Asee peer logo
Displaying results 91 - 120 of 187 in total
Conference Session
Topics in Computing and Information Technologies II
Collection
2015 ASEE Annual Conference & Exposition
Authors
Richard G. Helps, Brigham Young University
Tagged Divisions
Computing & Information Technology
platforms for teaching some IT concepts are strong.Trends in IT towards much more diverse computing platforms that are integrated into the realworld indicate that IT students should pay more attention to hardware systems.Hardware adds a significant dimension to the learning experience of IT students. Commonlyavailable systems provide the necessary elements for introducing hardware into IT courses. Thebenefits to students are clear. The framework we have developed leading to the use of widelystandardized systems has been demonstrated to be effective in multiple classes and will becontinued and extended.Bibliography1. B. M. Lunt, J. J. Ekstrom, S. Gorka, G. Hislop, R. Kamali, E. A. Lawson, R. LeBlanc, J. Miller, H. Reichgelt, and T. A. for C. M
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2016 ASEE Annual Conference & Exposition
Authors
Yujian Fu P.E., Alabama A&M University; Peter J. Clarke, Florida International University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
of Testing Tools in SE Courses," in the 42nd ACM Technical Symposium on Computer Science Education (SIGCSE '11)., New York, NY, USA, 2011. [8] A. P. Rovai, M. K. Ponton and M. J. Wighting, "A Comparative Analysis of Student Motivation in Traditional Classroom and E-Learning Courses," International Journal on E-Learning, vol. 6, no. 3, pp. 413-432, 2007. [9] A. Goswami, G. S. Walia and S. Aburardeh, "Using a Web-Based Testing Tool Repository in Programming Course: An Empirical Study," in the 2014 International Conference on Frontiers in Education: Computer Science and Computer Enginee, 2014. [10] S. Wolfe and R. Flewitt, "New technologies, new multimodal practices and young children’s metacognitive," Cambridge Journal
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2014 ASEE Annual Conference & Exposition
Authors
Mohammad Rafiq Muqri, DeVry University, Pomona; Hasan Muqri, UCLA; Shih Ek Chng, DeVry University, Pomona
Tagged Divisions
Computing & Information Technology
Page 24.866.4line legend('Euler solution','Exact solution') hold off error=norm(y-exactSolution)/norm(exactSolution); A general form of a second-order ODE is shown as follows: d2 y/dx2 + p(x)dy/dx + q(x)y + r(x) + s = 0 (1.2) Any high order ODE can be expressed as a coupled set of first -order differential equations. For example the second-order ODE given in equation (1.2) can be reduced to a coupled set of two first-order differential equations. d/dx(dy/dx) = - p(x)dy/dx – q(x)y – r(x) – s (1.3) d/dx(y) = dy/dxJava’s ODE ClassWe will use and demonstrate a class named ODESolver that will define a number ofmethods2 used to solve ODEs and also subclasses that can be used to represent
Conference Session
Computing & Information Technology Division Technical Session
Collection
2016 ASEE Annual Conference & Exposition
Authors
Joshua Levi Weese, Kansas State University; Russell Feldhausen, Kansas State University; Nathan H. Bean
Tagged Divisions
Computing & Information Technology
). Computational Thinking : A Digital Age Skill for Everyone. Learning & Leading with Technology, 5191, 20-23.3. Barr, V., & Stephenson, C. (2011). Bringing Computational Thinking to K-12: What is Involved and What is the Role of the Computer Science Education Community ? ACM Inroads, 2(1), 48-54.4. Bean, N., Weese, J. L., Feldhausen, R., & Bell, R. (2015). Starting From Scratch: Developing a Pre-Service Teacher Program in Computational Thinking. Frontiers in Education.5. Bell, R. S. (2014). Low Overhead Methods for Improving Capacity and Outcomes in Computer Science. Manhattan, KS: Kansas State University.6. Bennett, V., Ioannidou, A., Repenning, A., Kyu Han, K., & Basawapatna, A. (2011
Conference Session
