Paper ID #9264Credentialing MOOCs: A Case StudyMr. S. Cory Brozina, Virginia Tech Cory Brozina is a PhD student in the Engineering Education department at Virginia Tech. His research is in educational technology and data analysis.Dr. David B Knight, Virginia Tech Department of Engineering Education David Knight is an Assistant Professor in the Department of Engineering Education and affiliate faculty with the Higher Education Program at Virginia Tech. His research focuses on student learning outcomes in undergraduate engineering, interdisciplinary teaching and learning, organizational change in colleges and universities
, technology is not widely integrated into the learning experience. A recent surveyof ECAR shows that they wish that their professors more often use classroom technology inonline or face to face teaching (Figure 2).Figure 1: Students’ ownership of education related tech devices (a) and their importance rank to do with mobile devices (b) [2] Page 24.760.3 Figure 2: Student wished that their professors communicated more using these means [2]Classroom technology is both highly customizable and intrinsically motivating to students, it isparticularly well-suited to expand the learning experience [3]. Besides innovative
-446.4. DeMarco, T. 1982. Controlling software projects: management, measurement & estimation. Yourdon Press, New York, NY.5. Humphrey, W. S. (1988). Characterizing the software process: a maturity framework. Software, IEEE, 5, 2 (March/April, 1998), 73-79.6. Kaner, M., and Karni, R. 2004. A capability maturity model for knowledge-based decision-making. Information, Knowledge, Systems Management, 4, 4 (December, 2004), 225-252.7. Keller, K., and Mack, B. 2013. Maturity Profile Reports (March 2013). Retrieved May 17, 2013 from http://cmmiinstitute.com/assets/presentations/2013MarCMMI.pdf.8. Kitson, D., and Masters, S. 1992. Analysis of SEI Software Process Assessment Results 1987-1991, Technical Report
an object-oriented system. Figure 1 - Example UML Class DiagramOf course, she could not see a UML diagram. Therefore, there were several major problems thathad to be overcome: a) helping her to understand what the diagrams normally convey visually, soshe can understand what the diagrams teach about program structure, b) providing a way torepresent a UML diagram that she could both read and produce, and c) providing a way for herto participate in the diagram assignments and, in particular, the peer review process.The natural idea for conveying UML diagrams was to convert them to raised-dot diagrams,where the structure is indicated by raised dots on paper and the textual elements are indicated inBraille. RCPD has a
figure is the block diagram of this homework.Homework : Design a binary to decimal convertor.1-Multiply bit #i by 2^i.2-Add all the results obtained from step 1.Following figure is the block diagram of this homework. Page 24.842.6These homework could be expanded for teaching the procedure for converting a number fromother bases such as octal or hexadecimal.(b)- LabVIEW in the Data Communications coursesLabVIEW could be used to enhance teaching communication courses. It is very helpful inexplaining many important topics such as: AM, FM, and PSK, and many other communicationtopics.Homework : Design AM modulation with LabVIEW. Use the following
Further examples can be found in the literature6,7. It is clear that each sub-convolution can beseparately processed, followed by a reconstruction stage to provide the final result. Parallelalgorithms can be developed by factorization of the Block Pseudocirculant matrix shown in (9),(12) and (13) into diagonal blocks. The general tensor product formulation for a block diagonalfactorization of the Block Pseudocirculant Matrix is6, y r = R r0 (A r0 ⊗ I N/r )D H (B r0 ⊗ I N/r )x r0 (15) 0 0 r0 0where xr0 and yr0 are the decimated-by-r0 input and output sequences and Ar0 and Br0 are thepost/pre-processing matrices, which are determined by each
of the Thirty-second SIGCSE Technical Symposium on Computer Science Education, SIGCSE ’01, pages 36–40, 2001. ISBN 1-58113-329-4.15 Steven P Miller, B Clifford Neuman, Jeffrey I Schiller, and Jermoe H Saltzer. Kerberos authentication and authorization system. In In Project Athena Technical Plan. Citeseer, 1987.16 Vennila Ramalingam and Susan Wiedenbeck. Development and validation of scores on a computer programming self-efficacy scale and group analyses of novice programmer self-efficacy. Journal of Educational Computing Research, 19(4):367–381, 1998.17 Dale C. Rowe, Barry M. Lunt, and Joseph J. Ekstrom. The role of cyber-security in information technology education. In Proceedings of the 2011 Conference on Information Technology
