Science.gov

Sample records for computer networking courses

  1. Student Motivation in Computer Networking Courses

    ERIC Educational Resources Information Center

    Hsin, Wen-Jung

    2007-01-01

    This paper introduces several hands-on projects that have been used to motivate students in learning various computer networking concepts. These projects are shown to be very useful and applicable to the learners' daily tasks and activities such as emailing, Web browsing, and online shopping and banking, and lead to an unexpected byproduct,…

  2. Improving a Computer Networks Course Using the Partov Simulation Engine

    ERIC Educational Resources Information Center

    Momeni, B.; Kharrazi, M.

    2012-01-01

    Computer networks courses are hard to teach as there are many details in the protocols and techniques involved that are difficult to grasp. Employing programming assignments as part of the course helps students to obtain a better understanding and gain further insight into the theoretical lectures. In this paper, the Partov simulation engine and…

  3. Networking: A Necessary Component in a Computer-Literacy Course.

    ERIC Educational Resources Information Center

    Norales, Francisca O.

    1993-01-01

    Discusses factors to be considered when planning and implementing a local area network (LAN) for personal computers within a school or an organization. Topics addressed include reasons for networking, characteristics of LANs, organizing a LAN, workstations, disk servers, and file servers. (Contains six references.) (LRW)

  4. Innovation of laboratory exercises in course Distributed systems and computer networks

    NASA Astrophysics Data System (ADS)

    Souček, Pavel; Slavata, Oldřich; Holub, Jan

    2013-09-01

    This paper is focused on innovation of laboratory exercises in course Distributed Systems and Computer Networks. These exercises were introduced in November of 2012 and replaced older exercises in order to reflect real life applications.

  5. Software Assisted Syllabus Preparation for Computer Networks Courses

    ERIC Educational Resources Information Center

    Ercan, Tuncay; Sahin, Yasar Guneri

    2007-01-01

    Course descriptions prepared by the lecturers in the beginning of the academic year do not get any feed back from the students enrolled it. These syllabuses are not only used for the future semesters, but also used by the other lecturers without even making any changes. This causes a negative effect on the student education since many of the…

  6. Designing a Versatile Dedicated Computing Lab to Support Computer Network Courses: Insights from a Case Study

    ERIC Educational Resources Information Center

    Gercek, Gokhan; Saleem, Naveed

    2006-01-01

    Providing adequate computing lab support for Management Information Systems (MIS) and Computer Science (CS) programs is a perennial challenge for most academic institutions in the US and abroad. Factors, such as lack of physical space, budgetary constraints, conflicting needs of different courses, and rapid obsolescence of computing technology,…

  7. Motivating students' participation in a computer networks course by means of magic, drama and games.

    PubMed

    Hilas, Constantinos S; Politis, Anastasios

    2014-01-01

    The recent economic crisis has forced many universities to cut down expenses by packing students into large lecture groups. The problem with large auditoria is that they discourage dialogue between students and faculty and they burden participation. Adding to this, students in computer science courses usually find the field to be full of theoretical and technical concepts. Lack of understanding leads them to lose interest and / or motivation. Classroom experience shows that the lecturer could employ alternative teaching methods, especially for early-year undergraduate students, in order to grasp their interest and introduce basic concepts. This paper describes some of the approaches that may be used to keep students interested and make them feel comfortable as they comprehend basic concepts in computer networks. The lecturing procedure was enriched with games, magic tricks and dramatic representations. This approach was used experimentally for two semesters and the results were more than encouraging. PMID:25105085

  8. A Case Study of an FSL Senior Secondary Course Integrating Computer Networking.

    ERIC Educational Resources Information Center

    Sanaoui, Razika; Lapkin, Sharon

    1992-01-01

    Acknowledging that students learning a second language need opportunities for extended spoken and written interactions with native speakers, this paper describes instructional computer networking that links grade 12 Anglophone students of French in Toronto with native French-speaking peers in Montreal. Focus is on writing skills. (25 references)…

  9. Computer ethics: A capstone course

    SciTech Connect

    Fisher, T.G.; Abunawass, A.M.

    1994-12-31

    This paper presents a capstone course on computer ethics required for all computer science majors in our program. The course was designed to encourage students to evaluate their own personal value systems in terms of the established values in computer science as represented by the ACM Code of Ethics. The structure, activities, and topics of the course as well as assessment of the students are presented. Observations on various course components and student evaluations of the course are also presented.

  10. Introduction to Computing Course Guide.

    ERIC Educational Resources Information Center

    Hawaii State Dept. of Education, Honolulu. Office of Instructional Services.

    Developed to aid intermediate-level teachers and principals in initiating and developing computer literacy programs for their students, this document is a guide for the development of a one-semester course--Introduction to Computing--for the seventh and eighth grades. The course is designed to provide opportunities for students to develop computer…

  11. A Model Computer Literacy Course.

    ERIC Educational Resources Information Center

    Orndorff, Joseph

    Designed to address the varied computer skill levels of college students, this proposed computer literacy course would be modular in format, with modules tailored to address various levels of expertise and permit individualized instruction. An introductory module would present both the history and future of computers and computing, followed by an…

  12. Resources for Computational Geophysics Courses

    NASA Astrophysics Data System (ADS)

    Keers, Henk; Rondenay, Stéphane; Harlap, Yaël.; Nordmo, Ivar

    2014-09-01

    An important skill that students in solid Earth physics need to acquire is the ability to write computer programs that can be used for the processing, analysis, and modeling of geophysical data and phenomena. Therefore, this skill (which we call "computational geophysics") is a core part of any undergraduate geophysics curriculum. In this Forum, we share our personal experience in teaching such a course.

  13. Personal Computer Networks.

    ERIC Educational Resources Information Center

    Barkley, John

    This report develops a model of a personal computer network for office use from the standpoint of the end user. A network designed for personal computers is differentiated from personal computers which must be attached to an existing communications system. Three types of the latter networks are discussed: (1) networks which connect personal…

  14. Conception of a course for professional training and education in the field of computer and mobile forensics, part III: network forensics and penetration testing

    NASA Astrophysics Data System (ADS)

    Kröger, Knut; Creutzburg, Reiner

    2014-02-01

    IT security and computer forensics are important components in the information technology. From year to year, incidents and crimes increase that target IT systems or were done with their help. More and more companies and authorities have security problems in their own IT infrastructure. To respond to these incidents professionally, it is important to have well trained staff. The fact that many agencies and companies work with very sensitive data make it necessary to further train the own employees in the field of network forensics and penetration testing. Motivated by these facts, this paper - a continuation of a paper of January 2012 [1], which showed the conception of a course for professional training and education in the field of computer and mobile forensics - addresses the practical implementation important relationships of network forensic and penetration testing.

  15. Computer Networking for Educators.

    ERIC Educational Resources Information Center

    McCain, Ted D. E.; Ekelund, Mark

    This book is intended to introduce the basic concepts of connecting computers together and to equip individuals with the technical background necessary to begin constructing small networks. For those already experienced with creating and maintaining computer networks, the book can help in considering the creation of a schoolwide network. The book…

  16. Computer Literacy: Course Description [and] Computer Awareness: Module Syllabus.

    ERIC Educational Resources Information Center

    Kirkwood Community Coll., Cedar Rapids, IA.

    This course description outlines an independent-study computer awareness course for community college faculty that uses videotapes, computer-assisted instruction, and individual study modules. The outline includes the rationale for the course and the media to be used; time required to complete the course; the goals of the course; the topics…

  17. A Position on a Computer Literacy Course.

    ERIC Educational Resources Information Center

    Self, Charles C.

    A position is put forth on the appropriate content of a computer literacy course and the role of computer literacy in the community college. First, various definitions of computer literacy are examined, including the programming, computer awareness, and comprehensive approaches. Next, five essential components of a computer literacy course are…

  18. K-12 Computer Networking.

    ERIC Educational Resources Information Center

    ERIC Review, 1993

    1993-01-01

    The "ERIC Review" is published three times a year and announces research results, publications, and new programs relevant to each issue's theme topic. This issue explores computer networking in elementary and secondary schools via two principal articles: "Plugging into the 'Net'" (Michael B. Eisenberg and Donald P. Ely); and "Computer Networks for…

  19. Hyperswitch Communication Network Computer

    NASA Technical Reports Server (NTRS)

    Peterson, John C.; Chow, Edward T.; Priel, Moshe; Upchurch, Edwin T.

    1993-01-01

    Hyperswitch Communications Network (HCN) computer is prototype multiple-processor computer being developed. Incorporates improved version of hyperswitch communication network described in "Hyperswitch Network For Hypercube Computer" (NPO-16905). Designed to support high-level software and expansion of itself. HCN computer is message-passing, multiple-instruction/multiple-data computer offering significant advantages over older single-processor and bus-based multiple-processor computers, with respect to price/performance ratio, reliability, availability, and manufacturing. Design of HCN operating-system software provides flexible computing environment accommodating both parallel and distributed processing. Also achieves balance among following competing factors; performance in processing and communications, ease of use, and tolerance of (and recovery from) faults.

  20. Computer networking at FERMILAB

    SciTech Connect

    Chartrand, G.

    1986-05-01

    Management aspects of data communications facilities at Fermilab are described. Local area networks include Ferminet, a broadband CATV system which serves as a backbone-type carrier for high-speed data traffic between major network nodes; micom network, four Micom Micro-600/2A port selectors via private twisted pair cables, dedicated telephone circuits, or Micom 800/2 statistical multiplexors; and Decnet/Ethernet, several small local area networks which provide host-to-host communications for about 35 VAX computers systems. Wide area (off site) computer networking includes an off site Micom network which provides access to all of Fermilab's computer systems for 10 universities via leased lines or modem; Tymnet, used by many European and Japanese collaborations: Physnet, used for shared data processing task communications by large collaborations of universities; Bitnet, used for file transfer, electronic mail, and communications with CERN; and Mfenet, for access to supercomputers. Plans to participate in Hepnet are also addressed. 3 figs. (DWL)

  1. Computers, Networks and Education.

    ERIC Educational Resources Information Center

    Kay, Alan C.

    1991-01-01

    Discussed is how globally networked, easy-to-use computers can enhance learning only within an educational environment that encourages students to question "facts" and seek challenges. The strengths and weaknesses of computers used as amplifiers for learning are described. (KR)

  2. Teaching Computer Science Courses in Distance Learning

    ERIC Educational Resources Information Center

    Huan, Xiaoli; Shehane, Ronald; Ali, Adel

    2011-01-01

    As the success of distance learning (DL) has driven universities to increase the courses offered online, certain challenges arise when teaching computer science (CS) courses to students who are not physically co-located and have individual learning schedules. Teaching CS courses involves high level demonstrations and interactivity between the…

  3. Computer Network Interconnection: Problems and Prospects. Computer Science & Technology Series.

    ERIC Educational Resources Information Center

    Cotton, Ira W.

    This report examines the current situation regarding the interconnection of computer networks, especially packet switched networks (PSNs). The emphasis is on idntifying the barriers to interconnection and on surveying approaches to a solution, rather than recommending any single course of action. Sufficient organizational and technical background…

  4. Educational Computing Course. [SITE 2001 Section].

    ERIC Educational Resources Information Center

    Bump, Wren, Ed.

    This document contains the following papers on the educational computing course from the SITE (Society for Information Technology & Teacher Education) 2001 conference: "Using a Flexible Format To Create a Constructivist Learning Environment in the Educational Computing Course" (Wren M. Bump); "Technological Diversity: Managing Differing Technology…

  5. Computing in College Courses: The Dartmouth Experience.

    ERIC Educational Resources Information Center

    Cohen, Peter A.

    In order to assess faculty and student use of, and attitudes toward, instructional computing at Dartmouth College, faculty members and students were surveyed during the spring of 1981 to determine how computing was being used in Dartmouth courses. Each of the 450 faculty members who taught an on-campus course from summer 1980 through spring 1981…

  6. Gateways among Academic Computer Networks.

    ERIC Educational Resources Information Center

    McCredie, John W.

    National intercampus computer networks are discussed, along with six illustrative networks. Attention is focused on computer networks with significant academic usage through which special software is available to manage resources in the network. It is noted that computer networks have widespread use among academics for communication in the form of…

  7. Computer Network Resources for Physical Geography Instruction.

    ERIC Educational Resources Information Center

    Bishop, Michael P.; And Others

    1993-01-01

    Asserts that the use of computer networks provides an important and effective resource for geography instruction. Describes the use of the Internet network in physical geography instruction. Provides an example of the use of Internet resources in a climatology/meteorology course. (CFR)

  8. Computer network programming

    SciTech Connect

    Hsu, J.Y.

    1996-12-31

    The programs running on a computer network can be divided into two parts, the Network Operating System and the user applications. Any high level language translator, such as C, JAVA, BASIC, FORTRAN, or COBOL, runs under NOS as a programming tool to produce network application programs or software. Each application program while running on the network provides the human user with network application services, such as remote data base search, retrieval, etc. The Network Operating System should provide a simple and elegant system interface to all the network application programs. This programming interface may request the Transport layer services on behalf of a network application program. The primary goals are to achieve programming convenience, and to avoid complexity. In a 5-layer network model, the system interface is comprised of a group of system calls which are collectively known as the session layer with its own Session Protocol Data Units. This is a position paper discussing the basic system primitives which reside between a network application program and the Transport layer, and a programming example of using such primitives.

  9. A course in Computational Physics

    NASA Astrophysics Data System (ADS)

    Rawitscher, George

    2011-03-01

    This course, taught at UConn, has several objectives: 1) To make the students comfortable in using MATLAB; 2) To reveal the existence of unavoidable inaccuracies due to numerical roundoff errors and algorithm inaccuracies; 3) to introduce modern spectral expansion methods, and compare them with conventional finite difference methods. Some of the projects assigned in the course will be described, such as the motion of a falling parachute, and the vibrations of an inhomogeneous vibrating string.

  10. Computer and information networks.

    PubMed

    Greenberger, M; Aronofsky, J; McKenney, J L; Massy, W F

    1973-10-01

    The most basic conclusion coming out of the EDUCOM seminars is that computer networking must be acknowledged as an important new mode for obtaining information and computation (15). It is a real alternative that needs to be given serious attention in current planning and decision-making. Yet the fact is that many institutions are not taking account of networks when they confer on whether or how to replace their main computer. Articulation of the possibilities of computer networks goes back to the early 1960's and before, and working networks have been in evidence for several years now, both commercially and in universities. What is new, however, is the unmistakable recognition-bordering on a sense of the inevitable-that networks are finally practical and here to stay. The visionary and promotional phases of computer networks are over. It is time for hard-nosed comparative analysis (16). Another conclusion of the seminars has to do with the factors that hinder the fuller development of networking. The major problems to be overcome in applying networks to research and education are political, organizational, and economic in nature rather than technological. This is not to say that the hardware and software problems of linking computers and information systems are completely solved, but they are not the big bottlenecks at present. Research and educational institutions must find ways to organize themselves as well as their computers to work together for greater resource sharing. The coming of age of networks takes on special significance as a result of widespread dissatisfactions expressed with the present computing situation. There is a feeling that the current mode of autonomous, self-sufficient operation in the provision of computing and information services is frequently wasteful, deficient, and unresponsive to users' needs because of duplication of effort from one installation to another, incompatibilities, and inadequate documentation, program support, and user

  11. The Educational Computing Course. [SITE 2002 Section].

    ERIC Educational Resources Information Center

    Bump, Wren, Ed.

    This document contains the following papers on the educational computing course from the SITE (Society for Information Technology & Teacher Education) 2002 conference: (1) "Integrating Media Literacy into a Technology Course for Preservice Secondary Teachers" (Gregg Brownell and Nancy Brownell); (2) "From Video Tutors to Electronic Portfolios:…

  12. Rethink Required Courses in Computer Programming.

    ERIC Educational Resources Information Center

    Texley, Juliana

    1988-01-01

    The educational value of courses in computer programing must be judged by sound curriculum criteria: they should fit a logical sequence of K-12 learning objectives, expose students to future career opportunities, and teach students reasoning skills. (TE)

  13. Computation in gene networks

    NASA Astrophysics Data System (ADS)

    Ben-Hur, Asa; Siegelmann, Hava T.

    2004-03-01

    Genetic regulatory networks have the complex task of controlling all aspects of life. Using a model of gene expression by piecewise linear differential equations we show that this process can be considered as a process of computation. This is demonstrated by showing that this model can simulate memory bounded Turing machines. The simulation is robust with respect to perturbations of the system, an important property for both analog computers and biological systems. Robustness is achieved using a condition that ensures that the model equations, that are generally chaotic, follow a predictable dynamics.

  14. Effectiveness of Simulation in a Hybrid and Online Networking Course.

    ERIC Educational Resources Information Center

    Cameron, Brian H.

    2003-01-01

    Reports on a study that compares the performance of students enrolled in two sections of a Web-based computer networking course: one utilizing a simulation package and the second utilizing a static, graphical software package. Analysis shows statistically significant improvements in performance in the simulation group compared to the…

  15. Closeness Possible through Computer Networking.

    ERIC Educational Resources Information Center

    Dodd, Julie E.

    1989-01-01

    Points out the benefits of computer networking for scholastic journalism. Discusses three systems currently offering networking possibilities for publications: the Student Press Information Network; the Youth Communication Service; and the Dow Jones Newspaper Fund's electronic mail system. (MS)

  16. Computer Programming in a Spatial Analysis Course.

    ERIC Educational Resources Information Center

    Gesler, Wilbert; Kaplan, Abram

    1993-01-01

    Contends that students in spatial analysis courses generally are familiar with computer use and programs but lack basic computer programing skills. Describes four exercises in which students learn programing using BASIC and dBASE. Asserts that programming exercises help students clarify concepts, understand the rationale behind calculations, use…

  17. Computer Maintenance Technology. Suggested Basic Course Outline.

    ERIC Educational Resources Information Center

    Texas A and M Univ., College Station. Vocational Instructional Services.

    This competency-based basic course outline is designed for a two-year secondary program in computer maintenance technology. The first year is devoted to basic electricity and electronics, the second to the troubleshooting, maintenance, and service of microcomputers. (The repair section is based upon the Apple II computer, disc drive, monitor, and…

  18. Survey: Computer Usage in Design Courses.

    ERIC Educational Resources Information Center

    Henley, Ernest J.

    1983-01-01

    Presents results of a survey of chemical engineering departments regarding computer usage in senior design courses. Results are categorized according to: computer usage (use of process simulators, student-written programs, faculty-written or "canned" programs; costs (hard and soft money); and available software. Programs offered are listed in a…

  19. Network Coding for Function Computation

    ERIC Educational Resources Information Center

    Appuswamy, Rathinakumar

    2011-01-01

    In this dissertation, the following "network computing problem" is considered. Source nodes in a directed acyclic network generate independent messages and a single receiver node computes a target function f of the messages. The objective is to maximize the average number of times f can be computed per network usage, i.e., the "computing…

  20. Plagiarism in computer science courses

    SciTech Connect

    Harris, J.K.

    1994-12-31

    Plagiarism of computer programs has long been a problem in higher education. Ease of electronic copying, vague understanding by students as to what constitutes plagiarism, increasing acceptance of plagiarism by students, lack of enforcement by instructors and school administrators, and a whole host of other factors contribute to plagiarism. The first step in curbing plagiarism is prevention, the second (and much less preferable) is detection. History files and software metrics can be used as a tool to aid in detecting possible plagiarism. This paper gives advice concerning how to deal with plagiarism and with using software monitors to detect plagiarism.

  1. Computing in the Introductory Physics Course

    NASA Astrophysics Data System (ADS)

    Chabay, Ruth; Sherwood, Bruce

    2004-03-01

    In the Matter & Interactions version of the calculus-based introductory physics course (http://www4.ncsu.edu/ ˜rwchabay/mi) , students write programs in VPython (http://vpython.org) to model physical systems and to calculate and visualize electric and magnetic fields. VPython is unusually easy to learn, produces navigable 3D animations as a side effect of physics computations, and supports full vector calculations. The high speed of current computers makes sophisticated numerical analysis techniques unnecessary. Students can use simple first-order Euler integration, cutting the step size until the behavior of the system no longer changes. In mechanics, iterative application of the momentum principle gives students a sense of the time-evolution character of Newton's second law which is usually missing from the standard course. In E, students calculate electric and magnetic fields numerically and display them in 3D. We are currently studying the impact of introducing computational physics into the introductory course.

