physics as less appealing, preferring to stay in the lab, and may not apply themselves in working complex, multistep problems. (B) Some are interested in pure science and/or are planning to pursue other scientific fields (e.g., medicine). These students sometimes have little interest in the bots and programming but may do well in learning theory and taking tests.Unfortunately, most students have never done any programming or worked with spreadsheets.Some students struggle with programming beyond simple commands. Programs of any length,which required use of several subroutines and “IF…THEN” logic, were a struggle for many ofthe students. We have not emphasized programming in the course; we see it as an enablingtechnology
Influencing the Choice of Hearing Aid Type. CIKM '11 International Conference on Information and Knowledge Management, pp. 11-17, Association for Computing Machinery, New York, 2011. 2. Koh, H. C., & Tan, G., Data Mining Applications in Healthcare. Journal of Healthcare Information Management, pp. 64-72, http://www.himss.org, 2005. 3. Park, I., Lee, K. H., & Lee, D. Mining Cancer Genes with Running Sum Statistics. CIKM '09 Conference on Information and Knowledge Management , pp. 35-42, Association for Computing Machinery, New York, 2009. 4. Srinivas, K., Kavihta Rani, B., & Govrdhan, A., Applications of Data Mining Techniques in Healthcare and Prediction of Heart Attacks. International
are analyzed. Listed in thefollowing are the articulated benchmarks set to evaluate the attainment of each programoutcome:Metric 1: The percentage of the IT 495 students who receives a grade of 2 or higher (out of 3point) on the learning statements and supporting evidence for the designate program outcome.Metric 2: The percentage of the students who receive a grade of B or higher on two selectedcourse embedded assessments that measure the related program outcome. Page 23.1299.6Metric 3: The mean of the graduates’ perceptions of their achievement of the related programoutcomes (data collected from the exit survey).Metric 4 (Reference): The mean of
into a digital image. An RGB digital camera is commonly used for image acquisition especially if the desired object has a color contrast with respect to the background. Some applications require a special image acquisition system like a thermal camera or an infrared camera8. 3. Image processing acts as the brain of the machine vision and is typically composed of pre-processing, segmentation, and feature extraction. a. Pre-processing – modify and prepare the raw image to produce an image data that is suitable for subsequent operation. An example is increasing the intensity of the image pixels. b. Segmentation - the desired object is differentiated from the background. The
. Page 23.818.95. Davies, N. and Gellersen, H.-W. Beyond Prototypes: Challenges in Deploying Ubiquitous Systems. IEEEPervasive Computing(January-March 2002 2002).6. Edwards, S., Lavagno, L., Lee, E. A. and Sangiovanni-Vincentelli, A. Design of embedded systems: formalmodels, validation, and synthesis. Proceedings of the IEEE, 85, 3 1997), 366-390.7. Lunt , B. M., Ekstrom, J. J., Gorka, S., Hislop, G., Kamali, R., Lawson, E. A., LeBlanc, R., Miller, J. andReichgelt, H. Information Technology 2008: Curriculum Guidelines for Undergraduate Degree Programs inInformation Technology. ACM, IEEE-CS, 2008.8. Times, E. Embedded Market Study 2011. City, 2011.9. Anderson, L. W., Krathwohl, D. R. and Bloom, B. S. A taxonomy for learning, teaching, and
informative thus leading to reliable, safeand secure design of CPS in the near future.REFERENCES1. B. M. Mckay and P. A. Engineer, “Best practices in automation security.” Cement Industry Technical Conference, 2012 IEEE-IAS/PCA 53rd, pp. 1 - 15, 2012.2. N. Adam, "Workshop on Future Directions in Cyber-Physical Systems Security ", in Report on Workshop on Future Directions in Cyber-Physical Systems Security, January, 2010.3. B. Miller and D. Rowe, “A survey SCADA of and critical infrastructure incidents,” in Proceedings of the 1st Annual conference on Research in information technology - RIIT ’12, p. 51, 2012.4. ENISA, “Protecting Industrial Control Systems,” 2011.5. B. Schneier, “All Security Involves Trade-offs
