laboratoryprojects.Each laboratory project was discussed first in class and students were assigned homeworkbased on the project, followed by 3 hour lab to improve their understanding of the majorconcepts. Students wrote project reports (learning by writing).The relevant learning goals for the course addressed by these two projects are to develop theability to: a. identify and use signal models, b. develop models of engineering systems, physical systems, and social systems, c. analyze continuous-time system models by applying Fourier methods, and frequency response methods, d. develop computer models using available software packages for analysis and design, and e. communicate laboratory and project
. Remote ExperimentationThe lead author has been working on remote laboratory development and implementation for Page 23.807.3more than ten years. During this period, he has attracted research and development grants fromthe National Science Foundation and industries. Some of these developments are used to deliverlaboratory courses within an electrical engineering technology program. This section willprovide an outline of those developments.To maximize the benefit of remote laboratories, the facility design philosophy includes a numberof features: a) use of emerging technologies; b) individualized learning; c) knowledge-centeredlearning; d
Objectivesevolve. To complete the program of study for the BS-CS, every student will a) Demonstrate proficiency in the foundation areas of Computer Science including discrete structures, logic and the theory of algorithms. b) Demonstrate proficiency in various areas of Computer Science including data structures and algorithms, concepts of programming languages and computer systems. c) Demonstrate proficiency in problem solving and application of software engineering techniques. d) Demonstrate mastery of at least one modern programming language and proficiency in at least one other. e) Demonstrate understanding of the social and ethical concerns of the practicing computer scientist. f) Demonstrate the ability to work cooperatively in teams. g
+ √y 2 =1 ( ab b2 −y 2 ) ( cb b2 −y 2 ) 2 x2 A2 + By 2 = 1 where √ √ A = ab b2 − y 2 , B = cb b2 − y 2 2 2 The elliptic disk Ax 2 + By 2 = 1 has the area of πAB. Thus the secondmoment with respect x − z plane, mxz , can be calculated as follows: +∞ +∞ +∞ +b mxz = y 2 dxdydz = πABy 2 dy = −∞ −∞ −∞ −b 2acπ +b
courses as a part of a regular curriculum. Experiences from these courseofferings will also be presented.2. Shortcomings of Internet Accessible Remote LaboratoryWhat are the issuesAs mentioned in the introduction section, researchers are pursuing this problem in an abruptmanner and are not yet coming up with a sustainable solution that can popularize the use ofremote laboratories. The major issues are: a) Integration of a number of disciplines into remote experimentation design; b) Modularity in designs; c) Readily available commercial products; d) Integration of learning management system; e) Maintenance and training; f) Administrative awareness and support; and g) Industry applications.a) Integration of a number of disciplines into
and(ρ,θ) is illustrated in Figure 1. A straight line in the plane is uniquely specified by two parameterssuch as (a, b) in the Cartesian space (a and b represent slope and intercept respectively), or (ρ, θ). Inthe polar (parameter) space where ρ is the length of the line segment from the origin perpendicularto the line, and θ is the angle that the line makes with the positive x axis, measured clockwise. Themost commonly used coordinate system in the Hough Transform implementation is (ρ, θ). With nimage points, the ranges of (ρ,θ) can be taken to be ρ: [−M, M ] and θ: [−π, π] where M depends onthe image size. If we restrict θ to be in [0, π] range, then normal parameters for the line will beunique. With this restriction, every line in the x
care, physicians can predict the future of a bacterial infectionor an allergic reaction. These types of sequences are harmful and need to be brought to anend as soon as possible. To do so, physicians recommend necessary treatments toterminate these undesirable sequences.Implementation ModelA multiway lexicographic search tree can be used to represent event sequences where anevent from the sequence of events determines a multiway branch at each step. If thesequence is constructed from the English alphabets, at the root of the tree there are 27possible branches. Similarly, there are 27 braches for each subsequent node of the tree.For the sake of simplicity, assume we have a text that its words are constructed from theletters a, b, and c. The
