say you have adata source in which each of two objects are identified as a person and you want to define arelationship between these two objects that they “know” each other. Using RDF triples, orstatements, containing a subject, predicate and object, you can do just that as seen in Figure 1from Hebeler6. literal value Figure 1 - Sample RDF/XML triple Applying our example, the subject is the first person, the predicate is the property defined as“knows” from FOAF7, and the object is the second person. FOAF stands for ‘Friend of a Friend’and
, Page 26.328.4Helping other people, Having others working under my supervision, Having job security,Working with people rather than objects, Inventing new things, Developing new knowledge andskills, Having lots of family time, Having lots of time for myself/friends, Making my owndecisions, Having an easy job, Having an exciting job, Making use of my talents/abilities,Working in an area with lots of job opportunities. Characteristics were rated on a scale of 1 to 6,where 1 = Not at all important and 6 = Very important. (For more information on the PRiSEproject and survey methodology, see 26, 27)Occupational DataThe most recent available occupational statistics were obtained from the U. S. Bureau of LaborStatistics (BLS). These include 2013
popular YouTube series27. While thedelivery focus of this intervention was game design principles, we used the development ofdifferent games in Scratch to teach CT concepts. Like Mission to Mars, this program consistedof four days of activities. Day one began with an introduction to game design principles. These consisted ofseven principles: (1) Principle of isolation: introducing new elements in a way that allowsplayers to familiarize with new enemies or mechanics before they are set in a real situation. (2)Principle of accomplishment: gives players a sense of motivation and direction either throughstory progression or the mastering of skills. (3) Teach without teaching principle: help playerslearn by doing instead of relying on step-by
professional uses of Termediator include collaborative projects (both inter- andintradisciplinary) and telecommuting work situations. Termediator also has a distinct role in ITeducation, where it is imperative to include pedagogy that sensitizes students to the potential formisunderstanding because of semantic differences in commonly used terms.1. INTRODUCTIONCognitive dissonance refers to a situation when an individual is simultaneously holding twocontradictory beliefs. The term was coined in 1954 by psychologist Leon Festinger, whoproposed the combined presence of contradictory beliefs produces psychological discomfort inthe individual, and the greater the discomfort, the greater the desire to reduce the dissonance ofthe two cognitive elements20
writing process. The first two workshops were held in the Fallof 2014. The whole series is based on Dr. Patrick Bahls’s research and ideas. Professor Bahls wasan integral part of Workshop #1, in which he presented strategies of integrated writing assignmentsin regular, non-writing-intensive courses. The 8 faculty recruits were from science-relateddisciplines across the university. Each faculty member teaches between 1 and 3 courses thatinclude a writing assignment. Student participants were be drawn from the faculty members’courses, for an approximate total number of 160-200 students.Genres in Academic and Workplace Engineering Environments Various writing genres have been identified during faculty discussions and activities overthe course
pleasant and gained new network functionality that increasedtheir creativity. We anticipate that the effort and time required by instructors and systemadministrators to set up and manage labs will markedly decrease, particularly, with the ability tocentrally monitor the classroom progress and the students’ utilization of servers’ resources.1. IntroductionCloud computing is an up and coming technology that is gaining popularity as the speeds of ournetworks increase. Cloud computing [1-3] is the distribution of computing resources across the Page 26.835.2network. It normally has a central system, or server stack, that completes all of the
Build a Prototype Test and evaluate prototype Implement Communication of Results System Analysis and Control Improve: Review and redesign as needed Table 1: Engineering Design Process10Our Capstone course is offered every semester. The students in the Computer Engineeringprogram take this course during their last semester. Students have the option of selecting theirown embedded project or to work on a project that is given to them by their advisors. During thefirst week of the semester, students write a proposal to define problems and identify solutionapproaches for
