Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Selected Works (16)
- Singapore Management University (13)
- Kennesaw State University (8)
- Loyola University Chicago (4)
- University of Texas at El Paso (4)
-
- Embry-Riddle Aeronautical University (3)
- University of Nevada, Las Vegas (3)
- City University of New York (CUNY) (2)
- Eastern Michigan University (2)
- Florida International University (2)
- San Jose State University (2)
- Southwestern Oklahoma State University (2)
- Technological University Dublin (2)
- Walden University (2)
- Air Force Institute of Technology (1)
- Australian Council for Educational Research (ACER) (1)
- Bowling Green State University (1)
- California Polytechnic State University, San Luis Obispo (1)
- Edith Cowan University (1)
- Gettysburg College (1)
- Missouri University of Science and Technology (1)
- Nova Southeastern University (1)
- Sacred Heart University (1)
- Southern Methodist University (1)
- The University of Maine (1)
- University of Nebraska - Lincoln (1)
- University of Nebraska Medical Center (1)
- University of Richmond (1)
- University of South Florida (1)
- University of Southern Maine (1)
- Keyword
-
- Programming (6)
- Computer science (5)
- Exploring Computer Science (5)
- Computer programming (4)
- Computer science education (4)
-
- Education (4)
- Robotics (4)
- Assessment (3)
- Coding (3)
- Computer science attitudes (3)
- Cybersecurity (3)
- Gender (3)
- High school computer science (3)
- Simulator (3)
- Active learning (2)
- Air Traffic Control (2)
- Artificial Intelligence (2)
- Computer Science Education (2)
- Curriculum (2)
- Cybersecurity education (2)
- Data analysis (2)
- Flight Transition Corridor (2)
- Game mechanics (2)
- High school (2)
- Mission Control Center (2)
- National Air Space (2)
- STEM (2)
- Software development (2)
- Space Operations (2)
- Suborbital (2)
- Publication
-
- Research Collection School Of Computing and Information Systems (12)
- Ronald Greenberg (8)
- Ashish Amresh (4)
- Computer Science: Faculty Publications and Other Works (4)
- Departmental Technical Reports (CS) (4)
-
- Journal of Cybersecurity Education, Research and Practice (4)
- KSU Proceedings on Cybersecurity Education, Research and Practice (4)
- Journal of Aviation/Aerospace Education & Research (3)
- Articles (2)
- Faculty Publications (2)
- Heng Ngee MOK (2)
- Master's Theses and Doctoral Dissertations (2)
- Publications and Research (2)
- Student Research (2)
- UNLV Best Teaching Practices Expo (2)
- Walden Dissertations and Doctoral Studies (2)
- 2009 - 2019 ACER Research Conferences (1)
- All Works (1)
- Amber Settle (1)
- CCE Theses and Dissertations (1)
- Capstone Experience (1)
- Computer Science Faculty Publications (1)
- Cyber Security Capstone Research Project Reports (1)
- FIU Electronic Theses and Dissertations (1)
- Fred and Harriet Cox Senior Design Competition Projects (1)
- General University of Maine Publications (1)
- Honors Expanded Learning Clubs (1)
- Honors Projects (1)
- ICOT 18 - International Conference on Thinking - Cultivating Mindsets for Global Citizens (1)
- Languages Faculty Publications (1)
- Publication Type
- File Type
Articles 1 - 30 of 86
Full-Text Articles in Education
Using Case Studies To Teach Cybersecurity Courses, Yu Cai
Using Case Studies To Teach Cybersecurity Courses, Yu Cai
Journal of Cybersecurity Education, Research and Practice
This paper introduces a holistic and case-analysis teaching model by integrating case studies into cybersecurity courses. The proposed model starts by analyzing real-world cyber breaches. Students look into the details of these attacks and learn how these attacks took place from the beginning to the end. During the process of case analysis, a list of security topics reflecting different aspects of these breaches is introduced. Through guided in-class discussion and hands-on lab assignments, student learning in lecture will be reinforced. Overall, the entire cybersecurity course is driven by case studies. The proposed model is great for teaching cybersecurity. First, the …
An Examination Of Cybersecurity Knowledge Transfer: Teaching, Research, And Website Security At U.S. Colleges And Universities, Aditya Gupta, James R. Wolf
An Examination Of Cybersecurity Knowledge Transfer: Teaching, Research, And Website Security At U.S. Colleges And Universities, Aditya Gupta, James R. Wolf
Journal of Cybersecurity Education, Research and Practice
This work seeks to answer the question: Does faculty cybersecurity knowledge gained from teaching and research transfer to other IT units in the university? Specifically, do colleges and universities that excel in cybersecurity teaching and research have more secure websites? This work explores a unique setting where the knowledge of the source and recipient are both directly related and observable without outside intervention. Our study employed data from 591 U.S. colleges and universities, the National Centers of Academic Excellence (CAE) program, accepted paper data from the ACM Conference on Computer and Communications Security (CCS) and the IEEE Symposium on Security …
