Asee peer logo
Displaying all 10 results
Conference Session
Emerging Information Technologies
Collection
2012 ASEE Annual Conference & Exposition
Authors
Lakshmi Ramachandran, North Carolina State University; Edward F. Gehringer, North Carolina State University
Tagged Divisions
Computing & Information Technology
review wesee that the advisory part is more pronounced than the summative part and therefore such areview gets classified as an advisory review.2.2.3. Quantity of FeedbackText quantity is important in determining review quality since a good review must provide theauthor with sufficient feedback. We plan on using this metric to indicate to the reviewer theamount of feedback he/she has provided in comparison to the average review quantity (fromother reviewers of the system), thus motivating them to provide more feedback to the authors.Quantity of feedback is identified by taking a count of all the unique tokens in a piece of review Page
Conference Session
Information and Network Security
Collection
2012 ASEE Annual Conference & Exposition
Authors
Tokunbo Ogunfunmi, Santa Clara University
Tagged Divisions
Computing & Information Technology
provide examples of the curriculum,what is covered and how we cover it. We also provide examples of laboratory projectsthat are used to complement the class lecture sessions. We use MATLAB software in allthe lab projects.We also discuss possible implementations of the speech coding and processing usinghardware such as DSPs. In the future, we plan to introduce the use of FPGAs for thisapplication as well.Details of the course and our experiences in developing and offering them will bepresented at the conference.IntroductionPreviously, we have developed three graduate-level courses in the Multimedia area ofSpeech to teach the fundamentals of speech coding and voice-over-IP. They are a 3-course sequence (1) ELEN 421 (Speech Coding I) (2) ELEN 422
Conference Session
Curricular Issues in Computer-oriented Programs
Collection
2012 ASEE Annual Conference & Exposition
Authors
Ibraheem A. Kateeb, North Carolina A&T State University; Larry Burton, North Carolina A&T State University; Naser El-Bathy P.E., North Carolina A&T State University; Michael S. Peluso, North Carolina A&T State Univerisity
Tagged Divisions
Computing & Information Technology
these being successful are rare 11VII. Cables vs. Wireless (pros and cons)January 9, 2007, was a watershed moment for the telecommunications industry. This was theday that the late Steve Jobs and Apple computer introduced the iPhone. Very quickly after itsrelease it became apparent that the iPhone was going to be a disruptive technology in thewireless segment of the telecommunications industry. In the same way that wired internets“always on” and unmetered connection changed the way people were able to consume Internetcontent on their home computers, the iPhones required data plan changed the way peopleconsumed information. Use patterns and service expectations formerly only reserved for wireline providers were not also understood to be
Conference Session
Potpourri
Collection
2012 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Ali Sanati-Mehrizy, Pennsylvania State University; Paymon Sanati-Mehrizy, University of Pennsylvania; Reza Sanati-Mehrizy, Utah Valley University
Tagged Divisions
Computing & Information Technology
graduation, Sanati-Mehrizy plans to attend medical school.Dr. Reza Sanati-Mehrizy, Utah Valley University Reza Sanati-Mehrizy is a professor of the Computing Sciences Department at Utah Valley University, Orem, Utah. He received his M.S. and Ph.D. in computer science from the University of Oklahoma, Norman, Okla. His research focuses on diverse areas, such as database design, data structures, artificial intelligence, robotics, computer integrated manufacturing, data mining, data warehousing, and machine learning. Page 25.338.1 c American Society for Engineering Education, 2012
Conference Session
Information and Network Security
Collection
2012 ASEE Annual Conference & Exposition
Authors
Mudasser Fraz Wyne, National University; Gregory Stuart Rogers; Preston Jay Mendoza, National University
Tagged Divisions
Computing & Information Technology
teamcollaboration. 3.6. Data Entry and QueriesOnce the schema SQL script was executed, error free, within the MySQL workbenchenvironment, test data was entered. The original queries were taken from the Access databaseand altered (both in their commands and semantics) to fit the newly created schema residing inthe MySQL environment. Ultimately, the results of the queries populate the reports generated inthe web-based User Interface (UI) application or “front-end” for the database user to completethe task. The intent was to retain the original capability of the Access database (i.e. keep all thequeries for report generation) but use an open source SQL schema and a web-based applicationfor user presentation. In addition it was planned that any user based
Conference Session
Innovations in Computing Education
Collection
2012 ASEE Annual Conference & Exposition
Authors
