tocapture a more comprehensive picture of software usability across computing platforms.The methodology has been validated by performing an initial study using the tasks andperformance metrics across each of the defined computing platforms. The results from theseinitial tests have allowed us to make improvements to the testing methodology as well as somehypotheses for further testing. This proposed methodology, when used in conjunction withqualitative research, can provide a reliable approach for cross-platform usability analysis.Some considerations for educational design of cross platform methodology are discussed.1. IntroductionAdvancement in technology has presented new opportunities for users to perform computingtasks on many new platforms and
were accessed by learners in two ways, on-campus, and remote. Approaches tocreating on-campus and remote cybersecurity laboratories are discussed.On-campusThere were two approaches usedfor cybersecurity lab setups for on-campus students. One approachshown in figure 1 was to installVMs on each workstation thestudent utilized. This was verysimple to do if golden disk imageswere deployed across the lab. Onegolden image had the VMsinstalled and it was pushed out toall the workstations. Additionally,students downloaded VMappliances. In this approach, there Figure1:On-campusfirstlabsetupwas no single point of failure.Student just moved to another workstation, if one machine had issues. The issues to thisapproach were; 1) if the workstation had
of word choices in missionstatements compared across public and private engineering colleges in the United States. Theresearch questions driving this study are: 1. Which words are most frequently used in missionstatements for private and public engineering colleges in the U.S.? 2. For six pre-determinedcategories of interest that each word may represent (eg. related to global, service, pedagogy,research, ethics, and diversity), what similarities and differences are noted in occurrences of eachof the six categories across the two settings of public and private colleges?BackgroundTo help situate this research study, in this section, a discussion drawing from two bodies ofliterature is presented. The first part of this discussion focusses on
rangeSun SPOTs consist of a battery pack, a processor board (main board), and a sensor board(eDemo Board) as shown in Figure 1. Figure 1: Free Range Sun SPOT9The two free range Sun SPOTs come with a rechargeable battery for use in the field as well asconnections to be powered by an external source. Figure 2, illustrates the schematic ofconnections between boards and battery for a Sun SPOT device. The eSPOT Main Board is thebrain of the Sun SPOT system. The eSPOT Main Board contains the main processor, the mainboard communication, memory, wireless radio, and power controller. The eDEMO boardcontains the sensors. Figure 3 illustrates the block diagram of the eSPOT Main Board
popularity of each food station, measured in number diners visiting that food-station, was firstobserved. Then the arrival rate of the customers and the number of workers were recorded. Basedon the collected data, several scenarios were developed to assess the system. The simulation resultsuggests that adding food-servers to the top 3 most visited food stations can dramatically reducethe overall waiting time. In addition, offering special deals, could further improve the result.1. IntroductionOne of the challenges teaching a simulation course regards example models students are assignedto develop. Albeit simple and generic models can teach students the basics, the usability of whatthey learned comes often from real world examples. Samples include
have taken him to Los Alamos where he worked on modeling the transient dynamic attributes of Kinetic Energy munitions during initial launch. Afterwards he was selected for the exchange scientist program and spent a summer working for DASA Aerospace in Wedel, Germany 1993. His initial research also made a major contribution to the M1A1 barrel reshape initiative that began in 1995. Shortly afterwards he was selected for a 1 year appointment to the United States Military Academy West Point where he taught Mathematics. Following these accomplishments he worked on the SADARM fire and forget projectile that was finally used in the second gulf war. Since that time, circa 2002, his studies have focused on unmanned systems
Alex Edgcomb1,2, Frank Vahid2,1, Roman Lysecky2, and Susan Lysecky1 1 zyBooks, Los Gatos, California 2 Computer Science and Engineering, University of California, Riverside 3 Electrical and Computer Engineering, University of ArizonaABSTRACTSmall auto-graded coding exercises with immediate feedback are widely recognized as helpingstudents in introductory programming courses. We analyzed usage of a particular codingexercise tool, at 11 courses at different universities. Instructors awarded differing amounts ofcourse points (including zero) for the exercises. We investigated how awarding points