cyberinfrastructure, computation, and computational tools and methods to: (a) leverage the understanding of complex phe- nomena in science and engineering and (b) support scientific inquiry learning and innovation. Specific efforts focus on studying cyberinfrastructure affordances and identifying how to incorporate advances from the learning sciences into authoring curriculum, assessment, and learning materials to appropriately support learning processes. Page 23.301.1 c American Society for Engineering Education, 2013 Colombian Elementary Students’ Performance and Perceptions of
: Explanation 13 7 3 3 6 0 30.2% of a concept (3. b.) Conceptual: Identification 9 3 4 4 1 2 21.7% of a concept (3. c.) Total Writing Prompts in Chapter/Total End- 44/148 14/112 18/135 14/207 9/42 9/90 of-Chapter Problems Percentage of problems with 29.7% 12.5% 13.3% 6.8% 21.4% 10.0% writing prompts (%)a Total writing prompts: 44+14+18+12+9+9=106. Relative % given as sum of found promptsdivided by 106.Textbook Summaries and AnalysisAs part of our analysis, the research team also examined each textbook for features
0.03022093 scholarship 0.030290559 graduate 0.028531669 leadership 0.028049867 innovation 0.028128905 learning 0.02741647 global 0.027577932 interdisciplinary 0.027188976 leadership 0.027501058 quality 0.027041394 service 0.027494654 address 0.026898937 education 0.026526552Figure 1 shows a bar diagram plotting the tf-idf scores of the top 5 tokens of Private (Fig. 1-a)and Public (Fig. 1-b) schools. To facilitate comparison, the corresponding tf-idf score
both Revit and Vico. Considering these factors, together with the ease ofavailability of the two software packages, it was decided to select Revit and Vico as the BIMsolutions under study.The Body of Knowledge (BOK) for ConE EducationLike any other pedagogical techniques, BIM technology should be integrated into ConEcurricula to accomplish their BOK requirements.Hildreth and Gehrig21 identified the following four principal knowledge areas and their subsetsof knowledge and skills to define the ConE BOK: I. The knowledge and skills associated with cost estimating include: a. understanding the requirements of the work based on the drawings and specifications; b. estimating work quantities; c. evaluating and selecting appropriate
fairness, is given inFigure 6. We observe in a) that a mutex may be unfair if the lock is obtained just after beingreleased, while chained semaphores in b) produce a pattern that resembles a checkerboard.However, if the critical section is short and frequent, a simple mutex is much faster on av-erage than the perfect fairness achieved with chained semaphores, where a context switch isforced at each cycle. Understanding the fine differences between lock types, clearly exposedby looking at their detailed behavior, would be hard to achieve without tracing. (a) Blocking mutex (b) Spinlock running in userspace Figure 5: Difference between mutex and spinlockThe
consulted for assistance. After evaluation, evidence was uploaded into a Microsoft Access database and stored in asecure network folder. This folder was available only to those active in the ABET analysisprocess to ensure preservation of the document. Within the Access database, courses were organized based on course number and in order Page 25.192.4to view specific courses, a user could scroll using the arrows seen in Figure 3.A to cycle throughthe list of courses. The top matrix for each course, labeled “Target”, is a repetition of the SOM,showing the courses targeted Bloom’s levels for each of the ABET Student Outcomes (Figure3.B). The
ate upd rds A hea ccess processing nd n g a reco lth ing Data s i e car & es car e B upd Acc ealth
realizes that his/her friend has a copy of the final exam questions. a. Pat should report this to his/her instructor. b. Pat may obtain a copy of the questions from her/his friend by promising not to report the incident. c. Pat should keep quiet about the matter. It is not her/his business. d. They should sell the questions to other students in the class. (Baylor University: “Workplace Ethics Questionnaire,” 2015)ANALYSIS OF DATAThe survey was administrated at the start and at the end of term. The comparison between thesets of results are also shown in the graphs and data tables.The raw percentage data sets of the comparisons between computer science (CS) and non-computer science majors (others) are found below. The results
, and a quick start guide totaling approximately$80+tax. The model of Raspberry Pi used for this project is the Raspberry Pi 2 Model B, which“replaced the original Raspberry Pi 1 Model B+ in February 201516.” Shared features includefour USB ports, 40 general-purpose input/output (GPIO) pins, full High-Definition MultimediaInterface (HDMI) video output, Ethernet port, combined 3.5mm audio jack and composite video,a camera serial interface (CSI), display interface (DSI), Micro SD card slot, and VideoCore IV3D graphics core. Raspberry Pi 1 Model B+ has a Broadcom BCM2835 700 MHz ARM11processor, whereas the Raspberry Pi 2 Model B has an updated Broadcom BCM2836 900 MHzquad-core ARM7 processor, which boosts performance approximately six times its
