, D., “Bottle Rockets and Parametric Design in a Converging-Diverging Design Strategy,” Proceedings of the ASEE Annual Conference and Exposition, June 2006, Chicago, IL.3. Constans, E., Courtney, J., Dahm, K., Everett, J., Gabler, C., Harvey, R., Head, L., Hutto, D., Zhang, H., “Setting the Multidisciplinary Scene: Engineering Design and Communication in the ‘Hoistinator’ Project,” ASEE Annual Conference and Exposition, June 2005, Portland, OR.4. Bakrania, S., Bhatia, K., Riddell, W., Weiss, L., and Dahm, K., “Wind Turbines to Teach Parametric Design,” ASEE Annual Conference and Exposition, June 2009, Austin, TX.5. Engineering Accreditation Commission, Engineering Criteria 2000, Accreditation Board for Engineering
information on migration patterns of the Black Tip Shark. And yet the web is a fairly young technology Page 26.1358.6 emerging in the early 1990’s out of efforts at the European Center for Nuclear Research (CERN). Figure 2 – Top App (Marine Debris) splash screen It is at CERN that Tim Berners-Lee first assembled the components necessary for the realizationof the web; a browser (client), a server, a protocol for client/server communication (HTTP) and alanguage for presenting information (HTML) 10. Since then the growth of the web has beennothing short of explosive. The rapid growth itself caused one of the inherent
, Brandon Deaguero, Kelsey Farenholtz, Bo Li, Timmy Meyer,John Mooring, Tamar Petersen, Robert Redfern, and Michelle Will.References[1] Wing , J., Computational thinking. Communications of the ACM, 2006. 49(3): p. 33-35.[2] Voogt, J., et al., Challenges to learning and schooling in the digital networked world of the 21st century. Journal of computer assisted learning, 2013. 29(5): p. 403-413.[3] Grover, S. and R. Pea, Computational Thinking in K–12 A Review of the State of the Field. Educational Researcher, 2013. 42(1): p. 38-43.[4] NRC, Report of a Workshop on the Pedagogical Aspects of Computational Thinking. 2011: The National Academies Press.[5] Grover, S., Foundations for advancing computational thinking
showcased in the course website.IV. Pre-Lesson Quiz a. You just downloaded the popular Angry Birds game. As you play the game (on your phone, or in the lab, or on your computer), try to figure out how the game is implemented. What are the variables you change as you push the bird up or down, left or right?V. Test Your Mettle Quiz a. You shoot a dart at a speed of 10 m/s with an angle of 50. What is the time for impact. b. What is the maximum height and what is the maximum range for the dart in question a. c. You shoot a dart at a speed of 10 m/s with an angle of 45. What is the time for impact. d. What is the maximum height and what is the maximum range for the dart in question c. e
Page 23.154.3contain the item in y. Properties of association rules may be expressed in terms of differentdefined measures. The support count of an itemset is the number of transactions that contain theitemset. We denote the number of elements in an itemset x by |x|. Then the support of itemset x is σ ( x) = {t i | x ∈ t i , t i ∈ T } .The support of a rule x→ y, is the proportion of transactions that contain the itemsets in the rule.This is the support count of the union of the antecedent and the consequent divided by the totalnumber of transactions as in Equation 1. σ ( x ∪ y) s( x → y
Security, Elsevier/Newnes, Amsterdam, 2012.3. Gebotys C.H., Security in Embedded Devices, Springer-Verlag, New York, 2010.4. Stapko T., Practical Embedded Security, Elsevier/Newnes, Amsterdam, 2008.5. Howard M., S. Lipner, Writing Secure Code. 2nd Edition, Microsoft Press, Redmond, Wash., 2003.6. Swiderski F., W. Snyder, Threat Modeling, Microsoft Press, Redmond, Wash., 2004.7. Howard M., S. Lipner, The Security Development Lifecycle, Microsoft Press, Redmond, Wash., 2006.8. Florida Gulf Coast University. Software Engineering Program. CEN 3213 Embedded Systems Programming. Topics on Security. Ft. Myers, Florida, December 2013. URL: http://satnet.fgcu.edu/CEN3213/9. Sun Microsystems. Java Security Overview. White Paper. April 2005. URL: http
