Asee peer logo
Well-matched quotation marks can be used to demarcate phrases, and the + and - operators can be used to require or exclude words respectively
Displaying results 121 - 150 of 237 in total
Conference Session
Information Systems and Computing Potpourri
Collection
2011 ASEE Annual Conference & Exposition
Authors
Alireza Kavianpour, DeVry University, Pomona
Tagged Divisions
Computing & Information Technology
: Page 22.144.2LIBRARY IEEE;USE IEEE.STD_LOGIC_1164.ALL;USE STD.TEXTIO.ALL;Example of ENTITY part for a three inputs OR gate with inputs A,B, C and output D is:ENTITY OR ISPORT(A, B, C :IN STD_LOGIC; D :OUT STD_LOGIC);END OR;Example of Architecture part for a three inputs OR gate with inputs A, B, C, and output D is:ARCHITECTURE OR OF OR ISBEGIND <= A OR B OR C;END OR;Following is an example of 32KB SRAM (Static Random Access Memory) with active low read,write, and chip select inputs. Memory has 15 address lines and 8 data lines.LIBRARY IEEE;USE IEEE.std_logic_1164.ALL;ENTITY sram is PORT ( nCS: in STD_LOGIC; nOE: in STD_LOGIC; nWE: in STD_LOGIC; addr: in STD_LOGIC_VECTOR (14 downto 0); data: inout
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2017 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Jacob Haven Gosling; Reza Sanati-Mehrizy, Utah Valley University
Tagged Divisions
Computing & Information Technology
/ITU- T/recommendations/rec.aspx?rec=y.2060 , accessed on Feb. 2017. 6. Stapko, T.J., “Practical Embedded Security: Building Secure Resource-Constrained Systems”. Amsterdam: Newnes, 2008. 7. Pfleeger, Charles, et. al., Security in Computing”, 5th Edition, Prentice Hall, 2015. 8. Mu, D., Ma, B., Mao, B., & Hu, W., A bottom-up approach to verifiable embedded system information flow security. IET Information Security, 8(1), 12–17. doi:10.1049/iet-ifs.2012.0342, 2014. 9. Xiang, W., Zexi, Z., Ying, L., & Yi, Z. (2013). A design of security module to protect program execution in embedded system. 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and
Conference Session
IT-based Instructional Technologies
Collection
2012 ASEE Annual Conference & Exposition
Authors
Xiannong Meng, Bucknell University; Song Xing, California State University, Los Angeles; Wang Wei, Southeast University
Tagged Divisions
Computing & Information Technology
course contents are available only to internalaudience through courseware such as BlackBoard or Moodle. We do our best to summarize thecollected data into a coherent segment of information. The raw data used in this paper are listedin Appendix A (course websites), Appendix B (textbooks used), and Appendix C (list of courseobjectives and goals by each course when available). Readers can also visit the informationonline at one of authors’ website at http://www.eg.bucknell.edu/~xmeng/webir-resources-asee2012.html.The rest of the paper is organized as follows. Section 2 is a review of other surveys of similarnature and general discussions of teaching and learning on the subject of information retrievaland web search. In Section 3, we present our
Conference Session
Potpourri
Collection
2017 ASEE Annual Conference & Exposition
Authors
Jacob Bailey, University of Illinois, Urbana-Champaign; Matthew West, University of Illinois, Urbana-Champaign; Craig Zilles, University of Illinois, Urbana-Champaign
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
. The critical role of retrieval practice in long-term retention. Trends in Cognitive Sciences, 15:20–27, 2011.[5] D. Rohrer, K. Taylor, and B. Sholar. Tests enhance the transfer of learning. Journal of Experimental Psychology Learning Memory and Cognition, 36:233–239, 2010.[6] K. E. Train. Discrete Choice Methods with Simulation. Cambridge University Press, second edition, 2009.[7] M. West and C. Zilles. Modeling student scheduling preferences in a computer-based testing facility. In Proceedings of the Third (2016) ACM Conference on Learning @ Scale, pages 309–312, 2016. doi: 10.1145/2876034.2893441.[8] C. Zilles, R. T. Deloatch, J. Bailey, B. B. Khattar, W. Fagen, C. Heeren, D. Mussulman, and M. West. Computerized testing: A
Conference Session
Embedded Systems and Mobile Computing
Collection
2014 ASEE Annual Conference & Exposition
