Asee peer logo
Displaying results 1 - 30 of 34 in total
Conference Session
Information and Network Security
Collection
2014 ASEE Annual Conference & Exposition
Authors
Usman Ghani, DeVry University; Ahmed S. Khan, DeVry University, DuPage
Tagged Divisions
Computing & Information Technology
various professional IT consulting assign- ments. Dr. Ghani holds MSEE from Illinois Institute of Technology, MBA from Keller Graduate School of Management and Doctorate from Northern Illinois University.Dr. Ahmed S. Khan, DeVry University, DuPage Dr. Ahmed S. Khan is a Senior Professor in the College of Engineering and Information Sciences at DeVry University, Addison, Illinois. Dr. Khan has more than thirty years of experience in research, instruction, curricula design, development, evaluation, implementation and program accreditation, management and supervision. Dr. Khan received an MSEE from Michigan Technological University, an MBA from Keller Graduate School of Management., and his Ph.D. from Colorado
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2014 ASEE Annual Conference & Exposition
Authors
David M. Whittinghill, Purdue University, West Lafayette; Jacob Samuel Brown, Purdue University
Tagged Divisions
Computing & Information Technology
Paper ID #10954Gamification of Physical Therapy for the Treatment of Pediatric CerebralPalsy: A Pilot Study Examining Player PreferencesDr. David M Whittinghill, Purdue University, West Lafayette Dr. David Whittinghill is an Assistant Professor of Computer Graphics Technology and Computer and Information Technology. Dr. Whittinghill’ s research focuses on simulation, gaming and computer pro- gramming and how these technologies can more effectively address outstanding issues in health, educa- tion, and society in general. Dr. Whittinghill leads projects in pediatric physical therapy, sustainable energy simulation, phobia
Conference Session
Emerging Computing and Information Technologies
Collection
2014 ASEE Annual Conference & Exposition
Authors
Mudasser Fraz Wyne, National University; Jimmy Faraon, National University
Tagged Divisions
Computing & Information Technology
) to store large amounts of data. Itis designed to make web scale computing easier for developers. The AS3 provides asimple web services interface that can be used to store and retrieve any amount of data, atany time, from anywhere on the web5. It gives any developers access to the same highlyscalable, reliable, secure, fast, inexpensive infrastructure that Amazon uses to run its ownglobal network of web sites. The service aims to maximize benefits of scale and to passthose benefits on to developers. Data stored in AS3 is secured by default. AS3 supportsmultiple access control mechanisms, as well as encryption for both secure transit andsecure storage on disk. With AS3’s data protection features, the user can protect data
Conference Session
Emerging Computing and Information Technologies
Collection
2014 ASEE Annual Conference & Exposition
Authors
Seyed Mousavinezhad, Idaho State University; R. Eugene Stuffle, Idaho State University; Wei Pan, Idaho State University; Steven Grant Maclure, Idaho State University
Tagged Divisions
Computing & Information Technology
Paper ID #8728Computing Tools in an Advanced Filter Theory CourseDr. S. Hossein Mousavinezhad, Idaho State University Dr. Mousavinezhad is an active member of IEEE and ASEE having chaired sessions in national and re- gional conferences. He is an ABET Program Evaluator (PEV.) He is the Founding General Chair of the IEEE International Electro Information Technology Conferences, www.eit-conference.org and served as 2002/2003 ASEE ECE Division Chair. He is a panelist for the National Science Foundation, has published a book in hand-held computing in 2013 and received an NSF grant (Enhancing Access to Radio Spec- trum
Conference Session
Topics in Computing and Information Technologies
Collection
2014 ASEE Annual Conference & Exposition
Authors
