Instructional Strategies In Diagram-Based Itss: Lessons Learned From Two Tutoring Systems, 2017 Iowa State University
Instructional Strategies In Diagram-Based Itss: Lessons Learned From Two Tutoring Systems, Enruo Guo, Stephen B. Gilbert
Stephen B. Gilbert
Unlike text-based input to an intelligent tutoring system, a diagram is perceived as a whole state; the operation sequence is less important. Traditional step-wise coaching is not as appropriate in diagram-based intelligent tutoring systems (DITS). From two previous tutoring systems, StaticsTutor and Thermo Cycle Tutor, we propose cross-domain pedagogical guidelines for DITS. In particular, instruction needs to be mapped to a hierarchical understanding of the diagram, where each level focuses on different characteristics of the drawing. Also, instruction needs to address conceptual knowledge and procedure expertise separately. Some practical suggestions are described to achieve these goals, such as 1) different ...
Autonomous Speed Control For Kia Optima, 2017 Kennesaw State University
Autonomous Speed Control For Kia Optima, Andrew J. Combs, Kyle Fugatt, Kevin Mcfall
The Kennesaw Journal of Undergraduate Research
The standard method for speed control is the cruise control system built into most modern vehicles. These systems employ a PID controller which actuates the accelerator thus, in turn, maintains the desired vehicle speed. The main drawback of such a system is that typically the cruise control will only engage above 25 mph. The goal of this paper is to describe a system which we used to control vehicle speed from a stop to any desired speed using an Arduino microcontroller and a CAN BUS shield, from where autonomous features can be built upon. With this system, we were able ...
The Dark Destiny Of Safety, 2017 Northwestern University
The Dark Destiny Of Safety, Max Rowe, Jose Trejos
Most people imagine hacking to be an exceedingly complex crime, requiring an understanding of computing systems that goes far beyond that of average, functionally literate PC users. While there are sophisticated hacking techniques which do fit this description, many forms of hacking require little more than the ability to install basic programs on a computer. Perhaps the simplest of all forms of hacking is DDoS , or Denial of Service attack. DDoS is a simple brute-force method that spams a server with millions of identical simple requests, which can cause sites and providers to be overloaded and temporarily shut down. Users ...
Wireless Window Blinds, 2017 California Polytechnic State University, San Luis Obispo
Wireless Window Blinds, Cooper Laone, Niraj Morar, Zachary Malig, Jake Phillips
The Internet of Things asserts that there exists a global need for all objects to connect easily and accessibly. Today, smartphones, tablets, laptops and smart watches makeup just a few of the interconnected devices by the greater population. As a result a growing need for wireless connection between personal devices like phones, and computers to everyday appliances exists. This idea extends directly to households, businesses and buildings, where a growing need for smart home or smart-business appliances has taken root. Many companies like Nest, ADT and Apple make products for automated home security and in home media control. The Wireless ...
Vertical Search Engines, 2017 Dublin Institute of Technology
Vertical Search Engines, Kevin Curran, Jude Mc Glinchey
The ITB Journal
This paper outlines the growth in popularity of vertical search engines, their origins, the differences between them and well-known broad based search engines such as Google and Yahoo. We also discuss their use in business-to-business, their marketing and advertising costs, what the revenue streams are and who uses them.
Be Aware With A Honeypot, 2017 Dublin Institute of Technology
Be Aware With A Honeypot, Stephen Meyer, Ivan Smyth, Mark Cummins, Anthony Keane
The ITB Journal
The Internet has already become a hostile environment for computers, especially when they are directly connected with a public IP address. We have experienced this hostile activity where on an average day; the ITB Honeypot recorded over a thousand reconnaissance attacks seeking unauthorised entry onto our private network. Our Honeypot is a basic PC running Windows XP with no services offered and no activity from users that would generate traffic. The Honeypot is running in a passive state on a stub-network where all inbound and outbound traffic is recorded at the bridging computer to the WAN. We report on the ...