Paper ID #9482Cloud Computing: Is it a way to go for academia?Prof. Mudasser Fraz Wyne, National University I have a Ph.D. in Computer Science, M.Sc. in Engineering, and B.Sc. in Electrical Engineering. In my capacity as Chair of the Department of Computer Science, Information and Media Systems at the Na- tional University of San Diego, I administer 4 graduate and 4 undergraduate programs. Furthermore, I manage 7 specializations, 2 certification programs, as well as the teaching and scholarship of 14 full-time faculty members (7 Full Professors, 4 Associate Professors, and 3 Assistant Professors) and more than 115
. Boston: Academic Press, 2011.3. Bird, Robert. B.; Stewart, Warren E.; Lightfoot, Edwin N. Transport Phenomena, 2 nd edition. New York:J. Wiley, 2002.4. Borgnakke, Claus; Sonntag, Richard E. Fundamentals of Thermodynamics, 7 th edition. J. Wiley, 2008.5. Çengel, Yunus A.; Boles, Michael A. Thermodynamics an Engineering Approach, 6 th edition. NewYork: McGraw-Hill, 2008.6. Çengel, Yunus A.; Cimbala, John M.; Turner, Robert H. Fundamentals of Thermal-Fluid Science,4thedition.New York: McGraw-Hill, 2012.7. Çengel, Yunus A.; Cimbala, John M. Fluid Mechanics: Fundamentals and Applications, 2 nd. McGraw-Hill, 20108. Çengel, Yunus A.; Cimbala, John M. Fluid Mechanics Fundamentals and Applications, 3 rd edition.McGraw-Hill, 2013.9. Chi, M.T.H. (2005
% 0.0% A B C D FFigure 13: Grade Distribution Between Flipped (n=27) and Non-Flipped (n=21) Course Sections Page 24.181.16Comparing the grade distribution of only summative assessments between the flipped and non-flipped courses might provide a more specific comparison, as shown in Figure 14. Flipped Classroom Non-Flipped Classroom 51.9% 52.4% 38.1% 25.9% 14.8% 7.4% 4.8
24.638.74. van den Berg-Emons, H. J. G., Saris, W. H. M., de Barbanson, D. C., Westerterp, K. R., Huson, A., & van Baak, M. A. (1995). Daily physical activity of schoolchildren with spastic diplegia and of healthy control subjects. The Journal of Pediatrics, 127(4), 578–584.5. Betker, A. L., Szturm, T., Moussavi, Z. K., & Nett, C. (2006). Video game–based exercises for balance rehabilitation: A single-subject design. Archives of Physical Medicine and Rehabilitation, 87(8), 1141– 1149.6. Bjornson, K. F., Belza, B., Kartin, D., Logsdon, R., & McLaughlin, J. F. (2007). Ambulatory physical activity performance in youth with cerebral palsy and youth who are developing typically. Physical Therapy, 87(3
locations and display similar locations. a) b) Figure 6: False detections of small landmarks on top of large landmarks. Although three main large landmarks are taken inside bounding boxes, many unnecessary small landmarks also appear inside large landmarks. a) Surface image, b) ROIs drawn on imageLRO imagery was retrieved from [18]. The multi-resolution Reduced Data Records (RDR) forthe LROC were downloaded as they provide preprocessed projected mosaics at relatively highresolution suitable for our study. An imagery pre-processor was developed, using GDAL andOpenCV, to construct image pyramids from the LRO imagery, suitable for display using WorldWind. Each tile in the pyramid is then
] Chaitanya Mishra, Nick Koudas, and Calisto Zuzarte. Generating targeted queries for database testing. In Proceedings of the 2008 ACM SIGMOD international conference on Management of data, SIGMOD ’08, pages 499–510, New York, NY, USA, 2008. ACM.[16] R. Nielsen, J. Buckingham, G. Knoll, B. Marsh, and L. Palen. A taxonomy of questions for question generation. In Workshop on the Question Generation Shared Task and Evaluation Challenge, 2008.[17] Christopher Olston, Shubham Chopra, and Utkarsh Srivastava. Generating example data for dataflow programs. In Proceedings of the 35th SIGMOD international conference on Management of data, SIGMOD ’09, pages 245–256, New York, NY, USA, 2009. ACM.[18] Shiyan Ou, Constantin Orasan, Dalila
Paper ID #9550A collaborative, multinational cyberinfrastructure for big data analyticsProf. Raymond A Hansen, Purdue UniversityDr. Tomasz Wiktor Wlodarczyk, University of Stavanger Dr Tomasz Wiktor Wlodarczyk, is an Associate Professor at the Department of Electrical and Computer Engineering at University of Stavanger, Norway. His work focuses on analysis, storage and communica- tion in data intensive computing. His particular interest is time series storage and analysis. He is currently working on these areas in several research projects including: SEEDS (EU FP7), Safer@Home (RCN), A4Cloud (EU FP7), BigDataCom-PU
Paper ID #10639Wireless Sensor Networks Projects in a Computer Engineering ProgramDr. Afsaneh Minaie, Utah Valley University Afsaneh Minaie is a professor of Computer Engineering at Utah Valley University. She received her B.S., M.S., and Ph.D. all in Electrical Engineering from University of Oklahoma. Her research interests include gender issues in the academic sciences and engineering fields, Embedded Systems Design, Mobile Computing, Wireless Sensor Networks, and Databases.Dr. Reza Sanati-Mehrizy, Utah Valley University Reza Sanati-Mehrizy is a professor of Computer Science Department at Utah Valley University, Orem