Manghui Tu, Purdue University Calumet; Kimberly Lynn Spoa-Harty, Purdue University Calumet Graduate Student
Tagged Divisions
Computing & Information Technology
ate upd rds A hea ccess processing nd n g a reco lth ing Data s i e car & es car e B upd Acc ealth
Conference Session
Topics in Computing and Information Technologies
Collection
2014 ASEE Annual Conference & Exposition
Authors
Abul K. M. Azad, Northern Illinois University; Namratha Siripragada, Northern Illinois University
Tagged Divisions
Computing & Information Technology
, and Mathematics) project, award number DUE-1140502. Any opinions, findings, and conclusions or recommendations expressed in this materialare those of the authors and do not necessarily reflect the views of the National Science Foundation.References[1] Elliott, S. and Kukula, E. (2007), The Challenges Associated with Laboratory-Based Distance Education, EDUCASE Quarterly, pp. 37-42.[2] Saleem, A. I. and Al-Aubidy, K. M. (2008), Mixed Reality Environment for Web-Based Laboratory Interactive Learning, International Journal of Online Engineering, 4(1), pp. 40-45[3] Gomes, L. and Bogosyan, S. (2009). Current Trends in Remote Laboratories, IEEE Transactions on Industrial Electronics, 56(12), pp. 4744-4756.[4] García
Conference Session
Information and Network Security
Collection
2014 ASEE Annual Conference & Exposition
Authors
Manghui Tu, Purdue University Calumet; Shiming Xue, Purdue University Calumet
Tagged Divisions
Computing & Information Technology
questions: what information isrelevant to the studied attack, where related fingerprint items can be located, and whatinformation each piece of fingerprint can indicate. Also, an evidence tree can provide thecontextual information to correlate attack operations by examine the fingerprints theyproduce. Furthermore, the contextual information provided to an incident tracking softwaremay have the potential of automating attack reconstruction. Page 24.1075.11References[1] Biggs, S. and Vidalis, S. (2009). Cloud Computing: The Impact on Digital Forensic Investigations. InProceeding of the International Conference on Internet Technology and Secured
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2014 ASEE Annual Conference & Exposition
Authors
Osvaldo Mangual, Honeywell Aerospace; Marvi Teixeira, Polytechnic University of Puerto Rico; Reynaldo Lopez-Roig, Polytechnic University of Puerto Rico; Felix Javier Nevarez-Ayala, Polytechnic University of Puerto Rico
Tagged Divisions
Computing & Information Technology
mixed-mode (MPI-OpenMP) parallel implementation, including performance and scalability studies, carried out inour 16-node, 64 processor cluster.Based on the prime factor decomposition of the signal length this algorithm, which is based on ablock diagonal factorization of the circulant matrices, breaks a one-dimensional cyclicconvolution into shorter cyclic sub-convolutions. The subsections can be processed,independently, either in serial or parallel mode. The only requirement is that the signal length, N,admits at least an integer, r0, as a factor; N = r0.s. The Argawal-Cooley Cyclic Convolutionalgorithm, has a similar capability but requires that the signal length can be factored intomutually prime factors; N = r0.s with (r0,s) = 1. Since the
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2014 ASEE Annual Conference & Exposition
Authors
Candido Cabo, New York City College of Technology/CUNY
Tagged Divisions
Computing & Information Technology
cl t s gn se t st ct h h ev s cl es s ys ys ys c g se et et en le le ra ra ra s rin si m
Conference Session
Embedded Systems and Mobile Computing
Collection
2014 ASEE Annual Conference & Exposition
Authors
Cory Brozina, Virginia Tech; David B. Knight, Virginia Tech Department of Engineering Education
Tagged Divisions
Computing & Information Technology
