequate average performance in programming concepts is necessary but notsufficient for students to write viable computer programs; 2) Adequate performance in allindividual conceptual categories, and not just adequate average performance, is necessary to beable to write viable computer programs; 3) Given the correlations between performance indifferent conceptual categories, a subset of conceptual assessments consisting of repetition,classes, assignment operations and Java syntax is sufficient to predict
extremely abstract topic that requires deep conceptual knowledge.Devices used for parallel computing are often “black boxes” in which the only indication oftransmission is through limited external cues (i.e. flashing LED lights or the hum of the system).In the project discussed in this paper we postulated that if we can provide those who are new tothe idea of parallel computing a visual and embodied experience, they would find it easier tocomprehend the concept. To translate this idea into a designed object, a kinetic computingsculpture comprising of a functional cluster of Raspberry Pi computers (figure1.) has been builtby an interdisciplinary group of researchers.Figure 1. Kinetic sculpture (prototype version consisting 30 Raspberry pi computers
finding lower-cost routers with the capability of running it can bechallenging. Cisco’s integrated services or multiservice routers are designed for branch officeapplications and some support IOS images with MPLS capability.Generally, MPLS first became available for certain 3600- and 2800- series branch routersstarting with IOS version 12.4(1). These routers are now obsolete though the 2800 is stillsupported into 2016. Presently Cisco’s branch router product line has moved to 3900-, and 2900-series. Determining an appropriate combination of platform and IOS feature set can be done bycontacting Cisco representatives or by using the online Cisco Feature Navigator8. The navigatorpermits searching by combinations of router platform, image release
students do not need to study the underlying theory before class to understandthe algorithms. This methodology is aimed to explode the abilities of those with kinestheticlearning (others with a preference for other style of learning can make use of the videos,textbook, or the instructor’s lecture notes).3 It has the beneficial side effect of lettingstudents to socialize with their fellows by requiring them to get in touch and talk to eachother, and giving them the opportunity to learn their fellow’s names. It also avoids studentsto fall asleep in class, since they have to stand up and move to specific positions during thesimulations. Even though similar proposals exist in the literature,5, 6, 1, 4 some of them are nottailored to courses in data
]. Typically, we wouldwe would just read the introduction, examine the diagrams and review the conclusion. The mainbody of text was only read if clarifications or in-depth information was needed. Not only did thissave time but also, as most of our employers were not native speakers of English, focusing oninfographics and less on text reduced misunderstandings [1].After moving to academia, I found that students were unaware of the writing style that is used intoday’s high-paced industries. While many schools offer writing intensive programs [3] andsome guidance on the use of graphs and charts [4], students do not receive enough instruction onhow to develop and integrate infographics [12] within their documentation. This is particularlytrue of the many
-item by line-item, and placed in a containingcategory. No additional containing categories were required during this follow on phase,indicating that categorical saturation was achieved. Four top level categories were added tothe 37 containers; effectively creating an hierarchical taxonomy for REILs.1 IntroductionThis paper presents a remote laboratory information taxonomy. Development of taxonomiesis a common human intellectual activity; a taxonomy within some given domain organizesand clarifies the domain content and provides a common framework that supports andfacilitates reasoning and communication about the domain in question. In this paper, theinformation taxonomy that is presented was developed to support reasoning about
Physics Department at Kansas State University. Page 26.496.1 c American Society for Engineering Education, 2015 Developing and Piloting a Quantitative Assessment Tool for Cybersecurity Courses Scott Bell1 , Eleanor Sayre2 , and Eugene Vasserman2 1 Northwest Missouri State University 2 Kansas State UniversityAbstractThe rapid growth of the Internet over the past two decades has led to a proliferation ofnetwork-capable computing devices
, fluid mechanics, homework problems, content analysis,textbooks, writing promptsIntroductionAs assessments of learning outcomes are increasingly emphasized through accreditationrequirements (e.g., via ABET) and other quality assurance initiatives, written communication isone area that engineering instructors often find challenging to incorporate and assess.1 This isparticularly true in large core courses at the sophomore and junior levels. Yet it has also beenfound that technical writing is best taught during the learning of technical material.2This study is part of a larger ongoing project to understand and expand the incorporation ofwriting in large-lecture engineering courses, including investigation of faculty perspectives andtextbook
lives, theopportunities for careers are expanding rapidly. A major challenge of this field is the trainingand education of a new generation of skilled workers. This paper studies different approachesthat are used by different institutions of higher education to integrate nanotechnology conceptsinto their curriculum.IntroductionNanotechnology is the science, engineering, and technology that deals with various structures ofmatter that have dimensions on the order of a billionth of a meter. Nanotechnology is the abilityto observe, manipulate, measure, and manufacture things at the nanoscale, which is about 1 to100 nanometers. While the word nanotechnology is new and was introduced in the late 1970s,the existence of functional devices and