Emerging Computing and Information Technologies II
Collection
2016 ASEE Annual Conference & Exposition
Authors
Yujian Fu P.E., Alabama A&M University; Md Hossain Shuvo, Alabama A&M University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
graph for path testing testingb. TachoTestThis test has been done to test the consistency between the expected moving distance and theactual moving using the EV3’s default odometer data. This test purposed to find the drift in theEV3 servo motors. The code snippet is depicted in the following figure. Fig 10: Tacho Test for Robot Control System © American Society for Engineering Education, 2016 2016 ASEE Southeast Section ConferenceAll the test tests cases are written using Robotium and JUnit. The main class of Robotium Solo is used for testing which offers
Conference Session
Information and Network Security
Collection
2015 ASEE Annual Conference & Exposition
Authors
Richard Scott Bell, Northwest Missouri State University; Eugene Vasserman, Kansas State University; Eleanor C Sayre, Kansas State University
Tagged Divisions
Computing & Information Technology
thevolume and complexity of cybersecurity problems facing today’s workforce. This is what wewould like for our survey to help educators identify in their classrooms. A more detaileddescription and further analysis of this portion of our study can be found in our previous work. 5The information gained from this investigation was used to develop the statements used in ourcurrent assessment tool. Table 1: Statements included in survey 1 Pursue an advanced degree(s) focused on cybersecurity 2 Find ways to exploit vulnerabilities in existing software 3 Perform research focused on cybersecurity 4 Learn how to crack users’ passwords 5 Take additional
Conference Session
Potpourri
Collection
2015 ASEE Annual Conference & Exposition
Authors
Chaomin Luo, University of Detroit Mercy
Tagged Divisions
Computing & Information Technology
. Satisfactory performance was evaluated by various milestoneassignments, projects, presentation and other activities. Generally, on-going multi-project-basededucation combined effective classroom lectures, student active learning, innovative pedagogies,project management, and team work, benefits for both student research involvement, andengineering curriculum.References 1. Subbian, V., Purdy, C. C., and Beyette, F. R., UnLecture: A Novel Active Learning Based Pedagogical Strategy for Engineering Courses, Proceedings of the 2014 American Society for Engineering Education Annual Conference & Exposition, ASEE 2014. 2. Rios, E. F., Khan, A. S., and Padgett, D. V., A Senior Design Project: Heating and Cooling System for Car’s Interior
Conference Session
Topics in Computing and Information Technologies I
Collection
2015 ASEE Annual Conference & Exposition
Authors
Mudasser Fraz Wyne, National University; Jodi Reeves, National University; Frank Xavier Montes; Tom J Gurbach
Tagged Divisions
Computing & Information Technology
as the early 2000’s.4 College sustainabilitymeasures, such as financial ratios, student retention rate, admissions to applications ratio,and tuition rates by year are metrics that could then be used for reporting to accreditationboards. Later on, 5identified the metrics related to student affairs: student housing, facilitywork orders, engagement, and retention. However, these studies focuses only onperformance metric identification for higher education that cater to university officialsother than program leads. Furthermore, a recent dissertation identified metrics pertainingto organizational change in higher education, but the dashboard metrics identifiedfocused on program justification, such as student completion rates, and the
Conference Session
Innovations in Computing Education
Collection
2011 ASEE Annual Conference & Exposition
Authors
Alejandra J. Magana, Purdue University, West Lafayette; Aidsa I. Santiago-Román, University of Puerto Rico, Mayaguez; Nayda G. Santiago, University of Puerto Rico, Mayaguez; Cesar A Aceros; Brandeis H Marshall, Purdue University; Eric T. Matson, Purdue University, West Lafayette