Paper ID #9264Credentialing MOOCs: A Case StudyMr. S. Cory Brozina, Virginia Tech Cory Brozina is a PhD student in the Engineering Education department at Virginia Tech. His research is in educational technology and data analysis.Dr. David B Knight, Virginia Tech Department of Engineering Education David Knight is an Assistant Professor in the Department of Engineering Education and affiliate faculty with the Higher Education Program at Virginia Tech. His research focuses on student learning outcomes in undergraduate engineering, interdisciplinary teaching and learning, organizational change in colleges and universities
Conference Session
Potpourri
Collection
2014 ASEE Annual Conference & Exposition
Authors
Reza Sanati-Mehrizy, Utah Valley University; Afsaneh Minaie, Utah Valley University; Ruhul H. Kuddus, Utah Valley University; Ali Sanati-Mehrizy; Paymon Sanati-Mehrizy, Icahn School of Medicine at Mount Sinai
Tagged Divisions
Computing & Information Technology
effects of climate change on public health in my research agenda. My research also involve data mining.Dr. Ali Sanati-Mehrizy Dr. Ali Sanati-Mehrizy is a Pediatric resident physician at Rutgers University - New Jersey Medical School in Newark, NJ. He is a graduate of the Milton S. Hershey Pennsylvania State University College of Medicine. He completed his undergraduate studies in Biology from the University of Utah. His research interests are varied and involve pediatric hematology and oncology as well as higher education curricula, both with universities and medical schools.Mr. Paymon Sanati-Mehrizy, Icahn School of Medicine at Mount Sinai Paymon is currently a medical student at the Icahn School of Medicine at Mount
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2014 ASEE Annual Conference & Exposition
Authors
Norman Pestaina, Florida International University; Tiana Solis, Florida International University; Peter J. Clarke, Florida International Univeristy
Tagged Divisions
Computing & Information Technology
(hoped) improvements, to a revised set of SOs. To that end, some desired attributes of the SeniorProject Rubric are evaluated:RQ1 (Applicability): Does the rubric’s methodology measure attainment of all of the SOs in ameaningful way? If not all, to which SOs is it not applicable?RQ2 (Extendibility): Is the rubric methodology(s) applicable to varied SO categories, and does itlend itself to fine tuning?RQ3 (Consistency): Is there reasonable expectation that repeated application of the rubric toidentical data should yield identical metrics? When there is not, can this shortcoming beameliorated?5.2 MethodThe sources of the data for this study are 22 capstone projects completed between Fall 2010 andSpring 2012, encompassing the efforts of about 82
Conference Session
New Trends in Computing and Information Technology Education
Collection
2014 ASEE Annual Conference & Exposition
Authors
Kien A. Hua, University of Central Florida; Gholam Ali Shaykhian, NASA; Robert J Beil, NASA Engineering and Safety Center; KUTALMIS AKPINAR, School of Electrical Engineering and Computer Science, University of Central Florida; Kyle A. Martin, University of Central Florida
Tagged Divisions
Computing & Information Technology
image-processing pipeline to provide a user-friendlyinterface for studying lunar imagery. The Geospatial Data Abstraction Library (GDAL) [14] isused to efficiently access LRO imagery stored in the PDS image file format. We use the LuceneImage Retrival (LIRE) library [15], [16] with the search engine to store and index landformfeature vectors for use during similarity search. NASA‟s World Wind library [17] is used toimplement a 3D interface (Figure 7) for viewing and interacting with GIS (GeographicInformation System) data sets. This approach is motivated by the fact that NASA scientists arealready familiar with the World Wind operating environment. The current prototype allows theuser to browse and search imagery to identify interesting
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2014 ASEE Annual Conference & Exposition
Authors
