Asee peer logo
Well-matched quotation marks can be used to demarcate phrases, and the + and - operators can be used to require or exclude words respectively
Displaying results 1 - 30 of 197 in total
Collection
2014 ASEE Zone 1 Conference
Authors
Paul B. Crilly
accelerating electron causes a radiated EMundergraduate electrical and computer engineering (ECE) field. This is reinforced by a demonstration to quickly dispelcurriculums despite the fact that most ECE curriculums are the notion that ordinary circuit theory can adequately explainincreasingly crowded with much of the usual and/or currently the behavior of distributed parameter systems. (b) This is then“hot” topics. However, like circuits, EM is fundamental to followed by transmission lines and then classical EM theory,electrical engineering (EE) and needs to be covered. For antennas and propagation. (c) The lecture material isexample, electromagnetic compatibility and interference augmented by eight labs
Collection
2014 ASEE Zone 1 Conference
Authors
Kyle Pustola; Can B. Aktas
Proceedings of 2014 Zone 1 Conference of the American Society for Engineering Education (ASEE Zone 1) Quantifying Sustainable Improvements: Interactions of Energy Efficient Construction Techniques and Estimating Their Efficiency Kyle Pustola, and Dr. Can B. Aktas, University of New Haven Abstract—Many sustainable building improvements can beimplemented in order to increase a building’s efficiency. The II. BACKGROUNDarticle demonstrates ways in which improvements can be tested,compared, and evaluated together to identify synergies among A. Building Energy Efficiencydifferent improvements to find the best return on
Collection
2014 ASEE Zone 1 Conference
Authors
Islam A. Ashry
plotted in Figure 3. B Fig. 3. Apodization profiles. III. RESULTS AND DISCUSSIONS The performance of the different apodization profiles aretested based on investigating three different parameters;maximum reflectivity, sidelobes level, and FWHM. In thiswork, the simulations are performed for a single mode stepindex fiber of 1550 nm Bragg wavelength. The length of theused FBG is within the range of 0.1 cm to 1.9 cm and Δn isselected to be between 0.01 x 10 4 (weak grating) and Fig. 4. Reflectivity versus wavelength of different apodized FBGs at L = 1 cm14.4 x 10 4 (strong grating). These values are selected
Collection
2014 ASEE Zone 1 Conference
Authors
Carlos A. Munoz
. jaw, and roll alterations to the quad. They are both send/receive modules. In today’s world, autonomous quad copters are beingutilized more often as cheaper more efficient alternatives. The B. KinectOlympics [3] are a good example. In the past, helicopters were The Kinect cameras “Fig. 3” are made by Microsoft. Theyused to get the “perfect angles” during competitions. In the contain three main functions. There is a depth stream that isrecent Olympics it was all done by quad copters. The route and mainly used to give an approximation on how far an object islength of time is set up per quad and off they go to get the same from the Kinect. There is
Collection
2014 ASEE Zone 1 Conference
Authors
Timothy A. Zimmerman
all, 1101 data sets were A NN learns by iterating through training data, which created for the training of the NN. The data sets spanned manycontains the input values and the expected NN output. The different situations that the robot would encounter, allowingnetwork will then process the input signals, producing an the robot to make correct decisions regardless of what“actual” output based on its current weight values. Any obstacles that were presented to it.deviation between the “actual” output and expected output willbe back propagated through the NN. Doing so modifies the B. Neural Network Implementationweights to correct for the error on the next iteration
Collection
2014 ASEE Zone 1 Conference
Authors
Ketul B Shah; Aritra Ghosh; Md Naim Hossain; Young Lee
1 Enhancing Engineering Educational Using Virtual Lab Technology Ketul B Shah Aritra Ghosh Electrical Engineering Computer Science Department Texas A&M University - Kingsville Texas A&M University - Kingsville Kingsville, TX-78363. USA Kingsville, TX-78363. USA ketul.shah@students.tamuk.edu aritra.ghosh
Collection
2014 ASEE Zone 1 Conference
Authors
Rasha Gaffer M. Helali
module [3]. Software metrics proposed more maintenance than others, even before system isand used for procedural paradigm have been found inadequate completed [2]for object-oriented software products [1]. The word syntacticreflects to what extend we can use source code syntax to B. Semantic metricsestimate some quality attributes. In [12] quality is defined asthe degree to which a product is bug-free. Traditional syntactic metrics discussed above reflect howIn this point it is important to say that the use of pre
Collection
2014 ASEE Zone 1 Conference
Authors
Damien Laird; Jack Price; Ioannis A. Raptis