GUI for user monitoring.Images of completed mobile platform are shown in Figure 4. (a) Overall system. (b) Close up view of electronics. Figure 4: Images of the mobile platform.ASEE Annual Conference 2016 New Orleans, USDesigning a GUI to provide users with excellent visual composition is a vital part of remotetestbed designs. The goal is to improvise and enhance the visual experience between the humaneye and computer. Considering the issues for an effective GUI, HTML was used as a softwaretool for testbed GUI development. Along with HTML, Cascaded Style Sheets (CSS) wereprovided to improve the overall visual experience. The
,instructions, and alternatives are provided in Appendix B. As mentioned earlier the first part ofthis activity was inspired by “The Orange Game” from CS Unplugged 2 and uses it as a warm upexercise. This is a great outreach activity to have students participate in after they have beensitting working on individual tasks and can be easily tailored to various time lengths.Linked List with Yarn and Paper BagsLearning Objectives: • Define, in their own words, a data structure • Define, in their own words, a linked list • Explain the steps to add a node to a linked list (front or back) • Explain the steps to delete a node from a linked list (front or back)In this activity, students learn about the basic data structure linked list. Many students
Science Foundation (CNS #1138469, DRL#1417835, and DUE #1504293), the Scott Hudgens Family Foundation, and the Arthur M. BlankFamily Foundation.References[1] J. M. Wing, “Computational thinking and thinking about computing,” Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences, vol. 366, no. 1881, pp. 3717–3725, 2008.[2] M. Guzdial and E. Soloway, “Teaching the Nintendo generation to program,” Commun. ACM, vol. 45, no. 4, pp. 17–21, Apr. 2002.[3] A. Bruckman, M. Biggers, B. Ericson, T. McKlin, J. Dimond, B. DiSalvo, M. Hewner, L. Ni, and S. Yardi, “‘Georgia computes!’: improving the computing education pipeline,” in Proceedings of the 40th ACM technical symposium on Computer
comparative literature review.,” ACM Comput. Surv., vol. 38, no. 3 Article 7, 2006. [2] E. Lindsay and M. C. Good, “Effects of laboratory access modes upon learning outcomes,” Educ. IEEE Trans., vol. 48, no. 4, pp. 619–631, 2005.[3] J. E. Corter, J. V Nickerson, S. K. Esche, C. Chassapis, S. Im, and J. Ma, “Constructing reality: A study of remote, hands-on, and simulated laboratories,” ACM Trans. Comput. Interact., vol. 14, no. 2, p. 7, 2007.[4] B. Aktan, C. A. Bohus, L. A. Crowl, and M. H. Shor, “Distance learning applied to control engineering laboratories,” Educ. IEEE Trans., vol. 39, no. 3, pp. 320–326, 1996.[5] Labshare, “The
Page 25.1009.2for them. Students can do all the homework from any location as long as they have access tocomputer.(b)-A student can learn at his or her own pace.(c)- Degrees can be completed in less time compared to traditional universities.(d)- Students have fewer distractions, and it can be less intimidating to participate in thediscussions.(e)-Students have the opportunity to connect with and work alongside students from otherlocations.Cons(a)-Students who have trouble managing their time may find it difficult.(b)-Lack of interaction personally with other students and the instructor.(c)-Technology and/or technology issues may be a barrier for some students2- Limitations of the onsite teaching of senior projectsSenior projects often consist
Instrumentation SetupThe Bioinformatics offers a representation of medical data (e.g., nucleotide and amino acid sequences—DNA) in a quantitative and precise (almost exactly) using discrete representation. In this lab, we willexplore the sequence of the typical chain nucleic acid molecules containing adenine, guanine, cytosine,and thymine/uracil specific to DNA, RNA, and proteinThe BioMedical instrumentation setup depicted above is used in conjunction with The Silver(Ag)-Silver Chloride (AgCl) electrodes, a high-performance bio-potential amplifier with built-inhardware filter from iWorx, IV, National Instrument Elvis II+, and Laptop/PC runningBiomedical Workbench, LabVIEW, and MATLAB.The only new addition is Raspberry PI 3 Model B Python Module: it uses
databases. In ACM SIGMOD Record, volume 22, pages 207-216. ACM, 1993. 8. O.R. Zaiane and J. Luo. Towards evaluating learners' behaviour in a web-based distance learning environment. In Advanced Learning Technologies, 2001. Proceedings. IEEE International Conference , pages 357-360. IEEE, 2001. 9. R. Cooley, B. Mobasher, J. Srivastava, Data preparation for mining world wide web browsing patterns. Knowledge and information systems, 1(1):5-32, 1999. 10. O.R. Zaiane. Building a recommender agent for e-learning systems. In Computers in Education, 2002. Proceedings. International Conference on, pages 55-59. IEEE, 2002. 11. F. Abel, I. Bittencourt, N. Henze, D. Krause, and J. Vassileva. A rule-based