Francis Giraldeau, Polytechnique Montreal; Michel R. Dagenais, Ecole Polytechnique de Montreal; Hanifa Boucheneb, École Polytechnique de Montréal
Tagged Divisions
Computing & Information Technology
6e+07 6e+07 4e+07 4e+07 2e+07 2e+07 0 0 Time (s) Time (s) (a) Large heap allocation with fill (b) Large heap allocation without fill 7e+06 heap os 6e+06 5e+06
Conference Session
New Trends in Computing and Information Technology Education
Collection
2014 ASEE Annual Conference & Exposition
Authors
Stephen J. Zilora, Rochester Institute of Technology (CAST); Jim Leone
Tagged Divisions
Computing & Information Technology
-446.4. DeMarco, T. 1982. Controlling software projects: management, measurement & estimation. Yourdon Press, New York, NY.5. Humphrey, W. S. (1988). Characterizing the software process: a maturity framework. Software, IEEE, 5, 2 (March/April, 1998), 73-79.6. Kaner, M., and Karni, R. 2004. A capability maturity model for knowledge-based decision-making. Information, Knowledge, Systems Management, 4, 4 (December, 2004), 225-252.7. Keller, K., and Mack, B. 2013. Maturity Profile Reports (March 2013). Retrieved May 17, 2013 from http://cmmiinstitute.com/assets/presentations/2013MarCMMI.pdf.8. Kitson, D., and Masters, S. 1992. Analysis of SEI Software Process Assessment Results 1987-1991, Technical Report
Conference Session
Embedded Systems and Mobile Computing
Collection
2014 ASEE Annual Conference & Exposition
Authors
Vamshi Krishna Bolly, Purdue University; John Springer, Purdue University, West Lafayette, IN, USA; J. Eric Dietz, Purdue University
Tagged Divisions
Computing & Information Technology
Proceedings of the ACM 14th international workshop on Data Warehousing and OLAP, on pages 101-104, ACM, October, 2011.2. S. Amjad, S. Neelakrishnan, and R. Rudramoorthy. “Review of design considerations and technological challenges for successful development and deployment of plug-in hybrid electric vehicles,” in Renewable and Sustainable Energy Reviews, 14(3), on pages 1104-1110, 2010.3. The Apache Software Foundation, “Apache Hadoop,” http://hadoop.apache.org, February, 2014.4. “A commercialization project of Energy Systems Network,” http://www.energysystemsnetwork.com/project-summary-benefits, April, 2012.5. “Why Think City?,” http://thinkev.leftbankcompanies.com/why-think-city, December, 2013.6. J. Shafer, S
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2014 ASEE Annual Conference & Exposition
Authors
Mohammad Rafiq Muqri, DeVry University, Pomona; Hasan Muqri, UCLA; Shih Ek Chng, DeVry University, Pomona
Tagged Divisions
Computing & Information Technology
Page 24.866.4line legend('Euler solution','Exact solution') hold off error=norm(y-exactSolution)/norm(exactSolution); A general form of a second-order ODE is shown as follows: d2 y/dx2 + p(x)dy/dx + q(x)y + r(x) + s = 0 (1.2) Any high order ODE can be expressed as a coupled set of first -order differential equations. For example the second-order ODE given in equation (1.2) can be reduced to a coupled set of two first-order differential equations. d/dx(dy/dx) = - p(x)dy/dx – q(x)y – r(x) – s (1.3) d/dx(y) = dy/dxJava’s ODE ClassWe will use and demonstrate a class named ODESolver that will define a number ofmethods2 used to solve ODEs and also subclasses that can be used to represent
Conference Session
Potpourri
Collection
2014 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Reza Sanati-Mehrizy, Utah Valley University; Paymon Sanati-Mehrizy, Icahn School of Medicine at Mount Sinai; Ali Sanati-Mehrizy
Tagged Divisions
Computing & Information Technology
Pediatric resident physician at Rutgers University - New Jersey Medical School in Newark, NJ. He is a graduate of the Milton S. Hershey Pennsylvania State University College of Medicine. He completed his undergraduate studies in Biology from the University of Utah. His research interests are varied and involve pediatric hematology and oncology as well as higher education curricula, both with universities and medical schools. Page 24.1380.1 c American Society for Engineering Education, 2014 Wireless Sensor Networks Projects in a Computer Engineering ProgramAbstractWireless Sensor Networks