  2. A social implications of computing course which teaches computer ethics

    SciTech Connect

    Pulliam, S.C.

    1994-12-31

    Computers are integral to today`s world, forming our society as well as responding to it, In recognition of this interaction, as well as in response to requirements by the Computer Science Accrediting Board (CSAB), many schools are incorporating computer ethics and values and addressing the social implications of computing within their curriculum. The approach discussed here is through a separate course, rather than relying on the integration of specific topics throughout the curriculum.

  3. A Survey of Computer Science Capstone Course Literature

    ERIC Educational Resources Information Center

    Dugan, Robert F., Jr.

    2011-01-01

    In this article, we surveyed literature related to undergraduate computer science capstone courses. The survey was organized around course and project issues. Course issues included: course models, learning theories, course goals, course topics, student evaluation, and course evaluation. Project issues included: software process models, software…

  4. Computer Networks and Networking: A Primer.

    ERIC Educational Resources Information Center

    Collins, Mauri P.

    1993-01-01

    Provides a basic introduction to computer networks and networking terminology. Topics addressed include modems; the Internet; TCP/IP (Transmission Control Protocol/Internet Protocol); transmission lines; Internet Protocol numbers; network traffic; Fidonet; file transfer protocol (FTP); TELNET; electronic mail; discussion groups; LISTSERV; USENET;…

  5. Course Goals in Computer Education, K-12.

    ERIC Educational Resources Information Center

    Allenbrand, Bob, Ed.; And Others

    Designed to be used in conjunction with a school district's educational goals and focusing on what is to be learned rather than the methodology to be used, the program and course goals presented here are intended as guidelines for planning and evaluating elementary and secondary school curricula in computer education. Of four possible levels of…

  6. Augmenting computer networks

    NASA Technical Reports Server (NTRS)

    Bokhari, S. H.; Raza, A. D.

    1984-01-01

    Three methods of augmenting computer networks by adding at most one link per processor are discussed: (1) A tree of N nodes may be augmented such that the resulting graph has diameter no greater than 4log sub 2((N+2)/3)-2. Thi O(N(3)) algorithm can be applied to any spanning tree of a connected graph to reduce the diameter of that graph to O(log N); (2) Given a binary tree T and a chain C of N nodes each, C may be augmented to produce C so that T is a subgraph of C. This algorithm is O(N) and may be used to produce augmented chains or rings that have diameter no greater than 2log sub 2((N+2)/3) and are planar; (3) Any rectangular two-dimensional 4 (8) nearest neighbor array of size N = 2(k) may be augmented so that it can emulate a single step shuffle-exchange network of size N/2 in 3(t) time steps.

  7. A survey of computer science capstone course literature

    NASA Astrophysics Data System (ADS)

    Dugan, Robert F., Jr.

    2011-09-01

    In this article, we surveyed literature related to undergraduate computer science capstone courses. The survey was organized around course and project issues. Course issues included: course models, learning theories, course goals, course topics, student evaluation, and course evaluation. Project issues included: software process models, software process phases, project type, documentation, tools, groups, and instructor administration. We reflected on these issues and thecomputer science capstone course we have taught for seven years. The survey summarized, organized, and synthesized the literature to provide a referenced resource for computer science instructors and researchers interested in computer science capstone courses.

  8. Measurement of Computer Communication Networks.

    ERIC Educational Resources Information Center

    Abrams, Marshall D.; And Others

    Measures, tools, and techniques applicable to the performance measurement of computer communication networks are described for technicians who procure computer services from a remote access network. Cost considerations are discussed as a major component of evaluation, and measurement and evaluation methodologies are surveyed. External measurement…

  9. Sharing Writing through Computer Networking.

    ERIC Educational Resources Information Center

    Fey, Marion H.

    1997-01-01

    Suggests computer networking can support the essential purposes of the collaborative-writing movement, offering opportunities for sharing writing. Notes that literacy teachers are exploring the connectivity of computer networking through numerous designs that use either real-time or asynchronous communication. Discusses new roles for students and…

  10. A Computer-based Course in Classical Mechanics.

    ERIC Educational Resources Information Center

    Kane, D.; Sherwood, B.

    1980-01-01

    Describes and illustrates the tutorial and homework exercise lessons, student routing, course organization, administration, and evaluation of a PLATO computer-based course in classical mechanics. An appendix lists 41 lessons developed for the course. (CMV)

  11. Queueing in networks of computers

    NASA Technical Reports Server (NTRS)

    Denning, Peter J.

    1991-01-01

    The designers of networks of computers must assess the capacity of the network to complete work within reasonable times. The utilization law, Little's law, forced-flow law, and response time formula are simple tools that can be used to calculate throughput and response times of networks. Bottleneck analysis can be used to calculate simple lower bounds on response time in terms of individual server parameters and the load on network as a whole. These simple results are important tools for all users of scientific networks - back of the envelope calculations can quickly reveal the effects of distant servers on local throughput and response time.

  12. Using Computers in Introductory Astronomy Courses

    NASA Astrophysics Data System (ADS)

    Deming, Grace L.

    1995-12-01

    Computer literacy is fast becoming a focal point in undergraduate education. Scientific literacy has been a continuing goal of undergraduate programs across the nation and a course in introductory astronomy is often used to satisfy such science requirements. At U. MD an introduction to computer skills is being integrated into our astronomy curriculum for non-science majors. The campus is adequately equipped with computer labs, yet many students enter college without basic computer skills. In Astronomy 101 (General Astronomy) students are introduced to electronic mail, a Listserver, and the world wide web. Students in this course are required to register for a free campus computer account. Their first assignment is to use e-mail to subscribe to the class Listserver, Milkyway. Through Milkyway, students have access to weekly lecture summaries, questions to review for exams, and copies of previous exams. Using e-mail students may pose questions, provide comments, or exchange opinions using Milkyway, or they may e-mail the instructor directly. Studies indicate that using e-mail is less intimidating to a student than asking a question in a class of 200 students. Monitoring e-mail for student questions has not been a problem. Student reaction has been favorable to using e-mail, since instructor office hours are not always convenient, especially to commuting or working students. Through required assignments, students receive an introduction to accessing information on the world wide web using Netscape. Astronomy has great resources available on the Internet which can be used to supplement and reinforce introductory material. Assignments are structured so that students will gain the techniques necessary to access available information. It is hoped that students will successfully apply the computer skills they learn in astronomy class to their own fields and as life-long learners. We have found that students comfortable with computers are willing to share their knowledge

  13. Computer (PC/Network) Coordinator.

    ERIC Educational Resources Information Center

    Ohio State Univ., Columbus. Center on Education and Training for Employment.

    This publication contains 22 subjects appropriate for use in a competency list for the occupation of computer (PC/network) coordinator, 1 of 12 occupations within the business/computer technologies cluster. Each unit consists of a number of competencies; a list of competency builders is provided for each competency. Titles of the 22 units are as…

  14. A CAD (Classroom Assessment Design) of a Computer Programming Course

    ERIC Educational Resources Information Center

    Hawi, Nazir S.

    2012-01-01

    This paper presents a CAD (classroom assessment design) of an entry-level undergraduate computer programming course "Computer Programming I". CAD has been the product of a long experience in teaching computer programming courses including teaching "Computer Programming I" 22 times. Each semester, CAD is evaluated and modified for the subsequent…

  15. LINCS: Livermore's network architecture. [Octopus computing network

    SciTech Connect

    Fletcher, J.G.

    1982-01-01

    Octopus, a local computing network that has been evolving at the Lawrence Livermore National Laboratory for over fifteen years, is currently undergoing a major revision. The primary purpose of the revision is to consolidate and redefine the variety of conventions and formats, which have grown up over the years, into a single standard family of protocols, the Livermore Interactive Network Communication Standard (LINCS). This standard treats the entire network as a single distributed operating system such that access to a computing resource is obtained in a single way, whether that resource is local (on the same computer as the accessing process) or remote (on another computer). LINCS encompasses not only communication but also such issues as the relationship of customer to server processes and the structure, naming, and protection of resources. The discussion includes: an overview of the Livermore user community and computing hardware, the functions and structure of each of the seven layers of LINCS protocol, the reasons why we have designed our own protocols and why we are dissatisfied by the directions that current protocol standards are taking.

  16. Computer Business Applications II. Course Two. Information Systems Curriculum.

    ERIC Educational Resources Information Center

    O'Neil, Sharon Lund; Everett, Donna R.

    This course is the second of seven in the Information Systems curriculum. The purpose of the course is to build on the skills acquired in the prerequisite course, Computer Business Applications I, through the manipulation of word processing, spreadsheet, database management, and graphics software. An overview of the course sets forth the condition…

  17. Software Tools: A One-Semester Secondary School Computer Course.

    ERIC Educational Resources Information Center

    Bromley, John; Lakatos, John

    1985-01-01

    Provides a course outline, describes equipment and teacher requirements, discusses student evaluation and course outcomes, and details the computer programs used in a high school course. The course is designed to teach students use of the microcomputer as a tool through hands-on experience with a variety of commercial software programs. (MBR)

  18. Computer Design in an Introductory Course--Part II.

    ERIC Educational Resources Information Center

    Spoerri, Peter

    1990-01-01

    Describes the use of a logic circuit simulator to design a computer in an introductory computer course. Discusses the design of a sequence generator, control circuits, and testing of a computer's instruction set. (YP)

  19. Computer networking for scientists.

    PubMed

    Jennings, D M; Landweber, L H; Fuchs, I H; Farber, D J; Adrion, W R

    1986-02-28

    Scientific research has always relied on communication for gathering and providing access to data; for exchanging information; for holding discussions, meetings, and seminars; for collaborating with widely dispersed researchers; and for disseminating results. The pace and complexity of modern research, especially collaborations of researchers in different institutions, has dramatically increased scientists' communications needs. Scientists now need immediate access to data and information, to colleagues and collaborators, and to advanced computing and information services. Furthermore, to be really useful, communication facilities must be integrated with the scientist's normal day-to-day working environment. Scientists depend on computing and communications tools and are handicapped without them. PMID:17740290

  20. Computer Network Security- The Challenges of Securing a Computer Network

    NASA Technical Reports Server (NTRS)

    Scotti, Vincent, Jr.

    2011-01-01

    This article is intended to give the reader an overall perspective on what it takes to design, implement, enforce and secure a computer network in the federal and corporate world to insure the confidentiality, integrity and availability of information. While we will be giving you an overview of network design and security, this article will concentrate on the technology and human factors of securing a network and the challenges faced by those doing so. It will cover the large number of policies and the limits of technology and physical efforts to enforce such policies.

  1. Combining Cloud Networks and Course Management Systems for Enhanced Analysis in Teaching Laboratories

    ERIC Educational Resources Information Center

    Abrams, Neal M.

    2012-01-01

    A cloud network system is combined with standard computing applications and a course management system to provide a robust method for sharing data among students. This system provides a unique method to improve data analysis by easily increasing the amount of sampled data available for analysis. The data can be shared within one course as well as…

  2. Using Virtualization and Automatic Evaluation: Adapting Network Services Management Courses to the EHEA

    ERIC Educational Resources Information Center

    Ros, S.; Robles-Gomez, A.; Hernandez, R.; Caminero, A. C.; Pastor, R.

    2012-01-01

    This paper outlines the adaptation of a course on the management of network services in operating systems, called NetServicesOS, to the context of the new European Higher Education Area (EHEA). NetServicesOS is a mandatory course in one of the official graduate programs in the Faculty of Computer Science at the Universidad Nacional de Educacion a…

  3. Optical computer switching network

    NASA Technical Reports Server (NTRS)

    Clymer, B.; Collins, S. A., Jr.

    1985-01-01

    The design for an optical switching system for minicomputers that uses an optical spatial light modulator such as a Hughes liquid crystal light valve is presented. The switching system is designed to connect 80 minicomputers coupled to the switching system by optical fibers. The system has two major parts: the connection system that connects the data lines by which the computers communicate via a two-dimensional optical matrix array and the control system that controls which computers are connected. The basic system, the matrix-based connecting system, and some of the optical components to be used are described. Finally, the details of the control system are given and illustrated with a discussion of timing.

  4. Computers and Problem Solving: An Independent Study Course.

    ERIC Educational Resources Information Center

    Moursund, David

    The first chapter of this text for an independent study course on computers and problem solving provides an overview of computers in education which focuses on the three main instructional uses of computers in schools--learning about computers, the computer-as-tool, and computer-assisted instruction. Using a workshop format, chapter 2 discusses…

  5. Hyperswitch Network For Hypercube Computer

    NASA Technical Reports Server (NTRS)

    Chow, Edward; Madan, Herbert; Peterson, John

    1989-01-01

    Data-driven dynamic switching enables high speed data transfer. Proposed hyperswitch network based on mixed static and dynamic topologies. Routing header modified in response to congestion or faults encountered as path established. Static topology meets requirement if nodes have switching elements that perform necessary routing header revisions dynamically. Hypercube topology now being implemented with switching element in each computer node aimed at designing very-richly-interconnected multicomputer system. Interconnection network connects great number of small computer nodes, using fixed hypercube topology, characterized by point-to-point links between nodes.

  6. Computational acceleration using neural networks

    NASA Astrophysics Data System (ADS)

    Cadaret, Paul

    2008-04-01

    The author's recent participation in the Small Business Innovative Research (SBIR) program has resulted in the development of a patent pending technology that enables the construction of very large and fast artificial neural networks. Through the use of UNICON's CogniMax pattern recognition technology we believe that systems can be constructed that exploit the power of "exhaustive learning" for the benefit of certain types of complex and slow computational problems. This paper presents a theoretical study that describes one potentially beneficial application of exhaustive learning. It describes how a very large and fast Radial Basis Function (RBF) artificial Neural Network (NN) can be used to implement a useful computational system. Viewed another way, it presents an unusual method of transforming a complex, always-precise, and slow computational problem into a fuzzy pattern recognition problem where other methods are available to effectively improve computational performance. The method described recognizes that the need for computational precision in a problem domain sometimes varies throughout the domain's Feature Space (FS) and high precision may only be needed in limited areas. These observations can then be exploited to the benefit of overall computational performance. Addressing computational reliability, we describe how existing always-precise computational methods can be used to reliably train the NN to perform the computational interpolation function. The author recognizes that the method described is not applicable to every situation, but over the last 8 months we have been surprised at how often this method can be applied to enable interesting and effective solutions.

  7. Computing motion using resistive networks

    NASA Technical Reports Server (NTRS)

    Koch, Christof; Luo, Jin; Mead, Carver; Hutchinson, James

    1988-01-01

    Recent developments in the theory of early vision are described which lead from the formulation of the motion problem as an ill-posed one to its solution by minimizing certain 'cost' functions. These cost or energy functions can be mapped onto simple analog and digital resistive networks. It is shown how the optical flow can be computed by injecting currents into resistive networks and recording the resulting stationary voltage distribution at each node. These networks can be implemented in cMOS VLSI circuits and represent plausible candidates for biological vision systems.

  8. Networking DEC and IBM computers

    NASA Technical Reports Server (NTRS)

    Mish, W. H.

    1983-01-01

    Local Area Networking of DEC and IBM computers within the structure of the ISO-OSI Seven Layer Reference Model at a raw signaling speed of 1 Mops or greater are discussed. After an introduction to the ISO-OSI Reference Model nd the IEEE-802 Draft Standard for Local Area Networks (LANs), there follows a detailed discussion and comparison of the products available from a variety of manufactures to perform this networking task. A summary of these products is presented in a table.

  9. Collective network for computer structures

    DOEpatents

    Blumrich, Matthias A.; Coteus, Paul W.; Chen, Dong; Gara, Alan; Giampapa, Mark E.; Heidelberger, Philip; Hoenicke, Dirk; Takken, Todd E.; Steinmacher-Burow, Burkhard D.; Vranas, Pavlos M.

    2011-08-16

    A system and method for enabling high-speed, low-latency global collective communications among interconnected processing nodes. The global collective network optimally enables collective reduction operations to be performed during parallel algorithm operations executing in a computer structure having a plurality of the interconnected processing nodes. Router devices ate included that interconnect the nodes of the network via links to facilitate performance of low-latency global processing operations at nodes of the virtual network and class structures. The global collective network may be configured to provide global barrier and interrupt functionality in asynchronous or synchronized manner. When implemented in a massively-parallel supercomputing structure, the global collective network is physically and logically partitionable according to needs of a processing algorithm.

  10. Collective network for computer structures

    DOEpatents

    Blumrich, Matthias A; Coteus, Paul W; Chen, Dong; Gara, Alan; Giampapa, Mark E; Heidelberger, Philip; Hoenicke, Dirk; Takken, Todd E; Steinmacher-Burow, Burkhard D; Vranas, Pavlos M

    2014-01-07

    A system and method for enabling high-speed, low-latency global collective communications among interconnected processing nodes. The global collective network optimally enables collective reduction operations to be performed during parallel algorithm operations executing in a computer structure having a plurality of the interconnected processing nodes. Router devices are included that interconnect the nodes of the network via links to facilitate performance of low-latency global processing operations at nodes of the virtual network. The global collective network may be configured to provide global barrier and interrupt functionality in asynchronous or synchronized manner. When implemented in a massively-parallel supercomputing structure, the global collective network is physically and logically partitionable according to the needs of a processing algorithm.

  11. Using Computer Networking for Feedback.

    ERIC Educational Resources Information Center

    Woodward, John; And Others

    1987-01-01

    Two studies involving 27 learning-disabled middle-school students and 30 mildly handicapped junior high students investigated use of Teacher Net, a computer networking system that facilitates immediate feedback. Teacher Net reduced the teachers' administrative workload, effectively monitored student understanding, provided feedback to teachers,…

  12. Positive Change through Computer Networking.

    ERIC Educational Resources Information Center

    Robertson, Gladene; And Others

    1997-01-01

    Explores the role of computer technology in facilitating communication and problem solving among teachers within a school. Describes "Instruction CoPlanner," a software network package which takes a team of educators through a systematic process of planning, decision making, implementation, and evaluation. (DB)

  13. Improving Student Engagement Using Course-Based Social Networks

    ERIC Educational Resources Information Center

    Imlawi, Jehad Mohammad

    2013-01-01

    This study proposes an engagement model that supports use of course-based online social networks for engaging student, and hence, improving their educational outcomes. This research demonstrates that instructors who create course-based online social networks to communicate with students can increase the student engagement in these online social…

  14. Simulation of reliability in multiserver computer networks

    NASA Astrophysics Data System (ADS)

    Minkevičius, Saulius

    2012-11-01

    The performance in terms of reliability of computer multiserver networks motivates this paper. The probability limit theorem is derived on the extreme queue length in open multiserver queueing networks in heavy traffic and applied to a reliability model for multiserver computer networks where we relate the time of failure of a multiserver computer network to the system parameters.

  15. Optimal monitoring of computer networks

    SciTech Connect

    Fedorov, V.V.; Flanagan, D.

    1997-08-01

    The authors apply the ideas from optimal design theory to the very specific area of monitoring large computer networks. The behavior of these networks is so complex and uncertain that it is quite natural to use the statistical methods of experimental design which were originated in such areas as biology, behavioral sciences and agriculture, where the random character of phenomena is a crucial component and systems are too complicated to be described by some sophisticated deterministic models. They want to emphasize that only the first steps have been completed, and relatively simple underlying concepts about network functions have been used. Their immediate goal is to initiate studies focused on developing efficient experimental design techniques which can be used by practitioners working with large networks operating and evolving in a random environment.

  16. Courses About Computers--For Secondary School Students

    ERIC Educational Resources Information Center

    Mattei, K. C.

