Asee peer logo
Displaying all 29 results
Conference Session
Computing Technology Applications-I
Collection
2018 ASEE Annual Conference & Exposition
Authors
Raja S. Kushalnagar, Gallaudet University; Gary W. Behm, Rochester Institute of Technology; Kevin T. Wolfe; Peter Yeung; Becca Dingman; Shareef Sayel Ali, Center on Access Technology ; Abraham Glasser, Rochester Institute of Technology; Claire Elizabeth Ryan
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Paper ID #22803RTTD-ID: Tracked Captions with Multiple Speakers for Deaf StudentsDr. Raja S. Kushalnagar, Gallaudet University Raja Kushalnagar is the Director of the Information Technology program in the Department of Science, Technology and Mathematics at Gallaudet University in Washington, DC. His research interests encom- pass the fields of accessible computing and accessibility/intellectual property law, with the goal of improv- ing information access for deaf and hard of hearing (deaf) individuals. In the accessible computing field, he investigates information access disparities between hearing and deaf. For
Conference Session
Computing & Information Technology: Curriculum and Assessment
Collection
2018 ASEE Annual Conference & Exposition
Authors
Shanon Marie Reckinger, Stanford University; Bryce E. Hughes, Montana State University
Tagged Divisions
Computing and Information Technology
http://www.ncsu.edu/felder-public/ILSdir/styles.pdf.Freeman, S., Eddy, S. L., McDonough, M., Smith, M. K., Okoroafor, N., Jordt, H., & Wenderoth, M. P. (2014). Active learning increases student performance in science, engineering, and mathematics. Proceedings of the National Academy of Sciences, 111(23), 8410-8415.Hawk, T. F., & Shah, A. J. (2007). Using learning style instruments to enhance student learning. Decision Sciences Journal of Innovative Education, 5(1), 1-19.Heyman, G. D., Martyna, B., & Bhatia, S. (2002). Gender and achievement-related Beliefs among engineering students. Journal of Women and Minorities in Science and Engineering, 8(1), 41-52.Johnson, D. W., & Johnson, R. T
Conference Session
Computing Research
Collection
2018 ASEE Annual Conference & Exposition
Authors
Deng Cao, Central State University; Cadance Lowell, Central State University; Augustus Morris, Central State University
Tagged Divisions
Computing and Information Technology
marijuana growingin rural fields or among other crops14, while a Marijuana classifier can be installed on adrone and make such process more efficient and cost-effective. The student downloaded303 Marijuana images and 353 images of other plants from online using an imagedownloading tool called Fatkun Batch Download Image from Chrome web store (seeFigure 1-2). Figure 1: Marijuana image samples Figure 2: Other plant image samplesThe student then tried to install TensorFlow on his own Mac. After a couple of unsuccessfultrials, the student was able to installed TensorFlow using Docker. The student fine-tunedInception-v3’s final layers for the new classes: Marijuana and Other plants. The newclassifier
Conference Session
Topics in Computing and Information Technology-III
Collection
2018 ASEE Annual Conference & Exposition
Authors
Mehmet Ergezer, Wentworth Institute of Technology; Bryon Kucharski, Wentworth Institute of Technology; Aaron Carpenter, Wentworth Institute of Technology
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Paper ID #22725Work in Progress: Designing Laboratory Work for a Novel Embedded AICourseDr. Mehmet Ergezer, Wentworth Institute of Technology Mehmet Ergezer (S’06) received the B.S. and M.S. degrees in electrical and computer engineering from Youngstown State University, Youngstown, OH, USA, in 2003 and 2006, respectively. He received the D.Eng. degree in artificial intelligence from the Department of Electrical and Computer Engineering, Cleveland State University, Cleveland, OH, USA, in May 2014. From 2003 to 2005, following his internship with U.S. Steel, he was a Graduate Assistant with Youngstown State University. In
Conference Session
Topics in Computing and Information Technology-I
Collection
2018 ASEE Annual Conference & Exposition
Authors
Justin Daniel Josey, Robert Morris University; Sushil Acharya, Robert Morris University
Tagged Divisions
Computing and Information Technology
]. Ekman, P., Sorenson, E. R. & Friesen, W. V. (1969). Pan-Cultural elements in facial displays of emotions. Science Vol.164, pp. 86-88[6]. Tomkins, S. S. & McCarter, R. (1964). What and where are the primary affects? Some evidence for a theory. Perceptual and Motor Skills, 18, 119-158.[7]. Kumari, J., Rajesh, R., & Pooja, KM. (2015). Facial Expression Recognition: A Survey. In Proceedings of IEEE Translation and Pattern Analysis Machine Intelligence Conference.[8]. Cohn, J.F., Ambadar, Z., Ekman, P. (2007). Observer-Based Measurement of Facial Expression With the Facial Action Coding System. New York NY: Oxford University.[9]. Rathi, A. & Shah, B. (2016). Facial Expression Recognition A Survey. International
Conference Session
Tools and Techniques
Collection
2018 ASEE Annual Conference & Exposition
Authors
Mohammad Rafiq Muqri, DeVry University, Pomona; Nikole Harper; Hasan Muqri; Brian Keith Wesr Sr.