Authors
Javad Shakib, DeVry University, Pomona; Mohammad Rafiq Muqri, DeVry University, Pomona
Tagged Divisions
Computing & Information Technology
://www.digikey.com3. D. Vyas, “Microcontrollers: options and trends in today's market,” in ACM Proceedings International Conference and Workshop on Emerging Trends in Technology, Mumbai, India, 2010, pp. 1019-1019.4. D’Souza, J., Reed, A., & Adams, K. (2014). Selecting Microcontrollers and Development Tools for Undergraduate Engineering Capstone Projects. Computers in Education, 24(1), (In press)5. M. Slade, M. H. Jones, and J. B. Scott, “Choosing the right microcontroller: A comparison of 8-bit Atmel, Microchip and Freescale MCUs,” Faculty of Engineering, The University of Waikato, Hamilton, New Zealand, Tech Rep. http://hdl.handle.net/10289/5938 , Nov. 2011.6. Daniel Cross-Cole, ‘ECET 365 Course Overview’ document, DeVry University, available
Conference Session
Emerging Computing and Information Technologies I
Collection
2017 ASEE Annual Conference & Exposition
Authors
Brian Patrick, Brigham Young University; Richard G. Helps, Brigham Young University
Tagged Divisions
Computing & Information Technology
testsby allowing each user performs the tasks on only two platforms. Platform order will be assignedto users randomly. By reducing the platforms to two, the time per user will be greatly reduced,the learning effect will only be from one platform to a second platform, rather than across fourplatforms. By randomizing the platform selections, we will have as many subjects learning fromplatform A to B as we do from B to A. Statistically the learning effect will be removed. Thisapproach requires significantly more test subjects but will require a much shorter test time foreach.3.2 Metrics of PerformanceQuantifiable metrics permit quantitative analysis, as has been discussed. The metrics selected forthe tasks as discussed above are time, errors and
Conference Session
POTPOURRI
Collection
2013 ASEE Annual Conference & Exposition
Authors
Jeffrey Chastine, Southern Polytechnic State University
Tagged Divisions
Computing & Information Technology
: ACollaborative Virtual Environment for Molecular Modeling," Proc. of ACM Symposium on Virtual Reality Softwareand Technology (VRST), Monterey, CA, 2005.[7] Billinghurst, M., Duenser, A., Augmented Reality in the Classroom. IEEE Computer, Volume 45, Issue 7, pp56-63, July 2012. http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6171143[8] B. Shelton, N Hedley. Using Augmented Reality for Teaching Earth-Sun Relationships to UndergraduateGeography Students. The First IEEE International Augmented Reality Toolkit Workshop. Darmstadt, Germany.September, 2002.[9] Reitmayr, G., Schmalstieg, D., "Collaborative Augmented Reality for Outdoor Navigation and InformationBrowsing," Proc. of Symposium Location Based Services and TeleCartography, 2004.[10] Pair
Conference Session
Information and Network Security
Collection
2011 ASEE Annual Conference & Exposition
Authors
Edward F. Gehringer, North Carolina State University
Tagged Divisions
Computing & Information Technology
, 24(5), 1913-1928, 2008.doi:10.1016/j.chb.2008.02.010[6] Xiao, Y., and Lucking, R. “The impact of two types of peer assessment on students' performance andsatisfaction within a Wiki environment”. The Internet and Higher Education, 11(3-4), 186-193, 2008.doi:10.1016/j.iheduc.2008.06.005[7] Reys B. J., Reys R. E. and Chavez, O. “Why mathematics textbooks matter,” Educational Leadership61(5), 61-66, 2004.[8] Hohne, D., Fu, L, Barkel, B., and Woolf, Peter, “The wiki approach to teaching: using studentcollaboration to create an up-to-date open-source textbook,” 2007 American Society for EngineeringEducation Annual Conference, paper AC 2007-2074[9] Gehringer, E.F.; Ehresman, LM.; Conger, S. G.; Wagle, P. A., “Reusable learning objects through
Conference Session
Computing & Information Technology Division Technical Session
Collection
2016 ASEE Annual Conference & Exposition
Authors
Alireza Kavianpour, DeVry University - Pomona; Sogand Kavianpour, University of California - Irvine
Tagged Divisions
Computing & Information Technology