Tagged Divisions
Computing & Information Technology
problemsolving task, we explored how technology and engineering students approach solvingcomputational problems. This study is guided under the premise that people’s ways ofexperiencing phenomena result from the unique interaction of their understanding of thephenomena and the situation in which they must apply that understanding 6 . Our ultimate goal isthat by identifying, comparing, and contrasting students’ understandings and strategies toapproach problems, more effective instructional approaches will be identified.Theoretical FrameworksProblem-based learning and Computational thinking theoretical frameworks are merged in thedesign and analysis of this study. Problem-Based learning is a student-centered instructionalstrategy to guide the learner(s
Conference Session
Potpourri
Collection
2017 ASEE Annual Conference & Exposition
Authors
Joshua B. Gross, Blackburn College
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
faculty themselves and the perceptions their institutions have of them. Givencurrent findings, we anticipate a large and concerning gap between the two sets of beliefs.AcknowledgementsThe author thanks Blackburn College's Faculty Research fund for sponsoring this research, andAnneliese Darow, Jalaa Hoblos, Kate Lockwood, and Laura Wiedlocher for their assistance.Bibliography[1] R. Starkman., (2016, April 28). "Stanford computer science launches a new masters ofeducation", in The Huffington Post [Online]. Available:http://www.huffingtonpost.com/ruth-starkman/stanford-computer-science_b_9713220.html[2] S. Zweben and B. Bizot, "2015 taulbee survey," in Computing Research News: CRA, 2016[3] J. Tims, S. Zweben, Y. Timanovsky, J. Chu Prey, "ACM NDC
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2017 ASEE Annual Conference & Exposition
Authors
Lorri J Barnett, Purdue Polytechnic, Anderson; Dennis O. Owen, Purdue University
Tagged Divisions
Computing & Information Technology
may be transferred to other universities throughestablished transfer policies.University Faculty Involvement and CommitmentEach dual credit course is delivered with the same level of academic integrity as all other classesat Purdue University. Each course offered must be equivalent to the course taught on campus incontent, assignments, prerequisites, labs, exams, texts used, class size limitations, and otherpossible course requirements. The university identifies a faculty member from the appropriatedepartment to teach the course(s) and work in collaboration with the appropriate high schoolcurriculum coordinator.University faculty use a flipped course delivery model. Lecture and group projects are deliveredon Monday, Tuesday, and Wednesday
Conference Session
Potpourri
Collection
2014 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Reza Sanati-Mehrizy, Utah Valley University; Paymon Sanati-Mehrizy, Icahn School of Medicine at Mount Sinai; Ali Sanati-Mehrizy
Tagged Divisions
Computing & Information Technology
Pediatric resident physician at Rutgers University - New Jersey Medical School in Newark, NJ. He is a graduate of the Milton S. Hershey Pennsylvania State University College of Medicine. He completed his undergraduate studies in Biology from the University of Utah. His research interests are varied and involve pediatric hematology and oncology as well as higher education curricula, both with universities and medical schools. Page 24.1380.1 c American Society for Engineering Education, 2014 Wireless Sensor Networks Projects in a Computer Engineering ProgramAbstractWireless Sensor Networks
Conference Session
Emerging Computing and Information Technologies I
Collection
2016 ASEE Annual Conference & Exposition
Authors
Araceli Martinez Ortiz, Texas State University - San Marcos; Mina Guirguis, Texas State University
