location-based data acquired on the university campus. Many objects located on campus (artwork,benches, emergency telephones, recycling containers, building entry doors, etc.) are not fullydocumented on existing campus maps. No printed map can include everything, but in many casesthese are needed for visitors or even students in an emergency situation. Directions for Mapping Project 1 Goal: Use the GPS to gather data points and import into a map. Summary: Using a GPS device (e.g. the Garmin eTrex Legends), capture 20 thematic waypoints on campus and create a map using ArcGIS with these points imported and displayed on a basemap of your own choosing. Use available basemaps from the ESRI resource web pages. Keep a
much insight students gained from their writing. We alsolearned that certain aspects of the experience (such as double-blind review) were moredifficult, and other aspects (such as sequencing between chapters) were easier thanexpected. These experiences are guiding further development of the software, which isavailable to any instructor who wants to use it to manage development of a wiki textbook.1. IntroductionIn the middle of the 19th century, a revolution swept through the American textbookindustry, as understanding replaced rote memorization as the goal of education [1]. Nolonger were textbooks written in the catechetical question-answer style, but they nowincorporated word problems that students were challenged to solve. We may be on the
HPC education.1. IntroductionThe emergence of virtualization technology over the past five years is sparking a new revolutionin computing. This revolution has led to greater efficiencies in the use of computer servers andis one of the driving technologies behind the development of cloud computing. A similar trend adecade ago exploited the availability of low cost and high performance commodity computerhardware and open source software to power the development of commodity component basedhigh performance computing systems. Today, these systems dominate the list of the 500 mostpowerful supercomputers in the world 1.The recent availability of virtualization technologies motivates the exploration of severalquestions about the applicability of
the entire production process. At the center of this process would be therequirements for a quality peer review publications.The group started by setting up a process that tackled the review process for the book and thenwriting some custom software to implement the process (see Figure 1). In addition, the group Page 22.476.2adopted some practices from the corporate training arena. Figure 1. ProcessToward the goals of creating the most effective instructional contents, the group decided toinstitute a publishing process similar to that founds at industrial training facilities. In thisparadigm, the authors
this program is to show how general Java workhorsediscrete Fourier Transform and other control theory methods 7 can be introduced at an earlieststage to engineering technology students with the tools and concepts they will further reinforcein future DSP courses.public class Fourier { public static double[] discreteFT(double[]fdata, int N, boolean fwd){ double X[] = new double[2*N]; double omega; int k, ki, kr, n; if (fwd){ omega = 2.0*Math.PI/N; } else { omega = -2.0*Math.PI/N; } for(k=0; k>= 1; } j += k; } if (fwd) fscale = 1.0; else fscale = -1.0
cycle, execution cycle, control unit, arithmetic logic unit, read/write memory, andinput/output operations. Most of the embedded applications we are familiar with use a MIPSprocessor. Therefore, as a teaching tool in a computer architecture course, MIPS processor andVHDL could be used for teaching different topics.1- IntroductionThere are now two industry standard for hardware description languages: VHDL and Verilog.The complexity of ASIC and FPGA designs has caused an increase in the number of specialistdesign consultants with specific tools and an increase in libraries of macro and mega cellswritten in either VHDL or Verilog. VHDL became IEEE standard 1076 in 1987. It was updatedin 1993 and is known today as "IEEE standard 1076 1993". VHDL is
derivative appears on the left side of the equation. If an initial conditionof the form y(x0) = y0 is also specified, then the only solution curve of of interest is y’ = f(x,y)the one that passes through the intial point (x0,y0). For the first-order initial-value problemthe popular graphical method also known as Euler method can be used that satisfies theformula given below yn+1 = yn + hf(xn ,yn )which can also be written as yn+1 = yn + h(y’n ), where the approximate solution at xn isdesignated by y(xn), or simply yn. The true solution at xn will be denoted by either Y(x n) orYn. Note that once yn is known, equation y’ = f(x,y) can be used to obtain yn’ as
lessons learned will be explained in this paperin full detail.1. IntroductionIn most undergraduate engineering programs, students are required to complete a capstone designproject by building and testing a prototype1. Depending on the nature and complexity of the designspecifications, the final product may be a composite of analog and digital, hardware and software,discrete components and off-the-shelf parts.For a majority of the projects in disciplines such as electrical engineering and mechanicalengineering, the primary processing component of these projects is a microcontroller unit (MCU).It used to be that the number of different MCUs and development tools (DT) available to peoplewas pretty limited, but times have changed. Digikey2 lists over