Tagged Divisions
Computing and Information Technology
Statistical Graphic Interface Manipulation Specialties Curve Analysis s Moderate Custom Scope Tables, Menus & SySPSS Gradual Moderate Good ANOVA & ntax Medium Multivariate Versatility Analysis Broad Panel Data
Conference Session
Computing Technology Applications-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
Yun Dai, University of Southern California; Tianmeng Li, University of New South Wales; Ang Liu, University of New South Wales; Stephen Lu, University of Southern California
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
”,“crossing the chasm”, “technological S curve”, and so forth. Figure 9. Word-cloud of peer interactions within study groups Figure 10. Distance between keywords of peer discussionsLessons Learned about Peer InstructionAt the conclusion of the course, multiple course participants were interviewed to solicit theirfeedback on the P2P platform. Some interesting lessons were learned in terms of how theplatform was used in practice.Generally speaking, student feedback was mostly positive. According to students, it was“fairly straightforward” to learn to use the platform, especially since a detailed user guidehad been provided. It was helpful to view the feedback of other students, which oftentimestriggered a student to
Conference Session
Tools and Techniques
Collection
2018 ASEE Annual Conference & Exposition
Authors
Emil H. Salib, James Madison University; John David Lester
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
authors senior capstone project partner and Paul Henriksenfor his diligence and effort in reviewing and editing this paper.References [1] M. C. et al., “Network virtualization in multi-tenant datacenters,” in 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI ’14)., 2014. [2] M. Casado, “Origins and evolution of openflow/sdn,” in Open Networking Summit, 2011. [3] M. Casado, “Keynote: Make sdn real,” in Open Networking Summit, 2017. [4] N. Mckeown, “How sdn will shape networking,” in Open Networking Summit, 2011. [5] S. Shenker, “The future of networking, and the past of protocols,” in Open Networking Summit, 2011. [6] J. H. Cox, J. Chung, S. Donovan, J. Ivey, R. J. Clark, G. Riley, and H. L. Owen, “Advancing software
Conference Session
Computing Technology Applications-I
Collection
2018 ASEE Annual Conference & Exposition
Authors
Zhen Wu, University of Colorado, Boulder; Christopher Lynnly Hovey, University of Colorado, Boulder; Leisa D. Thompson, University of Virginia
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
“veryhigh” research activity based on the Carnegie Classifications, and offer doctoral degrees in CSor computer and information science. Overall institutional enrollments ranged from slightlyabove 3,000 undergraduate students to slightly above 39,000. Participating schools aregeographically located in the Eastern (n = 3), Midwestern (n = 1), Southwestern (n = 1), orPacific (n = 2) United States. At six of the seven schools, students declare their majors uponenrollment; at the remaining university, students declare majors at the end of their second yearof coursework. No other data about “population(s) served” (e.g., student demographics,socioeconomic status, etc.) were collected, apart from the change in participation of women andmen within the CS
Conference Session
Computing Technology Applications-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
Tamer Omar, California State Polytechnic University, Pomona; Srikanth Venkatesan, California State Polytechnic University, Pomona; Abdelfattah Amamra, California State Polytechnic University, Pomona
Tagged Divisions
Computing and Information Technology
-Champaign; Center for Information Assurance Education and Research (CIAER) [16]. 6. University of Pittsburgh; Laboratory for Education and Research on Security Assured Information Systems (LERSAIS) [17]. 7. Syracuse University; Center for Advanced Systems and Engineering (CASE) [18]. 8. George Mason University; Center for Secure Information Systems (CSIS) [19], Center for Assurance Research & Engineering (CARE) [20]. 9. University of California-Davis; Computer Security Lab (CSL) [21]. 10. University of Texas at San Antonio; Center for Education and Research in Information and Infrastructure Security (CERI²S) [22], Center for Security and Privacy Enhanced Cloud Computing (C-SPECC) [23] & Center for
