technology at North Carolina A&T State University. He earned his B.S. degree from Wayne State University, Mich., M.S, (computer science, 2006) from Wayne State University, and Ph.D. (information technology, 2010) from Lawrence Technological University. El-Bathy is currently teaching at the North Carolina A&T State University. His interests are in health informatics, bioinformatics, artificial intelligence, intelligent infor- mation retrieval, and intelligent web development. El-Bathy may be reached at nielbath@ncat.edu.Mr. Michael S. Peluso, North Carolina A&T State Univerisity Mike Peluso has been involved in high technology management and support for the better part of two decades. Peluso started his career
table showed the correlation of the desired 3-5 year post graduationcompetencies of the PEOs to their foundation in student outcomes A.1-K. Table 1 AGEN Mapping of Student Outcomes to PEOs Student Outcomes PEOs A.1 A.2 B C D E F G H I J K 1 S S S S M S M S M M S S 2 M M M S L S M L M S S S 3 S M S S L S L S M S S S 4 M M L L S
course also involves completion of a simple projectwhich involves real-time simulation of a MATLAB/Simulink-based speech codingalgorithm for coding speech [9]. Page 25.960.4Analog telephone systems have mostly been replaced by digital telephone systems. Butwith the advent of digital systems, the speech can be coded and has more flexibility, easeof regeneration and security than analog systems. But the disadvantage of digital systemsis it requires larger bandwidth. The speech coding technology has gone through a numberof phases starting with the development and deployment of PCM and ADPCM systems.The 64 kb/s Log-PCM and 32 kb/s ADPCM systems which have
as it provides high bandwidth access at avery low latency.Fixed Wireless BroadbandFWB access is suitable for fringe areas, metro black spots and sparsely populated areas withsuitable propagation characteristics, i.e. not mountainous. It will rely on 4G mobile technology(IMT advanced) with peek data rates of 1Gbit/s. Latency of the access component of the networkis low by design, i.e. 10ms under ideal conditions. This has been demonstrated in a field trail 20.A factor that could introduce additional, unacceptable latencies is extensive wireless backhaul.For most areas this is not an issues as the proposed network topology largely relies on opticalfibre backhaul.SatelliteAreas that are not covered by FTTH or FWB have to rely on satellite
educational community. This paper examines how specific Computer Science courses can be mapped to certain layer(s) of the Cloud (see Sections 4 & 5). Rapid growth of the cloud technology and promises to reduce the IT costs 5 pushed numerous educational institutions to revise their IT infrastructure and follow the Cloud development. Our university, like many others, is moving to the Cloud within the next five to ten years. Computer Sciences and STEM Education are among prime targets. Ever since the emergence of Cloud Computing, significant emphasis and efforts have been offered in exploring and defining this new technology 4, 7, 8, 9 . Experts predict that by 2020 most institutions and enterprises will move to
underway.Bibliography1. Ayala, K. J. (1997). The 8051 Microcontroller: Architecture, Programming and Applications (2 ed.): West.2. Barnett, R., Cox, S., & O'Cull, L. (2003). Embedded C Programming and the Atmel AVR: Thomson, Delmar Learning.3. Barnett, R., Cox, S., & O'Cull, L. (2004). Embedded C Programming and the Microchip PIC: Thomson, Delmar Learning.4. Cady, F. M. (2008). Software and Hardware Engineering: Assembly and C Programming for then Freescale HS12 Microcontroller.5. Gaonkar, R. S. (2007). Fundamentals of Microcontrollers and Applications in Embedded Systems with the PIC18 Microcontroller Family): Thomson Delmar Learning.6. Peatman, J. B. (2003). Embedded Design with the PIC18F452
square meter movable solar cells panel mountedso that it was perpendicular to the Sun’s position through out the day. The fixed solar panel wasperpendicular to the Sun’s position only when the Sun was directly overhead.Two simulated locations for the experiment were selected, Morogoro, Tanzania and Huntsville,Alabama. Morogoro has a latitude of 6° 49′ 0″ S and a longitude of 37° 40′ 0″ E which is nearthe Equator. Huntsville, Alabama has a latitude of 34° 43′ 49″ N and a longitude of 86° 35′ 10″W and is located in the middle part of the Northern Hemisphere of the Earth.The four dates selected for the simulation were the Vernal Equinox March 20, 2011, SummerSolstice June 21, 2011, Autumnal Equinox September 23, 2011, and the Winter
leastwe could identify the course title, instructor(s) of the course, and a list of main topics of thecourse. Most of the sites contain much richer contents than the aforementioned minimum amountof information. Among the additional information found on these sites include teachingschedules, topics discussed in the course, lecture notes, detailed homework and projectassignments, and any combinations of the above. In the end, information from a total of 38course websites is collected. Twenty-eight courses of the 38 total have been taught since 2007 (afive-year window through spring 2012). A list of these 28 course websites is in Appendix A.4. Course Titles, Goals, and ObjectivesCollectively the following different course titles are used in the
