Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Computer Engineering

Eyes On The Prize: Delivering Archival Content With Synchronized Transcripts In Hydra, Irene Taylor, Shannon Davis Nov 2016

Eyes On The Prize: Delivering Archival Content With Synchronized Transcripts In Hydra, Irene Taylor, Shannon Davis

Central Plains Network for Digital Asset Management

Regarded as the definitive work on the Civil Rights Movement, the documentary series, Eyes on the Prize, has been seen by millions since its PBS debut in 1987. However, what remains unseen is the nearly 85 hours of interview outtakes that provide further insight into the series’ original stories of struggle, resistance, and perseverance. Through the Eyes on the Prize Digitization and Reassembly project, funded by the National Historical Publications and Records Commission, Washington University Libraries has made the complete, never-before-seen interviews and TEI XML encoded, synchronized transcripts freely accessible through its newly developed Hydra digital repository.

This session …


An M-Learning Maturity Model For Universities And Higher Educational Institutes, Luiz Fernando Capretz, Muasaad Alrasheedi, Arif Raza Nov 2016

An M-Learning Maturity Model For Universities And Higher Educational Institutes, Luiz Fernando Capretz, Muasaad Alrasheedi, Arif Raza

Electrical and Computer Engineering Publications

An m-learning maturity model is put forward in this research to assess the mobile technology adoption rates in universities and higher educational institutes. The model is derived from Capability Maturity Model (CMM), which has been widely used in organizations to gauge the adoption of various new processes. Five levels of m-learning maturity are specified including preliminary, established, defined, structured, and continuous improvement. Each of these maturity levels is gauged through nine critical success factors (CSFs) in assessment questionnaires. The CSFs used in measuring instrument of the model are adopted from three of our previous empirical studies. Using an assessment questionnaire …


Cyber Security Training Tools For The Nuclear Energy Sector, Vu A. Pham Aug 2016

Cyber Security Training Tools For The Nuclear Energy Sector, Vu A. Pham

STAR Program Research Presentations

Nowadays, cyber security should be a priority for everyone when they connect their laptop to the internet; however, not many internet users have sufficient knowledge about cyber security. A cyberattack on an individual’s computer could result in the loss of personal information, financial information, or other resources. The damage from a cyberattack on a nuclear facility or other critical infrastructure could have much greater consequences. The attackers could impact the confidentiality of data, the availability of key systems, or the integrity of those safety or operating systems. Therefore, the National Nuclear Security Administration has tasked Pacific Northwest National Laboratory with …


Ipv6 And Ospf Networks Lab, Kevin Jeremy Watson Jun 2016

Ipv6 And Ospf Networks Lab, Kevin Jeremy Watson

Computer Engineering

No abstract provided.


A Unit Design : Learning To Code With Finches, William V. Gruman Jan 2016

A Unit Design : Learning To Code With Finches, William V. Gruman

Graduate Research Papers

The purpose of this project was to develop a coding unit for students in grades 5-8 as an introductory programming course using the programming language SNAP! with a Finch robotics platform. The robotics platform provides a means of student engagement that allows them to complete computer programming challenges that drive interest and motivation. A series of five major learning activities were created as part of a middle school technology exploratory course. The beta testers included the four course instructors and around 30 of middle school student volunteers.

The designed unit was implemented once as a pilot, and was being implemented …