Conference Session
Computing Technology Applications-I
Collection
2018 ASEE Annual Conference & Exposition
Authors
Predrag T. Tosic, University of Idaho; Julie Beeston, University of Idaho
Tagged Divisions
Computing and Information Technology
designed to prove.Understanding what fact(s) about the world a proof is trying to establish is a crucial first step,especially for a novice. It helps the student organize his thoughts and evaluate different possiblepaths if the end goal is clearly defined in his mind. In the same vein, understanding the purposeand value of education is a crucial first step towards long term success in Computer Science. If thestudent understands the long-term benefits, he or she is much more likely to devote the time andenergy needed to master complex technical skills.2.2 Strategies in Upper Level Undergraduate ClassesThe issues in the lower level classes all still apply but there is another issue that is unique to theupper level classes: the need to build on an
Conference Session
Tools and Techniques
Collection
2018 ASEE Annual Conference & Exposition
Authors
Karen H. Jin, University of New Hampshire; Michael Jonas, University of New Hampshire; Christopher David LeBlanc, University of New Hampshire; Theodore Sean Tavares, University of New Hampshire
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
of papers implementing surveys started in 1994by Todd and Magleby et al. [4] that was followed up by Howe. S. et al. in 2010 [5] and 2015 [6],[7] respectively. The work from Howe, which can be found in the ASEE database, is more recentand relevant to this work. In 2015 Howe did both a qualitative and quantitative analysis ofsurvey results from 256 ABET accredited institutions executing Capstone projects in 464 distinctdepartments for a total of 522 respondents. This work looked at many aspects of the Capstoneexperience. One interesting reported observation was how various programs and institutionsvalued “process vs. product” in the final outcomes of a Capstone experience. Howe alsoexamined the number of semesters to complete, age of Capstone
Conference Session
Topics in Computing and Information Technology-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
Andreas Febrian, Utah State University; Oenardi Lawanto, Utah State University; Kamyn Peterson-Rucker; Alia Melvin; Shane E. Guymon
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Pervasive,” J. Sci. Pract. Comput., vol. 1, no. 2, pp. 67–69, 2007.[2] Q. Bui, “Will Your Job Be Done By A Machine?,” Planet Money - The Economy Explained, 2015. [Online]. Available: http://www.npr.org/sections/money/2015/05/21/408234543/will-your-job-be-done-by-a- machine. [Accessed: 25-May-2015].[3] M. Weisser, “The Computer for the Twenty-First Century,” Sci. Am., vol. 3, no. 265, pp. 94–104, 1991.[4] S. Hambrusch, C. Hoffmann, J. T. Korb, M. Haugan, and A. L. Hosking, “A Multidisciplinary Approach Towards Computational Thinking for Science Majors,” ACM SIGCSE Bull., vol. 41, no. 1, p. 183, Mar. 2009.[5] P. B. Henderson, “Ubiquitous computational thinking,” Computer (Long. Beach. Calif)., vol. 42
Conference Session
Computing Research
Collection
2018 ASEE Annual Conference & Exposition
Authors
Mariangely Iglesias Pena, Iowa State University; Stephen B. Gilbert, Iowa State University; Jamie Payton, Temple University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
] R. Matzen and R. Alrifai, "Defining undergraduate research in computer science: a survey of computer science faculty," Journal of Computing Sciences in Colleges, vol. 27, no. 3, pp. 31-37, 2012.[2] A. S. Rorrer, "An evaluation capacity building toolkit for principal investigators of undergraduate research experiences: A demonstration of transforming theory into practice," Evaluation and program planning, vol. 55, pp. 103-111, 2016.[3] J. J. Garrett, Elements of user experience, the: user-centered design for the web and beyond. Pearson Education, 2010.[4] J. Gothelf and J. Seiden, Lean UX: Applying lean principles to improve user experience. " O'Reilly Media, Inc.", 2013.[5] E. Wenger
Conference Session
Computing Technology Applications-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
