al., Editors. 2010, Springer Berlin / Heidelberg. p. 216-227.4. Soldani, D., M. Li, and R. Cuny, QoS and QoE management in UMTS cellular systems. 2006, Chichester: John Wiley and Sons. xxvii, 459 p.5. Kilkki, K., Quality of Experience in Communications Ecosystem. Journal of Universal Computer Science, 2008. 14(5): p. 615-624.6. Kist, A.A., A Framework to Evaluate Performance from an Application and User Perspective, in 2011 Australasian Telecommunication Networks and Applications Conference (ATNAC 2011) 2011: Melbourne, Australia.7. Brooks, P. and B. Hestnes, User measures of quality of experience: why being objective and quantitative is important. Network, IEEE, 2010. 24(2): p. 8-13.8
, 2011 618.70 823.48 Huntsville Vernal Equinox March 20, 2011 455.89 707.50 Huntsville Summer Solstice June 21, 2011 630.25 825.62 Huntsville Autumnal Equinox September 23, 2011 455.18 706.81 Huntsville Winter Solstice December 22, 2011 192.31 461.42 Table 4. The average amount of solar energy produced at Morogoro and Huntsville.Figure 4-1 (a) and (b) show the simulated solar energy collection versus time at Huntsville on thesummer solstice day, June 21, 2011. Similar trends, but of course different magnitude plots weregenerated for Morogoro and all other days. Table 4 lists the average value over the day lightperiod at
the release of failure data. A more pragmatic approach for the purposes ofcontrasting cable reliability is to explore the actual causes of failure in cable.IV. Economies of Fiber Optic vs. Copper NetworkThe question must be asked, if fiber optic cable is so much more effective and reliable attransmitting data, why have telecommunication network providers adopted its use in every singlepossible area? The answer has much more to do with economics of network operations than itdoes in the effectiveness of it. It is simply not cost effective to deploy a Fiber to the Page 25.1300.3Home/Business (FTTH/B) end to end fiber optic network.As an example
clustering. The document sethas been simplified to only have 2 different words in each document. The values on the X and Yaxes are the word weights of those two words in the documents. Figure 5a shows the documentsarranged on 2-dimensional grid without any clustering information applied. Figure 5b and 5cdiffer in that the documents have been colored and circled to designate the different clusterswithin the set of documents. Figure 5b has been clustered using the K-means algorithm, while Page 25.1012.12with Figure 5c our genetic algorithm is used to find a clustering solution. Figure 5 a) Documents without clustering (left), b) K-means Clustering
effectiveness of the course contents and their placements in the framework. Bibliography 1. Armburst, A. Fox, R. Griffth, A.Joseph, R.Kaltz, G. Lee, D. Patterson, A. Rabkin, and M. Zaharia. “Above the Clouds: A Berkeley View of Cloud Computing”. http://www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS 200928.pdf 2. Escalante, B. F. (2010). “Cloud Computing Fundamentals”. In Handbook of Cloud Computing. Springer link. 3. Delic Walker. “Emergence of the academic computing clouds”. ACM publications, August 2008. http://portal.acm.org/citation.cfm?id=1414664 4. M. Chowdhury. “Cloud Computing: Facts, Security, & Challenges.” http://www.aipath.com/mchowdhury_law447b.pdf 5. Dias Marcos, Alexdandre, Buyya. “Evaluating the cost
consulted for assistance. After evaluation, evidence was uploaded into a Microsoft Access database and stored in asecure network folder. This folder was available only to those active in the ABET analysisprocess to ensure preservation of the document. Within the Access database, courses were organized based on course number and in order Page 25.192.4to view specific courses, a user could scroll using the arrows seen in Figure 3.A to cycle throughthe list of courses. The top matrix for each course, labeled “Target”, is a repetition of the SOM,showing the courses targeted Bloom’s levels for each of the ABET Student Outcomes (Figure3.B). The
Page 25.1009.2for them. Students can do all the homework from any location as long as they have access tocomputer.(b)-A student can learn at his or her own pace.(c)- Degrees can be completed in less time compared to traditional universities.(d)- Students have fewer distractions, and it can be less intimidating to participate in thediscussions.(e)-Students have the opportunity to connect with and work alongside students from otherlocations.Cons(a)-Students who have trouble managing their time may find it difficult.(b)-Lack of interaction personally with other students and the instructor.(c)-Technology and/or technology issues may be a barrier for some students2- Limitations of the onsite teaching of senior projectsSenior projects often consist