    1974-01-01

    Goals and guidelines for teaching courses about computers to secondary school students are discussed. A method of teaching introductory ideas of computer operations through the use of a programmable calculator is suggested. (DT)

  17. Courses on Computational Physics in Chinese Universities and Colleges

    NASA Astrophysics Data System (ADS)

    Fanglin, Peng

    The paper concisely introduces the general aspects of the courses on computational physics in Chinese universities and Colleges, and specifically introduces the computational physics curriculum and textbook of Beijing Normal University.

  18. Integrating Computational Chemistry into a Course in Classical Thermodynamics

    ERIC Educational Resources Information Center

    Martini, Sheridan R.; Hartzell, Cynthia J.

    2015-01-01

    Computational chemistry is commonly addressed in the quantum mechanics course of undergraduate physical chemistry curricula. Since quantum mechanics traditionally follows the thermodynamics course, there is a lack of curricula relating computational chemistry to thermodynamics. A method integrating molecular modeling software into a semester long…

  19. A Laboratory Course on Digital Computers in Chemical Instrumentation

    ERIC Educational Resources Information Center

    Perone, S. P.

    1970-01-01

    After introducing computer terminology, the author states the purpose of a 3-week intensive summer course to afford practicing scientists familiarity with digital computers in chemical instrumentation. Describes equipment and personnel required. The course consists of fourteen formal lectures and fourteen laboratory assignments in digital logic,…

  20. Integrating Emerging Topics through Online Team Design in a Hybrid Communication Networks Course: Interaction Patterns and Impact of Prior Knowledge

    ERIC Educational Resources Information Center

    Reisslein, Jana; Seeling, Patrick; Reisslein, Martin

    2005-01-01

    An important challenge in the introductory communication networks course in electrical and computer engineering curricula is to integrate emerging topics, such as wireless Internet access and network security, into the already content-intensive course. At the same time it is essential to provide students with experiences in online collaboration,…

  1. Demonstrations of Neural Network Computations Involving Students

    PubMed Central

    May, Christopher J.

    2010-01-01

    David Marr famously proposed three levels of analysis (implementational, algorithmic, and computational) for understanding information processing systems such as the brain. While two of these levels are commonly taught in neuroscience courses (the implementational level through neurophysiology and the computational level through systems/cognitive neuroscience), the algorithmic level is typically neglected. This leaves an explanatory gap in students’ understanding of how, for example, the flow of sodium ions enables cognition. Neural networks bridge these two levels by demonstrating how collections of interacting neuron-like units can give rise to more overtly cognitive phenomena. The demonstrations in this paper are intended to facilitate instructors’ introduction and exploration of how neurons “process information.” PMID:23493501

  2. Computer networking at SLR stations

    NASA Astrophysics Data System (ADS)

    Novotny, Antonin

    1993-06-01

    There are several existing communication methods to deliver data from the satellite laser ranging (SLR) station to the SLR data center and back: telephonmodem, telex, and computer networks. The SLR scientific community has been exploiting mainly INTERNET, BITNET/EARN, and SPAN. The total of 56 countries are connected to INTERNET and the number of nodes is exponentially growing. The computer networks mentioned above and others are connected through E-mail protocol. The scientific progress of SLR requires the increase of communication speed and the amount of the transmitted data. The TOPEX/POSEIDON test campaign required to deliver Quick Look data (1.7 kB/pass) from a SLR site to SLR data center within 8 hours and full rate data (up to 500 kB/pass) within 24 hours. We developed networking for the remote SLR station in Helwan, Egypt. The reliable scheme for data delivery consists of: compression of MERIT2 format (up to 89 percent), encoding to ASCII Me (files); and e-mail sending from SLR station--e-mail receiving, decoding, and decompression at the center. We do propose to use the ZIP method for compression/decompression and the UUCODE method for ASCII encoding/decoding. This method will be useful for stations connected via telephonemodems or commercial networks. The electronics delivery could solve the problem of the too late receiving of the FR data by SLR data center.

  3. Computer networking at SLR stations

    NASA Technical Reports Server (NTRS)

    Novotny, Antonin

    1993-01-01

    There are several existing communication methods to deliver data from the satellite laser ranging (SLR) station to the SLR data center and back: telephonmodem, telex, and computer networks. The SLR scientific community has been exploiting mainly INTERNET, BITNET/EARN, and SPAN. The total of 56 countries are connected to INTERNET and the number of nodes is exponentially growing. The computer networks mentioned above and others are connected through E-mail protocol. The scientific progress of SLR requires the increase of communication speed and the amount of the transmitted data. The TOPEX/POSEIDON test campaign required to deliver Quick Look data (1.7 kB/pass) from a SLR site to SLR data center within 8 hours and full rate data (up to 500 kB/pass) within 24 hours. We developed networking for the remote SLR station in Helwan, Egypt. The reliable scheme for data delivery consists of: compression of MERIT2 format (up to 89 percent), encoding to ASCII Me (files); and e-mail sending from SLR station--e-mail receiving, decoding, and decompression at the center. We do propose to use the ZIP method for compression/decompression and the UUCODE method for ASCII encoding/decoding. This method will be useful for stations connected via telephonemodems or commercial networks. The electronics delivery could solve the problem of the too late receiving of the FR data by SLR data center.

  4. Computer Networks Improve Student Achievement, School Management.

    ERIC Educational Resources Information Center

    Cherry, Steve

    1991-01-01

    Using computer networking programs at two high schools as examples, this article describes what principals should know about networking. The many advantages of computer networking in schools will remain beneficial so long as the principal's objectives are met. Tips are provided for assessing the network. (eight references) (MLH)

  5. An Integrative Model of Factors Related to Computing Course Performance.

    ERIC Educational Resources Information Center

    Charlton, John P.; Birkett, Paul E.

    1999-01-01

    A path-modeling approach is adopted to examine interrelationships between factors influencing computing behavior and computer course performance. Factors considered are gender, personality, intellect and computer attitudes, ownership, and experience. Intrinsic motivation is suggested as a major factor which can explain many variables' relationship…

  6. Addressing Small Computers in the First OS Course

    ERIC Educational Resources Information Center

    Nutt, Gary

    2006-01-01

    Small computers are emerging as important components of the contemporary computing scene. Their operating systems vary from specialized software for an embedded system to the same style of OS used on a generic desktop or server computer. This article describes a course in which systems are classified by their hardware capability and the…

  7. Computers, Curricula and Courses: Assessing the Gains.

    ERIC Educational Resources Information Center

    Tickoo, Makhan Lal

    1988-01-01

    Researchers at the University of Birmingham (United Kingdom) have built a large database of every-day English and dictionary (COBUILD) for producing better English-as-a-Second/Foreign-Language teaching and learning materials. The lexical syllabus and the English course that has evolved from is are discussed. (23 references) (Author/LB)

  8. Student Learning Networks on Residential Field Courses: Does Size Matter?

    ERIC Educational Resources Information Center

    Langan, A. Mark; Cullen, W. Rod; Shuker, David M.

    2008-01-01

    This article describes learner and tutor reports of a learning network that formed during the completion of investigative projects on a residential field course. Staff and students recorded project-related interactions, who they were with and how long they lasted over four phases during the field course. An enquiry based learning format challenged…

  9. Delayed commutation in quantum computer networks.

    PubMed

    García-Escartín, Juan Carlos; Chamorro-Posada, Pedro

    2006-09-15

    In the same way that classical computer networks connect and enhance the capabilities of classical computers, quantum networks can combine the advantages of quantum information and communication. We propose a nonclassical network element, a delayed commutation switch, that can solve the problem of switching time in packet switching networks. With the help of some local ancillary qubits and superdense codes, we can route a qubit packet after part of it has left the network node. PMID:17025870

  10. An Elective Course on Computer-Aided Process Design.

    ERIC Educational Resources Information Center

    Sommerfeld, Jude T.

    1979-01-01

    Describes an undergraduate chemical engineering course which has been offered at the Georgia Institute of Technology. The objectives, structure, instructional materials and content of this course, which emphasizes the structure and usage of computer-aided design systems, are also included. (HM)

  11. Automating a Massive Online Course with Cluster Computing

    ERIC Educational Resources Information Center

    Haas, Timothy C.

    2016-01-01

    Before massive numbers of students can take online courses for college credit, the challenges of providing tutoring support, answers to student-posed questions, and the control of cheating will need to be addressed. These challenges are taken up here by developing an online course delivery system that runs in a cluster computing environment and is…

  12. A 12-week High School Course in Computer Use.

    ERIC Educational Resources Information Center

    Brown, Faith K.

    1982-01-01

    Using personal-sized microcomputers (8K), students learn to operate equipment and program in BASIC. They complete computer-assisted instruction lessons and select, design, operate, demonstrate, and document their own original programs in this one quarter, high school course. Course objectives, activities, materials, and evaluation are outlined.…

  13. Experiences of Using Automated Assessment in Computer Science Courses

    ERIC Educational Resources Information Center

    English, John; English, Tammy

    2015-01-01

    In this paper we discuss the use of automated assessment in a variety of computer science courses that have been taught at Israel Academic College by the authors. The course assignments were assessed entirely automatically using Checkpoint, a web-based automated assessment framework. The assignments all used free-text questions (where the students…

  14. Computer Based Reference Service--A Course Taught by Practitioners

    ERIC Educational Resources Information Center

    Knapp, Sara D.; Gavryck, Jacquelyn A.

    1978-01-01

    An overview is provided of a computer based reference course at the State University of New York at Albany which uses the ERIC file on BRS to teach online searching techniques. Course highlights include question negotiation, Venn diagramming, explanation of STAIRS file structure and Boolean logic, and management of services. (J PF)

  15. Computer Technology and Student Preferences in a Nutrition Course

    ERIC Educational Resources Information Center

    Temple, Norman J.; Kemp, Wendy C.; Benson, Wendy A.

    2006-01-01

    This study assessed learner preferences for using computer-based technology in a distance education course. A questionnaire was posted to students who had taken an undergraduate nutrition course at Athabasca University, Canada. The response rate was 57.1% (176 returned out of 308). Subjects were predominately female (93.7%) and nursing students…

  16. Traffic Dynamics of Computer Networks

    NASA Astrophysics Data System (ADS)

    Fekete, Attila

    2008-10-01

    Two important aspects of the Internet, namely the properties of its topology and the characteristics of its data traffic, have attracted growing attention of the physics community. My thesis has considered problems of both aspects. First I studied the stochastic behavior of TCP, the primary algorithm governing traffic in the current Internet, in an elementary network scenario consisting of a standalone infinite-sized buffer and an access link. The effect of the fast recovery and fast retransmission (FR/FR) algorithms is also considered. I showed that my model can be extended further to involve the effect of link propagation delay, characteristic of WAN. I continued my thesis with the investigation of finite-sized semi-bottleneck buffers, where packets can be dropped not only at the link, but also at the buffer. I demonstrated that the behavior of the system depends only on a certain combination of the parameters. Moreover, an analytic formula was derived that gives the ratio of packet loss rate at the buffer to the total packet loss rate. This formula makes it possible to treat buffer-losses as if they were link-losses. Finally, I studied computer networks from a structural perspective. I demonstrated through fluid simulations that the distribution of resources, specifically the link bandwidth, has a serious impact on the global performance of the network. Then I analyzed the distribution of edge betweenness in a growing scale-free tree under the condition that a local property, the in-degree of the "younger" node of an arbitrary edge, is known in order to find an optimum distribution of link capacity. The derived formula is exact even for finite-sized networks. I also calculated the conditional expectation of edge betweenness, rescaled for infinite networks.

  17. Using Computers in Undergraduate Economics Courses.

    ERIC Educational Resources Information Center

    Barr, Saul Z.; Harmon, Oscar

    Seven computer assignments for undergraduate economics students that concentrate on building a foundation for programming higher level mathematical calculations are described. The purpose of each assignment, the computer program for it, and the correct answers are provided. "Introduction to Text Editing" acquaints the student with some basic…

  18. "Horses for Courses": Categories of Computer-Based Learning Program and Their Uses in Pharmacology Courses.

    ERIC Educational Resources Information Center

    Hughes, Ian E.

    1998-01-01

    Describes the pharma-CAL-ogy project, funded by Teaching and Learning Technology Programme (TLTP), which has developed various types of software for use in pharmacology courses. Topics include course organization and delivery software, drill and practice software, tutorial-type programs, simulations, and the need to integrate computer-assisted…

  19. The Course as Token: A Construction of/by Networks.

    ERIC Educational Resources Information Center

    Gaskell, Jim; Hepburn, Gary

    1998-01-01

    Describes the way in which a new applied-physics course introduced in British Columbia as part of a program in applied academics can be seen to construct different networks in different contexts. Employs actor network theory (ANT). Contains 20 references. (DDR)

  20. Filling Structural Holes: Social Networks in the Introductory Course

    ERIC Educational Resources Information Center

    Cook, James M.

    2005-01-01

    Although the literature on social networks has made a considerable contribution to the sociological imagination in recent years, it has been largely ignored in conventional course materials. Such an omission is curious, considering social networks' intuitive imagery, broad theoretical relevance and extensive empirical application. This article…

  1. Terminal-oriented computer-communication networks.

    NASA Technical Reports Server (NTRS)

    Schwartz, M.; Boorstyn, R. R.; Pickholtz, R. L.

    1972-01-01

    Four examples of currently operating computer-communication networks are described in this tutorial paper. They include the TYMNET network, the GE Information Services network, the NASDAQ over-the-counter stock-quotation system, and the Computer Sciences Infonet. These networks all use programmable concentrators for combining a multiplicity of terminals. Included in the discussion for each network is a description of the overall network structure, the handling and transmission of messages, communication requirements, routing and reliability consideration where applicable, operating data and design specifications where available, and unique design features in the area of computer communications.

  2. Software For Monitoring A Computer Network

    NASA Technical Reports Server (NTRS)

    Lee, Young H.

    1992-01-01

    SNMAT is rule-based expert-system computer program designed to assist personnel in monitoring status of computer network and identifying defective computers, workstations, and other components of network. Also assists in training network operators. Network for SNMAT located at Space Flight Operations Center (SFOC) at NASA's Jet Propulsion Laboratory. Intended to serve as data-reduction system providing windows, menus, and graphs, enabling users to focus on relevant information. SNMAT expected to be adaptable to other computer networks; for example in management of repair, maintenance, and security, or in administration of planning systems, billing systems, or archives.

  3. Pacific Educational Computer Network Study. Final Report.

    ERIC Educational Resources Information Center

    Hawaii Univ., Honolulu. ALOHA System.

    The Pacific Educational Computer Network Feasibility Study examined technical and non-technical aspects of the formation of an international Pacific Area computer network for higher education. The technical study covered the assessment of the feasibility of a packet-switched satellite and radio ground distribution network for data transmission…

  4. Computer Learning Networks and Student Empowerment.

    ERIC Educational Resources Information Center

    Warschauer, Mark; And Others

    1996-01-01

    Examines whether computer networks can empower second-language learners, focusing on three aspects: autonomy, equality, and learning skills. The article concludes that these networks, appropriately used, can empower students, and provides pedagogical suggestions for effective computer networking in the second- and foreign-language classroom. (66…

  5. Proceedings of the computer networking symposium

    SciTech Connect

    Not Available

    1986-01-01

    This book presents the papers given at a conference on array processors and computer networks. Topics considered at the conference included heterogeneous local networks supporting scientific and knowledge processing, dynamic flow control in a computer communication network, broadcast protocols preserving concurrency, distributed systems, algorithms, routing, flow control, and internetworking.

  6. Working the network: Initiating a new science and technology course

    NASA Astrophysics Data System (ADS)

    Hepburn, Gary Roy

    1997-12-01

    This study explores the introduction of a new applied physics course into a British Columbia high school during the 1994-1995 school year. The course was part of a provincial effort aimed at making science and technology education more responsive to the workplace. Data collection took place during the first year the applied physics course was being piloted at the school and focused on the pilot teacher and the applied physics classes, but also involved others inside and outside the school who had a connection to the course. A variety of methods were used in data collection including interviews, observation, and document analysis. Using actor-network theory and sociocultural theory, the focus of the research is on the networks that were constructed at the pilot school and at the provincial level where the course was conceptualized and developed. The research describes how the teacher and other network builders attempted to enroll various human and nonhuman actors into the networks they were constructing in support of the course. They did this by convincing the actors that the course was compatible with their interests. The types of actors that were enrolled, the sociocultural communities they belonged to, and what it took to convince them to support the course are shown to shape the way that the course was enacted in the classroom. In addition, it is demonstrated that the network that was constructed at the provincial level had only a minor connection to the one the teacher was constructing at the school level. The lack of contact between the two networks meant that the interests of those who were involved in organizing the applied physics pilots at the provincial level were seldom taken into account in the course at the school. Fourteen conclusions are drawn about the networks that were constructed and the network building process at both the school and provincial levels. These conclusions have implications for policy in educational change initiatives and for

  7. Code 672 observational science branch computer networks

    NASA Technical Reports Server (NTRS)

    Hancock, D. W.; Shirk, H. G.

    1988-01-01

    In general, networking increases productivity due to the speed of transmission, easy access to remote computers, ability to share files, and increased availability of peripherals. Two different networks within the Observational Science Branch are described in detail.

  8. Computer Software Designs for College Science Courses.

    ERIC Educational Resources Information Center

    Jain, Duli C.; And Others

    1985-01-01

    Computer-assisted-instruction software was developed to supplement the conventional lecture-laboratory mode of instruction with another instructional aid for learning science in an individualized, nonthreatening environment. This development project was designed to teach physical concepts, mathematical techniques, and problem solving strategies.…

  9. My Experience with Computers in a Linear Mathematics Course.

    ERIC Educational Resources Information Center

    Johnson, Clare F.

    1982-01-01

    The introduction of computer use in college mathematics classes for non-mathematics oriented students majoring in marketing, management, and other business-related fields is discussed. Results of a questionnaire of student opinions matched with pupil course grades is presented. It is noted students as a whole seemed satisfied with computer use.…

  10. A Computer Course for Business Students: Teacher's Guide.

    ERIC Educational Resources Information Center

    Waterhouse, Ann

    This teacher's guide is for a course designed to teach business students the fundamentals of the BASIC language and computer programming using a series of business-oriented programs. Each lesson contains an introduction, flow charts, and computer programs. The six lesson topics are print-out and format control, count-average, withholding tax…

  11. Application of CDIO model in major courses for computer profession

    NASA Astrophysics Data System (ADS)

    Yang, Xiaowen; Han, Xie

    2012-04-01

    This paper introduces the structure of CDIO model. Through analyzing the existent problem from teaching of recent computer profession, the teaching reform of major courses for computer profession is necessary. So this paper imports the model to the teaching reform of major courses for computer profession as operating system. It integrates the teaching content of operating system, uses the teaching methods of case, task-driving and collaboration and improves the assessment system. The questionnaire inquiries from the teaching practice prove that the mode improves the understanding ability of students for theory and through experiment teaching exercises practice and innovation ability for students. The improved effect is evident.

  12. Micro Computer Technician Course. Course Design, Course Curricula, Learning Units, Resource Requirements. InfoTVE 14.

    ERIC Educational Resources Information Center

    Royal Melbourne Inst. of Tech. (Australia).

    This guide to the core curricula for the training of microcomputer technicians is designed for school leavers after 10 or more years of general/vocational education with a science and mathematics background. The 2-year course is to be administered in four semesters. An introductory outline of course design and curricula provides the rationale,…

  13. Computer Literacy in Pennsylvania Community Colleges. Competencies in a Beginning Level College Computer Literacy Course.

    ERIC Educational Resources Information Center

    Tortorelli, Ann Eichorn

    A study was conducted at the 14 community colleges (17 campuses) in Pennsylvania to assess the perceptions of faculty about the relative importance of course content items in a beginning credit course in computer literacy, and to survey courses currently being offered. A detailed questionnaire consisting of 96 questions based on MECC (Minnesota…

  14. Products and Services for Computer Networks.

    ERIC Educational Resources Information Center

    Negroponte, Nicholas P.

    1991-01-01

    Creative applications of computer networks are discussed. Products and services of the future that come from imaginative applications of both channel and computing capacity are described. The topics of entertainment, transactions, and electronic personal surrogates are included. (KR)

  15. Integrating ethical topics in a traditional computer science course

    SciTech Connect

    Winrich, L.B.