Vuk Marojevic, Virginia Tech; Antoni Gelonch-Bosch, Universitat Politècnica de Catalunya; Jeffrey Reed, Virginia Tech
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
in the process. (3) Hands-on activitiesneed careful preparation and close guidance.1 IntroductionThe wireless telecommunication industry has grown tremendously since the first cellular systemwas deployed in 1983. Digital techniques were introduced in 1993 to accommodate the hugeboom in subscribers of portable telephone service in the mid 90’s. Cellular communicationssystems evolved from providing voice in the mid 90’s (2nd generation or 2G) to all-IP dataservices that are available since 2011 (4G). Advanced mobile broadband and real-time controlwill be enabled by future 5G systems. Wireless systems that provide personal andmachine-to-machine communications currently constitute a major research area of vitalimportance.Telecommunication
Conference Session
Computing & Information Technology: Curriculum and Assessment
Collection
2018 ASEE Annual Conference & Exposition
Authors
Predrag T. Tosic, University of Idaho; Julie Beeston, University of Idaho
Tagged Divisions
Computing and Information Technology
Data Scientist’s Skill-Set(s)Once the talent gap in the area of data science & analytics has been identified, and many expertpredictions about the near-to-intermediate future about the continued growth in demand for therelated skills, and once the institutions of higher education in the US (as well as many globally)have taken a notice, the next question is: what are the actual, concrete key skills and knowledgethat the next-generation data scientists and analysts should have, in order to fill that gap mosteffectively? This, too, turns out to be a multi-faceted, complex question.We will briefly summarize below our own experience, stemming cf. from i) working as aSenior/Principal Data Scientist in industry (cf. high-tech/Silicon Valley) and
Conference Session
Topics in Computing and Information Technology-III
Collection
2018 ASEE Annual Conference & Exposition
Authors
Landon A. Braden; Scott Alexander Kaiser, Utah Valley University; Reza Kamali-Sarvestani, Utah Valley University; Afsaneh Minaie, Utah Valley University; Paul Weber, Utah Valley University
Tagged Divisions
Computing and Information Technology
2007. 5. Minaie, Afsaneh, et.al., Nanotechnology in Engineering Education”, 2015 American Society for Engineering Education Annual Conference, June 2015. 6. “What is Nanotechnology?,” What is Nanotechnology? | Nano. [Online]. Available: https://www.nano.gov/nanotech-101/what/definition. [Accessed: 28-Jan-2018]. 7. P. Dockrill, “Scientists Just Developed The World's Smallest Transistor,” ScienceAlert, 07 Oct-2016. [Online]. Available: https://www.sciencealert.com/scientists-just- developed-the-world-s-smallest-ever-transistor. [Accessed: 28-Jan-2018]. 8. “VEGA3,” Tescan. [Online]. Available: https://www.tescan.com/en- us/technology/sem/vega3. [Accessed: 27-Jan-2018]. 9. M. J. Madou, Fundamentals of
Conference Session
Computing & Information Technology: Curriculum and Assessment
Collection
2018 ASEE Annual Conference & Exposition
Authors
Masoud Naghedolfeizi, Fort Valley State University; Xiangyan Zeng, Fort Valley State University; Chunhua Dong, Fort Valley State University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
/mentoring sessions and regularly communicating with the course professors and project director about their tutoring/mentoring activities. To further enhance the communication between tutors and course instructors as well as to better familiarize the tutors with the students and class activities, the tutors would be required to attend 2 to 3 classes per week (maximum 3 hours/week) for the course(s) they tutor. The attendance in these classes would be considered as part of their tutoring load.  Identify at least 5 qualified students for tutoring/mentoring task. These students have performed at least at a level of B or better in the gate keeping courses, have junior/senior standing, and have a GPA of at
Conference Session
Topics in Computing and Information Technology-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
John Pickard, East Carolina University; Dale Drummond, East Carolina University; Philip J. Lunsford II, East Carolina University; Ciprian Popoviciu, Nephos6, Inc.