College Of Engineering Senior Design Competition Fall 2018, University Of Nevada, Las Vegas
College Of Engineering Senior Design Competition Fall 2018, University Of Nevada, Las Vegas
Fred and Harriet Cox Senior Design Competition Projects
Part of every UNLV engineering student’s academic experience, the senior design project stimulates engineering innovation and entrepreneurship. Each student in their senior year chooses, plans, designs, and prototypes a product in this required element of the curriculum. A capstone to the student’s educational career, the senior design project encourages the student to use everything learned in the engineering program to create a practical, real world solution to an engineering challenge. The senior design competition helps focus the senior students in increasing the quality and potential for commercial application for their design projects. Judges from local industry evaluate the projects on …
Data Mining Approach To The Identification Of At-Risk Students, Li Chin Ho, Kyong Jin Shim
Data Mining Approach To The Identification Of At-Risk Students, Li Chin Ho, Kyong Jin Shim
Research Collection School Of Computing and Information Systems
In recent years, the use of digital tools and technologies in educational institutions are continuing to generate large amounts of digital traces of student learning behavior. This study presents a proof-of-concept analytics system that can detect at-risk students along their learning journey. Educators can benefit from the early detection of at-risk students by understanding factors which may lead to failure or drop-out. Further, educators can devise appropriate intervention measures before the students drop out of the course. Our system was built using SAS ® Enterprise Miner (EM) and SAS ® JMP Pro.
An Architectural Design And Evaluation Of An Affective Tutoring System For Novice Programmers, Hua Leong Fwa
An Architectural Design And Evaluation Of An Affective Tutoring System For Novice Programmers, Hua Leong Fwa
Research Collection School Of Computing and Information Systems
Affect is prevalent in learning and it influences students’ learning achievement. This paper details the design and evaluation of an Affective Tutoring System (ATS) that tutors student in computer programming. Although most ATSs are purpose built for a specific domain, making adaptation to another domain difficult, this ATS is architected for adaptability and extensibility. This study also addresses a lack of research exploring the theories and methods of integrating affect and learning within the learning process by proposing methods of regulating the negative affect of students. Both quantitative and qualitative techniques were used for evaluation of the effectiveness of the …
Applying Design Thinking To Student Outreach Projects: Experiences From An Information Systems School, Swapna Gottipati, Venky Shankararaman, Alan Megargel
Applying Design Thinking To Student Outreach Projects: Experiences From An Information Systems School, Swapna Gottipati, Venky Shankararaman, Alan Megargel
Research Collection School Of Computing and Information Systems
As countries turn into Smart Nations, Infocom Technology plays a key role in enhancing their competitiveness through high skilled workforces. Reaching to younger generations and attracting them to computing programs such as Information Systems (IS) and Computer Science (CS) is a key challenge faced by universities. Many high quality students from junior colleges either don’t choose IS programs or choose IS programs as their last option during the application process. A School of Information Systems (SIS) from a large metropolitan university decided to implement an innovative outreach program to attract high quality high school aka Junior College (JC) students. JC …
Effectiveness Of Physical Robot Versus Robot Simulator In Teaching Introductory Programming, Oka Kurniawan, Norman Tiong Seng Lee, Subhajit Datta, Nachamma Sockalingam, Pey Lin Leong
Effectiveness Of Physical Robot Versus Robot Simulator In Teaching Introductory Programming, Oka Kurniawan, Norman Tiong Seng Lee, Subhajit Datta, Nachamma Sockalingam, Pey Lin Leong
Research Collection School Of Computing and Information Systems