package(s) to fulfill specific body of knowledge (BOK) for the ConE education?METHODOLOGYIn this research study, two widely used BIM software packages, namely Autodesk Revit family2010 and Vico Virtual Construction Suite 2008, were selected and their capacities andlimitations were examined by the authors. As a case study, these two packages were used to Page 22.818.4model a two-story academic building. Finally, conclusions and recommendations are provided.BIM SolutionsAs BIM technology continues to evolve, software vendors have been developing solutions to fillthe BIM matrix. A brief introduction of the most developed BIM solutions
.[9] P. Guo, “Why scientists and engineers must learn programming,” Communications of the ACM, 2013. [Online]. Available: http://cacm.acm.org/blogs/blog-cacm/166115-why- scientists-and-engineers-must-learn-programming/fulltext. [Accessed: 02-Jul-2017].[10] J. M. Wing, “Computational thinking,” Commun. ACM, vol. 49, no. 3, pp. 33–35, 2006.[11] K. Lynch, A. Carbone, D. Arnott, and P. Jamieson, “Studio-Based Approach to Teaching Information Technology,” vol. 8, no. April 2013, pp. 75–79, 2002.[12] M. Woodley and S. N. Kamin, “Programming Studio : A Course for Improving Programming Skills in Undergraduates,” 1971.[13] R. A. Layton, M. L. Loughry, M. W. Ohland, and G. D. Ricco, “Design and validation of a web-based system
Constituent, 2014.[15] Fu, Y. and Clarke, P., “Gamification based Cyber Enabled Learning Environment for Software Testing” submitted to the 123rd American Society for Engineering Education (ASEE) - Software Engineering Constituent, 2016.[16] A. Goswami, G. S. Walia and S. Aburardeh, "Using a Web-Based Testing Tool Repository in Programming Course: An Empirical Study," in the 2014 International Conference on Frontiers in Education: Computer Science and Computer Enginee, 2014.[17] Drupal Community. Drupal, 2016. http://drupal.org/.[18] Mening, R., “Building a Simple Drupal Website”, Websitesetup.org. November 2013. Available from http://websitesetup.org/build-website-drupal/.[19] Rovai, A.P.. Blended learning and sense of community
both air and ground. His team deployed a bomb finding robot named the LynchBot to Iraq late in 2004 and then again in 2006 deployed about a dozen more improved LynchBots to Iraq. His team also assisted in the deployment of 84 TACMAV systems in 2005. Around that time he volunteered as a science advisor and worked at the Rapid Equipping Force during the summer of 2005 where he was exposed to a number of unmanned systems technologies. His initial group composed of about 6 S&T grew to nearly 30 between 2003 and 2010 as he transitioned from a Branch head to an acting Division Chief. In 2010-2012 he again was selected to teach Mathematics at the United States Military Academy West Point. Upon returning to ARL’s
Science Education, pages 131-152.3. C.A. Shaffer, M.L. Cooper, A.J.D. Alon, M. Akbar, M. Stewart, S. Ponce, and S.H. Edwards. (2010). Algorithmvisualization: The state of the Field. ACM Transactions on Computing Education, 10:1-22.4. E. Fouh, M. Akbar, and C.A. Shaffer (2012). The Role of Visualization in Computer Science Education, Com-puters in the Schools 29, Issue 1-2, 95—117.5. L. Malmi, V. Karavirta, A. Korhonen, J. Nikander, O. Seppala, and P. Silvasti (2004). Visual algorithm simula-tion exercise system with automatic assessment: TRAKLA2. Informatics in Education, 3(2):267- 288.6. C.A. Shaffer, M. Akbar, A.J.D. Alon, M. Stewart, and S.H. Edwards (2011). Getting Algorithm Visualizationsinto the Classroom in Proceedings of the 42nd ACM
as such: iperf3 -s enablesserver mode, iperf3 -c enables client mode, -u changes default TCP testing to UDP testing, -k(followed by a number) sets the number of packets to send during the test. Following is theexample of TCP and UDP testing commands respectively. “iperf3 -c 192.168.42.1 -p 5021 -k5000” and “iperf3 -c 192.168.42.1 -p 5021 –u”. Iperf3 uses set of packet transmissions, 5000 forTCP and 159 for UDP, to measure the throughput, retransmission, and packet loss. Thethroughput is computed by use of predetermined fixed size of the Internet Control MessageProtocol (ICMP) packet and its round-trip time (RTT). Retransmission, only available in TCP, ismeasured by counting the resending packets due to any unsuccessful transmission such as