Tagged Divisions
Computing & Information Technology
) Increasing Persistence of College Students in STEM, Science, Vol. 341.7. Beyer, S. (2014). Why are women underrepresented in Computer Science? Gender differences in stereotypes, self-efficacy, values, and interests and predictors of future CS course-taking and grades. Computer Science Education, 24(2/3), 153-192.8. Patitsas, E., Craig, Michelle, and Easterbrook, S. (2015). Scaling up Women in Computing Initiatives: What Can We Learn from a Public Policy Perspective? ICER ’15, August 09 - 13, 2015, Omaha, NE, USA.9. National Research Council. A Framework for K-12 Science Education: Practices, Crosscutting Concepts, and Core Ideas. Washington, DC: The National Academies Press, 2012.10. National
Conference Session
Embedded Systems and Mobile Computing
Collection
2013 ASEE Annual Conference & Exposition
Authors
Alireza Kavianpour, DeVry University, Pomona; Behdad Kavianpour, University of California, Irvine
Tagged Divisions
Computing & Information Technology
architecture,” Proc. IEEE Workshop Computer Architecture Pattern Anal. Machine Intel., pp. 115-121, Oct.1987.4. R. O. Duda and P. E. Hart, “Use of the Hough transformation to detect lines and curves in pictures,” CACM, 15, (1),pp. 11-15, 1972.5. A. L. Fisher and P. T. Highnam, “Computing the Hough Transforms on a Scan Line Array Processor,” IEEE Trans.on PAMI, vol. 11, no. 3, pp.262-265, March 1989.6. H. A. H. Ibrahim, J. R. Kender, and D. E. Shaw, “The Analysis and Performance of Two Middle-level Vision Taskson a Fine-grained SIMD Tree Machine,” Proceedings IEEE Conf. Comput. Vis. Pattern Recog. pp. 248-256, June 1985.7. P. V. C. Hough, “A method and means for recognizing complex patterns,”U.S. Patent 3,069,654, 1962.8. C. S. Kannan and H. Y. H
Conference Session
Information and Network Security
Collection
2013 ASEE Annual Conference & Exposition
Authors
john pickard, East Carolina University; Te-shun Chou, East Carolina University; Philip J Lunsford II P.E., East Carolina University; John Spence
Tagged Divisions
Computing & Information Technology
Security Instruction. J. Educ. Resour. Comput. 6(4), 5. doi: 10.1145/1248453.1248458.2. Cao, X., Y. Wang. Wang, A. Carciula & Wang. 2009. Developing a multifunctional network laboratory for teaching and research. In Proceedings of the 10 th ACM conference on SIG-information technology education, 155-160. Fairfax, Virginia, USA: ACM.3. Curtis, S. 2011. World IPv4 Stocks Finally Run Out. TechWeek Europe.4. DoD HPC. 2012. IPv6 not Needed Here. Retrieved 11 December, 2012 from http://www.hpcmo.hpc.mil/cms2/5. EMC. 2012. EMC Academic Alliance. Retrieved 11 December, 2012, from https://education.emc.com/academicalliance.6. Hamza, M. K., Alhalabi, B., Hsu, S., Larrondo-Petre, M. M., and Marcovitz, D.M. 2003. Remote
Conference Session
Curricular Issues in Computing and Information Technolog Programs
Collection
2013 ASEE Annual Conference & Exposition
Authors
Mudasser Fraz Wyne, National University; Raul Soto Jr
Tagged Divisions
Computing & Information Technology
satisfaction and delivery.Communications management: Proceed with systems development even if client isunavailable to review and give feedback on progress; the initial requirements should begood enough to do so. This will eliminate major development delays. We have not yetcompleted a survey of users to establish this and to determine whether there are anysoftware and hardware problems in implementing the automated system.Reference:1. Jayaprakash, M. and Balasubramani, R. (2011). “Status of Automation in University Libraries of Tamilnadu: A Survey”. European Journal of Scientific Research, 53(1), pp. 17-24.2. Rajput, P. and Jain, S. (2006). “Status of automation in special library and information centers of Gwalior: A survey”. NCIMDL, pp. 55-64.3
Conference Session
Potpourri
Collection
2012 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Ali Sanati-Mehrizy, Pennsylvania State University; Paymon Sanati-Mehrizy, University of Pennsylvania; Reza Sanati-Mehrizy, Utah Valley University
