Asee peer logo
Displaying results 151 - 180 of 187 in total
Conference Session
Topics in Computing and Information Technologies I
Collection
2015 ASEE Annual Conference & Exposition
Authors
Jeffrey Erin Cole, Acute Systems, LLC; Walter E Thain, Southern Polytechnic College of Engr and Engr Tech; Thomas Fallon, Southern Polytechnic College of Engr and Engr Tech
Tagged Divisions
Computing & Information Technology
equipment.This paper discusses a small scale lab network used to investigate the key capabilities of MPLS.This same lab network can also be used to instruct fundamental computer and datacommunication concepts to students, while maintaining low cost, ease of configuration, anddesign flexibility. The network design and concepts illustrated are taken from a master’s thesisresearch project at Southern Polytechnic State University (now part of Kennesaw StateUniversity) that investigated the performance of MPLS networks.The telecommunication lab at Southern Polytechnic State University is comprised primarily ofseveral Cisco-based routers (2600, 2800, and 2900 series) and switches, a reconfigurable systemof cables and patch panels, and various support
Conference Session
Emerging Computing and Information Technologies II
Collection
2015 ASEE Annual Conference & Exposition
Authors
James Lohse, Holladay Labs; Reza Sanati-Mehrizy, Utah Valley University; Afsaneh Minaie, Utah Valley University
Tagged Divisions
Computing & Information Technology
-frequency terms. It was only the keywords and alphabetical strings thatwere used with a naïve-Bayes classifier from the Bayesian Knowledge Discovery project.3 The C4.5algorithm was also used4 and 20,816 cases were analyzed.A similar approach using updated tools could be effective when looking at the interaction betweenemployees in a support environment. There are two sources of text to be analyzed. First, there are chatsessions between employees. Second, when a second-level employee takes a call from a first-level, orsimply provides an assist, there are sets of notes that can be analyzed. The first-level employee shouldbe taking complete notes about the nature of the case and what troubleshooting did not resolve theproblem. Then the second-level
Conference Session
Information and Network Security
Collection
2014 ASEE Annual Conference & Exposition
Authors
Richard Scott Bell, Kansas State University; Eugene Y. Vasserman, Kansas State University; Eleanor C. Sayre, Kansas State University
Tagged Divisions
Computing & Information Technology
own pedagogicalmethods.There have been numerous research projects investigating ways to measure and improve studentoutcomes within introductory computer programming courses 7,10,16,19 . Unfortunately, theapproaches taken do not readily apply to the cybersecurity classroom. First, the content of thesecourses has remained fairly consistent from year to year and even from university to university.Second, given the number of students enrolled in these courses (the introductory programmingcourse in our program had over 110 students enrolled this past semester), researchers are able toconduct quantitative surveys and achieve statistically significant results over the course of a singlesemester and compare results from courses at various schools
Conference Session
Emerging Computing and Information Technologies
Collection
2013 ASEE Annual Conference & Exposition
Authors
Shaundra Bryant Daily, Clemson University; Juan E Gilbert, Clemson University; Wanda Eugene, University of North Carolina Charlotte; Christina Gardner-McCune, Clemson University; Kyla Alanna McMullen, Clemson University; Phillip Wendell Hall Jr, Clemson University ; Sekou L Remy, Division of Human Centered Computing - School of Computing, Clemson University; Damon Lamar Woodard, Clemson University; Tania Roy, Clemson University
Tagged Divisions
Computing & Information Technology
postdoctoral fellow. His postdoctoral research focused on the development of advanced iris recognition systems us- ing high resolution sensors. His current research projects include the development of periocular-based biometric systems, ear shape based biometrics, and soft biometric classification.Tania Roy, Clemson University Tania Roy is a PhD student in the Human Centered Computing division of Clemson University. She re- ceived her B.Tech from West Bengal University of Technology, India in Computer Science & Engineering . Her research interests are in affective computing. Page 23.144.2
Conference Session
Information and Network Security
Collection
2014 ASEE Annual Conference & Exposition
Authors
Manghui Tu, Purdue University Calumet; Shiming Xue, Purdue University Calumet
Tagged Divisions
Computing & Information Technology
