) Page 22.816.5 64-bit PowerPC 32 KB Instr/Data L1 Cache, 512 KB L2 Cache SMP (2 threads) 3.2 GHz (SP: 25.6 GFlops DP: 6.4 GFlops) o 8 SPEs (Synergistic Processing Element) 256 KB Local Store 3.2 GHz (SP: 25.6 GFlops DP: 1.83 GFlops ) 128-bit Vector Registers o EIB (Element Interconnect Bus) Interconnects PPE, SPEs, Memory, I/O Simultaneous Read/Write o MIC (Memory Interface Controller) Interfaces to XDR Memory Theoretical B/W of 25.6 GB/s o 218 GFLOPS of total floating point performance
., Laity, A., Jacob, J. C., and D. S. Katz (2005). Pegasus: a Framework for Mapping Complex Scientific Workflows onto Distributed Systems, Scientific Programming Journal, Vol 13(3), (2005). 2. Ma, J., Kang, J.-H., Shaw, E. and Kim, J. (2011), Workflow-Based Assessment of Student Online Activities with Topic and Dialogue Role Classification , Proceedings of the AI in Education Conference, 2011. 3. Ma, J., Shaw, E. and Kim, J. (2010) Computational Workflows for Assessing Student Learning, The 10th International Conference on Intelligent Tutoring Systems Conference, 2010. 4. Xu, H., Shaw, E. and Kim, J. (in process) Workflow reporting and feedback system for formative assessment of online course
, Wiley. 9. Palm, W.J (2001), Introduction to Matlab 6 for Engineers, McGraw-Hill. 10. Wieder, S.(1992), Introduction to MathCAD for Scientists and Engineers, McGraw-Hill. 11. Bedford, A., and W. Fowler (2008), Engineering Mechanics: Statics, 5th ed., Pearson/Prentice-Hall. 12. Beer, F.P., and E.R.Johnston (2007), Vector Mechanics for Engineers: Statics, 8th ed., McGraw-Hill. 13. Efimba, R.E. (2012), “The Joy of Mechanics I: Statics,” 4th ed., Department of Civil and Environmental Engineering, Howard University, Washington, DC., 250 pp. 14. Efimba, R.E. (2012), “The Joy of Mechanics III: Mechanics of Materials,” 3 rd ed., Department of Civil and Environmental Engineering, Howard University, Washington, DC
, 2000, ISBN-10:1-879102- 81-1.6 MacEachren, Alan M., How Maps Work, The Guilford Press, New York, New York, Paperback Edition, 2004. http://www.guilford.com7 DNR Garmin Application, University of Minnesota, http://www.dnr.state.mn.us/mis/gis/tools/arcview/extensions/DNRGarmin/DNRGarmin.html (last accessed January 12, 2011)8 Goodchild, Michael F., Looking Forward: Five Thoughts on the Future of GIS, Esri ArcWatch e-magazine, February 2011. Page 22.1068.89 Matthew, J., Sarker, S. and Varshney, U.. M-Commerce Services: Promises and Challenges. Promises and Challenges. Communications of AIS 2004, 1-11.