Page 24.1065.1 c American Society for Engineering Education, 2014 Saliency-Based CBIR System for Exploring Lunar Surface Imagery Kien A. Hua, Ph.D.1 Gholam Ali Shaykhian, Ph.D.2 Robert J Beil2 Kutalmis Akpinar1 Kyle Martin11 Department of Computer Science, University of Central Florida2 National Aeronautics and Space Administration (NASA)AbstractRecent NASA missions like the Lunar Reconnaissance Orbiter (LRO) have produced vastarchives of surface imagery that must be analyzed to
Paper ID #8420Security Incident Tracking in Virtualized Linux EnvironmentDr. Manghui Tu, Purdue University Calumet Assistant Professor, Computer Information Technology, Purdue University Calumet, USA. He received his Ph.D. degree of computer science from the University of Texas at Dallas in December 2006. His research interests include distributed computing, information security, and computer forensics.Mr. Shiming Xue, Purdue University Calumet SHIMING XUE Address: 6943 Wicker Ave E-mail: xues@purduecal.edu Hammond, IN, U.S 46323 Cell: +1 (765) 404-9776 EDUCATION Purdue University Calumet, Hammond, IN Jul 2014
represents time and ei represents the event taking place at time ti.ei takes place before ei+1 for 1≤ i ≤ n-1. This model can be used in data mining, calledsequence data mining, to predict certain event that may take place at a specific time.Sequence data mining has a wide range of applications. This data mining technique canbe used for prediction of adverse events and recommend proper actions to be taken asneeded. In aviation safety, the future of a flight can be predicted as a sequence and properaction can be recommended to avoid dangerous situations that a flight may get intootherwise. In health care system, the future of a bacterial infection can be predicted andproper medicine can be prescribed for different situations to bring the patient’s
-semester projects. Third, HGDshould provide an environment where student managers can manage their peers and find ways toresolve unforeseen problems. Fourth, we hope that innovative methods used in HGD might attractmore students interested in computer science, art, and entrepreneurism to Michigan Tech.A significant body of research suggests that integrating gaming programming and project-basedlearning into computer science curricula can capture student interest in computer science. For asummary of institutions which have attempted to integrate these ideas into curricula, see.1 Forexample, some2 have found that teams of students working collaboratively on game projects canpositively impact students’ attitudes about computer science, programming
visual tools and environments. Most end-userdevelopment is for visual environments, from graphical user interfaces (GUIs) to web pages. Thetools of choice have become highly visual integrated development environments (IDE). Visualmodeling languages such as Unified Modeling Language (UML) are a major element of programunderstanding and design. All of these tools and methods are problematic for a blind student.This paper describes the challenges we faced as both the instructor and student as we adaptedtools, material, and assignments in an object-oriented programming course.1 IntroductionIn the fall of 2013, Jordyn, a co-author of this paper, enrolled in an intermediate-level course inobject-oriented programming and modern development
the effect ofrunning their own programs as part of a problem solving challenge. Participants can thus observethe duration of underlying system calls and the actual scheduling performed by the operatingsystem which is otherwise hidden. Experiments are proposed to compare the impact of designchoices and to lead to improved awareness of performance implications. We describe five problemsolving activities that we developed and expose the purpose of each tool used. In the context of thefirst semester of deployment, we evaluated the activities using a qualitative method. We conductedonline surveys and a focus group, and observed a high learning satisfaction level for students. Thisvalidates the proposed approach with a high level of confidence.1
popular “agile” models for which it isn’t obvious how or where best to attemptsolution of the compliance problem. The problem is important regardless of particularsoftware development model context. It is important to software developers becauselengthy software development times, large software development costs, poor softwarequality and high liability risks are very likely if it isn’t well solved. It is important to theend users because this kind of software if properly implemented can greatly reducecompliance and compliance enforcement costs.Compliance software development problem definitionTable 1 below is evidence of the considerable current interest in “compliance” generally.The Google data reveals little about the specific reasons for that