Table I.loop dynamics when the feedback law is implemented. Inaddition, in real-life applications the set-point objective is B. Object Manipulationachieved when ρ < Rt , where Rt > 0. To investigate the Potential robotics applications, multi-agent or otherwise,stability of the feedback law, consider the Lyapunov function almost always involve interaction with other physical objects.candidate: This fundamental feature served as a great challenge with 1 V (ρ, α) = ρ2 + (1 − cos α) (5) which to demonstrate the flexibility of the new spider robot 2
Collection
2014 ASEE Zone 1 Conference
Authors
Constadinos Lales; Aparicio Carranza
computer 256MB RAM and costs $25 and Modelnetworking. In addition, these networks B comes with 512MB RAM and costsmay take away from our freedom of web $35. There are several, Linux based,browsing by blocking different websites. operating systems available for the PiThey can also view every website that that can be downloaded online andone goes on while connected to their written on the SanDisk card. Eachinternet. All of these problems can be operating system has its pros and cons.solved by setting up a virtual private The one to choose from depends on whatnetwork (VPN). A VPN is a network a user wants to use the raspberry pi for.that uses encryption to securely connect The Pi operates at
Collection
2014 ASEE Zone 1 Conference
Authors
Varun Pande; Jayanta Paul; Manuel Curillo; Jani Macari Pallis
. auroras by the multi-spectral auroral camera onboard the Reimei satellite, Earth, Planets, and Space, 60, 827–835, 2008.[5]. Archer J., H, Dahlgren, N. Ivchenko, B. S. Lancester, and G. TMarklund (2011), Dynamics and characteristics of black Aurora asobserved by high-resolution ground based imagers and radar, Int. J. RemoteSens., 32(11), 2973-2985.[6]. Akasofu, S. I. (1964), The development of the auroral substorm, Planet.Space Sci., 12, 273.[7]. Christon, S. P., Williams, D. J., Mitchell, D. G., Huang, C. Y., andFrank, L. A.: Spectral Characteristics of Plasma Sheet Ion and ElectronPopulations during Disturbed Geomagnetic Conditions, J. Geophysics.Res., 96, 1–22, doi:10.1029
Collection
2014 ASEE Zone 1 Conference
Authors
Nan Feng
recognition (Craig & Douglas, 2000)” of studies and plans considered less critical in how to create, manage the relative concentration of the solution, and refresh the commercial brand MULTI-BRANDS (Lindgreen, Beverland, & Farrelly) The multi-brand strategy is a company using their ownexisting well-know brand to extension other well-known CONCLUSION [9] Fennis, B. M., & Pruyn, A. T. H. (2007). You are what you wear: Brand
Collection
2014 ASEE Zone 1 Conference
Authors
Xi Kang; Chengxin Zhang; Xingguo Xiong; Sk Hasan Hafizul Haque
vibration results in air instead of species. fabrication flow. VI. VELOCITY VECTOR IN ANSYSThe flow velocity vector plot of the micro-fluid along MEMSmixer without perturbing the interface by resonant beam isshown in Figure4.7. Two species go into the inlet with aspecific speed and they slow down in the chamber. As we see,the two fluidics diffuse in the chamber but do not meettogether until near the outlet. The velocity is almost zero nearthe sides of the chamber because of the resistance. REFERENCES [1] Kamholz, A. E., Weigl, B. H., Finlayson, B. A. & Yager
Collection
2014 ASEE Zone 1 Conference
Authors
Kishan Gutta; Madhav Patil
good technology and make it an economic 25. Calhoun, B.H.; Daly, D.C.; Verma, N.; success, . Sensors: The Journal of Applied Finchelstein, D.F. ; Wentzloff, D.D. ; Wang, A. ; Sensing Technology (May 1999). 16((5)): p. 70- Cho, S. ; Chandrakasan, A.P., Design 80. Considerations for Ultra-Low Energy Wireless13. Manges, W.W., Allgood, G. O., and Smith, S. F., Microsensor Nodes, Computers, IEEE , It's time for sensors to go wireless; Part 1: Transactions on (Volume:54 , Issue: 6 ) Technological underpinnings,. Sensors: The Journal of Applied Sensing Technology (April 26. Nickerson, B
Collection
2014 ASEE Zone 1 Conference
Authors
Martin Sinclair; Ioannis A. Raptis
⇥ ⇤T ~kI W B = RT W I = mg S✓ C✓ S C✓ C (11) ~iIThe reaction from the surface to the object is opposite and OI L Lequal to the weight component in the ~kO direction, thus: 2 2 ⇥ ⇤T Fig. 3. This Figure illustrates the two side views of a single cell with the
Collection
2014 ASEE Zone 1 Conference
Authors
Anatoliy Gordonov
profit. Phrack, 49–14, -The standard page size is 4K (8K for Sparc). November1996. Available fromNevertheless, as we see from table 1, much bigger pages can http://www.phrack.org/issues.html?issue=49&id=14 [3]. W. Stallings. L. Brown, “Computer Security”, Prentice Hall, 2008, ISBN-be used which will considerably increase the memory 13: 978-0-13-600424consumption. This may happen when threads allocate large [4] J. Pincus, B. Baker “Beyond Stack Smashing: Recent Advances indata structures on stack and a large guard area may be needed Exploiting Buffer Overruns”, IEEE Security and Privacy, July/August 2004