. Although we made a comprehensive comparisonbetween two boards and we used the tower as the primary board, I should emphasize that we areteaching principles. The platform we have is sufficient to teach everything the students need toknow at this point in time...Unless there is a compelling reason to change the platform, we should stick with what we havefor a significant amount of time.References1. L. J. McKenzie, M. S. Trevisan, D. C. Davis, and S.W. Beyerlein, “Capstone design courses and assessment: A national study,” in Proceedings 2004 ASEE Annual Conference and Expo., Salt Lake Page 24.1012.10 City, Utah, USA, 2004, pp. 1-14.2. http
. Sci. Coll., 27(3):31–37, January 2012.[28] Mendeley Ltd. Mendeley: Reference Manager and Academic Social Network. http://www.mendeley.com/, September 2012.[29] Masoud Milani, S. Masoud Sadjadi, Raju Rangaswami, Peter J. Clarke, and Tao Li. Research experiences for undergraduates: autonomic computing research at fiu. In The Fifth Richard Tapia Celebration of Diversity in Computing Conference: Intellect, Initiatives, Insight, and Innovations, TAPIA ’09, pages 93–97, New York, NY, USA, 2009. ACM.[30] Joan Peckham, Fatma Mili, Daniela Stan Raicu, and Ingrid Russell. Reus: undergraduate research experiences and funding. J. Comput. Sci. Coll., 23(5):208–211, May 2008
mini-map in Figure 4. As dis-cussed later, the view was changed to a first-person point of view and enabled the player to shootenemy turrets along the path. The view also contained several visual elements to indicate thestatus (e.g. health, shields, etc.) of each ship in the convoy. Figure 4. MT-18’s first-person view and overhead mini-mapIn trying to satisfy the constraints of both architecture and gaming, students needed to be clever.Architecture students expressed interest in seeing their models not only from a specific view-point (~ 5 to 6 feet above the ground), but were also interested in visualizing the models in theirentirety. All groups used different approaches for this constraint, but were able to integrate these
). CUNY Student Experience Survey. New York City College ofTechnology, CUNY.[2] Barnett, S. & Ceci, S (2002). When and where do we apply what we learn? A taxonomy for far transfer.Psychological Bulletin, 128(4), 612-637.[3] Benander, R., & Lightner, R. (2005). Promoting transfer of learning: Connecting general education courses. TheJournal of General Education, 54 (3), 199-208.[4] Cabo, C., & Lansiquot, R. D. (2013). Development of interdisciplinary problem-solving strategies throughgames and computer simulations. In R. D. Lansiquot (Ed.) Cases on interdisciplinary research trends in science,technology, engineering, and mathematics: Studies on urban classrooms (pp. 268-294). New York: IGI Global.[5] Campbell, J. (1949). The hero with
answer and also fields that keep track of how many timesthe question appeared in tests and how many times it was answered correctly. SLOATrelation has records of tests. Each test has up to 10 questions, as pilot study. For example,q1 indicates which question is picked and q1c filed is true if it is answered correctly. Theoverall design of the relations was based on the hierarchical relationship among the mainentities of the application. In our design a course is allowed to have one or moreobjectives. Associated with each course objective is one or more multiple choicequestion(s). Multiple choice questions have 4 options for possible answers. Anassessment test for a given course consists of a collection of questions, one question foreach
the College of Engineering at the Universityof Illinois at Urbana-Champaign as part of the Strategic Instructional Initiatives Program (SIIP),as well as by the National Science Foundation (NSF) awards DUE- 1347722 andCMMI-1150490.References[1] J. R. Anderson. Learning and memory: An integrated approach. John Wiley and Sons, second edition, 2000.[2] A. de Palma, N. Picard, and P. Waddell. Discrete choice models with capacity constraints: An empirical analysis of the housing market of the greater Paris region. Journal of Urban Economics, 62(2):204–230, 2007. doi: 10.1016/j.jue.2007.02.007.[3] K. A. Lack. Current status of research on online learning in postsecondary education. Ithaka S+R, 2013.[4] H. L. Roediger and A. C. Butler