courses. The modules are designed to be stand-alone mini-lecturesthat describe how CS is relevant in other disciplines/fields such as cyber warfare, biology,electronic voting, epidemics, etc. These modules would be supported by class projects thatreinforce such paradigms. Teams of faculty in the STEM Faculty Learning Community willdevelop course modules in collaboration with CS faculty who coordinate entry- level classes.5. Study MethodologyThis study is composed of two efforts: (a) developing the intervention- the course modules thatwill be integrated into particular introductory computer science classes and (b) studying the impactof those modules upon students’ perceptions of computer science through surveys.In the first effort, it has been
Expert Systems With Applications (pp. 9939-9945) Vol 39(2012) Elsevier6. http://decoda.univ-avignon.fr/projet.php7. Bechet, F., Maza, B., Bigouroux, N., Bazillon, T., El-Bèze, M., De Mori, R., & Arbillot, E. DECODA: a call-center human-human spoken conversation corpus.8. http://www.wsj.com/articles/metadata-can-expose-persons-identity-even-when-name-isnt-1422558349 Page 26.439.119. http://bits.blogs.nytimes.com/2015/01/29/with-a-few-bits-of-data-researchers-identify-anonymous-people/?_r=010. http://www.sciencemag.org/content/347/6221/536.full?intcmp=collection-privacy11. Speaker Identification by Speech
fast and portable dynamic translator. 2005: USENIX.7. Victoria, B., Creating and Controlling KVM Guests using libvirt. 2009, University of Victoria.8. Yu, J. Performance Evaluation on Linux Bridge. 2004.9. SWSoft. OpenVZ User's Guide. 2005 July 1, 2009; Available from: http://download.openvz.org/doc/OpenVZ-Users-Guide.pdf.10. McLennan, M. and R. Kennell, HUBzero: A Platform for Dissemination and Collaboration in Computational Science and Engineering. Computing in Science & Engineering, 2010. 12(2): p. 48-53.11. Watson, J., Virtualbox: bits and bytes masquerading as machines. Linux Journal, 2008. 2008(166): p. 1.12. Corbato, F. and V. Vyssotsky. Introduction and overview of the Multics system. 1965: ACM.13
corporate CIS and engineering professionals will have a common vocabulary by which tomeet security challenges. Outlines of the modules with respect to student groups are as follows.A. Topics for CIS students: 1. ICS hardware a. Programmable Logic Controller (PLC) processor architecture b. PLC real-time operating systems c. Sensory input and actuator output buffers and interfaces 2. ICS software a. Human Machine Interfaces, GUI b. PLC programming languages, overview i. 981 ladder logic ii. IEC 61131-3 3. ICS networks a. Ethernet considerations in real-time networks b. Modbus/TCP and serial links i. RS-232 and RS-485 c. Proprietary
studies are potentially limited because they primarily engage self-selectingstudents in extra-curricular study groups, and thus may include be selecting motivated studentswho rather than simply effects of PLTL. One of the additional hopes of this paper is to inspireempirical research, perhaps even retrospective views of courses such as this study, to further theunderstanding of peer learning in the classroom.References[1] L. Vygotsky, Thought and language. Cambridge, MA: MIT Press, 1962.[2] N. Salleh, E. Mendes, and J. Grundy, “Empirical Studies of Pair Programming for CS/SE Teaching in Higher Education: A Systematic Literature Review,” IEEE Trans. Softw. Eng., vol. 37, no. 4, pp. 509–525, 2011.[3] L. Porter, C. Bailey-Lee, and B
communicates with the Bluetooth USBmodule on Computer-A. The Bluetooth USB module driver software on Computer-A creates alocal virtual COM port. The TCP-COM software installed on Computer-A in the server modetakes the serial data from virtual COM port and retransmits it to Computer-B over the Ethernetnetwork by using the TCP/IP network protocol. Another instance of the TCP-COM softwareinstalled on Computer-B in the client mode, converts the data received using TCP/IP protocol toa local virtual COM port on Computer-B. The Hyperterminal communication program onComputer-B receives and transmits serial data through the local virtual COM port, therebyestablishing a two way communication channel with the PIC micro-controller as seen in thefollowing Figure 2
also include socialactivities to show that college can be fun, too.The Computer and Information Technology department actively participates in these outreachprograms. A variety of activities designed by faculty, undergraduate, and graduate students havebeen used in these sessions over the past ten years. Some example sessions included the use ofthe following tools: 1. Web page development (static HTML to dynamic ASP.NET) 2. Social media tools through a Twitter-enabled game 3. Programming languages a. Alice b. Scratch c. Scratch 4 Arduino d. C# 4. Physical computing a. Arduino board b. Phoenix Contact Nanoline microcontrollerThe remainder of this paper will present the