Paper ID #9362A Visual and Engaging Approach to Learning Computer AlgorithmsDr. Daniel Raviv, Florida Atlantic UniversityYumi Kahori NakagawaMr. George Roskovich Page 24.126.1 c American Society for Engineering Education, 2014 A Visual and Engaging Approach to Learning Computer Algorithms Daniel Raviv, George Roskovich and Yumi Nakagawa Department of Computer & Electrical Engineering and Computer Science Florida Atlantic University Boca
Fall2012. Since Spring 2011, the course has regularly had a higher proportion of women enrolledthan the overall CS department. Even when projects are not successful, HGD gives studentsvaluable experience working on large projects and to exercise management and leadership skillsthrough experiential learning. We have also provided useful guidelines and suggestions to helpother colleges and universities replicate the success of HGD.References1 Briana B. Morrison and Jon A. Preston. Engagement: Gaming throughout the curriculum. In Proceedings of the 40th ACM Technical Symposium on Computer Science Education, SIGCSE ’09, pages 342–346, New York, NY, USA, 2009. ACM.2 Yolanda Rankin, Amy Gooch, and Bruce Gooch. The impact of game design on
Paper ID #8737CENTRALIZED OR FEDERATED DATA MANAGEMENT MODELS, ITPROFESSIONALS’ PREFERENCESDr. Gholam Ali Shaykhian, NASA Ali Shaykhian has received a Master of Science (M.S.) degree in Computer Systems from University of Central Florida and a second M.S. degree in Operations Research from the same university and has earned a Ph.D. in Operations Research from Florida Institute of Technology. His research interests include knowledge management, data mining, object-oriented methodologies, design patterns, software safety, genetic and optimization algorithms and data mining. Dr. Shaykhian is a professional member of the
Paper ID #8720Information Technology for Communities: Development of a Web-based 3DVisualization and Cluster Computing System for Disaster ManagementDr. Ge Jin, Purdue University Calumet (College of Technology) Ge Jin, D.Sc, is currently an assistant professor in the Department of Computer Information Technology and Graphics at the Purdue University Calumet. He teaches computer game development, computer graphics and animation, as well as computer information technology courses at the undergraduate and graduate levels. Prior to joining Purdue University Calumet, he was a postdoctoral research scientist at the George
Paper ID #8523The Effect of Feedback Mechanisms on Students’ Learning in the Use ofSimulation-based IT Training in a Computer Networking ProgramDr. Usman Ghani, DeVry University Usman Ghani Senior Professor DeVry University College of Engineering and Information Science Usman Ghani is a senior professor of Network and Communication Management in the College of En- gineering and Information Science at DeVry University, Addison, Illinois. Professor Ghani’s area of specialization is ’Network Infrastructure and Security’. Mr. Ghani began his career as an Electronics Engineer for Johnson Controls, Inc. in Milwaukee, Wisconsin
block diagram of the systemis shown in Figure 1. This is composed of a) Experiment bank; b) Switching mechanism; c)Interfacing between the system and the experiment bank; d) Graphical user interface (GUI); e)Access control and user management; and f) Web application for system monitoring. Figure 1: Overall block diagram of the developed system.Experiments and InterfacingThe Experiment bank consists of all the developed experiments and is connected to the HostComputer via a switching mechanism. The switching mechanism allows one to reconfigure thehardware connection to form different experiment setups.The developed experiments deal with both the analog and digital signals. An I/O card fromNational Instruments (NI) is
Objectivesevolve. To complete the program of study for the BS-CS, every student will a) Demonstrate proficiency in the foundation areas of Computer Science including discrete structures, logic and the theory of algorithms. b) Demonstrate proficiency in various areas of Computer Science including data structures and algorithms, concepts of programming languages and computer systems. c) Demonstrate proficiency in problem solving and application of software engineering techniques. d) Demonstrate mastery of at least one modern programming language and proficiency in at least one other. e) Demonstrate understanding of the social and ethical concerns of the practicing computer scientist. f) Demonstrate the ability to work cooperatively in teams. g