, Assessment, & Data Adminis- tration in the College of Engineering & Computer Science at the University of Central Florida. She is Co-PI of 2 NSF-funded S-STEM programs and program evaluator for 2 NSF-funded REU programs. Her research interests include factors that impact student persistence, identity formation, and career develop- ment in the STEM fields.Salih Safa Bacanli, University of Central Florida Salih Safa Bacanli is PhD student at Department of Computer Science, University of Central Florida (UCF). He received his MS degree in Computer Science from UCF and BS degree in Computer Engi- neering from Bilkent University, Turkey. His research interests include opportunistic networking routing, wireless
-implemented emulation of the computer system andexecutes the program as a physical machine. The purpose of virtualization is to execute theprogram in different environments from the host machine. Two techniques are developed andavailable, hardware virtualization and abstract virtual machine. Since the hardware virtualizationvirtually creates one or more separate physical space environment(s) isolated from the hostmachine, it is preferred and widely adopted. In this paper, we will focus on and compare thesetwo virtualization approaches.3.1 Hypervisor-based virtual machineHypervisor-based virtual machine is a software and/or hardware implementation to create andrun separate virtual environments different from host machine. The type-1 hypervisor
value,that of the application layer’s Instant Messenger application (used to create LL3P packets). Eachpacket has a unique identifier (2 bytes long), and a 1 byte Time To Live field which must bedecremented as the packet is forwarded through the network. The payload is variable sized and a1’s complement checksum is calculated over the packet using a method similar to IP’s method ofzeroing out the checksum field and placing the resulting checksum in the checksum field.Accordingly, when the TTL field changes the checksum must also change. LL3P Frame Structure Offset 0 1 2 3 4 5 Source LL3P 0x00
that serves all the LOBs(Line Of Businesses) and Channels in the organization, 3) increased sales revenues because ofmore cross sell and up sell Opportunities, 4) lower TCO (Total Cost of Ownership) because oflesser maintenance costs as the existing SOR s will slowly retire, 5) increased customersatisfaction and retention, 6) consolidated data enables rapid sales and marketing turnaroundtimes, 7) fast performing SOA web services resulting in increased productivity, 8) analyze theconsumer pattern analysis through intelligent analytics, 9) ability to monitor the applicationhealth through intelligent and real-time monitoring dashboards, and 10) enhanced applicationmaintenance and scalable, reliable catering to future needs [10]. The other
] Danielewicz, J. (n.d.). SIX SIGMA AND MDM. Data Strategy Journal. Retrieved from http://www.datastrategyjournal.com/index.php?option=com_content&task=view &id=64&Itemid=1[3] Dreibelbis, A., Hechler, E., Milman, I., Oberhofer, M. (2008). Enterprise Master Data Management: An SOA Approach to Managing Core Information. IBM Press Page 26.759.9 9[4] Godinez, M. ; Hechler, E., Koenig, K., Lockwood, S., Oberhofer, M., Schroeck, M. (2010). The Art of Enterprise Information Architecture: A Systems-Based Approach for
://www.networkworld.com/article/2287582/lan-wan/frame-relay-vs--atm.html2. U. Black, MPLS and Label Switching etworks, Upper Saddle River, NJ, Prentice Hall PTR, 2002.3. L.D. Ghein, MPLS Fundamentals, Indianapolis, IN, Cisco Press, 2007.4. E. Osborne and A. Simha, Traffic Engineering with MPLS, Indianapolis, IN, Cisco Press, 2003.5. S. Bradner and J. McQuaid. (1999, Mar.). Benchmarking Methodology for etwork Interconnect Devices (IETF RFC 2544) [Online]. Available: http://www.ietf.org/rfc/rfc2544.txt6. A. Akhter, R. Asati, and C. Pignataro. (2009, Nov.) MPLS Forwarding Benchmarking Methodology for IP Page 26.1164.15 Flows (IETF RFC
the interactivity of the software and the ability of the learner to impacthis/her environment, which should facilitate different modes of learning. Future work willinclude testing the iHASOB prototype in an educational environment to test the validity of theconcept and how it compares to traditional eBook.AcknowledgementThis work was partially supported by NSF grant DUE 1022934 and Office of Research and Graduate Studies at Texas A&M University-‐Kingsville. References1. S. Canfield, Sheikh G. and M. Abdelrahman, “Enhancing the Programming Experience for First-Year Engineering Students through Hands-On Integrated Computer Experiences,” Journal of STEM Education: Innovations and Research, Volume 13 • Issue 4 • July
