various professional IT consulting assign- ments. Dr. Ghani holds MSEE from Illinois Institute of Technology, MBA from Keller Graduate School of Management and Doctorate from Northern Illinois University.Dr. Ahmed S. Khan, DeVry University, DuPage Dr. Ahmed S. Khan is a Senior Professor in the College of Engineering and Information Sciences at DeVry University, Addison, Illinois. Dr. Khan has more than thirty years of experience in research, instruction, curricula design, development, evaluation, implementation and program accreditation, management and supervision. Dr. Khan received an MSEE from Michigan Technological University, an MBA from Keller Graduate School of Management., and his Ph.D. from Colorado
Paper ID #10954Gamification of Physical Therapy for the Treatment of Pediatric CerebralPalsy: A Pilot Study Examining Player PreferencesDr. David M Whittinghill, Purdue University, West Lafayette Dr. David Whittinghill is an Assistant Professor of Computer Graphics Technology and Computer and Information Technology. Dr. Whittinghill’ s research focuses on simulation, gaming and computer pro- gramming and how these technologies can more effectively address outstanding issues in health, educa- tion, and society in general. Dr. Whittinghill leads projects in pediatric physical therapy, sustainable energy simulation, phobia
) to store large amounts of data. Itis designed to make web scale computing easier for developers. The AS3 provides asimple web services interface that can be used to store and retrieve any amount of data, atany time, from anywhere on the web5. It gives any developers access to the same highlyscalable, reliable, secure, fast, inexpensive infrastructure that Amazon uses to run its ownglobal network of web sites. The service aims to maximize benefits of scale and to passthose benefits on to developers. Data stored in AS3 is secured by default. AS3 supportsmultiple access control mechanisms, as well as encryption for both secure transit andsecure storage on disk. With AS3’s data protection features, the user can protect data
Paper ID #8728Computing Tools in an Advanced Filter Theory CourseDr. S. Hossein Mousavinezhad, Idaho State University Dr. Mousavinezhad is an active member of IEEE and ASEE having chaired sessions in national and re- gional conferences. He is an ABET Program Evaluator (PEV.) He is the Founding General Chair of the IEEE International Electro Information Technology Conferences, www.eit-conference.org and served as 2002/2003 ASEE ECE Division Chair. He is a panelist for the National Science Foundation, has published a book in hand-held computing in 2013 and received an NSF grant (Enhancing Access to Radio Spec- trum
ate upd rds A hea ccess processing nd n g a reco lth ing Data s i e car & es car e B upd Acc ealth
, and Mathematics) project, award number DUE-1140502. Any opinions, findings, and conclusions or recommendations expressed in this materialare those of the authors and do not necessarily reflect the views of the National Science Foundation.References[1] Elliott, S. and Kukula, E. (2007), The Challenges Associated with Laboratory-Based Distance Education, EDUCASE Quarterly, pp. 37-42.[2] Saleem, A. I. and Al-Aubidy, K. M. (2008), Mixed Reality Environment for Web-Based Laboratory Interactive Learning, International Journal of Online Engineering, 4(1), pp. 40-45[3] Gomes, L. and Bogosyan, S. (2009). Current Trends in Remote Laboratories, IEEE Transactions on Industrial Electronics, 56(12), pp. 4744-4756.[4] García
questions: what information isrelevant to the studied attack, where related fingerprint items can be located, and whatinformation each piece of fingerprint can indicate. Also, an evidence tree can provide thecontextual information to correlate attack operations by examine the fingerprints theyproduce. Furthermore, the contextual information provided to an incident tracking softwaremay have the potential of automating attack reconstruction. Page 24.1075.11References[1] Biggs, S. and Vidalis, S. (2009). Cloud Computing: The Impact on Digital Forensic Investigations. InProceeding of the International Conference on Internet Technology and Secured
mixed-mode (MPI-OpenMP) parallel implementation, including performance and scalability studies, carried out inour 16-node, 64 processor cluster.Based on the prime factor decomposition of the signal length this algorithm, which is based on ablock diagonal factorization of the circulant matrices, breaks a one-dimensional cyclicconvolution into shorter cyclic sub-convolutions. The subsections can be processed,independently, either in serial or parallel mode. The only requirement is that the signal length, N,admits at least an integer, r0, as a factor; N = r0.s. The Argawal-Cooley Cyclic Convolutionalgorithm, has a similar capability but requires that the signal length can be factored intomutually prime factors; N = r0.s with (r0,s) = 1. Since the
