, the connectivity is limited by many environmental factors such as distance,noise, objectives, etc. In order to extend the connectivity in wireless network, the relay node iscommonly used in many wireless applications such as cellular network, wireless ad hoc network,wireless sensor network, etc. For example, when two wireless nodes are out of communicationrange each other, relay node can be located between them to connect each other as shown inFigure 1(a). Another common application is Wi-Fi extender, which can extend the coverage areaby relaying the traffic between wireless access point and clients (i.e., PCs, mobile devices, etc.)as in Figure 1(b). (a) Relay node in mobile ad hoc network (b) Wi-Fi extender
AC 2011-1301: IMPLEMENTING AN AFFORDABLE HIGH PERFORMANCECOMPUTING PLATFORM FOR TEACHING-ORIENTED COMPUTERSCIENCE CURRICULUMJeongkyu Lee, University of Bridgeport Jeongkyu Lee received a B.S. from Sungkyunkwan University in Mathematic Education and an M.S. from Sogang University in Computer Science, both of Seoul, Korea in 1996 and 2001, respectively. Before he pursued his doctorate, he worked as a database administrator for seven years with companies including IBM. In fall 2002, he entered the Doctoral program in Computer Science and Engineering at the Univer- sity of Texas at Arlington. After he received Ph.D. degree in summer 2006, he joined the Department of Computer Sciences and Engineering at University of
. Page 24.593.10References[1] Dagan, B. (2008). Master data management systems to be useful for ccs, other functions. Natural Gas, 24(10), 25-29. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=31872515&site =ehost-live [2] Dyché, J., & Levy, E. (2006). Serving many masters: a closer look at MDM; as important to business strategy as the EDW was, the processing of the item master was ultimately much more critical to business operations. swtuopproxy.museglobal.com. Advance online publication. Retrieved from swtuopproxy.museglobal.com/MuseSessionID=fd925b9615e67115f7e6173a6599 d7e2/MuseHost=proquest.umi.com/MusePath/pqdweb?index=0&did=145494226 1&
11Formal Education and Computing Professionals’ Needs and do it. And if you go to industry, they find very hard. . . but that’s what they are looking for.Degree of Coverage in the Curriculum and Their Individual Courses When we asked about the degree of emphasis of the skills described above in the CScurriculum, all participants explained that these skills are not stated explicitly in the curriculumbecause of a number of reasons: (a) faculty are not trained this way, (b) faculty do notsufficiently value them, and finally, (c) faculty have a heavy curriculum load and not enoughtime to address or even incorporate these skills. As one participant explained, This is part of team leadership, program management. It is hard to
Paper ID #11155Factors influence data management model selections: IT Expert testimoniesDr. Gholam Ali Shaykhian, - Gholam Shaykhian has received a Master of Science (M.S.) degree in Computer Systems from University of Central Florida and a second M.S. degree in Operations Research from the same university and has earned a Ph.D. in Operations Research from Florida Institute of Technology. His research interests include knowledge management, data mining, object-oriented methodologies, design patterns, software safety, genetic and optimization algorithms and data mining. Dr. Shaykhian is a professional member of the
-ftcs-consumer-complaint-categories-again-2014[5] Beckers, J. J. & Schmidt, H. G. (2001). The structure of computer anxiety: A six-factor model. Computers in Human Behavior, 17(1), 35-49.[6] John Winterdyk. & Nikki Thompson. (2008). Student and Non-Student Perceptions and Awareness of Identity Theft. Canadian Journal of Criminology and Criminal Justice 50(2), 153-186. Project MUSE. Web. 5 Apr. 2013. http://muse.jhu.edu[7] Nachmias, D. & Nachmias, C. (1987). Research methods in the Social Sciences. New York: St. Martins Press.[8] Costello, A. B., & Osborne, J. W. (2005). Exploratory Factor Analysis: Four recommendations for getting the most from your analysis. Practical Assessment, Research, and Evaluation, 10(7
D.E. Leidner, Knowledge Management and Knowledge Management Systems: Conceptual Foundations and Research Issues. MIS Quarterly, 2001. 25(1): p. 107-136.8. Brown, J.S. and P. Duguid, Knowledge and Organization: A Social-practice Perspective. Organization Science, 2001. 12(2): p. 198-213.9. Choi, S.Y., H. Lee, and Y. Yoo, The impact of information technology and transactive memory systems on knowledge sharing, application, and team performance: A field study. Management Information Systems Quarterly, 2010. 34(4): p. 855-870.10. Moran, P. and S. Ghoshal, Value Creation by Firms, in Academy of Management Best Paper Proceedings, Dosier, Editor. 1996, In J, B, Keys& L. N.: Georgia Southern University.11