programming language for everyone. In: WesternCanadian Conference on Computing Education. (2003)7.Harvey M. Deitel, H. M. (Editor), Deitel P. J., Liperi J. P., Wiedermann B. A., P. Liperi, J. P.,"Python, How to Program", Prentice Hall, Feb. 20028. Martelli, A., Ascher D. (eds): "The Python Cookbook", O'Reilly, 20039. Python Programming In A Day & C++ Programming Professional Made Easy (Volume 43) by Sam KeyCreate Space Independent Publishing, 2015, ISBN-13:9781511776752
Conference Session
Emerging Computing and Information Technologies II
Collection
2016 ASEE Annual Conference & Exposition
Authors
Tae-Hoon Kim, Purdue University - Calumet; Keyuan Jiang, Purdue University - Calumet; Vivek Singh Rajput
Tagged Divisions
Computing & Information Technology
number of simultaneously running guest machines is greatlydependent upon the host machine specification. Therefore, the higher end system specification ispreferred in hypervisor-based virtual machine. However, it is beneficial to run the application indifferent types of OS since it allows creating and running different type of OS in each guestmachine. Each guest machine has its own resources and OS in hypervisor-based virtual machine.3.2 Container-based virtual machineUnlike hypervisor-based virtual machine running a full OS, container-based is running on the topof the existing OS as shown in Figure 1(b), which provides the isolation using a kernelnamespace feature in Linux. The basic idea of container-based virtualization concept is tominimize
Conference Session
Emerging Computing and Information Technologies II
Collection
2015 ASEE Annual Conference & Exposition
Authors
Jessica Richards, BYU; Joseph J Ekstrom, Brigham Young University
Tagged Divisions
Computing & Information Technology
Paper ID #14106Automated Identification of Terminological Dissonance in IT and adjacentfieldsMs. Jessica Richards, BYU Graduate student in Information Technology with a background of interdisciplinary work between com- puting and media fields. Highly interested in streamlining the collaborating of technical and creative minds.Joseph J Ekstrom, Brigham Young University Dr. Ekstrom spent more than 30 years in industry as a software developer, technical manager, and en- trepreneur. In 2001 he helped initiate the IT program at BYU. He was the Program Chair of the Informa- tion Technology program from 2007-2013. His research
Conference Session
Emerging Information Technologies
Collection
2012 ASEE Annual Conference & Exposition
Authors
Lakshmi Ramachandran, North Carolina State University; Edward F. Gehringer, North Carolina State University
Tagged Divisions
Computing & Information Technology
detailed information that can be used by the author. For example,they might point out problems in the author’s work or provide suggestions to improve the work,similar to that in the last two comments in Table 1, below.Reviewer feedback can be evaluated by a process referred to as metareviewing. Metareviewing isdefined as the process of reviewing reviews, i.e., the process of identifying the quality ofreviews. Metareviewing is a manual process and just as with any process that is manual;metareviewing is (a) slow, (b) prone to errors and is (c) likely to be inconsistent. An automatedreview process ensures consistent (bias-free) reviews to all reviewers. It also provides immediatefeedback to reviewers, which is likely to motivate reviewers to improve
Conference Session
Computing & Information Technology Division Technical Session
Collection
2016 ASEE Annual Conference & Exposition
Authors
Candido Cabo, New York City College of Technology; Reneta Davina Lansiquot, New York City College of Technology
Tagged Divisions
Computing & Information Technology
the total bill. If the service is just fine the tip will be 15% of the total bill. Calculate the tip (Input: 2 points; Processing: 6 points; Output: 2 points) 5) Create a flowchart that requests the points scored by the B’klyn Nets and the Lakers at the end of regular time. The program should display “B’klyn Nets won!” if the Nets won, or “Lakers won!” if the Lakers won, or “Overtime needed” if there was a tie. (Input: 2 points; Processing: 6 points; Output: 2 points) 6) Create a flowchart that converts a numeric grade to a letter grade. The user should be able to enter a numeric grade from 0 to 100. The flowchart will calculate the letter grade based on: A >= 90; 80<= B < 90; 70<= C < 80