Augmented Reality Technician Assistance Program, 2017 Cedarville University
Augmented Reality Technician Assistance Program, Jackson W. Volante, Kidron R. Filbrun, Jeffrey T. Deane, Andrew T. Carr, Nathan A. Harold, Daniel J. Eckley
The Research and Scholarship Symposium
The Augmented Reality Technician Assistance Program is a proof-of-concept project for allowing a remote expert to communicate with and assist a field technician in completing procedures with which the technician may be unfamiliar. For example, an expert in Navy aircraft maintenance could advise an Air Force flight mechanic about performing repairs or maintenance on Navy aircraft. The end goal of our Cedarville computer science capstone project is to create an experimental prototype to deliver to the Air Force Research Laboratory. In our prototype the expert uses a Microsoft Surface Pro tablet to communicate via marked up still images with a ...
Who R U? Identity Theft And Unl Students, 2017 University of Nebraska-Lincoln
Who R U? Identity Theft And Unl Students, Marcia L. Dority Baker, Cheryl O'Dell
Publications from Information Technology Services
How can academic institutions help educate their students about the risks of identity theft? Or teach students to better understand how one’s online presence can hold so much joy and angst? For one campus, the University of Nebraska–Lincoln, the opportunity came from a middle school teacher engaging his students in a future problem-solving activity. UNL had the opportunity to create a 45-minute presentation on identity theft for local public school students who would be spending the day on campus researching this topic.
While preparing the presentation, we realized a top 10 list on identity theft for UNL students ...
Making Random - Cryptography And The Generation Of Random Sequences, 2017 University of Southern Maine
Making Random - Cryptography And The Generation Of Random Sequences, Samuel Barton
The algorithm utilizes the behavior of modern operating systems to generate random bits by putting the process to sleep for 10 microseconds, and then comparing the actual number of microseconds slept to the expected amount. The reason why this works for generating \random" bits is that modern operating systems do not wake processes exactly when they request. This is due to process scheduling. The algorithm uses the randomness in actual sleep time to generate each bit.
The bits are not truly random, as if a person were able to force the algorithm to always execute, then we would not have ...
Research Poster.Pdf, 2017 University of Central Florida
Research Poster.Pdf, Desiree Dominguez
Cloud Computing: Current And Future Impact On Organizations, 2017 Western Oregon University
Cloud Computing: Current And Future Impact On Organizations, Yiyun Zhu
Student Theses, Papers and Projects (Computer Science)
This project focuses on the business application of cloud computing, both at present and in the future. This investigation aims to assist business users of cloud computing services to improve the perception of cloud computing, to assess the value of their cloud computing service relationships, and to assist in selecting appropriate cloud computing services. This project bases its information on the existing cloud computing technology to clarify the technical aspects of current cloud services and companies. It presents the key elements of conception of cloud computing, its definitions, main service models, and implementation types. Ultimately, this paper analyzes the cons ...
Collaborating Through Virtual Communities Using Cloud Technology, 2017 American Public University System
Collaborating Through Virtual Communities Using Cloud Technology, Diane Stottlemyer
Collaboration and communication are both essential for successful interaction and participation in virtual communities. In this book, there are discussions of how a virtual community can be an essential communication tool to enhance traditional and online schools. In addition, the virtual community can provide information on the importance of collaboration for those who want to discuss a specific topic area. The virtual community is a tool that can encourage the interaction and exchange of information between individuals. Cloud Technology has helped schools in many ways managing cost while still improving communication and e-collaboration. Cloud technology has increased opportunities for setting ...
Promoting Information Resources To Students: Using Wordpress To Maintain Library Data Sets, 2017 CUNY La Guardia Community College
Promoting Information Resources To Students: Using Wordpress To Maintain Library Data Sets, Derek Stadler
Publications and Research
Although it began as a blog tool, WordPress has grown into a complete content management system with thousands of interactive themes available. Since it uses the MySQL database management system, the open-source software suits the needs of library websites by aggregating a college library’s complete database inventory. Rather than update several HTML pages within a site when new vendors are added or a URL is changed, information from vendors can be maintained in a database table and then displayed to students, highlighting available resources and information. The presentation highlights the use of some simple WordPress plugins to manage many ...