course contents are available only to internalaudience through courseware such as BlackBoard or Moodle. We do our best to summarize thecollected data into a coherent segment of information. The raw data used in this paper are listedin Appendix A (course websites), Appendix B (textbooks used), and Appendix C (list of courseobjectives and goals by each course when available). Readers can also visit the informationonline at one of authors’ website at http://www.eg.bucknell.edu/~xmeng/webir-resources-asee2012.html.The rest of the paper is organized as follows. Section 2 is a review of other surveys of similarnature and general discussions of teaching and learning on the subject of information retrievaland web search. In Section 3, we present our
detailed information that can be used by the author. For example,they might point out problems in the author’s work or provide suggestions to improve the work,similar to that in the last two comments in Table 1, below.Reviewer feedback can be evaluated by a process referred to as metareviewing. Metareviewing isdefined as the process of reviewing reviews, i.e., the process of identifying the quality ofreviews. Metareviewing is a manual process and just as with any process that is manual;metareviewing is (a) slow, (b) prone to errors and is (c) likely to be inconsistent. An automatedreview process ensures consistent (bias-free) reviews to all reviewers. It also provides immediatefeedback to reviewers, which is likely to motivate reviewers to improve
intelligence applications ANALYSIS What‐if Configurable UIs REPORTs applications scenarios (web, excel) Physicians Partners Foundational Data Model Data Feeds Figure 2.1 – Goals for NU Physicians Partners ProjectIn addition, the design rationale for providing solutions to these two separate elements warrantedan approach that must be viable; (a) Lower the clients initial capital expenditure (CAPEX) at inception and deployment of any new system proposed, and (b) Exhibit significant reduced long term operational expenditure (OPEX) in terms of
-scada-systems-hacked-by-anonymous/19. Charette, Robert, “Stuxnet Successor Looking for New Cyber Targets?” IEEE Spectrum, Risk factor, October 2011, http://spectrum.ieee.org/riskfactor/telecom/security/stuxnet-successor-looking-for-new-cyber-targets Accessed March 201220. Nakashima, Ellen, “Water-pump failure in Illinois wasn’t cyberattack after all,” Washington Post November 25, 2011.21. Criteria for Accrediting Computing Programs: Effective for Evaluations During the 2011-2012 Accreditation Cycle (2010).22. Lunt , B. M., Ekstrom, J. J., Gorka, S., Hislop, G., Kamali, R., Lawson, E. A., et al. (2008). Information Technology 2008: Curriculum Guidelines for Undergraduate Degree Programs in Information
the best practices in implementing future iPhone apps development.Bibliography1. Muqri, M., Shakib, J., A Taste of Java-Discrete and Fast Fourier Transforms, American Society for Engineering Education, AC 2011-451.2. Shakib, J., Muqri, M., Leveraging the Power of Java in the Enterprise, American Society for Engineering Education, AC 2010-1701.3. Learning Objective-C: A Primer, iOS Developer Library, http://developer.apple.com/devcenter/ios/gettingstarted/docs/objectivecprimer.action4. The Objective- C Programming Language, February 2003, http://pj.freefaculty.org/ps905/ObjC.pdf5. Altenberg, B., Clarke, A., Mougin, P., Become an Xcoder : Start Programming the Mac Using Objective-C, CocoaLab, 2008, http
, one of the authors has taught his mechanics courses from classlecture notes and handouts13,14, and provided CBA’s from a range of topics, such as: a. Vector algebra – addition and multiplication; b. Particle equilibrium; c. Equivalent Force and Moment Systems; d. Reactions for plane trusses and frames; e. Analysis of a three-bar truss; f. Geometric properties of lines, areas, or masses; g. Equilibrium of an object on a rough inclined plane; and h. Shear force and bending moment diagrams for cantilevers and simple beams.Some typical CBA’s are shown in the Appendix.For the data presented in this paper, students were organized into teams of four or five persons,with each team having approximately equal academic strength
Calculate Quantize Harmonic Amplitudes Amplitudes Fig 2.1(a): Block Diagram of Split-Band LPC Encoder. Page 25.960.6The blocks are implemented in MATLAB Simulink. The Simulink Model is as shown in Fig.2.1(b) yout3 Signal To Workspace3
results may only bemeaningful to specific instructors, given the unique nature of any one course, although we expectthat instructors who use question and answer style discussion boards will also find these resultsuseful. The next step in the study is to interview a second teacher, whose course workflows havebeen developed, starting with the results from this investigation.AcknowledgementsThe work was supported by the National Science Foundation, under Human-CenteredComputing grant #0917328. Page 25.177.8Bibliography 1. Deelman, E., Singh, G., Su, M., Blythe, J., Gil, Y., Kesselman, C., Mehta, G., Vahi, K., Berriman, G. B., Good, J