(the post-test surveys were different for the two groups).Both sections received three weeks worth of instruction on sorting and hashing, and then bothsections took the identical test.The pre-survey from both groups measured a) students’ experience with online tools, content,and assessment, b) students’ perceptions of their learning in a face-to-face course compared withonline/Web-based instruction, c) students’ experience with using technology or e-textbook as itrelates to accomplishing course work, and d) students’ preference for lecture courses versuscourses given in a lab setting.The post survey from the treatment group measured students’ perception, enjoyment, and satis-faction with the OpenDSA modules, as well as their preference for
Paper ID #6792Development of a Multi-Platform High Performance Computing StreamingVideo Distribution ClusterProf. Carlos R Morales, Purdue University, West LafayetteMr. Perry Lucas CoxMr. Matthew John FarrenkopfMr. Robert Eric Knorr, Purdue University I studied at Purdue University to receive a Bachelor’s of Science in Computer Graphic Technology. I specialized in production and practiced in production management.Erick MoralesMr. Christopher GaetaMr. Martin Jerome Durchholz Page 23.420.1 c American
Paper ID #7151Scaffolding Beginning Research Students Using Open Source ToolsDr. Dhana Rao, Marshall University Dhana Rao is an Assistant Professor in Microbiology at Marshall University, West Virginia. She ob- tained her PhD in 2006 from the University of New South Wales, Australia. Her research interest are in metagenomics and bioinformatics.Dr. Rajeev K Agrawal, North Carolina A&T University (Tech) Dr. Rajeev Agrawal is an assistant professor in the department of computer systems technology at North Carolina A&T State University. He has published 30 referred journal and conference papers and 4 book chapters
Paper ID #6065Tapestry Workshops: Helping High School Teachers Grow and DiversifyComputingProf. James P Cohoon, University of Virginia James P. Cohoon is an Associate Professor in the Department of Computer Science at the University of Virginia. Cohoon has a PhD in Computer Science from the University of Minnesota, an M.S. in Computer Science from Pennsylvania State University, and a BS in Mathematics from Ramapo College of NJ. His research interests include algorithms, Computer Science Education, Diversity and Education, swarms, and VLSI physical design. His awards include the IEEE Computer Society Taylor Booth
Paper ID #7883Experiences Developing International Partnerships for Education and Re-search in ComputingMr. Jason St. John, Purdue University, West Lafayette Jason St. John earned a Bachelor of Science degree in Computer & Information Technology (Network Engineering Technology concentration) from Purdue University, West Lafayette in December 2010. In January 2011, he accepted a position as a Graduate Research Assistant in the Department of Computer & Information Technology at Purdue University working under Dr. Thomas Hacker. He is currently pursuing a master’s degree in high performance computing systems.Prof
. Remote ExperimentationThe lead author has been working on remote laboratory development and implementation for Page 23.807.3more than ten years. During this period, he has attracted research and development grants fromthe National Science Foundation and industries. Some of these developments are used to deliverlaboratory courses within an electrical engineering technology program. This section willprovide an outline of those developments.To maximize the benefit of remote laboratories, the facility design philosophy includes a numberof features: a) use of emerging technologies; b) individualized learning; c) knowledge-centeredlearning; d
and(ρ,θ) is illustrated in Figure 1. A straight line in the plane is uniquely specified by two parameterssuch as (a, b) in the Cartesian space (a and b represent slope and intercept respectively), or (ρ, θ). Inthe polar (parameter) space where ρ is the length of the line segment from the origin perpendicularto the line, and θ is the angle that the line makes with the positive x axis, measured clockwise. Themost commonly used coordinate system in the Hough Transform implementation is (ρ, θ). With nimage points, the ranges of (ρ,θ) can be taken to be ρ: [−M, M ] and θ: [−π, π] where M depends onthe image size. If we restrict θ to be in [0, π] range, then normal parameters for the line will beunique. With this restriction, every line in the x