(expected) Bachelor of Science in Computer Info Technology Department of Computer Info Tech Graphic Courses: Integrative Programming, Networking Technologies, Discrete Mathematics for IT, Applied Database Tech, Data Communication and Network- ing. Projects and Activities: Created a customer/employee management system with windows server 2008 R2 Created the database and few Web Pages that help to update, insert, and delete data for a customer and employees. Created a Minesweeper with the C# by Visual studio 2010 Created a minesweeper game, which can set mines’ number. Created a high school grade management system with the Basic C by Visual Studio 2010 Created a database for a high school which could help the school
Conference Session
Emerging Computing and Information Technologies I
Collection
2016 ASEE Annual Conference & Exposition
Authors
Justin L. Hess, Purdue University, West Lafayette; Lorraine G. Kisselburgh, Purdue University; Carla B. Zoltowski, Purdue University, West Lafayette; Andrew O. Brightman, Purdue University, West Lafayette
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
over twenty years experience designing and supporting learning environments in academic settings. Her research has been funded by the National Science Foundation (an Ethics in Science and Engineering project to develop frameworks for developing ethical reasoning in engineers, and a Cyberlearning project to develop collaborative design environments for engineers), and by corporate foundations, the Department of Homeland Security, the College of En- gineering, and the Purdue Research Foundation. She has been recognized as the inaugural Butler Faculty Scholar, a Faculty Fellow in the CERIAS institute, a Service Learning Faculty Fellow, Diversity Faculty Fellow, and recipient of the Violet Haas Award (for efforts on
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2017 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Jacob Haven Gosling; Reza Sanati-Mehrizy, Utah Valley University
Tagged Divisions
Computing & Information Technology
Systems Security Project:This project has been funded in part by National Science Foundation to improve embeddedsystems security education for undergraduate students in the computing and engineeringprograms. They have developed the following eight online modules on embedded systemssecurity17: 1. General Introduction to Computer Security 2. Introduction to Cryptography 3. Embedded Systems Security 4. FPGA Security 5. RFID Security 6. SCADA Security 7. JAVA Security 8. Threat ModelingThese eight modules were offered in the following two software engineering courses: • Embedded Systems Programming • Software Project in Computer NetworksOffering of these modules in the
Conference Session
Computing & Information Technology Division Technical Session
Collection
2016 ASEE Annual Conference & Exposition
Authors
Candido Cabo, New York City College of Technology; Reneta Davina Lansiquot, New York City College of Technology
Tagged Divisions
Computing & Information Technology
intellectually may prevent them from creating an effective solution.The goal of our project was to create narratives (case-studies) that students could understand,relate to, and be engaged with, so they can be used as the contexts to learn problem-solving andprocedural programming skills in the flowcharting component of the PS course. Since studentsknow what is relevant to them, we selected a group of five students majoring in ComputerSystems to help us develop those narratives.The use of student-developed narratives affected performance in different flowcharting structures(sequence, selection, repetition) differently. Overall, the data suggests that the use of case studieswas beneficial for increasing performance in flowcharting assessments using
Conference Session
Emerging Information Technologies
Collection
2011 ASEE Annual Conference & Exposition
Authors
Richard G. Helps, Brigham Young University
Tagged Divisions
Computing & Information Technology
Names “Constructivist” (T, G), “Studio teaching,” (D, G) “ActivePhilosophy for instructional learning” (G, J, S), “Coaching” (T) approachesStrategies Concept, Problem, “Basic IT concepts, principles” (S), “Fundamental [idea]” Interaction, Exercise, (A, D, G, J), “Assignment” (A, D, T, G, J, L, S), Lab (A, Instructional period, D, T, G, J, L, S), “Project” (A, T, G, J, L), “what is a challenge, Unit, Lesson better way to present this than I've done in the past?” (A), “this is one we will build together in class
Conference Session
Innovations in Computing Education
Collection
2011 ASEE Annual Conference & Exposition
Authors
Thomas J. Hacker, Purdue University, West Lafayette