Conference Session
Emerging Computing and Information Technologies II
Collection
2015 ASEE Annual Conference & Exposition
Authors
Candido Cabo, New York City College of Technology/City University of New York
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
26.1295.5adequate performance (equivalent to a passing grade or C).Figure 1. Average sttudent perforrmance (0-10) in seven ttypes of proggramming coonceptassessmeents (first two categories in Bloom’s taxonomy). n = 62. Dasshed horizonntal line markks alevel of acceptable a peerformance.Figure 2. 2 Percent of students perrforming adeequately (>= = 7 which is equivalent too a passing Page 26.1295.6grade, 70 0% or C) in the t seven diffferent progrramming connceptual cateegories.Average values can be b distorted byb very good d performannce of some
Conference Session
Emerging Computing and Information Technologies
Collection
2013 ASEE Annual Conference & Exposition
Authors
Shaundra Bryant Daily, Clemson University; Juan E Gilbert, Clemson University; Wanda Eugene, University of North Carolina Charlotte; Christina Gardner-McCune, Clemson University; Kyla Alanna McMullen, Clemson University; Phillip Wendell Hall Jr, Clemson University ; Sekou L Remy, Division of Human Centered Computing - School of Computing, Clemson University; Damon Lamar Woodard, Clemson University; Tania Roy, Clemson University
Tagged Divisions
Computing & Information Technology
and high school social studies classes. Page 23.144.1 Dr. Gardner-McCune recently completed a year and a half long Post-Doctoral Research position in com- puter science education at Georgia Institute of Technology’s College of Computing where she led the design of the I-3 Experience programs. She holds a B. S. degree in Computer Engineering from Syra- cuse University, and earned both her masters and doctorate in Computer Science from Georgia Institute c American Society for Engineering Education, 2013
Conference Session
Topics in Computing and Information Technologies II
Collection
2015 ASEE Annual Conference & Exposition
Authors
Richard G. Helps, Brigham Young University
Tagged Divisions
Computing & Information Technology
platforms for teaching some IT concepts are strong.Trends in IT towards much more diverse computing platforms that are integrated into the realworld indicate that IT students should pay more attention to hardware systems.Hardware adds a significant dimension to the learning experience of IT students. Commonlyavailable systems provide the necessary elements for introducing hardware into IT courses. Thebenefits to students are clear. The framework we have developed leading to the use of widelystandardized systems has been demonstrated to be effective in multiple classes and will becontinued and extended.Bibliography1. B. M. Lunt, J. J. Ekstrom, S. Gorka, G. Hislop, R. Kamali, E. A. Lawson, R. LeBlanc, J. Miller, H. Reichgelt, and T. A. for C. M
Conference Session
Emerging Computing and Information Technologies
Collection
2014 ASEE Annual Conference & Exposition
Authors
Seyed Mousavinezhad, Idaho State University; R. Eugene Stuffle, Idaho State University; Wei Pan, Idaho State University; Steven Grant Maclure, Idaho State University
Tagged Divisions
Computing & Information Technology
example,design different filters based on their pole/zero location, an obvious characteristic evidentin the frequency domain.Example 2. Similar to Example 1 but with zero initial conditions (ZIC):6y[n] – 5y[n-1] + y[n-2] = 6x[n] , x[n] = (2)n u[n] , y[-1] = y[-2] = 0y[n] = yh[n] + yp[n] = C1(0.5)n + C2(1/3)n + C3(2)n = -(0.5)n + 0.4(1/3)n + 1.6(2)n, n ≥ 0.H(z) = Y(z)/X(z) = 6z2/(6z2 -5z +1), Y(z) = X(z)H(z) = z3/[(z - 0.5)(z - 1/3)(z - 2)].At the same time students can use MATLAB solution to compare it to the analyticalformulation presented above.>> n=0:1:10; B=[1]; A=[1, -5/6, 1/6]; x=2.^n; y=filter(B,A,x)y = 1.0e+003 * Columns 1 through 10 0.0010 0.0028 0.0062 0.0127 0.02550.0512 0.1024 0.2048