acquisition, teaching techniques vary as a function oflearner proficiency. Proficiency levels are typically characterized as progressing through fivestages from preproduction to advanced fluency. Throughout the SLA sections, self-paced videoswere developed for the students, consistent with and supplementing in-class instructionalstrategies. As well, peer supportive techniques, such as ‘think, pair, share’ and moderateddiscussion boards, were used throughout the projects in SLA course sections12-15. Table 1 belowpresents the stages of language proficiency and presents a comparison of teaching techniquesapplied at each stage in both SLA and non-SLA based class sections 15.Table 1. A comparison of Non-SLA-based and SLA-based Teaching Techniques
forstudents with strong technical background, Cyber security is not just about Technology. SocialEngineering is also a integral part of it. Many Universities are now offering Cyber securityrelated programs for non IT students as well. A program such as Masters in Cyber SecurityManagement does not require students to have extensive technical knowledge [16]. HoweverKnowledge on network and computing skills are required to start with. There are also DigitalForensic and Cyber security Certificate courses available in some Universities [17].Recommendations on PreparationCTF events should be considered like a playground where students can succeed or fail atcomputer defense without fear of consequences [1]. Students who are willing to participate inCTF
sessions and tutoring sessionswere offered through Google Hangouts On Air. Particularly, we managed to offer liveinteractive instructions using regular hardware like microphones and webcams. As depicted bytwo snapshots in Figure 1, our live instructions integrate PowerPoint slides with the instructor’svideo, which nicely emulates face-to-face instructions. Moreover, the live instructions can berecorded, edited, and shared over Google+ and YouTube. Indeed by following our recipe, anyinstructor can create online classes with PowerPoint slides, video, and audio integrated byhimself/herself, that is, without resorting to a professional crew. Figure 1: Snapshots of our live interactive instructions through Google Hangouts On AirOur workshop
address a particular course learning outcomethat in turn is linked to a program learning outcome. This practice is often used toevaluate the effectiveness of a course as well as to identify any need for coursemodifications and improvements. When assessment is in the form of a test, then theadministration, collection and the final aggregate report generation becomes a timesconsuming task that often introduces delays in planning. In this paper we present a web-based software tool that is primarily designed and developed for automating the courseassessment process. It automates the test creation, grading and the final reportgeneration that can help save time, reduce errors and produce variety of reportsummaries for better decision making.1
introductory computer science courses (CS1).1. From writing-to-learn (WTL) to writing-to-learn-to-program (WTLTP)WTL strategies arose from the writing across the curriculum (WAC) movement, which can betraced back to the 19th century in the U.S. It describes programs that emphasize the connectionbetween writing and learning, but the term also refers to the pedagogical theories that supportthis connection. In the following sections, the history and influence of WTL are discussed as thefoundation for WTLTP.1.1. History of WTL Page 26.1779.2David Russell’s history7 of the WAC movement traced the cultural changes in the U.S. that ena-bled the movement’s
c American Society for Engineering Education, 2015 1 Factors influence data management model selection: IT Expert testimonies Gholam Ali Shaykhian, Ph.D. Mohamed Abdelgadir Khairi, Ph.D. Jinan Ziade, ABDAbstractThis paper examines the IT Expert testimonies perspectives to determine which factors(cost, schedule, performance, efficiency, limitations, risk, training, operations,compliances, deployment, security, accessibility, dependability, data quality, stability,maintainability, reliability, availability
