6e+07 6e+07 4e+07 4e+07 2e+07 2e+07 0 0 Time (s) Time (s) (a) Large heap allocation with fill (b) Large heap allocation without fill 7e+06 heap os 6e+06 5e+06
gained.References1. Bandura, A. (1982). Self-Efficacy Mechanism in Human Agency. American Pyschologist, 37(2), 122-147.2. Basawapatna, A., Repenning, A., & Koh, K. H. (2015). Closing The Cyberlearning Loop. Proceedings of the 46th ACM Technical Symposium on Computer Science Education - SIGCSE '15, (pp. 12-17).3. Bean, N., Weese, J. L., Feldhausen, R., & Bell, R. (2015). Starting From Scratch: Developing a Pre- Service Teacher Program in Computational Thinking. Frontiers in Education.4. Bell, R. S. (2014). Low Overhead Methods for Improving Capacity and Outcomes in Computer Science. Manhattan, KS: Kansas State University.5. Brennan, K., & Resnick, M. (2012). Using artifact-based interviews to study the
more time, the system’sdesign could be further refined and the software algorithms’ capabilities increased. With theseimprovements, the hybrid system’s overall effectiveness and feasibility may become even moreappealing.AcknowledgementWe would like to thank Wendell A. Gibby, MD, for allowing us to use his medical facility,including medical equipment and access to medical personnel necessary for the successfulconduction of this undergraduate research project.References:1. L Li et al., "Assessment of the fetal thymus by two- and three-dimensional ultrasound during normal human gestation and in fetuses with congenital heart defects.," Ultrasound in Obstetrics and Gynecology, vol. 37, no. 4, pp. 404 - 409, 2011.2. E. Pavlova, D. Markov, S
Manufacturing since 2010 and International Journal of Computational Materials Science and Surface Engineering since 2007.Dr. S. Hossein Mousavinezhad, Idaho State University is the principal investigator of the National Science Foundation’s research grant, National Wireless Re- search Collaboration Symposium 2014; he has published a book (with Dr. Hu of University of North Dakota) on mobile computing in 2013. Professor Mousavinezhad is an active member of IEEE and ASEE having chaired sessions in national and regional conferences. He has been an ABET Program Evaluator for Electrical Engineering and Computer Engineering as well as Engineering Education. He is Founding General Chair of the IEEE International Electro Information
).Learner’sperceptionsofacybersecuritycompetitionasitrelates toknowledge,skills,andabilities(KSA’s).PaperpresentedattheNICE(NationalInitiativefor CybersecurityEducation)Conference,SanDiego,CA.Justice,C.,&Do,L.(2012).ITexperientiallearning:TheLivingLab.PaperpresentedattheFrontiersin EducationConference(FIE),2012.Kelly,S.(2014).Dnsmasq.Retrievedfromhttp://www.thekelleys.org.uk/dnsmasq/doc.htmlTheNationalInitiativeforCybersecurityEducation(NICE).(2015).Retrievedfrom http://csrc.nist.gov/nice/framework/Newhouse,B.K.,Scribner,B.,&Witte,G.(2016).NICECybersecurityWorkforceFramework(NCWF). DraftNISTSpecialPublication800-181.Pearce,M.,Zeadally,S.,&Hunt,R.(2013).Virtualization:Issues,securitythreats,andsolutions.ACM ComputingSurveys(CSUR),45(2
://www.qualtrics.com/. [Accessed 1 February 2015].[3] S. Y. Lye and J. H. L. Koh, "Review on teaching and learning of computational thinking through programming: What is next for K-12?," vol. 41, pp. 51-61, 2014.[4] Phoenix Contact, [Online]. Available: https://www.phoenixcontact.com/nanoline. [Accessed 1 February 2015].[5] Phoenix Contact, "How to program nanoLine with flow chart programming - Phoenix Contact," 15 October 2009. [Online]. Available: https://www.youtube.com/watch?v=qXA2O47rqqw. [Accessed 1 February 2015].[6] National Center for Women in Computing, "By the Numbers," National Center for Women in Computing, Boulder, CO, 2014.[7] Y. Oh and S. Yang, "Defining exergames and exergaming," in Proceedings of Meaningful Play, East Lansing, MI
FDM CDM y FDM CDM s liance ity FDM