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2011 ASEE Annual Conference & Exposition
Authors
Xiannong Meng, Bucknell University; Song Xing, California State University, Los Angeles
Tagged Divisions
Computing & Information Technology
concentrate on one course atBucknell University in great detail first. (Course A.) The second course in California StateUniversity at Los Angels will be briefly described so the similar information will not beredundant. We will first describe the background, content, and structure for Course A. We thenwill discuss the pre and post course expectations. The assessment of the course will be discussednext, followed by a discussion of challenges and how we addressed them. We then will discussthe course at California State University – Los Angels (Course B), in which we will point outsome similarities and differences between the two courses. Last we will conclude our discussion,drawing some lessons from our experiences and proposing future course of
Conference Session
Information and Network Security
Collection
2014 ASEE Annual Conference & Exposition
Authors
Janusz Zalewski, Florida Gulf Coast University; Andrew J. Kornecki, Embry-Riddle Aeronautical Univ., Daytona Beach; Bogdan Denny Czejdo, Fayetteville State University; Fernando Garcia Gonzalez, Florida Gulf Coast University; Nary Subramanian, University of Texas, Tyler; Dawid Trawczynski, Advanced Micro Devices
Tagged Divisions
Computing & Information Technology
be put in place. This could be considered a combination of message encryption and authentication. For the Student Activities component of each module, there are two basic required partswhose completion assures that the respective knowledge is acquired: (a) Required Reading and(b) Hands-on Exercise. In case of Java Security module, the Required Reading involved theessential mandatory reading from the source “Java Security Overview” white paper,9 and anoptional reading material from a selection of Java security books, determined primarily by theiravailability in the school library.10-12 The reading was accompanied by a specially developed Hands-on Exercise, which involvedfollowing the actual code to replicate the security violation
Conference Session
Emerging Computing and Information Technologies
Collection
2013 ASEE Annual Conference & Exposition
Authors
Briana Lowe Wellman, University of the District of Columbia; Tommy Suriel, University of The District of Columbia; Evanna Maria Reynoso
Tagged Divisions
Computing & Information Technology
demonstrate differences in team performance for simulations and real robotexperiments. While simulations are good for quicker testing and a cheaper solution thanpurchasing equipment, conducting experiments with real robots allows for more accurate results.In physical experiments, there are many factors, such as robot interference, an unknownenvironment, and delayed communications, which can influence results. However, running realexperiments are required to accurately test the efficiency of an approach. Future work includesexamining these factors further.Bibliography[1] S. Dawson, B. L. Wellman, and M. Anderson, “Using simulation to predict multi-robot performance on coveragetasks,” in Intelligent Robots and Systems (IROS), 2010 IEEE/RSJ
Conference Session
Information and Network Security
Collection
2012 ASEE Annual Conference & Exposition
Authors
Mudasser Fraz Wyne, National University; Gregory Stuart Rogers; Preston Jay Mendoza, National University
Tagged Divisions
Computing & Information Technology
  intelligence applications  ANALYSIS   What‐if  Configurable UIs  REPORTs  applications  scenarios  (web, excel)  Physicians Partners Foundational Data Model  Data   Feeds  Figure 2.1 – Goals for NU Physicians Partners ProjectIn addition, the design rationale for providing solutions to these two separate elements warrantedan approach that must be viable; (a) Lower the clients initial capital expenditure (CAPEX) at inception and deployment of any new system proposed, and (b) Exhibit significant reduced long term operational expenditure (OPEX) in terms of
Conference Session
Potpourri
Collection
2014 ASEE Annual Conference & Exposition
Authors