Tagged Divisions
Computing & Information Technology
environment, withinteraction controller through an embedded VNC window. The NEES project also uses IaaS inthe form of VMware virtual machines that provide a secure development sandbox for NEESsoftware engineering and users.In the context of developing virtual clusters, Infrastructure-as-a-Service is the most relevant typeof cloud computing. Generally, IaaS systems provide a higher level of management above theindividual system level for collections of physical systems and virtual machines running in afinite set of physical computer nodes. There are several types of IaaS cloud computing packagesavailable today that can be used to develop a virtual high performance computing cluster. As isthe case in virtualization technology, there are commercial and
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2017 ASEE Annual Conference & Exposition
Authors
Gene Lee Fisher Ph.D., California Polytechnic State University, San Luis Obispo
Tagged Divisions
Computing & Information Technology
, retrieved 12 February 2017.[5] Larry Booth, Jon Preston, and Junfeng Qu, "Continuous program improvement: a project toautomate record-keeping for accreditation", In Proceedings of the 8th ACM SIGITE conferenceon Information technology education (SIGITE ’07). ACM, New York, NY, USA, 155-160, 2007.[6] Business Insider, "The 50 best computer-science and engineering schools in America",http://www.businessinsider.com/best-computer-science-engineering-schools-in-america-2015-7,retrieved 12 February 2017.[7] The California State University, "Search CSU Degrees", http://degrees.calstate.edu, retrieved12 February 2017.[8] Ernest L. Carey. "A quest for ABET accreditation: in retrospect", J. Comput. Sci. Coll. 19, 1,139-146, October 2003.[9] Computing
Conference Session
Emerging Computing and Information Technologies II
Collection
2017 ASEE Annual Conference & Exposition
Authors
Sushma Sanga, Bosch Inc; Ali Eydgahi, Eastern Michigan University
Tagged Divisions
Computing & Information Technology
-ftcs-consumer-complaint-categories-again-2014[5] Beckers, J. J. & Schmidt, H. G. (2001). The structure of computer anxiety: A six-factor model. Computers in Human Behavior, 17(1), 35-49.[6] John Winterdyk. & Nikki Thompson. (2008). Student and Non-Student Perceptions and Awareness of Identity Theft. Canadian Journal of Criminology and Criminal Justice 50(2), 153-186. Project MUSE. Web. 5 Apr. 2013. http://muse.jhu.edu[7] Nachmias, D. & Nachmias, C. (1987). Research methods in the Social Sciences. New York: St. Martins Press.[8] Costello, A. B., & Osborne, J. W. (2005). Exploratory Factor Analysis: Four recommendations for getting the most from your analysis. Practical Assessment, Research, and Evaluation, 10(7
Conference Session
Information and Network Security
Collection
2016 ASEE Annual Conference & Exposition
Authors
Te-shun Chou, East Carolina University; Steve Keith Baker, East Carolina University; Miguel Vega-Herrera
Tagged Divisions
Computing & Information Technology
activities can also automate gradingroutines and facilitates unique testing environments with variable content generation [3]. This isa powerful tool that enables the instructor to create unique assignments, and facilitates for quickand efficient grading of complex configurations.3. ConclusionsInstead of having to choose using either PT or GNS3 for network development, it might be aneven better idea to use them both together. As previously discussed, both programs target distinctaspects of an overall project, and can be used to complement each other. PT can be used to createa networking plan that incorporates the internal and external functions of a network. PT couldfurther facilitate ease of assessment and automated grading. GNS3, on the other hand
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2015 ASEE Annual Conference & Exposition
Authors
Mohammed Eltaher, Dept. of Computer Science and Engineering, University of Bridgeport, Bridgeport, CT; Yawei Yang, University of Bridgeport; Jeongkyu Lee, University of Bridgeport
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
. Fig. 7. Experimental setup using Kincet sensorRegarding to the implementation, we program on a computer with Intel Core i5-2430 2.0 GHzCPU, 4 GB DDR main memory. The Kinect sensor is connected to this computer through USBport. We program under 64-bit Windows 7 operating system with Kinect SDK 1.7, XNAS40 aswell as EmguCV version 2.9.0. The programming IDE for this project is Microsoft Visual Studio2010 with .NET framework 4.0.We have 72 volunteers including 38 female and 34 male, and ask them to walk in front of thesensor back and forth. The program records gait silhouettes as well as gender of the testedperson. Page 26.808.9The following are
