and texts as resulting from typified behaviors, knowledge, and actions of agiven community of practice: “[T]o write, to engage in any communication is to participate in acommunity; to write well is to understand the conditions of one’s own participation with thatcommunity and determine the success or failure of communication”11. As such, genres reflect thevalue systems of individual organizations (e.g., a stand alone business) and also large scalecommunities (e.g., engineers). Being a proficient writer means becoming intimatelyknowledgeable of the conditions of participation in a given community of practice. According toJames Dubinsky, “our work [as professors] involves more than teaching our students strategies orforms; it also
Group C 3.47 1.19 Group D 3.24 1.33Team online discussion makes me reflect on the course content Group A 2.88 1.24in a deeper level. Group B 2.72 1.06 Group C 2.75 1.32 Group D 2.91 1.42I frequently respond to the post from my group members through Group A 3.53 1.45online discussion. Group B 3.28 1.11
significant proportion ofstudents to fail in exams, which consisted mostly of simulating the execution of thealgorithms for a given input. Usually, students made two types of errors: simple involuntarymistakes and errors that reflect a lack of understanding of the algorithm. After applying themethodology, the former were less common, and the latter were infrequent. We started usingthe methodology in the II semester of 2010 (in our college, I semester goes from March toJune and II semester from August to November). Tables 1 and 2 show the average grades forTest 1 applied during the II semester of 2009-2010 and the I semester of 2010-2011 (beforeand after applying the methodology, in each case). This test is about analysis of algorithmsand sorting
, this imperfection inmeasuring can convincingly reflect the real overhead in a real system.5.1 Hash FunctionsIn the first set of experiments, we measured the H(VM) with several major CryptographicHashing Functions [12]. We chose different hash function to be able to compare them and chosethe best match for our proposed Architecture. Results of H(VM)’s Execution time are shown inthe Table 2. As seen from the results, the CPU processing time of hashing is basically linear tothe size of the VM templates. SHA-384 and SHA-512 has similar processing time due to the factthe construction of the hashing are very similar. An interesting to note was SHA-256 processtime is actually longer time than SHA-384 and SHA-512. This is because SHA-384 and SHA-512
. These software enabled devices allowed students to take notes,draw charts and diagrams. Afterwards the results were measured through student feedback. The Page 26.1592.3results of the experiment were satisfactory as more than 85% of the students thought that usingthe tablets contributed positively towards their active learning experience. Instructors observedthat the level of interaction and enthusiasm increased greatly among students. While it is difficultto provide accurate result values that reflect the amount of increase in student performance in theclassroom, the high level of attendance, which was observed, was certainly a good indicator
. Despite thebenefits of an approach teaching problem-solving skills first, the transition from pre-programming problem-solving courses to courses in which students should master a full-fledgeprogramming language remains a challenge 18, 22. This is reflected in the number of students(44%) who did not have an acceptable performance in either concepts or skills (Figures 4 and 5).Even though those students had passed a previous problem solving course, they find thetransition to a learning environment that uses a full-fledge programming language like Javadifficult.According to Mayer 17, in addition to the cognitive and metacognitive aspects of problemsolving, other aspects like motivation and engagement are also important determinants of studentsuccess
information, funding sources, government entity, etc.) of information they seek. This preference will drive the use of the corresponding web site seed along with the presentation of the associated keywords to the user as defined by the attribute property also in the ontology. And third, the refined list of keywords, instead of all the keywords under a given topic, is used by the application for the searches. Figure 9 contains a sample mockup of the modified search application including the Page 26.1358.14 Figure 9 - Sample Search Application Mock-up user’s ability to set the search aspect. Note the categories reflect
to succeed.AcknowledgementsThis work was supported by a National Science Foundation grant (#1203206) to the NationalCenter for Women and Information Technology, and a National Science Foundation grant(#062444) for Project PRiSE. Any opinions, findings, conclusions, or recommendationsexpressed in this paper are the authors’ and do not necessarily reflect the views of the National Page 26.328.16Science Foundation.References1. The White House. (2011). Women and girls in science, technology, engineering, and math (STEM). Retrieved from http://www.whitehouse.gov/sites/default/files/microsites/ostp/ostp-women-girls-stem-november2011.pdf2