This study reports the use of a physical robot and robot simulator in an introductory programming course in a university and measures students' programming background conceptual learning gain and learning experience. One group used physical robots in their lessons to complete programming assignments, while the other group used robot simulators. We are interested in finding out if there is any difference in the learning gain and experiences between those that use physical robots as compared to robot simulators. Our results suggest that there is no significant difference in terms of students' learning between the two approaches. However, the control group …
From Gig Economy To Gig Education, Olga Kosheleva, Julian Viera Jr., Vladik Kreinovich
From Gig Economy To Gig Education, Olga Kosheleva, Julian Viera Jr., Vladik Kreinovich
Departmental Technical Reports (CS)
Modern economy has benefited from gig economy idea, where, instead of hiring permanent employees, a company assigns each task to the person who is the most efficient in performing this task. This way, each task is performed in the best possible way -- by a person who is the most suited for this job. Why not extend this idea to education? Every student deserves the best possible teacher in every topic. So why not have a teacher who is the best in town in explaining quadratic equations teach quadratic equations to all the students from the town? In this paper, …
Should School Feel Like A Family: Lessons From Business Controversy As Interpreted By Decision Making Theory, Olga Kosheleva, Julian Viera Jr., Vladik Kreinovich
Should School Feel Like A Family: Lessons From Business Controversy As Interpreted By Decision Making Theory, Olga Kosheleva, Julian Viera Jr., Vladik Kreinovich
Departmental Technical Reports (CS)
Traditional business theory promoted the ideal of business as a family: everyone should feel good about each other, all employees should feel good working together towards a joint goal. Recently, however, researchers claim that the well-promoted ideal is unattainable, it is a ruse causing everyone to overwork. Instead, these researchers propose a non-emotional collaboration of adults working temporarily on a joint project. In this paper, we show that this new trend is not just based on anecdotal evidence, it actually has a solid foundation in decision theory. So maybe we should apply this new trend to teaching too - and …
Class Discussion Management And Analysis Application, Venky Shankararaman, Swapna Gottipati, Seshan Ramaswami, Chirag Chhablan
Class Discussion Management And Analysis Application, Venky Shankararaman, Swapna Gottipati, Seshan Ramaswami, Chirag Chhablan
Research Collection School Of Computing and Information Systems
Discussion-based teaching is popular in several courses because it creates opportunities for students to practice important skills useful for the working environment. In order to make this pedagogy impactful and effective, instructors employ technologies such as online discussion forums and student response systems to conduct and manage classroom discussions. More recently mobile devices have become prevalent and researchers have been exploring how this device can help support education. In this paper we report the innovative use of mobile technology and supporting backend tools to manage classroom discussions. We have implemented a class discussion and management application, LiveClass. This application records …
Vt-Revolution: Interactive Programming Tutorials Made Possible, Lingfeng Bao, Zhenchang Xing, Xin Xia, David Lo, Shanping Li
Vt-Revolution: Interactive Programming Tutorials Made Possible, Lingfeng Bao, Zhenchang Xing, Xin Xia, David Lo, Shanping Li
Research Collection School Of Computing and Information Systems
Programming video tutorials showcase programming tasks and associated workflows. Although video tutorials are easy to create, it isoften difficult to explore the captured workflows and interact withthe programs in the videos. In this work, we propose a tool named VTRevolution – an interactive programming video tutorial authoring system. VTRevolution has two components: 1) a tutorial authoring system leverages operating system level instrumentation to log workflow history while tutorial authors are creating programming video tutorials; 2) a tutorial watching system enhances the learning experience of video tutorials by providing operation history and timeline-based browsing interactions. Our tutorial authoring system does not …
Improving Knowledge Tracing Model By Integrating Problem Difficulty, Sein Minn, Feida Zhu, Michel C. Desmarais
Improving Knowledge Tracing Model By Integrating Problem Difficulty, Sein Minn, Feida Zhu, Michel C. Desmarais
Research Collection School Of Computing and Information Systems