Conference Session
Emerging Computing and Information Technologies I
Collection
2015 ASEE Annual Conference & Exposition
Authors
Peng Li, East Carolina University; Lee Toderick, East Carolina University
Tagged Divisions
Computing & Information Technology
important for educational institutions where enrollment is growing faster thanthe budget and the resource.After using BroadReach Extended, the students repeatedly express satisfaction with immediatelab experiment grading and the ability to use feedback to correct lab work and resubmit the lab toachieve the maximum grade.In the future, we would like to expand the BRE project and make the system more usable to agreater number of faculty teaching technical classes with labs. Grading and feedback scripts canbe difficult and tedious, and may not be possible for all faculty to create. A future BRE upgradeis intended to include a menu-driven module for less experienced faculty, and an advancedmodule that accepts complex programming statements for
Conference Session
Information and Network Security
Collection
2015 ASEE Annual Conference & Exposition
Authors
Chris Foreman, Purdue University, West Lafayette; Matthew Turner, Purdue University (Statewide Technology); Karl Perusich, Purdue Statewide Technology DO NOT USE DUPE
Tagged Divisions
Computing & Information Technology
several power sector cyber security projects, including Advanced Metering Infrastructure. Dr. Foreman continues to explore cyber security in critical infrastructure through novel process control solutions.Dr. Matthew Turner, Purdue University (Statewide Technology) Dr. Matthew Turner is an Assistant Professor of ECET at Purdue University New Albany where he teaches courses in power systems and controls. Prior to joining the faculty at Purdue, Professor Turner worked as a researcher at the Conn Center for Renewable Energy Research in the area of power and energy systems, with a focus on smart grid implementation and computer modeling. Dr. Turner’s current research concentrates on demand response technologies and the
Conference Session
Information and Network Security
Collection
2013 ASEE Annual Conference & Exposition
Authors
john pickard, East Carolina University; Te-shun Chou, East Carolina University; Philip J Lunsford II P.E., East Carolina University; John Spence
Tagged Divisions
Computing & Information Technology
June, 2012 from http://www.netdevgroup.com/products.17. Pickard, J., Spence, J., Lunsford, P. 2012. IPv6 Certification and Course Development. Proceedings of the ACM SIGIT/RIIT 2012. Calgary, Alberta.18. Sarkar, N.I. (2006) Teaching computer networking fundamentals using practical laboratory exercises. Education, IEEE Transactions on, 49, 285-291.19. Sharma, S.K. & J. Sefchek (2007) Teaching information security courses: A hands-on approach. Computers & Security, 26 290-299.20. Te-Shun, C. 2011) Development of an intrusion detection and prevention course project using virtualization technology. International Journal of Education & Development using Information & Communication Technology, 7, 46-55.21. VMWare
Conference Session
Information and Network Security
Collection
2013 ASEE Annual Conference & Exposition
Authors
Reza Sanati-Mehrizy, Utah Valley University; Jeffrey H Wright; Afsaneh Minaie, Utah Valley University; Ali Sanati-Mehrizy; Paymon Sanati-Mehrizy, Icahn School of Medicine at Mount Sinai
Tagged Divisions
Computing & Information Technology
instances of cancer, but it would beincredible to see the number of people whose lives likely were able to be saved by this form ofearly detection. The implications of being able to classify these genes are astounding to say theleast.DNA SpeculationJustin Zobel5 explores where data mining is headed. He explains the potential of DNAsequencing and what challenges are presented in trying to extract useful information from thedata gathered by the DNA sequencing process.The Human Genome Project was a joint effort to catalog all the different genes found in humanDNA. Since its completion in 2000, “the cost of sequencing DNA fell by a factor of around a
Conference Session
Information and Network Security
Collection
2014 ASEE Annual Conference & Exposition
Authors
Jane LeClair, National Cybersecurity Institute at Excelsior College; Denise Pheils, National Cybersecurity Institute
Tagged Divisions
Computing & Information Technology