. He is the author of numerous research and pedagogical articles in his areas of expertise.Prof. Sanjeev Arora, Fort Valley State University Dr. Arora holds a B.Sc. (Honors) and M.Sc. degree in Physics from University of Delhi, India, and a M.S. and Ph.D. degree in Physics from University of Delaware. Dr. Arora’s research interest is experimental atomic physics and he is well-versed in the use of the van de Graaff accelerator, scalars, MCAs, and other physics instrumentation. He has been instrumental in acquiring, through various grants, computers, and software for the physics laboratory at FVSU. Some of his funded grant proposals are as follows: 1) Establishing a Nuclear Science and Engineering Minor at Fort Valley
(IoT), the development of remote testbeds aregaining momentum with an intention to use them for teaching and for laboratory activities.Remote testbeds allow one to perform experiments on a real hardware over the Internet from aremote location. There are a number of software packages used in the design and developmentof remote testbeds. This paper will describe the use of Python for such a development. Todemonstrate Python’s effectiveness, the paper will describe two case studies. One of them is aremote vacuum cleaner and the other is an embedded processor system with remoteprogramming capability.1. IntroductionIt is vital to provide laboratory activities to maximize learning in STEM disciplines.Traditionally, students perform experiments
, it was decided to use Linux platform due to its popularity, open-source nature, andhaving a dedicated Linux distribution for hosting server, which translates to better reliability.Content Management SystemThe Content Management System (CMS) [1] is a software system that provides websiteauthoring, collaboration, and administration tools designed to allow users with little knowledgeof programming language to create and manage website content with relative ease. Such asystem, which normally would take a lot of time and resource to develop, still need to bemaintained and updated with new features. Hence, it is more cost and time effective to use one ofthe available CMS and concentrate on developing new features.For the purpose of the project
the cyber security realm within the Coast Guard and in the private sector after my military career. Page 26.1071.1 c American Society for Engineering Education, 2015 Learning IPv6: Becoming a Subject Matter Expert of a Technical Topic through a Year-Long Capstone Design ProjectIntroductionThe purpose of education remains the subject of much vigorous debate and discussion. Educationhas been a part of the development of humans from the earliest times to the present with manydifferent perspectives [1-4]. While university education contains many pedagogical aspects, theconcept of a
solution is a new cloud service known as HPC-as-a-Service.In this paper, we present an HPCaaS platform called ASETS which uses Software DefinedNetworking (SDN) technologies to smooth the execution of parallel tasks in the cloud. Further,we provide application examples that could be used in a typical introductory parallel programingcourse. We argue that HPCaaS platform like ASETS can significantly benefit the users of HPCin the cloud as if their program is running on a dedicated hardware in their own laboratory. Thisis especially advantageous for students and educators who need not to deal with the underlyingcomplexities of the cloud.1. IntroductionCloud Computing according to NIST1 is a shared pool of configurable resources offeringservices with
three wheeled ground robot with an ultrasonic sensor tied in front of it as shown in Fig 1. Its compactness, robustness, user friendliness, the synchronization (both Android and EV3) in terms of programming paradigm and necessarily its cost effectiveness Fig 1: Structure of the robot have made it the ideal robotic platform for the implementation of this project.iii. Android platformAndroid is an innovative as well as a noble and open development platform launched in 2007 byGoogle, based on the Linux carnal. Besides enhancing the flexibility in using mobile devices andpromoting user experience, it has
Satisfaction Table 4 Data collection procedures and schedules Phases Contents Duration(1) Pre-tests Demographics , computer experience, GPA Two weeks Knowledge on selected subjects through Concept Inventory Learning disposition measured through MSLQ(2) Collaborative learning Online discussion for collaborative learning Ten weeksthrough online discussion Students' Self-report on collaborative learning process Instructors
board and controlling the frequency of a piezoelectric speaker. This previousresearch was presented in several papers 1. The idea has shown great promise in terms ofengaging students in learning programming.Recently, the technology began to offer the new tablet devices that incorporate the capability ofreading eBooks and run different application ranging from games to sophisticated scientificapplications. The major limitation for these devices to spread out quickly in the markets was tillnow the price. Prices have dropped rapidly due to several factors like the mass production,competition, cloning and fast pace of advances in the hardware and manufacturing technology.These devices are now in the hands of almost all college students and very