. https://c9.io/ 4. Wu, L., Liang, G., Kui, S., & Wang, Q. 2011. CEclipse: An online IDE for program- ing in the cloud. In 2011 IEEE World Congress on Services, IEEE, pp. 45-52. 5. https://www.codecademy.com/ 6. http://cscircles.cemc.uwaterloo.ca/ 7. Pritchard, D. and Vasiga, T. 2013. CS circles: an inbrowser python course for begin- ners. In ACM Technical Symposium on Computer Science Education, pp. 591-596. 8. Guo, P. 2012. Online Python Tutor: Embeddable web-based program visualization for CS education. http://pythontutor.com/.9. Brusilovsky, P. and Sosnovsky, S. 2005. Individualized exercises for self-assessment of programming knowledge: An Evaluation of QuizPACK. ACM Journal of Educa- tional Resources in
quantitiesof textual data by processing data sets in both time and resource efficient ways.One of the tasks that NLP is used for in analyzing textual data sets is that of stylometry.Stylometry can be understood as a linguistic analysis of use of words in terms of both choice andorder, which can help characterize traits of a single or group of author(s). Fox, Ehmoda, andCharniak (2012) describe the underlying principle behind work on authorship attribution to be aset of statistically quantifiable characteristics of the writing style reflected by the word/phrasechoices of individuals which make it easy to distinguish one author from the other. Stylometry isthus a type of quantitative or statistical analysis which helps identify and characterize
should consider using a genre-based approach to integrating writing into engineeringcurriculum if they are concerned with the integration of students into real, actual engineeringcommunities of practice.Acknowledgement The project presented in this paper was funded by the Old Dominion University’s QualityEnhancement Plan (QEP): as Interdisciplinary Writing (IDW) Project “Student Writing in theSTEM Disciplines: A Faculty Learning Community”19.References 1. Lang, J. D., Cruse, S.,McVey, F. D., & McMasters, J. (1999). Industry expectations of new engineers: A survey to assist curriculum designers. Journal of Engineering Education,88, 43-51. 2. Reave, L. (1999). Technical communication instruction in engineering schools: A
. In Presence: Teleoperators and Virtual Environments 6, 4(August 1997), 355-385.[3] Mellor, J.P., "Enhanced Reality Visualization in a Surgical Environment, A.I. Technical Report No. 1544," 1995.[4] Grimson, W. E. L., Ettinger, G. J., White, S. J. and Lozano-Perez, T. "An automatic registration method forframeless stereotaxy, image guided surgery, and enhanced reality," IEEE Transactions on Medical Imaging, vol. 15,pp. 129-140, 1996.[5] Schmalsteig, D., Fuhrmann, A., Hessina, G., Szalavari, Z., Encarnacao, L. M., Gervautz, M., Purgathofer, W.,"The Studierstube Augmented Reality Project," Presence, vol. II, pp. 33-54, February, 2002 2002.[6] Chastine, J.W., Brooks, J. C., Zhu, Y., Owen, G. S., Harrison, R. W., and I.T. Weber, "AMMP-Vis
underway.Bibliography1. Ayala, K. J. (1997). The 8051 Microcontroller: Architecture, Programming and Applications (2 ed.): West.2. Barnett, R., Cox, S., & O'Cull, L. (2003). Embedded C Programming and the Atmel AVR: Thomson, Delmar Learning.3. Barnett, R., Cox, S., & O'Cull, L. (2004). Embedded C Programming and the Microchip PIC: Thomson, Delmar Learning.4. Cady, F. M. (2008). Software and Hardware Engineering: Assembly and C Programming for then Freescale HS12 Microcontroller.5. Gaonkar, R. S. (2007). Fundamentals of Microcontrollers and Applications in Embedded Systems with the PIC18 Microcontroller Family): Thomson Delmar Learning.6. Peatman, J. B. (2003). Embedded Design with the PIC18F452
Transactions on Education, VOL. 50(4), November 2007.5. Atech, C. and Alicia Charpentier, A., “Sustaining Student Engagement in Learning Science”, The Clearing House: A Journal of Educational Strategies, Issues and Ideas, Vol. 87(6), pp. 259-263, 2014.6. Reyes, M., Brackett, M., Rivers, S., White, M., and Salovey, P., “Classroom Emotional Climate, Student Engagement, and Academic Achievement”, Journal of Educational Psychology, pp. 700-712, Vol. 104(3), 2012.7. Gavin Northey, G., Bucic, T., Chylinski, M., and Govind, R., “Increasing Student Engagement Using Asynchronous Learning”, Journal of Marketing Education, pp. 171-180, Vol. 37(3), 2015.8. Entwistle, N. “Conceptions of Learning and the Experience of Understanding: Thresholds