. Pheils holds 21 certifications including the CISSP and PMP, and bringing many years of relevant and current work and research into cybersecurity topics. To provide hands-on experience to cybersecurity learners she piloted the Community Project Approach to Teaching Network- ing and Cybersecurity Topics that partners classes with not-for-profits in the community to accomplish tasks and secure that organization. She is a Fellow with the National Cybersecurity Institute at Excelsior College. Page 24.196.1 c American Society for Engineering Education, 2014Are We Prepared: Issues
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2011 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Paymon Sanati-Mehrizy, University of Pennsylvania; Ali Sanati-Mehrizy, Pennsylvania State University; Reza Sanati-Mehrizy, Utah Valley University
Tagged Divisions
Computing & Information Technology
Systems.Princeton U.S. None N/A NoneUniversity46Rice U.S. Mobile and Mobile & CE/CS: Mobile andUniversity47 Embedded Embedded Wireless Networking System Design Systems and Application Mobile Wireless CE/CS: Security of SRVC Project HW Embedded Mobile Wireless Systems Services ProjectUniversity of U.S. Introduction to Embedded System N/ABerkely48 Embedded Design: Models, Systems
Conference Session
Emerging Information Technologies
Collection
2012 ASEE Annual Conference & Exposition
Authors
Robert E. Efimba P.E., Howard University; Tori Rhoulac Smith, Howard University
Tagged Divisions
Computing & Information Technology
the field of structural design, and his research area is in finite element appplications to structural design and engineering mechanics education.Dr. Tori Rhoulac Smith, Howard University Tori Rhoulac Smith began as an Assistant Professor in the Department of Civil Engineering at Howard University in 2003. In this position, she served as an academic and research advisor, instructor for a variety of undergraduate and graduate engineering courses, and researcher on traffic engineering and engineering education projects. Feeling an overwhelming desire to work more directly on identifying and meeting the needs of increased recruitment, retention, and achievement of traditionally-underrepresented minority students
Conference Session
Information Systems and Computing Potpourri
Collection
2011 ASEE Annual Conference & Exposition
Authors
Alireza Kavianpour, DeVry University, Pomona
Tagged Divisions
Computing & Information Technology
course. As a demonstration,MIPS processor is selected to explain different steps in an instruction cycle. The MIPSprocessor is similar to (and therefore a good example of) many other available RISC processorsin the market today. With the help of VHDL notation and MULTISIM software, instructorsmay assign numerous homework and projects (See Appendix A) for implementing differentprocesses such as fetch, decode, and execute cycles in a processor.6- References1- Sudhakar Yalamanchili, VHDL Starter's Guide, Prentice Hall, ISBN 0-13-519802-X, 19982-William Stallings, Computer Organization and Architecture, Fifth Edition, Prentice Hall, ISBN 0-13-081294-3,20013 - D. Patterson and J. Hennessy, Computer Organization and Design:The Hardware/Software
Conference Session
Emerging Computing and Information Technologies II
Collection
2016 ASEE Annual Conference & Exposition
Authors
Samuel Moses, Brigham Young University; Nathaniel Scott Baker; Dale C. Rowe, Brigham Young University
Tagged Divisions
Computing & Information Technology
case studies.ProjectsAs part of the class students will complete a project and have the option to complete a secondproject to replace one lab. 1. Dropbox a. Students will create a discrete host that can be used as a work-around when a firewall has interrupted a security assessment. Students will learn about reverse SSH tunneling and other methods of circumnavigating a firewall, as well as what policies might fend off an attempt to place a dropbox within their own organization. 2. Build Your Own Lab a. This is a chance for students to develop their skills in an area of their choice by designing a lab which they think would be of value to their own studies and the
Conference Session
Computing & Information Technology Division Technical Session
Collection
2016 ASEE Annual Conference & Exposition
Authors
Alireza Farahani; Mudasser Fraz Wyne, National University; Lu Zhang, National University
Tagged Divisions
Computing & Information Technology
way of life”, Tribal College Journal, 19(4), pp.60–61, 2008.16. Slater, J., & Burson, T., “Connecting assessment to resource allocation: A demonstration project atQueens University of Charlotte”, New York, Wiley Periodicals, 2011.17. Suskie, L., “Assessing student learning: A common sense guide”, 2nd Ed., San Francisco, CA: Jossey-Bass, 2009.18. Flint, N. and Johnson, B., “Towards fairer university assessment: Recognizing the concerns ofstudents”, New York, NY: Taylor & Francis, 2011.