Tagged Divisions
Computing & Information Technology
integrate wireless sensor networks concepts into their curriculum.IntroductionA wireless sensor network (WSN) is a network of a set of independent small nodes equippedwith sensor(s), a wireless radio, a battery, and an on-board processor. Usually, the unit thatconsists of the wireless radio and the on-board processor is called a mote. With the recentadvances in MEMS technology, wireless communications, and digital electronics, the design anddevelopment of low-cost, low power, multifunctional sensor nodes that are small in size andcommunicate untethered in short distances have become feasible. The ever-increasingcapabilities of these tiny sensor nodes, which include sensing, data processing, andcommunicating, enable the realization of wireless
Conference Session
Information and Network Security
Collection
2012 ASEE Annual Conference & Exposition
Authors
Frank Jordan Sheen, Brigham Young University; Dale C. Rowe Ph.D., Brigham Young University; Richard G. Helps, Brigham Young University
Tagged Divisions
Computing & Information Technology
span continents[4].The management of SCADA systems was consolidated using personal computers to monitorprocesses by making requests for information from embedded devices commonly known asprogrammable logic controllers (PLCs). However, as SCADA systems began to integrate withpersonal computers, they were exposed to outside volatile networks, bypassing the common“security by obscurity” philosophy [5, 6].Several instances occurred in the early 2000’s that raised concern about the security of SCADA Page 25.877.2environments[7]. In 2003, the Slammer Worm infected the David-Besse nuclear power plant inOhio. Although the facility was undergoing
Conference Session
Innovations in Computing Education
Collection
2011 ASEE Annual Conference & Exposition
Authors
Tao Xing, Tuskegee University; Legand L. Burge Jr., Tuskegee University; Heshmat A. Aglan, Tuskegee University
Tagged Divisions
Computing & Information Technology
). Page 22.927.87 Nakajima, K. & Hori, M. in 2009 2nd IEEE International Conference on Computer Science and Information Technology, ICCSIT 2009, August 8, 2009 - August 11, 2009. 319-322 (IEEE Computer Society).8 Huang, Y.-M., Kuo, Y.-H., Lin, Y.-T. & Cheng, S.-C. Toward interactive mobile synchronous learning environment with context-awareness service. Computers and Education 51, 1205-1226 (2008).9 Dagon, D., Martin, T. & Starner, T. Mobile phones as computing devices: The viruses are coming! IEEE Pervasive Computing 3, 11-15 (2004).10 Maniar, N., Bennett, E., Hand, S. & Allan, G. The effect of mobile phone screen size on video based learning. Journal of Software 3, 51-61 (2008
Conference Session
Information Systems and Computing Potpourri
Collection
2011 ASEE Annual Conference & Exposition
Authors
Alireza Kavianpour, DeVry University, Pomona
Tagged Divisions
Computing & Information Technology
+100 Equal test; PC relative branch Branch on bne $1,$2,100 if ($1!= $2) go to PC+4+100 Not equal test; PC relative sss ssss set on less than slt $1,$2,$3 if ($2 < $3) $1=1; else $1=0 Compare less than; 2’s comp. set < imm. slti $1,$2,100 if ($2 < 100) $1=1; else $1=0 Compare < constant; 2’s comp. set < uns. sltu $1,$2,$3 if ($2 < $3) $1=1; else $1=0 Compare less than; natural numbers set < imm. uns. sltiu $1,$2,100 if ($2 < 100) $1=1; else $1=0 Compare < constant
Conference Session
Topics in Computing and Information Technologies I
Collection
2015 ASEE Annual Conference & Exposition
Authors
Wei Zheng, Jackson State University; Jianjun Yin, Jackson State University; Yanhua Cao, Jackson State University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
Conference Session
Emerging Computing and Information Technologies II
Collection
2016 ASEE Annual Conference & Exposition
Authors
Stephany Coffman-Wolph, West Virginia University Institute of Technology