AC 2012-3348: JUST-IN-TIME TEACHING: COMPUTER SCIENCE MEETSPHYSICSDr. Alex Pantaleev, State University of New York, Oswego Alex Pantaleev received a B.A. degree in computer science from the American University in Bulgaria, Blagoevgrad, Bulgaria, in 2003, and M.S. and Ph.D. degrees in computer science from the Ohio State University, Columbus, Ohio in 2007 and 2008, respectively. He is currently an Assistant Professor in the Department of Computer Science at the State University of New York, Oswego.Dr. Adrian Ieta, State University of New York, Oswego Adrian Ieta received a B.Sc. degree in physics from the University of Timisoara, Timisoara, Romania, in 1984, a B.E.Sc. degree in electrical engineering from the
AC 2012-4446: COMPUTER ENGINEERING CAPSTONE PROJECTS INTHE COMPUTER SCIENCE DEPARTMENTDr. Afsaneh Minaie, Utah Valley University Afsaneh Minaie is a professor of computer science at Utah Valley University. Her research interests include gender issues in the academic sciences and engineering fields, embedded systems design, mobile computing, wireless sensor networks, and databases.Mr. Ali Sanati-Mehrizy, Pennsylvania State UniversityMr. Paymon Sanati-Mehrizy, University of Pennsylvania Paymon Sanati-Mehrizy is currently a senior at the University of Pennsylvania, studying biology. Cur- rently, his research interests consist of higher education curricula, including within the field of wireless sensor networking. After
AC 2012-4722: INTEGRATION OF WIRELESS SENSOR NETWORKS INTHE COMPUTER SCIENCE AND ENGINEERING CURRICULADr. Afsaneh Minaie, Utah Valley University Afsaneh Minaie is a professor of computer science at Utah Valley University. Her research interests include gender issues in the academic sciences and engineering fields, embedded systems design, mobile computing, wireless sensor networks, and databases.Mr. Ali Sanati-Mehrizy, Pennsylvania State UniversityMr. Paymon Sanati-Mehrizy, University of Pennsylvania Paymon Sanati-Mehrizy is currently a senior at the University of Pennsylvania, studying biology. Cur- rently, his research interests consist of higher education curricula, including within the field of wireless sensor
AC 2012-3999: STUCK IN THE MIDDLE: THE IMPACT AND PREVA-LENCE OF FRUSTRATION IN ONLINE QUESTION-ANSWER DISCUS-SION THREADSMr. Michael Hergenrader, University of Southern California Michael Hergenrader is a senior majoring in computer science and Spanish. His interests include dis- tributed systems, machine learning, and search technologies. At the Informational Sciences Institute at ISI and at IBM, he is able to work with pride and happiness in all that he does.Dr. Jihie Kim, University of Southern California Jihie Kim is the Principal Investigator of the Intelligent Technologies for Teaching and Learning group in the USC Information Sciences Institute (http://ai.isi.edu/pedtek). She is also a Research Assistant
AC 2012-3122: DEVELOPING VIRTUAL CLUSTERS FOR HIGH PER-FORMANCE COMPUTING USING OPENNEBULAMr. Jason St. John, Purdue University, West Lafayette Jason St. John earned a Bachelor of Science degree in Computer & Information Technology (Network Engineering Technology concentration) from Purdue University, West Lafayette in December 2010. In January 2011, Jason accepted a position as a Graduate Research Assistant in the Department of Computer & Information Technology at Purdue University working under Dr. Thomas Hacker. Jason is currently pursuing a Master’s Degree in high performance computing systems.Prof. Thomas J. Hacker, Purdue University, West Lafayette Thomas J. Hacker is an Associate Professor of computer
AC 2012-3033: APPLICATION OF JAVA TECHNOLOGY IN INDUSTRIALREAL-TIME SYSTEMSDr. Javad Shakib, DeVry University, Pomona Page 25.194.1 c American Society for Engineering Education, 2012 Application of Java Technology in Industrial Real-Time SystemsIndustrial automation is currently characterized by a number of trends induced by the currentmarket situation. The main trends are the pursuit of high flexibility, good scalability, highrobustness of automation systems, and the integration of new technologies in all fields and levelsof automation. Of special interest is the integration of technologies into the control area.In this context
AC 2012-3612: LARGE SCALE, REAL-TIME SYSTEMS SECURITY ANAL-YSIS IN HIGHER EDUCATIONJordan Sheen, Brigham Young University Jordan Sheen is a graduate student in the School of Technology at Brigham Young University (BYU). Sheen completed a B.S in information technology at BYU in 2011, where his main interests were in cyber security and embedded systems. In his graduate program, Sheen will focus on the security of critical infrastructure components. In his spare time, Sheen enjoys walking with his wife, wrestling with his three sons, and cooing for his infant daughter.Dr. Dale C. Rowe Ph.D., Brigham Young University Dale Rowe’s is an asst. professor of IT and a director of the Cyber Security Research Laboratory. His