Reza Sanati-Mehrizy, Utah Valley University; Afsaneh Minaie, Utah Valley University; Ruhul H. Kuddus, Utah Valley University; Ali Sanati-Mehrizy; Paymon Sanati-Mehrizy, Icahn School of Medicine at Mount Sinai
Tagged Divisions
Computing & Information Technology
sequences.ImplementationA multiway lexicographic search tree can be used to represent a sequence where an eventfrom the sequence of events determines a multiway branch at each step. If the sequence isconstructed from the English alphabets, at the root of the tree there are 26 possiblebranches followed by another branch according to the next letter in the sequence.The tree shown in Fig. 16 represents sequences constructed from letters a, b, and c. Page 24.1079.3 Fig. 1. A multiway lexicographic search tree constructed using the English letters.At the root of the tree, there are three branches one for each of the letters a, b, and c. Atthe next level there are
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2017 ASEE Annual Conference & Exposition
Authors
Dennis K. Njeru, Utah Valley University and Novarad Corporation; Afsaneh Minaie, Utah Valley University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
. Leung, YP. Lee, HY. Chan, and MH. Tang, "Fetal biometry by an inexperienced operator using two- and three-dimensional ultrasound," Ultrasound in Obstetrics and Gynecology, vol. 35, no. 5, pp. 566--571, 2010.7. Ioannis Pratikakis, Christian Barillot, Pierre Hellier, and Etienne Memin, "Robust Multiscale Deformable Registration of 3D Ultrasound Images.," International Journal of Image and Graphics, vol. 3, no. 4, p. 547, 2003.8. Aaron. Fenster, B. Downey Dónal, and Neale Cardinal H., "Three-dimensional ultrasound imaging," Physics in Medicine and Biology, vol. 46, no. 5, p. R67, 2001.9. Charles E. Kahn Jr, John A. Carrino, Michael J. Flynn, Donald J. Peck, and Steven C. Horii, "DICOM and Radiology: Past, Present, and Future
Conference Session
Computing & Information Technology Division Technical Session
Collection
2016 ASEE Annual Conference & Exposition
Authors
Alireza Farahani; Mudasser Fraz Wyne, National University; Lu Zhang, National University
Tagged Divisions
Computing & Information Technology
way of life”, Tribal College Journal, 19(4), pp.60–61, 2008.16. Slater, J., & Burson, T., “Connecting assessment to resource allocation: A demonstration project atQueens University of Charlotte”, New York, Wiley Periodicals, 2011.17. Suskie, L., “Assessing student learning: A common sense guide”, 2nd Ed., San Francisco, CA: Jossey-Bass, 2009.18. Flint, N. and Johnson, B., “Towards fairer university assessment: Recognizing the concerns ofstudents”, New York, NY: Taylor & Francis, 2011.
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2017 ASEE Annual Conference & Exposition
Authors
Chaomin Luo, University of Detroit Mercy; Jiawen Wang, University of Detroit Mercy; Wenbing Zhao, Cleveland State University; Lei Wang, Anhui Polytechnic University
Tagged Divisions
Computing & Information Technology
design project through ROS mayassist us in conducting a rudimentary evaluation of the TCK integrated multi-lab method. Thequestionnaire covers the seven questions below. The outcomes specified in the parentheses are inaccordance with the ABET standards. Figure 2 Generated ROS navigation environment • Question 1 - “I can apply formal engineering design methodology to carry out the design, experiments and construction of labs and project based on ROS data and interpretation.” (Outcome b: An ability to design and conduct experiments, as well as to analyze and interpret data relating to electrical systems.) • Question 2 - “I understand the fundamental algorithms on ROS and software/hardware co
Conference Session
IT-based Instructional Technologies
Collection
2012 ASEE Annual Conference & Exposition
Authors
Richard G. Helps, Brigham Young University
Tagged Divisions
Computing & Information Technology