Conference Session
Embedded Systems and Mobile Computing
Collection
2014 ASEE Annual Conference & Exposition
Authors
Cho Sehyeong, Myong Ji University; Yeonseung Ryu, Myongji University; Sang-Kyun Kim, Myongji University
Tagged Divisions
Computing & Information Technology
thefunction call stack by a stack of parameters. CFL is tightly integrated into a web-basedinstruction system for efficient assigning of exercises, submitting, and grading6. Table 1. CFL node types processing type I/O node Decision Function node typical example(s) +, -, *, /, % putchar, scanf !=, ==, > ,=, <= return All operations are intentionally aligned with C language statements for easier transitionfrom CFL to C language. For instance, input statements “scanf” has not only the same name asin C language, but also has the
Conference Session
Information and Network Security
Collection
2014 ASEE Annual Conference & Exposition
Authors
Janusz Zalewski, Florida Gulf Coast University; Andrew J. Kornecki, Embry-Riddle Aeronautical Univ., Daytona Beach; Bogdan Denny Czejdo, Fayetteville State University; Fernando Garcia Gonzalez, Florida Gulf Coast University; Nary Subramanian, University of Texas, Tyler; Dawid Trawczynski, Advanced Micro Devices
Tagged Divisions
Computing & Information Technology
Security, Elsevier/Newnes, Amsterdam, 2012.3. Gebotys C.H., Security in Embedded Devices, Springer-Verlag, New York, 2010.4. Stapko T., Practical Embedded Security, Elsevier/Newnes, Amsterdam, 2008.5. Howard M., S. Lipner, Writing Secure Code. 2nd Edition, Microsoft Press, Redmond, Wash., 2003.6. Swiderski F., W. Snyder, Threat Modeling, Microsoft Press, Redmond, Wash., 2004.7. Howard M., S. Lipner, The Security Development Lifecycle, Microsoft Press, Redmond, Wash., 2006.8. Florida Gulf Coast University. Software Engineering Program. CEN 3213 Embedded Systems Programming. Topics on Security. Ft. Myers, Florida, December 2013. URL: http://satnet.fgcu.edu/CEN3213/9. Sun Microsystems. Java Security Overview. White Paper. April 2005. URL: http
Conference Session
Potpourri
Collection
2014 ASEE Annual Conference & Exposition
Authors
Jeremy Webb, Department of Mechanical and Biomedical Engineering Boise State University; Inanc Senocak, Boise State University; Dazhi Yang, Boise State University
Tagged Divisions
Computing & Information Technology
Applications, 2 nd edition. CRC Press,2008.24. Slotta, J. D. In defense of Chi’s ontological incompatibility hypothesis. The Journal of theLearning Sciences, 2011, 20, 151–162.25. Sonntag, Richard E.; Borgnakke, C.; Van Wylen, Gordon J. Fundamentals of Thermodynamics, 6 th edition. NewYork: J. Wiley, 200326. Streveler, R. A., Geist, M. R., Ammerman, R.F., Sulzbach, C. S., Miller, R. L., Olds, B. M., & Nelson, M. A.The development of a professional knowledge base: The persistence of substance based schemas in engineeringstudents. Paper presented at the Annual Meeting of the American Educational Research Association, 2006, Chicago,IL.27. Tipler, Paul A.; Mosca, Gene. Physics for Scientists and Engineers: with Modern Physics, 6 th edition.New York
Conference Session
New Trends in Computing and Information Technology Education
Collection
2014 ASEE Annual Conference & Exposition
Authors
Tanya Stanko P.E., Innopolis University; Oksana Zhirosh, Unium
Tagged Divisions
Computing & Information Technology
] 4. De Pablos, Juan (2010). “Higher Education and the Knowledge Society. Information and Digital Competencies”, Information and Digital Competencies in Higher Education, Revista de Universidad y Sociedad del Conocimiento (RUSC). Vol. 7, No 2. 5. EAEA General Assembly (2003), “Definition and Selection of Competencies: Theoretical and Conceptual Foundations (DeSeCo): Strategy Paper on Key Competencies – An overarching frame of reverence for an assessment and research program “, [online] Available at: Page 24.534.9 http://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&