Collection
2014 ASEE Zone 1 Conference
Authors
Priscilla Tengdin; Kayla Santello; Robert Henry
comparison.interactive, self guided learning environment. This An e-book is an expansive tool hidden in a small, less-interactive e-book environment is a way to supplement the daunting application.information provided by the teacher. Where a 2-D picturecan only show you an object from one angle an interactive, IV. S TUDENT INTEREST IN DOING THIS PROJECT : B. How our knowledge has been expanded: P ERSONAL P ERSPECTIVE I had firsthand experience of trying to navigate and work with construction drawing without the benefit of any supportA. Why the students were interested
Collection
2014 ASEE Zone 1 Conference
Authors
Sithisone Kalaya; Hussain A. Alhazmi
. a) Each robot starts at an arbitrary unknown location and incrementally builds a local map of the environmentThe object avoidance capability on the mobile robots is basedon the algorithm using heading range information provided while using its abilities to localize itself. It then sends the information of the local maps to the host.by front mounted measuring sonar device. A transmission ofdata between mobile robots to a host computer, we used b) The host matches the pose of the robot and the boundary of the robots. It can
Collection
2014 ASEE Zone 1 Conference
Authors
Hussain A. Alhassan; Christian Bach
hospital can have the choice to backup data by setup daily schedule and store it in different location.[14] B. Ease of Information search Retrieving information for any patient in a short amount of time is considered as a high priority in the medical area. Especially if that case is in an emergency room. With paper, a hospital organizes them
Collection
2014 ASEE Zone 1 Conference
Authors
Hussain A. Alhassan; Christian Bach
all tasks efficiently is important to most users. mistake easily [19], which requires high patience and plenty of However, certain operating deals with hardware are time. better than other operating systems which make them unique and different [11]. B. Windows • FACTOR 3: Security level is one side of an effective Window is an operating system developed by the Microsoft decision, and it ranges from personal use to business Corporation as closed-source and they launched the first managing. Sometimes the operating system is known version on November 20, 1985 [20]. Which is one year after for a high standard of security
Collection
2014 ASEE Zone 1 Conference
Authors
Joseph A. Levert; Andy Grosso
section. A mechanical engineeringstudent capstone design team from SUNY Maritime Collegemodified a standard tagging gun for their GIGNY customersto use for attaching retail price tags to clothes. ProjectCREATE coordinated with GIGNY in identifying potentialdesign projects during the summer of 2012. GIGNY then Fig. 1. Typical tagging gun showing needle on upper right-hand side.invited the SUNY Maritime capstone design course instructor Students modified the design by adding a switch (A), auxiliary light (B), andto meet and discuss the scope of potential projects. One of the battery energy source (C).two chosen was the tagging gun
Collection
2014 ASEE Zone 1 Conference
Authors
Hussain A. Alhassan; Eman Abdel Fattah
by the Media AccessWiMAX system in a specific environment: an urban microcell. Control (MAC), which is seen as the second aspect of IEEEThey applied MIMO techniques after extending SIS mode. 802.16. However, in order to achieve good signal PHY, theyTheir approach studied the behavior of mode in both scenarios need to use less space and reduce signal and increase speed.UL and DL simulating Packet Error Rate (PER). Theyemployed 3GPP spatial channel models and based on that, they B. Randomizationbuild their matrix channel. The authors found that SNR STBC First procedure that is being done in PHY is in thewith lower values prefers DL
Collection
2014 ASEE Zone 1 Conference
Authors
Ruoxu Jia; Junling Hu; Xingguo Xiong; Linfeng Zhang
restrictions ondoor sizes compared to door frame or door way bars. Besidesthe function of the pull-up bars, price and weight of the barsare very important factors for user to select a pull-up bar. Fig.3 Beam model of a pull up bar The supporting beam can be modeled as a cantilever beam with a standard squire cross section of thickness b and length L, as shown in Fig. 3. The design requirements are
Collection
2014 ASEE Zone 1 Conference
Authors
Jeng-Nan Juang; Ramachandran Radharamanan
the output voltage needed to power American appliances. The solar energy system designed and developed includes a • Collect, process and display real-time data of the systemsolar panel, a battery, and an inverter. The solar panel is on an LCD screen: The system must also be able to collectdesigned with a tracking mechanism that directs the panel real-time data from the system, process it, and display thistowards the area of high sunlight intensity. It also has a data on an LCD screen.method of concentrating the sunlight onto the photoreceptors B. Merit Criteriaon the solar panel. All of these maximize the amount of solar A merit criterion was developed to compare
