Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Engineering

Graduate Curricula In Software Engineering And Software Assurance: Need And Recommendations, T. B. Hilburn, Andrew J. Kornecki Oct 2014

Graduate Curricula In Software Engineering And Software Assurance: Need And Recommendations, T. B. Hilburn, Andrew J. Kornecki

Andrew J. Kornecki

In discussions about the development and use of computer systems and software products, the term “professional software engineer” is used repeatedly. In the last two decades there has been significant effort devoted to enhancing and advancing the state of professional software engineering (SwE) – new software engineering processes, methods, tools, and practices; creation of a software engineering body of knowledge [1]; development of a code of ethics and professional conduct [2], and software certification and licensing programs [3] . In 1989 the Software Engineering Institute (SEI) of Carnegie Mellon University published a landmark report on graduate education in software engineering …


Interpreting, Stephanie Jo Kent Aug 2014

Interpreting, Stephanie Jo Kent

Doctoral Dissertations

What do community interpreting for the Deaf in western societies, conference interpreting for the European Parliament, and language brokering in international management have in common? Academic research and professional training have historically emphasized the linguistic and cognitive challenges of interpreting, neglecting or ignoring the social aspects that structure communication. All forms of interpreting are inherently social; they involve relationships among at least three people and two languages. The contexts explored here, American Sign Language/English interpreting and spoken language interpreting within the European Parliament, show that simultaneous interpreting involves attitudes, norms and values about intercultural communication that overemphasize information and discount …


The Department Of Engineering And Computer Science Class Of 2014 Mechanical Engineering Celebration Program, Cedarville University May 2014

The Department Of Engineering And Computer Science Class Of 2014 Mechanical Engineering Celebration Program, Cedarville University

Engineering and Computer Science Academic Celebrations

No abstract provided.


The Department Of Engineering And Computer Science Class Of 2014 Computer Science And Computer And Electrical Engineering Academic Celebration Program, Cedarville University May 2014

The Department Of Engineering And Computer Science Class Of 2014 Computer Science And Computer And Electrical Engineering Academic Celebration Program, Cedarville University

Engineering and Computer Science Academic Celebrations

No abstract provided.


The Design Of A Mobile, Animatronic Bald Eagle, Eric Burns Apr 2014

The Design Of A Mobile, Animatronic Bald Eagle, Eric Burns

Phi Kappa Phi Research Symposium (2012-2016)

Modern animatronics are used as a tool to help engage audiences in realistic and entertaining experiences. Many animatronic figures are dynamic in movement, but static in mobility. The research presented covers the beginnings of mobile animatronic research. An animatronic bald eagle, Opportunity, was designed for that purpose. Animations for Opportunity are generated by integration of Arduino, Pololu Mini Maestro, and Hitec Servo Motors. Arduino receives signals from flex sensors which cause voltage variations when “flexed”. The 1:1 scale, animatronic eagle can be perched on the arm of an “actor” who simulates an eagle’s caretaker. The flex sensors are located within …


The Future Of National And International Security On The Internet, Maurice Dawson, Marwan Omar, Jonathan Abramson, Dustin Bessette Dec 2013

The Future Of National And International Security On The Internet, Maurice Dawson, Marwan Omar, Jonathan Abramson, Dustin Bessette

Maurice Dawson

Hyperconnectivity is a growing trend that is driving cyber security experts to develop new security architectures for multiple platforms such as mobile devices, laptops, and even wearable displays. The futures of national and international security rely on complex countermeasures to ensure that a proper security posture is maintained during this state of hyperconnectivity. To protect these systems from exploitation of vulnerabilities it is essential to understand current and future threats to include the laws that drive their need to be secured. Examined within this chapter are the potential security-related threats with the use of social media, mobile devices, virtual worlds, …