-scada-systems-hacked-by-anonymous/19. Charette, Robert, “Stuxnet Successor Looking for New Cyber Targets?” IEEE Spectrum, Risk factor, October 2011, http://spectrum.ieee.org/riskfactor/telecom/security/stuxnet-successor-looking-for-new-cyber-targets Accessed March 201220. Nakashima, Ellen, “Water-pump failure in Illinois wasn’t cyberattack after all,” Washington Post November 25, 2011.21. Criteria for Accrediting Computing Programs: Effective for Evaluations During the 2011-2012 Accreditation Cycle (2010).22. Lunt , B. M., Ekstrom, J. J., Gorka, S., Hislop, G., Kamali, R., Lawson, E. A., et al. (2008). Information Technology 2008: Curriculum Guidelines for Undergraduate Degree Programs in Information
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2017 ASEE Annual Conference & Exposition
Authors
Gene Lee Fisher Ph.D., California Polytechnic State University, San Luis Obispo
Tagged Divisions
Computing & Information Technology
Paper ID #18897Rethinking ABET Accreditation of Computer Science Degree ProgramsProf. Gene Lee Fisher Ph.D., California Polytechnic State University, San Luis Obispo Gene Fisher received a BS in Computer Science and a BA in Mathematics from the University of Califor- nia Irvine in 1973. After several years in industry he returned to Irvine for his PhD, which he completed in 1985. Currently Dr. Fisher is an emeritus professor in the Department of Computer Science at the California Polytechnic State University San Luis Obispo. He joined the Cal Poly faculty in 1990. Prior to this, he was an Assistant Professor at the
Conference Session
Embedded Systems and Mobile Computing
Collection
2014 ASEE Annual Conference & Exposition
Authors
Mohammad Rafiq Muqri, DeVry University, Pomona; Brian Joseph Lane
Tagged Divisions
Computing & Information Technology
, February 2003, http://pj.freefaculty.org/ps905/ObjC.pdf5. Altenberg, B., Clarke, A., Mougin, P., Become an Xcoder : Start Programming the Mac Using Objective-C, CocoaLab, 2008, http://www.e-booksdirectory.com/details.php?ebook=38326. Kochan, S. G., Programming in Objective-C, Addison-Wesley, August 2011.7. Cocoa Developers Guide, Apple Developer Publications, December 2010, http://itunes.apple.com/us/book/cocoa-fundamentals- guide/id409921412?mt=118. Deitel, H.M., Deitel, P.J., Java How to program, Prentice Hall, 2003 Page 24.234.12Appendix A: Bluetooth Project Class Definitions and Pairing MethodsIOBluetoothAn
Conference Session
Computing & Information Technology Division Technical Session
Collection
2016 ASEE Annual Conference & Exposition
Authors
Joshua Levi Weese, Kansas State University; Russell Feldhausen, Kansas State University; Nathan H. Bean
Tagged Divisions
Computing & Information Technology
). 100 Principles of Game Design. New Riders.12. Faber, M., Unfried, A., Corn, J., & Townsend, L. W. (2012). Student Attitudes toward STEM: The Development of Upper Elementary School and Middle / High School Surveys. Friday Institute for Educational Innovation.13. Falkner, K., Vivian, R., & Falkner, N. (20015). Teaching Computational Thinking in K-6: The CSER Digital Technologies MOOC. Australian Computing Educaiton Conference, 27-72.14. Google. (2015). Retrieved from Blockly: https://developers.google.com/blockly/15. Gormally, C., Brickman, P., Hallar, B., & Armstrong, N. (2009). Effects of Inquiry-based Learning on Students’ Science Literacy Skills and Confidence. International
Conference Session
Embedded Systems and Mobile Computing
Collection
2013 ASEE Annual Conference & Exposition
Authors
Maurice F. Aburdene, Bucknell University; Marie Catherine Pizzorno, Department of Biology, Bucknell University; Alexander P Thompson, Bucknell University
Tagged Divisions
Computing & Information Technology
presentations.Each paper was reviewed by multiple students and faculty who provided both technical andeditorial comments.Homework Assignment:Would you please read the following articles?Anastassiou, D., "Genomic signal processing," Signal Processing Magazine, IEEE , vol.18, no.4,pp.8-20, Jul 2001.Afreixo, Vera, et al. "Genome analysis with inter-nucleotide distances." Bioinformatics 25.23(2009): 3064-3070.Would you please summarize your readings? Please prepare a PowerPoint presentation of yoursummary to share with the class.Class DiscussionAnastassiou, D. , "Genomic signal processing," Signal Processing Magazine, IEEE , vol.18, no.4,pp.8-20, Jul 2001.a) “Genomic signal processing (GSP) creates a paradigm shift.” What does Anastassiou mean byit?b