Paper ID #14390Architectural Evaluation of Master Data Management (MDM): LiteratureReviewDr. Gholam Ali Shaykhian, NASA Ali has received a BS degree in Electronics, a Master of Science (M.S.) degree in Computer Systems and a second M.S. degree in Operations Research from the University of Central Florida and has received a Ph.D. degree in Operations Research from the Florida Institute of Technology (FIT). His research interests include knowledge management, data mining, object-oriented methodologies, design patterns, software safety, genetic and optimization algorithms. Dr. Shaykhian is a professional member of the
Paper ID #20263Mobile Payments and End Users’ Sensitivity to Information DisclosureMr. Abdulwaheed Johnson, Pace University Abdulwaheed Johnson is a cybersecurity enthusiast who is currently in the second year of his Masters’ Degree program in Telecommunication Systems and Networks at Pace University, New York. His first degree was in Electrical Engineering, and is looking to specialize in cloud security after the completion of his Masters Degree program.Dr. Anthony Joseph, Pace University Dr. Anthony Joseph has a Ph.D. in electrical engineering with specialization in digital signal processing. He conducts research in
Paper ID #6513Capstone Experience: Multimedia Request AutomationDr. Mudasser Fraz Wyne, National University Ph.D. in Computer Science, from University of Birmingham U.K., M.Sc. in Engineering and B.Sc., in Electrical Engineering. He has been in academics for 24 years and currently serving as a Professor of Computer Science and Chair department of Computer Science, Information and Media Systems at School of Engineering, Technology, and Media, National University, San Diego, USA. He is also the program lead for BS in Information Systems program. He is serving as a commissioner for Computing Accredi- tation Commission
our gamification platform,GamerCard, which was used for four semesters in an upper-level game design course at ourinstitution. We found that some gamification elements that are often thought to be motivatingfor participants had little to no effect on our course, while elements that specifically targetedmaking the student’s standing in the course more transparent were the most effective.1. IntroductionGamification is becoming an increasingly popular methodology for improving motivation andinterest in many domains [1]. Gamification involves the application of game mechanics to taskstypically considered to be void of fun. In the classroom, this often materializes as a set ofmechanics meant to motivate students to learn more effectively. For
Paper ID #12938Game Design and Development Capstone Project Assessment Using ScrumJohn Glossner, Daniel Webster College Dr. John Glossner is Associate Professor of Computer Science at Daniel Webster College. He also serves as CEO of Optimum Semiconductor Technologies. Prior to joining OST John co-founded Sandbridge Technologies and served as EVP & CTO. Prior to Sandbridge, John managed both technical and business activities in DSP and Broadband Communications at IBM and Lucent/Starcore. John was also an adjunct professor at Lehigh University. John received a Ph.D. in Electrical and Computer Engineering from TU Delft
Paper ID #15630Innovative Activities to Teach Computer Science Concepts Inside the Class-room and at Outreach EventsDr. Stephany Coffman-Wolph, West Virginia University Institute of Technology Dr. Stephany Coffman-Wolph is an Assistant Professor at West Virginia University Institute of Technol- ogy (WVU Tech) in the Department of Computer Science and Information Systems. She is a founding member of AWESOME (Association for Women Engineers, Scientists, Or Mathematician Empowerment) at WVU Tech and currently serves as a co-Advisor of the student organization. Other research interests include: Artificial Intelligence, Fuzzy Logic
Paper ID #14807Google Sheets for Realtime Assessment and Analysis of Less-Structured Prob-lemsDr. James D. Palmer, Louisiana Tech University Virgil Orr Professor of Chemical Engineering Director of Biomedical and Chemical Engineering c American Society for Engineering Education, 2016 Google Sheets for Realtime Assessment and Analysis of Less Structured ProblemsAbstractUniversities are under increasing pressures for efficiencies in education with declining budgets,increasing enrollments, and increasing expectations/accountability by students. A traditionalapproach with engineering or science computations is to
AC 2011-209: TESTING STRATEGY IN MULTIPROCESSOR SYSTEMSWITH CUBE CONNECTIONSAlireza Kavianpour, DeVry University, Pomona Dr. Alireza Kavianpour received his Ph.D. Degree from University of Southern California (USC). He is currently Senior Professor at DeVry University, Pomona, CA. Dr. Kavianpour is the author and co-author of over forty technical papers all published in IEEE Journals or referred conferences. Before joining DeVry University he was a researcher at the University of California, Irvine and consultant at Qualcom Inc. His main interests are in the areas of embedded systems and computer architecture