cl t s gn se t st ct h h ev s cl es s ys ys ys c g se et et en le le ra ra ra s rin si m
Paper ID #9264Credentialing MOOCs: A Case StudyMr. S. Cory Brozina, Virginia Tech Cory Brozina is a PhD student in the Engineering Education department at Virginia Tech. His research is in educational technology and data analysis.Dr. David B Knight, Virginia Tech Department of Engineering Education David Knight is an Assistant Professor in the Department of Engineering Education and affiliate faculty with the Higher Education Program at Virginia Tech. His research focuses on student learning outcomes in undergraduate engineering, interdisciplinary teaching and learning, organizational change in colleges and universities
effects of climate change on public health in my research agenda. My research also involve data mining.Dr. Ali Sanati-Mehrizy Dr. Ali Sanati-Mehrizy is a Pediatric resident physician at Rutgers University - New Jersey Medical School in Newark, NJ. He is a graduate of the Milton S. Hershey Pennsylvania State University College of Medicine. He completed his undergraduate studies in Biology from the University of Utah. His research interests are varied and involve pediatric hematology and oncology as well as higher education curricula, both with universities and medical schools.Mr. Paymon Sanati-Mehrizy, Icahn School of Medicine at Mount Sinai Paymon is currently a medical student at the Icahn School of Medicine at Mount
(hoped) improvements, to a revised set of SOs. To that end, some desired attributes of the SeniorProject Rubric are evaluated:RQ1 (Applicability): Does the rubric’s methodology measure attainment of all of the SOs in ameaningful way? If not all, to which SOs is it not applicable?RQ2 (Extendibility): Is the rubric methodology(s) applicable to varied SO categories, and does itlend itself to fine tuning?RQ3 (Consistency): Is there reasonable expectation that repeated application of the rubric toidentical data should yield identical metrics? When there is not, can this shortcoming beameliorated?5.2 MethodThe sources of the data for this study are 22 capstone projects completed between Fall 2010 andSpring 2012, encompassing the efforts of about 82
image-processing pipeline to provide a user-friendlyinterface for studying lunar imagery. The Geospatial Data Abstraction Library (GDAL) [14] isused to efficiently access LRO imagery stored in the PDS image file format. We use the LuceneImage Retrival (LIRE) library [15], [16] with the search engine to store and index landformfeature vectors for use during similarity search. NASA‟s World Wind library [17] is used toimplement a 3D interface (Figure 7) for viewing and interacting with GIS (GeographicInformation System) data sets. This approach is motivated by the fact that NASA scientists arealready familiar with the World Wind operating environment. The current prototype allows theuser to browse and search imagery to identify interesting
6e+07 6e+07 4e+07 4e+07 2e+07 2e+07 0 0 Time (s) Time (s) (a) Large heap allocation with fill (b) Large heap allocation without fill 7e+06 heap os 6e+06 5e+06
-446.4. DeMarco, T. 1982. Controlling software projects: management, measurement & estimation. Yourdon Press, New York, NY.5. Humphrey, W. S. (1988). Characterizing the software process: a maturity framework. Software, IEEE, 5, 2 (March/April, 1998), 73-79.6. Kaner, M., and Karni, R. 2004. A capability maturity model for knowledge-based decision-making. Information, Knowledge, Systems Management, 4, 4 (December, 2004), 225-252.7. Keller, K., and Mack, B. 2013. Maturity Profile Reports (March 2013). Retrieved May 17, 2013 from http://cmmiinstitute.com/assets/presentations/2013MarCMMI.pdf.8. Kitson, D., and Masters, S. 1992. Analysis of SEI Software Process Assessment Results 1987-1991, Technical Report
Proceedings of the ACM 14th international workshop on Data Warehousing and OLAP, on pages 101-104, ACM, October, 2011.2. S. Amjad, S. Neelakrishnan, and R. Rudramoorthy. “Review of design considerations and technological challenges for successful development and deployment of plug-in hybrid electric vehicles,” in Renewable and Sustainable Energy Reviews, 14(3), on pages 1104-1110, 2010.3. The Apache Software Foundation, “Apache Hadoop,” http://hadoop.apache.org, February, 2014.4. “A commercialization project of Energy Systems Network,” http://www.energysystemsnetwork.com/project-summary-benefits, April, 2012.5. “Why Think City?,” http://thinkev.leftbankcompanies.com/why-think-city, December, 2013.6. J. Shafer, S