software engineering class (CS 222) has been selected as anatural candidate to attain a large numbers of the ABET outcomes. A large number ofuniversities utilize the capstone series for the data collection process for ABET accreditation. Ascapstone class is the last class students take before their graduation, we believe that it might belittle late if a student does not demonstrate expected competencies in certain skill(s). Hence werecommend utilization of an earlier class in the program to introduce students to ABETprofessional skills (along with periodic review of the corresponding student outcomes) and latercontinue the process to the capstone series. To identify courses which will be more suitablecandidate for this purpose, we performed a
.[14] Raspberry Pi Diagram. (n.d.). [Online]. Available:https://www.google.com/url?sa=i&rct=j&q=&esrc=s&source=images&cd=&cad=rja&uact=8&ved=0CAcQjRxqFQoTCO2xoan7ssgCFUGNDQod140FYQ&url=https%3A%2F%2Fwww.raspberrypi.org%2Flearning%2Frobot-antenna%2Fworksheet%2F&psig=AFQjCNG9MWf-2bzcSvvTmdadxa7t1KjZOg&ust=1444396721593289. Accessed: September 22, 2015.[15] Raspberry Pi Foundation. (n.d.). About Us. [Online]. Available:https://www.raspberrypi.org/about/. Accessed September 20, 2015.[16] Raspberry Pi Foundation. (n.d.). Raspberry Pi 2 Model B. [Online]. Available:https://www.raspberrypi.org/products/raspberry-pi-2-model-b/. Accessed September 20, 2015.[17] Raspberry Pi Foundation (n.d.). Raspi-Config
]. Available: http://shop.oreilly.com/product/0636920022466.do. [Accessed: 09-Aug-2013]13. N. Burlingame, The Little Book of DATA SCIENCE, 2012 Edition. New Street Communications, LLC, 2012.14. N. Burlingame and L. Nielsen, A simple introduction to data science. Wickford, RI: New Street Communications, 2012.15. J. Lin, Data-intensive text processing with MapReduce. [San Rafael, Calif.]: Morgan & Claypool Publishers, 2010 [Online]. Available: http://www.morganclaypool.com/doi/abs/10.2200/S00274ED1V01Y201006HLT007. [Accessed: 09-Aug- 2013]16. D. Miner and A. Shook, “MapReduce design patterns,” 2012. .17. S. Owen, Mahout in action. Shelter Island, N.Y.: Manning Publications Co., 2012.18. E. Hewitt, Cassandra
-efficacy, gender and experience with computers. Journal of Educational Computing Research, 26(2):133–153, 2002. 8 Ronald S Cheung, Joseph P Cohen, Henry Z Lo, and Fabio Elia. Challenge based learning in cybersecurity education. In Proceedings of the 2011 International Conference on Security & Management, volume 1. 9 Stephen Cooper, Christine Nickell, Victor Piotrowski, Brenda Oldfield, Ali Abdallah, Matt Bishop, Bill Caelli, Melissa Dark, E. K. Hawthorne, Lance Hoffman, Lance C. P´erez, Charles Pfleeger, Richard Raines, Corey Schou, and Joel Brynielsson. An exploration of the current state of information assurance education. SIGCSE Bull., 41(4):109–125, January 2010.10 Brian Dorn and Allison Elliott Tew. Becoming experts: Measuring
recomendations for the future," Josurnal of Information Science, vol. 18, pp. 217-224, 1992.5. T. R. Guskey, "Professional development and teacher change," Teachers and Teaching: theory and practice, vol. 8, pp. 381-391, 2002.6. M. Palacios, Por una reforma de la educación técnica y tecnológica para modernizar a Colombia. 19907. EAFIT. (2011, August 20). Alianza Futuro Digital Medellin. Available: http://www.futurodigital.org/8. S. Kemmis and R. McTaggart, The action research reader: Deakin university press, 1988.9. W. Hunter, "Action research as a framework for science education research," in Theoretical frameworks for research in chemistry/science education, G. Bodner and M. K. Orgill, Eds., ed: Prentice Hall, 2007, pp
Paper ID #6904Application of Wireless Sensor Networks in Health Care SystemDr. Afsaneh Minaie, Utah Valley University Afsaneh Minaie is a professor of Computer Engineering at Utah Valley University. Her research interests include gender issues in the academic sciences and engineering elds, Embedded Systems Design, Mobile Computing, Wireless Sensor Networks, and Databases.Dr. Ali Sanati-Mehrizy Dr. Ali Sanati-Mehrizy is a graduate of the Milton S. Hershey Pennsylvania State University College of Medicine. He completed his undergraduate studies in Biology from the University of Utah. In July 2013, he will begin a
://www.e-booksdirectory.com/details.php?ebook=38326. Kochan, S. G., Programming in Objective-C, Addison-Wesley, August 2011.7. Green, D., Android vs iPhone Development: A Comparison.html, July 2009, http://greensopinion.blogspot.com/2009/07/android-versus-iphone-development.html8. Cocoa Developers Guide, Apple Developer Publications, December 2010, http://itunes.apple.com/us/book/cocoa-fundamentals-guide/id409921412?mt=119. Deitel, H.M., Deitel, P.J., Java How to program, Prentice Hall, 200310. Android Developer Resources, Tutorials, http://developer.android.com/index.html.11. iOS App Programming Guide, iOS Developer Library, http://developer.apple.com/devcenter/ios/gettingstarted/docs/objectivecprimer.action