    1994-12-31

    It is never hard to find additional, often unconventional, topics which seem to beg inclusion in standard courses. A dynamic discipline like computer science usually provides a steady stream of new technical ideas to vie for time and attention with more traditional material. As difficult as it may be to keep standard CS courses up-to-date with technical innovations, it often seems even more difficult to include non-technical topics even when there is universal agreement on their importance, Inevitably the question of whether or not such inclusion will compromise the technical content of the course arises. This paper describes an attempt to include two such topics in a traditional course in data structures. The two topics are writing and ethics and, although the effort concentrates on the inclusion of ethical questions in a standard CS course, writing is the vehicle for accomplishing this goal. Furthermore, the inclusion writing in the CS curriculum is certainly recognized as a desirable outcome.

  16. A Computer Security Course in the Undergraduate Computer Science Curriculum.

    ERIC Educational Resources Information Center

    Spillman, Richard

    1992-01-01

    Discusses the importance of computer security and considers criminal, national security, and personal privacy threats posed by security breakdown. Several examples are given, including incidents involving computer viruses. Objectives, content, instructional strategies, resources, and a sample examination for an experimental undergraduate computer…

  17. Course 10: Three Lectures on Biological Networks

    NASA Astrophysics Data System (ADS)

    Magnasco, M. O.

    1 Enzymatic networks. Proofreading knots: How DNA topoisomerases disentangle DNA 1.1 Length scales and energy scales 1.2 DNA topology 1.3 Topoisomerases 1.4 Knots and supercoils 1.5 Topological equilibrium 1.6 Can topoisomerases recognize topology? 1.7 Proposal: Kinetic proofreading 1.8 How to do it twice 1.9 The care and proofreading of knots 1.10 Suppression of supercoils 1.11 Problems and outlook 1.12 Disquisition 2 Gene expression networks. Methods for analysis of DNA chip experiments 2.1 The regulation of gene expression 2.2 Gene expression arrays 2.3 Analysis of array data 2.4 Some simplifying assumptions 2.5 Probeset analysis 2.6 Discussion 3 Neural and gene expression networks: Song-induced gene expression in the canary brain 3.1 The study of songbirds 3.2 Canary song 3.3 ZENK 3.4 The blush 3.5 Histological analysis 3.6 Natural vs. artificial 3.7 The Blush II: gAP 3.8 Meditation

  18. Evolving Computer Networks in American Higher Education.

    ERIC Educational Resources Information Center

    McCredie, John W.; Timlake, William P.

    1983-01-01

    Traditions and pressures in the academic environment accounting for early and continuing involvement of higher education with computer networking are described. Several established networks illustrating the wide range of academic applications currently available as well as policy issues of particular significance in academic networks are…

  19. Neural-Network Computer Transforms Coordinates

    NASA Technical Reports Server (NTRS)

    Josin, Gary M.

    1990-01-01

    Numerical simulation demonstrated ability of conceptual neural-network computer to generalize what it has "learned" from few examples. Ability to generalize achieved with even simple neural network (relatively few neurons) and after exposure of network to only few "training" examples. Ability to obtain fairly accurate mappings after only few training examples used to provide solutions to otherwise intractable mapping problems.

  20. Computer-Based Information Networks: Selected Examples.

    ERIC Educational Resources Information Center

    Hardesty, Larry

    The history, purpose, and operation of six computer-based information networks are described in general and nontechnical terms. In the introduction the many definitions of an information network are explored. Ohio College Library Center's network (OCLC) is the first example. OCLC began in 1963, and since early 1973 has been extending its services…

  1. Using E-Mail across Computer Networks.

    ERIC Educational Resources Information Center

    Hazari, Sunil

    1990-01-01

    Discusses the use of telecommunications technology to exchange electronic mail, files, and messages across different computer networks. Networks highlighted include ARPA Internet; BITNET; USENET; FidoNet; MCI Mail; and CompuServe. Examples of the successful use of networks in higher education are given. (Six references) (LRW)

  2. Super-speed computer interfaces and networks

    SciTech Connect

    Tolmie, D.E.; St. John, W.; DuBois, D.H.

    1997-10-01

    This is the final report of a one-year, Laboratory Directed Research and Development (LDRD) project at Los Alamos National Laboratory (LANL). Research into super-speed computer interfaces has been directed towards identifying networking requirements from compute-intensive applications that are crucial to DOE programs. In particular, both the DOE Energy Research High Performance Computing Research Centers (HPCRC) and the DOE Defense Programs Accelerated Strategic Computing Initiative (ASCI) have planned applications that will require large increases in network bandwidth. This project was set up to help network researchers identify those networking requirements and to plan the development of such networks. Based on studies, research, and LANL-sponsored workshops, this project helped forge the beginnings for multi-gigabit/sec network research and developments that today is being lead by Los Alamos in the American National Standards Institute (ANSI) 6.4 gigabit/sec specification called HIPPI-6400.

  3. Gateways among Academic Computer Networks.

    ERIC Educational Resources Information Center

    McCredie, John W.

    1984-01-01

    Local area networks for intracampus facilities and national inter-campus networks are discussed. Descriptions of some of these networks (ARPAnet, BITNET, CSNET, EDUNET, MAILNET, RLIN, AND USENET) are provided that illustrate the wide range of academic applications currently available. (Author/MLW)

  4. Collaborative Teaching and Learning in a Networked Course Setting

    ERIC Educational Resources Information Center

    Kontopoulos, Ourania; Ford, Vivian; Roth, Stacy

    2007-01-01

    We report on a partnership between a librarian and two other community college teachers (a humanist and a social scientist) working to establish "networked courses" that use the model and techniques of collaborative teaching and learning in an interdisciplinary setting. In this partnership--and, in fact, in any interdisciplinary context--the role…

  5. Computational capabilities of recurrent NARX neural networks.

    PubMed

    Siegelmann, H T; Horne, B G; Giles, C L

    1997-01-01

    Recently, fully connected recurrent neural networks have been proven to be computationally rich-at least as powerful as Turing machines. This work focuses on another network which is popular in control applications and has been found to be very effective at learning a variety of problems. These networks are based upon Nonlinear AutoRegressive models with eXogenous Inputs (NARX models), and are therefore called NARX networks. As opposed to other recurrent networks, NARX networks have a limited feedback which comes only from the output neuron rather than from hidden states. They are formalized by y(t)=Psi(u(t-n(u)), ..., u(t-1), u(t), y(t-n(y)), ..., y(t-1)) where u(t) and y(t) represent input and output of the network at time t, n(u) and n(y) are the input and output order, and the function Psi is the mapping performed by a Multilayer Perceptron. We constructively prove that the NARX networks with a finite number of parameters are computationally as strong as fully connected recurrent networks and thus Turing machines. We conclude that in theory one can use the NARX models, rather than conventional recurrent networks without any computational loss even though their feedback is limited. Furthermore, these results raise the issue of what amount of feedback or recurrence is necessary for any network to be Turing equivalent and what restrictions on feedback limit computational power. PMID:18255858

  6. Computer-Oriented Calculus Courses Using Finite Differences.

    ERIC Educational Resources Information Center

    Gordon, Sheldon P.

    The so-called discrete approach in calculus instruction involves introducing topics from the calculus of finite differences and finite sums, both for motivation and as useful tools for applications of the calculus. In particular, it provides an ideal setting in which to incorporate computers into calculus courses. This approach has been…

  7. A Term Project for a Course on Computer Forensics

    ERIC Educational Resources Information Center

    Harrison, Warren

    2006-01-01

    The typical approach to creating an examination disk for exercises and projects in a course on computer forensics is for the instructor to populate a piece of media with evidence to be retrieved. While such an approach supports the simple use of forensic tools, in many cases the use of an instructor-developed examination disk avoids utilizing some…

  8. Interpersonal Presence in Computer-Mediated Conferencing Courses.

    ERIC Educational Resources Information Center

    Herod, L.

    Interpersonal presence refers to the cues individuals use to form impressions of one another and form/maintain relationships. The physical cues used to convey interpersonal presence in face-to-face learning environments are absent in text-based computer-mediated conferencing (CMC) courses. Learners' perceptions of interpersonal presence in CMC…

  9. An Undergraduate Electrical Engineering Course on Computer Organization.

    ERIC Educational Resources Information Center

    Commission on Engineering Education, Washington, DC.

    Outlined is an undergraduate electrical engineering course on computer organization designed to meet the need for electrical engineers familiar with digital system design. The program includes both hardware and software aspects of digital systems essential to design function and correlates design and organizational aspects of the subject. The…

  10. Evaluating Computer Lab Modules for Large Biology Courses.

    ERIC Educational Resources Information Center

    Eichinger, David C.; And Others

    This paper describes the first phase of a study to investigate students' evaluations of computer laboratory modules in a university-level, non-majors biology course. The National Science Foundation-funded project has two primary goals: (1) to develop programmable, multifunctional Bio LabStations for data collection and analysis, lab extensions,…

  11. Computed Tomography-Enhanced Anatomy Course Using Enterprise Visualization

    ERIC Educational Resources Information Center

    May, Hila; Cohen, Haim; Medlej, Bahaa; Kornreich, Liora; Peled, Nathan; Hershkovitz, Israel

    2013-01-01

    Rapid changes in medical knowledge are forcing continuous adaptation of the basic science courses in medical schools. This article discusses a three-year experience developing a new Computed Tomography (CT)-based anatomy curriculum at the Sackler School of Medicine, Tel Aviv University, including describing the motivations and reasoning for the…

  12. Effects of a Television Distance Education Course in Computer Science.

    ERIC Educational Resources Information Center

    Boulet, Marie-Michele; Boudreault, Serge; Guerette, Louis

    1998-01-01

    Presents an analysis of the learning outcomes pertaining to one unit of the undergraduate television distance-education course, Information Technology, in the computer science program at University Laval (Quebec, Canada). Investigates the relative effects of television distance education versus tradition classroom teaching on learning…

  13. Early Adolescent Social Networks and Computer Use.

    ERIC Educational Resources Information Center

    Orleans, Myron; Laney, Margaret C.

    A research project was conducted to examine the interactions between the social networks of young adolescents and their computer usage. Particular attention was focused upon whether computers tend to isolate youthful users. Adult anxiety regarding the damaging effects of computers on children was assessed. Parental involvement, orientation to…

  14. Airlines Network Optimization using Evolutionary Computation

    NASA Astrophysics Data System (ADS)

    Inoue, Hiroki; Kato, Yasuhiko; Sakagami, Tomoya

    In recent years, various networks have come to exist in our surroundings. Not only the internet and airline routes can be thought of as networks: protein interactions are also networks. An “economic network design problem” can be discussed by assuming that a vertex is an economic player and that a link represents some connection between economic players. In this paper, the Airlines network is taken up as an example of an “economic network design problem”, and the Airlines network which the profit of the entire Airlines industry is maximized is clarified. The Airlines network is modeled based on connections models proposed by Jackson and Wolinsky, and the utility function of the network is defined. In addition, the optimization simulation using the evolutionary computation is shown for a domestic airline in Japan.

  15. Queuing theory models for computer networks

    NASA Technical Reports Server (NTRS)

    Galant, David C.

    1989-01-01

    A set of simple queuing theory models which can model the average response of a network of computers to a given traffic load has been implemented using a spreadsheet. The impact of variations in traffic patterns and intensities, channel capacities, and message protocols can be assessed using them because of the lack of fine detail in the network traffic rates, traffic patterns, and the hardware used to implement the networks. A sample use of the models applied to a realistic problem is included in appendix A. Appendix B provides a glossary of terms used in this paper. This Ames Research Center computer communication network is an evolving network of local area networks (LANs) connected via gateways and high-speed backbone communication channels. Intelligent planning of expansion and improvement requires understanding the behavior of the individual LANs as well as the collection of networks as a whole.

  16. The Effect of Computer Literacy Course on Students' Attitudes toward Computer Applications

    ERIC Educational Resources Information Center

    Erlich, Zippy; Gadot, Rivka; Shahak, Daphna

    2009-01-01

    Studies indicate that the use of technologies as teaching aids and tools for self-study is influenced by students' attitudes toward computers and their applications. The purpose of this study is to determine whether taking a Computer Literacy and Applications (CLA) course has an impact on students' attitudes toward computer applications, across…

  17. A first course in computing with applications to biology.

    PubMed

    Libeskind-Hadas, Ran; Bush, Eliot

    2013-09-01

    We believe that undergraduate biology students must acquire a foundational background in computing including how to formulate a computational problem; develop an algorithmic solution; implement their solution in software and then test, document and use their code to explore biological phenomena. Moreover, by learning these skills in the first year, students acquire a powerful tool set that they can use and build on throughout their studies. To address this need, we have developed a first-year undergraduate course that teaches students the foundations of computational thinking and programming in the context of problems in biology. This article describes the structure and content of the course and summarizes assessment data on both affective and learning outcomes. PMID:23449003

  18. Pedagogy in the Computer-Networked Classroom (Computers and Pedagogy).

    ERIC Educational Resources Information Center

    Eldred, Janet M.

    1991-01-01

    Argues that, with careful planning, computer networking can work in the writing classroom by stressing composition as a social collaborative act. Suggests that classroom networking planners must attend to (1) choice of technology; (2) ease of use; (3) participation; and (4) audience awareness. (SG)

  19. Computer Self-Efficacy: A Factor in Understanding Gender Differences in Computer Course Enrollment.

    ERIC Educational Resources Information Center

    Miura, Irene T.

    The purpose of this study was to investgate the role of self-efficacy expectations in understanding gender differences in the election of college computer science courses. Participants were 368 undergraduate students (males=104, females=264) enrolled in a course fulfilling a general education requirement at a large urban university. A two-page…

  20. Computer network environment planning and analysis

    NASA Technical Reports Server (NTRS)

    Dalphin, John F.

    1989-01-01

    The GSFC Computer Network Environment provides a broadband RF cable between campus buildings and ethernet spines in buildings for the interlinking of Local Area Networks (LANs). This system provides terminal and computer linkage among host and user systems thereby providing E-mail services, file exchange capability, and certain distributed computing opportunities. The Environment is designed to be transparent and supports multiple protocols. Networking at Goddard has a short history and has been under coordinated control of a Network Steering Committee for slightly more than two years; network growth has been rapid with more than 1500 nodes currently addressed and greater expansion expected. A new RF cable system with a different topology is being installed during summer 1989; consideration of a fiber optics system for the future will begin soon. Summmer study was directed toward Network Steering Committee operation and planning plus consideration of Center Network Environment analysis and modeling. Biweekly Steering Committee meetings were attended to learn the background of the network and the concerns of those managing it. Suggestions for historical data gathering have been made to support future planning and modeling. Data Systems Dynamic Simulator, a simulation package developed at NASA and maintained at GSFC was studied as a possible modeling tool for the network environment. A modeling concept based on a hierarchical model was hypothesized for further development. Such a model would allow input of newly updated parameters and would provide an estimation of the behavior of the network.

  1. Impact of Multimedia and Network Services on an Introductory Level Course

    NASA Technical Reports Server (NTRS)

    Russ, John C.

    1996-01-01

    We will demonstrate and describe the impact of our use of multimedia and network connectivity on a sophomore-level introductory course in materials science. This class services all engineering students, resulting in large (more than 150) class sections with no hands-on laboratory. In 1990 we began to develop computer graphics that might substitute for some laboratory or real-world experiences, and demonstrate relationships hard to show with static textbook images or chalkboard drawings. We created a comprehensive series of modules that cover the entire course content. Called VIMS (Visualizations in Materials Science), these are available in the form of a CD-ROM and also via the internet.

  2. Computing Network Bill Viewed as High Priority.

    ERIC Educational Resources Information Center

    Hanson, David

    1991-01-01

    Discussed is the High Performance Computing Act of 1991 which would provide federal funding for the establishment of a National Research and Education network. The rationale for the proposed legislation is discussed. (CW)

  3. Nuclear Physics computer networking: Report of the Nuclear Physics Panel on Computer Networking

    SciTech Connect

    Bemis, C. ); Erskine, J. ); Franey, M. ); Greiner, D. ); Hoehn, M. ); Kaletka, M. ); LeVine, M. ); Roberson, R. (Duke Univ., Durham, NC (U

    1990-05-01

    This paper discusses: the state of computer networking within nuclear physics program; network requirements for nuclear physics; management structure; and issues of special interest to the nuclear physics program office.

  4. Educator's Guide to Networking: Using Computers.

    ERIC Educational Resources Information Center

    Spurgin, Judy Barrett

    Since electronic networking via microcomputers is fast becoming one of the most popular communications mediums of this decade, this manual is designed to help educators use personal computers as communication devices. The purpose of the document is to acquaint the reader with: (1) the many available communications options on electronic networks;…

  5. Computer Networks and African Studies Centers.

    ERIC Educational Resources Information Center

    Kuntz, Patricia S.

    The use of electronic communication in the 12 Title VI African Studies Centers is discussed, and the networks available for their use are reviewed. It is argued that the African Studies Centers should be on the cutting edge of contemporary electronic communication and that computer networks should be a fundamental aspect of their programs. An…

  6. Networking Course Syllabus in Accredited Library and Information Science Programs: A Comparative Analysis Study

    ERIC Educational Resources Information Center

    Abouserie, Hossam Eldin Mohamed Refaat

    2009-01-01

    The study investigated networking courses offered in accredited Library and Information Science schools in the United States in 2009. The study analyzed and compared network syllabi according to Course Syllabus Evaluation Rubric to obtain in-depth understanding of basic features and characteristics of networking courses taught. The study embraced…

  7. Managing secure computer systems and networks.

    PubMed

    Von Solms, B

    1996-10-01

    No computer system or computer network can today be operated without the necessary security measures to secure and protect the electronic assets stored, processed and transmitted using such systems and networks. Very often the effort in managing such security and protection measures are totally underestimated. This paper provides an overview of the security management needed to secure and protect a typical IT system and network. Special reference is made to this management effort in healthcare systems, and the role of the information security officer is also highlighted. PMID:8960921

  8. Computer Networking with the Victorian Correspondence School.

    ERIC Educational Resources Information Center

    Conboy, Ian

    During 1985 the Education Department installed two-way radios in 44 remote secondary schools in Victoria, Australia, to improve turn-around time for correspondence assignments. Subsequently, teacher supervisors at Melbourne's Correspondence School sought ways to further augument audio interactivity with computer networking. Computer equipment was…

  9. Optimization of an interactive distributive computer network

    NASA Technical Reports Server (NTRS)

    Frederick, V.

    1985-01-01

    The activities under a cooperative agreement for the development of a computer network are briefly summarized. Research activities covered are: computer operating systems optimization and integration; software development and implementation of the IRIS (Infrared Imaging of Shuttle) Experiment; and software design, development, and implementation of the APS (Aerosol Particle System) Experiment.

  10. Spontaneous Ad Hoc Mobile Cloud Computing Network

    PubMed Central

    Lacuesta, Raquel; Sendra, Sandra; Peñalver, Lourdes

    2014-01-01

    Cloud computing helps users and companies to share computing resources instead of having local servers or personal devices to handle the applications. Smart devices are becoming one of the main information processing devices. Their computing features are reaching levels that let them create a mobile cloud computing network. But sometimes they are not able to create it and collaborate actively in the cloud because it is difficult for them to build easily a spontaneous network and configure its parameters. For this reason, in this paper, we are going to present the design and deployment of a spontaneous ad hoc mobile cloud computing network. In order to perform it, we have developed a trusted algorithm that is able to manage the activity of the nodes when they join and leave the network. The paper shows the network procedures and classes that have been designed. Our simulation results using Castalia show that our proposal presents a good efficiency and network performance even by using high number of nodes. PMID:25202715

  11. Techniques of networking in the computer world.

    PubMed

    Armstrong, M L

    1985-09-01

    Networks can play an important role for nurses in user-to-user communication because they can be used both within and outside the health care delivery system. The choices include an information exchange, which can be an effective strategy for sharing personal concerns, problems, and achievements about the computer; commercial data bases with their vast sources of information and research data; or local area networks, effective in an office or campus setting. All of these networks can put worlds of information and services just a few words or keyboard strokes away, because they offer, outside of your own computer, a whole new dimension of retrieval, storage, reference, and communication capabilities. These networks can significantly enhance computing potential by providing an overall expansion of information. PMID:3903669

  12. Engineering Technology Programs Courses Guide for Computer Aided Design and Computer Aided Manufacturing.

    ERIC Educational Resources Information Center

    Georgia Univ., Athens. Div. of Vocational Education.