Intelligent Tutoring Systems (ITS) are designed for providing personalized instructions to students with the needs of their skills. Assessment of student knowledge acquisition dynamically is nontrivial during her learning process with ITS. Knowledge tracing, a popular student modeling technique for student knowledge assessment in adaptive tutoring, which is used for tracing student's knowledge state and detecting student's knowledge acquisition by using decomposed individual skill or problems with a single skill per problem. Unfortunately, recent KT models fail to deal with practices of complex skill composition and variety of concepts included in a problem simultaneously. Our goal is to investigate a …
A Mixed Method Study Of Prospective Teachers' Epistemic Beliefs And Web Evaluation Strategies Concerning Hoax Websites, Jennifer Coccaro-Pons
A Mixed Method Study Of Prospective Teachers' Epistemic Beliefs And Web Evaluation Strategies Concerning Hoax Websites, Jennifer Coccaro-Pons
FIU Electronic Theses and Dissertations
Teachers need to be equipped with the tools necessary to evaluate content on the Internet and determine if it is a credible source, or a hoax website since they are expected to instruct and prepare students on how to evaluate the sites which is now a relevant phenomenon. The purpose of the mixed‑method study was to obtain an understanding of the web evaluation strategies of prospective teachers regarding the evaluation of hoax websites and how their epistemic beliefs may influence their evaluation. Another aspect of this study was to find out what outcomes resulted from providing guidance, or not to …
Setting Up A Low-Cost Lab Management System For A Multi-Purpose Computing Laboratory Using Virtualisation Technology, Heng Ngee Mok, Wee Kiat Tan
Setting Up A Low-Cost Lab Management System For A Multi-Purpose Computing Laboratory Using Virtualisation Technology, Heng Ngee Mok, Wee Kiat Tan
Heng Ngee MOK
This paper describes how a generic computer laboratory equipped with 52 workstations is set up for teaching IT-related courses and other general purpose usage. The authors have successfully constructed a lab management system based on decentralised, client-side software virtualisation technology using Linux and free software tools from VMware that fulfils the requirements of fast "switch over" time between consecutive lab sessions, the ability to support a wide range of IT courses and usage scenarios, low cost, easy maintenance, and a sandboxed environment for potentially disruptive IT security lab exercises. Sufficient implementation details are provided so that readers can build a …
Teaching Tip: The Flipped Classroom, Heng Ngee Mok
Teaching Tip: The Flipped Classroom, Heng Ngee Mok
Heng Ngee MOK
The flipped classroom has been gaining popularity in recent years. In theory, flipping the classroom appears sound: passive learning activities such as unidirectional lectures are pushed to outside class hours in the form of videos, and precious class time is spent on active learning activities. Yet the courses for information systems (IS) undergraduates at the university that the author is teaching at are still conducted in the traditional lecture-in-class, homework-after-class style. In order to increase students’ engagement with the course content and to improve their experience with the course, the author implemented a trial of the flipped classroom model for …
Mapping Knowledge Units Using A Learning Management System (Lms) Course Framework, Casey Rackley
Mapping Knowledge Units Using A Learning Management System (Lms) Course Framework, Casey Rackley
KSU Proceedings on Cybersecurity Education, Research and Practice
ABSTRACT
The purpose of this paper is to examine the outcomes of using a Learning Management System (LMS) course as a framework for mapping the Centers of Academic Excellence in Cyber Defense (CAE-CD) 2019 Knowledge Units (KU) to college courses. The experience shared herein will be useful to faculty who are interested in performing the mapping and applying for CAE-CDE designation.
Cybersecurity Education Employing Experiential Learning, Travis Lowe, Casey Rackley
Cybersecurity Education Employing Experiential Learning, Travis Lowe, Casey Rackley
KSU Proceedings on Cybersecurity Education, Research and Practice
ABSTRACT
The purpose of this paper is to discuss a curriculum design that employs Kolb’s Experiential Learning Theory stages and Kolb’s Learning Styles in four consecutive class sessions. The challenge each class is to present students with perplexing and often frustrating network problems that someday might be encountered on the job. By using Kolb’s theory, students address those problems from the perspective of each learning style, while passing through each phase of the learning cycle. As a result, students gain stronger cognitive thinking skills and hands-on troubleshooting skills in preparation for work as network administrators or cybersecurity analysts.