need for automated and scalableassessment mechanisms, to assess large numbers of students without a proportionateincrease in costs. There are four main approaches to this kind of assessment:autograding, constructed-response analysis, automated essay scoring, and peer review.This paper examines the current status of these approaches, and surveys new research oncombinations of these approaches to produce more reliable grading.Keywords: scalable assessment, autograding, constructed-response analysis, automatedessay scoring, peer review, self-review1. IntroductionLimited resources to adequately assess student work are a major problem in highereducation. A 2012 New York Times article [1] on automated essay scoring contains thefollowing anecdote
college upper level management to quickly evaluate theuniversity’s performance by looking at the index score. The upper management can thendrill down and see which KPI’s were responsible for the change in monthly performance.Richland used these metrics until 2007, but the structure of their dashboard had evolved,adding visual cues in the form of traffic lights to allow for faster analysis10. Table 1. Richland College Data Dashboard9 Page 26.312.5In the year 2000, The University of California (UC) realized that it would need to makechanges to its business architecture to accommodate its projected influx of futureenrollments. Since the
the level of IPv6 readiness ofinternational universities is largely unknown. Secondly, the quality or “effectiveness” ofuniversities that have IPv6 web services enabled is also unknown. This study addresses thesetwo challenges by providing the first known published assessment of the IPv6 enablement ofuniversities within a global scope.Though the need to become ready for IPv6 implementation may not be on the forefront of auniversity’s list of priorities, the effects of not becoming IPv6 ready can have negativeimplementations much sooner than administrators may anticipate. A university’s adoption ofIPv6 can affect the institution’s teaching, research, innovation, and budget.1 Partneringinstitutions and research facilities that are already IPv6
programs fail to engage 21st century learners, ignoring the plethora of resourcesand techniques made available by advanced technology.1 GalvanizeU offers programs that are industry relevant. Developed in partnership with theUniversity of New Haven (UNH), GalvanizeU’s data science program is based in Silicon Valley,California (San Francisco). GalvanizeU/UNH will infuse a new breed of diverse, creative andinterdisciplinary talent into the field of data science. This paper describes the innovative way in which GalvanizeU/UNH’s curriculum isdesigned to address the needs of students, educators, employers, and stakeholders, combininglearner-centered pedagogy, industry partnerships, and a commitment to continuous improvement.The first program
two semesters. Figure 1. Cynefin Complex Domain (used with permission Cognitive Edge Pte Ltd http://cognitive-edge.com/ as published in Essential Scrum: A Practical Guide to the Most Popular Agile Process1) Page 26.809.2Many projects can be partitioned into domains according to their complexity and uniqueness.The Cynefin framework partitions projects into five domains based on their complexity: Simple,Complicated, Complex, Chaotic, and Disorder. In the Simple domain the correct solution isobvious and generally undisputed. Best practices and continuous business process improvementmethodologies
Data Mining for Adverse Event Detection and Action RecommendationAbstractMany real-life data mining applications use sequence data modeling, in which data isrepresented as a sequence. A temporal sequence is a finite ordered list of events (t1,e1),(t2,e2), …,(tn,en) where ti represents time and ei represents the event taking place at time ti.ei takes place before ei+1 for 1≤ i ≤ n-1. This model can be used in data mining, calledsequence data mining, to predict certain event that may take place at a specific time.Sequence data mining has a wide range of applications. This data mining technique canbe used for prediction of adverse events and can recommend appropriate actions to betaken as needed. In aviation safety, the
engineering discipline and 2more projects for out-of-discipline choices. At the same time, each faculty member shares theirlist of projects, each specifying the maximum number of students required from each discipline.Once all the input is collected, discipline managers (DM’s) from each of the engineeringdepartments manually sorted students according to the preferences and project constraints.Figure 1 attempts to visually capture the existing assignment approach.Figure 1. The existing approach involved faculty pitches where faculty members described their project’s needs (left) and students submitted their preferences via paper-based formed (right
-based course, multiple-projectis intended to be designed to train the following research skills of students: (1) knowing currentwork in field, (2) recognizing research problems, (3) critical thinking, (4) problem-resolving, (5)research methods, (6) critical reviewing, and (7) documenting and reporting.2. The On-going Multiple-project-based PedagogyThe Department of Electrical and Computer Engineering in our school offers track concentration onthe Robotics and Mechatronics program. A variety of practical research and development projectsare crucial features of the Robotics and Mechatronics program. Therefore, ComputationalIntelligence course with on-going practical R&D project is a great opportunity for students toenhance their research
say you have adata source in which each of two objects are identified as a person and you want to define arelationship between these two objects that they “know” each other. Using RDF triples, orstatements, containing a subject, predicate and object, you can do just that as seen in Figure 1from Hebeler6. literal value Figure 1 - Sample RDF/XML triple Applying our example, the subject is the first person, the predicate is the property defined as“knows” from FOAF7, and the object is the second person. FOAF stands for ‘Friend of a Friend’and