Tagged Divisions
Computing and Information Technology
allowing the synthetic transaction to follow the same path that is taken by thestudent's and teacher's sessions when accessing the cloud-based resource.After the solution for the authentication of the web filtering application is verified, the agentdeployment will be expanded to the additional schools, with the final goal of having multipleagents deployed at each school in the school district, the school district’s central office and theirInternet Service Provider.© American Society for Engineering Education, 2018 2018 ASEE National ConferenceReferences[1] S. Stein, J. Ware, J. Laboy, H. E. Schaffer, “Improving K-12 pedagogy via a Cloud designed for education,” International Journal of Information Management
Conference Session
Computing & Information Technology: Curriculum and Assessment
Collection
2018 ASEE Annual Conference & Exposition
Authors
Michael Oudshoorn, Northwest Missouri State University; Rajendra K. Raj, Rochester Institute of Technology; Stan Thomas, Wake Forest University; Allen Parrish, United States Naval Academy
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Conference Session
Topics in Computing and Information Technology-I
Collection
2018 ASEE Annual Conference & Exposition
Authors
Andrew R. Schmitt, Metropolitan State University; Theresa Chasar, Newell Brands; Mangaya Sivagnanam, Ingersoll Rand; Faisal Kaleem, Metropolitan State University
Tagged Divisions
Computing and Information Technology
Socket_Server (Bind_Port, B_Size): s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) s.bind(('', Bind_Port)) s.listen(5) conn, addr = s.accept() print "Connected with", addr Total = 0 while True: data = conn.recv(B_size) if not data: break print "Received Bytes: ", B_size Total = Total + B_size print "Total Bytes:", Total conn.close()#Run the Serverprint 'Prepare the server to be started'os.system ('pause')Socket_Server (Bind_port, B_size)print 'Connections closed'os.system ('pause')Client Side:#Script to establish a client side socket to test maximum bandwidth based on hardware resources#Using a file to send data for an
Conference Session
Topics in Computing and Information Technology-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
Arshia Khan, University of Minnesota, Duluth
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
-fields-and-the-gender-gap-where- and information sciences: A design rationale analysis. are-the-women/#2715e4857a0b4aefb52f33a9 In System Sciences (HICSS), 2011 44th Hawaii International[3] Young, D.M., Rudman, L.A., Buettner, H.M. and McLean, Conference. IEEE, 1-10. M.C., 2013. The influence of female role models on [15] Parikh, P.P. and Sukhatme, S.P., 2004. Women engineers in women’s implicit science cognitions. Psychology of Women India. Economic and Political Weekly, 193-201. Quarterly, 37(3), 283-292. [16] Zingaro, D. 2015. Examining Interest and Grades in[4] Cheryan, S., Drury, B.J. and Vichayapai, M., 2012
Conference Session
Topics in Computing and Information Technology-I
Collection
2018 ASEE Annual Conference & Exposition
Authors
Umit Karabiyik, Sam Houston State University; Naciye Celebi; Faruk Yildiz, Sam Houston State University; James Holekamp, Sam Houston State University; Khaled Rabieh, Sam Houston State University
Tagged Divisions
Computing and Information Technology
controllers of the system, the type of data can be collected, andwhere the data can be collected. Data sources need to be identified when any type of attackperformed to the system. Needless to say, documentation of the actions taken during this phase iscritical and essential for a forensically sound investigation.Phase 3- Preservation, Prioritizing, and Collection: In this phase, the identified data is collectedfrom the known locations, and it is preserved and prioritized for the purpose of repeatability andpresentation. In this phase, it is also critical to collect volatile data as it might be destroyed easily.For instance, data can be collected from databases, computer workstation(s), PLC, etc.Phase 4- Examination: The purpose of this phase is the
Conference Session
Topics in Computing and Information Technology-I
Collection
2018 ASEE Annual Conference & Exposition
Authors
Kari L. Jordan Ph.D., The Carpentries; Marianne Corvellec, Institute for Globally Distributed Open Research and Education (IGDORE); Elizabeth D. Wickes, University of Illinois at Urbana-Champaign; Naupaka B. Zimmerman, University of San Francisco; Jonah M. Duckles, Software Carpentry; Tracy K. Teal, The Carpentries
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