Page 24.866.4line legend('Euler solution','Exact solution') hold off error=norm(y-exactSolution)/norm(exactSolution); A general form of a second-order ODE is shown as follows: d2 y/dx2 + p(x)dy/dx + q(x)y + r(x) + s = 0 (1.2) Any high order ODE can be expressed as a coupled set of first -order differential equations. For example the second-order ODE given in equation (1.2) can be reduced to a coupled set of two first-order differential equations. d/dx(dy/dx) = - p(x)dy/dx – q(x)y – r(x) – s (1.3) d/dx(y) = dy/dxJava’s ODE ClassWe will use and demonstrate a class named ODESolver that will define a number ofmethods2 used to solve ODEs and also subclasses that can be used to represent
Pediatric resident physician at Rutgers University - New Jersey Medical School in Newark, NJ. He is a graduate of the Milton S. Hershey Pennsylvania State University College of Medicine. He completed his undergraduate studies in Biology from the University of Utah. His research interests are varied and involve pediatric hematology and oncology as well as higher education curricula, both with universities and medical schools. Page 24.1380.1 c American Society for Engineering Education, 2014 Wireless Sensor Networks Projects in a Computer Engineering ProgramAbstractWireless Sensor Networks
thefunction call stack by a stack of parameters. CFL is tightly integrated into a web-basedinstruction system for efficient assigning of exercises, submitting, and grading6. Table 1. CFL node types processing type I/O node Decision Function node typical example(s) +, -, *, /, % putchar, scanf !=, ==, > ,=, <= return All operations are intentionally aligned with C language statements for easier transitionfrom CFL to C language. For instance, input statements “scanf” has not only the same name asin C language, but also has the
Security, Elsevier/Newnes, Amsterdam, 2012.3. Gebotys C.H., Security in Embedded Devices, Springer-Verlag, New York, 2010.4. Stapko T., Practical Embedded Security, Elsevier/Newnes, Amsterdam, 2008.5. Howard M., S. Lipner, Writing Secure Code. 2nd Edition, Microsoft Press, Redmond, Wash., 2003.6. Swiderski F., W. Snyder, Threat Modeling, Microsoft Press, Redmond, Wash., 2004.7. Howard M., S. Lipner, The Security Development Lifecycle, Microsoft Press, Redmond, Wash., 2006.8. Florida Gulf Coast University. Software Engineering Program. CEN 3213 Embedded Systems Programming. Topics on Security. Ft. Myers, Florida, December 2013. URL: http://satnet.fgcu.edu/CEN3213/9. Sun Microsystems. Java Security Overview. White Paper. April 2005. URL: http
Applications, 2 nd edition. CRC Press,2008.24. Slotta, J. D. In defense of Chi’s ontological incompatibility hypothesis. The Journal of theLearning Sciences, 2011, 20, 151–162.25. Sonntag, Richard E.; Borgnakke, C.; Van Wylen, Gordon J. Fundamentals of Thermodynamics, 6 th edition. NewYork: J. Wiley, 200326. Streveler, R. A., Geist, M. R., Ammerman, R.F., Sulzbach, C. S., Miller, R. L., Olds, B. M., & Nelson, M. A.The development of a professional knowledge base: The persistence of substance based schemas in engineeringstudents. Paper presented at the Annual Meeting of the American Educational Research Association, 2006, Chicago,IL.27. Tipler, Paul A.; Mosca, Gene. Physics for Scientists and Engineers: with Modern Physics, 6 th edition.New York
] 4. De Pablos, Juan (2010). “Higher Education and the Knowledge Society. Information and Digital Competencies”, Information and Digital Competencies in Higher Education, Revista de Universidad y Sociedad del Conocimiento (RUSC). Vol. 7, No 2. 5. EAEA General Assembly (2003), “Definition and Selection of Competencies: Theoretical and Conceptual Foundations (DeSeCo): Strategy Paper on Key Competencies – An overarching frame of reverence for an assessment and research program “, [online] Available at: Page 24.534.9 http://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&
Science Teaching, 42(5), 36-41.9. Hoyt, J. E., & Winn, B. A. (2004). Understanding retention and college student bodies: Differences between drop-outs, stop-outs, opt-outs, and transfer-outs. NASPA Journal (National Association of Student Personnel Administrators, Inc.), 41(3), 395-417.10. Divjak, B., Ostroski, M., & Hains, V. V. (2010). Sustainable student retention and gender issues in mathematics for ICT study. International Journal of Mathematical Education in Science & Technology, 41(3), 293-310. doi: 10.1080/0020739090339841611. Wasburn, M. H., & Miller, S. G. (2008). Keeping women students in technology: Preliminary evaluation of an intervention. Journal of College Student Retention: Research