Research Center Minneapolis, MN, USA 6. Parker, D.B., Swope, S., Baker, B. N. Ethical conflicts: in information and computer science, technology, and business. QED Information Sciences, Inc. Wellesley, MA, USA ©1990 7. Prior, M., S. Rogerson, and B. Fairweather (2002). “The Ethical Attitudes of Information systems Professional: Outcomes of an Initial Survey,” Telematics and Informatics (19), pp. 21-36. 8. Slater, D. (1991) “New Crop of IS Pros on Shaky Ground,” Computerworld, p. 90. SPA/BSA (1997). Software Publishers Association/Business Software Alliance joint commissioned study: 1996. Global Piracy Report, International Planning and Research, 1997. 9. Straub, S. “Computer abuse and security: Update on
. L. D. Feisel and A. J. Rosa, “The role of the laboratory in undergraduate engineering education,” Journal ofEngineering Education, vol. 94, no. 1, pp. 121–130, 2005.2. Ordua, Pablo and Irurzun, Jaime and Rodriguez-Gil, Luis and Garcia-Zubia, Javier and Gazzola, Fabricio andLpez-de-Ipia, Diego. Adding New Features to New and Existing Remote Experiments through their Integrationin WebLab-Deusto. International Journal of Online Engineering (iJOE), vol. 7, no. S2, Oct. 2011.3. Lowe, S. Murray, E. Lindsay, and D. Liu, Evolving remote laboratory architectures to leverage emerginginternet technologies. Learning Technologies, IEEE Transactions on, vol. 2, no. 4, pp. 289294, 2009
by a gift from the Intel Corporation through their UniversityProgram Office.References 1. David Goldman, “Hacker hits on U.S. power and nuclear targets spiked in 2012,” CNN Money, WWW, found at http://money.cnn.com/2013/01/09/technology/security/infrastructure-cyberattacks/index.html, retrieved Jan 2015, Jan 2013. 2. David E. Sanger and Eric Schmitt, “Rise Is Seen in Cyberattacks Targeting U.S. Infrastructure,” The New York Times New York Edition, pp. A8, July 27, 2012. 3. Cárdenas, A. A., Amin, S., Lin, Z.-S., Huang, Y.-L., Huang, C.-Y. and Sastry, S., “Attacks Against Process Control Systems: Risk Assessment, Detection, and Response,” ACM Symposium on Information Computer and Communications Security, pp
laboratory in undergraduate engineering education,” Journal ofEngineering Education, vol. 94, no. 1, pp. 121–130, 2005.3. E.D. Lindsay and M.C. Good, “Effects of Laboratory Access Modes upon Learning Outcomes,” IEEE Trans.Education, vol. 48, no. 4, pp. 619-631, Nov. 2005.4. V. J. Harward, J. A. del Alamo, S. R. Lerman P. H. Bailey, J. Carpenter, et. al., "The iLab Shared Architecture:A Web Services Infrastructure to Build Communities of Internet Accessible Laboratories," Proceedings of theIEEE , vol.96, no.6, pp.931-950, June 2008.5. P. Orduña, “Transitive and Scalable Federation Model for Remote Laboratories,” Doctoral Thesis, Univertityof Deusto, Bilbao, Spain, Apr. 2013. [Online]. Available:http://morelab.deusto.es/media/publications/theses/pablo
-446.4. DeMarco, T. 1982. Controlling software projects: management, measurement & estimation. Yourdon Press, New York, NY.5. Humphrey, W. S. (1988). Characterizing the software process: a maturity framework. Software, IEEE, 5, 2 (March/April, 1998), 73-79.6. Kaner, M., and Karni, R. 2004. A capability maturity model for knowledge-based decision-making. Information, Knowledge, Systems Management, 4, 4 (December, 2004), 225-252.7. Keller, K., and Mack, B. 2013. Maturity Profile Reports (March 2013). Retrieved May 17, 2013 from http://cmmiinstitute.com/assets/presentations/2013MarCMMI.pdf.8. Kitson, D., and Masters, S. 1992. Analysis of SEI Software Process Assessment Results 1987-1991, Technical Report
PC to teach computer networking and operating systems”, Proceedings of the 4th Conference on Information Technology Curriculum, Lafayette, Indiana, USA, 2003.2. A. Gaspar, S. Langevin, W. Armitage, R. Sekar, and T. Daniels, “The role of virtualization in computing education”, Proceedings of the 39th ACM SIGCSE Technical Symposium on Computer Science Education Portland, Oregon, USA, 2008.3. J. Ekstrom, M. Bailey, “Teaching Web Deployment with OS-virtualization”, Proceedings of 2009 ASEE Annual Conference and Exposition, Austin, Texas, USA, 2009.4. P. Li, “Integrating Virtualization Technology into Remote Lab: A Three- Year Experience”, Proceedings of 2009 ASEE Annual Conference and Exposition, Austin, Texas, USA