students’ performanceas measured by their grades, students’ perceptions and opinions obtained on surveys, field notesfrom observing the classes, interview data at the end of the course, and the interaction logs thatour system records. After the pilot test, students’ average grade in the treatment group wasslightly (but not significantly) better than the control group on the post test. Students’ survey andinterview data indicated positive feedback about OpenDSA, with the average response on howwell they liked using the OpenDSA materials increasing after use as compared to a similar pre-test question about whether they would like to use such materials.1. IntroductionWe present our first evaluation results from an ongoing research and development
partnerships with peer departments and institutions.1 IntroductionInternational partnerships are frequently proposed, but many never make it beyond anexpression of mutual interest. The challenges to overcome are initiating first contact, discussingresearch areas to determine if there are overlapping areas or topics of mutual interest, seekingout and pursuing visiting and funding opportunities, and loss of initial momentum.To overcome these challenges, we have developed a process for building and strengtheninginternational partnerships in computing and information technology.2 Our Approach Page 23.567.2Our approach consists of three primary stages
complementary sequences of a four character alphabet (AGTC)representing the nucleotides, as shown in Figure 1. Page 23.636.3 Figure 1: A representation of a flattened segment of a double-sided DNA strandMeeting 1: Introduction2, 3, 4, 5, 6This meeting consisted of an introduction to the course, of students, course objectives, andcourse grading. The promise of genomics was discussed by referencing articles from both thepopular press and technical literature. Additional discussion points included fundamental tools,microscopes and spectrum analyzers, advances in computer chips, sequencing methods, andbioinformatics. Lastly, the students were engaged in
detect the presence of groups of collinear figure points. In this paper,the use of basic math such as the polar coordinate system, for line detection in an image wasdescribed. In these algorithms both mesh and tree connections of processors were exploited.1-IntroductionParallel computing for image processing has recently received considerable attentions 1,3,10,13.Technological advances have made the design of fine-grain architectures possible and many practicalalgorithms have been implemented. Line detection by the Hough Transform 1 method is a powerfultool in shape analysis. It extracts global features from images; however, because of its computationalcomplexity, it is not easily implemented in real-time for some applications. One approach
suitable for Internet accessible remoteexperimentation. Considering the challenge, the authors have developed a custom designedLMS for an Internet accessible remote laboratory. This paper describes the design anddevelopment of an integrated facility with Internet accessible remote laboratory and an LMS. Interms of the remote experimentation part, it uses computer interfacing hardware and softwarefrom National Instruments (Input/Output cards and LabVIEW). The LMS part is mainlysoftware tools that are implemented by using MySQL and .NET technologies.1. IntroductionThe presence of computer technology in education has increased dramatically, and predictionsare that this trend will continue to accelerate. Many of the new technologies are
(measured by credit-hours completed). Students’ programming backgrounds vary from none to paid programmers. • Lab equipment is limited. The class is large enough to require 15 identical lab stations. Therefore the system had to be designed so that the cost, multiplied by 15, was reasonable. Even with 15 stations students work in pairs, and two or three lab sections are required.Measurement of effectiveness of the student experienceIn line with the research goals of the lab experience measurements will be made of: 1. Students’ understanding of CPS 2. Students’ understanding of the pillars of IT relevant to this experience. 3. Students’ evaluation (opinion) of the relationship between CPS and IT.These
controls for IPv6 (ACLs, Policies, etc) Observe and mitigate first hop security threats Implement control plane protection mechanisms Observe and mitigate security threats introduced by transition mechanisms Secure IPv6 networking (routing protocols, DNS, and MPLS) Configure IPsec for IPv6Remote Lab environmentHands-on lab experience for the students was an essential element of this course. In theliterature there are numerous examples showing that lab experience plays a critical role instudent learning.1, 2, 18 Because this course is taught completely online, the labs must be eitherremote equipment or simulation. Literature shows that simulation software can limit studentcuriosity and experimentation.6 Therefore, to allow
systems, allowing them to be effective in thelaboratory and, ultimately, as data analysts/scientists [1][2][3][4]. One paradigm that has beenwidely adopted in industry is MapReduce as implemented in open-source tool, Hadoop [3].Although these systems are based on many years of research work, the conceptual framework onwhich these systems were built differs largely from what could be found in the earlier researchwork and education curricula. University courses available today are largely focused aroundvarious areas (some from repackaged content) that cover some selected parts of Big Dataspectrum, mostly: data mining, distributed systems and most recently data science [5][6][7].We believe that the pedagogical approach used by related education