Conference Session
New Trends in Computing and Information Technology Education
Collection
2014 ASEE Annual Conference & Exposition
Authors
Vicky L. Smith, Indiana University Purdue University, Indianapolis; Eugenia Fernandez, Indiana University Purdue University, Indianapolis
Tagged Divisions
Computing & Information Technology
Science Teaching, 42(5), 36-41.9. Hoyt, J. E., & Winn, B. A. (2004). Understanding retention and college student bodies: Differences between drop-outs, stop-outs, opt-outs, and transfer-outs. NASPA Journal (National Association of Student Personnel Administrators, Inc.), 41(3), 395-417.10. Divjak, B., Ostroski, M., & Hains, V. V. (2010). Sustainable student retention and gender issues in mathematics for ICT study. International Journal of Mathematical Education in Science & Technology, 41(3), 293-310. doi: 10.1080/0020739090339841611. Wasburn, M. H., & Miller, S. G. (2008). Keeping women students in technology: Preliminary evaluation of an intervention. Journal of College Student Retention: Research
Conference Session
Information and Network Security
Collection
2014 ASEE Annual Conference & Exposition
Authors
Jane LeClair, National Cybersecurity Institute at Excelsior College; Denise Pheils, National Cybersecurity Institute
Tagged Divisions
Computing & Information Technology
spending on protection.” Bernstein Global Wealth Management October. p1-188.6. Finkle, J. (2013) Retrieved from the internet on 12/29/2013 at http://www.reuters.com/article/2013/12/19/us-target-breach-idUSBRE9BH1GX201312197. Kaplan, D. (2013) Retrieved from the internet on 12/24/2013 http://www.scmagazine.com/data-breach-lawsuits-roll-on-as-lawyers-work-to-establish-legal-precedent/article/309439/8. Kerner, S. (2013). “Cyber-crime costs continue to rise: Study”. eWeek. 10/8/2013, p2-2.9. LeClair, J. (2013). Protecting our future: Educating a cybersecurity workforce. Albany, NY. Hudson Whitman/Excelsior College Press.10. Lynch, M. (2009). “TJX settles cyber-breach case.” Women's Wear Daily. 197(131
Conference Session
Embedded Systems and Mobile Computing
Collection
2014 ASEE Annual Conference & Exposition
Authors
Mohammad Rafiq Muqri, DeVry University, Pomona; Brian Joseph Lane
Tagged Divisions
Computing & Information Technology
, February 2003, http://pj.freefaculty.org/ps905/ObjC.pdf5. Altenberg, B., Clarke, A., Mougin, P., Become an Xcoder : Start Programming the Mac Using Objective-C, CocoaLab, 2008, http://www.e-booksdirectory.com/details.php?ebook=38326. Kochan, S. G., Programming in Objective-C, Addison-Wesley, August 2011.7. Cocoa Developers Guide, Apple Developer Publications, December 2010, http://itunes.apple.com/us/book/cocoa-fundamentals- guide/id409921412?mt=118. Deitel, H.M., Deitel, P.J., Java How to program, Prentice Hall, 2003 Page 24.234.12Appendix A: Bluetooth Project Class Definitions and Pairing MethodsIOBluetoothAn
Conference Session
Potpourri
Collection
2014 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Reza Sanati-Mehrizy, Utah Valley University; Paymon Sanati-Mehrizy, Icahn School of Medicine at Mount Sinai; Ali Sanati-Mehrizy
Tagged Divisions
Computing & Information Technology
resident physician at Rutgers University - New Jersey Medical School in Newark, NJ. He is a graduate of the Milton S. Hershey Pennsylvania State University College of Medicine. He completed his undergraduate studies in Biology from the University of Utah. His research interests are varied and involve pediatric hematology and oncology as well as higher education curricula, both with universities and medical schools. Page 24.306.1 c American Society for Engineering Education, 2014 Computer Engineering Program at Utah Valley UniversityAbstractThis paper elaborates the detail content
Conference Session
Embedded Systems and Mobile Computing
Collection
2014 ASEE Annual Conference & Exposition