;SrchMode=2&sid=1&Fmt=3&VInst=PROD&VType=PQD&RQT=309&VNa me=PQD&TS=1258783964&clientId=13118 [3] Godinez, M. ; Hechler, E., Koenig, K., Lockwood, S., Oberhofer, M., Schroeck, M. (2010). The Art of Enterprise Information Architecture: A Systems-Based Approach for Unlocking Business Insight. Indianapolis, Indiana: IBM Press. Retrieved From http://pqtechbus.safaribooksonline.com/book/databases/business- intelligence/9780137054947/enterprise-information-architecture-operational- model/ch06lev1sec1#searchlist[4] Longman, C. (2008). Why Master Data Management is Such a Challenge. DM Review, 18(11), 18-20[5] Loshin, D. (2008). Master Data Management. Morgan Kaufmann, CA: San
Mining,2008, pp. 192– 196.[2] E. F. Gehringer, L. M. Ehresman, and W. P. Conger, S.G., “Reusable learning objects throughpeer review: The Expertiza approach,” in Innovate: Journal of On- line Education, 2007.[3] E. F. Gehringer, “Expertiza: information management for collaborative learning,” in InMonitoring and As- sessment in Online Collaborative Environments: Emergent ComputationalTechnologies for E-Learning Support. IGI Global Press, 2009.[4] F. P. W. Landauer, T. K. and D. Laham. An introduction to latent semantic analysis. InDiscourse Processes. Special Issue on Quantitative Approaches to Semantic KnowledgeRepresentations, 259–284. Volume 25. 1998.[5] T. A. S. Pardo, L. H. M. Rino and Maria das Graças Volpe Nunes, “Extractive
contrast to the peers that did not become involved.1 http://news.stanford.edu/news/2011/august/online-computer-science-081611.html2 http://ocw.mit.edu/index.htm3 Kim, J., Kim, T., Li, J., Shaw, E., and Wyner, S. (2010). Discerning Affect in Student Discussions. Annual Meeting of the Cognitive Science Society, 2010.4 Cole, M., and Engeström, Y. (1993). A cultural-historical approach to distributed cognition. In G. Salomon (Ed.), Distributed cognitions: Psychological and educational considerations. New York: Cambridge University Press.4 Engeström, Y. (1987). Learning by Expanding: An Activity Theoretical Approach to Developmental Research. Helsinki: Orienta-Konsultit Oy.4 Lave, J. (1996) Teaching as Learning, in
, NY). He worked as a researcher for NASA Langley Base in Hampton, VA, for 2 years. His research activities include embedded systems, software development for embed- ded systems with real time simulation, real time gamming simulation programming, and web application programming.Farrukh Zia, NYC College of Technology / CUNYDr. Andy Zhang, New York City College of Technology Professor Andy S. Zhang earned his master’s in mechanical engineering from the City College of New York in 1987 and his Ph.D. in mechanical engineering from the Graduate Center of the City University of New York in 1995. Prior joining the Mechanical Engineering Technology department at City Tech in 2000, he served as an engineering instructor for
success, teaching students the basics of technology and having a deeper understanding ofthe social impact brought on by the latest technologies. Students also practiced their writing andpresentation skills in these two courses.References [1] Brin, S. & Page, L. (1998). The Anatomy of a Large-Scale Hypertextual Web Search Engine. In Proceedings of the 7th IWWW Conference, Brisbane, Australia, 14-18 April 1998. [2] Bucknell University. (2010). Foundation Seminar. Accessed December 20, 2010 from http://www.eg.bucknell.edu/~found-cs/2009-fall/index.html [3] Bush, V. (July 1945). As We May Think. The Atlantic Monthly. July 1945. [4] Halavais, A. (2009). Search Engine Society Malden, MA: Polity Press. [5] Jansen, B.J. &
. 44-49.3. Bishop, J.L. and M.A. Verleger. The Flipped Classroom: A Survey of the Research. in 2013 ASEE Annual Page 24.181.20 Conference. 2013. Atlanta, GA: American Society for Engineering Education.4. Zappe, S., et al. "Flipping" the classroom to explore active learning in a large undergraduate course. in American Society for Engineering Education Annual Conference and Exposition. 2009. Austin, TX.5. Gannod, G.C., J.E. Burge, and M.T. Helmick, Using the inverted classroom to teach software engineering, in Proceedings of the 30th international conference on Software engineering2008, ACM