Collection
2014 ASEE Zone 1 Conference
Authors
Ashenafi Lambebo; Sasan Haghani
sensor code.programming interface (API) is used to display the data. • Transmit the processed data to the base station periodically for further analysis and display. Fig. 1: Network architecture Fig. 2(a): Structure of transmitter node.A. Transmitter Node To achieve a power efficient network, open source andlow-power consumption hardware were used to implement thetransmitter. The structure of the transmitting nodes and thefinal product are shown in Fig. 2(a) and Fig. 2(b),respectively. Each transmitting node consists of one
Collection
2014 ASEE Zone 1 Conference
Authors
Joseph Betthauser; Daniel Benavides; Jeff Schornick; Neal O'Hara; Jimit Patel; Jeremy Cole; Edgar Lobaton
Model B The design has been optimized to be compact, highly Proc. Type ARM Cortex A8 ARM 11maneuverable using an omni-directional drive system, and Proc. Speed 1 GHz 700 MHzpossesses a suite of inertial, visual, and environmental sensors RAM 512 MB DDR3L 512 MBon-board. Fig. 2 and 3 shows CAD model views and actual GPY SGX530 3D Videocore 4views of the WolfBot. The main features considered during VFP version NEON VFPv2
Collection
2014 ASEE Zone 1 Conference
Authors
Thomas Goddard; Konstantin Litovskiy; Nathan Nichols-Roy; Matthew Reed; Igor Shvartser; Nicholas Smith; David Zeppa; Linda Werner; Julia E. Rice; Hans W. Horn; Amanda C. Engler
diagram In addition to learning background material, the student B. Difficulty defining data-modelsteam decided that it would be beneficial to maintain contactwith an intermediary to assist with answering chemistry Chemists and computer scientists communicate in tworelated questions that arose during the implementation phase. different ways. Chemists talk in terms of the applicationThe course professor sought a student with an organic domain, while the computer scientists talk in terms of thechemistry background to assist with the initial student team by implementation domain. We needed to bridge that gap byserving as an intermediary between the student team and the creating a
Collection
2014 ASEE Zone 1 Conference
Authors
Ruoxu Jia; Junling Hu; Abubaker E.M. Elbalsohi
boundaryrelative to the velocity boundary and a longer thermal entrancelength compared to the hydrodynamic length. The normalized centerline velocities in two channels areshown in Fig. 10. Centerline velocities increase rapidly in the underdeveloped flow region near the flow entrances and the changes slow as it approaches to the fully developed region. Fig. 10 Centerline velocities in two channels normalized by the inlet velocities T v p T v p (a) (b) Fig.11 Contour
Collection
2014 ASEE Zone 1 Conference
Authors
Lile Yu; Jingyun Xiao; Xingguo Xiong; Prabir Patram
Proceedings of 2014 Zone 1 Conference of the American Society for Engineering Education (ASEE Zone 1) A Magnetic Micropump with Tri-membrane Fully Differential Structure Lile Yua, Jingyun Xiaob, Xingguo Xionga, Prabir Patrab a Department of Computer Engineering and Science, University of Bridgeport, CT, USA b Department of Biomedical Engineering, University of Bridgeport, CT, USA Abstract—MEMS are typically defined as the devices or have attracted strong interests. In [8], a rotating magneticsystems which are integrated
Collection
2014 ASEE Zone 1 Conference
Authors
Tamer Abukhalil; Madhav Patil
exist on the particularrobot. The programs which will be uploaded on each robottype will differ according the different pin locations associated (a)with each type that were set by the user. The computer willask the user to connect each robot to allow uploading theprogram as shown in fig. 3 (b). The next four subsystemsshow how the deployment system works to manage theheterogeneity of the hardware and the software associatedwith each robotic agent.2) Coordination Agent The heterogeneity of the robots and the operatingplatforms imposes dependencies such as data format, locationof machine addresses, and availability of the components. Asaddressed in [8] the data format dependency is removed by astandard
Collection
2014 ASEE Zone 1 Conference
Authors
Kai Hu
ASEE 2014 Zone I Conference, April 3-5, 2014, University of Bridgeport, Bridgeport, CT, USA. RFID Infrastructure for Product Take Back: Includes Establishing/Building a Prototype Kai Hu and Nimishaben Patel Department of Technology Management Bridgeport, CT - USAAbstract—as the global economic integration development, Recycling and the value of reverse logistics study. In 1990s, atechnology brings revolutionary technology to challenge the number of companies in developed countries began to practicetraditional model. The reverse logistics industry is also