Tagged Divisions
Computing & Information Technology
: Binary, Octal, and Hexadecimal Initial Keychains Materials:  Pony Beads in 2 colors (binary), 8 colors (octal), and 16 colors (hexadecimal)  3 pieces of Cord cut at approximately 10 inches for each participant  1 Keyring for each participant  ASCII Table(s) showing binary, octal, and hexadecimal Prep:  Purchase pony beads  Place each color of bead in a separate container with a tag or sign to designate the number it represents. Using containers with easily removable and
Conference Session
Curricular Issues in Computer-oriented Programs
Collection
2012 ASEE Annual Conference & Exposition
Authors
Naser El-Bathy P.E., North Carolina A&T State University; Clay Samuel Gloster Jr., North Carolina A&T State University; Ghassan M. Azar; Cameron Seay, North Carolina A&T State Univeristy; Mohammed K. El-Bathy, Lawrence Technological University; Ibraheem A. Kateeb, North Carolina A&T State University; Rajeev K. Agrawal, North Carolina A&T State University; Aiman Ghassan Baset
Tagged Divisions
Computing & Information Technology
, Massachusetts: Jones and Bartlett Publishers, 2008.[19] N. Chaiyarataiia, A. M. S . Zalzala. Recent developments in evolutionary and genetic algorithms: theory and Page 25.1012.15 applications. Genetic Algorithms in Engineering Systems: Innovations and Applications. GALESIA 97. Second International Conference On (Conf. Publ. No. 446), pp. 270 – 277, 1997.[20] D. E. Rowley, D. G. Rhoades. The cognitive jogthrough: a fast-paced user interface evaluation procedure. CHI '92 Proceedings of the SIGCHI conference on Human factors in computing systems, ACM, New York, 1992.[21] D. Pinelle, C. Gutwin. Groupware
Conference Session
Innovations in Computing Education
Collection
2011 ASEE Annual Conference & Exposition
Authors
Thomas J. Hacker, Purdue University, West Lafayette
Tagged Divisions
Computing & Information Technology
AC 2011-1231: EXPLORING THE USE OF VIRTUAL MACHINES ANDVIRTUAL CLUSTERS FOR HIGH PERFORMANCE COMPUTING EDU-CATION.Thomas J. Hacker, Purdue University, West Lafayette Page 22.690.1 c American Society for Engineering Education, 2011 Exploring the Use of Virtual Machines and Virtual Clusters for High Performance Computing Education.AbstractHigh performance computing systems have been based on commodity computing hardware sincethe introduction of Beowulf systems in the mid-1990’s. The emergence of virtualization andcloud computing technologies now make it possible to build high performance computing
Conference Session
Potpourri
Collection
2017 ASEE Annual Conference & Exposition
Authors
Abdulwaheed Johnson, Pace University; Anthony Joseph, Pace University
Tagged Divisions
Computing & Information Technology
efficiency of transaction processing. Mobility refers tothe capability of mobile payment transactions to be carried out at any time and in any place. Easeof use is the ease with which transactions can be performed using mobile payment methods.Mobile payments are completed in a relatively short time when compared to other forms ofpayment, hence the speed attribution, and the security of mobile payments is also a benefit thatmakes mobile payments adoption particularly advantageous [1][4][5]. The ease-of-use, speed,and efficiency of transaction processing are factors that boost merchant adoption as well [2].“The acceptance of mobile payment method[s] by merchant[s] especially small and mid-sizedbusiness[es] (SMBs) has risen tremendously…[to] 21% of
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2016 ASEE Annual Conference & Exposition
Authors
Cheryl Xu, Florida State University ; Seyed Mousavinezhad, Idaho State University
Tagged Divisions
Computing & Information Technology