Study Of Physical Layer Security And Teaching Methods In Wireless Communications, Zhijian Xie, Christopher Horne
Study Of Physical Layer Security And Teaching Methods In Wireless Communications, Zhijian Xie, Christopher Horne
KSU Proceedings on Cybersecurity Education, Research and Practice
In most wireless channels, the signals propagate in all directions. For the communication between Alice and Bob, an Eavesdropper can receive the signals from both Alice and Bob as far as the Eavesdropper is in the range determined by the transmitting power. Through phased array antenna with beam tracking circuits or cooperative iteration, the signals are confined near the straight line connecting the positions of Alice and Bob, so it will largely reduce the valid placement of an Eavesdropper. Sometimes, this reduction can be prohibitive for Eavesdropper to wiretap the channel since the reduced space can be readily protected. Two …
Evaluating Two Hands-On Tools For Teaching Local Area Network Vulnerabilities, Ariana Brown, Jinsheng Xu, Xiaohong Yuan
Evaluating Two Hands-On Tools For Teaching Local Area Network Vulnerabilities, Ariana Brown, Jinsheng Xu, Xiaohong Yuan
KSU Proceedings on Cybersecurity Education, Research and Practice
According to the Verizon’s Data Breach Investigations Report, Local Area Network (LAN) access is the top vector for insider threats and misuses. It is critical for students to learn these vulnerabilities, understand the mechanisms of exploits, and know the countermeasures. The department of Computer Science at North Carolina A&T State University designed two different educational tools that help students learn ARP Spoofing Attacks, which is the most popular attack on LAN. The first tool, called Hacker’s Graphical User Interface (HGUI), is a visualization tool that demonstrates ARP Spoofing Attack with real time animation. The second tool is a hands-on (HandsOn) …
Girls Who Code 3rd-5th, Khristina Polivanov
Girls Who Code 3rd-5th, Khristina Polivanov
Honors Expanded Learning Clubs
The goal of the club is to encourage girls to be confident in themselves and their abilities while teaching them basic concepts used in computer science.
Comparing Us And Russian Grading Scales, Olga Kosheleva, Vladik Kreinovich
Comparing Us And Russian Grading Scales, Olga Kosheleva, Vladik Kreinovich
Departmental Technical Reports (CS)
In the US, grades are usually based on comprehensive written exams: the larger the proportion of topic in which the student shows knowledge, the higher the student's grade. In contrast, in Russia, the grades are based on oral exams, and the bulk of the grade comes from a student answering questions of a few (usually, three) randomly selected topics. A natural question is: what is the relation between the two grading scales? It turns out that "excellent" and "good" grades means the same in both scales, while the US "satisfactory" level is higher than a similar Russian level.
Psychological Behavior Of English Learners Utilizing A Cognitive Tutor In An Online Pre-Calculus, Julian Viera Jr., Olga Kosheleva, Vladik Kreinovich
Psychological Behavior Of English Learners Utilizing A Cognitive Tutor In An Online Pre-Calculus, Julian Viera Jr., Olga Kosheleva, Vladik Kreinovich
Departmental Technical Reports (CS)
The educational landscape is becoming a digital learning environment. Students in today's digital world draw from multiple sources of information; from hypertext, videos, social media, to video games and internet searches. English Learners, individuals learning two languages at once, who use software written in English have a passive relationship with the computer when software is not in their native language. They feel that this educational software belongs to another culture. This paper will present findings from a study with English Learners' engagement in a fully online pre-calculus course. The authors utilized Cultural-Historical Activity Theory to describe how English Learners' created …
Ums Data Governance Annual Report 2018, University Of Maine System Data Advisory Committee
Ums Data Governance Annual Report 2018, University Of Maine System Data Advisory Committee
General University of Maine Publications
The newly formed University of Maine System Data Governance program was launched to improve the System's capacity to collect information and deploy resources in service to the students and in response to Maine's dire demographic and workforce challenges.
The UMS campuses and administrative units make up a complex system that requires a strategic approach to data collection and analysis. From understanding the intricacies of distance education and online programs, to aligning human resource and financial department codes, unified data governance is essential to ensuring the integrity and reliability of the University of Maine System's data.
Sufat: An Analytics Tool For Gaining Insights From Student Feedback Comments, Siddhant Pyasi, Swapna Gottipati, Venky Shankararaman
Sufat: An Analytics Tool For Gaining Insights From Student Feedback Comments, Siddhant Pyasi, Swapna Gottipati, Venky Shankararaman
Research Collection School Of Computing and Information Systems
Teacher evaluation is a vital element inimproving student learning outcomes. Course and instructor feedback given bystudents, provides insights that can help improve student learning outcomes andteaching quality. Teaching and course evaluation systems help to collectquantitative and qualitative feedback from students. Since manually analysingthe qualitative feedback is painstaking and a tedious process, usually, onlythe quantitative feedback is often used for evaluating the course and theinstructor. However, useful knowledge is hidden in the qualitative comments, inthe form of sentiments and suggestions that can provide valuable insights tohelp plan improvements in the course content and delivery. In order toefficiently gather, analyse and provide …
Exploring Experiential Learning Model And Risk Management Process For An Undergraduate Software Architecture Course, Eng Lieh Ouh, Yunghans Irawan
Exploring Experiential Learning Model And Risk Management Process For An Undergraduate Software Architecture Course, Eng Lieh Ouh, Yunghans Irawan
Research Collection School Of Computing and Information Systems
This paper shares our insights on exploring theexperiential learning model and risk management process todesign an undergraduate software architecture course. The keychallenge for undergraduate students to appreciate softwarearchitecture design is usually their limited experience in thesoftware industry. In software architecture, the high-level designprinciples are heuristics lacking the absoluteness of firstprinciples which for inexperienced undergraduate students, thisis a frustrating divergence from what they used to value. From aneducator's perspective, teaching software architecture requirescontending with the problem of how to express this level ofabstraction practically and also make the learning realistic. Inthis paper, we propose a model adapting the concepts ofexperiential learning …
Research Innovation And Institutional Growth: Digital Humanities, Usm, And The University Of Maine System, Janet M. Billson, Katherine Bessey
Research Innovation And Institutional Growth: Digital Humanities, Usm, And The University Of Maine System, Janet M. Billson, Katherine Bessey
Research Innovation and Institutional Growth
No abstract provided.
