Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication
- Publication Type
Articles 1 - 6 of 6
Full-Text Articles in Engineering
Graduate Curricula In Software Engineering And Software Assurance: Need And Recommendations, T. B. Hilburn, Andrew J. Kornecki
Graduate Curricula In Software Engineering And Software Assurance: Need And Recommendations, T. B. Hilburn, Andrew J. Kornecki
Andrew J. Kornecki
In discussions about the development and use of computer systems and software products, the term “professional software engineer” is used repeatedly. In the last two decades there has been significant effort devoted to enhancing and advancing the state of professional software engineering (SwE) – new software engineering processes, methods, tools, and practices; creation of a software engineering body of knowledge [1]; development of a code of ethics and professional conduct [2], and software certification and licensing programs [3] . In 1989 the Software Engineering Institute (SEI) of Carnegie Mellon University published a landmark report on graduate education in software engineering …
Interpreting, Stephanie Jo Kent
Interpreting, Stephanie Jo Kent
Doctoral Dissertations
What do community interpreting for the Deaf in western societies, conference interpreting for the European Parliament, and language brokering in international management have in common? Academic research and professional training have historically emphasized the linguistic and cognitive challenges of interpreting, neglecting or ignoring the social aspects that structure communication. All forms of interpreting are inherently social; they involve relationships among at least three people and two languages. The contexts explored here, American Sign Language/English interpreting and spoken language interpreting within the European Parliament, show that simultaneous interpreting involves attitudes, norms and values about intercultural communication that overemphasize information and discount …
The Department Of Engineering And Computer Science Class Of 2014 Mechanical Engineering Celebration Program, Cedarville University
The Department Of Engineering And Computer Science Class Of 2014 Mechanical Engineering Celebration Program, Cedarville University
Engineering and Computer Science Academic Celebrations
No abstract provided.
The Department Of Engineering And Computer Science Class Of 2014 Computer Science And Computer And Electrical Engineering Academic Celebration Program, Cedarville University
The Department Of Engineering And Computer Science Class Of 2014 Computer Science And Computer And Electrical Engineering Academic Celebration Program, Cedarville University
Engineering and Computer Science Academic Celebrations
No abstract provided.
The Design Of A Mobile, Animatronic Bald Eagle, Eric Burns
The Design Of A Mobile, Animatronic Bald Eagle, Eric Burns
Phi Kappa Phi Research Symposium (2012-2016)
Modern animatronics are used as a tool to help engage audiences in realistic and entertaining experiences. Many animatronic figures are dynamic in movement, but static in mobility. The research presented covers the beginnings of mobile animatronic research. An animatronic bald eagle, Opportunity, was designed for that purpose. Animations for Opportunity are generated by integration of Arduino, Pololu Mini Maestro, and Hitec Servo Motors. Arduino receives signals from flex sensors which cause voltage variations when “flexed”. The 1:1 scale, animatronic eagle can be perched on the arm of an “actor” who simulates an eagle’s caretaker. The flex sensors are located within …
The Future Of National And International Security On The Internet, Maurice Dawson, Marwan Omar, Jonathan Abramson, Dustin Bessette
The Future Of National And International Security On The Internet, Maurice Dawson, Marwan Omar, Jonathan Abramson, Dustin Bessette
Maurice Dawson
Hyperconnectivity is a growing trend that is driving cyber security experts to develop new security architectures for multiple platforms such as mobile devices, laptops, and even wearable displays. The futures of national and international security rely on complex countermeasures to ensure that a proper security posture is maintained during this state of hyperconnectivity. To protect these systems from exploitation of vulnerabilities it is essential to understand current and future threats to include the laws that drive their need to be secured. Examined within this chapter are the potential security-related threats with the use of social media, mobile devices, virtual worlds, …