] R. L. Brown, H. L. Helton, A. C. Williams, M. T. Shrove, M. Milošević and E. Jovanov, "Android Control Application for Nao Humanoid Robot," in Proc. of the International Conference on Frontiers in Education: Computer Science and Computer Engineering, 2013.[4] H. Ahn, H. Kim, Y. Oh and S. Oh, "Smartphone-Controlled Telerobotic Systems," in Cyber- Physical Systems, Networks, and Applications (CPSNA), 2014 IEEE International Conference on, Hong Kong, 2014.[5] I. Fette and A. Melnikov, "The WebSocket Protocol," [Online]. Available: https://tools.ietf.org/html/rfc6455. [Accessed 25 July 2016].[6] R. Fielding, J. Gettys, J. Mogul, H. Frystyk, L. Masinter, P. Leach and T. Berners-Lee, "Hypertext Transfer Protocol -- HTTP/1.1
California that offer a computer sciencedegree [16]. Of those, only 4 are accredited by ABET [1]. This means that 8% of private 4-yearcomputer science degrees in California are accredited by ABET.There are presumably a wide range of reasons that a computer science program would choose toforgo ABET accreditation. A detailed discussion of these reasons is beyond the scope of thispaper. What is of note here is that a substantial fraction of 4-year California universities choosenot to be ABET accredited. Hence for whatever reason(s), non-accreditation is considered aviable option for those universities, either by explicit choice or for some other reason such asinsufficient resources to devote to ABET.Conspicuously missing from the list of ABET
activities on creating, implementing, and improving theactivities. In the future, the author plans to collect data on student opinions of these activitiesand analyze grades from exams/homework/labs to improve the student experience and maximizetheir learning.Bibliography[1] T. Bell, et al., “Computer Science Unplugged: School Students Doing Real Computing Without Computers,”Computing and Information Technology Research and Education, New Zealand (CITRENZ), vol. 13, no. 1, pp. 20-29, 2009.[2] T. Bell, et al., CS Unplugged: Computer Science without a Computer. www.csunplugged.org., 2015.[3] S. Coffman-Wolph, “Innovative Activities to Teach Computer Science Concepts Inside the Classroom and atOutreach Events”, Proceedings of the 123rd Annual ASEE
Learning: Perceptions of EPICS Alumni,” Journal of Engineering Education, 105: 43–69. doi: 10.1002/jee.20107 9. E.J. Coyle, J.V. Krogmeier, R.T. Abler, A. Johnson, S. Marshall and B.E. Gilchrist, 2014. “The Vertically- Integrated Projects (VIP) Program – Leveraging Faculty Research Interests to Transform Undergraduate STEM Education,” Proceedings of the Transforming Institutions: 21st Century Undergraduate STEM Education Conference,10. Gediminas Adomavicius, Alexander Tuzhilin, 2001. "Using Data Mining Methods to Build Customer Profiles", Computer, vol.34, no. 2, pp. 74-82, February, doi:10.1109/2.90117011. Xindong Wu; Xingquan Zhu; Gong-Qing Wu; Wei Ding, 2014. "Data mining with big data," in Knowledge and
curriculum owners within universities decide toadopt any of the recommendations made in this paper, the software industry will benefit for yearsto come.References1. The CHAOS Manifesto, 2013: Think Big, Act Small, 2013, The Standish Report International.2. Al-Ahmad, W., et al., A taxonomy of an IT project failure: Root Causes. International Management Review, 2009. 5(1): p. 93.3. Fabriek, M., et al. Reasons for Success and Failure in Offshore Software Development Projects. in ECIS. 2008.4. Mandal, A. and S. Pal, Identifying the Reasons for Software Project Failure and Some of their Proposed Remedial through BRIDGE Process Models.5. Jagtiani, L.J. and N. Lewis, The Impact of Big Data on the Management of Business Software Technology Projects
SingaporeMillennium Foundation, under the project code: M4061449, and in part by an Instructionaldevelopment grant from the University of California, Santa Barbara. The authors also thank Dr.George Michaels, Executive Director, Instructional Development, University of California,Santa Barbara for his assistance in the development of the website.References:[1] Drupal.org, (2016). Drupal - Open Source CMS | Drupal.org. Available at https://www.drupal.org/[2] W3techs.com, (2016). Usage Statistics and Market Share of Content Management Systems for Websites, January 2016. Available at http://w3techs.com/technologies/overview/content_management/all[3] Patel, S.K.; Rathod, V.R.; Parikh, S., "Joomla, Drupal and WordPress - A statistical