/ploscompbiol/article?id=10.1371/journal.pcbi.1003285[9] J. M. Osborne‚ M. O. Bernabeu‚ M. Bruna‚ B. Calderhead‚ J. Cooper‚ N.Dalchau‚ S−J. Dunn‚ A. G. Fletcher‚ R. Freeman‚ D. Groen‚ B. Knapp‚ G. J.McInerny‚ G. R. Mirams‚ J. Pitt−Francis‚ B. Sengupta‚ D. W. Wright‚ C. A.Yates‚ D. J. Gavaghan‚ S. Emmott, and C. Deane, “Ten Simple Rules forEffective Computational Research,” PLoS Computational Biology,10(3):e1003506, 2014.[10] B. M. Duckles, “Value of Software Carpentry to Instructors Report,” Report to SoftwareCarpentry Foundation and Data Carpentry Foundation, 2016.[11] J. Dolin, P. Black, W. Harlen, and A. Tiberghien, “Exploring Relations Between Formativeand Summative Assessment,” in Transforming Assessment. Contributions from ScienceEducation
Conference Session
Computing Technology Applications-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
Laura Kay Dillon, Michigan State University; Michelle Slattery, Peak Research
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
recently, as Vice Chair of ACM SIGSOFT and General Chair of the 38th International Conference on Software Engineering. She has participated in many CRAW and ACM mentoring events; is a founding adviser of MSU Women in Computing, the MSU ACM-W Chapter; and co-led TechKobwa, a technology camp for secondary-school teachers and female students in Rwanda, for three summers. She was awarded the ACM SIGSOFT Distinguished Service Award in 2017.Ms. Michelle Slattery, Peak Research Michelle Slattery has more than 30 years’ experience as a professional evaluator working with diverse clients on complex project evaluations. Her business, Peak Research LLC, is celebrating 25 years of providing services to evaluate S-STEM, BPC, RED
Conference Session
Computing Technology Applications-I
Collection
2018 ASEE Annual Conference & Exposition
Authors
Yu Cai, Michigan Technological University
Tagged Divisions
Computing and Information Technology
market. https://jumpcloud.com/blog/comparing-three-directory-services/[2] M. Wahl, T. Howes, and S. Kille, "Lightweight Directory Access Protocol (v3)," IETF RFC 2251, Dec. 1997[3] CNSA at MTU. http://www.tech.mtu.edu/cnsa/[4] Microsoft Active Directory. http://www.microsoft.com/windowsserver2003/technologies/ directory/activedirectory/default.mspx[5] OpenLDAP. http://www.openldap.org/[6] VMWare. http://www.vmware.com[7] Canvas. http://www.canvas.com[8] VirtualBox. https://www.virtualbox.org/wiki/Downloads[9] Gerald Carter, “LDAP System Administration”. O'Reilly Media, Inc.
Conference Session
Tools and Techniques
Collection
2018 ASEE Annual Conference & Exposition
Authors
Tamer Omar, California State Polytechnic University, Pomona
Tagged Divisions
Computing and Information Technology
://www.polarisnetworks.net/Riverbed®. (2017). OPNET Technologies. Retrieved from https://www.riverbed.com/products/steelcentral/opnet.htmlTamer Omar, S. H. (2016). Broadband Wireless Networking in the Era of Big Data. ASEE Annual Conference & Exposition.Weldon, M. K. (2015). The Future X Network: A Bell Labs Perspective. CRC Press.
Conference Session
Topics in Computing and Information Technology-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
Farshid Marbouti, San Jose State University; Valerie A. Carr, San Jose State University; Belle Wei, San Jose State University; Morris E. Jones Jr., San Jose State University; Amy Strage
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
. Cukier, "Big Data–A Revolution That Will Transform How We Live, Think and Work," ed: London: John Murray, 2013.[5] T. D. Snyder and S. A. Dillow, "Digest of Education Statistics, 2011. NCES 2012-001," National Center for Education Statistics, 2012.[6] B. G. Technologies, The art of employment: How liberal arts graduates can improve their labor market practices. Boston, MA, 2013.[7] N. J. Slamecka and P. Graf, "The generation effect: Delineation of a phenomenon," Journal of experimental Psychology: Human learning and Memory, vol. 4, no. 6, p. 592, 1978.[8] H. Ebbinghaus, "Memory: A contribution to Experimental Psychology (HA Ruger & CE Bussenius, Tradutores)," ed: New York, 1913.[9] A. Baddeley and D. Longman, "The
Conference Session
Topics in Computing and Information Technology-III
Collection
2018 ASEE Annual Conference & Exposition
Authors
Reza Kamali-Sarvestani, Utah Valley University; Brian Durney, Utah Valley University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
and experiences rather than generalities: Humans do not usually think through general definitions and logical principles. Rather, they think through experiences they have had and imaginative reconstructions of experience. You don’t think and reason about weddings on the basis of generalities, but in terms of the weddings you have been to and heard about and imaginative reconstructions of them. It’s your experiences that give weddings and the word ‘wedding’ meaning(s). Furthermore, for humans, words and concepts have their deepest meanings when they are clearly tied to perception and action in the world. [5]In Magnitude Museum, players learn nanotechnology concepts and concepts relating todimensions