Paper ID #18191The Application of PID Control in Student ProjectsDr. Alireza Kavianpour, DeVry University, Pomona Dr. Alireza Kavianpour received his PH.D. Degree from University of Southern California (USC). He is currently Senior Professor at DeVry University, Pomona, CA. Dr. Kavianpour is the author and co-author of over forty technical papers all published in IEEE Journals or referred conferences. Before joining DeVry University he was a researcher at the University of California, Irvine and consultant at Qualcom Inc. His main interests are in the areas of embedded systems and computer architecture.Miss Sogand Kavianpour
AC 2012-3348: JUST-IN-TIME TEACHING: COMPUTER SCIENCE MEETSPHYSICSDr. Alex Pantaleev, State University of New York, Oswego Alex Pantaleev received a B.A. degree in computer science from the American University in Bulgaria, Blagoevgrad, Bulgaria, in 2003, and M.S. and Ph.D. degrees in computer science from the Ohio State University, Columbus, Ohio in 2007 and 2008, respectively. He is currently an Assistant Professor in the Department of Computer Science at the State University of New York, Oswego.Dr. Adrian Ieta, State University of New York, Oswego Adrian Ieta received a B.Sc. degree in physics from the University of Timisoara, Timisoara, Romania, in 1984, a B.E.Sc. degree in electrical engineering from the
Paper ID #12707Searching the World Wide Web – Finding the Right Information the FirstTimeMs. Kristine Donate, Florida Atlantic University Twenty years in the RF Analog/Mixed Signal Design and EDA software industries doing design, customer support, application engineering, technical writing, training development and delivery, project manage- ment, AE and business management. Current focus is on telephony and IVR technologies. Realization of software development as a true passion of mine led to the pursuit of a Master’s degree in Computer Science at Florida Atlantic University, graduated in December, 2013.Dr. Ravi T
AC 2012-4446: COMPUTER ENGINEERING CAPSTONE PROJECTS INTHE COMPUTER SCIENCE DEPARTMENTDr. Afsaneh Minaie, Utah Valley University Afsaneh Minaie is a professor of computer science at Utah Valley University. Her research interests include gender issues in the academic sciences and engineering fields, embedded systems design, mobile computing, wireless sensor networks, and databases.Mr. Ali Sanati-Mehrizy, Pennsylvania State UniversityMr. Paymon Sanati-Mehrizy, University of Pennsylvania Paymon Sanati-Mehrizy is currently a senior at the University of Pennsylvania, studying biology. Cur- rently, his research interests consist of higher education curricula, including within the field of wireless sensor networking. After
only lectures, but also hands-on labs remotely. Traditionally,online courses were heavily weighted towards lecture and paper assessments; this was justifieddue to lab hardware cost, lab availability, and inability to objectively measure student labperformance. While cost remains a factor in any course with a lab component, implementing newtechnologies such as virtualization and cloud computing has mitigated and in some casescompletely removed ancillary lab issues. Different virtual lab approaches, centralized ordecentralized, have been tested or implemented in many educational institutions1,2,3,4. Previousstudies usually focused on a single system, for example, how VirtualBox was used in a particularcourse. In the Information and Computer
AC 2012-4722: INTEGRATION OF WIRELESS SENSOR NETWORKS INTHE COMPUTER SCIENCE AND ENGINEERING CURRICULADr. Afsaneh Minaie, Utah Valley University Afsaneh Minaie is a professor of computer science at Utah Valley University. Her research interests include gender issues in the academic sciences and engineering fields, embedded systems design, mobile computing, wireless sensor networks, and databases.Mr. Ali Sanati-Mehrizy, Pennsylvania State UniversityMr. Paymon Sanati-Mehrizy, University of Pennsylvania Paymon Sanati-Mehrizy is currently a senior at the University of Pennsylvania, studying biology. Cur- rently, his research interests consist of higher education curricula, including within the field of wireless sensor
Hands-On Networking & Security Labs On-Demand Dr. Emil H Salib, Ryan Lutz, Ryan Carter Integrated Science & Technology Department, James Madison University, Harrisonburg, VA salibeh@jmu.edu, lutzra@dukes.jmu.edu, carterra@dukes.jmu.eduAbstractVirtualization is one of the most effective ways to increase efficiency, boost productivity andreduce expenses in an enterprise environment through the deployment of a platform such asVMware vSphere Suite. In academic classrooms, virtualization has also been adopted but in theform of a standalone desktop application such as VWware Workstation, Microsoft Hyper-V,Virtualbox, and QEMU to name a few. However, these standalone
applying big data techniques for improving STEM education for women and minorities. She is PI and Co-PI for NSF-funded REU and RET programs respectively. Her recent honors and awards include 2017 University Excellence in Professional Service Award and being featured in the UCF Women Making History series in March 2015. She was co-recipient of the Best Paper Award at the IEEE ICC 2013. Dr. Turgut serves as a member of the editorial board and of the technical program committee of ACM and IEEE journals and international conferences. She is a member of IEEE, ACM, and the Upsilon Pi Epsilon honorary society.Dr. Lisa Massi, University of Central Florida Dr. Lisa Massi is the Director of Operations Analysis for Accreditation