    This guide describes the requirements for courses in computer-aided design and computer-aided manufacturing (CAD/CAM) that are part of engineering technology programs conducted in vocational-technical schools in Georgia. The guide is organized in five sections. The first section provides a rationale for occupations in design and in production,…

  13. Role of Computer Assisted Instruction (CAI) in an Introductory Computer Concepts Course.

    ERIC Educational Resources Information Center

    Skudrna, Vincent J.

    1997-01-01

    Discusses the role of computer assisted instruction (CAI) in undergraduate education via a survey of related literature and specific applications. Describes an undergraduate computer concepts course and includes appendices of instructions, flowcharts, programs, sample student work in accounting, COBOL instructional model, decision logic in a…

  14. Computing galled networks from real data

    PubMed Central

    Huson, Daniel H.; Rupp, Regula; Berry, Vincent; Gambette, Philippe; Paul, Christophe

    2009-01-01

    Motivation: Developing methods for computing phylogenetic networks from biological data is an important problem posed by molecular evolution and much work is currently being undertaken in this area. Although promising approaches exist, there are no tools available that biologists could easily and routinely use to compute rooted phylogenetic networks on real datasets containing tens or hundreds of taxa. Biologists are interested in clades, i.e. groups of monophyletic taxa, and these are usually represented by clusters in a rooted phylogenetic tree. The problem of computing an optimal rooted phylogenetic network from a set of clusters, is hard, in general. Indeed, even the problem of just determining whether a given network contains a given cluster is hard. Hence, some researchers have focused on topologically restricted classes of networks, such as galled trees and level-k networks, that are more tractable, but have the practical draw-back that a given set of clusters will usually not possess such a representation. Results: In this article, we argue that galled networks (a generalization of galled trees) provide a good trade-off between level of generality and tractability. Any set of clusters can be represented by some galled network and the question whether a cluster is contained in such a network is easy to solve. Although the computation of an optimal galled network involves successively solving instances of two different NP-complete problems, in practice our algorithm solves this problem exactly on large datasets containing hundreds of taxa and many reticulations in seconds, as illustrated by a dataset containing 279 prokaryotes. Availability: We provide a fast, robust and easy-to-use implementation of this work in version 2.0 of our tree-handling software Dendroscope, freely available from http://www.dendroscope.org. Contact: huson@informatik.uni-tuebingen.de PMID:19478021

  15. A new interconnection network for SIMD computers: The sigma network

    SciTech Connect

    Seznec, A.

    1987-07-01

    When processing vectors on SIMD computers, some data manipulations (rearrangement, expansion, compression, perfect-shuffle, bit-reversal) have to be performed by an inter-connection network. When this network lacks an efficient routing control, it becomes the bottleneck for performance. It has been pointed out that general algorithms to control rearrangeable networks for arbitrary permutations are time consuming. To overcome this difficulty, Lenfant proposed a set of permutations covering standard needs associated with efficient control algorithms for the Benes network. But to perform explicit permutations on vectors, several passes through the network are necessary because they have to be composed with transfer rearrangements. The author presents efficient control algorithms to perform these vector permutations in a single pass on a new interconnection network.

  16. Profiles of Motivated Self-Regulation in College Computer Science Courses: Differences in Major versus Required Non-Major Courses

    ERIC Educational Resources Information Center

    Shell, Duane F.; Soh, Leen-Kiat

    2013-01-01

    The goal of the present study was to utilize a profiling approach to understand differences in motivation and strategic self-regulation among post-secondary STEM students in major versus required non-major computer science courses. Participants were 233 students from required introductory computer science courses (194 men; 35 women; 4 unknown) at…

  17. Computing with structured connections networks. Technical report

    SciTech Connect

    Feldman, J.A.; Fanty, M.A.; Goddard, N.; Lynne, K.

    1987-04-01

    Rapid advances both in the neurosciences and in computer science are beginning to lead to a new interest in computational models linking animal brains and behavior. In computer science, there is a large and growing body of knowledge about parallel computation and another, largely separate, science of artificial intelligence. The idea of looking directly at massively parallel realizations of intelligent activity promises to be fruitful for the study of both natural and artificial computations. Much attention has been directed towards the biological implications of this interdisciplinary effort, but there are equally important relations with computational theory, hardware and software. This article focuses on the design and use of massively parallel computational models, particularly in artificial intelligence. Much of the recent work on massively parallel computation has been carried out by physicists and examines the emergent behavior of large, unstructured collections of computing units. We are more concerned with how one can design, realize and analyze networks that embody the specific computational structures needed to solve hard problems. Adaptation and learning are treated as ways to improve structured networks, not as a replacement for analysis and design.

  18. Estimating computer communication network performance using network simulations

    SciTech Connect

    Garcia, A.B.

    1985-01-01

    A generalized queuing model simulation of store-and-forward computer communication networks is developed and implemented using Simulation Language for Alternative Modeling (SLAM). A baseline simulation model is validated by comparison with published analytic models. The baseline model is expanded to include an ACK/NAK data link protocol, four-level message precedence, finite queues, and a response traffic scenario. Network performance, as indicated by average message delay and message throughput, is estimated using the simulation model.

  19. Modern control centers and computer networking

    SciTech Connect

    Dy-Liacco, T.E.

    1994-10-01

    The automation of power system operation is generally achieved with the implementation of two control centers, one for the operation of the generation-transmission system and the other for the operation of the distribution system. These control centers are referred to, respectively, as the energy management system (EMS) and the distribution management system (DMS). The EMS may consist of several control centers in a hierarchy. The DMS may be made up of several independent distribution control centers. This article features the fundamental design aspects of modern EMS and DMS control centers (computer networks, distributed processing, and distributed databases), the linking of computer networks, and the communications that support such internetworking. The extension of such networking beyond the confines of system operation to other corporate networks is now made practical by the maturing concepts of client-server architectures and by the availability of modern communication technologies.

  20. Systematic computational prediction of protein interaction networks.

    PubMed

    Lees, J G; Heriche, J K; Morilla, I; Ranea, J A; Orengo, C A

    2011-06-01

    Determining the network of physical protein associations is an important first step in developing mechanistic evidence for elucidating biological pathways. Despite rapid advances in the field of high throughput experiments to determine protein interactions, the majority of associations remain unknown. Here we describe computational methods for significantly expanding protein association networks. We describe methods for integrating multiple independent sources of evidence to obtain higher quality predictions and we compare the major publicly available resources available for experimentalists to use. PMID:21572181

  1. Meteorological Monitoring And Warning Computer Network

    NASA Technical Reports Server (NTRS)

    Evans, Randolph J.; Dianic, Allan V.; Moore, Lien N.

    1996-01-01

    Meteorological monitoring system (MMS) computer network tracks weather conditions and issues warnings when weather hazards are about to occur. Receives data from such meteorological instruments as wind sensors on towers and lightning detectors, and compares data with weather restrictions specified for outdoor activities. If weather violates restriction, network generates audible and visible alarms to alert people involved in activity. Also displays weather and toxic diffusion data and disseminates weather forecasts, advisories, and warnings to workstations.

  2. Position paper on active countermeasures for computer networks.

    SciTech Connect

    Van Randwyk, Jamie A.

    2003-07-01

    Computer security professionals have used passive network countermeasures for several years in order to secure computer networks. Passive countermeasures such as firewalls and intrusion detection systems are effective but their use alone is not enough to protect a network. Active countermeasures offer new ways of protecting a computer network. Corporations and government entities should adopt active network countermeasures as a means of protecting their computer networks.

  3. Anonymous Transactions in Computer Networks

    NASA Astrophysics Data System (ADS)

    Dolev, Shlomi; Kopeetsky, Marina

    We present schemes for providing anonymous transactions while privacy and anonymity are preserved, providing user anonymous authentication in distributed networks such as the Internet. We first present a practical scheme for anonymous transactions while the transaction resolution is assisted by a Trusted Authority. This practical scheme is extended to a theoretical scheme where a Trusted Authority is not involved in the transaction resolution. Given an authority that generates for each player hard to produce evidence EVID (e. g., problem instance with or without a solution) to each player, the identity of a user U is defined by the ability to prove possession of said evidence. We use Zero-Knowledge proof techniques to repeatedly identify U by providing a proof that U has evidence EVID, without revealing EVID, therefore avoiding identity theft.

  4. Student Perceived Importance and Correlations of Selected Computer Literacy Course Topics

    ERIC Educational Resources Information Center

    Ciampa, Mark

    2013-01-01

    Traditional college-level courses designed to teach computer literacy are in a state of flux. Today's students have high rates of access to computing technology and computer ownership, leading many policy decision makers to conclude that students already are computer literate and thus computer literacy courses are dinosaurs in a modern digital…

  5. Distributed neural computations for embedded sensor networks

    NASA Astrophysics Data System (ADS)

    Peckens, Courtney A.; Lynch, Jerome P.; Pei, Jin-Song

    2011-04-01

    Wireless sensing technologies have recently emerged as an inexpensive and robust method of data collection in a variety of structural monitoring applications. In comparison with cabled monitoring systems, wireless systems offer low-cost and low-power communication between a network of sensing devices. Wireless sensing networks possess embedded data processing capabilities which allow for data processing directly at the sensor, thereby eliminating the need for the transmission of raw data. In this study, the Volterra/Weiner neural network (VWNN), a powerful modeling tool for nonlinear hysteretic behavior, is decentralized for embedment in a network of wireless sensors so as to take advantage of each sensor's processing capabilities. The VWNN was chosen for modeling nonlinear dynamic systems because its architecture is computationally efficient and allows computational tasks to be decomposed for parallel execution. In the algorithm, each sensor collects it own data and performs a series of calculations. It then shares its resulting calculations with every other sensor in the network, while the other sensors are simultaneously exchanging their information. Because resource conservation is important in embedded sensor design, the data is pruned wherever possible to eliminate excessive communication between sensors. Once a sensor has its required data, it continues its calculations and computes a prediction of the system acceleration. The VWNN is embedded in the computational core of the Narada wireless sensor node for on-line execution. Data generated by a steel framed structure excited by seismic ground motions is used for validation of the embedded VWNN model.

  6. Computation of signal delays in RC networks

    NASA Technical Reports Server (NTRS)

    Hidalgo, Juan Carlos; Narendran, Paliath; Chaiken, Seth

    1993-01-01

    A model for signal delay computation in RC networks is presented. The strength of the paradigm is its generality and simplicity. The definition of delay is applicable to RC meshes with potential resistive attenuating paths to ground. The algorithms can also be applied to undriven circuits (static charge sharing) and circuits with initial charge. To compute the delays, each node in the network is explored locally to derive a system of sparse linear equations. The solutions of the system are delay values based on the Elmore time constant at each point in the circuit.

  7. Computation of signal delays in RC networks

    NASA Astrophysics Data System (ADS)

    Hidalgo, Juan Carlos; Narendran, Paliath; Chaiken, Seth

    A model for signal delay computation in RC networks is presented. The strength of the paradigm is its generality and simplicity. The definition of delay is applicable to RC meshes with potential resistive attenuating paths to ground. The algorithms can also be applied to undriven circuits (static charge sharing) and circuits with initial charge. To compute the delays, each node in the network is explored locally to derive a system of sparse linear equations. The solutions of the system are delay values based on the Elmore time constant at each point in the circuit.

  8. On computer vision in wireless sensor networks.

    SciTech Connect

    Berry, Nina M.; Ko, Teresa H.

    2004-09-01

    Wireless sensor networks allow detailed sensing of otherwise unknown and inaccessible environments. While it would be beneficial to include cameras in a wireless sensor network because images are so rich in information, the power cost of transmitting an image across the wireless network can dramatically shorten the lifespan of the sensor nodes. This paper describe a new paradigm for the incorporation of imaging into wireless networks. Rather than focusing on transmitting images across the network, we show how an image can be processed locally for key features using simple detectors. Contrasted with traditional event detection systems that trigger an image capture, this enables a new class of sensors which uses a low power imaging sensor to detect a variety of visual cues. Sharing these features among relevant nodes cues specific actions to better provide information about the environment. We report on various existing techniques developed for traditional computer vision research which can aid in this work.

  9. Computational Statistical Methods for Social Network Models

    PubMed Central

    Hunter, David R.; Krivitsky, Pavel N.; Schweinberger, Michael

    2013-01-01

    We review the broad range of recent statistical work in social network models, with emphasis on computational aspects of these methods. Particular focus is applied to exponential-family random graph models (ERGM) and latent variable models for data on complete networks observed at a single time point, though we also briefly review many methods for incompletely observed networks and networks observed at multiple time points. Although we mention far more modeling techniques than we can possibly cover in depth, we provide numerous citations to current literature. We illustrate several of the methods on a small, well-known network dataset, Sampson’s monks, providing code where possible so that these analyses may be duplicated. PMID:23828720

  10. DTW-MIC Coexpression Networks from Time-Course Data.

    PubMed

    Riccadonna, Samantha; Jurman, Giuseppe; Visintainer, Roberto; Filosi, Michele; Furlanello, Cesare

    2016-01-01

    When modeling coexpression networks from high-throughput time course data, Pearson Correlation Coefficient (PCC) is one of the most effective and popular similarity functions. However, its reliability is limited since it cannot capture non-linear interactions and time shifts. Here we propose to overcome these two issues by employing a novel similarity function, Dynamic Time Warping Maximal Information Coefficient (DTW-MIC), combining a measure taking care of functional interactions of signals (MIC) and a measure identifying time lag (DTW). By using the Hamming-Ipsen-Mikhailov (HIM) metric to quantify network differences, the effectiveness of the DTW-MIC approach is demonstrated on a set of four synthetic and one transcriptomic datasets, also in comparison to TimeDelay ARACNE and Transfer Entropy. PMID:27031641

  11. DTW-MIC Coexpression Networks from Time-Course Data

    PubMed Central

    Riccadonna, Samantha; Jurman, Giuseppe; Visintainer, Roberto; Filosi, Michele; Furlanello, Cesare

    2016-01-01

    When modeling coexpression networks from high-throughput time course data, Pearson Correlation Coefficient (PCC) is one of the most effective and popular similarity functions. However, its reliability is limited since it cannot capture non-linear interactions and time shifts. Here we propose to overcome these two issues by employing a novel similarity function, Dynamic Time Warping Maximal Information Coefficient (DTW-MIC), combining a measure taking care of functional interactions of signals (MIC) and a measure identifying time lag (DTW). By using the Hamming-Ipsen-Mikhailov (HIM) metric to quantify network differences, the effectiveness of the DTW-MIC approach is demonstrated on a set of four synthetic and one transcriptomic datasets, also in comparison to TimeDelay ARACNE and Transfer Entropy. PMID:27031641

  12. A Computer-Based Education Approach to Electrical Network Theory: Lesson Development, Use and Evaluation.

    ERIC Educational Resources Information Center

    Grossel, Roger Louis

    This study investigated the use of the PLATO III computer assisted instruction (CAI) system to assist in the teaching of an electrical network theory course. It sought to: 1) identify the topics and teaching strategies most amenable to CAI system; 2) develop computer programs needed to teach those topics; 3) use, evaluate and service the programs;…

  13. Computational capabilities of random automata networks for reservoir computing

    NASA Astrophysics Data System (ADS)

    Snyder, David; Goudarzi, Alireza; Teuscher, Christof

    2013-04-01

    This paper underscores the conjecture that intrinsic computation is maximal in systems at the “edge of chaos”. We study the relationship between dynamics and computational capability in random Boolean networks (RBN) for reservoir computing (RC). RC is a computational paradigm in which a trained readout layer interprets the dynamics of an excitable component (called the reservoir) that is perturbed by external input. The reservoir is often implemented as a homogeneous recurrent neural network, but there has been little investigation into the properties of reservoirs that are discrete and heterogeneous. Random Boolean networks are generic and heterogeneous dynamical systems and here we use them as the reservoir. A RBN is typically a closed system; to use it as a reservoir we extend it with an input layer. As a consequence of perturbation, the RBN does not necessarily fall into an attractor. Computational capability in RC arises from a tradeoff between separability and fading memory of inputs. We find the balance of these properties predictive of classification power and optimal at critical connectivity. These results are relevant to the construction of devices which exploit the intrinsic dynamics of complex heterogeneous systems, such as biomolecular substrates.

  14. Effects of Computer Course on Computer Self-Efficacy, Computer Attitudes and Achievements of Young Individuals in Siirt, Turkey

    ERIC Educational Resources Information Center

    Çelik, Halil Coskun

    2015-01-01

    The purpose of this study is to investigate the effects of computer courses on young individuals' computer self-efficacy, attitudes and achievement. The study group of this research included 60 unemployed young individuals (18-25 ages) in total; 30 in the experimental group and 30 in the control group. An experimental research model with…

  15. Computational Modeling of Mammalian Signaling Networks

    PubMed Central

    Hughey, Jacob J; Lee, Timothy K; Covert, Markus W

    2011-01-01

    One of the most exciting developments in signal transduction research has been the proliferation of studies in which a biological discovery was initiated by computational modeling. Here we review the major efforts that enable such studies. First, we describe the experimental technologies that are generally used to identify the molecular components and interactions in, and dynamic behavior exhibited by, a network of interest. Next, we review the mathematical approaches that are used to model signaling network behavior. Finally, we focus on three specific instances of “model-driven discovery”: cases in which computational modeling of a signaling network has led to new insights which have been verified experimentally. Signal transduction networks are the bridge between the extraordinarily complex extracellular environment and a carefully orchestrated cellular response. These networks are largely composed of proteins which can interact, move to specific cellular locations, or be modified or degraded. The integration of these events often leads to the activation or inactivation of transcription factors, which then induce or repress the expression of thousands of genes. Because of this critical role in translating environmental cues to cellular behaviors, malfunctioning signaling networks can lead to a variety of pathologies. One example is cancer, in which many of the key genes found to be involved in cancer onset and development are components of signaling pathways [1, 2]. A detailed understanding of the cellular signaling networks underlying such diseases would likely be extremely useful in developing new treatments. However, the complexity of signaling networks is such that their integrated functions cannot be determined without computational simulation. In recent years, mathematical modeling of signal transduction has led to some exciting new findings and biological discoveries. Here, we review the work that has enabled computational modeling of mammalian

  16. Multimedia computer support for a course in ground control

    SciTech Connect

    Summers, D.A.; Unal, A.

    1996-12-31

    A prototype multimedia compact disc (CD) was created using the facilities at the Rock Mechanics and Explosives Research Center (RMERC) of the University of Missouri-Rolla (UMR) to teach a portion of a course in Ground Control. Multimedia computers offer an environment where audio-visual presentations can be made in an interactive fashion. Together with relevant animation clips, video clips, and 3-D representations, the difficulties in describing mining processes and earth structures can be overcome. This paper describes the experience gained in preparing interactive multimedia lectures on computers. The hardware and software used in creating the sound commentary, 3-D graphics, animation clips, video clips, and movies are listed. The structure of the program and how interactivity was achieved is explained in detail. Such an instructional tool is not only an excellent supplement to regular courses but it also is an inexpensive and effective way of providing distance education for mining engineers working at remote locations scattered all over the country.