Contributions To Edge Computing, 2017 University of Kentucky
Contributions To Edge Computing, Vernon K. Bumgardner
Theses and Dissertations--Computer Science
Efforts related to Internet of Things (IoT), Cyber-Physical Systems (CPS), Machine to Machine (M2M) technologies, Industrial Internet, and Smart Cities aim to improve society through the coordination of distributed devices and analysis of resulting data. By the year 2020 there will be an estimated 50 billion network connected devices globally and 43 trillion gigabytes of electronic data. Current practices of moving data directly from end-devices to remote and potentially distant cloud computing services will not be sufficient to manage future device and data growth.
Edge Computing is the migration of computational functionality to sources of data generation. The importance of ...
Inference In Networking Systems With Designed Measurements, 2017 University of Massachusetts Amherst
Inference In Networking Systems With Designed Measurements, Chang Liu
Doctoral Dissertations May 2014 - current
Networking systems consist of network infrastructures and the end-hosts have been essential in supporting our daily communication, delivering huge amount of content and large number of services, and providing large scale distributed computing. To monitor and optimize the performance of such networking systems, or to provide flexible functionalities for the applications running on top of them, it is important to know the internal metrics of the networking systems such as link loss rates or path delays. The internal metrics are often not directly available due to the scale and complexity of the networking systems. This motivates the techniques of inference ...
High Performance Multiview Video Coding, 2017 Michigan Technological University
High Performance Multiview Video Coding, Caoyang Jiang
Dissertations, Master's Theses and Master's Reports
Following the standardization of the latest video coding standard High Efficiency Video Coding in 2013, in 2014, multiview extension of HEVC (MV-HEVC) was published and brought significantly better compression performance of around 50% for multiview and 3D videos compared to multiple independent single-view HEVC coding. However, the extremely high computational complexity of MV-HEVC demands significant optimization of the encoder. To tackle this problem, this work investigates the possibilities of using modern parallel computing platforms and tools such as single-instruction-multiple-data (SIMD) instructions, multi-core CPU, massively parallel GPU, and computer cluster to significantly enhance the MVC encoder performance. The aforementioned computing tools ...
Oefs: On-Demand Energy-Based Forwarding Strategy For Named Data Wireless Ad Hoc Networks, 2016 National University of Computer and Emerging Sciences
Oefs: On-Demand Energy-Based Forwarding Strategy For Named Data Wireless Ad Hoc Networks, Rana Asif Rehman, Syed Hassan Ahmed, Byung-Seo Kim
Rana Asif Rehman
Modelling And Analysis Of Smart Grids For Critical Data Communication, 2016 The University of Western Ontario
Modelling And Analysis Of Smart Grids For Critical Data Communication, Abdulfattah Noorwali
Electronic Thesis and Dissertation Repository
Practical models for the subnetworks of smart grid are presented and analyzed. Critical packet-delay bounds for these subnetworks are determined, with the overall objective of identifying parameters that would help in the design of smart grid with least end-to-end delay.
A single-server non-preemptive queueing model with prioritized critical packets is presented for Home Area Network (HAN). Closed-form expressions for critical packet delay are derived and illustrated as a function of: i) critical packet arrival rate, ii) service rate, iii) utilization factor, and iv) rate of arrival of non-critical packets. Next, wireless HANs using FDMA and TDMA are presented. Upper and ...
Hashtag Recommendation With Topical Attention-Based Lstm, 2016 Singapore Management University
Hashtag Recommendation With Topical Attention-Based Lstm, Yang Li, Ting Liu, Jing Jiang, Liang Zhang
Research Collection School Of Information Systems
Microblogging services allow users to create hashtags to categorize their posts. In recent years,the task of recommending hashtags for microblogs has been given increasing attention. However,most of existing methods depend on hand-crafted features. Motivated by the successful use oflong short-term memory (LSTM) for many natural language processing tasks, in this paper, weadopt LSTM to learn the representation of a microblog post. Observing that hashtags indicatethe primary topics of microblog posts, we propose a novel attention-based LSTM model whichincorporates topic modeling into the LSTM architecture through an attention mechanism. Weevaluate our model using a large real-world dataset. Experimental results ...
Rocket Stats, 2016 California Polytechnic State University, San Luis Obispo
Rocket Stats, Kyle Cornelison
An Android application to allow Rocket League players to view their stats and track progress.