with the earlier studies and recommends strategies for using feedback mechanism toimprove students’ learning in designing and simulation-based IT training. I. IntroductionThe Internet, with its distributive architecture, has provided the power to combine a series ofdiscrete, unlinked, and unmeasured activities into an enterprise-wide process of continuouslearning that directly links business goals and individual outcomes.1 Our economic, social, andtechnological forces today are pushing all of us to become more productive in every walk of life,and learning is no exception. One of the learning tools that have become more prevalent in thefield of instructional technology is simulation. The focus of this paper is to understand
gateway courses with low passing grades, which may resultin student attrition and transfers out of engineering and computer science degrees. Barriers tosuccess include a good understanding of programming concepts and the ability to apply thoseconcepts to write viable computer programs.In this paper, we analyze the determinants of the transition from concepts to skills in computerprogramming courses using factor and cluster analysis. The purpose of this study is to answer thefollowing questions related to computer programming teaching and learning: 1) Which are thecorrelations and interdependencies in student understanding of different computer programmingconcepts?; 2) Which are the cognitive challenges that students find when learning
abstractobjects (like the objects found in a graphic user interface window, such as buttons, textboxes, andlabels) that they will manipulate in subsequent and more advanced programming courses.The LC common assignment (described further in the section entitled “The CommonAssignment: A Game Design Document” below) is a crucial component enabling students toachieve and reinforce the learning outcomes for this course. As part of that assignment, studentsimplement the background story for a video game developed in the EG1 class as a computerprogram in Alice. The assignment is organized around several milestones, including: (1)preparation of a flowchart of the story; (2) creating the setting of the video game with Aliceobjects; (3) creating the characters for
Page 24.1339.4code of these utilities is readily available and can be customized as per the user needs andrequirements.Figure 1: Sample Java program to read from a HBase table.To perform data reads from the repository, appropriate and easy to use Java APIs areprovided for programmatic access. Figure 1 shows a sample program to read data fromHBase table and store it in an output file. It demonstrates the flexibility of performing readson a table and writing the results in user defined formats. Also, this helps the user incustomizing the data reads from the table and improves the query times. This inherently givesmore control over the data to the user.Also, HBase supports the MapReduce processing framework. Hence, queries can be doneusing mapper
analysis wasemployed and generated five factors: community influence, satisfaction, service quality,learnability and technical quality. Repeated measures ANOVA showed communityinfluence as the highest rated by participants, followed by satisfaction, service quality,learnability and technical quality. The findings are discussed providing evidence for theusefulness of implementing Moodle as a free open source course management system forboth teaching and learning.IntroductionMoodle, the most popular free open source course management system (CMS), wasdeveloped from a social constructivist perspective by Martin Dougmias in Australia 1.This free application provides instructors with useful features such as the ability to embedresources, activities
discuss artificial intelligence through computer science usingheuristics. Additionally, the students debate the ethics associated with artificial intelligence andwhen legal rights should apply to artificial beings.Teachers attend a week-long, immersive professional development workshop for Cyber Sciencethe summer prior to teaching the course6. Following the professional development workshopteachers gain access to all curriculum materials including lesson plans, master notes, andsupplemental documents which are found on NICERC’s website. Communication is maintainedthroughout the school year via the website allowing for any questions, concerns, or issues ateacher may experience when teaching the material.Narrative #1 – High School Teachers
this paper, we illustrate how several high quality open source tools can be used to overcome some of these challenges. We identify various tasks that comprise the research workflow pipeline and discuss solutions for a subset of the tasks.1 IntroductionThe number of open access and online scholarly journals featuring disciplinary research hasincreased tremendously in recent years. Added to this is an increasing number of annual researchconferences which range in scope from regional to international. For example, there are literallyhundreds of international conferences being held every year in computer science discipline.Keeping track of advances even in a specialized area of an academic discipline is a challengingtask for