Manufacturing since 2010 and International Journal of Computational Materials Science and Surface Engineering since 2007.Dr. S. Hossein Mousavinezhad, Idaho State University Dr. Mousavinezhad was the principal investigator of the National Science Foundation’s recent research grant, National Wireless Research Collaboration Symposium 2014; he has published a book (with Dr. Hu of University of North Dakota) on mobile computing in 2013. Professor Mousavinezhad is an active member of IEEE and ASEE having chaired sessions in national and regional conferences. He has been an ABET Program Evaluator for Electrical Engineering and Computer Engineering as well as Engineer- ing Education. He is Founding General Chair of the IEEE
Conference Session
Computing & Information Technology Division Technical Session
Collection
2016 ASEE Annual Conference & Exposition
Authors
Alireza Kavianpour, DeVry University - Pomona; Sogand Kavianpour, University of California - Irvine
Tagged Divisions
Computing & Information Technology
= = 𝑅𝐶𝑠 + 1 1 1 𝑠 + 𝑅𝐶 𝑠+ 1 𝑠 + 1000 𝑅𝐶 10𝑘Ω ∗ 0.1µ𝐹The following four lines of codes can be used to find the Bode plot:num = [1000];den = [1, 1000];TF = tf(num,den)bode(TF)1000/(s+1000) Bode Diagram 0 -5 -10 -15 Magnitude (dB) -20 -25 -30 -35 -40 0 Phase (deg
Conference Session
Embedded Systems and Mobile Computing
Collection
2014 ASEE Annual Conference & Exposition
Authors
Cho Sehyeong, Myong Ji University; Yeonseung Ryu, Myongji University; Sang-Kyun Kim, Myongji University
Tagged Divisions
Computing & Information Technology
thefunction call stack by a stack of parameters. CFL is tightly integrated into a web-basedinstruction system for efficient assigning of exercises, submitting, and grading6. Table 1. CFL node types processing type I/O node Decision Function node typical example(s) +, -, *, /, % putchar, scanf !=, ==, > ,=, <= return All operations are intentionally aligned with C language statements for easier transitionfrom CFL to C language. For instance, input statements “scanf” has not only the same name asin C language, but also has the
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2011 ASEE Annual Conference & Exposition
Authors
Reza Sanati-Mehrizy, Utah Valley University; Evan Jackson; Ali Sanati-Mehrizy, Pennsylvania State University; Paymon Sanati-Mehrizy, University of Pennsylvania; Afsaneh Minaie, Utah Valley University
Tagged Divisions
Computing & Information Technology
AC 2011-2280: MOUNT TIMPANOGOS COMMUNITY SPECIES DATABASEDr. Reza Sanati-Mehrizy, Utah Valley University Reza Sanati-Mehrizy is a professor of Computer Science at Utah Valley University. His research interests include Data Structures, Databases, and Data Mining.Mr. Evan JacksonAli Sanati-Mehrizy, Pennsylvania State University Ali Sanati-Mehrizy is a medical student at the Milton S. Hershey Medical Center at Pennsylvania State University. His research interests include the application of mobile computing in the sciences. Upon completion of medical school, he hopes to pursue a career in Internal Medicine/Pediatrics with a further specialization in Hematology-Oncology.Paymon Sanati-Mehrizy, University of Pennsylvania
Conference Session
Emerging Computing and Information Technologies II
Collection
2017 ASEE Annual Conference & Exposition
Authors
Mohammad Rafiq Muqri, DeVry University, Pomona; Javad Shakib, DeVry University, Pomona; James R. Lewis, DeVry University, Pomona
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
Applications, Prentice Hall, 2003.9. Joyce Van de Vegte, Fundamentals of Digital Signal Processing, Prentice Hall, 2002.10. Sanei, S., Chambers, J., EEG Signal Processing, John Wiley & Sons, Ltd, West Sussex, England, 2007.11. Greenfield, L., Geyer, J., Carney, P., Reading EEGs, Lippincott, 2010.12. ZhijunGu, NI Biomedical Start up Kit 3.0, July 2010, https://decibel.ni.com/content/docs/DOC-1264613. Biomedical Workbench 2013 Help, https://digital..ni.com/14. http://www.ni.com/white-paper/8599/en/Appendix A Bioinformatics Sample Lab: Nucleotides/Protein Data Search/IdentificationOne of the most common DNA format is FASTA. This format is the official format withinBLAST and NCBI searching, matching, and sequencing engine. FASTA is a text-based