Paper ID #13300Business Intelligence Dashboard for Academic Program ManagementDr. Mudasser Fraz Wyne, National University I have a Ph.D. in Computer Science, M.Sc. in Engineering, and B.Sc. in Electrical Engineering. Currently I serve as a Chair for Department of Computer Science, Information and Media Systems and Professor of Computer Science at School of Engineering and Computing, National University. I am also the Program Lead for MS in Information Technology Management and have also served recently as the lead for BSc in Information Systems, the co-Lead for MSc Computer Science and Program Lead for MSc in Database
Paper ID #11542Comparatively Mapping Genres in Academic and Workplace EngineeringEnvironmentsDr. Vukica M. Jovanovic, Old Dominion University Dr. Jovanovic is an Assistant Professor of Engineering Technology, Frank Batten College of Engineering and Technology at Old Dominion University. She is teaching classes in the area of mechatronics and computer aided engineering. Her research Interests are: mechatronics, robotics, digital manufacturing, product lifecycle management, manufacturing systems, and engineering education.Megan McKittrick, Old Dominion University Megan McKittrick is a full-time Instructor and part-time PhD
AC 2012-3999: STUCK IN THE MIDDLE: THE IMPACT AND PREVA-LENCE OF FRUSTRATION IN ONLINE QUESTION-ANSWER DISCUS-SION THREADSMr. Michael Hergenrader, University of Southern California Michael Hergenrader is a senior majoring in computer science and Spanish. His interests include dis- tributed systems, machine learning, and search technologies. At the Informational Sciences Institute at ISI and at IBM, he is able to work with pride and happiness in all that he does.Dr. Jihie Kim, University of Southern California Jihie Kim is the Principal Investigator of the Intelligent Technologies for Teaching and Learning group in the USC Information Sciences Institute (http://ai.isi.edu/pedtek). She is also a Research Assistant
Paper ID #6904Application of Wireless Sensor Networks in Health Care SystemDr. Afsaneh Minaie, Utah Valley University Afsaneh Minaie is a professor of Computer Engineering at Utah Valley University. Her research interests include gender issues in the academic sciences and engineering elds, Embedded Systems Design, Mobile Computing, Wireless Sensor Networks, and Databases.Dr. Ali Sanati-Mehrizy Dr. Ali Sanati-Mehrizy is a graduate of the Milton S. Hershey Pennsylvania State University College of Medicine. He completed his undergraduate studies in Biology from the University of Utah. In July 2013, he will begin a
AC 2012-3122: DEVELOPING VIRTUAL CLUSTERS FOR HIGH PER-FORMANCE COMPUTING USING OPENNEBULAMr. Jason St. John, Purdue University, West Lafayette Jason St. John earned a Bachelor of Science degree in Computer & Information Technology (Network Engineering Technology concentration) from Purdue University, West Lafayette in December 2010. In January 2011, Jason accepted a position as a Graduate Research Assistant in the Department of Computer & Information Technology at Purdue University working under Dr. Thomas Hacker. Jason is currently pursuing a Master’s Degree in high performance computing systems.Prof. Thomas J. Hacker, Purdue University, West Lafayette Thomas J. Hacker is an Associate Professor of computer
AC 2011-2280: MOUNT TIMPANOGOS COMMUNITY SPECIES DATABASEDr. Reza Sanati-Mehrizy, Utah Valley University Reza Sanati-Mehrizy is a professor of Computer Science at Utah Valley University. His research interests include Data Structures, Databases, and Data Mining.Mr. Evan JacksonAli Sanati-Mehrizy, Pennsylvania State University Ali Sanati-Mehrizy is a medical student at the Milton S. Hershey Medical Center at Pennsylvania State University. His research interests include the application of mobile computing in the sciences. Upon completion of medical school, he hopes to pursue a career in Internal Medicine/Pediatrics with a further specialization in Hematology-Oncology.Paymon Sanati-Mehrizy, University of Pennsylvania
AC 2011-2161: INTEGRATION OF MOBILE DEVICES INTO COMPUTERSCIENCE AND ENGINEERING CURRICULUMDr. Afsaneh Minaie, Utah Valley University Afsaneh Minaie is a professor of Computer Science at Utah Valley University. Her research interests include gender issues in the academic sciences and engineering fields, Embedded Systems Design, Mobile Computing, and Databases.Paymon Sanati-Mehrizy, University of Pennsylvania Paymon Sanati-Mehrizy is an undergraduate student at the University of Pennsylvania studying Biology. His research area of interest includes the field of Mobile Computing and effective use of databases, par- ticularly relating to their incorporations into the Health Care industry. After graduation, Paymon