integrate wireless sensor networks concepts into their curriculum.IntroductionA wireless sensor network (WSN) is a network of a set of independent small nodes equippedwith sensor(s), a wireless radio, a battery, and an on-board processor. Usually, the unit thatconsists of the wireless radio and the on-board processor is called a mote. With the recentadvances in MEMS technology, wireless communications, and digital electronics, the design anddevelopment of low-cost, low power, multifunctional sensor nodes that are small in size andcommunicate untethered in short distances have become feasible. The ever-increasingcapabilities of these tiny sensor nodes, which include sensing, data processing, andcommunicating, enable the realization of wireless
span continents[4].The management of SCADA systems was consolidated using personal computers to monitorprocesses by making requests for information from embedded devices commonly known asprogrammable logic controllers (PLCs). However, as SCADA systems began to integrate withpersonal computers, they were exposed to outside volatile networks, bypassing the common“security by obscurity” philosophy [5, 6].Several instances occurred in the early 2000’s that raised concern about the security of SCADA Page 25.877.2environments[7]. In 2003, the Slammer Worm infected the David-Besse nuclear power plant inOhio. Although the facility was undergoing
, Massachusetts: Jones and Bartlett Publishers, 2008.[19] N. Chaiyarataiia, A. M. S . Zalzala. Recent developments in evolutionary and genetic algorithms: theory and Page 25.1012.15 applications. Genetic Algorithms in Engineering Systems: Innovations and Applications. GALESIA 97. Second International Conference On (Conf. Publ. No. 446), pp. 270 – 277, 1997.[20] D. E. Rowley, D. G. Rhoades. The cognitive jogthrough: a fast-paced user interface evaluation procedure. CHI '92 Proceedings of the SIGCHI conference on Human factors in computing systems, ACM, New York, 1992.[21] D. Pinelle, C. Gutwin. Groupware
., Laity, A., Jacob, J. C., and D. S. Katz (2005). Pegasus: a Framework for Mapping Complex Scientific Workflows onto Distributed Systems, Scientific Programming Journal, Vol 13(3), (2005). 2. Ma, J., Kang, J.-H., Shaw, E. and Kim, J. (2011), Workflow-Based Assessment of Student Online Activities with Topic and Dialogue Role Classification , Proceedings of the AI in Education Conference, 2011. 3. Ma, J., Shaw, E. and Kim, J. (2010) Computational Workflows for Assessing Student Learning, The 10th International Conference on Intelligent Tutoring Systems Conference, 2010. 4. Xu, H., Shaw, E. and Kim, J. (in process) Workflow reporting and feedback system for formative assessment of online course
, Wiley. 9. Palm, W.J (2001), Introduction to Matlab 6 for Engineers, McGraw-Hill. 10. Wieder, S.(1992), Introduction to MathCAD for Scientists and Engineers, McGraw-Hill. 11. Bedford, A., and W. Fowler (2008), Engineering Mechanics: Statics, 5th ed., Pearson/Prentice-Hall. 12. Beer, F.P., and E.R.Johnston (2007), Vector Mechanics for Engineers: Statics, 8th ed., McGraw-Hill. 13. Efimba, R.E. (2012), “The Joy of Mechanics I: Statics,” 4th ed., Department of Civil and Environmental Engineering, Howard University, Washington, DC., 250 pp. 14. Efimba, R.E. (2012), “The Joy of Mechanics III: Mechanics of Materials,” 3 rd ed., Department of Civil and Environmental Engineering, Howard University, Washington, DC
://www.e-booksdirectory.com/details.php?ebook=38326. Kochan, S. G., Programming in Objective-C, Addison-Wesley, August 2011.7. Green, D., Android vs iPhone Development: A Comparison.html, July 2009, http://greensopinion.blogspot.com/2009/07/android-versus-iphone-development.html8. Cocoa Developers Guide, Apple Developer Publications, December 2010, http://itunes.apple.com/us/book/cocoa-fundamentals-guide/id409921412?mt=119. Deitel, H.M., Deitel, P.J., Java How to program, Prentice Hall, 200310. Android Developer Resources, Tutorials, http://developer.android.com/index.html.11. iOS App Programming Guide, iOS Developer Library, http://developer.apple.com/devcenter/ios/gettingstarted/docs/objectivecprimer.action
Mining,2008, pp. 192– 196.[2] E. F. Gehringer, L. M. Ehresman, and W. P. Conger, S.G., “Reusable learning objects throughpeer review: The Expertiza approach,” in Innovate: Journal of On- line Education, 2007.[3] E. F. Gehringer, “Expertiza: information management for collaborative learning,” in InMonitoring and As- sessment in Online Collaborative Environments: Emergent ComputationalTechnologies for E-Learning Support. IGI Global Press, 2009.[4] F. P. W. Landauer, T. K. and D. Laham. An introduction to latent semantic analysis. InDiscourse Processes. Special Issue on Quantitative Approaches to Semantic KnowledgeRepresentations, 259–284. Volume 25. 1998.[5] T. A. S. Pardo, L. H. M. Rino and Maria das Graças Volpe Nunes, “Extractive
contrast to the peers that did not become involved.1 http://news.stanford.edu/news/2011/august/online-computer-science-081611.html2 http://ocw.mit.edu/index.htm3 Kim, J., Kim, T., Li, J., Shaw, E., and Wyner, S. (2010). Discerning Affect in Student Discussions. Annual Meeting of the Cognitive Science Society, 2010.4 Cole, M., and Engeström, Y. (1993). A cultural-historical approach to distributed cognition. In G. Salomon (Ed.), Distributed cognitions: Psychological and educational considerations. New York: Cambridge University Press.4 Engeström, Y. (1987). Learning by Expanding: An Activity Theoretical Approach to Developmental Research. Helsinki: Orienta-Konsultit Oy.4 Lave, J. (1996) Teaching as Learning, in