Authors
Javad Shakib, DeVry University, Pomona; Mohammad Rafiq Muqri, DeVry University, Pomona
Tagged Divisions
Computing & Information Technology
. Although we made a comprehensive comparisonbetween two boards and we used the tower as the primary board, I should emphasize that we areteaching principles. The platform we have is sufficient to teach everything the students need toknow at this point in time...Unless there is a compelling reason to change the platform, we should stick with what we havefor a significant amount of time.References1. L. J. McKenzie, M. S. Trevisan, D. C. Davis, and S.W. Beyerlein, “Capstone design courses and assessment: A national study,” in Proceedings 2004 ASEE Annual Conference and Expo., Salt Lake Page 24.1012.10 City, Utah, USA, 2004, pp. 1-14.2. http
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2014 ASEE Annual Conference & Exposition
Authors
Jeffrey Chastine, Southern Polytechnic State University (ENG); Charles Richard Cole, Southern Polytechnic State University; Christopher Welty, Southern Polytechnic State University
Tagged Divisions
Computing & Information Technology
mini-map in Figure 4. As dis-cussed later, the view was changed to a first-person point of view and enabled the player to shootenemy turrets along the path. The view also contained several visual elements to indicate thestatus (e.g. health, shields, etc.) of each ship in the convoy. Figure 4. MT-18’s first-person view and overhead mini-mapIn trying to satisfy the constraints of both architecture and gaming, students needed to be clever.Architecture students expressed interest in seeing their models not only from a specific view-point (~ 5 to 6 feet above the ground), but were also interested in visualizing the models in theirentirety. All groups used different approaches for this constraint, but were able to integrate these
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2014 ASEE Annual Conference & Exposition
Authors
Reneta Davina Lansiquot, New York City College of Technology; Ashwin Satyanarayana, New York City College of Technology; Candido Cabo, New York City College of Technology/CUNY
Tagged Divisions
Computing & Information Technology
). CUNY Student Experience Survey. New York City College ofTechnology, CUNY.[2] Barnett, S. & Ceci, S (2002). When and where do we apply what we learn? A taxonomy for far transfer.Psychological Bulletin, 128(4), 612-637.[3] Benander, R., & Lightner, R. (2005). Promoting transfer of learning: Connecting general education courses. TheJournal of General Education, 54 (3), 199-208.[4] Cabo, C., & Lansiquot, R. D. (2013). Development of interdisciplinary problem-solving strategies throughgames and computer simulations. In R. D. Lansiquot (Ed.) Cases on interdisciplinary research trends in science,technology, engineering, and mathematics: Studies on urban classrooms (pp. 268-294). New York: IGI Global.[5] Campbell, J. (1949). The hero with
Conference Session
Emerging Computing and Information Technologies
Collection
2014 ASEE Annual Conference & Exposition
Authors
Raymond A. Hansen, Purdue University; Tomasz Wiktor Wlodarczyk, University of Stavanger; Thomas J. Hacker, Purdue University, West Lafayette
Tagged Divisions
Computing & Information Technology
]. Available: http://shop.oreilly.com/product/0636920022466.do. [Accessed: 09-Aug-2013]13. N. Burlingame, The Little Book of DATA SCIENCE, 2012 Edition. New Street Communications, LLC, 2012.14. N. Burlingame and L. Nielsen, A simple introduction to data science. Wickford, RI: New Street Communications, 2012.15. J. Lin, Data-intensive text processing with MapReduce. [San Rafael, Calif.]: Morgan & Claypool Publishers, 2010 [Online]. Available: http://www.morganclaypool.com/doi/abs/10.2200/S00274ED1V01Y201006HLT007. [Accessed: 09-Aug- 2013]16. D. Miner and A. Shook, “MapReduce design patterns,” 2012. .17. S. Owen, Mahout in action. Shelter Island, N.Y.: Manning Publications Co., 2012.18. E. Hewitt, Cassandra