Mohammad Rafiq Muqri, DeVry University, Pomona; James R. Lewis, DeVry University, Pomona
Tagged Divisions
Computing & Information Technology
MainStoryboard.storyboard to plan Calculator layout. 3. Create a label and appropriate buttons for digits (0-9) entered as well as for four Page 25.985.13 operations (+, -, *, /) and Enter button. We need an Enter button because a RPN calculator puts all of its operands on a stack and then operates on them. Enter is used to push a number onto the operand stack. For example 3 Enter 4 Enter * results in 12 4. Control-click-drag from the label you created in the View window to the UILabel IBOutlet property display. 5. Control-click-drag from each button in the View window to the appropriate IBAction method. For each digit button, you
Conference Session
Potpourri
Collection
2012 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Ali Sanati-Mehrizy, Pennsylvania State University; Paymon Sanati-Mehrizy, University of Pennsylvania; Reza Sanati-Mehrizy, Utah Valley University
Tagged Divisions
Computing & Information Technology
networking. After graduation, Sanati-Mehrizy plans to attend medical school.Dr. Reza Sanati-Mehrizy, Utah Valley University Reza Sanati-Mehrizy is a professor of the Computing Sciences Department at Utah Valley University, Orem, Utah. He received his M.S. and Ph.D. in computer science from the University of Oklahoma, Norman, Okla. His research focuses on diverse areas, such as database design, data structures, artificial intelligence, robotics, computer integrated manufacturing, data mining, data warehousing, and machine learning. Page 25.823.1 c American Society for Engineering
Conference Session
Curricular Issues in Computer-oriented Programs
Collection
2012 ASEE Annual Conference & Exposition
Authors
Jason St. John, Purdue University, West Lafayette; Thomas J. Hacker, Purdue University, West Lafayette
Tagged Divisions
Computing & Information Technology
virtual HPC cluster • Hands-on experience in virtualization, cloud computing technologies, and networking • Introduction to MPI (message passing interface) 3 , high performance LINPACK (HPL) 21 , and HPC system schedulers like TORQUE 18 • Students exposed to an IaaS tool via OpenNebula • Students gain experience in planning, designing, building, and benchmarking deployed VMs within each student’s virtual HPC cluster6 Our ApproachEach student was assigned 16 recycled computer lab desktop computers and a recycled monitorfrom Purdue University’s IT department, a commodity Gigabit Ethernet network switch, a fewcarts to store the computers and monitor on, and a number of other peripherals and cablesrequired to use the equipment. Each
Conference Session
Emerging Information Technologies
Collection
2012 ASEE Annual Conference & Exposition
Authors
Erin Shaw, University of Southern California; Michael Crowley, University of Southern California; Jaebong Yoo, University of Southern California; Hao Xu, University of Southern California; Jihie Kim, University of Southern California
Tagged Divisions
Computing & Information Technology
support social and collaborative graph annotation tofacilitate data understanding by social scientists and intelligence analysts. Each of thesecommunities desired to understand data from their unique perspectives, and came to anunderstanding based on the underlying flexibility of the tools. However, sophisticated dataanalysis tools are expensive and instructional needs are unique to each class. Moreover, becauseof the instructor’s unique relationship with the course data, we felt it was important to usecurrent and authentic data. We do, however, plan to interview different instructors about thissame data in the future, and so will be looking at this issue in more depth.ConclusionsThe Pedagogical Workflows team has been developing graphs to
Conference Session
Curricular Issues in Computer-oriented Programs
Collection
2012 ASEE Annual Conference & Exposition
Authors
Naser El-Bathy P.E., North Carolina A&T State University; Clay Samuel Gloster Jr., North Carolina A&T State University; Ghassan M. Azar; Cameron Seay, North Carolina A&T State Univeristy; Mohammed K. El-Bathy, Lawrence Technological University; Ibraheem A. Kateeb, North Carolina A&T State University; Rajeev K. Agrawal, North Carolina A&T State University; Aiman Ghassan Baset
Tagged Divisions
Computing & Information Technology
get students to be familiar withthese concepts to develop the course project. The instructor divided the class into teams. Eachteam member had a primary task with his/her team and a secondary task with other teams. Eachteam selected a team leader. The role of team leaders was assigning a task to each team member,clarifying the procedures of each task, solving problems, and providing a weekly progress reportto the project manager, the instructor. The tasks are based on Software Development Life-Cycle(SDLC) phases. These phases are planning, implementation, testing, documenting, Deployment,and maintenance. The students trained on each of these phases.At the same time, the instructor initiated IT Research Methodology that the students