Conference Session
Curricular Issues in Computing
Collection
2017 ASEE Annual Conference & Exposition
Authors
Sreyoshi Bhaduri, Virginia Tech; Tamoghna Roy, Virginia Tech
Tagged Divisions
Computing & Information Technology
, purpose, intent, intention, aim, invention, excogitation, conception, project, contrive, experimentation, try out, initiation, founding, foundation, institution, origination, creation, introduction, instauration, real number, existent, tangible, actual, genuine, literal, substantial, material, veridical, very, really, rattle, 'issue', publishing, print, bring out, put out, release, write, introduce, pioneer, trailblazer, groundbreaker Ethics ethic, society, environment, ethical motive, moral, morality, moral philosophy, ethic, moral principle, value system, value orientation, ethical code, club
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2016 ASEE Annual Conference & Exposition
Authors
Mark Sherriff, University of Virginia; Mark Floryan, University of Virginia
Tagged Divisions
Computing & Information Technology
were attached to theirname whenever it was displayed on their GamerCard or on any leaderboard listing. A title wasdisplayed immediately after a student’s name. For example, a student that found a usefulresource for the rest of the students to use, such as an online tutorial, could earn the title theGatherer. Classes refer to a student’s experience in the course. Students could earn new titlesby reaching a certain amount of XP or by choosing to build their project on a particular platform.4. ResultsIn the end of semester course evaluations for the four semesters that we used GamerCard, weasked the students a number of questions regarding their experience with GamerCard and thegamification of the course as a whole. Students were not required to
Conference Session
Embedded Systems and Mobile Computing
Collection
2013 ASEE Annual Conference & Exposition
Authors
Richard G. Helps, Brigham Young University; Scott Pack
Tagged Divisions
Computing & Information Technology
designers who addressspecific needs in the domain including integrative systems design, Human-Computer Interaction(HCI), Information Assurance and Security (IAS), reliability, networking, web interactions andmuch more. Since these skills are all part of the IT university curriculum IT professionals have asignificant role to play in the design of these complex systems. In fact most of these skills arepart of the pillars and central themes of IT education7. It is revealing that the respected annualsurvey sponsored by EE Times and others8 indicate that over 50% of the projects includenetworking and more than 30% include wireless, but in this report the designers are classified ashardware, software or firmware engineers and their lists of design tasks
Conference Session
Topics in Computing and Information Technologies
Collection
2014 ASEE Annual Conference & Exposition
Authors
Gholam Ali Shaykhian, NASA; Mohd Abdelgadir Khairi, Najran University
Tagged Divisions
Computing & Information Technology
one entity, this way analytical usage will be easy,project risk reduces, data governance relieved, and the scope and ROI will be limited.However, the technology focus will not solve all business problems which leadcompanies to pursue CDM option [12].Limitation factor: FDM Compensate for SQL limitations at the data source byprocessing parts of a distributed request at the MDM federated server (Godinez et. al.,2010). Confounding factors such as legal constraints limit MDM across geopolitical Page 24.593.4boundaries [3][5][6] do not allow CDM. Another limitation to use CDM is master datalocking in Line of Business (LOB) packaged application.A technology
Conference Session
Innovations in Computing Education
Collection
2012 ASEE Annual Conference & Exposition
Authors
Hassan Rajaei, Bowling Green State University; Eman A. Aldakheel, Bowling Green State University
Tagged Divisions
Computing & Information Technology
 ultimately uses IaaS utilities. In addition, the project identified different levels of difficulties in courses to explore more than one layer of cloud services.  Figure 4: The proposed CBE­CS architecture mapping Computer Science courses to the  Cloud architecture (courses appearing in multiple layers have different levels). Moving  from  the  SaaS  layer  to  the  PaaS  reflects  the  increase  in  the  depth,  difficulty,  and complexity of a course. Likewise, the move from PaaS to IaaS indicates complexity of a course  Page 25.318.8with  respect  to  the  needs  for  details  in  VM  configuration,  networking
Conference Session
Emerging Information Technologies
Collection
2012 ASEE Annual Conference & Exposition
Authors
Lakshmi Ramachandran, North Carolina State University; Edward F. Gehringer, North Carolina State University
Tagged Divisions
Computing & Information Technology
automatedmetareviewing technique. The statistical analysis tool R is used to carry out the text analysis [7].The lsa package available for R is used to perform classification using LSA and cosine. For textpre-processing, the text mining and natural language packages such as tm, openNLP and Wordnetare used. Page 25.245.83.1. ExpertizaReview data consisting of textual feedback provided by students was collected from courses atNorth Carolina State University that used the Expertiza system [2, 3]. Expertiza is a collaborativeweb-based learning application that helps students work together on projects and critique eachother’s work using peer reviews. Figure 1 shows