professionalism) 2 . Similarly, in2013, for the first time, the ACM and the IEEE have included information assurance and securityas a separate knowledge area within their recommended Computer Science Curricula 1 . As withthe IT curriculum, the CS curriculum also incorporates components of cybersecurity throughoutthe various other computer science knowledge areas. While both guidelines providerecommended cybersecurity topics that should be covered within the respective curricula, they do Page 24.61.3not include any pedagogical best practices to guide instructors as to how they should engagestudents within the cybersecurity classroom or how to assess their
process to achieve the same goals.1. Introduction1.1 AttitudesEducators regularly assess their students’ work with carefully constructed tools. There are manytools available such as tests, projects, and homework assignments. These tools are used based onthe task at hand and new tools are developed as necessary. Such assessments assist the educatorin determining the student’s degree of subject mastery. Formative assessments point out gaps ina student’s understanding and provide opportunity for improvement. Final, summativeassessments involve the review of not just the final course average, but also the progress thestudent has made, the consistency of effort, and additional factors. Typically, the educatorexpends significant consideration to
, they tend to discuss the history anddifferences between the Fahrenheit and Celsius scales4,5,11,22,27,30. Few textbooks includeda section discussing the physical origin of temperature as the measure of molecularenergy12,25. This type of coverage may leave students with an incomplete understandingof temperature, or even erroneous understanding as they try to apply their understandingof the gas phase to the liquid and solid phases of matter, leading to potentialmisconceptions in the phase change physics. Page 24.123.5Figure 1. Screen shot of molecular motion animation in the solid phase.In our instructional approach, temperature is explained as an
of the method by monitoring the progress of a class andits individuals as the semester moves on. 1. Introduction According to research, 65% percent of the population benefits more from visual learning than anyother style1. Incidentally, 90% of the information that the brain processes is visual2. Although there is alot of research to conduct regarding visualization as a tool for teaching and learning, there is a consensusin terms of the effectiveness of catering to this style of learning. Studies have shown, students withdifferent learning styles favor visualization as a means of learning a new concept 3. Considering thosefacts, the learning examples for this approach to teaching computer algorithms strives to use the
heavily weighted withstudents from traditionally underrepresented groups, including women and minorities.Most students, whether at the undergraduate or graduate level, are reentering an academicenvironment after having been out in the working world for some time. Like any otheruniversity, NU is always considered a center of excellence with main objectives toprovide education, conduct research, in addition to providing public service to itsconstuents [1]. Similarly, National University Library System (NULS) supports alleducational and research activities of students, faculty, and staff of all of the affiliates ofthe National University System. Our library uses a Library Management System (LMS)that provides easy access to a countless array of
computational thinking practices: Connecting Computing Developing computational artifacts Abstracting Analyzing problems and artifacts Communicating Working effectively in teamsThey are grouped by seven big ideas and 23 key concepts as shown in Table 1. Page 23.301.4 Table 1 – Big Ideas and Key Concepts – CS Principles13 Big Idea Key Concept Creativity: Computing is a A. Computing fosters the creation of artifacts. creative activity. B. Computing fosters creative expression C. Programming is a
bytheir Center for Neural Basis of Cognition (CNBC). This minor is open to students in any majorof any college at Carnegie Mellon. This minor seeks to attract undergraduate students fromcomputer science, engineering, biology, statistics, and others. This minor requires a total of fivecourses. Four courses are drawn from neural computation, neuroscience, cognitive psychology,and intelligence system analysis areas, and one additional depth elective chosen one of the coreareas that is outside of the student’s major. This depth elective can be replaced by a one-yearresearch project in computational neuroscience27.Models for Integration of Computing Intelligence in CurriculumsTable 1 provides a list of computing intelligence course offerings of
c American Society for Engineering Education, 2013 Crop Monitoring System: A Case of Teaching Machine Vision through Undergraduate Research AbstractNorthwest Nazarene University, which is located in the Treasure Valley of Idaho, is developing acrop monitoring platform (CMP). The CMP, which uses a machine vision system, estimates fruittree parameters such as tree canopy volume and canopy reflectance characteristics. This researchproject, conducted by undergraduate engineering students, is integrated with the teaching ofmachine vision in a Control Systems course. This paper presents a case for teaching machinevision through undergraduate research.1. IntroductionNorthwest