intends on attending Medical School.Ali Sanati-Mehrizy, Pennsylvania State University Ali Sanati-Mehrizy is a medical student at the Milton S. Hershey Medical Center at Pennsylvania State University. His research interests include the application of mobile computing in the sciences. Upon completion of medical school, he hopes to pursue a career in Internal Medicine/Pediatrics with a further specialization in Hematology-Oncology.Dr. Reza Sanati-Mehrizy, Utah Valley University Page 22.926.1 c American Society for Engineering Education, 2011 Integration of Mobile Computing into
square meter movable solar cells panel mountedso that it was perpendicular to the Sun’s position through out the day. The fixed solar panel wasperpendicular to the Sun’s position only when the Sun was directly overhead.Two simulated locations for the experiment were selected, Morogoro, Tanzania and Huntsville,Alabama. Morogoro has a latitude of 6° 49′ 0″ S and a longitude of 37° 40′ 0″ E which is nearthe Equator. Huntsville, Alabama has a latitude of 34° 43′ 49″ N and a longitude of 86° 35′ 10″W and is located in the middle part of the Northern Hemisphere of the Earth.The four dates selected for the simulation were the Vernal Equinox March 20, 2011, SummerSolstice June 21, 2011, Autumnal Equinox September 23, 2011, and the Winter
Proceedings of the ACM 14th international workshop on Data Warehousing and OLAP, on pages 101-104, ACM, October, 2011.2. S. Amjad, S. Neelakrishnan, and R. Rudramoorthy. “Review of design considerations and technological challenges for successful development and deployment of plug-in hybrid electric vehicles,” in Renewable and Sustainable Energy Reviews, 14(3), on pages 1104-1110, 2010.3. The Apache Software Foundation, “Apache Hadoop,” http://hadoop.apache.org, February, 2014.4. “A commercialization project of Energy Systems Network,” http://www.energysystemsnetwork.com/project-summary-benefits, April, 2012.5. “Why Think City?,” http://thinkev.leftbankcompanies.com/why-think-city, December, 2013.6. J. Shafer, S
betweeneach variable and each factor. For items that were loaded under two factors, only thehighest loading was retained. The following variances were reported for the factors:factor1, σ2 = 38.62%; factor2, σ2 = 8.41%; factor3, σ2 = 6.73%; factor4, σ2 = 5.36%; andfactor5, σ2 = 4.81%.After evaluating the items loaded under each factor, factor1 was labelled CommunityInfluence (CI), factor2 Satisfaction (S), factor3 Service Quality (SQ), factor4 Learnability(L) and factor5 Technical Quality (TQ). Five new variables were computed on the basisof the means of the items falling under each factor. To compare the factors as rated byusers, one-way repeated measures ANOVA was applied to the five variables. Repeatedmeasures ANOVA indicated significant
the types of cryptographic algorithms. In the beginning, aka the70’s, a cryptographic method was developed called the Data Encryption Standard (DES). Thisencryption algorithm consisted of a 54-bit key using the hardware that was available then. Thiswas more than enough encryption to protect files and communication. Technology quicklyadvanced and far surpassed the capabilities of the systems that were encrypted with DES. Thismethod is no longer considered an acceptable method of encryption. This is because it would betrivial for a mediocre computer by today’s standards to break this encryption.With the loss of integrity in the DES algorithm, a variant was conceived that used a three 56-bitnumbered key. This method is considered reasonably