spending on protection.” Bernstein Global Wealth Management October. p1-188.6. Finkle, J. (2013) Retrieved from the internet on 12/29/2013 at http://www.reuters.com/article/2013/12/19/us-target-breach-idUSBRE9BH1GX201312197. Kaplan, D. (2013) Retrieved from the internet on 12/24/2013 http://www.scmagazine.com/data-breach-lawsuits-roll-on-as-lawyers-work-to-establish-legal-precedent/article/309439/8. Kerner, S. (2013). “Cyber-crime costs continue to rise: Study”. eWeek. 10/8/2013, p2-2.9. LeClair, J. (2013). Protecting our future: Educating a cybersecurity workforce. Albany, NY. Hudson Whitman/Excelsior College Press.10. Lynch, M. (2009). “TJX settles cyber-breach case.” Women's Wear Daily. 197(131
, February 2003, http://pj.freefaculty.org/ps905/ObjC.pdf5. Altenberg, B., Clarke, A., Mougin, P., Become an Xcoder : Start Programming the Mac Using Objective-C, CocoaLab, 2008, http://www.e-booksdirectory.com/details.php?ebook=38326. Kochan, S. G., Programming in Objective-C, Addison-Wesley, August 2011.7. Cocoa Developers Guide, Apple Developer Publications, December 2010, http://itunes.apple.com/us/book/cocoa-fundamentals- guide/id409921412?mt=118. Deitel, H.M., Deitel, P.J., Java How to program, Prentice Hall, 2003 Page 24.234.12Appendix A: Bluetooth Project Class Definitions and Pairing MethodsIOBluetoothAn
resident physician at Rutgers University - New Jersey Medical School in Newark, NJ. He is a graduate of the Milton S. Hershey Pennsylvania State University College of Medicine. He completed his undergraduate studies in Biology from the University of Utah. His research interests are varied and involve pediatric hematology and oncology as well as higher education curricula, both with universities and medical schools. Page 24.306.1 c American Society for Engineering Education, 2014 Computer Engineering Program at Utah Valley UniversityAbstractThis paper elaborates the detail content
. Although we made a comprehensive comparisonbetween two boards and we used the tower as the primary board, I should emphasize that we areteaching principles. The platform we have is sufficient to teach everything the students need toknow at this point in time...Unless there is a compelling reason to change the platform, we should stick with what we havefor a significant amount of time.References1. L. J. McKenzie, M. S. Trevisan, D. C. Davis, and S.W. Beyerlein, “Capstone design courses and assessment: A national study,” in Proceedings 2004 ASEE Annual Conference and Expo., Salt Lake Page 24.1012.10 City, Utah, USA, 2004, pp. 1-14.2. http
mini-map in Figure 4. As dis-cussed later, the view was changed to a first-person point of view and enabled the player to shootenemy turrets along the path. The view also contained several visual elements to indicate thestatus (e.g. health, shields, etc.) of each ship in the convoy. Figure 4. MT-18’s first-person view and overhead mini-mapIn trying to satisfy the constraints of both architecture and gaming, students needed to be clever.Architecture students expressed interest in seeing their models not only from a specific view-point (~ 5 to 6 feet above the ground), but were also interested in visualizing the models in theirentirety. All groups used different approaches for this constraint, but were able to integrate these
). CUNY Student Experience Survey. New York City College ofTechnology, CUNY.[2] Barnett, S. & Ceci, S (2002). When and where do we apply what we learn? A taxonomy for far transfer.Psychological Bulletin, 128(4), 612-637.[3] Benander, R., & Lightner, R. (2005). Promoting transfer of learning: Connecting general education courses. TheJournal of General Education, 54 (3), 199-208.[4] Cabo, C., & Lansiquot, R. D. (2013). Development of interdisciplinary problem-solving strategies throughgames and computer simulations. In R. D. Lansiquot (Ed.) Cases on interdisciplinary research trends in science,technology, engineering, and mathematics: Studies on urban classrooms (pp. 268-294). New York: IGI Global.[5] Campbell, J. (1949). The hero with
]. Available: http://shop.oreilly.com/product/0636920022466.do. [Accessed: 09-Aug-2013]13. N. Burlingame, The Little Book of DATA SCIENCE, 2012 Edition. New Street Communications, LLC, 2012.14. N. Burlingame and L. Nielsen, A simple introduction to data science. Wickford, RI: New Street Communications, 2012.15. J. Lin, Data-intensive text processing with MapReduce. [San Rafael, Calif.]: Morgan & Claypool Publishers, 2010 [Online]. Available: http://www.morganclaypool.com/doi/abs/10.2200/S00274ED1V01Y201006HLT007. [Accessed: 09-Aug- 2013]16. D. Miner and A. Shook, “MapReduce design patterns,” 2012. .17. S. Owen, Mahout in action. Shelter Island, N.Y.: Manning Publications Co., 2012.18. E. Hewitt, Cassandra