. Using thismethodology students were successful in iterating a working game that was always in apotentially shippable state. Students were able to change their game objectives and refinefeatures over the course of the project, resulting in all expected outcomes being achieved.Bibliography1. Rubin, Kenneth S., Essential Scrum: A Practical Guide to the Most Popular Agile Process, Addison-Wesley Professional; 1st edition (August 5, 2012), ISBN-10: 0137043295.2. Waterfall method. http://en.wikipedia.org/wiki/Waterfall_model3. Baldwin game design document available from http://baldwindesignconsulting.org4. http://cateme.org5. Grimheden, M.E., Mutual learning experiences – Mechatronics capstone course projects based on Scrum, American Society for
experienced faculty.In addition to the two courses in this paper, BoardReach Extended has been deployed in othercourses inside and outside East Carolina University. Data collection is still ongoing and theresults will be reported later.REFERENCES[1] Ala-Mutka, K. M. (2005). A survey of automated assessment approaches for programmingassignments. Computer Science Education, 15(2), 83-102.[2] Douce, C., Livingstone, D., & Orwell, J. (2005). Automatic test-based assessment of programming: Areview. Journal on Educational Resources in Computing (JERIC), 5(3), 4.[3] Edwards, S. H. (2003). Improving student performance by evaluating how well students test their ownprograms. Journal on Educational Resources in Computing (JERIC), 3(3), 1
machines and basic computer organization. In Proceedings of the 16th Annual Joint Conference on Innovation and Technology in Computer Science Education, ITiCSE ’11, pp. 335–335, New York, NY, USA, 2011. ACM.6. Sivilotti, P. A. G. and Pike, S. M. The suitability of kinesthetic learning activities for teaching distributed algorithms. SIGCSE Bull., 39(1):362–366, March 2007. Page 26.1373.8
–246. doi:10.1016/j.jsis.2004.08.0025. Basu, A., & Jarnagin, C. (2008, March 10). How to tap IT’s hidden potential. The Wall Street Journal. Retrieved from http://online.wsj.com/article/SB120467900166211989.html6. Brehob, K. (2001). Usability glossary. Retrieved from http://www.usabilityfirst.com7. Creswell, J. W. (2012). Educational research: Planning, conducting, and evaluating quantitative and qualitative research (4th ed.). Upper Saddle River, NJ: Pearson.8. Iqbal, M., Nieves, M., & Taylor, S. (2007). Service strategy. London, England: Stationery Office Books.9. Irvine, B., & Probst, J. (2007). ITIL: A factor for all purchases. Summit, 10(6), 8-9. Retrieved from http://www.summitconnects.com
process was adjusted to put a stronger emphasis on motivation issues and technicalbackground of candidates. The biggest limitation of the analysis conducted is the small number of observations. Currently, in splitting afew hundred students according to certain aspects, we get buckets of only a few dozen people. At this rate, a fewoutliers in a bucket might create a visible anomaly. We hope to get a statistically significant amount of data bymonitoring students performance and admission metrics over the course of 2-3 years.References[1] T. Stanko, Innopolis University – a new IT resource for Russia, Proceedings of the International Conference on Interactive Collaborative Learning (ICL), Kazan, Russia September 25 – 27, 2013[2] Irina S
Applications, 2 nd edition. CRC Press,2008.24. Slotta, J. D. In defense of Chi’s ontological incompatibility hypothesis. The Journal of theLearning Sciences, 2011, 20, 151–162.25. Sonntag, Richard E.; Borgnakke, C.; Van Wylen, Gordon J. Fundamentals of Thermodynamics, 6 th edition. NewYork: J. Wiley, 200326. Streveler, R. A., Geist, M. R., Ammerman, R.F., Sulzbach, C. S., Miller, R. L., Olds, B. M., & Nelson, M. A.The development of a professional knowledge base: The persistence of substance based schemas in engineeringstudents. Paper presented at the Annual Meeting of the American Educational Research Association, 2006, Chicago,IL.27. Tipler, Paul A.; Mosca, Gene. Physics for Scientists and Engineers: with Modern Physics, 6 th edition.New York