  17. Pedagogical Utilization and Assessment of the Statistic Online Computational Resource in Introductory Probability and Statistics Courses

    PubMed Central

    Dinov, Ivo D.; Sanchez, Juana; Christou, Nicolas

    2009-01-01

    Technology-based instruction represents a new recent pedagogical paradigm that is rooted in the realization that new generations are much more comfortable with, and excited about, new technologies. The rapid technological advancement over the past decade has fueled an enormous demand for the integration of modern networking, informational and computational tools with classical pedagogical instruments. Consequently, teaching with technology typically involves utilizing a variety of IT and multimedia resources for online learning, course management, electronic course materials, and novel tools of communication, engagement, experimental, critical thinking and assessment. The NSF-funded Statistics Online Computational Resource (SOCR) provides a number of interactive tools for enhancing instruction in various undergraduate and graduate courses in probability and statistics. These resources include online instructional materials, statistical calculators, interactive graphical user interfaces, computational and simulation applets, tools for data analysis and visualization. The tools provided as part of SOCR include conceptual simulations and statistical computing interfaces, which are designed to bridge between the introductory and the more advanced computational and applied probability and statistics courses. In this manuscript, we describe our designs for utilizing SOCR technology in instruction in a recent study. In addition, present the results of the effectiveness of using SOCR tools at two different course intensity levels on three outcome measures: exam scores, student satisfaction and choice of technology to complete assignments. Learning styles assessment was completed at baseline. We have used three very different designs for three different undergraduate classes. Each course included a treatment group, using the SOCR resources, and a control group, using classical instruction techniques. Our findings include marginal effects of the SOCR treatment per individual

  18. Advanced networks and computing in healthcare

    PubMed Central

    Ackerman, Michael

    2011-01-01

    As computing and network capabilities continue to rise, it becomes increasingly important to understand the varied applications for using them to provide healthcare. The objective of this review is to identify key characteristics and attributes of healthcare applications involving the use of advanced computing and communication technologies, drawing upon 45 research and development projects in telemedicine and other aspects of healthcare funded by the National Library of Medicine over the past 12 years. Only projects publishing in the professional literature were included in the review. Four projects did not publish beyond their final reports. In addition, the authors drew on their first-hand experience as project officers, reviewers and monitors of the work. Major themes in the corpus of work were identified, characterizing key attributes of advanced computing and network applications in healthcare. Advanced computing and network applications are relevant to a range of healthcare settings and specialties, but they are most appropriate for solving a narrower range of problems in each. Healthcare projects undertaken primarily to explore potential have also demonstrated effectiveness and depend on the quality of network service as much as bandwidth. Many applications are enabling, making it possible to provide service or conduct research that previously was not possible or to achieve outcomes in addition to those for which projects were undertaken. Most notable are advances in imaging and visualization, collaboration and sense of presence, and mobility in communication and information-resource use. PMID:21486877

  19. Network based high performance concurrent computing

    SciTech Connect

    Sunderam, V.S.

    1991-01-01

    The overall objectives of this project are to investigate research issues pertaining to programming tools and efficiency issues in network based concurrent computing systems. The basis for these efforts is the PVM project that evolved during my visits to Oak Ridge Laboratories under the DOE Faculty Research Participation program; I continue to collaborate with researchers at Oak Ridge on some portions of the project.

  20. Advanced networks and computing in healthcare.

    PubMed

    Ackerman, Michael; Locatis, Craig

    2011-01-01

    As computing and network capabilities continue to rise, it becomes increasingly important to understand the varied applications for using them to provide healthcare. The objective of this review is to identify key characteristics and attributes of healthcare applications involving the use of advanced computing and communication technologies, drawing upon 45 research and development projects in telemedicine and other aspects of healthcare funded by the National Library of Medicine over the past 12 years. Only projects publishing in the professional literature were included in the review. Four projects did not publish beyond their final reports. In addition, the authors drew on their first-hand experience as project officers, reviewers and monitors of the work. Major themes in the corpus of work were identified, characterizing key attributes of advanced computing and network applications in healthcare. Advanced computing and network applications are relevant to a range of healthcare settings and specialties, but they are most appropriate for solving a narrower range of problems in each. Healthcare projects undertaken primarily to explore potential have also demonstrated effectiveness and depend on the quality of network service as much as bandwidth. Many applications are enabling, making it possible to provide service or conduct research that previously was not possible or to achieve outcomes in addition to those for which projects were undertaken. Most notable are advances in imaging and visualization, collaboration and sense of presence, and mobility in communication and information-resource use. PMID:21486877

  1. Reducing the diameters of computer networks

    NASA Technical Reports Server (NTRS)

    Bokhari, S. H.; Raza, A. D.

    1986-01-01

    Three methods of reducing the diameters of computer networks by adding additional processor to processor links under the constraint that no more than one I/O port be added to each processor are discussed. This is equivalent to adding edges to a given graph under the constraint that the degree of any node be increased, at most, by one.

  2. Multiple network alignment on quantum computers

    NASA Astrophysics Data System (ADS)

    Daskin, Anmer; Grama, Ananth; Kais, Sabre

    2014-12-01

    Comparative analyses of graph-structured datasets underly diverse problems. Examples of these problems include identification of conserved functional components (biochemical interactions) across species, structural similarity of large biomolecules, and recurring patterns of interactions in social networks. A large class of such analyses methods quantify the topological similarity of nodes across networks. The resulting correspondence of nodes across networks, also called node alignment, can be used to identify invariant subgraphs across the input graphs. Given graphs as input, alignment algorithms use topological information to assign a similarity score to each -tuple of nodes, with elements (nodes) drawn from each of the input graphs. Nodes are considered similar if their neighbors are also similar. An alternate, equivalent view of these network alignment algorithms is to consider the Kronecker product of the input graphs and to identify high-ranked nodes in the Kronecker product graph. Conventional methods such as PageRank and HITS (Hypertext-Induced Topic Selection) can be used for this purpose. These methods typically require computation of the principal eigenvector of a suitably modified Kronecker product matrix of the input graphs. We adopt this alternate view of the problem to address the problem of multiple network alignment. Using the phase estimation algorithm, we show that the multiple network alignment problem can be efficiently solved on quantum computers. We characterize the accuracy and performance of our method and show that it can deliver exponential speedups over conventional (non-quantum) methods.

  3. Multiple network alignment on quantum computers

    NASA Astrophysics Data System (ADS)

    Daskin, Anmer; Grama, Ananth; Kais, Sabre

    2014-09-01

    Comparative analyses of graph structured datasets underly diverse problems. Examples of these problems include identification of conserved functional components (biochemical interactions) across species, structural similarity of large biomolecules, and recurring patterns of interactions in social networks. A large class of such analyses methods quantify the topological similarity of nodes across networks. The resulting correspondence of nodes across networks, also called node alignment, can be used to identify invariant subgraphs across the input graphs. Given $k$ graphs as input, alignment algorithms use topological information to assign a similarity score to each $k$-tuple of nodes, with elements (nodes) drawn from each of the input graphs. Nodes are considered similar if their neighbors are also similar. An alternate, equivalent view of these network alignment algorithms is to consider the Kronecker product of the input graphs, and to identify high-ranked nodes in the Kronecker product graph. Conventional methods such as PageRank and HITS (Hypertext Induced Topic Selection) can be used for this purpose. These methods typically require computation of the principal eigenvector of a suitably modified Kronecker product matrix of the input graphs. We adopt this alternate view of the problem to address the problem of multiple network alignment. Using the phase estimation algorithm, we show that the multiple network alignment problem can be efficiently solved on quantum computers. We characterize the accuracy and performance of our method, and show that it can deliver exponential speedups over conventional (non-quantum) methods.

  4. Distributed sensor networks with collective computation

    SciTech Connect

    Lanman, D. R.

    2001-01-01

    Simulations of a network of N sensors have been performed. The simulation space contains a number of sound sources and a large number of sensors. Each sensor is equipped with an omni-directional microphone and is capable of measuring only the time of arrival of a signal. Sensors are able to wirelessly transmit and receive packets of information, and have some computing power. The sensors were programmed to merge all information (received packets as well as local measurements) into a 'world view' for that node. This world view is then transmitted. In this way, information can slowly diffuse across the network. One node was monitored in the network as a proxy for when information had diffused across the network. Simulations demonstrated that the energy expended per sensor per time step was approximately independent of N.

  5. Accelerating commutation circuits in quantum computer networks

    NASA Astrophysics Data System (ADS)

    Jiang, Min; Huang, Xu; Chen, Xiaoping; Zhang, Zeng-ke

    2012-12-01

    In a high speed and packet-switched quantum computer network, a packet routing delay often leads to traffic jams, becoming a severe bottleneck for speeding up the transmission rate. Based on the delayed commutation circuit proposed in Phys. Rev. Lett. 97, 110502 (2006), we present an improved scheme for accelerating network transmission. For two more realistic scenarios, we utilize the characteristic of a quantum state to simultaneously implement a data switch and transmission that makes it possible to reduce the packet delay and route a qubit packet even before its address is determined. This circuit is further extended to the quantum network for the transmission of the unknown quantum information. The analysis demonstrates that quantum communication technology can considerably reduce the processing delay time and build faster and more efficient packet-switched networks.

  6. Advanced Scientific Computing Research Network Requirements

    SciTech Connect

    Bacon, Charles; Bell, Greg; Canon, Shane; Dart, Eli; Dattoria, Vince; Goodwin, Dave; Lee, Jason; Hicks, Susan; Holohan, Ed; Klasky, Scott; Lauzon, Carolyn; Rogers, Jim; Shipman, Galen; Skinner, David; Tierney, Brian

    2013-03-08

    The Energy Sciences Network (ESnet) is the primary provider of network connectivity for the U.S. Department of Energy (DOE) Office of Science (SC), the single largest supporter of basic research in the physical sciences in the United States. In support of SC programs, ESnet regularly updates and refreshes its understanding of the networking requirements of the instruments, facilities, scientists, and science programs that it serves. This focus has helped ESnet to be a highly successful enabler of scientific discovery for over 25 years. In October 2012, ESnet and the Office of Advanced Scientific Computing Research (ASCR) of the DOE SC organized a review to characterize the networking requirements of the programs funded by the ASCR program office. The requirements identified at the review are summarized in the Findings section, and are described in more detail in the body of the report.

  7. Non-harmful insertion of data mimicking computer network attacks

    DOEpatents

    Neil, Joshua Charles; Kent, Alexander; Hash, Jr, Curtis Lee

    2016-06-21

    Non-harmful data mimicking computer network attacks may be inserted in a computer network. Anomalous real network connections may be generated between a plurality of computing systems in the network. Data mimicking an attack may also be generated. The generated data may be transmitted between the plurality of computing systems using the real network connections and measured to determine whether an attack is detected.

  8. A Textbook for a First Course in Computational Fluid Dynamics

    NASA Technical Reports Server (NTRS)

    Zingg, D. W.; Pulliam, T. H.; Nixon, David (Technical Monitor)

    1999-01-01

    This paper describes and discusses the textbook, Fundamentals of Computational Fluid Dynamics by Lomax, Pulliam, and Zingg, which is intended for a graduate level first course in computational fluid dynamics. This textbook emphasizes fundamental concepts in developing, analyzing, and understanding numerical methods for the partial differential equations governing the physics of fluid flow. Its underlying philosophy is that the theory of linear algebra and the attendant eigenanalysis of linear systems provides a mathematical framework to describe and unify most numerical methods in common use in the field of fluid dynamics. Two linear model equations, the linear convection and diffusion equations, are used to illustrate concepts throughout. Emphasis is on the semi-discrete approach, in which the governing partial differential equations (PDE's) are reduced to systems of ordinary differential equations (ODE's) through a discretization of the spatial derivatives. The ordinary differential equations are then reduced to ordinary difference equations (O(Delta)E's) using a time-marching method. This methodology, using the progression from PDE through ODE's to O(Delta)E's, together with the use of the eigensystems of tridiagonal matrices and the theory of O(Delta)E's, gives the book its distinctiveness and provides a sound basis for a deep understanding of fundamental concepts in computational fluid dynamics.

  9. Organizational Alternatives for a Pacific Educational Computer-Communications Network.

    ERIC Educational Resources Information Center

    Ah Mai, Karen L.

    Organizational alternatives for a Pacific educational computer-communications network are studied through the examples provided by other networks. A survey of networks is provided with a discussion of the history and development of networks and the distinctions in network technology and applications. Nine specific networks are described. Libraries…

  10. Spiking network simulation code for petascale computers

    PubMed Central

    Kunkel, Susanne; Schmidt, Maximilian; Eppler, Jochen M.; Plesser, Hans E.; Masumoto, Gen; Igarashi, Jun; Ishii, Shin; Fukai, Tomoki; Morrison, Abigail; Diesmann, Markus; Helias, Moritz

    2014-01-01

    Brain-scale networks exhibit a breathtaking heterogeneity in the dynamical properties and parameters of their constituents. At cellular resolution, the entities of theory are neurons and synapses and over the past decade researchers have learned to manage the heterogeneity of neurons and synapses with efficient data structures. Already early parallel simulation codes stored synapses in a distributed fashion such that a synapse solely consumes memory on the compute node harboring the target neuron. As petaflop computers with some 100,000 nodes become increasingly available for neuroscience, new challenges arise for neuronal network simulation software: Each neuron contacts on the order of 10,000 other neurons and thus has targets only on a fraction of all compute nodes; furthermore, for any given source neuron, at most a single synapse is typically created on any compute node. From the viewpoint of an individual compute node, the heterogeneity in the synaptic target lists thus collapses along two dimensions: the dimension of the types of synapses and the dimension of the number of synapses of a given type. Here we present a data structure taking advantage of this double collapse using metaprogramming techniques. After introducing the relevant scaling scenario for brain-scale simulations, we quantitatively discuss the performance on two supercomputers. We show that the novel architecture scales to the largest petascale supercomputers available today. PMID:25346682

  11. Spiking network simulation code for petascale computers.

    PubMed

    Kunkel, Susanne; Schmidt, Maximilian; Eppler, Jochen M; Plesser, Hans E; Masumoto, Gen; Igarashi, Jun; Ishii, Shin; Fukai, Tomoki; Morrison, Abigail; Diesmann, Markus; Helias, Moritz

    2014-01-01

    Brain-scale networks exhibit a breathtaking heterogeneity in the dynamical properties and parameters of their constituents. At cellular resolution, the entities of theory are neurons and synapses and over the past decade researchers have learned to manage the heterogeneity of neurons and synapses with efficient data structures. Already early parallel simulation codes stored synapses in a distributed fashion such that a synapse solely consumes memory on the compute node harboring the target neuron. As petaflop computers with some 100,000 nodes become increasingly available for neuroscience, new challenges arise for neuronal network simulation software: Each neuron contacts on the order of 10,000 other neurons and thus has targets only on a fraction of all compute nodes; furthermore, for any given source neuron, at most a single synapse is typically created on any compute node. From the viewpoint of an individual compute node, the heterogeneity in the synaptic target lists thus collapses along two dimensions: the dimension of the types of synapses and the dimension of the number of synapses of a given type. Here we present a data structure taking advantage of this double collapse using metaprogramming techniques. After introducing the relevant scaling scenario for brain-scale simulations, we quantitatively discuss the performance on two supercomputers. We show that the novel architecture scales to the largest petascale supercomputers available today. PMID:25346682

  12. Parallel Computation of Unsteady Flows on a Network of Workstations

    NASA Technical Reports Server (NTRS)

    1997-01-01

    Parallel computation of unsteady flows requires significant computational resources. The utilization of a network of workstations seems an efficient solution to the problem where large problems can be treated at a reasonable cost. This approach requires the solution of several problems: 1) the partitioning and distribution of the problem over a network of workstation, 2) efficient communication tools, 3) managing the system efficiently for a given problem. Of course, there is the question of the efficiency of any given numerical algorithm to such a computing system. NPARC code was chosen as a sample for the application. For the explicit version of the NPARC code both two- and three-dimensional problems were studied. Again both steady and unsteady problems were investigated. The issues studied as a part of the research program were: 1) how to distribute the data between the workstations, 2) how to compute and how to communicate at each node efficiently, 3) how to balance the load distribution. In the following, a summary of these activities is presented. Details of the work have been presented and published as referenced.

  13. Fuzzy logic, neural networks, and soft computing

    NASA Technical Reports Server (NTRS)

    Zadeh, Lofti A.

    1994-01-01

    The past few years have witnessed a rapid growth of interest in a cluster of modes of modeling and computation which may be described collectively as soft computing. The distinguishing characteristic of soft computing is that its primary aims are to achieve tractability, robustness, low cost, and high MIQ (machine intelligence quotient) through an exploitation of the tolerance for imprecision and uncertainty. Thus, in soft computing what is usually sought is an approximate solution to a precisely formulated problem or, more typically, an approximate solution to an imprecisely formulated problem. A simple case in point is the problem of parking a car. Generally, humans can park a car rather easily because the final position of the car is not specified exactly. If it were specified to within, say, a few millimeters and a fraction of a degree, it would take hours or days of maneuvering and precise measurements of distance and angular position to solve the problem. What this simple example points to is the fact that, in general, high precision carries a high cost. The challenge, then, is to exploit the tolerance for imprecision by devising methods of computation which lead to an acceptable solution at low cost. By its nature, soft computing is much closer to human reasoning than the traditional modes of computation. At this juncture, the major components of soft computing are fuzzy logic (FL), neural network theory (NN), and probabilistic reasoning techniques (PR), including genetic algorithms, chaos theory, and part of learning theory. Increasingly, these techniques are used in combination to achieve significant improvement in performance and adaptability. Among the important application areas for soft computing are control systems, expert systems, data compression techniques, image processing, and decision support systems. It may be argued that it is soft computing, rather than the traditional hard computing, that should be viewed as the foundation for artificial

  14. Computer Networks teaching by microlearning principles

    NASA Astrophysics Data System (ADS)

    A, Zhamanov; M, Zhamapor

    2013-04-01

    In nowadays there are many kinds of problems in the system of higher education. One of them is: everyday students get very huge amount of information. All of them take very big amount of time for a student to understand lesson and it is very hard for him/her to do everything in time. This paper explains a study of work microlearning application for computer networks. It consists of general introduction and purpose.

  15. Criteria development for upgrading computer networks

    NASA Technical Reports Server (NTRS)

    Efe, Kemal

    1995-01-01

    Being an infrastructure system, the computer network has a fundamental role in the day to day activities of personnel working at KSC. It is easily appreciated that the lack of 'satisfactory' network performance can have a high 'cost' for KSC. Yet, this seemingly obvious concept is quite difficult to demonstrate. At what point do we say that performance is below the lowest tolerable level? How do we know when the 'cost' of using the system at the current level of degraded performance exceeds the cost of upgrading it? In this research, we consider the cost and performance factors that may have an effect in decision making in regards to upgrading computer networks. Cost factors are detailed in terms of 'direct costs' and 'subjective costs'. Performance factors are examined in terms of 'required performance' and 'offered performance.' Required performance is further examined by presenting a methodology for trend analysis based on applying interpolation methods to observed traffic levels. Offered performance levels are analyzed by deriving simple equations to evaluate network performance. The results are evaluated in the light of recommended upgrade policies currently in use for telephone exchange systems, similarities and differences between the two types of services are discussed.

  16. Computer Based Collaborative Problem Solving for Introductory Courses in Physics

    NASA Astrophysics Data System (ADS)

    Ilie, Carolina; Lee, Kevin

    2010-03-01

    We discuss collaborative problem solving computer-based recitation style. The course is designed by Lee [1], and the idea was proposed before by Christian, Belloni and Titus [2,3]. The students find the problems on a web-page containing simulations (physlets) and they write the solutions on an accompanying worksheet after discussing it with a classmate. Physlets have the advantage of being much more like real-world problems than textbook problems. We also compare two protocols for web-based instruction using simulations in an introductory physics class [1]. The inquiry protocol allowed students to control input parameters while the worked example protocol did not. We will discuss which of the two methods is more efficient in relation to Scientific Discovery Learning and Cognitive Load Theory. 1. Lee, Kevin M., Nicoll, Gayle and Brooks, Dave W. (2004). ``A Comparison of Inquiry and Worked Example Web-Based Instruction Using Physlets'', Journal of Science Education and Technology 13, No. 1: 81-88. 2. Christian, W., and Belloni, M. (2001). Physlets: Teaching Physics With Interactive Curricular Material, Prentice Hall, Englewood Cliffs, NJ. 3. Christian,W., and Titus,A. (1998). ``Developing web-based curricula using Java Physlets.'' Computers in Physics 12: 227--232.