cyberinfrastructure, computation, and computational tools and methods to: (a) leverage the understanding of complex phe- nomena in science and engineering and (b) support scientific inquiry learning and innovation. Specific efforts focus on studying cyberinfrastructure affordances and identifying how to incorporate advances from the learning sciences into authoring curriculum, assessment, and learning materials to appropriately support learning processes. Page 23.301.1 c American Society for Engineering Education, 2013 Colombian Elementary Students’ Performance and Perceptions of
databases. In ACM SIGMOD Record, volume 22, pages 207-216. ACM, 1993. 8. O.R. Zaiane and J. Luo. Towards evaluating learners' behaviour in a web-based distance learning environment. In Advanced Learning Technologies, 2001. Proceedings. IEEE International Conference , pages 357-360. IEEE, 2001. 9. R. Cooley, B. Mobasher, J. Srivastava, Data preparation for mining world wide web browsing patterns. Knowledge and information systems, 1(1):5-32, 1999. 10. O.R. Zaiane. Building a recommender agent for e-learning systems. In Computers in Education, 2002. Proceedings. International Conference on, pages 55-59. IEEE, 2002. 11. F. Abel, I. Bittencourt, N. Henze, D. Krause, and J. Vassileva. A rule-based
: ACollaborative Virtual Environment for Molecular Modeling," Proc. of ACM Symposium on Virtual Reality Softwareand Technology (VRST), Monterey, CA, 2005.[7] Billinghurst, M., Duenser, A., Augmented Reality in the Classroom. IEEE Computer, Volume 45, Issue 7, pp56-63, July 2012. http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6171143[8] B. Shelton, N Hedley. Using Augmented Reality for Teaching Earth-Sun Relationships to UndergraduateGeography Students. The First IEEE International Augmented Reality Toolkit Workshop. Darmstadt, Germany.September, 2002.[9] Reitmayr, G., Schmalstieg, D., "Collaborative Augmented Reality for Outdoor Navigation and InformationBrowsing," Proc. of Symposium Location Based Services and TeleCartography, 2004.[10] Pair
and high school social studies classes. Page 23.144.1 Dr. Gardner-McCune recently completed a year and a half long Post-Doctoral Research position in com- puter science education at Georgia Institute of Technology’s College of Computing where she led the design of the I-3 Experience programs. She holds a B. S. degree in Computer Engineering from Syra- cuse University, and earned both her masters and doctorate in Computer Science from Georgia Institute c American Society for Engineering Education, 2013
demonstrate differences in team performance for simulations and real robotexperiments. While simulations are good for quicker testing and a cheaper solution thanpurchasing equipment, conducting experiments with real robots allows for more accurate results.In physical experiments, there are many factors, such as robot interference, an unknownenvironment, and delayed communications, which can influence results. However, running realexperiments are required to accurately test the efficiency of an approach. Future work includesexamining these factors further.Bibliography[1] S. Dawson, B. L. Wellman, and M. Anderson, “Using simulation to predict multi-robot performance on coveragetasks,” in Intelligent Robots and Systems (IROS), 2010 IEEE/RSJ
presentations.Each paper was reviewed by multiple students and faculty who provided both technical andeditorial comments.Homework Assignment:Would you please read the following articles?Anastassiou, D., "Genomic signal processing," Signal Processing Magazine, IEEE , vol.18, no.4,pp.8-20, Jul 2001.Afreixo, Vera, et al. "Genome analysis with inter-nucleotide distances." Bioinformatics 25.23(2009): 3064-3070.Would you please summarize your readings? Please prepare a PowerPoint presentation of yoursummary to share with the class.Class DiscussionAnastassiou, D. , "Genomic signal processing," Signal Processing Magazine, IEEE , vol.18, no.4,pp.8-20, Jul 2001.a) “Genomic signal processing (GSP) creates a paradigm shift.” What does Anastassiou mean byit?b