the presence of mind in the middle of a call) toproperly classify cases. Human-based classification is only good at spotting call trends when theemployees use the system properly.This proposal has a beneficial side effect that classification would be done automatically, thereforeincreasing the ability to spot new trends and redeploy call-taking and training resources accordingly.To implement this proposal, the following the proposed system (figure 1) would be inserted into thenormal flow of information between first-level tech support employees and the second-level co-workers they consult with when they need help. Page 26.439.7
flexibility of the platform weare now using these units in multiple classes. Our analysis shows that the critical properties itoffers to the learning experience are • Immersive interactive learning • Immediacy of interactive control (direct manipulation) • Tactile and experiential learningThe problems of this approach include the lack of experience of IT students with the HWThe key parameters to handling this problem are 1. Provide ready-packaged hardware that obviates the need to build circuits 2. Use a source of hardware that provides three key properties, IE a wide selection, standardized interfaces and software libraries for accessing the softwareEducational impact evaluation at this stage is mostly qualitative. An example
. L. D. Feisel and A. J. Rosa, “The role of the laboratory in undergraduate engineering education,” Journal ofEngineering Education, vol. 94, no. 1, pp. 121–130, 2005.2. Ordua, Pablo and Irurzun, Jaime and Rodriguez-Gil, Luis and Garcia-Zubia, Javier and Gazzola, Fabricio andLpez-de-Ipia, Diego. Adding New Features to New and Existing Remote Experiments through their Integrationin WebLab-Deusto. International Journal of Online Engineering (iJOE), vol. 7, no. S2, Oct. 2011.3. Lowe, S. Murray, E. Lindsay, and D. Liu, Evolving remote laboratory architectures to leverage emerginginternet technologies. Learning Technologies, IEEE Transactions on, vol. 2, no. 4, pp. 289294, 2009
laboratory in undergraduate engineering education,” Journal ofEngineering Education, vol. 94, no. 1, pp. 121–130, 2005.3. E.D. Lindsay and M.C. Good, “Effects of Laboratory Access Modes upon Learning Outcomes,” IEEE Trans.Education, vol. 48, no. 4, pp. 619-631, Nov. 2005.4. V. J. Harward, J. A. del Alamo, S. R. Lerman P. H. Bailey, J. Carpenter, et. al., "The iLab Shared Architecture:A Web Services Infrastructure to Build Communities of Internet Accessible Laboratories," Proceedings of theIEEE , vol.96, no.6, pp.931-950, June 2008.5. P. Orduña, “Transitive and Scalable Federation Model for Remote Laboratories,” Doctoral Thesis, Univertityof Deusto, Bilbao, Spain, Apr. 2013. [Online]. Available:http://morelab.deusto.es/media/publications/theses/pablo
afirst-year course. We believe that the pedagogical process used in this course is transferable toother educational contexts.References: 1. Allen, D., Allenby, B., Bridges, M., Crittenden, J., Davidson, C., Hendrickson, C., Matthews, S., Murphy, C., and Pijawka, D. (2008), Benchmarking sustainable engineering education: Final report. EPA Grant X3-83235101-0. 2. Wiggins, J., McCormick, M., Bielefeldt, A., Swan, C., and Paterson, K. (2011), “Students and sustainability: Assessing students’ understanding of sustainability from service learning experiences”, paper presented at the 2011 Annual American Society of Engineering Educators (ASEE) Conference and Exposition, 26-29 June 2011, Vancouver, Canada
indexers. In apublish-and-subscribe environment, there should be at least two indexers per class of data. If thepublish-and-subscribe method is not used, care must be taken to ensure there are sufficientindexers to handle the workload even during peak throughput. To have enough resilience in thesystem, it is always a good idea to have n+1 indexers. With the use of a broker, it is possible tolose all but one indexer for each class of data with pub/sub, or all but only one indexer foroperating the broker as a simple key-value store. By keeping at least one indexer alive, data canstill be processed into the searchable storage.Once all the data has been funneled and processed, it must be stored in some sort of searchablefashion. We elected to use