  17. Computer network defense through radial wave functions

    NASA Astrophysics Data System (ADS)

    Malloy, Ian J.

    The purpose of this research is to synthesize basic and fundamental findings in quantum computing, as applied to the attack and defense of conventional computer networks. The concept focuses on uses of radio waves as a shield for, and attack against traditional computers. A logic bomb is analogous to a landmine in a computer network, and if one was to implement it as non-trivial mitigation, it will aid computer network defense. As has been seen in kinetic warfare, the use of landmines has been devastating to geopolitical regions in that they are severely difficult for a civilian to avoid triggering given the unknown position of a landmine. Thus, the importance of understanding a logic bomb is relevant and has corollaries to quantum mechanics as well. The research synthesizes quantum logic phase shifts in certain respects using the Dynamic Data Exchange protocol in software written for this work, as well as a C-NOT gate applied to a virtual quantum circuit environment by implementing a Quantum Fourier Transform. The research focus applies the principles of coherence and entanglement from quantum physics, the concept of expert systems in artificial intelligence, principles of prime number based cryptography with trapdoor functions, and modeling radio wave propagation against an event from unknown parameters. This comes as a program relying on the artificial intelligence concept of an expert system in conjunction with trigger events for a trapdoor function relying on infinite recursion, as well as system mechanics for elliptic curve cryptography along orbital angular momenta. Here trapdoor both denotes the form of cipher, as well as the implied relationship to logic bombs.

  18. A needs assessment for a graduate level course in optical networking

    NASA Astrophysics Data System (ADS)

    Zhang, Qi; Reisslein, Jana; Klein, James; Reisslein, Martin

    2003-10-01

    To explore the need for a graduate level engineering course in optical networking, a needs assessment consisting of (i) an investigation of 14 existing optical networking courses, (ii) an analysis of online surveys among the networking community and the ASU electrical engineering department, (iii) faculty interviews, and (iv) focus groups was conducted. Survey responses from a total of 61 respondents were received and analyzed. The results support the need for a graduate level course in optical networking. Our analyses indicate that a graduate course in optical networking should (i) focus on the basic mechanisms and current trends in optical networking, (ii) be based on a text book and instructor slides combined with collections of examples and problems. Regarding the optimal delivery method it was found that current students and faculty strongly prefer face-to-face delivery complemented by on-line readings and assignments, whereas working engineering professionals are more open to the idea of online courses.

  19. Using Microcomputer Simulations in the Classroom: Examples from Undergraduate and Faculty Computer Literacy Courses.

    ERIC Educational Resources Information Center

    Hart, Jeffrey A.

    Examples of the use of computer simulations in two undergraduate courses, (American Foreign Policy and Introduction to International Politics), and a faculty computer literacy course on simulations and artificial intelligence, are provided in this compilation of various instructional items. A list of computer simulations available for various…

  20. Path Not Found: Disparities in Access to Computer Science Courses in California High Schools

    ERIC Educational Resources Information Center

    Martin, Alexis; McAlear, Frieda; Scott, Allison

    2015-01-01

    "Path Not Found: Disparities in Access to Computer Science Courses in California High Schools" exposes one of the foundational causes of underrepresentation in computing: disparities in access to computer science courses in California's public high schools. This report provides new, detailed data on these disparities by student body…

  1. Using satellite communications for a mobile computer network

    NASA Technical Reports Server (NTRS)

    Wyman, Douglas J.

    1993-01-01

    The topics discussed include the following: patrol car automation, mobile computer network, network requirements, network design overview, MCN mobile network software, MCN hub operation, mobile satellite software, hub satellite software, the benefits of patrol car automation, the benefits of satellite mobile computing, and national law enforcement satellite.

  2. Neural network computer simulation of medical aerosols.

    PubMed

    Richardson, C J; Barlow, D J

    1996-06-01

    Preliminary investigations have been conducted to assess the potential for using artificial neural networks to simulate aerosol behaviour, with a view to employing this type of methodology in the evaluation and design of pulmonary drug-delivery systems. Details are presented of the general purpose software developed for these tasks; it implements a feed-forward back-propagation algorithm with weight decay and connection pruning, the user having complete run-time control of the network architecture and mode of training. A series of exploratory investigations is then reported in which different network structures and training strategies are assessed in terms of their ability to simulate known patterns of fluid flow in simple model systems. The first of these involves simulations of cellular automata-generated data for fluid flow through a partially obstructed two-dimensional pipe. The artificial neural networks are shown to be highly successful in simulating the behaviour of this simple linear system, but with important provisos relating to the information content of the training data and the criteria used to judge when the network is properly trained. A second set of investigations is then reported in which similar networks are used to simulate patterns of fluid flow through aerosol generation devices, using training data furnished through rigorous computational fluid dynamics modelling. These more complex three-dimensional systems are modelled with equal success. It is concluded that carefully tailored, well trained networks could provide valuable tools not just for predicting but also for analysing the spatial dynamics of pharmaceutical aerosols. PMID:8832491

  3. Computational Fact Checking from Knowledge Networks

    PubMed Central

    Ciampaglia, Giovanni Luca; Shiralkar, Prashant; Rocha, Luis M.; Bollen, Johan; Menczer, Filippo; Flammini, Alessandro

    2015-01-01

    Traditional fact checking by expert journalists cannot keep up with the enormous volume of information that is now generated online. Computational fact checking may significantly enhance our ability to evaluate the veracity of dubious information. Here we show that the complexities of human fact checking can be approximated quite well by finding the shortest path between concept nodes under properly defined semantic proximity metrics on knowledge graphs. Framed as a network problem this approach is feasible with efficient computational techniques. We evaluate this approach by examining tens of thousands of claims related to history, entertainment, geography, and biographical information using a public knowledge graph extracted from Wikipedia. Statements independently known to be true consistently receive higher support via our method than do false ones. These findings represent a significant step toward scalable computational fact-checking methods that may one day mitigate the spread of harmful misinformation. PMID:26083336

  4. Computational Fact Checking from Knowledge Networks.

    PubMed

    Ciampaglia, Giovanni Luca; Shiralkar, Prashant; Rocha, Luis M; Bollen, Johan; Menczer, Filippo; Flammini, Alessandro

    2015-01-01

    Traditional fact checking by expert journalists cannot keep up with the enormous volume of information that is now generated online. Computational fact checking may significantly enhance our ability to evaluate the veracity of dubious information. Here we show that the complexities of human fact checking can be approximated quite well by finding the shortest path between concept nodes under properly defined semantic proximity metrics on knowledge graphs. Framed as a network problem this approach is feasible with efficient computational techniques. We evaluate this approach by examining tens of thousands of claims related to history, entertainment, geography, and biographical information using a public knowledge graph extracted from Wikipedia. Statements independently known to be true consistently receive higher support via our method than do false ones. These findings represent a significant step toward scalable computational fact-checking methods that may one day mitigate the spread of harmful misinformation. PMID:26083336

  5. Computed tomography-enhanced anatomy course using enterprise visualization.

    PubMed

    May, Hila; Cohen, Haim; Medlej, Bahaa; Kornreich, Liora; Peled, Nathan; Hershkovitz, Israel

    2013-01-01

    Rapid changes in medical knowledge are forcing continuous adaptation of the basic science courses in medical schools. This article discusses a three-year experience developing a new Computed Tomography (CT)-based anatomy curriculum at the Sackler School of Medicine, Tel Aviv University, including describing the motivations and reasoning for the new curriculum, the CT-based learning system itself, practical examples of visual dissections, and student assessments of the new curriculum. At the heart of this new curriculum is the emphasis on studying anatomy by navigating inside the bodies of various living individuals utilizing a CT viewer. To assess the students' experience with the new CT-based learning method, an anonymous questionnaire was administered at the end of the course for three consecutive academic years: 2008/2009, 2009/2010, 2010/2011. Based upon the results, modifications were made to the curriculum in the summers of 2009 and 2010. Results showed that: (1) during these three years the number of students extensively using the CT system quadrupled (from 11% to 46%); (2) students' satisfaction from radiologists involvement increased by 150%; and (3) student appreciation of the CT-based learning method significantly increased (from 13% to 68%). It was concluded that discouraging results (mainly negative feedback from students) during the first years and a priori opposition from the teaching staff should not weaken efforts to develop new teaching methods in the field of anatomy. Incorporating a new curriculum requires time and patience. Student and staff satisfaction, along with utilization of the new system, will increase with the improvement of impeding factors. PMID:23401203

  6. Computational drug repositioning through heterogeneous network clustering

    PubMed Central

    2013-01-01

    Background Given the costly and time consuming process and high attrition rates in drug discovery and development, drug repositioning or drug repurposing is considered as a viable strategy both to replenish the drying out drug pipelines and to surmount the innovation gap. Although there is a growing recognition that mechanistic relationships from molecular to systems level should be integrated into drug discovery paradigms, relatively few studies have integrated information about heterogeneous networks into computational drug-repositioning candidate discovery platforms. Results Using known disease-gene and drug-target relationships from the KEGG database, we built a weighted disease and drug heterogeneous network. The nodes represent drugs or diseases while the edges represent shared gene, biological process, pathway, phenotype or a combination of these features. We clustered this weighted network to identify modules and then assembled all possible drug-disease pairs (putative drug repositioning candidates) from these modules. We validated our predictions by testing their robustness and evaluated them by their overlap with drug indications that were either reported in published literature or investigated in clinical trials. Conclusions Previous computational approaches for drug repositioning focused either on drug-drug and disease-disease similarity approaches whereas we have taken a more holistic approach by considering drug-disease relationships also. Further, we considered not only gene but also other features to build the disease drug networks. Despite the relative simplicity of our approach, based on the robustness analyses and the overlap of some of our predictions with drug indications that are under investigation, we believe our approach could complement the current computational approaches for drug repositioning candidate discovery. PMID:24564976

  7. Massively Open Online Course for Educators (MOOC-Ed) Network Dataset

    ERIC Educational Resources Information Center

    Kellogg, Shaun; Edelmann, Achim

    2015-01-01

    This paper presents the Massively Open Online Course for Educators (MOOC-Ed) network dataset. It entails information on two online communication networks resulting from two consecutive offerings of the MOOC called "The Digital Learning Transition in K-12 Schools" in spring and fall 2013. The courses were offered to educators from the USA…

  8. Profiles of Motivated Self-Regulation in College Computer Science Courses: Differences in Major versus Required Non-Major Courses

    NASA Astrophysics Data System (ADS)

    Shell, Duane F.; Soh, Leen-Kiat

    2013-12-01

    The goal of the present study was to utilize a profiling approach to understand differences in motivation and strategic self-regulation among post-secondary STEM students in major versus required non-major computer science courses. Participants were 233 students from required introductory computer science courses (194 men; 35 women; 4 unknown) at a large Midwestern state university. Cluster analysis identified five profiles: (1) a strategic profile of a highly motivated by-any-means good strategy user; (2) a knowledge-building profile of an intrinsically motivated autonomous, mastery-oriented student; (3) a surface learning profile of a utility motivated minimally engaged student; (4) an apathetic profile of an amotivational disengaged student; and (5) a learned helpless profile of a motivated but unable to effectively self-regulate student. Among CS majors and students in courses in their major field, the strategic and knowledge-building profiles were the most prevalent. Among non-CS majors and students in required non-major courses, the learned helpless, surface learning, and apathetic profiles were the most prevalent. Students in the strategic and knowledge-building profiles had significantly higher retention of computational thinking knowledge than students in other profiles. Students in the apathetic and surface learning profiles saw little instrumentality of the course for their future academic and career objectives. Findings show that students in STEM fields taking required computer science courses exhibit the same constellation of motivated strategic self-regulation profiles found in other post-secondary and K-12 settings.

  9. Computer Networks for Science Teachers. ERIC CSMEE Digest.

    ERIC Educational Resources Information Center

    Roempler, Kimberly S.; Warren, Charles R.

    Formerly reserved for use by scientists, researchers, and computer buffs, computer networks now have capabilities that make them extremely useful to science teachers and their classes. This digest is designed to provide educators with some basic background on computer communications and to provide a few examples of computer networks that are…

  10. Program Predicts Time Courses of Human/Computer Interactions

    NASA Technical Reports Server (NTRS)

    Vera, Alonso; Howes, Andrew

    2005-01-01

    CPM X is a computer program that predicts sequences of, and amounts of time taken by, routine actions performed by a skilled person performing a task. Unlike programs that simulate the interaction of the person with the task environment, CPM X predicts the time course of events as consequences of encoded constraints on human behavior. The constraints determine which cognitive and environmental processes can occur simultaneously and which have sequential dependencies. The input to CPM X comprises (1) a description of a task and strategy in a hierarchical description language and (2) a description of architectural constraints in the form of rules governing interactions of fundamental cognitive, perceptual, and motor operations. The output of CPM X is a Program Evaluation Review Technique (PERT) chart that presents a schedule of predicted cognitive, motor, and perceptual operators interacting with a task environment. The CPM X program allows direct, a priori prediction of skilled user performance on complex human-machine systems, providing a way to assess critical interfaces before they are deployed in mission contexts.

  11. Some queuing network models of computer systems

    NASA Technical Reports Server (NTRS)

    Herndon, E. S.

    1980-01-01

    Queuing network models of a computer system operating with a single workload type are presented. Program algorithms are adapted for use on the Texas Instruments SR-52 programmable calculator. By slightly altering the algorithm to process the G and H matrices row by row instead of column by column, six devices and an unlimited job/terminal population could be handled on the SR-52. Techniques are also introduced for handling a simple load dependent server and for studying interactive systems with fixed multiprogramming limits.

  12. Some Specifications for a Computer-Oriented First Course in Electrical Engineering.

    ERIC Educational Resources Information Center

    Commission on Engineering Education, Washington, DC.

    Reported are specifications for a computer-oriented first course in electrical engineering giving new direction to the development of texts and alternative courses of study. Guidelines for choice of topics, a statement of fundamental concepts, pitfalls to avoid, and some sample course outlines are given. The study of circuits through computer…

  13. Design Principles for "Thriving in Our Digital World": A High School Computer Science Course

    ERIC Educational Resources Information Center

    Veletsianos, George; Beth, Bradley; Lin, Calvin; Russell, Gregory

    2016-01-01

    "Thriving in Our Digital World" is a technology-enhanced dual enrollment course introducing high school students to computer science through project- and problem-based learning. This article describes the evolution of the course and five lessons learned during the design, development, implementation, and iteration of the course from its…

  14. "The 'Mouse' That Roared": Using Computer Labs for Basic Course Group Projects.

    ERIC Educational Resources Information Center

    O'Connor, Penny; Chatham-Carpenter, April

    One of the challenges in teaching a hybrid Basic Course in Communication is the wide variety of topics that can be covered in one semester. Two basic course instructors have found that their recently opened Basic Course computer lab gave them the opportunity to develop interdisciplinary assignments to help more efficiently address various…

  15. Enhancing Basic Course Values and Reducing Problems with a Computer-Assisted Student Assessment Center.

    ERIC Educational Resources Information Center

    Babich, Roger M.

    To alleviate problems with course content, procedure, and philosophy identified by basic communication skills students and faculty, the University of Oklahoma developed a computer assisted Student Assessment Center (SAC) as a basic communication course adjunct. The SAC allows students from all sections of the course to take each of the four unit…

  16. An Evaluation of the Computer Science 11E Course Offered During the Spring Semester of 1973.

    ERIC Educational Resources Information Center

    Durward, M. Lynne; Ellis, E. N.

    The evaluation of Computer Science 11E, a locally-developed course offered in six Vancouver secondary schools, consisted of four parts: a questionnaire to teachers concerning all aspects of their courses, as well as their own evaluation of the program, a questionnaire to students designed to determine their attitude toward the course and what they…

  17. Incorporating electronic-based and computer-based strategies: graduate nursing courses in administration.

    PubMed

    Graveley, E; Fullerton, J T

    1998-04-01

    The use of electronic technology allows faculty to improve their course offerings. Four graduate courses in nursing administration were contemporized to incorporate fundamental computer-based skills that would be expected of graduates in the work setting. Principles of adult learning offered a philosophical foundation that guided course development and revision. Course delivery strategies included computer-assisted instructional modules, e-mail interactive discussion groups, and use of the electronic classroom. Classroom seminar discussions and two-way interactive video conferencing focused on group resolution of problems derived from employment settings and assigned readings. Using these electronic technologies, a variety of courses can be revised to accommodate the learners' needs. PMID:9570421

  18. Deterministic Function Computation with Chemical Reaction Networks*

    PubMed Central

    Chen, Ho-Lin; Doty, David; Soloveichik, David

    2013-01-01

    Chemical reaction networks (CRNs) formally model chemistry in a well-mixed solution. CRNs are widely used to describe information processing occurring in natural cellular regulatory networks, and with upcoming advances in synthetic biology, CRNs are a promising language for the design of artificial molecular control circuitry. Nonetheless, despite the widespread use of CRNs in the natural sciences, the range of computational behaviors exhibited by CRNs is not well understood. CRNs have been shown to be efficiently Turing-universal (i.e., able to simulate arbitrary algorithms) when allowing for a small probability of error. CRNs that are guaranteed to converge on a correct answer, on the other hand, have been shown to decide only the semilinear predicates (a multi-dimensional generalization of “eventually periodic” sets). We introduce the notion of function, rather than predicate, computation by representing the output of a function f : ℕk → ℕl by a count of some molecular species, i.e., if the CRN starts with x1, …, xk molecules of some “input” species X1, …, Xk, the CRN is guaranteed to converge to having f(x1, …, xk) molecules of the “output” species Y1, …, Yl. We show that a function f : ℕk → ℕl is deterministically computed by a CRN if and only if its graph {(x, y) ∈ ℕk × ℕl ∣ f(x) = y} is a semilinear set. Finally, we show that each semilinear function f (a function whose graph is a semilinear set) can be computed by a CRN on input x in expected time O(polylog ∥x∥1). PMID:25383068

  19. Telecommunications/Networking. Course Four. Information Systems Curriculum.

    ERIC Educational Resources Information Center

    O'Neil, Sharon Lund; Everett, Donna R.

    This course is the fourth of seven in the Information Systems curriculum. The purpose of the course is to review data, text, graphics, and voice communications technology. It includes an overview of telecommunications technology. An overview of the course sets forth the condition and performance standard for each of the five task areas in the…

  20. Quantum computation over the butterfly network

    SciTech Connect

    Soeda, Akihito; Kinjo, Yoshiyuki; Turner, Peter S.; Murao, Mio

    2011-07-15

    In order to investigate distributed quantum computation under restricted network resources, we introduce a quantum computation task over the butterfly network where both quantum and classical communications are limited. We consider deterministically performing a two-qubit global unitary operation on two unknown inputs given at different nodes, with outputs at two distinct nodes. By using a particular resource setting introduced by M. Hayashi [Phys. Rev. A 76, 040301(R) (2007)], which is capable of performing a swap operation by adding two maximally entangled qubits (ebits) between the two input nodes, we show that unitary operations can be performed without adding any entanglement resource, if and only if the unitary operations are locally unitary equivalent to controlled unitary operations. Our protocol is optimal in the sense that the unitary operations cannot be implemented if we relax the specifications of any of the channels. We also construct protocols for performing controlled traceless unitary operations with a 1-ebit resource and for performing global Clifford operations with a 2-ebit resource.

  1. Visualization Techniques for Computer Network Defense

    SciTech Connect

    Beaver, Justin M; Steed, Chad A; Patton, Robert M; Cui, Xiaohui; Schultz, Matthew A

    2011-01-01

    Effective visual analysis of computer network defense (CND) information is challenging due to the volume and complexity of both the raw and analyzed network data. A typical CND is comprised of multiple niche intrusion detection tools, each of which performs network data analysis and produces a unique alerting output. The state-of-the-practice in the situational awareness of CND data is the prevalent use of custom-developed scripts by Information Technology (IT) professionals to retrieve, organize, and understand potential threat events. We propose a new visual analytics framework, called the Oak Ridge Cyber Analytics (ORCA) system, for CND data that allows an operator to interact with all detection tool outputs simultaneously. Aggregated alert events are presented in multiple coordinated views with timeline, cluster, and swarm model analysis displays. These displays are complemented with both supervised and semi-supervised machine learning classifiers. The intent of the visual analytics framework is to improve CND situational awareness, to enable an analyst to quickly navigate and analyze thousands of detected events, and to combine sophisticated data analysis techniques with interactive visualization such that patterns of anomalous activities may be more easily identified and investigated.