Teaching Basic Programming To Pre-University Students Through Blended Learning Pedagogy: A Descriptive Study, Vandana Ramachandra Rao, Ngee Mok Heng
Teaching Basic Programming To Pre-University Students Through Blended Learning Pedagogy: A Descriptive Study, Vandana Ramachandra Rao, Ngee Mok Heng
Research Collection School Of Computing and Information Systems
Students enrolling for undergraduate programmes in Singapore would have either finished their polytechnic diploma or completed Junior College (JC) studies. Most pre-university students coming through the JC pathway are not exposed to programming as computing is offered as a subject in a very few JCs. The authors of this paper conducted four runs of an introductory programing course between 2016 and 2017 for a research project funded by the Ministry of Education, Singapore. The project named “Let’s Code!” was intended to introduce fundamental programming concepts to students and guide them to consider taking a computer-science related degree for their university …
Transforming Learning With Information And Communication Technologies: Insights From Three Decades Of Research, Romina Jamieson-Proctor
Transforming Learning With Information And Communication Technologies: Insights From Three Decades Of Research, Romina Jamieson-Proctor
2009 - 2019 ACER Research Conferences
Since computers first appeared in classrooms, educators have sought to integrate information communication technologies (ICT) into teaching and learning. In Australia, as elsewhere, ICT are widely regarded as critical facilitators of student learning. The ability to use ICT effectively is specified in Australia’s national curriculum as a required general capability. However, despite the educational environment being replete with ICT related programs, our understanding of how students use ICT for learning is still limited. This paper presents insights from the past 30 years of research, which suggest that even though the current ‘climate’ in Australian schools is favourable, teacher confidence and …
An Examination Of Factors Correlating With Course Failure In A High School Computer Science Course, Steven Mcgee, Ronald I. Greenberg, Lucia Dettori, Andrew M. Rasmussen, Randi Mcgee-Tekula, Jennifer Duck, Erica Wheeler
An Examination Of Factors Correlating With Course Failure In A High School Computer Science Course, Steven Mcgee, Ronald I. Greenberg, Lucia Dettori, Andrew M. Rasmussen, Randi Mcgee-Tekula, Jennifer Duck, Erica Wheeler
Computer Science: Faculty Publications and Other Works
Across the United States, enrollment in high school computer science (CS) courses is increasing. These increases, however, are not spread evenly across race and gender. CS remains largely an elective class, and fewer than three-fourths of the states allow it to count towards graduation. The Chicago Public Schools has sought to ensure access for all students by recently enacting computer science as a high school graduation requirement. The primary class that fulfills the graduation requirement is Exploring Computer Science (ECS), a high school introductory course and professional development program designed to foster deep engagement through equitable inquiry around CS …
Visualization Of Geospatial Data As An Analytical And Educational Tool, Richard A. Vu
Visualization Of Geospatial Data As An Analytical And Educational Tool, Richard A. Vu
STAR Program Research Presentations
World Wind is an open-source API developed for Java, Android, and browsers that is designed to visualize and interact with geospatial data. The Web World Wind client is composed of four major components: the HTML template, the globe, geospatial features, and application features. The template was implemented using Bootstrap and hosts the globe provided by World Wind. This globe draws its data from multiple imagery sources, including the Open Geospatial Consortium (OGC) Web Map Service and Web Map Tile Service. This enables the application to perform and visualize complex calculations with multiple types of data such as weather and terrain. …