d faculty opiinion on the use of case studies. Studdent responsses andperformaance were segregated by instructor. Student S resp onses in the sections tauught by instruuctor#1 were not n availablee.5. Next StepsDue to the overall positive effect of the case studies on student flowcharting performance, wewill continue implementing case studies. We will revise the case studies, taking into accountstudent and faculty opinions. This should include, for example, shortening Mind Games, whichuses all basic procedural programming concepts—such as input, sequencing, selection (if/else),repetition (for and while loops), and output—as well as including additional student-createdstories in the
leastwe could identify the course title, instructor(s) of the course, and a list of main topics of thecourse. Most of the sites contain much richer contents than the aforementioned minimum amountof information. Among the additional information found on these sites include teachingschedules, topics discussed in the course, lecture notes, detailed homework and projectassignments, and any combinations of the above. In the end, information from a total of 38course websites is collected. Twenty-eight courses of the 38 total have been taught since 2007 (afive-year window through spring 2012). A list of these 28 course websites is in Appendix A.4. Course Titles, Goals, and ObjectivesCollectively the following different course titles are used in the
prepared and given resources necessary to run a successful workshop. ● Only evaluated or research-based practices that work with diverse students are presented. Evidence of effectiveness is provided for all recommended practices. ● Presented examples and resources are easily used and adapted without ongoing support or instruction. ● Inclusion of success stories by energetic high school teachers (local if possible) using recommended practices. ● Active learning components; e.g., group problem solving to facilitate workshop ice breaker activities. ● Sessions including: ○ Current conditions and need for computing in high school. ○ CS1-type course(s) that promotes more and diverse computing majors
the requirements of self-reflection at the end of each small lab project.Perhaps this new component will be able to call up students’ metacognitive ability and find iteasier to form higher-level and conceptual understandings based on their actual experiencesusing ROS for robotics design.Acknowledgments: Anhui Provincial Natural Science Foundation (Grant no. 1708085ME129), NationalNatural Science Foundation of China (Grant no. 51305001).References 1. Subbian, V., Purdy, C. C., and Beyette, F. R., UnLecture: A Novel Active Learning Based Pedagogical Strategy for Engineering Courses, Proc. of the 2014 American Society for Engineering Education Annual Conference & Exposition, ASEE 2014.2. Rios, E. F., Khan, A. S., and Padgett, D
afirst-year course. We believe that the pedagogical process used in this course is transferable toother educational contexts.References: 1. Allen, D., Allenby, B., Bridges, M., Crittenden, J., Davidson, C., Hendrickson, C., Matthews, S., Murphy, C., and Pijawka, D. (2008), Benchmarking sustainable engineering education: Final report. EPA Grant X3-83235101-0. 2. Wiggins, J., McCormick, M., Bielefeldt, A., Swan, C., and Paterson, K. (2011), “Students and sustainability: Assessing students’ understanding of sustainability from service learning experiences”, paper presented at the 2011 Annual American Society of Engineering Educators (ASEE) Conference and Exposition, 26-29 June 2011, Vancouver, Canada
. He is a graduate of the Milton S. Hershey Pennsylvania State University College of Medicine. He completed his undergraduate studies in Biology from the University of Utah. His research interests are varied and involve pediatric hematology and oncology as well as higher education curricula, both with universities and medical schools.Paymon Sanati-Mehrizy Paymon Sanati-Mehrizy is currently a medical student at the Icahn School of Medicine at Mount Sinai. He completed his undergraduate studies in Biology from the University of Pennsylvania in May 2012. Currently, his research interests consist of higher education curricula, both with universities and medical schools.Dr. Reza Sanati-Mehrizy, Utah Valley University