  2. Visualization techniques for computer network defense

    NASA Astrophysics Data System (ADS)

    Beaver, Justin M.; Steed, Chad A.; Patton, Robert M.; Cui, Xiaohui; Schultz, Matthew

    2011-06-01

    Effective visual analysis of computer network defense (CND) information is challenging due to the volume and complexity of both the raw and analyzed network data. A typical CND is comprised of multiple niche intrusion detection tools, each of which performs network data analysis and produces a unique alerting output. The state-of-the-practice in the situational awareness of CND data is the prevalent use of custom-developed scripts by Information Technology (IT) professionals to retrieve, organize, and understand potential threat events. We propose a new visual analytics framework, called the Oak Ridge Cyber Analytics (ORCA) system, for CND data that allows an operator to interact with all detection tool outputs simultaneously. Aggregated alert events are presented in multiple coordinated views with timeline, cluster, and swarm model analysis displays. These displays are complemented with both supervised and semi-supervised machine learning classifiers. The intent of the visual analytics framework is to improve CND situational awareness, to enable an analyst to quickly navigate and analyze thousands of detected events, and to combine sophisticated data analysis techniques with interactive visualization such that patterns of anomalous activities may be more easily identified and investigated.

  3. Designing for Deeper Learning in a Blended Computer Science Course for Middle School Students

    ERIC Educational Resources Information Center

    Grover, Shuchi; Pea, Roy; Cooper, Stephen

    2015-01-01

    The focus of this research was to create and test an introductory computer science course for middle school. Titled "Foundations for Advancing Computational Thinking" (FACT), the course aims to prepare and motivate middle school learners for future engagement with algorithmic problem solving. FACT was also piloted as a seven-week course…

  4. Computer Controlled Test Systems. Introduction. A Course Based on the IEEE 488 Bus.

    ERIC Educational Resources Information Center

    Herrmann, Eric J.

    An introductory course in computer automated tests and measurement systems based on the International Test Instrument-Computer Interface Standard, the IEEE (Institute of Electrical and Electronics Engineers)-488, is presented in this study guide. This course is designed to: (1) introduce the electronics engineering technician to the functional…

  5. A Computer Literacy Course at Colleges of Education: What and How.

    ERIC Educational Resources Information Center

    Leh, Amy S. C.

    A report recently released by the National Council for Accreditation of Teacher Education (NCATE) promotes the use of technology in colleges of education. To respond to the professional call, several teacher education programs have been offering computer courses to help the future teachers. This research examined one of the computer courses, an…

  6. Converting an Experimental Laboratory Course from Paper and Pencil to Computer

    ERIC Educational Resources Information Center

    Hamilton, Maryellen; Geraci, Lisa

    2004-01-01

    This article provides suggestions for developing a laboratory-based research methods course using computers. We describe important considerations for creating this type of course including selecting software, choosing experiments, and teaching students with different levels of computer skill. We also include 3 model projects that required…

  7. A Survey and Evaluation of Simulators Suitable for Teaching Courses in Computer Architecture and Organization

    ERIC Educational Resources Information Center

    Nikolic, B.; Radivojevic, Z.; Djordjevic, J.; Milutinovic, V.

    2009-01-01

    Courses in Computer Architecture and Organization are regularly included in Computer Engineering curricula. These courses are usually organized in such a way that students obtain not only a purely theoretical experience, but also a practical understanding of the topics lectured. This practical work is usually done in a laboratory using simulators…

  8. THE DEVELOPMENT AND PRESENTATION OF FOUR COLLEGE COURSES BY COMPUTER TELEPROCESSING. FINAL REPORT.

    ERIC Educational Resources Information Center

    MITZEL, HAROLD E.

    THIS IS A FINAL REPORT ON THE DEVELOPMENT AND PRESENTATION OF FOUR COLLEGE COURSES BY COMPUTER TELEPROCESSING FROM APRIL 1964 TO JUNE 1967. IT OUTLINES THE PROGRESS MADE TOWARDS THE PREPARATION, DEVELOPMENT, AND EVALUATION OF MATERIALS FOR COMPUTER PRESENTATION OF COURSES IN AUDIOLOGY, MANAGEMENT ACCOUNTING, ENGINEERING ECONOMICS, AND MODERN…

  9. A Program of Computational Chemistry Exercises for the First-Semester General Chemistry Course

    ERIC Educational Resources Information Center

    Feller, Scott E.; Dallinger, Richard F.; McKinney, Paul Caylor

    2004-01-01

    The computer systems available for molecular modeling are described, along with a discussion of a molecular modeling program created and supported by computational techniques for the first-semester general chemistry course. Various exercises are listed, which direct the learner from a beginner's course in software practice to more complex…

  10. Computational functions in biochemical reaction networks.

    PubMed Central

    Arkin, A; Ross, J

    1994-01-01

    In prior work we demonstrated the implementation of logic gates, sequential computers (universal Turing machines), and parallel computers by means of the kinetics of chemical reaction mechanisms. In the present article we develop this subject further by first investigating the computational properties of several enzymatic (single and multiple) reaction mechanisms: we show their steady states are analogous to either Boolean or fuzzy logic gates. Nearly perfect digital function is obtained only in the regime in which the enzymes are saturated with their substrates. With these enzymatic gates, we construct combinational chemical networks that execute a given truth-table. The dynamic range of a network's output is strongly affected by "input/output matching" conditions among the internal gate elements. We find a simple mechanism, similar to the interconversion of fructose-6-phosphate between its two bisphosphate forms (fructose-1,6-bisphosphate and fructose-2,6-bisphosphate), that functions analogously to an AND gate. When the simple model is supplanted with one in which the enzyme rate laws are derived from experimental data, the steady state of the mechanism functions as an asymmetric fuzzy aggregation operator with properties akin to a fuzzy AND gate. The qualitative behavior of the mechanism does not change when situated within a large model of glycolysis/gluconeogenesis and the TCA cycle. The mechanism, in this case, switches the pathway's mode from glycolysis to gluconeogenesis in response to chemical signals of low blood glucose (cAMP) and abundant fuel for the TCA cycle (acetyl coenzyme A). Images FIGURE 3 FIGURE 4 FIGURE 5 FIGURE 7 FIGURE 10 FIGURE 12 FIGURE 13 FIGURE 14 FIGURE 15 FIGURE 16 PMID:7948674

  11. Computational classifiers for predicting the short-term course of Multiple sclerosis

    PubMed Central

    2011-01-01

    Background The aim of this study was to assess the diagnostic accuracy (sensitivity and specificity) of clinical, imaging and motor evoked potentials (MEP) for predicting the short-term prognosis of multiple sclerosis (MS). Methods We obtained clinical data, MRI and MEP from a prospective cohort of 51 patients and 20 matched controls followed for two years. Clinical end-points recorded were: 1) expanded disability status scale (EDSS), 2) disability progression, and 3) new relapses. We constructed computational classifiers (Bayesian, random decision-trees, simple logistic-linear regression-and neural networks) and calculated their accuracy by means of a 10-fold cross-validation method. We also validated our findings with a second cohort of 96 MS patients from a second center. Results We found that disability at baseline, grey matter volume and MEP were the variables that better correlated with clinical end-points, although their diagnostic accuracy was low. However, classifiers combining the most informative variables, namely baseline disability (EDSS), MRI lesion load and central motor conduction time (CMCT), were much more accurate in predicting future disability. Using the most informative variables (especially EDSS and CMCT) we developed a neural network (NNet) that attained a good performance for predicting the EDSS change. The predictive ability of the neural network was validated in an independent cohort obtaining similar accuracy (80%) for predicting the change in the EDSS two years later. Conclusions The usefulness of clinical variables for predicting the course of MS on an individual basis is limited, despite being associated with the disease course. By training a NNet with the most informative variables we achieved a good accuracy for predicting short-term disability. PMID:21649880

  12. Interdisciplinary Team-Teaching Experience for a Computer and Nuclear Energy Course for Electrical and Computer Engineering Students

    ERIC Educational Resources Information Center

    Kim, Charles; Jackson, Deborah; Keiller, Peter

    2016-01-01

    A new, interdisciplinary, team-taught course has been designed to educate students in Electrical and Computer Engineering (ECE) so that they can respond to global and urgent issues concerning computer control systems in nuclear power plants. This paper discusses our experience and assessment of the interdisciplinary computer and nuclear energy…

  13. Distributed Computer Networks in Support of Complex Group Practices

    PubMed Central

    Wess, Bernard P.

    1978-01-01

    The economics of medical computer networks are presented in context with the patient care and administrative goals of medical networks. Design alternatives and network topologies are discussed with an emphasis on medical network design requirements in distributed data base design, telecommunications, satellite systems, and software engineering. The success of the medical computer networking technology is predicated on the ability of medical and data processing professionals to design comprehensive, efficient, and virtually impenetrable security systems to protect data bases, network access and services, and patient confidentiality.

  14. Time-course gene profiling and networks in demethylated retinoblastoma cell line

    PubMed Central

    Malusa, Federico; Taranta, Monia; Zaki, Nazar; Cinti, Caterina; Capobianco, Enrico

    2015-01-01

    Retinoblastoma, a very aggressive cancer of the developing retina, initiatiates by the biallelic loss of RB1 gene, and progresses very quickly following RB1 inactivation. While its genome is stable, multiple pathways are deregulated, also epigenetically. After reviewing the main findings in relation with recently validated markers, we propose an integrative bioinformatics approach to include in the previous group new markers obtained from the analysis of a single cell line subject to epigenetic treatment. In particular, differentially expressed genes are identified from time course microarray experiments on the WERI-RB1 cell line treated with 5-Aza-2′-deoxycytidine (decitabine; DAC). By inducing demethylation of CpG island in promoter genes that are involved in biological processes, for instance apoptosis, we performed the following main integrative analysis steps: i) Gene expression profiling at 48h, 72h and 96h after DAC treatment; ii) Time differential gene co-expression networks and iii) Context-driven marker association (transcriptional factor regulated protein networks, master regulatory paths). The observed DAC-driven temporal profiles and regulatory connectivity patterns are obtained by the application of computational tools, with support from curated literature. It is worth emphasizing the capacity of networks to reconcile multi-type evidences, thus generating testable hypotheses made available by systems scale predictive inference power. Despite our small experimental setting, we propose through such integrations valuable impacts of epigenetic treatment in terms of gene expression measurements, and then validate evidenced apoptotic effects. PMID:26143641

  15. Theory VI. Computational Materials Sciences Network (CMSN)

    SciTech Connect

    Zhang, Z Y

    2008-06-25

    The Computational Materials Sciences Network (CMSN) is a virtual center consisting of scientists interested in working together, across organizational and disciplinary boundaries, to formulate and pursue projects that reflect challenging and relevant computational research in the materials sciences. The projects appropriate for this center involve those problems best pursued through broad cooperative efforts, rather than those key problems best tackled by single investigator groups. CMSN operates similarly to the DOE Center of Excellence for the Synthesis and Processing of Advanced Materials, coordinated by George Samara at Sandia. As in the Synthesis and Processing Center, the intent of the modest funding for CMSN is to foster partnering and collective activities. All CMSN proposals undergo external peer review and are judged foremost on the quality and timeliness of the science and also on criteria relevant to the objective of the center, especially concerning a strategy for partnering. More details about CMSN can be found on the CMSN webpages at: http://cmpweb.ameslab.gov/ccms/CMSN-homepage.html.

  16. Towards a Versatile Tele-Education Platform for Computer Science Educators Based on the Greek School Network

    ERIC Educational Resources Information Center

    Paraskevas, Michael; Zarouchas, Thomas; Angelopoulos, Panagiotis; Perikos, Isidoros

    2013-01-01

    Now days the growing need for highly qualified computer science educators in modern educational environments is commonplace. This study examines the potential use of Greek School Network (GSN) to provide a robust and comprehensive e-training course for computer science educators in order to efficiently exploit advanced IT services and establish a…

  17. A Course in Algebra and Trigonometry with Computer Programming.

    ERIC Educational Resources Information Center

    Beavers, Mildred; And Others

    This textbook was developed by the Colorado Schools Computing Science (CSCS) Curriculum Development Project. It can be used with high school or college students in an integrated presentation of second-year algebra, trigonometry, and beginning computer programing. (MK)

  18. Network Computer Technology. Phase I: Viability and Promise within NASA's Desktop Computing Environment

    NASA Technical Reports Server (NTRS)

    Paluzzi, Peter; Miller, Rosalind; Kurihara, West; Eskey, Megan

    1998-01-01

    Over the past several months, major industry vendors have made a business case for the network computer as a win-win solution toward lowering total cost of ownership. This report provides results from Phase I of the Ames Research Center network computer evaluation project. It identifies factors to be considered for determining cost of ownership; further, it examines where, when, and how network computer technology might fit in NASA's desktop computing architecture.

  19. An Interdisciplinary Bibliography for Computers and the Humanities Courses.

    ERIC Educational Resources Information Center

    Ehrlich, Heyward

    1991-01-01

    Presents an annotated bibliography of works related to the subject of computers and the humanities. Groups items into textbooks and overviews; introductions; human and computer languages; literary and linguistic analysis; artificial intelligence and robotics; social issue debates; computers' image in fiction; anthologies; writing and the…

  20. Computer networking in an ambulatory health care setting.

    PubMed

    Alger, R; Berkowitz, L L; Bergeron, B; Buskett, D

    1999-01-01

    Computers are a ubiquitous part of the ambulatory health care environment. Although stand-alone computers may be adequate for a small practice, networked computers can create much more powerful and cost-effective computerized systems. Local area networks allow groups of computers to share peripheral devices and computerized information within an office or cluster of offices. Wide area networks allow computers to securely share devices and information across a large geographical area. Either singly or in combination, these networks can be used to create robust systems to help physicians automate their practices and improve their access to important clinical information. In this article, we will examine common network configurations, explain how they function, and provide examples of real-world implementations of networking technology in health care. PMID:10662271

  1. Course Control of Underactuated Ship Based on Nonlinear Robust Neural Network Backstepping Method

    PubMed Central

    Yuan, Junjia; Meng, Hao; Zhu, Qidan; Zhou, Jiajia

    2016-01-01

    The problem of course control for underactuated surface ship is addressed in this paper. Firstly, neural networks are adopted to determine the parameters of the unknown part of ideal virtual backstepping control, even the weight values of neural network are updated by adaptive technique. Then uniform stability for the convergence of course tracking errors has been proven through Lyapunov stability theory. Finally, simulation experiments are carried out to illustrate the effectiveness of proposed control method. PMID:27293422

  2. Course Control of Underactuated Ship Based on Nonlinear Robust Neural Network Backstepping Method.

    PubMed

    Yuan, Junjia; Meng, Hao; Zhu, Qidan; Zhou, Jiajia

    2016-01-01

    The problem of course control for underactuated surface ship is addressed in this paper. Firstly, neural networks are adopted to determine the parameters of the unknown part of ideal virtual backstepping control, even the weight values of neural network are updated by adaptive technique. Then uniform stability for the convergence of course tracking errors has been proven through Lyapunov stability theory. Finally, simulation experiments are carried out to illustrate the effectiveness of proposed control method. PMID:27293422

  3. Interaction, Critical Thinking, and Social Network Analysis (SNA) in Online Courses

    ERIC Educational Resources Information Center

    Thormann, Joan; Gable, Samuel; Fidalgo, Patricia Seferlis; Blakeslee, George

    2013-01-01

    This study tried to ascertain a possible relationship between the number of student moderators (1, 2, and 3), online interactions, and critical thinking of K-12 educators enrolled in an online course that was taught from a constructivist approach. The course topic was use of technology in special education. Social network analysis (SNA) and…

  4. An Experimental Analysis of Computer-Mediated Instruction and Student Attitudes in a Principles of Financial Accounting Course.

    ERIC Educational Resources Information Center

    Basile, Anthony; D'Aquila, Jill M.

    2002-01-01

    Accounting students received either traditional instruction (n=46) or used computer-mediated communication and WebCT course management software. There were no significant differences in attitudes about the course. However, computer users were more positive about course delivery and course management tools. (Contains 17 references.) (SK)

  5. Efficiently modeling neural networks on massively parallel computers

    NASA Technical Reports Server (NTRS)

    Farber, Robert M.

    1993-01-01

    Neural networks are a very useful tool for analyzing and modeling complex real world systems. Applying neural network simulations to real world problems generally involves large amounts of data and massive amounts of computation. To efficiently handle the computational requirements of large problems, we have implemented at Los Alamos a highly efficient neural network compiler for serial computers, vector computers, vector parallel computers, and fine grain SIMD computers such as the CM-2 connection machine. This paper describes the mapping used by the compiler to implement feed-forward backpropagation neural networks for a SIMD (Single Instruction Multiple Data) architecture parallel computer. Thinking Machines Corporation has benchmarked our code at 1.3 billion interconnects per second (approximately 3 gigaflops) on a 64,000 processor CM-2 connection machine (Singer 1990). This mapping is applicable to other SIMD computers and can be implemented on MIMD computers such as the CM-5 connection machine. Our mapping has virtually no communications overhead with the exception of the communications required for a global summation across the processors (which has a sub-linear runtime growth on the order of O(log(number of processors)). We can efficiently model very large neural networks which have many neurons and interconnects and our mapping can extend to arbitrarily large networks (within memory limitations) by merging the memory space of separate processors with fast adjacent processor interprocessor communications. This paper will consider the simulation of only feed forward neural network although this method is extendable to recurrent networks.

  6. A topology for computer networks with good survivability characteristics and low transmission delays between node computers

    NASA Technical Reports Server (NTRS)

    Kelly, G. L.; Jiang, D. P.

    1984-01-01

    Various network topologies are developed which have not appeared in the literature before which result in minimum diameter graphs for computer networks having connectivity four. The topologies presented have good survivability characteristics and result in more topologies being available for computer network designers which achieve the minimum diameter resulting in small transmission delays.

  7. Talking about Code: Integrating Pedagogical Code Reviews into Early Computing Courses

    ERIC Educational Resources Information Center

    Hundhausen, Christopher D.; Agrawal, Anukrati; Agarwal, Pawan

    2013-01-01

    Given the increasing importance of soft skills in the computing profession, there is good reason to provide students withmore opportunities to learn and practice those skills in undergraduate computing courses. Toward that end, we have developed an active learning approach for computing education called the "Pedagogical Code Review"…

  8. Computer Course Articulation among High Schools and Colleges and Universities in the State of Arizona.

    ERIC Educational Resources Information Center

    Babcock, Gifford M.

    The purpose of this study was to determine the extent of communication between Arizona's secondary schools and postsecondary institutions concerning computer education and computer literacy. A document analysis of college catalogs and a survey of 70 school districts determined the extent of advanced placement courses, computer education services,…

  9. Evaluating the Effectiveness of Collaborative Computer-Intensive Projects in an Undergraduate Psychometrics Course

    ERIC Educational Resources Information Center

    Barchard, Kimberly A.; Pace, Larry A.

    2010-01-01

    Undergraduate psychometrics classes often use computer-intensive active learning projects. However, little research has examined active learning or computer-intensive projects in psychometrics courses. We describe two computer-intensive collaborative learning projects used to teach the design and evaluation of psychological tests. Course…

  10. Administrators' Perceptions of Community College Students' Computer Literacy Skills in Beginner Courses

    ERIC Educational Resources Information Center

    Ragin, Tracey B.

    2013-01-01

    Fundamental computer skills are vital in the current technology-driven society. The purpose of this study was to investigate the development needs of students at a rural community college in the Southeast who lacked the computer literacy skills required in a basic computer course. Guided by Greenwood's pragmatic approach as a reformative force in…