fairness, is given inFigure 6. We observe in a) that a mutex may be unfair if the lock is obtained just after beingreleased, while chained semaphores in b) produce a pattern that resembles a checkerboard.However, if the critical section is short and frequent, a simple mutex is much faster on av-erage than the perfect fairness achieved with chained semaphores, where a context switch isforced at each cycle. Understanding the fine differences between lock types, clearly exposedby looking at their detailed behavior, would be hard to achieve without tracing. (a) Blocking mutex (b) Spinlock running in userspace Figure 5: Difference between mutex and spinlockThe
ate upd rds A hea ccess processing nd n g a reco lth ing Data s i e car & es car e B upd Acc ealth
://www.digikey.com3. D. Vyas, “Microcontrollers: options and trends in today's market,” in ACM Proceedings International Conference and Workshop on Emerging Trends in Technology, Mumbai, India, 2010, pp. 1019-1019.4. D’Souza, J., Reed, A., & Adams, K. (2014). Selecting Microcontrollers and Development Tools for Undergraduate Engineering Capstone Projects. Computers in Education, 24(1), (In press)5. M. Slade, M. H. Jones, and J. B. Scott, “Choosing the right microcontroller: A comparison of 8-bit Atmel, Microchip and Freescale MCUs,” Faculty of Engineering, The University of Waikato, Hamilton, New Zealand, Tech Rep. http://hdl.handle.net/10289/5938 , Nov. 2011.6. Daniel Cross-Cole, ‘ECET 365 Course Overview’ document, DeVry University, available
example,design different filters based on their pole/zero location, an obvious characteristic evidentin the frequency domain.Example 2. Similar to Example 1 but with zero initial conditions (ZIC):6y[n] – 5y[n-1] + y[n-2] = 6x[n] , x[n] = (2)n u[n] , y[-1] = y[-2] = 0y[n] = yh[n] + yp[n] = C1(0.5)n + C2(1/3)n + C3(2)n = -(0.5)n + 0.4(1/3)n + 1.6(2)n, n ≥ 0.H(z) = Y(z)/X(z) = 6z2/(6z2 -5z +1), Y(z) = X(z)H(z) = z3/[(z - 0.5)(z - 1/3)(z - 2)].At the same time students can use MATLAB solution to compare it to the analyticalformulation presented above.>> n=0:1:10; B=[1]; A=[1, -5/6, 1/6]; x=2.^n; y=filter(B,A,x)y = 1.0e+003 * Columns 1 through 10 0.0010 0.0028 0.0062 0.0127 0.02550.0512 0.1024 0.2048
be put in place. This could be considered a combination of message encryption and authentication. For the Student Activities component of each module, there are two basic required partswhose completion assures that the respective knowledge is acquired: (a) Required Reading and(b) Hands-on Exercise. In case of Java Security module, the Required Reading involved theessential mandatory reading from the source “Java Security Overview” white paper,9 and anoptional reading material from a selection of Java security books, determined primarily by theiravailability in the school library.10-12 The reading was accompanied by a specially developed Hands-on Exercise, which involvedfollowing the actual code to replicate the security violation
sequences.ImplementationA multiway lexicographic search tree can be used to represent a sequence where an eventfrom the sequence of events determines a multiway branch at each step. If the sequence isconstructed from the English alphabets, at the root of the tree there are 26 possiblebranches followed by another branch according to the next letter in the sequence.The tree shown in Fig. 16 represents sequences constructed from letters a, b, and c. Page 24.1079.3 Fig. 1. A multiway lexicographic search tree constructed using the English letters.At the root of the tree, there are three branches one for each of the letters a, b, and c. Atthe next level there are
, February 2003, http://pj.freefaculty.org/ps905/ObjC.pdf5. Altenberg, B., Clarke, A., Mougin, P., Become an Xcoder : Start Programming the Mac Using Objective-C, CocoaLab, 2008, http://www.e-booksdirectory.com/details.php?ebook=38326. Kochan, S. G., Programming in Objective-C, Addison-Wesley, August 2011.7. Cocoa Developers Guide, Apple Developer Publications, December 2010, http://itunes.apple.com/us/book/cocoa-fundamentals- guide/id409921412?mt=118. Deitel, H.M., Deitel, P.J., Java How to program, Prentice Hall, 2003 Page 24.234.12Appendix A: Bluetooth Project Class Definitions and Pairing MethodsIOBluetoothAn
. Rixner, and A.L. Cox. “The Hadoop distributed filesystem: Balancing portability and performance,” in Performance Analysis of Systems & Software (ISPASS), 2010 IEEE International Symposium, on pages 122-133, IEEE, 2010.7. G. Attebury, A. Baranovski, K. Bloom, B. Bockelman, D. Kcira, J. Letts, T. Levshina, C. Lundestedt, T. Martin, W. Maier, H. Pi, A. Rana, I. Sfiligoi, A. Sim, M. Thomas, and F. Wuerthwein. “Hadoop Distributed File System for the grid,” in Nuclear Science Symposium Conference Record (NSS/MIC), 2009 IEEE, on pages 1056-1061. IEEE, October, 2009.8. R. P. Padhy. “Big Data Processing with Hadoop-MapReduce in Cloud Systems,” in International Journal of Cloud Computing and Services Science (IJ