Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
- Publication
- Publication Type
Articles 1 - 5 of 5
Full-Text Articles in Computer Engineering
Eyes On The Prize: Delivering Archival Content With Synchronized Transcripts In Hydra, Irene Taylor, Shannon Davis
Eyes On The Prize: Delivering Archival Content With Synchronized Transcripts In Hydra, Irene Taylor, Shannon Davis
Central Plains Network for Digital Asset Management
Regarded as the definitive work on the Civil Rights Movement, the documentary series, Eyes on the Prize, has been seen by millions since its PBS debut in 1987. However, what remains unseen is the nearly 85 hours of interview outtakes that provide further insight into the series’ original stories of struggle, resistance, and perseverance. Through the Eyes on the Prize Digitization and Reassembly project, funded by the National Historical Publications and Records Commission, Washington University Libraries has made the complete, never-before-seen interviews and TEI XML encoded, synchronized transcripts freely accessible through its newly developed Hydra digital repository.
This session …
An M-Learning Maturity Model For Universities And Higher Educational Institutes, Luiz Fernando Capretz, Muasaad Alrasheedi, Arif Raza
An M-Learning Maturity Model For Universities And Higher Educational Institutes, Luiz Fernando Capretz, Muasaad Alrasheedi, Arif Raza
Electrical and Computer Engineering Publications
An m-learning maturity model is put forward in this research to assess the mobile technology adoption rates in universities and higher educational institutes. The model is derived from Capability Maturity Model (CMM), which has been widely used in organizations to gauge the adoption of various new processes. Five levels of m-learning maturity are specified including preliminary, established, defined, structured, and continuous improvement. Each of these maturity levels is gauged through nine critical success factors (CSFs) in assessment questionnaires. The CSFs used in measuring instrument of the model are adopted from three of our previous empirical studies. Using an assessment questionnaire …
Cyber Security Training Tools For The Nuclear Energy Sector, Vu A. Pham
Cyber Security Training Tools For The Nuclear Energy Sector, Vu A. Pham
STAR Program Research Presentations
Nowadays, cyber security should be a priority for everyone when they connect their laptop to the internet; however, not many internet users have sufficient knowledge about cyber security. A cyberattack on an individual’s computer could result in the loss of personal information, financial information, or other resources. The damage from a cyberattack on a nuclear facility or other critical infrastructure could have much greater consequences. The attackers could impact the confidentiality of data, the availability of key systems, or the integrity of those safety or operating systems. Therefore, the National Nuclear Security Administration has tasked Pacific Northwest National Laboratory with …
Ipv6 And Ospf Networks Lab, Kevin Jeremy Watson
Ipv6 And Ospf Networks Lab, Kevin Jeremy Watson
Computer Engineering
No abstract provided.
A Unit Design : Learning To Code With Finches, William V. Gruman
A Unit Design : Learning To Code With Finches, William V. Gruman
Graduate Research Papers
The purpose of this project was to develop a coding unit for students in grades 5-8 as an introductory programming course using the programming language SNAP! with a Finch robotics platform. The robotics platform provides a means of student engagement that allows them to complete computer programming challenges that drive interest and motivation. A series of five major learning activities were created as part of a middle school technology exploratory course. The beta testers included the four course instructors and around 30 of middle school student volunteers.
The designed unit was implemented once as a pilot, and was being implemented …