, the behavioral change is possible because the involved systems haveknowledge about other co-located wireless devices. Page 23.1244.13References1. Gang Zhao, Network Protocols and Algorithms, 2011, Vol. 3, No. 1, Wireless Sensor Networks for Industrial Process Monitoring and Control: A Survey.2. L. Q. Zhuang, K. M. Goh and J. B. Zhang, 1-4244-0826-1/2007 IEEE , The Wireless Sensor Networks for Factory Automation: Issues and Challenges.3. http://www.ni.com/white-paper/7142/en, published May 05, 20124. Javad Shakib, Mohammad Muqri ,118th Annual ASEE Conference, Session: AC 2011- 389, Wireless Technologies in Industrial
for a pattern to be "interesting". 2. Data Preprocessing. Real world data are generally (a) incomplete: lacking attribute values, lacking certain attributes of interest, or containing only aggregate data (b) noisy: containing errors or outliers and (c) inconsistent: containing discrepancies in codes or names. Certain basic preprocessing techniques are discussed here, including: • Data cleaning: fill in missing values, smooth noisy data, identify or remove outliers, and resolve inconsistencies. • Data integration: using multiple databases, data cubes, or files. • Data transformation: normalization and aggregation. • Data reduction: reducing
' Percieved Satisfaction, Behavioral Intention, and Effectiveness of E-Learning: A Case Study of the Balckboard System." Computers & Education, Vol. 51, pp. 864-73.11. Marques, B. P., J. E. Villate, and C. V. Carvalho. (2011). "Applying the Utaut Model in Engineering Higher Education: Teacher's Technology Adoption." In 6th Iberian Conference on Information Systems and Technologies (CISTI), 1-6: IEEE.12. Sumak, B., G. Polancic, and M. Hericko. (2010). "An Empirical Study of Virual Learning Page 23.961.8 Environemnt Adoption Using Utaut." In Second International Conference on Mobile, Hybrid, and On-line
Security Instruction. J. Educ. Resour. Comput. 6(4), 5. doi: 10.1145/1248453.1248458.2. Cao, X., Y. Wang. Wang, A. Carciula & Wang. 2009. Developing a multifunctional network laboratory for teaching and research. In Proceedings of the 10 th ACM conference on SIG-information technology education, 155-160. Fairfax, Virginia, USA: ACM.3. Curtis, S. 2011. World IPv4 Stocks Finally Run Out. TechWeek Europe.4. DoD HPC. 2012. IPv6 not Needed Here. Retrieved 11 December, 2012 from http://www.hpcmo.hpc.mil/cms2/5. EMC. 2012. EMC Academic Alliance. Retrieved 11 December, 2012, from https://education.emc.com/academicalliance.6. Hamza, M. K., Alhalabi, B., Hsu, S., Larrondo-Petre, M. M., and Marcovitz, D.M. 2003. Remote
Technology, Sensing, and Simulation (CE)Stanford CS221: ArtificialUniversity28 Intelligence: CS Principles and Techniques CS229- Machine Learning EE 294 A – AI EE 294 B – Probabilistic Models in AI EE 294C – Machine LearningUniversity of Genetic CE889-7-AU: Offering an MSc inEssex29(U.K.) Programming and ARTIFICIAL Computational
Paper ID #6513Capstone Experience: Multimedia Request AutomationDr. Mudasser Fraz Wyne, National University Ph.D. in Computer Science, from University of Birmingham U.K., M.Sc. in Engineering and B.Sc., in Electrical Engineering. He has been in academics for 24 years and currently serving as a Professor of Computer Science and Chair department of Computer Science, Information and Media Systems at School of Engineering, Technology, and Media, National University, San Diego, USA. He is also the program lead for BS in Information Systems program. He is serving as a commissioner for Computing Accredi- tation Commission
Paper ID #6904Application of Wireless Sensor Networks in Health Care SystemDr. Afsaneh Minaie, Utah Valley University Afsaneh Minaie is a professor of Computer Engineering at Utah Valley University. Her research interests include gender issues in the academic sciences and engineering elds, Embedded Systems Design, Mobile Computing, Wireless Sensor Networks, and Databases.Dr. Ali Sanati-Mehrizy Dr. Ali Sanati-Mehrizy is a graduate of the Milton S. Hershey Pennsylvania State University College of Medicine. He completed his undergraduate studies in Biology from the University of Utah. In July 2013, he will begin a