Internetaccess restriction imposed by some governments increased the technical challenges that wouldneed to be met by our solution.Prior to creating a custom solution, the group evaluated a wide range of commercial and open‐source streaming platforms using a robust set of objective criteria. The most important criteriawere identified as: (1) ability to stream content to any common client (PCs/Macs, Tablets,mobile phones), (2) ability to encode / transcode content into any necessary format in real‐timeor faster, (3) ability to adequately handle adverse conditions such as network congestion, and(4) ability to handle a large number of simultaneous client requests.B. system overviewTo accomplish encoding, the team erected a computing farm with a cluster of
. To begin, we discuss the structure of the course, the challenges that emerged, andthe development approaches that were employed. We conclude with the results of twoanonymous surveys on engagement; the first was given to students who participated in the class,while the second was sent to the general computing population of the university.BackgroundMilgram describes mixed reality environments as a spectrum, with the physical world at oneextreme and purely virtual environments at the other [1]. In purely virtual environments, most(if not all) aspects of the user experience are synthesized. However, because virtual objects areembedded within the physical world, AR lies between these two extremes. Its strong ties to thephysical world naturally
; Oakes1 conducted research based on audiology records to help audiology technicianswhen the decision between an ITE, hearing aid worn ‘in the ear’, and a BTE, hearing aid worn‘behind the ear’. Audiology technicians generally will make the decision based on theaudiogram results and a consultation with the patient and the decision to be made at that point isgenerally pretty clear. However, there are occasions where the data leaves them in a spot wherethey can go either way. In these cases, they might “benefit from a second opinion given by anautomatic system with an explanation of how that second opinion was arrived at”1. The data thatAnwar & Oakes collected consisted of the audiograms, which graphs the auditory thresholds ofthe patient at 6
c American Society for Engineering Education, 2013 Alternate Pathways to Careers in Computing: Recruiting and Retaining Women Students I. Introduction The U.S. Department of Labor (2005) has predicted an increase in demand for computer systemanalysts (29%), database administrators (37%), and software engineers (38%). Even with theseincreasing demands, there is a severe lack of representation of minority women in the field.Participation of women in computing and information technology, although never equitable, hasdeclined during the past decade (Misa, 2010)1. With numerous reasons cited, includingstereotypes of the field, a lack of role models, and a desire to help others, attracting and
describe the application of a particular data analysis tool, association analysis,and demonstrate its relevance to data generated by learners in an OLE. Specifically, wedemonstrate how association analysis can be used to: 1) better understand learner behavior on anOLE discovering common usage patterns in the site anf 2) identify the learner interactions withthe site that correspond to resultant learning of the site’s target learning objectives.The first of these analyses generates rules of the type “users who visited page x and page y alsovisited page z” and shed light common usage patterns. They can be used both for betterunderstanding how learners are interacting with an OLE and also for recommending particularpages. For examples, upon observing
individual embedded systems that are capable of 1. interacting with their environment through various sensors, 2. processing information locally, and 3. communicating this information wirelessly with their neighbors. “19A sensor node (embedded system) usually consists of three components which are19: • Wireless modules or motes – key components of the network which consists of a microcontroller, transceiver, power source, memory unit, and may contain few sensors. Examples: Mica2, Cricket, MicaZ, Iris, Telos, SunSPOT, and Imote2. • A sensor board which is mounted on the mote and is embedded with multiple types of sensors. Examples: MTS300/400 and MDA100/300. • A programming board (gateway board) – provides multiple
engineeringproblems, engineering education needs reform. Multi-university system education (MUSE) is aproject sponsored by the National Science Foundation as a step toward engineering educationreform. The goal of this project is to develop innovative approaches for engineering education.They have proposed a learning model that develops important skills that is not addressed in thecontemporary engineering curricula. This model’s emphasis is to teach system thinking skills toundergraduate students. Systems thinking enable students to envision the architecture ofcomplex, multi-layered engineering systems13.In this project, an undergraduate track in wireless sensor networks has been developed as avehicle for studying these systems, featuring (1) junior-year