Science with an emphasis in Database Engineering. He is currently employed at Lucid Software Inc.Dr. Afsaneh Minaie, Utah Valley University Afsaneh Minaie is a professor of Computer Engineering at Utah Valley University. Her research interests include gender issues in the academic sciences and engineering elds, Embedded Systems Design, Mobile Computing, Wireless Sensor Networks, and Databases.Dr. Ali Sanati-Mehrizy Dr. Ali Sanati-Mehrizy is a graduate of the Milton S. Hershey Pennsylvania State University College of Medicine. He completed his undergraduate studies in Biology from the University of Utah. In July 2013, he will begin a Pediatrics residency at the UMDNJ-Newark University Hospital. His research interests
] 4. De Pablos, Juan (2010). “Higher Education and the Knowledge Society. Information and Digital Competencies”, Information and Digital Competencies in Higher Education, Revista de Universidad y Sociedad del Conocimiento (RUSC). Vol. 7, No 2. 5. EAEA General Assembly (2003), “Definition and Selection of Competencies: Theoretical and Conceptual Foundations (DeSeCo): Strategy Paper on Key Competencies – An overarching frame of reverence for an assessment and research program “, [online] Available at: Page 24.534.9 http://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&
Science Teaching, 42(5), 36-41.9. Hoyt, J. E., & Winn, B. A. (2004). Understanding retention and college student bodies: Differences between drop-outs, stop-outs, opt-outs, and transfer-outs. NASPA Journal (National Association of Student Personnel Administrators, Inc.), 41(3), 395-417.10. Divjak, B., Ostroski, M., & Hains, V. V. (2010). Sustainable student retention and gender issues in mathematics for ICT study. International Journal of Mathematical Education in Science & Technology, 41(3), 293-310. doi: 10.1080/0020739090339841611. Wasburn, M. H., & Miller, S. G. (2008). Keeping women students in technology: Preliminary evaluation of an intervention. Journal of College Student Retention: Research
spending on protection.” Bernstein Global Wealth Management October. p1-188.6. Finkle, J. (2013) Retrieved from the internet on 12/29/2013 at http://www.reuters.com/article/2013/12/19/us-target-breach-idUSBRE9BH1GX201312197. Kaplan, D. (2013) Retrieved from the internet on 12/24/2013 http://www.scmagazine.com/data-breach-lawsuits-roll-on-as-lawyers-work-to-establish-legal-precedent/article/309439/8. Kerner, S. (2013). “Cyber-crime costs continue to rise: Study”. eWeek. 10/8/2013, p2-2.9. LeClair, J. (2013). Protecting our future: Educating a cybersecurity workforce. Albany, NY. Hudson Whitman/Excelsior College Press.10. Lynch, M. (2009). “TJX settles cyber-breach case.” Women's Wear Daily. 197(131
, February 2003, http://pj.freefaculty.org/ps905/ObjC.pdf5. Altenberg, B., Clarke, A., Mougin, P., Become an Xcoder : Start Programming the Mac Using Objective-C, CocoaLab, 2008, http://www.e-booksdirectory.com/details.php?ebook=38326. Kochan, S. G., Programming in Objective-C, Addison-Wesley, August 2011.7. Cocoa Developers Guide, Apple Developer Publications, December 2010, http://itunes.apple.com/us/book/cocoa-fundamentals- guide/id409921412?mt=118. Deitel, H.M., Deitel, P.J., Java How to program, Prentice Hall, 2003 Page 24.234.12Appendix A: Bluetooth Project Class Definitions and Pairing MethodsIOBluetoothAn
resident physician at Rutgers University - New Jersey Medical School in Newark, NJ. He is a graduate of the Milton S. Hershey Pennsylvania State University College of Medicine. He completed his undergraduate studies in Biology from the University of Utah. His research interests are varied and involve pediatric hematology and oncology as well as higher education curricula, both with universities and medical schools. Page 24.306.1 c American Society for Engineering Education, 2014 Computer Engineering Program at Utah Valley UniversityAbstractThis paper elaborates the detail content