worse results in simulations.Figure 1: Robots disperse and search pre-agreed sectors. Since the environment is unknown, sectors aredetermined by using a semicircle to represent the environment. The arc of a semicircle is always 180°. If thereare N robots, then sectors can be divided and robot will disperse 180°/N apart.Sector Search with Rendezvous AlgorithmIn Sector Search with Rendezvous, robots explore pre-agreed areas or sectors and periodicallyrendezvous to share information about what was found. Each robot performs frontier-basedexploration in their sectors. Frontier-based exploration18 involves robots recursively exploring anunknown environment while building a map represented by an occupancy grid19. Robots use adistance sensor to detect
specific to CPS aspects of the system. Theuse of CPS in medical systems to collect, exchange, store and control electronic health data relyheavily on existing computer and communication technologies. These technologies expose themedical systems to similar threats that are familiar to conventional computer systems. Some ofthese threats, as mentioned by Venkatasubramanian and Gupta 9 include: Page 23.1057.7 1. Unauthorized access to health data 2. Deliberate alteration of health data, leading to incorrect diagnosis, treatment and ultimately fatality. 3. Deliberate generation of false alarms or suppression or real alarms raised by the
they have been unintentionally excluding girls.Evaluation of this session shows that 75% of the survey respondents strongly agreed that theinformation provided was useful (N=204) and over 60% of the 49 respondents to the summer2011 follow-up survey indicated that they had used the information during the prior school year.CS1 redesignThere have been several successful attempts in recent years to modify CS1 pedagogy andpractices to make the curriculum interesting to diverse groups of people.1, 19, 12 We alwaysinclude a session with a CS1 instructor whose practices are particularly encouraging to womenand minorities. The CS1X effort developed at University of Virginia has been of particularinterest to high school computer science teachers because
committee and fine tuned based on our own experience7. 1. Introduction. Basic concepts, definitions and terminology of data mining should be covered here. Motivate the field with real-world applications of where data mining has been used. We encourage you to discuss current uses of data mining by pulling examples from various news repositories. Discuss some of the implications of data mining, such as privacy and ownership. Using the examples from the news and current events, discuss the different kinds of data repositories on which data mining can be performed. Encourage them to think about the different kinds of patterns and knowledge that can be mined. Introduce the idea of what it might mean
1451 standards and discusshow to create WSNs and intelligent interactive devices, and interface with smart sensors andtransducers. Moreover, the WirelessHART(Highway Addressable Remote Transducer), IEEE1451, ZigBee / 802.15.4, and 6LoWPAN standards will be explained. Networking actuators andsmart sensors and real-world technical challenges will also be highlighted.Advances in computing and instrumentation have sparked the need of engineering technologygraduates who can update and improve manufacturing facilities and product design. This paper isan attempt to expose engineering technology students earlier to WSNs and other emergingtechnologies in lieu of taking WSN track in their technology curriculum.1. IntroductionThe field of wireless
studentlearning are documented in the Institutional Assessment Plan of Student Learning (IAPSL).Under the College’s assessment framework, the School of Business and Technology develop anassessment plan that incorporates a systematic process to measure the achievement of fourinterrelated categories of student learning outcomes – program educational objectives (PEOs),and program (student) outcomes (PO/SOs). Page 23.1299.3Following Huba & Freed’s1 process for assessment of student learning, SBT adopts thefollowing eight steps in developing the assessment plans for the intended outcomes: 1. Develop articulated statements of intended goals/outcomes
analyze data for labreports, to learn linear algebra, to solve problems in mechanics, problems involving differentialequations, and writing a program to control a robot (embedded programming).In this paper based on the data collected from three programming courses (CS10, CS12, andCS20), we evaluate and recommend a programming language for the first course ofprogramming to our undergraduate engineering students. Python, C, and assembly languages areconsidered in this analysis. We also emphasis the importance of Malab for the senior engineeringcourses.1-InroductionPython is a high-level object-oriented programming language. It is designed to be easy toprogram. Guido van Rossum4,5,6 started the design of Python in 1980. Over the years, Python
calculating the lo-cation and orientation of an object. An algorithm for recognitionof an individual identity based on a digitally represented image ofthe scanned retina is presented. The technology is based upon thefact that no two retinal patterns are alike. In this paper, the nine parameters of an ellipsoidal shape fit-ted into a retinal image such as coordinates of the center of theellipsoid, the length of major, minor, intermediate axes, and thedirection of three axes will be calculated. For each individual, theseparameters are unique. Key Words: Ellipsoid, image processing, pattern recognition,parallel algorithm, retina, three-dimensional moments . 1